Search

1901 results. Displaying page 1 of 39.

Security Now

Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.

MacBreak

The only Macintosh show you'll ever need. Mac experts Leo Laporte, Kendra Arimoto, Emery Wells, Merlin Mann and Alex Lindsay talk about everything Mac, including hardware, software, pro apps, and...

The Tech Guy

No one does a better job of explaining technology, computers, and the Internet than Leo Laporte. This feed contains the full audio of his twice weekly radio talk show as heard on stations all over...

Jumping Monkeys

Join Megan Morrone, mother of three toddlers, and Leo Laporte, father of two teens, as they talk about parenting in the digital age, featuring lots of helpful links and advice, plus interviews with...

Abby's Road

Join high school senior Abby Laporte and her guests as they offer fresh perspectives on the difficult subjects of teen sex, drugs, decision making, friends, parents, money, driving, new...

TWiT Photo

Professional photographer Catherine Hall and overenthusiastic amateur Leo Laporte chat with some of the world's leading and most inspirational image-makers. Learn tips from acclaimed pros as they...

Know How...

Know How...Gaming: Get your gaming on! Jason Howell and Ars Technica's Sam Machkovech bring you 12 episodes and cover it all, from tips and tricks, consoles, gaming rigs, controllers, Virtual...

OMGcraft

OMGcraft is your one-stop-shop for everything Minecraft. Discover the big new tips, tricks, and stuff you should know about Minecraft. Hosted by Chad Johnson, this show will make you a Minecraft...

Coding 101

Join Father Robert Ballecer and Lou Maresca on Coding 101, a weekly instructional, project-oriented programming show with appeal for beginning to intermediate programmers. Using a combination of...

Marketing Mavericks

Marketing Mavericks covers the intersection of marketing and tech. Each week, Tonya Hall interviews top marketing professionals to discuss case studies, communication strategies, and brand insights...

Security Now! Episode 2

This week Steve talks about Microsoft's Strider HoneyMonkey project. It's catching bad guys, but Microsoft isn't sharing the information with the rest of the world. Is it ok to withhold security...

Security Now! Episode 3 is Live

In this edition Steve Gibson and Leo Laporte talk about the benefits of NAT routers. If you're on a broadband connection: Use a router (even if it's not labeled a "firewall" it works as one) Change...

Passwords

In this edition Steve Gibson and Leo Laporte talk about passwords, but first an update from last week's show, including a look at the Smoothwall Linux distribution. Microsoft security expert,...

Keyboard Snooping

On this episode Steve and I discuss a recent report from the University of California that researchers have been able to turn audio recordings of keystrokes into the text typed with 90% accuracy....

Spyware

It had to happen eventually, the man who coined the term Spyware, and wrote the first spyware removal program, addresses it. This is the ultimate spyware primer, what it is, how it works, and what...

DDoS Attacks

Steve explains how Denial of Service (DOS) attacks happen, and how the newer Distributed Denial of Services attacks (DDoS) have changed the game. Can a router protect you? No. Can a proxy server...

Rootkits

This week Steve and I discuss Rootkits and how spyware is beginning to used this advanced hacker technique to hide from you (and removal tools). We also recommend an excellent rootkit revealer....

Wireless Access Points

In this episode we discuss security concerns with wireless access points. First, we revisit last week's podcast on rootkits. After doing the show we tested RootkitRevealer on a number of machines...

WEP and MAC Address Filtering

In this episode Steve debunks three popular forms of Wi-Fi security: MAC address filtering, WEP encryption, and SSID hiding. He explains why none of these are effective security except against...

Sony/BMG's Rootkit DRM

The Sony/BMG DRM rootkit was first discovered by F-Secure and widely publicized by Mark Russinovich of Sysinternals in his blog. The Sony DRM hides itself by modifying the Windows kernel, names...

WPA

In this episode we wrap up Wi-Fi security with a discussion of WPA.

VPNs

In this episode Steve explains how VPNs can protect you on open Wi-Fi networks. He also announces the grc.com WPA password generator.

Your Questions, Steve's Answers

In this episode Steve answers your questions on a variety of security issues including: The best way to store passwords Managing guests on your wireless network Why you should never use a public...

PPTP and IPSec

In this episode Steve continues his quest for the perfect way to secure your connection on the road. In this episode he talks about two secure protocols, PPTP and IPSec, which are commonly used for...

Hamachi

Steve reviews a new, free, VPN solution called Hamachi - and he likes what he sees.

OpenVPN

Steve finishes out his search for a way to secure hotspot Internet access with a look at OpenVPN. But first, he responds to some issues from previous shows... Steve offers newsgroup style security...

Your Questions, Steve's Answers

On this show we discuss: Logging into secure sites Hamachi troubles Getting WPA security on old wi-fi equipment Securing Windows Remote Desktop The unreliabilty of fingerprint scanners Using Gmail...

Ilfak Guilanov and the WMF Flaw

As we've told you in the past two editions of Security Now! there's a very serious security flaw in all versions of Windows. This hole takes advantage of poor design choice in the Windows metafile...

The WMF Backdoor

Microsoft has patched the WMF vulnerability in Windows 2000 and XP, but in his research for a fix for Windows 95/98/Me Steve has come up with a blockbuster. It is his considered opinion that the...

Mousetrap

It's now pretty clear that the ability to execute code in WMF graphics files was intentional - but we may never know why it's there. Steve wraps up the subject, lays a few myths to rest, explains...

Your Questions, Steve's Answers

Our monthly question and answer session with Steve Gibson...

How the Internet Works, Pt. 1

Steve talks about the Kama Sutra virus, scheduled to strike tomorrow, and PC World's anti-virus roundup. Then we delve into How the Internet Works, part 1. We'll wrap things up next week.

How the Internet Works, Pt. 2

Part 2 of Steve's discussion of how the fundamental Internet technologies work. This and the previous episode will provide the foundation for our future podcasts on Internet security issues.

How LANs Work, Pt. 1

Steve continues to lay a foundation on understanding networking. This week, part one of how LANs work. We cover DHCP, Subnet Masks, Routers, and hubs. We'll conclude with part two on episode 29.

The Road to 1080p, Part 1

Behind-the-scenes of an HD shoot. See how the next episode of MacBreak is being produced with high-end cameras and, of course, Macs!. The Pixel Corps' Alex Lindsay gives you a tour of the on-set...

Your Questions, Steve's Answers

Steve answers your questions on this episide. With further clarification on VPN security, Hamachi, and the answer to the eternal question, which operating system is the most secure.

Ethernet Insecurity

In this week's marathon edition Steve tackles security issues inherent to Ethernet, including ARP spoofing.

Crypto Issues

This week Steve takes a look at how cryptography is used and the difficult issues strong crypto raises.

Crypto 102

This week Steve continues his discussion of crypto with a look at secret decoder rings and one-time pads.

XP on Mac

Ben Durbin of the Pixel Corps followed the instructions at onmac.net and got Windows XP running on one of the new Intel Mac Minis just like that. This is no kludge - it runs very well. No network...

Q&A

Episode 32 is our monthly question and answer session.

Symmetric Block Ciphers

Part three of Steve's overview of cryptography looks at symmetric block ciphers.

Public Key Cryptography

This week Steve explains how public key cryptography works, and we welcome our new sponsor, Astaro! Thanks so much for the support guys.

Video Compression with QuickTime Pro

In this episode, MacBreak hosts Alex Lindsay and Emery Wells discuss video compression techniques and strategies for creating high-quality videos with the smallest file size possible.

Cryptographic Hashes

This week Steve talks about how cryptographic hashes work and are used to verify the integrity of files and email. We also talk about email signing and recommend the Gnu Privacy Guard.

One Dozen Questions

As usual on every fourth episode, Steve answers listener questions.

Primes and Certificates

We wrap up our talk about cryptography with a discussion of prime number generation, key recovery, and digital certificates.

The Road to 1080p, Part 3

Our final look behind-the-scenes at MacBreak as Alex shows us how episodes are composited in Apple Shake.

Browser Security

Why is Internet Explorer so insecure? What can you do to secure it? And why is it so hard to make a secure browser? Steve talks about security policy vs. browser flaws, how he uses IE safely, and...

Enter the Automatrix

Apple's Applescript Product Manager, Sal Soghoian, make Automator jump through hoops.