1767 results. Displaying page 1 of 36.

Security Now! Episode 2

This week Steve talks about Microsoft's Strider HoneyMonkey project. It's catching bad guys, but Microsoft isn't sharing the information with the rest of the world. Is it ok to withhold security...

Security Now! Episode 3 is Live

In this edition Steve Gibson and Leo Laporte talk about the benefits of NAT routers. If you're on a broadband connection: Use a router (even if it's not labeled a "firewall" it works as one) Change...


In this edition Steve Gibson and Leo Laporte talk about passwords, but first an update from last week's show, including a look at the Smoothwall Linux distribution. Microsoft security expert,...

Keyboard Snooping

On this episode Steve and I discuss a recent report from the University of California that researchers have been able to turn audio recordings of keystrokes into the text typed with 90% accuracy....


It had to happen eventually, the man who coined the term Spyware, and wrote the first spyware removal program, addresses it. This is the ultimate spyware primer, what it is, how it works, and what...

DDoS Attacks

Steve explains how Denial of Service (DOS) attacks happen, and how the newer Distributed Denial of Services attacks (DDoS) have changed the game. Can a router protect you? No. Can a proxy server...


This week Steve and I discuss Rootkits and how spyware is beginning to used this advanced hacker technique to hide from you (and removal tools). We also recommend an excellent rootkit revealer....

Wireless Access Points

In this episode we discuss security concerns with wireless access points. First, we revisit last week's podcast on rootkits. After doing the show we tested RootkitRevealer on a number of machines...

WEP and MAC Address Filtering

In this episode Steve debunks three popular forms of Wi-Fi security: MAC address filtering, WEP encryption, and SSID hiding. He explains why none of these are effective security except against...

Sony/BMG's Rootkit DRM

The Sony/BMG DRM rootkit was first discovered by F-Secure and widely publicized by Mark Russinovich of Sysinternals in his blog. The Sony DRM hides itself by modifying the Windows kernel, names...


In this episode we wrap up Wi-Fi security with a discussion of WPA.


In this episode Steve explains how VPNs can protect you on open Wi-Fi networks. He also announces the WPA password generator.

Your Questions, Steve's Answers

In this episode Steve answers your questions on a variety of security issues including: The best way to store passwords Managing guests on your wireless network Why you should never use a public...

PPTP and IPSec

In this episode Steve continues his quest for the perfect way to secure your connection on the road. In this episode he talks about two secure protocols, PPTP and IPSec, which are commonly used for...


Steve reviews a new, free, VPN solution called Hamachi - and he likes what he sees.


Steve finishes out his search for a way to secure hotspot Internet access with a look at OpenVPN. But first, he responds to some issues from previous shows... Steve offers newsgroup style security...

Ilfak Guilanov and the WMF Flaw

As we've told you in the past two editions of Security Now! there's a very serious security flaw in all versions of Windows. This hole takes advantage of poor design choice in the Windows metafile...

The WMF Backdoor

Microsoft has patched the WMF vulnerability in Windows 2000 and XP, but in his research for a fix for Windows 95/98/Me Steve has come up with a blockbuster. It is his considered opinion that the...


It's now pretty clear that the ability to execute code in WMF graphics files was intentional - but we may never know why it's there. Steve wraps up the subject, lays a few myths to rest, explains...

How the Internet Works, Pt. 1

Steve talks about the Kama Sutra virus, scheduled to strike tomorrow, and PC World's anti-virus roundup. Then we delve into How the Internet Works, part 1. We'll wrap things up next week.

How the Internet Works, Pt. 2

Part 2 of Steve's discussion of how the fundamental Internet technologies work. This and the previous episode will provide the foundation for our future podcasts on Internet security issues.

How LANs Work, Pt. 1

Steve continues to lay a foundation on understanding networking. This week, part one of how LANs work. We cover DHCP, Subnet Masks, Routers, and hubs. We'll conclude with part two on episode 29.

Ethernet Insecurity

In this week's marathon edition Steve tackles security issues inherent to Ethernet, including ARP spoofing.

Crypto Issues

This week Steve takes a look at how cryptography is used and the difficult issues strong crypto raises.

Crypto 102

This week Steve continues his discussion of crypto with a look at secret decoder rings and one-time pads.

Symmetric Block Ciphers

Part three of Steve's overview of cryptography looks at symmetric block ciphers.

Public Key Cryptography

This week Steve explains how public key cryptography works, and we welcome our new sponsor, Astaro! Thanks so much for the support guys.

Cryptographic Hashes

This week Steve talks about how cryptographic hashes work and are used to verify the integrity of files and email. We also talk about email signing and recommend the Gnu Privacy Guard.

One Dozen Questions

As usual on every fourth episode, Steve answers listener questions.

Primes and Certificates

We wrap up our talk about cryptography with a discussion of prime number generation, key recovery, and digital certificates.

Browser Security

Why is Internet Explorer so insecure? What can you do to secure it? And why is it so hard to make a secure browser? Steve talks about security policy vs. browser flaws, how he uses IE safely, and...

Buffer Overflows

Buffer overflows... they're the most common kind of security flaw, but what are they and how do they happen? Finally, how can we protect ourselves from them? Steve explains all.


The ultimate encryption program, free, open source, strong, and flexible: Truecrypt.

NAT Traversal

Steve explains the clever technique that Skype and other programs use to end around NAT routers.


Ever wonder what a port is? Steve explains what they are and what terms like "stealth ports" and "port sniffing mean." Leo reads a little poetry.

Twelve Questions

More on Virtualization technology, with a special focus on VMWare's Virtual Appliances.

Router Logs

This week Steve tells us what to do with the router logs. What a router can (and can't) tell you about your security situation? For 16kpbs versions, transcripts, and notes, visit Steve's site: grc...

The HOSTS File

This week Steve explains the mysterious HOSTS file - part of Windows, OS X, Linux, and many other operating systems. He talks about how malicious programs may misuse it, and how you can use it to...

Internet Weaponry

This week Steve tells us about distributed denial of service attacks and how hackers use IRC botnets to create them.

KFI Tech Guy #237

Apple releases Boot Camp, a program that makes it easy to run Windows on Intel Macs. But that's not all. A company called Parallels has released software that lets you run Windows programs in OS X...

KFI Tech Guy #238

Do you spend your time "screensucking"? Do you get "email voice" on the phone? I hope you're not being a "cellopain"? New words coined by Dr. Edward M. Hallowell (who also coined the term Adult...

KFI Tech Guy #239

The video tape recorder is 50 years old. Was AOL blocking email with links to

KFI Tech Guy #240

Next year's Infiniti G35 will come with a 9.5GB hard drive for ripping CDs! Yay! The Beatles are planning to offer their music online.

KFI Tech Guy #241

Yahoo turns in another Chinese dissident. According to Apple, 50% of people buying Macs at the Apple Store are new users. That's very good news for Apple, a challenge for Microsoft which won't ship...

KFI Tech Guy #242

Have you seen the Air Force One graffiti video? Looks real enough to have fooled the Air Force, but the perpatrators admit, it's a hoax. Should cities legislate for Wi-Fi security? That's what tony...

KFI Tech Guy #243

Leo Laporte the Tech Guy on KFI is taking YOUR calls.

KFI Tech Guy #244

11a-Noon Charlie - help I’ve got a trojan horse John in New York - learning UNIX on OS X Johnny in Sherman Oaks - Looking for Linux CD and DVD cataloging Noon-1p Chris in Lakewood - replace...

KFI Tech Guy #245

Is it ok to use a shopkeeper's time to research a purchase you'll make elsewhere? We'll discuss the old Hebrew "Shopkeeper's Law." And when a retailer like Best Buy treats its customers as a...

KFI Tech Guy #246

11a-Noon BJ - Quark ate my files Ryan in Boston - wi-fi router loses connection several times a day Bill in Monterey Park - 15 minutes to boot Nick in Culver City - he’s getting numbers instead of...

KFI Tech Guy #247

Last chance for free tickets to next weekend's MacGathering. Use the promo code LEO for free exhibit passes. Apple has shipped a big patch (apply it now!) but according to one researcher it's not...