Hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network
POPULARITY
Categories
Praveen Ghanta recently turned 47 and started to look at the things he wanted to do - but potentially couldn't do in the future. He's married with 3 teenage kids, and has been into running for quite some time. So much so, that he attempted to run a 5 minute mile... and almost made it. Also, he recently signed up for soccer classes, after having been beat by some eighth grade kids, who helped him realize he needed training in his ball handling skills.In his prior startup, Praveen and his team stumbled upon a new approach to hiring that fueled the building of this startup, all the way through exit. After that success, he decided to make this approach available to others, and form a business around this very thing - fractional talent for your startup.This is the creation story of Fraction and DevHawk.SponsorsVentionCodeCrafters helps you become a better engineer by building real-world, production-grade projects. Learn hands-on by creating your own Git, Redis, HTTP server, SQLite, or DNS server from scratch. Sign up for free today using this link and enjoy 40% off.Full ScalePaddle.comSema SoftwarePropelAuthPostmanMeilisearchLinkshttps://www.hirefraction.com/https://www.devhawk.ai/https://www.linkedin.com/in/pghanta/Support this podcast at — https://redcircle.com/code-story-insights-from-startup-tech-leaders/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
Our ligaments, tendons, and overall musculoskeletal system can take a real hit during the menopause transition, making injuries more frequent and recovery slower. Too often, practitioners still overlook common issues like tendinopathies—leaving women to live with unnecessary pain before getting an accurate diagnosis and effective treatment. This week's guest, former pro triathlete and licensed massage therapist Jan Wanklyn, dives into the unique musculoskeletal challenges active menopausal women face, the soft tissue therapies (like ART) and exercise strategies that can help, and why she wishes hormone therapy had been an option back in her day.Jan Wanklyn, LMT, has been a massage therapist for 34 years. She is an Active Release Techniques® (ART) instructor and practitioner (1998–2025) and former professional triathlete with five Ironman wins (Germany, New Zealand ×3, Australia) and two Philadelphia Marathon victories. She holds a Human Movement Studies degree (University of Queensland) and a Graduate Diploma in Teaching, taught PE for eight years, and has coached triathletes online and in person. Jan's clinical toolkit spans Contemporary Medical Acupuncture, K-taping, DNS, SFMA, Smart Tools/IASTM, and extensive wet-lab/cadaver and running biomechanics training. She practices at Northside Chiropractic Clinic in Brisbane, QLD and has a private practice on the Sunshine Coast -North of Brisbane you can contact through Active Release Australia / Jan Wanklyn on Instagram.Resources:Active Release Techniques at Physio-PediaSign up for our FREE Feisty 40+ newsletter: https://feisty.co/feisty-40/Join our Feisty Winter Training for Cyclists at https://feisty.co/ and look for the yellow banner at the top of the page. Use code HITPLAY50 to save $50 Learn More and Register for our 2026 Tucson Bike Camp: https://feisty.co/events/gravel-camp-x-bike-mechanic-school/ Follow Us on Instagram:Feisty Menopause: @feistymenopause Hit Play Not Pause Facebook Group: https://www.facebook.com/groups/807943973376099 Support our Partners:Cozy Earth: Use Code HITPLAY at https://cozyearth.com/ Midi Health: You Deserve to Feel Great. Book your virtual visit today at https://www.joinmidi.com/Previnex: Get 15% off your first order with code HITPLAY at https://www.previnex.com/ Nutrisense: Go to nutrisense.io/hitplay and use code: HITPLAY to get 30% offWahoo KICKR RUN: Use the code FEISTY to get a free Headwind Smart Fan (value $300) with the purchase of a Wahoo KICKR RUN at https://shorturl.at/maTzL
Chris Wallis lives in London, and grew up on a farm in the UK. He was the kid running around the countryside climbing trees - until his parents bought a computer when he was 15. Past that point, he didn't leave the house much, learning to code and digging into ethical hacking. Outside of tech, he is into tennis, swimming, alpine skiing and surfing. He finds himself in phases with these sports, and rotates them often.In the past, Chris was an ethical hacker, and spent a long time busting into big name systems. Eventually, he moved into one of those companies - and he realized that the tooling out there to discover attack surface weaknesses were lagging. He decided to build a platform that got the job done.This is the creation story of Intruder.SponsorsVentionCodeCrafters helps you become a better engineer by building real-world, production-grade projects. Learn hands-on by creating your own Git, Redis, HTTP server, SQLite, or DNS server from scratch. Sign up for free today using this link and enjoy 40% off.Full ScalePaddle.comSema SoftwarePropelAuthPostmanMeilisearchLinkshttps://www.intruder.io/https://www.linkedin.com/in/chris-wallis/Support this podcast at — https://redcircle.com/code-story-insights-from-startup-tech-leaders/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
Topics covered in this episode: httptap 10 Smart Performance Hacks For Faster Python Code FastRTC Explore Python dependencies with pipdeptree and uv pip tree Extras Joke Watch on YouTube About the show Sponsored by us! Support our work through: Our courses at Talk Python Training The Complete pytest Course Patreon Supporters Connect with the hosts Michael: @mkennedy@fosstodon.org / @mkennedy.codes (bsky) Brian: @brianokken@fosstodon.org / @brianokken.bsky.social Show: @pythonbytes@fosstodon.org / @pythonbytes.fm (bsky) Join us on YouTube at pythonbytes.fm/live to be part of the audience. Usually Monday at 10am PT. Older video versions available there too. Finally, if you want an artisanal, hand-crafted digest of every week of the show notes in email form? Add your name and email to our friends of the show list, we'll never share it. Michael #1: httptap Rich-powered CLI that breaks each HTTP request into DNS, connect, TLS, wait, and transfer phases with waterfall timelines, compact summaries, or metrics-only output. Features Phase-by-phase timing – precise measurements built from httpcore trace hooks (with sane fallbacks when metal-level data is unavailable). All HTTP methods – GET, POST, PUT, PATCH, DELETE, HEAD, OPTIONS with request body support. Request body support – send JSON, XML, or any data inline or from file with automatic Content-Type detection. IPv4/IPv6 aware – the resolver and TLS inspector report both the address and its family. TLS insights – certificate CN, expiry countdown, cipher suite, and protocol version are captured automatically. Multiple output modes – rich waterfall view, compact single-line summaries, or -metrics-only for scripting. JSON export – persist full step data (including redirect chains) for later processing. Extensible – clean Protocol interfaces for DNS, TLS, timing, visualization, and export so you can plug in custom behavior. Example: Brian #2: 10 Smart Performance Hacks For Faster Python Code Dido Grigorov A few from the list Use math functions instead of operators Avoid exception handling in hot loops Use itertools for combinatorial operations - huge speedup Use bisect for sorted list operations - huge speedup Michael #3: FastRTC The Real-Time Communication Library for Python: Turn any python function into a real-time audio and video stream over WebRTC or WebSockets. Features
We break down how a small DNS error inside AWS rippled into a global outage, and why it affected everything from uploads to streaming to... beds? Andy Szoke, Developer at Punchmark, joins us to explain cloud basics, Lambda bottlenecks, and redundancy.Send us a text Send feedback or learn more about the podcast: punchmark.com/loupe Learn about Punchmark's website platform: punchmark.com Inquire about sponsoring In the Loupe and showcase your business on our next episode: podcast@punchmark.com
By the end, it is hard to believe that in 2025, less than 30% of all Web Domains have properly configured SPF, DMARC, and DKIM records. Yep, less than 30% of the top 10 million domains. I sit down with Al Iverson of Valimail to talk about DNS records and the importance of SPF, DMARC, and DKIM records. Might sound a bit boring...At the end of November, bulk mailing will stop working for your company if you don't have those records configured correctly.
We dive into your configs, the genius moves, the glorious blunders, and everything in between.Sponsored By:Managed Nebula: Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love. 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps. CrowdHealth: Discover a Better Way to Pay for Healthcare with Crowdfunded Memberships. Join CrowdHealth to get started today for $99 for your first three months using UNPLUGGED.Unraid: A powerful, easy operating system for servers and storage. Maximize your hardware with unmatched flexibility. Support LINUX UnpluggedLinks:
Episode #358 - The Essential Guide to Domain Verification for Ecommerce Brands Ever throw a party and forget to tell the bouncer who's on the list? Suddenly your best friends are stuck outside while total randos waltz right in. That's basically what happens when you skip domain verification - and your emails are the ones getting bounced.
Facebook knowingly sending you scam adds and making a fortune! Michael Burry agrees with Erik that we might have an AI bubble, My daughter getting scammed? My Internet provider changed its Terms, HP C8180 Printer driver does NOT exist. My laptop can't connect is my DNS correct?
Erez Druk grew up in Israel, but has been in the Bay Area for many years. He has a common theme in his life of obsessing over his current thing. In the 4th grade it was the saxophone, and later on it was being Israel's board game champion, and then - he became obsessed with startups. Outside of tech, he is married and expecting his first child. He's into exercising, reading and coffee. His favorite is going to a coffee shop with his wife, and having a cappuccino and a pastry - but at home, he leans towards his aeropress.Eight years ago, Erez met his wife who was heading into medical school. He got to see first hand how folks in the healthcare system work, and how hard their jobs are. After wrapping up his prior startup, he started down the path of building a solution that improved the lives of these clinicians.This is the creation story of Freed.SponsorsVentionCodeCrafters helps you become a better engineer by building real-world, production-grade projects. Learn hands-on by creating your own Git, Redis, HTTP server, SQLite, or DNS server from scratch. Sign up for free today using this link and enjoy 40% off.Full ScalePaddle.comSema SoftwarePropelAuthPostmanMeilisearchLinkshttps://www.getfreed.ai/https://www.linkedin.com/in/drukerez/Support this podcast at — https://redcircle.com/code-story-insights-from-startup-tech-leaders/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
Today the IPv6 Buzz crew provides updates on the latest in IPv6 standards, RFCs, and best practices. They break down the recent discussions around RFC 6052, explore the options for RFC 8215, and share Nick's spin on the now defunct testipv6.com site. Episode Links: RFC 6052 RFC 8215 RFC 6598 IPv6.army
Today the IPv6 Buzz crew provides updates on the latest in IPv6 standards, RFCs, and best practices. They break down the recent discussions around RFC 6052, explore the options for RFC 8215, and share Nick’s spin on the now defunct testipv6.com site. Episode Links: RFC 6052 RFC 8215 RFC 6598 IPv6.army
If you think managing Kubernetes clusters is hard, what about managing Kubernetes clusters across three different public clouds? We dive into the challenges that arises from running multi-cloud Kubernetes workloads. These challenges include workload identity, DNS query resolutions, and security. Here to help us navigate this complexity and offer possible solutions is Goutam Tadi, Staff... Read more »
If you think managing Kubernetes clusters is hard, what about managing Kubernetes clusters across three different public clouds? We dive into the challenges that arises from running multi-cloud Kubernetes workloads. These challenges include workload identity, DNS query resolutions, and security. Here to help us navigate this complexity and offer possible solutions is Goutam Tadi, Staff... Read more »
Send us a textStart with a simple truth: when the platform breaks, your clever architecture won't save you. We dig into the AWS US‑East‑1 outage where DynamoDB's role in DNS planning for load balancers collided with a race condition, leaving empty records and stalled EC2 instances. Forget the finger‑wagging about “well‑architected” apps—this was a platform failure with limited customer escape routes. We weigh multi‑region and multi‑cloud trade‑offs with a sober look at cost, complexity, and operational burden.Security took center stage with two high‑risk stories you need to act on. First, a critical WSUS flaw enabling remote unauthenticated code execution against the very servers meant to protect fleets. If WSUS is still live, patch immediately or take it offline until you can. Then, the F5 source code theft: not a cloning threat, but a blueprint for discovering subtle bugs and crafting precise exploits. Attribution points toward Chinese state‑sponsored actors, which means targeted, quiet use rather than noisy mass exploitation. The risk isn't gone when headlines fade; it's just harder to see.We connect this to rising exploitation of vSock across hypervisors like VMware ESXi. With public PoCs and active abuse, vSock opens covert channels from host to guest, making segmentation and management plane isolation non‑negotiable. Patch aggressively, gate access through jump hosts, enforce MFA, and consider disabling vSock where viable on QEMU stacks. These are concrete steps that cut real risk.Then we turn to the elephant in the data center: AI ROI. Vendors keep shipping agentic assistants and copilots, but few can show durable returns outside a subsidized token economy. We share a pragmatic lens for measuring value—cycle time, MTTR, defect rates—while acknowledging the dot‑com‑style arc ahead: hype, correction, then durable wins that prioritize efficiency. As AI demand drives massive new builds, the physical footprint of the cloud is showing up in local power grids and skylines. Infrastructure choices now carry community and energy implications leaders can't ignore.Subscribe, share with a colleague who owns platform reliability or security, and leave a review with your biggest takeaway or question—what will you patch, segment, or measure first?Purchase Chris and Tim's book on AWS Cloud Networking: https://www.amazon.com/Certified-Advanced-Networking-Certification-certification/dp/1835080839/ Check out the Monthly Cloud Networking Newshttps://docs.google.com/document/d/1fkBWCGwXDUX9OfZ9_MvSVup8tJJzJeqrauaE6VPT2b0/Visit our website and subscribe: https://www.cables2clouds.com/Follow us on BlueSky: https://bsky.app/profile/cables2clouds.comFollow us on YouTube: https://www.youtube.com/@cables2clouds/Follow us on TikTok: https://www.tiktok.com/@cables2cloudsMerch Store: https://store.cables2clouds.com/Join the Discord Study group: https://artofneteng.com/iaatj
If you think managing Kubernetes clusters is hard, what about managing Kubernetes clusters across three different public clouds? We dive into the challenges that arises from running multi-cloud Kubernetes workloads. These challenges include workload identity, DNS query resolutions, and security. Here to help us navigate this complexity and offer possible solutions is Goutam Tadi, Staff... Read more »
Mrinal Wadhwa grew up in India with a Dad in the Armed Forces, so he moved around a lot. His mother was a teacher for 40+ years, and greatly influenced his love for teaching. In addition to this, he grew up loving to build things. He was introduced to computers and the internet by his cousin - and at that point he was hooked. Outside of tech, he is married and enjoys attending concerts in the Bay Area. He plays pool, very seriously. In fact, he is the guy carrying the little bag into a party with his own pool stick.Mrinal is one of the minds behind Okham, a popular open source Rust toolkit to build secure communications between applications. Late last year, he observed people desiring to build the layer between agent communications... and decided to build something to do it the right way.This is the creation story of Autonomy.SponsorsVentionCodeCrafters helps you become a better engineer by building real-world, production-grade projects. Learn hands-on by creating your own Git, Redis, HTTP server, SQLite, or DNS server from scratch. Sign up for free today using this link and enjoy 40% off.Full ScalePaddle.comSema SoftwarePropelAuthPostmanMeilisearchLinkshttps://autonomy.computer/https://docs.ockam.io/https://www.linkedin.com/in/mrinalwadhwa/Support this podcast at — https://redcircle.com/code-story-insights-from-startup-tech-leaders/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
professorjrod@gmail.comEver wonder how your phone grabs an IP address the instant you join Wi‑Fi? We break down the invisible handshake that makes it happen: DORA. From discovery to acknowledgement, we map each step of the DHCP exchange, explain lease timers, and show how networks hand out addresses at scale without stepping on their own toes. Along the way, we share practical stories from classrooms, offices, and coffee shops that turn abstract packets into clear mental models.We go deeper than definitions. You'll learn how scopes shape address pools, why reservations keep printers stable, and how APIPA exposes broken paths with 169.254.x.x clues. In segmented environments, relays and the GIADDR field become the traffic cops that steer requests to the right subnet; misconfigure them and clients get stranded. Security gets real too: rogue DHCP can poison DNS, starvation floods can exhaust pools, and well‑meaning mesh gear can become a second server. We detail protective moves like DHCP snooping, port security, and rate limiting, plus how snooping's binding tables feed stronger Layer 2 defenses.Resilience matters, so we unpack failover strategies—hot standby, load balancing, and legacy split scopes—and the rich set of DHCP options that deliver DNS, NTP, TFTP, and VoIP boot settings. We also tackle IPv6 with a sober lens: where SLAAC fits, when DHCPv6 is still essential, and why economics slow change even as IPv4 addresses remain scarce. If you support users, we hand you a troubleshooting playbook: spot APIPA, check relays, expand scopes, and use ipconfig release/renew to solve issues methodically and ace help desk interviews.If this helped you see the network with new eyes, tap follow, share with a teammate, and leave a quick review. Got a DHCP puzzle or a rogue gear story? Send it our way and we might feature it next time.Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifySupport the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
In this episode, hosts Lois Houston and Nikita Abraham team up with Senior Principal OCI Instructor Sergio Castro to unpack the basics of cloud networking and the Domain Name System (DNS). You'll learn how local and virtual networks connect devices, and how DNS seamlessly translates familiar names like oracle.com into addresses computers understand. Cloud Tech Jumpstart: https://mylearn.oracle.com/ou/course/cloud-tech-jumpstart/152992 Oracle University Learning Community: https://education.oracle.com/ou-community LinkedIn: https://www.linkedin.com/showcase/oracle-university/ X: https://x.com/Oracle_Edu Special thanks to Arijit Ghosh, David Wright, Kris-Ann Nansen, Radhika Banka, and the OU Studio Team for helping us create this episode. ------------------------------------------------ Episode Transcript: 00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:25 Lois: Hello and welcome to the Oracle University Podcast! I'm Lois Houston, Director of Innovation Programs with Oracle University, and with me is Nikita Abraham, Team Lead: Editorial Services. Nikita: Hi everyone! For the last few weeks, we've been talking about different aspects of cloud data centers. Today, we're focusing on something that's absolutely key to how everything works in the cloud: networking and domain name systems. 00:52 Lois: And to guide us through it, we've got Sergio Castro, Senior Principal OCI Instructor at Oracle University. We'll start by trying to understand why networking is so crucial and how it connects everything behind the scenes. Sergio, could you explain what networking means in simple terms, especially for folks new to cloud tech? Sergio: Networking is the backbone of cloud computing. It is a fundamental service because it provides the infrastructure for connecting users, applications, and resources within a cloud environment. It basically enables data transfers. It facilitates remote access. And ensures that cloud services are accessible to users. This provided that these users have the correct credentials. 01:38 Nikita: Ok, can you walk us through how a typical network operates? Sergio: In networking, typically starts with the local area network. Basically, networking is a crucial component for any IT service because it's the foundation for the architecture framework of any of the services that we consume today. So, a network is two or more computers interconnected to each other. And not necessarily it needs to be a computer. It can be another device such as a printer or an IP TV or an IP phone or an IP camera. Many devices can be part of a local area network. And a local area network can be very small. Like I mentioned before, two or more computers, or it could grow into a very robust and complicated set of interconnected networks. And if that happens, then it can become very expensive as well. Cloud networking, it's the Achilles heel for many of the database administrators, programmers, quality assurance engineers, any IT other than a network administrator. Actually, when the network starts to grow, managing access and permissions and implementing robust security measures, this coupled with the critical importance of reliable, and secure performance, can create significant hurdles. 03:09 Nikita: What are the different types of networks we have? Sergio: A local area network is basically in one building. It covers… it can be maybe two buildings that are in close proximity in a small campus, but typically it's very small by definition, and they're all interconnected to each other via one router, typically. A metropolitan area network is a typical network that spans into a city or a metro area, hence the name metropolitan area network. So, one building can be on one edge of the city and the other building can be at the other edge of the city, and they are interconnected by a digital circuit typically. So that's the case. It's more than one building, and the separation of those buildings is considerable. It can go into several miles. And a wide area network is a network that spans multiple cities, states, countries, even international. 04:10 Lois: I think we'll focus on the local area network for today's conversation. Could you give us a real-world example, maybe what a home office network setup looks like? Sergio: If you are accessing this session from your home office or from your office or corporate office even, but a home office or a home network, typically, you have a router that is being provided to you by the internet vendor—the internet service provider. And then you have your laptop or your computer, your PC connected to that router. And then you might have other devices either connected via cable—ethernet cable—or Wi-Fi. And the interconnectivity within that small building is what makes a local area network. And it looks very similar once you move on into a corporate office. Again, it's two or more computers interconnected. That's what makes a local area network. In a corporate office, the difference with a home office or your home is that you have many more computers. And because you have many more computers, that local area network might be divided into subnets. And for that, you need a switch. So, you have additional devices like a switch and a firewall and the router. And then you might have a server as well. So that's the local area network. Two or more computers. And local area networks are capable of high speeds because they are in close proximity to each other. 05:47 Nikita: Ok… so obviously a local area network has several different components. Let's break them down. What's a client, what's a server, and how do they interact? Sergio: A client basically is a requester of a service. Like when you hop into your browser and then you want to go to a website, for example, oracle.com, you type www.oracle.com, you are requesting a service from a server. And that server typically resides in a data center like oracle.com under the Oracle domain is a big data center with many interconnected servers. Interconnected so they can concurrently serve multiple millions of requests coming into www.oracle.com at the same time. So, servers provide services to client computers. So basically, that's the relation. A client requests a service and the server provides that service. 06:50 Lois: And what does that client-server setup actually look like? Sergio: So, let's continue with our example of a web browser requesting a service from a web server. So, in this case, the physical computer is the server. And then it has a software running on it. And that makes it a web server. So, once you type www.oracle.com, it sends the request and the request is received. And provided that everything's configured correctly and that there are no typos, then it will provide a response and basically give the view of the website. And that's obviously in the local area network, maybe quality assurance when they were testing this for going live. But when it goes live, then you have the internet in the middle. And the internet in the middle then have many routers, hubs, switches. 07:51 Transform the way you work with Oracle Database 23ai! This cutting-edge technology brings the power of AI directly to your data, making it easier to build powerful applications and manage critical workloads. Want to learn more about Database 23ai? Visit mylearn.oracle.com to pick from our range of courses and enroll today! 08:16 Nikita: Welcome back! Sergio, would this client-server model also apply to my devices at home? Sergio: In your own local area network, you have client server even without noticing. For example, let's go back to our home office example. What happens if we add another laptop into the scenario? Then all of these devices, they need a way for them to communicate. And for that, they have an IP address. And who provides that IP address? The minute that you add, the other device is going to send a request to the router. The router, we call it router, but it has multiple functions like the mobile device, the handheld device that we call smartphone. It has many functions like camera and calendar and many other functionalities. The router has an additional functionality called the dynamic host configuration protocol at DHCP server. So basically, the laptop requests, hey, give me an IP address, and then the router or the DHCP server replies, here's your IP address. And it's going to be a different one. So, they don't overlap. So that's an example of client server. 09:32 Lois: And where do virtual networks fit into all this? Sergio: A virtual network is basically, a software version of the physical network. It looks and feels exactly as a physical network does. We do have a path or a communication, in this case, in the physical network, you have either Wi-Fi or you have internet cable. And then you add your workstations or devices on top of that. And then you might create subnets. So, in a software-defined network or in a virtual network, you have a software-defined connectivity, physical cable and all of that. Everything is software-defined. And it looks exactly the same, except that everything is software. In a software or a virtual network, you can communicate with a physical network as if that software or that virtual network was another physical network. Again, this is a software network or a software-defined network, a virtual network, no longer a physical network. 10:42 Lois: Let's switch gears a little and talk about Domain Name Systems. Sergio, can you explain what DNS is, and why it's important when we browse the web? Sergio: DNS is the global database for internet addressing. The DNS plays a very important role on the internet. And many internet services are closely related to DNS. The main functionality of DNS is to translate easy-to-remember names into IP addresses. Some IP addresses might be very easy to remember. But however, if you have many of them, then it's easier to remember oracle.com or ucla.edu or navy.mil for military or eds.org for organization or gobierno.mx for Mexico. So that's the main feature of the DNS. It's very similar to a mobile phone to the contacts application in your mobile phone, because the contacts application maps names to phone numbers. It's easier to remember Bob's phone than 555-123-4567. So, it's easier to remember the name of the persons in your contacts list, like it is easier to remember, as previously mentioned, oracle.com than 138.1.33.162. Again, 138.1.33.162 might be easy for you to remember if that's the only one that you need to remember. But if you have 20, 40, 50, like we do with phone numbers, it's easier to remember oracle.com or ucla.edu. And this is essential, this mapping, again, because we work with names it's easier for us to remember. However, the fact is that computers, they still need to use IP addresses. And remember that this is the decimal representation of the binary number. It's a lot harder for us to remember the 32 bits or each one of the octets in binary. So that's the main purpose of DNS. Now the big difference is that the contact list in a cell phone is unique to that individual phone. However, DNS is global. It applies to everybody in the world. Anybody typing oracle.com will translate that into 138.1.33.162. Now this is an actual IP address of oracle.com. Oracle.com has many IP addresses. If you ping oracle.com, chances are that this is one of the many addresses that maps to oracle.com. 13:35 Nikita: You mentioned that a domain name like oracle.com can have many IP addresses. So how does DNS help my computer find the right one? Sergio: So, let's say that you want to look for www.example.com, how do you do that? So, you type in your computer instance or in your terminal, in your laptop, in your computer, you type in your browser "www.example.com." If the browser doesn't have that information in cache, then it's going to first ask your DNS server, the one that you have assigned and indicating in your browser's configuration. And if the DNS server then it will relate that the information is 96.7.128.198. This address is real, and your browser will go to this address once you type www.example.com. 14:34 Nikita: But what happens if the browser doesn't know the address? Sergio: This is where it gets interesting. Your browser wants to go to www.example.com. And it's going to go and look within its cache. If it doesn't have it, then the first step is to go ahead to your DNS server and ask them, hey, if you don't know this address, go ahead and find out. So, it goes to the root server. All the servers are administrated by IANA. And it's going to send the information, hey, what's the IP address for www.example.com? And if the root server doesn't know it, it's going to let you know, hey, ask the top-level domain name server, in this case, the .com. It's a top-level domain name server. So, you go ahead and ask this top-level domain name server to do that for you. In this case, again, the .com and you asked, hey, what's the IP address for example.com? And if the top-level domain name server doesn't know, it's going to ask you, hey, ask example.com. And example.com is actually within the customer's domain. And then based on these instructions you ask, what is the IP address for www.example.com? So, it will provide you with the IP address. And once your DNS server has the IP address, then it's going to relate to your web browser. And this is where your web browser actually reaches 96.7.128.198. Very interesting, isn't it? 16:23 Lois: Absolutely! Sergio, you mentioned top-level domain names. What are they and how are they useful? Sergio: A top level domain is the rightmost segment of a domain name, and it's located after the last visible dot in the domain name. So oracle.com or cloud.oracle.com is a domain name. So, .com is a top-level domain. And the purpose of the top-level domain is to recognize certain elements of a website. This top-level domain indicates that this is a commercial site. Now, .edu, for example, is a top-level domain name for higher education. We also have .org for nonprofit organizations, .net for network service providers. And we also have country specific. .ca for Canadian websites, .it for Italian websites. Now .it, a lot of companies that are in the information technology business utilizes this one to indicate that they're in information technology. There's also the .us. And for US companies, most of the time this is optional. .com, .org, .net is understood that they are from the US. Now if .com is a top-level domain name, what is that .oracle in cloud? So, Oracle is the second-level domain name. And in this case, Cloud is the third-level domain name. And lately you've been seeing a lot more top-level domain names. These are the classic ones. But now you get .AI, .media, .comedy, .people, and so on and so forth. You have many, many, even companies now have the option of registering their company name as the top-level domain name. 18:24 Nikita: Thank you, Sergio, for this deep dive into local area networks and domain name systems. If you want to learn about the topics we covered today, go to mylearn.oracle.com and search for the Cloud Tech Jumpstart course. Lois: And don't forget to join us next week for another episode on networking essentials. Until next time, this is Lois Houston… Nikita: And Nikita Abraham, signing off! 18:46 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.
Take a Network Break! We start with some educational content on Small Modular Nuclear Reactors, and sound the alarm about a sandbox escape affecting the Firefox browser. On the news front, a DNS issue triggers a major Azure outage that affected numerous services and caused problems around the globe, Palo Alto Networks announces enhancements to... Read more »
Take a Network Break! We start with some educational content on Small Modular Nuclear Reactors, and sound the alarm about a sandbox escape affecting the Firefox browser. On the news front, a DNS issue triggers a major Azure outage that affected numerous services and caused problems around the globe, Palo Alto Networks announces enhancements to... Read more »
Take a Network Break! We start with some educational content on Small Modular Nuclear Reactors, and sound the alarm about a sandbox escape affecting the Firefox browser. On the news front, a DNS issue triggers a major Azure outage that affected numerous services and caused problems around the globe, Palo Alto Networks announces enhancements to... Read more »
In this confab, Max catches up with Chet—long-time friend of the show, pleb miner mafia stalwart, and one of the most hands-on mining pioneers around. We reflect on the evolution from pleb to pioneer, the value of craft mastery, and the realities of living like a “mining monk” to keep uptime high. Chet opens up about humility in markets, his thesis on used miner pricing, why community matters more than adulation, and how building a circular economy means choosing who you spend your sats with. We dig into balance, burnout, OPSEC trade-offs, and finding purpose beyond number go up—whether that's family, fitness, or a well-built deck at home.Max and Chet also dive into gas mining as the next scrappy frontier, mineral rights and licenses, and how Big Tech's energy appetite will reshape competition. On the privacy front, they discuss Ashigaru's rebirth of the Samourai-style toolset (including its new Whirlpool), practical wallet setups with Cake Wallet and node linking, and the importance of meetups like Lake Satoshi for real-world learning. It's a candid, wide-ranging chat on building, belonging, and the grind required to make Bitcoin living, not just Bitcoin listening.VALUE FOR VALUEThanks for listening you Ungovernable Misfits, we appreciate your continued support and hope you enjoy the shows.You can support this episode using your time, talent or treasure.TIME:- create fountain clips for the show- create a meetup- help boost the signal on social mediaTALENT:- create ungovernable misfit inspired art, animation or music- design or implement some software that can make the podcast better- use whatever talents you have to make a contribution to the show!TREASURE:- BOOST IT OR STREAM SATS on the Podcasting 2.0 apps @ https://podcastapps.com- DONATE via Monero @ https://xmrchat.com/ugmf- BUY SOME STICKERS @ https://www.ungovernablemisfits.com/shop/FOUNDATIONhttps://foundation.xyz/ungovernableFoundation builds Bitcoin-centric tools that empower you to reclaim your digital sovereignty.As a sovereign computing company, Foundation is the antithesis of today's tech conglomerates. Returning to cypherpunk principles, they build open source technology that “can't be evil”.Thank you Foundation Devices for sponsoring the show!Use code: Ungovernable for $10 off of your purchaseCAKE WALLEThttps://cakewallet.comCake Wallet is an open-source, non-custodial wallet available on Android, iOS, macOS, and Linux.Features:- Built-in Exchange: Swap easily between Bitcoin and Monero.- User-Friendly: Simple interface for all users.Monero Users:- Batch Transactions: Send multiple payments at once.- Faster Syncing: Optimized syncing via specified restore heights- Proxy Support: Enhance privacy with proxy node options.Bitcoin Users:- Coin Control: Manage your transactions effectively.- Silent Payments: Static bitcoin addresses- Batch Transactions: Streamline your payment process.Thank you Cake Wallet for sponsoring the show!MYNYMBOXhttps://mynymbox.netYour go-to for anonymous server hosting solutions, featuring: virtual private & dedicated servers, domain registration and DNS parking. We don't require any of your personal information, and you can purchase using Bitcoin, Lightning, Monero and many other cryptos.Explore benefits such as No KYC, complete privacy & security, and human support.(00:00:00) INTRO(00:01:45) BOOSTS(00:05:31) THANK YOU CAKE WALLET(00:06:38) THANK YOU FOUNDATION(00:07:25) THANK YOU MYNYMBOX(00:08:22) Reunion on the Mic(00:12:17) From Pleb to Pioneer(00:19:30) Thanks for the Memories(00:22:53) The Mining Monk(00:26:54) Getting Into Gas(00:33:34) Paying it Forward(00:36:21) The Value of Wholesome Work(00:41:34) More Hash Sluts(00:48:00) Doing It Live(00:52:53) Living Life or Basement Dweller OPSEC(00:56:41) Grassroots Education(01:03:03) Ashigaru, Samourai and Whirlpool(01:06:47) We'll Make it Happen at Lake Satoshi
AN OPEN CONVERSATION WITH FRIENDS THAT LOVE THE WORLD OF CONCERT AND SPECIAL EVENT PRODUCTIONSJoin our current events support zoomcast show hosted by Jan Landy and his knowledgeable affable panel of friends and colleagues for an entertaining robust discussion offering opinions on anything related to a working professional life in general.Our ZoomCast isn't just a fountain of knowledge; it's also a opportunity to laugh. Think of it as therapy, but with more jokes and fewer couches. Join us and share your thoughts. Stay updated on life and world events, and enjoy multiple good chuckles along the way.
In this week's episode, Jon Westfall and I kicked things off by discussing "falling back" for Daylight Saving Time and reminiscing about dealing with dark mornings. We then moved on to some podcast milestones. I realized that MobileViews is about to turn 18, with the first episode dating back to November 26, 2008 . We also noted that Jon's 12th anniversary on the show is coming up in December. This got us talking about the early days of podcasting. I recalled listening to pioneers like Adam Curry (the "Podfather") and Adam Christiansen ("The Mac Cast") , and how I was amazed they could produce so much content solo . We contrasted that with today's landscape, which seems dominated by celebrity-hosted shows, and I made sure to thank Jon, as I'm certain the podcast would have ended years ago without him. We discussed the recently released free Affinity all-in-one creative suite for MacOS, which both Jon and I had previously purchased, becoming a free all-in-one app on the Mac following its acquisition by Canva. We also chatted about the recent Microsoft Azure outage , which briefly gave me trouble accessing a file on OneDrive , and shared a laugh about how "it's always DNS". On the AI front, I shared a song I generated with Suno AI called "DNS Blues" and we discussed the news of an AI artist, Xenia Monet, debuting on the Billboard charts. Jon shared his own impressive AI project: in about 30 minutes, he used ChatGPT to build a Python-based Discord bot that can serve up Disney trivia, psychology questions, or bad jokes pulled from his 12-year spreadsheet archive.
In this episode of 'Cybersecurity Today,' the panel, including Laura Payne from White TOK and David Shipley from Boer on Securities, reviews the major cybersecurity events of October. Key topics include DNS failures at AWS and Microsoft, the rise of AI and its associated security concerns, and several severe cloud and on-premises vulnerabilities in platforms like SharePoint and WSUS. The discussion highlights a surge in sophisticated phishing threats, the integration of AI in cyber attacks, and the critical importance of multifactor authentication. The panel also examines the implications of recent security breaches affecting critical infrastructure and the broader impact of cybersecurity on financial sectors. Ethical concerns about AI's use in creating inappropriate content and the urgent need for better regulatory frameworks for tech and cloud providers are underscored. The episode concludes with a humorous moment as Jim dons a gifted white TOK, bringing a smile to the discussion. 00:00 Introduction and Sponsor Message 00:18 Panel Introduction and AI Discussion 01:02 Cloud Outages and Their Impact 02:52 DNS and Internet Fragility 07:07 Botnets and Cybersecurity Threats 14:09 Industrial Control Systems Vulnerabilities 26:29 AI in Cybersecurity 35:37 Voice Deepfakes and Authentication Risks 38:32 Creative Scams and Real-Time Voice Translators 39:22 The Importance of Safe Words and Persistent Surveillance Issues 40:17 Hybrid Scams and Financial Crimes in Canada 41:44 Corporate Reputation and Financial Crimes Agency 42:41 Challenges with Digital Banking and Security 44:49 The Role of AI and Security in Financial Transactions 45:55 The Impact of Open Banking and Real-Time Payments 50:57 Email Filters and Cybersecurity Awareness 58:03 Microsoft's Security Challenges and Vulnerabilities 01:03:39 Legal Consequences for Cybercriminals 01:12:17 Final Thoughts and Acknowledgements
Pierre Robert, Outlook indexing fix, DNS repairs, Security news, Listener email
On October 19 2025 AWS experienced an outage that lasted over a day, 10 days later we finally got the root cause analysis and we know exactly what caused the DNS to fail0:00 Summary 5:30 How did Dynamo lost its DNS?13:41 EC2 Errors 16:16 Network Load Balancer ErrorsRCA here https://aws.amazon.com/message/101925/
Shamba Chowdhury got his first computer at an early age. He was the kid that explored every button and every setting, trying to figure out how it all worked. His curiosity exploded when he was 15 and the internet came around. Post that, his first foray into programming came from his love of playing video games. Outside of tech, he loves to read, in particular crime thrillers. He noted that his favorite is A Minute to Midnight by David Baldacci.Shamba and his co-founder have participated in many hackathons, and they noticed how difficult it was to stitch together ideas, utilizing AI technology. It was at that point they decided to build a no code builder to wire up AI agents together.This is the creation story of DeForge.SponsorsVentionCodeCrafters helps you become a better engineer by building real-world, production-grade projects. Learn hands-on by creating your own Git, Redis, HTTP server, SQLite, or DNS server from scratch. Sign up for free today using this link and enjoy 40% off.Full ScalePaddle.comSema SoftwarePropelAuthPostmanMeilisearchLinkshttps://deforge.io/https://www.linkedin.com/in/shambac/Support this podcast at — https://redcircle.com/code-story-insights-from-startup-tech-leaders/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
Max and Q cover the latest happenings in the world of Bitcoin, privacy and much more. NEWSSoft fork proposalAlby attackSolo Miner wins a blockBitKey collaborative custoday improvement BIPLugano StreamWoS Spark privacy concernsUPDATES/RELEASESTrezor releaseLedger releaseArkade betaCake v5.5.0 + v5.5.1Bull by Bull BitcoinBitcoin for SignalSatGo integrates Spark Peach BTCPay PluginStack Duo v1.3.0RoninDojo v2.4.0EducationPassport guideAnd anotherCupcake deep diveSeth Ark articleArk explainer by NeilVALUE FOR VALUEThanks for listening you Ungovernable Misfits, we appreciate your continued support and hope you enjoy the shows.You can support this episode using your time, talent or treasure.TIME:- create fountain clips for the show- create a meetup- help boost the signal on social mediaTALENT:- create ungovernable misfit inspired art, animation or music- design or implement some software that can make the podcast better- use whatever talents you have to make a contribution to the show!TREASURE:- BOOST IT OR STREAM SATS on the Podcasting 2.0 apps @ https://podcastapps.com- DONATE via Monero @ https://xmrchat.com/ugmf- BUY SOME STICKERS @ https://www.ungovernablemisfits.com/shop/FOUNDATIONhttps://foundation.xyz/ungovernableFoundation builds Bitcoin-centric tools that empower you to reclaim your digital sovereignty.As a sovereign computing company, Foundation is the antithesis of today's tech conglomerates. Returning to cypherpunk principles, they build open source technology that “can't be evil”.Thank you Foundation Devices for sponsoring the show!Use code: Ungovernable for $10 off of your purchaseCAKE WALLEThttps://cakewallet.comCake Wallet is an open-source, non-custodial wallet available on Android, iOS, macOS, and Linux.Features:- Built-in Exchange: Swap easily between Bitcoin and Monero.- User-Friendly: Simple interface for all users.Monero Users:- Batch Transactions: Send multiple payments at once.- Faster Syncing: Optimized syncing via specified restore heights- Proxy Support: Enhance privacy with proxy node options.Bitcoin Users:- Coin Control: Manage your transactions effectively.- Silent Payments: Static bitcoin addresses- Batch Transactions: Streamline your payment process.Thank you Cake Wallet for sponsoring the show!MYNYMBOXhttps://mynymbox.netYour go-to for anonymous server hosting solutions, featuring: virtual private & dedicated servers, domain registration and DNS parking. We don't require any of your personal information, and you can purchase using Bitcoin, Lightning, Monero and many other cryptos.Explore benefits such as No KYC, complete privacy & security, and human support.(00:00:41) Welcome, show format, and brief housekeeping(00:05:19) UK weather banter and setting the scene(00:05:22) Events and product updates: Bitfest, Envoy 2.10, Passport audit(00:08:06) BIT-444 proposal to restrict arbitrary data on Bitcoin(00:12:03) Critiques: miniscript breakage, Peter Todd demo, and soft vs hard fork risk(00:18:26) Mining politics, hash power, and potential chain splits(00:18:33) Security incident: Alby password reset spam and email exposure(00:20:45) Feel-good story: solo miner finds a block via Public Pool on Umbrel(00:23:05) New BIP: Chaincode Delegation for private collaborative multisig(00:28:08) Conference notes and a privacy PSA on Spark implementations(00:32:28) Boosts and community feedback: swaps, Moon wallet UX, and Boltz reliance(00:37:09) Q&A: consolidating UTXOs, PayJoin, Whirlpool, and Robosats flows(00:42:11) Q&A: Running a self-hosted AlbyHub LDK node—backup and privacy(00:46:12) Hardware wallet releases: Trezor Safe 7 and Ledger Nano Gen 5(00:52:35) Multisig device choices and inheritance practicality(00:52:38) ARC in the wild: Arcade.money public beta hands-on(00:53:55) Cake Wallet 5.5 updates and hardware support(00:54:22) Bull Bitcoin releases Bull Wallet: features and roadmap(00:58:12) eCash in Signal fork: UX gains vs custodial trade-offs(01:02:30) Spark adoption notes: SatGo and Wallet of Satoshi privacy caveats(01:03:31) Peach plugin for BTCPay and Stack Duo's Frost multisig progress(01:05:06) RoninDojo 2.4 and Fulcrum 2.0 stability improvements(01:06:03) Education picks and closing logistics(01:07:29) Stats corner addendum by John: RoboSats, Whirlpool, Bisq, and more
Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security
In part 2 of this year's Spooky Stories special, Wes and Scott discuss the most chilling developer horror stories—from six-month-old unprocessed donations and runaway dog-food orders to vanishing databases, DNS disasters, code that literally tore apart a mall's ventilation system, and more! Show Notes 00:00 Welcome to Syntax! 01:33 A Bug Beyond the Grave 04:16 NHL SPOOKS 06:36 White Space Ghost Faced 10:54 Over Order Nightmare 16:50 Alaskian 21:16 Brought to you by Sentry.io 22:50 Rackspace'd Out 25:02 Fired 26:52 WordPress Woes 33:21 What does the P in VPS stand for? 34:18 Beyond the Grave II 35:39 The Hottest Hot Fix 37:54 Bad Redirect 40:03 Instead of Making Money, You Spend Money! 41:26 Certbot Certain Death 43:55 It's Always DNS 50:02 Cache Ruins Everything Around Me 51:52 Fiber F-Up 56:18 More Spooky Stories Don't Drink and Deploy
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line/32428 Apache Tomcat PUT Directory Traversal Apache released an update to Tomcat fixing a directory traversal vulnerability in how the PUT method is used. Exploits could upload arbitrary files, leading to remote code execution. https://lists.apache.org/thread/n05kjcwyj1s45ovs8ll1qrrojhfb1tog BIND9 DNS Spoofing Vulnerability A PoC exploit is now available for the recently patched BIND9 spoofing vulnerability https://gist.github.com/N3mes1s/f76b4a606308937b0806a5256bc1f918
In this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: L3Harris Trenchant boss accused of selling exploits to Russia once worked at the Australian Signals Directorate Microsoft WSUS bug being exploited in the wild Dan Kaminsky DNS cache poisoning comes back because of a bad PRNG SpaceX finally starts disabling Starlink terminals used by scammers Garbage HP update deletes certificates that authed Windows systems to Entra This week's episode is sponsored by automation company Tines. Field CISO Matt Muller joins to discuss how Tines has embraced LLMs and the agentic-AI future into their workflow automation. This episode is also available on Youtube. Show notes US accuses former L3Harris cyber boss of stealing and selling secrets to Russian buyer | TechCrunch Attackers bypass patch in deprecated Windows Server update tool | CyberScoop CVE-2025-59287 WSUS Unauthenticated RCE | HawkTrace CVE-2025-59287 WSUS Remote Code Execution | HawkTrace Catching Credential Guard Off Guard - SpecterOps Cache poisoning vulnerabilities found in 2 DNS resolving apps - Ars Technica Uncovering Qilin attack methods exposed through multiple cases Safety on X: "By November 10, we're asking all accounts that use a security key as their two factor authentication (2FA) method to re-enroll their key to continue accessing X. You can re-enroll your existing security key, or enroll a new one. A reminder: if you enroll a new security key, any" / X SpaceX disables more than 2,000 Starlink devices used in Myanmar scam compounds | The Record from Recorded Future News SpaceX: Update Your Inactive Starlink Dishes Now or They'll Be Bricked How we linked ForumTroll APT to Dante spyware by Memento Labs | Securelist Former Polish official indicted over spyware purchase | The Record from Recorded Future News HP OneAgent Update Broke Entra Trust on HP AI Devices Windows' Built-in OpenSSH for Offensive Security How Hacked Card Shufflers Allegedly Enabled a Mob-Fueled Poker Scam That Rocked the NBA | WIRED
Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security
Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security
Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security
Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security
Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security
Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security
Cold open A House of Dynamite Technieuws Nexperia follow-up: China verbiedt export van Nexperia-chips uit Chinese fabriek, Europese auto-industrie bezorgd over supply chain. Samsung Galaxy XR (Project Moohan) vanaf nu verkrijgbaar in de VS en Zuid-Korea. Nikes Project Amplify Amazon wil meer dan half miljoen werknemers vervangen door robots Waymo komt in 2026 naar Londen. Nog geen plannen voor het Europese vasteland. Brico en Carrefour kiezen voor AI-muziek in hun winkels: "Artiesten in België dreigen kwart inkomsten te verliezen" Reportage: &lsqo;De link tussen bordspellen en video games’ (3/4) Deep dive(s) ‘Dit is een alarmerend signaal’: hoe één fout bij AWS wereldwijd miljoenen gebruikers trof | Amazon brain drain finally sent AWS down the spout | AWS crash causes $2,000 Smart Beds to overheat and get stuck upright | Amazon: bug in geautomatiseerd DNS-beheer zorgde voor kettingreactie AWS-storing
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vulnerability Unifi fixed a critical vulnerability in it s Access product https://community.ui.com/releases/Security-Advisory-Bulletin-056-056/ce97352d-91cd-40a7-a2f4-2c73b3b30191 OpenAI Atlas Omnibox Prompt Injection OpenAI s latest browser can be jailbroken by inserting prompts in URLs https://neuraltrust.ai/blog/openai-atlas-omnibox-prompt-injection
Zohar Bronfman spends most of his time in Tel Aviv, Israel these days. He has a focused academic background, specifically in philosophy and neuroscience. He was always intrigued by the question - how do we know what we know? - which led him to get a PhD in Philosophy. While doing that, he also became fascinated with he human mind and empirical decision making, which took him down the road of obtaining another PhD in AI & Neuroscience, essentially emulating brain processes. Outside of tech, he has 3 kids and a startup. He loves a good book in the philosophy or neuroscience space, and is a big fan of sports. Specifically, he loves the NBA and claims to be a Knicks fan.Zohar and his now co-founder were digging into predictive models, as an extension of their academic studies. They were curious as to why companies, though they were running predictive models, were not making accurate predictions. They soon realized that this was because the AI modeling expertise was centralized at couple of well known companies.This is the creation story of Pecan AI.SponsorsVentionCodeCrafters helps you become a better engineer by building real-world, production-grade projects. Learn hands-on by creating your own Git, Redis, HTTP server, SQLite, or DNS server from scratch. Sign up for free today using this link and enjoy 40% off.Full ScalePaddle.comSema SoftwarePropelAuthPostmanMeilisearchLinkshttps://www.pecan.ai/https://www.linkedin.com/in/zohar-bronfman/https://demandforecast.ai/Support this podcast at — https://redcircle.com/code-story-insights-from-startup-tech-leaders/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architecture that have to be updated or replaced to complete the migration? Can we get it all done by 2030? Sandy Carielli and Martha Bennett join us to answer these questions and dive into one area of tech that hasn't been discussed much when it comes to post-quantum encryption: blockchain. Relevant Forrester Reports: Quantum Computing isn't a Threat to Blockchains - Yet The Architect's Guide to Quantum Security In the news, high standards for open source software, trends in self-hosting, doing the cloud wrong, and is it really always DNS? Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-354
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architecture that have to be updated or replaced to complete the migration? Can we get it all done by 2030? Sandy Carielli and Martha Bennett join us to answer these questions and dive into one area of tech that hasn't been discussed much when it comes to post-quantum encryption: blockchain. Relevant Forrester Reports: Quantum Computing isn't a Threat to Blockchains - Yet The Architect's Guide to Quantum Security In the news, high standards for open source software, trends in self-hosting, doing the cloud wrong, and is it really always DNS? Show Notes: https://securityweekly.com/asw-354
Welcome back to our weekend Cabral HouseCall shows! This is where we answer our community's wellness, weight loss, and anti-aging questions to help people get back on track! Check out today's questions: Mohamed: Good day Dr.Cabral, thanks for all your amazing work and shout out to the amazing staff at Equilife/IHP. My question is regarding my EKG, had a bit of an issue one day so I got it done. Eveything looked normal however it said “Consider Right Atrial Enlargement (CRAE)”. I'm 26 years old, I use Equilife products such as DNS, DVB, Full spectrum Mag. My CBC lab looked fine. However I was slightly leaning towards hyponaterima. (Ref range: 135-145), I was 136 (Canadian values). My resting HR is 72, however, I do exercise 2-3 times a week. I do have stress sometimes.. if I get really worked up (emotionally)… I feel it in my chest.. however exercise-wise I can run and run..please advise. Thanks Carlos: i have searched your database and cannot find your nighttime routine for cleaning/moisturizing your face. I am wondering what I could do to try and prevent wrinkles and have a healthy, smooth face. Anonymous: Can you explain a little on under eye eyebags and puffiness. I love listening to your podcast! I tell my friends and family. Thanks for all you do. Lori: Hello Dr. Cabral, I've recently noticed more joint stiffness and mild aches when I wake up in the morning. I'm only in my 40s, so I was surprised by this. What are the most common underlying causes of early joint discomfort, and are there natural ways to support joint health before it gets worse? Rocco: Hi Stephen, LOVE your work and your the main person i trust for my health! 2 quick questions, in my morning smoothie (containing avocado, blueberries, banana, psyllium husk, kale), i open 4 capsules of your daily multivitamin, blend it up then drink it over the next 30 minutes. Is that okay that i open the capsules and empty them into my smoothie pre blending, or should i be swallowing them in full capsule form? Finally, is it best to take all vitamins with food, or just follow instructions. I usually take 2-3 Cal-Mag capsules right before bed, as the instructions do not say i need to have it with a meal. Why do some vitamins need to be taken with food, and others not need to be? Thanks ! Thank you for tuning into today's Cabral HouseCall and be sure to check back tomorrow where we answer more of our community's questions! - - - Show Notes and Resources: StephenCabral.com/3550 - - - Get a FREE Copy of Dr. Cabral's Book: The Rain Barrel Effect - - - Join the Community & Get Your Questions Answered: CabralSupportGroup.com - - - Dr. Cabral's Most Popular At-Home Lab Tests: > Complete Minerals & Metals Test (Test for mineral imbalances & heavy metal toxicity) - - - > Complete Candida, Metabolic & Vitamins Test (Test for 75 biomarkers including yeast & bacterial gut overgrowth, as well as vitamin levels) - - - > Complete Stress, Mood & Metabolism Test (Discover your complete thyroid, adrenal, hormone, vitamin D & insulin levels) - - - > Complete Food Sensitivity Test (Find out your hidden food sensitivities) - - - > Complete Omega-3 & Inflammation Test (Discover your levels of inflammation related to your omega-6 to omega-3 levels) - - - Get Your Question Answered On An Upcoming HouseCall: StephenCabral.com/askcabral - - - Would You Take 30 Seconds To Rate & Review The Cabral Concept? The best way to help me spread our mission of true natural health is to pass on the good word, and I read and appreciate every review!
Jessica reports LIVE from Jakarta while Spencer analysis every detail from GymCastic headquarters on the first day of event finals! World Championships Headquarters Get for all Jakarta Worlds Videos, Interviews, Podcasts, Fantasy, Guides Extended Episode + Live Q&A (Members) +30 extra minutes of analysis, behind-the-scenes secret stories, and answering your questions. Here's how to ask questions live. Can't make it live? Add Club bonus episodes to your favorite podcast player (instructions here). Tip: After logging in, refresh this page and the extended player will appear below. Headlines IOC stops Olympic talks with Indonesia over Israeli athlete ban How to Report Exploitative Photography during a FIG meet Contact the FIG and LOC safeguarding officers on site. They are listed in the work plan, which is accessible on the event page (e.g. Jakarta: https://live.gymnastics.sport/event_detail.php?idevent=17810 They can also be reached by phone or WhatsApp. Anonymous reports can be filed directly to the Gymnastics Ethics Foundation FIG Safeguarding page Chapters 00:00 – Intro & Sponsors — Gymnastics Medicine, Club Gym Nerd 02:00 – Welcome from Jakarta: Jessica & Spencer on Day 1 of Event Finals 03:40 – Headlines: IOC vs. Indonesia, Fujitsu robots & FIG ethics 08:10 – Are the medals light or heavy? 08:35 – Women's Vault Final 09:00 – Melnikova, Fontaine & Josc medal recap 09:45 – Deng's vault crash & DNS rule explained 12:30 – Antwerp flashback & Voinea precedent 14:15 – Valen's “no-pike” Rudi & judging notes 15:40 – Kalmykova, Schönemaier & Fontaine highlights 20:05 – Melnikova's Cheng vs. form deductions 21:30 – Vault wrap-up 22:20 – Women's Uneven Bars Final 22:45 – Hit-a-thon! Skye Blakely sticks 24:20 – Melnikova & McDonald clean hits 26:10 – Yang's no-release issue 27:30 – Zoya's one-leg heroic routine 29:20 – Bars recap 30:00 – Men's Floor Final 30:25 – Jake Jarman's triple-double clinic 32:05 – Luke Whitlock & Yulo analysis 34:10 – Minami's honest fall 35:25 – Milad's Shushunova & artistry talk 37:05 – Floor medal recap 38:00 – Pommel Horse 38:20 – Highlights & scoring notes 41:00 – PH results 41:40 – Rings Final 42:00 – Whittenburg, World Champion at 31 43:20 – Adem celebration & medal reaction 46:00 – Nelson's style points 48:20 – Awards of the Day & BTS Teaser 48:40 – Best routines, surprises & Club Gym Nerd info 52:00 – Live Q&A & upcoming finals preview 54:35 – Show Close 55:00 – Tomorrow's coverage preview & sign-off from Jakarta How Do I Watch the Competition? All sessions of the competition will be streamed on Eurovision Sport. Follow along here! Gymnastics Indonesia's YouTube channel will stream all qualification sessions Live scores from the FIG and Swiss Timing Check out NBC's behind-the-scenes mini-doc on the US Women's World Trials US viewers check out Peacock and NBC broadcast schedlue here. GymCastic Updates Subscribe to our YouTube Channel Coming Up 6 days of LIVE podcasts at World Championships in Jakarta Club members get extended coverage and can join us live to ask questions immediately after the meet Play our World Championships Fantasy Game! Win a Club Gym Nerd Scholarship: Go to our Forum > Show Stuff > GymCastic Scholarship We are matching every new sponsorship If you would like access to the club content, but aren't currently in a position to purchase a membership, all you need to do is fill out the form that's linked in our message board If you would also like to sponsor a scholarship, please email editor@gymcastic.com. Thank you! Support Our Work Club Gym Nerd: Join Here Become a Sponsor: GymCastic is matching all donations Nearly 50 scholarships have been awarded so far Learn More Headstand Game: Play Now Forum: Start Chatting Merch: Shop Now Thank you to our Sponsors Gymnastics Medicine Beam Queen Bootcamp's Overcoming Fear Workshop Huel Daily Greens Ready to Drink - Get 15% off your purchase for New Customers with our exclusive code GYMCASTIC at huel.com/GYMCASTIC. Use our code and fill out the post checkout survey to help support the show! Resources Jakarta schedule & times: See our live podcast times on the Worlds HQ schedule Guides: Download the quick-reference guide on the Jakarta Headquarters page The Balance Beam Situation: Spencer's GIF Code of Points Gymnastics History and Code of Points Archive from Uncle Tim Kensley's men's gymnastics site Neutral Deductions Unlock the Extended Episode Join Club Gym Nerd → Choose a plan Complete checkout — your site account is created. Log in here → /my-account/ Return to this page and refresh. The extended player appears automatically.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu/diary/Infostealer%20Targeting%20Android%20Devices/32414 Attackers exploit recently patched Adobe Commerce Vulnerability CVE-2025-54236 Six weeks after Adobe's emergency patch, SessionReaper (CVE-2025-54236) has entered active exploitation. E-Commerce security company SanSec has detected multiple exploit attempts. https://sansec.io/research/sessionreaper-exploitation Patch for BIND and unbound nameservers CVE-2025-40780 The Internet Systems Consortium (ISC.org), as well as the Unbound project, patched a flaw that may allow for DNS spoofing due to a weak random number generator. https://kb.isc.org/docs/cve-2025-40780 WSUS Exploit Released CVE-2025-59287 Hawktrace released a walk through showing how to exploit the recently patched WSUS vulnerability https://hawktrace.com/blog/CVE-2025-59287
Tanmai Gopal is a repeat guest on the podcast. Back in Season 7, he came on to tell the creation story of Hasura, which is a universal data access layer for next generations apps. He talked through he and his colleagues frustration with building API after API, and taking steps to ensure people wanted to not do that work anymore.As Hasura started to take off, Tanmai started to ask the question around what was the right method for developers, in particular their applications, to access data. With the advent of AI, he and his team dug into what the right problems were to solve - and they identified the main problem with this type of tech was accuracy and trust.This is the creation story of PromptQL.SponsorsVentionCodeCrafters helps you become a better engineer by building real-world, production-grade projects. Learn hands-on by creating your own Git, Redis, HTTP server, SQLite, or DNS server from scratch. Sign up for free today using this link and enjoy 40% off.Full ScalePaddle.comSema SoftwarePropelAuthPostmanMeilisearchLinkshttps://promptql.io/https://www.linkedin.com/in/tanmaig/https://codestory.co/podcast/e20-tanmai-gopal-hasura-graph-ql/Support this podcast at — https://redcircle.com/code-story-insights-from-startup-tech-leaders/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
RFC 9872 makes recommendations for NAT64 prefix discovery for hosts supporting v4-to-v6 translation. Co-host Nick Buralgio is a co-author of this RFC, so we’re taking the opportunity to talk about it in detail. We discuss the problems RFC 9872 is addressing and why a new RFC was needed for operational guidance, not necessarily defining a... Read more »