POPULARITY
Oh hi, welcome back to Geek Warning!There are some things to tell this week. We've had a number of changes to the pod over the past few months (sorry!), and we've got a few more to share.Ask a Wrench, which sits at the end of our episodes, is now members-only. That means you'll need to be on our member podcast feed to hear that extra part of the podcast. Meanwhile, the first hour of goodness is free for all.Additionally, you'll still hear from UK-based tech writers Suvi Loponen and Alex Hunt on occasion, just not every episode. Suvi will soon begin on a new podcast series that investigates industry-related topics. Meanwhile, you'll also hear Alex and Suvi on an upcoming and recurring special episode where we'll catch up on the bikes and gear we've been testing.With all that said, jump on in to hear Dave Rome, Ronan McLaughlin, and the return of Zach Edwards (Boulder Groupetto). Also, Brad Copeland is present at the end to answer some of your Ask a Wrench questions.The episode itself is jam-packed. The geeks offer their opinions on what the UCI's relaxed equipment ruling from four years ago are doing to bikes of today and tomorrow. They cover the details of new Shimano CUES. And talk about the realities in the durability of modern road pedals. Plus a whole lot more…Time stamps:0:00 - Changes are happening2:30 - The impact of the UCI's relaxed rules from 202119:45 - New Shimano CUES and ESSA for dropbar bikes31:00 - On our mind: Pedals should be serviceable41:35 - Ritchey ditches the World Champ rainbow46:20 - QO cranks, from the founders of Rotor48:05 - Wolf Tooth's EnCase mini pump line49:10 - A bad week for smartwatch users52:20 - CeramicSpeed has a new tool for (DUB) crank removal55:20 - State's new 4130 All-Road is very cheap57:42 - Biggest tech news for the week comes from Chris King (spoiler, it's a coffee tamper).59:22 - Tangent into our favourite tool-related bottle openers1:01:00 - Switch to the Member-Only feed if you want Ask a Wrench!1:05:00 - Modern drivetrain compatibility leading to road and MTB gravel (recorded a week before the CUES announcement, oops)1:11:00 - Sweating tubeless tyres and what to do about it.1:17:00 - Disc brake performance and bed-in when using multiple wheelsets, plus a dive into bed-in procedure.
In this episode of The Cybersecurity Defenders Podcast, we take a close look at Digital Forensics with Carlos Cajigas, CTO of Covert Bit.Carlos is a seasoned Incident Response professional hailing from San Juan, Puerto Rico. Carlos's journey in the field began after dedicating over a decade to law enforcement, specializing as a Digital Forensics Detective and Examiner in West Palm Beach, Florida. His extensive experience spans conducting detailed examinations on numerous digital devices, backed by hundreds of hours in specialized training from reputable institutions like EnCase, NW3C, Access Data, and SANS, to name a few. Carlos is not just an expert in the field; he's also a dedicated educator, holding instructor roles with both the Florida Department of Law Enforcement and SANS, where he teaches courses on Windows Forensic Analysis and Advanced Incident Response. With a solid academic foundation, Carlos brings a wealth of knowledge and insight into today's digital forensics and incident response landscape.You can find Carlos on Twitter/X here.
Greetings, warriors. I'm Matthew Adams, your host, and today, we extend our arms and spirits into a realm often spoken of but seldom journeyed into. This episode of our podcast takes a leap into the endless, boundless space where God speaks unceasingly to His warriors. Together, let's explore, comprehend, and integrate the truth of His unbridled communication into our spiritual warfare.Scripture"We are not like Moses, who put a veil over his face so the people of Israel would not see the glory, even though it was destined to fade away. But the people's minds were hardened, and to this day whenever the old covenant is being read, the same veil covers their minds so they cannot understand the truth. And this veil can be removed only by believing in Christ." — 2 CORINTHIANS 3:13-14The image of Moses veiling his face signifies a transient barrier that once separated humanity from fully experiencing God's glory. For too long, our minds, influenced by tangible experiences, have conceived spiritual barriers that hinder our profound engagements with God. The heavenly whispers, ever-present, oftentimes find a barricade of our own disbelief and measured expectations. Yet, Christ has torn the veil, allowing an unhindered, perpetual connection between our spirit and God's voice.The Power Of God's Whisper is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.Driving Points* Awakening to the Unveiled Spiritual RealmRealizing that through Christ the veil is removed, we're invited to dwell in a space where God's voice isn't a distant echo but a present, tangible reality. Our spiritual warriors' journey is thus about awakening to this reality, comprehending that the spiritual signals from God are uninterrupted and ceaseless.* Harboring Expectant Faith in God's Ever-Present VoiceWhile our empirical experiences attempt to shape our spiritual expectations, anchoring our faith in God's continual presence defies those physical limitations. Our spiritual eyes and ears, untethered by the earthly and the observable, must expectantly seek and respond to God's persistent, enveloping voice in our lives.* Embracing Persistent Pursuit and Unhindered Relationship with GodA relationship unrestrained by veils and barriers is an invitation into uncharted spiritual terrains. Our walk with God thus should mirror an unyielding pursuit, where the sounds of His whispers steer our paths, and our hearts remain ever-receptive to His divine instructions.ConclusionDear friends, the echo from eternity does not beckon us into a distant, unattainable fellowship with God. Rather, it invites us into a vibrant, active, and unbroken communion, where His voice does not merely visit, but dwells, instructs, and guides our spiritual endeavors.Call to ActionEmbrace this truth, dear spiritual warriors: The communication from our Almighty is not restricted, not waned by celestial distance. Encase your spirit in expectant faith, and step into a boundless, unshielded relationship with Him, for your path is lit by the constant whisper of His voice.PrayerOh, Gentle Whisperer of the Heavens, enkindle within us an unyielding faith that perceives Your ceaseless voice amidst the clamor of this world. May our spirits, unbridled by veils, perpetually seek and find You in every echo of our journey. Embed within us, Lord, a pursuit that knows no bounds, traversing into the depths of Your eternal love and guidance. Amen.Thank you for journeying with me, Matthew Adams, into the boundless realms where God's voice eternally resonates. May your spiritual endeavors be perpetually bathed in His unceasing whispers, guiding your path into the profound depths of His eternal love and wisdom. Until next time, may your heart remain perpetually unbridled, ever-hearing, and perpetually dialoguing with our unceasingly communicative God. Get full access to My Reasons To Believe at myr2b.substack.com/subscribe
Greetings, warriors. I'm Matthew Adams, your host, and today, we extend our arms and spirits into a realm often spoken of but seldom journeyed into. This episode of our podcast takes a leap into the endless, boundless space where God speaks unceasingly to His warriors. Together, let's explore, comprehend, and integrate the truth of His unbridled communication into our spiritual warfare.Scripture"We are not like Moses, who put a veil over his face so the people of Israel would not see the glory, even though it was destined to fade away. But the people's minds were hardened, and to this day whenever the old covenant is being read, the same veil covers their minds so they cannot understand the truth. And this veil can be removed only by believing in Christ." — 2 CORINTHIANS 3:13-14The image of Moses veiling his face signifies a transient barrier that once separated humanity from fully experiencing God's glory. For too long, our minds, influenced by tangible experiences, have conceived spiritual barriers that hinder our profound engagements with God. The heavenly whispers, ever-present, oftentimes find a barricade of our own disbelief and measured expectations. Yet, Christ has torn the veil, allowing an unhindered, perpetual connection between our spirit and God's voice.The Power Of God's Whisper is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.Driving Points* Awakening to the Unveiled Spiritual RealmRealizing that through Christ the veil is removed, we're invited to dwell in a space where God's voice isn't a distant echo but a present, tangible reality. Our spiritual warriors' journey is thus about awakening to this reality, comprehending that the spiritual signals from God are uninterrupted and ceaseless.* Harboring Expectant Faith in God's Ever-Present VoiceWhile our empirical experiences attempt to shape our spiritual expectations, anchoring our faith in God's continual presence defies those physical limitations. Our spiritual eyes and ears, untethered by the earthly and the observable, must expectantly seek and respond to God's persistent, enveloping voice in our lives.* Embracing Persistent Pursuit and Unhindered Relationship with GodA relationship unrestrained by veils and barriers is an invitation into uncharted spiritual terrains. Our walk with God thus should mirror an unyielding pursuit, where the sounds of His whispers steer our paths, and our hearts remain ever-receptive to His divine instructions.ConclusionDear friends, the echo from eternity does not beckon us into a distant, unattainable fellowship with God. Rather, it invites us into a vibrant, active, and unbroken communion, where His voice does not merely visit, but dwells, instructs, and guides our spiritual endeavors.Call to ActionEmbrace this truth, dear spiritual warriors: The communication from our Almighty is not restricted, not waned by celestial distance. Encase your spirit in expectant faith, and step into a boundless, unshielded relationship with Him, for your path is lit by the constant whisper of His voice.PrayerOh, Gentle Whisperer of the Heavens, enkindle within us an unyielding faith that perceives Your ceaseless voice amidst the clamor of this world. May our spirits, unbridled by veils, perpetually seek and find You in every echo of our journey. Embed within us, Lord, a pursuit that knows no bounds, traversing into the depths of Your eternal love and guidance. Amen.Thank you for journeying with me, Matthew Adams, into the boundless realms where God's voice eternally resonates. May your spiritual endeavors be perpetually bathed in His unceasing whispers, guiding your path into the profound depths of His eternal love and wisdom. Until next time, may your heart remain perpetually unbridled, ever-hearing, and perpetually dialoguing with our unceasingly communicative God. Get full access to My Reasons To Believe at myr2b.substack.com/subscribe
Link to bioRxiv paper: http://biorxiv.org/cgi/content/short/2023.07.07.548169v1?rss=1 Authors: Wilson, Z. N., West, M., English, A. M., Odorizzi, G., Hughes, A. Abstract: Preserving the health of the mitochondrial network is critical to cell viability and longevity. To do so, mitochondria employ several membrane remodeling mechanisms, including the formation of mitochondrial-derived vesicles (MDVs) and compartments (MDCs) to selectively remove portions of the organelle. In contrast to well-characterized MDVs, the distinguishing features of MDC formation and composition remain unclear. Here we used electron tomography to observe that MDCs form as large, multilamellar domains that generate concentric spherical compartments emerging from mitochondrial tubules at ER-mitochondria contact sites. Time-lapse fluorescence microscopy of MDC biogenesis revealed that mitochondrial membrane extensions repeatedly elongate, coalesce, and invaginate to form these compartments that encase multiple layers of membrane. As such, MDCs strongly sequester portions of the outer mitochondrial membrane, securing membrane cargo into a protected domain, while also enclosing cytosolic material within the MDC lumen. Collectively, our results provide a model for MDC formation and describe key features that distinguish MDCs from other previously identified mitochondrial structures and cargo-sorting domains. Copy rights belong to original authors. Visit the link for more info Podcast created by Paper Player, LLC
Encase your pocky in a glass. Stick it in the freezer. Wait however long you wait for things to get cold. Open the freezer. Eat the pocky. Repeat. Forever. Submit to the Mikugeddon. The Mikudon. The Wooly Mikueth. Just don’t enter the RESTRICTED ACCESS area. John Hurst is your host this week and he can… Read more S7:E7 – Hatsune Miku Frozen Pocky Commercial
Support the podcast at: https://www.patreon.com/thewts Cam Anderson from Blacktail Studio is back for the 3.5th time to talk about epoxy, big slabs of wood, and YouTube. Blacktail Studio is still the most popular woodworking channel on YouTube, recently passing 2 million subscribers, a significant number of whom are probably hate-watching. (You know who you are.) Cam's got over 227 million channel views…and that's off the success of full-length videos, not shorts. His videos feature really really big slabs of lumber, gallons and gallons of epoxy, and lots of dollar signs in the thumbnails. But above all the glamor and glitz, Cam is an artist and the furniture he makes is stunningly beautiful. Blacktail Studio channel: https://www.youtube.com/@BlacktailStudio
The Swarm is a swarm of Nazi bees. No, really. The Swarm first appeared in "The Champions" #14 -- Check out Encase at your local airport for a quick, safe*, and cheap way to fly! *Up to 80% of people now survive the freezing process!
Hello! Welcome back to Books on the Brain, a podcast of what... BOOKS AND NONSENSE! NEW LOGO, WHO DIS???? Thank you all for your patience on our very early mid-season break as we did some housekeeping on our end and got our ducks in a row. Encase you missed it, Carli has decided that their time with the podcast has come to a close and they are moving on to new creative endeavours. Please go give Carli's message a listen and send love their way as they move on in their journey and spend time managing their health. You can still find them on their personal social media handles, so go give them a follow to keep up to date with all things Carli! We will miss them dearly and wish them nothing but the best with their new path forward. You will still be getting all things Books on the Brain from Deirdre and me, so make sure you are following us on our Instagram (@booksonthebrainpod) to keep up to date on all things podcast-related. You can also send us an email at booksonthebrainpod@gmail.com . Today's episode is filled with laughs, seriously... it's funny. We are bringing back one of our favourite episodes with a little twist, reading 1-star GoodReads reviews on popular books. Leave us a comment on Instagram with books you'd like to see us roast in a future episode. This episode has been locked and loaded for a while so some of the info is not up to date, so apologies in advance for that! Please don't forget to leave us a rating and review on your podcast platform of choice, it does make a difference and we love you for it! You can also follow us on our individual accounts : Deirdre (she/her) @deirdrerosemorgan and Danielle (she/her) @d.j.books current reads: Deirdre: Dating Dr. Dil - Nisha Sharma Danielle: No Exit - Taylor Adams --- Send in a voice message: https://anchor.fm/booksonthebrainpod/message
In episode 59 we discuss the Marshall House Hotel in Savannah, GA and the Queen Anne Hotel in San Francisco, CA.ghostcitytours.commarshallhouse.comhauntedrooms.comsffirst.comtripadvisor.com #myfavoritehaunting #podcast #ghost #ghoststory #haunted #hauntedhotel #xfilesreferences
Because sometimes a waist-deep morass of trashy tabloid pages is just overzealous shielding for a yummy fish supper. Rob & I remind you of that fish supper. ... yeah, that'll do. Encase your ear-pipes in more of Rob's astute, personable verbiage at https://anchor.fm/the-longest-night or https://wearerebelchums.wordpress.com/ or dig some of his punchy-ass power-pop at https://colourfulsevens.bandcamp.com/
r/Pettyrevenge In today's episode, a complete jerkface decides to park in disabled parking even though he doesn't have a disabled placard. OP's mom, however, is disabled and she relies on those parking spaces. When jerkface walks off and leaves his car alone, OP's mom takes advantage of the freezing temperatures and some water to encase the jerk's key wells in solid ice. Maybe next time you'll think twice about being an inconsiderate prick! --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app · Music + Talk: Got an idea for a Music + Talk show? Get started by downloading the free Anchor app or going to anchor.fm/musicplustalk anchor.fm/musicplustalk Support this podcast: https://anchor.fm/rslash/support
Between segments, Jack learns that “Jeopardy” host Alex Trebek ate a ton of pot brownies at a party. Even better, he wasn’t seen for 3 days afterwards. Encase this man in carbonite! Following up from the previous segment, Jack also has details about the Pizza Party in Massachusetts. It’s a political party, officially recognized by state officials. Jack is proudly a member, and hopes to one day run against Mike and his Pirate Party. Back on-track, Jack and Mike discuss teenage riff-raff. These days, you’re cool if you’re underage and dress as a grandma to purchase alcohol. What has the plague done to our youth?! This leads Jack to feature a segment from NerdWire, where old women try Fireball whiskey for the first time. These are the bags you’d want to party with. Wrapping up, Jack proclaims his love for the game show “Supermarket Sweep.” For whatever reason, it’s trending on Netflix. Forget Yeezy – Vote David Ruprecht and Johnny Gilbert in 2020! --- Support this podcast: https://anchor.fm/hardlyfocused/support
Part One: “We don’t give a fudge…” Welcome to Hardly Focused! Jack and Mike with you for this episode. A certain Fro-host was on the bill for this podcast, but he called it an early night. This episode begins with sad news. Grant Imahara of “Mythbusters” fame, passes on at 49 years old. Jack features audio from the Discovery Channel, honoring Grant and his contributions to both science and entertainment. Elsewhere, “that bitch” Carole Baskin remains in the news. She’s on Cameo, and for $300 she will record for you her best 50 Cent impression! Well worth every penny… or not. Part Two: Yeezy for President? Good news, everyone! Kayne West is running for President! Wait, sorry, he’s not running. Hold on, he’s still running. What the hell? Part Three: Getting Crunk with Grandma Between segments, Jack learns that “Jeopardy” host Alex Trebek ate a ton of pot brownies at a party. Even better, he wasn’t seen for 3 days afterwards. Encase this man in carbonite! Following up from the previous segment, Jack also has details about the Pizza Party in Massachusetts. It’s a political party, officially recognized by state officials. Jack is proudly a member, and hopes to one day run against Mike and his Pirate Party. Back on-track, Jack and Mike discuss teenage riff-raff. These days, you’re cool if you’re underage and dress as a grandma to purchase alcohol. What has the plague done to our youth?! This leads Jack to feature a segment from NerdWire, where old women try Fireball whiskey for the first time. These are the bags you’d want to party with. Wrapping up, Jack proclaims his love for the game show “Supermarket Sweep.” For whatever reason, it’s trending on Netflix. Forget Yeezy – Vote David Ruprecht and Johnny Gilbert in 2020! --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app Support this podcast: https://anchor.fm/hardlyfocused/support
COVID fraud warnings, the UK’s National Cyber Security Centre's suspicious email reporting service, Dubai’s police deal with COVID fraud, Microsoft tracks ransomware groups, a fake FBI special agent starts dating, porn blackmail, counter-drone tech, and the Metropolitan Police force’s virtual police academy highlight our law enforcement round-up followed by a conversation with retired FBI Supervisory Special Agent Scott Augenbaum the author of The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime. As a generous nod to our listeners, Scott will send you a personal copy of his book if you are one of the first five to send him an email: Information Assured Podcast as the title (email available address on the show website).Scott and I discuss Scott’s career at the FBIThe story of his bookFraudPersonal ProtectionCorporate ProtectionsNation-States and our EconomyScott reveals his four truths of cybersecurity during our conversation, and he delivers with an energy and enthusiasm I think you’ll appreciate. I’ve had the pleasure of working with Scott for many years, and he was indirectly responsible for my training and professional experiences with ENCASE and FTK through a regional ICAC team in Tennessee.Law Enforcement Round-Up: ONLINE EXTORTION SCAMS INCREASING DURING THE COVID-19 CRISIS Law Enforcement Round-Up: Citizens flagged over 160,000 suspicious emails to NCSC in two weeks Law Enforcement Round-Up: Coronavirus: Hackers pose as Dubai Police to steal bank details Law Enforcement Round-Up: Ransomware groups continue to target healthcare, critical services; here's how to reduce risk Law Enforcement Round-Up: Monroe Woman Who Posed As An FBI Agent On Dating Websites Is Sentenced To Prison Law Enforcement Round-Up: Met welcomes 320 new recruitsLaw Enforcement Round-Up: How the Justice Department is Permitted to Use Counter-Drone Technology Conversation with retired FBI Supervisory Special Agent Scott Augenbaum the author of The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime.Closing RemarksSupport the show (https://www.patreon.com/utterlymental?fan_landing=true)
Dropping in for a quick announcement - you heard it here first! This week a few different announcements went out from OpenText, but this one caught my attention because it could honestly and truly be a game-changer for security and legal teams when it comes to breaches. Going beyond the typical EDR solution, this announcement may be able to shine light into the questions security and legal professionals need answered in the case of a breach. Check it out. Official Name: OpenText™ Content Security for EnCase™ by Reveille. Press release: https://www.opentext.com/about/press-releases?id=6A68BD4D22384A45A910DEFBD22BECBD Guests: Paul Shomo, Senior Security Architect, OpenText Brian Dewyer, CTO, Reveille Software
The Genealogy Gems Podcast Episode #205 with Lisa Louise Cooke This episode breaks two huge pieces of genealogy news and shares two great conversations: FamilySearch ends microfilm lending: how you can get the records you need; RootsMagic adds Ancestry.com compatibility: sync your Ancestry.com tree to your master RootsMagic file and search Ancestry.com from within the software; Melissa Barker, the Archive Lady, talks about visiting archives to explore original manuscript record treasures; Nicole Dyer shares a fun family history activity idea to do with kids—do you have a family gathering coming up that could use this inspiration? A SURPRISE IN MY MAILBOX! NEWS NEW PREMIUM VIDEO! Lisa Louise Cooke shows you how to use the free Google Earth Pro software to create your own historic map collection customized for your genealogy and family history research. By the end of this class you'll have a permanent collection of hundreds of gorgeous historic and vintage maps from around the world, organized and ready to use for family history. to watch a free preview of this full-length video class. Genealogy Gems Premium website members can watch the whole thing: to learn more. LISA: I thought the resolution of the jpg version wasn't good, so I just left this ad as text. The 4th Annual Northwest Genealogy Conference This episode today is brought to you by the 4rd Annual Northwest Genealogy Conference, hosted by the Stillaguamish Valley Genealogical Society, north of Seattle in Arlington, WA. Centering on the theme, “Where Does Your Story Begin?” it's four days PACKED full of genealogy. There will be well-known and respected keynote speakers, including our friend and genetic genealogist Diahan Southard, speaking on DNA; Kenyatta Berry of Genealogy Roadshow fame, speaking on Caribbean research and using slave schedules in research; and Daniel Earl speaking on Putting History in Your Family History. Starting off with the Free Day Wednesday afternoon, Speaker Peggy Lauritzen will address beginner's issues in her Genealogy 101 presentation, which is also a good refresher for the more seasoned genealogists. There will be such great genealogical information for all levels, AND it'll be lot of fun! Between classes take a chance to meet a distant cousin with the “Cousin Wall”. Participate in the genealogy-related scavenger hunt, the Wednesday evening meet and greet and the Friday dress-as-your-ancestor day, and much, much more! Go to for details and to register. Check it out now -- registrations are limited, so it's good to get in early. It's August 16-19, 2017. It'll be a great show: don't miss it! INTERVIEW: MELISSA BARKER, THE ARCHIVE LADY Melissa Barker is a Certified Archives Records Manager, the Houston County, Tennessee Archivist and author of the popular blog and bi-weekly advice column . She has been researching her own family history for the past 27 years. Preserve your own family archive: Items in danger: Original items in attics, basements What to preserve first: The most precious and original items you have! Restoration tips: Clean documents and photos with archival sponges. Lay the item perfectly flat. Gently place a finger or hand to hold it steady. Work with the sponge from the center outward, in small sections. Keep two-dimensional items as flat as possible. Encase fragile items in Mylar sleeves (buy from archival supply companies). Visiting an archive: Call ahead! Don't trust the operational hours from the website. Ask about parking – it's often very limited. Ask ahead about access to archival items of interest. Archive etiquette: Follow the rules. Be courteous when working with staff. Museums, societies, archives, and libraries may all have collections in back rooms you can't see—but you can ask for them. Vertical Files – in folders in cabinets Manuscript Collections – underused in genealogy! Ask for finding aid. Loose Records – the working papers of a court case, for example Unprocessed Records – not yet incorporated into the official collection Tips for using your mobile devices in archives: Ask for procedures for taking photos with your own device. There may be rules against this or a use fee. Capture the source information by photographs: cover page, page number, folder, box number, manuscript collection name, etc. BONUS CONTENT for Genealogy Gems App Users If you're listening through the Genealogy Gems app, your bonus audio content for this episode comes from Melissa Barker, the Archive Lady, with more about finding and using original manuscript records in your genealogy research. The and is only $2.99 for . Lisa Louise Cooke uses and recommends family history software. From within RootsMagic, you can search historical records on FamilySearch.org, Findmypast.com and MyHeritage.com. RootsMagic is now fully integrated with Ancestry.com, too: you can sync your RootsMagic trees with your Ancestry.com trees and search records on the site. Learn more about Keep your family history research, photos, tree software files, videos and all other computer files safely backed up with , the official cloud-based computer backup system for Lisa Louise Cooke's Genealogy Gems. Learn more at . INTERVIEW: NICOLE DYER Nicole has been researching her ancestors and delighting in their stories for the past 15 years. Nicole volunteers at the Tucson Family History Center teaching a family history story time group for young children. Lisa suggested the free program Jing for video screen capturing: (Full disclosure: this podcast blog contains affiliate links. We will be compensated if you make a purchase through our link. Isn't that an awesome way to help keep the free podcast free?!) and start a free trial Start creating fabulous, irresistible videos about your family history with Animoto.com. You don't need special video-editing skills: just drag and drop your photos and videos, pick a layout and music, add a little text and voila! You've got an awesome video! Try this out for yourself at . is the place to make connections with relatives overseas, particularly with those who may still live in your ancestral homeland. : it's free to get started. GENEALOGY GEMS BOOK CLUB: A FAMILY HISTORY MURDER MYSTERY! Journalist Helene Stapinski's new family history memoir: A story of poverty and power, love, tragic decisions, and a courageous and desperate woman's leap for a new life across the ocean continues to unravel a past Helene explored in her fantastic first family history memoir, . Find a whole list of fabulous family history-inspired reading at the PRODUCTION CREDITS Lisa Louise Cooke, Host and Producer Sunny Morton, Editor Vienna Thomas, Associate Producer Lacey Cooke, Service "Happiness" Manager
The Forensic Lunch! The videocast/livecast/podcast all about #DFIR! This week we have Eric Zimmerman talking about the work he did speed and scale testing Encase, FTK and X-ways. Also Matthew and I talking about our newest tool BitRocker which will expose which recovery keys will unlock a bitlocker encrypted volume. Get our newest tool BitRocker here: https://www.gettriforce.com/product/bitrocker-bitlocker-recovery-key-identifier/ Read Eric's testing here: https://binaryforay.blogspot.com/2016/09/let-benchmarks-hit-floor-autopsy-vs.html
This week I take a look at three popular computer forensic suites: FTK, Encase and WinHex. I offer my opinion as to the strengths and weaknesses of each.
Forensic Lunch live from EnFuse with Rob Batzloff talking about Encase 8, and James Wiebe talking about new advancements at CRU
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ballenthin-Graeber-Teodorescu-WMI-Attacks-Defense-Forensics.pdf WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis Matt Graeber Reverse Engineer, FireEye Inc. Willi Ballenthin Reverse Engineer, FireEye Inc. Claudiu Teodorescu Reverse Engineer, FireEye Inc. Windows Management Instrumentation (WMI) is a remote management framework that enables the collection of host information, execution of code, and provides an eventing system that can respond to operating system events in real time. FireEye has recently seen a surge in attacker use of WMI to carry out objectives such as system reconnaissance, remote code execution, persistence, lateral movement, covert data storage, and VM detection. Defenders and forensic analysts have largely remained unaware of the value of WMI due to its relative obscurity and completely undocumented file format. After extensive reverse engineering, our team has documented the WMI repository file format in detail, developed libraries to parse it, and formed a methodology for finding evil in the repository. In this talk, we will take a deep dive into the architecture of WMI, reveal a case study in attacker use of WMI in the wild, describe WMI attack mitigation strategies, show how to mine its repository for forensic artifacts, and demonstrate how to detect attacker activity in real-time by tapping into the WMI eventing system. By the end of this talk, we will have convinced the audience that WMI is a valuable asset not just for system administrators and attackers, but equally so for defenders and forensic analysts. Matt Graeber is a reverse engineer in the FireEye Labs Advanced Reverse Engineering (FLARE) team with a varied background in reverse engineering, red teaming, and offensive tool development. Since joining FireEye, Matt has reversed a vast quantity of targeted and commodity malware samples and served as an instructor of Mandiant's Advanced Malware Analysis course. Matt is the author of various PowerShell modules used for pentesting and reverse engineering including PowerSploit and PowerShellArsenal. He has also been designated a Microsoft "Most Valuable Professional" in PowerShell. Twitter: @mattifestation Willi Ballenthin is a reverse engineer in the FLARE team who specializes in incident response and computer forensics. He can typically be found investigating intrusions at Fortune 500 companies and enjoys reverse engineering malware, developing forensic techniques, and exploring the cutting edge. Willi is the author of a number of cross-platform Python libraries including python-registry, python-evtx, and INDXParse.py. Twitter: @williballenthin Claudiu Teodorescu is a reverse engineer in the FLARE team. Prior to joining FireEye, Claudiu worked for Guidance Software, writing forensic parsers for different file formats to support the EnCase forensic tool. Also, as the Cryptographic Officer of the company, he supported EnCase integration with different disk/volume/file based encryption products including Bitlocker, McAfee EEPC, Checkpoint FDE, Symantec EEPC, etc.
Ya estamos en nuestro episodio #64 de Crimen Digital, y en esta ocasión tenemos un tema bastante recurrente en la actualidad, nos referimos a la privacidad y seguridad de datos sin que una afecte a la otra, para una perspectiva más amplia acerca de ello nos acompaña el experto Juan Carlos Carrillo. Esperamos sus comentarios referente a este y otros temas que puedan interesarles o bien envíenos sus saludos y díganos de que parte del mundo nos escuchan, recuerden que sus opiniones son muy importantes. LO NUEVO – Aprehenden a hacker en Colombia. – Vienen 2 eventos importantes: El CEIC 2014, de Guidance Software, muy relacionado con su programa EnCase, del 12 al 22 de mayo; y la Conferencia Internacional & Training Expo del HTCIA (High Technology Crime Investigation Association), en agosto 2014. – Siguen los Cursos SANS Mentor, con los código de descuento que pueden encontrar en episodios pasados. LA ENTREVISTA Juan Carlos Carrillo (@juan_carrillo), sobre la protección de datos personales en la red. LA ROLA – HIM – Wicked Game RECOMENDACIONES- CrowdStrike Muchas gracias por seguir con nosotros en nuestro nuevo episodio #64, esperamos que lo disfruten y sea de gran apoyo para ustedes. Sigan apoyándonos mediante sus donaciones a traves de Paypal, lo pueden hacer ingresando a la liga que está en nuestro sitio. Pueden estar en contacto directo con nosotros en contacto@crimendigital.com, y nuestras redes sociales: Twitter y Facebook. Estamos por llegar a nuestros primeros 10 mil seguidores en Twitter esperamos lograrlo pronto con sus interaciones en dónde nos comparten! Learn more about your ad choices. Visit megaphone.fm/adchoices
I spoke with Patrick Burke, Senior Director and Assistant General Counsel for Guidance Software, the makers of Encase, which is used by corporations for the collection and processing of e-mail and electronic information. Burke will be moderating a panel of judges and chairing the second day at the 2009 IQPC E-Discovery conference next week. We discussed the judges panel and the technology-related issues on which Burke expects the judiciary to focus in 2010.
I spoke with Patrick Burke, Senior Director and Assistant General Counsel for Guidance Software, the makers of Encase, which is used by corporations for the collection and processing of e-mail and electronic information. Burke will be moderating a panel of judges and chairing the second day at the 2009 IQPC E-Discovery conference next week. We discussed the judges panel and the technology-related issues on which Burke expects the judiciary to focus in 2010.
I spoke with Patrick Burke, Senior Director and Assistant General Counsel for Guidance Software, the makers of Encase, which is used by corporations for the collection and processing of e-mail and electronic information. Burke will be moderating a panel of judges and chairing the second day at the 2009 IQPC E-Discovery conference next week. We discussed the judges panel and the technology-related issues on which Burke expects the judiciary to focus in 2010.
I spoke with Patrick Burke, Senior Director and Assistant General Counsel for Guidance Software, the makers of Encase, which is used by corporations for the collection and processing of e-mail and electronic information. Burke will be moderating a panel of judges and chairing the second day at the 2009 IQPC E-Discovery conference next week. We discussed the judges panel and the technology-related issues on which Burke expects the judiciary to focus in 2010.
In Episode 9, The MacDudes talk about hardening your Mac using native security applications and processes. Following in the security theme, the Plist of the Week (PLoW) covers com.apple.loginwindow.plist and com.apple.loginitems.plist.We have a great interview with Joe Duke of AccessData. Joe will discuss the use of FTK in analyzing Macintosh and the new FTK Mac Forensics course. The following are some of the websites we talk about concerning Mac Security & anti-virus Mac Shadows Secure Mac Mac Hacking Security Social Intego BlogThe show note to follow, honest!Be Safe,The MacDudes
In this Episode, Ryan interviews Al Lewis of SubRosaSoft, Chris talks with Social Media & Communications expert, Christ M. Miller about her website, Cops2Point0.com. The MacDudes also discuss:HFS+ read support in BootCamp 3.0 Mac OS's native screenshot capabilitiesPlist of the Week: com.apple.sidebarlists.plistWe're still struggling with some sound quality issues, hopefully we will have this worked out with the next round of interviews.Show notes will be posted shortly.
This episode covers why we point everyone to the user's Home folder first. Ryan talks about Diskarbitration for Leopard and Tiger. Chris showcases the Plists of the Week, Safari bookmarks, history, downloads, TopSites & Last Session.Websites of the Week: MacTracker & EveryMacPodcasts to listen to: CyberSpeak & Forensic 4CastShow notes are available for download. They are more detailed than the synopsis below:Click here to DownloadShow notes synopsis:Home Folder: -Most of the evidence is located in the Userʼs Home Folder -Majority of the Preference PLists with user-specific settings are in User/Library/ Preferences -User Logs: -Indicative of the userʼs activity -Not system activity, but user specific logs -Preferences: -PLists files or proprietary format files for the User -Contains configurations and settings for the User -I.E. Online activity, buddy lists, email, logins, etc.-Application Support: -Mozilla Cache, iPhone backup files from MobileSync folder -Application PLists with information LEOPARD: -Disk Arbitration looks at devices and mounts the device and makes icon to access this device available to the user -On Boot, Disk Arbitration recognizes the internal hard drive. Recognizes file system. Mounts partitions on desktop. -In order to prevent writes, we must prevent the mount. -To turn off Disk Arbitration, enter Terminal and type: sudo launchctl unload System/Library/LaunchDaemon/com.apple.diskarbitrationd.plist-Now when you connect a disk, the disk will not mount -To turn back on, enter Terminal and type: sudo launchctl load System/Library/LaunchDaemons/com.apple.diskarbitrationd.plist or Reboot system and diskarbitration will become active again TIGER: -Not controlled by LaunchCtl process -Need to move the PList from one location to another -Method: 1. Make copy of the diskarbitrationd.plist 2.Once the copy is made, use the remove command in Terminal to delete the com.apple.diskarbitrationd.plist from the /etc/mach_init.d folder 3.Reboot system 4.Only OS Boot partition will mount. To UNDO, Copy the diskarbitrationd.plist back to the /etc/mach_init.d folder and reboot the system. PList(s) of the Week(PLOW): User/Library/Safari:Bookmarks.plist: -User created/maintained bookmarks Downloads.plist -Any downloads specific to Safari -Download history History.plist: -History from Safari if not cleared TopSites.plist -Came with Safari 4 -When a New Tab is opened, it opens thumbnails of most visited sites -Instead of typing URL, just click on thumbnail and it opens the site. LastSession.plist: -Indicates what was open on last Safari session -If multiple windows opened, it will indicate each as a different Item
Hey,Episode 3 is uploaded and ready for your listening pleasure. We cover Safari Internet cache, the Trusted Utilities Disk and the Plist of the Week. We also have our Host at Large, Reggy, with part one of his series on the Terminal. Show notes should be posted tomorrow. Thanks for listening and keep those emails coming in!Be Safe,The MacDudes
Episode 2 is uploaded! The sound quality is a bit better but still working on that. In this episode we cover: Defeating the Open Firmware password, Mobile Forensics World's iPhone Forensics panel discussion, the Plist of the Week and a few Mac websites.You can send any comments or questions to: Click here to send The MacDudes an e-mailEpisode 1 Show Notes (Download at: Show Notes)GOLDEN RULE: Use OPTION key to boot first and confirm no Firmware Password OFP: Prevents any other startup option other than "option" or "startup disk". If OFP is active and you attempt alternative boot sequence, the system will default to the normal “Startup Disk” and possible writes will be made. -Dont want to make writes.... 1. Boot with option key to confirm Open Firmware Password exist 2. To get around: A. Pull hard drive and image via write block (24 screws or less) B. Reconfigure the RAM: 1) Shut down 2) Disconnect power (if laptop remove battery) 3) Remove stick or add stick of RAM to reconfigure 4) Close up, connect battery/power 5) Command+Option+P+R key all at once "Vulcan Death Grip" 6) Listen for 3 Chimes-Indicates reset 7) Restart and use Option key to check NOTE: Time will be reset. The clock will possibly be off. Logs may be important. Mobile Forensics World iPhone Forensics PaneliPhone Panel: -Ryan Kubasiak: Macosxforensics.com -Jonathan Zdziarski : iPhone Forensics author -Sean Morrissey :Dept. of Defense -Andrew Hoag : Moderator -Took questions from audience after moderated question session.Different ways to get data: Hardware/Software Suites: Wolf: Good for unlocked phone, and if you unlock can use. CellebriteDifferent Methods: Raw Disk info: Jonathan Zdziarski and Sean Morrissey -Concerns as to what is being changed from data standpoint Dont forget about the iPhone backups on the Mac: a wealth of informationPList(s) of the Week(PLOW): Plist: Registry like files but corruption of one file doesnʼt corrupt the entire system. Application plists: Quicktime: Global: Library--> Preferences--> com.apple.quicktime.plist -Shows Registered User and Registered Key -Can indicate the key for verififcation of legal software iWork (Mac Office Suite): Global-->Library-->Preferences-> iWork08: com.apple.iwork08.plist iWork09: com.apple.iwork09.plist Google Gears: Global--Library-->Preferences-> com.google.gears.plist User-->Library-->Preferences-> com.google.gmailnotifier.plist Websites to Check Out:Mac Shadows: www.macshadows.comMacenstein: www.macenstein.com
Well, we finally got Episode 1 uploaded! We had some minor problems with sound quality, hopefully we will get those cleared up for the next episode.You can send any comments or questions to: Click here to send The MacDudes an e-mailEpisode 1 Show Notes (Download at: Show Notes)Single User Mode: GOLDEN RULE: Use OPTION key to boot first and confirm no Firmware Password -If Firmware Password in use, power off. (Firmware Password Options will be covered in a later podcast) -Single User Mode can be used to find Date/Time of the system without making changes -After OPTION key boot and confirmation of no firmware password -REBOOT holding OPTION + ʻSʼ Key to boot into Single User Mode -Will be similar to a Verbose boot -After boot stops, type “Date” at cursor and date and time will be displayed. -To find the make & model of the installed hard drive, look for the line that starts with "Got Boot Device"-Can also run System Profiler to access information about the system Training: Forward Discovery: -Non-Tool Specific Mac Forensics Survival Course -Teaches how to do Mac Forensics using Mac -Basic and Advanced Courses being offered Internationally BlackBag Technologies: -Offers both training for non-tool and Blackbag Tool Training -Suite of Proprietary tools for using a Mac to do Mac Forensics -Beginner, Intermediate, and Advanced Courses SubRosaSoft: -Also offers tool specific training -MacForensicsLab:Proprietary software Purdue University: (Law Enforcement Only): -3 day class -Traveling Class and at the University -Beginning and Advanced Course Apple: -Several certifications: -Apple Certified Support Professional (ACSP) -Apple Certified Technical Coordinator (ACTC) -Apple Certified System Administrator (ACSA) -Range of Apple Software Pro Certifications as well Plist of the Week(PLOW): This weekʼs PLOW is: com.apple.ipod.plist 1.It is located in both Global and User: Library --> Preferences 2.Contains information about all IPod/IPhone devices connected to system. 3.Includes (not comprehensive): a.UUID: Unique ID for the Device b.Connected: Last Connected Date/Time c. Device Class: IPod/IPhone d.Firmware Version e.Serial Number f. IMEI (IPhone) g.Use Count
Welcome to Inside the Core, the Macintosh & Apple Device Forensics podcast.Today is a short introduction into what Inside the Core is all about. We will cover Mac specific resources and the Plist of the Week.ResourcesThe Mac OS X Forensics websitewww.macosxforensics.comThe Mac OS Forensics Yahoo Grouptech.groups.yahoo/group/macos_forensicsTips & Tricks at the MacForensicLabs websitewww.macforensicslab.comPlist of the Weekcom.apple.preferences.account.plistThis plist is located in the Local Library (/Library/Preferences) and holds information pertaining to deleted user accounts. These user accounts can be totally deleted from the system or archived by the administrator.To see if the user accounts were archived, look in the Users folder for the Deleted Users subfolder (/Users/Deleted Users/). User accounts that have been archived will be in a disk image (DMG) format or if it was FileVaulted, a sparsebundle image.
Today we have an interview of Russell Yawn,Chief Investigator, Office of Prosecutorial Services for the State of Alabama and panel mamber for the National Computer Forensics Institute. Also, check out Mount image Pro's new Virtual Forensic Computer that gives you the ability to virtually boot EnCase, DD, and Smart images. Sorry for any hissing sound on Ovie's side, we are exchanging a defective mixer
Today Bret talks with Brian Dykstra, CIO and Director of Education at Mandiant, about the ediscovery rule changes. Bret also talks about virtual machine detection in malware, spamgourmet, employee comensation, Encase version 6, Nigerian scam still works, FBI dropps boarding pass generator investigation, Parallels build 3036, proxy site lists, 30-essential pieces of free and open software for Windows.Please take the time to give us a review on iTunes.Drop by Brian Dykstra's site at www.virtualwar.com
Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference
Don't get caught. Building off of Foster's log manipulation and bypassing forensics session at BlackHat Windows 2004, James C. Foster and Vincent T. Liu will share over eighteen months of continued private forensic research with the Black Hat audience including ground-breaking vulnerabilities and key weaknesses in some of the most popular tools used by forensic examiners including EnCase, CA eTrustAudit, and Microsoft ISA Server. Watch live demonstrations as Foster and Vinnie detail how to leverage these weaknesses to avoid being detected, and discover the theory and practice behind the most effective and cutting-edge anti-forensics techniques. Finally, learn how to turn a forensic analyst's training against himself by joining the speakers in a lively discussion of the "Top 10 Ways to Exploit a Forensic Examiner". This talk should be required viewing for all those on both sides of the fence, so come prepared to watch trusted forensics tools crumble. James C. Foster, Fellow, is the Deputy Director of Global Security Solution Development for Computer Sciences Corporation. Foster is responsible for directing and managing the vision, technology, and operational design for CSC's global security services. Prior to joining CSC, Foster was the Director of Research and Development for Foundstone Inc (acquired by McAfee). and was responsible for all aspects of product, consulting, and corporate Rresearch and developmentD initiatives. Prior to joining Foundstone, Foster was a Senior Advisor and Research Scientist with Guardent Inc (acquired by Verisign) and an editor at Information Security Magazine(acquired by TechTarget Media), subsequent to working as an Information Security and Research Specialist for the Department of Defense. Foster's core competencies include high-tech management, international software development and expansion, web-based application security, cryptography, protocol analysis, and search algorithm technology. Foster has conducted numerous code reviews for commercial OS components, Win32 application assessments, and reviews on commercial and government cryptography implementations. Foster is a seasoned speaker and has presented throughout North America at conferences, technology forums, security summits, and research symposiums with highlights at the Microsoft Security Summit, BlackHat, MIT Wireless Research Forum, SANS, MilCon, TechGov, InfoSec World 2001, and the Thomson Security Conference. He also is commonly asked to comment on pertinent security issues and has been cited in USAToday, Information Security Magazine, Baseline, Computer World, Secure Computing, and the MIT Technologist. Foster holds degrees in Business Administration, Software Engineering, and Management of Information Systems and has attended the Yale School of Business, Harvard University, the University of Maryland, and is currently a Fellow at University of Pennsylvania's Wharton School of Business. Foster is also a well published author with multiple commercial and educational papers; and has authored, contributed, or edited for major publications to include "Snort 2.0", "Snort 2.1" 2nd Edition, "Hacking Exposed" 4th Ed and 5th Ed, "Special Ops Security", "Anti-Hacker Toolkit" 2nd Ed, "Advanced Intrusion Detection", "Hacking the Code", "Anti-Spam Toolkit", "Programmer's Ultimate Security DeskRef", "Google for Penetration Testers", "Buffer Overflow Attacks", and "Sockets, Shellcode, Porting, and Coding". Vincent Liu is an IT security specialist at a Fortune 100 company where he is responsible for assessing the security of the enterprise network infrastructure and participating as a member of the global incident response team.Before moving to his current position, Vincent worked as a consultant with the Ernst and Young Advanced Security Center and as an analyst at the National Security Agency. His specialties include penetration testing, web application assessments, incident response, binary reverse engineering, and exploit development. Vincent holds a degree in Computer Science and Engineering from the University of Pennsylvania. While at Penn, Vincent taught courses on operating system implementation and C programming, and was involved with DARPA-funded research into advanced intrusion detection techniques. He is currently a contributor to the Metasploit project, and is a contributing author for Sockets, Shellcode, Porting, and Coding. Vincent has also studied at the University of Maryland and the University of Kentucky.>
Black Hat Briefings, Las Vegas 2005 [Video] Presentations from the security conference
Don't get caught. Building off of Foster's log manipulation and bypassing forensics session at BlackHat Windows 2004, James C. Foster and Vincent T. Liu will share over eighteen months of continued private forensic research with the Black Hat audience including ground-breaking vulnerabilities and key weaknesses in some of the most popular tools used by forensic examiners including EnCase, CA eTrustAudit, and Microsoft ISA Server. Watch live demonstrations as Foster and Vinnie detail how to leverage these weaknesses to avoid being detected, and discover the theory and practice behind the most effective and cutting-edge anti-forensics techniques. Finally, learn how to turn a forensic analyst's training against himself by joining the speakers in a lively discussion of the "Top 10 Ways to Exploit a Forensic Examiner". This talk should be required viewing for all those on both sides of the fence, so come prepared to watch trusted forensics tools crumble. James C. Foster, Fellow, is the Deputy Director of Global Security Solution Development for Computer Sciences Corporation. Foster is responsible for directing and managing the vision, technology, and operational design for CSC's global security services. Prior to joining CSC, Foster was the Director of Research and Development for Foundstone Inc (acquired by McAfee). and was responsible for all aspects of product, consulting, and corporate Rresearch and developmentD initiatives. Prior to joining Foundstone, Foster was a Senior Advisor and Research Scientist with Guardent Inc (acquired by Verisign) and an editor at Information Security Magazine(acquired by TechTarget Media), subsequent to working as an Information Security and Research Specialist for the Department of Defense. Foster's core competencies include high-tech management, international software development and expansion, web-based application security, cryptography, protocol analysis, and search algorithm technology. Foster has conducted numerous code reviews for commercial OS components, Win32 application assessments, and reviews on commercial and government cryptography implementations. Foster is a seasoned speaker and has presented throughout North America at conferences, technology forums, security summits, and research symposiums with highlights at the Microsoft Security Summit, BlackHat, MIT Wireless Research Forum, SANS, MilCon, TechGov, InfoSec World 2001, and the Thomson Security Conference. He also is commonly asked to comment on pertinent security issues and has been cited in USAToday, Information Security Magazine, Baseline, Computer World, Secure Computing, and the MIT Technologist. Foster holds degrees in Business Administration, Software Engineering, and Management of Information Systems and has attended the Yale School of Business, Harvard University, the University of Maryland, and is currently a Fellow at University of Pennsylvania's Wharton School of Business. Foster is also a well published author with multiple commercial and educational papers; and has authored, contributed, or edited for major publications to include "Snort 2.0", "Snort 2.1" 2nd Edition, "Hacking Exposed" 4th Ed and 5th Ed, "Special Ops Security", "Anti-Hacker Toolkit" 2nd Ed, "Advanced Intrusion Detection", "Hacking the Code", "Anti-Spam Toolkit", "Programmer's Ultimate Security DeskRef", "Google for Penetration Testers", "Buffer Overflow Attacks", and "Sockets, Shellcode, Porting, and Coding". Vincent Liu is an IT security specialist at a Fortune 100 company where he is responsible for assessing the security of the enterprise network infrastructure and participating as a member of the global incident response team.Before moving to his current position, Vincent worked as a consultant with the Ernst and Young Advanced Security Center and as an analyst at the National Security Agency. His specialties include penetration testing, web application assessments, incident response, binary reverse engineering, and exploit development. Vincent holds a degree in Computer Science and Engineering from the University of Pennsylvania. While at Penn, Vincent taught courses on operating system implementation and C programming, and was involved with DARPA-funded research into advanced intrusion detection techniques. He is currently a contributor to the Metasploit project, and is a contributing author for Sockets, Shellcode, Porting, and Coding. Vincent has also studied at the University of Maryland and the University of Kentucky.>
In this short show we talk about some Microsoft initiatives, shared access, deciphering information in the Windows/prefetch directory, live.com, expo.live.com. Weâve been Zinged by www.podzinger.com. We also briefly discuss a new indexing tool that works with EnCase called Mercury from www.microforensics.com â ALL CyberSpeak listeners can get $50 off by emailing the owner and saying that you heard about Mercury on CyberSpeak. We also discuss Appleâs âBoot Campâ?. Appleâs sanctioned application to dul boot and run Windows XP on your MacBook. We also have a new SOUND engineer editing our podcast.