POPULARITY
Categories
After another disappointing performance by the Kansas City Chiefs, Between the Hashes co-host and Chiefs fan Dawson Livingston wants to start the conversation on whether or not the dynasty in Kansas City is over. Hear his thoughts on the Chiefs and if Braden or Brock agree with his concerns on the future of the franchise.
Braden and Dawson react to the news of the New York Giants moving on from Head Coach Brian Daboll. They recap his time in New York and discuss what is next for the Giants, who seem to be stuck in a rebuild.
Braden and Brock recap the chaotic week leading up to the NFL Trade Deadline. From the shocking news of Sauce Gardner being sent to Indianapolis to the strategic moves of the Chargers trading for an offensive lineman to replace the injured Joe Alt, the boys break down every trade that went down. They will spotlight some of the key trades that may change the outlook of some teams heading into the last half of the season, as well as some of the notable names that didn't get traded before the deadline. Hear who the Braden and Brock have as the winners and losers of this year's trade deadline, and whether or not any of these trades have changed their thoughts on certain teams as we get closer and closer to the NFL Playoffs.
Join Braden, Brock, and Dawson in this episode as they explore the latest developments leading up to the NFL Trade Deadline. They look at some of the recent trades that have already happened in the NFL world and share their thoughts on the moves. The boys also list some impactful players who might be on the trading block, discussing the potential impact these players' getting traded could have on the outlook for the second half of the NFL season.
Joe Flacco makes his debut as a Bengal and puts on a show as the Cincinnati Bengals defeat their division rival, the Pittsburgh Steelers. The boys discuss whether Flacco and the Bengals have a chance to make the playoffs and potentially make a playoff run, depending on Burrow's injury. The boys will also react to the impressive comeback by the Denver Broncos against the New York Giants and discuss which NFL head coaches might be on the hot seat as we approach the midway point of the season.
Braden and Dawson react to the Sunday Night game between the Kansas City Chiefs and the Detroit Lions, analyzing the intense gameplay and the controversial low number of penalties called throughout the game. They'll discuss whether Baker Mayfield has positioned himself as the MVP frontrunner and take a closer look at the Indianapolis Colts, who are proving themselves as legitimate contenders in the NFL with their recent performances. Join us as we break down these thrilling topics, assess team performances, and look ahead to what these developments mean for the rest of the season!
In this week's episode, the boys take a look at the thrilling action of last week's NFL games. We break down the Arizona Cardinals and how they were unable to hold onto a significant lead against the Tennessee Titans. Brock, our Cardinals fan, will give his thoughts on the game and share what he wants the team to do after another heartbreaking close loss. We also recap the electrifying finish from Monday Night's Chiefs vs. Jaguars game. We will discuss whether it was a big win for the Jaguars or a terrible loss for the Chiefs. Tune in as we break down the plays, analyze key performances, and discuss the implications of these games for the rest of the season!
With Malik Nabers now out for the season with a torn ACL, the boys discuss whether it is time to get rid of turf fields in the NFL. Hear their opinions on the situation along with other takes as they recap and react to Week 4.
Dawson and Braden recap what was an exciting and special teams-driven Week 3 of the NFL. They will give out their Player of the Week picks and update their power rankings after teams like the Green Bay Packers and Los Angeles Rams lose their first game of the season.
Week 2 is in the books, and there is a lot to talk about. Dawson, Braden and Brock break down some of the notable injuries in the NFL and what it could mean to some Super Bowl contending teams.
Dawson, Braden and Brock recap the results from week 1. They discuss which teams impressed them and what teams they might be worried about heading into week 2.
New name, same entertaining football podcast. Dawson, Braden, and Brock preview the upcoming NFL season, discussing their predictions for the playoffs, regular season awards, and who they believe will win Super Bowl LX. Tune in for their insights!
Baby Blue Viper is an evolving platform for clarity, reflection, and poetic disruption.BBV Consultancy is its applied, bilingual arm —offering strategic support — in English and Spanish — for those navigating complexity, change, and the Bitcoin era. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.babyblueviper.com/subscribe
KeywordsBitcoin, mining, 256 Foundation, open source, technology, community, ASIC, market dynamics, predictions, educationSummaryIn this episode of Pod 256, the hosts discuss various aspects of the Bitcoin mining community, including updates on the 256 Foundation, experiences from a recent meetup in Belgrade, and innovations in mining technology. They explore the importance of open-source mining, the challenges posed by copycats, and the dynamics of the Bitcoin market. The conversation also touches on predictions for Bitcoin's future price and the psychological aspects of Bitcoin pricing, emphasizing the need for education in Bitcoin adoption.TakeawaysThe 256 Foundation is actively engaging with the Bitcoin community.Rod shares insights from a recent meetup in Belgrade, highlighting community spirit.Open-source mining technology is evolving with new innovations.The importance of user experience in mining software is emphasized.Market dynamics are leading to a race to the bottom in pricing.New ASIC designs are impacting the mining landscape.Manufacturers and sellers play a crucial role in the Bitcoin ecosystem.Navigating copycats and knockoffs is a challenge for open-source projects.The state of the Bitcoin network is constantly changing, with fluctuations in hash rate.Education is key to fostering Bitcoin adoption and understanding. Chapters00:00 Introduction and Meeting Updates04:14 Rod's European Adventures and Community Engagement08:31 Innovations in Mining Technology12:33 The Future of Mining and Open Source Solutions16:49 The Shift from Proprietary to Open Hardware19:31 The Rise of Digital Shovel and Blue Axe20:57 Pricing Trends in Bid Axes22:19 The Race to the Bottom in Mining Hardware23:41 The Future of ASIC Manufacturers25:39 Challenges of Open Source in Mining27:51 The Impact of Rapid Development on Copycats28:34 State of the Network and Market Predictions38:25 The Mysterious Disappearance of Hashing39:06 Exploring the Hashes and Their Impact40:25 Community Contributions and Support41:34 The Rise of Ocean and Its Innovations42:46 Mining Dynamics and Market Fluctuations44:09 Treasury Strategies in Bitcoin Mining45:47 Market Sentiment and Bitcoin's Future48:31 The Psychological Aspect of Bitcoin Valuation50:25 Education and Resources for New Investors51:38 Upcoming Events and Community Engagement
Video available — www.fed965.comCollaborations, Meetings, Sessions — babyblueviperbusiness@gmail.comLinkedIn — Federico Blanco Sánchez-LlanosSupport Baby Blue Viper by visiting Amazon and Shopify through our affiliate links — shop smart, fuel the fight. We've teamed up with NordVPN , the king of VPNs, to keep you locked down. And for your sats, grab one of Ledger's ultimate hardware wallets. No fluff, just tools that push harder. We've also got stickers. Grab one for free at www.fed965.com. Print it, stick it, spread the word. You can also find our BTC address there. If you can spare a few, we'd much appreciate it. We'll use it for the fight. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.fed965.com/subscribe
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
File Hashes Analysis with Power BI Guy explains in this diary how to analyze Cowrie honeypot file hashes using Microsoft's BI tool and what you may be able to discover using this tool. https://isc.sans.edu/diary/File%20Hashes%20Analysis%20with%20Power%20BI%20from%20Data%20Stored%20in%20DShield%20SIEM/31764 Apache Camel Vulnerability Apache released two patches for Camel in close succession. Initially, the vulnerability was only addressed for headers, but as Akamai discovered, it can also be exploited via query parameters. This vulnerability is trivial to exploit and leads to arbitrary code execution. https://www.akamai.com/blog/security-research/march-apache-camel-vulnerability-detections-and-mitigations Juniper Patches Junos Vulnerability Juniper patches an already exploited vulnerability in JunOS. However, to exploit the vulnerability, and attacker already needs privileged access. By exploiting the vulnerability, an attacker may completely compromised the device. https://supportportal.juniper.net/s/article/2025-03-Out-of-Cycle-Security-Bulletin-Junos-OS-A-local-attacker-with-shell-access-can-execute-arbitrary-code-CVE-2025-21590?language=en_US AMI Security Advisory AMI patched three vulnerabilities. One of the, an authentication bypass in Redfish, allows for a complete system compromise without authentication and is rated with a CVSS score of 10.0. https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Tool Update: Sigs.py Jim updates sigs.py. The tool verifies hashes for files and automatically recognizes what hash is used. https://isc.sans.edu/diary/Tool%20update%3A%20sigs.py%20-%20added%20check%20mode/31706 Google Announcing Quantum Safe Digital Signatures in Cloud KMS Google announced the option to use quantum safe digital signatures for its cloud key management system. https://cloud.google.com/blog/products/identity-security/announcing-quantum-safe-digital-signatures-in-cloud-kms Windows 11 Patch issues The February Patch Tuesday appears to have caused issues with a number of Windows 11 systems. In particular the usability of the file manager appears to be affected. https://www.windowslatest.com/2025/02/16/windows-11-kb5051987-breaks-file-explorer-install-fails-on-windows-11-24h2/ LTE/5G Vulnerabilities Researchers at the university of Florida have identified a large number of vulnerabilities in 5G and LTE networks. https://nathanielbennett.com/publications/ransacked.pdf
Zu den letzten Episoden gab es viel inhaltliches Feedback, auf das Christopher und Sylvester in Folge 19 gerne eingehen. Außerdem reden die beiden noch einmal über das Tor-Projekt, denn eine aktuelle und interessante Angriffswelle auf das System hat es gerade so nicht in die vergangene Folge geschafft. Anschließend schauen sich die Hosts einige in letzter Zeit bekannt gewordene Security-Fails an. Die sind teilweise wirklich erschreckend und fanden sich ausgerechnet in Produkten von IT-Sicherheitsfirmen. So mancher Hersteller muss sich offenbar nochmal die Basics hinter die Ohren schreiben. Um Zertifikate geht es natürlich auch wieder, denn was wäre das Internet, ohne Geknarze in seiner Public-Key-Infrastruktur? - [Frontal-Bericht](https://www.youtube.com/watch?v=7anmIIwg0gI) - [BCP-38](http://www.bcp38.info/index.php/Main_Page) - [Passwort-Hashing-Funktionen](https://www.heise.de/hintergrund/IT-Security-Wie-Schluesselableitungsfunktionen-funktionieren-und-was-sie-leisten-9241241.html) - [Géant vs. Sectigo](https://doku.tid.dfn.de/de:dfnpki:tcsfaq:aktuellesituation) Mitglieder unserer Security Community auf heise security PRO hören alle Folgen bereits zwei Tage früher. Mehr Infos: https://pro.heise.de/passwort
Brendan Schaub reveals talking it out with SteveWillDoIt after Steve made some negative Twitter/X posts about him, Bryan discusses why he's really starting to like MMA reporter Luke Thomas, and the guys talk current events around the world including Reggie Bush getting back his Hesiman Trophy, Kanye's new venture and much more! True Classic - Upgrade your wardrobe and get up to 25% OFF @trueclassic at https://trueclassic.com/FIGHTER ! #trueclassicpod #sponsored JOYMODE - https://usejoymode.com/fighter or enter code: Fighter at checkout for 20% off your first order Sportsmans's Cove Lodge - http://alaskasbestlodge.com/ Use code “TFATK” at checkout for 10% off your first trip! Fieldcraft Survival - https://fieldcraftsurvival.com/fighter Use code: Fighter20 for 20% OFF Training and Product Happy Hippo - https://happyhippo.com/pages/brendan-schaub Promo Code: Thiccc24 for 20% OFF for LIFE!
What do you know about cryptography? Have you ever wanted to get a better understanding of some of the maths behind encryption? This week we speak to Ed, a Senior Technologist at PI, about some of the history and basics of encryption. Find out more about encryption: - Computerphile on youtube (https://www.youtube.com/@Computerphile) is a computer science professor with a range of useful and accessible videos on encryption - Cloudflare have a helpful learning centre including this article on how encryption works and why cloudflare use Lava lamps to generate keys: https://www.cloudflare.com/en-gb/learning/ssl/lava-lamp-encryption/ - This is a helpful article on Diffie-Hellman including a diagram of the colours demonstration, which Ed discusses during the podcast: https://www.comparitech.com/blog/information-security/diffie-hellman-key-exchange/ - This article is great for learning more about hashing: https://auth0.com/blog/hashing-in-action-understanding-bcrypt/ - And if you're interested here is the wikipedia page on the Skytale sticks Ed talks about (https://en.wikipedia.org/wiki/Scytale) Learn more about PI's work on encryption: - PI's main encryption learn page: https://privacyinternational.org/learn/encryption - A PI report on the importance of End to End Encryption (E2EE): https://privacyinternational.org/report/4949/securing-privacy-end-end-encryption
1986, Mexico City, Nairobi, Phnom Penh, Frankfurt, DC area Hashes, --- Send in a voice message: https://podcasters.spotify.com/pod/show/ononh3/message Support this podcast: https://podcasters.spotify.com/pod/show/ononh3/support
This Week: The Chiefs! Drastic temperatures and snow in the South East. Strep throat. Dust mites. Shoe spikes. Justin takes up tap dancing. Hash is fucking dog food. Farmer's Dog. Why is rent so much? Why are mortgages so much? T. Swift is not “unlucky”. Tearful fans. Digging Up the Past in Paris. The black-eyed pea capital of the world. That piece of magic bread under hot chicken. "If it's dirty, it's good". Done with pancakes. Recorded January 21st, 2024 We would be honored by your support and, sweet Jesus, it would help Justin sleep at night: https://anchor.fm/sushi-jackknife/support Nathan and Justin's Music: https://judystruckstop.bandcamp.com/ As Always: Twitter: @SushiJackknife @badlandsbadley @Bob_ThangPod Email: sushijackknife@gmail.com instagram: justindrakecroft, siddandthefinches --- Support this podcast: https://podcasters.spotify.com/pod/show/sushi-jackknife/support
Robert De Niro and his ex-assistant Graham Robinson have “fully and finally resolved” their nasty court battle — and the legendary actor will NOT appeal the recent court decision entered against him.Advertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
Last week's news about evidence of LastPass vault decryption targeting cryptocurrency keys, and the UK's backing down on its encryption monitoring legislation. How hardware security modules (HSMs) allow cryptographic operations like code signing without exposing private keys. Browser identity segregation using multiple profiles rather than separate browsers. Requirements and best practices for securely wiping data from modern solid state drives. A countdown clock for the 32-bit UNIX time rollover in the year 2038. Steve's plan to move off Twitter and onto email lists for Security Now communication. A deep dive into cryptographic hash collisions, using fewer hash bits, and balancing anonymity with statistical meaning. Show Notes - https://www.grc.com/sn/SN-940-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Last week's news about evidence of LastPass vault decryption targeting cryptocurrency keys, and the UK's backing down on its encryption monitoring legislation. How hardware security modules (HSMs) allow cryptographic operations like code signing without exposing private keys. Browser identity segregation using multiple profiles rather than separate browsers. Requirements and best practices for securely wiping data from modern solid state drives. A countdown clock for the 32-bit UNIX time rollover in the year 2038. Steve's plan to move off Twitter and onto email lists for Security Now communication. A deep dive into cryptographic hash collisions, using fewer hash bits, and balancing anonymity with statistical meaning. Show Notes - https://www.grc.com/sn/SN-940-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Last week's news about evidence of LastPass vault decryption targeting cryptocurrency keys, and the UK's backing down on its encryption monitoring legislation. How hardware security modules (HSMs) allow cryptographic operations like code signing without exposing private keys. Browser identity segregation using multiple profiles rather than separate browsers. Requirements and best practices for securely wiping data from modern solid state drives. A countdown clock for the 32-bit UNIX time rollover in the year 2038. Steve's plan to move off Twitter and onto email lists for Security Now communication. A deep dive into cryptographic hash collisions, using fewer hash bits, and balancing anonymity with statistical meaning. Show Notes - https://www.grc.com/sn/SN-940-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Last week's news about evidence of LastPass vault decryption targeting cryptocurrency keys, and the UK's backing down on its encryption monitoring legislation. How hardware security modules (HSMs) allow cryptographic operations like code signing without exposing private keys. Browser identity segregation using multiple profiles rather than separate browsers. Requirements and best practices for securely wiping data from modern solid state drives. A countdown clock for the 32-bit UNIX time rollover in the year 2038. Steve's plan to move off Twitter and onto email lists for Security Now communication. A deep dive into cryptographic hash collisions, using fewer hash bits, and balancing anonymity with statistical meaning. Show Notes - https://www.grc.com/sn/SN-940-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Last week's news about evidence of LastPass vault decryption targeting cryptocurrency keys, and the UK's backing down on its encryption monitoring legislation. How hardware security modules (HSMs) allow cryptographic operations like code signing without exposing private keys. Browser identity segregation using multiple profiles rather than separate browsers. Requirements and best practices for securely wiping data from modern solid state drives. A countdown clock for the 32-bit UNIX time rollover in the year 2038. Steve's plan to move off Twitter and onto email lists for Security Now communication. A deep dive into cryptographic hash collisions, using fewer hash bits, and balancing anonymity with statistical meaning. Show Notes - https://www.grc.com/sn/SN-940-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT drata.com/twit
Last week's news about evidence of LastPass vault decryption targeting cryptocurrency keys, and the UK's backing down on its encryption monitoring legislation. How hardware security modules (HSMs) allow cryptographic operations like code signing without exposing private keys. Browser identity segregation using multiple profiles rather than separate browsers. Requirements and best practices for securely wiping data from modern solid state drives. A countdown clock for the 32-bit UNIX time rollover in the year 2038. Steve's plan to move off Twitter and onto email lists for Security Now communication. A deep dive into cryptographic hash collisions, using fewer hash bits, and balancing anonymity with statistical meaning. Show Notes - https://www.grc.com/sn/SN-940-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Last week's news about evidence of LastPass vault decryption targeting cryptocurrency keys, and the UK's backing down on its encryption monitoring legislation. How hardware security modules (HSMs) allow cryptographic operations like code signing without exposing private keys. Browser identity segregation using multiple profiles rather than separate browsers. Requirements and best practices for securely wiping data from modern solid state drives. A countdown clock for the 32-bit UNIX time rollover in the year 2038. Steve's plan to move off Twitter and onto email lists for Security Now communication. A deep dive into cryptographic hash collisions, using fewer hash bits, and balancing anonymity with statistical meaning. Show Notes - https://www.grc.com/sn/SN-940-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Ricky Martin and his ex-husband Jwan Yosef have reached a settlement in their divorce in record time, RadarOnline.com has learned.Advertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
In order to truly understand why Bitcoin works, we must understand a fundamental tool that operates at basically every level of the system. The hash function. And using the hash function, we can build one of the most important elements of the game theory that keeps the system honest, Proof of work. This is the second episode of the Bitcoin Basics series: Hashes & Proofs of Work To play around yourself with the hashing tools discussed you can: - open a Terminal window on your Mac or Linux computer and type... shasum -a 256 [insert file] Replacing [insert file] with the file path of whatever you wish to hash (you can usually drag and drop) - On Windows open the "command prompt" and type... Get-FileHash -Path [insert file] To verify my Proof of Work done in the episode: echo -n "H18" | shasum -a 256 (this works on Mac & Linux, but unfortunately the process on Windows was too complicated to go through the trouble of confirming it) Don't forget to check out our amazing sponsors: • Dive into the Bitcoin only wallet, the cypherpunk calculator, and a company that has built secure Bitcoin products for nearly a decade. Code BITCOINAUDIBLE gets 9% off everything in your cart! (https://guyswann.com/coldcard) • Gets sats back every time you dump fiat at a store, to pay your bills, everything in your fiat life pays you sats with the Fold Debit Card and FoldApp. 20,000 FREE SATS! at (https://guyswann.com/fold) • The best place to onboard a true Bitcoiner - Stack sats automatically, withdraw automatically, and learn or get help from the best team of Bitcoiners out there with Swan Bitcoin. (https://swanbitcoin.com/guy) -------------------------------------- "You never change things by fighting the existing reality. To change something, build a new model, that makes teh existing model obsolete." – R. Buckminster Fuller Learn more about your ad choices. Visit megaphone.fm/adchoices
In order to truly understand why Bitcoin works, we must understand a fundamental tool that operates at basically every level of the system. The hash function. And using the hash function, we can build one of the most important elements of the game theory that keeps the system honest, Proof of work. This is the second episode of the Bitcoin Basics series: Hashes & Proofs of Work To play around yourself with the hashing tools discussed you can: - open a Terminal window on your Mac or Linux computer and type... shasum -a 256 [insert file] Replacing [insert file] with the file path of whatever you wish to hash (you can usually drag and drop) - On Windows open the "command prompt" and type... Get-FileHash -Path [insert file] To verify my Proof of Work done in the episode: echo -n "H18" | shasum -a 256 (this works on Mac & Linux, but unfortunately the process on Windows was too complicated to go through the trouble of confirming it) Don't forget to check out our amazing sponsors: • Dive into the Bitcoin only wallet, the cypherpunk calculator, and a company that has built secure Bitcoin products for nearly a decade. Code BITCOINAUDIBLE gets 9% off everything in your cart! (https://guyswann.com/coldcard) • Gets sats back every time you dump fiat at a store, to pay your bills, everything in your fiat life pays you sats with the Fold Debit Card and FoldApp. 20,000 FREE SATS! at (https://guyswann.com/fold) • The best place to onboard a true Bitcoiner - Stack sats automatically, withdraw automatically, and learn or get help from the best team of Bitcoiners out there with Swan Bitcoin. (https://swanbitcoin.com/guy) -------------------------------------- "You never change things by fighting the existing reality. To change something, build a new model, that makes teh existing model obsolete." – R. Buckminster Fuller Learn more about your ad choices. Visit megaphone.fm/adchoices --- Send in a voice message: https://podcasters.spotify.com/pod/show/bitcoinaudible/message
In Hour 4, Tobin lashes out on Lebron for 10 straight minutes while Leroy attempts to box in this Semantic Samurai. We close the show out with a interview of the former Boxing Promoter of the year, newly inducted Florida Boxing Hall of Famer and friend of the show Peter Khan joins us with Hialeah Gardens' very own Alien King Aaron Aponte.
Software Engineering Radio - The Podcast for Professional Software Developers
Roberto Di Cosmo, Computer Science professor at University Paris Diderot and founder of the Software Heritage initiative, discusses how to protect against sudden loss from the collapse of a "free" source code repository provider, how to protect...
Gisele Bündchen appears to have broken her silence on her marriage troubles with Tom Brady by leaving a cryptic comment on a post. Listen here and learn more at RadarOnline.comAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
Nextauth.js account takeover due to parsing flaw, URL parsing flaw in Go's net/url, another path traversal, Slack exposes password hashes (whaaat!?), Twitter exposes 5.4 million accounts, ransomware and research against PyPI and GitHub, videos from fwd:cloudsec 2022. Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw207
Nextauth.js account takeover due to parsing flaw, URL parsing flaw in Go's net/url, another path traversal, Slack exposes password hashes (whaaat!?), Twitter exposes 5.4 million accounts, ransomware and research against PyPI and GitHub, videos from fwd:cloudsec 2022. Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw207
Philippe Humeau joins us this hour to talk about CrowdSec - an IDS/IPS that uses crowd sourced information to evaluate threats on your network! -- During The Show -- 01:00 New Red Hat CEO Matt Hicks New Red Hat CEO (https://www.redhat.com/en/about/press-releases/red-hat-names-matt-hicks-president-and-chief-executive-officer) 03:44 Remove all traces of a user on logout? - Wayne TailsOS (https://tails.boum.org/) Noah's hackish solution TempFS? RamDisk? SquashFS? 'Delete' isn't a thing (Inodes) PhotoRec (https://www.cgsecurity.org/wiki/PhotoRec) 09:30 Recommendations for hosting provider - Gary Gary's Site (https://www.shawanga.com/) Host Gator Self Host with Hugo Tied to Hosting provider 14:00 Listener responds about CAD on Linux - Heath FreeCAD (https://www.freecad.org/) LibreCAD (https://librecad.org/) TinkerCAD (https://www.tinkercad.com/) Run under Wine 15:30 More Info about Steve's Solar? - Ian Steve likes his EnPhase Solar (https://enphase.com/) setup Hacks Home Assistant Integration (https://github.com/briancmpbll/home_assistant_custom_envoy) 18:30 News Wire Linux Better on i9 Systems Ghacks (https://www.ghacks.net/2022/07/09/linux-is-performing-better-than-windows-11-according-to-this-benchmark-test/) UltimateXR XR Today (https://www.xrtoday.com/virtual-reality/ultimatexr-launches-free-open-source-unity-tool/) EMQX 5.0 EIN News (https://www.einnews.com/pr_news/580326713/emqx-5-0-released-the-ultra-scalable-open-source-mqtt-broker) Calibre 6.0 9 to 5 Linux (https://9to5linux.com/calibre-6-0-released-with-full-text-search-arm64-support-on-linux-qt-6-port) Budgie Desktop 10.6.2 Buddies of Budgie (https://blog.buddiesofbudgie.org/budgie-10-6-2-released/) Linux Mint 21 Beta 9 to 5 Linux (https://9to5linux.com/linux-mint-21-beta-is-now-available-for-download-heres-a-first-look) Debian GNU/Linux 11.4 9 to 5 Linux (https://9to5linux.com/debian-gnu-linux-11-4-bullseye-released-with-79-security-updates-and-81-bug-fixes) Kali Linux on Linode Help Net Security (https://www.helpnetsecurity.com/2022/07/11/linode-kali-linux/) Paladin Cloud Security-as-Code Virtualization Review (https://virtualizationreview.com/articles/2022/07/11/paladin-cloud.aspx) Android Zero Day XDA Developers (https://www.xda-developers.com/pixel-6-galaxy-s22-linux-kernel-vulnerability-root-android/) OrBit Malware Cyper Security News (https://cybersecuritynews.com/orbit-undetected-linux-malware/) CrowdSec Interview Philippe Ew-Mow from CrowdSec (https://www.crowdsec.net/) What is CrowdSec How CrowdSec works Domains and Hashes vs IP Address and Behavior How IPs are cleaned Reporting based on "identity" not IP Address IDS and IPS CrowdSec Agent and CrowdSec Console Open Source Cyber Threat Intelligence (CTI) CrowdSec API How does CrowdSec resolve IDS and IPS problems? Blocking Unique Attacks The 3 Tiers of Crowdsec CrowdSec and GDPR Using Crowdsec Bouncers (IPS) CrowdSec Best Practices Replay Mode Integration into Firewalls CrowdSec on OPNSense (https://www.crowdsec.net/blog/crowdsec-arrives-on-opnsense) Best place to get started/learn CrowdSec Docs (doc.crowdsec.net) 49:00 Thoughts on CrowdSec Noah has been playing with CrowdSec Can also identify and block malicious out going traffic 51:00 Interview with Matt Hicks Interview with Matt Hicks (YouTube) (https://www.youtube.com/watch?v=qWg5cRH9YQg) -- The Extra Credit Section -- For links to the articles and material referenced in this week's episode check out this week's page from our podcast dashboard! This Episode's Podcast Dashboard (http://podcast.asknoahshow.com/294) Phone Systems for Ask Noah provided by Voxtelesys (http://www.voxtelesys.com/asknoah) Join us in our dedicated chatroom #GeekLab:linuxdelta.com on Matrix (https://element.linuxdelta.com/#/room/#geeklab:linuxdelta.com) -- Stay In Touch -- Find all the resources for this show on the Ask Noah Dashboard Ask Noah Dashboard (http://www.asknoahshow.com) Need more help than a radio show can offer? Altispeed provides commercial IT services and they're excited to offer you a great deal for listening to the Ask Noah Show. Call today and ask about the discount for listeners of the Ask Noah Show! Altispeed Technologies (http://www.altispeed.com/) Contact Noah live [at] asknoahshow.com -- Twitter -- Noah - Kernellinux (https://twitter.com/kernellinux) Ask Noah Show (https://twitter.com/asknoahshow) Altispeed Technologies (https://twitter.com/altispeed) Special Guest: Steve Ovens.
The Wonderswan Episode: A Little Extra Free Time, 35 Minutes, The Wonderswan's Story, Boring Emulation, Vertical/Horizontal, The Extra Work, Joy From Obscurity, The Perfect Grey Market, Hashes and Dumps, The Joy to Play. Announcing the Wonderswan collection at https://archive.org/details/wonderswan-library which has settled down to about 260 games, all playable and all rather interesting, especially if the Swan was never a part of your life, like me.
Immer mehr Darstellungen von sexuell missbrauchten Kindern fluten Teile des Internets. Die EU reagiert mit einem Gesetz. Doch schießt Brüssel über das Ziel hinaus? Weltweit werden laut EU-Kommission 85 Millionen Bilder und Videos mit Missbrauch-Darstellungen gemeldet, plus Dunkelziffer. Gigantischen Mengen von Darstellungen missbrauchter Kinder fluten also Teile des Netzes. Am Mittwoch hat die EU-Kommission deshalb einen Maßnahmenkatalog dagegen vorgelegt. EU-Innenkommissarin Ylva Johansson spricht von einer bahnbrechenden Gesetzgebung und sagt: "And to the perpetrators. We are coming for you.” Doch an dem Gesetzentwurf hagelt es Kritik. Denn die EU-Kommission will dazu Chat-Apps wie WhatsApp oder Facebook Messenger einspannen und die privaten Nachrichten ihrer Nutzer durchleuchten", sagt Jannis Brühl, Leiter des SZ-Digitalteams. Google, Facebook und Co sollen künftig jede Nachricht in jedem privaten Chat mit "Hashes", also digitalen Fingerabdrücken, scannen. Dabei seien diese Kriminellen vor allem im Darknet oder auf bestimmte Plattformen im Netz aktiv. Beim Kampf gegen die Darstellung von Kindesmissbrauch und deren Verbreitung dürfe "nicht die demokratische Kontrolle ausgeschaltet werden", meint Brühl. Im Grund drohe da "Big Brother", die Dystopie von George Orwell. Weitere Nachrichten: Ukraine stoppt Gas-Transit, Maskenpflicht fällt bei Flügen weg, Musk will Trump zurück bei Twitter. Moderation, Redaktion: Lars Langenau Redaktion: Vinzent-.Vitus Leitgeb Produktion: Immanuel Pedersen _Zusätzliches Audiomaterial über EU-Kommission _
¿Cuáles son las novedades de Bitcoin y su ecosistema más relevantes para un inversor que han ocurrido en el último año? En esta charla con Ricardo Pérez-Marco, doctor en Matemáticas especializado en estudios sobre sistemas dinámicos, Bitcoin, Blockchain y plataformas descentralizadas y trader, repasamos los acontecimientos más relevantes ocurridos desde que grabamos el episodio 44 de este podcast. Si te interesa Bitcoin puedes también escuchar el debate que tuvimos con Enrique Gallego en los episodios 41 y 42, así como el primer podcast que grabé con Ricardo en los episodios 32 y 33.Temas comentados: Evolución del precio, capitalización de mercado y volatilidad de Bitcoin en el último año. Adopción de Bitcoin como moneda de curso legal por El Salvador y la República Centroafricana. Análisis de los Bitcoin no movidos, los que probablemente estén perdidos y los que tienen los Exchanges. Composición de los integrantes del mercado: Hodlers, compradores institucionales y especuladores. Premio Ricardo Pérez-Marco de Olimpiadas Matemáticas. Tasa de Hashes de bitcoin como indicador de salud de la red. Introducción de Taproot para mejorar la privacidad y la capacidad de Bitcoin para crear smart contracts. Lightning Network para poder hacer micropagos con satoshis de forma casi instantánea. Recomendaciones para comprar y custodiar satoshis. Evolución de las principales criptomonedas por capitalización de mercado en el último año. Sesgo de supervivencia en las inversiones. Más info con enlaces a los contenidos comentados en el Blog de Juan Such en Rankia:https://www.rankia.com/blog/such/5385832-56-invertir-bitcoin-novedades-ultimo-ano-ricardo-perez-marco
Good ole Jerry hash stops by to sit with us and hash out life it with us!! --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app
Cam Mellor and Ian Cummings talk NFL Draft news with Tony Pauline about several CFB prospects who may stay at school another season or declare for the NFL Draft. Cam and Ian then discuss some of the better coaching hires by various programs, preview the College Football Playoff, and discuss several NFL Draft prospects on Between the Hashes. Learn more about your ad choices. Visit megaphone.fm/adchoices
Oli and Ian are here for you weekly episode of Between the Hashes. They discuss Garrett Wilson and if he's going to be the WR1 for this draft class. With tons of receivers entering the draft, Oli and Ian break down their top five and who their sleepers are. With players returning to school to play another year at the college level, we discuss who you should be looking out for in the 2023 NFL Draft class. Learn more about your ad choices. Visit megaphone.fm/adchoices
The Between the Hashes crew is back and here for your latest updates on everything draft news. Tony gives you what he's hearing in regards to big names like Kaleb Eleby and Desmond Ridder. The crew breaks down the Senior Bowl quarterbacks and who they think can shine. Learn more about your ad choices. Visit megaphone.fm/adchoices
In Episode 7, we chat with Nadav Kohen of Suredbits and discuss payment points as an alternative to HTLCs on the Lightning Network. In this conversation we cover: Payment points (1:55) - Blog post part 1 - HTLCs (2:00) Timelocks (4:16) HTLC drawbacks (5:38) - Payment decorrelation - Wormhole attack presented in Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability (6:35) Point time lock contracts (PTLCs) (9:50) - Adaptor signatures on Schnorr Proof of payment (13:25) Invoiceless transactions (15:05) Hashes, pre-images, and HTLC mechanics (16:35) Onion analogy (18:55) PTLC mechanics (19:30) Why don't we use PTLCs today? (22:15) Lightning in Scriptless Scripts posting by Andrew Poelstra March 2017 Improving proof of payment (26:10) Stuckless payments (30:46) Spam on Lightning (35:46) Selling Signatures and Schnorr signatures off the main chain (36:55) Contingent payments (39:20) Escrow contracts (41:28) Atomic multiparty setup and payment renegotiation (46:02) ETA of payment points (48:02) Thanks as always to Matthew Zipkin for the sound engineering.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Whats App Phishing https://www.heise.de/newsticker/meldung/Phishing-Mails-gaukeln-Ende-von-WhatsApp-Abonnement-vor-4447165.html Encrypted EMail Phishing https://www.bleepingcomputer.com/news/security/phishing-scam-asks-you-to-login-to-read-encrypted-message/ Android Apps Link to Fake Sites https://news.drweb.com/show/?i=13313&lng=en&c=5 Precomputed Hash Tables https://a.ndronic.us/pre-computed-hash-table-v-1-0/