Numerical label used to identify a network interface in an IP network
POPULARITY
Ridding my home network of IP addresses, Tools for Identifying and Resolving Storage Bottlenecks, OpenBGPD 8.7 released, Let's port the GNAT Ada compiler to macOS/aarch64, Modify an OmniOS service parameters, The history and use of /etc/glob in early Unixes, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines Ridding my home network of IP addresses (https://gist.github.com/jmason/aabd9d3acc86d9098654e8559e93b707) Tools for Identifying and Resolving Storage Bottlenecks (https://klarasystems.com/articles/managing-tracking-storage-performance-openzfs-bottlenecks/) News Roundup OpenBGPD 8.7 released (https://www.undeadly.org/cgi?action=article;sid=20241218195732) Let's port the GNAT Ada compiler to macOS/aarch64 (https://briancallahan.net/blog/20250112.html) Modify an OmniOS service parameters (https://www.tumfatig.net/2025/modify-an-omnios-service-parameters/) The history and use of /etc/glob in early Unixes (https://utcc.utoronto.ca/~cks/space/blog/unix/EtcGlobHistory) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Nelson - TUHS (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/596/feedback/nelson-tuhs.md) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
00:00 - PreShow Banter™ — The Old and The New02:27 - BHIS - Talkin' Bout [infosec] News 2024-11-1103:44 - Story # 1: Mattel pulls thousands of ‘Wicked' dolls off shelves after printing adult website on packaging08:03 - Story # 2: Office apps crash on Windows 11 24H2 PCs with CrowdStrike antivirus11:41 - Story # 3: Mislabeled patch sends Windows Server 2022 admins on unwanted upgrade to 202516:49 - Story # 4: Suspected Snowflake Hacker Arrested in Canada18:26 - Story # 5: Interpol Cybercrime Sweep Takes Down 22,000 IP Addresses, Arrests 4129:47 - Story # 6: Google Cloud to mandate MFA for all users in 202541:30 - Story # 7: Cisco scores a perfect CVSS 10 with critical flaw in its wireless system49:26 - Story # 8: H.I.G. Capital and Thoma Bravo to Acquire CompTIA Brand and Products59:05 - SANS Holiday Hack Challenge™ 2024
In part two of our white collar criminal law episode with Chilwin Cheng, we'll speak about a new Charter decision regarding whether police need warrants to access IP addresses ✨ Read the full episode transcript HERE ✨ Learn more about the topics/cases on the Lawyered website✨ Help to declutter the law on the Lawyered crowdfunding page
- Ross Stevens: Bitcoin is Protected Speech https://nydig.com/research/bitcoins-protection-under-the-first-amendment - Tornado Cash Developer Roman Storm to Face Criminal Trial, Judge Rules https://www.nobsbitcoin.com/tornado-cash-developer-roman-storm-to-face-criminal-trial-judge-rules/ - Hut8 & Bitmain to Launch of Next-Gen ASIC Miner U3S21EXPH https://www.nobsbitcoin.com/hut8-bitmain-to-launch-of-next-gen-asic-miner-u3s21exph/ - Bitfarms and Riot Platforms Reach Settlement in Hostile Takeover Saga https://www.nobsbitcoin.com/bitfarms-and-riot-platforms-reach-settlement-in-hostile-takeover-saga/ - Swan sues former leadership https://cdn.satellite.earth/4f664f69c76d7be841ca750cd0ebd9953a59e293db46525d73981d66b699ae3d.pdf - BTCPay Server team releases Riga case study https://blog.btcpayserver.org/case-study-bhb24-nostriga/ - PayPal Enables Business Accounts to Buy, Hold and Sell Cryptocurrency https://www.prnewswire.com/news-releases/paypal-enables-business-accounts-to-buy-hold-and-sell-cryptocurrency-302259069.html - Telegram Changes Policy to Share Phone Numbers & IP Addresses in 'Valid Requests' https://www.nobsbitcoin.com/telegram-changes-policy-to-share-phone-numbers-ip-addresses-in-valid-requests/ - OpenSats Distributes Seventh Wave of Bitcoin Grants https://opensats.org/blog/bitcoin-grants-september-2024-7th-wave - OpenSats announces long term support for Jon Atack https://opensats.org/blog/jon-atack-receives-lts-grant - Arthur Hayes family office, Maelstrom, announces support for Jon as well https://bitcoinmagazine.com/business/arthur-hayess-family-office-funds-another-bitcoin-core-developer - OpenSats Announces Seventh Wave of Nostr Grants https://www.nobsbitcoin.com/opensats-announces-seventh-wave-of-nostr-grants/ - Human Rights Foundation Story of the Week - Wasabi Wallet v2.2.0: Taproot Receive Addresses, Free Coordinators & More https://www.nobsbitcoin.com/wasabi-wallet-v2-2-0/ - Ashigaru v1.0.0: Privacy-first Mobile Bitcoin Wallet https://www.nobsbitcoin.com/ashigaru-v1-0-0/ - kibo.money: Satonomics v0.4.0 https://www.nobsbitcoin.com/kibo-money-satonomics-v0-4-0-rebranded-2/ - Core Lightning v24.08.1: Crash and Bug Fixes https://www.nobsbitcoin.com/cln-v24-08-1/ - Krux v24.09.0 https://github.com/selfcustody/krux/releases/tag/v24.09.0 - Haven relay v0.2.2 https://github.com/bitvora/haven/releases/tag/v0.2.2 - Damus v1.10.1 https://primal.net/e/nevent1qqsqa56flt4nxmzavwv5r7klrzd0hjxxek99fesh2g42rrp3lm839qspz9mhxue69uhkummnw3eryvfwvdhk6qg5waehxw309aex2mrp0yhxgctdw4eju6t0qyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqpzemhxue69uhhyetvv9ujuurjd9kkzmpwdejhgq3qxtscya34g58tk0z605fvr788k263gsu6cy9x0mhnm87echrgufzsky2cnp - Strike adds privacy shake feature https://x.com/Strike/status/1837222021903573227 0:00 - Crossfit and chill 13:53 - Dashboard 17:14 - Ross Stevens paper 21:43 - Tornado Cash dev criminal trial 28:02 - Choke Point 2.0 36:49 - Hut 8 Bitmain miner 42:32 - Riot hostile takeover settlement 47:22 - Swan lawsuit 51:49 - BTCPay Server Riga case study 58:57 - PayPal business crypto 1:01:57 - Telegram doxxing policy 1:04:51 - Grants section 1:13:34 - HRF Story of the Week 1:17:31 - Boosts & Facebook glasses 1:28:38 - Software updates 1:43:15 - Macro 1:47:56 - Matt's politics questions Shoutout to our sponsors: Unchained Capital https://unchained.com/concierge/ Coinkite https://coinkite.com/ Stakwork https://stakwork.ai/ TFTC Merch is Available: Shop Now https://merch.tftc.io/ Join the TFTC Movement: Main YT Channel https://www.youtube.com/c/TFTC21/videos Clips YT Channel https://www.youtube.com/channel/UCUQcW3jxfQfEUS8kqR5pJtQ Website https://tftc.io/ Twitter https://twitter.com/tftc21 Instagram https://www.instagram.com/tftc.io/ Follow Marty Bent: Twitter https://twitter.com/martybent Newsletter https://tftc.io/martys-bent/ Podcast https://tftc.io/podcasts/ Follow Odell: Nostr https://primal.net/odell Newsletter https://discreetlog.com/ Podcast https://citadeldispatch.com/
Check out this episode from the SWN Vault, hand picked by main host Doug White! This SDL episode was initially published on August 9, 2017. Doug explains the basics of how IP Addresses work, with help from Doug in an alternate dimension. Beware of the terminator! Show Notes: https://securityweekly.com/vault-swn-20
Check out this episode from the SWN Vault, hand picked by main host Doug White! This SDL episode was initially published on August 9, 2017. Doug explains the basics of how IP Addresses work, with help from Doug in an alternate dimension. Beware of the terminator! Show Notes: https://securityweekly.com/vault-swn-20
Check out this episode from the SWN Vault, hand picked by main host Doug White! This SDL episode was initially published on August 9, 2017. Doug explains the basics of how IP Addresses work, with help from Doug in an alternate dimension. Beware of the terminator! Show Notes: https://securityweekly.com/vault-swn-20
Check out this episode from the SWN Vault, hand picked by main host Doug White! This SDL episode was initially published on August 9, 2017. Doug explains the basics of how IP Addresses work, with help from Doug in an alternate dimension. Beware of the terminator! Show Notes: https://securityweekly.com/vault-swn-20
And Another Thing With Dave, by Dave Smith #AATWD In this episode, part 5 of 6 in a 3 hour conversation with one of the founders of Anonymous. We cover a lot of ground. --------- EPISODE CHAPTERS WITH SHORT KEY POINTS --------- (0:00:02) - Internet Scams and Identity Theft I was scammed online, lost $3,000, received a pallet of hand sanitizer, and found out the person was wanted for drug and human trafficking. (0:09:18) - Exploring Online Chat, Hacking, and Exploitation NSA personnel, elite hackers, Ashley Madison hack, 2FA, sending dick pics, and online safety skills discussed. (0:23:09) - Identify and Protect Against Fake People Online dating protocols, IP addresses, hacker hierarchy, and the Ashley Madison hack are discussed to explore potential dangers. On this engaging episode, we take you through the murky and dangerous waters of internet scams and identity theft. Our guest shares a chilling tale of online deception where he was almost left three thousand dollars in the hole after falling prey to a cunning online scam. Listen as we uncover the startling reality of the dark underbelly of the internet, from cases of stolen identities to associations with drug and human trafficking rings. This episode is a stark reminder of the potential perils of the digital world and the importance of online safety. We also journey into the realms of online chat, hacking, and exploitation. From discussing the hierarchy of hackers, to the impact of the Ashley Madison hack on the advent of two-factor authentication, we leave no stone unturned. The exploration continues with a deep look at the potential dangers of online dating and the precautions one can take to ensure safety. This is an episode filled with intriguing discussions and insights into the world of internet security. Tune in for an eye-opening discourse on the risks lurking behind your screens and learn how to protect yourself against them. If you are digging what I am doing, and picking up what I'm putting down, please share the podcast on social media and with friends. Reviews are greatly appreciated. You can leave a review on Apple Podcasts, or Spotify. Thanks again!!! Follow me and find More of My Content with link below https://linktr.ee/andanotherthingwithdave Thank you to my listeners throughout the world. Now heard in 65 countries. According to Spotify my podcast is in the top 20% of podcasts shared internationally. Listener locations: 69% USA 11% Canada 6% United Kingdom 5% India 2% Germany 2% Romania 1% Russia less than 1% in 50 plus countries THANK YOU all !!! #aatwd #andanotherthing #davesmith #podcast #conspiracies #truther #rich #1% #99% #99percent #anonymous #epstein #silkroad Internet Scams, Identity Theft, Online Chat, Hacking, Exploitation, Fake People, Ashley Madison Hack, Two-Factor Authentication, Dick Pics, Online Dating, Safety Protocols, Fake URL, IP Addresses, NSA Personnel, Elite Hackers, Architects, Suicides --- Send in a voice message: https://podcasters.spotify.com/pod/show/andanotherthingwithdave/message
Gain insights into real estate trends, leveraging income property for impressive returns, and stay informed on the dynamic landscape of mortgage applications. Then Jason and Rob Braxman discuss internet privacy issues and how they affect civil liberties in a dystopian tech world. Rob explains that Facebook uses IP addresses to detect proximity checks using "Mac addresses," which are unique network identifiers that are unique to each device. IP addresses are a protocol used for transferring data over the Internet, while Mac addresses are for announcing traffic inside one's own network. The limitation of Mac addresses is that they can only exist inside a local area network and do not transmit to the Internet. Rob suggests using a VPN virtual private network (VPN) to protect IP addresses, and locations. Listen in as Rob shares how you can defend your privacy in this relentless tech world bent on attacking your privacy. Key Takeaways: Jason's editorial 3:13 The Magic Number 4:19 California numbers YOY 5:19 A surge of new home mortgage applications on October 6:29 Empowered Investor Pro's new insurance product Rob Braxman interview 8:04 This dystopian tech world 10:40 The Idaho Killer and the Google sensor vault 13:26 Why privacy is important 14:52 FB, Reading Minds with Functional MRi and Hot Mics on phones 18:30 Mac and IP Addresses and why it matters 25:31 Layers of privacy via VPNs and "Degoogled" phones 32:35 CALEA LAW- Protection against a cell carrier and a state 39:21 What we can do to protect our privacy Follow Jason on TWITTER, INSTAGRAM & LINKEDIN Twitter.com/JasonHartmanROI Instagram.com/jasonhartman1/ Linkedin.com/in/jasonhartmaninvestor/ Call our Investment Counselors at: 1-800-HARTMAN (US) or visit: https://www.jasonhartman.com/ Free Class: Easily get up to $250,000 in funding for real estate, business or anything else: http://JasonHartman.com/Fund CYA Protect Your Assets, Save Taxes & Estate Planning: http://JasonHartman.com/Protect Get wholesale real estate deals for investment or build a great business – Free Course: https://www.jasonhartman.com/deals Special Offer from Ron LeGrand: https://JasonHartman.com/Ron Free Mini-Book on Pandemic Investing: https://www.PandemicInvesting.com
Apple is finally planning to kill off iTunes on Windows, Amazon now offers passkeys for logins, and Google Chrome will allow users to hide their IP addresses; just like Apple's iCloud Private Relay. Show Notes: French authority leaks iOS 17.1 launch date: “by October 24 at the latest” “Scary Fast” Apple Event on October 30 (Twitter link to thoughts by Mark Gurman and Ming-Chi Kuo on what will be presented next week) Apple Is Finally Killing Off iTunes – for Real This Time Apple Releases iTunes for Windows Update With Option to Listen to Podcasts and Audiobooks Apple hikes Apple One cost by up to $5 as most services prices rise Hacker leaks 4.1 million additional 23andMe genetic data profiles Amazon now lets you log in with Apple's Passkeys 1Password detects “suspicious activity” in its internal Okta account Okta says hackers breached its support system and viewed customer files Fake KeePass site uses Google Ads and Punycode to push malware Firesheep is 13 years old Google Chrome's new "IP Protection" will hide users' IP addresses Intego Mac Premium Bundle X9 is the ultimate protection and utility suite for your Mac. Download a free trial now at intego.com, and use this link for a special discount when you're ready to buy.
PEBCAK Podcast: Information Security News by Some All Around Good People
Welcome to this week's episode of the PEBCAK Podcast! We've got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast PEBCAK - Acronym of “problem exists between chair and keyboard.” Find us on our YouTube channel: https://www.youtube.com/@pebcakpodcast Cupping - https://www.youtube.com/watch?v=g9EUo_jj4Xo Hamas fundraising with cryptocurrency https://www.wsj.com/world/middle-east/militants-behind-israel-attack-raised-millions-in-crypto-b9134b7a Stolen IP address thief sentenced https://krebsonsecurity.com/2023/10/tech-ceo-sentenced-to-5-years-in-ip-address-scheme/ World's largest DDoS attack https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/ Things you don't know how people afford Dad Joke of the Week (DJOW) Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Glenn - https://www.linkedin.com/in/glennmedina/
On episode 343 of the BlockHash Podcast, Core Team member Constantin joins Brandon Zemp to talk about how blockchain DAOs can be used to preserve IP addresses. IPv4 addresses are a vital Internet resource that was depleted in 2019. Most of them are assigned to large corporations and distributed unevenly. Their DAO builds a pool of IP addresses which brings a new vision on how this scarce resource should be handled and preserved. ⏳ Timestamps: 0:00 | Introduction and Pre-roll 2:10 | Who is Constantin? 9:20 | Lack of IPv4 addresses 12:40 | AI and VR will increase demand for IP addresses 13:00 | What is IPv4DAO? 18:55 | ICANN and IP addresses 21:45 | Who contributes IP addresses? 24:20 | Root Token 26:05 | IPv4 vs. IPv6 33:25 | Leasing IP addresses 37:30 | Conclusion
This episode is brought to you by 5-Bullet Friday, my very own email newsletter.Welcome to another episode of The Tim Ferriss Show, where it is my job to deconstruct world-class performers to tease out the routines, habits, et cetera that you can apply to your own life. This is a special inbetweenisode, which serves as a recap of the episodes from last month. It features a short clip from each conversation in one place so you can easily jump around to get a feel for the episode and guest.Based on your feedback, this format has been tweaked and improved since the first recap episode. For instance, @hypersundays on Twitter suggested that the bios for each guest can slow the momentum, so we moved all the bios to the end. See it as a teaser. Something to whet your appetite. If you like what you hear, you can of course find the full episodes at tim.blog/podcast. Please enjoy! *This episode is brought to you by 5-Bullet Friday, my very own email newsletter that every Friday features five bullet points highlighting cool things I've found that week, including apps, books, documentaries, gadgets, albums, articles, TV shows, new hacks or tricks, and—of course—all sorts of weird stuff I've dug up from around the world.It's free, it's always going to be free, and you can subscribe now at tim.blog/friday.*Timestamps:Professor John Vervaeke: 00:02:58Brené Brown: 00:06:30Elan Lee: 00:13:57Dr. Matthew Walker: 00:22:58Full episode titles:Professor John Vervaeke — How to Build a Life of Wisdom, Flow, and Contemplation (#657)Brené Brown — Striving versus Self-Acceptance, Saving Marriages, and More (#409) (Originally posted in February 2020 and reposted in February 2023) Elan Lee, Co-Creator of Exploding Kittens — How to Raise Millions on Kickstarter, Deconstructing Mega-Successes, Secrets of Game Design, The Power of Positive Constraints, The Delights of Craftsmanship, and The Art of Turning Fans into Superfans (#653)Dr. Matthew Walker, All Things Sleep Continued — The Hidden Dangers of Melatonin, Tools for Insomnia, Enhancing Learning and Sleep Spindles, The Upsides of Sleep Divorce, How Sleep Impacts Sex (and Vice Versa), Adventures in Lucid Dreaming, The One Clock to Rule Them All, The IP Addresses of Your Memories, and More (#654)*For show notes and past guests on The Tim Ferriss Show, please visit tim.blog/podcast.For deals from sponsors of The Tim Ferriss Show, please visit tim.blog/podcast-sponsorsSign up for Tim's email newsletter (5-Bullet Friday) at tim.blog/friday.For transcripts of episodes, go to tim.blog/transcripts.Discover Tim's books: tim.blog/books.Follow Tim:Twitter: twitter.com/tferriss Instagram: instagram.com/timferrissYouTube: youtube.com/timferrissFacebook: facebook.com/timferriss LinkedIn: linkedin.com/in/timferrissPast guests on The Tim Ferriss Show include Jerry Seinfeld, Hugh Jackman, Dr. Jane Goodall, LeBron James, Kevin Hart, Doris Kearns Goodwin, Jamie Foxx, Matthew McConaughey, Esther Perel, Elizabeth Gilbert, Terry Crews, Sia, Yuval Noah Harari, Malcolm Gladwell, Madeleine Albright, Cheryl Strayed, Jim Collins, Mary Karr, Maria Popova, Sam Harris, Michael Phelps, Bob Iger, Edward Norton, Arnold Schwarzenegger, Neil Strauss, Ken Burns, Maria Sharapova, Marc Andreessen, Neil Gaiman, Neil de Grasse Tyson, Jocko Willink, Daniel Ek, Kelly Slater, Dr. Peter Attia, Seth Godin, Howard Marks, Dr. Brené Brown, Eric Schmidt, Michael Lewis, Joe Gebbia, Michael Pollan, Dr. Jordan Peterson, Vince Vaughn, Brian Koppelman, Ramit Sethi, Dax Shepard, Tony Robbins, Jim Dethmer, Dan Harris, Ray Dalio, Naval Ravikant, Vitalik Buterin, Elizabeth Lesser, Amanda Palmer, Katie Haun, Sir Richard Branson, Chuck Palahniuk, Arianna Huffington, Reid Hoffman, Bill Burr, Whitney Cummings, Rick Rubin, Dr. Vivek Murthy, Darren Aronofsky, Margaret Atwood, Mark Zuckerberg, Peter Thiel, Dr. Gabor Maté, Anne Lamott, Sarah Silverman, Dr. Andrew Huberman, and many more.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
I'm Coming to Prague; The HIBP Email Address Extractor; TheGradCafe Data Breach; I Ran Out of IP Addresses; Garage & Kitchen Rebuilds; Sponsored by Kolide https://www.troyhunt.com/weekly-update-340/See omnystudio.com/listener for privacy information.
2023-01-24 Weekly News - Episode 181Watch the video version on YouTube at https://youtu.be/SrS95HqW8HQ Hosts: Gavin Pickin - Senior Developer at Ortus Solutions Brad Wood - Senior Developer at Ortus Solutions Thanks to our Sponsor - Ortus SolutionsThe makers of ColdBox, CommandBox, ForgeBox, TestBox and all your favorite box-es out there. A few ways to say thanks back to Ortus Solutions: Like and subscribe to our videos on YouTube. Help ORTUS reach for the Stars - Star and Fork our ReposStar all of your Github Box Dependencies from CommandBox with https://www.forgebox.io/view/commandbox-github Subscribe to our Podcast on your Podcast Apps and leave us a review Sign up for a free or paid account on CFCasts, which is releasing new content every week BOXLife store: https://www.ortussolutions.com/about-us/shop Buy Ortus's Books 102 ColdBox HMVC Quick Tips and Tricks on GumRoad (http://gum.co/coldbox-tips) Learn Modern ColdFusion (CFML) in 100+ Minutes - Free online https://modern-cfml.ortusbooks.com/ or buy an EBook or Paper copy https://www.ortussolutions.com/learn/books/coldfusion-in-100-minutes Patreon Support ( amazing )Goal 1 - We have 42 patreons providing 100% of the funding for our Modernize or Die Podcasts via our Patreon site: https://www.patreon.com/ortussolutions. Goal 2 - We are 37% of the way to fully fund the hosting of ForgeBox.io News and AnnouncementsNew updates released for Java 8, 11, 17, and 19 as of Jan 17 2023Here's a heads-up that some will want to hear about: there are new JVM updates released today (Jan 17, 2023) for the current long-term support (LTS) releases of Oracle Java, 8, 11, and 17, as well as the current interim update 19. (Note that prior to Java 9, releases of Java were known technically as 1.x, so 8 is referred to in resources below as 1.8.)https://www.carehart.org/blog/2023/1/17/java_updates_Jan_2023 Beware that latest Oracle JDK installers will REMOVE older JDK installs of that versionHere's something new to beware if you may run the Oracle JDK installer for the recently updated Java 11 or 17, whether on Windows, macOS, or via RPM: the new Oracle jdk installer WILL REMOVE any older previous versions of that JVM version created by previous JDK installers of the same major version. (Note that this issue does not affect those who implement java by extracting it from a compressed file, like a zip or tar.gz.)Fortunately for some, this issue does NOT affect those running Java 8 or below, or Java 19 or abovehttps://www.carehart.org/blog/2023/1/23/beware_latest_oracle_JDK_installers_will_remove_older_JDK_installs CBWire Poll about a CFCasts SeriesI'm in the planning stage of developing an ongoing video series for CBWIRE on https://cfcasts.com/. I have several ideas and would like to put it out to the community to vote what you'd like to see most. All series would feature 5-7 minute bit-sized videos posted regularly (probably weekly) until the series is finished.https://community.ortussolutions.com/t/poll-cbwire-cfcasts-com-series/9513 New Releases and UpdatesCBSecurity - V 3.0.0 This module will enhance your ColdBox applications by providing out-of-the-box security.Now with a cool Security Visualizer too?Change Log is packed - https://www.forgebox.io/view/cbsecurity#changeLog Changed / COMPATIBILITY Dropped ACF2016 Separated routes to it's own module Router COMPAT New JwtAuthValidator instead of mixing concerns with the JwtService. You will have to update your configuration to use this validator instead of the JwtService useSSL is now defaulted to true for all security relocations as the default Encapsulation of jwt settings from the ModuleConfig to the JwtService CBAuthValidator has been renamed to just AuthValidator this way it can be used with ANY authentication service instead of binding it to just cbauth. This validator just relies on the IAuthUser interface now. Added New AuthValidator now can validate permissions and roles according to our IAuthUser interface but can be used on ANY authentication service that implements IAuthService New authorization and authentication delegates for usage in cb7 New ability for the firewall to log all action events to a database table. New visualizer that can visualize all settings and all firewall events via the log table if enabled. New Basic Auth validator and basic auth user credentials storage system. This will allow you to secure your apps where no database interaction is needed or required. New global and rule action: block and the fireall will block the request with a 401 Unathorized page. New event cbSecurity_onFirewallBlock announced whenever the firewall blocks a request into the system with a 403. DBTokenStorage now rotates using async scheduler and not direct usage anymore. Ability to set the cbcsrf module settings into the cbsecurity settings as csrf. We now default the user service class and the auth token rotation events according to used authentication service (cbauth, etc), no need to duplicate work. New rule based IP security. You can add a allowedIPs key into any rule and add which IP Addresses are allowed into the match. By default, it matches all IPs. New rule based HTTP method security. You can add a httpMethods key into any rule and add which HTTP methods are allowed into the match. By default, it matches all HTTP Verbs. New securityHeaders configuration to allow a developer to protect their apps from common exploits: xss, HSTS, Content Type Options, host header validation, ip validation, click jacking, non-SSL redirection and much more. Authenticated user is now stored by the security firewall according to the prcUserVariable on authenticated calls via preProcess() no matter the validator used Dynamic Custom Claims: You can pass a function/closure as the value for a custom claim and it will be evaluated at runtime passing in the current claims before being encoded Allow passing in custom refresh token claims to attempt() and fromUser() and refreshToken() : refreshCustomClaims Added TokenInvalidException and TokenExpiredException to the refreshToken endpoint https://www.forgebox.io/view/cbsecurityWebinar / Meetups and WorkshopsOrtus Event Calendar for Googlehttps://calendar.google.com/calendar/u/0?cid=Y181NjJhMWVmNjFjNGIxZTJlNmQ4OGVkNzg0NTcyOGQ1Njg5N2RkNGJiNjhjMTQwZjc3Mzc2ODk1MmIyOTQyMWVkQGdyb3VwLmNhbGVuZGFyLmdvb2dsZS5jb20 Ortus Fridays are back in Full Effect in 2023 ICYMI - Ortus Office Hours - Jan 6th, 2023 - 11 AM CST ICYMI - Ortus Webinar - Jan 20th 2023 - CBWIRE Coding Session - Let's build an app with CBWIRE with Grant Copley - 11 AM CST https://cfcasts.com/series/ortus-webinars-2023/videos/cbwire-live-coding-session-with-grant-copley Ortus Office Hours - Feb 3rd, 2023 - 11 AM CST Software Craftsmanship Book Club - Feb 10th, 2023 - 2 PM CST (Patreon exclusive) CFCasts Content Updateshttps://www.cfcasts.comRecent Releases Ortus Webinar - January - CBWIRE Live Coding Session https://cfcasts.com/series/ortus-webinars-2023/videos/cbwire-live-coding-session-with-grant-copley ITB 2022 - All videos released to subscribers - 30+!!!! 2023 ForgeBox Module of the Week Series - 1 new Video https://cfcasts.com/series/2023-forgebox-modules-of-the-week 2023 VS Code Hint tip and Trick of the Week Series - 1 new Video https://cfcasts.com/series/2023-vs-code-hint-tip-and-trick-of-the-week Coming Soon Brad with more CommandBox Videos - 27!!! More ForgeBox and VS Code Podcast snippet videos CBWire Series from Grant - Fill out the Poll here https://community.ortussolutions.com/t/poll-cbwire-cfcasts-com-series/9513 ColdBox Elixir from Eric Getting Started with ContentBox from Daniel Box-ifying a 3rd Party Library from Gavin Conferences and TrainingCF Summit Online All the webinars, all the speakers from Adobe ColdFusion Summit 2022 – brought right to your screen. All sessions will soon be streamed online, for your convenience. Stay tuned for more! ICYMI - LEVERAGING AI / COGNITIVE SERVICES VIA COLDFUSIONMichael HayesJanuary 17 | 12:00 - 13:00 pm EST (1 hour)Azure Cognitive Services is API that leverages AI and Machine Learning to provide capability such as Sentiment Analysis, Entity Recognition, Auto Translator, Text to Speech, speech translation, and many more. All this would be written in ColdFusion 2021 of course and a GIT repo of the code will be shared with the community. There may be a secondary package that will be shared that would convert PostMan / Swagger collections to ColdFusion for rapid development via API's.https://www.youtube.com/watch?v=jM6YpCMs6jg ICYMI - SPREADSHEET MAGICKevin WrightJanuary 19 | 12:00 - 13:00 pm EST (1 hour)Microsoft Office is the 'de facto' standard in most business environments. In this session we will look at different ways of integrating with one of the most used applications of the MS office suite, Excel. Come learn how to create, access and manipulate spreadsheets programmatically with the CFSPREADSHEET tag in ColdFusion. We will go beyond basic read and write features, and will delve into more advanced techniques like working with formulas and formatting, and creating multiple sheets. We will also look at examples of more complex types of spreadsheets by using lookups and even creating and embedding dynamic charts. FORMAT: Presentation with slides / live code reviewhttps://www.youtube.com/watch?v=VAvTsqXZ2o0 OPPORTUNITIES FOR BLOCKCHAIN TECHNOLOGY AND NFTS IN THE REAL WORLDMasha Edelen and Nick JuntillaJanuary 24 | 14:00 - 15:00pm EST (1 hour)Understanding the value and practical use cases of Non-Fungible Tokens in modern business applications. Learn how to get started using the blockchain and building your Web 3 strategy.Website for CF Summit Onlinehttps://cfsummit-online.meetus.adobeevents.com/ VUE.JS NATION CONFERENCEJanuary 25th & 26th 2023https://vuejsnation.com/ VUEJS AMSTERDAM 20239-10 February 2023, Theater AmsterdamWorld's Most Special and Largest Vue ConferenceCALL FOR PAPERS AND BLIND TICKETS AVAILABLE NOW!https://vuejs.amsterdam/ VueJS Live MAY 12 & 15, 2023ONLINE + LONDON, UKCODE / CREATE / COMMUNICATE35 SPEAKERS, 10 WORKSHOPS10000+ JOINING ONLINE GLOBALLY300 LUCKIES MEETING IN LONDONhttps://vuejslive.com/ Dev NexusApril 4-6th, 2023 in AtlantaGeorgia World Congress Center285 Andrew Young International Blvd NWAtlanta, GA 30313https://devnexus.com/ No Ortus speakers this year. :-(Into the Box 2023 - 10th EditionMay 17-19, 2023 The conference will be held in The Woodlands (Houston), TexasThis year we will continue the tradition of training and offering a pre-conference hands-on training day on May 17th and our live Mariachi Band Party! However, we are back to our Spring schedule and beautiful weather in The Woodlands! Also, this 2023 will mark our 10 year anniversary. So we might have two live bands and much more!!!Still time - call for speakers for the Into The Box Conference for 2023 is open until Jan 31sthttps://www.intothebox.org/blog/into-the-box-2023-call-for-speakers https://itb2023.eventbrite.com/ CFCamp is backJune, 22-23rd 2023Marriott Hotel Munich Airport, FreisingCall for Speakers is now open!https://www.papercall.io/cfcamp2023https://www.cfcamp.org/Even Ben Nadel was talking about busting out the passportMore conferencesNeed more conferences, this site has a huge list of conferences for almost any language/community.https://confs.tech/https://github.com/scraly/developers-conferences-agenda Blogs, Tweets, and Videos of the Week1/24/23 - Blog - Charlie Arehart - What's new in FusionReactor 9.2.0, released Jan 18 2023If you're a user of the wonderful FusionReactor monitoring and observability solution (for ColdFusion, Lucee, Java servers and more), you may delight in hearing news of a new FusionReactor (FR) version. 9.2.0 was released last week, Jan 18, 2023.https://www.carehart.org/blog/2023/1/24/whats_new_in_fr_9.2.0 1/23/23 - Blog - Charlie Arehart - Beware that latest Oracle JDK installers will REMOVE older JDK installs of that versionHere's something new to beware if you may run the Oracle JDK installer for the recently updated Java 11 or 17, whether on Windows, macOS, or via RPM: the new Oracle jdk installer WILL REMOVE any older previous versions of that JVM version created by previous JDK installers of the same major version. (Note that this issue does not affect those who implement java by extracting it from a compressed file, like a zip or tar.gz.)Fortunately for some, this issue does NOT affect those running Java 8 or below, or Java 19 or abovehttps://www.carehart.org/blog/2023/1/23/beware_latest_oracle_JDK_installers_will_remove_older_JDK_installs 1/21/23 - Blog - Ben Nadel - Does The Order Of Hash Inputs Matter In Terms Of Uniqueness And Distribution?My initial implementation of the CUID2 algorithm for ColdFusion tried to stay as close as possible to the JavaScript version. As part of this algorithm, I hash together various sources of entropy in order to create a unique, collision-resistant value. Once I completed my initial implementation, I got to thinking: since the goal isn't to create a specific value but rather a random, unique value, does the order of the inputs to the hash actually have any bearing on the characteristics of the output? In other words, does the order of hash inputs make the hash more unique? Or, give it a more even distribution in a given space?https://www.bennadel.com/blog/4394-does-the-order-of-hash-inputs-matter-in-terms-of-uniqueness-and-distribution.htm 1/19/23 - Blog - Ben Nadel - Comparing Java's MessageDigest To ColdFusion's hash() Function In Lucee CFMLLast week, I implemented a ColdFusion port of the CUID2 library. My version seems to work correctly; however, it has some performance problems when compared to the Java version. When I instrumented the ColdFusion component methods, nothing really jumped out at me. But, I have a hunch that I could make the SHA hashing more performant. Only, I don't have a great mental model for hashing. As such, I wanted to perform a small comparison of Java's MessageDigest class with ColdFusion's native hash() function for hashing a compound input.https://www.bennadel.com/blog/4393-comparing-javas-messagedigest-to-coldfusions-hash-function-in-lucee-cfml.htm 1/18/23 - Blog - Ben Nadel - Using "continue" To Short-Circuit .each() Iteration In ColdFusionYesterday, I was refactoring some ColdFusion code to go from using a standard for-in loop to using an .each() iteration member method. The for-in version of the code had some short-circuiting logic that used continue statements to skip to the next loop iteration. And, when I refactored to using .each(), I forgot to change the continue keyword to be a return keyword. And, wouldn't you know it - the code worked anyway. This is likely a quirk, not a feature, of the CFML platform; but, I thought it would be fun to share.https://www.bennadel.com/blog/4392-using-continue-to-short-circuit-each-iteration-in-coldfusion.htm 1/17/23 - Blog - Charlie Arehart - New updates released for Java 8, 11, 17, and 19 as of Jan 17 2023Here's a heads-up that some will want to hear about: there are new JVM updates released today (Jan 17, 2023) for the current long-term support (LTS) releases of Oracle Java, 8, 11, and 17, as well as the current interim update 19. (Note that prior to Java 9, releases of Java were known technically as 1.x, so 8 is referred to in resources below as 1.8.)https://www.carehart.org/blog/2023/1/17/java_updates_Jan_2023 CFML JobsSeveral positions available on https://www.getcfmljobs.com/Listing over 46 ColdFusion positions from 27 companies across 22 locations in 5 Countries.2 new jobs listed this weekFull-Time - ColdFusion Developer at Remote - United Kingdom Jan 18https://www.getcfmljobs.com/jobs/index.cfm/united-kingdom/ColdFusion-Developer-at-Remote/11548 Full-Time - Senior ColdFusion Developer at India - India Jan 17https://www.getcfmljobs.com/jobs/index.cfm/india/Senior-ColdFusion-Developer-at-India/11549 Other Job LinksThere is a jobs channel in the CFML slack team, and in the Box team slack now tooForgeBox Module of the WeekCBSecurity - V 3.0.0 This module will enhance your ColdBox applications by providing out-of-the-box security in the form of: A security rule engine for incoming requests allowing blocking, authentication, and authorization checks Annotation-driven security for handlers and actions JWT (JSON Web Tokens) generator, decoder, rotation, invalidation and authentication services JWT Token Storage in a cache or database Refresh and access tokens Ip Blocking, Host Blocking, and much more CSRF protection Security Headers for protection against ip spoofing, host spoofing, click jacking, ssl attacks, hsts, and much more Pluggable with any Authentication service or can leverage cbauth by default Basic auth capabilities with an internal user storage Capability to distinguish between invalid authentication and authorization and determine the process's outcome Ability to load/unload security rules from contributing modules. So you can create a nice HMVC hierarchy of security Ability for each module to define its own validator Now with a cool Security Visualizer too?Lots more to it - https://www.forgebox.io/view/cbsecurity#changeLog https://www.forgebox.io/view/cbsecurityVS Code Hint Tips and Tricks of the WeekMarkmapVisualize your markdown in VSCode Preview markdown files as markmap Edit markdown files in a text editor and the markmap will update on the fly Works offline https://marketplace.visualstudio.com/items?itemName=gera2ld.markmap-vscode Thank you to all of our Patreon SupportersThese individuals are personally supporting our open source initiatives to ensure the great toolings like CommandBox, ForgeBox, ColdBox, ContentBox, TestBox and all the other boxes keep getting the continuous development they need, and funds the cloud infrastructure at our community relies on like ForgeBox for our Package Management with CommandBox. You can support us on Patreon here https://www.patreon.com/ortussolutionsDon't forget, we have Annual Memberships, pay for the year and save 10% - great for businesses. Bronze Packages and up, now get a ForgeBox Pro and CFCasts subscriptions as a perk for their Patreon Subscription. All Patreon supporters have a Profile badge on the Community Website All Patreon supporters have their own Private Forum access on the Community Website All Patreon supporters have their own Private Channel access BoxTeam Slack Live Stream Access to streams like “Koding with the Kiwi + Friends” and Ortus Software Craftsmanship Book Club https://community.ortussolutions.com/ Top Patreons ( amazing ) John Wilson - Synaptrix Tomorrows Guides Jordan Clark Gary Knight Mario Rodrigues Giancarlo Gomez David Belanger Dan Card Jeffry McGee - Sunstar Media Dean Maunder Nolan Erck Abdul Raheen And many more PatreonsYou can see an up to date list of all sponsors on Ortus Solutions' Websitehttps://ortussolutions.com/about-us/sponsors Thanks everyone!!! ★ Support this podcast on Patreon ★
After last week's massive news week, another shoe just dropped: Metamask has updated its Privacy Policy, informing its users that it will begin collecting IP Addresses and Ethereum Addresses. What does that mean for Metamask Users? Can they circumvent the oversight? Join Richard and Steve for all you need to know and get the Latest Web3 News from around the Metaverse!*Disclaimer. Richard Carthon is the Founder of Crypto Current. All opinions expressed by members of the Crypto Current Team, Richard or his guest on this podcast are solely their opinions and do not reflect the opinions of Crypto Current. You should not treat any opinion expressed by Richard as a specific inducement to make a particular investment or follow a particular strategy but only as an expression of his opinion. This podcast is for informational purposes only.~Want more information on us? Please check out our Linktree for all our info :)linktr.ee/cryptocurrent
See omnystudio.com/listener for privacy information.
Configuration Examples with KevTechify for the Cisco Certified Network Associate (CCNA)
In this episode we are going to look at Configuring and Identifying MAC and IP Addresses.This activity is optimized for viewing PDUs. The devices are already configured. We will gather PDU information in simulation mode and answer a series of questions about the data you collect. We will be discussing Gather PDU Information for Local Network Communication and Gather PDU Information for Remote Network Communication.Thank you so much for watching this episode of my series on Configuration Examples for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.comYouTube Channel: https://YouTube.com/KevTechify-------------------------------------------------------Cisco Certified Network Associate (CCNA)Configuration Examples for Introduction to Networks v1 (ITN)Address ResolutionLab 9.1.3 - Identify MAC and IP AddressesLab Number: 9Pod Number: 9Season: 1-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
Introduction to Networks with KevTechify on the Cisco Certified Network Associate (CCNA)
In this episode we are going to look at Types of IPv4 Addresses.We will be discussing Public and Private IPv4 Addresses, Routing to the Internet, Special Use IPv4 Addresses, Loopback Addresses, Link-Local Addresses, Legacy Classful Addressing, and finally Assignment of IP Addresses.Thank you so much for listening to this episode of my series on Introduction to Networks for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Introduction to Networks v1 (ITN)Episode 11 - IPv4 AddressingPart C - Types of IPv4 AddressesPodcast Number: 53-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
This week I discuss the benefits of a dedicated VPN IP address, and an overall update to my thoughts on VPN providers. Direct support for this podcast comes from our privacy services, online training, and new books for 2022: Extreme Privacy (4th Edition) and Open Source Intelligence Techniques (9th Edition). More details can be found at IntelTechniques.com. Your support eliminates ads, sponsors, endorsements, branded merchandise, premium releases, donation requests, commercial influences, and other annoyances found within many podcasts. Thank you for keeping this show 100% about the content. Listen to ALL episodes at https://inteltechniques.com/podcast.html SHOW NOTES: INTRO: None NEWS & UPDATES: Book update YoutubeDL Script https://home.treasury.gov/news/press-releases/jy0659 https://www.scss.tcd.ie/doug.leith/privacyofdialerandsmsapps.pdf Amazon blocking VPNs DEDICATED VPN IP ADDRESSES: VPN summary Dedicated IPs https://www.privateinternetaccess.com/ThePSOSHOW https://inteltechniques.com/firewall/ https://inteltechniques.com/vpn.html NEXT WEEK: https://inteltechniques.com/book7.html Free Guides: https://inteltechniques.com/links.html Affiliate Links: Extreme Privacy (4th): https://amzn.to/3D6aiXp ProtonMail: https://go.getproton.me/aff_c?offer_id=7&aff_id=1519 ProtonVPN: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=277 PIA Dedicated IP VPN: https://www.privateinternetaccess.com/ThePSOSHOW SimpleLogin Masked Email: https://simplelogin.io?slref=osint Silent Pocket Bags & Wallets: https://slnt.com/discount/IntelTechniques
White House warns of large-scale Russian cyberattacks. Browser-in-the-Browser attacks. New Conti affiliate described. Android malware “Facestealer” described. Android malware “Facestealer” described. Microsoft and Okta investigate possible Lapsus$ attacks. Arid Gopher is out in the wild. Our guest is Swathi West of Barr Advisory on opportunities for the underrepresented in cybersecurity. Joe Carrigan wonders if we can't just get rid of passwords once and for all. And advancing censorship by finding “extremism” and “Russophobia” in Meta's platforms. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/55 Selected reading. Russia's hybrid war with Ukraine: strategy, norms, and alliances (The CyberWire) Statement by President Biden on our Nation's Cybersecurity (The White House) FACT SHEET: Act Now to Protect Against Potential Cyberattacks (The White House) Statement from CISA Director Easterly on Potential Russian Cyberattacks Against the United States (CISA) Press Briefing by Press Secretary Jen Psaki and Deputy NSA for Cyber and Emerging Technologies Anne Neuberger, March 21, 2022 (The White House) Statement from Secretary Mayorkas on Cybersecurity Preparedness (US Department of Homeland Security) Conti Affiliate Exposed: New Domain Names, IP Addresses and Email… (eSentire) New Phishing toolkit lets anyone create fake Chrome browser windows (BleepingComputer). New Browser-in-the Browser (BITB) Attack Makes Phishing Nearly Undetectable (The Hacker News) Arid Gopher: Newest Micropsia Malware Variant (Deep Instinct) Spyware dubbed Facestealer infects 100,000+ Google Play users (Pradeo) Okta confirms investigation into potential breach (The Record by Recorded Future) Microsoft investigating alleged Lapsus$ hack of Azure DevOps source code repositories (Computing) Russian War Report: Meta officially declared “extremist organization” in Russia (Atlantic Council)
Introduction to Networks with KevTechify on the Cisco Certified Network Associate (CCNA)
In this episode we are going to look at Ports and Addresses.We will be discussing IP Addresses, Interfaces, and and Ports.Thank you so much for listening to this episode of my series on Introduction to Networks for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Introduction to Networks v1Episode 2 - Basic Switch and End Device ConfigurationPart F - Ports and AddressesPodcast Number: 15-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
There's no denying iOS14 hurt our ability to track our customers, but did you know there's a way around losing that data? That's the power of Connected TV, which utilizes IP addresses to track instead of cookies.In this episode, Gathre President Michael Eraso shares about Connected TV and how he is able to Track via a third-party app. He talks about how to track the Return on Ad Spend via the use of IP Addresses.Listen up and learn something new.KEY TAKEAWAYS FROM THIS EPISODEIt is important to be in tune with your finances and budgeting and to have KPIs and metrics that show that the dollars spent are done so wisely. Know your numbers and know the keys to scaling up.Invest in social platforms and updating content sharing if you're really into knowing your customers.Diversifying your marketing channels is powerful.The idea of connected TV bypasses some of the IOS 14 changes because it's based on IP addresses.There's no way to skip Ads on connected TVs.Finding other channels is great, but so is relying on your tried and true channels.1% improvements can sometimes be overlooked, but they all add up over time. Do a lot of tests.Recommended Tool:Google Analyticshttps://analytics.google.com/Enquire Labshttps://enquirelabs.comMNTNhttps://mountain.com/Recommended Book:How Will You Measure Your Life? by Clayton Christensenhttps://www.amazon.com/How-Will-Measure-Your-Life/dp/0062102419Today's Guest:Michael Eraso is the President and Co-Founder of Gathre.Gathre is a design company that develops and produces products for the modern parent, located in the Provo, Utah area.Connect and learn more about Michael and Gathre here:Website: https://gathre.com/#Linkedin: https://www.linkedin.com/in/michaelerasoThis month's sponsor is KnoCommerce - the first survey platform built for eCommerce brands. Gain insight on everything from marketing attribution to purchase motivation, while leveraging your customer data for enhanced personalization.Start for free at KnoCommerce.comWe love our podcast community and listeners so much that we have decided to offer a free eCommerce Growth Plan for your brand! To learn more and how we can help, click here:https://mindfulmarketing.co/growthplan-applyIf you've been paying attention and your brand is ready to GROW, apply now to be the one new brand we take on this month!https://mindfulmarketing.co/apply
You can find Philippe on Twitter here and learn more about CrowdSec here.They recently put together a list of the IP addresses trying to exploit the new Log4j vulnerability.For a prescient view of today's cybersecurity challenges, Humeau recommends John Brunner's classic 1975 sci-fi novel, The Shockwave Rider.
You can find Philippe on Twitter here and learn more about CrowdSec here.They recently put together a list of the IP addresses trying to exploit the new Log4j vulnerability.For a prescient view of today's cybersecurity challenges, Humeau recommends John Brunner's classic 1975 sci-fi novel, The Shockwave Rider.
Today we'll be looking at some negative SEO issues that have come up including how an onlyfan performer may have taken down reddit's homepage, your IP address in Google results, Meta's new restrictions on advertising, and the worst practice for handing over a site from one agency to another.How easy would it be to remove reddit's home page from Google's index? Apparently a simple DMCA is all it took. Cyrus Shepard noted on twitter that the main reddit homepage wasn't ranking #1 anymore and some further investigation looks like a DMCA request was the culprit.While you are checking out the tweets, also take a look at Cyrus' company Zyppy and their SEO success factors. Probably one of the better put together lists of ranking factors you should and shouldn't care about.https://twitter.com/CyrusShepard/status/1478101570646540289https://zyppy.com/seo-success-factors/We've all been there, a staging version or just the straight IP version of the site gets indexed. I didn't bring this up yesterday as part of the office hours recap as John somewhat touched on this issue, but there was a reddit thread where he put in a lot of effort into the reply and I think it's important enough to mention. John Mueller said that generally, Google will list a site in its search results with the domain name rather than using an IP address. But if you see both and know your website is crawlable via this protocol then there's no reason to worry about being deindexed. https://www.reddit.com/r/TechSEO/comments/rs7pjb/perfect_storm_caused_a_tank_in_ratings_ip_address/ Starting January 19th, 2022 Meta (You know, Facebook) will no longer allow you to market certain targeting options relating to sensitive topics. A list containing examples for all types of sensitive categories was given Health causes (e.g., “Lung cancer awareness”, “World Diabetes Day”, “Chemotherapy”)Sexual orientation (e.g., “same-sex marriage” and “LGBT culture”)Religious practices and groups (e.g., “Catholic Church” and “Jewish holidays”)Political beliefs, social issues, causes, organizations, and figuresI think this is a great move, and I am happy to see this. Having worked in marketing in the medical field, I did sometimes feel like we were able to target a little too accurately and it felt someone intrusive. Little by little, we're getting less targeted ads, but we're also safeguarding our privacy. I think the balancing act is a tough one, but this is the right direction. This also is something I think will help balance out the ability to influence a specific group too much, and forces advertisers to broaden their ads to a larger spectrum of people with differing political or social beliefs. https://developers.facebook.com/blog/post/2021/12/08/updating-metas-detailed-targeting-options/Hiding results when handing over a site: Just a fun little reminder of the URL removal tool in Search Console - which is used to temporarily remove a result from the search result pages. Think of it like a filter for results, and you are asking Google to filter the results out that follow a specific pattern. I've seen this used in negative ways when handing over a site from one agency to another, it's a bit hidden but a great way to hide the important parts of a page with nothing else wrong with the site. https://twitter.com/JohnMu/status/1477740336134959104
Websites are under constant attack what you should do if you have a site upate as soon as possiable WordPress Under Attack Over 16,000 Ip Addresses Used To Target Over 1.6 Million Sites Every day Big Tech and Mass Media make it hard to find out what is going on with the internet. The suppression of information is a danger to all of us. Social media attempts to shape news and information by over-amplification of disinformation. Join our community!! Subscribe to the Insecurity Brief podcast now on every platform we can find Follow me on Twitter @trip_elix Links Our Website: https://www.tripelix.com/insecurity/wordpress-under-attack-over-16000-ip-addresses-used-to-target-over-1-6-million-sites/ Youtube: https://youtu.be/Tk8TW5PFia0 Rumble: https://rumble.com/vqmdhy-wordpress-under-attack-over-16000-ip-addresses-used-to-target-over-1.6-mill.html iTunes: https://podcasts.apple.com/us/podcast/wordpress-under-attack-over-16-000-ip-addresses-used/id1583788677?i=1000545022394 Spotify: https://open.spotify.com/episode/33gXTgy0D3KdPNGkZVlMuv Trip’s books https://www.tripelix.com/merch Vulnerable Plugins Activello (
I start off announcing the winner(s) of the Squid Game contest I had last week. Google finished the rollout for the November spam update after 8 days. That Google November spam update seems to be big, at least...
Protronmail logs IP Addresses for French government targeting activists Trip and Honey discuss tech like no one else Join our community!! Subscribe to the Insecurity Brief podcast now on evey platform we can findFollow us on Twitter @HoneyBeez0x @trip_elixlinksOur Website: https://www.tripelix.com/insecurity/protronmail-logs-ip-addresses-for-french-government-targeting-activists Youtube : https://youtu.be/BRCWn1gTE1I the link to the podcast the link to soundcloudTrip's books https://www.tripelix.com/merchHoney's books https://beedefense.net#polynetwork #money #protonmail #french #swiss #secuirty The attacker returned the loot after being offered a gig as chief security advisor with Poly Network. A threat actor called “Mr. White Hat” has returned the $610 million they stole from the decentralized finance platform Poly Network. The breached company did everything from threaten to sic law enforcement on the attacker on up to its ultimate offer: the position of chief security officer in exchange for getting its money back https://threatpost.com/poly-network-recoups-610m-stolen-from-defi-platform/168906/ threatpost.com ProtonMail Logs Activist's IP Address With Authorities After Swiss Court OrderEnd-to-end encrypted email service provider ProtonMail has drawn criticism after it ceded to a legal request and shared the IP address of anti-gentrification activists with law enforcement authorities, leading to their arrests in France. https://thehackernews.com/2021/06/chinese-hackers-believed-to-be-behind.html thehackernews.com
Welcome to the Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest security & privacy news. This report most notably recaps recent Protonmail news where they handed over a users IP address, in addition to WhatsApp possibly accessing user messages, and much more! Support The Podcast Protonmail Support Link: https://go.getproton.me/aff_c?offer_id=26&aff_id=1182&url_id=267 The New Oil Support Methods: https://thenewoil.xyz/links.html Techlore Support Methods: https://techlore.tech/support.html Timestamps 00:00 Introduction 01:12 Data Breaches 06:11 Company News 19:52 Research 27:00 Politics 33:04 Beginning of Australia Section 38:50 FOSS News 40:31 Misfits SR54 Sources: https://github.com/techlore/channel-content/blob/master/Surveillance%20Report%20Sources/SR54.md Main Sites Techlore Website: https://techlore.tech The New Oil Website: https://thenewoil.xyz/ Surveillance Report Podcast: https://www.surveillancereport.tech/
Join James Cridland and Sam SethiINTERVIEW: Bryan Barletta - Sounds ProfitableNEWS HEADLINES:“Nearly one in five weekly listeners say that YouTube is their primary service for podcasts. This is why I twitch a little every time I hear a podcast tell listeners to 'subscribe or follow us wherever you get your podcasts.' Are you sure?” - in his latest newsletter, Tom Webster shares some data that might convince you to get your podcast onto YouTube.James has written how to auto-publish your podcast to YouTubeAfter Podnews highlighted Fireside Chat's terms of service following its public launch at Podcast Movement, the company released updated terms late last week. The new terms (differences here) seek to clarify the 'General Media Release' section about ownership of content, and one clause has been removed. We have reviewed Fireside's new terms and conditions.So what happens to podcasting when IP addresses go away? In Sounds Profitable this week with Chartable, Bryan Barletta highlights who wins - and who loses.It's time to hang up the egos and move beyond IP addresses, says Dave Jones, writing on The Podcast Index's blog. The post highlights a new way to get better podcast analytics, using a “ULID” URL parameter, and listen stats.A new podcast report was released in Germany on Thursday. Hitting the right tone: Germany's podcast boom was released by the Otto Brenner Foundation. It's covered by Berlin's Der Tagesspiegel. A detailed 133-page report with plenty of data about podcasting in Germany is now available. SPONSORS: Buzzsprout Podcast hosting and a whole lot moreRiverside.FM Podcast recording made simple. The easiest way to record podcasts in studio quality from anywhere.
In Podnews today: Acast release significant growth figures; German podcast data; and avoiding burnout Visit https://podnews.net/update/ip-addresses-disappear for all the podcasting news, and to get our daily newsletter.
Open Tech Talks : Technology worth Talking| Blogging |Lifestyle
In this session part 7, we will cover three topics: How to manage the virtual network interface cards (VNICs) in a virtual cloud network (VCN). How your instances are assigned private and public IP addresses, and the use of DNS within your cloud network. How to manage the Dynamic Host Configuration Protocol (DHCP) options in a virtual cloud network (VCN). The Journey started from the first station of networking to learn the basics of Oracle Cloud Infrastructure. In the second station of our journey to learn Oracle Cloud Infrastructure (OCI). We will cover different gateways available in the VCN like: Network address translation (NAT Gateway), Service Gateway, Internet Gateway, Dynamic Routing Gateway (DRG), Local Peering Gateway (LPG), and Remote Peering Gateway (RPG). When you will arrive at the third station of our journey, to learn OCI, you will get the basics of default components of VCN, including the below three-component comes by default with the Virtual Cloud Network on OCI. Default route table, with no route rules Default security list, with default security rules A default set of DHCP options, with default values In the fourth station of our journey, we will cover the three different scenarios, public subnet, Private Subnet with a VPN, and Public and Private Subnets with a VPN. In the fifth and sixth station of the journey to learn the basics of OC we have covered below areas: Access controls Security Rules Network security groups Security Lists VCN Flow logs
Multiple dormant White House IP addresses went active moments before Donald Trump left office. A listener details the strange behavior of his daughter while she sleeps, prompting a conversation about the mysteries of parasomnia. A Conspiracy Realist asks for more information about the rumors that the US purposely abandoned soldiers in Vietnam... and, if so, where those people may be today. Learn more about your ad-choices at https://www.iheartpodcastnetwork.com
For this week's episode, I'm going to have to ask all of you to fasten your seatbelts because today, we cover the internet. Specifically: HTTP, Hosting, Domains, IP Addresses, and more! We also cover sh*tty job postings, bad take home assessments, and even more SCUBA talk. All this and so much more on Tech Heads.Victor Recommends:Star Tech DockAna Recommends:Brave Browser
On this week’s Cyber Report, sponsored by Northrop Grumman, Daan Keuper of Dutch security testing company Computest — who along with his colleague. Thijs Alkemade — exposed a vulnerability in the Zoom communications software to win a $200,000 prize. In our second. segment, Justin Sherman of the Atlantic Council discusses the move by the Pentagon’s Defense Digital Service to move more than 170 million internet addresses to an unknown Florida company Global Resource Systems, and Daan Keuper of Dutch security testing company Computest, discusses how he and his colleague Thijs Alkemade discovered a vulnerability in the Zoom communications software to win a $200,000 prize with Defense & Aerospace Report Editor Vago Muradian.
Three things to know today A worlds largest block of IPs from a company you haven’t heard of https://www.washingtonpost.com/technology/2021/04/24/pentagon-internet-address-mystery/ The SolarWinds analysis continues https://www.zdnet.com/article/solarwinds-hack-analysis-reveals-56-boost-in-command-server-footprint/#ftag=CAD-03-10abf5f https://www.govinfosecurity.com/analysts-uncover-more-servers-used-in-solarwinds-attack-a-16457 https://finance.yahoo.com/news/russia-us-network-access-after-solarwinds-hack-192305973.html AND ISG’s data on IT services https://smartermsp.com/demand-for-it-services-accelerates-as-economy-recovers/ Want to get the show on your podcast app, or get the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://shop.spreadshirt.com/mspradio Follow us on: Facebook: https://www.facebook.com/mspradionews/ Twitter: https://twitter.com/mspradionews/ Instagram: https://www.instagram.com/mspradio/ LinkedIn: https://www.linkedin.com/company/28908079/
The Conspiracy Beer Me Boys discuss the transfer of 175 million IP addresses from the DOD during the last minutes of Trumps presidency. Each week, comedians Sam Mazany, Justin Scranton, and Shane Smith get drunk and break down ridiculous conspiracies so you don't have to. Become a patron! https://www.patreon.com/conspiracybeerme Give us a follow at @conspiracybeerme on Instagram and Facebook! Review us on iTunes! www.conspiracybeerme.com
192.168.1.1 - Humans use plain-language addresses (such as https://192-168-i-i.com/) to refer to websites. But since computers store everything digitally, they need another system. That's where IP addresses come in. To understand what an IP address is, think of it as a series of numbers that identifies any type of digital device on the internet.There are two types of IP addresses: public (or external) IP addresses and local (or internal) IP addresses. The public address is provided by your internet service provider (ISP) and is how the internet recognizes your network like https://192.168.1.1/. Each device on your local network, including your computer, has a unique local IP address that is usually assigned by the router on your internal network.You may need a local IP address to do things like setting up printers or solving technical problems on your network.
IP reconnaissance is often the base and a starting point of any security research or bug hunt. This is simply because scanning any IP address can lead you to an individual host in question, and once you've found the host, the possibilities are limitless. From there you may find running services, open ports, databases, unsecured files and much more. Everything begins with finding and scanning the IP address. Doing this is relatively easy for smaller organizations; looking up the ASN of an organization often nets you almost all of its IP addresses. When looking at larger organizations, however, you can get multiple departments running on different network spaces, ASNs and locations with tens and thousands of IPs. Some larger organizations like IBM, Amazon, Ford Motor Company have /8's of their own which is approximately 16777216 individual IPv4 addresses. Scanning and finding open ports and services on half a million IPs or even, say, 10,000 IPs (which is commonly seen at many larger organizations) is quite a time consuming and difficult task. But not all hope is lost! Some tools like our own Securitytrails Surfacebrowser, actively scan and gather information for you, empowering your security research and IP reconnaissance in literally seconds. How to perform IP reconnaissance for Bug Bounty Hunting Let's see how anyone can perform a complete IP reconnaissance using Surfacebrowser, our all-in-one surface analysis tool: To begin your IP reconnaissance, first head over to your user area and log into your account. Once logged in, click on "Access Surfacebrowser" on the left-hand side or load this URL:/ In our example, we'll be scanning the company domain "ge.com" From the left-hand sidebar, select "IP Blocks" under the "IP Addresses" heading: Give it a few seconds for Surfacebrowser to generate your report, after which you'll see all the IP addresses associated with the company GE: As you can see, the IP blocks along with IP counts, RIR, open ports, hostnames and apex domains hosted on those IP addresses are also revealed. Looking further into per-IP information with Surfacebrowser Scanning the IP 1.1.1.1 as an example, Surfacebrowser now shows you a summary of all the available information, and allows you to jump from one tab to another to discover even more details: Domains The Domains tab lists the number of domains associated with this IP address, current, active domains on the IP address and past domains, domain history associated with the IP address. Ports History The Ports History tab lists ports that were open in the past (and might still be open), or are closed now and when they were last seen open. P2P The P2P tab lists any peer-to-peer activity which may have occurred on or via this IP address, including data such as date, torrent, category and source. Open Ports and Software The Open Ports and Software section lists services and applications running as well as each open port found on the IP address. Services and applications include web servers, DNS servers such as Nginx, Unbound (DNS-Server), other services like HTTP proxy and more. DNS This section lists all associated forward DNS and reverse DNS addresses and information for the IP address. ASN This section indicates which autonomous system number (ASN) the IP address belongs to, helping to further trace out associated IP ranges and network uplinks, providers. Latest Seen Certificates The last or latest seen certificates seen on this IP address, the port it is assigned to, location and validity are indicated in this area. Combined, the above information gives you a great headstart into gathering information about the IP address in question. What about IP neighbors? Sometimes an IP address might not have much to offer, simply because it could be well secured or running nothing of value to the investigation. On the other hand, its neighbours might be running services of interest, and finding these IP neighbors is super easy with the Surfacebrowser tool as well: We f...
In this episode of Hacker Valley Studio podcast, Ron and Chris are joined by Chris Parker, creator of WhatIsMyIPAddress. His website now reaches six million monthly visitors and began as a necessity to solve a technical problem, which you can probably guess, determine his IP Address. WhatIsMyIPAddress predates Google and was often found through the search engine AltaVista. For years, the site was simple, straightforward and didn’t have any graphics or markup (HTML). At some point, Chris stumbled upon a Content Management System (CMS) called Geek Log but quickly learned with the amount of traffic that it was best for him to manually code each page on his website. For quite some time Chris maintained the website, answered questions from users about IP Addresses, and created more content without receiving any monetary compensation. The advent of Google AdSense led Chris to realize that he could make a profit for hosting his website. Chris’s website is in the top 3,000 websites on the Internet and was managed out of his home office for over 8 years. As you can imagine, he received traffic from users across the world and was even the target of some cybersecurity attacks. However, keeping the functionality on his website simple, the biggest threat Chris faced was Denial of Service (DoS). After moving his website from his home to a CDN provider that blocks malicious traffic and bots, Chris saw a 90% reduction in web traffic to his website. This led Chris down the path of creating content about security and configuration. With such a large audience, Chris decided to start the Easy Pray podcast and help listeners learn how to avoid becoming easy targets for scammers and fraudsters online and in the real world. Chris recalls a story of a fraud group that scammed victims by telling the victim that they’ve won the lottery in their country but are unable to withdraw the winnings because of citizenship. This scam is not uncommon and has caused hopeful individuals to lose thousands and sometimes their entire life savings. Chris has set out on a mission to inform others of these scams and create awareness about online safety. Impactful Moments 0:00 - Welcome back to the Hacker Valley Studio 1:44 - Introducing Chris Parker, Creator of WhatIsMyIPAddress 5:11 - Was the naming of the website intentional or was it incidental? 6:04 - Adapting and digital transformation 7:29 - Malicious traffic and cyber attacks 10:39 - Creating a more safe Internet with the Easy Pray podcast 12:43 - Unfortunate spam and scamming stories 15:18 - More about Chris’s goal to provide education to his listeners 18:40 - Learnings and takeaways to avoid being scammed 24:02 - Tools that Chris is using to grow and scale his business 26:51 - How to stay up to date with Chris Parker Links: Learn more about Chris Parker and visit his website and podcast. Learn more about Hacker Valley Studio. Support Hacker Valley Studio on Patreon. Follow Hacker Valley Studio on Twitter. Follow hosts Ron Eddings and Chris Cochran on Twitter. Learn more about our sponsor ByteChek.
Back again with another great episode of the HackableYou Podcast. This week in the Cyber News we shed light on how some of the Top tech firms like Microsoft, Tesla, Apple have all been compromised through open source code repositorys, we discuss the Yandex insdier who had unauthorised access to 5000 user email accounts and give you our view on the recent Florida based water supply companies remote access hack that could have poisoned thousands of people. Our Topic of the week dives into "The Art of Social Engineering" and we talk about how Social Engineering is far more than just phishing. Lastly, in Secrets from The SOC we give you practical advise on how to use Reputation Blacklists for IP Addresses and other IOCs. We hope you enjoy and feel free to contact us at info@hackableyou.com Timestamps: Cyber News: 01:37 Topic of The Week: 13:18 SFTS: 23:59
My first day in Clearwater Florida if YouTube watch to clean up their website they must start blocking hate groups 71 degrees and raining
In this first episode, Adam and Andy discuss whether geo-restricting IP addressing is considered "good" security. They also discuss Azure AD password protection as a method to protect against password spraying attacks. Documentation: Overview on Azure AD password protection: https://techcommunity.microsoft.com/t5/azure-active-directory-identity/azure-ad-password-protection-is-now-generally-available/ba-p/377487 How to deploy Azure AD protection: https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-password-ban-bad-on-premises-deploy Andy Jaw Twitter: @ajawzero LinkedIn: https://www.linkedin.com/in/andyjaw/ Adam Brewer Twitter: @ajbrewer LinkedIn: https://www.linkedin.com/in/adamjbrewer/ --- Send in a voice message: https://anchor.fm/blue-security-podcast/message
Learn to Run Your I.T. Business Hosted by Paco Lebron from ProdigyTeks John Dubinsky from Maven Group Billy Austin from Rocket Cyber MSP Unplugged Video Live Show and Chat every Sunday at 7:30pm EST Email: Jeff@MSPUnplugged.com Support This Show Patreon.com/MSPUnplugged BuyMeACoffee.com/MSPUnplugged PayPal.Me/MSPUnplugged Main Topic: Managed SOC Platform Built for MSPs delivering cyber security to SMBs ENDPOINT | NETWORK | CLOUD Links: Call to Action: Our friends over at Syncro are hosting a giveaway for a few weeks. Those who sign up for a free trial of Syncro and attend a product tour will receive a nifty Syncro mug! Visit the URL to book your demo today: https://bit.ly/mugpl Paco Tips Smart Calling on Sales In this new day and age you need to re-adjust your sales process and comfort. My good friend blah blah blah John Tips Microsoft Windows File Recovery (Windows 20-04 only) Accidentally deleted an important file? Wiped clean your hard drive? Unsure of what to do with corrupted data? Windows File Recovery can help recover your personal data. ** Do not ignore the Store for Microsoft tools that might help. - Windows Scan, Microsoft Whiteboard, Wireless Display, etc. whatsmyip.org WhatsMyIP.org started in April of 2001 when I bought this domain name on a whim. This site was originally hosted on an Apple Mac Quadra 700, connected to a residential internet connection, and the IP Addresses were retrieved via AppleScript. We've come a very long way. If you want to see how long, check us out on Archive.org! ** Port Scanners, WhoIs & DNS, Website Rankings, Password Generator, MAC Address Lookup, etc., etc., etc. VOIP Tips (rant) If you are going to be a VOIP provider you ARE going to be a network engineer. If your vendor cannot provide you recommendations on the following - FIND A NEW VENDOR. Your vendor vetting is EXTREMELY important. Your vendor will easily be 70% of a successful installation. 95% of VOIP sales vendors will ask nothing about the current infrastructure or supply necessary requirements. Understand that your customers really have no idea what VOIP is, they simply want phone service. There is nothing VOIP cannot do versus an on-site PBX with the correct vendor and configuration. You need to have commercial grade equipment for a successful installation that supports the settings requirements of VOIP (RTP and SIP traffic (QoS) and firewalls that are SIP/VoIP friendly). Know and understand UDP. You will need to configure or accommodate this for BLF (Busy Lamp Field). Know and understand QOS (quality of service) so you can prioritize traffic. Large VOIP installations are going to most likely need a separate VLAN for voice. Correctly configure your firewall to bypass trusted VOIP traffic without inspection. You will need both LAN and WAN bandwidth. Example: Take the amount of phone connections times 100kpbs (check with your VOIP vendor) for a good approximation of just your voice needs. Do not forget about VOIP security. Make sure your vendor considers compliance and feature needs (spam calls, HIPAA, training, etc.). Make sure you 911 is correctly configured. Billy Tip Have insight and visibility into customer account authentications. Guest: Billy Austin - President & Co-founder at RocketCyber Billy Austin LinkedIn Profile RocketCyber: FAQ’s BLOG How to Videos RocketCyber's threat detection apps provide solutions for many cybersecurity use cases. Each use case facilitates cyber monitoring opportunities for the managed service provider. Login to your account to turn on preferred RocketApps, no separate installation required. Each App is purposely built to detect malicious/suspicious activity spanning endpoint, network, and cloud attack pillars. When threats are detected, RocketCyber provides the MSP operator reporting, a triage view, and the ability to generate tickets to your PSA. Cybersecurity Framework (NIST) Pax8 NIST Cybersecurity Framework Windows Defender Cylance Webroot Sentinel One Untangle Firewall What is a firewall Syslog - firewall log monitoring acting as a syslog collector. Messages are parsed, analyzed, and enriched with threat intel for potential threat indicators. When a threat or security event is detected, message details show up in the console. What is a Syslog? DISCLAIMER: This description contains affiliate links, which means that if you click on one of the product links, we’ll receive a small commission. Music By Jim Holley
Intro Is a VPN really a good way to stay safe, or just something people feel obligated to buy from exposure to fear mongering? NO VPN SERVICE IS ANOYNYMOUS. The weakest link is the VPN that you're putting all of your trust in. “I swear, just minutes after I was browsing an article about shoes, Facebook knew what I was looking at and now they're advertising shoes to me! This is ridiculous.“ A VPN still isn't going to stop things like this from happening. Marketing companies already have ways of finding out what products you like. When you visit Facebook, you're logging into a site. Logging into a Site. Logging into their site. Facebook sells ads, you talk about things online, they're listening. VPN won't protect you from this. On the other hand, you would still decrease the amount of tracking on that happens because your IP address can originate from another country. So, you can still see ads, but they're likely be irrelevant to you. Solution: Develop better habits and just be a little more educated on how things are tracking you. “Oh, “I'm logged into a social network?”. “Oh, I'm signed into Gmail, and receiving products receipts and promotional emails to my inbox? A company that makes a killing on ad revenue would never use this information to their benefit!”. Realize that if you DO go with a VPN Provider, you now need to put all of your trust in them. All of your traffic is routed through them. Your IP address is ONLY ONE of the ways to track you There are Tracking ID's completely different from your IP address, so when you're all set hiding your IP address, there so many other factors that can reveal ..You. Your machine has a cookies, device ID's (given to you when you sign up for services – they can track you across the web). Mobile devices can further track you by GPS/Celullar networks that reveal your location. I think we're so busy focusing on “IP Addresses” while marketing companies are perfecting their best product: You. VPN Companies can't solve it all. Your browser, itself, has plugins, versions, so many other things that talk to the website it's connecting to. You're being tracked. You can't hide. You're wasting your time. My point is, if a government wants to subpoena the information that you're hiding, a VPN will make it very convenient for them to get that data. “Come one! I really want to do everything I can to not be tracked.“ Alright, then power off all of your electronic devices – anything with a network connection. You CAN do more to be tracked less, but remember that your fort Knox of privacy is as only good at the weakest link. Most of us probably don't work for the CIA and we're not in that high of demand. Follow our Podcast If you're a new listener to the Manly Hanley Podcast, we would love to hear from you. Visit our website and leave a comment. While you're there, be sure to subscribe to the newsletter! Follow Randrums on twitter Like the Manley Hanley Podcast Facebook page.
In this episode, we talk about IP addresses
Hello folks, welcome to the tech podcast, podcast 316. On this podcast, we cover We Transfer. This is a service that was used to deliver files to me, and I actually like its interface. If it is right, I could see myself paying for it, but right now, I don't need to do that. I talk about this service and what it has to offer. Next Braille 2000 V2.274 take 2: we’re getting better is the accompanying article and I talk about a new menu that will appear once the talking edition becomes available to the general public hopefully very soon. The beta can now be recommended, and you should contact Bob to get your copy. Finally, Krebs on Security is here with an article A Tough Week for IP Address Scammers is discussed. I hope you enjoy the program as much as I have, and thanks so much for listening to the program! The opinions expressed are those of the show notes, and may not necessarily represent the companies in which they represent. See you next time!
Buckle up guys, there's super ineffectual "zombies" ahead. Jake and Sky watch Reboot: the Guardian Code episode 12 "Zombie Army" We discuss the questionable location choices to test fly a drone, Jake tries to piece together something logical about the sorcerer's motivations, and Jake and Sky don't fully understand how IP Addresses work. http://popculturefailure.podomatic.com popculturefailure@gmail.comShow: @FailedPopCultur Jake: @mdwstlvaffr Sky: @sandwichsurplus
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
The Risk of Authenticated Vulnerability Scans https://isc.sans.edu/forums/diary/The+Risk+of+Authenticated+Vulnerability+Scans/24942/ ARIN Revokes about 735,000 IP Addresses https://www.arin.net/vault/about_us/media/releases/20190513.html More Cisco Patches (Prime Infrastructure, EPN Manager) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-rce Instrument Landing Systems Spoofing https://aanjhan.com/assets/ils_usenix2019.pdf
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
The Risk of Authenticated Vulnerability Scans https://isc.sans.edu/forums/diary/The+Risk+of+Authenticated+Vulnerability+Scans/24942/ ARIN Revokes about 735,000 IP Addresses https://www.arin.net/vault/about_us/media/releases/20190513.html More Cisco Patches (Prime Infrastructure, EPN Manager) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-rce Instrument Landing Systems Spoofing https://aanjhan.com/assets/ils_usenix2019.pdf
Buckle up guys, there's super ineffectual "zombies" ahead. Jake and Sky watch Reboot: the Guardian Code episode 12 "Zombie Army" We discuss the questionable location choices to test fly a drone, Jake tries to piece together something logical about the sorcerer's motivations, and Jake and Sky don't fully understand how IP Addresses work. http://popculturefailure.podomatic.com popculturefailure@gmail.com Show: @FailedPopCultur Jake: @mdwstlvaffr Sky: @sandwichsurplus
Imagine starting an internet company 20 years ago. Our guest today is Chris Parker, founder and CEO of WhatIsMyIPAddress.com. Eighteen years ago when the internet was a desolate place, Chris created a site that now consistently gets six million visitors per month and generates almost seven figures per year. Chris has leveraged his technical background and interests managing WhatIsMyIPAddress.com for 18 years and has turned it into a thriving business teaching people about privacy and online safety. In this episode, we discuss starting an internet business in the year 2000, running an online business today, and IP addresses. With Chris's compelling stories and expertise about IP Addresses and running an internet company, we are excited to share his story with you. The post EP063: Perspectives on Building an Internet Company with Chris Parker appeared first on KazSource.
Dorothy and I talk about IP Addresses for her new network. There are several things we have to take into consideration. The number one issue is overlapping IP space. We can't have that. We also have to plan for the future. How many subnets will she need? Will the network grow in the future? What happens if we want to connect her network with another location? These are just some of things we have to take into consideration. Planning now will save us extra work in the future.
Have you ever had to explain yourself to IT? It seemed like the IT folks, were blocking you at every turn. Why do you need IP addresses? Why do you need to put your devices on our network? Why do your addresses need to be static? Every day these questions plague BAS professionals. One false move and the IT group will withdraw and block you from achieving your goals. In this week's episode of the Building Automation Monthly Podcast, we will be discussing how to deal with these exact issues. This episode will cover: What IP addressing is and why it matters to BAS professionals The common challenges you will get from IT professionals and how to overcome them What the three most common IP controls architectures are and when you should use each one Why the deep study of IT networking is actually hurting your BAS career and what to do instead IP Addresses and IP BAS Controls A real-world IT issue faced by one of our students and how they resolved it (1:35) The importance of having IP knowledge (5:35) What exactly is the IP address and why does it matter? (6:52) How subnet ranges and IP addresses work together (9:55) The very important reason for understanding how to calculate IP addresses (12:02) Two types of IP addresses and when to use each one (14:30) How to deal with IT folks who don't want to give you static IP addresses (16:00) How broadcasts and default gateways make BAS networks work (19:00) What are routers and how do they affect your BAS network traffic (21:04) The three major BAS IP controls architectures (26:05)
t's Wednesday, April 17th, 2018, and here's your update: A canadian teenager is facing prison for downloading unsecured files from a Nova Scotia government website 10-year old Windows freeware makes a comeback Facebook explains what data they collect on other websites Europe's data protection authorities have their sights on the WHOIS database Why Microsoft built its own custom Linux kernel Russia blocks over 16 million IP addresses And finally, Why New York City Stopped Building Subways Feedback appreciated! info@hackerdaily.co
In this episode of LIGHT TALK, the Lumen Brothers interview lighting designer and software guru, John McKernon. Join Steve, Stan, David, and John as they pontificate about The history of Lightwright, Working with Ken Billington, Stan and David in Napoli, The key to keeping a relationship with your spouse in the business, New features in Lightwright 7, Creating hookups by hand, Working as an associate on Broadway, Being in the right place at the right time, IP Addresses vs. Universes, Gary Fails and Multiverces, 6x22's on the Balcony Rail, Broadway stories with Mary Tyler Moore and Lynn Redgrave, Working on Broadway flops, The Red Shoes, You Have to Work the Room, Optimism for the next generation of lighting designers, Surprised by things that never happened, and What's the deal with the Corgis? Nothing is Taboo, Nothing is Sacred, and very little makes sense.
Doug explains the basics of how IP Addresses work, with help from Doug in an alternate dimension. Beware of the terminator! Full Show Notes: https://wiki.securityweekly.com/SDL_episode_26 Visit Our Website: https://www.securedigitallife.com
Doug explains the basics of how IP addresses work, with help from Doug in an alternate dimension. Beware of the terminator! Full Show Notes: https://wiki.securityweekly.com/SDL_episode_26 Visit Our Website: securedigitallife.com
You’re listening to Episode 34 of the Bright Planning Marketing Podcast featuring Catherine Campbell. In this must-listen show, we give you the skinny on Geo Location and Location-Based Marketing. This episode will serve as an overview for the uninitiated. If you run a local service or a retail store, and you want to increase your foot traffic, Location-Based Marketing is essential. Although about 20 percent of people want to shop online, an overwhelming percentage (60 to 70 percent) still prefer to purchase products in shops. You can capitalize on these numbers with Geo Location Marketing, because it helps you to personalize and customize your patrons’ experience based on their location. And you can even use the data you collect to determine statistics about when people are visiting your shop and so forth. But how does it work, exactly? Geo Location Marketing is based on data about a person’s physical location. This information is typically based on satellites, which provide GPS-supplied location data. And if a smartphone’s GPS is turned off, the location data is triangulated from cell phone towers. This method is a little less precise, but it can still work wonders for your marketing. There are three different ways that you can target potential customers: 1. Geo Targeting - This is the process of reaching someone based on their location. With Geo Targeting, the visitors’ IP address will be used on their smartphones. IP Addresses aren’t overly precise, but they are useful for covering broader regions, like an entire state or city or a country. 2. Geo Fencing - This method helps to draw an invisible fence around your user or your shop to cover a particular neighborhood or a block. Geo Fencing uses the customers’ GPS location (rather than their IP address). This method updates in real time, even when the person is walking around! Geo Fencing is the next advanced step that you can take to make your mobile campaigns more refined. 3. Beacons - The third method, Beacons, are small, physical objects that receive location data from Bluetooth using nearby devices. Beacons are useful for any area that has poor cell phone reception. The data you can get from a Beacon will tell you exactly where the customers are inside your store! The only problem is, your customers’ Bluetooth signal must be turned on (and this isn’t always the case). In order to take advantage of Geo Location and Location-Based Marketing, you must have a mobile-optimized website. And though many businesses have gotten the memo on how crucial it is to have mobile-friendly websites, many small businesses are still unfamiliar with the benefits of Geo technology. But if you can implement Location-Based Marketing with your business, you can start targeting your customers on very specific levels and help to personalize their experience. You can finally start serving the best customers that are closest to you. Join us for Episode 34 to learn more! “People are forgetting how to talk to each other and interact with one another, so millennials will prefer to consult their phone rather than ask a person to help them.” We want to hear your thoughts, reviews and more questions! LEAVE A REVIEW ON iTUNES, AND SUBSCRIBE TO GET NEW MARKETING EPISODES ON THE GO. Have a question for Catherine? Or would you like to send any special messages to Jason? E-mail us! info@brightplanning.com
IP Addresses prove nothing, Apple opens the iPhone's code up and music streaming revenue sees some serious growth. If you're listening on the go, check out munchtech.tv/mobile to find out more about our mobile applications. Enjoy the show? We'd appreciate if you could leave an iTunes rating or review to let us know!
In this episode of the Building Automation Monthly podcast I discuss everything you could want to know about IP addresses. Specifically I dive into the topics of: What is an IP Address? What is a Sub-Net What is the Domain Name System (DNS) What is the Dynamic Host Configuration Protocol (DHCP) What is a Static and Dynamic IP Address
The guys bust the myth that you need to put your sites on separate IP addresses.
Can your internet address be protected under privacy law? We talk to the leader of the EU's privacy watchdogs about the controversial question. Plus we hear how social networking sites are failing disabled users.
The Internet: How it works Who manages and pays for the Internet How do the Internet'snetworking components interact What data transmissions and protocols are used IP Addresses and Domain Names Running time: 1:09:23 Listen To The Mp3 Here! This lecture was given on November 14, 2006