Family of free and open-source software operating systems based on the Linux kernel
POPULARITY
Categories
First up is a technical segment called "Paul's Linux Hacks". I finally got around to releasing a bunch of scripts and tutorials for Linux that I've created over the years. We'll go over scripts that can give you a supply chain security report and help you update your Arch-based Linux systems and the tutorial for using Linux KVM/Qemu/Libvirt. Repo is here: https://github.com/pasadoorian/Linux_Hacks Next up is the security news: Controlling 7,000 robot vacuums Curl finds not all AI is bad Palo Alto says "These are not the ties to China you were looking for" Bloomberg writes an article that sheds light on Ivanti Looking for BLE is a trend Don't use AI to generate you passwords New research on hacking Samsung TVs Its not all about gadgets Ring's new bug bounty Paul will be voted in as Prime Minister of Denmark? Hacking AI, AI does some hacking, and hackers are talking about AI Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-915
ETH Zurich's deep-dive into the world's top password managers exposes how feature overload and legacy design obscure real security flaws, forcing a rethink of what "zero knowledge" actually means for your vault. Learn why recent fixes matter—and why open source may be your safest bet. CA's warn us to urgently prepare for the inevitable. Three U.S. states attempt to ban 3D printed firearms. Denied ransom, ShinyHunters leaks 967,000 personal details. "Billions" of U.S. social security numbers leaked. Is Apple planning to add cameras to three new gadgets. No more security fixes for Firefox on Windows 7 & 8. Russia blocks the official Linux kernel site they need. Will the U.S."freedom.gov" site post EU blocked content. LLM's will offer secure passwords. Do Not Use Them. As predicted, the "ClickFix" attack strategy takes over. A listener believes his computer is compromised. How could three popular password managers get things wrong. Show Notes - https://www.grc.com/sn/SN-1066-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: guardsquare.com bitwarden.com/twit zscaler.com/security hoxhunt.com/securitynow material.security
ETH Zurich's deep-dive into the world's top password managers exposes how feature overload and legacy design obscure real security flaws, forcing a rethink of what "zero knowledge" actually means for your vault. Learn why recent fixes matter—and why open source may be your safest bet. CA's warn us to urgently prepare for the inevitable. Three U.S. states attempt to ban 3D printed firearms. Denied ransom, ShinyHunters leaks 967,000 personal details. "Billions" of U.S. social security numbers leaked. Is Apple planning to add cameras to three new gadgets. No more security fixes for Firefox on Windows 7 & 8. Russia blocks the official Linux kernel site they need. Will the U.S."freedom.gov" site post EU blocked content. LLM's will offer secure passwords. Do Not Use Them. As predicted, the "ClickFix" attack strategy takes over. A listener believes his computer is compromised. How could three popular password managers get things wrong. Show Notes - https://www.grc.com/sn/SN-1066-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: guardsquare.com bitwarden.com/twit zscaler.com/security hoxhunt.com/securitynow material.security
ETH Zurich's deep-dive into the world's top password managers exposes how feature overload and legacy design obscure real security flaws, forcing a rethink of what "zero knowledge" actually means for your vault. Learn why recent fixes matter—and why open source may be your safest bet. CA's warn us to urgently prepare for the inevitable. Three U.S. states attempt to ban 3D printed firearms. Denied ransom, ShinyHunters leaks 967,000 personal details. "Billions" of U.S. social security numbers leaked. Is Apple planning to add cameras to three new gadgets. No more security fixes for Firefox on Windows 7 & 8. Russia blocks the official Linux kernel site they need. Will the U.S."freedom.gov" site post EU blocked content. LLM's will offer secure passwords. Do Not Use Them. As predicted, the "ClickFix" attack strategy takes over. A listener believes his computer is compromised. How could three popular password managers get things wrong. Show Notes - https://www.grc.com/sn/SN-1066-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: guardsquare.com bitwarden.com/twit zscaler.com/security hoxhunt.com/securitynow material.security
ETH Zurich's deep-dive into the world's top password managers exposes how feature overload and legacy design obscure real security flaws, forcing a rethink of what "zero knowledge" actually means for your vault. Learn why recent fixes matter—and why open source may be your safest bet. CA's warn us to urgently prepare for the inevitable. Three U.S. states attempt to ban 3D printed firearms. Denied ransom, ShinyHunters leaks 967,000 personal details. "Billions" of U.S. social security numbers leaked. Is Apple planning to add cameras to three new gadgets. No more security fixes for Firefox on Windows 7 & 8. Russia blocks the official Linux kernel site they need. Will the U.S."freedom.gov" site post EU blocked content. LLM's will offer secure passwords. Do Not Use Them. As predicted, the "ClickFix" attack strategy takes over. A listener believes his computer is compromised. How could three popular password managers get things wrong. Show Notes - https://www.grc.com/sn/SN-1066-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: guardsquare.com bitwarden.com/twit zscaler.com/security hoxhunt.com/securitynow material.security
ETH Zurich's deep-dive into the world's top password managers exposes how feature overload and legacy design obscure real security flaws, forcing a rethink of what "zero knowledge" actually means for your vault. Learn why recent fixes matter—and why open source may be your safest bet. CA's warn us to urgently prepare for the inevitable. Three U.S. states attempt to ban 3D printed firearms. Denied ransom, ShinyHunters leaks 967,000 personal details. "Billions" of U.S. social security numbers leaked. Is Apple planning to add cameras to three new gadgets. No more security fixes for Firefox on Windows 7 & 8. Russia blocks the official Linux kernel site they need. Will the U.S."freedom.gov" site post EU blocked content. LLM's will offer secure passwords. Do Not Use Them. As predicted, the "ClickFix" attack strategy takes over. A listener believes his computer is compromised. How could three popular password managers get things wrong. Show Notes - https://www.grc.com/sn/SN-1066-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: guardsquare.com bitwarden.com/twit zscaler.com/security hoxhunt.com/securitynow material.security
ETH Zurich's deep-dive into the world's top password managers exposes how feature overload and legacy design obscure real security flaws, forcing a rethink of what "zero knowledge" actually means for your vault. Learn why recent fixes matter—and why open source may be your safest bet. CA's warn us to urgently prepare for the inevitable. Three U.S. states attempt to ban 3D printed firearms. Denied ransom, ShinyHunters leaks 967,000 personal details. "Billions" of U.S. social security numbers leaked. Is Apple planning to add cameras to three new gadgets. No more security fixes for Firefox on Windows 7 & 8. Russia blocks the official Linux kernel site they need. Will the U.S."freedom.gov" site post EU blocked content. LLM's will offer secure passwords. Do Not Use Them. As predicted, the "ClickFix" attack strategy takes over. A listener believes his computer is compromised. How could three popular password managers get things wrong. Show Notes - https://www.grc.com/sn/SN-1066-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: guardsquare.com bitwarden.com/twit zscaler.com/security hoxhunt.com/securitynow material.security
In this Confab, Max sit down with Kevin Loaec, CEO of WizardSardine, for a frank discussion on the surge in coordinated, violent Bitcoin-related kidnappings in France and broader personal security lessons for anyone holding wealth. They explore practical, non-technical measures—community awareness, operational silence, modest living, and physical deterrents—alongside technical defences that reduce attacker incentives. Kevin explains why the threat was “late but inevitable,” how societal factors may be fuelling the crime wave, and why relocation and strong local networks can matter as much as any wallet setup.Max and Kevin discuss Liana, WizardSardine's time-locked, Taproot-powered wallet. Kevin breaks down inheritance-first design, decaying/expanding policies, and how time locks can prevent premature access while enabling robust recovery for families and businesses—without revealing recovery paths on-chain. They cover miniscript device support (what works today and what's missing), fee/UX trade-offs, future payjoin integrations, and how to pair Liana with spending wallets or Lightning for better privacy. If you've ever worried about $5 wrench attacks, estate planning, or operational resilience, this one's essential listening.HELP GET SAMOURAI A PARDONSIGN THE PETITION ----> https://www.change.org/p/stand-up-for-freedom-pardon-the-innocent-coders-jailed-for-building-privacy-tools DONATE TO THE FAMILIES ----> https://www.givesendgo.com/billandkeonneSUPPORT ON SOCIAL MEDIA ---> https://billandkeonne.org/VALUE FOR VALUEThanks for listening you Ungovernable Misfits, we appreciate your continued support and hope you enjoy the shows.You can support this episode using your time, talent or treasure.TIME:- create fountain clips for the show- create a meetup- help boost the signal on social mediaTALENT:- create ungovernable misfit inspired art, animation or music- design or implement some software that can make the podcast better- use whatever talents you have to make a contribution to the show!TREASURE:- BOOST IT OR STREAM SATS on the Podcasting 2.0 apps @ https://podcastapps.com- DONATE via Monero @ https://xmrchat.com/ugmf- BUY SOME STICKERS @ https://www.ungovernablemisfits.com/shop/FOUNDATIONhttps://foundation.xyz/ungovernableFoundation builds Bitcoin-centric tools that empower you to reclaim your digital sovereignty.As a sovereign computing company, Foundation is the antithesis of today's tech conglomerates. Returning to cypherpunk principles, they build open source technology that “can't be evil”.Thank you Foundation Devices for sponsoring the show!Use code: Ungovernable for $10 off of your purchaseCAKE WALLEThttps://cakewallet.comCake Wallet is an open-source, non-custodial wallet available on Android, iOS, macOS, and Linux.Features:- Built-in Exchange: Swap easily between Bitcoin and Monero.- User-Friendly: Simple interface for all users.Monero Users:- Batch Transactions: Send multiple payments at once.- Faster Syncing: Optimized syncing via specified restore heights- Proxy Support: Enhance privacy with proxy node options.Bitcoin Users:- Coin Control: Manage your transactions effectively.- Silent Payments: Static bitcoin addresses- Batch Transactions: Streamline your payment process.Thank you Cake Wallet for sponsoring the show!MYNYMBOXhttps://mynymbox.ioYour go-to for anonymous server hosting solutions, featuring: virtual private & dedicated servers, domain registration and DNS parking. We don't require any of your personal information, and you can purchase using Bitcoin, Lightning, Monero and many other cryptos.Explore benefits such as No KYC, complete privacy & security, and human support.(00:00) INTRO(01:20) THANK YOU FOUNDATION(02:11) THANK YOU CAKE WALLET(02:52) THANK YOU MYNYMBOX(03:36) Kicking Off With Kevin(09:21) Non-Technical Wealth Defense(16:18) Why France?(26:31) Designing Deterrence(30:51) Liana Deep Dive(44:03) Miniscript Musings(53:36) BOOSTS
ETH Zurich's deep-dive into the world's top password managers exposes how feature overload and legacy design obscure real security flaws, forcing a rethink of what "zero knowledge" actually means for your vault. Learn why recent fixes matter—and why open source may be your safest bet. CA's warn us to urgently prepare for the inevitable. Three U.S. states attempt to ban 3D printed firearms. Denied ransom, ShinyHunters leaks 967,000 personal details. "Billions" of U.S. social security numbers leaked. Is Apple planning to add cameras to three new gadgets. No more security fixes for Firefox on Windows 7 & 8. Russia blocks the official Linux kernel site they need. Will the U.S."freedom.gov" site post EU blocked content. LLM's will offer secure passwords. Do Not Use Them. As predicted, the "ClickFix" attack strategy takes over. A listener believes his computer is compromised. How could three popular password managers get things wrong. Show Notes - https://www.grc.com/sn/SN-1066-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: guardsquare.com bitwarden.com/twit zscaler.com/security hoxhunt.com/securitynow material.security
ETH Zurich's deep-dive into the world's top password managers exposes how feature overload and legacy design obscure real security flaws, forcing a rethink of what "zero knowledge" actually means for your vault. Learn why recent fixes matter—and why open source may be your safest bet. CA's warn us to urgently prepare for the inevitable. Three U.S. states attempt to ban 3D printed firearms. Denied ransom, ShinyHunters leaks 967,000 personal details. "Billions" of U.S. social security numbers leaked. Is Apple planning to add cameras to three new gadgets. No more security fixes for Firefox on Windows 7 & 8. Russia blocks the official Linux kernel site they need. Will the U.S."freedom.gov" site post EU blocked content. LLM's will offer secure passwords. Do Not Use Them. As predicted, the "ClickFix" attack strategy takes over. A listener believes his computer is compromised. How could three popular password managers get things wrong. Show Notes - https://www.grc.com/sn/SN-1066-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: guardsquare.com bitwarden.com/twit zscaler.com/security hoxhunt.com/securitynow material.security
Discord’s new age gating policy might be a real opportunity for open source but it’s not clear that we have anything that can compete, the complex and bizarre tale of an AI agent writing a blog post attacking a FOSS maintainer, why we lost some trust in a major tech publication, the Firefox AI kill switch arrives, and a quick KDE Korner. News Piss up at The Shipwrights Arms (just next to London Bridge station) on Saturday 27th June from 6pm until late Discord Launches Teen-by-Default Settings Globally Discord Voluntarily Pushes Mandatory Age Verification Despite Recent Data Breach Hackers Expose Age-Verification Software Powering Surveillance Web I Verified My LinkedIn Identity. Here’s What I Actually Handed Over. An AI Agent Published a Hit Piece on Me An AI Agent Published a Hit Piece on Me – More Things Have Happened An AI Agent Published a Hit Piece on Me – Forensics and More Fallout An AI Agent Published a Hit Piece on Me – The Operator Came Forward The obnoxious GitHub OpenClaw AI bot is … a crypto bro Editor's Note: Retraction of article containing fabricated quotations Sorry all this is my fault Firefox 148 Now Available With The New AI Controls / AI Kill Switches KDE Korner 4 A quick anti-FUD FAQ to debunk “the KDE is forcing systemd!” hoax KDE endorses the UN’s Open Source Principles Plasma 6.6 Automox Turnkey Results Endpoint management tailored to your specific environment. Know the plan. Trust the result. Learn more at www.automox.com Support us on patreon and get an ad-free RSS feed with early episodes sometimes See our contact page for ways to get in touch. RSS: Subscribe to the RSS feeds here
Discord’s new age gating policy might be a real opportunity for open source but it’s not clear that we have anything that can compete, the complex and bizarre tale of an AI agent writing a blog post attacking a FOSS maintainer, why we lost some trust in a major tech publication, the Firefox AI kill switch arrives, and a quick KDE Korner. News Piss up at The Shipwrights Arms (just next to London Bridge station) on Saturday 27th June from 6pm until late Discord Launches Teen-by-Default Settings Globally Discord Voluntarily Pushes Mandatory Age Verification Despite Recent Data Breach Hackers Expose Age-Verification Software Powering Surveillance Web I Verified My LinkedIn Identity. Here’s What I Actually Handed Over. An AI Agent Published a Hit Piece on Me An AI Agent Published a Hit Piece on Me – More Things Have Happened An AI Agent Published a Hit Piece on Me – Forensics and More Fallout An AI Agent Published a Hit Piece on Me – The Operator Came Forward The obnoxious GitHub OpenClaw AI bot is … a crypto bro Editor's Note: Retraction of article containing fabricated quotations Sorry all this is my fault Firefox 148 Now Available With The New AI Controls / AI Kill Switches KDE Korner 4 A quick anti-FUD FAQ to debunk “the KDE is forcing systemd!” hoax KDE endorses the UN’s Open Source Principles Plasma 6.6 Automox Turnkey Results Endpoint management tailored to your specific environment. Know the plan. Trust the result. Learn more at www.automox.com Support us on patreon and get an ad-free RSS feed with early episodes sometimes See our contact page for ways to get in touch. RSS: Subscribe to the RSS feeds here
In this episode, hosts Lois Houston and Nikita Abraham are joined by special guests Samvit Mishra and Rashmi Panda for an in-depth discussion on security and migration with Oracle Database@AWS. Samvit shares essential security best practices, compliance guidance, and data protection mechanisms to safeguard Oracle databases in AWS, while Rashmi walks through Oracle's powerful Zero-Downtime Migration (ZDM) tool, explaining how to achieve seamless, reliable migrations with minimal disruption. Oracle Database@AWS Architect Professional: https://mylearn.oracle.com/ou/course/oracle-databaseaws-architect-professional/155574 Oracle University Learning Community: https://education.oracle.com/ou-community LinkedIn: https://www.linkedin.com/showcase/oracle-university/ X: https://x.com/Oracle_Edu Special thanks to Arijit Ghosh, Anna Hulkower, Kris-Ann Nansen, Radhika Banka, and the OU Studio Team for helping us create this episode. ------------------------------------------------------------- Episode Transcript: 00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:26 Nikita: Welcome to the Oracle University Podcast! I'm Nikita Abraham, Team Lead: Editorial Services with Oracle University, and with me is Lois Houston, Director of Communications and Adoption with Customer Success Services. Lois: Hello again! We're continuing our discussion on Oracle Database@AWS and in today's episode, we're going to talk about the aspects of security and migration with two special guests: Samvit Mishra and Rashmi Panda. Samvit is a Senior Manager and Rashmi is a Senior Principal Database Instructor. 00:59 Nikita: Hi Samvit and Rashmi! Samvit, let's begin with you. What are the recommended security best practices and data protection mechanisms for Oracle Database@AWS? Samvit: Instead of everyone using the root account, which has full access, we create individual users with AWS, IAM, Identity Center, or IAM service. And in addition, you must use multi-factor authentication. So basically, as an example, you need a password and a temporary code from virtual MFA app to log in to the console. Always use SSL or TLS to communicate with AWS services. This ensures data in transit is encrypted. Without TLS, the sensitive information like credentials or database queries can be intercepted. AWS CloudTrail records every action taken in your AWS account-- who did what, when, and from where. This helps with audit, troubleshooting, and detecting suspicious activity. So you must set up API and user activity logging with AWS CloudTrail. Use AWS encryption solutions along with all default security controls within AWS services. To store and manage keys by using transparent data encryption, which is enabled by default, Oracle Database@AWS uses OCI vaults. Currently, Oracle Database@AWS doesn't support the AWS Key Management Service. You should also use advanced managed security services such as Amazon Macie, which assists in discovering and securing sensitive data that is stored in Amazon S3. 03:08 Lois: And how does Oracle Database@AWS deliver strong security and compliance? Samvit: Oracle Database@AWS enforces transparent data encryption for all data at REST, ensuring stored information is always protected. Data in transit is secured using SSL and Native Network Encryption, providing end-to-end confidentiality. Oracle Database@AWS also uses OCI Vault for centralized and secure key management. This allows organizations to manage encryption keys with fine-grained control, rotation policies, and audit capabilities to ensure compliance with regulatory standards. At the database level, Oracle Database@AWS supports unified auditing and fine-grained auditing to track user activity and sensitive operations. At the resource level, AWS CloudTrail and OCI audit service provide comprehensive visibility into API calls and configuration changes. At the database level, security is enforced using database access control lists and Database Firewall to restrict unauthorized connections. At the VPC level, network ACLs and security groups provide layered network isolation and access control. Again, at the database level, Oracle Database@AWS enforces access controls to Database Vault, Virtual Private Database, and row-level security to prevent unauthorized access to sensitive data. And at a resource level, AWS IAM policies, groups, and roles manage user permissions with the fine-grained control. 05:27 Lois Samvit, what steps should users be taking to keep their databases secure? Samvit: Security is not a single feature but a layered approach covering user access, permissions, encryption, patching, and monitoring. The first step is controlling who can access your database and how they connect. At the user level, strong password policies ensure only authorized users can login. And at the network level, private subnets and network security group allow you to isolate database traffic and restrict access to trusted applications only. One of the most critical risks is accidental or unauthorized deletion of database resources. To mitigate this, grant delete permissions only to a minimal set of administrators. This reduces the risk of downtime caused by human error or malicious activity. Encryption ensures that even if the data is exposed, it cannot be read. By default, all databases in OCI are encrypted using transparent data encryption. For migrated databases, you must verify encryption is enabled and active. Best practice is to rotate the transparent data encryption master key every 90 days or less to maintain compliance and limit exposure in case of key compromise. Unpatched databases are one of the most common entry points for attackers. Always apply Oracle critical patch updates on schedule. This mitigates known vulnerabilities and ensures your environment remains protected against emerging threats. 07:33 Nikita: Beyond what users can do, are there any built-in features or tools from Oracle that really help with database security? Samvit: Beyond the basics, Oracle provides powerful database security tools. Features like data masking allow you to protect sensitive information in non-production environments. Auditing helps you monitor database activity and detect anomalies or unauthorized access. Oracle Data Safe is a managed service that takes database security to the next level. It can access your database configuration for weaknesses. It can also detect risky user accounts and privileges, identify and classify sensitive data. It can also implement controls such as masking to protect that data. And it can also continuously audit user activity to ensure compliance and accountability. Now, transparent data encryption enables you to encrypt sensitive data that you store in tables and tablespaces. It also enables you to encrypt database backups. After the data is encrypted, this data is transparently decrypted for authorized users or applications when they access that data. You can configure OCI Vault as a part of the transparent data encryption implementation. This enables you to centrally manage keystore in your enterprise. So OCI Vault gives centralized control over encryption keys, including key rotation and customer managed keys. 09:23 Lois: So obviously, lots of companies have to follow strict regulations. How does Oracle Database@AWS help customers with compliance? Samvit: Oracle Database@AWS has achieved a broad and rigorous set of compliance certifications. The service supports SOC 1, SOC 2, and SOC 3, as well as HIPAA for health care data protection. If we talk about SOC 1, that basically covers internal controls for financial statements and reporting. SOC 2 covers internal controls for security, confidentiality, processing integrity, privacy, and availability. SOC 3 covers SOC 2 results tailored for a general audience. And HIPAA is a federal law that protects patients' health information and ensures its confidentiality, integrity, and availability. It also holds certifications and attestations such as CSA STAR, C5. Now C5 is a German government standard that verifies cloud providers meet strict security and compliance requirements. CSA STAR attestation is an independent third-party audit of cloud security controls. CSA STAR certification also validates a cloud provider's security posture against CSA's cloud controls matrix. And HDS is a French certification that ensures cloud providers meet stringent requirements for hosting and protecting health care data. Oracle Database@AWS also holds ISO and IEC standards. You can also see PCI DSS, which is basically for payment card security and HITRUST, which is for high assurance health care framework. So, these certifications ensure that Oracle Database@AWS not only adheres to best practices in security and privacy, but also provides customers with assurance that their workloads align with globally recognized compliance regimes. 11:47 Nikita: Thank you, Samvit. Now Rashmi, can you walk us through Oracle's migration solution that helps teams move to OCI Database Services? Rashmi: Oracle Zero-Downtime Migration is a robust and flexible end-to-end database migration solution that can completely automate and streamline the migration of Oracle databases. With bare minimum inputs from you, it can orchestrate and execute the entire migration task, virtually needing no manual effort from you. And the best part is you can use this tool for free to migrate your source Oracle databases to OCI Oracle Database Services faster and reliably, eliminating the chances of human errors. You can migrate individual databases or migrate an entire fleet of databases in parallel. 12:34 Nikita: Ok. For someone planning a migration with ZDM, are there any key points they should keep in mind? Rashmi: When migrating using ZDM, your source databases may require minimal downtime up to 15 minutes or no downtime at all, depending upon the scenario. It is built with the principles of Oracle maximum availability architecture and leverages technologies like Oracle GoldenGate and Oracle Data Guard to achieve high availability and online migration workflow using Oracle migration methods like RMAN, Data Pump, and Database Links. Depending on the migration requirement, ZDM provides different migration method options. It can be logical or physical migration in an online or offline mode. Under the hood, it utilizes the different database migration technologies to perform the migration. 13:23 Lois: Can you give us an example of this? Rashmi: When you are migrating a mission critical production database, you can use the logical online migration method. And when you are migrating a development database, you can simply choose the physical offline migration method. As part of the migration job, you can perform database upgrades or convert your database to multitenant architecture. ZDM offers greater flexibility and automation in performing the database migration. You can customize workflow by adding pre or postrun scripts as part of the workflow. Run prechecks to check for possible failures that may arise during migration and fix them. Audit migration jobs activity and user actions. Control the execution like schedule a job pause, resume, if needed, suspend and resume the job, schedule the job or terminate a running job. You can even rerun a job from failure point and other such capabilities. 14:13 Lois: And what kind of migration scenarios does ZDM support? Rashmi: The minimum version of your source Oracle Database must be 11.2.0.4 and above. For lower versions, you will have to first upgrade to at least 11.2.0.4. You can migrate Oracle databases that may be of the Standard or Enterprise edition. ZDM supports migration of Oracle databases, which may be a single-instance, or RAC One Node, or RAC databases. It can migrate on Unix platforms like Linux, Oracle Solaris, and AIX. For Oracle databases on AIX and Oracle Solaris platform, ZDM uses logical migration method. But if the source platform is Linux, it can use both physical and logical migration method. You can use ZDM to migrate databases that may be on premises, or in third-party cloud, or even within Oracle Cloud Infrastructure. ZDM leverages Oracle technologies like RMAN datacom, Database Links, Data Guard, Oracle GoldenGate when choosing a specific migration workflow. 15:15 Are you ready to revolutionize the way you work? Discover a wide range of Oracle AI Database courses that help you master the latest AI-powered tools and boost your career prospects. Start learning today at mylearn.oracle.com. 15:35 Nikita: Welcome back! Rashmi, before someone starts using ZDM, is there any prep work they should do or things they need to set up first? Rashmi: Working with ZDM needs few simple configuration. Zero-downtime migration provides a command line interface to run your migration job. First, you have to download the ZDM binary, preferably download from my Oracle Support, where you can get the binary with the latest updates. Set up and configure the binary by following the instructions available at the same invoice node. The host in which ZDM is installed and configured is called the zero-downtime migration service host. The host has to be Oracle Linux version 7 or 8, or it can be RCL 8. Next is the orchestration step where connection to the source and target is configured and tested like SSH configuration with source and target, opening the ports in respective destinations, creation of dump destination, granting required database privileges. Prepare the response file with parameter values that define the workflow that ZDM should use during Oracle Database migration. You can also customize the migration workflow using the response file. You can plug in run scripts to be executed before or after a specific phase of the migration job. These customizations are called custom plugins with user actions. Your sources may be hosted on-premises or OCI-managed database services, or even third-party cloud. They may be Oracle Database Standard or Enterprise edition and on accelerator infrastructure or a standard compute. The target can be of the same type as the source. But additionally, ZDM supports migration to multicloud deployments on Oracle Database@Azure, Oracle Database@Google Cloud, and Oracle Database@AWS. You begin with a migration strategy where you list the different databases that can be migrated, classification of the databases, grouping them, performing three migration checks like dependencies, downtime requirement versions, and preparing the order migration, the target migration environment, et cetera. 17:27 Lois: What migration methods and technologies does ZDM rely on to complete the move? Rashmi: There are primarily two types of migration: physical or logical. Physical migration pertains to copy of the database OS blocks to the target database, whereas in logical migration, it involves copying of the logical elements of the database like metadata and data. Each of these migration methods can be executed when the database is online or offline. In online mode, migration is performed simultaneously while the changes are in progress in the source database. While in offline mode, all changes to the source database is frozen. For physical offline migration, it uses backup and restore technique, while with the physical online, it creates a physical standby using backup and restore, and then performing a switchover once the standby is in sync with the source database. For logical offline migration, it exports and imports database metadata and data into the target database, while in logical online migration, it is a combination of export and import operation, followed by apply of incremental updates from the source to the target database. The physical or logical offline migration method is used when the source database of the application can allow some downtime for the migration. The physical or logical online migration approach is ideal for scenarios where any downtime for the source database can badly affect critical applications. The only downtime that can be tolerated by the application is only during the application connection switchover to the migrated database. One other advantage is ZDM can migrate one or a fleet of Oracle databases by executing multiple jobs in parallel, where each job workflow can be customized to a specific database need. It can perform physical or logical migration of your Oracle databases. And whether it should be performed online or offline depends on the downtime that can be approved by business. 19:13 Nikita: Samvit and Rashmi, thanks for joining us today. Lois: Yeah, it's been great to have you both. If you want to dive deeper into the topics we covered today, go to mylearn.oracle.com and search for the Oracle Database@AWS Architect Professional course. Until next time, this is Lois Houston… Nikita: And Nikita Abraham, signing off! 19:35 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.
Áthágja az univerzum eddig biztosnak hitt szabályait egy űrbeli objektum Vége lehet az éghajlati korszaknak, amiben felvirágzott az emberi civilizáció, és ez is a klímaváltozás miatt van Aranykincsekkel teli sírt fedeztek fel Panamában Ez lesz a jövő? Így működik a telefonkészülék-előfizetés a Samsungnál Egy friss tanulmány szerint gyakoribbak a rákos halálesetek az atomerőművek közelében Itt van a Linux 7.0 - és ezek a legfőbb fejlesztések és újdonságok benne MBH-leállás: ezeket a szolgáltatásokat érinti Meglepő felfedezés: az erdők jobban védenek az árvizektől, mint hittük! Ezzel a trükkel csalta csapdába a férfiakat egy gyilkos nő A ChatGpt már tavaly júniusban észlelte, hogy a kanadai iskolai lövöldöző készülhet valamire AI-képpel próbálta lejáratni a Tisza Pártot, de ott maradt a vízjel A további adásainkat keresd a podcast.hirstart.hu oldalunkon. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
In dieser Sightviews-Folge stellt Aleksander vom BIT-Zentrum München das BT Speak vor. Dabei handelt es sich um einen Braille-Eingabecomputer mit Sprachausgabe, der das klassische Braille-'n-Speak-Konzept der 1980er Jahre in moderner Form wieder aufgreift. Aleksander zeichnet zunächst die historische Entwicklung der Gerätefamilie von Blazie Engineering nach und zeigt, wie das heutige BT Speak daraus hervorgegangen ist. Anschließend gibt er einen kompakten Praxisüberblick über Aufbau, Bedienkonzept und Softwarebasis des Geräts, das heute als Linux-System mit Braille-Tastatur umgesetzt ist. Das BT Speak ist in Deutschland derzeit nur schwer erhältlich, da der Vertrieb ausschließlich direkt aus den USA erfolgt. Die Vorstellung versteht sich daher ausdrücklich nicht als ausführlicher Test, sondern als Überblick über ein Nischenprodukt, das vor allem für technikaffine Nutzer mit Interesse am klassischen Braille-'n-Speak-Workflow spannend sein könnte.
Áthágja az univerzum eddig biztosnak hitt szabályait egy űrbeli objektum Vége lehet az éghajlati korszaknak, amiben felvirágzott az emberi civilizáció, és ez is a klímaváltozás miatt van Aranykincsekkel teli sírt fedeztek fel Panamában Ez lesz a jövő? Így működik a telefonkészülék-előfizetés a Samsungnál Egy friss tanulmány szerint gyakoribbak a rákos halálesetek az atomerőművek közelében Itt van a Linux 7.0 - és ezek a legfőbb fejlesztések és újdonságok benne MBH-leállás: ezeket a szolgáltatásokat érinti Meglepő felfedezés: az erdők jobban védenek az árvizektől, mint hittük! Ezzel a trükkel csalta csapdába a férfiakat egy gyilkos nő A ChatGpt már tavaly júniusban észlelte, hogy a kanadai iskolai lövöldöző készülhet valamire AI-képpel próbálta lejáratni a Tisza Pártot, de ott maradt a vízjel A további adásainkat keresd a podcast.hirstart.hu oldalunkon. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
¿Es Python siempre la mejor opción para tus scripts de automatización? En este episodio, Lorenzo profundiza en una de las discusiones más recurrentes de la comunidad: la estabilidad de los scripts frente a la comodidad de los módulos de terceros. Acompaña a nuestro experto en Linux mientras desglosa los motivos que lo llevaron a abandonar soluciones basadas en Python para la gestión de metadatos de audio.Descubre ID3CLI, una herramienta potente y ligera escrita en Rust que soluciona los problemas de retrocompatibilidad y fallos en tiempo de ejecución. Aprenderás cómo automatizar el etiquetado de tus podcasts extrayendo datos directamente de archivos Markdown, eliminando la necesidad de introducir información manualmente en herramientas gráficas. Analizamos la importancia de tener binarios compilados que simplemente "funcionan", permitiéndote centrarte en crear contenido en lugar de arreglar herramientas rotas.Temas destacados del episodio: Bash vs Python: ¿Cuándo el "follón" de compilar merece la pena? Los peligros de depender de módulos de terceros que cambian sin previo aviso. De EasyTag a la automatización total en la terminal. Uso de Front Matter y RipGrep para un flujo de trabajo eficiente. Soporte de metadatos para Apple y carátulas en múltiples formatos. Capítulos,00:00:00 Introducción: El dilema de Bash vs Python00:00:48 El riesgo de las dependencias de terceros en Python00:01:35 La obsesión por la automatización de metadatos00:03:01 Flujo de trabajo: De EasyTag a la Terminal00:05:36 Extrayendo datos del Front Matter en Markdown00:07:24 Herramientas antiguas: ID3 y MiD3v2 (Mutagen)00:09:12 El colapso de los módulos y la necesidad de compilar00:10:13 Presentando ID3CLI: La solución definitiva en Rust00:11:53 Características técnicas y soporte de formatos (MP3, OGG, FLAC)00:13:48 Integración de ID3CLI en scripts de automatización00:15:23 Reflexión sobre la importancia de los metadatos00:16:42 Nuevo proyecto: El podcast "La Era de las Distros"00:17:47 Comunidad y cierre del episodioAdemás, Lorenzo nos habla sobre su nuevo podcast "La Era de las Distros", una mirada necesaria a las distribuciones Linux que marcaron un hito en la informática española como LinEx o Guadalex. ¡Disfruta del episodio y optimiza tu entorno Linux!Más información y enlaces en las notas del episodio
Dočkáme se Windows 12? A vlastně – zajímá to ještě někoho? Není verzování operačních systémů už stejně abstraktní a nic neříkající záležitost jako číslování webových prohlížečů? Ať jsou Windows klidně jaká jsou, ale hlavně bez věčných chyb. A tady Redmond stále selhává. Možná by všem pomohlo, kdyby z nich Microsoft udělal POSIX-like OS. Ideálně Linux. Jistě, byla by to revoluce, bylo by to zpočátku extrémně těžké, ale výhledově by to dávalo ekonomický smysl, když dnes firmu živí hlavně Azure a podnikové aplikace. Tomáš do redakce přivezl kapesní AI superpočítač Nvidia DGX Spark a Kuba jej hned zabavil. Řekneme si, k čemu taková mašinka vlastně je. Tak třeba na ní rozjedete svobodný velký jazykový model GPT-OSS-20B od OpenAI s dvaceti miliardami parametrů, aniž byste propálili výplatu za elektřinu. Má to jen jeden háček. Tahle legrace stojí sto tisíc. Program pořadu 00:29 Bude Windows 12?12:06 Nvidia DGX Spark23:21 Windows na Linuxu
This week we cover an Immutable Gentoo-derived distro, the release of KDE 6.6, Blender 5.1 and PipeWire 1.6. Then Intel hires more Linux developers, with a very specific gaming-centric experience wishlist, and the kernel 6.19.3 minor update is out, fixing some serious issues. For tips we have whosthere for network device discovery, rate-mirrors for exploring update mirror speeds, system-ac-power for detecting power and battery state, and unzip for .zip handling. You can find the show notes at https://bit.ly/4rCL0ZK and enjoy! Host: Jonathan Bennett Co-Hosts: Jeff Massie, Rob Campbell, and Ken McDonald Download or subscribe to Untitled Linux Show at https://twit.tv/shows/untitled-linux-show Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
People often like to talk down Electron, but it is really that bad? There may be better ways to use Web technologies to make desktop apps, but isn’t having Linux versions of apps a good thing no matter how they are made? We mentioned Tauri and Wails. Support us on Patreon and get an ad-free RSS feed with early episodes sometimes See our contact page for ways to get in touch. Subscribe to the RSS feed
People often like to talk down Electron, but it is really that bad? There may be better ways to use Web technologies to make desktop apps, but isn’t having Linux versions of apps a good thing no matter how they are made? We mentioned Tauri and Wails. Support us on Patreon and get an ad-free RSS feed with early episodes sometimes See our contact page for ways to get in touch. Subscribe to the RSS feed
The fellas are back, this time to discuss if older tech like iPods and the handy notebook make sense in this high tech age. ==== Special Thanks to Our Patrons! ==== https://thelinuxcast.org/patrons/ ===== Follow us
This week we cover an Immutable Gentoo-derived distro, the release of KDE 6.6, Blender 5.1 and PipeWire 1.6. Then Intel hires more Linux developers, with a very specific gaming-centric experience wishlist, and the kernel 6.19.3 minor update is out, fixing some serious issues. For tips we have whosthere for network device discovery, rate-mirrors for exploring update mirror speeds, system-ac-power for detecting power and battery state, and unzip for .zip handling. You can find the show notes at https://bit.ly/4rCL0ZK and enjoy! Host: Jonathan Bennett Co-Hosts: Jeff Massie, Rob Campbell, and Ken McDonald Download or subscribe to Untitled Linux Show at https://twit.tv/shows/untitled-linux-show Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
Gareth and Ted look at Martial Arts Robots putting on a dsiplay before impending potential human anniliation, the Honor MagicPad 4 tablet, Samsung's MovingStyle... thing, Steam Deck woes, Linux 7.0 excitement, changes to the Google AI Plus, Pro, & Ultra packages and Ted analysises Sapphire as an Aluminium flagship. With Gareth Myles and Ted Salmon Join us on Mewe RSS Link: https://techaddicts.libsyn.com/rss Direct Download | iTunes | YouTube Music | Stitcher | Tunein | Spotify Amazon | Pocket Casts | Castbox | PodHubUK News The Samsung MovingStyle Official: New Honor MagicPad 4 tablet beats Samsung Galaxy Tab S12 series to global debut Linux 7.0 is coming, and it could be one of the biggest updates in years RAM shortage hits Valve's four-year-old Steam Deck, now available "intermittently" - Out of Stock Worldwide Scary! Martial arts robots dazzle at 2026 Spring Festival Gala Banters: Knocking out a Quick Bant 'Sapphire' isn't just an 'Aluminium' flagship: it is actually the first Chromebook Plus tablet What Gemini features you get with Google AI Plus, Pro, & Ultra Bargain Basement: Best UK deals and tech on sale we have spotted INIU Smallest Power Bank 45W Fast Charging, USB C in&out, 10000mAh Battery Pack £28 from £39 XIAOMI Smart Band 10 Fitness Tracker - £34.73 Edifier R990BT Bluetooth 5.4 Bookshelf Speakers Active Speakers, 24W, RCA/AUX/Bluetooth, App Control £60 from £100 Hisense HS3100, 3.1 CH Soundbar - £99.00 Lenovo Idea Tab Pro Android Tablet 12.7" + Pen £278 (5 x £55) from £380 Masterplug Three Socket Fused Wall Plug Adaptor - £8.49 Acer Chromebook Plus 516 16" Chromebook Plus + 12/m Gemini AI Pro (£227.88) £329 from £429 (-£227 = £102.11) ClicKid CAM20 - £9.99 + 15% off voucher Bonus - Marshall Monitor III ANC £239 from £299 Main Show URL: http://www.techaddicts.uk | PodHubUK Contact:: gareth@techaddicts.uk | @techaddictsuk Gareth - @garethmyles | Mastodon | Blusky | garethmyles.com | Gareth's Ko-Fi Ted - tedsalmon.com | Ted's PayPal | Mastodon | Ted's AmazonYouTube: Tech Addicts
In this level of Linux Out Loud, Nate takes player‑one controls with Wendy and Matt as co‑op buddies for a run‑and‑gun through data disasters, platform drama, and hopeful Linux gaming news. Matt kicks things off with a catastrophic cold‑storage failure that turns into a hard‑earned reminder about backups and the limits of data‑recovery tools on both Windows and Linux. Wendy then opens a side‑quest about Discord's upcoming age‑verification changes, why that's a problem for community privacy and moderation, and what it might mean for the future home of the Lobby of Loudness. Nate rounds out the host updates with Linux Saloon going fully independent, moving show notes and polls onto CubicleNate.com so he controls the platform and the ad dollars. For the main mission, the crew dives into GOG calling Linux its “next major frontier” for GOG GALAXY and hiring a senior C++ engineer to help make Linux a first‑class gaming citizen instead of an afterthought. Along the way they talk heroic launchers, Proton and Wine, and what a “good citizen” GOG client on Linux should actually look like for home‑labbed and multi‑PC setups. Show Links: GOG job posting – “Senior Software Engineer (C++ GOG GALAXY)”: https://www.gog.com/en/work/senior-software-engineer-c-gog-galaxy Linux Saloon show notes and polls: https://CubicleNate.com/LinuxSaloon https://CubicleNate.com/polls
A weekly live show covering all things Freedom Tech with Max, Q and Seth.HELP GET SAMOURAI A PARDONSIGN THE PETITION ----> https://www.change.org/p/stand-up-for-freedom-pardon-the-innocent-coders-jailed-for-building-privacy-tools DONATE TO THE FAMILIES ----> https://www.givesendgo.com/billandkeonneSUPPORT ON SOCIAL MEDIA ---> https://billandkeonne.org/TO DONATE TO ROMAN'S DEFENSE FUND: https://freeromanstorm.com/donateVALUE FOR VALUEThanks for listening you Ungovernable Misfits, we appreciate your continued support and hope you enjoy the shows.You can support this episode using your time, talent or treasure.TIME:- create fountain clips for the show- create a meetup- help boost the signal on social mediaTALENT:- create ungovernable misfit inspired art, animation or music- design or implement some software that can make the podcast better- use whatever talents you have to make a contribution to the show!TREASURE:- BOOST IT OR STREAM SATS on the Podcasting 2.0 apps @ https://podcastapps.com- DONATE via Monero @ https://xmrchat.com/ugmf- BUY SOME STICKERS @ https://www.ungovernablemisfits.com/shop/FOUNDATIONhttps://foundation.xyz/ungovernableFoundation builds Bitcoin-centric tools that empower you to reclaim your digital sovereignty.As a sovereign computing company, Foundation is the antithesis of today's tech conglomerates. Returning to cypherpunk principles, they build open source technology that “can't be evil”.Thank you Foundation Devices for sponsoring the show!Use code: Ungovernable for $10 off of your purchaseCAKE WALLEThttps://cakewallet.comCake Wallet is an open-source, non-custodial wallet available on Android, iOS, macOS, and Linux.Features:- Built-in Exchange: Swap easily between Bitcoin and Monero.- User-Friendly: Simple interface for all users.Monero Users:- Batch Transactions: Send multiple payments at once.- Faster Syncing: Optimized syncing via specified restore heights- Proxy Support: Enhance privacy with proxy node options.Bitcoin Users:- Coin Control: Manage your transactions effectively.- Silent Payments: Static bitcoin addresses- Batch Transactions: Streamline your payment process.Thank you Cake Wallet for sponsoring the show!MYNYMBOXhttps://mynymbox.ioYour go-to for anonymous server hosting solutions, featuring: virtual private & dedicated servers, domain registration and DNS parking. We don't require any of your personal information, and you can purchase using Bitcoin, Lightning, Monero and many other cryptos.Explore benefits such as No KYC, complete privacy & security, and human support.
Why would anyone willingly spend weeks chasing a slow query, knowing they might hit dead ends along the way? In Episode 36 of Talking Postgres, Tomas Vondra—Postgres committer and long‑time performance contributor—joins Claire to explain why hacking on Postgres performance is not just hard, but also fun. We dig into the process of investigating why queries are slow, how iteration and “wrong turns” are part of performance work, and why Tomas prefers meaningful performance puzzles over toy problems. Along the way, we talk about using benchmarks to build an understanding of a problem. Tomas also shares how even small changes in code can have outsized impact when that code is used a lot, and how the mathematics embedded in the Postgres query planner/executor makes the work especially rewarding.Previously on Talking Postgres:Talking Postgres Ep31: What went wrong (& what went right) with AIO with Andres FreundTalking Postgres Ep24: Why mentor Postgres developers with Robert HaasLinks mentioned in this episode:PGConf.dev 2026: ScheduleGitHub repo: PostgreSQL Monthly Hacking Workshop, organized by Robert Haas Nordic PGDay 2026: Tomas talk on approximating percentilesVideo of POSETTE 2025 talk: Performance Archaeology – 20 years of improvementsVideo of PGConf EU 2025 talk: Fast-path locking improvements in PG18Conference: Prague PostgreSQL Developer DayDiscord: PostgreSQL Hacking DiscordGitHub repo: tvondra/tdigestBrendan Gregg's site: perf Linux profiler examplesDocs: pgbench for running benchmarks on PostgreSQLBlog: Tomas Vondra blogPostgres Patch Ideas: List on Tomas Vondra blogCalendar invite: LIVE recording of Ep37 of Talking Postgres to happen on Wed Mar 18, 2026
In episode 105, we finally get the stream dialed and dive straight into hands‑on Bitcoin mining and open-source hardware updates. We share the latest on Ember One: a sneaky IO voltage domain bug uncovered by Mujina dev Ryan led to a desk‑side hardware fix that's now pushing ~2 TH/s (target is 3.6 TH/s across 12 chips with proper cooling). We unpack chip and hashboard design lore—from stacked voltage domains and reliability in long chains to the insider politics at big silicon shops like Intel. We talk why selling chips openly matters, how spec sheets unlock real builder momentum, and why third‑party system builders (think Epic Blockchain) can grease the skids between chipmakers and end products.We cover Mujina's trajectory toward a universal, Linux‑first, open firmware for miners—auto‑detect dreams vs config realities—and near‑term support for Ember One's Intel boards and existing Antminers. We riff on home‑miner UX, remote monitoring, and agent/LLM tooling (cron‑job‑with‑superpowers, heartbeats, MCP integrations) to tune, alert, and manage miners. There's buzz around FutureBit's Apollo 3 (likely Auradine chips), open vs lawyered licenses, and the path from FPGA teaching rigs to community‑designed ASICs. We celebrate community hashing on the 256F HydroPool hash‑dash, solo‑block wins, and Heat Punk Summit prep (immersion hot tub included). Plus, a call to action: support developer freedom at change.org/billandkeonne. It's a dense, builder‑first session on chips, firmware, agents, and bringing practical hashrate‑heat products to life.
Check Out Echoplex Radio iTunes, Stitcher, Google, iHeart, Spotify, RSS, Odysee, Twitch, YouTubeSupport This Project On Patreon Check Out Our Swag Shop Join Our Discord Server Check out our Linux powered studio! Host: Producer DaveDocket: https://bit.ly/2-15-2026-docMembers ShowFourthwallPatreon
Fanless Linux-powered digital audio workstations! Ubuntu splits its firmware into 17 packages, a native Linux client for classic World of Warcraft is available, and DaVinci Resolve runs on Ryzen AI with ROCm and AV1.Video and bonus content:https://www.patreon.com/lwdwTOPICSDavinci Resolve on the AMD Ryzen AI 9 HX 370https://interfacinglinux.com/community/streaminglinux/davinci-resolve-on-the-amd-ryzen-ai-9-hx-370-rocm-av1-aac/Silent audio workstation on Linuxhttps://interfacinglinux.com/2026/02/13/silent-pro-audio-pipewire-reaper-and-windows-vsts-on-linux/Ubuntu splitting Firmware https://www.omgubuntu.co.uk/2026/02/ubuntu-26-04-firmware-splitOpen-Source WOWhttps://interfacinglinux.com/community/linuxgaming/open-source-world-of-warcraft-linux-client/#post-988Lutris v0.5.20https://github.com/lutris/lutris/releases/tag/v0.5.20Timestamps00:00 Intro03:43 Davinci Resolve on the AMD Ryzen AI 9 HX 37009:31 A FireWire ZIP drive?14:10 Silent audio workstation on Linux17:35 Ubuntu splitting Firmware 23:45 Open-Source WOW client for Linux27:13 Lutris v0.5.20
¿Tu contenedor está realmente funcionando o es solo un proceso zombie ocupando memoria? En el episodio 772 de Atareao con Linux, te revelo los secretos para gestionar la salud de tus contenedores como un experto.Soy Lorenzo y en esta entrega nos enfocamos en Podman y los Health Checks. Si en el episodio 688 hablamos de Docker, hoy damos el salto definitivo hacia la automatización profesional en Linux utilizando Quadlets y Systemd.Lo que vas a descubrir en este audio: Detección de Zombies: Aprende a identificar procesos que parecen activos pero no responden. Dependencias Reales: Cómo configurar tu stack de WordPress, MariaDB y Redis para que arranquen en el orden correcto y solo cuando sus predecesores estén sanos. Auto-reanimación: Configura políticas de reinicio que actúan automáticamente ante fallos de salud. Notificaciones Inteligentes: Recibe alertas en Telegram o en tu escritorio cuando tus servicios cambien de estado.Este episodio es una guía práctica para cualquier persona que quiera robustecer su infraestructura de contenedores, evitando los cierres inesperados y las dependencias rotas que suelen ocurrir con herramientas tradicionales como Docker Compose.Capítulos: 00:00:00 ¿Tu contenedor está vivo o es un ZOMBIE? 00:01:44 ¿Qué es realmente un Health Check? 00:02:22 4 Ventajas de usar Health Checks 00:03:20 Implementación en Podman y Docker 00:05:20 La potencia de los Quadlets 00:08:58 Dependencias inteligentes: WordPress+MariaDB+Redis 00:11:00 Notificaciones On Success 00:13:55 Gestión de errores On Failure 00:18:21 Próximos pasos y TraefikSi disfrutas del podcast, te agradecería enormemente una valoración en Spotify o Apple Podcast. ¡Ayúdame a difundir la palabra del Open Source!Más información y enlaces en las notas del episodio
Joel works all the time now.
Neste episódio do Diocast a gente mergulhou nas distros imutáveis, aquelas que adotam raiz somente leitura para evitar os problemas clássicos durante atualizações mal-sucedidas ou configurações arriscadas. Nessas distros, como Fedora Silverblue ou Vanilla OS, você não edita diretamente os arquivos do sistema operacional; em vez disso, tudo é gerenciado por camadas seguras, como Flatpaks para aplicativos ou toolboxes para ambientes de desenvolvimento, garantindo que o core permaneça intacto e sempre consistente após cada ciclo de uso.O "pulo do gato" dessa abordagem está na atomicidade das atualizações, onde cada mudança é tratada como uma transação indivisível, tudo ou nada mesmo. Tecnologias como OSTree, usadas no Fedora Silverblue, baixam uma imagem completa do sistema (ou deltas otimizados para eficiência), que só é ativada no próximo reboot.E há diversas formas de implementar essa imutabilidade em sistemas operacionais: desde rpm-ostree e transactional-update em desktops Linux, passando por modelos em smartphones com Android, que usa partições A/B para updates atômicos, até smart TVs como o WebOS da LG, otimizado para atualizações seguras sem interromper o uso diário.---https://diolinux.com.br/podcast/distros-imutaveis-pros-e-contras.html
A China-linked group exploits a critical Dell zero-day for 18 months. A Microsoft 365 Copilot bug risks sensitive email oversharing. A new Linux botnet leans on old-school IRC for command and control. Switzerland tightens critical infrastructure rules with mandatory cyber reporting. AstarionRAT emerges as a custom post-exploitation implant. Researchers find serious flaws in popular PDF platforms. A suspected Iranian-aligned campaign targets protest supporters. Notepad++ rolls out a “double-lock” update fix. And a Spanish court orders NordVPN and ProtonVPN to block illegal football streams. Our guest is Keith Mularski, Former FBI Special Agent and Chief Global Ambassador at Qintel, reflecting on the 25th anniversary of notorious spy Robert Hanssen's arrest. Dutch Defense flaunt F-35 firmware freedom. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Keith Mularski, Former FBI Special Agent and Chief Global Ambassador at Qintel, to talk about the 25th anniversary of Robert Hanssen's arrest. If you enjoyed Keith's conversation, you can hear more from him over on the Only Malware in the Building podcast. Selected Reading Chinese hackers exploited a Dell zero-day for 18 months before anyone noticed (CyberScoop) Microsoft says bug causes Copilot to summarize confidential emails (Bleeping Computer) New Linux Botnet Discovered (Linux Magazine) Switzerland's NCSC boosts operational capabilities, mandates cyberattack reporting on critical infrastructure (Industrial Cyber) ClickFix Won't Die. Neither Will Matanbuchus. A New RAT and a Hands-on-Keyboard Intrusion (Huntress) Vulnerabilities in Popular PDF Platforms Allowed Account Takeover, Data Exfiltration (SecurityWeek) CRESCENTHARVEST: Iranian protestors and dissidents targeted in cyberespionage campaign (Acronis) Notepad++ boosts update security with ‘double-lock' mechanism (Bleeping Computer) Spain orders NordVPN, ProtonVPN to block LaLiga piracy sites (Bleeping Computer) Dutch defense chief: F-35s can be jailbroken like iPhones (The Register) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Send a textMost cybersecurity stories talk about the hacks, but this episode peels back the curtain on the raw, unfiltered journey of a hacker turned industry pioneer. Jason Haddix shares how his early days of hex editing and fake IDs evolved into leading offensive security at Fortune 100 giants — all driven by relentless curiosity and defiance. His tales of surviving the shadowy underground, navigating multi-year career pivots, and turning obsession into innovation will blow your mind. This isn't just about tech — it's about fearlessly forging a path in a chaotic, ever-changing world where knowledge is power and resilience is everything.You'll discover the secret frameworks behind modern pen testing—like the Bug Hunters Methodology—and how cutting-edge tools are reshaping cybersecurity. Jason dives into his real-world battles: from bypassing the most sophisticated security measures to hacking into critical infrastructure under intense pressure. His insights reveal the brutal truths of red teaming, physical infiltration, and the mental grit required to succeed when everyone else doubts you.We break down the rise of AI and LLMs in security: how attackers jailbreak systems, bypass defenses with prompt injections, and weaponize new technologies faster than security teams can respond. Jason warns about deploying these powerful tools without enough guardrails or understanding — and how FOMO is fueling a wild, unsecured frontier. His perspective is a call to arms for defenders and hackers alike: adapt fast, think boldly, and stay one step ahead in the most dangerous cyber game yet.This episode is essential for anyone hungry to understand the raw reality of offensive security, the future of AI in hacking, and the relentless pursuit of mastery in a digital battlefield. Whether you're a seasoned pro, a curious newcomer, or a business leader, Jason's fearless authenticity will challenge your assumptions and ignite your passion to innovate. Hit play — your fight for security starts now.Chapters00:00 Introduction and Background in Cybersecurity06:05 Early Experiences and Learning in Cybersecurity12:14 Transitioning to Professional Penetration Testing18:30 Challenges and Realities of Consulting in Cybersecurity20:41 Phishing Tests and Their Consequences23:09 Transitioning to Entrepreneurship26:05 The Evolution of Training and Consulting31:18 The Role of AI in Cybersecurity39:11 Navigating AI Security Challenges39:11 Understanding LLMs and User Education41:42 Privacy Concerns and Risk Management in AI44:32 Prompt Engineering Vulnerabilities and Jailbreaking Techniques47:03 Security Challenges in AI Systems49:39 Future of AI and Community EngagementSupport the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast Affiliates➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh➡️ OffGrid Coupon Code: JOE➡️ Unplugged Phone: https://unplugged.com/Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout*See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.
Mike chats for an hour with the Wicked Spursy Nicky Winks AI v2.5 now run on LINUX. They talk about Igor though Nick keeps changing the subject. They also talk about the ACTUAL chances of relegation. Mike's Drinkin' Gaffel Kolsch. COYS UP THE SPURS
TECNOLOGIA y LIBERTAD -------------------------- twitter.com/D3kkaR #Bitcoin BTC: dekkar$paystring.crypt Seedbox: https://members.rapidseedbox.com/ref.php?id=66848 CANAL PRIVADO DEKNET https://t.me/+0W_fPQXXOFAyNzE8
Hemos recibido varias acusaciones de que el episodio 595 de Café Fandango no es fiel al espíritu del primer episodio del programa, y frente a estas serias declaraciones venimos a responder que obvio que sí, que pasaron 10 años, que ahora tenemos mejores micrófonos que los del Guitar Hero y que dejen de rompernos las pelotas para que echemos a Seba. Habiendo aclarado eso, en este programa vas a escuchar a Gus que te cuenta como viene su experiencia con Linux y que está viejo y choto y se queja de que el Spider Man Miles Morales es un juego y se comporta como tal. Edu, por su lado, se ríe del capitalismo con el Earth Must Die, se copa explorando islas en el Dragon Quest y te cuenta de sus primeras experiencias con el Sons of Sparta. Luego pasamos por los quince mil lanzamientos de la semana para después adentrarnos en las pocas noticias que tenemos: Microsoft/Activision/Blizzard hizo un evento por los 30 años del Diablo, se publicaron todos los premios que ganó el Clair Obscur en los premios DICE, Sony tuvo una linda State of Play, aunque uno de sus anuncios no fue bien recibido por el director del primer God of War. Cerramos con la Pregunta Fandango donde nos quejamos de secuelas que no respetaron a sus antepasados.
Jason, Liam, and Nick navigate all the bad news from Valve, explain the Discord drama, and reframe some game developer news with a positive spin. Plus, a mountain of evidence showing how awesome Linux gaming is already doing in 2026. Oh, and the obligatory rant from Liam, some spicy opinions about GeForce Now on Linux, and much more! Watch this podcast: https://youtu.be/gqgqzungNaw ▶️ @NJTechBenchmark's Benchmark Video: https://www.youtube.com/watch?v=wDDdbb7wuCA ▶️ @LinuxForEveryone's Bazzite vs Windows video: https://www.youtube.com/watch?v=wDDdbb7wuCA
What does it really take to lead through constant disruption? Jim Stallings, Founder and CEO of PS27 Ventures, shares lessons from a career spanning the U.S. Marine Corps, senior leadership roles at IBM, and now early-stage investing. Jim breaks down how IBM turned Linux from free software into a multibillion-dollar business, why internal resistance is often the biggest blocker to innovation, and how leaders can use customers to force change. He also explains what he looks for in founders, why leadership matters more than a perfect plan, and how AI is collapsing product cycles from years to months.Topics & Timestamps
攻殻機動隊展で、ある特定の画像がプリントされたTシャツを着ると監視カメラのAIを騙して透明になれる仕組みが面白い。Tokyo Prototypeでは初代iMac(MacOS 9+IE3)が2026年の高画質な写真とAI生成されたテキストを表示するエモいメディアアート。後半は、大寒波によるNY凍結の話や、マイナス17度のお湯実験について話しました。00:57 Macが壊れて、代わりにCrostini(Linuxコンテナ)を初期設定から作っていく楽しさを満喫02:12 移行アシスタントが動かず8時間格闘:OS3回再インストール、USB-C 40Gbpsでも転送が始まらない地獄04:36 Tokyo Prototypeで、動いている初代iMacが3台展示05:42 1999年当時のiMac(MacOS 9) + IE3(!)で2026年のAI生成テキストと画像を表示するメディアアート08:31 1999年に使われていた言葉を、2026年の言い方に置き換えて表示させる仕組み(「スマホ」を「公衆電話」に)09:28 Googleスピーカーの分解展示:試作段階の素材・形状・内部構造まで全部見せてくれた10:35 「攻殻機動隊展」で、監視カメラのAIを騙して人間が透明になるTシャツを体験してみた13:03 どうやってAIを騙しているの? → AIしか分からないインジェクションでAIを攪乱させる14:53 AIを攪乱させるだけでなくその後「人にどのように見せてどう感じさせるか」は工夫が問われる15:51 マイナス17度で”やってみた”実験 − お湯を空中に撒くと一瞬で氷の粉になる17:07 ニューヨークの川(ハドソンリバー・イーストリバー)が凍結し、フェリー全面通行止め、通勤手段消滅19:03 支笏湖の氷濤まつりにいつか行きたい:ライトアップされた氷柱が幻想的20:52 世界で最も雪が降るのは日本(青森で9m)ニューヨークは25cmで都市機能麻痺22:58 札幌出張で雪道運転に驚愕:走ってても自然に滑る、対面すれ違いで雪壁ギリエピソード内で取り上げた情報へのリンク: Tokyo Prototype 攻殻機動隊展 支笏湖 氷濤まつりテック業界で働く3人が、テクノロジーとクリエイティブに関するトピックを、視点を行き交わしながら語り合います。及川卓也 @takoratta プロダクトマネジメントとプロダクト開発組織づくりの専門家 自己紹介エピソード ep1, ep2関信浩 @NobuhiroSeki アメリカ・ニューヨークでスタートアップ投資を行う、何でも屋 自己紹介エピソード ep52上野美香 @mikamika59 マーケティング・プロダクトマネジメントを手掛けるフリーランス 自己紹介エピソード ep53Official X: @x_crossing_ https://x-crossing.com
Running events is not easy, even for companies and organizations who this as (part of) their business. If you think that maintaining open source events as a volunteer organizer in your free time is impossible, you're proven wrong!In the My Open Source Experience podcast episode, Ariel Jolo shares his experience how he got from helping his friends install Linux on their PCs and then becoming a sysadmin all the way to being the organizer of Nerdearla. Recent occasions of the event attracted over 10,000 people in person and over 30,000 people online, and yet, Ariel is organizing the series in multile locations aroudn the globe on his free time without any monetary compensation.Learn more about:- Building a community as a kid- Getting from interest in OSS to a paid job- How to make a gathering for sysadmins go viral- The story behind the Nerdearla event- What it takes to organize a wildly successful event series in your free time Hosted on Acast. See acast.com/privacy for more information.
The professional-grade audio workstation Ardour has a great new version, LinkedIn does a shocking but not surprising amount of browser fingerprinting, Firefox is getting a button to turn off the AI nonsense, a new way to prevent slop “contributions” to your project, another tale of someone failing to switch to Linux, and why we should talk more about why open source software can be better than proprietary alternatives. With guest host Kevin from Linux Dev Time. News/discussion Ardour 9.0 — What’s new Linkedin-extension-fingerprinting AI controls are coming to Firefox Introducing Vouch: explicit trust management for open source I went back to Linux and it was a mistake Automox Turnkey Results Endpoint management tailored to your specific environment. Know the plan. Trust the result. Learn more at www.automox.com Support us on patreon and get an ad-free RSS feed with early episodes sometimes See our contact page for ways to get in touch. RSS: Subscribe to the RSS feeds here
The professional-grade audio workstation Ardour has a great new version, LinkedIn does a shocking but not surprising amount of browser fingerprinting, Firefox is getting a button to turn off the AI nonsense, a new way to prevent slop “contributions” to your project, another tale of someone failing to switch to Linux, and why we should talk more about why open source software can be better than proprietary alternatives. With guest host Kevin from Linux Dev Time. News/discussion Ardour 9.0 — What’s new Linkedin-extension-fingerprinting AI controls are coming to Firefox Introducing Vouch: explicit trust management for open source I went back to Linux and it was a mistake Automox Turnkey Results Endpoint management tailored to your specific environment. Know the plan. Trust the result. Learn more at www.automox.com Support us on patreon and get an ad-free RSS feed with early episodes sometimes See our contact page for ways to get in touch. RSS: Subscribe to the RSS feeds here
The Linux Kernel 6.19 is out, the Rust experiment is over, and it's time to talk about 7.0. Vim 9.2 is out, with a bit of a weird new feature in its changelogs, and IPFire is an intriguing, community-driven security domain block list. PearOS has a new release for those seeking an Apple-inspired Linux experience, and Linux Mint is adjusting its release schedule to better manage developer and tester schedules. River is a new project trying to do Wayland support with a modular Desktop stack, and Mesa 26.0 is out with impressive performance gains. For tips, we have cull for finding and deleting big files, a systemd program for detecting if the OS is running virtualized, preload for caching applications in ram, and new_script for a script-writing tool that *doesn't* feature an LLM. You can find the show notes at https://bit.ly/3ZCNcEc and happy Linux'ing! Host: Jonathan Bennett Co-Hosts: Rob Campbell, Ken McDonald, and Jeff Massie Download or subscribe to Untitled Linux Show at https://twit.tv/shows/untitled-linux-show Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
https://www.linkedin.com/in/brian-ogrady/ - my linkedin https://www.linkedin.com/company/qdrant/ - company linkedin https://qdrant.tech/contact-us - contact us https://github.com/qdrant/qdrant/ - Qdrant GH https://github.com/qdrant/qdrant-edge-demo - Qdrant Edge running on smart glasses Mike on LinkedIn Coder Radio on Discord Mike's Oryx Review Alice Alice Jumpstart Offer Vorpal Mike in USA Today
The Linux Kernel 6.19 is out, the Rust experiment is over, and it's time to talk about 7.0. Vim 9.2 is out, with a bit of a weird new feature in its changelogs, and IPFire is an intriguing, community-driven security domain block list. PearOS has a new release for those seeking an Apple-inspired Linux experience, and Linux Mint is adjusting its release schedule to better manage developer and tester schedules. River is a new project trying to do Wayland support with a modular Desktop stack, and Mesa 26.0 is out with impressive performance gains. For tips, we have cull for finding and deleting big files, a systemd program for detecting if the OS is running virtualized, preload for caching applications in ram, and new_script for a script-writing tool that *doesn't* feature an LLM. You can find the show notes at https://bit.ly/3ZCNcEc and happy Linux'ing! Host: Jonathan Bennett Co-Hosts: Rob Campbell, Ken McDonald, and Jeff Massie Download or subscribe to Untitled Linux Show at https://twit.tv/shows/untitled-linux-show Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
Tony: -Division 1 Definitive edition is not a remake: https://www.ign.com/articles/the-division-definitive-edition-quietly-launches-but-its-not-the-remaster-some-had-hoped-for -Baldur's Gate turning into a show: HBO is turning Baldur's Gate into a TV show -BL4 is not likely on Switch 2: https://www.neonlightsmedia.com/blog/borderlands-4-switch-2-port-paused Jarron: -GOG working on native Linux support: GOG is already working on native Linux support -Steam Machine may not be out for a bit longer with increased pricing: Valve's Steam Machine has been delayed, and the RAM crisis will impact pricing -Next Gen Xbox coming out next year? AMD hints Microsoft could launch its next-gen Xbox in 2027 -Switch is Nintendo's best-selling console of all time: The Switch is Now Nintendo's Best-Selling Console of All Time -Co-op Horizon game announced https://blog.playstation.com/2026/02/05/announcing-horizon-hunters-gathering-guerrillas-new-co-op-action-game/ -Nintendo Direct https://www.nintendolife.com/guides/nintendo-direct-partner-showcase-february-2026-every-announcement-game-reveal-trailer -This dongle allows you to use PS5 controllers with the Switch 2: GuliKit's tiny USB dongle lets you connect your PS5 controller to your Switch 2 Owen: -No Humans Allowed https://arstechnica.com/ai/2026/02/after-moltbook-ai-agents-can-now-hang-out-in-their-own-space-faring-mmo/
ZeroDayRAT delivers full mobile compromise on Android and iOS. The UK warns infrastructure operators to act now as severe cyber threats mount. Russia moves to block Telegram. The FTC draws a line on data sales to foreign adversaries. Researchers unpack DeadVax, a stealthy new malware campaign, while an old-school Linux botnet resurfaces. BeyondTrust fixes a critical flaw. And in AI, are we moving too fast? One mild training prompt may be enough to knock down safety guardrails. Our guest is Omer Akgul, Researcher at RSA Conference, discussing his work on "The Case for LLM Consistency Metrics in Cybersecurity (and Beyond)." A pair of penned pentesters provoke a pricey payout. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Omer Akgul, PhD, Researcher at RSA Conference, discussing his work on "The Case for LLM Consistency Metrics in Cybersecurity (and Beyond)." Selected Reading New ‘ZeroDayRAT' Spyware Kit Enables Total Compromise of iOS, Android Devices (SecurityWeek) NCSC Issues Warning Over “Severe” Cyber-Attacks Targeting Critical National Infrastructure (Infosecurity Magazine) Russian Watchdog Starts Limiting Access to Telegram, RBC Reports (Bloomberg) FTC Reminds Data Brokers of Their Obligations to Comply with PADFAA (FTC) Dead#Vax: Analyzing Multi-Stage VHD Delivery and Self-Parsing Batch Scripts to Deploy In-Memory Shellcode (secureonix) New ‘SSHStalker' Linux Botnet Uses Old Techniques (SecurityWeek) BeyondTrust Patches Critical RCE Vulnerability (SecurityWeek) Critics warn America's 'move fast' AI strategy could cost it the global market (CyberScoop) Microsoft boffins figured out how to break LLM safety guardrails with one simple prompt (The Register) County pays $600,000 to pentesters it arrested for assessing courthouse security (Ars Technica) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices