POPULARITY
1 - Queen Bee Blues - Eddie "Cleanhead" Vinson - 19502 - Woodman, Spare that Tree - Bert Williams - 19133 - Ever Lovin Bee - Ace Brigode and his 14 Virginians – 19254 - They Cut Down the Old Pine Tree - Perry B. Lipson and Joe Rines and his Orchestra - 19325 - Deep Elm - Ben Pollack and his Orchestra – 19366 - Be My Little Babay Bumble Bee - Ada Jones and Billy Murray - 19127 - Bumble Bee Schottische - Whoopee John Polka Band – 19488 - Flight of the Bumble Bee (Rimsky Korsakov) - Harry James and his Orchestra – 19409 – Honeydew – Joseph C Smith Orchestra - 192010 - Leave my Honey Bee Alone - Merle Travis - 194811 - Buzzin' Round with the Bee - Lionel Hampton and his Orchestra – 193712 - We'll Find Our Shelter Before the Rain - George Beaver and the Carolina Collegians - 192913 - Bee Boogie Boo - Bob Mosely and the All Stars – 194514 - All the Bees are Buzzin Round My Honey - Janet Brace and The Glee Club with Johnny Long and his Orchestra - 194915 - Dance of the Honey Bees - Victor Orchestra – 191316 - Busy as a Bee (I'm Buzz, Buzz, Buzzin') - Helen Forrest with Benny Goodman and his Orchestra – 1939
In this final episode of The Big Band and Swing Podcast we listen to vintage music by Charlie Spivak, Johnny Long and Stan Kenton. Thank you so much for listening these past five years. * The music featured in this podcast is considered Public Domain. Artists are credited within the podcast.
Features vintage recordings by Al Donahue, Johnny Long and Guy Lombardo. We also learn a little bit about the show Victory Parade of Spotlight Bands. Consider supporting The Big Band and Swing Podcast by becoming a Hepcat. Learn more at SupportSwing.com. * The music featured in this podcast is considered Public Domain. Artists are credited within the podcast.
Dean Weaver, EPC Stated Clerk, welcomes Johnny Long, Director of Operations of World Outreach. Dean and Johnny talk about the preparation that has gone into preparing our global workers and denomination for the next steps of World Outreach.
Features vintage recordings by Gene Krupa, Glenn Miller and Ray McKinley. Ronnaldo plays a Soundie by Johnny Long and we also learn that Grandfather always loved Mac and Cheese. Consider supporting The Big Band and Swing Podcast by becoming a Hepcat. Learn more at SupportSwing.com. * The music featured in this podcast is considered Public Domain. Artists are credited within the podcast.
Johnny Long and Ronan Mc Laughlin join Caley Fretz on this week's Placeholders to discuss the Vuelta, Remco Evenpoel, transfers, and more from around the cycling world.
Features vintage music by Tony Pastor, Johnny Long and Les Elgart. We also learn about the show "Let's Go To Town". Consider supporting The Big Band and Swing Podcast by becoming a Hepcat. Learn more at SupportSwing.com. * The music featured in this podcast is considered Public Domain. Artists are credited within the podcast.
Features vintage recordings by Johnny Long, Artie Shaw and Glenn Miller. Ronnaldo also plays a Snader Telescription by The Dinning Sisters. Consider supporting The Big Band and Swing Podcast by becoming a Hepcat. Learn more at SupportSwing.com. * All music in this podcast are Creative Commons. Artists are credited within the podcast.
Features music by Buddy Rich, Johnny Long, Andy Kirk and The Andrews Sisters. We also listen to a Soundie by Cab Calloway and learn about changes with the newsletter. Consider supporting The Big Band and Swing Podcast by becoming a Hepcat. Learn more at SupportSwing.com. * All music in this podcast are Creative Commons. Artists are credited within the podcast.
Dean Weaver, EPC Stated Clerk, welcomes Johnny Long, Executive Director of Signal Mountain Presbyterian Church, to discuss the challenges of overseeing ministries at the local church and the exciting mission efforts going on at the EPC.
Johnny Long spent time in prison. He was addicted to drug for years. He's made a lot of mistakes but his heart is made of gold and finally he has found his story. He talks about learning to edit that story, change the punctuation and answer many of the questions, leaving periods in places he'd never seen boundaries before. This interview will inspire you and make you look at your own life much differently.
Hear from UNA Hall of Famers Matt Peck, Trey Mitchell, Pat Jackson, Chloe Roberts, Ande Jones, Tyrone Rush, Johnny Long and Gary Elliott.
Those on the red team may not be household names to the everyday person, but they are absolutely legends and icons in the world of cybersecurity and hacking. While we have our personal favorite hackers between the two of us, we also invite our guest, Davin Jackson, to share his favorite cybersecurity legends and the lessons he's learned from them. Timecode Guide: [00:50] The importance of red teaming, especially during this season [02:17] Ron and Chris' first experience working in a red team environment [11:23] Communication and collaboration between blue and red [16:53] Knowledge gained from Davin Jackson's humble beginnings in tech [22:19] Gaining the blue perspective with Hacker Valley Blue Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life! Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy today! _____________ Legends, Icons, Teachers, and Friends From Marcus Carey to Johnny Long, we're excited to share the legends that had an early influence and lasting impact on our careers in cybersecurity. While our two backgrounds in red teaming are different, we can attribute so much of our success and our ability to share our knowledge with all of you to the experts that were willing to invite us to join and learn the best hacking techniques alongside them. “I think that's the most important thing in red teaming, it's passing that knowledge on to someone else.” - Chris Cochran Communication, collaboration, and community instead of red vs blue It is not two teams with two separate fights when we're talking about red teams and blue teams. Often, when cybersecurity is too focused on this split between offensive and defensive, we forget to collaborate and fall short of improving on issues we discovered. Communication between red and blue can be a costly struggle, which is why we're happy to see our sponsor PlexTrac stepping in to develop communication technology for these teams. “There's this push and pull of collaboration. On one hand, you want the red team to work autonomously…but on the other hand, they do need insight if you're going to go deeper and deeper.” - Ron Eddings Legends met, lessons learned, tech loneliness understood In the latter half of our episode, we're joined by Hacker Valley Blue host Davin Jackson, also known as DJax Alpha. Davin started his cybersecurity journey with no computer of his own. Working his way up from basic tech jobs at corporations like Circuit City, lessons Davin learned from the legends he looked up to include finding a mentor, focusing on networking (even when it feels like a dead end), and being always willing to share what you've learned. “It's about consistency, and you have to have self control and discipline…It's one thing to get it, but it's another to maintain that success.” - Davin ---------- Spend some time with our guest, Davin Jackson (DJax Alpha/Alpha Cyber Security) on his website, Twitter, Instagram, Facebook, and weekly on the Hacker Valley Blue podcast. Follow Ron Eddings on Twitter and LinkedIn Catch up with Chris Cochan on Twitter and LinkedIn Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.
Those on the red team may not be household names to the everyday person, but they are absolute legends and icons in the world of cybersecurity and hacking. While we have our personal favorite hackers between the two of us, we also invite our guest, Davin Jackson, to share his favorite cybersecurity legends and the lessons he's learned from them. Timecode Guide: [00:50] The importance of red teaming, especially during this season [02:17] Ron and Chris' first experience working in a red team environment [11:23] Communication and collaboration between blue and red [16:53] Knowledge gained from Davin Jackson's humble beginnings in tech [22:19] Gaining the blue perspective with Hacker Valley Blue Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life! Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone PlexTrac, the proactive cybersecurity management platform, brings red and blue teams together for better collaboration and communication. Check them out at plextrac.com/hackervalley Legends, Icons, Teachers, and Friends From Marcus Carey to Johnny Long, we're excited to share the legends that had an early influence and lasting impact on our careers in cybersecurity. While our two backgrounds in red teaming are different, we can attribute so much of our success and our ability to share our knowledge with all of you to the experts that were willing to invite us to join and learn the best hacking techniques alongside them. “I think that's the most important thing in red teaming, it's passing that knowledge on to someone else.” - Chris Cochran Communication, collaboration, and community instead of red vs blue It is not two teams with two separate fights when we're talking about red teams and blue teams. Often, when cybersecurity is too focused on this split between offensive and defensive, we forget to collaborate and fall short of improving on issues we discovered. Communication between red and blue can be a costly struggle, which is why we're happy to see our sponsor PlexTrac stepping in to develop communication technology for these teams. “There's this push and pull of collaboration. On one hand, you want the red team to work autonomously…but on the other hand, they do need insight if you're going to go deeper and deeper.” - Ron Eddings Legends met, lessons learned, tech loneliness understood In the latter half of our episode, we're joined by Hacker Valley Blue host Davin Jackson, also known as DJax Alpha. Davin started his cybersecurity journey with no computer of his own. Working his way up from basic tech jobs at corporations like Circuit City, lessons Davin learned from the legends he looked up to include finding a mentor, focusing on networking (even when it feels like a dead end), and being always willing to share what you've learned. “It's about consistency, and you have to have self control and discipline…It's one thing to get it, but it's another to maintain that success.” - Davin Hacking the Vocabulary: Pen test — Pen test, or penetration testing, is a method of identifying and testing vulnerabilities and gaps in an IT security system that could be exploited. This can also be referred to as “ethical hacking”. Popping a shell — A slang term for when a hacker exploits a security vulnerability to make a program run a hacker code. Red team — A group within an organization made up of offensive security experts who try to attack an organization's cybersecurity defenses. Blue team — A group of defensive security experts within the same organization that defends against and responds to the red team attack. Additional resources to check out: Marcus J Carey, Johnny Long/Hackers for Charity, United States Cyber Command, Booz Allen Hamilton ---------- Spend some time with our guest, Davin Jackson (DJax Alpha/Alpha Cyber Security) on his website, Twitter, Instagram, Facebook, and on the Hacker Valley Blue podcast. Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. Follow Ron Eddings on Twitter and LinkedIn Catch up with Chris Cochan on Twitter and LinkedIn
This week, we revisit a great show from 1997 to fill on with some blues. Legendary blues guitarist Robert Cray is with us, plus country blues artist Johnny Long, and an excellent vintage eChievement Award story about someone making a real difference.
1 - Lucky Day - George Olsen and his Music - 19262 - Lucky Little Accident - Victor Arden - Phil Ohman Orchestra – 19323 - Opni Mi Tropni Mi - Vulkana Stoyanova - 1930s Bulgaria4 - Accident'ly On Purpose - Helen Young with Johnny Long and his Orchestra – 19415 - Beginner's Luck - Edythe Wright with Tommy Dorsey and his Orchestra - 19376 - Get Lucky - Ralph Williams and his Rainbo Orchestra – 19247 - It Was Fate When I First Met You - Bob Eberly with Jimmy Dorsey and his Orchestra - 19398 - Fate Introduced Me To You - Jacques Renard Orchestra – 19319 - Everything Happens for the Best - Billie Holiday and her Orchestra – 193910 - Fate - The Bar Harbor Society Orchestra - 192211 - Fate (Tango) - International Novelty Orchestra - 192612 - Accidents Will Happen - Bing Crosby with Victor Young and his Orchestra – 195013 - Mala Suerte (Hard Luck), Bolero - Daniel Santos Con Orquesta - 194614 - Les Souffrances De Mon Accident - Madame Bolduc – 1939 French Canada15 – Oy Vey Der Dalles (Hard Luck) - J. Feldman – 1920 Yiddish16 - Everything Happens to Me - Alyce King with Alvino Rey and his Orchestra – 194117 - Yenz' Inqab' Intombi (Unexpected Occurances) - Evening Birds – 1937 South African Zulu
Johnny Long of Elevate Skateshop hangs out with us for talk about what he and his shop are up to. www.elevateskate.ca @johnny_long
The Players are back with Episode 77 The Players speak on Lil Wayne(43:00) , Kanye West (1:20:00) , The Race Card(1:43:10) , Needing Space(1:52:00) , Music(2:07:00), & So Much More
Episode 19 features music by Tommy Dorsey, Johnny Long, Judy Garland, Frank Sinatra, Benny Goodman and many more. We also listen to a great Raymond Scott performance from 1961. ...and remember, if you want to listen to more Big Band and Swing Music check out SwingCityRadio.com to hear Your Big Band Favorites from the 1930's, 40's and Today! * All music in this podcast are Creative Commons. Artists are credited within the podcast.
Michael convinces Johnny Fontaine to provide entertainment at the Corleone's casino in Las Vegas. See acast.com/privacy for privacy and opt-out information.
Johnny Long interviewed his mom and dad (Ray Long and Michelle Sneed) about how the pandemic has impacted their lives during the school shut down in Cherokee NC.
Featuring The Jordan Bros., The Xtreems, Lee Shot Williams,Onie Wheeler, Paul and Barry Ryan, Johnny Long,Johnny Daye, Jimmy McCracklin, Motherlode,Equipe 84, Ian and The Zodiacs, Nappy Brown,and more! as broadcast live via 5130kc shortwave 2-22-20
Hackers for Charity founder Johnny Long discusses Google hacking, finding God, and bringing the hacker spirit to philanthropy. Follow Hackers for Charity and Johnny at https://www.hackersforcharity.org and https://twitter.com/ihackstuff. Follow Jeremy at http://jeremynsmith.com and https://twitter.com/jeremynsmith. Learn more about Breaking and Entering at http://jeremynsmith.com/breaking-and-entering.html.
In true Freaky Friday fashion, Sam and Deana have switched places. A well-meaning trouble maker is trying to make Deana understand why her sister won't give up in breaking her demon deal. “Wacky Wednesday” Cast: Samantha Winchester ......... Kasey Heimann Deana Winchester ............... Amanda Gilbertson Bobby Singer ....................... Zachary Prusak Trickster ............................... Kendra Murray Other voice talents include: Libbie Baylinson Patrick Marlon Bender Michael Joaquin Johnny Long JSkeleton* * = Forum name / Username
Read the review at http://audiodramareviews.com/audio-drama/whos-johnny-long-arms Links Twitter.com/AudioDramaNews Facebook.com/AudioDramaDigest Youtube.com/channel/UCvqiDIg0ESpYH_Zhfw_G8lg Patreon.com/audiodramareviews geo.itunes.apple.com/us/podcast/audio-drama-reviews/id1105200411 --- Send in a voice message: https://anchor.fm/audio-drama-reviews/message
This week, the PC Gamer team discusses a plethora of smaller games, from Tokyo 42 to Rime. One might call it a smorgasbord. Not us, though – partly because it’s a rubbish metaphor, but mostly because we doubt Little Nightmares would be appetising. Also, we discuss what games we’d smush together into a much better game, and inevitably Dragon Age 2 is mentioned. Discussed: Tokyo 42, Danger Zone, Perception, Rime, Vanquish This week: Samuel Roberts (https://twitter.com/samuelwroberts) , Phil Savage (https://twitter.com/octaeder) , and, for the final time as a weekly participant, Andy Kelly (https://twitter.com/ultrabrilliant) The PC Gamer UK Podcast is a weekly podcast about PC gaming. Thoughts? Feedback? Requests? Tweet us @PCGamerPod (http://twitter.com/PCGamerPod) . This week’s music is from What Remains of Edith Finch. http://dl.pcgamer.com/podcasts/PCGUKpodcast/pcgukpodcast_045.mp3
Ella Fitzgerald was born on April 25th, 1917 100 years ago. She is one of the greatest jazz vocalist in jazz history and she got her start singing with the big bands. In Part Two of our celebration we'll be playing some of Ella's recordings with different big bands. Some of the big bands include Count Basie, Johnny Long, Buddy Bregman and a couple of numbers from the songbook series. In between numbers we'll finish our biography of the woman they called "The First Lady of Song." Also, The Big Band Puzzler is back this week. Please visit this podcast at http://bigbandbashfm.blogspot.com
Part 3 of today's Showcase brings you Who's Johnny Long Arms?: a self-contained original production. Who's Johnny Long Arms? is nominated for Best Original, Short Form, Self-contained Production. This production is rated PG. – The Audio Verse Awards Team Subscribe to our Nominee Showcase Podcast! Via RSS: Link Via iTunes: Link Via Google Play: Link
Gain Your Edge is a twice-monthly podcast on all things IT. This week’s guest is a bona fide hacker. Bill Gardner is an assistant professor at Marshall University where he teaches in the Digital Forensics and Information Assurance degree program. He is an information security author and speaker. During this episode, Bill mentioned several resources and references which are presented below for your enjoyment: Book Links “Ghost in the Wires” by Kevin Mitnick “Building an Information Security Awareness Program” by Bill Gardner and Valerie Thomas “Google Hacking for Penetration Testers” by Bill Gardner, Johnny Long and Justin Brown Conference Links DEF CON Black Hat Other Site Links & References Dual Core, Nerdcore Music M.C. Frontalot PTES.org Cyber War Zone 1Password Reboot It Podcast Marshall University Information Security Contact Our Guest Expert Follow Bill on Twitter! More Host Skip Lineberg Subscribe via iTunes Send your feedback, comments and questions to BusinessEdge@Frontier.com
DEF CON 22 was an amazing year for us... 5 year anniversary, a packed house and Johnny Long... what more can we say.
Kurt Baumgartner of Kaspersky Labs joins us to talk about Red October, a research paper that he co-authored, along with the other areas that he works on at Kaspersky. It's time for another Drunken Security News. Much of the gang was on the road this week so Patrick Laverty sat in with Paul and Engineer Steve for the show, plus Jack's epic beard called in via Skype from lovely Maryland. First, Paul admitted it was a stretch to bring this into a security context but he wanted to talk about an article that he found in The Economist (via Bruce Schneier) about one theory that if the US would simply be nicer to terrorists, release them from Guantanamo Bay, Cuba and stop hunting them down around the world, that they would in turn be nicer to us. Also, fewer would pop up around the world. The thinking is that jailing and killing them turns others into terrorists. So here's the leap. Can the same be said for black hat hackers? If law enforcement agencies stop prosecuting the hackers, will they be nicer and will there be fewer of them? I think we all came to the same conclusion. "Nah." Paul also found an Adam Shostack article about how attention to the tiniest details can be important to the largest degree. The example given was the vulnerability to the Death Star in the original Star Wars movie was so small and the chances of it being exploited were so remote that the Empire overlooked it, Grand Moff Tarkin even showing his arrogance shortly before his own demise. The same can be said for our systems. It might be a tiny hole and maybe you think that no one would look for it and even if they do, what are the chances they both find it and exploit it? In some cases, it can have quite dire consequences. The Empire overlooked a small vulnerability that they shouldn't have. Are you doing the same with your systems? Did we happen to mention that Security BSides Boston is May 18 at Microsoft NERD in Cambridge, MA and Security BSides Rhode Island is June 14th and 15th in Providence, RI. Good seats and good conference swag are still available. We all hope to see you there! The Onion's Twitter account was breached by the Syrian Electronic Army and they handled it a way that only The Onion can, making light of both themselves and the SEA. Additionally, possibly for the first time ever, The Onion published a non-parody post about exactly how the breach occurred. Additionally, the National Republican Congressional Committee (NRCC) web site got spam hacked/defaced with Viagra ads. The only thing we were wondering is, are we sure it was hacked and not just a convenient online pharmacy for their members? A new whitepaper was released from MIT talking about "Honeywords". The problem being solved here is creating a way for server admins to know sooner when a passwords file has been breached on a server. In addition to the correct password, this new system would add a bunch of fake passwords as well. When the attacker starts trying usernames and passwords, if they use one of the fake passwords, the server admin would be notified that someone is doing that and it is very likely that the passwords file has been breached. It's an interesting concept to ponder. Jack had an article from Dennis Fisher at Threatpost, asking the question about what's the point of blaming various people for cyberespionage if we don't have a plan to do something about it. The NSA also has its own 643 page document telling its members how to use Google to find things like Excel documents in Russian that contain the word "login". Wait, I feel like I've heard of this somewhere before. Oh yeah, that's right. Johnny Long was talking about Google Hacking at least as far back as 2007. It's just interesting some times to see things that the media gets wind of and without the slightest bit of checking, thinks something is "new".
Part 1 - Interview with Johnny Long:
Episode 200 Show Notes Episode 200 all day podcast in support of hackersforcharity.org. FINAL: In the last release from 200 Sonny Crocket joins us as we discuss ZigBee, Linux hardening and Stories from the week. Remember its never to little or to late to donate to Johnny Long's hackers for charity. Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand, Mick Douglas, Carlos "Dark0perator" Perez Audio Feeds:
Episode 200 Show Notes HISTORIC Episode 200 all day podcast in support of hackersforcharity.org. Part 5: Retired competitive food eater and lover of the entire snuggy product line, Dennis Brown joins us to discuss how easy it is to get a hold of your very own Zeus botnet. Learn how much a few grand gets you, and what functionality. Remember its never to little or to late to donate to Johnny Long's hackers for charity. Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand, Mick Douglas, Carlos "Dark0perator" Perez Audio Feeds:
Episode 200 Show Notes HISTORIC Episode 200 all day podcast in support of hackersforcharity.org. Part 4: Paul Joyal from, Mr. J's Havana shop in West Warwick, RI, joins us to go a bit off topic and talk about cigars. So light up your favorite stick and sit back and enjoy something NOT security related. Remember its never to little or to late to donate to Johnny Long's hackers for charity. Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand, Mick Douglas, Carlos "Dark0perator" Perez Audio Feeds:
Episode 200 Show Notes HISTORIC Episode 200 all day podcast in support of hackersforcharity.org. Part 3: Ron from Tenable Security and Anthony from Core Security take on an array of listener questions about their respective products. Remember its never to little or to late to donate to Johnny Long's hackers for charity. Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand, Mick Douglas, Carlos "Dark0perator" Perez Audio Feeds:
Paul and Larry talk coming at you live from Shmoocon 2009! Special guests include Marcus Carey, Johnny Long, Listener Karl, Mubix, and Matthew Carpenter! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
"This presentation explores the explosive growth of a technique known as ""Google Hacking"". When the modern security landscape includes such heady topics as ""blind SQL injection"" and ""integer overflows"", it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Attendees will learn how to torque Google to detect SQL injection points and login portals, execute portscans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious ""Google hackers"", this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage. The speaker, Johnny Long, maintains the Internet's most comprehensive database of Google exposures on his website. Johnny Long did not develop his skills within the hallowed halls of higher learning but rather by spending way too many late nights huddled in front of his computer, developing his anti-social tendencies. Mr Long (Johnny's professional alter-ego) has previously presented at SANS and other computer security conferences nationwide. In addition, he has presented before several government alphabet-soup entities including three starting with the letter 'A', four starting with the letter 'D', a handful starting with the letters 'F' and 'S' and two starting with the today's letter, the letter 'N'. During his career as an attack and penetration specialist, Mr Long has performed active network and physical security assessments (one in the cube is worth twenty on the net) for hundreds of government and commercial clients. Johnny Long is the Author of 'Penetration Testing with Google', available December 2004 from Syngress Publishing"
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
"This presentation explores the explosive growth of a technique known as ""Google Hacking"". When the modern security landscape includes such heady topics as ""blind SQL injection"" and ""integer overflows"", it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Attendees will learn how to torque Google to detect SQL injection points and login portals, execute portscans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious ""Google hackers"", this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage. The speaker, Johnny Long, maintains the Internet's most comprehensive database of Google exposures on his website. Johnny Long did not develop his skills within the hallowed halls of higher learning but rather by spending way too many late nights huddled in front of his computer, developing his anti-social tendencies. Mr Long (Johnny's professional alter-ego) has previously presented at SANS and other computer security conferences nationwide. In addition, he has presented before several government alphabet-soup entities including three starting with the letter 'A', four starting with the letter 'D', a handful starting with the letters 'F' and 'S' and two starting with the today's letter, the letter 'N'. During his career as an attack and penetration specialist, Mr Long has performed active network and physical security assessments (one in the cube is worth twenty on the net) for hundreds of government and commercial clients. Johnny Long is the Author of 'Penetration Testing with Google', available December 2004 from Syngress Publishing"
Today we send Ovie overseas and talk with Johnny Long. Johnny talks about his upcoming talks at Blackhat and DEFCON this year. We also cover how to detect if you are being spied on by the NSA, the VA gets it laptop back, and guess what, Microsoft is getting sued!
Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference
If you know good tech, you can smell bad tech from a mile away. Bad tech is the stuff that makes you laugh out loud in a theater when all the "normal" people around you thought something k-rad just happened. The stuff that makes real hackers cringe, furious that they missed their true calling: the cushy life of a Hollywood "technical consultant". Then again, maybe Hollywood got it right, and the hackers have it all confused. Judge for yourself as Johnny slings the code that quite possibly explains what, exactly those boneheads must have been thinking. If you can piece together the meaning behind the code, and guess the pop culture reference first, you'll win the respect of your peers and possibly one of many dandy prizes. Either way you'll relish in the utter stupidity (or brilliance) of Hollywood's finest hacking moments. Johnny Long is a "clean-living" family guy who just so happens to like hacking stuff. A college dropout, Johnny overcompensates by writing books, speaking at conferences and hanging around with really smart people. Johnny is currently working on the final third of the coveted "Hacker Pirate Ninja" title, which has thus far evaded even the most erudite of academics. Johnny can be reached through his website at http://johnny.ihackstuff.com"
Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference
In this day and age, forensics evidence lurks everywhere. This talk takes attendees on a brisk walk through the modern technological landscape in search of hidden digital data. Some hiding places are more obvious than others, but far too many devices are overlooked in a modern forensics investigation. As we touch on each device, we'll talk about the possibilities for the forensic investigator, and take a surprising and fun look at the nooks and crannies of many devices considered commonplace in today's society. For each device, we'll look at what can be hidden and talk about various detection and extraction techniques, avoiding at all costs the obvious "oh I knew that" path of forensics investigation. All this will of course be tempered with Johnny's usual flair, some fun (and admittedly rowdy) "where's the evidence" games, and some really cool giveaways. Johnny Long is a "clean-living" family guy who just so happens to like hacking stuff. A college dropout, Johnny overcompensates by writing books, speaking at conferences and hanging around with really smart people. Johnny is currently working on the final third of the coveted "Hacker Pirate Ninja" title, which has thus far evaded even the most erudite of academics. Johnny can be reached through his website at http://johnny.ihackstuff.com"
Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference
Google Hacking returns for more guaranteed fun this year at Blackhat USA! If you haven't caught one of Johnny's Google talks, you definitely should. Come and witness all the new and amazing things that can be done with Google. All new for BH USA 2005, Johnny reveals basic and advanced search techniques, basic and advanced hacking techniques, multi-engine attack query morphing, and zero-packet target foot printing and recon techniques. Check out Google's search-blocking tactics (and see them bypassed), and learn all about using Google to locate targets Google doesn't even know about! But wait, there's more! Act now and Johnny will throw in the all new "Google Hacking Victim Showcase, 2005" loaded with tons of screenshots (and supporting queries) of some of the most unfortunate victims of this fun, addictive and deadly form of Internet nastiness. Think you're too uber to be caught in a Google talk? Fine. Prove your badness. Win the respect of the audience by crushing the live Google Hacking contest! Submit your unique winning query by the end of the talk to win free books from Syngress Publishing and other cool gear! Or don't. Just listen to your friends rave about it. Whatever. Johnny Long is a "clean-living" family guy who just so happens to like hacking stuff. Over the past two years, Johnny's most visible focus has been on this Google hacking "thing" which has served as yet another diversion to a serious (and bill-paying) job as a professional hacker and security researcher for Computer Sciences Corporation. In his spare time, Johnny enjoys making random pirate noises ("Yarrrrr!"), spending time with his wife and kids, convincing others that acting like a kid is part of his job as a parent, feigning artistic ability with programs like Bryce and Photoshop, pushing all the pretty shiny buttons on them new-fangled Mac computers, and making much-too-serious security types either look at him funny or start laughing uncontrollably. Johnny has written or contributed to several books, including "Google Hacking for Penetration Testers" from Syngress Publishing, which has secured rave reviews and has lots of pictures.
Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference
Jeff Moss, founder of Black Hat, invites Chief Information Security Officers from global corporations to join him on stage for a unique set of questions and answers. What do CISOs think of Black Hat, David Litchfield, Dan Kaminsky, Joe Grand, Johnny Long, Metasploit, and DEFCON? How many years before deperimeterization is a reality? Is security research more helpful or harmful to the economy? What privacy practices do CISOs personally use? These questions and others from the audience will be fielded by this panel of security visionaries. Scott Blake is Chief Information Security Officer for Liberty Mutual Insurance Group and is responsible for information security strategy and policy. Prior to joining Liberty, Scott was Vice President of Information Security for BindView Corporation where he founded the RAZOR security research team and directed security technology, market, and public affairs strategy. Scott has delivered many lectures on all aspects of information security and is frequently sought by the press for expert commentary. Since 1993, Scott has also worked as a security consultant, IT director, and network engineer. He holds an MA in Sociology from Brandeis University, a BA in Social Sciences from Simon's Rock College, and holds the CISM and CISSP security certifications. Pamela Fusco, CISSP, CISM, CHS-III, Chief Security Officer, Merck and Co., Inc. Pamela Fusco is an Executive Global Information Security Professional, for Merck and CO., Inc. She has accumulated over 19 years of substantial experience within the Security Industry. Her extensive background and expertise expand globally encompassing all facets of security inclusive of logical, physical, personal, facilities, systems, networks, wireless, and forensic investigations. Presently she leads a talented team of Compliance, Systems and Information Security Engineers operating a world-wide 24X7X365 SIRT (security incident response team). Andre Gold is currently Director of Information Security at Continental Airlines, one of the world's largest and most successful commercial and freight transportation providers. Before assuming his current role, Mr. Gold served as Technical Director of Internet Services, responsible for Continental's continental.com property, which contributes over a billion dollars a year in revenue for Continental. Prior to Continental Airlines, Inc. Mr. Gold worked as a consultant in the IT industry. Mr. Gold has a BBA in Computer Information Systems from the University of Houston-Downtown and received his commission in the Army from Wentworth Military Academy. In addition to his position at Continental, Mr. Gold servers on the Microsoft Chief Security Officer Council, the Skyteam Data Privacy and Security Subcommittee, as well as eEye Digital Security's Executive Advisory Council. Ken Pfeil is CSO at Capital IQ, a web-based information service company headquartered in New York City. His experience spans over two decades with companies such as Microsoft, Dell, Avaya, Identix, and Merrill Lynch. Ken is coauthor of the books "Hack Proofing Your Network - 2nd Edition" and "Stealing the Network - How to Own the Box," and a contributing author of "Security Planning and Disaster Recovery" and "Network Security - The Complete Reference." Justin Somaini is Director of Information Security at VeriSign Inc. where he is responsible for managing all aspects of network and information security for VeriSign. With over 10 years of Information Security and Corporate Audit experience, Justin has leveraged his knowledge of audit and large organizations to remediate global infrastructure problems and create a full risk identification and remediation Information Security group. Previously, Justin was the Director of Information Security Services for Charles Schwab Inc., where he was responsible for all aspects of Information Security Operations. Before that he was a Manager with PricewaterhouseCoopers LLP where he spent several years developing their attack and penetration leadership and audit practice.>
Black Hat Briefings, Las Vegas 2005 [Video] Presentations from the security conference
Google Hacking returns for more guaranteed fun this year at Blackhat USA! If you haven't caught one of Johnny's Google talks, you definitely should. Come and witness all the new and amazing things that can be done with Google. All new for BH USA 2005, Johnny reveals basic and advanced search techniques, basic and advanced hacking techniques, multi-engine attack query morphing, and zero-packet target foot printing and recon techniques. Check out Google's search-blocking tactics (and see them bypassed), and learn all about using Google to locate targets Google doesn't even know about! But wait, there's more! Act now and Johnny will throw in the all new "Google Hacking Victim Showcase, 2005" loaded with tons of screenshots (and supporting queries) of some of the most unfortunate victims of this fun, addictive and deadly form of Internet nastiness. Think you're too uber to be caught in a Google talk? Fine. Prove your badness. Win the respect of the audience by crushing the live Google Hacking contest! Submit your unique winning query by the end of the talk to win free books from Syngress Publishing and other cool gear! Or don't. Just listen to your friends rave about it. Whatever. Johnny Long is a "clean-living" family guy who just so happens to like hacking stuff. Over the past two years, Johnny's most visible focus has been on this Google hacking "thing" which has served as yet another diversion to a serious (and bill-paying) job as a professional hacker and security researcher for Computer Sciences Corporation. In his spare time, Johnny enjoys making random pirate noises ("Yarrrrr!"), spending time with his wife and kids, convincing others that acting like a kid is part of his job as a parent, feigning artistic ability with programs like Bryce and Photoshop, pushing all the pretty shiny buttons on them new-fangled Mac computers, and making much-too-serious security types either look at him funny or start laughing uncontrollably. Johnny has written or contributed to several books, including "Google Hacking for Penetration Testers" from Syngress Publishing, which has secured rave reviews and has lots of pictures.
Black Hat Briefings, Las Vegas 2005 [Video] Presentations from the security conference
Jeff Moss, founder of Black Hat, invites Chief Information Security Officers from global corporations to join him on stage for a unique set of questions and answers. What do CISOs think of Black Hat, David Litchfield, Dan Kaminsky, Joe Grand, Johnny Long, Metasploit, and DEFCON? How many years before deperimeterization is a reality? Is security research more helpful or harmful to the economy? What privacy practices do CISOs personally use? These questions and others from the audience will be fielded by this panel of security visionaries. Scott Blake is Chief Information Security Officer for Liberty Mutual Insurance Group and is responsible for information security strategy and policy. Prior to joining Liberty, Scott was Vice President of Information Security for BindView Corporation where he founded the RAZOR security research team and directed security technology, market, and public affairs strategy. Scott has delivered many lectures on all aspects of information security and is frequently sought by the press for expert commentary. Since 1993, Scott has also worked as a security consultant, IT director, and network engineer. He holds an MA in Sociology from Brandeis University, a BA in Social Sciences from Simon's Rock College, and holds the CISM and CISSP security certifications. Pamela Fusco, CISSP, CISM, CHS-III, Chief Security Officer, Merck and Co., Inc. Pamela Fusco is an Executive Global Information Security Professional, for Merck and CO., Inc. She has accumulated over 19 years of substantial experience within the Security Industry. Her extensive background and expertise expand globally encompassing all facets of security inclusive of logical, physical, personal, facilities, systems, networks, wireless, and forensic investigations. Presently she leads a talented team of Compliance, Systems and Information Security Engineers operating a world-wide 24X7X365 SIRT (security incident response team). Andre Gold is currently Director of Information Security at Continental Airlines, one of the world's largest and most successful commercial and freight transportation providers. Before assuming his current role, Mr. Gold served as Technical Director of Internet Services, responsible for Continental's continental.com property, which contributes over a billion dollars a year in revenue for Continental. Prior to Continental Airlines, Inc. Mr. Gold worked as a consultant in the IT industry. Mr. Gold has a BBA in Computer Information Systems from the University of Houston-Downtown and received his commission in the Army from Wentworth Military Academy. In addition to his position at Continental, Mr. Gold servers on the Microsoft Chief Security Officer Council, the Skyteam Data Privacy and Security Subcommittee, as well as eEye Digital Security's Executive Advisory Council. Ken Pfeil is CSO at Capital IQ, a web-based information service company headquartered in New York City. His experience spans over two decades with companies such as Microsoft, Dell, Avaya, Identix, and Merrill Lynch. Ken is coauthor of the books "Hack Proofing Your Network - 2nd Edition" and "Stealing the Network - How to Own the Box," and a contributing author of "Security Planning and Disaster Recovery" and "Network Security - The Complete Reference." Justin Somaini is Director of Information Security at VeriSign Inc. where he is responsible for managing all aspects of network and information security for VeriSign. With over 10 years of Information Security and Corporate Audit experience, Justin has leveraged his knowledge of audit and large organizations to remediate global infrastructure problems and create a full risk identification and remediation Information Security group. Previously, Justin was the Director of Information Security Services for Charles Schwab Inc., where he was responsible for all aspects of Information Security Operations. Before that he was a Manager with PricewaterhouseCoopers LLP where he spent several years developing their attack and penetration leadership and audit practice.>
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
"In this day and age, forensics evidence lurks everywhere. This talk takes attendees on a brisk walk through the modern technological landscape in search of hidden digital data. Some hiding places are more obvious than others, but far too many devices are overlooked in a modern forensics investigation. As we touch on each device, we'll talk about the possibilities for the forensic investigator, and take a surprising and fun look at the nooks and crannies of many devices considered commonplace in today's society. For each device, we'll look at what can be hidden and talk about various detection and extraction techniques, avoiding at all costs the obvious "oh I knew that" path of forensics investigation. All this will of course be tempered with Johnny's usual flair, some fun (and admittedly rowdy) "where's the evidence" games, and some really cool giveaways. Johnny Long is a "clean-living" family guy who just so happens to like hacking stuff. A college dropout, Johnny overcompensates by writing books, speaking at conferences and hanging around with really smart people. Johnny is currently working on the final third of the coveted "Hacker Pirate Ninja" title, which has thus far evaded even the most erudite of academics. Johnny can be reached through his website at http://johnny.ihackstuff.com"
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
"If you know good tech, you can smell bad tech from a mile away. Bad tech is the stuff that makes you laugh out loud in a theater when all the "normal" people around you thought something k-rad just happened. The stuff that makes real hackers cringe, furious that they missed their true calling: the cushy life of a Hollywood "technical consultant". Then again, maybe Hollywood got it right, and the hackers have it all confused. Judge for yourself as Johnny slings the code that quite possibly explains what, exactly those boneheads must have been thinking. If you can piece together the meaning behind the code, and guess the pop culture reference first, you'll win the respect of your peers and possibly one of many dandy prizes. Either way you'll relish in the utter stupidity (or brilliance) of Hollywood's finest hacking moments. Johnny Long is a "clean-living" family guy who just so happens to like hacking stuff. A college dropout, Johnny overcompensates by writing books, speaking at conferences and hanging around with really smart people. Johnny is currently working on the final third of the coveted "Hacker Pirate Ninja" title, which has thus far evaded even the most erudite of academics. Johnny can be reached through his website at http://johnny.ihackstuff.com"
We are very proud to bring you the exclusive interview with Johnny Long. I would like everyone to go out and buy two copies of his Google hacking book from Johnny's web site because 100% of the proceed go to charity, and everyone should have a copy for work and a copy for home :) Here are the links to purchase: Purchase the book here - All proceeds benefit the Compassion International Children's Fund. NOTE: There was some lag on this call, we're sorry, hoping to upgrading bandwith or replace Skype with something better. How Johnny set a new world record for employment (well sorta) The history of "Google Hacking" How johnny.ihackstuff.com came to be the wonderful Google hacking source Johnny discuss an assortment of Google hacking tools, such as BiDiHBLAH, bile, Wikto, and AdvancedDork Hear the "behind the scenes" of Johnny's "Hacking Hollywood" presentation he gave at Schmoocon Johnny discusses some of his other books, including "OS X for the Hackers Heart" and the Stealing the Network Series Ethics, religion, and being yourself Good advice for life, Kung Fu, and being a penetration tester
This show features an interview with Johnny Long. Johnny talks about his work with GoogleHacking and his new book OS X for Hackers at Heart. Also in this episode, web based network tools, how to trace an email, more info on WMF vulnerability, and sticky note Firefox extension.