Podcast appearances and mentions of Johnny Long

  • 30PODCASTS
  • 51EPISODES
  • 47mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Mar 31, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Johnny Long

Latest podcast episodes about Johnny Long

Round the World With Cracklin Jane

1 - Queen Bee Blues - Eddie "Cleanhead" Vinson - 19502 - Woodman, Spare that Tree - Bert Williams - 19133 - Ever Lovin Bee - Ace Brigode and his 14 Virginians – 19254 - They Cut Down the Old Pine Tree - Perry B. Lipson and Joe Rines and his Orchestra - 19325 - Deep Elm - Ben Pollack and his Orchestra – 19366 - Be My Little Babay Bumble Bee - Ada Jones and Billy Murray - 19127 - Bumble Bee Schottische - Whoopee John Polka Band – 19488 - Flight of the Bumble Bee (Rimsky Korsakov) - Harry James and his Orchestra – 19409 – Honeydew – Joseph C Smith Orchestra - 192010 - Leave my Honey Bee Alone - Merle Travis - 194811 - Buzzin' Round with the Bee - Lionel Hampton and his Orchestra – 193712 - We'll Find Our Shelter Before the Rain - George Beaver and the Carolina Collegians - 192913 - Bee Boogie Boo - Bob Mosely and the All Stars – 194514 - All the Bees are Buzzin Round My Honey - Janet Brace and The Glee Club with Johnny Long and his Orchestra - 194915 - Dance of the Honey Bees - Victor Orchestra – 191316 - Busy as a Bee (I'm Buzz, Buzz, Buzzin') - Helen Forrest with Benny Goodman and his Orchestra – 1939

The Big Band and Swing Podcast
The Fifth Year Goodbye (Show 253)

The Big Band and Swing Podcast

Play Episode Listen Later Mar 7, 2025 34:39


In this final episode of The Big Band and Swing Podcast we listen to vintage music by Charlie Spivak, Johnny Long and Stan Kenton. Thank you so much for listening these past five years. * The music featured in this podcast is considered Public Domain.  Artists are credited within the podcast.

The Big Band and Swing Podcast
Victory In The Blue Of Evening (Show 244)

The Big Band and Swing Podcast

Play Episode Listen Later Jan 3, 2025 30:38


Features vintage recordings by Al Donahue, Johnny Long and Guy Lombardo.  We also learn a little bit about the show Victory Parade of Spotlight Bands. Consider supporting The Big Band and Swing Podcast by becoming a Hepcat.  Learn more at SupportSwing.com. * The music featured in this podcast is considered Public Domain.  Artists are credited within the podcast.

In All Things
Episode 152: Laying the Groundwork for the Next Steps of World Outreach | Global Movement discussions with Johnny Long, Director of Operations at World Outreach

In All Things

Play Episode Listen Later Nov 1, 2024 29:31


Dean Weaver, EPC Stated Clerk, welcomes Johnny Long, Director of Operations of World Outreach.  Dean and Johnny talk about the preparation that has gone into preparing our global workers and denomination for the next steps of World Outreach.

The Big Band and Swing Podcast
Kick It Under The Chestnut Tree (Show 231)

The Big Band and Swing Podcast

Play Episode Listen Later Sep 27, 2024 28:28


Features vintage recordings by Gene Krupa, Glenn Miller and Ray McKinley.  Ronnaldo plays a Soundie by Johnny Long and we also learn that Grandfather always loved Mac and Cheese.  Consider supporting The Big Band and Swing Podcast by becoming a Hepcat.  Learn more at SupportSwing.com. * The music featured in this podcast is considered Public Domain.  Artists are credited within the podcast.

Escape Collective
How much gold is too much gold?

Escape Collective

Play Episode Listen Later Sep 4, 2024 51:09


Johnny Long and Ronan Mc Laughlin join Caley Fretz on this week's Placeholders to discuss the Vuelta, Remco Evenpoel, transfers, and more from around the cycling world.

The Big Band and Swing Podcast
Hey, Let's Go To Town (Show 216)

The Big Band and Swing Podcast

Play Episode Listen Later Jun 14, 2024 31:51


Features vintage music by Tony Pastor, Johnny Long and Les Elgart.  We also learn about the show "Let's Go To Town". Consider supporting The Big Band and Swing Podcast by becoming a Hepcat.  Learn more at SupportSwing.com. * The music featured in this podcast is considered Public Domain.  Artists are credited within the podcast.

The Big Band and Swing Podcast
A Dozen Roses For You (Show 198)

The Big Band and Swing Podcast

Play Episode Listen Later Feb 9, 2024 32:39


Features vintage recordings by Johnny Long, Artie Shaw and Glenn Miller.  Ronnaldo also plays a Snader Telescription by The Dinning Sisters. Consider supporting The Big Band and Swing Podcast by becoming a Hepcat.  Learn more at SupportSwing.com. * All music in this podcast are Creative Commons.  Artists are credited within the podcast.

The Big Band and Swing Podcast
Keyholes at the Woodside (Show 193)

The Big Band and Swing Podcast

Play Episode Listen Later Jan 5, 2024 33:01


Features music by Buddy Rich, Johnny Long, Andy Kirk and The Andrews Sisters.  We also listen to a Soundie by Cab Calloway and learn about changes with the newsletter.  Consider supporting The Big Band and Swing Podcast by becoming a Hepcat.  Learn more at SupportSwing.com. * All music in this podcast are Creative Commons.  Artists are credited within the podcast.

In All Things
Episode 104: The Generous Side of Fair | A Discussion with Johnny Long, Executive Director and World Outreach National Committee Member.

In All Things

Play Episode Listen Later Nov 24, 2023 21:25


Dean Weaver, EPC Stated Clerk, welcomes Johnny Long, Executive Director of Signal Mountain Presbyterian Church, to discuss the challenges of overseeing ministries at the local church and the exciting mission efforts going on at the EPC.

Get Real With Rick Dancer
Get Real With Rick Dancer: A Hell of a Story Johnny Long

Get Real With Rick Dancer

Play Episode Listen Later Nov 15, 2023 40:13


Johnny Long spent time in prison. He was addicted to drug for years. He's made a lot of mistakes but his heart is made of gold and finally he has found his story. He talks about learning to edit that story, change the punctuation and answer many of the questions, leaving periods in places he'd never seen boundaries before. This interview will inspire you and make you look at your own life much differently.

Heart of a Lion
Heart of a Lion - Episode 56

Heart of a Lion

Play Episode Listen Later Oct 6, 2023


Hear from UNA Hall of Famers Matt Peck, Trey Mitchell, Pat Jackson, Chloe Roberts, Ande Jones, Tyrone Rush, Johnny Long and Gary Elliott.

Hacker Valley Studio
Learning from Cybersecurity Legends with Davin Jackson

Hacker Valley Studio

Play Episode Listen Later Aug 4, 2022 29:56


Those on the red team may not be household names to the everyday person, but they are absolutely legends and icons in the world of cybersecurity and hacking. While we have our personal favorite hackers between the two of us, we also invite our guest, Davin Jackson, to share his favorite cybersecurity legends and the lessons he's learned from them. Timecode Guide: [00:50] The importance of red teaming, especially during this season [02:17] Ron and Chris' first experience working in a red team environment [11:23] Communication and collaboration between blue and red [16:53] Knowledge gained from Davin Jackson's humble beginnings in tech [22:19] Gaining the blue perspective with Hacker Valley Blue Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life! Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy today! _____________ Legends, Icons, Teachers, and Friends From Marcus Carey to Johnny Long, we're excited to share the legends that had an early influence and lasting impact on our careers in cybersecurity. While our two backgrounds in red teaming are different, we can attribute so much of our success and our ability to share our knowledge with all of you to the experts that were willing to invite us to join and learn the best hacking techniques alongside them. “I think that's the most important thing in red teaming, it's passing that knowledge on to someone else.” - Chris Cochran   Communication, collaboration, and community instead of red vs blue It is not two teams with two separate fights when we're talking about red teams and blue teams. Often, when cybersecurity is too focused on this split between offensive and defensive, we forget to collaborate and fall short of improving on issues we discovered. Communication between red and blue can be a costly struggle, which is why we're happy to see our sponsor PlexTrac stepping in to develop communication technology for these teams. “There's this push and pull of collaboration. On one hand, you want the red team to work autonomously…but on the other hand, they do need insight if you're going to go deeper and deeper.” - Ron Eddings   Legends met, lessons learned, tech loneliness understood In the latter half of our episode, we're joined by Hacker Valley Blue host Davin Jackson, also known as DJax Alpha. Davin started his cybersecurity journey with no computer of his own. Working his way up from basic tech jobs at corporations like Circuit City, lessons Davin learned from the legends he looked up to include finding a mentor, focusing on networking (even when it feels like a dead end), and being always willing to share what you've learned. “It's about consistency, and you have to have self control and discipline…It's one thing to get it, but it's another to maintain that success.” - Davin ---------- Spend some time with our guest, Davin Jackson (DJax Alpha/Alpha Cyber Security) on his website, Twitter, Instagram, Facebook, and weekly on the Hacker Valley Blue podcast. Follow Ron Eddings on Twitter and LinkedIn Catch up with Chris Cochan on Twitter and LinkedIn Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Hacker Valley Red
Learning from Cybersecurity Legends with Davin Jackson

Hacker Valley Red

Play Episode Listen Later May 20, 2022 29:23


Those on the red team may not be household names to the everyday person, but they are absolute legends and icons in the world of cybersecurity and hacking. While we have our personal favorite hackers between the two of us, we also invite our guest, Davin Jackson, to share his favorite cybersecurity legends and the lessons he's learned from them. Timecode Guide: [00:50] The importance of red teaming, especially during this season [02:17] Ron and Chris' first experience working in a red team environment [11:23] Communication and collaboration between blue and red [16:53] Knowledge gained from Davin Jackson's humble beginnings in tech [22:19] Gaining the blue perspective with Hacker Valley Blue   Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life! Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone PlexTrac, the proactive cybersecurity management platform, brings red and blue teams together for better collaboration and communication. Check them out at plextrac.com/hackervalley Legends, Icons, Teachers, and Friends From Marcus Carey to Johnny Long, we're excited to share the legends that had an early influence and lasting impact on our careers in cybersecurity. While our two backgrounds in red teaming are different, we can attribute so much of our success and our ability to share our knowledge with all of you to the experts that were willing to invite us to join and learn the best hacking techniques alongside them. “I think that's the most important thing in red teaming, it's passing that knowledge on to someone else.” - Chris Cochran   Communication, collaboration, and community instead of red vs blue It is not two teams with two separate fights when we're talking about red teams and blue teams. Often, when cybersecurity is too focused on this split between offensive and defensive, we forget to collaborate and fall short of improving on issues we discovered. Communication between red and blue can be a costly struggle, which is why we're happy to see our sponsor PlexTrac stepping in to develop communication technology for these teams. “There's this push and pull of collaboration. On one hand, you want the red team to work autonomously…but on the other hand, they do need insight if you're going to go deeper and deeper.” - Ron Eddings   Legends met, lessons learned, tech loneliness understood In the latter half of our episode, we're joined by Hacker Valley Blue host Davin Jackson, also known as DJax Alpha. Davin started his cybersecurity journey with no computer of his own. Working his way up from basic tech jobs at corporations like Circuit City, lessons Davin learned from the legends he looked up to include finding a mentor, focusing on networking (even when it feels like a dead end), and being always willing to share what you've learned. “It's about consistency, and you have to have self control and discipline…It's one thing to get it, but it's another to maintain that success.” - Davin   Hacking the Vocabulary: Pen test — Pen test, or penetration testing, is a method of identifying and testing vulnerabilities and gaps in an IT security system that could be exploited. This can also be referred to as “ethical hacking”. Popping a shell — A slang term for when a hacker exploits a security vulnerability to make a program run a hacker code. Red team — A group within an organization made up of offensive security experts who try to attack an organization's cybersecurity defenses. Blue team — A group of defensive security experts within the same organization that defends against and responds to the red team attack. Additional resources to check out: Marcus J Carey, Johnny Long/Hackers for Charity, United States Cyber Command, Booz Allen Hamilton ---------- Spend some time with our guest, Davin Jackson (DJax Alpha/Alpha Cyber Security) on his website, Twitter, Instagram, Facebook, and on the Hacker Valley Blue podcast. Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. Follow Ron Eddings on Twitter and LinkedIn Catch up with Chris Cochan on Twitter and LinkedIn  

eTown
eTown Time Capsule 1997 - Robert Cray / Johnny Long

eTown

Play Episode Listen Later Sep 1, 2021 59:15


This week, we revisit a great show from 1997 to fill on with some blues. Legendary blues guitarist Robert Cray is with us, plus country blues artist Johnny Long, and an excellent vintage eChievement Award story about someone making a real difference. 

Round the World With Cracklin Jane

1 - Lucky Day - George Olsen and his Music - 19262 - Lucky Little Accident - Victor Arden - Phil Ohman Orchestra – 19323 - Opni Mi Tropni Mi - Vulkana Stoyanova - 1930s Bulgaria4 - Accident'ly On Purpose - Helen Young with Johnny Long and his Orchestra – 19415 - Beginner's Luck - Edythe Wright with Tommy Dorsey and his Orchestra - 19376 - Get Lucky - Ralph Williams and his Rainbo Orchestra – 19247 - It Was Fate When I First Met You - Bob Eberly with Jimmy Dorsey and his Orchestra - 19398 - Fate Introduced Me To You - Jacques Renard Orchestra – 19319 - Everything Happens for the Best - Billie Holiday and her Orchestra – 193910 - Fate - The Bar Harbor Society Orchestra - 192211 - Fate (Tango) - International Novelty Orchestra - 192612 - Accidents Will Happen - Bing Crosby with Victor Young and his Orchestra – 195013 - Mala Suerte (Hard Luck), Bolero - Daniel Santos Con Orquesta - 194614 - Les Souffrances De Mon Accident - Madame Bolduc – 1939 French Canada15 – Oy Vey Der Dalles (Hard Luck) - J. Feldman – 1920 Yiddish16 - Everything Happens to Me - Alyce King with Alvino Rey and his Orchestra – 194117 - Yenz' Inqab' Intombi (Unexpected Occurances) - Evening Birds – 1937 South African Zulu

Platform Skate Podcast
Episode 11 Johnny Long

Platform Skate Podcast

Play Episode Listen Later Mar 17, 2021 62:54


Johnny Long of Elevate Skateshop hangs out with us for talk about what he and his shop are up to. www.elevateskate.ca @johnny_long

Imaginary Players
"Johnny Long Walker"

Imaginary Players

Play Episode Listen Later Oct 30, 2020 181:51


The Players are back with Episode 77 The Players speak on Lil Wayne(43:00) , Kanye West (1:20:00) , The Race Card(1:43:10) , Needing Space(1:52:00) , Music(2:07:00), & So Much More

The Big Band and Swing Podcast
The Poor Jingle Segue

The Big Band and Swing Podcast

Play Episode Listen Later Jul 10, 2020 29:41


Episode 19 features music by Tommy Dorsey, Johnny Long, Judy Garland, Frank Sinatra, Benny Goodman and many more. We also listen to a great Raymond Scott performance from 1961. ...and remember, if you want to listen to more Big Band and Swing Music check out SwingCityRadio.com to hear Your Big Band Favorites from the 1930's, 40's and Today! * All music in this podcast are Creative Commons.  Artists are credited within the podcast.

The Godfather Minute
The Godfather Minute 143: Johnny Long Pause

The Godfather Minute

Play Episode Listen Later May 10, 2020 44:27


Michael convinces Johnny Fontaine to provide entertainment at the Corleone's casino in Las Vegas. See acast.com/privacy for privacy and opt-out information.

CCS School History
Ray Long and Michelle Sneed

CCS School History

Play Episode Listen Later Apr 13, 2020 7:51


Johnny Long interviewed his mom and dad (Ray Long and Michelle Sneed) about how the pandemic has impacted their lives during the school shut down in Cherokee NC.

Lost Discs Radio Show
LDRS 352 Valentines in March: The Fallout

Lost Discs Radio Show

Play Episode Listen Later Feb 23, 2020


Featuring The Jordan Bros., The Xtreems, Lee Shot Williams,Onie Wheeler, Paul and Barry Ryan, Johnny Long,Johnny Daye, Jimmy McCracklin, Motherlode,Equipe 84, Ian and The Zodiacs, Nappy Brown,and more! as broadcast live via 5130kc shortwave 2-22-20

The Hacker Next Door
Hacker for Charity Johnny Long

The Hacker Next Door

Play Episode Listen Later Oct 22, 2019 22:20


Hackers for Charity founder Johnny Long discusses Google hacking, finding God, and bringing the hacker spirit to philanthropy. Follow Hackers for Charity and Johnny at https://www.hackersforcharity.org and https://twitter.com/ihackstuff. Follow Jeremy at http://jeremynsmith.com and https://twitter.com/jeremynsmith. Learn more about Breaking and Entering at http://jeremynsmith.com/breaking-and-entering.html.

Fool's Gold Theatre Productions
Supernatural 3.13 - Wacky Wednesday

Fool's Gold Theatre Productions

Play Episode Listen Later Jul 22, 2019 31:01


In true Freaky Friday fashion, Sam and Deana have switched places. A well-meaning trouble maker is trying to make Deana understand why her sister won't give up in breaking her demon deal.           “Wacky Wednesday” Cast:          Samantha Winchester ......... Kasey Heimann          Deana Winchester ............... Amanda Gilbertson           Bobby Singer ....................... Zachary Prusak          Trickster ............................... Kendra Murray           Other voice talents include:          Libbie Baylinson          Patrick Marlon Bender          Michael Joaquin          Johnny Long          JSkeleton*           * = Forum name / Username

Audio Drama Reviews
Who's Johnny Long Arms?

Audio Drama Reviews

Play Episode Listen Later Dec 6, 2018 4:36


Read the review at http://audiodramareviews.com/audio-drama/whos-johnny-long-arms Links Twitter.com/AudioDramaNews Facebook.com/AudioDramaDigest Youtube.com/channel/UCvqiDIg0ESpYH_Zhfw_G8lg Patreon.com/audiodramareviews geo.itunes.apple.com/us/podcast/audio-drama-reviews/id1105200411 --- Send in a voice message: https://anchor.fm/audio-drama-reviews/message

arms johnny long who's johnny
PC Gamer UK
Episode 45: Johnny Long-Arms

PC Gamer UK

Play Episode Listen Later Jun 1, 2017 84:21


This week, the PC Gamer team discusses a plethora of smaller games, from Tokyo 42 to Rime. One might call it a smorgasbord. Not us, though – partly because it’s a rubbish metaphor, but mostly because we doubt Little Nightmares would be appetising. Also, we discuss what games we’d smush together into a much better game, and inevitably Dragon Age 2 is mentioned. Discussed: Tokyo 42, Danger Zone, Perception, Rime, Vanquish This week: Samuel Roberts (https://twitter.com/samuelwroberts) , Phil Savage (https://twitter.com/octaeder) , and, for the final time as a weekly participant, Andy Kelly (https://twitter.com/ultrabrilliant) The PC Gamer UK Podcast is a weekly podcast about PC gaming. Thoughts? Feedback? Requests? Tweet us @PCGamerPod (http://twitter.com/PCGamerPod) . This week’s music is from What Remains of Edith Finch. http://dl.pcgamer.com/podcasts/PCGUKpodcast/pcgukpodcast_045.mp3

Big Band Bash
Ella Fitzgerald - A 100th Birthday Celebration Part 2

Big Band Bash

Play Episode Listen Later Apr 29, 2017 59:34


Ella Fitzgerald was born on April 25th, 1917 100 years ago. She is one of the greatest jazz vocalist in jazz history and she got her start singing with the big bands. In Part Two of our celebration we'll be playing some of Ella's recordings with different big bands. Some of the big bands include Count Basie, Johnny Long, Buddy Bregman and a couple of numbers from the songbook series. In between numbers we'll finish our biography of the woman they called "The First Lady of Song." Also, The Big Band Puzzler is back this week. Please visit this podcast at http://bigbandbashfm.blogspot.com

The Audio Verse Awards Nominee Showcase Podcast
2016 Showcase: Who's Johnny Long Arms?

The Audio Verse Awards Nominee Showcase Podcast

Play Episode Listen Later Oct 20, 2016 12:34


Part 3 of today's Showcase brings you Who's Johnny Long Arms?: a self-contained original production. Who's Johnny Long Arms? is nominated for Best Original, Short Form, Self-contained Production. This production is rated PG. – The Audio Verse Awards Team Subscribe to our Nominee Showcase Podcast! Via RSS: Link Via iTunes: Link Via Google Play: Link

Gain Your Edge
Interview with a Hacker: Bill Gardner (Marshall University)

Gain Your Edge

Play Episode Listen Later Mar 11, 2016 43:23


Gain Your Edge is a twice-monthly podcast on all things IT. This week’s guest is a bona fide hacker. Bill Gardner is an assistant professor at Marshall University where he teaches in the Digital Forensics and Information Assurance degree program. He is an information security author and speaker. During this episode, Bill mentioned several resources and references which are presented below for your enjoyment:   Book Links “Ghost in the Wires” by Kevin Mitnick “Building an Information Security Awareness Program” by Bill Gardner and Valerie Thomas  “Google Hacking for Penetration Testers” by Bill Gardner, Johnny Long and Justin Brown   Conference Links DEF CON Black Hat   Other Site Links & References Dual Core, Nerdcore Music M.C. Frontalot PTES.org Cyber War Zone 1Password Reboot It Podcast Marshall University Information Security   Contact Our Guest Expert Follow Bill on Twitter!   More Host Skip Lineberg Subscribe via iTunes   Send your feedback, comments and questions to BusinessEdge@Frontier.com

The Social-Engineer Podcast
Ep. 060 –Live From DEF CON 22 with Johnny Long

The Social-Engineer Podcast

Play Episode Listen Later Aug 12, 2014 79:18


DEF CON 22 was an amazing year for us... 5 year anniversary, a packed house and Johnny Long... what more can we say.

Paul's Security Weekly
Kurt Baumgartner, Drunken Security News - Episode 331 - May 9, 2013

Paul's Security Weekly

Play Episode Listen Later May 13, 2013 59:21


Kurt Baumgartner of Kaspersky Labs joins us to talk about Red October, a research paper that he co-authored, along with the other areas that he works on at Kaspersky. It's time for another Drunken Security News. Much of the gang was on the road this week so Patrick Laverty sat in with Paul and Engineer Steve for the show, plus Jack's epic beard called in via Skype from lovely Maryland. First, Paul admitted it was a stretch to bring this into a security context but he wanted to talk about an article that he found in The Economist (via Bruce Schneier) about one theory that if the US would simply be nicer to terrorists, release them from Guantanamo Bay, Cuba and stop hunting them down around the world, that they would in turn be nicer to us. Also, fewer would pop up around the world. The thinking is that jailing and killing them turns others into terrorists. So here's the leap. Can the same be said for black hat hackers? If law enforcement agencies stop prosecuting the hackers, will they be nicer and will there be fewer of them? I think we all came to the same conclusion. "Nah." Paul also found an Adam Shostack article about how attention to the tiniest details can be important to the largest degree. The example given was the vulnerability to the Death Star in the original Star Wars movie was so small and the chances of it being exploited were so remote that the Empire overlooked it, Grand Moff Tarkin even showing his arrogance shortly before his own demise. The same can be said for our systems. It might be a tiny hole and maybe you think that no one would look for it and even if they do, what are the chances they both find it and exploit it? In some cases, it can have quite dire consequences. The Empire overlooked a small vulnerability that they shouldn't have. Are you doing the same with your systems? Did we happen to mention that Security BSides Boston is May 18 at Microsoft NERD in Cambridge, MA and Security BSides Rhode Island is June 14th and 15th in Providence, RI. Good seats and good conference swag are still available. We all hope to see you there! The Onion's Twitter account was breached by the Syrian Electronic Army and they handled it a way that only The Onion can, making light of both themselves and the SEA. Additionally, possibly for the first time ever, The Onion published a non-parody post about exactly how the breach occurred. Additionally, the National Republican Congressional Committee (NRCC) web site got spam hacked/defaced with Viagra ads. The only thing we were wondering is, are we sure it was hacked and not just a convenient online pharmacy for their members? A new whitepaper was released from MIT talking about "Honeywords". The problem being solved here is creating a way for server admins to know sooner when a passwords file has been breached on a server. In addition to the correct password, this new system would add a bunch of fake passwords as well. When the attacker starts trying usernames and passwords, if they use one of the fake passwords, the server admin would be notified that someone is doing that and it is very likely that the passwords file has been breached. It's an interesting concept to ponder. Jack had an article from Dennis Fisher at Threatpost, asking the question about what's the point of blaming various people for cyberespionage if we don't have a plan to do something about it. The NSA also has its own 643 page document telling its members how to use Google to find things like Excel documents in Russian that contain the word "login". Wait, I feel like I've heard of this somewhere before. Oh yeah, that's right. Johnny Long was talking about Google Hacking at least as far back as 2007. It's just interesting some times to see things that the media gets wind of and without the slightest bit of checking, thinks something is "new".

Paul's Security Weekly
Johnny Long - Episode 265 - October 28, 2011

Paul's Security Weekly

Play Episode Listen Later Nov 1, 2011 23:11


Part 1 - Interview with Johnny Long:

Paul's Security Weekly
Paul's Security Weekly - Episode 200 FINAL - June 4th, 2010

Paul's Security Weekly

Play Episode Listen Later Jun 30, 2010 80:14


Episode 200 Show Notes Episode 200 all day podcast in support of hackersforcharity.org. FINAL: In the last release from 200 Sonny Crocket joins us as we discuss ZigBee, Linux hardening and Stories from the week. Remember its never to little or to late to donate to Johnny Long's hackers for charity. Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand, Mick Douglas, Carlos "Dark0perator" Perez Audio Feeds:

Paul's Security Weekly
Paul's Security Weekly - Episode 200 part 5 - June 4th, 2010

Paul's Security Weekly

Play Episode Listen Later Jun 23, 2010 42:38


Episode 200 Show Notes HISTORIC Episode 200 all day podcast in support of hackersforcharity.org. Part 5: Retired competitive food eater and lover of the entire snuggy product line, Dennis Brown joins us to discuss how easy it is to get a hold of your very own Zeus botnet. Learn how much a few grand gets you, and what functionality. Remember its never to little or to late to donate to Johnny Long's hackers for charity. Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand, Mick Douglas, Carlos "Dark0perator" Perez Audio Feeds:

Paul's Security Weekly
Paul's Security Weekly - Episode 200 part 4 - June 4th, 2010

Paul's Security Weekly

Play Episode Listen Later Jun 22, 2010 28:09


Episode 200 Show Notes HISTORIC Episode 200 all day podcast in support of hackersforcharity.org. Part 4: Paul Joyal from, Mr. J's Havana shop in West Warwick, RI, joins us to go a bit off topic and talk about cigars. So light up your favorite stick and sit back and enjoy something NOT security related. Remember its never to little or to late to donate to Johnny Long's hackers for charity. Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand, Mick Douglas, Carlos "Dark0perator" Perez Audio Feeds:

Paul's Security Weekly
Paul's Security Weekly - Episode 200 part 3 - June 4th, 2010

Paul's Security Weekly

Play Episode Listen Later Jun 16, 2010 53:33


Episode 200 Show Notes HISTORIC Episode 200 all day podcast in support of hackersforcharity.org. Part 3: Ron from Tenable Security and Anthony from Core Security take on an array of listener questions about their respective products. Remember its never to little or to late to donate to Johnny Long's hackers for charity. Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand, Mick Douglas, Carlos "Dark0perator" Perez Audio Feeds:

Paul's Security Weekly
Paul's Security Weekly - Episode 139 - February 7, 2009

Paul's Security Weekly

Play Episode Listen Later Feb 9, 2009 53:40


Paul and Larry talk coming at you live from Shmoocon 2009! Special guests include Marcus Carey, Johnny Long, Listener Karl, Mubix, and Matthew Carpenter! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference

"This presentation explores the explosive growth of a technique known as ""Google Hacking"". When the modern security landscape includes such heady topics as ""blind SQL injection"" and ""integer overflows"", it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Attendees will learn how to torque Google to detect SQL injection points and login portals, execute portscans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious ""Google hackers"", this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage. The speaker, Johnny Long, maintains the Internet's most comprehensive database of Google exposures on his website. Johnny Long did not develop his skills within the hallowed halls of higher learning but rather by spending way too many late nights huddled in front of his computer, developing his anti-social tendencies. Mr Long (Johnny's professional alter-ego) has previously presented at SANS and other computer security conferences nationwide. In addition, he has presented before several government alphabet-soup entities including three starting with the letter 'A', four starting with the letter 'D', a handful starting with the letters 'F' and 'S' and two starting with the today's letter, the letter 'N'. During his career as an attack and penetration specialist, Mr Long has performed active network and physical security assessments (one in the cube is worth twenty on the net) for hundreds of government and commercial clients. Johnny Long is the Author of 'Penetration Testing with Google', available December 2004 from Syngress Publishing"

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference

"This presentation explores the explosive growth of a technique known as ""Google Hacking"". When the modern security landscape includes such heady topics as ""blind SQL injection"" and ""integer overflows"", it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Attendees will learn how to torque Google to detect SQL injection points and login portals, execute portscans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious ""Google hackers"", this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage. The speaker, Johnny Long, maintains the Internet's most comprehensive database of Google exposures on his website. Johnny Long did not develop his skills within the hallowed halls of higher learning but rather by spending way too many late nights huddled in front of his computer, developing his anti-social tendencies. Mr Long (Johnny's professional alter-ego) has previously presented at SANS and other computer security conferences nationwide. In addition, he has presented before several government alphabet-soup entities including three starting with the letter 'A', four starting with the letter 'D', a handful starting with the letters 'F' and 'S' and two starting with the today's letter, the letter 'N'. During his career as an attack and penetration specialist, Mr Long has performed active network and physical security assessments (one in the cube is worth twenty on the net) for hundreds of government and commercial clients. Johnny Long is the Author of 'Penetration Testing with Google', available December 2004 from Syngress Publishing"

CyberSpeak's Podcast
CyberSpeak July 9, 2006

CyberSpeak's Podcast

Play Episode Listen Later Jul 11, 2006 43:20


Today we send Ovie overseas and talk with Johnny Long.  Johnny talks about his upcoming talks at Blackhat and DEFCON this year.  We also cover how to detect if you are being spied on by the NSA, the VA gets it laptop back, and guess what, Microsoft is getting sued!

Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference

If you know good tech, you can smell bad tech from a mile away. Bad tech is the stuff that makes you laugh out loud in a theater when all the "normal" people around you thought something k-rad just happened. The stuff that makes real hackers cringe, furious that they missed their true calling: the cushy life of a Hollywood "technical consultant". Then again, maybe Hollywood got it right, and the hackers have it all confused. Judge for yourself as Johnny slings the code that quite possibly explains what, exactly those boneheads must have been thinking. If you can piece together the meaning behind the code, and guess the pop culture reference first, you'll win the respect of your peers and possibly one of many dandy prizes. Either way you'll relish in the utter stupidity (or brilliance) of Hollywood's finest hacking moments. Johnny Long is a "clean-living" family guy who just so happens to like hacking stuff. A college dropout, Johnny overcompensates by writing books, speaking at conferences and hanging around with really smart people. Johnny is currently working on the final third of the coveted "Hacker Pirate Ninja" title, which has thus far evaded even the most erudite of academics. Johnny can be reached through his website at http://johnny.ihackstuff.com"

Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference

In this day and age, forensics evidence lurks everywhere. This talk takes attendees on a brisk walk through the modern technological landscape in search of hidden digital data. Some hiding places are more obvious than others, but far too many devices are overlooked in a modern forensics investigation. As we touch on each device, we'll talk about the possibilities for the forensic investigator, and take a surprising and fun look at the nooks and crannies of many devices considered commonplace in today's society. For each device, we'll look at what can be hidden and talk about various detection and extraction techniques, avoiding at all costs the obvious "oh I knew that" path of forensics investigation. All this will of course be tempered with Johnny's usual flair, some fun (and admittedly rowdy) "where's the evidence" games, and some really cool giveaways. Johnny Long is a "clean-living" family guy who just so happens to like hacking stuff. A college dropout, Johnny overcompensates by writing books, speaking at conferences and hanging around with really smart people. Johnny is currently working on the final third of the coveted "Hacker Pirate Ninja" title, which has thus far evaded even the most erudite of academics. Johnny can be reached through his website at http://johnny.ihackstuff.com"

Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference

Google Hacking returns for more guaranteed fun this year at Blackhat USA! If you haven't caught one of Johnny's Google talks, you definitely should. Come and witness all the new and amazing things that can be done with Google. All new for BH USA 2005, Johnny reveals basic and advanced search techniques, basic and advanced hacking techniques, multi-engine attack query morphing, and zero-packet target foot printing and recon techniques. Check out Google's search-blocking tactics (and see them bypassed), and learn all about using Google to locate targets Google doesn't even know about! But wait, there's more! Act now and Johnny will throw in the all new "Google Hacking Victim Showcase, 2005" loaded with tons of screenshots (and supporting queries) of some of the most unfortunate victims of this fun, addictive and deadly form of Internet nastiness. Think you're too uber to be caught in a Google talk? Fine. Prove your badness. Win the respect of the audience by crushing the live Google Hacking contest! Submit your unique winning query by the end of the talk to win free books from Syngress Publishing and other cool gear! Or don't. Just listen to your friends rave about it. Whatever. Johnny Long is a "clean-living" family guy who just so happens to like hacking stuff. Over the past two years, Johnny's most visible focus has been on this Google hacking "thing" which has served as yet another diversion to a serious (and bill-paying) job as a professional hacker and security researcher for Computer Sciences Corporation. In his spare time, Johnny enjoys making random pirate noises ("Yarrrrr!"), spending time with his wife and kids, convincing others that acting like a kid is part of his job as a parent, feigning artistic ability with programs like Bryce and Photoshop, pushing all the pretty shiny buttons on them new-fangled Mac computers, and making much-too-serious security types either look at him funny or start laughing uncontrollably. Johnny has written or contributed to several books, including "Google Hacking for Penetration Testers" from Syngress Publishing, which has secured rave reviews and has lots of pictures.

Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference

Jeff Moss, founder of Black Hat, invites Chief Information Security Officers from global corporations to join him on stage for a unique set of questions and answers. What do CISOs think of Black Hat, David Litchfield, Dan Kaminsky, Joe Grand, Johnny Long, Metasploit, and DEFCON? How many years before deperimeterization is a reality? Is security research more helpful or harmful to the economy? What privacy practices do CISOs personally use? These questions and others from the audience will be fielded by this panel of security visionaries. Scott Blake is Chief Information Security Officer for Liberty Mutual Insurance Group and is responsible for information security strategy and policy. Prior to joining Liberty, Scott was Vice President of Information Security for BindView Corporation where he founded the RAZOR security research team and directed security technology, market, and public affairs strategy. Scott has delivered many lectures on all aspects of information security and is frequently sought by the press for expert commentary. Since 1993, Scott has also worked as a security consultant, IT director, and network engineer. He holds an MA in Sociology from Brandeis University, a BA in Social Sciences from Simon's Rock College, and holds the CISM and CISSP security certifications. Pamela Fusco, CISSP, CISM, CHS-III, Chief Security Officer, Merck and Co., Inc. Pamela Fusco is an Executive Global Information Security Professional, for Merck and CO., Inc. She has accumulated over 19 years of substantial experience within the Security Industry. Her extensive background and expertise expand globally encompassing all facets of security inclusive of logical, physical, personal, facilities, systems, networks, wireless, and forensic investigations. Presently she leads a talented team of Compliance, Systems and Information Security Engineers operating a world-wide 24X7X365 SIRT (security incident response team). Andre Gold is currently Director of Information Security at Continental Airlines, one of the world's largest and most successful commercial and freight transportation providers. Before assuming his current role, Mr. Gold served as Technical Director of Internet Services, responsible for Continental's continental.com property, which contributes over a billion dollars a year in revenue for Continental. Prior to Continental Airlines, Inc. Mr. Gold worked as a consultant in the IT industry. Mr. Gold has a BBA in Computer Information Systems from the University of Houston-Downtown and received his commission in the Army from Wentworth Military Academy. In addition to his position at Continental, Mr. Gold servers on the Microsoft Chief Security Officer Council, the Skyteam Data Privacy and Security Subcommittee, as well as eEye Digital Security's Executive Advisory Council. Ken Pfeil is CSO at Capital IQ, a web-based information service company headquartered in New York City. His experience spans over two decades with companies such as Microsoft, Dell, Avaya, Identix, and Merrill Lynch. Ken is coauthor of the books "Hack Proofing Your Network - 2nd Edition" and "Stealing the Network - How to Own the Box," and a contributing author of "Security Planning and Disaster Recovery" and "Network Security - The Complete Reference." Justin Somaini is Director of Information Security at VeriSign Inc. where he is responsible for managing all aspects of network and information security for VeriSign. With over 10 years of Information Security and Corporate Audit experience, Justin has leveraged his knowledge of audit and large organizations to remediate global infrastructure problems and create a full risk identification and remediation Information Security group. Previously, Justin was the Director of Information Security Services for Charles Schwab Inc., where he was responsible for all aspects of Information Security Operations. Before that he was a Manager with PricewaterhouseCoopers LLP where he spent several years developing their attack and penetration leadership and audit practice.>

Black Hat Briefings, Las Vegas 2005 [Video] Presentations from the security conference

Google Hacking returns for more guaranteed fun this year at Blackhat USA! If you haven't caught one of Johnny's Google talks, you definitely should. Come and witness all the new and amazing things that can be done with Google. All new for BH USA 2005, Johnny reveals basic and advanced search techniques, basic and advanced hacking techniques, multi-engine attack query morphing, and zero-packet target foot printing and recon techniques. Check out Google's search-blocking tactics (and see them bypassed), and learn all about using Google to locate targets Google doesn't even know about! But wait, there's more! Act now and Johnny will throw in the all new "Google Hacking Victim Showcase, 2005" loaded with tons of screenshots (and supporting queries) of some of the most unfortunate victims of this fun, addictive and deadly form of Internet nastiness. Think you're too uber to be caught in a Google talk? Fine. Prove your badness. Win the respect of the audience by crushing the live Google Hacking contest! Submit your unique winning query by the end of the talk to win free books from Syngress Publishing and other cool gear! Or don't. Just listen to your friends rave about it. Whatever. Johnny Long is a "clean-living" family guy who just so happens to like hacking stuff. Over the past two years, Johnny's most visible focus has been on this Google hacking "thing" which has served as yet another diversion to a serious (and bill-paying) job as a professional hacker and security researcher for Computer Sciences Corporation. In his spare time, Johnny enjoys making random pirate noises ("Yarrrrr!"), spending time with his wife and kids, convincing others that acting like a kid is part of his job as a parent, feigning artistic ability with programs like Bryce and Photoshop, pushing all the pretty shiny buttons on them new-fangled Mac computers, and making much-too-serious security types either look at him funny or start laughing uncontrollably. Johnny has written or contributed to several books, including "Google Hacking for Penetration Testers" from Syngress Publishing, which has secured rave reviews and has lots of pictures.

Black Hat Briefings, Las Vegas 2005 [Video] Presentations from the security conference

Jeff Moss, founder of Black Hat, invites Chief Information Security Officers from global corporations to join him on stage for a unique set of questions and answers. What do CISOs think of Black Hat, David Litchfield, Dan Kaminsky, Joe Grand, Johnny Long, Metasploit, and DEFCON? How many years before deperimeterization is a reality? Is security research more helpful or harmful to the economy? What privacy practices do CISOs personally use? These questions and others from the audience will be fielded by this panel of security visionaries. Scott Blake is Chief Information Security Officer for Liberty Mutual Insurance Group and is responsible for information security strategy and policy. Prior to joining Liberty, Scott was Vice President of Information Security for BindView Corporation where he founded the RAZOR security research team and directed security technology, market, and public affairs strategy. Scott has delivered many lectures on all aspects of information security and is frequently sought by the press for expert commentary. Since 1993, Scott has also worked as a security consultant, IT director, and network engineer. He holds an MA in Sociology from Brandeis University, a BA in Social Sciences from Simon's Rock College, and holds the CISM and CISSP security certifications. Pamela Fusco, CISSP, CISM, CHS-III, Chief Security Officer, Merck and Co., Inc. Pamela Fusco is an Executive Global Information Security Professional, for Merck and CO., Inc. She has accumulated over 19 years of substantial experience within the Security Industry. Her extensive background and expertise expand globally encompassing all facets of security inclusive of logical, physical, personal, facilities, systems, networks, wireless, and forensic investigations. Presently she leads a talented team of Compliance, Systems and Information Security Engineers operating a world-wide 24X7X365 SIRT (security incident response team). Andre Gold is currently Director of Information Security at Continental Airlines, one of the world's largest and most successful commercial and freight transportation providers. Before assuming his current role, Mr. Gold served as Technical Director of Internet Services, responsible for Continental's continental.com property, which contributes over a billion dollars a year in revenue for Continental. Prior to Continental Airlines, Inc. Mr. Gold worked as a consultant in the IT industry. Mr. Gold has a BBA in Computer Information Systems from the University of Houston-Downtown and received his commission in the Army from Wentworth Military Academy. In addition to his position at Continental, Mr. Gold servers on the Microsoft Chief Security Officer Council, the Skyteam Data Privacy and Security Subcommittee, as well as eEye Digital Security's Executive Advisory Council. Ken Pfeil is CSO at Capital IQ, a web-based information service company headquartered in New York City. His experience spans over two decades with companies such as Microsoft, Dell, Avaya, Identix, and Merrill Lynch. Ken is coauthor of the books "Hack Proofing Your Network - 2nd Edition" and "Stealing the Network - How to Own the Box," and a contributing author of "Security Planning and Disaster Recovery" and "Network Security - The Complete Reference." Justin Somaini is Director of Information Security at VeriSign Inc. where he is responsible for managing all aspects of network and information security for VeriSign. With over 10 years of Information Security and Corporate Audit experience, Justin has leveraged his knowledge of audit and large organizations to remediate global infrastructure problems and create a full risk identification and remediation Information Security group. Previously, Justin was the Director of Information Security Services for Charles Schwab Inc., where he was responsible for all aspects of Information Security Operations. Before that he was a Manager with PricewaterhouseCoopers LLP where he spent several years developing their attack and penetration leadership and audit practice.>

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference

"In this day and age, forensics evidence lurks everywhere. This talk takes attendees on a brisk walk through the modern technological landscape in search of hidden digital data. Some hiding places are more obvious than others, but far too many devices are overlooked in a modern forensics investigation. As we touch on each device, we'll talk about the possibilities for the forensic investigator, and take a surprising and fun look at the nooks and crannies of many devices considered commonplace in today's society. For each device, we'll look at what can be hidden and talk about various detection and extraction techniques, avoiding at all costs the obvious "oh I knew that" path of forensics investigation. All this will of course be tempered with Johnny's usual flair, some fun (and admittedly rowdy) "where's the evidence" games, and some really cool giveaways. Johnny Long is a "clean-living" family guy who just so happens to like hacking stuff. A college dropout, Johnny overcompensates by writing books, speaking at conferences and hanging around with really smart people. Johnny is currently working on the final third of the coveted "Hacker Pirate Ninja" title, which has thus far evaded even the most erudite of academics. Johnny can be reached through his website at http://johnny.ihackstuff.com"

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference

"If you know good tech, you can smell bad tech from a mile away. Bad tech is the stuff that makes you laugh out loud in a theater when all the "normal" people around you thought something k-rad just happened. The stuff that makes real hackers cringe, furious that they missed their true calling: the cushy life of a Hollywood "technical consultant". Then again, maybe Hollywood got it right, and the hackers have it all confused. Judge for yourself as Johnny slings the code that quite possibly explains what, exactly those boneheads must have been thinking. If you can piece together the meaning behind the code, and guess the pop culture reference first, you'll win the respect of your peers and possibly one of many dandy prizes. Either way you'll relish in the utter stupidity (or brilliance) of Hollywood's finest hacking moments. Johnny Long is a "clean-living" family guy who just so happens to like hacking stuff. A college dropout, Johnny overcompensates by writing books, speaking at conferences and hanging around with really smart people. Johnny is currently working on the final third of the coveted "Hacker Pirate Ninja" title, which has thus far evaded even the most erudite of academics. Johnny can be reached through his website at http://johnny.ihackstuff.com"

Paul's Security Weekly
Paul's Security Weekly - SE - Interview with Johnny Long

Paul's Security Weekly

Play Episode Listen Later Apr 12, 2006 53:10


We are very proud to bring you the exclusive interview with Johnny Long. I would like everyone to go out and buy two copies of his Google hacking book from Johnny's web site because 100% of the proceed go to charity, and everyone should have a copy for work and a copy for home :) Here are the links to purchase: Purchase the book here - All proceeds benefit the Compassion International Children's Fund. NOTE: There was some lag on this call, we're sorry, hoping to upgrading bandwith or replace Skype with something better. How Johnny set a new world record for employment (well sorta) The history of "Google Hacking" How johnny.ihackstuff.com came to be the wonderful Google hacking source Johnny discuss an assortment of Google hacking tools, such as BiDiHBLAH, bile, Wikto, and AdvancedDork Hear the "behind the scenes" of Johnny's "Hacking Hollywood" presentation he gave at Schmoocon Johnny discusses some of his other books, including "OS X for the Hackers Heart" and the Stealing the Network Series Ethics, religion, and being yourself Good advice for life, Kung Fu, and being a penetration tester

CyberSpeak's Podcast
CyberSpeak Jan 21 2006

CyberSpeak's Podcast

Play Episode Listen Later Jan 21, 2006 53:18


This show features an interview with Johnny Long. Johnny talks about his work with GoogleHacking and his new book OS X for Hackers at Heart. Also in this episode, web based network tools, how to trace an email, more info on WMF vulnerability, and sticky note Firefox extension.