POPULARITY
Categories
Episode 251Special Guest:Meghan SundermeierOmaha Wood Co.https://www.instagram.com/omahawoodco/ Sponsors:Onefinity CNC:The industry standard for at home production CNCs. Ball screw and linear rail construction - No beltsCompatible with all popular software, 15 minute setup, infinitely upgradable, and world class tech support!And its made in Canada. Which means Maple Glazed Rails!One Machine - Infinite possibilitieshttps://www.onefinitycnc.com/Sign up for Patreon for Early access, and special Patreon-only content:https://www.patreon.com/anotherwoodshoppodcastJoin us for the AWP Mid-West MAYker Meetup - May 17 2025RSVP: http://midwestmaykermeetup.com PATREON GIVEAWAY!Donate to Maker's For St. JudeEvery $5 earns you an extra entry in the January Patreon Giveaway (Paid Patrons Only)http://fundraising.stjude.org/goto/anotherwoodshoppodcast Questions:Alex AdamsType A FurnitureCan you recommend any way to get cat poop out of wooden chisel handles? Nick MiddlecampNSM WoodcraftI have a dilemma. My current shop setup is split across two locations 3 miles apart. I have Thunder Bolt laser and a 4ft by 2ft CNC (not an Onefinity) in a climate controlled shed at my house. The other location is a storage unit, I have all of my traditional larger shop tools there. Cabinet table saw, Miter station, Joiner, Planer, Router table and an array of bench top sanding equipment. The situation is not ideal but is currently my only option. I have made some duplicate purchases of my smaller cordless tools to put them at both locations, but where do I stop? What tools are an absolute must have for that immediate post processing of CNC'd items.You can send in your question to get answered on the podcast! Record your question or comment on your phones voice memo app and email it to anotherwoodshoppodcast@gmail.comYou can follow us all and the podcast on Instagram and YouTube!Podcast:https://www.instagram.com/anotherwoodshoppodcast/https://www.youtube.com/anotherwoodshoppodcast https://www.etsy.com/shop/awpstore Pete:https://www.instagram.com/ptreesworkshop/ https://www.youtube.com/ptreesworkshophttps://www.etsy.com/shop/pTreesWorkShop Dan:https://www.instagram.com/danieldunlap.woodworks/ https://www.youtube.com/danieldunlap https://www.etsy.com/shop/ddwwstore Braden:https://www.instagram.com/littlebugwoodworking/ https://www.youtube.com/@littlebugwoodworking https://littlebugwoodworking.com/ Support the show
We look at the Acer Connect X6e router, see more about it here. Acer Connect X6e router reviewed This product came out last year, but still might not be on your radar in terms of an option for your next router, depending on whether you knew that Acer are making more than just laptops. It is relatively heavy, but, once sited and set up, this may give it a bit more durability than some of the flimsier models on the market. For our testers one of the use cases is the ability to transfer it from various locations depending on where they will be based next. This model's solidity and heft actually stood it in good stead compared to some other options which tended to get a bit damaged in transit. With this model there are less delicate, moving parts and this actually works quite well, and was a positive aspect to the router. Out of the box the device worked well, and it has good security protocols too, you just need to remember to set them up of course. Maybe it will even play better with your laptop if it is an Acer too, but it worked well with all devices that came within range of it. Accessibility to ports is good for all options apart from the one on the underneath of the base, maybe that one is for when it is attached to a wall, or floating in space perhaps. That to one solid, the weight and solidity work well in terms of avoiding cat, children or just clumsy operators. Our testers liked it, and are hopeful that they can get their hands on some of the newer Acer products that have caught their eyes next, especially the outdoors charging rigs. Now that could be interesting… More about the device Acer 5G Router | Connect X6E Ref. FF.G2KTA.002 Experience lightning-fast 5G speeds powered by the Qualcomm Snapdragon Processor (3GPP R16) with AI Signal Boost Enjoy super fast, multi-device capability with Wi-Fi 6E and 4 x 4 MU-MIMO technology Supports up to 128 connected devices for a seamlessly connected home or mobile workspace Simultaneous 5G and WAN dual connectivity for better load balance and fail over Share Internet access as quickly with a simple wave their devices near Acer Connect X6E 5G CPE Make and receive crystal-clear phone calls with built-in telephony, which supports VoLTE / VolP1 calling More about Acer Founded in 1976, Acer is one of the world's top technology companies with a presence in more than 160 countries. The company continues to evolve by embracing innovation across its product offerings including computers and displays, while branching out to new businesses. Acer is also committed to sustainable growth, exploring new opportunities that align with its environmental and social responsibilities. The Acer Group employs over 9,000 people globally who contribute to the research, design, marketing, sales and support of products, solutions, and services that break barriers between people and technology. Acer Group to reach 60% renewable electricity usage RE100 reached by 2035 45% reduction in average computer energy consumption in 2025, compared to 2016 80% of critical suppliers committed to RE100 or set carbon reduction SBTs See more reviews here.
Jeff Carney from Darkhorse IT explains why the FBI Warns of Outdated Devices Being Exploited:See omnystudio.com/listener for privacy information.
The state of Virginia passes an age-restriction law that has no chance. New Zealand also tries something similar, citing Australia's lead. A nasty Python package for Discord survived 3 years and 11K downloads. The FBI says it's a good idea to discard end-of-life consumer routers. What's in WhatsApp? Finding out was neither easy nor certain. The UK's Cyber Centre says AI promises to make things much worse. A bunch of great feedback from our great listeners, then: Is true end-to-end encryption possible when records must be retained? Show Notes - https://www.grc.com/sn/SN-1025-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com for Security Now uscloud.com hoxhunt.com/securitynow canary.tools/twit - use code: TWIT
The state of Virginia passes an age-restriction law that has no chance. New Zealand also tries something similar, citing Australia's lead. A nasty Python package for Discord survived 3 years and 11K downloads. The FBI says it's a good idea to discard end-of-life consumer routers. What's in WhatsApp? Finding out was neither easy nor certain. The UK's Cyber Centre says AI promises to make things much worse. A bunch of great feedback from our great listeners, then: Is true end-to-end encryption possible when records must be retained? Show Notes - https://www.grc.com/sn/SN-1025-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com for Security Now uscloud.com hoxhunt.com/securitynow canary.tools/twit - use code: TWIT
The state of Virginia passes an age-restriction law that has no chance. New Zealand also tries something similar, citing Australia's lead. A nasty Python package for Discord survived 3 years and 11K downloads. The FBI says it's a good idea to discard end-of-life consumer routers. What's in WhatsApp? Finding out was neither easy nor certain. The UK's Cyber Centre says AI promises to make things much worse. A bunch of great feedback from our great listeners, then: Is true end-to-end encryption possible when records must be retained? Show Notes - https://www.grc.com/sn/SN-1025-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com for Security Now uscloud.com hoxhunt.com/securitynow canary.tools/twit - use code: TWIT
The state of Virginia passes an age-restriction law that has no chance. New Zealand also tries something similar, citing Australia's lead. A nasty Python package for Discord survived 3 years and 11K downloads. The FBI says it's a good idea to discard end-of-life consumer routers. What's in WhatsApp? Finding out was neither easy nor certain. The UK's Cyber Centre says AI promises to make things much worse. A bunch of great feedback from our great listeners, then: Is true end-to-end encryption possible when records must be retained? Show Notes - https://www.grc.com/sn/SN-1025-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com for Security Now uscloud.com hoxhunt.com/securitynow canary.tools/twit - use code: TWIT
The state of Virginia passes an age-restriction law that has no chance. New Zealand also tries something similar, citing Australia's lead. A nasty Python package for Discord survived 3 years and 11K downloads. The FBI says it's a good idea to discard end-of-life consumer routers. What's in WhatsApp? Finding out was neither easy nor certain. The UK's Cyber Centre says AI promises to make things much worse. A bunch of great feedback from our great listeners, then: Is true end-to-end encryption possible when records must be retained? Show Notes - https://www.grc.com/sn/SN-1025-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com for Security Now uscloud.com hoxhunt.com/securitynow canary.tools/twit - use code: TWIT
The state of Virginia passes an age-restriction law that has no chance. New Zealand also tries something similar, citing Australia's lead. A nasty Python package for Discord survived 3 years and 11K downloads. The FBI says it's a good idea to discard end-of-life consumer routers. What's in WhatsApp? Finding out was neither easy nor certain. The UK's Cyber Centre says AI promises to make things much worse. A bunch of great feedback from our great listeners, then: Is true end-to-end encryption possible when records must be retained? Show Notes - https://www.grc.com/sn/SN-1025-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com for Security Now uscloud.com hoxhunt.com/securitynow canary.tools/twit - use code: TWIT
The state of Virginia passes an age-restriction law that has no chance. New Zealand also tries something similar, citing Australia's lead. A nasty Python package for Discord survived 3 years and 11K downloads. The FBI says it's a good idea to discard end-of-life consumer routers. What's in WhatsApp? Finding out was neither easy nor certain. The UK's Cyber Centre says AI promises to make things much worse. A bunch of great feedback from our great listeners, then: Is true end-to-end encryption possible when records must be retained? Show Notes - https://www.grc.com/sn/SN-1025-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com for Security Now uscloud.com hoxhunt.com/securitynow canary.tools/twit - use code: TWIT
The panel analyzes Tim Cook's recent comments on Siri and Apple Intelligence from the latest earnings call, debating whether Apple overpromised on AI capabilities. Chuck Joiner, David Ginsburg, Marty Jencius, Mark Fuccio, Eric Bolden, Jim Rea, and Jeff Gamet also revisit Apple's discontinued router line and the likelihood of a comeback in today's competitive market. The episode wraps with a discussion about Duolingo's decision to replace human content creators with AI, exploring both the potential educational value and the broader implications for language learning and job displacement. MacVoices is supported by CleanMyMac Business, Centralize remote Mac fleet maintenance for your business. Try CleanMyMac Business for 14 days free for up to 30 devices. https://clnmy.com/MacVoicesCleanMyMacBusiness Show Notes: Chapters: 00:03 Tim Cook's Siri Comments 13:33 AI in Language Learning 23:53 The Future of AI in Education 29:27 Panel Sign-Off Links: Tim Cook addresses Apple's delay of personalized Siri features https://9to5mac.com/2025/05/01/tim-cook-addresses-apples-delay-of-personalized-siri-features/ A new petition is asking for Apple to resume updates for its discontinued AirPort routers A new petition is asking for Apple to resume updates for its discontinued AirPort routers https://appleworld.today/2025/04/a-new-petition-is-asking-for-apple-to-resume-updates-for-its-discontinued-airport-routers/ Duolingo will replace contract workers with AI https://www.engadget.com/ai/duolingo-will-replace-contract-workers-with-ai-for-content-creation-123058970.html Guests: Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Mark Fuccio is actively involved in high tech startup companies, both as a principle at piqsure.com, or as a marketing advisor through his consulting practice Tactics Sells High Tech, Inc. Mark was a proud investor in Microsoft from the mid-1990's selling in mid 2000, and hopes one day that MSFT will be again an attractive investment. You can contact Mark through Twitter, LinkedIn, or on Mastodon. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
The state of Virginia passes an age-restriction law that has no chance. New Zealand also tries something similar, citing Australia's lead. A nasty Python package for Discord survived 3 years and 11K downloads. The FBI says it's a good idea to discard end-of-life consumer routers. What's in WhatsApp? Finding out was neither easy nor certain. The UK's Cyber Centre says AI promises to make things much worse. A bunch of great feedback from our great listeners, then: Is true end-to-end encryption possible when records must be retained? Show Notes - https://www.grc.com/sn/SN-1025-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com for Security Now uscloud.com hoxhunt.com/securitynow canary.tools/twit - use code: TWIT
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Steganography Challenge Didier revealed the solution to last weekend s cryptography challenge. The image used the same encoding scheme as Didier described before, but the columns and rows were transposed. https://isc.sans.edu/forums/diary/Steganography%20Challenge%3A%20My%20Solution/31912/ FBI Warns of End-of-life routers The FBI is tracking larger botnets taking advantage of unpatched routers. Many of these routers are end-of-life, and no patches are available for the exploited vulnerabilities. The attackers are turning the devices into proxies, which are resold for various criminal activities. https://www.ic3.gov/PSA/2025/PSA250507 ASUS Driverhub Vulnerability ASUS Driverhub software does not properly check the origin of HTTP requests, allowing a CSRF attack from any website leading to arbitrary code execution. https://mrbruh.com/asusdriverhub/ RV-Tools SEO Poisoning Varonis Threat Labs observed SEO poisoning being used to trick system administrators into installing a malicious version of RV Tools. The malicious version includes a remote access tool leading to the theft of credentials https://www.varonis.com/blog/seo-poisoning#initial-access-and-persistence
Esiste un router che ha moltissime funzioni, in modo veramente facile e intuitivo e che può tornare utile in moltissime occasioni. È piccolissimo, consuma poco e costa una cifra ridicola, in rapporto a quello che fa. È il router giallo di GL-inet. La vecchia puntata di Geekcookies dove ne abbiamo parlato GL-inet Mango Tutti i GL-inet che si trovano su Amazon Il sito ufficiale di GL-inet La Tigre, podcast di Chora Media Pillole di Bit (https://www.pilloledib.it/) è un podcast indipendente realizzato da Francesco Tucci, se vuoi metterti con contatto con me puoi scegliere tra diverse piattaforme: - Telegram - BlueSky - Il mio blog personale ilTucci.com - Il mio canale telegram personale Le Cose - Mastodon personale - Mastodon del podcast - la mail (se mi vuoi scrivere in modo diretto e vuoi avere più spazio per il tuo messaggio) Rispondo sempre Se questo podcast ti piace, puoi contribuire alla sue realizzazione! Con una donazione diretta: - Singola con Satispay - Singola con SumUp - Singola o ricorrente con Paypal Usando i link sponsorizzati - Con un acquisto su Amazon (accedi a questo link e metti le cose che vuoi nel carrello) - Attivando uno dei servizi di Ehiweb Se hai donato più di 5€ ricordati di compilare il form per ricevere i gadget! Il sito è gentilmente hostato da ThirdEye (scrivete a domini AT thirdeye.it), un ottimo servizio che vi consiglio caldamente e il podcast è montato con gioia con PODucer, un software per Mac di Alex Raccuglia
Sudo watch this show, Hallucinations, Kickidler, Powershool redux, Old Man Router, PSMU, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-475
Sudo watch this show, Hallucinations, Kickidler, Powershool redux, Old Man Router, PSMU, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-475
Sudo watch this show, Hallucinations, Kickidler, Powershool redux, Old Man Router, PSMU, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-475
Ali Hackalife und Basti sprechen über Themen der letzten Tage die auch interessant sind. Ali stellt ein Buch über interna bei Facebook vor. Es geht um schlechte Umweltapps, einen neuen Router, die ePA und den PELOSI Act.
We've been diving into the evolving landscape of React app development and why tools like Create TS Router App (CTA) are stepping up to fill the gap left by the deprecation of Create React App (CRA). What we've learned is that SSR (server-side rendering) isn't one-size-fits-all—e-commerce sites need it for SEO and performance, but internal tools and dashboards often don't. That's where CTA shines. It gives us a fast, modern, Vite-powered setup with TanStack Router built in, so we can start small and scale up without committing to heavy frameworks like Next.js from day one.What we love about CTA is how it keeps things familiar (same structure as CRA) while giving us type safety, file-based routing, and the flexibility to add only the features we need—like Clerk, Sentry, or even SolidJS support. Whether we're building a simple prototype or a full-featured app, CTA makes the experience smoother, more intuitive, and future-friendly.Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
Brian becomes a regional IT manager, Justin parties with Substack, two Michael Cohens collide, and Tony the Tiger discourse happens. Plus, "grape" and mugging for the camera during sex. Get an extra episode every week only at https://www.patreon.com/greatnight!
Brian becomes a regional IT manager, Justin parties with Substack, two Michael Cohens collide, and Tony the Tiger discourse happens. Plus, "grape" and mugging for the camera during sex. Get an extra episode every week only at https://www.patreon.com/greatnight!
Die Hardware- und Netzwerk-Spezialisten der c't-Redaktion Ernst Ahlers, Andrijan Möcker und Christof Windeck gehen den Hintergründen auf die Spur: Glasfaser wird zwar an vielen Stellen mit 2,5 Gbit/s ausgebaut, aber schon ihre 1-Gbit/s-Anschlüsse werden die Anbieter im Privatkundengeschäft kaum los. Ähnlich gilt fürs Heimnetz, dass sich Wifi-7 und 6-GHz-Router schlecht verkaufen, und dass beim Kabel-LAN meist 1 Gbit/s reichen. NAS, Boards und Router mit 2G5-Ethernet gibt's zwar immer mehr, aber kaum jemand scheint wirklich Wert drauf zu legen – ganz zu schweigen von schnelleren Kabellösungen. Auch die Nachfrage nach USB-Sticks oder Speicherkarten mit garantiert 20 oder 40 MBit/s bleibt gering. Selbst die PC-internen Schnittstellen stagnieren, beispielsweise verkaufen sich schnelle PCIe-5.0-SSDs kaum, und die fertig spezifizierte PCIe-Schnittstelle für Festplatten als SATA-Ersatz wird von keinem Hersteller implementiert. Spezielle NAS-Festplatten sind vom Markt wieder quasi verschwunden. Anders siehts lediglich für Profi-Hardware aus: Die Rechenzentren haben Bedarf nach schnelleren und größeren Festplatten, besseren Schnittstellen, mehr RAM und leistungsfähigeren Interconnects (sogar der KI-Grafikkarten direkt untereinander). Wieso klafft das so auseinander? Wir spüren dem Bedarf hinterher, schauen in die Zukunft, diskutieren Einsatzgebiete und Gewohnheiten – wie viel Zeit etwa wollen wir in die Pflege einer Smartphone-Fotosammlung stecken? Eine wichtige Grenze sind auch die menschlichen Sinne, etwa was Augen und Ohren wahrnehmen können.
Die Hardware- und Netzwerk-Spezialisten der c't-Redaktion Ernst Ahlers, Andrijan Möcker und Christof Windeck gehen den Hintergründen auf die Spur: Glasfaser wird zwar an vielen Stellen mit 2,5 Gbit/s ausgebaut, aber schon ihre 1-Gbit/s-Anschlüsse werden die Anbieter im Privatkundengeschäft kaum los. Ähnlich gilt fürs Heimnetz, dass sich Wifi-7 und 6-GHz-Router schlecht verkaufen, und dass beim Kabel-LAN meist 1 Gbit/s reichen. NAS, Boards und Router mit 2G5-Ethernet gibt's zwar immer mehr, aber kaum jemand scheint wirklich Wert drauf zu legen – ganz zu schweigen von schnelleren Kabellösungen. Auch die Nachfrage nach USB-Sticks oder Speicherkarten mit garantiert 20 oder 40 MBit/s bleibt gering. Selbst die PC-internen Schnittstellen stagnieren, beispielsweise verkaufen sich schnelle PCIe-5.0-SSDs kaum, und die fertig spezifizierte PCIe-Schnittstelle für Festplatten als SATA-Ersatz wird von keinem Hersteller implementiert. Spezielle NAS-Festplatten sind vom Markt wieder quasi verschwunden. Anders siehts lediglich für Profi-Hardware aus: Die Rechenzentren haben Bedarf nach schnelleren und größeren Festplatten, besseren Schnittstellen, mehr RAM und leistungsfähigeren Interconnects (sogar der KI-Grafikkarten direkt untereinander). Wieso klafft das so auseinander? Wir spüren dem Bedarf hinterher, schauen in die Zukunft, diskutieren Einsatzgebiete und Gewohnheiten – wie viel Zeit etwa wollen wir in die Pflege einer Smartphone-Fotosammlung stecken? Eine wichtige Grenze sind auch die menschlichen Sinne, etwa was Augen und Ohren wahrnehmen können. Mit dabei: Ernst Ahlers, Andrijan Möcker, Christof Windeck Moderation: Jörg Wirtgen Produktion: Gordon Hof
Die Hardware- und Netzwerk-Spezialisten der c't-Redaktion Ernst Ahlers, Andrijan Möcker und Christof Windeck gehen den Hintergründen auf die Spur: Glasfaser wird zwar an vielen Stellen mit 2,5 Gbit/s ausgebaut, aber schon ihre 1-Gbit/s-Anschlüsse werden die Anbieter im Privatkundengeschäft kaum los. Ähnlich gilt fürs Heimnetz, dass sich Wifi-7 und 6-GHz-Router schlecht verkaufen, und dass beim Kabel-LAN meist 1 Gbit/s reichen. NAS, Boards und Router mit 2G5-Ethernet gibt's zwar immer mehr, aber kaum jemand scheint wirklich Wert drauf zu legen – ganz zu schweigen von schnelleren Kabellösungen. Auch die Nachfrage nach USB-Sticks oder Speicherkarten mit garantiert 20 oder 40 MBit/s bleibt gering. Selbst die PC-internen Schnittstellen stagnieren, beispielsweise verkaufen sich schnelle PCIe-5.0-SSDs kaum, und die fertig spezifizierte PCIe-Schnittstelle für Festplatten als SATA-Ersatz wird von keinem Hersteller implementiert. Spezielle NAS-Festplatten sind vom Markt wieder quasi verschwunden. Anders siehts lediglich für Profi-Hardware aus: Die Rechenzentren haben Bedarf nach schnelleren und größeren Festplatten, besseren Schnittstellen, mehr RAM und leistungsfähigeren Interconnects (sogar der KI-Grafikkarten direkt untereinander). Wieso klafft das so auseinander? Wir spüren dem Bedarf hinterher, schauen in die Zukunft, diskutieren Einsatzgebiete und Gewohnheiten – wie viel Zeit etwa wollen wir in die Pflege einer Smartphone-Fotosammlung stecken? Eine wichtige Grenze sind auch die menschlichen Sinne, etwa was Augen und Ohren wahrnehmen können. Mit dabei: Ernst Ahlers, Andrijan Möcker, Christof Windeck Moderation: Jörg Wirtgen Produktion: Gordon Hof
El Instituto Nacional de Ciberseguridad aconseja seguir ocho medidas básicas para aumentar la seguridad de nuestro router y nuestra red WiFi de casa. ¿Estoy de acuerdo con ellas?
Episodio 312.Ella pensó que yo alegremente iba a hacer un viaje a Filadelfia con el cubano del Lyft así que… ¿Me pueden explicar un poco, en donde me metí? Yo creo que mi problema son los ascensores, pero se alinearon los planetas y todo salió bien.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
XWiki Search Vulnerablity Exploit Attempts (CVE-2024-3721) Our honeypot detected an increase in exploit attempts for an XWiki command injection vulnerablity. The vulnerability was patched last April, but appears to be exploited more these last couple days. The vulnerability affects the search feature and allows the attacker to inject Groovy code templates. https://isc.sans.edu/diary/X-Wiki%20Search%20Vulnerability%20exploit%20attempts%20%28CVE-2024-3721%29/31800 Correction: FBI Image Converter Warning The FBI's Denver office warned of online file converters, not downloadable conversion tools https://www.fbi.gov/contact-us/field-offices/denver/news/fbi-denver-warns-of-online-file-converter-scam VMWare Vulnerability Broadcom released a fix for a VMWare Tools vulnerability. The vulnerability allows users of a Windows virtual machine to escalate privileges within the machine. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25518 Draytek Reboots Over the weekend, users started reporting Draytek routers rebooting and getting stuck in a reboot loop. Draytek now published advise as to how to fix the problem. https://faq.draytek.com.au/docs/draytek-routers-rebooting-how-to-solve-this-issue/ Microsoft Managemnt Console Exploit CVE-2025-26633 TrendMicro released details showing how the MMC vulnerability Microsoft patched as part of its patch tuesday this month was exploited. https://www.trendmicro.com/en_us/research/25/c/cve-2025-26633-water-gamayun.html
Forecast = Router-geddon: Ballista storms brewing with a chance of unforgivable vulnerabilities. Patch umbrella required. In this episode of Storm ⚡ ️Watch, the crew laments the sorry state of modern edge computing through the lens of Steve Coley's 2007 paper on "Unforgivable Vulnerabilities". The discussion examines security flaws that should never appear in properly developed software yet continue to plague systems today. These vulnerabilities demonstrate a systematic disregard for secure development practices and would be immediately obvious to anyone with basic security awareness. The team breaks down "The Lucky 13" vulnerabilities, including buffer overflows, cross-site scripting, SQL injection, and hard-coded credentials, while also exploring how modern AI tools might inadvertently introduce these same issues into today's codebase, and how one might go about properly and safely use them in coding and security engineering. The episode also features an in-depth analysis of the newly discovered Ballista botnet that's actively targeting TP-Link Archer routers through a vulnerability discovered two years ago. First detected on January 10, 2025, this botnet has already infected over 6,000 devices worldwide, with the most recent activity observed in mid-February. The threat actors behind Ballista, believed to be based in Italy, have targeted organizations across multiple sectors including manufacturing, healthcare, services, and technology in the US, Australia, China, and Mexico. The botnet exploits CVE-2023-1389 to spread malware that establishes encrypted command and control channels, enabling attackers to launch DDoS attacks and further compromise vulnerable systems. The team rounds out the episode with updates from their partner organizations. Censys shares insights on JunOS vulnerabilities and the RedPenguin threat actor, along with an investigation into server misidentification issues. RunZero discusses the importance of cybersecurity labeling for end-of-life and end-of-support consumer IoT devices. GreyNoise alerts listeners to a new surge in SSRF exploitation attempts reminiscent of the 2019 Capital One breach and promotes their upcoming webinar on March 24th. As always, the Storm⚡️Watch crew delivers actionable intelligence and expert analysis to help security professionals stay ahead of emerging threats in the ever-evolving cybersecurity landscape. Storm Watch Homepage >> Learn more about GreyNoise >>
Capítulo 2305 del 18 mar 2025 Tras darle muchas vueltas, y aprovechando mi cumpleaños, ya tengo un nuevo router, un modelo mesh de la marca Mercusys, concretamente el Halo H3000X. Si quieres apoyar este podcast, invítame a un café me ayudaras a mantenerme despierto y a los gastos de este podcast. Únete al grupo de telegram del podcast en t.me/daytodaypod. Usa el enlace de afiliado de Amazon para ayudar a mantener el podcast. Soy miembro de la Asociación Podcast. Si te registras y usas el código SP7F21 tendrás 5€ de descuento el primer año. https://www.asociacionpodcast.es/registrarse/socio/?coupon=SP7F21 Date de alta en Curve con este código y conseguiremos 5£: DO6QR47E Ya sabéis que podéis escribirme a @spascual, spascual@spascual.es el resto de métodos de contacto en https://spascual.es/contacto.
Three Buddy Problem - Episode 38: On the show this week, we look at a hefty batch of Microsoft zero-days exploited in the wild, iOS 18.3.2 fixing an exploited WebKit bug, a mysterious Unpatched.ai being credited with Microsoft Access RCE flaws, and OpenAI lobbying for the US to ban China's DeepSeek. Plus, discussion on a Binarly technical paper with new approach to finding UEFI bootkits, Mandiant flagging custom backdoors on Juniper routers, and MEV 'sandwich attacks' front-running cryptocurrency transactions. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).
In this episode of Hacker in the Fed, former FBI special agent Chris Tarbell and ex-black hat hacker turned cybersecurity expert Hector Monsegur discuss GrayNoise's 2025 Mass Internet Exploitation Report, revealing how attackers are exploiting vulnerabilities faster than ever, particularly targeting home routers. The two also cover a shocking backdoor discovery in the Eight Sleep smart mattress, the rising trend of violent crypto-related attacks, and the recent Bybit hack. Hector wraps up with a deep dive into the U.S. Cyber Command's recent decision to halt cyber operations against Russia and what it means for national security. Send HATF your questions at questions@hackerandthefed.com.
Sign up for my daily deal emails - https://mailchi.mp/731woodworks/daily-tool-dealsTop Tool Deals at Home Depot, Lowe's, Amazon and more for March 2025! All Tool Deals - https://www.731woodworks.com/tool-dealsPLANS: https://www.731woodworks.com/storeGreatest Free Gift I've Ever Received: http://story4.us/731WoodworksI get commissions for purchases made through links in this post. This helps my website and allows me to keep finding these amazing deals!Tools Deals in this video:Join Team 731 in the $500 Bracket Challenge! https://www.731woodworks.com/tool-deals/last-brand-standing-team-731 USE Referral Code 731 to join my team!Japanese Hand Saw - https://amzn.to/3Derdf3Milwaukee Track Saw Deal - https://thetoolnut.sjv.io/k02yGxFestool Domino Limited Edition - https://thetoolnut.sjv.io/bOVKY6CRAFTSMAN Workbench DEAL - https://shoplowes.me/4kn4oXkKOBALT Workbench / Tool Box - https://shoplowes.me/41ssc3wHardwood Lumber Kits FREE SHIPPING - https://www.ollogginsawmill.com/collections/wood-kitsDeWALT 3Ah 4-Pack - https://amzn.to/4ijcQoyDeWALT POWERSTAACK Combo with Router - https://homedepot.sjv.io/LK21LMSKIL Router Combo - https://shoplowes.me/43BD2XFDeWALT Drill with Free 8Ah Battery - https://shoplowes.me/4kkdowaMakita 40v Drill/Impact Combo - https://acmetools.pxf.io/yqkQj2Harbor Freight New Trailer - https://www.731woodworks.com/tool-deals/harbor-freight-trailer-3-4-25RYOBI 80v Riding Mower Combo - https://homedepot.sjv.io/RGbKONEGO 42” Zero Turn Deal - https://amzn.to/4bsU8IM
Send us a textUnlock the secrets to fortifying your software development practices with expert insights from Shon Gerber. As we navigate the complex landscape of cybersecurity, we delve deep into the urgent risks posed by TP-Link routers, used by a staggering portion of U.S. households. Discover practical strategies for protecting your network, like firmware updates and firewall configurations, and learn how potential geopolitical threats could reshape your tech choices. This episode arms you with the knowledge to safeguard your digital ecosystem against looming threats and prepares you for possible shifts in government regulations.Venture into the vibrant world of programming languages and development environments, tracing their evolution from archaic beginnings with BASIC and C# to today's dynamic platforms like Python and Ruby on Rails. Shon unravels the intricacies of runtime environments and libraries, emphasizing why sourcing trusted libraries is non-negotiable in preventing security breaches. For those new to programming, we demystify Integrated Development Environments (IDEs) and offer insights into why securing these tools is paramount, especially as AI makes coding more accessible than ever before.As we wrap up, Shon guides you through best practices for securing both your development and runtime environments. From addressing vulnerabilities inherent in IDEs to ensuring robust CI/CD pipeline security, we cover it all. Learn about the pivotal role Dynamic Application Security Testing (DAST) plays and how to seamlessly integrate it within your development processes. This episode is a trove of actionable advice, aimed at equipping you with the skills and foresight needed to enhance your cybersecurity strategies and development protocols. Don't miss this comprehensive guide to making informed decisions and fortifying your software's security posture.Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Mac talk continued, Old Acer win 7 how do I get past the Admin password? I think I was scammed, Need to share data with the wife…NAS, Should I get my own Router? We fixed a guys mouse issue, Quickbooks issue it's costing me a arm and leg! Fiber they want me to purchase 1000mpbs….i'm only at 3mbps now.
Jon and David argue about how long it would take to walk to Sunrise Biscuit Kitchen from Jon's apartment. Support us on Patreon http://bit.ly/Ipatreon Send questions and comments to contact@electionprofitmakers.com Follow Jon on Bluesky http://bit.ly/bIuesky Watch David's show DICKTOWN on Hulu http://bit.ly/dicktown
PEBCAK Podcast: Information Security News by Some All Around Good People
Welcome to this week's episode of the PEBCAK Podcast! We've got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast Microsoft Edge adds tech support scam detection https://www.bleepingcomputer.com/news/microsoft/microsoft-tests-edge-scareware-blocker-to-block-tech-support-scams/ https://www.securityweek.com/google-says-nso-pegasus-zero-click-most-technically-sophisticated-exploit-ever-seen/ Patient monitors send data to China https://www.bleepingcomputer.com/news/security/backdoor-found-in-two-healthcare-patient-monitors-linked-to-ip-in-china/ Magic packet compromises Juniper routers https://www.darkreading.com/endpoint-security/black-magic-enterprise-juniper-routers-backdoor https://thehackernews.com/2025/01/custom-backdoor-exploiting-magic-packet.html https://arstechnica.com/security/2024/04/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world/ https://www.crn.com/news/networking/2025/doj-sues-to-block-hpe-s-14b-acquisition-of-juniper-networks-deal-5-things-to-know January challenge results https://www.wsj.com/finance/regulation/prediction-market-bets-test-limits-c52f556d Dad Joke of the Week (DJOW) Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Glenn - https://www.linkedin.com/in/glennmedina/ Victor - https://www.linkedin.com/in/victordeluca/
This Episodes Questions: Brians Questions: I am making a toy box for my grandson out of white oak. The dimensions will be 38” width, 18” depth, and 30” high. The front will be 4/4 quarter sawn, while the back and sides will be 4/4 flat sawn lumber. I plan to attach the front and sides, and the back and sides via dovetails. Since quarter sawn wood will move less than flat sawn, should I be concerned about the wood moving at different ratios? Also, can you recommend hinges that will prevent the top of the toy box from crashing down on my grandson's fingers? Mike My question concerns the router table that I built myself out of out of MDF and 2x4s last year. I'm pretty satisfied with it overall. I am by no means an expert, but I'd have to say having the router in a table seems to be roughly 1,000% more effective than using the router freehand. Having said that, I've been struggling with the fence, especially When I'm trying to edge join a board. My approach for securing the fence has been to clamp down each end of it with a trigger clamp, placing an additional clamp on the support frame or what have you at the rear of the router table. I've included a picture of my setup for this as well for clarity's sake. Here's the problem I'm running into: I position the fence, clamp it down, then check it again to make sure it hasn't come out of alignment. When I initially begin running boards over the router table, it works great. However, before too long, sometimes as soon as the second board, I find the fence is no longer properly aligned. When I check it I always find that the fence has shifted back towards the far end of the router table, usually by a 32nd of an inch or so. As you are all aware, this small difference has a pretty significant impact on how my boards come out, particularly when edge joining. My assumption is that this shift is due to my exerting pressure against the fence while feeding material through to keep the work piece tight against it. Do any of you have any suggestions regarding how I can secure my fence more effectively? Part of me wonders if I am just applying too much sideways pressure to my work pieces, but I also feel like I am applying just enough pressure to keep it from wandering away from the fence when passing the bit. Zach Owens Guy's Questions: I'd also like to hear about your process for organizing your shop space and how often you revisit the layout of your shop. As a follow-up to each question, I'd be curious if organizing and maintaining a shop are aspects of woodworking that you enjoy? Or loathe? Or maybe just tolerate? Marc I think there is a good question about red vs blue. red corner is woodpeckers, the YouTube influencers certified measuring and layout tools. Then there's the poor humans with affordable blue corner igaging. I believe woodpeckers is rated in their accuracy to .002 inch and igaging is .002 inch. So, I wonder if that .001 would make my skills somehow greater?? I think honestly that having a set of tools that I can use without each being a different measurement, as tape measures often would be. I also think about cost, even with a higher shipping fee due to my location I nearly outfitted my shop with all the marking and measuring tools at roughly $300 instead of $300 for one ruler or square. Thanks for the ongoing pod cast hope you all have a great year. Paul Mitchell Huy's Questions: On the face of wood, there is clearly a right and wrong direction to plane. Going the wrong direction causes gouging, chipping, and/or a time tough pushing the plane across the wood. How do you tell the correct direction to go with the plane, without having to risk messing up the piece by potentially going the wrong direction across the face of the wood with your plane? George I just made my first attempt at cutting dovetails for a small box with dividers that my wife asked me to make her for work. I cut them using a router table that I made just for the occasion. It went fairly well, meaning that they all fit and there aren't any unsightly large gaps. Starting with test pieces was definitely the way to go. I did have one issue, however. I'm not sure what the appropriate name for the different pieces of a dovetail are, but when I was cutting the female pieces I kept running into an issue where the router bit would jerk the work piece away from the fence, resulting in a somewhat crooked portion in my otherwise straight dovetail cut. I tried feeding the work piece into the bit from each side to see if one direction worked better than the other, but that didn't seem to help. I know that typically the recommendation is to make several shallow passes, but obviously this is not possible with a dovetail. Do you have any guesses as to what I might have been doing wrong? Should I have been pushing the work piece more firmly against the fence? Thanks in advance for your answers and insight. Can't wait to hear your next episode. Sincerely,Z achary T Owens
They're linked to security risks and cyberattacks. I'll show you how to protect your data before replacing yours.
Three Buddy Problem - Episode 31: Dennis Fisher steps in for Ryan Naraine to moderate discussion on a very busy week in cybersecurity. The cast dig into the wave of big research reports, the disbanding of the Cyber Safety Review Board (CSRB), the ongoing flood of exploits targeting security appliances from Ivanti and SonicWall, and the recent Lumen research on Juniper router backdoors. Plus, the challenges of coordinating disclosures, the tough realities of intelligence work, and the complex landscape of nation-state attacks -- especially around Chinese threat actors and Western defenses. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Dennis Fisher. Ryan Naraine (https://twitter.com/ryanaraine) in on work travel.
The Uplink Community is building the first decentralized ecosystem for existing and future internet infrastructure on Avalanche.Guest: Carlos Lei | Co-founder & CEO of UplinkJoin Uplink ➜ https://bit.ly/UplinkAVAX00:00 intro00:15 Sponsor: Coinbase00:45 Uplink02:20 Community Growth03:15 Helium Mobile vs Uplink05:23 Why Avalanche?07:30 Pre-Registering Routers08:56 Verified Router Map10:06 Surge Demand11:20 Carrier Offload12:47 Testnet Beta Launch13:51 Token Launch14:25 Roadmap 202515:39 User Rewards16:06 outro#Crypto #avax #cryptocurrency ~WiFi & 5G on Avalanche DePIN
David Druid och Linnea Wikblad är marginalfria, Cassandra Klatzkow fryser sina ägg och Cecilia Uddén om vapenvilans första dag. Lyssna på alla avsnitt i Sveriges Radio Play. Hela veckans Morgonpasset i P3 hör du i Sveriges Radio Play.Vi kan inte få nog av Jean-Pierre Barda som lär oss allt om Village People! Cassandra Klatzkow från podden ”Det skaver” fryser sina ägg och berättar om processen! Mellanösternkorren Cecilia Uddén på plats i Jerusalem om vapenvilans första dag. David Druid och Linnea Wikblad tillhör minoritetsgruppen ”marginalfria”. Linnea förstör avokadon för miljöns skull – clean ween! Matilda Rånge på P3 Nyheter om vapenvilan och att Trump svärs in. Matilda Rånges obekväma falska lilla hål: Router.Tidpunkter i avsnittet:18:06 Nyhetsfördjupning: Vapenvilan i Gaza.23:29 Jean-Pierre Barda om Village People och YMCA.46:37 Nyhetsfördjupning: Trump svärs in.57:33 Matilda Rånges obekväma falska lilla hål: Router.1:02:52 Cecilia Uddén i Jerusalem.1:18:09 Cassandra Klatzkow.Kapitellänkarna ovan leder till avsnittet utan musik i Sveriges Radio Play.Programledare: David Druid och Linnea Wikblad.
All links and images for this episode can be found on CISO Series. This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), partner, YL Ventures. Joining us is Yabing Wang, VP and CISO, Justworks. In this episode: Building a path to action Cracking the EOL conundrum The burning platform question Uncertainty is our only constant Thanks to our podcast sponsor, Entro! Reclaim control of your non-human identities with Entro Security! Our platform securely manages non-human identities and secrets throughout their lifecycle. Detect and prevent unusual activity before it becomes a threat. Trust Entro to safeguard your non-human identities in today's complex digital ecosystem.
Wallet drainer malware makes major impact U.S. telecom breach list grows Urgent warning on Moxa router vulnerabilities Huge thanks to our sponsor, Nudge Security Nudge Security discovers every GenAI tool ever used in your org, even those you've never heard of. For each tool, you'll see who introduced it, who else is using it, where it's integrated into other tools, and a vendor security profile. Get your free GenAI inventory today.
TP-Link routers, used by 65% of American homes and even the Department of Defense, are under fire for ties to Chinese cyberattacks and ignored security flaws. Also: Steve Harvey's not dead (thanks, AI), smart glasses might finally be cool, and OpenAI's chatbot hotline.
Host of “How to Money” on KFI Joel Larsgaard joins the show to discuss homeowners living longer and have more wealth, the memecoin space in crypto, and the best ways to save on travel. U.S weighs ban on Chinese-made router in millions of American homes. Host of ‘Later with Mo Kelly' on KFI weekdays from 7pm-10pm joins Bill to talk about Superman's latest trailer and Elton John's new documentary movie
Is your home internet router about to be banned? The US has a new Chinese tech target. An AI dev kit from Nvidia. Who actually buys the most chips from Nvidia? Hollywood has flip-flopped on the whole theatrical release strategy. And why Instagram is officially king of the hill at Meta.Sponsors:Lumen.me/rideLinks:U.S. Weighs Ban on Chinese-Made Router in Millions of American Homes (WSJ)Nvidia's new $249 AI development board promises 67 TOPS at half the price of the previous 40 TOPS model (TomsHardware)Nvidia's $249 dev kit promises cheap, small AI power (The Verge)Microsoft acquires twice as many Nvidia AI chips as tech rivals (Financial Times)Grubhub to pay $25 million for misleading customers, restaurants, drivers (Reuters)‘Red One' Becomes Most-Watched Prime Video Film Debut Ever With 50 Million Viewers After Modest Theatrical Run (Variety)Here's a Hollywood Twist: Streaming Success Runs Through Theaters (NYTimes)Instagram Expected to Generate 50% of Meta's US Ad Sales in 2025 (Bloomberg)See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
In this episode, Mark has a dog kennel update and burns black walnut in his furnace. Bruce almost breaks a bit on the CNC. Drew helps someone cut out an amazingly figured clock on his OneFinity. Plus, a ton more! GIVEAWAY ANNOUNCEMENT!Listen for details about our December giveaway. Get entered and there are even ways to earn bonus entries. Details in the episode. Thanks to Titebond for sponsoring this giveaway! T-shirts: https://fishersshoponline.com/merch & https://www.bruceaulrich.com/shop/clothing SUBSCRIBE TO DIRTtoDONE on YouTube: http://tinyurl.com/DIRTtoDON -This episode is sponsored by OneFinity CNC! We have partnered with them and would love it if you would go to their website and check them out: https://www.onefinitycnc.com/ Become a patron of the show! http://patreon.com/webuiltathing OUR TOP PATREON SUPPORTERS -Tim Morrill -Scott @ Dad It Yourself DIY http://bit.ly/3vcuqmv -Brent Jarvis https://bit.ly/2OJL7EV -Ray Jolliff -Deo Gloria Woodworks (Matthew Allen) https://www.instagram.com/deogloriawoodworks/ -Henry Lootens (@Manfaritawood) -Chris Simonton -Maddux Woodworks http://bit.ly/3chHe2p -Byrom's Custom Woodworks -Bruce Clark -Will White -Cody Elkins (creator of the Jenny Bit) -Andy @ Mud Turtle Woodworks -Damon Moran -Monkey Business Woodworks -Rich from Woodnote Studio -AC Nailed It -Joe Santos from Designer's Touch Kitchen & Bath Studio -Aaron Yelton -Chad Green -Ryan Talley -Trevor -Mark Herrick @ Empty Nest Woodworks -Not That Aaron, the other one Support our sponsors: TOOL CODES: -MagSwitch: “WBAT” -SurfPrep: “FISHER10” -Bumblechutes: “FISHER10” -Starbond: “BRUCEAULRICH” -Brunt Workgear: “GUNFLINT10” -Rotoboss: “GUNFLINT” -Merlin Moisture Meters: “FISHER10” -Montana Brand Tools: “GUNFLINT10” -Monport: “GUNFLINT6” -Stone Coat Epoxy: Gunflint -MAS Epoxy: FLINT -YesWelder: GUNFLINT10 -Millner-Haufen Tool Co: “ULRICH20” for 20% off -SmartSquareTools.com: “FISHER10” -Camel City Mill: GUNFLINT10 -Arbortech Tools: “BRUCEAULRICH” for 10% off -HighCountryTool.com: “FISHER10” for 10% off -Wagner Meters: https://www.wagnermeters.com/shop/orion-950-smart/?ref=210 We Built A Thing T-shirts! We have two designs to choose from! (You can get one of these as a reward at certain levels of support) https://amzn.to/2GP04jf https://amzn.to/2TUrCr2 ETSY SHOPS: Bruce: https://www.etsy.com/shop/BruceAUlrich?ref=simple-shop-header-name&listing_id=942512486 Drew: https://www.etsy.com/shop/FishersShopOnline?ref=simple-shop-header-name&listing_id=893150766 Mark: https://www.etsy.com/shop/GunflintDesigns?ref=search_shop_redirect Bruce's most recent video: https://youtu.be/xRFe5bELcyE?si=rXBq3csbaaBq7quz Drew's most recent video: https://youtu.be/uVlsKXiIoXo?si=7C3E3sYKkZz6uPIV Mark's most recent video: https://youtu.be/a701NsPo4ss?si=96H_AiQVVNV1YvbL We are all makers, full-time dads and all have YouTube channels we are trying to grow and share information with others. Throughout this podcast, we talk about making things, making videos to share on YouTube, Instagram, Facebook, etc...and all of the life that happens in between. CONNECT WITH US: WE BUILT A THING: www.instagram.com/webuiltathingWE BUILT A THING EMAIL: webuiltathing@gmail.com FISHER'S SHOP: www.instagram.com/fishersshop/ BRUDADDY: www.instagram.com/brudaddy/ GUNFLINT DESIGNS: https://www.instagram.com/gunflintdesigns Music by: Jay Fisher (Thanks, Jay!)
On this episode of Hands-On Mac, Mikah answers questions about what to do with old electronics, extracting photos out of downloaded files and maintaining the original photo names, how to properly manage your phone's battery, and a question from a listen about the best way to manage their router setup! Kelli came across some old electronics her father had years ago! She thinks they could be worth something but wonders if she should recycle them instead. Ray has their iPhone wirelessly charging at night while on Do Not Disturb. However, it randomly makes a sound at night! How can he get his phone to stop making that noise? Sean just downloaded their Google photos to back them up on an external drive. How can he keep the photos' original names when he extracts the files? Dan wonders how to manage their phone's battery life best when they keep it plugged in most of the time. Alan has three routers throughout his household in his home network. When he goes to different points in the house, he has to change the SSID to the router closest to where he is. Is there a simpler way of doing this before going to a Mesh router setup? Don't forget to send in your questions for Mikah to answer during the show! hot@twit.tv Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: cachefly.com/twit