Podcasts about service attack

  • 25PODCASTS
  • 29EPISODES
  • 28mAVG DURATION
  • ?INFREQUENT EPISODES
  • Mar 31, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about service attack

Latest podcast episodes about service attack

The Deep Dive Radio Show and Nick's Nerd News
Your Breaches of the Week! August 12 to August 18, 2024

The Deep Dive Radio Show and Nick's Nerd News

Play Episode Listen Later Aug 18, 2024 15:54


Everyone's Social Security Number and no... X did NOT suffer a Denial of Service Attack! We explore these and so much more!

Hacking Humans
denial-of-service attack (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Aug 13, 2024 6:37


Enjoy this encore episode: A cyber attack designed to impair or eliminate access to online services or data.

denial noun service attack
Word Notes
denial-of-service attack (noun)

Word Notes

Play Episode Listen Later Aug 13, 2024 6:37


Enjoy this encore episode: A cyber attack designed to impair or eliminate access to online services or data. Learn more about your ad choices. Visit megaphone.fm/adchoices

denial noun service attack
Bitcoin Audible
Read_822 - Denial of Service Attack on Consensus [Re-post]

Bitcoin Audible

Play Episode Listen Later May 21, 2024 47:08


Apologies for the repost, had some technical difficulties migrating the podcast to a new host. "It is like exercising a veto you hold for anything and everything, and yes, vetoes are important in consensus systems. But disrupting conversation is not the veto, the actions of actual transacting economic actors deciding what software to run or not run is the veto. This denial of service on dialogue is not some noble or righteous crusade to save Bitcoin, it is an active attack on those economic actors and their ability to gain a better understanding to make an informed decision on whether to veto something or not."~ Shinobi Today we dive into the contentious arena of Bitcoin consensus and the dialogue around it. Reading an insightful piece by Shinobi from Bitcoin Magazine, we explore the alarming trend of "denial of service attacks" on meaningful discussion within the Bitcoin community. Is this a calculated attack to silence new ideas, a necessary friction to maintain the integrity of Bitcoin's foundational principles, or is it an unavoidable consequence of Bitcoin's success? Listen as Guy offers his insights and invites you to judge the merit of open dialogue in the face of technological conservatism. Check out the original article at A Denial of Service Attack on Bitcoin Consensus. (Link: https://tinyurl.com/32urf3bv) Links to check out What is money??? Guy Swann and the Give-A-Shit Matrix (Link: https://tinyurl.com/yxjba3bp) Guest Links ⁠Brian Trollz on X⁠ (Link: https://twitter.com/Brian_trollz) ⁠Brian Trollz on Bitcoin Magazine (Link: https://tinyurl.com/bded6sw8/) Host Links ⁠Guy on Nostr ⁠(Link: http://tinyurl.com/2xc96ney) ⁠Guy on X ⁠(Link: https://twitter.com/theguyswann) Guy on Instagram (Link: https://www.instagram.com/theguyswann) Guy on TikTok (Link: https://www.tiktok.com/@theguyswann) Guy on YouTube (Link: https://www.youtube.com/@theguyswann) ⁠Bitcoin Audible on X⁠ (Link: https://twitter.com/BitcoinAudible) The Guy Swann Network Broadcast Room on Keet (Link: https://tinyurl.com/3na6v839) Check out our awesome sponsors! Get ⁠10% off the COLDCARD⁠ with code BITCOINAUDIBLE ⁠⁠⁠⁠⁠⁠(Link: bitcoinaudible.com/coldcard⁠⁠⁠⁠⁠⁠) Swan⁠: The best way to buy, learn, and earn #Bitcoin (Link: https://swanbitcoin.com) “You don’t win a debate by suppressing discussion; you win it with a better argument.”~ Frank Sonnenberg

Bitcoin Audible (previously the cryptoconomy)
Read_822 - Denial of Service Attack on Consensus

Bitcoin Audible (previously the cryptoconomy)

Play Episode Listen Later May 20, 2024 47:08


"It is like exercising a veto you hold for anything and everything, and yes, vetoes are important in consensus systems. But disrupting conversation is not the veto, the actions of actual transacting economic actors deciding what software to run or not run is the veto. This denial of service on dialogue is not some noble or righteous crusade to save Bitcoin, it is an active attack on those economic actors and their ability to gain a better understanding to make an informed decision on whether to veto something or not." ~ Shinobi Today we dive into the contentious arena of Bitcoin consensus and the dialogue around it. Reading an insightful piece by Shinobi from Bitcoin Magazine, we explore the alarming trend of "denial of service attacks" on meaningful discussion within the Bitcoin community. Is this a calculated attack to silence new ideas, a necessary friction to maintain the integrity of Bitcoin's foundational principles, or is it an unavoidable consequence of Bitcoin's success? Listen as Guy offers his insights and invites you to judge the merit of open dialogue in the face of technological conservatism. Check out the original article at A Denial oF Service Attack on Bitcoin Consensus. (Link: https://tinyurl.com/32urf3bv) Guest Links Shinobi on X (Link: https://twitter.com/brian_trollz) Shinobi on Bitcoin Magazine (Link: https://bitcoinmagazine.com/authors/shinobi) Host Links Guy on Nostr (Link: http://tinyurl.com/2xc96ney) Guy on X (Link: https://twitter.com/theguyswann) Guy on Instagram (Link: https://www.instagram.com/theguyswann/) Guy on TikTok (Link: https://www.tiktok.com/@theguyswann) Guy on YouTube (Link: https://www.youtube.com/@theguyswann) ⁠Bitcoin Audible on X⁠ (Link: https://twitter.com/BitcoinAudible) The Guy Swann Network Broadcast Room on Keet (Link: https://tinyurl.com/3na6v839) Check out our awesome sponsors! Get 10% off the COLDCARD with code BITCOINAUDIBLE ⁠⁠⁠⁠⁠⁠(Link: bitcoinaudible.com/coldcard⁠⁠⁠⁠⁠⁠) Swan: The best way to buy, learn, and earn #Bitcoin (Link: https://swanbitcoin.com) “You don't win a debate by suppressing discussion; you win it with a better argument.” ~ Frank Sonnenberg --- Send in a voice message: https://podcasters.spotify.com/pod/show/bitcoinaudible/message

Federal Tech Podcast: Listen and learn how successful companies get federal contracts

Cybersecurity threats are like fashion; wait a few years and they come back in style. The Internet was designed to take a series of digits and resolve them to a website address. This was deemed the Domain Name Service, or DNS. In 1996, we saw the first malicious actor flooding a system with an attack. This was called a Distributed Denial of Service Attack, or DDOS. Over the years new methods of attack have proliferated and DDOS has taken a back seat. However, the number of endpoints has risen exponentially. It certainly looks like we are in a perfect storm to revive good old-fashioned DDOS. During today's interview, Rob San Martin tells the audience that Akamai processes over 11 trillion DNS requests a day and can see trends. According to Akamai's internal threat intelligence, in 2023, 60% of DDOS attacks had a DNS component. Looks like we are Back to the Future! Sean Lyons from Akamai shared an amazing story from last year. A local government was attacked more than 6,000 times. This attack was sustained for over three- and one-half hours. If you work for a federal agency and are looking for an on-premises solution for this problem, you may want to consider Akamai's new offering in hybrid DNS infrastructure security called Shield NS53. Listen to the interview to gain a better understanding of options for controlling DNS issues in your system. = = = Want to leverage you next podcast appearance? www.podscorecard.com Connect to John Gilroy on LinkedIn   https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com  

popular Wiki of the Day
Denial-of-service attack

popular Wiki of the Day

Play Episode Listen Later Sep 30, 2023 2:23


Episode 2341: Our popular article of the day is Denial-of-service attack.

Cyber Security Today
Cyber Security Today, Dec. 16, 2022 - Denial of service attack sites shut, a Twitter spy is sentenced, and more

Cyber Security Today

Play Episode Listen Later Dec 16, 2022 6:18


This episode reports on the closing of 48 DDoS for hire sites, data breaches at Social Blade and an Australian email provider, and a new Facebook scam

Renegade Talk Radio
Episode 4170: War Room Democrats Double Down on Trump Secret Service Attack Lie Even After It’s Exposed

Renegade Talk Radio

Play Episode Listen Later Jun 30, 2022 102:41


War Room Democrats Double Down on Trump Secret Service Attack Lie Even After It's Exposed https://www.infowars.com/posts/elites-plunging-us-into-economic-chaos-but-america-can-resist/

Ethical Hacking
What is Denial of Service attack ?

Ethical Hacking

Play Episode Listen Later Nov 22, 2021 17:02


Hello everyone my name is vijay kumar Devireddy and I am glad to have you back on my episode 71 today we're going to discuss about we're going to focus on the concept of a Denial of Service attack.Now, a Denial of Service attack isn't a specific attack in and of itself,but instead is this category or type of attack that's carried out in a number of different ways.Essentially, the term Denial of Service is used to describe any attack which attempts to make a computer or service resources unavailable,but it can also be extended to network devices,like switches and routers as well.There are five subcategories of Denial of Service attacks,Flooding Attacks, the Ping of Death, the Teardrop,the Permanent Denial of Service attack, and the Fork Bomb.The first category is called a Flood Attack.This is a specialized type of Denial of Service which attempts to send more packets to a single server or host than it can handle.So, in this example,we see an attacker sending 12 requests at a time to a server.Now, normally a server wouldn't be overloaded with just 12 requests,but if I could send 12 hundred or 12,000 that might allow me to flood that server and take it down.Now, under a Flood Attack we have a few different specialized varieties that you're going to come across The first is called a Ping Flood,this attack is going to happen when somebody attempts to flood your server by sending too many pings.Now a ping is technically an ICMP echo request packet,but they like to call it a ping Because a Ping Flood has become so commonplace though,many organizations are now simply blocking echo replies,and simply having the firewall dropping these requests whenever they're received.This results in the attacker simply getting a request timed out message,and the service remains online,and the Denial of Service is stopped.Next we have a Smurf Attack.This is like a Ping Flood,but instead of trying to flood a server by sending out pings directly to it,the attacker instead tries to amplify this attack by sending a ping to a subnet broadcast address instead,using the spoofed IP of the target server.This causes all of the devices on that subnet to reply back to the victimized server with those ICMP echo replies,and it's going to eat up a lot of bandwidth,and processing power.Now, you can see how this looks here,with the attacker sending the ping request with the IP of that server being spoofed into the request,and now the destination is sent to the broadcast of that subnet.In this example, all three PCs in the subnet are going to reply back to that ping request thinking it's from the server,and the server gets three times the amount of ping replies than if the attacker had sent it to them directly.Now, this allows that attack to be amplified,especially if the attacker can get a large subnet,like a /16 or a /8 used in this attack.The next kind of Flood Attack is what we call Fraggle.Fraggle is a throwback reference to the kids show Fraggle Rock from the 1980s,which aired around the same time as the Smurf TV show.So you can guess that Fraggle and Smurf are kind of related.Well with Fraggle, instead of using an ICP echo reply,Fraggle uses a UDP echo instead.This traffic is directed to the UDP port of seven,which is the echo port for UDP, and the UDP port of 19,which is the character generation port.This is an older attack,and most networks don't have this vulnerability anymore,and both of these ports are usually closed,'cause again, they're unnecessary.Notice that I didn't have them in your port memorization chart either.Now, because of this,Fraggle attacks are considered very uncommon today.That said, a UDP Flood Attack,which is a variant of Fraggle,is still heavily used these days.It works basically the same way as a Fraggle attack,but it uses different UDP ports.

The Decrypt Daily: Bitcoin & Cryptocurrency  News Podcast
Sept 21: Blood, Hacks, & Burger King

The Decrypt Daily: Bitcoin & Cryptocurrency News Podcast

Play Episode Listen Later Sep 21, 2021 22:44


Follow The Decrypt Daily Twitter: @decryptmedia Website: Decrypt.co Follow me on : Twitter: @MatthewDiemer IG: @MatthewADiemer FB Page: https://www.facebook.com/thedecryptdaily FB Group: https://www.facebook.com/groups/thedecryptdaily Email: MatthewAaron@Decrypt.co Matthew Diemer For Congress OH16 Diemerforcongress.com https://secure.actblue.com/donate/diemer-personal —————————————————————— Spaces https://www.youtube.com/watch?v=VkR4db_grAs Solana Blames ‘Denial of Service Attack' for Last Week's Downtime https://decrypt.co/81375/solana-blames-denial-of-service-attack-for-last-weeks-downtime Avalanche DeFi Platform Vee Finance Suffers $35M Hack https://decrypt.co/81400/avalanche-defi-platform-vee-finance-suffers-35m-hack Over $1 Billion in Crypto Futures Liquidated Amid Evergrande Concerns https://decrypt.co/81395/over-1-billion-crypto-futures-liquidated-amid-evergrande-concerns Bitclout Founder Reveals DeSo, a $200M Blockchain to Take on Facebook https://decrypt.co/81380/bitclout-deso-blockchain-diamondhands Third of U.S. Swing State Voters Favor Crypto as Payment: Newsweek https://decrypt.co/81389/third-of-u-s-swing-state-voters-favor-crypto-as-payment-newsweek Binance Halts Derivatives Products in Australia https://decrypt.co/81386/binance-halts-derivatives-products-australia Burger King Launches 'Keep It Real Meals' NFT Campaign https://decrypt.co/81384/burger-king-launches-keep-real-meals-nft-campaign Coin of the Day https://bux-c.com —————————————————————— Music: Say Good Night by Joakim Karud https://soundcloud.com/joakimkarud Creative Commons — Attribution-ShareAlike 3.0 Unported— CC BY-SA 3.0 Free Download / Stream: http://bit.ly/2RzhBOn Music promoted by Audio Library https://youtu.be/SZkVShypKgM Track: Future Disco — Vendredi [Audio Library Release] Music provided by Audio Library Plus Watch: https://youtu.be/zW2bU3ZnL9Q Free Download / Stream: https://alplus.io/future-disco Here comes the money https://www.youtube.com/watch?v=o0ZpesMYF6A https://www.youtube.com/watch?v=n695sgmV3EQ Coins sound effect no copyright https://www.youtube.com/watch?v=RPzV4gqx34A https://twitter.com/trippybunnynft?lang=en —————————————————————— Financial Disclosure: Matthew Aaron is a holder of cryptocurrencies, digital assets, and other stocks. *** this is not financial or legal advice*** © Copyright 2021 Matthew Aaron Podcasts LLC All Rights Reserved

Matrickz Daily Tech
Dailytech 510 - Car Hacking in Practice - The Denial of Service Attack (20-11-2020)

Matrickz Daily Tech

Play Episode Listen Later May 1, 2021 5:31


What does a denial of service attack look like? Common issues like the parking brake coming on while the car is still driving - it could be as simple as that. Could you spot a common attack like this? Watch here as my colleague, Praveen Suvarna, Head of Department for the Embedded Development and Autosar at Matrickz GmbH, gives a detailed walkthrough of this type of car hacking. #CANbus #ControllerAreaNetwork #CarHacking #automotivesecurity #automotivecybersecurity #autonomousvehicles #autonomousvehicle #denialofservice #denialofserviceattack #hacking

head practice denial car hacking service attack embedded development
Matrickz Daily Tech
Dailytech 508 - The Real Action in Car Hacking - Denial of Service Attack in the CAN bus (18-11-2020)

Matrickz Daily Tech

Play Episode Listen Later Apr 29, 2021 1:46


What is a denial of service attack when it comes to a car’s CAN bus? This is a great question. When your car is being hacked, the person hacking the car may be throwing many packages at your car’s CAN bus. For example, your seatbelt light might come on…. Even though you are wearing it. #CANbus #ControllerAreaNetwork #CarHacking #automotivesecurity #automotivecybersecurity #autonomousvehicles #autonomousvehicle #denialofservice #denialofserviceattack #hacking

Hacking Humans
denial-of-service attack (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Apr 27, 2021 6:07


A cyber attack designed to impair or eliminate access to online services or data.

denial noun service attack
Word Notes
denial-of-service attack (noun)

Word Notes

Play Episode Listen Later Apr 6, 2021 6:07


A cyber attack designed to impair or eliminate access to online services or data.

denial noun service attack
David Bombal
#268: Python WiFi DoS (Denial Of Service) Attack

David Bombal

Play Episode Listen Later Mar 26, 2021 17:41


Python WiFi DoS (Denial of Service) attack script. It's very easy to destroy a wifi network using this simple Python script. Learn Python today. It will change your life. This script uses Wi-Fi deauthentication messages to stop all users from accessing a wifi network. In the background, we are using airmon-ng and airodump-ng to launch our attack. Script1: https://bit.ly/3vYsbng ​ Direct GitHub link: https://github.com/davidbombal/red-py... ​ Script2: https://bit.ly/3clToZ4 ​ Direct GitHub link: https://github.com/davidbombal/red-py... ​ Menu: Python WiFi DOS Attack: 0:00​ Network Adapter: 1:05​ Script demonstration: 1:56​ Connect WiFi adapter: 2:35​ Create python script: 3:23​ Run Python script: 4:25​ Select WiFi Network: 5:35​ Kill WiFi network (deauth Wifi): 6:10​ Break script: 7:09​ Run script again to deauth Wifi: 7:36​ Recommendations and coolness: 7:56​ Requirements: 8:44​ Two versions of the script: 9:37​ Python script explanation: 10:21​ Second Python script: 15:44​ ================ Network Adapters: ================ Alfa AWUS036NHA: https://amzn.to/3qbQGKN ​ Alfa AWUSO36NH: https://amzn.to/3moeQiI ​ ================ Connect with me: ================ Discord: https://discord.com/invite/usKSyzb ​ Twitter: https://www.twitter.com/davidbombal ​ Instagram: https://www.instagram.com/davidbombal ​ LinkedIn: https://www.linkedin.com/in/davidbombal ​ Facebook: https://www.facebook.com/davidbombal.co ​ TikTok: http://tiktok.com/@davidbombal ​ YouTube: https://www.youtube.com/davidbombal​ ================ Support me: ================ DavidBombal.com: CCNA ($10): http://bit.ly/yt999ccna ​ Udemy CCNA Course: https://bit.ly/ccnafor10dollars ​ GNS3 CCNA Course: CCNA ($10): https://bit.ly/gns3ccna10 ​ wifi wifi dos wifi doser wifi hacking python hacking python python wifi python network scan python scanner python scan oscp ddos elearnsecurity oscp certification ethical hacking ceh oscp ine try hack me hack the box hacking ethical hacker ctf for beginners Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

Cybersecurity FOREVER
Day-211: How Can You Perform Denial-of-Service Attack Without Extra Tool?

Cybersecurity FOREVER

Play Episode Listen Later Feb 27, 2021 7:46


Today I will discuss: 1. What is Denial-of-Service Attack? 2. Different types of DoS attacks? 3. How can you perform DoS attack easily? Watch

tool denial perform service attack
The Solo Coder Podcast
#80: Preetam & Sankalp - Micro-SaaS & Marketplace [S04-E20]

The Solo Coder Podcast

Play Episode Listen Later Feb 16, 2021 55:42


I spoke with Preetam Nath and Sankalp Jonna. They are the founders of DelightChat, a platform helping Shopify businesses with their customer service needs. I came across Preetam after reading his blog post about Micro-Saas. The concept grabbed my attention. Preetam wrote so eloquently that I said I had to talk to him. Naturally with co-founders, Preetam is more in the business side and Sankalp in the technology. We spoke about what is the first thing someone should look at before jumping to building their own Saas product. Saas means Software as a Service and we have discussed about it during the chat. Preetam and Sankalp are not new to doing business together. Their first product was so successful that their competitors tried to bring down their site by launching a Distributed Denial-of-Service Attack also called DDoS. I found these guys to be very smart but also very humble. There is so much they can teach us and if you stick around you will also come to the same realization. Full show notes and links: https://SoloCoder.com/80

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

CenturyLink Outage https://blog.cloudflare.com/analysis-of-todays-centurylink-level-3-outage/ New Zealand Stock Market Denial of Service Attack https://www.theregister.com/2020/08/27/nzx_ddos_third_day/ Pulse Connect Secure RCE Patch https://www.gosecure.net/blog/2020/08/26/forget-your-perimeter-rce-in-pulse-connect-secure/

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

CenturyLink Outage https://blog.cloudflare.com/analysis-of-todays-centurylink-level-3-outage/ New Zealand Stock Market Denial of Service Attack https://www.theregister.com/2020/08/27/nzx_ddos_third_day/ Pulse Connect Secure RCE Patch https://www.gosecure.net/blog/2020/08/26/forget-your-perimeter-rce-in-pulse-connect-secure/

FortiGuard Threat Intelligence Podcast
#11 - More Android malware, BLE denial of service attack, and more.

FortiGuard Threat Intelligence Podcast

Play Episode Listen Later Nov 26, 2018 10:31


#11 - More Android malware, BLE denial of service attack, and more. by FortiGuard Labs

android denial malware ble service attack more android
The Bitcoin Game
The Bitcoin Game #60: Dr. Adam Back Part 2 - Liquid

The Bitcoin Game

Play Episode Listen Later Nov 4, 2018 71:04


Welcome to episode 60 of The Bitcoin Game, I'm Rob Mitchell. I'm happy to bring to you part two of my interview with Cypherpunk and CEO of Blockstream, Dr. Adam Back. In this episode, we take a deep dive into Liquid, Blockstream's new federated sidechain. There's a lot more to Liquid than I realized, and it's fascinating to hear tons of details about the protocol. I lead us astray with some of my questions, but Dr. Back never fails to drop tons of crypto-knowledge. And if you missed the first part of my interview, give episode 59 a listen to hear a great Cypherpunk history lesson. EPISODE LINKS First half of our interview (The Bitcoin Game #59) https://letstalkbitcoin.com/blog/post/the-bitcoin-game-59-dr-adam-back Adam Back (Adam3us) on Twitter https://twitter.com/adam3us Dr. Back's Info Page http://www.cypherspace.org/adam Blockstream https://blockstream.com Lightning Network White Paper by Joseph Poon & Thaddeus Dryja https://lightning.network/lightning-network-paper.pdf Duplex Micropayment Channels by Christian Decker & Roger Wattenhofer https://www.tik.ee.ethz.ch/file/716b955c130e6c703fac336ea17b1670/duplex-micropayment-channels.pdf ETHZ (where Christian Decker earned his Bitcoin PhD) https://www.ethz.ch/de.html Rusty Russell https://en.wikipedia.org/wiki/Rusty_Russell C-Lightning https://github.com/ElementsProject/lightning Liquid https://blockstream.com/liquid Liquid Assets https://blockstream.com/2018/07/02/liquid-issued-assets Confidential Transactions https://bitcoinmagazine.com/articles/confidential-transactions-how-hiding-transaction-amounts-increases-bitcoin-privacy-1464892525 ERC-20 https://en.wikipedia.org/wiki/ERC-20 Counterparty https://counterparty.io/docs/faq-xcp UTXO https://en.wikipedia.org/wiki/Unspent_transaction_output Bulletproofs https://crypto.stanford.edu/bulletproofs https://eprint.iacr.org/2017/1066.pdf Tether https://en.wikipedia.org/wiki/Tether_(cryptocurrency) Proof of Burn https://www.coinbureau.com/education/proof-of-burn-explained Public Key vs. Public Address https://www.reddit.com/r/Bitcoin/comments/3filud/whats_the_difference_between_public_key_and Lamport Signatures https://en.wikipedia.org/wiki/Lamport_signature The Byzantine Generals Problem https://people.eecs.berkeley.edu/~luca/cs174/byzantine.pdf Schnorr Signatures https://en.wikipedia.org/wiki/Schnorr_signature ECDSA https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm Denial-of-Service Attack https://en.wikipedia.org/wiki/Denial-of-service_attack Tor https://www.torproject.org Liquid Block Explorer https://blockstream.com/2018/08/02/accelerating-liquid-adoption-liquid-block-explorer NBitcoin by Nicolas Dorier https://www.codeproject.com/Articles/768412/NBitcoin-The-most-complete-Bitcoin-port-Part-Crypt Green Address Wallet https://greenaddress.it KYC Compliance https://en.wikipedia.org/wiki/Know_your_customer Paul Sztorc talks about Sidechains, Drivechain, Liquid https://letstalkbitcoin.com/blog/post/lets-talk-bitcoin-377-sidechains-drivechains-and-the-apple-store RootStock https://en.wikipedia.org/wiki/RootStock Spark Lightning Wallet by Nadav Ivgi https://bitcoinmagazine.com/articles/spark-new-gui-lightning-wallet-bitcoin-now-available-download Lightning Splice-In, Splice Out (and more) https://medium.com/@pierre_rochard/day-2-of-the-chaincode-labs-lightning-residency-669aecab5f16 SPV Wallet https://en.bitcoinwiki.org/wiki/Simplified_Payment_Verification Neutrino Lite Bitcoin Client https://github.com/lightninglabs/neutrino/blob/master/README.md Lightning Watchtower https://www.coindesk.com/laolu-building-watchtower-fight-bitcoin-lightning-fraud/ ABCore by Lawrence Nahum (BTC full node on Android) https://play.google.com/store/apps/details?id=com.greenaddress.abcore Hardware Wallet https://en.bitcoin.it/wiki/Hardware_wallet STAY IN TOUCH Thanks so much for taking the time to listen to The Bitcoin Game! https://Twitter.com/TheBTCGame http://TheBitcoinGame.com Rob@TheBitcoinGame.com SPONSORS BTC Inc is excited to announce its upcoming conference, Distributed Health, November 5 & 6 in Nashville, TN. This is the first conference to bridge the gap between blockchain technology and the healthcare industry. Now in its third year, this two-day event is an opportunity for all members of the ecosystem, including payers, providers, law makers, retailers, investors and innovators, to reshape the future of healthcare. For more information, visit: health.distributed.com and use the promo code: BTCGAME20 to secure a 20% discount! While much of a Bitcoiner's time is spent in the world of digital assets, sometimes it's nice to own a physical representation of the virtual things you care about. For just the price of a cup of coffee or two (at Starbucks), you can own the world famous Bitcoin Keychain. As Seen On The Guardian • TechCrunch • Engadget • Ars Technica • Popular Mechanics Inforwars • Maxim • Inc. • Vice • RT • Bitcoin Magazine • VentureBeat PRI • CoinDesk • Washington Post • Forbes • Fast Company Bitcoin Keychains - BKeychain.com CREDITS All music in this episode of The Bitcoin Game was created by Rob Mitchell. The Bitcoin Game box art was created from an illustration by Rock Barcellos. Bitcoin (Segwit) tipping address: 3AYvXZseExRn3Dum8z9tFUk9jtQK6KMU4g Note: We've recently migrated our RSS feed (and primary content host) from Soundcloud to Libsyn. So if you notice the Soundcloud numbers have dropped off recently, that's the reason.

Ennui Talk
078 Ennui Fan Service: Attack on Titan, Dragon Ball Z and Death Note

Ennui Talk

Play Episode Listen Later Jul 29, 2018 31:50


Matthew Winter and Jack Peterson come together to talk all things anime in an Ennui Fan Service special. The two discuss favourite animes like Daily Lives of High School Boys and Yuri on Ice, the objectively best animes like Attack on Titan and Your Name, popular animes like Pokemon and Dragon Ball Z, bad anime live-action adaptations like Death Note, and if Ennui made an anime.

Pirates CSG Podcast
Pirates CSG Podcast #22: Caribbean Set Review

Pirates CSG Podcast

Play Episode Listen Later Apr 29, 2018 155:41


Pirates of the Caribbean set: http://m.miniaturetrading.com/?action=selectCard&series_id=916&goal=&cards_lang=&sort=cASC&new_sort=nQOTD: What do you think of Caribbean? Woelf’s fleet, Denial of Service Attack: http://m.miniaturetrading.com/im/showDeck/deck_id/170910/grouping/0/extended_format/trueReview of the Pearl: http://m.miniaturetrading.com/im/showCardReview/review_id/7857Review of Potions and Brews: http://m.miniaturetrading.com/im/showCardReview/review_id/7834

Brakeing Down Security Podcast
2016-046: BlackNurse, Buenoware, ICMP, Atombombing, and PDF converter fails

Brakeing Down Security Podcast

Play Episode Listen Later Nov 20, 2016 44:50


This week, Mr. Boettcher found himself with an interesting conundrum concerning what happened when he converted a Windows DOCX file to a PDF using a popular #PDF converter software. We discuss what happened, how Software Restriction Policy in Windows kept him safe from a potential malware infection, and about the logging that occurred. After that, we discuss some recent vulnerabilities, like the BlackNurse Resource Exhaustion vulnerability and how you can protect your infrastructure from a DDoS that can occur from someone sending your firewall 300 packets a second... which anyone can do. We discuss Robert Graham's recent run-in with a new surveillance camera and how it was pwned in less time than you think. And learn about the 'buenoware' that has been released that 'patches' IoT and embedded devices... But does it do more harm than good, and is it legal? All that and more this week on Brakeing Down Security Podcast!  Check out our official #Slack Channel! Sign up at https://brakesec.signup.team Next Book Club session is 29 November 2016. Our current book for study is 'Software Security: Building Security In' by Dr. Gary McGraw  https://www.amazon.com/Software-Security-Building-Gary-McGraw/dp/0321356705  (ebook is available of Safari books online)   BlackNurse https://nakedsecurity.sophos.com/2016/11/17/blacknurse-revisited-what-you-need-to-know/ http://researchcenter.paloaltonetworks.com/2016/11/note-customers-regarding-blacknurse-report/ http://www.netresec.com/?page=Blog&month=2016-11&post=BlackNurse-Denial-of-Service-Attack   Recent tweet from @boettcherpwned about infected docx with macros and we discuss why Foxit PDF runs the macros and open_document: https://twitter.com/boettcherpwned/status/799726266693713920 Brakesec Podcast about Software Restriction Policy and Application Whitelisting on Windows: http://traffic.libsyn.com/brakeingsecurity/2016-018-software_restriction_policy-applocker.mp3 Rob Graham @errataBob: new camera pwned by #Mirai botnet and others within 5 minutes: https://twitter.com/newsyc200/status/799761390915424261   #BlackNurse https://nakedsecurity.sophos.com/2016/11/17/blacknurse-revisited-what-you-need-to-know/ http://researchcenter.paloaltonetworks.com/2016/11/note-customers-regarding-blacknurse-report/ http://www.netresec.com/?page=Blog&month=2016-11&post=BlackNurse-Denial-of-Service-Attack ICMP Type 3, Code 3 (Destination Port unreachable)  http://www.faqs.org/rfcs/rfc792.html #SHA1 deprecated on website certs by Chrome on 1 January 2017 http://www.darkreading.com/operations/as-deadline-looms-35-percent-of-web-sites-still-rely-on-sha-1/d/d-id/1327522 #Benevolent #malware (buenoware) https://isc.sans.edu/diary/Benevolent+malware%3F+reincarnaLinux.Wifatch/21703 #Atombombing http://blog.ensilo.com/atombombing-a-code-injection-that-bypasses-current-security-solutions https://breakingmalware.com/injection-techniques/atombombing-cfg-protected-processes/ http://www.pandasecurity.com/mediacenter/malware/atombombing-windows-cybersecurity/   Direct Link: http://traffic.libsyn.com/brakeingsecurity/2016-046-Black_Nurse_buenoware_IoT_pwnage.mp3 iTunes: https://itunes.apple.com/us/podcast/2016-046-blacknurse-buenoware/id799131292?i=1000378076060&mt=2 Youtube: https://www.youtube.com/watch?v=w-FEJuWGXaQ   #RSS: http://www.brakeingsecurity.com/rss #Google Play Store: https://play.google.com/music/podcasts/portal/#p:id=playpodcast/series&a=100584969 #SoundCloud: https://www.soundcloud.com/bryan-brake Comments, Questions, Feedback: bds.podcast@gmail.com Support Brakeing Down Security #Podcast on #Patreon: https://www.patreon.com/bds_podcast #Twitter: @brakesec @boettcherpwned @bryanbrake #Facebook: https://www.facebook.com/BrakeingDownSec/ #Tumblr: http://brakeingdownsecurity.tumblr.com/ #Player.FM : https://player.fm/series/brakeing-down-security-podcast #Stitcher Network: http://www.stitcher.com/s?fid=80546&refid=stpr #TuneIn Radio App: http://tunein.com/radio/Brakeing-Down-Security-Podcast-p801582

TechStuff
What is a denial of service attack?

TechStuff

Play Episode Listen Later Aug 17, 2009 24:33


Recently, Twitter was shut down for a few hours because of a denial of service attack. Join Chris and Jonathan as they discuss the details of denial of service attacks in this podcast from HowStuffWorks.com. Learn more about your ad-choices at https://news.iheart.com/podcast-advertisers

denial howstuffworks service attack
artificialeyes.tv Loopcast
vjblog: Four O Four For Money

artificialeyes.tv Loopcast

Play Episode Listen Later Jun 23, 2005


So the truth has to come out...falk has been so busy NOT posting to the blog that i sort of put an unofficial boycott on myself since my content was filling up the site (and this is supposed to be a group project!)... but since its been soooo long, i figured, well, better get SOMETHING up... so if u could just imagine for a second that i havent been posting to the site because i suffered a Distributed Denial of Service Attack, well, u might understand why we have been so b0rk3d around here this last month. How's that for a good excuse? Music is an unreleased IDM (intelligent dance music) track from a barista named Bayrak who makes my daily fredocino in the gourmet coffeeshop i frequent in istanbul, which now has WIFI. What a great combination.

Artificial Eye
Four O Four For Money

Artificial Eye

Play Episode Listen Later Dec 31, 1969


So the truth has to come out...falk has been so busy NOT posting to the blog that i sort of put an unofficial boycott on myself since my content was filling up the site (and this is supposed to be a group project!)... but since its been soooo long, i figured, well, better get SOMETHING up... so if u could just imagine for a second that i havent been posting to the site because i suffered a Distributed Denial of Service Attack, well, u might understand why we have been so b0rk3d around here this last month. How's that for a good excuse? Music is an unreleased IDM (intelligent dance music) track from a barista named Bayrak who makes my daily fredocino in the gourmet coffeeshop i frequent in istanbul, which now has WIFI. What a great combination.