Podcasts about TPM

Share on
Share on Facebook
Share on Twitter
Share on Reddit
Copy link to clipboard
  • 329PODCASTS
  • 864EPISODES
  • 48mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Nov 28, 2021LATEST

POPULARITY

20112012201320142015201620172018201920202021


Best podcasts about TPM

Latest podcast episodes about TPM

Forge the Narrative - Warhammer 40k Podcast
FTN Episode 410 – Drukhari Can't Be Stopped – Or Can They?

Forge the Narrative - Warhammer 40k Podcast

Play Episode Listen Later Nov 28, 2021


Very sorry about missing the release last week but Paul was in Austin doing some commentary on the Games Workshop US Open Series. On this episode we talk a little … Read More

RunAs Radio
Windows 11 is Released with Mary Jo Foley

RunAs Radio

Play Episode Listen Later Nov 24, 2021 39:20


Windows 11 Ships! So now what? Richard chats with Mary Jo Foley about her thoughts around the release of Windows 11. Mary Jo talks about how quiet the conversation has been around Windows 11, other than a few bits of outrage like the TPM requirements - which, as it turns out, aren't actually required. Is there a reason to move to Windows 11? Most IT folks seem happy to wait for further updates - there's nothing wrong with Windows 10. Maybe operating system releases just aren't as exciting as they used to be?Links:Upgrading to Windows 11Windows WeeklyAll About MicrosoftRecorded October 22, 2021

Hanselminutes - Fresh Talk and Tech for Developers
Understanding Windows 11 new security requirements with David Weston

Hanselminutes - Fresh Talk and Tech for Developers

Play Episode Listen Later Nov 18, 2021 36:21


David Weston is Director of Enterprise and OS Security for Windows at Microsoft. Today he sits down with Scott to get some real answers about the hardware requirements of Windows 11. What's the role of the TPM, and what are the other significant requirements that were needed in silicon to make Windows 11 secure?

Blast Points - Star Wars Podcast
Episode 291 - The CommTech Chips Strike Back

Blast Points - Star Wars Podcast

Play Episode Listen Later Nov 16, 2021 63:33


Our lives were recently dramatically changed when we learned of the existence of over 20 unreleased CommTech chips. After the initial wave with TPM, originally the plan was for them to keep going with new technologies and "TWICE THE SPEECH". While these sadly never reached toy store shelves, we have presented for you listeners, a comprehensive guide to the forbidden CommTech sounds! Sabe! Shmi! Sickly sounding Tusken Raiders! Porkins screaming! It's the CommTech follow up episode everyone has been waiting for! PLUS : we're talking Disney Plus Day, that Kenobi concept art and the super charming Willow tease! So, stand behind a camel creature's tail, listen today and celebrate the love! check out Prototype Archive here: https://www.prototypearchives.com/commtech-guide JOIN THE BLAST POINTS ARMY and SUPPORT BLAST POINTS ON PATREON! BAD BATCH REVIEW EPISODES! MANDO SEASON 1 & 2 REVIEW EPISODES!! BLAST POINTS Q&A EPISODES! Theme Music downloadable tracks! Exclusive Commentaries! Extra goodies! and so much MORE! www.patreon.com/blastpoints new Blast Points T-SHIRTS are now available! Represent your favorite podcast everywhere you go! Get the NEW Ben Burtt and Indiana shirt ! Cool logo shirts & other stylish styles while supplies last! Perfect for conventions, dates, formal events and more! Get them here: www.etsy.com/shop/Gibnerd?section_id=21195481 visit the Blast Points website for comics, recipes, search for back episodes and so much more! www.blastpointspodcast.com if you dug the show, please leave BLAST POINTS a review on iTunes and share the show with friends! If you leave an iTunes review, we will read it on a future episode! honestly! talk to Blast Points on twitter at @blast_points leave feedback, comments or ideas for shows! "like" Blast Points on Facebook for news on upcoming shows and links to some of the stuff we talk about in the show!! Join the Blast Points Super Star Wars Chill Group here www.facebook.com/groups/BlastPointsGroup/ we are also on Instagram! Wow! www.instagram.com/blastpoints your hosts are Jason Gibner & Gabe Bott! contact BLAST POINTS at contact@blastpointspodcast.com send us show ideas, feedback, voice messages or whatever! May the Force be with you, always.

Forge the Narrative - Warhammer 40k Podcast
FTN Episode 409 – Is Warhammer 40k Balanced? Okay.. What About Now?

Forge the Narrative - Warhammer 40k Podcast

Play Episode Listen Later Nov 14, 2021


The Balance update is here and people by in large seem to be digging it.  Is it what we needed to put Competitive 40k back on track?  We are really … Read More

ProMarketer's Podcast
What a PTIN form change means for accountant data security

ProMarketer's Podcast

Play Episode Listen Later Nov 12, 2021 49:59


There are a lot of reasons people trust tax pros and accountants to manage their tax situations, but probably the biggest one is they need someone they trust who can confidently tackle the complicated details of tax compliance and dealing with the IRS. But who's looking out for tax pros and accountants when the IRS makes sudden requirement changes? See, in 2019, the IRS added a question 11 to the W-12 PTIN application and renewal form, which read: “As a paid tax return preparer, I am aware of my legal obligation to have a data security plan and to provide data and system security protections for all taxpayer information. Check the box to confirm you are aware of this responsibility.” An innocuous question? Maybe not.  After investing hours upon hours of research into creating a data security plan for a client, Andrew Lassise, founder and CEO of Tech4Accountants, discovered that this tiny little question had much larger implications. That's when he knew he and his team could help. Lassise's company is one of the leaders in the industry for establishing ACTUALLY IRS-compliant practices and building rock-solid fortresses of optimization and speed in their tech. As Andrew says, they take the "SH" out of IT for accountants and tax professionals. Listen in as TPM's Nate Hagerty and Andrew Lassise discuss data security plans, server backups, and the vulnerability of small firms in the hacking world.  And get access to that detailed data security plan template mentioned in the podcast here: Tech4accountants.net/taxpromarketer-wisp

Forge the Narrative - Warhammer 40k Podcast
FTN Episode 408 – Did The Orks Really Need New Rules?

Forge the Narrative - Warhammer 40k Podcast

Play Episode Listen Later Nov 7, 2021 59:37


We’re cracking open Octarius Book 2.  For Matched Play the book is focused largely on Orks.  The Blood Axe faction gets a pretty nice set of abilities.  There is an … Read More

Forge the Narrative - Warhammer 40k Podcast
FTN Episode 407 – Can You Win With Tyranids? We Tell You How

Forge the Narrative - Warhammer 40k Podcast

Play Episode Listen Later Oct 31, 2021 63:07


The wonderful Aceface, John Hickton, joins us this week to discuss the absolute brutal things Tyranids get out of the Octarius campaign book.  The Tyranids seemed to be missing a … Read More

Bruxa Evani
Água de Lençóis Flor de Laranjeira | Alma da Floresta

Bruxa Evani

Play Episode Listen Later Oct 29, 2021 5:17


Água de Lençois de Flor de Laranjeira desperta alegria e disposição para a vida! Xô deprê! Finalidade: Controle hormonal e alívio dos sintomas da menopausa. Traz ânimo, coragem e entusiasmo pela vida. Flor de laranjeira ou neroli auxilia no despertar da alegria e entusiasmos da vida. Útil em casos de medo, choques emocionais e pensamentos do passado presos. É também um poderoso calmante, utilizado em casos de fobia, síndrome do pânico, irritabilidade e TPM. Modo de usar: Borrifar em todo o quarto, nas cortinas, roupa de cama ou onde desejar. (11)94034-3160

Around the Galaxy - A Star Wars Fan Talkshow
139. Devon Michael: Almost Anakin

Around the Galaxy - A Star Wars Fan Talkshow

Play Episode Listen Later Oct 26, 2021 53:14


Devon Michael is a former child actor turned sci-fi author best known to #StarWars fans as one of the three finalists seen in the behind the scenes documentary "The Beginning: The Making of Episode I." Devon has recently been featured in a 15 minute New York Times documentary called "Almost Famous, The Unchosen One" and in this Around the Galaxy episode, takes us even deeper into the experience before, during and after the famous audition.Make-A-Wish Charity event: ATGcast.com/PODATHONDevonMichael.comNYT documentary: https://www.nytimes.com/video/opinion/100000007768854/the-unchosen-one.htmlOur links:www.ATGcast.comwww.Patreon.com/ATGcastTwitter.com/ATGcastFacebook.com/ATGcastInstagram.com/ATGcast

The Hardware Asylum Podcast
Windows 11 and the Trusted Platform Module

The Hardware Asylum Podcast

Play Episode Listen Later Oct 24, 2021 28:00


We once again have Sean in the Hardware Asylum Labs and in this episode, we dive into Windows 11 and discuss the TPM 2.0 requirement to install the new operating system. What is it? Why would Microsoft require it?? And what does it mean for the Hardware Enthusiast.

Forge the Narrative - Warhammer 40k Podcast
FTN Episode 406 – Can Octarius Save Cadia? Big Guns Never Tire

Forge the Narrative - Warhammer 40k Podcast

Play Episode Listen Later Oct 23, 2021 59:50


Octarius absolutely gives some units a new lease on life – including Fortifications.  I’ll be honest.. it’s hard for me to put Buildings in a list but wow, I may … Read More

Bruxa Evani
Água de lençóis flor de laranjeira | Alma da Floresta

Bruxa Evani

Play Episode Listen Later Oct 22, 2021 5:17


Água de Lençois de Flor de Laranjeira desperta alegria e disposição para a vida! Xô deprê! Finalidade: Controle hormonal e alívio dos sintomas da menopausa. Traz ânimo, coragem e entusiasmo pela vida. Flor de laranjeira ou neroli auxilia no despertar da alegria e entusiasmos da vida. Útil em casos de medo, choques emocionais e pensamentos do passado presos. É também um poderoso calmante, utilizado em casos de fobia, síndrome do pânico, irritabilidade e TPM. Modo de usar: Borrifar em todo o quarto, nas cortinas, roupa de cama ou onde desejar. (11)94034-3160

Erika Na America Podcast
27. Não é só papo de mulher: MENSTRUAÇÃO, CHICO, PEPECA, TPM, SINTOMAS e um micão

Erika Na America Podcast

Play Episode Listen Later Oct 21, 2021 24:19


Já que o episódio anterior “Taboo em inglês: cocô, xixi, soltar pum, descargáveis e alguns segredos meus” fez tanto sucesso, porquê não manter a audiência em alta e falar de… The post 27. Não é só papo de mulher: MENSTRUAÇÃO, CHICO, PEPECA, TPM, SINTOMAS e um micão appeared first on Clube do Inglês.

Tehnopolis
Tehnopolis 132: Borba čipova

Tehnopolis

Play Episode Listen Later Oct 19, 2021 36:53


Google je predstavio svoj prvi, Apple nastavio da ih niže, a Microsoft je ostavio bez Windowsa 11 one kojima fali čip pod imenom TPM. Poznati su svi detalji o Pixelu 6, Google je predstavio nove uređaje u dve dimenzije i dve klase, kako po mogućnostima, tako i po ceni. Ono što je ključno za njihovu priču je Google Tensor, novi Googleov čip koji sada pogoni Pixele i koji je ključna nit priče o iskustvu koje bi novi telefoni trebalo da pruže. Apple je dan ranije konačno osvežio MacBook Pro u punom smislu te reči. Novo, ili bolje rečeno ponovo viđeno je gotovo sve, M1 Pro i M1 Max pogone modele sa ekranima od 14 i 16 inča, vratili su se portovi, a notch je sa Appleovih telefona prešao i na računare. Uz retro dizajn, vratili su se i fizički "F" dugmići, izbacujući TouchBar sa scene. Početkom meseca ozvaničen je Windows 11, a u nastavku TPM sapunice otkrili smo da će Microsoft ipak "dozvoliti" instalaciju na uređaju koji nemaju ovaj čip u verziji 2.0, ali "bez obaveze". Bilo kako bilo, Windows se konačno bitno prolepšao. Tri bitna događaja za 132. epizodu Tehnopolis podcasta, hvala na slušanju! Pratite Tehnopolis podcast RSS: https://www.b92.net/podcast/tehnopolis/feed/ Apple Podcasts: https://podcasts.apple.com/podcast/tehnopolis/id1185520336?mt=2 Google Podcasts: https://bit.ly/32Y1mlO Aleksandar Miladinović https://twitter.com/alexmiladinovic Ivan Jelić https://twitter.com/escapetofreedom https://mastodon.social/@escapetofreedom

Cyber and Technology with Mike
19 October 2021 Cyber and Tech News

Cyber and Technology with Mike

Play Episode Listen Later Oct 19, 2021 10:16


In today's podcast we cover four crucial cyber and technology topics, including:  1. Microsoft patches Surface Pro 3 flaw, Carte Blanche    2. TikTok abused to target games with malicious adds  3. FluBot spreads via fake missed call messages  4. ACE shuts downs one of largest media pirate sites  I'd love feedback, feel free to send your comments and feedback to  | cyberandtechwithmike@gmail.com

Force Toast: A Star Wars Happy Hour
Ep 67: For Coors Light and Life

Force Toast: A Star Wars Happy Hour

Play Episode Listen Later Oct 19, 2021 71:26


In Episode 67, hosts Alyce and Laura are* pretty malicious posers who don't have a lot of Star Wars news to discuss Wow okay, we see how it is. Star Wars Visions gets a soundtrack right after its debut. Do Rebels fans look like clowns to you, Disney Music?We didn't read it, but in case you missed it, there's a new excerpt out for Star Wars Thrawn Ascendency: Lesser Evil, out November 16The Star Wars hotel for the 1% is set on an old-as-hell space cruiser? If that place isn't haunted af we don't want it. Anyway it's getting its own comic mini-series in 2022.Galaxy of Sounds dropped on Disney+ a few weeks ago and we have thoughtsWe asked and you delivered! Listener questions about the Jedi temple on Coruscant, where to start if you're new to Star Wars reading, our Mount Rushmore of Star Wars music and more!Prequel trivia? Please and thank youAn impromptu Alyce signature summary of CBS's “Ghosts” you didn't know you neededHelpful links referenced in this episode:The Jedi Way is back with a new episode after a brief hiatus! John Rocha and Laura discuss Star Wars Visions, Star Wars' first steps into the larger world of anime  on Disney+Until we get soundtracks for seasons 3 and 4 of Star Wars Rebels, the plan is to crash the Kiner Bros website by listening to the Rebels scores on repeat forever and ever amen Twitter: @forcetoastpod | @sLeiaAllDay | @ShutUp_LauraInstagram: @forcetoastpodEmail: forcetoastpod@gmail.comWebsite: forcetoastpod.com*This podcast contains a sh!t ton of profanity and boozin. You can find a bleeped version of this podcast absolutely nowhere. Cheers!

Forge the Narrative - Warhammer 40k Podcast
FTN Episode 405 – Will Black Templars Make an Impact? Can They Beat Ad Mech?

Forge the Narrative - Warhammer 40k Podcast

Play Episode Listen Later Oct 17, 2021 72:58


We’re talking about Black Templars this week.  Adam is a long time Black Templar player and we’re anxious to get his thoughts.  He’s a little critical of the book and … Read More

Computer Corner (5DRadio.com)
Computer Corner October 16, 2021

Computer Corner (5DRadio.com)

Play Episode Listen Later Oct 16, 2021


Hosts: Gene MitchellAir date: October 16, 2021 Topic: various iincl TPM Special Guest(s):

Craig Peterson's Tech Talk
How Many Times Per Week Are You Being Cyber Attacked? From Where? How? Why?

Craig Peterson's Tech Talk

Play Episode Listen Later Oct 15, 2021 84:46


How Many Times Per Week Are You Being Cyber Attacked? From Where? How? Why? We've got a new study out showing that North American organizations, businesses, and others, are being hit with an average of 497 cyber attacks per week, right here in the good old USA. [Following is an automated transcript] This is a study by checkpoint software technologies. Checkpoint, I used, oh my gosh. It would have been back in the nineties back then. They were one of the very first genuine firewall companies. And it was a system that I was putting in place for my friends over at troopers. I think it was New England telephone. It might've been Verizon by then. I can't even remember, man. [00:00:41] It's been a little while, but it was, a system we were using in front of this massive system that I designed, I made the largest internet property in the world. At that time called big yellow. It morphed into super pages. It might be familiar with. But it was me and my team that did everything. We built the data center out. [00:01:05] We wrote all of the software. Of course they provided all of the yellow pages type listing so we can put it all in. And we brought it up online and we were concerned. Well, first of all, You know, I've been doing cyber security now for over 30 years. And at this point in time, they wanted something a little more than my home grown firewall. [00:01:29] Cause I had designed and written one in order to protect this huge asset that was bringing in tens of millions of dollars a year to the phone company. So they said, Hey, listen, let's go ahead and we'll use checkpoint and get things going. We did, it was on a little, I remember it was a sun workstation. If you remember those back in the. [00:01:52] And it worked pretty well. I learned how to use it and played with it. And that was my first foray into kind of what the rest of the world had started doing, this checkpoint software, but they've continued on, they make some great firewalls and other intrusions type stuff, detection and blocking, you know, already that I am a big fan, at least on the bigger end. [00:02:17] You know, today in this day and age, I would absolutely use. The Cisco stuff and the higher end Cisco stuff that all ties together. It doesn't just have the fire power firewall, but it has everything in behind, because in this day and age, you've got to look at everything that's happening, even if you're a home user. [00:02:37] And this number really gets everybody concerned. Home users and business users is. Businesses are definitely under bigger attacks than home users are. And particularly when we're talking about businesses, particularly the bigger businesses, the ones that have a huge budget that are going to be able to go out and pay up, you know, a million, $10 million ransom. [00:03:05] Those are the ones that they're after and this analysis. Point software who does see some of those attacks coming in, showed some very disturbing changes. First of all, huge increases in the number of cyber attacks and the number of successful ransoms that have been going on. And we're going to talk a little bit later, too, about where some of those attacks are coming from, and the reason behind those attack. [00:03:36] According to them right now, the average number of weekly attacks on organizations globally. So far, this year is 40% higher than the average before March, 2020. And of course that's when the first lockdowns went into effect and people started working from home in the U S the. Increase in the number of attacks on an organizations is even higher at 53%. [00:04:07] Now you might ask yourself why, why would the U S be attacked more? I know you guys are the best and brightest, and I bet it, I don't even need to say this because you can figure this out yourself, but the us is where the money is. And so that's why they're doing it. And we had president Biden come out and say, Hey, don't attack the. [00:04:27] well, some of those sectors are under khaki for more after he said that then before, right. It's like giving a list to a bad guy. Yeah. I'm going to be gone for a month in June and yeah, there won't be anybody there. And the here's the code to my alarm. Right. You're you're just inviting disaster checkpoints. [00:04:49] Also showing that there were more. Average weekly attacks in September 21. That's this September than any time since January, 2020. In fact, they're saying 870 attacks per organization globally per week. The checkpoint counted in September was double the average in March, 2020. It's kind of funny, right? [00:05:14] It's kind of like a before COVID after COVID or before the Wu Han virus and after the Wu Han virus, however, we might want to know. So there are a lot of attacks going on. Volume is pretty high in a lot of different countries. You've heard me say before some of my clients I've seen attack multiple times a second, so let's take a second and define the attack because being scanned. [00:05:40] I kind of an attack, the looking to see, oh, where is there a device? Oh, okay. Here's a device. So there might be a home router. It might be your firewall or your router at the business. And then what it'll do is, okay, I've got an address now I know is responding, which by the way is a reason. The, we always configure these devices to not respond to these types of things. [00:06:04] And then what they'll do is they will try and identify it. So they'll try and go into the control page, which is why you should never have when. Configuration enabled on any of your routers or firewalls, because they're going to come in and identify you just on that because all of a sudden them brag about what version of the software you're running. [00:06:26] And then if it's responding to that, they will try and use a password. That is known to be the default for that device. So in a lot of these devices, the username is admin and the password is admin. So they try it and now off they go, they're running. Some of these guys will even go the next step and we'll replace the software. [00:06:52] In your router or firewall, they will replace it so that it now directs you through them, everything you are doing through them. So they can start to gather information. And that's why you want to make sure that the SSL slash TLS. That encryption is in place on the website. You're going to, so if you go to Craig peterson.com right now, my website, I'm going to go there myself. [00:07:22] So if you go to Craig peterson.com, you're going to notice that first of all, it's going to redirect you to my secure site and it doesn't really matter. You won't see it. Okay. But you are there because if he. Typically at the left side of that URL bar where it says, Craig peterson.com. You'll see, there's a little lock. [00:07:44] So if you click that lock, it says connection is secure. Now there's a lot more we could go into here. But the main idea is even if your data is being routed through China or. Both of which have happened before many tens of thousands, hundreds of thousands of time times. I'm not even sure of the number now. [00:08:06] It's huge. Even if your data is being routed through them, the odds are, they're not going to see anything. That you are doing on the Craig Peterson site. Now, of course you go into my site, you're going to be reading up on some of the cybersecurity stuff you can do. Right. The outages what's happened in the news. [00:08:27] You can do all of that sort of thing on my side, kind of, who cares, right? Um, but really what you care about is the bank, but it's the same thing with the bank. And I knew mine was going to be up there. And when everybody just check it out anyway, so. So the bad guys, then do this scan. They find a web page log in. [00:08:47] They try the default log in. If it works, the Le the least they will do is change. What are called your DNS settings. That's bad because changing your DNS settings now opens you up to another type of attack, which is they can go ahead. And when your browser says, I want to go to bank of america.com. It is in fact, going to go out to the internet, say is bank of America, the bad guys. [00:09:18] Did, and they will give you their bank of America site that looks like bank of America feels like bank of America. And all they're doing is waiting for you to type into your bank of America, username and password, and then they might redirect you to the. But at that point, they've got you. So there are some solutions to that one as well, and Firefox has some good solutions. [00:09:44] There are others out there and you had to have those that are in the works, but this is just an incredible number. So here's what I'm doing, right. I have been working for weeks on trying to figure out how can I help the most people. And obviously I needed to keep the lights on, right? I've got to pay for my food and gas and stuff, but what I'm planning on doing and what we've sketched out. [00:10:10] In fact, just this week, we got kind of our final sketch out of it is we're going to go ahead and have a success path for cyber security. All of the basic steps on that success path will be. Okay. So it will be training that is absolutely 100% free. And I'll do a deeper dive into some of these things that I'm doing that I'm doing right now here on the radio, because you can't see my desktop. [00:10:40] It's hard to do a deep dive and it's open to anybody, right? If you're a home user or if you're a business user, all of the stuff on that free. Is going to help you out dramatically. And then after that, then there'll be some paid stuff like a membership site. And then obviously done for you. If the cybersecurity stuff is just stuff that you don't want to deal with, you don't have the time to deal with. [00:11:05] You don't want to learn, because believe me, this is something that's taken me decades to learn and it's changing almost every day. So I understand if you don't want to learn it to. That is the other option. I'll give you, which is done for you, which we've been doing now for over 20, 30 years. Stick around. [00:11:25] We'll [00:11:25] So which sectors are economy are being hacked? I mentioned that in the last segment, but yeah, there are some problems and the sectors that president Biden lined out laid out are, are the ones that are under, even more attack after his message. [00:11:42] 497 cyber attacks per week. On average here in the US, that is a lot of attacks. And we started explaining what that meant so that we talked about the scan attacks that are automated and some person may get involved at some point, but the automated attacks can be pretty darn automated. Many of them are just trying to figure out who you are. [00:12:09] So, if it shows up, when they do that little scan that you're using a router that was provided by your ISP, that's a big hint that you are just a small guy of some sort, although I'm shocked at how many bigger businesses that should have their own router, a good router, right. A good Cisco router and a really good next generation firewall. [00:12:34] I'm shocked at how many don't have those things in place, but when they do this, That's the first cut. So if you're a little guy, they'll probably just try and reflash your router. In other words, reprogram it and change it so that they can start monitoring what you're doing and maybe grab some information from. [00:12:56] Pretty simple. If you are someone that looks like you're more of a target, so they connect to your router and let's say, it's a great one. Let's say it's a Cisco router firewall or Palo Alto, or one of those other big companies out there that have some really good products. Uh, at that point, they're going to look at it and say, oh, well, okay. [00:13:18] So this might be a good organization, but when they get. To it again, if when access has turned on wide area, access has turned down, that router is likely to say, this is the property of, uh, Covina hospital or whatever it might be, you know? And any access is disallowed authorized access only. Well, now they know. [00:13:42] Who it is. And it's easy enough just to do a reverse lookup on that address. Give me an address anywhere on the internet. And I can tell you pretty much where it is, whose it is and what it's being used for. So if that's what they do say they have these automated systems looking for this stuff it's found. [00:14:02] So now they'll try a few things. One of the first things they try nowadays is what's called an RDP attack. This is a remote attack. Are you using RDP to connect to your business? Right? A lot of people are, especially after the lockdown, this Microsoft. Desktop protocol has some serious bugs that have been known for years. [00:14:25] Surprisingly to me, some 60% of businesses have not applied those patches that have been available for going on two years. So what then button bad guys will do next. They say, oh, is there a remote desktop access? Cause there probably is most smaller businesses particularly use that the big businesses have a little bit more expensive, not really much more expensive, but much better stuff. [00:14:51] You know, like the Cisco AnyConnect or there's a few other good products out there. So they're going to say, oh, well, okay. Let's try and hack in again. Automate. It's automated. No one has to do anything. So it says, okay, let's see if they patch, let's try and break in a ha I can get in and I can get into this particular machine. [00:15:14] Now there's another way that they can get into their moat desktop. And this apparently has been used for some of the bigger hacks you've heard about recently. So the other way they get in is through credential stuff. What that is is Hey, uh, there are right now some 10 billion records out on the dark web of people's names, email addresses, passwords, and other information. [00:15:43] So, what they'll do is they'll say, oh, well this is Covina hospital and it looks it up backwards and it says, okay, so that's Covina hospital.org. I have no idea if there even is a Gavino hospital, by the way, and will come back and say, okay, great. So now let's look at our database of hacked accounts. Oh, okay. [00:16:04] I see this Covina hospital.org email address with a password. So at that point they just try and stuff. Can we get in using that username and password that we stole off of another website. So you see why it's so important to be using something like one password, a password generator, different passwords on every site, different usernames on every site, et cetera, et cetera. [00:16:29] Right. It gets pretty important per te darn quickly. So now that they're in, they're going to start going sideways and we call that east west in the biz. And so they're on a machine. They will see what they can find on that machine. This is where usually a person gets some. And it depends in historically it's been about six days on average that they spend looking around inside your network. [00:17:00] So they look around and they find, oh yeah, great. Here we go. Yep. Uh, we found this, we found that. Oh, and there's these file server mounts. Yeah. These SMB shares the, you know, the Y drive the G drive, whatever you might call it. So they start gaining through those and then they start looking for our other machines on the network that are compromised. [00:17:23] It gets to be really bad, very, very fast. And then they'll often leave behind some form of ransomware and also extortion, where that extort you additionally, for the threat of releasing your data. So there, there are many other ways they're not going to get into them all today, but that's what we're talking about. [00:17:43] Mirman, we're talking about the 500 cyber attacks per week against the average. North American company. So we have seen some industry sectors that are more heavily targeted than others. Education and research saw an 60% increase in attacks. So their education and I've tried to help out some of the schools, but because of the way the budgets work and the lowest bidder and everything else, they, they end up with equipment. [00:18:17] That's just totally misconfigured. It's just shocking to me. Right. They buy them from one of these big box online places. Yeah. I need a, a Cisco 10, 10. And I need some help in configuring it and all, yeah, no problems or we'll help you. And then they sell it to the school, the school installs it, and it is so misconfigured. [00:18:38] It provides zero protection, uh, almost zero, right. It provides almost no protection at all. And doesn't even use the advanced features that they paid for. Right. That's why, again, don't buy from these big box. Guys just don't do it. You need more value than they can possibly provide you with. So schools, 1500 attacks per week research companies, again, 1500 attacks per week, government and military. [00:19:10] Entities about 1100 weekly attacks. Okay. That's the next, most highest attacked. Okay. Uh, health care organizations, 752 attacks per week on average. Or in this case, it's a 55% increase from last year. So it isn't just checkpoints data that I've been quoting here. That, that gives us that picture. There are a lot of others out there IBM's has Verizon's has all of these main guys, and of course in the end, They've got these huge ransoms to deal with. [00:19:50] Hey, in New Hampshire, one of the small towns just got nailed. They had millions of dollars stolen, and that was just through an email trick that they played in. K again. I T people, um, I I've been thinking about maybe I should put together some sort of coaching for them and coaching for the cybersecurity people, even because there's so much more that you need to know, then you might know, anyways, if you're interested in any of this. [00:20:22] Visit me online. Craig peterson.com/subscribe. You will get my weekly newsletter, all of my show notes, and you'll find out about these various trainings and I keep holding. In fact, there's one in most of the newsletters. Craig peterson.com. Craig Peterson, S O n.com. Stick around. [00:20:43] We've been talking about the types of attacks that are coming against us. Most organizations here in north America are seeing 500 cyber attacks a week, some as many as 1500. Now, where are they coming from? [00:21:00] Whether they're scanning attacks, whether they're going deeper into our networks and into our systems who are the bad guys and what are they doing? Microsoft also has a report that they've been generating, looking at what they consider to be the source of the attacks. Now we know a lot of the reasons I'm going to talk about that too, but the source is an interesting way to look at. [00:21:29] Because the source can also help you understand the reason for the attacks. So according to dark reading, this is kind of an insider, a website you're welcome to go to, but it gets pretty darn deep sometimes, but they are showing this stats from Microsoft, which you can find online that in the last year rush. [00:21:53] Has been the source of 58% of the cyber cat tax. Isn't that amazing now it's not just the cyber attacks. I, I need to clarify this. It's the nation state cyber tech. So what's a nature's nation state cyber attack versus I don't know, a regular cyber attack. Well, the bottom line is a nation state cyber attack is an attack that's occurring and is actually coordinated and run by and on behalf of a nation state. [00:22:31] Uh, So Russia at 58% of all nation state attacks is followed by North Korea, 23% Iran, 11% China, 8%. Now you probably would have thought that China would be. Right up there on that list, but Russia has 50% more of the nation state cyber attacks coming from them than from China. And then after China is south Vietnam, Viet, or I should say South Korea, Vietnam, and Turkey, and they all have less than 1%. [00:23:14] Now, this is this new pool of data that Microsoft has been analyzing. And it's part of this year's Microsoft digital defense report, and they're highlighting the trends in the nation state threat cyber activity hybrid workforce security. Disinformation and your internet of things, operational technology and supply chain security. [00:23:35] In other words, the whole gambit before, before all of this, now the data is also showing that the Russian nation state attacks are increasingly effective, calming from about a 21% successful compromise rate last year to 32%. So basically 50% better this year at effectiveness there, Russians are also targeting more government agencies for intelligence gathering. [00:24:10] So that jumped from 3% of their victims last year to 53%. This. And the Russian nation state actors are primarily targeting guests who us, right? The United States, Ukraine and the United Kingdom. Now this is all according to the Microsoft data. So why has Russia been attacking us? Why is China been attacking us and why the change this. [00:24:38] Well, Russia has been attacking us primarily to rent some us it's a cash cow for them just like oil and gas. They are making crazy money. Now that president Biden has made us dependent on foreign oil supplies. It's just insanity and even dependent on. Gas coming from other places. Well guess where the number one source of gases now for Europe and oil it's Russia. [00:25:08] So we are no longer going to be selling to Europe. Russia is so they're going to be making a lot of money off of. But before then they were actually counted on ransomware to help fund the Russian federal government, as well as of course, these Russian oligarchs, these people who are incredibly rich that have a substantial influence on the government. [00:25:33] Don't if you're wondering who they might be, just think of people like, oh, I don't know. Bill gates and, uh, w who are on the, some of the other big guys, you know, Tim cook, uh, Amazon's Jeff bayzos Elon Musk, right? Those are by my definition and looking it up in the dictionary, they are all a. They get exemptions to laws. [00:25:58] They get laws passed that, protect them. In fact, most of regulations actually protect these big companies and hurt small companies. So I would call them oligarchs and that's the same sort of thing in Russia in Russia. Okay. They probably have a little bit more underhanded stuff than these guys here do, but that's what Russia has been. [00:26:21] China has been continually going after our national secrets, national defense, the largest database of DNA of Americans DNA, of course, is that unique key. If you will building block for all of us, that's what DNA is. And the largest database of all of that uniquely identifying information is in. China stole from the office of personnel management records of a federal employees, their secret clearance, all of their background check information who was spoken with, what did they have to say? [00:27:03] And on and on. So China has been interested in infiltrating our businesses that provide things to the military and the military themselves and the federal state, and even the local governments that's who they've been targeting. And that's why there's 8% number might seem small. Although, as I just mentioned this year, Russia moved, moved dramatically. [00:27:30] They used to be about 3% of their attacks or against the government agencies. And now it's 53%. So Russia. And China are going after our national secrets and they can use them in a cold war, which as I've said, I think the first shots of the third world war have been fired. And frankly, they're all cyber, it's all online and Russia. [00:27:57] Isn't the only nation state actor who's changing its approaches here as espionage is the most common goal amongst all nation state groups as of this year. Tivity of hackers reveals different motivations in Iran, which quadrupled its targeting of Israel. Surprise, surprise. Over the last year. And Iran has been launching destructive attacks, things that will destroy power, power plants, et cetera, and North Korea, which is targeting cryptocurrency companies for profit. [00:28:29] So they're stealing these various crypto coins again, funding their government. So it's, it's a problem. Absolute problem. Government sectors are some of the most targeted 48%. These NGOs non-government organizations that act kind of a quasi government functions and think tanks are 31%. Uh, and Microsoft, by the way, has been alerting customers of nation, state attack, attack attempts. [00:29:01] Guess how many this year that they had to warn about 20,500 times in the past three years. So that's a lot and Microsoft is not a company that's been out there at the front lines. It never has been it's in behind. So to have them come out and say, this is. And okay, by the way, your stolen username and password run for a buck per thousand, and it's only gonna take you hundreds of hours to get it all cleared up. [00:29:32] Isn't that nice spear fishing for a hire can cost a hundred to a thousand dollars per successful account takeover and denial of service attacks are cheap from protected sites, roughly $300. Per month. And if you want to be ransomware king, it's only going to cost you 66 bucks upfront 30% of the profit. [00:29:54] Okay. Craziness. Hey, visit me online. Sign up Craig, peter.com/subscribe. [00:30:03] I had an interesting mastermind meeting this week. There's six of us. We're all business owners and it opened my eyes pretty dramatically because one of the members got hacked, but that's not what I really want to emphasize. [00:30:20] This whole cybersecurity thing gets pretty complicated, pretty quickly. And a friend of mine who is in one of my mastermind groups had a real problem. And the here's here's what went on. We'll call him Walt for back of a letter, lack of a better name since that is his name. [00:30:40] And he doesn't mind me sharing this with you. Walt has a very small business that he and his wife run, and they have a couple of contractors that help out with some things, but his business is very reliant on advertising and primarily what he does is Facebook advertising. Now I've been talking for two years, I think in this mastermind group about cyber security and the fact that everyone needs good cyber security. [00:31:13] And he always just kind of pole hum to, uh, wow. You know, and it's just too complicated for me. I got to thinking for a, you know, a bit, really a few weeks, what does he mean to complicated? Cause there's some basic things you can do. So this week on Tuesday, I was on our mastermind groups meeting and I explained, okay, so here's what happened to Walt. [00:31:42] He had $40,000 stolen, which by the way, it's a lot of money for a teeny tiny husband wife company. And. Uh, well, here's what we did. He, we helped them. We got the FBI involved and, you know, with our direct ties, cause we work with them on certain types of cases and he got back every dime, which is just totally unheard of. [00:32:06] But um, without going into all of the details there, I spent a problem. 1520 minutes with the whole group and the mastermind explaining the basics of cyber security. And that really kind of woke me up, frankly, because of their responses. Now these are all small business owners and so they're making pretty decent money. [00:32:31] In fact, every one of them and they all have some contractors and some employees all except for Walt and his wife, they had just have contractors and. I had two completely different responses from two members of this group that no. Let me tell you this was really eye opening for me. And this is why you might've heard me in the first segment talking about this, but this is why I have really changed my view of this stuff, this cybersecurity stuff, because I explained. [00:33:08] If you're using things like Norton antivirus or McAfee, antivirus, or really any of them, even the built-in Microsoft defender this year, those standard antivirus system. I have only been able to catch about 30% of the malware out there, 30%, you know, that's like having a house and you've got a security guard posted out front. [00:33:39] He's armed, he's ready to fight. And yet all of your windows are open and all of your doors are unlocked. And all someone has to do is crawl in the side window because that guy that's posted up front, he's not going to be able to stop. So 30% effectiveness. And of course, Walt had all of the basic stuff. [00:33:59] He thought he was good enough. It's not worth spending time or money doing any of this. And of course it turned out to be well worth the time and money if he had done it. But he has a friend who has contacts and, and made things happen for him. So I guess he's kind of, kind of lucky in that regard, but I explained that and I said, do you know the, the way you. [00:34:21] To go. If you're a small business, it's about $997 a month for a small business, with a handful of employees to get the type of security you really need. There's going to catch. 90 something 98%. Maybe if, if things go well of the stuff going on, in other words, you don't just have an armed guard at the front door. [00:34:46] You've got all the windows closed and blocked and the doors closed and locked as well. So yeah, somebody can still get in, but they got to really want to get in and risk getting caught. So that's kind of the analogy that I used now. One of the members of my. Of my mastermind thought, well, okay. Cause you're just being Frank with me. [00:35:09] Right? We're all friends. She said, well, initially I thought, oh Craig, I'm going to have to have you help out with stuff here. Cause my, you know, I'm concerned about my security. I make some good money. Uh, she's the one that has employee. She has a million dollar plus a year business and she wants to keep it safe. [00:35:26] But then she. Uh, you know, but, but you know, you were talking about all of this Norton and stuff and that it doesn't work. So I, I just, I don't have any hope. And that's when the another member jumped in and this other member said, well, Uh, oh, that's not what I got at all. I got the, the normal off the shelf stuff that you buy that you're going to get from Amazon, or you're going to get from PC connection or wherever that stuff is not going to work, but there is stuff that does, but it's only professional stuff. [00:36:02] You can only get it from professionals that are trained in certified. Which is the right message. Right. That was the message I was trying to relay. Yeah. Don't try and do it yourself because you can't even get the right tools that you need. That is frankly a problem. So that really got me to think. In, in a very big way, because here are two people that have heard me talk about cybersecurity and their eyes probably glazed over, but now their eyes, I know at least one of these ladies definitely glazed over. [00:36:36] So I've come to the realization that sometimes I. A little too deep into things. And although I can explain it quite well to many people, sometimes people glaze over and I get emails from you guys saying kind of the same thing. I really appreciate it. I don't understand a lot of what you're saying, Craig, but thanks for being there. [00:36:59] Listen to you every week here on the radio. Uh, then that's good. That's reassuring, but now I've come to realize a few things. One is. The I've got to be a lot clearer in my messaging, because even when talking to my friends, it is a little bit overwhelming for them sometimes. Right. And then the next thing is everybody needs help because you're being lied to. [00:37:29] Right. How are people getting ransomware? If the stuff that they're buying work. Maybe it's just me, but I think there's a disconnect there. So a lot of you guys have gone out and you've hired people and I want to spend just a few minutes right now, going through some red flags that you need to be looking out for in vendor security assessment. [00:37:56] Now I'm putting one together. As well, right yet another one. Uh, and what I'm trying to do is help you out, right? This is not as sales tool. It is trying to help you figure out where you're at. I'm putting together a webinar that I'm going to be holding these what I'm calling bootcamps, where I go through and show you exactly how to do the basic steps that you need to do in order to be safe on. [00:38:25] Okay. If an online, all that means is your, is plugged in, right. Okay. It doesn't mean you're going out and doing a lot of stuff out there on the internet just means it's connected. So those are going to be coming out. I will send an email out as soon as all of that. Stuff's ready. Cause. Absolutely free. And these assessments, I have the basic one that you can do yourself. [00:38:47] It's a self-assessment. And then I have the more advanced ones that I do that are five grand. Okay. So you've got to be a decent sized business for this to make sense where we look for all of the security problem. On all of your computers and your networks, and then give you a list of things you need to do and how to do them. [00:39:10] Okay. So it's well worth it for them, but if you're a very small company and you're trying to do some of this yourself, I want to help you. So that's what these boot camps are going to be all over. And also what the scorecard is going to be all about. So that's coming up, but here are some good red flags and an assessment. [00:39:30] I found this again on dark reading. This is kind of an insider website for those of us in the cybersecurity business, but, um, How can you verify the information that vendors are giving you about their own cybersecurity posture? We've heard in the news and I've talked about them all year, this year, and for years past. [00:39:56] That are we're vendors can be our worst nightmare because some of these hacks come in through our vendors. So you've got yourself, a cybersecurity company. How do you know if they are really telling you the truth? And man, is that hard for you to know? Right. You're going to ask him questions and the salesmen are going to say, oh yeah, yeah, yeah. [00:40:21] That's why we don't have salesmen. Right. We have engineers. You talk to me, you might talk to my son or my daughter, people who have been doing this with me, who I have trained and helped out. So this guy who wrote the article and there's this on attributed, I don't see an attribution on here on this page. [00:40:41] I definitely want to give him, probably I heard is John Babinec wrote this thing and he is a principle threat hunters. What he calls himself over at net and rich. So he says, here's what you got to do. And if you're trying to be cost-effective, he puts it in. What I call an ed month clause. And one of these days I'll tell you that story, but he calls it a validity check question so that an honest vendor would tell you, no, they don't do X and give you a good reason why they don't like it's not cost effective. [00:41:17] It's outside of a reasonable risk model. Does that make sense to you? So when you're trying to evaluate a vendor, who's going to be doing your cyber security put in one of these validity checks put in one of these questions. It doesn't really matter to you, but it's something that would be very hard for one of these cybersecurity companies to do. [00:41:42] And maybe it doesn't fit the risk model that you have. I think it's just absolutely brilliant. Probably one of the better ways when you're trying to evaluate an MSSP as cybersecurity managed or otherwise provider stick in something like that. So you have a red flag that just stands out for you. All right. [00:42:04] Make sure you are registered online. Craig Peter sohn.com/subscribe. So you can find out about all of these trainings coming up. [00:42:17] If you've never heard of the Carrington event, I really hope, frankly, I really, really do hope we never have to live through one of these. Again, there is a warning out there right now about an internet apocalypse that could happen because of the Sun. [00:42:34] Solar storms are something that happens really kind of all of the time. The sun goes through solar cycles. About every seven years, there are longer cycles as well. You might know. I have an advanced class amateur radio license I've had for a long time, and we rely a lot when we're dealing with short wave on the solar cycle. [00:42:59] You see what happens is that the sun charges, the atmosphere. You see that if you've ever seen the Northern light, that is. Part of the Sunzi missions, hitting our magnetic field and kind of getting sucked into the core of the earth, if you will, as they get caught in that field. And the more charged the atmosphere is, the more bounce you get. [00:43:24] That's what we call it bounce. And the reason us hams have all these different frequencies to use is because of the battle. We can go different frequencies with different distances, I should say, using different frequencies. So think about it right now. You've got the earth and I want to talk from Boston to Chicago. [00:43:47] For instance, I know about how many miles it is, and I have to figure out in the ionosphere up in the higher levels of the atmosphere, what frequency. To use in order to go up into the atmosphere, bounce back, and then hit Chicago. That's the idea. It's not quite as simple or as complex in some ways, as it sounds, a lot of people just try different frequencies and a lot of hams just sit there, waiting for anybody anywhere to talk to, particularly if they are. [00:44:20] It's really quite fun. Now what we're worried about, isn't so much just the regular solar activity. We get worried when the sun spots increase. Now, the solar cycle is what has primary image. On the temperature on earth. So no matter what, you might've heard that isn't your gas, guzzling car or a diesel truck that causes the Earth's temperature to change. [00:44:49] Remember the only constant when it comes to the Earth's temperature has been changed over the millions of years. We had periods where the earth was much warmer than it is now had more common that carbon dioxide in the atmosphere than it does now had less. In fact, right now we are at one of the lowest levels of carbon dioxide in the atmosphere in earth, long, long. [00:45:15] So the sun, if you might remember, comes up in the morning, warms things up, right? And then it cools down. When the sun disappears at nighttime, it has a huge impact. It's almost exclusively the impact for our temperatures. If there's other things too, for instance, eruption can spew all to hold a lot of carbon dioxide. [00:45:40] In fact, just one, just Mount St. Helens wanted erupted, put more carbon dioxide into the atmosphere than man has throughout our entire existence. Just to give you an idea, right? So these alarms that are out there, uh, you know, come on, people. Really, and now we're seeing that in, uh, this last year we had a 30% increase in the ice cap up in the, in, up in the north, up in Northern Canada, around the polls. [00:46:12] Uh, we also had some of these glaciers growing. It was so funny. I saw an article this year, or excuse me, this week that was showing a sign that was at one of our national parks. And it said this glacier will have disappeared by 2020. Of course it hasn't disappeared. In fact, it has grown now and it's past 2020. [00:46:34] Anyhow, the sun has a huge impact on us in so many ways. And one of the ways is. Well, something called a coronal mass ejection. This is seriously charged particles. That tend to be very, very directional. So when, when it happens, when there's one of these CMS coronal, mass ejections, it's not just sending it out all the way around the sun everywhere. [00:47:02] It's really rather concentrated in one. One particular spot. Now we just missed one not too long ago. And let me see if I can find it here. Just mast, a cm E near miss. Here we go. There a solar super storm in July, 2012, and it was a very, very close shave that we had most newspapers didn't mention it, but this could have been. [00:47:33] AB absolutely incredible. We'd be picking up the pieces for the next 50 years. Yeah. Five, zero years from this one particular storm. And what happens is these, these solar flares, if you will, are very, very extreme, they CME. You're talking about x-rays extreme UV, ultraviolet radiation, reaching the earth at the speed of light ionizes, the upper layers of atmosphere. [00:48:02] When that happens, by the way, it hurts our communications, but it can also have these massive effects where it burns out saddle. And then causes radio blackouts, GPS, navigation problems. Think about what happened up in Quebec. So let me just look at this call back, uh, hit with an E and yeah, here we go. And March 13th, 1989. [00:48:33] Here we go. Here's another one. Now I remembered. And this is where Quill back got nailed. I'm looking at a picture here, which is, uh, looking at the United States and Canada from the sky and where the light is. And you can see Quebec is just completely black, but they have this massive electrical blackout and it's becomes. [00:48:57] Of this solar storm. Now they, these storms that I said are quite directional, depending on where it hits and when it hits things can get very, very bad. This particular storm back in 1989 was so strong. We got to see their Rora Borealis, the Northern lights as far south, as Florida and cue. Isn't that something, when we go back further in time to this Carrington event that I mentioned, you could see the Northern lights at the equals. [00:49:35] Absolutely amazing. Now the problem with all of this is we've never really had an internet up online. Like we have today when we had one of the storms hit. And guess what we're about to go into right now, we're going into an area or a time where the sun's going to be more active, certainly on this, this 11 year cycle and possibly another bigger cycle too, that we don't really know much about. [00:50:07] But when this hit us back in the 1850s, what we saw was a, uh, a. Telegraph system that was brought to its knees. Our telegraphs were burned out. Some of the Telegraph buildings were lit. They caught on fire because of the charges coming in, people who were working the telegraphs, who are near them at the time, got electric shocks or worse than that. [00:50:34] Okay. 1859 massive Carrington event compass needles were swinging wildly. The Aurora Borealis was visible in Columbia. It's just amazing. So that was a severe storm. A moderate severity storm was the one that hit in Quebec here, knocked out Quebec, uh, electric. Nine hour blackout on Northeast Canada. What we think would happen if we had another Carrington event, something that happened to 150 years ago is that we would lose power on a massive scale. [00:51:13] So that's one thing that would happen. And these massive transformers that would likely get burned out are only made in China and they're made on demand. Nobody has an inventory. So it would be at least six months before most of the country would get power back. Can you believe that that would be just terrible and we would also lose internet connectivity. [00:51:39] In fact, the thinking that we could lose internet connectivity with something much less than a severe storm, maybe if the Quebec power grid solar, a massive objection here. Maybe if that had happened, when. The internet was up. They might have burned out internet in the area and maybe further. So what we're worried about is if it hits us, we're going to lose power. [00:52:07] We're going to lose transformers on the transmission lines and other places we're going to lose satellites and that's going to affect our GPS communication. We're going to lose radio communication, and even the undersea cables, even though they're now no longer. Regular copper cables. It's now being carried of course, by light in pieces of glass. [00:52:32] The, those cables need to have repeaters about every 15 miles or so under underwater. So the power is provided by. Copper cables or maybe some other sort of power. So these undersea cables, they're only grounded at extensive intervals, like hundreds or thousands of kilometers apart. So there's going to be a lot of vulnerable components. [00:52:59] This is all a major problem. We don't know when the next massive. Solar storm is going to happen. These coronal mass ejections. We do know they do happen from time to time. And we do know it's the luck of the draw and we are starting to enter another solar cycle. So be prepared, everything. Of course, you're listening to Craig Peterson, cybersecurity strategist. [00:53:28] If you'd like to find out more and what you can do, just visit Craig peterson.com and subscribe to my weekly show notes. [00:53:39] Google's got a new admission and Forbes magazine has an article by Zach Dorfman about it. And he's saying you should delete Google Chrome now after Google's newest tracking admission. So here we go. [00:53:55] Google's web browser. Right? It's been the thing for people to use Google Chrome for many years, it's been the fastest. Yeah, not always people kind of leapfrog it every once in a while, but it has become quite a standard. Initially Microsoft is trying to be the standard with their terrible browser and yeah, I to Exploder, which was really, really bad and they have finally completely and totally shot it in the head. [00:54:29] Good move there on their part. In fact, they even got rid of their own browser, Microsoft edge. They shot that one in. They had to, I know I can hear you right now saying, oh, Craig, I don't know. I just use edge browser earlier today. Yeah. But guess what? It isn't edge browser. It's actually Google Chrome. The Microsoft has rebranded. [00:54:52] You see the guts to Google Chrome are available as what's called an open source project. It's called chromium. And that allows you to take it and then build whatever you want on top of. No, that's really great. And by the way, Apple's web kit, Kat is another thing that many people build browsers on top of and is part of many of these browsers we're talking about right now, the biggest problem with the Google Chrome. [00:55:22] Is they released it so they could track you, how does Google make its money? Well, it makes us money through selling advertising primarily. And how does it sell advertising if it doesn't know much or anything about you? So they came out with the Google Chrome browser is kind of a standard browser, which is a great. [00:55:43] Because Microsoft, of course, is very well known for not bothering to follow standards and say what they have is the actual standard and ignoring everybody else. Yeah. Yeah. I'm picking on Microsoft. They definitely deserve it. Well, there is what is being called here in Forbes magazine, a shocking new tracking admission from. [00:56:05] One that has not yet made headlines. And there are about what 2.6 billion users of Google's Chrome worldwide. And this is probably going to surprise you and it's frankly, Pretty nasty and it's, I think a genuine reason to stop using it. Now, as you probably know, I have stopped using Chrome almost entirely. [00:56:31] I use it when I have to train people on Chrome. I use it when I'm testing software. There's a number of times I use it, but I don't use. The reality is the Chrome is an absolute terror. When it comes to privacy and security, it has fallen way behind its rivals in doing that. If you have an iPhone or an iPad or a Mac, and you're using safari, apple has gone a long ways to help secure your. [00:57:09] Well, that's not true with Chrome. In fact, it's not protecting you from tracking and Dave up data harvesting. And what Google has done is they've said, okay, well, we're going to get these nasty third party cookies out of the whole equation. We're not going to do that anymore. And what they were planning on doing is instead of knowing everything specifically. [00:57:34] You they'd be able to put you in a bucket. So they'd say, okay, well you are a 40 year old female and you are like driving fast cars and you have some kids with a grandkid on the way, and you like dogs, not cats, right? So that's a bucket of people that may be a few hundred or maybe up to a thousand. As opposed to right now where they can tell everything about you. [00:58:04] And so they were selling that as a real advantage because they're not tracking you individually anymore. No, we're putting you in a bucket. Well, it's the same thing. Right. And in fact, it's easier for Google to put you in a bucket then to track everything about you and try and make assumptions. And it's easier for people who are trying to buy ads to place in front of you. [00:58:28] It's easier for them to not have to kind of reverse engineer all of the data the Google has gathered in instead of. To send this ad to people that are in this bucket and then that bucket. Okay. It makes sense to you, but I, as it turns out here, Google has even postponed of that. All right. They really have, they're the Google's kind of hiding. [00:58:54] It's really what's going on out there. Uh, they are trying to figure out what they should do, why they should do it, how they should do it, but it's, it's going to be a problem. This is a bad habit. The Google has to break and just like any, anybody that's been addicted to something it's going to take a long time. [00:59:16] They're going to go through some serious jitters. So Firefox is one of the alternatives and to Google Chrome. And it's actually a very good one. It is a browser that I use. I don't agree with some of the stuff that Mozilla and Firefox does, but again, right. Nobody agrees on everything. Here's a quote from them. [00:59:38] Ubiquitous surveillance harms individually. And society Chrome is the only major browser that does not offer meaningful protection against cross cross site tracking and Chrome will continue to leave users unprotected. And then it goes on here because. Uh, Google response to that. And they admit that this massive web tracking out of hand and it's resulted in, this is a quote from Google and erosion of trust, where 72% of people feel that almost all of what they do online is being. [01:00:19] By advertisers, technology firms or others, 81% say the potential risks from data collection outweigh the benefit by the way, the people are wrong. 72% that feel almost all of what they do on online is being tracked. No, no. The answer is 100% of what you do is probably being tracked in some way online. [01:00:41] Even these VPN servers and systems that say that they don't do log. Do track you take a look at proton mail just last week. Proton mail it's in Switzerland. Their servers are in Switzerland. A whole claim to fame is, Hey, it's all encrypted. We keep it safe. We don't do logging. We don't do tracking, uh, guess what they handed over the IP addresses of some of the users to a foreign government. [01:01:10] So how can you do that? If you're not logging, if you're not tracking. Yeah, right. They are. And the same thing is true for every paid VPN service I can think of. Right. So how can Google openly admit that their tracking is in place tracking everything they can, and also admit that it's undermining our privacy and. [01:01:38] Their flagship browser is totally into it. Right? Well, it's really, it's gotta be the money. And Google does not have a plan B this anonymized tracking thing that they've been talking about, you know, the buckets that I mentioned, isn't realistic, frankly. Uh, Google's privacy sandbox is supposed to Fitbit fix it. [01:02:00] I should say. The, the whole idea and the way it's being implemented and the way they've talked about it, the advertisers on happy. So Google's not happy. The users are unhappy. So there you go. That's the bottom line here from the Forbes article by Zach Dorfman, delete Google Chrome. And I said that for a long time, I do use some others. [01:02:27] I do use Firefox and I use. Which is a fast web browser, that some pretty good shape. Hey, if you sign up for my show's weekly newsletter, not only will you get all of my weekly tips that I send to the radio hosts, but you will get some of my special reports that go into detail on things like which browser you shouldn't be using. [01:02:52] Sign up right now. Craig peterson.com. [01:02:57] Many businesses have gone to the cloud, but the cloud is just another word for someone else's computer. And many of the benefits of the cloud just haven't materialized. A lot of businesses have pulled back and are building data centers again. [01:03:14] The reason I mentioned this thing about Microsoft again, and the cloud is Microsoft has a cloud offering. [01:03:23] It's called Microsoft Azure. Many people, many businesses use it. We have used it with some of our clients in the past. Now we have some special software that sits in front of it that helps to secure. And we do the same thing for Amazon web services. I think it's important to do that. And we also use IBM's cloud services, but Microsoft is been pitching for a long time. [01:03:51] Come use our cloud services and we're expecting here probably within the next month, a big announcement from Microsoft. They're planning on making it so that you can have your desktop reside in Microsoft's cloud, in the Azure cloud. And they're selling really the feature of it doesn't matter where you are. [01:04:17] You have your desktop and it doesn't matter what kind of computer you're on. As long as you can connect to your desktop, using some just reasonable software, you will be able to be just like you're in front of a computer. So if you have a Chromebook or a Mac, Or a windows or tablet, whatever, and you're at the grocery store or the coffee shop or the office, you'll be able to get it, everything, all of your programs, all your files. [01:04:47] And we, Microsoft will keep the operating system up to date for you automatically a lot of great selling points. And we're actually looking into that. Not too heavily yet. We'll give them a year before we really delve into it at all. Cause it takes them a while to get things right. And Microsoft has always been one that adds all kinds of features, but most of the time, most of them don't work and we can, we can document that pretty easily, even in things like Microsoft. [01:05:18] Well, the verge is now reporting that Microsoft has warned users of its as your cloud computing service, that their data has been exposed online for the last two years. Yeah, let me repeat that in case you missed it, you, uh, yeah. I'm I'm I might've misspoken. Right. Uh, let me see, what does it say? It says, um, users of Azure cloud competing service. [01:05:48] So that's their cloud. Microsoft's big cloud. Okay. Um, their data has been. Exposed online. Okay. So that means that people could get the data, maybe manipulate the data that sort of exposed means for the last two years. Are you kidding me? Microsoft is again, the verge. Microsoft recently revealed that an error in its Azure cosmos database product left more than 3,300 as your customers data. [01:06:24] Completely exposed. Okay guys. So this, this, this is not a big thing, right? It can't possibly be big thing because you know who uses Azure, right. Nobody uses a zer and nobody uses hosted databases. Come on, give me a break. Let me see, what else does this have to say? Oh, okay. It says that the vulnerability was reported, reportedly introduced into Microsoft systems in 2019, when the company added a data visualization feature called Jupiter notebook to cosmos DB. [01:06:59] Okay. Well, I'm actually familiar with that one and let's see what small companies let's see here. Um, some Azure cosmos DB clients include Coca Cola. Liberty mutual insurance, Exxon mobile Walgreens. Hmm. Let me see. Could any of these people like maybe, maybe Liberty mutual insurance and Walgreens, maybe they'd have information about us, right. [01:07:26] About our health and social security numbers and account numbers and credit cards. Names addresses. Right, right. That's again, why I got so upset when these places absolutely insist on taking my social security number, right? It, it, first of all, when it was put in place, the federal government guaranteed, it would never be used for anything other than social security. [01:07:53] And the law even said it could not be used for anything other than social security. And then the government started expanding it. Right. And the IRS started using it. To track all of our income and you know, that's one thing right there, the government computers, they gotta be secure. Right. All of these breaches we hear about that. [01:08:12] Can't be true. Uh, so how about when the insurance company wants your personal information? Like your social security number? What business is it of? There's really no. Why do they have to have my social security number? It's a social security number. It's not some number that's tattooed on my forehead. [01:08:36] That's being used to track me. Is it this isn't a socialist country like China is, or the Soviet union was right. It's not socially. So why are they tracking us like that? Walgreens? Why do they need some of that information? Why does the doctor that you go to that made the prescription for Walgreens? Why do they need that information? [01:09:00] And I've been all over this because they don't. Really need it. They want, it makes their life easier, but they don't really need it. However, it exposes us. Now, if you missed the email, I sent out a week ago, two weeks ago now, I guess. You missed something big because I, in my weekly newsletter went through and described exactly what you could do in order to keep your information private. [01:09:35] So in those cases where websites asking for information that they don't really need, right? You don't want to lie, but if they don't really need your real name, why you're giving them your real name? Why do you use a single email address? Why don't you have multiple addresses? Does that start make sense to you guys? [01:09:54] And now we find out that Microsoft Azure, their cloud services, where they're selling cloud services, including a database that can be used online, a big database, uh, 3,300 customers looks like some of them are actually kind of big. I don't know. ExxonMobil pretty big. Yeah. I think so. Walgreens, you think that that might be yeah, yeah, yeah, yeah. [01:10:22] Y. Why are we trusting these companies? You know it, if you have a lot of data, a lot of customers, you are going to be a major target of nation states to hack you and bat just general hackers, bad guys. But you're also, if, if you've got all this information, you've also got to have a much higher level of security than somebody that doesn't have all of that information. [01:10:52] Does that make sense too? Did I say that right? You don't need the information and, and I've got to warn anybody that's in a business, whether you're a business owner or you're an employee, do not keep more data than you need the new absolutely need to run your company. And that includes data about your customers. [01:11:16] And maybe, maybe it's even more specifically data about your customer. Because what can happen is that data can be stolen and we just found. That? Yes, indeed. It could have been, it was exposed Microsoft the same. We don't know how much it was stolen. If anything was stolen. Um, yeah, Walgreens. Hey, I wonder if anyone's going to try and get some pain pills illegally through, uh, this database hack or a vulnerability anyways. [01:11:47] All right, everyone. Stick around. We'll be back. Of course, you listening to Craig Peterson. I am a cybersecurity strategist for business, and I'm here to help you as well. You can ask any question any time, uh, consumers are the people I help the most, you know, I wish I got a dime for every time I answered a question. [01:12:09] Just email me@craigpeterson.com me@craigpeterson.com and stick around. [01:12:18] Whether or not, you agree with the lockdown orders that were put in place over this COVID pandemic that we had. Uh, there are some other parts of the world that are doing a lot more. [01:12:34] Australia has, I don't know. I think that they went over the deep end. The much, the same thing is true right next door to them. [01:12:45] And I am looking at a report of what they are doing with this new app. Uh, you might be aware that both apple and Google came out with an application programming interface. That could be used for contract tack tracking, contact tracking. There you go. Uh, it wasn't terribly successful. Some states put some things in place. [01:13:13] Of course you get countries like China. I love the idea because heaven forbid you get people getting together to talk about a Tannen square remembrance. Now you want to know who all of those people were, who were in close proximity, right? So, you know, good for China a while, as it turns out, Australia is putting something in place they have yet another COVID lockdown. [01:13:39] They have COVID quarantine orders. Now I think if you are sick, you should stay on. I've always felt that I, you know, I had 50 employees at one point and I would say, Hey, if you're sick, just stay home. Never required a doctor's note or any of that other silliness, come on. People. If someone's sick, they're sick and let them stay home. [01:14:04] You don't want to get everybody else in the office, sick and spread things around. Right. Doesn't that just kind of make sense. Well, they now in Australia, don't trust people to stay home, to get moving. Remember China, they were, they were taking welders and we're going into apartments in anybody that tested positive. [01:14:22] They were welding them into their apartment for minimum of two weeks. And so hopefully they had food in there and they had a way to get fresh water. Australia is not going quite that far, but some of the states down under. Using facial recognition and geolocation in order to enforce quarantine orders and Canada. [01:14:47] One of the things they've been doing for very long time is if you come into the country from out of the country, even if you're a Canadian citizen, you have to quarantine and they'll send people by your house or you have to pay to stay for 10 days in a quarantine hope. So you're paying the course now inflated prices for the hotel, because they're a special quarantine hotel. [01:15:14] You have to pay inflated prices to have food delivered outside your door. And that you're stuck there for the 10 days, or if you're at home though, they, you know, you're stuck there and they'll send people by to check up on you. They'll make phone calls to check up on you and. They have pretty hefty find. [01:15:36] Well, what Australia has decided to do is in Australia is Charlene's even going from one state to another state are required to prove that they're obeying a 14 day quarantine. And what they have to do is have this little app on their phone and they, the app will ping them saying, prove it. And then they have to take a photo of themselves with geo location tag on it and send it up via the app to prove their location. [01:16:15] And they have to do all of that within 15 minutes of getting the notification. Now the premier of the state of south Australia, Steven Marshall said we don't tell them how often or when on a random basis, they have to reply within 15 minutes. And if you don't then a police, officer's going to show up at the address you're supposed to be at to conduct an in-person check. [01:16:43] Very very intrusive. Okay. Here's another one. This is a, an unnamed government spokesperson who was apparently speaking with Fox news quote. The home quarantine app is for a selected cohort of returning self Australians who have applied to be part of a trial. If successful, it will help safely ease the burden of travel restrictions associated with the pandemic. [01:17:10] So there you go. People nothing to worry about. It's just a trial. Uh, it will go away. Uh, just like, uh, for instance, income tax, as soon as rule, number one is over, it will be removed and it will never be more than 3% and it will only apply to the top 1% of wage-earners. So there you go. Right. And we all know that world war one isn't over yet. [01:17:34] Right. So that's why they still have it in somehow. Yeah, some of the middle class pays the most income tax. I don't know. Interesting. Interesting. So there you go. Little news from down under, we'll see if that ends up happening up here. News from China, China has, uh, China and Russia have some interesting things going on. [01:17:55] First of all, Russia is no longer saw. Country, they kind of are. They kind of aren't, they are a lot freer in many ways than we are here in the United States. Of course, China, very heavily socialist. In fact, they're so socialists, they are communist and China. And Russia both want their kids to have a very good education in science, engineering, and mathematics. [01:18:23] Not so much on history, not so much on, on politics. Right. But definitely heavy on the, on the sciences, which I can see that makes all the sense. I think everybody should be pretty heavily on the science. Well, according to the wall street journal this week, gamers under the age of 18 will not be allowed to play online games between 8:00 PM and 9:00 PM on Friday, Saturdays and Sundays. [01:1

The Full Nerd
Special Edition: Security Expert Talks Windows 11, TPM, VBS & Much More

The Full Nerd

Play Episode Listen Later Oct 13, 2021 106:09


Join The Full Nerd gang as they talk about the latest PC hardware topics. In today's episode we are joined by security professional Mike Danseglio to discuss everything from Windows 11 and TPM requirements, to VBS and how it's affecting PC gaming. And of course we'll answer your questions live! *This episode of The Full Nerd is sponsored by Avast. Avast One gives you everything you need to take control of your safety and privacy online, and it's accessible through a single, easy-to-use interface. A free version includes essential features such as Free Antivirus, Free VPN and Free Firewall Protection, while the premium version has even more advanced protection. Learn more about Avast One at Avast.com. Join the PC related discussions and ask us questions on Discord: https://discord.gg/SGPRSy7 Follow the crew on Twitter: @GordonUng @BradChacos @MorphingBall @KeithPlaysPC @AdamPMurray Follow PCWorld for all things PC! ------------------------------­---- SUBSCRIBE: http://www.youtube.com/subscription_center?add_user=PCWorldVideos TWITCH: https://www.twitch.tv/PCWorldUS TWITTER: https://www.twitter.com/pcworld

LINUX Unplugged
427: Life Changing Virtualization

LINUX Unplugged

Play Episode Listen Later Oct 13, 2021 69:13


Wimpy stops by with a new tool that will change your virtualization game, and we share our thoughts on Ubuntu 21.10 and take the flavor challenge. Special Guest: Martin Wimpress.

大紀元新聞
微軟出Windows 11操作系統 中國用戶恐無緣用 | 大紀元 | 大纪元

大紀元新聞

Play Episode Listen Later Oct 11, 2021 8:45


美國微軟公司本週二(10月5日)推出全新的個人電腦(PC)操作系統Windows 11。微軟說,Windows 11將為用戶帶來更加流暢的體驗。不過,許多中國用戶卻無法進行升級,原因是他們的系統不支持或沒有啟動一種被中國政府禁止進口的「TPM」芯片。 更多內容請見:https://www.epochtimes.com/b5/21/10/9/n13292934.htm 大纪元,大纪元新闻,大紀元,大紀元新聞,微軟操作系統, Windows 11, 中國用戶, TPM芯片 Support this podcast

The Portrait System Podcast
How Nikki Closser Used Personal Branding to Retire Herself From Social Work

The Portrait System Podcast

Play Episode Listen Later Oct 11, 2021 73:26


Today, we have a very special episode of the Portrait System Podcast! Host Nikki Closser becomes a guest as photographer and SBE clubhouse host Ashleigh Taylor interviews her about her personal branding business. Over the years, Nikki has built a successful personal branding business that allowed her to retire from social work. In fact, Nikki teaches all about to build an incredible personal branding business in her TPM class available on the portrait masters website (https://theportraitmasters.com/product/the-personal-branding-system/). If you're looking for useful advice on how to run or create your business, then you'll definitely want to hear this episode!See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Forge the Narrative - Warhammer 40k Podcast
FTN Episode 404 – Podcast Found! We're Back!

Forge the Narrative - Warhammer 40k Podcast

Play Episode Listen Later Oct 9, 2021 65:10


Thanks for sticking with us after a week of vacation.  We are back with a little bit of recap from the Games Workshop US Open event in New Orleans and … Read More

c’t uplink
Windows 11 - Hardware-Limits und Bugs zum Start | c't uplink 40.0

c’t uplink

Play Episode Listen Later Oct 9, 2021 63:58


Heute in c't uplink sprechen wir über den Start von Windows 11: Wie streng sind die Vorgaben zu TPM und CPUs wirklich? Und wer ist von Performance-Einbußen betroffen? In der aktuellen Folge c't uplink dreht sich alles um den Start von Windows 11. Microsoft hat zwar mit dem Rollout begonnen, doch ein automatisches Update bekommt derzeit kaum einer. Wir erklären, wie man das Update händisch anstößt, wie streng Microsoft die Hardware-Vorgaben durchsetzt, wie man die Anforderungen umgeht -- und welche Probleme es zum Start gab. Zum Start melden einige Performance-Probleme. Einige AMD-Ryzen-CPUs laufen derzeit unter Windows 11 langsamer, außerdem gibt es bei einigen Benchmarks bei aktiviertem Security-Feature HCVI Einbußen. Ersteres soll ein Patch demnächst beheben, zweiteres dürfte man im Alltag kaum merken, schätzt Christof Windeck ein. Er und das c't-Hardware-Team testen aktuell auf diversen Rechnern, wo es noch hakt. Insgesamt läuft Windows 11 aber jetzt schon relativ rund, so das Fazit von Jan Schüßler im c't uplink. Auch hat Microsoft in letzter Minute vor dem Release-Termin einige Fehler behoben, die Jan noch einige Tage zuvor in der eigentlich schon finalen Version bemängelt hatte. Nicht geschafft ins Release hat es bisher die versprochene Möglichkeit, Android-Apps in Windows 11 zu starten. Mehr zu Windows 11 findet ihr in der aktuellen c't unter https://www.heise.de/select/ct/2021/22 === Anzeige / Sponsorenhinweis === Diese Ausgabe des c't uplink ist gesponsert von Dell Technologies. Besuchen Sie uns online unter: Dell.de/KMU-Beratung === Anzeige / Sponsorenhinweis Ende===

Abacaxizando
#59 Menstruação

Abacaxizando

Play Episode Listen Later Oct 7, 2021 33:23


O episódio de hoje é um oferecimento da nossa TPM (@tamisfeir, @marianamala), para vocês! Abrimos o coração sobre esse período desconfortável, falamos sobre metabolismo e a injustiça que é o nosso não ser tão potente igual aos dos homens. Uma grande salada de frutas. @rsimetti deu sorte de não poder participar senão sobrava pra ele. Aproveita e segue a gente nas redes sociais: www.instagram.com/podcastabacaxizando www.instagram.com/tamisfeir www.instagram.com/marianamala www.instagram.com/rsimetti --- Send in a voice message: https://anchor.fm/abacaxizando/message

mixxio — podcast diario de tecnología

Linux para Apple Silicon ya casi / Files v2 / Windows 11 pausado en China / El Capitán Kirk en Blue Origin / HBO trae 4K y una cosa rara / Adiós IGTV Patrocinador: Allianz es el líder mundial en gestión activa https://www.allianz.es/allianz-inversion.html. Te ofrece fondos de inversión, sostenibles y tecnológicos, así como planes de jubilación adaptados a tu edad actual https://www.allianz.es/plan-de-pensiones.html. Además de un producto único con garantía alemana como es Allianz Perspektive https://www.allianz.es/seguro-de-ahorro.html. — Para más información, asesórate en Allianz.es https://www.allianz.es/ o en el 900 228 228 tel:+34900228228. Linux para Apple Silicon ya casi / Files v2 / Windows 11 pausado en China / El Capitán Kirk en Blue Origin / HBO trae 4K y una cosa rara / Adiós IGTV  La adaptación de Linux a los procesadores Apple Silicon ya va tomando forma. Asahi Linux, el proyecto de código libre liderado por el español Héctor Martín lleva unos meses imparable. En su último boletín https://asahilinux.org/2021/10/progress-report-september-2021/ cuentan que ya es "tan usable como un escritorio básico para Linux (sin la aceleración por hardware)", y que los Mac con M1 ya son los PC con ARM más rápidos con Linux.  Files v2 llega a Windows 10 y 11. La aplicación alternativa de navegador de archivos con algunas funciones interesantes como las pestañas, se actualiza https://microsofters.com/179881/files-v2-el-mejor-explorador-de-archivos-para-windows-10-y-windows-11/ con soporte para FTP, agrupar archivos, e incluso un modo de superposición compacta que te permite tener una ventana permanentemente visible por encima del resto de ventanas.  ¿Qué pasará con Windows 11 en China? China prohíbe desde hace 22 años la venta de chips de seguridad TPM, así que los fabricantes no pueden pre-instalar https://www.scmp.com/tech/big-tech/article/3151286/how-banned-encryption-chip-stopping-china-running-windows-11-now el sistema operativo en sus portátiles para ese mercado. Los usuarios que lo instalen por su cuenta, recordemos, pueden saltarse ese requisito. — Considerando que casi 1 de cada 3 PCs del mundo se vende allí... ¿qué decisión tomará Microsoft, creará una versión china de Windows 11?  Más consecuencias de la caída de Facebook. Facebook publicó un post-mortem del incidente https://engineering.fb.com/2021/10/05/networking-traffic/outage-details/ algo vago en detalles. Telegram anunció que recibió 70 millones de usuarios https://www.infobae.com/america/tecno/2021/10/05/telegram-registro-mas-de-70-millones-de-usuarios-nuevos-tras-la-caida-de-whatsapp/ nuevos, la mayoría huérfanos de WhatsApp. — Según Haystack aumentó la productividad mundial https://www.usehaystack.io/blog/facebook-outage-increased-developer-throughput-by-32 de los programadores, y también las llamadas de teléfono https://www.nobbot.com/personas/la-caida-de-facebook-nos-recuerda-que-la-voz-humana-es-algo-mas-que-un-cortometraje-de-almodovar/#.YVxgjGS6nk0.twitter e incluso hasta los SMS.  William Shatner capitaneará la segunda misión de Blue Origin. El Capitán Kirk de Star Trek por fin irá al espacio de verdad en vez de al de carton piedra, aunque siendo la cápsula de Blue Origin tampoco creo que haya mucha diferencia. Hará historia igualmente https://es.gizmodo.com/william-shatner-el-mitico-capitan-kirk-de-star-trek-v-1847798111 porque a sus 90 años romperá el récord de persona más mayor en el espacio.  Ojo que no solo no pagará el billete. Blue Origin le pagará a él por ir https://www.tmz.com/2021/09/24/william-shatner-going-space-jeff-bezos-blue-origin/. Marketing puro. Le acompañarán el fundador de Planet (una de mi startups favoritas), otro emprendedor millonario y una VP de la propia Blue Origin.  Mientras tanto en la EEI llegaron la actriz y el director ruso que van a rodar parte de una película https://www.microsiervos.com/archivo/espacio/actriz-director-estacion-espacial-internacional.html durante los próximos días.  La nueva app de HBO llega a España con 4K y una extraña petición para los clientes abonados actuales. Si quieren mantener sus listas de contenido (contenido en favoritos) deberán hacer un pantallazo en la vieja app https://www.genbeta.com/multimedia/tus-listas-hbo-espana-se-perderan-cuando-llegue-hbo-max-tienen-solucion-que-le-saques-captura-pantalla y compartirlo dentro de la nueva. — No me explico qué motivo técnico les ha hecho aceptarlo.  La buena noticia es que la nueva aplicación tendrá un soporte mucho más amplio, incluyendo PlayStation.  IGTV desaparece y se diluye en el resto de Instagram. La aplicación hermana de Instagram que permitía subir y consumir vídeos más largos, de hasta 60 minutos. Poco más de tres años después, sus creadores deciden renombrarla a "Instagram TV" y aunque seguirá como app separada, los vídeos estarán presentes en el feed de la nodriza https://eloutput.com/noticias/redes-sociales/igtv-cambio-nombre-instagram-tv/.  Es decir que en Instagram tendrás un feed con imágenes, galerías, y vídeos de entre 1 segundo y 60 minutos. Además de las historias que van por separado. — Lo que sigue sin hacer todavía Instagram: pagar a los creadores, como sí hace YouTube. Se han pasado de listos.  Google activará la verificación en dos pasos a 150 millones de usuarios automáticamente. No ha especificado los factores que decidirán qué tipo de usuarios, pero antes de acabar el año muchos más usuarios de Google necesitarán un salto adicional para acceder a sus cuentas https://www.europapress.es/portaltic/ciberseguridad/noticia-google-activara-auntenticacion-dos-factores-150-millones-usuarios-antes-acabe-ano-20211005165222.html. Parece que será obligatorio para todos aquellos con canal en YouTube, unos dos millones.  Detenida una pequeña banda de Ransomwareros en Ucrania. Una operación policial internacional se salda con el arresto de dos miembros https://www.theregister.com/2021/10/04/ukraine_arrests_two_ransomware_150m_allegations_revil/ de una banda mayor de criminales digitales. Han requisado un millón de euros en criptomoneda, dinero en metálico y les acusan de haber atacado a "más de 100" empresas. — Improbable, pero no imposible, que sean parte de REvil.  Citroën presenta una base para vehículos eléctricos con ruedas esféricas. El Citroën Skate es un protipo conceptual https://www.caranddriver.com/es/movilidad/a37862420/citroen-skate-concept/ que serviría de sistema locomotor para una serie de vehículos urbanos diferentes. Encima del mismo se podrán poner diferentes carrocerías con objetivos variados. — Interesante pero dependerá de su precio y facilidad de fabricación.

Por que não?
37. Sobre menstruação (você precisa ouvir isso)

Por que não?

Play Episode Listen Later Oct 6, 2021 72:49


Se você interage com mulheres na sua vida, esse episódio é pra você. Em nossa modernidade, paramos de prestar atenção e dar espaço a ciclos que, na verdade, fazem parte da nossa natureza humana e do nosso cotidiano. Você fala de menstruação? Sabe como tratar uma mulher "na TPM"? Tem ciência do impacto que saber sobre o ciclo das mulheres e pessoas que convivem com você pode ter na sua própria vida e interação com elas? Vem com a gente desenvolver mais empatia, melhores relações interpessoais e uma sociedade mais inclusiva. Para mais conteúdo e ficar por dentro das novidades, siga @porquenaopodcast Anfitriões: @soldelcarlo @marc_oliv Por que não apoiar? Link para Picpay Episódios sem cortes no Youtube Trilhas sonoras: Funkorama by Kevin MacLeod: Link License

Microsoft Mechanics Podcast
Windows 11 Security — Our Hacker-in-Chief Runs Attacks and Shows Solutions

Microsoft Mechanics Podcast

Play Episode Listen Later Oct 5, 2021 17:01


Stay ahead of external and internal threats — and balance performance, reliability, and security with Windows 11. Dave Weston, Windows security expert, joins Jeremy Chapman to share the rationale behind hardware requirements and how they provide significantly more protection against today's most sophisticated malware and attacks. Cyber attacks are at an all time high. Many of the optional or high-end security controls from Windows 10 are now on by default and required on new machines with Windows 11. The Zero Trust security model is baked into Windows 11, from the silicon on the board itself, to the actual boot process, your login as a user, and the apps you use in your Windows session every day. See the sites that hackers use, and find out if your organization is exposed. Protect Windows from remote and in-person attacks with Virtualization-based Security. UEFI, Secure Boot and Trusted Boot stop rootkits or bootkits. Secure encryption keys, user credentials, and sensitive data behind a hardware barrier. Windows 11 requires TPM 2.0 on new installs by default. ► QUICK LINKS: 00:00 - Introduction 01:36 - Demo attack: Remote 06:05 - Demo attack: In person 08:01 - Virtualization-based Security 11:06 - Trusted Platform Module (TPM) 12:08 - UEFI, Secure Boot, and Trusted Boot 14:27 - Proof it works 15:37 - Wrap up ► Link References: To switch from MBR to GPT, check out our show at https://aka.ms/MechanicsMBR2GPT Check to see if your organization is exposed on https://Shodan.io ► Unfamiliar with Microsoft Mechanics? We are Microsoft's official video series for IT. You can watch and share valuable content and demos of current and upcoming tech from the people who build it at #Microsoft. Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries?sub_confirmation=1 Join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog Watch or listen via podcast here: https://microsoftmechanics.libsyn.com/website ► Keep getting this insider knowledge, join us on social: Follow us on Twitter: https://twitter.com/MSFTMechanics Follow us on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ 

Blue Security
TPM design limitations and Apple-Google app store actions

Blue Security

Play Episode Listen Later Oct 4, 2021 27:46


This week on the Blue Security Podcast, Adam and Andy talk about two interesting topics. The first is a pentesting company's successful hack Bitlocker using a TPM limitation. They talk about why this is complicated and the mitigations for it. They also talk about Apple and Google's decision to pull a voting app from the store in Russia a day before the parliamentary elections and the effect it has on democracy. ------------------------------------------- Youtube Video Link: https://youtu.be/-GNLKWTtxTI ------------------------------------------- Documentation: https://dolosgroup.io/blog/2021/7/9/from-stolen-laptop-to-inside-the-company-network https://explainxkcd.com/wiki/index.php/538:_Security https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238 ------------------------------------------- Contact Us: Website: http://bluesecuritypod.com Twitter: https://twitter.com/bluesecuritypod Instagram: https://www.instagram.com/bluesecuritypodcast/ Facebook: https://www.facebook.com/bluesecpod ------------------------------------------- Andy Jaw Twitter: https://twitter.com/ajawzero LinkedIn: https://www.linkedin.com/in/andyjaw/ Email: andy@bluesecuritypod.com ------------------------------------------- Adam Brewer Twitter: https://twitter.com/ajbrewer LinkedIn: https://www.linkedin.com/in/adamjbrewer/ Email: adam@bluesecuritypod.com --- Send in a voice message: https://anchor.fm/blue-security-podcast/message

Legends of S.H.I.E.L.D.: An Unofficial Marvel Agents Of S.H.I.E.L.D. Fan Podcast
"What If Ultron Won?" S01E08 Review (A Marvel Comic Universe Podcast) LoS394

Legends of S.H.I.E.L.D.: An Unofficial Marvel Agents Of S.H.I.E.L.D. Fan Podcast

Play Episode Listen Later Oct 3, 2021 87:08


The Legends Of S.H.I.E.L.D. Agent Lauren, Consultant Chris, Producer of the show Director SP discuss the Disney+ What If…? season one episode “What If…Ultron Won?” the weekly Marvel news and listener feedback. The Team debriefs you International Podcasting Day, that EPIC multiverse beat down fight, a diversion into the series music composer, The Watcher's prominent role in the episode, the Clint and Natasha glow in the dark post-apocalyptic glow in the dark adventure, why exactly was Zola effective against Zola in theory, we ask you to tell us who was Steve Roger's Vice Presidential running mate, the unique nature of the Ultron voice actor, Supreme Strange's demand, if Tony Stark's death is a Nexus point in the multiverse, why Vision didn't take care of Thanos like he did in the Ultron did, at least SOME of the Russian Language Easter Eggs, Black Widow's family heirloom, a HUGE Disney family multiverse Easter Egg, what the What If MCU continuity had limited the series to, speculation on how the What If moment came to pass, some comments on the Disney character copyright lawsuits, and Chris talks Marvel versus Capcom 2. Stay tuned after the credits for a few minutes of Legends Of S.H.I.E.L.D. bonus audio.   THIS TIME ON LEGENDS OF S.H.I.E.L.D.:   What If…Ultron Won? From the Disney+ Marvel series What If (S1E8) Weekly Marvel News Admissions about What If from the series showrunner A.C. Bradley herself The new plan for Disney+'s Ms Marvel series The Hit or Miss philosophy of future Marvel Studios related  projects And Disney's is suing people again over Marvel issues Plus an update on that Agent Carter Your Feedback   WHAT IF…? “WHAT IF … ULTRON WON?” [3:51]   S1E8 “What If … Ultron Won?”   “What If … Ultron Won?” premiered on Disney+ on Wednesday September 29th, 2021.   Series Directed By: Bryan Andrews https://www.imdb.com/name/nm1635535/?ref_=ttfc_fc_dr1 3 directing credits starting 1999 3x Men In Black: The Series 5x Jackie Chan Adventures 8x What If Also a Storyboard Artist with 41 credit And a Writer with 9 total credits   Story Editor: Mathew Chauncy https://www.imdb.com/name/nm10508309/?ref_=ttfc_fc_wr3#writer 2 Writer Credits starting in 2018 16x 3Below: Tales Of Arcadia 9x What If…? (Story Editor for all episodes but Written by for 5)   Executive Producer: A.C. Bradley (Creator, Head Writer and Showrunner) https://www.imdb.com/name/nm5642271/?ref_=tt_cl_wr_1  5 writing credits starting 2005 1x Arrow 28x Trollhunters: Tales of Arcadia 38x 3Below: Tales of Arcadia 9x What If   Music  Laura Karpman https://www.imdb.com/name/nm0440017/?ref_=fn_al_nm_1 139 Composing Credits starting in 1989 Winner of Primetime Emmy for Outstanding Music Composition for a Documentary Series or Special (Original Dramatic Score) - Why We Hate (2019) Episode: "Why We Hate: Tools & Tactics (2019) HBO series Lovecraft Country (TV Series) 2020 Craft in America (TV Series documentary) (18 episodes) 2013 L.A.'s Finest (TV Series) (13 episodes) 2019   Jeffrey Wright                        ... The Watcher (voice) 9 episodes Westworld The Hunger Games Casino Royale Quantum Of Solace Jeremy Renner                          ...         Clint Barton / Hawkeye (voice) 28 Weeks Later The Hurt Locker Lake Bell                                               ...         Natasha Romanoff / Black Widow Boston Legal It's Complicated No Strings Attached Harley Quinn (TV Series) Poison Ivy In a Word… No Escape Spider-Man: Into the Spider-Verse (Vanesssa Fisk) The Secret Life of Pets 2 Toby Jones                                ...         Arnim Zola (voice) Harry Potter and the Chamber of Secrets Harry Potter and the Deathly Hallows: Part 1 Your Highness The Adventures of Tintin The Hunger Games The Hunger Games: Catching Fire The Hunger Games: Mockingjay - Part 2 Atomic Blonde The Dark Crystal: Age of Resistance (TV Series) Ross Marquand                          …          Ultron (Played Johann Schmidt in Captain Carter episode) Mad Men (Paul Newman) Phineas and Ferb: Star Wars (2014) ... Han Solo (voice) The Walking Dead (Aaron) Family Guy (TV Series) Blockbuster (TV Series) American Dad! (TV Series) Robot Chicken (TV Series short) Invincible (TV Series) As an aside: Avengers: Infinity War - Red Skull (Stonekeeper) Avengers: Endgame - Red Skull (Stonekeeper) Avengers: Damage Control (Video Game) - Ultron (voice) Josh Keaton                                           ...         Steve Rogers / Captain America Dr. Quinn, Medicine Woman (TV Series) Boy Meets World (TV Series) Hercules (1997) Young Hercules (voice) Green Lantern: The Animated Series (TV Series) Voltron: Legendary Defender (TV Series) Enough Video Game and Animation Voice Over titles to cover the state of Texas Mick Wingert                                          ...         Tony Stark / Iron Man The Avengers: Earth's Mightiest Heroes (TV Series) Kung Fu Panda 3 Kung Fu Panda: Legends of Awesomeness (TV Series) Kung Fu Panda (TV Series) Voltron: Legendary Defender (TV Series) Attack on Titan (TV Series) Kung Fu Panda: The Paws of Destiny (TV Series) Alexandra Daniels                                  ...         Carol Danvers / Captain Marvel  Mothers and Daughters Benedict Cumberbatch                ...         Doctor Stephen Strange Hawking War Horse The Hobbit: An Unexpected Journey Star Trek Into Darkness The Hobbit: The Desolation of Smaug The Imitation Game The Hobbit: The Battle of the Five Armies Zoolander 2 Sherlock  The Grinch 1917   NEWS [50:30]   TOP NEWS STORY OF THE WEEK   Shang Chi and the Legend of the Ten Rings is scheduled to premiere on September 3rd, 2021. Eternals is scheduled to premiere on November 5th, 2021. Disney+ Day on November 12th, 2021 including streaming premiere for Shang-Chi Hawkeye is scheduled to premiere on November 24th, 2021. There will be 6 episodes … I think.  Spider-Man: No Way Home is scheduled to premiere on December 17th, 2021. Ms Marvel is supposed to premiere late in 2021 on Disney+ but no date has been announced.  Moon Knight is supposed to premiere late in 2022 on Disney+ but no date has been announced.  She-Hulk is supposed to premiere late in 2022 on Disney+ but no date has been announced.    Doctor Strange in the Multiverse of Madness (Mar 25th 2022?) Secret Invasion is in development for release on Disney+ but no date has been announced.  Ironheart is in development for release on Disney+ but no date has been announced.    Thor: Love and Thunder (May 6th, 2022) Armor Wars  is in development for release on Disney+ but no date has been announced.    Black Panther: Wakanda Forever (July 8th, 2022) https://comicbook.com/marvel/amp/news/black-panther-riri-williams-ironheart-mcu-debut-dominique-thorne/ Echo is in development for release on Disney+ but no date has been announced.  An untitled Wakanda series is in development for release on Disney+ but no date has been announced.    The Marvels (November 11th, 2022) Also, we know there will be a Loki season two at some point.   Ant-Man and the Wasp: Quantumania (February 17th, 2023)   Guardians of the Galaxy Vol. 3 (May 5th, 2023)   Fantastic Four  (???) I Am Groot is in development for release on Disney+ but no date has been announced. I've heard this will be a holiday special. Untitled (February 16th, 2024) Untitled (May 3rd, 2024) Untitled (July 26th, 2024) Untitled (November 8th, 2024) List of MCU films in production without premiere dates Fantastic Four Deadpool 3 Blade Avengers-Level Team up to end the phase (not confirmed in development) Could be linked to Russo Brothers story from last week Captain America Sequel Possible X-Men Projects that have NOT been announced yet Young Avengers   MCU – MARVEL STUDIOS   Marvel Suing to Keep Rights to ‘Avengers' Characters From Copyright Termination https://www.theverge.com/platform/amp/2021/9/24/22691842/disney-marvel-sues-comic-artist-iron-man-avengers https://www.hollywoodreporter.com/business/business-news/marvel-suing-avengers-copyright-termination-1235020110/ Disney's Marvel unit is suing to hold on to full control of Avengers characters including Iron Man, Spider-Man, Dr. Strange, Ant-Man, Hawkeye, Black Widow, Falcon, Thor and others.   The complaints, which The Hollywood Reporter has obtained, come against the heirs of some late comic book geniuses including Stan Lee, Steve Ditko and Gene Colan. The suits seek declaratory relief that these blockbuster characters are ineligible for copyright termination as works made for hire. If Marvel loses, Disney would have to share ownership of characters worth billions.   Marvel Studios Has Over 30 Projects in Active Development https://www.cbr.com/marvel-studios-30-plus-projects-in-development/ When veteran Marvel Studios producer Victoria Alonso was asked by 221radio if the company had 35 projects in the works, Alonso laughingly replied, "We are currently working on 31 projects, don't add 4 more, please." If that sounds like a lot to take on at once, Alonso agrees. Yet, the producer went on to assure fans that the studio is prepared for some hit-or-miss projects so long as they stay true to the human characters and interconnectedness of the MCU.   "It is a question about how are we handling multiple plates in the air at the same time," Alonso continued, "and the biggest thing is that sometimes the plates fall, and, you know, what are you going to do then? We want people to understand that the idea that we have, to tell these connected stories, it is important that the world knows that the characters we create, their stories have to do with how humans interact with each other."   Disney+   Marvel's What If…? team reveals season 1 finale intel: There's 'a bigger plan' AC Bradley Admits … We kill Tony a LOT https://ew.com/tv/marvel-what-if-ac-bradley-bryan-andrews-episode-8/ Season 1 was originally meant to be 10 episodes, but because of the COVID-19 pandemic one of those episodes had to be pushed to season 2, and Bradley says the delayed episode helped balance the other, darker stories. "Our 10th episode was a more light, upbeat Tony Stark episode," she says. "I noticed on Twitter we're getting a lot of crap for killing Tony a lot. He has become the Kenny of the What If…? universe by accident."   The episodes have mirrored the comics by ending on cliffhangers that each tease a larger story. And it seems that all of those threads may actually come together in the season's final episode. It's also possible that the already announced second season could follow up on certain stories, while new methods of remotely making animated series may help the show to avoid the issues the pandemic has posed and craft longer episodes. For now, however, the show does still have one limit: the MCU.   What If...? Episodes Are Shorter than Planned Because of COVID https://deadline.com/2021/09/what-if-marvel-series-a-c-bradley-podcast-interview-1234843778/ https://www.cbr.com/marvel-what-if-short-runtime-covid/ "What If...? comics ended abruptly and really dark to prove that the main timeline is the better timeline," Bradley said. "We've used that as our reason to cut stories off a little bit shorter. All these episodes could have been 45 minutes. Some of the animatics were 35 minutes, but due to animation and Covid, we cut them a little bit shorter than we would have liked."   Disney+ Pushes Ms. Marvel to 2022 https://variety.com/lists/marvel-studios-release-schedule/ https://www.cbr.com/disney-plus-ms-marvel-2022/ https://twitter.com/adambvary/status/1440844586016927744 Variety Senior Entertainment Writer Adam B. Vary recently posted an update regarding the Marvel Cinematic Universe's release schedule. "I've confirmed what was obvious to most Marvel Studios observers: [Ms. Marvel] has moved from a late 2021 release on Disney Plus to 2022," Vary tweeted.   This is not the first report indicating Ms. Marvel's debut shift. TVLine's Matt Webb Mitovich previously suggested the series had been delayed until early a 2022 delay. Film insider Amit Chaudhari recently stated that the series was set to hit Disney+ in February.     Disney+ Removes Hayley Atwell's Agent Carter Short Film https://thedirect.com/article/disney-plus-removal-hayley-atwell-agent-carter-short-film Marvel Studios' Agent Carter One-Shot was completely removed from Disney+, seemingly across all territories.   In mid-September 2021, Marvel Studios' Agent Carter One-Shot was added to Disney+ within its own special section/page . Beforehand, the short could only be found in Iron Man 3 's EXTRAS section; Agent Carter has been removed there as well.   There doesn't seem to be any clear indication as to why Disney+ would remove a section solely dedicated to the Agent Carter One-Shot.   The One-Shot originally appeared on the 2013 DVD and digital release of Iron Man 3 and gave some brief insight into how Peggy eventually started up what viewers knew as SHIELD. From there, the Agent Carter ABC show was also born, spanning two seasons on the television network .   On its own, the One-Shot exemplifies the brilliance of Atwell's character; it reminds viewers of why she is now a returning force to the franchise and re-emphasizes her importance to MCU lore as a whole .   It's possible that its removal could have been nothing more than in preparation for bigger and better things to come for Peggy; maybe the streaming service pulled the gun and wants to highlight her more so down the line, possibly aligning with the Season 1 finale of What If...? .   Video Games   https://gamerant.com/marvel-vs-capcom-2-disney-capcom-revival-discussion-report/ This campaign to bring back Marvel Vs. Capcom 2 was started by Maximilian Dood, a YouTuber whose content revolves around fighting games. He started the campaign earlier this year under "#FREEMVC2" in order to gather support to hopefully re-release the crossover game onto modern systems. This caught the attention of Digital Eclipse, a studio that has worked with both Disney and Capcom to remaster some of its old games. Studio head Mike Mika showed his support for re-releasing the game, along with giving the game a proper remaster treatment. In a recent interview with Shacknews, Mika brings further thoughts to the table regarding how this re-release could be possible.   PlayComics Episode 91: Marvel vs Capcom 2 New Age of Heroes with Trent Seely (Continuity Nod) https://playcomics.com/marvel-vs-capcom-2-new-age-of-heroes-with-trent-seely-continuity-nod/     FEEDBACK [1:08:24]   TWITTER   https://twitter.com/LegendsofSHIELD/status/1441009180190642177 Legends S.H.I.E.L.D. @LegendsofSHIELD Describe this week's @whatifofficial episode "What If...Thor Were An Only Child?" in one word. Go.   @Marvel @disneyplus @TheAshBradley https://twitter.com/MrParacletes/status/1441017538297610243 Dr. Gnome to you @MrParacletes Bueller?   https://twitter.com/MrParacletes/status/1439638970619547648 Dr. Gnome to you @MrParacletes @LegendsofSHIELD   Dr. Gnome to you @MrParacletes Sep 27 @LegendsofSHIELD  Just now learned these existed.   https://twitter.com/MrParacletes/status/1442576804351414274 https://cakebites.com/marvel-cakebites/   Dr. Gnome to you @MrParacletes @LegendsofSHIELD   https://twitter.com/MrParacletes/status/1442420926952448001   Andiminga @andiminga Yay or Nay??  @LegendsofSHIELD Quote Tweet Eric Goldman @TheEricGoldman More hype for Thor: The Dark World (Taylor's Version) twitter.com/GeekTyrant/sta… https://twitter.com/andiminga/status/1443669020868321288 https://geektyrant.com/news/thor-the-dark-world-director-would-love-to-make-a-snyder-cut-style-redo-of-the-marvel-film DISCORD Beard Watch 2021 — 09/24/2021 Okay, this week's What If... I think I'm officially over this series.   Beard Watch 2021 — 09/25/2021 Space-god frat boy holds intergalactic kegger does not make for a good story to me.   StargatePioneer — 09/25/2021 Overall the series is a light hearted campy ride that hits some weeks and misses in other episodes. Not to mention a few tragic stories along the way too. But I certainly would not take any of it too seriously. This week's episode especially was meant more as a fun dalliance than any other with events that could only be told via a cartoon IMO.   But all this is from a guy who like The Phantom Menace, dislikes Empire Strikes Back and is often wrong. So I might just be drinking the cool aid.   Erasure (Too Lazy !!) — 09/26/2021 That's on this was one of my favorite episodes too along with T'Challa Star Lord. And wow someone else who likes the Phantom Menace and Empire not so much Others do exist   TPM is one of my highest ranked SW films while ESB is one of my lowest.   Beard Watch 2021 — Today at 5:34 PM Interesting finale. Probably the best ep of the series. Though it raises some questions about how.things should have gone during infinity war...     OUTRO [1:16:53]   We would love to hear back from you! Call the voicemail line at 1-844-THE-BUS1 or 844-843-2871.                    Join Legends Of S.H.I.E.L.D. next time as the hosts discuss the finale episode of What If…? You can listen in live when we record Thursday Evenings at 8:00 PM Eastern time at Geeks.live. Contact Info: Please see http://www.legendsofshield.com for all of our contact information or call our voicemail line at 1-844-THE-BUS1 or 844-843-2871   Legends Of S.H.I.E.L.D. Is a Proud Member Of The GonnaGeek Network (gonnageek.com).   This podcast was recorded on Thursday September 30th, 2021.   Standby for your S.H.I.E.L.D. debriefing ---   Audio and Video Production by Stargate Pioneer of GonnaGeek.com.

Tech Talk Radio Podcast
October 2, 2021 Tech Talk Radio Show

Tech Talk Radio Podcast

Play Episode Listen Later Oct 2, 2021 59:12


Checking for TPM 2.0 Chip (are you Windows 11 ready), installing programs on second hard drive, configuring mouse for left hander, installing Chrome RSS extension, jelly scrolling on iPad (what causes it), Profiles in IT (Morris Chang, founder of TSMC), evolution of the chip foundry business, and Beethovens Tenth Symphony completed with AI. This show originally aired on Saturday, October 2, 2021, at 9:00 AM EST on WFED (1500 AM).

Forge the Narrative - Warhammer 40k Podcast
FTN Episode 403 – Is Mid Range The Best Range?

Forge the Narrative - Warhammer 40k Podcast

Play Episode Listen Later Sep 25, 2021 65:42


We may see a whole new slugfest developing over the next couple of tournaments.  Two or three armies that can absolutely dominate the middle of the table have dropped and … Read More

The Personal Computer Radio Show
The Personal Computer Radio Show - 09.22.21

The Personal Computer Radio Show

Play Episode Listen Later Sep 22, 2021 56:00


" The Personal Computer Show Wednesday September 22nd 2021 PRN.fm Streaming On the Internet 6:00 PM Eastern Time IN THE NEWS o AMD PCs Affected by New CPU Driver Flaw o Amazon Permanently Ban 600 Chinese Brands o WhatsApp Moderators Can Read Your Messages o Apple Confirms Embarrassing MacBook Pro Design Problems o Microsoft Doubles Down on TPM 2.0 for Windows 11 o Microsoft Won't Support Windows 11 on M1 Macs IT Pro Series with Benjamin Rockwell o SSA and Govt Spying on Employees From the Tech Corner o Using a Portable Hotspot Internet Router as an Alternative Option OpEd by Benjamin Rockwell o Technology Detection of CoVid Could Be Freedom Thief "

Forge the Narrative - Warhammer 40k Podcast
FTN 402 – Culture Club Part 2 – Consequences of Choice!

Forge the Narrative - Warhammer 40k Podcast

Play Episode Listen Later Sep 21, 2021 56:04


Red is back for part two of our Culture Crafting discussion.  I know so few of us actually end up running events but I do think it’s worth talking about … Read More

TechLinked
The Pixel 6 could be FIRE

TechLinked

Play Episode Listen Later Sep 18, 2021 5:59


0:00 NOT AGAIN 0:08 Pixel 6 Tensor chip design 1:21 A Tale of Two PS5s 2:13 Wikipedia vs. China 3:00 iFixit Mahi driver kit 3:32 QUICK BITS 3:36 Windows 11 needs TPM in VMs 3:59 AMD down to make ARM chips 4:26 Facebook troll farms report 4:57 Google, Apple remove Navalny app 5:22 Project Taara laser internet News sources: https://lmg.gg/lpV84

Force Toast: A Star Wars Happy Hour
Ep 65: Ode to Video Stores

Force Toast: A Star Wars Happy Hour

Play Episode Listen Later Sep 15, 2021 73:26


Honest question: if clone commanders consume steroids to get bulky, do we think their junk still shrinks? In episode 65, hosts Alyce and Laura ponder* this question and more while they trim their beards, catch up on the latest in Star Wars news and discuss Star Wars: The High Republic!

The WAN Show Podcast
Apple WON... but also Lost - WAN Show September 10, 2021

The WAN Show Podcast

Play Episode Listen Later Sep 13, 2021 80:18


Try JumpCloud for free at https://cloud.jumpcloud.com/WANshow Help your IT team take care of support, maintenance, and security for Enterprise Linux systems with TuxCare at https://hubs.ly/H0WRkfb0 Try FreshBooks free, for 30 days, no credit card required at https://www.freshbooks.com/wan [0:00] Chapters. [1:20] Intro. [2:10] Topic #1: Apple VS Epic suit is FINALLY over. 6:26 Tim Sweeney's reaction. 9:37 Epic's developer Apple account. 11:02 Effects on the developers and consumers. [17:26] Topic #2: ProtonMail is not really private. 23:10 Changes and securing your mail. [25:30] Sponsors. 25:34 Jumpcloud Cloud Active Directory. 28:21 TuxCare Open Source Linux Support. 29:21 Freshbooks Accounting. [30:36] Topic #3: The Matrix Resurrections Trailer. 34:05 Linus criticizes the movie, genre & its' MMO. 40:51 PS Showcase & Star Wars remake. 43:12 Grand Theft Auto 5 Enhanced Edition delayed. [44:31] Topic #4: Facebook smart glasses. 46:02 Pricing and specs. 49:19 Better POV videos. 51:27 Comparing to Google Glass. [53:28] Topic #5: Valorant anti-cheat & TPM 2.0. [1:04:47] TechIngredient's thermal paste. [1:05:36] LTTstore new merch. [1:07:35] Superchats. [1:19:06] Wrapping up. [1:19:51] Outro.

Forge the Narrative - Warhammer 40k Podcast
FTN Episode 401 – Warhammer 40k vs. Magic The Gathering – Who Wins?!

Forge the Narrative - Warhammer 40k Podcast

Play Episode Listen Later Sep 11, 2021 81:23


The title is very click baity and I don’t mean that on purpose.  We’re joined by Pleasant Kenobi for a great segment in the middle of the show to talk … Read More

Security Now (MP3)
SN 835: TPM v1.2 vs 2.0 - BlueTooth Troubles, Internet Anonymity, Apple CSAM, Light Chaser

Security Now (MP3)

Play Episode Listen Later Sep 8, 2021 131:25


Picture of the Week. The Razor mouse & keyboard. The wishful phrase "Internet Anonymity" is an oxymoron. And speaking of Apple's client-side image matching... BlueTooth has new troubles. Attackers Can Remotely Disable Fortress Wi-Fi Home Security Alarms. Closing the Loop. "Light Chaser" by Peter F. Hamilton and Gareth L. Powell. TPM v1.2 vs 2.0. We invite you to read our show notes at https://www.grc.com/sn/SN-835-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: itpro.tv/securitynow promo code SN30 CrowdStrike.com/twit Bitwarden.com/twit

Security Now (Video LO)
SN 835: TPM v1.2 vs 2.0 - BlueTooth Troubles, Internet Anonymity, Apple CSAM, Light Chaser

Security Now (Video LO)

Play Episode Listen Later Sep 8, 2021 131:25


Picture of the Week. The Razor mouse & keyboard. The wishful phrase "Internet Anonymity" is an oxymoron. And speaking of Apple's client-side image matching... BlueTooth has new troubles. Attackers Can Remotely Disable Fortress Wi-Fi Home Security Alarms. Closing the Loop. "Light Chaser" by Peter F. Hamilton and Gareth L. Powell. TPM v1.2 vs 2.0. We invite you to read our show notes at https://www.grc.com/sn/SN-835-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: itpro.tv/securitynow promo code SN30 CrowdStrike.com/twit Bitwarden.com/twit

Security Now (Video HI)
SN 835: TPM v1.2 vs 2.0 - BlueTooth Troubles, Internet Anonymity, Apple CSAM, Light Chaser

Security Now (Video HI)

Play Episode Listen Later Sep 8, 2021 131:25


Picture of the Week. The Razor mouse & keyboard. The wishful phrase "Internet Anonymity" is an oxymoron. And speaking of Apple's client-side image matching... BlueTooth has new troubles. Attackers Can Remotely Disable Fortress Wi-Fi Home Security Alarms. Closing the Loop. "Light Chaser" by Peter F. Hamilton and Gareth L. Powell. TPM v1.2 vs 2.0. We invite you to read our show notes at https://www.grc.com/sn/SN-835-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: itpro.tv/securitynow promo code SN30 CrowdStrike.com/twit Bitwarden.com/twit

Security Now (Video HD)
SN 835: TPM v1.2 vs 2.0 - BlueTooth Troubles, Internet Anonymity, Apple CSAM, Light Chaser

Security Now (Video HD)

Play Episode Listen Later Sep 8, 2021 131:25


Picture of the Week. The Razor mouse & keyboard. The wishful phrase "Internet Anonymity" is an oxymoron. And speaking of Apple's client-side image matching... BlueTooth has new troubles. Attackers Can Remotely Disable Fortress Wi-Fi Home Security Alarms. Closing the Loop. "Light Chaser" by Peter F. Hamilton and Gareth L. Powell. TPM v1.2 vs 2.0. We invite you to read our show notes at https://www.grc.com/sn/SN-835-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: itpro.tv/securitynow promo code SN30 CrowdStrike.com/twit Bitwarden.com/twit

All TWiT.tv Shows (MP3)
Security Now 835: TPM v1.2 vs 2.0

All TWiT.tv Shows (MP3)

Play Episode Listen Later Sep 8, 2021 131:25


Picture of the Week. The Razor mouse & keyboard. The wishful phrase "Internet Anonymity" is an oxymoron. And speaking of Apple's client-side image matching... BlueTooth has new troubles. Attackers Can Remotely Disable Fortress Wi-Fi Home Security Alarms. Closing the Loop. "Light Chaser" by Peter F. Hamilton and Gareth L. Powell. TPM v1.2 vs 2.0. We invite you to read our show notes at https://www.grc.com/sn/SN-835-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: itpro.tv/securitynow promo code SN30 CrowdStrike.com/twit Bitwarden.com/twit

Radio Leo (Audio)
Security Now 835: TPM v1.2 vs 2.0

Radio Leo (Audio)

Play Episode Listen Later Sep 8, 2021 131:25


Picture of the Week. The Razor mouse & keyboard. The wishful phrase "Internet Anonymity" is an oxymoron. And speaking of Apple's client-side image matching... BlueTooth has new troubles. Attackers Can Remotely Disable Fortress Wi-Fi Home Security Alarms. Closing the Loop. "Light Chaser" by Peter F. Hamilton and Gareth L. Powell. TPM v1.2 vs 2.0. We invite you to read our show notes at https://www.grc.com/sn/SN-835-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: itpro.tv/securitynow promo code SN30 CrowdStrike.com/twit Bitwarden.com/twit

TechLinked
AMD still loves us

TechLinked

Play Episode Listen Later Sep 7, 2021 6:32


0:00 I'm so sorry 0:08 Radeon RX 6600 incoming 1:00 Valorant requiring TPM on Win11 2:07 Wacky cars at IAA Mobility 2021 3:09 Honey 3:41 QUICK BITS 3:49 Alder Lake in November 4:19 No Android apps on Xbox 4:47 FF7 Remake on PC? 5:17 IBM Telum processor 5:46 Banksy NFT scam News sources: https://linustechtips.com/topic/1371279-amd-still-loves-us-%F0%9F%98%8A-sept-6-2021/

mixxio — podcast diario de tecnología
Sé lo que hicisteis el último verano

mixxio — podcast diario de tecnología

Play Episode Listen Later Sep 6, 2021 28:04


He vuelto. Tras un verano muy tumultuoso a nivel tecnológico, se me ha hecho hasta complicado no escribir algunas ideas sobre los acontecimientos demenciales que estaban ocurriendo delante de mis ojos. Me he mordido mucho la lengua incluso. Os cuento rápidamente lo que ha pasado. Apple retrasa su controvertido plan de identificación de contenido multimedia. La compañía anunció el viernes que no activarán de momento las nuevas medidas https://www.applesfera.com/apple-1/apple-retrasa-lanzamiento-medidas-anti-abuso-infantil-haremos-mejoras. Tras las quejas de asociaciones de expertos en ciberseguridad https://9to5mac.com/2021/08/06/comment-apples-child-protection-measures-get-mixed-reactions-from-experts/, gobiernos https://appleinsider.com/articles/21/08/17/germany-writes-to-tim-cook-to-reconsider-csam-plans y usuarios.  Ha sido un verano complejo para Apple. En Cupertino contaremos todo ../../../cupertino. Ojo a las quejas internas de sus empleados https://www.theverge.com/22648265/apple-employee-privacy-icloud-id, y al Ministerio de Trabajo de EE.UU. que ha iniciado una investigación preliminar https://archive.ph/2Eylq para evaluar la situación.  Corea del Sur aprobó la ley que prohíbe las limitaciones de pagos en los smartphones. Google y Apple serán las principales afectadas. Quedan muchos detalles sobre la implementación, pero los usuarios coreanos podrán realizar los micropagos en juegos y aplicaciones a través de métodos alternativos https://www.france24.com/es/minuto-a-minuto/20210831-corea-del-sur-espera-prohibir-monopolios-de-pago-en-aplicaciones como PayPal, Stripe, criptomonedas, etc. si los desarrolladores los añaden.  Excel sigue fastidiando artículos científicos sobre genética. Un nuevo estudio encuentra que aumentan las investigaciones https://www.nature.com/articles/d41586-021-02211-4 cuyos datos genéticos han sido modificados por Excel al interpretar el nombre de genes por el de fechas, y cambiar el valor de la celda. — Aquí un vídeo corto explicando el fallo https://www.youtube.com/watch?v=SppKiKIdCkI.  El identificador de una septina como SEPT1 lo identifica como primero de septiembre del año actual. — El problema es conocido desde hace años, y la comunidad científica ha cambiado el nombre a algunos identificadores https://www.genenames.org/news/newsletters/2017/05/10/HGNC-Newsletter-Spring-2017/, y creado sistemas que permiten corregir los datos modificados.  ¿Hemos superado la peor parte de la falta de componentes electrónicos? Aunque cada industria va a un ritmo diferente, y seguimos viendo cierres de fábricas y retrasos de productos, nos encontramos con una luz al final del túnel: la memoria RAM ya está bajando de precio https://www.trendforce.com/presscenter/news/20210810-10890.html. — De hecho ahora mismo hay exceso de producción y en los almacenes.  China supera los 1.000 millones de internautas. El primer país en lograr superar esta cifra tras añadir 21 millones más de ciudadanos conectados en los últimos seis meses para sumar 1.011 millones en concreto https://www.dw.com/es/china-alcanza-los-1000-millones-de-usuarios-de-internet/a-59000150. El 71,6% del total. — El récord llega en un marco cada vez más segmentado de Internet entre China y el resto del mundo.  Un fondo de capital compra La Casa de las Carcasas por 100 millones de euros. ProA Capital se hace con la mayoría de las participaciones https://www.eleconomista.es/empresas-finanzas/noticias/11378968/09/21/ProA-Capital-compra-La-Casa-de-las-Carcasas-por-mas-de-100-millones.html de la cadena de venta minorista de fundas y accesorios para móviles y tabletas, con 260 tiendas que desde hace poco han llegado también a Portugal e Italia.  Ikea lanzó un purificador de aire conectado en forma de mesilla. Se llama STARKVIND, cuesta 150 euros https://www.elmueble.com/menaje/ikea-purificador-aire-forma-mesa_47769 y lo puedes controlar a través de la aplicación de IKEA para smartphones o también desde los principales asistentes virtuales. — Se une así a FÖRNUFTIG, el purificador con forma de panel https://www.ikea.com/es/es/p/fornuftig-purificador-aire-negro-10488062/ que venden por 60 euros.  MasterCard será el primer operador de tarjetas que eliminará las bandas magnéticas. Aún son prevalentes en muchos países estos métodos inseguros de pago. La empresa de pagos dice que no será obligatorio a partir de 2024 https://www.mastercard.com/news/perspectives/2021/magnetic-stripe/ en la mayoría de países, y que desaparecerán de nuestras carteras en 2033. — Muy tarde. Me da a mí que para 2033 no existirán ni tarjetas físicas en algún que otro país. Windows 11  El nuevo sistema operativo se lanzará el 5 de octubre. Será una actualización gratuita https://www.genbeta.com/windows/windows-11-se-lanzara-gratis-5-octubre-llegara-su-gran-promesa-soporte-aplicaciones-android para todos los usuarios actuales que cumplan con los requisitos técnicos que, por cierto, Microsoft ha relajado ligeramente.  La webcam será obligatoria para los portátiles con Windows 11. A partir de 2023, ningún fabricante podrá licenciar Windows 11 para nuevos portátiles, tabletas, 2-en-1, etc. si no tiene cámara delantera https://news.softpedia.com/news/microsoft-makes-webcams-mandatory-on-windows-11-pcs-533343.shtml. La trasera será opcional. Quedan fuera de la futura norma los ordenadores de escritorio, así que el impacto será mínimo.  Se podrá instalar Windows 11 en ordenadores que oficialmente no lo soporten. Si te descargas una ISO, la cargas en un USB o DVD, el sistema operativo solo revisará los requisitos mínimos https://www.genbeta.com/windows/microsoft-permitira-instalar-windows-11-pcs-que-no-cumplan-requisitos-minimos-tu-propio-riesgo-asi-funcionara: 64 GB de espacio, 4 GB de RAM, una CPU de doble núcleo a 1 Ghz y TPM 2.0. — Pero Microsoft no garantiza actualizaciones, funcionalidades ni compatibilidad si no cumplen con los requisitos recomendados. Yo no lo haría.  La beta actual de Windows 11 estuvo rota por un bug en el sistema de publicidad. Un síntoma de la lamentable época en la que vivimos, una reciente actualización de Windows 11 impedía el uso del menú de inicio y el gestor de tareas por un bug en las librerías internas https://www.xda-developers.com/microsoft-breaks-windows-11-by-injecting-ads/ que animaban a los usuarios a probar Microsoft Teams. Xiaomi  Xiaomi hace oficial sus planes para coches eléctricos. Han creado una nueva empresa subsidiaria, Xiaomi Automobile, que estará dirigida por el propio CEO de Xiaomi y que ya cuenta con más de 300 empleados https://www.hibridosyelectricos.com/articulo/actualidad/gigante-telefonia-xiaomi-fabricara-coches-electricos-xiaomi-automobile/20210902090008048761.html. — Quieren iniciar la producción de su primer modelo en 2022, y prometen invertir más de 10.000 millones de dólares en los próximos años.  Anunciaron un perro robótico programable: CyberDog. Con múltiples cámaras, sensores y servomotores de movimiento, este robot cuadrúpedo https://cincodias.elpais.com/cincodias/2021/08/11/lifestyle/1628695377_962388.html con corazón NVIDIA podrá transportar hasta 3 Kg de peso, costará unos 1.300 euros. — Su fabricación estará limitada de momento a unas mil unidades. Facebook  Menos contenido político cuando entres en Facebook. Los usuarios de Facebook en España, Suecia, y un par de países más verán menos contenido político https://about.fb.com/news/2021/02/reducing-political-content-in-news-feed/ que la red social identifica que recibirán muchos comentarios negativos en el futuro. Lo han probado en otros países estos meses y dicen que ha funcionado bien, pero sin detalles.  Los que seguís este boletín ya sabéis que llevamos años pidiendo algo parecido. Me gustaría un ajuste que "silenciase" todo de golpe, pero algo es algo.  Descubren cómo recuperar una cuenta hackeada de Facebook: comprar una Oculus Quest. Por 300 euros, el casco de realidad virtual ofrece muchas cosas, entre ellas un servicio de atención al cliente con humanos que desbloquearán la cuenta de Facebook https://www.npr.org/2021/08/02/1023801277/your-facebook-account-was-hacked-getting-help-may-take-weeks-or-299 que quieras asociar. Útil para aquellos frustrados con el inexistente soporte de Facebook. Afganistán  ¿Cómo afectará la tecnología al régimen Talibán? Han vuelto al poder taras 20 años, pero el mundo ha cambiado muchísimo. Las AK-47 no son suficientes. Necesitan el control de las redes. De momento se quejan de que Facebook les censura https://theintercept.com/2021/08/17/taliban-spokesman-accuses-facebook-stifling-free-speech-banning-group/. Twitter dice que hasta que no infrinjan sus normas https://www.washingtonpost.com/technology/2021/08/20/taliban-internet-websites-twitter-facebook/ seguirán activos.  En mi opinión harían bien en mantener su presencia, aunque sea oficial, limitada o prohibida. — De momento algunas de las webs oficiales se han quedado sin hosting https://www.washingtonpost.com/technology/2021/08/20/taliban-internet-websites-twitter-facebook/.  El grupo Taliban dio un golpe de estado en Afganistán que tendrá graves repercusiones tecnológicas dentro del país, y otras no menos interesantes fuera de las fronteras: ¿qué pasará con la bandera en formato emoji? https://blog.emojipedia.org/what-about-the-afghanistan-flag-emoji/ ¿Legitimarán al nuevo régimen las plataformas tecnológicas al cambiarla? Cadenas de bloques  Las criptomonedas tendrán una situación compleja en Afganistán. Por un lado pueden ayudar a aquellos de los millones de refugiados que, con los bancos colapsados, han podido mover su dinero sin problema https://www-cnbc-com.cdn.ampproject.org/c/s/www.cnbc.com/amp/2021/08/21/bitcoin-afghanistan-cryptocurrency-taliban-capital-flight.html. Por otro lado, los propios Taliban las pueden usar para sus actividades terroristas. — Expertos piensan que serán importantes en ambos bandos https://es.cointelegraph.com/news/cardano-founder-says-crypto-will-be-vital-to-afghani-fight-against-taliban del conflicto.  Britney Spears usó Bitcoin desde 2014 para saltarse la tutela legal. Aunque la fuente de la noticia es desconocida https://twitter.com/heidiwood_/status/1427660666786156550, afirman que la cantante pudo aprovechar este tipo de pagos https://www.criptonoticias.com/comunidad/entretenimiento/britney-spears-uso-bitcoin-esconder-compras-tutores-2014/ para evadir los controles bancarios que su padre ejerce bajo orden judicial. Transporte  200 años de la invención del motor eléctrico. El 3 de septiembre de 1821, el británico Michael Faraday observó cómo un cable con carga eléctrica rotaba constantemente al acercarlo a los polos https://spectrum.ieee.org/200-years-ago-faraday-invented-the-electric-motor de un imán. Aquí un vídeo de su experimento replicado https://www.youtube.com/watch?v=8LTP49d7KF8. — Diez años más tarde consiguió hacer lo contrario al inventar la dinamo: crear electricidad girando unos imanes.  Inventor de un helicóptero casero muere durante una prueba de vuelo. El indio Shaikh Ismail, de 29 años, murió al ser golpeado por alguna pieza del rotor trasero https://indianexpress.com/article/india/man-dies-as-blade-of-helicopter-he-was-building-breaks-off-hits-head-7449608/ que se desconectó. Llevaba dos años creando el helicóptero, usando un motor de coche y piezas sueltas, y había alcanzado algo de fama en su país natal.  Como me lo vais a pedir, aquí está el vídeo https://www.youtube.com/watch?v=NGtcQSRbrbQ del trágico momento, grabado por sus ayudantes.  Se acaba el combustible con plomo añadido en todo el mundo. Las gasolineras de Argelia abandonan la gasolina con plomo https://www.lavanguardia.com/natural/contaminacion/20210830/7688776/adios-gasolina-plomo-gran-amenaza-salud.html. El último país del mundo en dar el paso. El plomo respirado causaba enfermedades mentales, y también fisiológicas, acarreando más de un millón de muertes prematuras al año.  Diferentes estudios científicos encontraron una relación entre el plomo en el aire y los niveles de crimen https://www.motherjones.com/environment/2016/02/lead-exposure-gasoline-crime-increase-children-health/, el cociente intelectual de la población, etc.  Volkswagen ofrece sus coches eléctricos bajo suscripción "todo incluido". No se diferencia mucho de los tradicionales sistemas de "renting" aunque por periodos más cortos de lo tradicional como 3 ó 6 meses. Un Volkswagen ID3 o ID4 desde 500 euros al mes https://forococheselectricos.com/2021/09/volkswagen-autoabo-id3-id4-renting-tres-meses.html para la versión más básica.  Por cierto dicen que este mes mostrarán el ID2 https://forococheselectricos.com/2021/08/volkswagen-prototipo-suv-electrico-id-2-septiembre.html, la versión "barata". No esperéis nada espectacular. Decisiones judiciales  Australia del Sur implementa una de las normas de cuarentena domiciliaria más duras. Todos los viajeros que lleguen al estado Australiano deberán permanecer en sus casas durante 14 días para evitar posibles contagios de COVID. Deberán tener instalada una app que rastrea sus movimientos https://www.abc.net.au/news/2021-08-23/how-will-south-australias-home-quarantine-trial-work/100398878 y contestar a llamadas aleatorias en menos de 15 minutos a lo largo de ese periodo.  La medida hablar de "reconocimiento facial", básicamente para evitar que responda por ti un familiar supongo. Pero es una prueba menor, de unas 50 personas.  Un juez español rechaza el derecho al olvido del sumario del caso del poeta Miguel Hernández. Tras la Guerra Civil española el poeta fue condenado a muerte. El hijo de uno de los secretarios judiciales quiere borrar el nombre de su padre de esa parte de la historia. El juez del caso desestima el derecho al olvido https://www.eldiario.es/comunitat-valenciana/juez-refrenda-negativa-universidad-alicante-eliminar-internet-nombre-secretario-juzgado-proceso-poeta-miguel-hernandez_1_8267577.html primando el interés público y científico.  Un juez estadounidense bloquea patentes registradas por un algoritmo. Aunque hablan de inteligencia artificial, nada más lejos de la realidad del caso en cuestión. Un investigador intentó registrar una patente a nombre de un sistema llamado "DABUS". El juez lo bloquea https://hipertextual.com/2021/09/inteligencia-artificial-patentes-estados-unidos porque debe ser un ciudadano real. — El mismo señor está intentándolo en otros países https://hipertextual.com/2021/08/si-una-inteligencia-artificial-crea-algo-puede-patentarlo-a-su-nombre-en-algunos-paises-ya-lo-permiten.  Esto no es un caso de si "el algoritmo suficientemente listo, creativo o no". Es básicamente activismo. Nada impide que un sistema informático cree mil inventos y un humano los registre. Me he dejado algunas noticias francamente importantes sin publicar. Tenía apuntadas 150 pestañas para resumir. Iré dando contexto los próximos días, tanto en el podcast diario ../../../mixxio como en Cupertino ../../../cupertino y ELON ../../../elon. Cómo habréis visto no hay patrocinador https://mixx.io/nuestros-patrocinadores/ esta semana por un descontrol de última hora, pero está casi todo lleno para lo que queda de año. Os animo a todos los que queráis saber más sobre el patrocinio a hablar conmigo https://mixx.io/nuestros-patrocinadores/. Muchas gracias a todos los que habéis esperado este mes. Muchas gracias en espacial a los colaboradores en Patreon y Ko-Fi https://mixx.io/colaboradores/.

Forge the Narrative - Warhammer 40k Podcast
FTN Episode 400 – How To Craft The Culture of Warhammer Events

Forge the Narrative - Warhammer 40k Podcast

Play Episode Listen Later Sep 5, 2021 63:33


Are you looking to start hosting Warhammer Tournaments or Events?  Are you looking for tips on how to make these more fun for your participants or expand the groups that … Read More

Forge the Narrative - Warhammer 40k Podcast
FTN Episode 399 – Warhammer+ and Thousand Sons Army Lists – Are they Good?

Forge the Narrative - Warhammer 40k Podcast

Play Episode Listen Later Aug 27, 2021 55:37


This week we had the fist opportunity to subscribe to Warhammer+ and I jumped in both feet first.  In this episode we also chat about a 1k Sons army list … Read More