POPULARITY
Welcome to Episode 238 of the Upland Property Experts Podcast!
Pumped Up Parenting | The Best Advice that NO ONE ELSE GIVES YOU about Raising Kids in Today's World
What if the key to achieving your biggest goals lies not in pushing harder, but in embracing calm amidst the climb? In this transformative session from the 2025 International Day of Calm Summit, Daniel Diaz—internationally recognized performance coach, endurance athlete, and founder of Peak Life Now and UPX—challenges the conventional belief that peace and progress are mutually exclusive.In his talk, “The Calm Within the Climb,” Daniel introduces his philosophy of the Holy Trinity of Flow: discipline, intuition, and self-compassion. Drawing from his own journey of overcoming personal adversity and guiding high-achieving individuals, he shares actionable strategies to help you stay grounded and centered while pursuing your ambitions.Discover how to rewire your inner dialogue, anchor into unshakable self-belief, and operate from a place of presence rather than pressure. Whether you're an entrepreneur, leader, or growth-driven individual, Daniel's insights will empower you to unlock your next level of performance without sacrificing well-being.Connect with Daniel Diaz:Website: iamdanieldiaz.com Instagram: @peaklifenowLinkedIn: Daniel Diaz*******************************************************Are you ready to STOP YELLING AT YOUR CHILD in just 21 Days? Join my newest program at low introductory pricing... go to QUITYELLING.COM1. Need more help? Let's grab some coffee or tea and talk. Go to TalkWithCelia.com and choose the time that works for you.2. Looking for a manual for parenting your child (now in English & Spanish)? It's finally here and you can grab your copy of my latest parenting & children's books today!3. Become a Member of my TRANQUILITY TRIBE and STOP YELLING Once & For All.4. Read my latest article to find out how to stop yelling... https://celiaArticle.com5. Looking to be part of a fun free and informative FB community (without all the bitching)?... join us in Pumped Up Parenting6. Love YouTube? Do you know there are lots of parenting videos, story time videos for you and your kids, as well as some great family workout videos? All on Pumped Up Parenting with Celia Kibler7. Follow me on Instagram and TikTok8. Join me on my newest platform PEANUT: Connecting women across fertility & motherhood9. Get my parenting worksheet and other resources at PumpedUpParenting.Etsy.com10. Join us on THE INTERNATIONAL DAY OF CALM, watch the full replay on our YouTube Channel @DayofCalmTake the Pledge, Support our Mission of the Day of Calm Foundation to SOOTHE THE ANGER & RAGE AT THE HUMAN CORE as we work to end senseless violence against our kids.Support our school in Uganda, Share the Day, Attend a Calm Class or Parenting Class and feel great!
In this power-packed episode, Lisa G. sits down with Vince Menzione—founder of Ultimate Partner and a seasoned expert in strategic tech alliances—to break down how companies can unlock explosive growth through successful partnering in today's rapidly shifting tech landscape.
From Bill Gates to Mark Zuckerberg, billionaires with no education expertise keep using their big names and big dollars to hype LLMs for classrooms. Promising ‘comprehensive AI tutors', or just ‘educator-informed' tools to address understaffed classrooms, this hype is just another round of Silicon Valley pointing to real problems -- under-supported school systems -- but then directing attention and resources to their favorite toys. Former educator and DAIR research fellow Adrienne Williams joins to explain the problems this tech-solutionist redirection fails to solve, and the new ones it creates.Adrienne Williams started organizing in 2018 while working as a junior high teacher for a tech owned charter school. She expanded her organizing in 2020 after her work as an Amazon delivery driver, where many of the same issues she saw in charter schools were also in evidence. Adrienne is a Public Voices Fellow on Technology in the Public Interest with The OpEd Project in partnership with the MacArthur Foundation, as well as a Research Fellow at both (DAIR) and Just Tech.References:Funding Helps Teachers Build AI ToolsSal Khan's 2023 Ted Talk: AI in the classroom can transform educationBill Gates: My trip to the frontier of AI educationBackground: Cory Booker Hates Public SchoolsBackground: Cory Booker's track record on educationBook: Access is Capture: How Edtech Reproduces Racial InequalityBook: Disruptive Fixation: School Reform and the Pitfalls of Techno-IdealismPreviously on MAIHT3K: Episode 26, Universities Anxiously Buy Into the Hype (feat. Chris Gilliard)Episode 17: Back to School with AI Hype in Education (feat. Haley Lepp)Fresh AI Hell:"Streamlining" teachingGoogle, Microsoft and Perplexity are promoting scientific racism in 'AI overviews''Whisper' medical transcription tool used in hospitals is making things upX's AI bot can't tell the difference between a bad game and vandalismPrompting is not a substitute for probability measurements in large language modelsYet another 'priestbot'Self-driving wheelchairs at Seattle-Tacoma International AirpotYou can check out future livestreams at https://twitch.tv/DAIR_Institute.Subscribe to our newsletter via Buttondown. Follow us!Emily Twitter: https://twitter.com/EmilyMBender Mastodon: https://dair-community.social/@EmilyMBender Bluesky: https://bsky.app/profile/emilymbender.bsky.social Alex Twitter: https://twitter.com/@alexhanna Mastodon: https://dair-community.social/@alex Bluesky: https://bsky.app/profile/alexhanna.bsky.social Music by Toby Menon.Artwork by Naomi Pleasure-Park. Production by Christie Taylor.
In today's episode, we discuss the arrest of the alleged ringleader of Scattered Spider, implicated in data breaches affecting Twilio, LastPass, and DoorDash (https://krebsonsecurity.com/2024/06/alleged-boss-of-scattered-spider-hacking-group-arrested/). We also explore a novel Linux malware, DISGOMOJI, that uses emojis for command execution via Discord (https://www.bleepingcomputer.com/news/security/new-linux-malware-is-controlled-through-emojis-sent-from-discord/). Finally, we cover Microsoft's upcoming security enhancements for Outlook, including the move to modern authentication (https://techcommunity.microsoft.com/t5/outlook-blog/keeping-our-outlook-personal-email-users-safe-reinforcing-our/ba-p/4164184). Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/ Logo Design by https://www.zackgraber.com/ Tags Scattered Spider, Twilio, LastPass, DoorDash, UK hacker, cyber-espionage, Volexity, DISGOMOJI, Discord, emojis, Microsoft, Outlook, authentication, security, Bitcoin, major corporations, hacking tactics, cybersecurity. Search Phrases How Scattered Spider hacked Twilio Breach of LastPass by Scattered Spider Capture of UK hacker behind Scattered Spider Methods used in Twilio hacking DISGOMOJI malware and its impact Scattered Spider group's tactics Cybersecurity in Discord using emojis Transition to modern authentication in Microsoft Outlook Protecting against DISGOMOJI malware Twilio and other major corporations' security breaches Alleged Boss of ‘Scattered Spider' Hacking Group Arrested https://krebsonsecurity.com/2024/06/alleged-boss-of-scattered-spider-hacking-group-arrested/ ---`### Flash Briefing: Alleged Boss of ‘Scattered Spider' Hacking Group Arrested Key Information: Spanish police arrested a 22-year-old UK man, Tyler Buchanan, in Palma de Mallorca. Buchanan allegedly leads Scattered Spider, a cybercrime group behind hacks on Twilio, LastPass, DoorDash, and more. Engagement: How does this arrest impact the cybersecurity landscape for companies frequently targeted by such groups? Actionable Insight: Buchanan allegedly controlled Bitcoins worth $27 million, highlighting the financial scale of cybercrime. Engagement: What measures can organizations take to protect against such high-stakes cyber threats? SIM-Swapping: Buchanan, alias "Tyler," is known for SIM-swapping attacks, transferring victims' phone numbers to intercept authentication codes. Engagement: Have you implemented safeguards like multi-factor authentication that don't rely on SMS? Scattered Spider's Tactics: The group uses social engineering to phish for credentials, often via SMS messages mimicking Okta authentication pages. Engagement: Could your organization's employees recognize a sophisticated phishing attempt? Notable Breaches: Scattered Spider's campaigns led to breaches at companies like Signal, Mailchimp, and LastPass, showcasing the importance of robust security practices. Engagement: What steps has your organization taken to ensure the security of its authentication processes? Internal Network Access: The group's attacks typically begin with social engineering, tricking individuals into revealing credentials that allow network access. Engagement: Are your employees trained to identify and report phishing attempts? Physical Repercussions: The cybercrime community often resorts to physical violence to settle disputes, including home invasions and other assaults. Engagement: How does the threat of physical violence alter your perception of cybersecurity risks? Recent Arrests: In January 2024, authorities arrested another Scattered Spider member, Noah Michael Urban, linked to significant financial thefts. Engagement: Does knowing the legal consequences deter potential cybercriminals, or is the allure of high rewards too strong? SIM-Swapping Leaderboard: Telegram channels maintain leaderboards ranking SIM-swappers by their conquests, showing the competitive nature of these groups. Engagement: What do you think motivates individuals to climb these illicit leaderboards? Concluding Note: Buchanan's arrest marks a significant win for cyber law enforcement, but the persistence of such groups calls for constant vigilance and improved security measures. Engagement: What are the most effective strategies your organization has implemented to stay ahead of cyber threats? New Linux malware is controlled through emojis sent from Discord https://www.bleepingcomputer.com/news/security/new-linux-malware-is-controlled-through-emojis-sent-from-discord/ ---`Flash Briefing: New Linux Malware 'DISGOMOJI' Innovative Command Control: Cybersecurity firm Volexity has discovered 'DISGOMOJI,' a Linux malware using emojis sent via Discord for command and control (C2), targeting Indian government agencies. (Source: Volexity, June 15, 2024) Espionage Campaign Origins: Volexity links DISGOMOJI to a Pakistan-based threat actor, UTA0137, known for espionage activities. They assess with high confidence that UTA0137 aims to infiltrate government entities in India. (Source: Volexity) Functionality and Tactics: Similar to other backdoors, DISGOMOJI can execute commands, take screenshots, steal files, and deploy additional payloads. Its emoji-based C2 system allows it to bypass security software focused on text-based commands. (Source: Volexity) Detection Method: Volexity discovered the malware via a UPX-packed ELF executable in a ZIP archive, likely distributed through phishing emails, targeting the custom Linux distribution BOSS used by Indian government agencies. (Source: Volexity) Operational Mechanics: DISGOMOJI exfiltrates system information and listens for new emoji-based commands on a Discord server, using a reaction-based protocol to confirm command execution. (Source: Volexity) Persistence and Spread: The malware maintains persistence using the @reboot cron command and other mechanisms like XDG autostart entries. It also steals data via USB drives and attempts lateral movement to gather more credentials. (Source: Volexity) Security Implications: The use of emojis for commands could make DISGOMOJI harder to detect, presenting a unique challenge for cybersecurity defenses. Mid/entry-level professionals should focus on strengthening phishing defenses and monitoring unusual Discord traffic. (Source: Volexity) Microsoft: New Outlook security changes coming to personal accounts https://techcommunity.microsoft.com/t5/outlook-blog/keeping-our-outlook-personal-email-users-safe-reinforcing-our/ba-p/4164184 ---`- Modern Authentication Requirement: Microsoft plans to phase out Basic Authentication (username and password) for Outlook personal accounts by September 16, 2024. This change impacts Outlook.com, Hotmail.com, and Live.com accounts, requiring users to switch to token-based authentication backed by multi-factor authentication (MFA). This strengthens security as Basic Authentication is vulnerable to credential capture and misuse. [Source: Microsoft] End of Support for Old Apps: Microsoft will no longer support the 'Mail' and 'Calendar' apps on Windows after December 31, 2024. Users should migrate to the new Outlook for Windows, which provides enhanced security features. A migration toggle will be added to the existing apps to facilitate this transition. [Source: Microsoft] Listener Feedback: Have you started migrating to the new Outlook for Windows? Let us know your experience! Deprecation of Outlook Light: The 'light' version of the Outlook Web App will reach the end of support on August 19, 2024. This version, intended for older web browsers, is being retired due to its degraded experience and lower security standards. [Source: Microsoft] Engagement Prompt: If you're still using Outlook Light, what are your plans for transitioning to a more secure email client? Gmail Access via Outlook.com: Starting June 30, 2024, users will no longer be able to access Gmail accounts through Outlook.com. However, standalone Outlook clients for Windows and Mac will continue to support this functionality. [Source: Microsoft] Discussion Point: How will this change affect your workflow if you use Gmail with Outlook.com? Join the conversation on our LinkedIn group. Cortana Deprecation Impact: The deprecation of Cortana means that 'Play My Emails' and 'Voice Search' features on Outlook mobile will be removed at the end of this month. [Source: Microsoft]
In this weeks episode, Eric, Malcolm and James Wells from LNS Research discuss Unified Performance Excellence. Unified Performance Excellence (UPX), is a modern approach to industrial performance management that integrates advanced digital tools and methodologies into traditional operational improvement processes. This framework seeks to enhance operational agility, flexibility, and resiliency by leveraging digital technologies like AI, machine learning, and digital twins within a connected and intelligent risk management system. At the 2024 Connected Workforce Summit presented by L2L, James will be a guest speaker talking about how UPX represents a significant shift towards integrating industrial operations with digital transformation initiatives, aiming to not only sustain but enhance operational performance through intelligent, data-driven methodologiesl2l.comYoutube: @leading2lean
We talked to Laurie Wired (X/Twitter, YouTube, Github) about malware reverse engineering, making youtube videos, and more! Check out her excellent series on Reverse Engineering 101 as well as her many Conference Talks. Here are links to some other topics we covered: Serial Experiments Lain EIEIO instruction Java Native Interface (JNI) .ipa file Virustotal MalwareBazaar RetroBar for Windows https://alula.github.io/SpaceCadetPinball/ Neon White game vx underground trivia Operation Triangulation and Video Presentation “What You Get When Attack iPhones of Researchers” Dalvik Executable Format (.dex) UPX packer Apk file Neon Genesis Evangelion XcodeGhost https://frida.re/ https://github.com/Ch0pin/medusa Have comments or suggestions for us? Find us on twitter @unnamed_show, or email us at show@unnamedre.com. Music by TeknoAxe (http://www.youtube.com/user/teknoaxe)
Sign up for Upland using this referral code discover.upland.me/UPX-Podcast. Earn of 50% bonus on your first deposit up to $100.
Today we have a special guest, Smuckuss, the second overall treasure hunter in the Upland Metaverse, who has claimed an impressive 3,000 treasures so far! We'll be diving deep into the Upland Metaverse with Smuckuss, exploring their treasure hunting journey and learning about their strategy.But that's not all, folks! We've got your hosts, 2Stupid2Win and ThankMeLater, here to keep you updated on all the latest happenings in the Upland community. They'll be analyzing the secondary market, discussing Spark Week, and talking about the latest rising stars challenge. And of course, we can't forget about Chokes for Charity, where if we raise $25,000 for Tap Out Cancer, The Hyde Park Ninjas will choke out ThankMeLater!In addition, we'll be hearing from the Upland Racing League about their week 1 updates and week 2 in Portage Park, sponsored by the UPX podcast. And we have the Playa Del Ray community represented by CEllis and BC4FUn, who will tell us why they are the #1 rated neighborhood in the Upland Metaverse and share their weekly giveaways.But hold on, folks, there's some drama on the horizon! On this episode, 2Stupid2Win and ThankMeLater get into a heated debate about the recent city releases. London and Birmingham have just been released, and 2Stupid2Win is confused about which city is which. They also disagree on the number of properties that should be released. 2Stupid2Win believes there should be more, given that it's the first Tier 1 international city, but ThankMeLater thinks that the current number is perfect for selling out the new city quickly.So, what are you waiting for? Grab a drink and join us for another exciting episode of The Upland Property Xperts PodcastThe UPX Podcast is the ORIGINAL and #1 spot for news, strategy, non-financial advice, and more in Upland. Join 2Stupid2Win, ThankMeLater, TDavis, and BDag as they discuss the current events, strategies, and community of the metaverse known as Upland.Sign up for Upland using this referral code discover.upland.me/UPX-Podcast. Earn of 50% bonus on your first deposit up to $100.Follow us on Twitter www.twitter.com/upxpodcastSHOW DISCLAIMER: The views, information, and opinions expressed on The Upland Property Xperts (UPX) Podcast are solely those of 2Stupid2Win, TML, and any guests of the podcast and do not necessarily represent/reflect those of UplandMe Inc. We are not employed by, or provided insider information from the UplandMe Inc. Nor are we financial/investment advisors. All discussion about properties, types of properties, or any other NFTs in Upland to buy or sell is not financial advice. Please do your own research first. We do not guarantee any particular outcome from participating in Upland. There is potential for loss from participating in the purchase, sale, or investing in Upland and their metaverse.
Ladies and gentlemen, welcome to another episode of the Upland Property Xperts, where we explore the latest developments in the fascinating world of the Upland metaverse. Today, we have a special treat for you, as Co-Hosts 2Stupid2Win and ThankMeLater are joined by none other than the Hyde Park Ninjas - a group of skilled martial artists who not only break boards but also happen to be upcoming experts in the world of Web3 experience.We'll dive into their exciting project with UPX.World and explore the potential impact of Web3 technology on the Upland metaverse. We'll also discuss the secondary market in Upland and how neighborhood ratings can add a new dimension to the game. And let me tell you, things get heated as the team debates the controversial topic of uncollected earnings and whether there should be a set number of days before they expire or an upx value.But that's not all - we'll also explore the possibilities of owning a racetrack in the Upland Metaverse, as applications are now open. And we'll hear about a live fundraiser on GoFundMe.com called Chokes For Charity, where you can support two great causes, Tap Out Cancer and Stop Soldier Suicide, by visiting https://gofund.me/ae089140 and https://gofund.me/9dde69b3.So grab a seat, put on your headphones, and get ready for an entertaining and informative ride as we explore the world of Upland with the Property Xperts. Let's go!The UPX Podcast is the ORIGINAL and #1 spot for news, strategy, non-financial advice, and more in Upland. Join 2Stupid2Win and ThankMeLater as they discuss the current events, strategies, and community of the metaverse known as Upland.Sign up for Upland using this referral code discover.upland.me/UPX-Podcast. Earn of 50% bonus on your first deposit up to $100.Follow us on Twitter www.twitter.com/upxpodcastSHOW DISCLAIMER: The views, information, and opinions expressed on The Upland Property Xperts (UPX) Podcast are solely those of 2Stupid2Win, TML, and any guests of the podcast and do not necessarily represent/reflect those of UplandMe Inc. We are not employed by, or provided insider information from the UplandMe Inc. Nor are we financial/investment advisors. All discussion about properties, types of properties, or any other NFTs in Upland to buy or sell is not financial advice. Please do your own research first. We do not guarantee any particular outcome from participating in Upland. There is potential for loss from participating in the purchase, sale, or investing in Upland and their metaverse.
2Stupid2Win & ThankMeLater discuss the secondary market, dive into UPX.World data, the ornament sales, the Cupid hunt, Treasure Hunting changes, and a troll hits the comments.The UPX Podcast is the ORIGINAL and #1 spot for news, strategy, non-financial advice, and more in Upland. Join 2Stupid2Win, ThankMeLater, TDavis, and BDag as they discuss the current events, strategies, and community of the metaverse known as Upland.Sign up for Upland using this referral code discover.upland.me/UPX-Podcast. Earn of 50% bonus on your first deposit up to $100.Follow us on Twitter www.twitter.com/upxpodcastSHOW DISCLAIMER: The views, information, and opinions expressed on The Upland Property Xperts (UPX) Podcast are solely those of 2Stupid2Win, TML, and any guests of the podcast and do not necessarily represent/reflect those of UplandMe Inc. We are not employed by, or provided insider information from the UplandMe Inc. Nor are we financial/investment advisors. All discussion about properties, types of properties, or any other NFTs in Upland to buy or sell is not financial advice. Please do your own research first. We do not guarantee any particular outcome from participating in Upland. There is potential for loss from participating in the purchase, sale, or investing in Upland and their metaverse.
Ele começou a empreender aos 12 anos de idade. Hoje a sua empresa, UPX, uma das maiores empresas de cibersegurança (cibersecurity) é responsável por 5% de todo o tráfego da internet no Brasil. Além disso, se tornou um triatleta, já fez diversas vezes Ironman 70.3 (O Ironman é uma prova de Triathlon, e a versão 70.3 totaliza 1.9km de natação, 90km de ciclismo, e 21km de corrida. Também existe o “full iron”, que totaliza 3.86km de natação, 180.25km de ciclismo, e 42.2km de corrida). Ou seja, Bruno Prado conhece bem os extremos da vida. Nesse episódio do Extremos, Bruno Prado conversa com Bruno Nardon e Alfredo Soares sobre alguns temas, entre eles: - Como Bruno Prado reagiu à notícia do seu câncer aos 15 anos? - Em que momento uma empresa deve se preocupar com cibersecurity? - Como Bruno Prado se tornou um triatleta, mesmo com todas as limitações? - E uma série de outros temas. Assista a esse episódio exclusivo do Extremos Podcast, e conte o que achou nos comentários! --- Se inscreva no YouTube do Extremos: https://g40.co/5xj Acompanhe o Extremos no Instagram: https://g40.co/hzm Instagram Alfredo Soares: https://g40.co/wnw Instagram Bruno Nardon: https://g40.co/5tv Siga o G4 Educação em todas as redes Instagram: https://g40.co/u7i Linkedin: https://g40.co/e15 Blog: https://g40.co/sbi
2Stupid2Win & ThankMeLater cover the secondary market, 2Stupid2Win lives up to his name and made a dumb decision, a tour, showrooms in the metaverse, and developer tools are coming to the Upland metaverse. 2Stupid2Win puts up hundreds of thousands of UPX for two different projects. The UPX Podcast is the ORIGINAL and #1 spot for news, strategy, non-financial advice, and more in Upland. Join 2Stupid2Win, ThankMeLater, TDavis, and BDag as they discuss the current events, strategies, and community of the metaverse known as Upland. Sign up for Upland using this referral code discover.upland.me/UPX-Podcast. Earn of 50% bonus on your first deposit up to $100. Follow us on Twitter www.twitter.com/upxpodcast SHOW DISCLAIMER: The views, information, and opinions expressed on The Upland Property Xperts (UPX) Podcast are solely those of 2Stupid2Win, TML, and any guests of the podcast and do not necessarily represent/reflect those of UplandMe Inc. We are not employed by, or provided insider information from the UplandMe Inc. Nor are we financial/investment advisors. All discussion about properties, types of properties, or any other NFTs in Upland to buy or sell is not financial advice. Please do your own research first. We do not guarantee any particular outcome from participating in Upland. There is potential for loss from participating in the purchase, sale, or investing in Upland and their metaverse.
Connor has spent a lot of episodes talking about the past, today he is talking about the future. Tyler Doyle is a celebrity in the metaverse. He is the most prominent influencer in the game Upland. In fact, he just returned from a conference in Las Vegas where he was named "Broadcaster of the Year." He has made a career out of investing in the metaverse and teaching others on how to make REAL money in the VIRTUAL world. If you aren't convinced that evolution is happening and coming at us faster than ever, you need to listen to this episode. Follow @Loyldoyl on social media, particularly his youtube channel if you are interested in learning more. A brief description of Upland... Built at the intersection of the real and virtual world, Upland gives you the power to buy, sell and trade properties based on real-world addresses, just like the one you live at today… but in the virtual world. The digital properties you collect in Upland don't have any association or rights to the correlating properties in the real world, however, the addresses do mirror real-life locations. Upland's economy is powered by an in-game currency called UPX (pronounced “UP-EX”). Once you own a property in Upland, you can start to collect UPX earnings on it every 3 hours. Pretty nifty, right? Complete property collections in order to boost your UPX earnings and win a one-time UPX award. Trade your properties with other Uplanders in the marketplace - for UPX or other properties in order to grow your property portfolio and UPX earnings! Have you spotted a property that you want which is already owned by someone else? No problem! you can always make an offer for the property - even if it's not actively up for sale on the marketplace! To Life, Liberty and Property!
Guests: Joshua Roth is the VP of Development for Decrypt Studios. He is an Emmy-nominated and Clio Award-winning producer and writer with 15 years of experience in the film, television, and branded content industries. It's an honor to have you on the show, Josh! Andrew Hayward is the Senior Writer at Decrypt. He is a writer and editor of over 15 years covering topics on video games, gadgets, esports, crypto, apps, and more across 100+ total publications. He wrote for publications such as Rolling Stone, Vice, Playboy, Polygon, Edge, Official Xbox Magazine, IGN, The Esports Observer, Variety, and The Verge. We're excited to hear Andrew's take on NFTs and the Metaverse!
Guests: Miles Anthony is the Founder of Decentral Games, a next-generation entertainment and play-to-earn DAO (Decentralized Autonomous Organization) at the intersection of the metaverse and NFT. The company is backed by key investor Digital Currency Group (DCG), whose principal subsidiary Grayscale is the world's biggest bitcoin and cryptocurrency fund manager. In this episode, we'll hear Miles share his insights and experience with Decentral Games and how they develop 3D metaverse games on blockchain for both consumer and business markets. Jason Chapman is the Co-Founder & Managing Partner at Konvoy Ventures, a venture fund investing in early-stage companies in the video gaming industry. Their recent investments include blockchain NFT games: Axie Infinity, Genopets, and Sky Mavis. In this episode, Jason will share with us his expertise and experience in investing in platforms and technologies at the frontier of gaming, particularly in the NFT and Metaverse space. Luca Passarotti is in International Business Development at Cagliari Calcio, the pride of a whole region, Sardinia, and one of the most popular teams in Italy. The club has partnered with Sorare, the digital football championship blockchain. In this episode, we're excited to have Luca Passarotti on the show as he shares his expertise and perspective on NFTs and the Metaverse.
Guests: Kate Mitselmakher is the CEO & Founder at Bloccelerate VC, a global decentralized engine for blockchain innovators. They are a team of serial investors, entrepreneurs, and executives from Fortune 500 companies passionate about supporting entrepreneurs in the blockchain space. In this episode, we'll hear Kate share her perspective on the Metaverse and the concept of the real world and the virtual world eventually merging into one. Martina Welkhoff is the Managing Partner at the WXR Fund, a venture firm at the intersection of two immense opportunities: female entrepreneurs and the next wave of computing. Their portfolio includes Metaverse platforms like Obsess, Scatter, and ShapesXR. We're honored to have Martina on the show to share with us how she helped companies realize the metaverse in some capacity to provide immersive content and experiences to the world.
Guests: Sandeep Nailwal is the Co-founder & Chief Operations Officer at Polygon Studios, an NFT-focused gaming and metaverse hub backed by a 100 million USD fund and already has multiple NFT projects with Decentraland, Opensea, Sandbox, Somnium Space, and Decentral Games. They have more than 3000 gaming and NFT decentralized applications. We're excited to have Sandeep on the show as he talks about various NFT projects he's led and how he set up Polygon Studios to make the best use of modern technology to shape fandom for generations to come and change the way the fans interact. Gabriele Bernasconi is the Co-CEO at Genuino, where they connect physical and digital commerce with authentic digital sport memorabilia. They help sports brands create trust with consumers by bringing transparency, traceability, and tradability of real-world objects into the digital frontier. In this episode, we're excited to hear from Gabriele Bernasconi and Genuino's NFT deals with brands and sports clubs like ACF Fiorentina. Thom Kozik is the Co-Founder & Chief Product Officer at Campus Legends, a socially-driven community for officially licensed collegiate digital collectibles. He has had 25+ years of success in leading teams to deliver innovation and transformation at the intersection of consumer services, technology, and marketing at organizations such as Marriott, Yahoo!, Microsoft, and Atari.
Guests: Ada Jonuse is the CEO and co-founder at Lympo. Acquired by Animoca Brands, Lympo is a sports NFT ecosystem featuring world-famous athletes and clubs together with a new ecosystem token LMT. Ada has co-founded 3 startups, 1 international startup community, released 2 crypto tokens, and was awarded the 2018 Women Technology Leader of the Year (Lithuania) and the 2017 Emerging European tech star. We're excited to have you on the show! Zach Zeurcher is the Founder of Gravity Space Marketing, a space-metaverse company and the only global marketing agency with the engineering and logistical capacity to take brands to space for marketing activations. Zach is an expert in finding and capturing value between the intersectionality of industries created through the adoption of new technology. We're honored to hear Zach's expertise and perspective in the future of the Metaverse. Josh Katz is the Founder and CEO at YellowHeart, a blockchain live event ticketing platform powered by distributed ledger technology. The YellowHeart platform is autonomous, fully decentralized, and runs on a public blockchain, which enables artists and teams to identify the market and sell directly to their fans. In this episode, we'll have the opportunity to hear Josh Katz talk about his perspective and vision on the future of NFTs and the Metaverse.
4's UpX's and Ro; Recruiting Update with GeoShow NotesMarsh and Jordan are first joined by our OBB Media colleague Ro from the Orange Bowl Boys. We discuss the new emerging culture of the Miami Hurricanes under Mario Cristobal. Ro gives his thoughts on our new offensive scheme under Josh Gattis and what we can expect to be different from the previous season. Geo then joins us to give us his first hand account of how spring practices are going. He then goes in depth on some of the more prominent recruiting names from this upcoming cycle, including a little bit of breaking news. We discuss how Mario and staff intend to use the transfer portal this season and some names to watch for.Sponsors: Ed Morse Automotive Group & DraftKingsIf you or someone you know has a gambling problem, crisis counseling and referral services can be accessed by calling 1-800-GAMBLER (1-800-426-2537) (IL/IN/MI/NJ/PA/WV/WY), 1-800-NEXT STEP (AZ), 1-800-522-4700 (CO/NH), 888-789-7777/visit http://ccpg.org/chat (CT), 1-800-BETS OFF (IA), 1-877-770-STOP (7867) (LA), 877-8-HOPENY/text HOPENY (467369) (NY), visit OPGR.org (OR), call/text TN REDLINE 1-800-889-9789 (TN), or 1-888-532-3500 (VA). 21+ (18+ NH/WY). Physically present in AZ/CO/CT/IL/IN/IA/LA/MI/NH/NJ/NY/OR/ PA/TN/VA/WV/WY only. Min. $5 deposit required. Eligibility restrictions apply. See http://draftkings.com/sportsbook for details.4's Up is produced by OBB Media Inc. You can visit us online at www.obbmediainc.com. Copyright 2022.
Guests: Avery Akkineni is the President at VaynerNFT, a consultancy that partners with the world's top intellectual property owners to develop market-leading NFT programs. VaynerNFT recently announced long-term NFT plans with their flagship client, Budweiser. In this episode, Avery Akkineni will talk about how she leads VaynerNFT in its mission to help the world's leading intellectual property owners navigate the wild and wonderful world of NFTs. It's an honor to have you on the show, Avery! Thibaut Predhomme is the Head of Operations & Chief of Staff at Sorare, well known for transforming online sports fandom and giving its community a new way to connect to the clubs and players that they love. With a monthly card sales volume of over $80M across 140 countries, Sorare is funded by a world-class team including Benchmark, Accel Partners, and footballers Gerard Piqué, Antoine Griezmann, and Rio Ferdinand. Thibaut Predhomme will share his perspective on NFTs and how Sorare achieved its success in the NFT space in the short span of 3 years. We're truly excited to have you on the show! Dr. Merav Ozair is a FinTech Professor at Rutgers Business School and a leading blockchain expert in NFTs, DeFi, DOAs, & Cryptocurrency. She has developed courses on blockchain and digital assets for both undergrads and graduate level while being the Research Director of the RBS Blockchain Hub. We're excited to dive into Dr. Ozair's vast knowledge and expertise in the NFT space.
Guests: Garrett Minks is the Chief Technology Officer at RAIR Technologies Inc., a blockchain-based digital rights management platform that uses NFTs to gate access to streaming content. Garrett is an early adopter of blockchain innovations, digital collectibles, and DLT based media platforms. In this episode, Garrett Minks shares how RAIR is at the forefront of revolutionizing streaming content. We're excited to have you here on the show! Dorukhan Acar is the Board Member, Executive Com. Member, & Chief Treasurer at Galatasaray SK, the only European cup winner football team in Turkey, holding the highest number of Turkish League cups. Galatasaray also won the UEFA Cup and the UEFA Super Cup in 2000. In this episode, Dorukhan Acar will talk about Galatasaray's NFTs deals with brands like Socios and more. We're excited to hear from you, Doruk! Murat Kristal is the Director of Centre of Excellence in Big Data & Analytics Leadership at the Schulich School of Business - York University. He has numerous publications in print, an analytics pioneer in Canada, an accomplished researcher, and is recognized as a Top 40 under 40 Professor. We're excited to hear Murat's expertise when it comes to NFTs and his perspective on the future of the Metaverse.
✅ Joe Pace is the Head of Business Development at ASICS Running Apps.ASICS, formerly Runkeeper, is a leading mobile running app, founded in 2008 and one of the first apps available when the app store launched that year. The app now has over 50 million users across 180 countries.Pace creates new products, services, and relationships for ASICS Running Apps business.In this episode, Joe Pace shares how ASICS dropped the world's first digital shoe, the ASICS Sunrise Red™ NFT Collection. ✅ Lauren Griewski has 15+ years media, advertising, technology and executive experience with the world's leading platforms including Roblox where she was responsible for brand integrations and 7 years at Facebook & Instagram. While at Facebook & Instagram, she was responsible for advertising sales and strategy, revenue growth, product development, partnerships, marketplaces advertiser effectiveness as well as global expansion and growth across priority verticals.She's now the Chief Revenue Officer at Permission.io. ✅ Dr. Farooq Anjum is the lead professor at the Harrisburg University Next Generation Technologies.Dr. Farooq Anjum recently discussed the rapid rise of non-fungible tokens (NFTs) with FOX43 news. He is also the CTO & Co-Founder at GroGuru Inc. which is transforming the agriculture industry with IOT + AI by providing precise guidance about irrigation time and frequency to a grower.
Guests: Zeev Klein is a General Partner at Landmark Ventures and the Founder of the “Royal Society of Players”, a collection of 10,000 hand-made NFT playing cards offering members unique perks, prizes, and privileges spanning both the metaverse and real world. He is also personally active as an angel investor and advisor to several NFT & Crypto companies including ZED RUN (who we also have here on the episode), Sandbox, Wilder World, Grin Gaming, Polygon (Matic), Concept Art House, and more. Roman Tirone is the Head of Partnerships at gaming startup Virtually Human Studio— they develop consumer-first entertainment experiences with emerging technologies like blockchain. Their flagship game ZED RUN was one of the first of its kind created on the blockchain (raised millions of USD from A16z, TCG Capital Management, and investors including Zeev). In this episode, Roman Tirone will talk about his experience in NFT partnerships with brands like NASCAR and more. Felipe Ribbe shares his experience working in innovation and sports. He recently joined Socios as their Head of BizDev Brazil. Socios is a new app for sports and esports fans, where you acquire voting rights to influence the clubs and teams you love. Find your voice, get club rewards & compete for once-in-a-lifetime experiences.
Episode 1 of the Navigating the Metaverse Show with our partner Decrypt Media. Guests: Daniel Roberts and Alanna Roazzi-Laforet from Decrypt. Highlights:
What Is Upland? Upland is a blockchain-based game in which participants can purchase, sell, and trade mapped-to-the-real-world virtual properties. Users can create properties and earn UPX coins by becoming "digital landowners." The concept makes use of blockchain technology to connect each property on the Upland platform to an NFT. Metaverse Properties offers land in prime Upland locations for individuals, organizations, and institutions ranging from conference and commercial venues to art galleries, family homes, and hangout areas. Unlike many traditional games, Upland attempts to empower users to own their own properties in the virtual world. It embraces the concept of "playing to earn," in which users may sell their holdings and earn real money. Join forces with other Uplanders to create one of the largest communities and digital markets on the planet. Be the True Owner of your Blockchain-enabled digital assets. Sign Up To Play Upland This episode is also available as a blog post: https://angrykids247radio.com/2022/02/17/upland-a-virtual-property-trading-game/ --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app Support this podcast: https://anchor.fm/aaron-lester9/support
This week 2Stupid2Win & ThankMeLater get you up to date on the happenings in the Upland metaverse. A Chief Executive finds themself in jail, UPX transfer between players, a new metaventures business is announced, the 2021 NFLPA Legits are out, NFL players are roaming the metaverse, a update to the Block Explorer shops, and much more. The UPX Podcast is the original and #1 spot for news, strategy, non-financial advice, and more in Upland. Join 2Stupid2Win, ThankMeLater, TDavis, and BDag as they discuss the current events, strategies, and community of the metaverse known as Upland. www.twitter.com/upxpodcast
BDag and TD are back, back at it with a recap of the last two weeks in Upland. They talk about NFL players in Upland, the 2021 NFLPA legits, the crackdown on Alcatraz offenders, UPX transfers, SoFi, BE shops, the collection reveal, and more!
ThankMeLater is back can he go a whole episode without dropping a Franklin Bomb? 2Stupid2Win & ThankMeLater briefly touch on the UPX earned rate being lowered. They compare networth from last week to February 2021. As the hype for Los Angeles continues to build they give their Top 5 Things to Prepare for a New City. This episode was streamed Live on YouTube https://youtu.be/h_6hxXwmLmY
Antonio, Guillaume et Emmanuel discutent 11, le 42 du rockeur, Quarkus, Java 17, limites de Kubernetes, #Y2k22, web3, Maven, Log4J, et et et cloud souverain. Enregistré le 14 janvier 2022 Téléchargement de l'épisode LesCastCodeurs-Episode–271.mp3 News Langages Quoi de neuf dans Java 18 de Loïc Mathieu Feature complete (mais encore des bugs) UTF–8 par défaut exemples de code dans la javadoc avec @snippet y compris des references a des fichiers extérieurs Simple Web Server pour des resources statiques (comme d'autres platformes comme Ruby ou Python je crois. En code ou via la commande jwebserver le mécanisme de finalisation proposé à la suppression --finalization=disabled pour tester. Celui-là il ne nous manquera pas ré-implementation de la réflection avec les MethodHandle Le calendrier de l'Avent Java 2021 a plein d'articles très intéressants pas tous révolutionnaires, mais c'est sympa RXJava vs Kotlin Coroutines Analyser votre repo Git en Java avec jgit Cinq choses que vous ne saviez pas sur la concurrence en Java l'ordre du programme et l'ordre d'exécution n'est pas le même, mais il est sémantiquement similaire le nombre de threads dans une JVM est limité (dépend de la machine) plus de threads ne veut pas dire plus de perfs Librairies Quarkus 2.5 et 2.6 sont sortis: API programmatique pour interagir avec le cache Kotlin 1.6 Java 17 par défaut pour les nouveaux projets générés des extensions ont bougé du core vers le quarkiverse hub, peut-être quelques impacts de migration images container plus petites en natif et compression UPX possible plus petit sur disque mais plus gros en memoire (pour la décompression) quarkus.native.compression.level de 1 à 10 dans le fichier de config dev service pour Oracvle DB Utiliser Neo4J pour analyser le chemin de code et pourquoi un bout de code est inclus en natif super utile pour les compilations natives quarkus.native.enable-reports pour avoir le rapport exploitable par neo4j SmallRye Stork service discovery et client side load balancing support pour Consul, Eureka, and Kubernetes extensible notamment pour le load balancing intégration avec Quarkus REST Client et gRPC dans la config stork://hello-service Infrastructure Pourquoi et comment de la taille des containers Kubernetes quand on ne partage pas, inefficient mais sécurisé Avec des VM, on peut overcommitter des resources sur l'hyperviseur mais risque sur mésentente Ne remplace pas le capacity planning Containers définissent des filtrages plus fins et tuent les process qui dépassent Discussion cpu_share (proportion en balance), cpu quota, cpu period pour définir les limites basses et hautes mais si ça reste statique par host c'est pas très pratique Orchestration de container via Kubernetes (request = min, limit = max) Kube donne au minimum request mais peut donner plus si le noeud n'est pas occupé à 100% Attention, la partie libre n'est pas distribuée équitablement mais en proportion du ratio de request demandé vs les autres. Donc les containers avec des grosses request sont privilégiés. Donc mettre limit est important Donc jouer le jeu request et monitored pour ajuster à la baisse si nécessaire. Tous les workloads doivent jouer le jeu. Kubernetes QoS (best effort , burstable et guaranteed) utilisé lorsque on tourne bas en mémoire (pas en cpu !) Discussion de la sélection du noeud (selector, affinity, taints and tolerations ou isolation/ restriction) pour isoler des qualités de service ou prédictabilité, pour la sécurité etc ) besoins mémoire : si utilisation max, pod killed. Besoins CPU : si utilisation max, on est throttled -> slow Mettre mémoire request = limit sauf si le process peut rendre de la mémoire (pas fait avant java 11) CPU request = limit si la prédictabilité de l'application est très important. Etudier conso CPU de l'appli en percentile et targeted par exemple une garantie à 99% ou 90 ou moins si pas sensible Article ne parle pas du scale out Exchange 2016 et 2019 souffrent du bug de l'an 2022 Y2K22 Après Matrix et son opus Resurection, Microsoft relance le bug de l'an 2000, 22 ans après, Y2k22 dans Exchange server 2016 et 2019 et d'autres systems non microsoft pour Exchange c'est du au systeme de scan d'antivirus qui ne reconnaissait pas les dates des signatures de virus 22010100001 parce que le software stocke les dates dans un entier signé 2^31-1=2147483647 et la date est stockée sur les deux premiers chiffres. le workaround initial est assez marrant, le software considère qu'on est le 33 décembre 2021 2112330001 Web Moxy de Signal (ex) discute web3 web1 était décentralisé, web2 est riche mais centralisé, web3 sera riche et décentralisé problème: les gens n'aiment pas faire tourner leurs propres serveurs et ne l'aimeront jamais même les entreprises ne font plus tourner leurs serveurs un protocole (standard) bouge beaucoup plus lentement qu'une plateforme exemple Spring, exemple Quarkus vs Microprofile ou Jakarka EE puis discute blockchain et NFT l'état et la logique / les permissions pour mettre a jour sont décentralisées mais pas l'interface avec l'utilisateur blockchain est une confiance entre serveurs plus qu'entre clients avec le mobile, les clients ne peuvent pas acter en tant que server (voir Bitcoin) donc des gens vendent des accès centralisés aux noeuds de la blockchain et les clients de ses APIs ont une confiance implicite (et pas par le système) et centralisation des accès et donc mining de ces informations NFTs stockent l'URL de l'objet (sans hash) donc pas sécurisé sans parler du rachat de domaine il a fait un NFT qui se change en émoji caca pour celui qui l'a acheté et il s'est fait virer son NFT ET sa preuve de possession mais c'est une blockchain ??? sauf que le wallet passe par des fournisseurs centralisés pour faire web3, les gens se concentrent autour de plateformes, un comportement tres web2 donc la blockchain et NFT ont du succès pas parce que c'est distribué mais parce que c'est un gold rush la dynamique rend les projets web3 successful mais fondamentalement les mêmes dynamiques vont les centraliser propositions accepter que les gens ne font pas tourner leur serveurs et utiliser la crypto pour distribuer la confiance Outillage Maven 3 à 5 une explication le POM est figé parce c'est ce que publie maven central, donc maven 3 ne fera que des améliorations mineures Maven 5 la proposition: avoir un POM de build (v5) et produire un POM de consommation en v4, comme les autres systèmes de builds font Maven 4 va faire la meme séparation mais en faisant un POM v4 build to PO)M v4 consumer conversion en étape intermédiaire maven 4 alpha 1 se rapproche, il attend juste des contributions de @aheritier blog de Hervé Boutemy Maven Wrapper (ex takari) est désormais un projet officiel apache maven : https://maven.apache.org/wrapper/maven-wrapper-plugin/ idem pour Maven Daemon https://github.com/apache/maven-mvnd Le maven Build Cache arrive : https://github.com/apache/maven-build-cache-extension Sécurité Comme prévu, la saga log4j continue avec Log4j 2.17 et 2.17.1 avec l'augmentation de la visibilité, plus de problèmes vont être trouvés Log4J 2.17 corrige un appel récursif infini exploitable en déni de service. Besoin d'avoir un pattern non standard dans la config (utilisant les context lookup) et un accès au Thread Context Map par l'attaquant (5.9) https://logging.apache.org/log4j/2.x/security.html#CVE-2021-45105 Log4J 2.17.1 fixe un abus du JDBCAppender qui peut référencer une URL JNDI et executer du code a distance mais l'attaquant doit pouvoir modifier la configuration de log4j (6.6) https://logging.apache.org/log4j/2.x/security.html#CVE-2021-44832 doit-on quitter le navire ? équilibre entre fonctionnalités et sécurité on fera un épisode spécial log4Shell bientôt H2 vulnérable à une attaque JNDI fondamentalement comme log4shell Mais exploitable pour ceux qui passent une url ou un login mot de passe via des infos utilisateur Par exemple h2 console Mais localhost par défaut Sauf dans jhipster Loi, société et organisation Tribune de Didier Girard sur le cloud souverain investissement de 1,8 milliards sur 4 ans dans le cloud français sur 4 ans. C'est moins que chaque grand cloud provider par an consortiums européens mais mauvaise histoire CloudWatt, Gaia-x et ses problèmes de gouvernance initiative Soutenu par la dépense publique Cloud de confiance est un moyen pour Didier du transfert technologique et de casser l'asymétrie de compétence et d'investissement Ça répond pas aux problèmes clés levés par Quentin dans l'interview La Maison Blanche demande à Oracle et Microsoft de réfléchir à la sécurisation des logiciels libres Outils de l'épisode Rambox en general je préfère les applis natives pour chaque service Mais avec les messageries instantanées c'est la chianlie Et il y a les apps qui sont des tabs dans le navigateur (Trello, Gmail, calendar etc) Là tout est centralisé dans une seule app (notifications etc) C'est comme un mini browser dédié avec des sites webs fixes Et contre toute attente j'aime bien Version gratuite et version pro. Encore des limitations (vue de deux apps en parallèle) mais ils travaillent à une nouvelle version Conférences Sunny Tech à Montpellier le 30 juin et 1er juillet — CfP ouvert jusqu'au 28 février Nous contacter Soutenez Les Cast Codeurs sur Patreon https://www.patreon.com/LesCastCodeurs Faire un crowdcast ou une crowdquestion Contactez-nous via twitter https://twitter.com/lescastcodeurs sur le groupe Google https://groups.google.com/group/lescastcodeurs ou sur le site web https://lescastcodeurs.com/
2Stupid2Win & ThankMeLater discuss the possibility of 100k UPX floor in San Francisco, Upland building a market analysis to stop gap until upx.world is back up and running ,and more Legits talk.
Hi, Spring fans! In this installment, [Josh Long (@starbuxman)](https://github.com/starbuxman) talks to Paketo contributor [Daniel Mikusa](https://github.com/dmikusa-pivotal) about buildpacks, Paketo, containers, UPX, and so much more.
Welcome to episode 100! 2Stupid2Win, ThankMeLater, Tdavis, & BDag all talk about collection bonuses, NFL Legits, TDavis & ThankMeLater discuss the difference between blockchain games vs games on blockchain. 500k UPX was given away on the episode. Another 700k UPX is up for grabs! Listen now!
2Stupid2Win & ThankMeLater discuss the New Orleans Collections release, the new partnership with Spirits Halloween, Nashville's upcoming release and how you can earn 1 million UPX!
2Stupid2Win & ThankMeLater have Stephen Stirling @Steefcrypto on to talk NBA Top Shot, NFTs and his art. 2Stupid2Win & ThankMeLater discuss the NFL & NFLPA's announcement with Dapper Labs and the impact on Upland Legits. The nven0m joins the podcast to discuss topics from a few weeks ago and the state of Green Rabbit. 100,000 UPX winner is announced and a new script is read for a chance to win another 100,000 UPX. You don't want to miss this one.
2Stupid2Win and ThankMeLater reveal new shocking Upland numbers. Talk a little more about Legits and last weeks release wasn't all of the 2020 Legits. The release of KC and Rutherford didn't live up to expectations and you get our thoughts. 100,000 UPX winner is announced and another script is read for another 100,000 UPX contest.
2Stupid2Win and ThankMeLater discuss the upcoming 2 city release. They talk collections, transportation, and new terminal purchases. They discuss Legits and the impact of the NFL players association partnership with Upland. Figure out the parody movie in the episode and get entered to win 100k UPX on next Thursday's podcast
2Stupid2Win & ThankMeLater discuss neighborhood/collection prices differences between spark and UPX. Also does having a building on your property make it more valuable? A new city is announced and these 2 idiots get it wrong for the WHOLE episode!
2Stupid2Win & ThankMeLater are joined by over a billion UPX networth during recording of the podcast. Was Upland hacked? Listen now to find out. They discuss what to consider and how to use www.upx.world to evaluate offers made. nven0m stops in to talk about his auction win of the Chrysler Building. DjShorts joins the crew to discuss his full on takeover of Upland and how he will pass Dizzy! Listen now for all the excitement!
ThankMeLater's dog chokes on a chicken bone, UPX is a cryptocurrency, UPX is not a cryptocurrency, Coit Tower sells for more than players can fiat out, Metaforce Comics will save the day, and 2Stupid2Win Senate could be legit.
2Stupid2Win & ThankMeLater are joined by special guest Dizzydski discussing the last week of Upland. They discuss some of Dizzydski's "Game Changer" plays over the last few months. The Operation Hello NYC is talked about and the last Upland event is covered. Calling all Rappers a contest is announced to write lyrics to the Podcast's theme music. For a 50% bonus on your initial UPX purchase in Upland use the following linkdiscover.upland.me/UPX-PodcastUpland is a virtual property trading game powered by blockchain technology.
Jon Jordan talks to Upland co-founder Idan Zuckerman about how he got into blockchain, the vision for Upland - a mobile-first game running on the EOS blockchain - and how the team plan to build on their initial success - currently Upland is the #2 blockchain game by daily activity - by launching the ability to run businesses within the game. You can use this link to get a sign-up bonus of 6,000 UPX, worth 2 entry-level buildings. https://discover.upland.me/blockchaingamingworld
Una historia más del legendario “Hotel X” de Raúl Parrao convertida en un ejercicio audiovisual esquizofrénico y audaz en donde la anécdota y la dramaturgia ceden espacio a las sensaciones, las emociones, el color y la forma. Este proyecto transporta el espacio teatral en otro regido por las leyes del caos, la velocidad y la vulnerabilidad; el espacio del video. Director Alfredo Salomón. 2001.
Una historia más del legendario “Hotel X” de Raúl Parrao convertida en un ejercicio audiovisual esquizofrénico y audaz en donde la anécdota y la dramaturgia ceden espacio a las sensaciones, las emociones, el color y la forma. Este proyecto transporta el espacio teatral en otro regido por las leyes del caos, la velocidad y la vulnerabilidad; el espacio del video. Director Alfredo Salomón. 2001.
Serie que gira alrededor del teatro y de montajes artísticos.
Serie que gira alrededor del teatro y de montajes artísticos.
Estamos de volta com o terceiro episódio do Hostcast, apresentado por Kauê Linden e Gustavo Guanabara e que recebe como convidados Ariel Alexandre, fundador do Videolog e Bruno Prado, CEO da UPX. Mais uma vez as notícias do mercado, apresentadas por Lisane Monteiro, vai falar sobre a briga entre blogueiros x ECAD e qualidade da Internet no Brasil. Como tema […] O post 1.3 – Hospedagem de Vídeos apareceu primeiro em Hostcast.
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
"Virtually every virus and worm that circulates the Internet today is ""protected"" by some form of obfuscation that hides the code's true intent. In the Window's world where worms prevail, the use of tools such as UPX, ASPack, and teLock has become standard. Protection of malicious code is not the only goal of binary obfuscators however which can be used to protect intellectual property. In the Linux world, tools such as Burneye and Shiva exist which can be used in ways similar to any Window's obfuscation tool. To fight such methods, analysts have created specific tools or techniques for unraveling these code obfuscators in order to reveal the software within. To date, in the fight against malware, anti-virus vendors have had the luxury of focusing on signature development since obfuscation of malware has presented little challenge. To combat this, malware authors are rapidly morphing their code in order to evade quickly developed and deployed signature-matching routines. What will happen when malware authors begin to morph their obfuscation techniques as rapidly as they morph their worms? While not designed specifically as a malware protection tool, one program, Shiva, aims to do exactly that. Shiva forces analysis of malicious code to be delayed while analysts fight through each novel mutation of Shiva's obfuscation mechanism. This, in effect, provides the malware a longer period of time to wreak havoc before countermeasures can be developed. This talk will focus on the use of emulated execution within IDA Pro to provide a generic means for rapidly deobfuscating protected code. Capabilities of the emulation engine will be discussed and the removal of several types of obfuscation will be demonstrated. Finally, the development of standalone deobfuscation tools based on the emulation engine will be discussed. Chris Eagle is the Associate Chairman of the Computer Science Department at the Naval Postgraduate School (NPS) in Monterey, CA. A computer engineer/scientist for 18 years, his research interests include computer network operations, computer forensics and reverse/anti-reverse engineering."
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
"Virtually every virus and worm that circulates the Internet today is ""protected"" by some form of obfuscation that hides the code's true intent. In the Window's world where worms prevail, the use of tools such as UPX, ASPack, and teLock has become standard. Protection of malicious code is not the only goal of binary obfuscators however which can be used to protect intellectual property. In the Linux world, tools such as Burneye and Shiva exist which can be used in ways similar to any Window's obfuscation tool. To fight such methods, analysts have created specific tools or techniques for unraveling these code obfuscators in order to reveal the software within. To date, in the fight against malware, anti-virus vendors have had the luxury of focusing on signature development since obfuscation of malware has presented little challenge. To combat this, malware authors are rapidly morphing their code in order to evade quickly developed and deployed signature-matching routines. What will happen when malware authors begin to morph their obfuscation techniques as rapidly as they morph their worms? While not designed specifically as a malware protection tool, one program, Shiva, aims to do exactly that. Shiva forces analysis of malicious code to be delayed while analysts fight through each novel mutation of Shiva's obfuscation mechanism. This, in effect, provides the malware a longer period of time to wreak havoc before countermeasures can be developed. This talk will focus on the use of emulated execution within IDA Pro to provide a generic means for rapidly deobfuscating protected code. Capabilities of the emulation engine will be discussed and the removal of several types of obfuscation will be demonstrated. Finally, the development of standalone deobfuscation tools based on the emulation engine will be discussed. Chris Eagle is the Associate Chairman of the Computer Science Department at the Naval Postgraduate School (NPS) in Monterey, CA. A computer engineer/scientist for 18 years, his research interests include computer network operations, computer forensics and reverse/anti-reverse engineering."
Black Hat Briefings, USA 2007 [Video] Presentations from the security conference.
It is important for the security professional to understand the techniques used by those they hope to defend against. This presentation focuses on the anti-forensic techniques which malware authors incorporate into their malicious code, as opposed to relying solely on an external rootkit. In addition to describing a number of known but scarcely documented techniques, this presentation will describe techniques which have never been observed through the presenter?s experience with incident response and malware reverse engineering. This presentation will also demonstrate a new technique for executing a malicious program directly from memory under unix. A new technique for avoiding entropy detection of packed or encrypted executables will also be discussed. This presentation will contain a great deal of highly technical content which covers the specifics of the techniques down to the machine instruction level. For the security professional/enthusiast with a limited technical background in this area, this presentation will serve as an eye-opening overview of malware anti-forensic techniques as well as a limited introduction to forensic analysis. The Executable Toolkit (exetk) will be introduced and demonstrated throughout the presentation. Included in the toolkit are various utilities for data hiding, manipulation and infection of executable files. The ability to execute a program directly from memory greatly enhances its stealth. With this ability, one malicious program can use any technique it chooses (such as downloading from the web) to fill a memory buffer with an executable, and then launch it directly without that executable ever being written to disk. If the executable is never written to disk there will be no binary for a forensic examiner to capture. A somewhat similar technique has been described before by ?the grugq?, though its inner workings were never fully described nor promised source code released. The approach taken by ?the grugq? was also significantly more obtuse and importable. The approach to executing a process directly from memory under unix which I describe for the first time in this presentation will take the following three stage approach. The first stage is a part of an executable program which is either stand alone or infected into another legitimate process or program file. The job of the first stage loader is to first act as a debugger, and launch a debugged process with a breakpoint at the entry point. This is accomplished through the ptrace() system call. With the debugged process suspended by a breakpoint at its entry point, the first stage loader will overwrite the memory at the entry point with the second stage loader, then resume continuous execution on the process. When the debugged process resumes continuous execution the code of the second stage loader begins executing. The role of the second stage loader is to first allocate enough memory for the new malicious executable. It then adjusts the memory protection on the new memory area to allow for writing and executing in addition to reading. The purpose for having a third stage loader is that the new executable code will likely have to be written to the same memory area in which the second stage loader currently resides. The third stage loader is a part of the same program which contains the first stage loader and performs its memory operations on the debugged process in the same fashion tradition debuggers use to alter process memory. Control is passed from the second stage loader to the third stage loader simply by setting a breakpoint interrupt at the end of the second stage loader. Control will return to the same program which contains the first stage loader but its role at this point is changed. The job of the third stage loader is to copy the malicious program into the new process memory in the same fashion as the operating system would had the program been executed traditionally. The third stage loader must also manually resolve program imports by loading all dynamic libraries and finding the appropriate exported symbols and populating the pointers in the program?s import table accordingly. Once everything has been loaded and dynamically linked, the instruction pointer of the new malicious process is set to its entry point and execution is resumed. At this point the process containing the first and third stage loader may detach itself from debugging if necessary. Packers will be discussed in detail. Use of a common packer such as UPX or PECompact can mask the malicious functionality of an executable but it is also very easy to ?unpack? these executables. This presentation will discuss how exactly a packer works and how you can write your own. The Executable Toolkit (exetk) will be demonstrated as a clean reference implementation for a simple obfuscating packer. The latest malware detection software is beginning to scan for such custom packers through the use of entropy (randomness) detection. The presentation will discuss a technique to create a packer which obscures program contents which keeping a non-suspicious entropy within the data.
Black Hat Briefings, USA 2007 [Audio] Presentations from the security conference.
It is important for the security professional to understand the techniques used by those they hope to defend against. This presentation focuses on the anti-forensic techniques which malware authors incorporate into their malicious code, as opposed to relying solely on an external rootkit. In addition to describing a number of known but scarcely documented techniques, this presentation will describe techniques which have never been observed through the presenter?s experience with incident response and malware reverse engineering. This presentation will also demonstrate a new technique for executing a malicious program directly from memory under unix. A new technique for avoiding entropy detection of packed or encrypted executables will also be discussed. This presentation will contain a great deal of highly technical content which covers the specifics of the techniques down to the machine instruction level. For the security professional/enthusiast with a limited technical background in this area, this presentation will serve as an eye-opening overview of malware anti-forensic techniques as well as a limited introduction to forensic analysis. The Executable Toolkit (exetk) will be introduced and demonstrated throughout the presentation. Included in the toolkit are various utilities for data hiding, manipulation and infection of executable files. The ability to execute a program directly from memory greatly enhances its stealth. With this ability, one malicious program can use any technique it chooses (such as downloading from the web) to fill a memory buffer with an executable, and then launch it directly without that executable ever being written to disk. If the executable is never written to disk there will be no binary for a forensic examiner to capture. A somewhat similar technique has been described before by ?the grugq?, though its inner workings were never fully described nor promised source code released. The approach taken by ?the grugq? was also significantly more obtuse and importable. The approach to executing a process directly from memory under unix which I describe for the first time in this presentation will take the following three stage approach. The first stage is a part of an executable program which is either stand alone or infected into another legitimate process or program file. The job of the first stage loader is to first act as a debugger, and launch a debugged process with a breakpoint at the entry point. This is accomplished through the ptrace() system call. With the debugged process suspended by a breakpoint at its entry point, the first stage loader will overwrite the memory at the entry point with the second stage loader, then resume continuous execution on the process. When the debugged process resumes continuous execution the code of the second stage loader begins executing. The role of the second stage loader is to first allocate enough memory for the new malicious executable. It then adjusts the memory protection on the new memory area to allow for writing and executing in addition to reading. The purpose for having a third stage loader is that the new executable code will likely have to be written to the same memory area in which the second stage loader currently resides. The third stage loader is a part of the same program which contains the first stage loader and performs its memory operations on the debugged process in the same fashion tradition debuggers use to alter process memory. Control is passed from the second stage loader to the third stage loader simply by setting a breakpoint interrupt at the end of the second stage loader. Control will return to the same program which contains the first stage loader but its role at this point is changed. The job of the third stage loader is to copy the malicious program into the new process memory in the same fashion as the operating system would had the program been executed traditionally. The third stage loader must also manually resolve program imports by loading all dynamic libraries and finding the appropriate exported symbols and populating the pointers in the program?s import table accordingly. Once everything has been loaded and dynamically linked, the instruction pointer of the new malicious process is set to its entry point and execution is resumed. At this point the process containing the first and third stage loader may detach itself from debugging if necessary. Packers will be discussed in detail. Use of a common packer such as UPX or PECompact can mask the malicious functionality of an executable but it is also very easy to ?unpack? these executables. This presentation will discuss how exactly a packer works and how you can write your own. The Executable Toolkit (exetk) will be demonstrated as a clean reference implementation for a simple obfuscating packer. The latest malware detection software is beginning to scan for such custom packers through the use of entropy (randomness) detection. The presentation will discuss a technique to create a packer which obscures program contents which keeping a non-suspicious entropy within the data.