700 & Counting
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Solarblizzard
Security Now! Transcript of Episode #800 Page 1 of 27 Transcript of Episode #800 SolarBlizzard Description: This week we open the New Year taking a longer look at fewer topics since the bad guys were apparently enjoying their New Year holiday, too. So we look at an interesting kludge that's been forced upon Chrome by ill-mannered antiviral scanners. We need to warn all enterprise users of Zyxel network border security products of another recently discovered built-in backdoor. We look at the rise in IoT compromise swatting attacks and a series of new flaws and vulnerabilities in the PHP Zend and Yii frameworks. We have a quick bit of miscellany to share, then I want to explain a lot about the value of trimming SSDs and newer SMR drives. And we'll conclude by catching up with what will hopefully be the last news, for a while at least, of the disastrous SolarWinds breach and intrusions. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-800.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-800-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here with a defunct football; a very bad AV security practice that Chrome has had to do something maybe even worse to fix. We'll talk about the built-in password access in 100,000 Zyxel firewalls, VPN gateways, and access point controllers; an update on SpinRite 6.1; and a whole lot more. Security Now! is coming up next. -
Internet Safety: Keeping Your Computer Safe on the Internet
Copyright © 2003-2010 Puget Sound Software, LLC and Leo A. Notenboom 1 Internet Safety Keeping your Computer Safe on the Internet 3rd Edition by Leo A. Notenboom http://ask-leo.com Copyright © 2011 Puget Sound Software, LLC & Leo A. Notenboom All rights reserved. ISBN: 978-1-937018-03-0 Copyright © 2003-2010 Puget Sound Software, LLC and Leo A. Notenboom 1 Copyright and Disclaimer This book is protected by US and International copyright law, and is Copyright © 2011 by Leo A. Notenboom and Puget Sound Software, LLC, all rights are reserved. Having said that, the PDF electronic version (only) of this book is FREE. In fact, I encourage you to share this book with others as long as you share it: In its entirety (the book, the whole book and nothing but the book) In its original form (no changes made and no markups added) You may not charge for this book when you share it. Furthermore, you may not incorporate this book into any product or collection that is not free. (Drop me a line for pricing if you want to do something along those lines.) This book is based on my experience and anecdotal evidence. I've tried to ensure that everything written here is as accurate as possible at the time of publication, but I cannot assume any responsibility for mistakes or omissions. On top of that, I know nothing about your specific computer, your specific experience and your specific abilities to understand and act appropriately on the information herein. The bottom line is that you, and only you, are responsible for using this information appropriately, safely and as you see fit, and for any of the consequences of having done so. -
SQRL: Anti-Phishing & Revocation
Security Now! Transcript of Episode #426 Page 1 of 30 Transcript of Episode #426 SQRL: Anti-Phishing & Revocation Description: After following-up on a week chockful of interesting security news, Steve and Leo continue with their discussion of SQRL, the Secure QR code Login system, to discuss two recent innovations in the system that bring additional valuable features. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-426.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-426-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson has the latest - yes, another Java patch - and more information about Lavabit. More information about the NSA, too. What is a Ferret's Cannon? It's coming up next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 426, recorded October 16th, 2013: SQRL, Anti-Phishing, and Revocation. It's time for Security Now!, the show that covers your privacy and security online. Somebody in the chatroom before we began the show today, Steve Gibson, Explainer in Chief, said we should call it "Insecurity Now!" since it really talks mostly about insecure. But not today. Today we're going to talk about better security. Steve Gibson: Well, yeah. Actually, this is one of those episodes where so much happened in the last week in security news that, I mean, we just - there's a whole bunch of really interesting stuff to talk about. And in the past when we've done that we've just said, okay, we're not going to have any major topic because too much happened. -
Podcast Industry Audience Rankings July 2016
PODCAST INDUSTRY AUDIENCE RANKINGS JULY 2016 2 INTRODUCTION With the growing popularity of podcasts, more and more brands and agencies are exploring the medium in search of opportunities that make the most sense for their brands. And publishers are making important content decisions about ways to expand or better serve their audiences across multiple shows. What is the most accurate measure of podcast audience size? An obvious place for advertisers to begin exploring podcast advertising is with understanding the relative audience sizes of podcast publishers and of podcasts individually. Podtrac has provided the leading measurement service for podcasts since 2005. In 2016, Podtrac introduced “Monthly Unique Audience” for the podcast industry. It's the same metric used for planning other types of digital media, and for the first time it's available for podcasts from Podtrac. Monthly Unique Audience from Podtrac is available: ● By podcast publisher across all of the podcast shows and episodes they produce ● By show for all of the podcast episodes they produce ● By global and U.S. audience counts “Monthly Unique Audience” is an important metric in digital media because it enables advertisers and publishers to consider monthly audience reach in addition to potential impressions served. And as with other media, the monthly unique audience metrics from Podtrac are consistent across publishers and shows whether the episodes post daily, twice a week, weekly, etc. Which podcasts are audiences listening to most? Podtrac produces a monthly Ranking Report showing the top publishers in the industry by US audience. Podtrac is in a unique position to produce this report, because of its podcast measurement technology and its 10+ years of measurement relationships with substantially all of the top publishers in the industry. -
Ublock Origin
Security Now! Transcript of Episode #523 Page 1 of 27 Transcript of Episode #523 uBlock Origin Description: Leo and I catch up with the week's major security events. We then examine the ecosystem of web page advertising by comparing it to other "opportunistic advertising" such as that appearing on public transportation, highway billboards, broadcast television commercials and other public venues - which consumers have no obligation to consume. I eschew the implication that visitors to a web page have an obligation to retrieve third-party content, over which the website has little or no control, which consumes bandwidth, reduces online privacy, hinders performance, and potentially exposes visitors to malicious exploitation. And I believe this remains true even when a visitor's retrieval of such despicable third-party content would generate much-needed revenue for the visited site. Finally, I review the many operational features of uBlock Origin, my chosen HTML firewall, which effectively returns control to web users. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-523.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-523-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson's here. This is the episode I've been waiting for all week. He's going to cover adblocking, why he thinks we need adblockers, and, I think, I'm guessing, his favorite ad blocker to date. Actually, I like it a lot, too. uBlock Origin, how it works, how to work it best, coming up next on Security Now!. -
Security Now! #560 051716 ZWave Goodbye
Security Now! #560 051716 ZWave Goodbye This week on Security Now! ● Steve's long love affair with Windows ● The Oracle/Google JAVA API lawsuit ● The pending registration of "burner" phones ● Surveillance microphones found in public areas ● John McAfee and team cracks WhatsApp encryption? ● The Ring Doorbell may need another update ● A securityrelated Kickstarter which Security Now listeners would never fall for. ● A controversial feature being removed from Windows 10 ● A worrisome and exploitable heap corruption in the popular 7Zip application ● ... and a look at the ZWave Home Automation system What was last week’s 3035583 refresh all about? Security News “Why does Steve hate Windows 10 so much?” ● Let’s get this straight, everyone: I LOVE WINDOWS. Source: https://analytics.usa.gov/ ● 83.60% = Win7/44.56% Win10/17.90% Win8.1/10.30% WinXP/7.46% Win8/3.38% ● My complaint is that Windows is a commercial, closedsource, profit center for a massive corporation which must keep finding ways to leverage Windows’ market share for its own profit. ● For me, Windows is not a curio, a toy, or a platform for instagram and social media. Windows is a tool. It is my chosen tool. But Microsoft needs to keep changing it, NOT TO MAKE IT BETTER, but only for the sake of making it new. ● So there is an inherent tension between Microsoft’s interests and my own. ● An operating system should manage file systems, manage the system’s memory, manage applications and services, provide I/O services… and more recently provide a comfortable and convenient desktop environment for its user. -
CYBERSECURITY When Will You Be Hacked?
SUFFOLK ACADEMY OF LAW The Educational Arm of the Suffolk County Bar Association 560 Wheeler Road, Hauppauge, NY 11788 (631) 234-5588 CYBERSECURITY When Will You Be Hacked? FACULTY Victor John Yannacone, Jr., Esq. April 26, 2017 Suffolk County Bar Center, NY Cybersecurity Part I 12 May 2017 COURSE MATERIALS 1. A cybersecurity primer 3 – 1.1. Cybersecurity practices for law firms 5 – 1.2. Cybersecurity and the future of law firms 11 – 2. Information Security 14 – 2.1. An information security policy 33 – 2.2. Data Privacy & Cloud Computing 39 – 2.3. Encryption 47 – 3. Computer security 51 – 3.1. NIST Cybersecurity Framework 77 – 4. Cybersecurity chain of trust; third party vendors 113 – 5. Ransomware 117 – 5.1. Exploit kits 132 – 6. Botnets 137 – 7. BIOS 139 – 7.1. Universal Extensible Firmware Interface (UEFI) 154– 8. Operating Systems 172 – 8.1. Microsoft Windows 197 – 8.2. macOS 236– 8.3. Open source operating system comparison 263 – 9. Firmware 273 – 10. Endpoint Security Buyers Guide 278 – 11. Glossaries & Acronym Dictionaries 11.1. Common Computer Abbreviations 282 – 11.2. BABEL 285 – 11.3. Information Technology Acronymns 291 – 11.4. Glossary of Operating System Terms 372 – 2 Cyber Security Primer Network outages, hacking, computer viruses, and similar incidents affect our lives in ways that range from inconvenient to life-threatening. As the number of mobile users, digital applications, and data networks increase, so do the opportunities for exploitation. Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction. -
Breaches & Vigilante Worms
Security Now! Transcript of Episode #528 Page 1 of 30 Transcript of Episode #528 Breaches & Vigilante Worms Description: With many massive Internet data breaches, and a prolific vigilante worm loose on the Internet, Leo and I spend a fun- and fact-filled podcast covering the past week's multitude of news. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-528.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-528-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here. My goodness, it's been a busy week. This is going to be an all-news episode. We'll talk about the vigilante worm. We'll talk about security breaches at some very well-known sites. And we'll also talk a little bit about updates that make Marshmallow, Android 6.0, more secure. It's all coming up next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 528, recorded Tuesday, October 6th, 2015: Breaches & Vigilante Worms. It's time for Security Now!, the show in which we protect you and your family and your loved ones online. We scour the Earth for new vulnerabilities, attempt to plug the holes, and it's all thanks to this guy. Steve Gibson: Actually, they find us, Leo. We need not scour. And if I thought I ever had to before, Twitter has solved that problem for me. Leo: Yeah. Steve: It's just - it's such a fabulous resource. I've got, you know, as I mentioned before - actually, I don't think I did mention that I mentioned we were nearly at - I. -
Take a Close Look at Windows Server 2008
0208red_Cover.v9 1/17/08 3:37 PM Page C1 Foley: Is Silverlight the White Elephant in the Room? 64 FEBRUARY 2008 REDMONDMAG.COM TakeTake aa CloseClose LookLook atat WindowsWindows ServerServer 20082008 Will it be your next-generation platform? 26 > $5.95 02 • FEBRUARY +Beta Man Looks at Microsoft Search Server 1212 Get Ready for SQL Server 2008 37 25274 867 27 71 Searching for Enterprise Search Engines 45 Project2 1/14/08 12:46 PM Page 1 UB_CatchPhrase_Redmond.ai 1/11/08 12:03:14 PM ™ Reliability — Catch phrase or reality? Hot backups. Business continuity. Continuous data protection. These and other buzzwords have been generated by the technology industry to get your attention. But what do these terms mean to you? To UltraBac Software, they are another way of explaining the goal at the center of our business: perfect uptime. We invest the time and resources to offer solutions that ensure you have the fastest, most reliable access to your stored data, avoiding costly downtime waiting for failed machines to recover. Introducing Continuous Image Protection (CIP). UltraBac Software is so excited about our new technology that aids in this goal, we’re announcing CIP before its planned release. CIP is a form of continuous data protection (CDP) with a new innovation: it automatically backs up each sector on a disk as it is changed, unlike standard image backups which run only on a periodic basis. With CIP, your image backup never stops – so a system can be brought back to a point-in-time, rather than restoring a static image that could be up to 23 hours old. -
Podcast Industry Audience Rankings Expanded Advertiser Edition: June 2016
PODCAST INDUSTRY AUDIENCE RANKINGS EXPANDED ADVERTISER EDITION: JUNE 2016 2 INTRODUCTION With the growing popularity of podcasts, more and more brands and agencies are exploring the medium in search of opportunities that make the most sense for their brands. And publishers are making important content decisions about ways to expand or better serve their audiences across multiple shows. What is the most accurate measure of podcast audience size? An obvious place for advertisers to begin exploring podcast advertising is with understanding the relative audience sizes of podcast publishers and of podcasts individually. Podtrac has provided the leading measurement service for podcasts since 2005. In 2016, Podtrac introduced “Monthly Unique Audience” for the podcast industry. It's the same metric used for planning other types of digital media, and for the first time it's available for podcasts from Podtrac. Monthly Unique Audience from Podtrac is available: ● By podcast publisher across all of the podcast shows and episodes they produce ● By show for all of the podcast episodes they produce ● By global and U.S. audience counts “Monthly Unique Audience” is an important metric in digital media because it enables advertisers and publishers to consider monthly audience reach in addition to potential impressions served. And as with other media, the monthly unique audience metrics from Podtrac are consistent across publishers and shows whether the episodes post daily, twice a week, weekly, etc. Which podcasts are audiences listening to most? Podtrac produces a monthly Ranking Report showing the top publishers in the industry by US audience. Podtrac is in a unique position to produce this report, because of its podcast measurement technology and its 10+ years of measurement relationships with substantially all of the top publishers in the industry. -
The Dark Escrow
Security Now! Transcript of Episode #820 Page 1 of 22 Transcript of Episode #820 The Dark Escrow Description: This week we examine Firefox's just-released and welcome re-architecture under codename "Fission." We look at a new and recently active ransomware player named "Conti" and at a recently paid, high-profile mega ransom. We then ask the question, "When they say IoT, do they mean us?" We examine the implications of a new industry term, "mean time to inventory." We'll then lighten things up a bit with a new form of CAPTCHA and, of all things, a screensaver I discovered that I cannot take my eyes off of. (Leo, it's not quite as bad as whatever that game is that you cannot stop playing, but still.) We'll then share an ample helping of closing-the-loop feedback from our terrific listeners, after which I want to conclude by predicting what I would bet we're probably going to next see emerge from the evolving ransomware business model sad though it is to utter the phrase "ransomware business model." High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-820.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-820-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here. We've got a great show for you. Brand new feature in Firefox. It's called Firefox Fission. Steve explains it and shows you how to turn it on. I did immediately. We'll also talk about a new form of CAPTCHA that involves playing Doom. -
New Year's News Catch-Up
Security Now! Transcript of Episode #437 Page 1 of 35 Transcript of Episode #437 New Year's News Catch-Up Description: This first podcast of 2014 catches us up on all of the news that transpired over the Christmas and New Year's holidays - and there was a LOT of it! (Like it or not, the NSA news just keeps on coming!) High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-437.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-437-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve is back. Our first show of the new year, what are we talking about: the NSA and the ANT protocols. Lots of security news. We'll catch up next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 437, recorded January 7th, 2014: New Year's News Catch-Up. It's time for Security Now!, the show that covers your security and privacy online, your safety online, with the guy in charge, the "Explainer in Chief" we call him, Steve Gibson. Oh, my goodness, Happy New Year, Steve. Steve Gibson: Yes, indeed. And I was wearing my Explainer in Chief T-shirt for the day up there with you for... Leo: I loved that. Steve: I didn't make it 24 hours. Actually I had a lot of people asking me, "Where did you get that TNO T-shirt?" And it was from one of our listeners. I'm so sorry that I've, like, it was so long ago, it was a couple years ago, and I just kept the T-shirt for the right occasion.