<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 18 Apr 2026 14:21:53 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Cisco”</title>
    <link>https://techsnap.systems/tags/cisco</link>
    <pubDate>Thu, 02 Aug 2018 18:30:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 378: Two-Factor Fraud</title>
  <link>https://techsnap.systems/378</link>
  <guid isPermaLink="false">3ec742ee-24f7-4eee-a5a0-c40c5248e31b</guid>
  <pubDate>Thu, 02 Aug 2018 18:30:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/3ec742ee-24f7-4eee-a5a0-c40c5248e31b.mp3" length="27355773" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Reddit’s Two Factor procedures fail, while Google’s prevents years of attacks. We’ll look at the different approaches, and discuss the fundamental weakness of Reddit’s approach.</itunes:subtitle>
  <itunes:duration>31:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Reddit’s Two Factor procedures fail, while Google’s prevents years of attacks. We’ll look at the different approaches, and discuss the fundamental weakness of Reddit’s approach.
Plus a Spectre attack over the network, BGP issues take out Telegram, and more! 
</description>
  <itunes:keywords>Spectre, NetSpectre, Verizon leak, S3, NICE, BGP, Telegram, Duo Security, Cisco, Two-Factor Authentication, SMS, Sysadmin Podcast, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Reddit’s Two Factor procedures fail, while Google’s prevents years of attacks. We’ll look at the different approaches, and discuss the fundamental weakness of Reddit’s approach.</p>

<p>Plus a Spectre attack over the network, BGP issues take out Telegram, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Hey, don&#39;t route the messenger! Telegram redirected through Iran by baffling BGP leak" rel="nofollow" href="https://www.theregister.co.uk/2018/08/01/bgp_route_leak_telegram_iran/">Hey, don't route the messenger! Telegram redirected through Iran by baffling BGP leak</a></li><li><a title="Finding and Diagnosing BGP Route Leaks" rel="nofollow" href="https://blog.thousandeyes.com/finding-and-diagnosing-bgp-route-leaks/">Finding and Diagnosing BGP Route Leaks</a></li><li><a title="Cloud Leak: How A Verizon Partner Exposed Millions of Customer Accounts" rel="nofollow" href="https://www.upguard.com/breaches/verizon-cloud-leak">Cloud Leak: How A Verizon Partner Exposed Millions of Customer Accounts</a></li><li><a title="New Spectre attack enables secrets to be leaked over a network" rel="nofollow" href="https://arstechnica.com/gadgets/2018/07/new-spectre-attack-enables-secrets-to-be-leaked-over-a-network/">New Spectre attack enables secrets to be leaked over a network</a></li><li><a title="NetSpectre: Read Arbitrary Memory over Network" rel="nofollow" href="https://arxiv.org/abs/1807.10535">NetSpectre: Read Arbitrary Memory over Network</a></li><li><a title="Password breach teaches Reddit that, yes, phone-based 2FA is that bad" rel="nofollow" href="https://arstechnica.com/information-technology/2018/08/password-breach-teaches-reddit-that-yes-phone-based-2fa-is-that-bad/">Password breach teaches Reddit that, yes, phone-based 2FA is that bad</a></li><li><a title="We had a security incident." rel="nofollow" href="https://www.reddit.com/r/announcements/comments/93qnm5/we_had_a_security_incident_heres_what_you_need_to/?st=JKBEHH8G&amp;sh=562ab497">We had a security incident.</a></li><li><a title="Google Employees Use a Physical Token as Their Second Authentication Factor" rel="nofollow" href="https://www.schneier.com/blog/archives/2018/07/google_employee.html">Google Employees Use a Physical Token as Their Second Authentication Factor</a></li><li><a title="Cisco is buying Duo Security for $2.35B in cash" rel="nofollow" href="https://techcrunch.com/2018/08/02/cisco-is-buying-duo-security-for-2-35b-in-cash/">Cisco is buying Duo Security for $2.35B in cash</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Reddit’s Two Factor procedures fail, while Google’s prevents years of attacks. We’ll look at the different approaches, and discuss the fundamental weakness of Reddit’s approach.</p>

<p>Plus a Spectre attack over the network, BGP issues take out Telegram, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Hey, don&#39;t route the messenger! Telegram redirected through Iran by baffling BGP leak" rel="nofollow" href="https://www.theregister.co.uk/2018/08/01/bgp_route_leak_telegram_iran/">Hey, don't route the messenger! Telegram redirected through Iran by baffling BGP leak</a></li><li><a title="Finding and Diagnosing BGP Route Leaks" rel="nofollow" href="https://blog.thousandeyes.com/finding-and-diagnosing-bgp-route-leaks/">Finding and Diagnosing BGP Route Leaks</a></li><li><a title="Cloud Leak: How A Verizon Partner Exposed Millions of Customer Accounts" rel="nofollow" href="https://www.upguard.com/breaches/verizon-cloud-leak">Cloud Leak: How A Verizon Partner Exposed Millions of Customer Accounts</a></li><li><a title="New Spectre attack enables secrets to be leaked over a network" rel="nofollow" href="https://arstechnica.com/gadgets/2018/07/new-spectre-attack-enables-secrets-to-be-leaked-over-a-network/">New Spectre attack enables secrets to be leaked over a network</a></li><li><a title="NetSpectre: Read Arbitrary Memory over Network" rel="nofollow" href="https://arxiv.org/abs/1807.10535">NetSpectre: Read Arbitrary Memory over Network</a></li><li><a title="Password breach teaches Reddit that, yes, phone-based 2FA is that bad" rel="nofollow" href="https://arstechnica.com/information-technology/2018/08/password-breach-teaches-reddit-that-yes-phone-based-2fa-is-that-bad/">Password breach teaches Reddit that, yes, phone-based 2FA is that bad</a></li><li><a title="We had a security incident." rel="nofollow" href="https://www.reddit.com/r/announcements/comments/93qnm5/we_had_a_security_incident_heres_what_you_need_to/?st=JKBEHH8G&amp;sh=562ab497">We had a security incident.</a></li><li><a title="Google Employees Use a Physical Token as Their Second Authentication Factor" rel="nofollow" href="https://www.schneier.com/blog/archives/2018/07/google_employee.html">Google Employees Use a Physical Token as Their Second Authentication Factor</a></li><li><a title="Cisco is buying Duo Security for $2.35B in cash" rel="nofollow" href="https://techcrunch.com/2018/08/02/cisco-is-buying-duo-security-for-2-35b-in-cash/">Cisco is buying Duo Security for $2.35B in cash</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 356: The Concern with Containers</title>
  <link>https://techsnap.systems/356</link>
  <guid isPermaLink="false">0d9f7516-90f2-4dd5-82e4-3bb92e6de943</guid>
  <pubDate>Thu, 15 Feb 2018 13:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/0d9f7516-90f2-4dd5-82e4-3bb92e6de943.mp3" length="27434183" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>The problems containers can’t solve, nasty security flaws in Skype and Telegram, and Cisco discovers they have a bigger issue on their hands then first realized. </itunes:subtitle>
  <itunes:duration>37:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>The problems containers can’t solve, nasty security flaws in Skype and Telegram, and Cisco discovers they have a bigger issue on their hands then first realized. 
And the latest jaw-dropping techniques to extract data from air-gapped systems. 
</description>
  <content:encoded>
    <![CDATA[<p>The problems containers can’t solve, nasty security flaws in Skype and Telegram, and Cisco discovers they have a bigger issue on their hands then first realized. </p>

<p>And the latest jaw-dropping techniques to extract data from air-gapped systems.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Skype can&#39;t fix a nasty security bug without a massive code rewrite" rel="nofollow" href="http://www.zdnet.com/article/skype-cannot-fix-security-bug-without-a-massive-code-rewrite/">Skype can't fix a nasty security bug without a massive code rewrite</a> &mdash; The bug grants a low-level user access to every corner of the operating system.</li><li><a title="Zero-day vulnerability in Telegram" rel="nofollow" href="https://securelist.com/zero-day-vulnerability-in-telegram/83800/">Zero-day vulnerability in Telegram</a> &mdash; The special nonprinting right-to-left override (RLO) character is used to reverse the order of the characters that come after that character in the string. In the Unicode character table, it is represented as ‘U+202E’; one area of legitimate use is when typing Arabic text. In an attack, this character can be used to mislead the victim. It is usually used when displaying the name and extension of an executable file: a piece of software vulnerable to this sort of attack will display the filename incompletely or in reverse.</li><li><a title="Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability" rel="nofollow" href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1?source=infected.io-telegram">Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability</a> &mdash; After further investigation, Cisco has identified additional attack vectors and features that are affected by this vulnerability. In addition, it was also found that the original fix was incomplete so new fixed code versions are now available. </li><li><a title="Microsoft To Embrace Decentralized Identity Systems Built On Bitcoin And Other Blockchains" rel="nofollow" href="https://www.forbes.com/sites/ktorpey/2018/02/12/microsoft-to-embrace-decentralized-identity-systems-built-on-bitcoin-and-other-blockchains/#76af78a45ada">Microsoft To Embrace Decentralized Identity Systems Built On Bitcoin And Other Blockchains</a> &mdash; In a new post today, Microsoft announced their embrace of public blockchains, such as Bitcoin and Ethereum, for use in decentralized identity systems.</li><li><a title="XRballer comments on The Stolen XRB has already been Redistributed/Sold Off" rel="nofollow" href="https://www.reddit.com/r/CryptoCurrency/comments/7wonkf/the_stolen_xrb_has_already_been_redistributedsold/du215tr/">XRballer comments on The Stolen XRB has already been Redistributed/Sold Off</a> &mdash; But this check was only on java-script client side, you find the js which is sending the request, then you inspect element - console, and run the java-script manually, to send a request for withdrawal of a higher amount than in your balance.</li><li><a title="Containers Will Not Fix Your Broken Culture" rel="nofollow" href="https://queue.acm.org/detail.cfm?id=3185224">Containers Will Not Fix Your Broken Culture</a> &mdash; Spoiler alert: the solutions to many difficulties that seem technical can be found by examining our interactions with others. Let's talk about five things you'll want to know when working with those pesky creatures known as humans.</li><li><a title="Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields" rel="nofollow" href="https://arxiv.org/abs/1802.02700">Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields</a> &mdash; In this paper, we show how attackers can bypass Faraday cages and air-gaps in order to leak data from highly secure computers. </li><li><a title="Feedback: BeyondCorp" rel="nofollow" href="http://pastedown.ctrl-c.us/#RP5t3LFg3gLPAoBi70ua6IyQJGo.markdown">Feedback: BeyondCorp</a></li><li><a title="Feedback: Mgmt" rel="nofollow" href="http://pastedown.ctrl-c.us/#2jhTp3-geBThElev10Bg9oFRHm4.markdown">Feedback: Mgmt</a></li><li><a title="Feedback: SuperMicro Mobo?" rel="nofollow" href="http://pastedown.ctrl-c.us/#U4lx-Ttdf1fcuRyMeWoF6JKsNVo.markdown">Feedback: SuperMicro Mobo?</a></li><li><a title="Super Micro Computer X8DTN+" rel="nofollow" href="https://www.supermicro.com/products/motherboard/QPI/5500/X8DTN_.cfm?IPMI=O">Super Micro Computer X8DTN+</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The problems containers can’t solve, nasty security flaws in Skype and Telegram, and Cisco discovers they have a bigger issue on their hands then first realized. </p>

<p>And the latest jaw-dropping techniques to extract data from air-gapped systems.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Skype can&#39;t fix a nasty security bug without a massive code rewrite" rel="nofollow" href="http://www.zdnet.com/article/skype-cannot-fix-security-bug-without-a-massive-code-rewrite/">Skype can't fix a nasty security bug without a massive code rewrite</a> &mdash; The bug grants a low-level user access to every corner of the operating system.</li><li><a title="Zero-day vulnerability in Telegram" rel="nofollow" href="https://securelist.com/zero-day-vulnerability-in-telegram/83800/">Zero-day vulnerability in Telegram</a> &mdash; The special nonprinting right-to-left override (RLO) character is used to reverse the order of the characters that come after that character in the string. In the Unicode character table, it is represented as ‘U+202E’; one area of legitimate use is when typing Arabic text. In an attack, this character can be used to mislead the victim. It is usually used when displaying the name and extension of an executable file: a piece of software vulnerable to this sort of attack will display the filename incompletely or in reverse.</li><li><a title="Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability" rel="nofollow" href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1?source=infected.io-telegram">Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability</a> &mdash; After further investigation, Cisco has identified additional attack vectors and features that are affected by this vulnerability. In addition, it was also found that the original fix was incomplete so new fixed code versions are now available. </li><li><a title="Microsoft To Embrace Decentralized Identity Systems Built On Bitcoin And Other Blockchains" rel="nofollow" href="https://www.forbes.com/sites/ktorpey/2018/02/12/microsoft-to-embrace-decentralized-identity-systems-built-on-bitcoin-and-other-blockchains/#76af78a45ada">Microsoft To Embrace Decentralized Identity Systems Built On Bitcoin And Other Blockchains</a> &mdash; In a new post today, Microsoft announced their embrace of public blockchains, such as Bitcoin and Ethereum, for use in decentralized identity systems.</li><li><a title="XRballer comments on The Stolen XRB has already been Redistributed/Sold Off" rel="nofollow" href="https://www.reddit.com/r/CryptoCurrency/comments/7wonkf/the_stolen_xrb_has_already_been_redistributedsold/du215tr/">XRballer comments on The Stolen XRB has already been Redistributed/Sold Off</a> &mdash; But this check was only on java-script client side, you find the js which is sending the request, then you inspect element - console, and run the java-script manually, to send a request for withdrawal of a higher amount than in your balance.</li><li><a title="Containers Will Not Fix Your Broken Culture" rel="nofollow" href="https://queue.acm.org/detail.cfm?id=3185224">Containers Will Not Fix Your Broken Culture</a> &mdash; Spoiler alert: the solutions to many difficulties that seem technical can be found by examining our interactions with others. Let's talk about five things you'll want to know when working with those pesky creatures known as humans.</li><li><a title="Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields" rel="nofollow" href="https://arxiv.org/abs/1802.02700">Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields</a> &mdash; In this paper, we show how attackers can bypass Faraday cages and air-gaps in order to leak data from highly secure computers. </li><li><a title="Feedback: BeyondCorp" rel="nofollow" href="http://pastedown.ctrl-c.us/#RP5t3LFg3gLPAoBi70ua6IyQJGo.markdown">Feedback: BeyondCorp</a></li><li><a title="Feedback: Mgmt" rel="nofollow" href="http://pastedown.ctrl-c.us/#2jhTp3-geBThElev10Bg9oFRHm4.markdown">Feedback: Mgmt</a></li><li><a title="Feedback: SuperMicro Mobo?" rel="nofollow" href="http://pastedown.ctrl-c.us/#U4lx-Ttdf1fcuRyMeWoF6JKsNVo.markdown">Feedback: SuperMicro Mobo?</a></li><li><a title="Super Micro Computer X8DTN+" rel="nofollow" href="https://www.supermicro.com/products/motherboard/QPI/5500/X8DTN_.cfm?IPMI=O">Super Micro Computer X8DTN+</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
