<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 01 May 2026 22:40:49 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Default Ftp Password”</title>
    <link>https://techsnap.systems/tags/default%20ftp%20password</link>
    <pubDate>Fri, 13 Jul 2018 05:00:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 374: Quantum Resistant Encryption</title>
  <link>https://techsnap.systems/374</link>
  <guid isPermaLink="false">7a87af82-bd6a-4e38-8986-767b339b094b</guid>
  <pubDate>Fri, 13 Jul 2018 05:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/7a87af82-bd6a-4e38-8986-767b339b094b.mp3" length="40621792" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Good progress is being made on post-quantum resilient computing. We’ll explain how they’re achieving it, the risks facing traditional cryptography.</itunes:subtitle>
  <itunes:duration>47:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>&lt;p&gt;Good progress is being made on post-quantum resilient computing. We’ll explain how they’re achieving it, the risks facing traditional cryptography.&lt;/p&gt;

&lt;p&gt;Plus how bad defaults led to the theft of military Drone docs, new attacks against LTE networks, more!&lt;/p&gt;
</description>
  <itunes:keywords>Quantum Computing, cryptography, qubits, Post-Quantum Cryptography project, Timehop, Default FTP Password, Netgear, Nighthawk R7000, MQ-9 Reaper, post-quantum resistance, LTE attack, alter attack, sysadmin podcast, techsnap</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Good progress is being made on post-quantum resilient computing. We’ll explain how they’re achieving it, the risks facing traditional cryptography.</p>

<p>Plus how bad defaults led to the theft of military Drone docs, new attacks against LTE networks, more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Hacker Steals Military Docs Because Someone Didn’t Change a Default FTP Password" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/hacker-steals-military-docs-because-someone-didn-t-change-a-default-ftp-password/">Hacker Steals Military Docs Because Someone Didn’t Change a Default FTP Password</a></li><li><a title="Year-Old Critical Vulnerabilities Patched in ISP Broadband Gear | The first stop for security news" rel="nofollow" href="https://threatpost.com/year-old-critical-vulnerabilities-patched-in-isp-broadband-gear/133702/">Year-Old Critical Vulnerabilities Patched in ISP Broadband Gear | The first stop for security news</a></li><li><a title="Timehop admits that additional personal data was compromised in breach" rel="nofollow" href="https://techcrunch.com/2018/07/11/timehop-data-breach/">Timehop admits that additional personal data was compromised in breach</a></li><li><a title="Researchers Uncover New Attacks Against LTE Network Protocol" rel="nofollow" href="https://thehackernews.com/2018/06/4g-lte-network-hacking.html">Researchers Uncover New Attacks Against LTE Network Protocol</a></li><li><a title="Breaking LTE on Layer Two" rel="nofollow" href="https://www.alter-attack.net/">Breaking LTE on Layer Two</a></li><li><a title="Nintendo reportedly rolling out new, more hack-resistant Switch hardware" rel="nofollow" href="https://arstechnica.com/gaming/2018/07/nintendo-reportedly-rolling-out-new-more-hack-proof-switch-hardware/">Nintendo reportedly rolling out new, more hack-resistant Switch hardware</a></li><li><a title="Wire and post-quantum resistance" rel="nofollow" href="https://blog.wire.com/blog/post-quantum-resistance-wire/">Wire and post-quantum resistance</a></li><li><a title="What is quantum computing?" rel="nofollow" href="https://www.research.ibm.com/ibm-q/learn/what-is-quantum-computing/">What is quantum computing?</a></li><li><a title="Quantum Computing and its Impact on Cryptography" rel="nofollow" href="https://www.cryptomathic.com/news-events/blog/quantum-computing-and-its-impact-on-cryptography">Quantum Computing and its Impact on Cryptography</a></li><li><a title="Why Quantum Computers Might Not Break Cryptography" rel="nofollow" href="https://www.quantamagazine.org/why-quantum-computers-might-not-break-cryptography-20170515/">Why Quantum Computers Might Not Break Cryptography</a></li><li><a title="Remote Manage Linux Boxes?" rel="nofollow" href="https://pastebin.com/fb7qDb9q">Remote Manage Linux Boxes?</a></li><li><a title="Learning OpenStack?" rel="nofollow" href="https://pastebin.com/JQspmLM9">Learning OpenStack?</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Good progress is being made on post-quantum resilient computing. We’ll explain how they’re achieving it, the risks facing traditional cryptography.</p>

<p>Plus how bad defaults led to the theft of military Drone docs, new attacks against LTE networks, more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Hacker Steals Military Docs Because Someone Didn’t Change a Default FTP Password" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/hacker-steals-military-docs-because-someone-didn-t-change-a-default-ftp-password/">Hacker Steals Military Docs Because Someone Didn’t Change a Default FTP Password</a></li><li><a title="Year-Old Critical Vulnerabilities Patched in ISP Broadband Gear | The first stop for security news" rel="nofollow" href="https://threatpost.com/year-old-critical-vulnerabilities-patched-in-isp-broadband-gear/133702/">Year-Old Critical Vulnerabilities Patched in ISP Broadband Gear | The first stop for security news</a></li><li><a title="Timehop admits that additional personal data was compromised in breach" rel="nofollow" href="https://techcrunch.com/2018/07/11/timehop-data-breach/">Timehop admits that additional personal data was compromised in breach</a></li><li><a title="Researchers Uncover New Attacks Against LTE Network Protocol" rel="nofollow" href="https://thehackernews.com/2018/06/4g-lte-network-hacking.html">Researchers Uncover New Attacks Against LTE Network Protocol</a></li><li><a title="Breaking LTE on Layer Two" rel="nofollow" href="https://www.alter-attack.net/">Breaking LTE on Layer Two</a></li><li><a title="Nintendo reportedly rolling out new, more hack-resistant Switch hardware" rel="nofollow" href="https://arstechnica.com/gaming/2018/07/nintendo-reportedly-rolling-out-new-more-hack-proof-switch-hardware/">Nintendo reportedly rolling out new, more hack-resistant Switch hardware</a></li><li><a title="Wire and post-quantum resistance" rel="nofollow" href="https://blog.wire.com/blog/post-quantum-resistance-wire/">Wire and post-quantum resistance</a></li><li><a title="What is quantum computing?" rel="nofollow" href="https://www.research.ibm.com/ibm-q/learn/what-is-quantum-computing/">What is quantum computing?</a></li><li><a title="Quantum Computing and its Impact on Cryptography" rel="nofollow" href="https://www.cryptomathic.com/news-events/blog/quantum-computing-and-its-impact-on-cryptography">Quantum Computing and its Impact on Cryptography</a></li><li><a title="Why Quantum Computers Might Not Break Cryptography" rel="nofollow" href="https://www.quantamagazine.org/why-quantum-computers-might-not-break-cryptography-20170515/">Why Quantum Computers Might Not Break Cryptography</a></li><li><a title="Remote Manage Linux Boxes?" rel="nofollow" href="https://pastebin.com/fb7qDb9q">Remote Manage Linux Boxes?</a></li><li><a title="Learning OpenStack?" rel="nofollow" href="https://pastebin.com/JQspmLM9">Learning OpenStack?</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
