<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 03 Apr 2026 15:25:57 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Epyc”</title>
    <link>https://techsnap.systems/tags/epyc</link>
    <pubDate>Fri, 01 May 2020 00:15:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>428: RAID Reality Check</title>
  <link>https://techsnap.systems/428</link>
  <guid isPermaLink="false">5556e3df-292d-4b0b-8e25-27f071862c06</guid>
  <pubDate>Fri, 01 May 2020 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/5556e3df-292d-4b0b-8e25-27f071862c06.mp3" length="25930419" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.</itunes:subtitle>
  <itunes:duration>36:00</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.
Plus Cloudflare steps up its campaign to secure BGP, and why you might want to trade in cron for systemd timers. 
</description>
  <itunes:keywords>DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, sysadmin podcast, EPYC, Threadripper, AMD, 7FX2, CPU, per-core performance, Intel, Threadripper, TDP, energy efficiency, RAID, md-raid, ZFS, hard disk performance, iops, hard drive, storage, Seagate, Iron Wolf, raidz, raidz2, RAID-5, RAID-6, RAID-10, ZFS, backups, fio, benchmarking, data integrity, BGP, Cloudflare, networking, RPKI, security, cryptography, route leak, routing, isbgpsafeyet, internet, systemd, systemd timers, cron, email, monitoring, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.</p>

<p>Plus Cloudflare steps up its campaign to secure BGP, and why you might want to trade in cron for systemd timers.</p><p>Links:</p><ul><li><a title="AMD Claims World’s Fastest Per-Core Performance with New EPYC Rome 7Fx2 CPUs" rel="nofollow" href="https://www.tomshardware.com/news/amd-worlds-fastest-processor-epyc-rome-7fx2-cpus">AMD Claims World’s Fastest Per-Core Performance with New EPYC Rome 7Fx2 CPUs</a></li><li><a title="AMD EPYC 7F52 Linux Performance - AMD 7FX2 CPUs Further Increasing The Fight Against Intel Xeon Review" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=amd-epyc-7f52&amp;num=1">AMD EPYC 7F52 Linux Performance - AMD 7FX2 CPUs Further Increasing The Fight Against Intel Xeon Review</a></li><li><a title="Understanding RAID: How performance scales from one disk to eight" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/understanding-raid-how-performance-scales-from-one-disk-to-eight/">Understanding RAID: How performance scales from one disk to eight</a></li><li><a title="New Cloudflare tool can tell you if your ISP has deployed BGP fixes" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/new-cloudflare-tool-can-tell-you-if-your-isp-has-deployed-bgp-fixes/">New Cloudflare tool can tell you if your ISP has deployed BGP fixes</a></li><li><a title="Is BGP safe yet?" rel="nofollow" href="https://isbgpsafeyet.com/">Is BGP safe yet?</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="Why I Prefer systemd Timers Over Cron – Thomas Stringer" rel="nofollow" href="https://trstringer.com/systemd-timer-vs-cronjob/">Why I Prefer systemd Timers Over Cron – Thomas Stringer</a></li><li><a title="systemd/Timers - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/Systemd/Timers">systemd/Timers - ArchWiki</a></li><li><a title="systemd.time (Time format docs)" rel="nofollow" href="https://www.freedesktop.org/software/systemd/man/systemd.time.html">systemd.time (Time format docs)</a></li><li><a title="systemd.timer (Unit docs)" rel="nofollow" href="https://www.freedesktop.org/software/systemd/man/systemd.timer.html">systemd.timer (Unit docs)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.</p>

<p>Plus Cloudflare steps up its campaign to secure BGP, and why you might want to trade in cron for systemd timers.</p><p>Links:</p><ul><li><a title="AMD Claims World’s Fastest Per-Core Performance with New EPYC Rome 7Fx2 CPUs" rel="nofollow" href="https://www.tomshardware.com/news/amd-worlds-fastest-processor-epyc-rome-7fx2-cpus">AMD Claims World’s Fastest Per-Core Performance with New EPYC Rome 7Fx2 CPUs</a></li><li><a title="AMD EPYC 7F52 Linux Performance - AMD 7FX2 CPUs Further Increasing The Fight Against Intel Xeon Review" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=amd-epyc-7f52&amp;num=1">AMD EPYC 7F52 Linux Performance - AMD 7FX2 CPUs Further Increasing The Fight Against Intel Xeon Review</a></li><li><a title="Understanding RAID: How performance scales from one disk to eight" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/understanding-raid-how-performance-scales-from-one-disk-to-eight/">Understanding RAID: How performance scales from one disk to eight</a></li><li><a title="New Cloudflare tool can tell you if your ISP has deployed BGP fixes" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/new-cloudflare-tool-can-tell-you-if-your-isp-has-deployed-bgp-fixes/">New Cloudflare tool can tell you if your ISP has deployed BGP fixes</a></li><li><a title="Is BGP safe yet?" rel="nofollow" href="https://isbgpsafeyet.com/">Is BGP safe yet?</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="Why I Prefer systemd Timers Over Cron – Thomas Stringer" rel="nofollow" href="https://trstringer.com/systemd-timer-vs-cronjob/">Why I Prefer systemd Timers Over Cron – Thomas Stringer</a></li><li><a title="systemd/Timers - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/Systemd/Timers">systemd/Timers - ArchWiki</a></li><li><a title="systemd.time (Time format docs)" rel="nofollow" href="https://www.freedesktop.org/software/systemd/man/systemd.time.html">systemd.time (Time format docs)</a></li><li><a title="systemd.timer (Unit docs)" rel="nofollow" href="https://www.freedesktop.org/software/systemd/man/systemd.timer.html">systemd.timer (Unit docs)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>424: AMD Inside</title>
  <link>https://techsnap.systems/424</link>
  <guid isPermaLink="false">770823cf-5179-4132-91fb-d67d5ddd5ff4</guid>
  <pubDate>Fri, 06 Mar 2020 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/770823cf-5179-4132-91fb-d67d5ddd5ff4.mp3" length="20391102" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.</itunes:subtitle>
  <itunes:duration>28:19</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.  
Plus Mozilla's rollout of DNS over HTTPS has begun, a big milestone for Let's Encrypt, and more. 
</description>
  <itunes:keywords>Performance per watt, power consumption, energy, CPU, AMD, Intel, EPYC, memory encryption, SGX, SME, TSME, TME, MKTME, security, encryption, Let's Encrypt, HTTPS, SSL, TLS, web security, DoH, DNS over HTTPS, DNS, Cloudflare, Mozilla, Firefox, kr00k, KRACK, WiFi, VPN, WPA2, ESET, wireless, Broadcom, Apple, iPhone, Microsoft Edge, Edge, Microsoft, Chrome, Google, Chromium, open source, NextDNS, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.  </p>

<p>Plus Mozilla&#39;s rollout of DNS over HTTPS has begun, a big milestone for Let&#39;s Encrypt, and more.</p><p>Links:</p><ul><li><a title="Firefox continues push to bring DNS over HTTPS by default for US users - The Mozilla Blog" rel="nofollow" href="https://blog.mozilla.org/blog/2020/02/25/firefox-continues-push-to-bring-dns-over-https-by-default-for-us-users/">Firefox continues push to bring DNS over HTTPS by default for US users - The Mozilla Blog</a></li><li><a title="The Facts: Mozilla’s DNS over HTTPs (DoH)" rel="nofollow" href="https://blog.mozilla.org/netpolicy/2020/02/25/the-facts-mozillas-dns-over-https-doh/">The Facts: Mozilla’s DNS over HTTPs (DoH)</a></li><li><a title="Security/DOH-resolver-policy - MozillaWiki" rel="nofollow" href="https://wiki.mozilla.org/Security/DOH-resolver-policy">Security/DOH-resolver-policy - MozillaWiki</a></li><li><a title="HTTPS for all: Let’s Encrypt reaches one billion certificates issued | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/lets-encrypt-issued-its-billionth-certificate-today/">HTTPS for all: Let’s Encrypt reaches one billion certificates issued | Ars Technica</a></li><li><a title="Let’s Encrypt Has Issued a Billion Certificates - Let’s Encrypt - Free SSL/TLS Certificates" rel="nofollow" href="https://letsencrypt.org/2020/02/27/one-billion-certs.html">Let’s Encrypt Has Issued a Billion Certificates - Let’s Encrypt - Free SSL/TLS Certificates</a></li><li><a title="Let’s Encrypt: A History - The Morning Paper" rel="nofollow" href="https://blog.acolyer.org/2020/02/12/lets-encrypt-an-automated-certificate-authority-to-encrypt-the-entire-web/">Let’s Encrypt: A History - The Morning Paper</a></li><li><a title="Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months • The Register" rel="nofollow" href="https://www.theregister.co.uk/2020/02/20/apple_shorter_cert_lifetime/">Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months • The Register</a></li><li><a title="Ballot SC22: Reduce Certificate Lifetimes" rel="nofollow" href="https://scotthelme.co.uk/ballot-sc22-reduce-certificate-lifetimes/">Ballot SC22: Reduce Certificate Lifetimes</a></li><li><a title="Google Chrome’s fear of Microsoft Edge is revealing its bad side" rel="nofollow" href="https://www.laptopmag.com/news/googles-fear-of-microsoft-edge-is-revealing-its-bad-side">Google Chrome’s fear of Microsoft Edge is revealing its bad side</a></li><li><a title="Microsoft shares a roadmap for the new Microsoft Edge" rel="nofollow" href="https://www.windowscentral.com/microsoft-shares-roadmap-new-microsoft-edges-upcoming-features">Microsoft shares a roadmap for the new Microsoft Edge</a></li><li><a title="Microsoft Edge: Top Feedback Summary for March 4" rel="nofollow" href="https://techcommunity.microsoft.com/t5/discussions/top-feedback-summary-for-march-4/m-p/1209808">Microsoft Edge: Top Feedback Summary for March 4</a></li><li><a title="Download Microsoft Edge Insider Channels" rel="nofollow" href="https://www.microsoftedgeinsider.com/en-us/download/">Download Microsoft Edge Insider Channels</a></li><li><a title="Flaw in billions of Wi-Fi devices left communications open to eavesdropping | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2020/02/flaw-in-billions-of-wi-fi-devices-left-communications-open-to-eavesdroppng/">Flaw in billions of Wi-Fi devices left communications open to eavesdropping | Ars Technica</a></li><li><a title="kr00k: A serious vulnerability deep inside Wi-Fi encryption" rel="nofollow" href="https://www.eset.com/int/kr00k/">kr00k: A serious vulnerability deep inside Wi-Fi encryption</a></li><li><a title="Kr00k Paper" rel="nofollow" href="https://www.welivesecurity.com/wp-content/uploads/2020/02/ESET_Kr00k.pdf">Kr00k Paper</a></li><li><a title="Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers" rel="nofollow" href="https://blog.cloudflare.com/technical-details-of-why-cloudflare-chose-amd-epyc-for-gen-x-servers/">Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers</a></li><li><a title="An EPYC trip to Rome: AMD is Cloudflare’s 10th-generation Edge server CPU" rel="nofollow" href="https://blog.cloudflare.com/an-epyc-trip-to-rome-amd-is-cloudflares-10th-generation-edge-server-cpu/">An EPYC trip to Rome: AMD is Cloudflare’s 10th-generation Edge server CPU</a></li><li><a title="Cloudflare’s Gen X: Servers for an Accelerated Future" rel="nofollow" href="https://blog.cloudflare.com/cloudflares-gen-x-servers-for-an-accelerated-future/">Cloudflare’s Gen X: Servers for an Accelerated Future</a></li><li><a title="Impact of Cache Locality" rel="nofollow" href="https://blog.cloudflare.com/impact-of-cache-locality/">Impact of Cache Locality</a></li><li><a title="Gen X Performance Tuning" rel="nofollow" href="https://blog.cloudflare.com/gen-x-performance-tuning/">Gen X Performance Tuning</a></li><li><a title="Securing Memory at EPYC Scale" rel="nofollow" href="https://blog.cloudflare.com/securing-memory-at-epyc-scale/">Securing Memory at EPYC Scale</a></li><li><a title="Intel promises Full Memory Encryption in upcoming CPUs | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/intel-promises-full-memory-encryption-in-upcoming-cpus/">Intel promises Full Memory Encryption in upcoming CPUs | Ars Technica</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.  </p>

<p>Plus Mozilla&#39;s rollout of DNS over HTTPS has begun, a big milestone for Let&#39;s Encrypt, and more.</p><p>Links:</p><ul><li><a title="Firefox continues push to bring DNS over HTTPS by default for US users - The Mozilla Blog" rel="nofollow" href="https://blog.mozilla.org/blog/2020/02/25/firefox-continues-push-to-bring-dns-over-https-by-default-for-us-users/">Firefox continues push to bring DNS over HTTPS by default for US users - The Mozilla Blog</a></li><li><a title="The Facts: Mozilla’s DNS over HTTPs (DoH)" rel="nofollow" href="https://blog.mozilla.org/netpolicy/2020/02/25/the-facts-mozillas-dns-over-https-doh/">The Facts: Mozilla’s DNS over HTTPs (DoH)</a></li><li><a title="Security/DOH-resolver-policy - MozillaWiki" rel="nofollow" href="https://wiki.mozilla.org/Security/DOH-resolver-policy">Security/DOH-resolver-policy - MozillaWiki</a></li><li><a title="HTTPS for all: Let’s Encrypt reaches one billion certificates issued | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/lets-encrypt-issued-its-billionth-certificate-today/">HTTPS for all: Let’s Encrypt reaches one billion certificates issued | Ars Technica</a></li><li><a title="Let’s Encrypt Has Issued a Billion Certificates - Let’s Encrypt - Free SSL/TLS Certificates" rel="nofollow" href="https://letsencrypt.org/2020/02/27/one-billion-certs.html">Let’s Encrypt Has Issued a Billion Certificates - Let’s Encrypt - Free SSL/TLS Certificates</a></li><li><a title="Let’s Encrypt: A History - The Morning Paper" rel="nofollow" href="https://blog.acolyer.org/2020/02/12/lets-encrypt-an-automated-certificate-authority-to-encrypt-the-entire-web/">Let’s Encrypt: A History - The Morning Paper</a></li><li><a title="Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months • The Register" rel="nofollow" href="https://www.theregister.co.uk/2020/02/20/apple_shorter_cert_lifetime/">Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months • The Register</a></li><li><a title="Ballot SC22: Reduce Certificate Lifetimes" rel="nofollow" href="https://scotthelme.co.uk/ballot-sc22-reduce-certificate-lifetimes/">Ballot SC22: Reduce Certificate Lifetimes</a></li><li><a title="Google Chrome’s fear of Microsoft Edge is revealing its bad side" rel="nofollow" href="https://www.laptopmag.com/news/googles-fear-of-microsoft-edge-is-revealing-its-bad-side">Google Chrome’s fear of Microsoft Edge is revealing its bad side</a></li><li><a title="Microsoft shares a roadmap for the new Microsoft Edge" rel="nofollow" href="https://www.windowscentral.com/microsoft-shares-roadmap-new-microsoft-edges-upcoming-features">Microsoft shares a roadmap for the new Microsoft Edge</a></li><li><a title="Microsoft Edge: Top Feedback Summary for March 4" rel="nofollow" href="https://techcommunity.microsoft.com/t5/discussions/top-feedback-summary-for-march-4/m-p/1209808">Microsoft Edge: Top Feedback Summary for March 4</a></li><li><a title="Download Microsoft Edge Insider Channels" rel="nofollow" href="https://www.microsoftedgeinsider.com/en-us/download/">Download Microsoft Edge Insider Channels</a></li><li><a title="Flaw in billions of Wi-Fi devices left communications open to eavesdropping | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2020/02/flaw-in-billions-of-wi-fi-devices-left-communications-open-to-eavesdroppng/">Flaw in billions of Wi-Fi devices left communications open to eavesdropping | Ars Technica</a></li><li><a title="kr00k: A serious vulnerability deep inside Wi-Fi encryption" rel="nofollow" href="https://www.eset.com/int/kr00k/">kr00k: A serious vulnerability deep inside Wi-Fi encryption</a></li><li><a title="Kr00k Paper" rel="nofollow" href="https://www.welivesecurity.com/wp-content/uploads/2020/02/ESET_Kr00k.pdf">Kr00k Paper</a></li><li><a title="Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers" rel="nofollow" href="https://blog.cloudflare.com/technical-details-of-why-cloudflare-chose-amd-epyc-for-gen-x-servers/">Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers</a></li><li><a title="An EPYC trip to Rome: AMD is Cloudflare’s 10th-generation Edge server CPU" rel="nofollow" href="https://blog.cloudflare.com/an-epyc-trip-to-rome-amd-is-cloudflares-10th-generation-edge-server-cpu/">An EPYC trip to Rome: AMD is Cloudflare’s 10th-generation Edge server CPU</a></li><li><a title="Cloudflare’s Gen X: Servers for an Accelerated Future" rel="nofollow" href="https://blog.cloudflare.com/cloudflares-gen-x-servers-for-an-accelerated-future/">Cloudflare’s Gen X: Servers for an Accelerated Future</a></li><li><a title="Impact of Cache Locality" rel="nofollow" href="https://blog.cloudflare.com/impact-of-cache-locality/">Impact of Cache Locality</a></li><li><a title="Gen X Performance Tuning" rel="nofollow" href="https://blog.cloudflare.com/gen-x-performance-tuning/">Gen X Performance Tuning</a></li><li><a title="Securing Memory at EPYC Scale" rel="nofollow" href="https://blog.cloudflare.com/securing-memory-at-epyc-scale/">Securing Memory at EPYC Scale</a></li><li><a title="Intel promises Full Memory Encryption in upcoming CPUs | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/intel-promises-full-memory-encryption-in-upcoming-cpus/">Intel promises Full Memory Encryption in upcoming CPUs | Ars Technica</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>411: Mobile Security Mistakes</title>
  <link>https://techsnap.systems/411</link>
  <guid isPermaLink="false">b9fd8f0e-82a3-44bb-b373-eea0ac62412d</guid>
  <pubDate>Fri, 06 Sep 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/b9fd8f0e-82a3-44bb-b373-eea0ac62412d.mp3" length="21338406" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</itunes:subtitle>
  <itunes:duration>29:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.
Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD's Epyc CPUs. 
</description>
  <itunes:keywords>iOS, iPhone, mobile, mobile apps, app security, Apple, jailbreak, security, mobile security, exploit chain, zeroday, project zero, google, libxpc, IPC, webkit, malware, android, v4l2, video4linux, privilege escalation, AMD, Epyc, NUMA, benchmarks, exploit market, Zerodium, cpu load balancing, linux, open source, USB, USB4, USB-C, Thunderbolt, USB Power Delivery, sysadmin podcast, DevOps, TechSNAP, jupiter broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</p>

<p>Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD&#39;s Epyc CPUs.</p><p>Links:</p><ul><li><a title="Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian" rel="nofollow" href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says">Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian</a> &mdash; Their location was uploaded every minute; their device’s keychain, containing all their passwords, was uploaded, as were their chat histories on popular apps including WhatsApp, Telegram and iMessage, their address book, and their Gmail database.</li><li><a title="Project Zero: A very deep dive into iOS Exploit chains found in the wild" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html">Project Zero: A very deep dive into iOS Exploit chains found in the wild</a> &mdash; We discovered exploits for a total of fourteen vulnerabilities across the five exploit chains: seven for the iPhone’s web browser, five for the kernel and two separate sandbox escapes. </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 1" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-1.html">Project Zero: In-the-wild iOS Exploit Chain 1</a> &mdash; This exploit provides evidence that these exploit chains were likely written contemporaneously with their supported iOS versions; that is, the exploit techniques which were used suggest that this exploit was written around the time of iOS 10. This suggests that this group had a capability against a fully patched iPhone for at least two years.  </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 3" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-3.html">Project Zero: In-the-wild iOS Exploit Chain 3</a> &mdash; It’s difficult to understand how this error could be introduced into a core IPC library that shipped to end users. While errors are common in software development, a serious one like this should have quickly been found by a unit test, code review or even fuzzing. </li><li><a title="Project Zero: JSC Exploits" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/jsc-exploits.html">Project Zero: JSC Exploits</a> &mdash; In this post, we will take a look at the WebKit exploits used to gain an initial foothold onto the iOS device and stage the privilege escalation exploits. All exploits here achieve shellcode execution inside the sandboxed renderer process (WebContent) on iOS.</li><li><a title="Project Zero: Implant Teardown" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html">Project Zero: Implant Teardown</a> &mdash; There is no visual indicator on the device that the implant is running. There's no way for a user on iOS to view a process listing, so the implant binary makes no attempt to hide its execution from the system. The implant is primarily focused on stealing files and uploading live location data. The implant requests commands from a command and control server every 60 seconds.The implant has access to all the database files (on the victim’s phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage.</li><li><a title="iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources" rel="nofollow" href="https://www.forbes.com/sites/thomasbrewster/2019/09/01/iphone-hackers-caught-by-google-also-targeted-android-and-microsoft-windows-say-sources/#374244a44adf">iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources</a> &mdash; Multiple sources with knowledge of the situation said that Google’s own Android operating system and Microsoft Windows PCs were also targeted in a campaign that sought to infect the computers and smartphones of the Uighur ethnic group in China.</li><li><a title="Google&#39;s Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update" rel="nofollow" href="https://www.forbes.com/sites/jeanbaptiste/2019/09/05/googles-shocking-decision-to-ignore-a-critical-android-vulnerability-in-its-latest-security-update/#5fa2487213bb">Google's Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update</a> &mdash; Despite immediately acknowledging the vulnerability and confirming in June that it will be fixed, Google had not provided an estimated time frame for the patch.</li><li><a title="Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost" rel="nofollow" href="https://threatpost.com/android-zero-day-bug-opens-door-to-privilege-escalation-attack-researchers-warn/148014/">Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost</a> &mdash; “In the unlikely event an attacker succeeds in exploiting this bug, they would effectively have complete control over the target device,” he told Threatpost. Once an attacker obtains escalated privileges, “it means they could completely take over a device if they can convince a user to install and run their application,”</li><li><a title="Why &#39;Zero Day&#39; Android Hacking Now Costs More Than iOS Attacks | WIRED" rel="nofollow" href="https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/">Why 'Zero Day' Android Hacking Now Costs More Than iOS Attacks | WIRED</a> &mdash; "During the last few months, we have observed an increase in the number of iOS exploits, mostly Safari and iMessage chains, being developed and sold by researchers from all around the world. The zero-day market is so flooded by iOS exploits that we've recently started refusing some them"</li><li><a title="Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.4-Improve-EPYC-Balance">Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers</a> &mdash; The scheduler topology improvement by SUSE's Matt Fleming changes the behavior as currently it turns out for EPYC hardware the kernel has failed to properly load balance across NUMA nodes on different sockets. </li><li><a title="USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/usb4-is-coming-soon-and-will-mostly-unify-usb-and-thunderbolt/?comments=1&amp;start=40">USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica</a> &mdash; The USB Implementers Forum published the official USB4 protocol specification. If your initial reaction was "oh no, not again," don't worry—the new spec is backward-compatible with USB 2 and USB 3, and it uses the same USB Type-C connectors that modern USB 3 devices do.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</p>

<p>Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD&#39;s Epyc CPUs.</p><p>Links:</p><ul><li><a title="Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian" rel="nofollow" href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says">Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian</a> &mdash; Their location was uploaded every minute; their device’s keychain, containing all their passwords, was uploaded, as were their chat histories on popular apps including WhatsApp, Telegram and iMessage, their address book, and their Gmail database.</li><li><a title="Project Zero: A very deep dive into iOS Exploit chains found in the wild" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html">Project Zero: A very deep dive into iOS Exploit chains found in the wild</a> &mdash; We discovered exploits for a total of fourteen vulnerabilities across the five exploit chains: seven for the iPhone’s web browser, five for the kernel and two separate sandbox escapes. </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 1" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-1.html">Project Zero: In-the-wild iOS Exploit Chain 1</a> &mdash; This exploit provides evidence that these exploit chains were likely written contemporaneously with their supported iOS versions; that is, the exploit techniques which were used suggest that this exploit was written around the time of iOS 10. This suggests that this group had a capability against a fully patched iPhone for at least two years.  </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 3" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-3.html">Project Zero: In-the-wild iOS Exploit Chain 3</a> &mdash; It’s difficult to understand how this error could be introduced into a core IPC library that shipped to end users. While errors are common in software development, a serious one like this should have quickly been found by a unit test, code review or even fuzzing. </li><li><a title="Project Zero: JSC Exploits" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/jsc-exploits.html">Project Zero: JSC Exploits</a> &mdash; In this post, we will take a look at the WebKit exploits used to gain an initial foothold onto the iOS device and stage the privilege escalation exploits. All exploits here achieve shellcode execution inside the sandboxed renderer process (WebContent) on iOS.</li><li><a title="Project Zero: Implant Teardown" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html">Project Zero: Implant Teardown</a> &mdash; There is no visual indicator on the device that the implant is running. There's no way for a user on iOS to view a process listing, so the implant binary makes no attempt to hide its execution from the system. The implant is primarily focused on stealing files and uploading live location data. The implant requests commands from a command and control server every 60 seconds.The implant has access to all the database files (on the victim’s phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage.</li><li><a title="iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources" rel="nofollow" href="https://www.forbes.com/sites/thomasbrewster/2019/09/01/iphone-hackers-caught-by-google-also-targeted-android-and-microsoft-windows-say-sources/#374244a44adf">iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources</a> &mdash; Multiple sources with knowledge of the situation said that Google’s own Android operating system and Microsoft Windows PCs were also targeted in a campaign that sought to infect the computers and smartphones of the Uighur ethnic group in China.</li><li><a title="Google&#39;s Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update" rel="nofollow" href="https://www.forbes.com/sites/jeanbaptiste/2019/09/05/googles-shocking-decision-to-ignore-a-critical-android-vulnerability-in-its-latest-security-update/#5fa2487213bb">Google's Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update</a> &mdash; Despite immediately acknowledging the vulnerability and confirming in June that it will be fixed, Google had not provided an estimated time frame for the patch.</li><li><a title="Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost" rel="nofollow" href="https://threatpost.com/android-zero-day-bug-opens-door-to-privilege-escalation-attack-researchers-warn/148014/">Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost</a> &mdash; “In the unlikely event an attacker succeeds in exploiting this bug, they would effectively have complete control over the target device,” he told Threatpost. Once an attacker obtains escalated privileges, “it means they could completely take over a device if they can convince a user to install and run their application,”</li><li><a title="Why &#39;Zero Day&#39; Android Hacking Now Costs More Than iOS Attacks | WIRED" rel="nofollow" href="https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/">Why 'Zero Day' Android Hacking Now Costs More Than iOS Attacks | WIRED</a> &mdash; "During the last few months, we have observed an increase in the number of iOS exploits, mostly Safari and iMessage chains, being developed and sold by researchers from all around the world. The zero-day market is so flooded by iOS exploits that we've recently started refusing some them"</li><li><a title="Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.4-Improve-EPYC-Balance">Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers</a> &mdash; The scheduler topology improvement by SUSE's Matt Fleming changes the behavior as currently it turns out for EPYC hardware the kernel has failed to properly load balance across NUMA nodes on different sockets. </li><li><a title="USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/usb4-is-coming-soon-and-will-mostly-unify-usb-and-thunderbolt/?comments=1&amp;start=40">USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica</a> &mdash; The USB Implementers Forum published the official USB4 protocol specification. If your initial reaction was "oh no, not again," don't worry—the new spec is backward-compatible with USB 2 and USB 3, and it uses the same USB Type-C connectors that modern USB 3 devices do.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>407: Old School Outages</title>
  <link>https://techsnap.systems/407</link>
  <guid isPermaLink="false">a442674d-ddd6-471a-ac89-448f1d9a3284</guid>
  <pubDate>Wed, 10 Jul 2019 22:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a442674d-ddd6-471a-ac89-448f1d9a3284.mp3" length="30618354" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Jim shares his Nagios tips and Wes chimes in with some modern monitoring tools as we chat monitoring in the wake of some high-profile outages.</itunes:subtitle>
  <itunes:duration>42:31</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.
Plus we turn our eye to hardware and get excited about the latest Ryzen line from AMD. 
</description>
  <itunes:keywords>Ryzen, AMD, Epyc, Intel, CPU, server, server builds, performance, benchmarks, internet, xeon, ecc, outages, google, cloudflare, facebook, microsoft, BGP, regex, deployment, verizon, RKPI, bgp leak, internet infrastructure, monitoring, openNMS, libreNMS, nagios, zabbix, prometheus, riemann, time series, metrics, logs, logging, observability, grafana, netdata, NRPE, old school, sysadmin, infosec, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.</p>

<p>Plus we turn our eye to hardware and get excited about the latest Ryzen line from AMD.</p><p>Links:</p><ul><li><a title="Third parties confirm AMD’s outstanding Ryzen 3000 numbers | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/07/third-parties-confirm-amds-outstanding-ryzen-3000-numbers/">Third parties confirm AMD’s outstanding Ryzen 3000 numbers | Ars Technica</a> &mdash; AMD debuted its new Ryzen 3000 desktop CPU line a few weeks ago at E3, and it looked fantastic. For the first time in 20 years, it looked like AMD could go head to head with Intel's desktop CPU line-up across the board. The question: would independent, third-party testing back up AMD's assertions?</li><li><a title="The Internet broke today: Facebook, Verizon, and more see major outages | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2019/07/facebook-cloudflare-microsoft-and-twitter-suffer-outages/">The Internet broke today: Facebook, Verizon, and more see major outages | Ars Technica</a> &mdash; Last week, Verizon caused a major BGP misroute that took large chunks of the Internet, including CDN company Cloudflare, partially down for a day. This week, the rest of the Internet has apparently asked Verizon to hold its beer.

</li><li><a title="It was a really bad month for the internet | TechCrunch" rel="nofollow" href="https://techcrunch.com/2019/07/05/bad-month-for-the-internet/">It was a really bad month for the internet | TechCrunch</a> &mdash; In the past month there were several major internet outages affecting millions of users across the world. Sites buckled, services broke, images wouldn’t load, direct messages ground to a halt and calendars and email were unavailable for hours at a time.</li><li><a title="Cloudflare outage caused by bad software deploy (updated)" rel="nofollow" href="https://blog.cloudflare.com/cloudflare-outage/">Cloudflare outage caused by bad software deploy (updated)</a> &mdash; For about 30 minutes today, visitors to Cloudflare sites received 502 errors caused by a massive spike in CPU utilization on our network. This CPU spike was caused by a bad software deploy that was rolled back.
</li><li><a title="How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today" rel="nofollow" href="https://blog.cloudflare.com/how-verizon-and-a-bgp-optimizer-knocked-large-parts-of-the-internet-offline-today/">How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today</a> &mdash; Today at 10:30UTC, the Internet had a small heart attack. A small company in Northern Pennsylvania became a preferred path of many Internet routes through Verizon (AS701), a major Internet transit provider. </li><li><a title="Getting started | Prometheus" rel="nofollow" href="https://prometheus.io/docs/prometheus/latest/getting_started/">Getting started | Prometheus</a> &mdash; This guide is a "Hello World"-style tutorial which shows how to install, configure, and use Prometheus in a simple example setup. </li><li><a title="prometheus/node_exporter" rel="nofollow" href="https://github.com/prometheus/node_exporter">prometheus/node_exporter</a> &mdash; Prometheus exporter for hardware and OS metrics exposed by *NIX kernels, written in Go with pluggable metric collectors.

</li><li><a title="Using netdata with Prometheus" rel="nofollow" href="https://docs.netdata.cloud/backends/prometheus/">Using netdata with Prometheus</a> &mdash; Prometheus is a distributed monitoring system which offers a very simple setup along with a robust data model. Recently netdata added support for Prometheus.</li><li><a title="prometheus/nagios_plugins" rel="nofollow" href="https://github.com/prometheus/nagios_plugins">prometheus/nagios_plugins</a> &mdash; Nagios plugin for alerting on prometheus query results.</li><li><a title="RobustPerception/nrpe_exporter" rel="nofollow" href="https://github.com/RobustPerception/nrpe_exporter">RobustPerception/nrpe_exporter</a> &mdash; The NRPE exporter exposes metrics on commands sent to a running NRPE daemon.

</li><li><a title="m-lab/prometheus-nagios-exporter" rel="nofollow" href="https://github.com/m-lab/prometheus-nagios-exporter">m-lab/prometheus-nagios-exporter</a> &mdash; The Prometheus Nagios exporter reads status and performance data from nagios plugins via the MK Livestatus Nagios plugin and publishes this in a form that can be scrapped by Prometheus.</li><li><a title="Comparison to alternatives | Prometheus" rel="nofollow" href="https://prometheus.io/docs/introduction/comparison/">Comparison to alternatives | Prometheus</a> &mdash; Prometheus is a full monitoring and trending system that includes built-in and active scraping, storing, querying, graphing, and alerting based on time series data.</li><li><a title="Quality server monitoring solution using NetData/Prometheus/Grafana" rel="nofollow" href="https://nemanja.io/quality-server-monitoring-solution-using-netdata-prometheus-grafana/">Quality server monitoring solution using NetData/Prometheus/Grafana</a> &mdash; I’m going to quickly show you how to install both netdata and Prometheus on the client and server. We can then use grafana pointed at Prometheus to obtain long-term metrics netdata offers.</li><li><a title="Monitoring stack by using Grafana + Prometheus + Netdata" rel="nofollow" href="https://medium.com/@jomzsg/monitoring-stack-by-using-grafana-prometheus-netdata-f9940d6804c8">Monitoring stack by using Grafana + Prometheus + Netdata</a> &mdash; This monitoring stack you can monitoring in real-time by Netdata and see the history by using Grafana.</li><li><a title="Monitoring Agent · NCPA" rel="nofollow" href="https://www.nagios.org/ncpa/">Monitoring Agent · NCPA</a> &mdash; New to NCPA? See some of the awesome features present in the Web GUI and API, available on any operating system.

</li><li><a title="Nagios 101: Understanding the Fundamentals - Nagios" rel="nofollow" href="https://www.nagios.com/nagios-101-understanding-fundamentals/">Nagios 101: Understanding the Fundamentals - Nagios</a></li><li><a title="Nagios Documentation " rel="nofollow" href="https://www.nagios.org/documentation/">Nagios Documentation </a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.</p>

<p>Plus we turn our eye to hardware and get excited about the latest Ryzen line from AMD.</p><p>Links:</p><ul><li><a title="Third parties confirm AMD’s outstanding Ryzen 3000 numbers | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/07/third-parties-confirm-amds-outstanding-ryzen-3000-numbers/">Third parties confirm AMD’s outstanding Ryzen 3000 numbers | Ars Technica</a> &mdash; AMD debuted its new Ryzen 3000 desktop CPU line a few weeks ago at E3, and it looked fantastic. For the first time in 20 years, it looked like AMD could go head to head with Intel's desktop CPU line-up across the board. The question: would independent, third-party testing back up AMD's assertions?</li><li><a title="The Internet broke today: Facebook, Verizon, and more see major outages | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2019/07/facebook-cloudflare-microsoft-and-twitter-suffer-outages/">The Internet broke today: Facebook, Verizon, and more see major outages | Ars Technica</a> &mdash; Last week, Verizon caused a major BGP misroute that took large chunks of the Internet, including CDN company Cloudflare, partially down for a day. This week, the rest of the Internet has apparently asked Verizon to hold its beer.

</li><li><a title="It was a really bad month for the internet | TechCrunch" rel="nofollow" href="https://techcrunch.com/2019/07/05/bad-month-for-the-internet/">It was a really bad month for the internet | TechCrunch</a> &mdash; In the past month there were several major internet outages affecting millions of users across the world. Sites buckled, services broke, images wouldn’t load, direct messages ground to a halt and calendars and email were unavailable for hours at a time.</li><li><a title="Cloudflare outage caused by bad software deploy (updated)" rel="nofollow" href="https://blog.cloudflare.com/cloudflare-outage/">Cloudflare outage caused by bad software deploy (updated)</a> &mdash; For about 30 minutes today, visitors to Cloudflare sites received 502 errors caused by a massive spike in CPU utilization on our network. This CPU spike was caused by a bad software deploy that was rolled back.
</li><li><a title="How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today" rel="nofollow" href="https://blog.cloudflare.com/how-verizon-and-a-bgp-optimizer-knocked-large-parts-of-the-internet-offline-today/">How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today</a> &mdash; Today at 10:30UTC, the Internet had a small heart attack. A small company in Northern Pennsylvania became a preferred path of many Internet routes through Verizon (AS701), a major Internet transit provider. </li><li><a title="Getting started | Prometheus" rel="nofollow" href="https://prometheus.io/docs/prometheus/latest/getting_started/">Getting started | Prometheus</a> &mdash; This guide is a "Hello World"-style tutorial which shows how to install, configure, and use Prometheus in a simple example setup. </li><li><a title="prometheus/node_exporter" rel="nofollow" href="https://github.com/prometheus/node_exporter">prometheus/node_exporter</a> &mdash; Prometheus exporter for hardware and OS metrics exposed by *NIX kernels, written in Go with pluggable metric collectors.

</li><li><a title="Using netdata with Prometheus" rel="nofollow" href="https://docs.netdata.cloud/backends/prometheus/">Using netdata with Prometheus</a> &mdash; Prometheus is a distributed monitoring system which offers a very simple setup along with a robust data model. Recently netdata added support for Prometheus.</li><li><a title="prometheus/nagios_plugins" rel="nofollow" href="https://github.com/prometheus/nagios_plugins">prometheus/nagios_plugins</a> &mdash; Nagios plugin for alerting on prometheus query results.</li><li><a title="RobustPerception/nrpe_exporter" rel="nofollow" href="https://github.com/RobustPerception/nrpe_exporter">RobustPerception/nrpe_exporter</a> &mdash; The NRPE exporter exposes metrics on commands sent to a running NRPE daemon.

</li><li><a title="m-lab/prometheus-nagios-exporter" rel="nofollow" href="https://github.com/m-lab/prometheus-nagios-exporter">m-lab/prometheus-nagios-exporter</a> &mdash; The Prometheus Nagios exporter reads status and performance data from nagios plugins via the MK Livestatus Nagios plugin and publishes this in a form that can be scrapped by Prometheus.</li><li><a title="Comparison to alternatives | Prometheus" rel="nofollow" href="https://prometheus.io/docs/introduction/comparison/">Comparison to alternatives | Prometheus</a> &mdash; Prometheus is a full monitoring and trending system that includes built-in and active scraping, storing, querying, graphing, and alerting based on time series data.</li><li><a title="Quality server monitoring solution using NetData/Prometheus/Grafana" rel="nofollow" href="https://nemanja.io/quality-server-monitoring-solution-using-netdata-prometheus-grafana/">Quality server monitoring solution using NetData/Prometheus/Grafana</a> &mdash; I’m going to quickly show you how to install both netdata and Prometheus on the client and server. We can then use grafana pointed at Prometheus to obtain long-term metrics netdata offers.</li><li><a title="Monitoring stack by using Grafana + Prometheus + Netdata" rel="nofollow" href="https://medium.com/@jomzsg/monitoring-stack-by-using-grafana-prometheus-netdata-f9940d6804c8">Monitoring stack by using Grafana + Prometheus + Netdata</a> &mdash; This monitoring stack you can monitoring in real-time by Netdata and see the history by using Grafana.</li><li><a title="Monitoring Agent · NCPA" rel="nofollow" href="https://www.nagios.org/ncpa/">Monitoring Agent · NCPA</a> &mdash; New to NCPA? See some of the awesome features present in the Web GUI and API, available on any operating system.

</li><li><a title="Nagios 101: Understanding the Fundamentals - Nagios" rel="nofollow" href="https://www.nagios.com/nagios-101-understanding-fundamentals/">Nagios 101: Understanding the Fundamentals - Nagios</a></li><li><a title="Nagios Documentation " rel="nofollow" href="https://www.nagios.org/documentation/">Nagios Documentation </a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 360: AMD Flaws Explained</title>
  <link>https://techsnap.systems/360</link>
  <guid isPermaLink="false">2bdd82c5-b92f-4a94-af10-1fdc61f7a3a9</guid>
  <pubDate>Thu, 22 Mar 2018 12:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/2bdd82c5-b92f-4a94-af10-1fdc61f7a3a9.mp3" length="21507018" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We cut through the noise and explain in clear terms what’s really been discovered.  The botched disclosure of flaws in AMD products has overshadowed the technical details of the vulnerabilities, and we aim to fix that..</itunes:subtitle>
  <itunes:duration>29:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We cut through the noise and explain in clear terms what’s really been discovered.  The botched disclosure of flaws in AMD products has overshadowed the technical details of the vulnerabilities, and we aim to fix that..
Plus another DNS Rebinding attack is in the wild and stealing Ethereum, Microsoft opens up a new bug bounty program, Expedia gets hacked, and we perform a TechSNAP checkup. 
</description>
  <content:encoded>
    <![CDATA[<p>We cut through the noise and explain in clear terms what’s really been discovered.  The botched disclosure of flaws in AMD products has overshadowed the technical details of the vulnerabilities, and we aim to fix that..</p>

<p>Plus another DNS Rebinding attack is in the wild and stealing Ethereum, Microsoft opens up a new bug bounty program, Expedia gets hacked, and we perform a TechSNAP checkup.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Microsoft Offers New Bug Bounties for Spectre, ..." rel="nofollow" href="https://www.darkreading.com/risk-management/microsoft-offers-new-bug-bounties-for-spectre-meltdown-type-flaws/d/d-id/1331303">Microsoft Offers New Bug Bounties for Spectre, ...</a> &mdash; Microsoft last week announced new bug bounties for speculative execution side-channel vulnerabilities. These vulnerabilities, of which Spectre and Meltdown were the first known examples, represent a new class of problem and Microsoft would like to know what else might be lurking in the neighborhood.</li><li><a title="Microsoft patches RDP vulnerability." rel="nofollow" href="https://nakedsecurity.sophos.com/2018/03/15/microsoft-patches-rdp-vulnerability-update-now/">Microsoft patches RDP vulnerability.</a> &mdash; Microsoft announced this week that they’ve released a preliminary fix for a vulnerability rated important, and present in all supported versions of Windows in circulation (basically any client or server version of Windows from 2008 onward).</li><li><a title="Firefox Master Password System Has Been Poorly Secured for the Past 9 Years" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/firefox-master-password-system-has-been-poorly-secured-for-the-past-9-years/">Firefox Master Password System Has Been Poorly Secured for the Past 9 Years</a> &mdash; For at past nine years, Mozilla has been using an insufficiently strong encryption mechanism for the "master password" feature.</li><li><a title="Firefox Lockbox Extension" rel="nofollow" href="https://mozilla-lockbox.github.io/lockbox-extension/">Firefox Lockbox Extension</a> &mdash; The Lockbox extension is a simple, stand-alone password manager that works with Firefox for desktop. It’s the first of several planned experiments designed to help us test and improve password management and online security.</li><li><a title="How your ethereum can be stolen through DNS rebinding" rel="nofollow" href="https://ret2got.wordpress.com/2018/01/19/how-your-ethereum-can-be-stolen-using-dns-rebinding/">How your ethereum can be stolen through DNS rebinding</a> &mdash; Most of the ethereum clients run a JSON-RPC service on port 8545 on localhost, but since it’s on localhost, we can’t access it directly from user’s browser due to SOP.</li><li><a title="TechSNAP Episode 353: Too Many Containers" rel="nofollow" href="http://techsnap.systems/353">TechSNAP Episode 353: Too Many Containers</a></li><li><a title="“AMD Flaws” Technical Summary | Trail of Bits Blog" rel="nofollow" href="https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/">“AMD Flaws” Technical Summary | Trail of Bits Blog</a> &mdash; Most of the discussion after the public announcement of the vulnerabilities has been focused on the way they were disclosed rather than their technical impact. In this post, we have tried to extract the relevant technical details from the CTS whitepaper so they can be of use to the security community without the distraction of the surrounding disclosure issues.</li><li><a title="Ivan is not happy with our memcrashed coverage" rel="nofollow" href="https://twitter.com/IvanTomica/status/975025525398831104?ref_src=twsrc%5Etfw">Ivan is not happy with our memcrashed coverage</a> &mdash; Discussion re:"memcrashed" on latest TechSNAP left me very mad. I think hosts did not properly explain the issue. </li><li><a title="PSA: Chrome distrusts certificates issued by Symantec starting today" rel="nofollow" href="https://www.reddit.com/r/sysadmin/comments/84m6vr/psa_chrome_distrusts_certificates_issued_by/">PSA: Chrome distrusts certificates issued by Symantec starting today</a> &mdash; This was announced back in September for v66, but we have machines running 65.0.3325.162 that display the full page "NET::ERR_CERT_AUTHORITY_INVALID" warning so it seems they jumped the gun a bit.</li><li><a title="Follow up: fail2ban AWS access controls " rel="nofollow" href="https://pastebin.com/4Q4zTZGA">Follow up: fail2ban AWS access controls </a></li><li><a title="Mr S Has a Handy pfSense how-to" rel="nofollow" href="https://pastebin.com/FXA8PzQx">Mr S Has a Handy pfSense how-to</a></li><li><a title="Running pfSense on a DigitalOcean droplet" rel="nofollow" href="https://squigly.blogspot.co.il/2018/02/running-pfsense-on-digitalocean-droplet.html">Running pfSense on a DigitalOcean droplet</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We cut through the noise and explain in clear terms what’s really been discovered.  The botched disclosure of flaws in AMD products has overshadowed the technical details of the vulnerabilities, and we aim to fix that..</p>

<p>Plus another DNS Rebinding attack is in the wild and stealing Ethereum, Microsoft opens up a new bug bounty program, Expedia gets hacked, and we perform a TechSNAP checkup.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Microsoft Offers New Bug Bounties for Spectre, ..." rel="nofollow" href="https://www.darkreading.com/risk-management/microsoft-offers-new-bug-bounties-for-spectre-meltdown-type-flaws/d/d-id/1331303">Microsoft Offers New Bug Bounties for Spectre, ...</a> &mdash; Microsoft last week announced new bug bounties for speculative execution side-channel vulnerabilities. These vulnerabilities, of which Spectre and Meltdown were the first known examples, represent a new class of problem and Microsoft would like to know what else might be lurking in the neighborhood.</li><li><a title="Microsoft patches RDP vulnerability." rel="nofollow" href="https://nakedsecurity.sophos.com/2018/03/15/microsoft-patches-rdp-vulnerability-update-now/">Microsoft patches RDP vulnerability.</a> &mdash; Microsoft announced this week that they’ve released a preliminary fix for a vulnerability rated important, and present in all supported versions of Windows in circulation (basically any client or server version of Windows from 2008 onward).</li><li><a title="Firefox Master Password System Has Been Poorly Secured for the Past 9 Years" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/firefox-master-password-system-has-been-poorly-secured-for-the-past-9-years/">Firefox Master Password System Has Been Poorly Secured for the Past 9 Years</a> &mdash; For at past nine years, Mozilla has been using an insufficiently strong encryption mechanism for the "master password" feature.</li><li><a title="Firefox Lockbox Extension" rel="nofollow" href="https://mozilla-lockbox.github.io/lockbox-extension/">Firefox Lockbox Extension</a> &mdash; The Lockbox extension is a simple, stand-alone password manager that works with Firefox for desktop. It’s the first of several planned experiments designed to help us test and improve password management and online security.</li><li><a title="How your ethereum can be stolen through DNS rebinding" rel="nofollow" href="https://ret2got.wordpress.com/2018/01/19/how-your-ethereum-can-be-stolen-using-dns-rebinding/">How your ethereum can be stolen through DNS rebinding</a> &mdash; Most of the ethereum clients run a JSON-RPC service on port 8545 on localhost, but since it’s on localhost, we can’t access it directly from user’s browser due to SOP.</li><li><a title="TechSNAP Episode 353: Too Many Containers" rel="nofollow" href="http://techsnap.systems/353">TechSNAP Episode 353: Too Many Containers</a></li><li><a title="“AMD Flaws” Technical Summary | Trail of Bits Blog" rel="nofollow" href="https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/">“AMD Flaws” Technical Summary | Trail of Bits Blog</a> &mdash; Most of the discussion after the public announcement of the vulnerabilities has been focused on the way they were disclosed rather than their technical impact. In this post, we have tried to extract the relevant technical details from the CTS whitepaper so they can be of use to the security community without the distraction of the surrounding disclosure issues.</li><li><a title="Ivan is not happy with our memcrashed coverage" rel="nofollow" href="https://twitter.com/IvanTomica/status/975025525398831104?ref_src=twsrc%5Etfw">Ivan is not happy with our memcrashed coverage</a> &mdash; Discussion re:"memcrashed" on latest TechSNAP left me very mad. I think hosts did not properly explain the issue. </li><li><a title="PSA: Chrome distrusts certificates issued by Symantec starting today" rel="nofollow" href="https://www.reddit.com/r/sysadmin/comments/84m6vr/psa_chrome_distrusts_certificates_issued_by/">PSA: Chrome distrusts certificates issued by Symantec starting today</a> &mdash; This was announced back in September for v66, but we have machines running 65.0.3325.162 that display the full page "NET::ERR_CERT_AUTHORITY_INVALID" warning so it seems they jumped the gun a bit.</li><li><a title="Follow up: fail2ban AWS access controls " rel="nofollow" href="https://pastebin.com/4Q4zTZGA">Follow up: fail2ban AWS access controls </a></li><li><a title="Mr S Has a Handy pfSense how-to" rel="nofollow" href="https://pastebin.com/FXA8PzQx">Mr S Has a Handy pfSense how-to</a></li><li><a title="Running pfSense on a DigitalOcean droplet" rel="nofollow" href="https://squigly.blogspot.co.il/2018/02/running-pfsense-on-digitalocean-droplet.html">Running pfSense on a DigitalOcean droplet</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
