<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 26 Apr 2026 07:43:27 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Hard Drive”</title>
    <link>https://techsnap.systems/tags/hard%20drive</link>
    <pubDate>Fri, 29 May 2020 00:15:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>430: All Good Things</title>
  <link>https://techsnap.systems/430</link>
  <guid isPermaLink="false">697f849c-00de-4c27-9231-6c039bb93a67</guid>
  <pubDate>Fri, 29 May 2020 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/697f849c-00de-4c27-9231-6c039bb93a67.mp3" length="37553551" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>It's a storage showdown as Jim and Wes bust some performance myths about RAID and ZFS.</itunes:subtitle>
  <itunes:duration>52:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>It's a storage showdown as Jim and Wes bust some performance myths about RAID and ZFS.
Plus our favorite features from Fedora 32, and why Wes loves DNF. 
</description>
  <itunes:keywords>DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, sysadmin podcast, Fedora, Fedora 32, Fedora Workstation, Ubuntu, Anaconda, Wayland, X11, Red Hat, CentOS, DNF, blivet, systemd, Linux, GNOME, Dash to Dock, Matthew Miller, LTS, rolling release, FUSE, OOM, EarlyOOM, ZFS, OpenZFS, DKMS, PPA, RAID, RAIDz, raid6, copy-on-write, vdev, storage, hard drive, SSD, HDD, spindle count, zpool, parity, filesystem, throughput, iops, chunk, block size, benchmarking</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s a storage showdown as Jim and Wes bust some performance myths about RAID and ZFS.</p>

<p>Plus our favorite features from Fedora 32, and why Wes loves DNF.</p><p>Links:</p><ul><li><a title="What&#39;s new in Fedora 32 Workstation" rel="nofollow" href="https://fedoramagazine.org/whats-new-fedora-32-workstation/">What's new in Fedora 32 Workstation</a></li><li><a title="Fedora 32 ChangeSet" rel="nofollow" href="https://fedoraproject.org/wiki/Releases/32/ChangeSet">Fedora 32 ChangeSet</a></li><li><a title="Linux distro review: Fedora Workstation 32" rel="nofollow" href="https://arstechnica.com/gadgets/2020/05/linux-distro-review-fedora-workstation-32/">Linux distro review: Fedora Workstation 32</a></li><li><a title="TechSNAP 428: RAID Reality Check" rel="nofollow" href="https://techsnap.systems/428">TechSNAP 428: RAID Reality Check</a></li><li><a title="ZFS versus RAID: Eight Ironwolf disks, two filesystems, one winner" rel="nofollow" href="https://arstechnica.com/gadgets/2020/05/zfs-versus-raid-eight-ironwolf-disks-two-filesystems-one-winner/">ZFS versus RAID: Eight Ironwolf disks, two filesystems, one winner</a></li><li><a title="Understanding RAID: How performance scales from one disk to eight" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/understanding-raid-how-performance-scales-from-one-disk-to-eight/">Understanding RAID: How performance scales from one disk to eight</a></li><li><a title="Find Jim on 2.5 Admins" rel="nofollow" href="https://2.5admins.com/">Find Jim on 2.5 Admins</a></li><li><a title="Find Wes on LINUX Unplugged" rel="nofollow" href="https://linuxunplugged.com/">Find Wes on LINUX Unplugged</a></li><li><a title="TechSNAP 1: First episode of TechSNAP (in 2011!)" rel="nofollow" href="https://www.youtube.com/watch?v=n7La9Z-XrCE">TechSNAP 1: First episode of TechSNAP (in 2011!)</a></li><li><a title="TechSNAP 300: End of the Allan and Chris era (2017)" rel="nofollow" href="https://www.jupiterbroadcasting.com/106026/2089-days-uptime-techsnap-300/">TechSNAP 300: End of the Allan and Chris era (2017)</a></li><li><a title="TechSNAP 301: Enter Dan and Wes " rel="nofollow" href="https://www.jupiterbroadcasting.com/106086/the-next-generation-techsnap-301/">TechSNAP 301: Enter Dan and Wes </a></li><li><a title="TechSNAP 347: A Farewell to Dan" rel="nofollow" href="https://www.jupiterbroadcasting.com/120317/a-farewell-to-dan-techsnap-347/">TechSNAP 347: A Farewell to Dan</a></li><li><a title="TechSNAP 348: Chris is back!" rel="nofollow" href="https://www.jupiterbroadcasting.com/120687/server-neglect-techsnap-348/">TechSNAP 348: Chris is back!</a></li><li><a title="TechSNAP 389: Jim&#39;s first time as a guest" rel="nofollow" href="https://www.jupiterbroadcasting.com/128101/the-future-of-http-techsnap-389/">TechSNAP 389: Jim's first time as a guest</a></li><li><a title="TechSNAP 390: Jim&#39;s second guest appearance" rel="nofollow" href="https://techsnap.systems/390">TechSNAP 390: Jim's second guest appearance</a></li><li><a title="TechSNAP 393: Chris says goodbye" rel="nofollow" href="https://www.jupiterbroadcasting.com/128656/back-to-our-roots-techsnap-393/">TechSNAP 393: Chris says goodbye</a></li><li><a title="TechSNAP 395: Jim joins the show" rel="nofollow" href="https://www.jupiterbroadcasting.com/128941/the-acme-era-techsnap-395/">TechSNAP 395: Jim joins the show</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s a storage showdown as Jim and Wes bust some performance myths about RAID and ZFS.</p>

<p>Plus our favorite features from Fedora 32, and why Wes loves DNF.</p><p>Links:</p><ul><li><a title="What&#39;s new in Fedora 32 Workstation" rel="nofollow" href="https://fedoramagazine.org/whats-new-fedora-32-workstation/">What's new in Fedora 32 Workstation</a></li><li><a title="Fedora 32 ChangeSet" rel="nofollow" href="https://fedoraproject.org/wiki/Releases/32/ChangeSet">Fedora 32 ChangeSet</a></li><li><a title="Linux distro review: Fedora Workstation 32" rel="nofollow" href="https://arstechnica.com/gadgets/2020/05/linux-distro-review-fedora-workstation-32/">Linux distro review: Fedora Workstation 32</a></li><li><a title="TechSNAP 428: RAID Reality Check" rel="nofollow" href="https://techsnap.systems/428">TechSNAP 428: RAID Reality Check</a></li><li><a title="ZFS versus RAID: Eight Ironwolf disks, two filesystems, one winner" rel="nofollow" href="https://arstechnica.com/gadgets/2020/05/zfs-versus-raid-eight-ironwolf-disks-two-filesystems-one-winner/">ZFS versus RAID: Eight Ironwolf disks, two filesystems, one winner</a></li><li><a title="Understanding RAID: How performance scales from one disk to eight" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/understanding-raid-how-performance-scales-from-one-disk-to-eight/">Understanding RAID: How performance scales from one disk to eight</a></li><li><a title="Find Jim on 2.5 Admins" rel="nofollow" href="https://2.5admins.com/">Find Jim on 2.5 Admins</a></li><li><a title="Find Wes on LINUX Unplugged" rel="nofollow" href="https://linuxunplugged.com/">Find Wes on LINUX Unplugged</a></li><li><a title="TechSNAP 1: First episode of TechSNAP (in 2011!)" rel="nofollow" href="https://www.youtube.com/watch?v=n7La9Z-XrCE">TechSNAP 1: First episode of TechSNAP (in 2011!)</a></li><li><a title="TechSNAP 300: End of the Allan and Chris era (2017)" rel="nofollow" href="https://www.jupiterbroadcasting.com/106026/2089-days-uptime-techsnap-300/">TechSNAP 300: End of the Allan and Chris era (2017)</a></li><li><a title="TechSNAP 301: Enter Dan and Wes " rel="nofollow" href="https://www.jupiterbroadcasting.com/106086/the-next-generation-techsnap-301/">TechSNAP 301: Enter Dan and Wes </a></li><li><a title="TechSNAP 347: A Farewell to Dan" rel="nofollow" href="https://www.jupiterbroadcasting.com/120317/a-farewell-to-dan-techsnap-347/">TechSNAP 347: A Farewell to Dan</a></li><li><a title="TechSNAP 348: Chris is back!" rel="nofollow" href="https://www.jupiterbroadcasting.com/120687/server-neglect-techsnap-348/">TechSNAP 348: Chris is back!</a></li><li><a title="TechSNAP 389: Jim&#39;s first time as a guest" rel="nofollow" href="https://www.jupiterbroadcasting.com/128101/the-future-of-http-techsnap-389/">TechSNAP 389: Jim's first time as a guest</a></li><li><a title="TechSNAP 390: Jim&#39;s second guest appearance" rel="nofollow" href="https://techsnap.systems/390">TechSNAP 390: Jim's second guest appearance</a></li><li><a title="TechSNAP 393: Chris says goodbye" rel="nofollow" href="https://www.jupiterbroadcasting.com/128656/back-to-our-roots-techsnap-393/">TechSNAP 393: Chris says goodbye</a></li><li><a title="TechSNAP 395: Jim joins the show" rel="nofollow" href="https://www.jupiterbroadcasting.com/128941/the-acme-era-techsnap-395/">TechSNAP 395: Jim joins the show</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>428: RAID Reality Check</title>
  <link>https://techsnap.systems/428</link>
  <guid isPermaLink="false">5556e3df-292d-4b0b-8e25-27f071862c06</guid>
  <pubDate>Fri, 01 May 2020 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/5556e3df-292d-4b0b-8e25-27f071862c06.mp3" length="25930419" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.</itunes:subtitle>
  <itunes:duration>36:00</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.
Plus Cloudflare steps up its campaign to secure BGP, and why you might want to trade in cron for systemd timers. 
</description>
  <itunes:keywords>DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, sysadmin podcast, EPYC, Threadripper, AMD, 7FX2, CPU, per-core performance, Intel, Threadripper, TDP, energy efficiency, RAID, md-raid, ZFS, hard disk performance, iops, hard drive, storage, Seagate, Iron Wolf, raidz, raidz2, RAID-5, RAID-6, RAID-10, ZFS, backups, fio, benchmarking, data integrity, BGP, Cloudflare, networking, RPKI, security, cryptography, route leak, routing, isbgpsafeyet, internet, systemd, systemd timers, cron, email, monitoring, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.</p>

<p>Plus Cloudflare steps up its campaign to secure BGP, and why you might want to trade in cron for systemd timers.</p><p>Links:</p><ul><li><a title="AMD Claims World’s Fastest Per-Core Performance with New EPYC Rome 7Fx2 CPUs" rel="nofollow" href="https://www.tomshardware.com/news/amd-worlds-fastest-processor-epyc-rome-7fx2-cpus">AMD Claims World’s Fastest Per-Core Performance with New EPYC Rome 7Fx2 CPUs</a></li><li><a title="AMD EPYC 7F52 Linux Performance - AMD 7FX2 CPUs Further Increasing The Fight Against Intel Xeon Review" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=amd-epyc-7f52&amp;num=1">AMD EPYC 7F52 Linux Performance - AMD 7FX2 CPUs Further Increasing The Fight Against Intel Xeon Review</a></li><li><a title="Understanding RAID: How performance scales from one disk to eight" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/understanding-raid-how-performance-scales-from-one-disk-to-eight/">Understanding RAID: How performance scales from one disk to eight</a></li><li><a title="New Cloudflare tool can tell you if your ISP has deployed BGP fixes" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/new-cloudflare-tool-can-tell-you-if-your-isp-has-deployed-bgp-fixes/">New Cloudflare tool can tell you if your ISP has deployed BGP fixes</a></li><li><a title="Is BGP safe yet?" rel="nofollow" href="https://isbgpsafeyet.com/">Is BGP safe yet?</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="Why I Prefer systemd Timers Over Cron – Thomas Stringer" rel="nofollow" href="https://trstringer.com/systemd-timer-vs-cronjob/">Why I Prefer systemd Timers Over Cron – Thomas Stringer</a></li><li><a title="systemd/Timers - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/Systemd/Timers">systemd/Timers - ArchWiki</a></li><li><a title="systemd.time (Time format docs)" rel="nofollow" href="https://www.freedesktop.org/software/systemd/man/systemd.time.html">systemd.time (Time format docs)</a></li><li><a title="systemd.timer (Unit docs)" rel="nofollow" href="https://www.freedesktop.org/software/systemd/man/systemd.timer.html">systemd.timer (Unit docs)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.</p>

<p>Plus Cloudflare steps up its campaign to secure BGP, and why you might want to trade in cron for systemd timers.</p><p>Links:</p><ul><li><a title="AMD Claims World’s Fastest Per-Core Performance with New EPYC Rome 7Fx2 CPUs" rel="nofollow" href="https://www.tomshardware.com/news/amd-worlds-fastest-processor-epyc-rome-7fx2-cpus">AMD Claims World’s Fastest Per-Core Performance with New EPYC Rome 7Fx2 CPUs</a></li><li><a title="AMD EPYC 7F52 Linux Performance - AMD 7FX2 CPUs Further Increasing The Fight Against Intel Xeon Review" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=amd-epyc-7f52&amp;num=1">AMD EPYC 7F52 Linux Performance - AMD 7FX2 CPUs Further Increasing The Fight Against Intel Xeon Review</a></li><li><a title="Understanding RAID: How performance scales from one disk to eight" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/understanding-raid-how-performance-scales-from-one-disk-to-eight/">Understanding RAID: How performance scales from one disk to eight</a></li><li><a title="New Cloudflare tool can tell you if your ISP has deployed BGP fixes" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/new-cloudflare-tool-can-tell-you-if-your-isp-has-deployed-bgp-fixes/">New Cloudflare tool can tell you if your ISP has deployed BGP fixes</a></li><li><a title="Is BGP safe yet?" rel="nofollow" href="https://isbgpsafeyet.com/">Is BGP safe yet?</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="Why I Prefer systemd Timers Over Cron – Thomas Stringer" rel="nofollow" href="https://trstringer.com/systemd-timer-vs-cronjob/">Why I Prefer systemd Timers Over Cron – Thomas Stringer</a></li><li><a title="systemd/Timers - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/Systemd/Timers">systemd/Timers - ArchWiki</a></li><li><a title="systemd.time (Time format docs)" rel="nofollow" href="https://www.freedesktop.org/software/systemd/man/systemd.time.html">systemd.time (Time format docs)</a></li><li><a title="systemd.timer (Unit docs)" rel="nofollow" href="https://www.freedesktop.org/software/systemd/man/systemd.timer.html">systemd.timer (Unit docs)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>417: Machine Learning Magic</title>
  <link>https://techsnap.systems/417</link>
  <guid isPermaLink="false">88c620a6-0b1c-4698-aac4-ac757b632286</guid>
  <pubDate>Fri, 29 Nov 2019 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/88c620a6-0b1c-4698-aac4-ac757b632286.mp3" length="19052274" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.</itunes:subtitle>
  <itunes:duration>26:27</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.
Plus so-so SSD security, and a new wireless protocol that works best where the Wi-Fi sucks. 
</description>
  <itunes:keywords>OFNP,wireless,wifi,On-Off Noise Power Communication,LORA,WiFi 6,Ubiquiti ,Unifi,Amplifi,Amplifi Alien,mesh wifi,router,home networking,networking,wireless,ethernet,ASUS,AiMesh,OFDMA,Orthogonal Frequency-Division Multiple Access,SmallNetBuilder,Tim Higgins,SSD,storage,IEEE,encryption,cryptography,hardware encryption,BitLocker,LUKS,DBAN,hard disk,hard drive,storage,solid state,Secure Erase,ATA,security,machine learning,AI,artificial intelligence,artificial general intelligence,training,neural network,inference,drunkard's walk,Nvidia,Tesla V100,Matrix multiplication,linear algebra,supercomputers,NPU,TPU,Google,Jeffrey Dean,CPU,GPU,Chip Design,Deep Learning,Intel AVX512,Deep Learning Boost,OpenVINO,ResNet,i9-10980XE,Arvind Narayanan,AIExpert, DevOps, TechSNAP, Jupiter Broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.</p>

<p>Plus so-so SSD security, and a new wireless protocol that works best where the Wi-Fi sucks.</p><p>Links:</p><ul><li><a title="“Where the Wi-Fi sucks” is where a new wireless protocol does its magic" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/where-the-wi-fi-sucks-is-where-a-new-wireless-protocol-does-its-magic/">“Where the Wi-Fi sucks” is where a new wireless protocol does its magic</a></li><li><a title="Ubiquiti’s new “Amplifi Alien” is a mesh-capable Wi-Fi 6 router" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/ubiquitis-new-amplifi-alien-is-a-mesh-capable-wi-fi-6-router/">Ubiquiti’s new “Amplifi Alien” is a mesh-capable Wi-Fi 6 router</a></li><li><a title="Self-encrypting deception: weaknesses in the encryption of solid state drives" rel="nofollow" href="https://www.ieee-security.org/TC/SP2019/papers/310.pdf">Self-encrypting deception: weaknesses in the encryption of solid state drives</a></li><li><a title="Securely erase a solid-state drive" rel="nofollow" href="https://kb.iu.edu/d/aiut">Securely erase a solid-state drive</a></li><li><a title="Solid state drive/Memory cell clearing - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/Solid_state_drive/Memory_cell_clearing">Solid state drive/Memory cell clearing - ArchWiki</a></li><li><a title="The Deep Learning Revolution and Its Implications for Computer Architecture and Chip Design" rel="nofollow" href="https://arxiv.org/abs/1911.05289">The Deep Learning Revolution and Its Implications for Computer Architecture and Chip Design</a></li><li><a title="Intel Core i9-10980XE—a step forward for AI, a step back for everything else" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/intel-core-i9-10980xe-a-step-forward-for-ai-a-step-back-for-everything-else/">Intel Core i9-10980XE—a step forward for AI, a step back for everything else</a></li><li><a title="How to recognize AI snake oil" rel="nofollow" href="https://www.cs.princeton.edu/~arvindn/talks/MIT-STS-AI-snakeoil.pdf">How to recognize AI snake oil</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.</p>

<p>Plus so-so SSD security, and a new wireless protocol that works best where the Wi-Fi sucks.</p><p>Links:</p><ul><li><a title="“Where the Wi-Fi sucks” is where a new wireless protocol does its magic" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/where-the-wi-fi-sucks-is-where-a-new-wireless-protocol-does-its-magic/">“Where the Wi-Fi sucks” is where a new wireless protocol does its magic</a></li><li><a title="Ubiquiti’s new “Amplifi Alien” is a mesh-capable Wi-Fi 6 router" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/ubiquitis-new-amplifi-alien-is-a-mesh-capable-wi-fi-6-router/">Ubiquiti’s new “Amplifi Alien” is a mesh-capable Wi-Fi 6 router</a></li><li><a title="Self-encrypting deception: weaknesses in the encryption of solid state drives" rel="nofollow" href="https://www.ieee-security.org/TC/SP2019/papers/310.pdf">Self-encrypting deception: weaknesses in the encryption of solid state drives</a></li><li><a title="Securely erase a solid-state drive" rel="nofollow" href="https://kb.iu.edu/d/aiut">Securely erase a solid-state drive</a></li><li><a title="Solid state drive/Memory cell clearing - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/Solid_state_drive/Memory_cell_clearing">Solid state drive/Memory cell clearing - ArchWiki</a></li><li><a title="The Deep Learning Revolution and Its Implications for Computer Architecture and Chip Design" rel="nofollow" href="https://arxiv.org/abs/1911.05289">The Deep Learning Revolution and Its Implications for Computer Architecture and Chip Design</a></li><li><a title="Intel Core i9-10980XE—a step forward for AI, a step back for everything else" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/intel-core-i9-10980xe-a-step-forward-for-ai-a-step-back-for-everything-else/">Intel Core i9-10980XE—a step forward for AI, a step back for everything else</a></li><li><a title="How to recognize AI snake oil" rel="nofollow" href="https://www.cs.princeton.edu/~arvindn/talks/MIT-STS-AI-snakeoil.pdf">How to recognize AI snake oil</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>405: Update Uncertainty</title>
  <link>https://techsnap.systems/405</link>
  <guid isPermaLink="false">8a576c94-20cc-497c-9de7-8402cd0a1135</guid>
  <pubDate>Tue, 11 Jun 2019 20:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/8a576c94-20cc-497c-9de7-8402cd0a1135.mp3" length="22166906" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We explore the risky world of exposed RDP, from the brute force GoldBrute botnet to the dangerously worm-able BlueKeep vulnerability.</itunes:subtitle>
  <itunes:duration>30:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We explore the risky world of exposed RDP, from the brute force GoldBrute botnet to the dangerously worm-able BlueKeep vulnerability.
Plus the importance of automatic updates, and Jim's new backup box.  
</description>
  <itunes:keywords>BlueKeep, RDP, GoldBrute, Terminal Services, Remote Desktop, Windows, Windows Update, network security, security, firewalls, worm, internet worm, wannacry, NSA, Microsoft, updates, patching, vulnerabilities, automatic updates, backups, supermicro, rosewill, ssd, hard drive, NAS, storage, brute force, industrial control systems, out of support, windows xp, patching policies, password security, remote desktop protocol, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We explore the risky world of exposed RDP, from the brute force GoldBrute botnet to the dangerously worm-able BlueKeep vulnerability.</p>

<p>Plus the importance of automatic updates, and Jim&#39;s new backup box. </p><p>Links:</p><ul><li><a title="Errata Security: Almost One Million Vulnerable to BlueKeep Vuln (CVE-2019-0708)" rel="nofollow" href="https://blog.erratasec.com/2019/05/almost-one-million-vulnerable-to.html">Errata Security: Almost One Million Vulnerable to BlueKeep Vuln (CVE-2019-0708)</a> &mdash; Microsoft announced a vulnerability in it's "Remote Desktop" product that can lead to robust, wormable exploits. I scanned the Internet to assess the danger. I find nearly 1-million devices on the public Internet that are vulnerable to the bug. </li><li><a title="Even the NSA is urging Windows users to patch BlueKeep (CVE-2019-0708) | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/even-the-nsa-is-urging-windows-users-to-patch-bluekeep-cve-2019-0708/">Even the NSA is urging Windows users to patch BlueKeep (CVE-2019-0708) | ZDNet</a> &mdash; "[The] NSA is concerned that malicious cyber actors will use the vulnerability in ransomware and exploit kits containing other known exploits, increasing capabilities against other unpatched systems.

</li><li><a title="Prevent a worm by updating Remote Desktop Services (CVE-2019-0708) – MSRC" rel="nofollow" href="https://blogs.technet.microsoft.com/msrc/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/">Prevent a worm by updating Remote Desktop Services (CVE-2019-0708) – MSRC</a> &mdash; This vulnerability is pre-authentication and requires no user interaction. In other words, the vulnerability is ‘wormable’, meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017</li><li><a title="BlueKeep - everyone agrees, you should patch PCs running legacy versions of Windows" rel="nofollow" href="https://www.grahamcluley.com/bluekeep-everyone-agrees-you-should-patch-pcs-running-legacy-versions-of-windows/">BlueKeep - everyone agrees, you should patch PCs running legacy versions of Windows</a> &mdash; I have this horrible feeling that the only way we’re going to wake the world up to the need to patch their ageing versions of Windows against the BlueKeep vulnerability is to wait until a malicious worm begins to spread around the world.

</li><li><a title="CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability" rel="nofollow" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708">CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability</a> &mdash; A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

</li><li><a title="Customer guidance for CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability" rel="nofollow" href="https://support.microsoft.com/en-us/help/4500705/customer-guidance-for-cve-2019-0708">Customer guidance for CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability</a> &mdash; Microsoft is aware that some customers are running versions of Windows that no longer receive mainstream support. That means those customers will not have received any security updates to protect their systems from CVE-2019-0708, which is a critical remote code execution vulnerability.

</li><li><a title="Forget BlueKeep: Beware the GoldBrute | Threatpost" rel="nofollow" href="https://threatpost.com/forget-bluekeep-beware-goldbrute/145482/">Forget BlueKeep: Beware the GoldBrute | Threatpost</a> &mdash; In the past few days, GoldBrute (named after the Java class it uses) has attempted to brute-force Remote Desktop Protocol (RDP) connections for 1.5 million Windows systems and counting, according to Morphus Labs chief research officer Renato Marinho. The botnet is actively scanning the internet for machines with RDP exposed, and trying out weak or reused passwords to see if it can gain access to the systems.</li><li><a title="The GoldBrute botnet" rel="nofollow" href="https://nakedsecurity.sophos.com/2019/06/10/the-goldbrute-botnet-is-trying-to-crack-open-1-5-million-rdp-servers/">The GoldBrute botnet</a> &mdash; The latest round of bad news emerged last week when Morphus Labs’ researcher Renato Marinho announced the discovery of an aggressive brute force campaign against 1.5 million RDP servers by a botnet called ‘GoldBrute’.

</li><li><a title="Ubuntu Automatic Updates" rel="nofollow" href="https://help.ubuntu.com/lts/serverguide/automatic-updates.html.en">Ubuntu Automatic Updates</a> &mdash; The unattended-upgrades package can be used to automatically install updated packages, and can be configured to update all packages or just install security updates. </li><li><a title="AutoUpdates - Fedora Project Wiki" rel="nofollow" href="https://fedoraproject.org/wiki/AutoUpdates">AutoUpdates - Fedora Project Wiki</a> &mdash; You must decide whether to use automatic DNF or YUM updates on each of your machines. </li><li><a title="It&#39;s time to block Windows Automatic Updating | Computerworld" rel="nofollow" href="https://www.computerworld.com/article/3339563/its-time-to-block-windows-automatic-updating.html">It's time to block Windows Automatic Updating | Computerworld</a> &mdash; Those of you who feel it’s important to install Windows and Office patches the moment they come out – I salute you. The Windows world needs more cannon fodder.</li><li><a title="Windows 10&#39;s Ugly Updates Just Got Uglier. Here&#39;s How To Stay Safe by Disabling Automatic Updates" rel="nofollow" href="https://www.forbes.com/sites/kevinmurnane/2019/04/25/windows-10s-ugly-updates-just-got-uglier-heres-how-to-stay-safe-by-disabling-automatic-updates/#591e6ac67ff0">Windows 10's Ugly Updates Just Got Uglier. Here's How To Stay Safe by Disabling Automatic Updates</a> &mdash; Stay safe by disabling automatic updates? How is that possible? As a general rule of thumb, I’d never recommend disabling updates because security patches are essential. But the situation with Windows 10 has become intolerable. Microsoft continues to fail and continues to release update after update that they know, or should know, has serious problems.</li><li><a title="Jim&#39;s New Rig" rel="nofollow" href="https://twitter.com/jrssnet/status/1136721049641455617">Jim's New Rig</a> &mdash; I build, sell, and manage much bigger and meaner systems than this all the time. But this one's MINE! 12 hot swap bays, Ryzen 7 2700 w/ ECC RAM, quiet enough to share an office with, and the trays can take either HDD or SSD with no adapter needed.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We explore the risky world of exposed RDP, from the brute force GoldBrute botnet to the dangerously worm-able BlueKeep vulnerability.</p>

<p>Plus the importance of automatic updates, and Jim&#39;s new backup box. </p><p>Links:</p><ul><li><a title="Errata Security: Almost One Million Vulnerable to BlueKeep Vuln (CVE-2019-0708)" rel="nofollow" href="https://blog.erratasec.com/2019/05/almost-one-million-vulnerable-to.html">Errata Security: Almost One Million Vulnerable to BlueKeep Vuln (CVE-2019-0708)</a> &mdash; Microsoft announced a vulnerability in it's "Remote Desktop" product that can lead to robust, wormable exploits. I scanned the Internet to assess the danger. I find nearly 1-million devices on the public Internet that are vulnerable to the bug. </li><li><a title="Even the NSA is urging Windows users to patch BlueKeep (CVE-2019-0708) | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/even-the-nsa-is-urging-windows-users-to-patch-bluekeep-cve-2019-0708/">Even the NSA is urging Windows users to patch BlueKeep (CVE-2019-0708) | ZDNet</a> &mdash; "[The] NSA is concerned that malicious cyber actors will use the vulnerability in ransomware and exploit kits containing other known exploits, increasing capabilities against other unpatched systems.

</li><li><a title="Prevent a worm by updating Remote Desktop Services (CVE-2019-0708) – MSRC" rel="nofollow" href="https://blogs.technet.microsoft.com/msrc/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/">Prevent a worm by updating Remote Desktop Services (CVE-2019-0708) – MSRC</a> &mdash; This vulnerability is pre-authentication and requires no user interaction. In other words, the vulnerability is ‘wormable’, meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017</li><li><a title="BlueKeep - everyone agrees, you should patch PCs running legacy versions of Windows" rel="nofollow" href="https://www.grahamcluley.com/bluekeep-everyone-agrees-you-should-patch-pcs-running-legacy-versions-of-windows/">BlueKeep - everyone agrees, you should patch PCs running legacy versions of Windows</a> &mdash; I have this horrible feeling that the only way we’re going to wake the world up to the need to patch their ageing versions of Windows against the BlueKeep vulnerability is to wait until a malicious worm begins to spread around the world.

</li><li><a title="CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability" rel="nofollow" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708">CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability</a> &mdash; A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

</li><li><a title="Customer guidance for CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability" rel="nofollow" href="https://support.microsoft.com/en-us/help/4500705/customer-guidance-for-cve-2019-0708">Customer guidance for CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability</a> &mdash; Microsoft is aware that some customers are running versions of Windows that no longer receive mainstream support. That means those customers will not have received any security updates to protect their systems from CVE-2019-0708, which is a critical remote code execution vulnerability.

</li><li><a title="Forget BlueKeep: Beware the GoldBrute | Threatpost" rel="nofollow" href="https://threatpost.com/forget-bluekeep-beware-goldbrute/145482/">Forget BlueKeep: Beware the GoldBrute | Threatpost</a> &mdash; In the past few days, GoldBrute (named after the Java class it uses) has attempted to brute-force Remote Desktop Protocol (RDP) connections for 1.5 million Windows systems and counting, according to Morphus Labs chief research officer Renato Marinho. The botnet is actively scanning the internet for machines with RDP exposed, and trying out weak or reused passwords to see if it can gain access to the systems.</li><li><a title="The GoldBrute botnet" rel="nofollow" href="https://nakedsecurity.sophos.com/2019/06/10/the-goldbrute-botnet-is-trying-to-crack-open-1-5-million-rdp-servers/">The GoldBrute botnet</a> &mdash; The latest round of bad news emerged last week when Morphus Labs’ researcher Renato Marinho announced the discovery of an aggressive brute force campaign against 1.5 million RDP servers by a botnet called ‘GoldBrute’.

</li><li><a title="Ubuntu Automatic Updates" rel="nofollow" href="https://help.ubuntu.com/lts/serverguide/automatic-updates.html.en">Ubuntu Automatic Updates</a> &mdash; The unattended-upgrades package can be used to automatically install updated packages, and can be configured to update all packages or just install security updates. </li><li><a title="AutoUpdates - Fedora Project Wiki" rel="nofollow" href="https://fedoraproject.org/wiki/AutoUpdates">AutoUpdates - Fedora Project Wiki</a> &mdash; You must decide whether to use automatic DNF or YUM updates on each of your machines. </li><li><a title="It&#39;s time to block Windows Automatic Updating | Computerworld" rel="nofollow" href="https://www.computerworld.com/article/3339563/its-time-to-block-windows-automatic-updating.html">It's time to block Windows Automatic Updating | Computerworld</a> &mdash; Those of you who feel it’s important to install Windows and Office patches the moment they come out – I salute you. The Windows world needs more cannon fodder.</li><li><a title="Windows 10&#39;s Ugly Updates Just Got Uglier. Here&#39;s How To Stay Safe by Disabling Automatic Updates" rel="nofollow" href="https://www.forbes.com/sites/kevinmurnane/2019/04/25/windows-10s-ugly-updates-just-got-uglier-heres-how-to-stay-safe-by-disabling-automatic-updates/#591e6ac67ff0">Windows 10's Ugly Updates Just Got Uglier. Here's How To Stay Safe by Disabling Automatic Updates</a> &mdash; Stay safe by disabling automatic updates? How is that possible? As a general rule of thumb, I’d never recommend disabling updates because security patches are essential. But the situation with Windows 10 has become intolerable. Microsoft continues to fail and continues to release update after update that they know, or should know, has serious problems.</li><li><a title="Jim&#39;s New Rig" rel="nofollow" href="https://twitter.com/jrssnet/status/1136721049641455617">Jim's New Rig</a> &mdash; I build, sell, and manage much bigger and meaner systems than this all the time. But this one's MINE! 12 hot swap bays, Ryzen 7 2700 w/ ECC RAM, quiet enough to share an office with, and the trays can take either HDD or SSD with no adapter needed.</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
