January 24th, 2020 | 25 mins 9 secs
2600, a cloud guru, apollo, arm, bsd, captain crunch whistle, certificate validation, crypt32.dll, cryptoapi spoofing, cryptography, crystal method, cve-2020-0601, devops, ecc, elliptic curve cryptography, eternalblue, firewall, firewall appliance, hacking, iptables, john draper, jupiter broadcasting, linux, linux academy, microsoft, mitm, moon, nasa, national security administration, netgate, netgear, networking, nmap, nsa, opnsense, patch tuesday, patching, pf, pfsense, phreaking, quindar, quindar tones, rdp, rdp client, rdp gateway, routing, security, security gateway, space, sysadmin podcast, techsnap, telephony, unix, vpn, vulnerability, windows, windows 10, windows update, x86
We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family.
August 23rd, 2019 | 50 mins 7 secs
amd, amd epyc, amd psp, amd rome, bluekeep, bluetooth, bruteforce, certificate lifespace, comet lake, cpu, cpu benchmarks, ctftool security, devops, encryption, entropy, ev certs, extended validation, https, ice lake, intel, intel me, jupiter broadcasting, knob, knob attack, memory encryption, rdp, security, sem, sev, sgx, ssl, ssl certifications, sysadmin podcast, techsnap, text services framework, tls, virtualization, vulnerabilities, windows, worms
It's CPU release season and we get excited about AMD's new line of server chips. Plus our take on AMD's approach to memory encryption, and our struggle to make sense of Intel's Comet Lake line.
June 11th, 2019 | 30 mins 47 secs
automatic updates, backups, bluekeep, brute force, devops, firewalls, goldbrute, hard drive, industrial control systems, internet worm, microsoft, nas, network security, nsa, out of support, password security, patching, patching policies, rdp, remote desktop, remote desktop protocol, rosewill, security, ssd, storage, supermicro, techsnap, terminal services, updates, vulnerabilities, wannacry, windows, windows update, windows xp, worm
We explore the risky world of exposed RDP, from the brute force GoldBrute botnet to the dangerously worm-able BlueKeep vulnerability.