<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 15 Apr 2026 19:24:35 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Rtl Sdr”</title>
    <link>https://techsnap.systems/tags/rtl-sdr</link>
    <pubDate>Tue, 24 Apr 2018 17:00:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 365: The Unfixable Exploit</title>
  <link>https://techsnap.systems/365</link>
  <guid isPermaLink="false">bebfb1b6-cfe5-4c97-855e-24922aeb957c</guid>
  <pubDate>Tue, 24 Apr 2018 17:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/bebfb1b6-cfe5-4c97-855e-24922aeb957c.mp3" length="33195967" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle. </itunes:subtitle>
  <itunes:duration>38:54</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle.  
</description>
  <content:encoded>
    <![CDATA[<p>Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle. </p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Sysadmin unplugged wrong server, ran away, hoped nobody noticed • The Register" rel="nofollow" href="https://www.theregister.co.uk/2018/04/23/who_me/">Sysadmin unplugged wrong server, ran away, hoped nobody noticed • The Register</a> &mdash; ‘I was a snot-nosed kid fresh out of college and thought I knew everything!’</li><li><a title="Spoofing Cell Networks with a USB to VGA Adapter | Hackaday" rel="nofollow" href="https://hackaday.com/2018/04/23/spoofing-cell-networks-with-a-usb-to-vga-adapter/">Spoofing Cell Networks with a USB to VGA Adapter | Hackaday</a> &mdash;  Available through the usual overseas suppliers for as little has $5 USD, these devices can be used unmodified to transmit low-power FM, DAB, DVB-T, GSM, UMTS and GPS signals.</li><li><a title="ShofEL2, a Tegra X1 and Nintendo Switch exploit" rel="nofollow" href="https://fail0verflow.com/blog/2018/shofel2/">ShofEL2, a Tegra X1 and Nintendo Switch exploit</a> &mdash; The Tegra X1 (also known as Tegra210) SoC inside the Nintendo Switch contains an exploitable bug that allow taking control over early execution, bypassing all signature checks.</li><li><a title="Atlanta spends more than $2 million to recover from ransomware attack" rel="nofollow" href="https://www.engadget.com/2018/04/23/atlanta-spends-over-2-million-ransomware-recovery/">Atlanta spends more than $2 million to recover from ransomware attack</a> &mdash; . It appears that firms Secureworks and Ernst &amp; Young were paid $650,000 and $600,000, respectively, for emergency services while Edelman was paid $50,000 for crisis communication services. Overall, the funds seemingly applied to the ransomware attack response add up to approximately $2.7 million.</li><li><a title="Google Chrome 66 Released Today Focuses on Security" rel="nofollow" href="https://www.bleepingcomputer.com/news/google/google-chrome-66-released-today-focuses-on-security/">Google Chrome 66 Released Today Focuses on Security</a> &mdash; The biggest change is that Google Chrome will start showing SSL certificate errors for all Symantec certs issued before June 1, 2016. This is "stage two" of Google's long-term plan on distrusting Symantec certificates altogether.</li><li><a title="Where to get started with monitoring?" rel="nofollow" href="https://pastebin.com/bPn1cGLV">Where to get started with monitoring?</a></li><li><a title="defunkt uses a fool tools for his network" rel="nofollow" href="https://pastebin.com/aFmwbguq">defunkt uses a fool tools for his network</a></li><li><a title="Brian shares some love for Zabbix" rel="nofollow" href="https://pastebin.com/z93N6GzR">Brian shares some love for Zabbix</a></li><li><a title="VMware Patches Pwn2Own VM Escape Vulnerabilities" rel="nofollow" href="https://threatpost.com/vmware-patches-pwn2own-vm-escape-vulnerabilities/124629/">VMware Patches Pwn2Own VM Escape Vulnerabilities</a> &mdash; VMware on Tuesday patched a series of vulnerabilities uncovered earlier this month at Pwn2Own. The flaws enabled an attacker to execute code on a workstation and carry out a virtual machine escape to attack a host server.</li><li><a title="balena - A Moby-based container engine for IoT" rel="nofollow" href="https://www.balena.io/">balena - A Moby-based container engine for IoT</a> &mdash; A Moby-based container engine for IoT</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle. </p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Sysadmin unplugged wrong server, ran away, hoped nobody noticed • The Register" rel="nofollow" href="https://www.theregister.co.uk/2018/04/23/who_me/">Sysadmin unplugged wrong server, ran away, hoped nobody noticed • The Register</a> &mdash; ‘I was a snot-nosed kid fresh out of college and thought I knew everything!’</li><li><a title="Spoofing Cell Networks with a USB to VGA Adapter | Hackaday" rel="nofollow" href="https://hackaday.com/2018/04/23/spoofing-cell-networks-with-a-usb-to-vga-adapter/">Spoofing Cell Networks with a USB to VGA Adapter | Hackaday</a> &mdash;  Available through the usual overseas suppliers for as little has $5 USD, these devices can be used unmodified to transmit low-power FM, DAB, DVB-T, GSM, UMTS and GPS signals.</li><li><a title="ShofEL2, a Tegra X1 and Nintendo Switch exploit" rel="nofollow" href="https://fail0verflow.com/blog/2018/shofel2/">ShofEL2, a Tegra X1 and Nintendo Switch exploit</a> &mdash; The Tegra X1 (also known as Tegra210) SoC inside the Nintendo Switch contains an exploitable bug that allow taking control over early execution, bypassing all signature checks.</li><li><a title="Atlanta spends more than $2 million to recover from ransomware attack" rel="nofollow" href="https://www.engadget.com/2018/04/23/atlanta-spends-over-2-million-ransomware-recovery/">Atlanta spends more than $2 million to recover from ransomware attack</a> &mdash; . It appears that firms Secureworks and Ernst &amp; Young were paid $650,000 and $600,000, respectively, for emergency services while Edelman was paid $50,000 for crisis communication services. Overall, the funds seemingly applied to the ransomware attack response add up to approximately $2.7 million.</li><li><a title="Google Chrome 66 Released Today Focuses on Security" rel="nofollow" href="https://www.bleepingcomputer.com/news/google/google-chrome-66-released-today-focuses-on-security/">Google Chrome 66 Released Today Focuses on Security</a> &mdash; The biggest change is that Google Chrome will start showing SSL certificate errors for all Symantec certs issued before June 1, 2016. This is "stage two" of Google's long-term plan on distrusting Symantec certificates altogether.</li><li><a title="Where to get started with monitoring?" rel="nofollow" href="https://pastebin.com/bPn1cGLV">Where to get started with monitoring?</a></li><li><a title="defunkt uses a fool tools for his network" rel="nofollow" href="https://pastebin.com/aFmwbguq">defunkt uses a fool tools for his network</a></li><li><a title="Brian shares some love for Zabbix" rel="nofollow" href="https://pastebin.com/z93N6GzR">Brian shares some love for Zabbix</a></li><li><a title="VMware Patches Pwn2Own VM Escape Vulnerabilities" rel="nofollow" href="https://threatpost.com/vmware-patches-pwn2own-vm-escape-vulnerabilities/124629/">VMware Patches Pwn2Own VM Escape Vulnerabilities</a> &mdash; VMware on Tuesday patched a series of vulnerabilities uncovered earlier this month at Pwn2Own. The flaws enabled an attacker to execute code on a workstation and carry out a virtual machine escape to attack a host server.</li><li><a title="balena - A Moby-based container engine for IoT" rel="nofollow" href="https://www.balena.io/">balena - A Moby-based container engine for IoT</a> &mdash; A Moby-based container engine for IoT</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
