<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 22 Apr 2026 01:07:16 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Samsam”</title>
    <link>https://techsnap.systems/tags/samsam</link>
    <pubDate>Wed, 01 Aug 2018 10:30:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 377: Linux Under Pressure</title>
  <link>https://techsnap.systems/377</link>
  <guid isPermaLink="false">01754d0c-6956-4f6e-a545-e7ec9f178bb5</guid>
  <pubDate>Wed, 01 Aug 2018 10:30:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/01754d0c-6956-4f6e-a545-e7ec9f178bb5.mp3" length="25089856" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.</itunes:subtitle>
  <itunes:duration>29:15</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.
Plus the death of a TLD, the return of SamSam, and more! 
</description>
  <itunes:keywords>PSI, oomd, Facebook, out-of-memory, oom, SamSam, Ransomeware, Malware, cryptoware, Open source Jobs, Sysadmin Podcast, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.</p>

<p>Plus the death of a TLD, the return of SamSam, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="psi: pressure stall information for CPU, memory, and IO v2" rel="nofollow" href="https://lwn.net/Articles/759658/">psi: pressure stall information for CPU, memory, and IO v2</a> &mdash; PSI aggregates and reports the overall wallclock time in which the
tasks in a system (or cgroup) wait for contended hardware resources.</li><li><a title="Chinese “hackers” are sending malware via snail mail" rel="nofollow" href="https://techcrunch.com/2018/07/30/chinese-hackers-are-sending-malware-via-snail-mail/">Chinese “hackers” are sending malware via snail mail</a> &mdash; The trick is simple: a package arrives with a Chinese postmark containing a rambling message and a small CD. The CD, in turn, contains a set of Word files that include script-based malware. These scripts run when the victims access them on their computers, presumably resulting in compromised systems.</li><li><a title="The death of a TLD" rel="nofollow" href="https://blog.benjojo.co.uk/post/the-death-of-a-tld">The death of a TLD</a></li><li><a title="SamSam: The (almost) $6 million ransomware" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/07/31/samsam-the-almost-6-million-ransomware/">SamSam: The (almost) $6 million ransomware</a> &mdash; Through original analysis, interviews and research, and by collaborating closely with industry partners and a specialist cryptocurrency monitoring organisation, Sophos has uncovered new details about how the secretive and sophisticated SamSam ransomware is used, who’s been targeted, how it works and how it’s evolving.</li><li><a title="Open sourcing oomd, a new approach to handling OOMs" rel="nofollow" href="https://code.fb.com/production-engineering/open-sourcing-oomd-a-new-approach-to-handling-ooms/">Open sourcing oomd, a new approach to handling OOMs</a> &mdash; As our infrastructure has scaled, we’ve found that an increasing fraction of our machines and networks span multiple generations. One side effect of this multigenerational production environment is that a new software release or configuration change might result in a system running healthily on one machine but experiencing an out-of-memory (OOM) issue on another.</li><li><a title="Tyler&#39;s recent job story" rel="nofollow" href="https://pastebin.com/FnfbWygS">Tyler's recent job story</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.</p>

<p>Plus the death of a TLD, the return of SamSam, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="psi: pressure stall information for CPU, memory, and IO v2" rel="nofollow" href="https://lwn.net/Articles/759658/">psi: pressure stall information for CPU, memory, and IO v2</a> &mdash; PSI aggregates and reports the overall wallclock time in which the
tasks in a system (or cgroup) wait for contended hardware resources.</li><li><a title="Chinese “hackers” are sending malware via snail mail" rel="nofollow" href="https://techcrunch.com/2018/07/30/chinese-hackers-are-sending-malware-via-snail-mail/">Chinese “hackers” are sending malware via snail mail</a> &mdash; The trick is simple: a package arrives with a Chinese postmark containing a rambling message and a small CD. The CD, in turn, contains a set of Word files that include script-based malware. These scripts run when the victims access them on their computers, presumably resulting in compromised systems.</li><li><a title="The death of a TLD" rel="nofollow" href="https://blog.benjojo.co.uk/post/the-death-of-a-tld">The death of a TLD</a></li><li><a title="SamSam: The (almost) $6 million ransomware" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/07/31/samsam-the-almost-6-million-ransomware/">SamSam: The (almost) $6 million ransomware</a> &mdash; Through original analysis, interviews and research, and by collaborating closely with industry partners and a specialist cryptocurrency monitoring organisation, Sophos has uncovered new details about how the secretive and sophisticated SamSam ransomware is used, who’s been targeted, how it works and how it’s evolving.</li><li><a title="Open sourcing oomd, a new approach to handling OOMs" rel="nofollow" href="https://code.fb.com/production-engineering/open-sourcing-oomd-a-new-approach-to-handling-ooms/">Open sourcing oomd, a new approach to handling OOMs</a> &mdash; As our infrastructure has scaled, we’ve found that an increasing fraction of our machines and networks span multiple generations. One side effect of this multigenerational production environment is that a new software release or configuration change might result in a system running healthily on one machine but experiencing an out-of-memory (OOM) issue on another.</li><li><a title="Tyler&#39;s recent job story" rel="nofollow" href="https://pastebin.com/FnfbWygS">Tyler's recent job story</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 352: Stop Using apt-get </title>
  <link>https://techsnap.systems/352</link>
  <guid isPermaLink="false">a35e6ff5-f699-4f4a-b6dd-3f01fff2a445</guid>
  <pubDate>Mon, 22 Jan 2018 21:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a35e6ff5-f699-4f4a-b6dd-3f01fff2a445.mp3" length="26958801" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>And start using configuration management. Embrace reproducibility of systems, and streamlined management with TechSNAP’s introduction to Configuration Management.
</itunes:subtitle>
  <itunes:duration>36:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>And start using configuration management. Embrace reproducibility of systems, and streamlined management with TechSNAP’s introduction to Configuration Management.
Plus the news of the week that could impact your systems, feedback, and more. 
</description>
  <content:encoded>
    <![CDATA[<p>And start using configuration management. Embrace reproducibility of systems, and streamlined management with TechSNAP’s introduction to Configuration Management.</p>

<p>Plus the news of the week that could impact your systems, feedback, and more.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="SamSam Ransomware Hits Hospitals, City Councils, ICS Firms" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/samsam-ransomware-hits-hospitals-city-councils-ics-firms/">SamSam Ransomware Hits Hospitals, City Councils, ICS Firms</a> &mdash; The SamSam crew usually scans the Internet for computers with open RDP connections and they break into networks by brute-forcing these RDP endpoints to spread to more computers.
</li><li><a title="RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an…" rel="nofollow" href="https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6">RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an…</a> &mdash; How you can very easily use Remote Desktop Services to gain lateral movement through a network, using no external software.</li><li><a title="EFF and Lookout Uncover New Malware Espionage Campaign Infecting Thousands Around the World" rel="nofollow" href="https://www.eff.org/press/releases/eff-and-lookout-uncover-new-malware-espionage-campaign-infecting-thousands-around">EFF and Lookout Uncover New Malware Espionage Campaign Infecting Thousands Around the World</a> &mdash; The trojanized apps, including Signal and WhatsApp, function like the legitimate apps and send and receive messages normally. However, the fake apps also allow the attackers to take photos, retrieve location information, capture audio, and more.</li><li><a title="Lenovo Discovers and Removes Backdoor in Networking Switches" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/lenovo-discovers-and-removes-backdoor-in-networking-switches/">Lenovo Discovers and Removes Backdoor in Networking Switches</a> &mdash; Lenovo engineers have discovered a backdoor in the firmware of RackSwitch and BladeCenter networking switches. The company released firmware updates earlier this week.</li><li><a title="Intel says Meltdown / Spectre patch causes reboots in computers with newer processors too" rel="nofollow" href="https://www.theverge.com/2018/1/18/16904726/intel-meltdown-spectre-fix-higher-reboots">Intel says Meltdown / Spectre patch causes reboots in computers with newer processors too</a> &mdash; Data center performance can degrade by up to 25 percent for certain workloads.</li><li><a title="VMware pulled Spectre patches on Friday." rel="nofollow" href="https://www.reddit.com/r/sysadmin/comments/7qjnfx/vmware_pulled_spectre_patches_on_friday/">VMware pulled Spectre patches on Friday.</a> &mdash; Affected updates are the ones for ESXi under VMSA-2018-0004 that contained CPU microcode. Despite these being the affected patches, all of the patches under VMSA-2018-004 have been pulled.</li><li><a title="Spectre Mitigation Added To GCC 8, Seeking Backport To GCC 7" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=GCC-8-Spectre-Mitigation-Lands">Spectre Mitigation Added To GCC 8, Seeking Backport To GCC 7</a> &mdash; The set of Spectre mitigation patches for the GNU Compiler Collection (GCC) were accepted to mainline and will be part of GCC 8 with the GCC 8.1 stable release that will likely be due out around March. This is on top of many other changes/features of GCC 8. </li><li><a title="New Linux Method to Check your System" rel="nofollow" href="http://kroah.com/log/blog/2018/01/19/meltdown-status-2/">New Linux Method to Check your System</a> &mdash; grep . /sys/devices/system/cpu/vulnerabilities/*</li><li><a title="AMD Processor Security" rel="nofollow" href="https://www.amd.com/en/corporate/speculative-execution">AMD Processor Security</a> &mdash; AMD will make optional microcode updates available to our customers and partners for Ryzen and EPYC processors starting this week.</li><li><a title="Skyfall and Solace" rel="nofollow" href="https://skyfallattack.com/">Skyfall and Solace</a></li><li><a title="An Introduction to Configuration Management | DigitalOcean" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/an-introduction-to-configuration-management">An Introduction to Configuration Management | DigitalOcean</a> &mdash; As a broader subject, configuration management (CM) refers to the process of systematically handling changes to a system in a way that it maintains integrity over time. Even though this process was not originated in the IT industry, the term is broadly used to refer to server configuration management</li><li><a title="Configuration Management on the Desktop" rel="nofollow" href="https://slexy.org/view/s23m6LwSnL">Configuration Management on the Desktop</a> &mdash; It installs GNOME, sets up my wallpaper, applies my GTK/icon themes, sets up my keyboard shortcuts, etc. It also sets up my SSH keys, user dotfiles, OpenSSH config, and much more. </li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>And start using configuration management. Embrace reproducibility of systems, and streamlined management with TechSNAP’s introduction to Configuration Management.</p>

<p>Plus the news of the week that could impact your systems, feedback, and more.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="SamSam Ransomware Hits Hospitals, City Councils, ICS Firms" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/samsam-ransomware-hits-hospitals-city-councils-ics-firms/">SamSam Ransomware Hits Hospitals, City Councils, ICS Firms</a> &mdash; The SamSam crew usually scans the Internet for computers with open RDP connections and they break into networks by brute-forcing these RDP endpoints to spread to more computers.
</li><li><a title="RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an…" rel="nofollow" href="https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6">RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an…</a> &mdash; How you can very easily use Remote Desktop Services to gain lateral movement through a network, using no external software.</li><li><a title="EFF and Lookout Uncover New Malware Espionage Campaign Infecting Thousands Around the World" rel="nofollow" href="https://www.eff.org/press/releases/eff-and-lookout-uncover-new-malware-espionage-campaign-infecting-thousands-around">EFF and Lookout Uncover New Malware Espionage Campaign Infecting Thousands Around the World</a> &mdash; The trojanized apps, including Signal and WhatsApp, function like the legitimate apps and send and receive messages normally. However, the fake apps also allow the attackers to take photos, retrieve location information, capture audio, and more.</li><li><a title="Lenovo Discovers and Removes Backdoor in Networking Switches" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/lenovo-discovers-and-removes-backdoor-in-networking-switches/">Lenovo Discovers and Removes Backdoor in Networking Switches</a> &mdash; Lenovo engineers have discovered a backdoor in the firmware of RackSwitch and BladeCenter networking switches. The company released firmware updates earlier this week.</li><li><a title="Intel says Meltdown / Spectre patch causes reboots in computers with newer processors too" rel="nofollow" href="https://www.theverge.com/2018/1/18/16904726/intel-meltdown-spectre-fix-higher-reboots">Intel says Meltdown / Spectre patch causes reboots in computers with newer processors too</a> &mdash; Data center performance can degrade by up to 25 percent for certain workloads.</li><li><a title="VMware pulled Spectre patches on Friday." rel="nofollow" href="https://www.reddit.com/r/sysadmin/comments/7qjnfx/vmware_pulled_spectre_patches_on_friday/">VMware pulled Spectre patches on Friday.</a> &mdash; Affected updates are the ones for ESXi under VMSA-2018-0004 that contained CPU microcode. Despite these being the affected patches, all of the patches under VMSA-2018-004 have been pulled.</li><li><a title="Spectre Mitigation Added To GCC 8, Seeking Backport To GCC 7" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=GCC-8-Spectre-Mitigation-Lands">Spectre Mitigation Added To GCC 8, Seeking Backport To GCC 7</a> &mdash; The set of Spectre mitigation patches for the GNU Compiler Collection (GCC) were accepted to mainline and will be part of GCC 8 with the GCC 8.1 stable release that will likely be due out around March. This is on top of many other changes/features of GCC 8. </li><li><a title="New Linux Method to Check your System" rel="nofollow" href="http://kroah.com/log/blog/2018/01/19/meltdown-status-2/">New Linux Method to Check your System</a> &mdash; grep . /sys/devices/system/cpu/vulnerabilities/*</li><li><a title="AMD Processor Security" rel="nofollow" href="https://www.amd.com/en/corporate/speculative-execution">AMD Processor Security</a> &mdash; AMD will make optional microcode updates available to our customers and partners for Ryzen and EPYC processors starting this week.</li><li><a title="Skyfall and Solace" rel="nofollow" href="https://skyfallattack.com/">Skyfall and Solace</a></li><li><a title="An Introduction to Configuration Management | DigitalOcean" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/an-introduction-to-configuration-management">An Introduction to Configuration Management | DigitalOcean</a> &mdash; As a broader subject, configuration management (CM) refers to the process of systematically handling changes to a system in a way that it maintains integrity over time. Even though this process was not originated in the IT industry, the term is broadly used to refer to server configuration management</li><li><a title="Configuration Management on the Desktop" rel="nofollow" href="https://slexy.org/view/s23m6LwSnL">Configuration Management on the Desktop</a> &mdash; It installs GNOME, sets up my wallpaper, applies my GTK/icon themes, sets up my keyboard shortcuts, etc. It also sets up my SSH keys, user dotfiles, OpenSSH config, and much more. </li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
