<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 07 May 2026 19:55:34 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Security Shaming”</title>
    <link>https://techsnap.systems/tags/security%20shaming</link>
    <pubDate>Thu, 13 Sep 2018 21:30:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 383: The Power of Shame</title>
  <link>https://techsnap.systems/383</link>
  <guid isPermaLink="false">8012b7a1-2660-4bbc-8dda-a09c631b57ab</guid>
  <pubDate>Thu, 13 Sep 2018 21:30:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/8012b7a1-2660-4bbc-8dda-a09c631b57ab.mp3" length="43811399" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>TechSNAP progenitor and special guest Allan Jude joins us to talk mobile security, hand out some SSH tips and tricks, and discuss why security shaming works so well.</itunes:subtitle>
  <itunes:duration>51:48</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>&lt;p&gt;TechSNAP progenitor and special guest Allan Jude joins us to talk mobile security, hand out some SSH tips and tricks, and discuss why security shaming works so well.&lt;/p&gt;

&lt;p&gt;Plus, how Mozilla is protecting their GitHub repos, a check-in on Equifax, and some great picks.&lt;br&gt;
 Special Guest: Allan Jude.&lt;/p&gt;
</description>
  <itunes:keywords>Mozilla, GitHub, Javascript, Supply Chain, British Airways, Equifax, SSH, SSH Forwarding, Security Shaming, Project Verify, 2FA, Apple, CSV, SQL, Sysadmin, Devops, Podcast</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>TechSNAP progenitor and special guest Allan Jude joins us to talk mobile security, hand out some SSH tips and tricks, and discuss why security shaming works so well.</p>

<p>Plus, how Mozilla is protecting their GitHub repos, a check-in on Equifax, and some great picks.</p><p>Special Guest: Allan Jude.</p><p>Links:</p><ul><li><a title="Protecting Mozilla’s GitHub Repositories from Malicious Modification" rel="nofollow" href="https://blog.mozilla.org/security/2018/09/11/protecting-mozillas-github-repositories-from-malicious-modification/">Protecting Mozilla’s GitHub Repositories from Malicious Modification</a></li><li><a title="British Airways: Suspect code that hacked fliers &#39;found&#39;" rel="nofollow" href="https://www.bbc.co.uk/news/technology-45481976">British Airways: Suspect code that hacked fliers 'found'</a></li><li><a title="A year later, Equifax lost your data but faced little fallout" rel="nofollow" href="https://techcrunch.com/2018/09/08/equifax-one-year-later-unscathed/">A year later, Equifax lost your data but faced little fallout</a></li><li><a title="Security Implications of SSH Forwarding" rel="nofollow" href="https://slexy.org/view/s24sQBImsz">Security Implications of SSH Forwarding</a></li><li><a title="sshd_config manual" rel="nofollow" href="https://man.openbsd.org/sshd_config.5#GatewayPorts">sshd_config manual</a></li><li><a title="SSH Chaining (for jumphosts)" rel="nofollow" href="http://www.bsdnow.tv/tutorials/ssh-chaining">SSH Chaining (for jumphosts)</a></li><li><a title="Troy Hunt posts a blog where he argues in favour of publicly shaming companies for bad security" rel="nofollow" href="https://www.troyhunt.com/the-effectiveness-of-publicly-shaming-bad-security/">Troy Hunt posts a blog where he argues in favour of publicly shaming companies for bad security</a></li><li><a title="Your phone is NOT your password" rel="nofollow" href="https://krebsonsecurity.com/2018/09/u-s-mobile-giants-want-to-be-your-online-identity/">Your phone is NOT your password</a></li><li><a title="Select Star SQL: an interactive book which aims to be the best place to learn SQL" rel="nofollow" href="https://selectstarsql.com/">Select Star SQL: an interactive book which aims to be the best place to learn SQL</a></li><li><a title="Source Of Evil – A Botnet Code Collection" rel="nofollow" href="https://hackaday.com/2018/09/09/source-of-evil-a-botnet-code-collection/">Source Of Evil – A Botnet Code Collection</a></li><li><a title="xsv: A fast CSV command line toolkit written in Rust" rel="nofollow" href="https://github.com/BurntSushi/xsv">xsv: A fast CSV command line toolkit written in Rust</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>TechSNAP progenitor and special guest Allan Jude joins us to talk mobile security, hand out some SSH tips and tricks, and discuss why security shaming works so well.</p>

<p>Plus, how Mozilla is protecting their GitHub repos, a check-in on Equifax, and some great picks.</p><p>Special Guest: Allan Jude.</p><p>Links:</p><ul><li><a title="Protecting Mozilla’s GitHub Repositories from Malicious Modification" rel="nofollow" href="https://blog.mozilla.org/security/2018/09/11/protecting-mozillas-github-repositories-from-malicious-modification/">Protecting Mozilla’s GitHub Repositories from Malicious Modification</a></li><li><a title="British Airways: Suspect code that hacked fliers &#39;found&#39;" rel="nofollow" href="https://www.bbc.co.uk/news/technology-45481976">British Airways: Suspect code that hacked fliers 'found'</a></li><li><a title="A year later, Equifax lost your data but faced little fallout" rel="nofollow" href="https://techcrunch.com/2018/09/08/equifax-one-year-later-unscathed/">A year later, Equifax lost your data but faced little fallout</a></li><li><a title="Security Implications of SSH Forwarding" rel="nofollow" href="https://slexy.org/view/s24sQBImsz">Security Implications of SSH Forwarding</a></li><li><a title="sshd_config manual" rel="nofollow" href="https://man.openbsd.org/sshd_config.5#GatewayPorts">sshd_config manual</a></li><li><a title="SSH Chaining (for jumphosts)" rel="nofollow" href="http://www.bsdnow.tv/tutorials/ssh-chaining">SSH Chaining (for jumphosts)</a></li><li><a title="Troy Hunt posts a blog where he argues in favour of publicly shaming companies for bad security" rel="nofollow" href="https://www.troyhunt.com/the-effectiveness-of-publicly-shaming-bad-security/">Troy Hunt posts a blog where he argues in favour of publicly shaming companies for bad security</a></li><li><a title="Your phone is NOT your password" rel="nofollow" href="https://krebsonsecurity.com/2018/09/u-s-mobile-giants-want-to-be-your-online-identity/">Your phone is NOT your password</a></li><li><a title="Select Star SQL: an interactive book which aims to be the best place to learn SQL" rel="nofollow" href="https://selectstarsql.com/">Select Star SQL: an interactive book which aims to be the best place to learn SQL</a></li><li><a title="Source Of Evil – A Botnet Code Collection" rel="nofollow" href="https://hackaday.com/2018/09/09/source-of-evil-a-botnet-code-collection/">Source Of Evil – A Botnet Code Collection</a></li><li><a title="xsv: A fast CSV command line toolkit written in Rust" rel="nofollow" href="https://github.com/BurntSushi/xsv">xsv: A fast CSV command line toolkit written in Rust</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
