<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 08 May 2026 21:09:57 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Upnp”</title>
    <link>https://techsnap.systems/tags/upnp</link>
    <pubDate>Thu, 15 Nov 2018 15:00:00 -0800</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 389: The Future of HTTP</title>
  <link>https://techsnap.systems/389</link>
  <guid isPermaLink="false">a3776de2-0fab-45fc-8d29-dcd0f2e6da03</guid>
  <pubDate>Thu, 15 Nov 2018 15:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a3776de2-0fab-45fc-8d29-dcd0f2e6da03.mp3" length="37053157" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Wes is joined by special guest Jim Salter to discuss Google's recent BGP outage and the future of HTTP.</itunes:subtitle>
  <itunes:duration>43:46</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>&lt;p&gt;Wes is joined by special guest Jim Salter to discuss Google's recent BGP outage and the future of HTTP.&lt;/p&gt;

&lt;p&gt;Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router. Special Guest: Jim Salter.&lt;/p&gt;
</description>
  <itunes:keywords>BGP, Google, MainOne, China Telecom, BGP Security, RPKI, BGP Leak, BGP Hijack, HTTP, TLS, QUIC, HTTP/3, Encryption, UDP, Spam, Router, UPnP, Botnet, Broadcom, BCMUPnP_Hunter, format string vulnerability, HTTP-over-QUIC, Router Security, WireGuard, Homebrew Router, Wifi, Jim Salter, Ars Technica, Sanoid, Security, Networking, SysAdmin, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Wes is joined by special guest Jim Salter to discuss Google&#39;s recent BGP outage and the future of HTTP.</p>

<p>Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="Google goes down after major BGP mishap routes traffic through China" rel="nofollow" href="https://arstechnica.com/information-technology/2018/11/major-bgp-mishap-takes-down-google-as-traffic-improperly-travels-to-china/">Google goes down after major BGP mishap routes traffic through China</a> &mdash; Google lost control of several million of its IP addresses for more than an hour on Monday in an event that intermittently made its search and other services unavailable to many users.</li><li><a title="Internet Vulnerability Takes Down Google" rel="nofollow" href="https://blog.thousandeyes.com/internet-vulnerability-takes-down-google/">Internet Vulnerability Takes Down Google</a></li><li><a title="China has been &#39;hijacking the vital internet backbone of western countries&#39;" rel="nofollow" href="https://www.zdnet.com/article/china-has-been-hijacking-the-vital-internet-backbone-of-western-countries/">China has been 'hijacking the vital internet backbone of western countries'</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="HTTP/3" rel="nofollow" href="https://daniel.haxx.se/blog/2018/11/11/http-3/">HTTP/3</a> &mdash; The protocol that's been called HTTP-over-QUIC for quite some time has now changed name and will officially become HTTP/3.</li><li><a title="HTTP/3: Come for the speed, stay for the security" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/14/http-3-come-for-the-speed-stay-for-the-security/">HTTP/3: Come for the speed, stay for the security</a></li><li><a title="The Road to QUIC" rel="nofollow" href="https://blog.cloudflare.com/the-road-to-quic/">The Road to QUIC</a></li><li><a title="Botnet pwns 100,000 routers using ancient security flaw" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/12/botnet-pwns-100000-routers-using-ancient-security-flaw/">Botnet pwns 100,000 routers using ancient security flaw</a> &mdash; Researchers have stumbled on another large botnet that’s been quietly hijacking home routers while nobody was paying attention</li><li><a title="BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers" rel="nofollow" href="http://www.dcwg.org/bcmpupnp_hunter-a-100k-botnet-turns-home-routers-to-email-spammers/">BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers</a></li><li><a title="From Zero to ZeroDay Journey: Router Hacking" rel="nofollow" href="http://defensecode.com/whitepapers/From_Zero_To_ZeroDay_Network_Devices_Exploitation.txt">From Zero to ZeroDay Journey: Router Hacking</a></li><li><a title="The Ars guide to building a Linux router from scratch" rel="nofollow" href="https://arstechnica.com/gadgets/2016/04/the-ars-guide-to-building-a-linux-router-from-scratch/">The Ars guide to building a Linux router from scratch</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Wes is joined by special guest Jim Salter to discuss Google&#39;s recent BGP outage and the future of HTTP.</p>

<p>Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="Google goes down after major BGP mishap routes traffic through China" rel="nofollow" href="https://arstechnica.com/information-technology/2018/11/major-bgp-mishap-takes-down-google-as-traffic-improperly-travels-to-china/">Google goes down after major BGP mishap routes traffic through China</a> &mdash; Google lost control of several million of its IP addresses for more than an hour on Monday in an event that intermittently made its search and other services unavailable to many users.</li><li><a title="Internet Vulnerability Takes Down Google" rel="nofollow" href="https://blog.thousandeyes.com/internet-vulnerability-takes-down-google/">Internet Vulnerability Takes Down Google</a></li><li><a title="China has been &#39;hijacking the vital internet backbone of western countries&#39;" rel="nofollow" href="https://www.zdnet.com/article/china-has-been-hijacking-the-vital-internet-backbone-of-western-countries/">China has been 'hijacking the vital internet backbone of western countries'</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="HTTP/3" rel="nofollow" href="https://daniel.haxx.se/blog/2018/11/11/http-3/">HTTP/3</a> &mdash; The protocol that's been called HTTP-over-QUIC for quite some time has now changed name and will officially become HTTP/3.</li><li><a title="HTTP/3: Come for the speed, stay for the security" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/14/http-3-come-for-the-speed-stay-for-the-security/">HTTP/3: Come for the speed, stay for the security</a></li><li><a title="The Road to QUIC" rel="nofollow" href="https://blog.cloudflare.com/the-road-to-quic/">The Road to QUIC</a></li><li><a title="Botnet pwns 100,000 routers using ancient security flaw" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/12/botnet-pwns-100000-routers-using-ancient-security-flaw/">Botnet pwns 100,000 routers using ancient security flaw</a> &mdash; Researchers have stumbled on another large botnet that’s been quietly hijacking home routers while nobody was paying attention</li><li><a title="BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers" rel="nofollow" href="http://www.dcwg.org/bcmpupnp_hunter-a-100k-botnet-turns-home-routers-to-email-spammers/">BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers</a></li><li><a title="From Zero to ZeroDay Journey: Router Hacking" rel="nofollow" href="http://defensecode.com/whitepapers/From_Zero_To_ZeroDay_Network_Devices_Exploitation.txt">From Zero to ZeroDay Journey: Router Hacking</a></li><li><a title="The Ars guide to building a Linux router from scratch" rel="nofollow" href="https://arstechnica.com/gadgets/2016/04/the-ars-guide-to-building-a-linux-router-from-scratch/">The Ars guide to building a Linux router from scratch</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 369: Another Pass at Bypass</title>
  <link>https://techsnap.systems/369</link>
  <guid isPermaLink="false">c9e44cac-c711-4e40-a417-2d0ecc5712e7</guid>
  <pubDate>Wed, 23 May 2018 14:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/c9e44cac-c711-4e40-a417-2d0ecc5712e7.mp3" length="38084184" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We’ll explain how Speculative Store Bypass works, and the new mitigation techniques that are inbound. </itunes:subtitle>
  <itunes:duration>44:43</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>&lt;p&gt;We’ll explain how Speculative Store Bypass works, and the new mitigation techniques that are inbound. &lt;/p&gt;

&lt;p&gt;Plus this week’s security news has a bit of a theme, and we share some great war stories sent into the show. &lt;/p&gt;
</description>
  <content:encoded>
    <![CDATA[<p>We’ll explain how Speculative Store Bypass works, and the new mitigation techniques that are inbound. </p>

<p>Plus this week’s security news has a bit of a theme, and we share some great war stories sent into the show.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Security Flaw Impacts Electron-Based Apps" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/security-flaw-impacts-electron-based-apps/">Security Flaw Impacts Electron-Based Apps</a></li><li><a title="Attackers Use UPnP to Sidestep DDoS Defenses | Threatpost | The first stop for security news" rel="nofollow" href="https://threatpost.com/attackers-use-upnp-to-sidestep-ddos-defenses/131981/">Attackers Use UPnP to Sidestep DDoS Defenses | Threatpost | The first stop for security news</a></li><li><a title="Another severe flaw in Signal desktop app lets hackers steal your chats in plaintext" rel="nofollow" href="https://thehackernews.com/2018/05/signal-desktop-hacking.html?m=1">Another severe flaw in Signal desktop app lets hackers steal your chats in plaintext</a></li><li><a title="Critical Linux Flaw Opens the Door to Full Root Access | Threatpost | The first stop for security news" rel="nofollow" href="https://threatpost.com/critical-linux-flaw-opens-the-door-to-full-root-access/132034/">Critical Linux Flaw Opens the Door to Full Root Access | Threatpost | The first stop for security news</a></li><li><a title="Microsoft, Google: We&#39;ve found a fourth data-leaking Meltdown-Spectre CPU hole • The Register" rel="nofollow" href="https://www.theregister.co.uk/2018/05/21/spectre_meltdown_v4_microsoft_google/">Microsoft, Google: We've found a fourth data-leaking Meltdown-Spectre CPU hole • The Register</a></li><li><a title="Speculative Store Bypass explained: what it is, how it works" rel="nofollow" href="https://www.redhat.com/en/blog/speculative-store-bypass-explained-what-it-how-it-works">Speculative Store Bypass explained: what it is, how it works</a></li><li><a title="TechSNAP Episode 351: Performance Meltdown" rel="nofollow" href="http://techsnap.systems/351">TechSNAP Episode 351: Performance Meltdown</a></li><li><a title="Dave&#39;s Users flip the switch!" rel="nofollow" href="https://pastebin.com/LKVFaUYp">Dave's Users flip the switch!</a></li><li><a title="Dave&#39;s War Story is really Screwy!" rel="nofollow" href="https://pastebin.com/tsfjKEhb">Dave's War Story is really Screwy!</a></li><li><a title="Egon&#39;s Adventures in misslabled VMs" rel="nofollow" href="https://pastebin.com/wg4y034g">Egon's Adventures in misslabled VMs</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We’ll explain how Speculative Store Bypass works, and the new mitigation techniques that are inbound. </p>

<p>Plus this week’s security news has a bit of a theme, and we share some great war stories sent into the show.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Security Flaw Impacts Electron-Based Apps" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/security-flaw-impacts-electron-based-apps/">Security Flaw Impacts Electron-Based Apps</a></li><li><a title="Attackers Use UPnP to Sidestep DDoS Defenses | Threatpost | The first stop for security news" rel="nofollow" href="https://threatpost.com/attackers-use-upnp-to-sidestep-ddos-defenses/131981/">Attackers Use UPnP to Sidestep DDoS Defenses | Threatpost | The first stop for security news</a></li><li><a title="Another severe flaw in Signal desktop app lets hackers steal your chats in plaintext" rel="nofollow" href="https://thehackernews.com/2018/05/signal-desktop-hacking.html?m=1">Another severe flaw in Signal desktop app lets hackers steal your chats in plaintext</a></li><li><a title="Critical Linux Flaw Opens the Door to Full Root Access | Threatpost | The first stop for security news" rel="nofollow" href="https://threatpost.com/critical-linux-flaw-opens-the-door-to-full-root-access/132034/">Critical Linux Flaw Opens the Door to Full Root Access | Threatpost | The first stop for security news</a></li><li><a title="Microsoft, Google: We&#39;ve found a fourth data-leaking Meltdown-Spectre CPU hole • The Register" rel="nofollow" href="https://www.theregister.co.uk/2018/05/21/spectre_meltdown_v4_microsoft_google/">Microsoft, Google: We've found a fourth data-leaking Meltdown-Spectre CPU hole • The Register</a></li><li><a title="Speculative Store Bypass explained: what it is, how it works" rel="nofollow" href="https://www.redhat.com/en/blog/speculative-store-bypass-explained-what-it-how-it-works">Speculative Store Bypass explained: what it is, how it works</a></li><li><a title="TechSNAP Episode 351: Performance Meltdown" rel="nofollow" href="http://techsnap.systems/351">TechSNAP Episode 351: Performance Meltdown</a></li><li><a title="Dave&#39;s Users flip the switch!" rel="nofollow" href="https://pastebin.com/LKVFaUYp">Dave's Users flip the switch!</a></li><li><a title="Dave&#39;s War Story is really Screwy!" rel="nofollow" href="https://pastebin.com/tsfjKEhb">Dave's War Story is really Screwy!</a></li><li><a title="Egon&#39;s Adventures in misslabled VMs" rel="nofollow" href="https://pastebin.com/wg4y034g">Egon's Adventures in misslabled VMs</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
