<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 05 Apr 2026 17:51:13 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Wd My Cloud”</title>
    <link>https://techsnap.systems/tags/wd%20my%20cloud</link>
    <pubDate>Fri, 21 Sep 2018 00:00:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 384: Interplanetary Peers</title>
  <link>https://techsnap.systems/384</link>
  <guid isPermaLink="false">be1b2668-8b45-4297-8043-0f6108bcfe71</guid>
  <pubDate>Fri, 21 Sep 2018 00:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/be1b2668-8b45-4297-8043-0f6108bcfe71.mp3" length="31575819" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Jon the Nice Guy joins Wes to discuss all things IPFS. We'll explore what it does, how it works, and why it might be the best hope for a decentralized internet.</itunes:subtitle>
  <itunes:duration>37:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Jon the Nice Guy joins Wes to discuss all things IPFS. We'll explore what it does, how it works, and why it might be the best hope for a decentralized internet.
Plus, Magecart strikes again, Alpine has package problems, and why you shouldn't trust Western Digital's MyCloud.  Special Guest: Jon Spriggs.
</description>
  <itunes:keywords>GovPayNow, Government Payment Service, Data Breach, Magecart, Payment Systems, Javascript, Newegg, WD My Cloud, Western Digital, IPFS, Interplanetary Filesystem, IPNS, DNSLink, Content-addressable storage, Decentralization, Decentralized Storage, Filesystems, Peer-to-Peer, Cloudflare, OrbitDB, Filecoin, Alpine Linux, Docker, DevOps, Sysadmin, Podcast</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Jon the Nice Guy joins Wes to discuss all things IPFS. We&#39;ll explore what it does, how it works, and why it might be the best hope for a decentralized internet.</p>

<p>Plus, Magecart strikes again, Alpine has package problems, and why you shouldn&#39;t trust Western Digital&#39;s MyCloud. </p><p>Special Guest: Jon Spriggs.</p><p>Links:</p><ul><li><a title="GovPayNow.com Leaks 14M+ Records" rel="nofollow" href="https://krebsonsecurity.com/2018/09/govpaynow-com-leaks-14m-records/">GovPayNow.com Leaks 14M+ Records</a> &mdash; Government Payment Service Inc. has leaked more than 14 million customer records dating back at least six years, including names, addresses, phone numbers and the last four digits of the payer’s credit card.</li><li><a title="Magecart claims another victim in Newegg merchant data theft" rel="nofollow" href="https://www.zdnet.com/article/magecart-claims-another-victim-in-newegg-merchant-data-theft/">Magecart claims another victim in Newegg merchant data theft</a> &mdash; Researchers from RiskIQ, together with Volexity, revealed that California-based retailer Newegg is the latest well-known merchant to succumb to the threat actors.</li><li><a title="RiskIQ: Another Victim of the Magecart Assault Emerges" rel="nofollow" href="https://www.riskiq.com/blog/labs/magecart-newegg/">RiskIQ: Another Victim of the Magecart Assault Emerges</a></li><li><a title="Password bypass flaw in Western Digital My Cloud drives puts data at risk" rel="nofollow" href="https://techcrunch.com/2018/09/19/password-bypass-flaw-western-digital-my-cloud-drives/">Password bypass flaw in Western Digital My Cloud drives puts data at risk</a> &mdash; A security researcher has published details of a vulnerability in Western Digital’s My Cloud devices, which could allow an attacker to bypass the admin password on the drive, gaining complete control over the user’s data.</li><li><a title="WD MyCloud Metasploit Example" rel="nofollow" href="https://pastecry.pt/dUHB3e#PewMuk%3AUt2Ek3Bee4Rej2Syz5Mek">WD MyCloud Metasploit Example</a></li><li><a title="Cloudflare goes InterPlanetary" rel="nofollow" href="https://blog.cloudflare.com/distributed-web-gateway/">Cloudflare goes InterPlanetary</a> &mdash; Today we’re excited to introduce Cloudflare’s IPFS Gateway, an easy way to access content from the InterPlanetary File System (IPFS) that doesn’t require installing and running any special software on your computer.</li><li><a title="End-to-End Integrity with IPFS" rel="nofollow" href="https://blog.cloudflare.com/e2e-integrity/">End-to-End Integrity with IPFS</a> &mdash; This post describes how to use Cloudflare's IPFS gateway to set up a website which is end-to-end secure, while maintaining the performance and reliability benefits of being served from Cloudflare’s edge network.</li><li><a title="How permanent is data stored on IPFS?" rel="nofollow" href="https://github.com/ipfs/faq/issues/93">How permanent is data stored on IPFS?</a></li><li><a title="Lesson: Add Content to IPFS and Retrieve It · Decentralized Web Primer" rel="nofollow" href="https://flyingzumwalt.gitbooks.io/decentralized-web-primer/content/files-on-ipfs/lessons/add-and-retrieve-file-content.html">Lesson: Add Content to IPFS and Retrieve It · Decentralized Web Primer</a></li><li><a title="Leo Tindall: Putting This Blog on IPFS" rel="nofollow" href="https://ipfs.io/ipns/Qme48wyZ7LaF9gC5693DZyJBtehgaFhaKycESroemD5fNX/post/putting_this_blog_on_ipfs/">Leo Tindall: Putting This Blog on IPFS</a></li><li><a title="A Beginner’s Guide to IPFS" rel="nofollow" href="https://hackernoon.com/a-beginners-guide-to-ipfs-20673fedd3f">A Beginner’s Guide to IPFS</a> &mdash; IPFS consists of several innovations in communication protocols and distributed systems that have been combined to produce a file system like no other.</li><li><a title="Useful resources for using IPFS and building things on top of it" rel="nofollow" href="https://github.com/ipfs/awesome-ipfs">Useful resources for using IPFS and building things on top of it</a></li><li><a title="OrbitDB: Peer-to-Peer Databases for the Decentralized Web" rel="nofollow" href="https://github.com/orbitdb/orbit-db">OrbitDB: Peer-to-Peer Databases for the Decentralized Web</a></li><li><a title="Rebuild Alpine Linux Docker Containers After Package Manager Patch" rel="nofollow" href="https://www.itprotoday.com/linux/time-rebuild-alpine-linux-docker-containers-after-package-manager-patch">Rebuild Alpine Linux Docker Containers After Package Manager Patch</a> &mdash; An attacker could intercept a package request as a Alpine Linux Docker image is being built and add malicious code that target machines would then unpack and run within the Docker container</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Jon the Nice Guy joins Wes to discuss all things IPFS. We&#39;ll explore what it does, how it works, and why it might be the best hope for a decentralized internet.</p>

<p>Plus, Magecart strikes again, Alpine has package problems, and why you shouldn&#39;t trust Western Digital&#39;s MyCloud. </p><p>Special Guest: Jon Spriggs.</p><p>Links:</p><ul><li><a title="GovPayNow.com Leaks 14M+ Records" rel="nofollow" href="https://krebsonsecurity.com/2018/09/govpaynow-com-leaks-14m-records/">GovPayNow.com Leaks 14M+ Records</a> &mdash; Government Payment Service Inc. has leaked more than 14 million customer records dating back at least six years, including names, addresses, phone numbers and the last four digits of the payer’s credit card.</li><li><a title="Magecart claims another victim in Newegg merchant data theft" rel="nofollow" href="https://www.zdnet.com/article/magecart-claims-another-victim-in-newegg-merchant-data-theft/">Magecart claims another victim in Newegg merchant data theft</a> &mdash; Researchers from RiskIQ, together with Volexity, revealed that California-based retailer Newegg is the latest well-known merchant to succumb to the threat actors.</li><li><a title="RiskIQ: Another Victim of the Magecart Assault Emerges" rel="nofollow" href="https://www.riskiq.com/blog/labs/magecart-newegg/">RiskIQ: Another Victim of the Magecart Assault Emerges</a></li><li><a title="Password bypass flaw in Western Digital My Cloud drives puts data at risk" rel="nofollow" href="https://techcrunch.com/2018/09/19/password-bypass-flaw-western-digital-my-cloud-drives/">Password bypass flaw in Western Digital My Cloud drives puts data at risk</a> &mdash; A security researcher has published details of a vulnerability in Western Digital’s My Cloud devices, which could allow an attacker to bypass the admin password on the drive, gaining complete control over the user’s data.</li><li><a title="WD MyCloud Metasploit Example" rel="nofollow" href="https://pastecry.pt/dUHB3e#PewMuk%3AUt2Ek3Bee4Rej2Syz5Mek">WD MyCloud Metasploit Example</a></li><li><a title="Cloudflare goes InterPlanetary" rel="nofollow" href="https://blog.cloudflare.com/distributed-web-gateway/">Cloudflare goes InterPlanetary</a> &mdash; Today we’re excited to introduce Cloudflare’s IPFS Gateway, an easy way to access content from the InterPlanetary File System (IPFS) that doesn’t require installing and running any special software on your computer.</li><li><a title="End-to-End Integrity with IPFS" rel="nofollow" href="https://blog.cloudflare.com/e2e-integrity/">End-to-End Integrity with IPFS</a> &mdash; This post describes how to use Cloudflare's IPFS gateway to set up a website which is end-to-end secure, while maintaining the performance and reliability benefits of being served from Cloudflare’s edge network.</li><li><a title="How permanent is data stored on IPFS?" rel="nofollow" href="https://github.com/ipfs/faq/issues/93">How permanent is data stored on IPFS?</a></li><li><a title="Lesson: Add Content to IPFS and Retrieve It · Decentralized Web Primer" rel="nofollow" href="https://flyingzumwalt.gitbooks.io/decentralized-web-primer/content/files-on-ipfs/lessons/add-and-retrieve-file-content.html">Lesson: Add Content to IPFS and Retrieve It · Decentralized Web Primer</a></li><li><a title="Leo Tindall: Putting This Blog on IPFS" rel="nofollow" href="https://ipfs.io/ipns/Qme48wyZ7LaF9gC5693DZyJBtehgaFhaKycESroemD5fNX/post/putting_this_blog_on_ipfs/">Leo Tindall: Putting This Blog on IPFS</a></li><li><a title="A Beginner’s Guide to IPFS" rel="nofollow" href="https://hackernoon.com/a-beginners-guide-to-ipfs-20673fedd3f">A Beginner’s Guide to IPFS</a> &mdash; IPFS consists of several innovations in communication protocols and distributed systems that have been combined to produce a file system like no other.</li><li><a title="Useful resources for using IPFS and building things on top of it" rel="nofollow" href="https://github.com/ipfs/awesome-ipfs">Useful resources for using IPFS and building things on top of it</a></li><li><a title="OrbitDB: Peer-to-Peer Databases for the Decentralized Web" rel="nofollow" href="https://github.com/orbitdb/orbit-db">OrbitDB: Peer-to-Peer Databases for the Decentralized Web</a></li><li><a title="Rebuild Alpine Linux Docker Containers After Package Manager Patch" rel="nofollow" href="https://www.itprotoday.com/linux/time-rebuild-alpine-linux-docker-containers-after-package-manager-patch">Rebuild Alpine Linux Docker Containers After Package Manager Patch</a> &mdash; An attacker could intercept a package request as a Alpine Linux Docker image is being built and add malicious code that target machines would then unpack and run within the Docker container</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 351: Performance Meltdown</title>
  <link>https://techsnap.systems/351</link>
  <guid isPermaLink="false">92c20700-9d53-4470-a263-d3e009a19100</guid>
  <pubDate>Thu, 11 Jan 2018 16:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/92c20700-9d53-4470-a263-d3e009a19100.mp3" length="30893583" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>The types of workloads that will see the largest performance impacts from Meltdown, tools to test yourself, and the outlook for 2018.

Plus a concise breakdown of Meltdown, Spectre, and side-channel attacks like only TechSNAP can. </itunes:subtitle>
  <itunes:duration>41:43</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>The types of workloads that will see the largest performance impacts from Meltdown, tools to test yourself, and the outlook for 2018.
Plus a concise breakdown of Meltdown, Spectre, and side-channel attacks like only TechSNAP can. 
Then we run through the timeline of events, and the scuttlebutt of so called coordinated disclosure. We also discuss yet another security issue in macOS High Sierra, a backdoor in popular storage appliances, your questions, and more! 
</description>
  <content:encoded>
    <![CDATA[<p>The types of workloads that will see the largest performance impacts from Meltdown, tools to test yourself, and the outlook for 2018.</p>

<p>Plus a concise breakdown of Meltdown, Spectre, and side-channel attacks like only TechSNAP can. </p>

<p>Then we run through the timeline of events, and the scuttlebutt of so called coordinated disclosure. We also discuss yet another security issue in macOS High Sierra, a backdoor in popular storage appliances, your questions, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="Meltdown and Spectre" rel="nofollow" href="https://meltdownattack.com/">Meltdown and Spectre</a> &mdash; Meltdown and Spectre exploit critical vulnerabilities in modern processors. </li><li><a title="The Meltdown and Spectre CPU Bugs, Explained" rel="nofollow" href="https://blog.barkly.com/meltdown-spectre-bugs-explained">The Meltdown and Spectre CPU Bugs, Explained</a></li><li><a title="How we got to Spectre and Meltdown A Timeline My version of the timeline..." rel="nofollow" href="https://plus.google.com/+jwildeboer/posts/jj6a9JUaovP">How we got to Spectre and Meltdown A Timeline My version of the timeline...</a> &mdash; My version of the timeline on Spectre Meltdown. This post will be updated! If you want to add/correct something, please comment.</li><li><a title="How Tier 2 cloud vendors banded together to cope with Spectre and Meltdown | TechCrunch" rel="nofollow" href="https://techcrunch.com/2018/01/06/how-tier-2-cloud-vendors-banded-together-to-cope-with-spectre-and-meltdown/">How Tier 2 cloud vendors banded together to cope with Spectre and Meltdown | TechCrunch</a> &mdash; Eventually six cloud providers — Scaleway, DigitalOcean, Packet, Vultr, Linode and OVH — formed a consortium of sorts to help one another and share information. In order to make the process more efficient, they started a Slack channel with CEOs, CTOs and engineers from the various companies sharing information and fixes as they became available.</li><li><a title="FreeBSD was made aware of Meltdown and Spectre in late December. There&#39;s currently no ETA for mitigation." rel="nofollow" href="https://www.reddit.com/r/freebsd/comments/7och5a/freebsd_was_made_aware_of_meltdown_and_spectre_in/">FreeBSD was made aware of Meltdown and Spectre in late December. There's currently no ETA for mitigation.</a> &mdash; It looks like Dragonfly BSD has a patch, so hopefully that will be useful for FreeBSD.</li><li><a title="heads up: Fix for intel hardware bug will lead to performance regressions" rel="nofollow" href="https://www.postgresql.org/message-id/20180102222354.qikjmf7dvnjgbkxe@alap3.anarazel.de">heads up: Fix for intel hardware bug will lead to performance regressions</a> &mdash; Upcoming versions of the linux kernel (and apparently also windows and
others), will include new feature that apparently has been implemented
with haste to work around an intel hardware bug.</li><li><a title="AWS Developer Forums: Degraded performance" rel="nofollow" href="https://forums.aws.amazon.com/thread.jspa?threadID=269858">AWS Developer Forums: Degraded performance</a> &mdash; Immediately following the reboot my server running on this instance started to suffer from cpu stress.</li><li><a title="Google is pushing Retpoline" rel="nofollow" href="https://www.blog.google/topics/google-cloud/protecting-our-google-cloud-customers-new-vulnerabilities-without-impacting-performance/">Google is pushing Retpoline</a> &mdash; With Retpoline, we could protect our infrastructure at compile-time, with no source-code modifications. Furthermore, testing this feature, particularly when combined with optimizations such as software branch prediction hints, demonstrated that this protection came with almost no performance loss.

</li><li><a title="PCID is now a critical performance/security feature on x86 " rel="nofollow" href="http://archive.is/ma8Iw#selection-341.2-344.0">PCID is now a critical performance/security feature on x86 </a> &mdash; On any system that does not currently show "pcid" in the flags line of /proc/cpuinfo, Meltdown is a bigger issue than "install latest updates".
</li><li><a title="Spectre &amp; Meltdown vulnerability/mitigation checker for Linux" rel="nofollow" href="https://github.com/speed47/spectre-meltdown-checker">Spectre &amp; Meltdown vulnerability/mitigation checker for Linux</a> &mdash; A simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018.</li><li><a title="Microsoft PowerShell Script to check for Meltdown" rel="nofollow" href="https://support.microsoft.com/en-gb/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in">Microsoft PowerShell Script to check for Meltdown</a> &mdash; To help customers verify that protections are enabled, Microsoft has published a PowerShell script that customers can run on their systems. Install and run the script by running the following commands.

</li><li><a title="Why Raspberry Pi isn&#39;t vulnerable to Spectre or Meltdown" rel="nofollow" href="https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/">Why Raspberry Pi isn't vulnerable to Spectre or Meltdown</a> &mdash; To help us understand why, here’s a little primer on some concepts in modern processor design. </li><li><a title="macOS High Sierra&#39;s App Store System Preferences Can Be Unlocked With Any Password" rel="nofollow" href="https://www.macrumors.com/2018/01/10/macos-high-sierra-app-store-password-bug/">macOS High Sierra's App Store System Preferences Can Be Unlocked With Any Password</a> &mdash; A bug report submitted on Open Radar this week has revealed a security flaw in the current version of macOS High Sierra that allows the App Store menu in System Preferences to be unlocked with any password. </li><li><a title="Major macOS High Sierra Bug Allows Full Admin Access Without Password" rel="nofollow" href="https://www.macrumors.com/2017/11/28/macos-high-sierra-bug-admin-access/">Major macOS High Sierra Bug Allows Full Admin Access Without Password</a></li><li><a title="WD My Cloud NAS devices have hard-wired backdoor" rel="nofollow" href="https://www.theregister.co.uk/2018/01/08/wd_mycloud_nas_backdoor/">WD My Cloud NAS devices have hard-wired backdoor</a> &mdash; Lets anyone log in as user mydlinkBRionyg with the password abc12345cba.</li><li><a title="Question: How could I measure all of these overhead performance hits?" rel="nofollow" href="https://slexy.org/view/s2hNxl4Ras">Question: How could I measure all of these overhead performance hits?</a> &mdash; My question: how could I measure all of these overhead performance hits, so I can put in a well educated request to adjust all of these components, so I have a computer that performs near its capacity?</li><li><a title="Perfmon" rel="nofollow" href="https://technet.microsoft.com/en-us/library/bb490957.aspx">Perfmon</a></li><li><a title="Troubleshooting with the Windows Sysinternals Tools" rel="nofollow" href="https://docs.microsoft.com/en-us/sysinternals/learn/troubleshooting-book">Troubleshooting with the Windows Sysinternals Tools</a></li><li><a title="ProcDump" rel="nofollow" href="https://docs.microsoft.com/en-us/sysinternals/downloads/procdump">ProcDump</a></li><li><a title="Process Monitor - Replaces filemon" rel="nofollow" href="https://docs.microsoft.com/en-us/sysinternals/downloads/procmon">Process Monitor - Replaces filemon</a></li><li><a title="Question: MySQL Replication Woes" rel="nofollow" href="https://slexy.org/view/s2iRKPgsGI">Question: MySQL Replication Woes</a> &mdash; The problem is that during some larger deletes on the master, the tables on the slave get locked and the slave lag goes through the roof.. During this time all of my selects that have been sent to the slave are just sitting there and waiting for the table to unlock while the master is just fine.</li><li><a title="Ask Noah 44: Red Hat with Brandon Johnson" rel="nofollow" href="http://www.jupiterbroadcasting.com/121292/redhat-with-brandon-johnson-ask-noah-44/">Ask Noah 44: Red Hat with Brandon Johnson</a></li><li><a title="BSD Now 228: The Spectre of Meltdown" rel="nofollow" href="http://www.jupiterbroadcasting.com/121362/the-spectre-of-meltdown-bsd-now-228/">BSD Now 228: The Spectre of Meltdown</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The types of workloads that will see the largest performance impacts from Meltdown, tools to test yourself, and the outlook for 2018.</p>

<p>Plus a concise breakdown of Meltdown, Spectre, and side-channel attacks like only TechSNAP can. </p>

<p>Then we run through the timeline of events, and the scuttlebutt of so called coordinated disclosure. We also discuss yet another security issue in macOS High Sierra, a backdoor in popular storage appliances, your questions, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="Meltdown and Spectre" rel="nofollow" href="https://meltdownattack.com/">Meltdown and Spectre</a> &mdash; Meltdown and Spectre exploit critical vulnerabilities in modern processors. </li><li><a title="The Meltdown and Spectre CPU Bugs, Explained" rel="nofollow" href="https://blog.barkly.com/meltdown-spectre-bugs-explained">The Meltdown and Spectre CPU Bugs, Explained</a></li><li><a title="How we got to Spectre and Meltdown A Timeline My version of the timeline..." rel="nofollow" href="https://plus.google.com/+jwildeboer/posts/jj6a9JUaovP">How we got to Spectre and Meltdown A Timeline My version of the timeline...</a> &mdash; My version of the timeline on Spectre Meltdown. This post will be updated! If you want to add/correct something, please comment.</li><li><a title="How Tier 2 cloud vendors banded together to cope with Spectre and Meltdown | TechCrunch" rel="nofollow" href="https://techcrunch.com/2018/01/06/how-tier-2-cloud-vendors-banded-together-to-cope-with-spectre-and-meltdown/">How Tier 2 cloud vendors banded together to cope with Spectre and Meltdown | TechCrunch</a> &mdash; Eventually six cloud providers — Scaleway, DigitalOcean, Packet, Vultr, Linode and OVH — formed a consortium of sorts to help one another and share information. In order to make the process more efficient, they started a Slack channel with CEOs, CTOs and engineers from the various companies sharing information and fixes as they became available.</li><li><a title="FreeBSD was made aware of Meltdown and Spectre in late December. There&#39;s currently no ETA for mitigation." rel="nofollow" href="https://www.reddit.com/r/freebsd/comments/7och5a/freebsd_was_made_aware_of_meltdown_and_spectre_in/">FreeBSD was made aware of Meltdown and Spectre in late December. There's currently no ETA for mitigation.</a> &mdash; It looks like Dragonfly BSD has a patch, so hopefully that will be useful for FreeBSD.</li><li><a title="heads up: Fix for intel hardware bug will lead to performance regressions" rel="nofollow" href="https://www.postgresql.org/message-id/20180102222354.qikjmf7dvnjgbkxe@alap3.anarazel.de">heads up: Fix for intel hardware bug will lead to performance regressions</a> &mdash; Upcoming versions of the linux kernel (and apparently also windows and
others), will include new feature that apparently has been implemented
with haste to work around an intel hardware bug.</li><li><a title="AWS Developer Forums: Degraded performance" rel="nofollow" href="https://forums.aws.amazon.com/thread.jspa?threadID=269858">AWS Developer Forums: Degraded performance</a> &mdash; Immediately following the reboot my server running on this instance started to suffer from cpu stress.</li><li><a title="Google is pushing Retpoline" rel="nofollow" href="https://www.blog.google/topics/google-cloud/protecting-our-google-cloud-customers-new-vulnerabilities-without-impacting-performance/">Google is pushing Retpoline</a> &mdash; With Retpoline, we could protect our infrastructure at compile-time, with no source-code modifications. Furthermore, testing this feature, particularly when combined with optimizations such as software branch prediction hints, demonstrated that this protection came with almost no performance loss.

</li><li><a title="PCID is now a critical performance/security feature on x86 " rel="nofollow" href="http://archive.is/ma8Iw#selection-341.2-344.0">PCID is now a critical performance/security feature on x86 </a> &mdash; On any system that does not currently show "pcid" in the flags line of /proc/cpuinfo, Meltdown is a bigger issue than "install latest updates".
</li><li><a title="Spectre &amp; Meltdown vulnerability/mitigation checker for Linux" rel="nofollow" href="https://github.com/speed47/spectre-meltdown-checker">Spectre &amp; Meltdown vulnerability/mitigation checker for Linux</a> &mdash; A simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018.</li><li><a title="Microsoft PowerShell Script to check for Meltdown" rel="nofollow" href="https://support.microsoft.com/en-gb/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in">Microsoft PowerShell Script to check for Meltdown</a> &mdash; To help customers verify that protections are enabled, Microsoft has published a PowerShell script that customers can run on their systems. Install and run the script by running the following commands.

</li><li><a title="Why Raspberry Pi isn&#39;t vulnerable to Spectre or Meltdown" rel="nofollow" href="https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/">Why Raspberry Pi isn't vulnerable to Spectre or Meltdown</a> &mdash; To help us understand why, here’s a little primer on some concepts in modern processor design. </li><li><a title="macOS High Sierra&#39;s App Store System Preferences Can Be Unlocked With Any Password" rel="nofollow" href="https://www.macrumors.com/2018/01/10/macos-high-sierra-app-store-password-bug/">macOS High Sierra's App Store System Preferences Can Be Unlocked With Any Password</a> &mdash; A bug report submitted on Open Radar this week has revealed a security flaw in the current version of macOS High Sierra that allows the App Store menu in System Preferences to be unlocked with any password. </li><li><a title="Major macOS High Sierra Bug Allows Full Admin Access Without Password" rel="nofollow" href="https://www.macrumors.com/2017/11/28/macos-high-sierra-bug-admin-access/">Major macOS High Sierra Bug Allows Full Admin Access Without Password</a></li><li><a title="WD My Cloud NAS devices have hard-wired backdoor" rel="nofollow" href="https://www.theregister.co.uk/2018/01/08/wd_mycloud_nas_backdoor/">WD My Cloud NAS devices have hard-wired backdoor</a> &mdash; Lets anyone log in as user mydlinkBRionyg with the password abc12345cba.</li><li><a title="Question: How could I measure all of these overhead performance hits?" rel="nofollow" href="https://slexy.org/view/s2hNxl4Ras">Question: How could I measure all of these overhead performance hits?</a> &mdash; My question: how could I measure all of these overhead performance hits, so I can put in a well educated request to adjust all of these components, so I have a computer that performs near its capacity?</li><li><a title="Perfmon" rel="nofollow" href="https://technet.microsoft.com/en-us/library/bb490957.aspx">Perfmon</a></li><li><a title="Troubleshooting with the Windows Sysinternals Tools" rel="nofollow" href="https://docs.microsoft.com/en-us/sysinternals/learn/troubleshooting-book">Troubleshooting with the Windows Sysinternals Tools</a></li><li><a title="ProcDump" rel="nofollow" href="https://docs.microsoft.com/en-us/sysinternals/downloads/procdump">ProcDump</a></li><li><a title="Process Monitor - Replaces filemon" rel="nofollow" href="https://docs.microsoft.com/en-us/sysinternals/downloads/procmon">Process Monitor - Replaces filemon</a></li><li><a title="Question: MySQL Replication Woes" rel="nofollow" href="https://slexy.org/view/s2iRKPgsGI">Question: MySQL Replication Woes</a> &mdash; The problem is that during some larger deletes on the master, the tables on the slave get locked and the slave lag goes through the roof.. During this time all of my selects that have been sent to the slave are just sitting there and waiting for the table to unlock while the master is just fine.</li><li><a title="Ask Noah 44: Red Hat with Brandon Johnson" rel="nofollow" href="http://www.jupiterbroadcasting.com/121292/redhat-with-brandon-johnson-ask-noah-44/">Ask Noah 44: Red Hat with Brandon Johnson</a></li><li><a title="BSD Now 228: The Spectre of Meltdown" rel="nofollow" href="http://www.jupiterbroadcasting.com/121362/the-spectre-of-meltdown-bsd-now-228/">BSD Now 228: The Spectre of Meltdown</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
