<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 12 Apr 2026 21:23:24 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Wordpress”</title>
    <link>https://techsnap.systems/tags/wordpress</link>
    <pubDate>Fri, 15 May 2020 00:15:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>429: Curious About Caddy</title>
  <link>https://techsnap.systems/429</link>
  <guid isPermaLink="false">a30bad27-ffe4-4dd7-a499-0117167b9f4e</guid>
  <pubDate>Fri, 15 May 2020 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a30bad27-ffe4-4dd7-a499-0117167b9f4e.mp3" length="22145590" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Jim and Wes take the latest release of the Caddy web server for a spin, investigate Intel's Comet Lake desktop CPUs, and explore the fight over 5G between the US Military and the FCC.</itunes:subtitle>
  <itunes:duration>30:45</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Jim and Wes take the latest release of the Caddy web server for a spin, investigate Intel's Comet Lake desktop CPUs, and explore the fight over 5G between the US Military and the FCC. 
</description>
  <itunes:keywords>DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, sysadmin podcast, Caddy, https, Let's Encrypt, Apache, NGINX, web server, internet, web, containers, Traefik, Wordpress, packaging, Debian, certbot, TLS, OCSP, security, automation, cloud, reverse proxy, Comet Lake, CPU, Intel, 14nm, 10nm, base clock rate, gigahertz wars, lithography, 5.0 GHz, single-core, Celeron, Pentium, Intel Core, i3, i5, i7, Ice Lake, hyperthreading, turbo max boost, thermal velocity boost, power management, CPU cooling, TDP, thermal design power, integrated graphics, AMD, 5G, Ligado, wireless communication, GPS, US Military, Pentagon, Defense Department, L-Band spectrum, spoofing, software-defined radio, FCC, IoT, mobile broadband, LightSquared</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Jim and Wes take the latest release of the Caddy web server for a spin, investigate Intel&#39;s Comet Lake desktop CPUs, and explore the fight over 5G between the US Military and the FCC.</p><p>Links:</p><ul><li><a title="Caddy offers TLS, HTTPS, and more in one dependency-free Go Web server" rel="nofollow" href="https://arstechnica.com/gadgets/2020/05/caddy-offers-tls-https-and-more-in-one-dependency-free-go-web-server/">Caddy offers TLS, HTTPS, and more in one dependency-free Go Web server</a></li><li><a title="Caddy 2" rel="nofollow" href="https://caddyserver.com/v2">Caddy 2</a></li><li><a title="Caddy v2 Improvements [slightly out of date]" rel="nofollow" href="https://github.com/caddyserver/caddy/wiki/v2:-Improvements">Caddy v2 Improvements [slightly out of date]</a></li><li><a title="Proposal: Permanently change all proprietary licensing to open source · Issue #2786 · caddyserver/caddy" rel="nofollow" href="https://github.com/caddyserver/caddy/issues/2786">Proposal: Permanently change all proprietary licensing to open source · Issue #2786 · caddyserver/caddy</a></li><li><a title="Revert &quot;Implement Caddy-Sponsors HTTP response header&quot; by lol768 · Pull Request #1866 · caddyserver/caddy" rel="nofollow" href="https://github.com/caddyserver/caddy/pull/1866">Revert "Implement Caddy-Sponsors HTTP response header" by lol768 · Pull Request #1866 · caddyserver/caddy</a></li><li><a title="Intel’s 10th generation desktop CPUs have arrived—still on 14nm" rel="nofollow" href="https://arstechnica.com/gadgets/2020/05/intels-comet-lake-desktop-cpus-are-here/">Intel’s 10th generation desktop CPUs have arrived—still on 14nm</a></li><li><a title="Intel Comet Lake 10th Gen CPU release date, specs, price, and performance" rel="nofollow" href="https://www.pcgamer.com/intel-comet-lake-release-date-specs-performance/">Intel Comet Lake 10th Gen CPU release date, specs, price, and performance</a></li><li><a title="10th Gen Intel® Core™ Desktop Processors" rel="nofollow" href="https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-desktop-brief.html">10th Gen Intel® Core™ Desktop Processors</a></li><li><a title="US military is furious at FCC over 5G plan that could interfere with GPS" rel="nofollow" href="https://arstechnica.com/tech-policy/2020/05/millions-of-gps-devices-at-risk-from-fcc-approved-5g-network-military-says/">US military is furious at FCC over 5G plan that could interfere with GPS</a></li><li><a title="The Pentagon&#39;s fight to kill Ligado&#39;s 5G network" rel="nofollow" href="https://www.cnet.com/news/the-pentagons-fight-to-kill-ligados-5g-network/">The Pentagon's fight to kill Ligado's 5G network</a></li><li><a title="FCC Approves Ligado L-Band Application to Facilitate 5G &amp; IoT" rel="nofollow" href="https://www.fcc.gov/document/fcc-approves-ligado-l-band-application-facilitate-5g-iot">FCC Approves Ligado L-Band Application to Facilitate 5G &amp; IoT</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Jim and Wes take the latest release of the Caddy web server for a spin, investigate Intel&#39;s Comet Lake desktop CPUs, and explore the fight over 5G between the US Military and the FCC.</p><p>Links:</p><ul><li><a title="Caddy offers TLS, HTTPS, and more in one dependency-free Go Web server" rel="nofollow" href="https://arstechnica.com/gadgets/2020/05/caddy-offers-tls-https-and-more-in-one-dependency-free-go-web-server/">Caddy offers TLS, HTTPS, and more in one dependency-free Go Web server</a></li><li><a title="Caddy 2" rel="nofollow" href="https://caddyserver.com/v2">Caddy 2</a></li><li><a title="Caddy v2 Improvements [slightly out of date]" rel="nofollow" href="https://github.com/caddyserver/caddy/wiki/v2:-Improvements">Caddy v2 Improvements [slightly out of date]</a></li><li><a title="Proposal: Permanently change all proprietary licensing to open source · Issue #2786 · caddyserver/caddy" rel="nofollow" href="https://github.com/caddyserver/caddy/issues/2786">Proposal: Permanently change all proprietary licensing to open source · Issue #2786 · caddyserver/caddy</a></li><li><a title="Revert &quot;Implement Caddy-Sponsors HTTP response header&quot; by lol768 · Pull Request #1866 · caddyserver/caddy" rel="nofollow" href="https://github.com/caddyserver/caddy/pull/1866">Revert "Implement Caddy-Sponsors HTTP response header" by lol768 · Pull Request #1866 · caddyserver/caddy</a></li><li><a title="Intel’s 10th generation desktop CPUs have arrived—still on 14nm" rel="nofollow" href="https://arstechnica.com/gadgets/2020/05/intels-comet-lake-desktop-cpus-are-here/">Intel’s 10th generation desktop CPUs have arrived—still on 14nm</a></li><li><a title="Intel Comet Lake 10th Gen CPU release date, specs, price, and performance" rel="nofollow" href="https://www.pcgamer.com/intel-comet-lake-release-date-specs-performance/">Intel Comet Lake 10th Gen CPU release date, specs, price, and performance</a></li><li><a title="10th Gen Intel® Core™ Desktop Processors" rel="nofollow" href="https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-desktop-brief.html">10th Gen Intel® Core™ Desktop Processors</a></li><li><a title="US military is furious at FCC over 5G plan that could interfere with GPS" rel="nofollow" href="https://arstechnica.com/tech-policy/2020/05/millions-of-gps-devices-at-risk-from-fcc-approved-5g-network-military-says/">US military is furious at FCC over 5G plan that could interfere with GPS</a></li><li><a title="The Pentagon&#39;s fight to kill Ligado&#39;s 5G network" rel="nofollow" href="https://www.cnet.com/news/the-pentagons-fight-to-kill-ligados-5g-network/">The Pentagon's fight to kill Ligado's 5G network</a></li><li><a title="FCC Approves Ligado L-Band Application to Facilitate 5G &amp; IoT" rel="nofollow" href="https://www.fcc.gov/document/fcc-approves-ligado-l-band-application-facilitate-5g-iot">FCC Approves Ligado L-Band Application to Facilitate 5G &amp; IoT</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>404: Prefork Pitfalls</title>
  <link>https://techsnap.systems/404</link>
  <guid isPermaLink="false">e2a5afa9-3180-4551-91a0-e84e65eb61e1</guid>
  <pubDate>Sat, 25 May 2019 18:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/e2a5afa9-3180-4551-91a0-e84e65eb61e1.mp3" length="24351787" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We turn our eye to web server best practices, from the basics of CDNs to the importance of choosing the right multi-processing module.</itunes:subtitle>
  <itunes:duration>33:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We turn our eye to web server best practices, from the basics of CDNs to the importance of choosing the right multi-processing module.
Plus the right way to setup PHP, the trouble with benchmarking, and when to choose NGiNX.  
</description>
  <itunes:keywords>HTTP, web servers, nginx, apache, lighttpd, prefork, mod_php, php, concurrency, threadpool, threads, scalability, event loop, apache mpms, Multi-Processing Modules, varnish, CDN, static sites, wordpress, apache bench, benchmarking, w3 total cache, performance, networking, sysadmin, web hosting, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We turn our eye to web server best practices, from the basics of CDNs to the importance of choosing the right multi-processing module.</p>

<p>Plus the right way to setup PHP, the trouble with benchmarking, and when to choose NGiNX. </p><p>Links:</p><ul><li><a title="Jim&#39;s Blog: Installing WordPress on Apache the modern way" rel="nofollow" href="https://jrs-s.net/2019/05/25/installing-wordpress-on-apache-the-modern-way/">Jim's Blog: Installing WordPress on Apache the modern way</a> &mdash; It’s been bugging me for a while that there are no correct guides to be found about using modern Apache 2.4 or above with the Event or Worker MPMs. We’re going to go ahead and correct that lapse today, by walking through a brand-new WordPress install on a new Ubuntu 18.04 VM.
</li><li><a title="Apache Performance Tuning" rel="nofollow" href="https://httpd.apache.org/docs/2.4/misc/perf-tuning.html">Apache Performance Tuning</a> &mdash; Apache 2.x is a general-purpose webserver, designed to provide a balance of flexibility, portability, and performance. Although it has not been designed specifically to set benchmark records, Apache 2.x is capable of high performance in many real-world situations.</li><li><a title="Tuning Your Apache Server" rel="nofollow" href="https://www.linode.com/docs/web-servers/apache-tips-and-tricks/tuning-your-apache-server/">Tuning Your Apache Server</a></li><li><a title="worker - Apache HTTP Server Version 2.4" rel="nofollow" href="https://httpd.apache.org/docs/2.4/mod/worker.html">worker - Apache HTTP Server Version 2.4</a> &mdash; This Multi-Processing Module (MPM) implements a hybrid multi-process multi-threaded server. By using threads to serve requests, it is able to serve a large number of requests with fewer system resources than a process-based server.</li><li><a title="event - Apache HTTP Server Version 2.4" rel="nofollow" href="https://httpd.apache.org/docs/2.4/mod/event.html">event - Apache HTTP Server Version 2.4</a> &mdash; The event Multi-Processing Module (MPM) is designed to allow more requests to be served simultaneously by passing off some processing work to the listeners threads, freeing up the worker threads to serve new requests.

</li><li><a title="PHP-FPM" rel="nofollow" href="https://php-fpm.org/">PHP-FPM</a> &mdash; PHP-FPM (FastCGI Process Manager) is an alternative PHP FastCGI implementation with some additional features useful for sites of any size, especially busier sites.
</li><li><a title="FastCGI overview" rel="nofollow" href="https://help.dreamhost.com/hc/en-us/articles/217298967-FastCGI-overview">FastCGI overview</a> &mdash; FastCGI is a way to have CGI scripts execute time-consuming code (like opening a database) only once, rather than every time the script is loaded. In technical terms, FastCGI is a language independent, scalable, open extension to CGI that provides high performance without the limitations of server specific APIs.

</li><li><a title="Alexa Top 500 Global Sites" rel="nofollow" href="https://www.alexa.com/topsites">Alexa Top 500 Global Sites</a></li><li><a title="What Is a CDN? How Does a CDN work?" rel="nofollow" href="https://www.cloudflare.com/learning/cdn/what-is-a-cdn/">What Is a CDN? How Does a CDN work?</a> &mdash; A content delivery network (CDN) refers to a geographically distributed group of servers which work together to provide fast delivery of Internet content. </li><li><a title="W3 Total Cache – WordPress plugin" rel="nofollow" href="https://wordpress.org/plugins/w3-total-cache/">W3 Total Cache – WordPress plugin</a> &mdash; W3 Total Cache improves the SEO and user experience of your site by increasing website performance, reducing load times via features like content delivery network (CDN) integration and the latest best practices.

</li><li><a title="krakjoe/apcu: APCu - APC User Cache" rel="nofollow" href="https://github.com/krakjoe/apcu">krakjoe/apcu: APCu - APC User Cache</a> &mdash; APCu is an in-memory key-value store for PHP. Keys are of type string and values can be any PHP variables.

</li><li><a title="PHP: APCu - Manual" rel="nofollow" href="https://www.php.net/manual/en/book.apcu.php">PHP: APCu - Manual</a></li><li><a title="Introduction to Varnish — Varnish HTTP Cache" rel="nofollow" href="https://varnish-cache.org/intro/">Introduction to Varnish — Varnish HTTP Cache</a> &mdash; Varnish Cache is a web application accelerator also known as a caching HTTP reverse proxy. You install it in front of any server that speaks HTTP and configure it to cache the contents. Varnish Cache is really, really fast. It typically speeds up delivery with a factor of 300 - 1000x, depending on your architectur</li><li><a title="ab - Apache HTTP server benchmarking tool" rel="nofollow" href="https://httpd.apache.org/docs/2.4/programs/ab.html">ab - Apache HTTP server benchmarking tool</a> &mdash; ab is a tool for benchmarking your Apache Hypertext Transfer Protocol (HTTP) server. It is designed to give you an impression of how your current Apache installation performs. This especially shows you how many requests per second your Apache installation is capable of serving.</li><li><a title="HTTP(S) Benchmark Tools " rel="nofollow" href="https://gist.github.com/denji/8333630">HTTP(S) Benchmark Tools </a></li><li><a title="jimsalterjrs/network-testing" rel="nofollow" href="https://github.com/jimsalterjrs/network-testing">jimsalterjrs/network-testing</a> &mdash; This is a small collection of GPLv3-licensed tools to assist an intrepid researcher in testing the performance of networks, wired or wireless.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We turn our eye to web server best practices, from the basics of CDNs to the importance of choosing the right multi-processing module.</p>

<p>Plus the right way to setup PHP, the trouble with benchmarking, and when to choose NGiNX. </p><p>Links:</p><ul><li><a title="Jim&#39;s Blog: Installing WordPress on Apache the modern way" rel="nofollow" href="https://jrs-s.net/2019/05/25/installing-wordpress-on-apache-the-modern-way/">Jim's Blog: Installing WordPress on Apache the modern way</a> &mdash; It’s been bugging me for a while that there are no correct guides to be found about using modern Apache 2.4 or above with the Event or Worker MPMs. We’re going to go ahead and correct that lapse today, by walking through a brand-new WordPress install on a new Ubuntu 18.04 VM.
</li><li><a title="Apache Performance Tuning" rel="nofollow" href="https://httpd.apache.org/docs/2.4/misc/perf-tuning.html">Apache Performance Tuning</a> &mdash; Apache 2.x is a general-purpose webserver, designed to provide a balance of flexibility, portability, and performance. Although it has not been designed specifically to set benchmark records, Apache 2.x is capable of high performance in many real-world situations.</li><li><a title="Tuning Your Apache Server" rel="nofollow" href="https://www.linode.com/docs/web-servers/apache-tips-and-tricks/tuning-your-apache-server/">Tuning Your Apache Server</a></li><li><a title="worker - Apache HTTP Server Version 2.4" rel="nofollow" href="https://httpd.apache.org/docs/2.4/mod/worker.html">worker - Apache HTTP Server Version 2.4</a> &mdash; This Multi-Processing Module (MPM) implements a hybrid multi-process multi-threaded server. By using threads to serve requests, it is able to serve a large number of requests with fewer system resources than a process-based server.</li><li><a title="event - Apache HTTP Server Version 2.4" rel="nofollow" href="https://httpd.apache.org/docs/2.4/mod/event.html">event - Apache HTTP Server Version 2.4</a> &mdash; The event Multi-Processing Module (MPM) is designed to allow more requests to be served simultaneously by passing off some processing work to the listeners threads, freeing up the worker threads to serve new requests.

</li><li><a title="PHP-FPM" rel="nofollow" href="https://php-fpm.org/">PHP-FPM</a> &mdash; PHP-FPM (FastCGI Process Manager) is an alternative PHP FastCGI implementation with some additional features useful for sites of any size, especially busier sites.
</li><li><a title="FastCGI overview" rel="nofollow" href="https://help.dreamhost.com/hc/en-us/articles/217298967-FastCGI-overview">FastCGI overview</a> &mdash; FastCGI is a way to have CGI scripts execute time-consuming code (like opening a database) only once, rather than every time the script is loaded. In technical terms, FastCGI is a language independent, scalable, open extension to CGI that provides high performance without the limitations of server specific APIs.

</li><li><a title="Alexa Top 500 Global Sites" rel="nofollow" href="https://www.alexa.com/topsites">Alexa Top 500 Global Sites</a></li><li><a title="What Is a CDN? How Does a CDN work?" rel="nofollow" href="https://www.cloudflare.com/learning/cdn/what-is-a-cdn/">What Is a CDN? How Does a CDN work?</a> &mdash; A content delivery network (CDN) refers to a geographically distributed group of servers which work together to provide fast delivery of Internet content. </li><li><a title="W3 Total Cache – WordPress plugin" rel="nofollow" href="https://wordpress.org/plugins/w3-total-cache/">W3 Total Cache – WordPress plugin</a> &mdash; W3 Total Cache improves the SEO and user experience of your site by increasing website performance, reducing load times via features like content delivery network (CDN) integration and the latest best practices.

</li><li><a title="krakjoe/apcu: APCu - APC User Cache" rel="nofollow" href="https://github.com/krakjoe/apcu">krakjoe/apcu: APCu - APC User Cache</a> &mdash; APCu is an in-memory key-value store for PHP. Keys are of type string and values can be any PHP variables.

</li><li><a title="PHP: APCu - Manual" rel="nofollow" href="https://www.php.net/manual/en/book.apcu.php">PHP: APCu - Manual</a></li><li><a title="Introduction to Varnish — Varnish HTTP Cache" rel="nofollow" href="https://varnish-cache.org/intro/">Introduction to Varnish — Varnish HTTP Cache</a> &mdash; Varnish Cache is a web application accelerator also known as a caching HTTP reverse proxy. You install it in front of any server that speaks HTTP and configure it to cache the contents. Varnish Cache is really, really fast. It typically speeds up delivery with a factor of 300 - 1000x, depending on your architectur</li><li><a title="ab - Apache HTTP server benchmarking tool" rel="nofollow" href="https://httpd.apache.org/docs/2.4/programs/ab.html">ab - Apache HTTP server benchmarking tool</a> &mdash; ab is a tool for benchmarking your Apache Hypertext Transfer Protocol (HTTP) server. It is designed to give you an impression of how your current Apache installation performs. This especially shows you how many requests per second your Apache installation is capable of serving.</li><li><a title="HTTP(S) Benchmark Tools " rel="nofollow" href="https://gist.github.com/denji/8333630">HTTP(S) Benchmark Tools </a></li><li><a title="jimsalterjrs/network-testing" rel="nofollow" href="https://github.com/jimsalterjrs/network-testing">jimsalterjrs/network-testing</a> &mdash; This is a small collection of GPLv3-licensed tools to assist an intrepid researcher in testing the performance of networks, wired or wireless.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>393: Back to our /roots</title>
  <link>https://techsnap.systems/393</link>
  <guid isPermaLink="false">1126dc11-7156-4c4d-84f1-a9aa9bf4ebcf</guid>
  <pubDate>Thu, 03 Jan 2019 04:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/1126dc11-7156-4c4d-84f1-a9aa9bf4ebcf.mp3" length="19076619" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend.</itunes:subtitle>
  <itunes:duration>22:22</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend. 
</description>
  <itunes:keywords>Security Breach, Flash, AWS, Cloud, Bitcoin, Dropbox, Sony, PSN Breach, Wordpress, SSL, TLS, Allan Jude, FreeBSD, Jim Salter, Information Density, Automation, Bitcoin, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend.</p><p>Links:</p><ul><li><a title="Jim Salter" rel="nofollow" href="https://arstechnica.com/author/jimsalter/">Jim Salter</a> &mdash; Jim Salter (@jrssnet) is an author, public speaker, small business owner, mercenary sysadmin, and father of three—not necessarily in that order. He got his first real taste of open source by running Apache on his very own dedicated FreeBSD 3.1 server back in 1999, and he's been a fierce advocate of FOSS ever since.</li><li><a title="Jim Salter on Twitter" rel="nofollow" href="https://twitter.com/jrssnet?lang=en">Jim Salter on Twitter</a></li><li><a title="Dropbox Flaws | TechSNAP | 1" rel="nofollow" href="https://www.youtube.com/watch?v=n7La9Z-XrCE&amp;t=972s">Dropbox Flaws | TechSNAP | 1</a></li><li><a title="PSN Breech Details | TechSNAP 3" rel="nofollow" href="https://www.youtube.com/watch?v=d5FCF9lpVYE">PSN Breech Details | TechSNAP 3</a></li><li><a title="2089 Days Uptime | TechSNAP 300" rel="nofollow" href="https://www.jupiterbroadcasting.com/106026/2089-days-uptime-techsnap-300/">2089 Days Uptime | TechSNAP 300</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend.</p><p>Links:</p><ul><li><a title="Jim Salter" rel="nofollow" href="https://arstechnica.com/author/jimsalter/">Jim Salter</a> &mdash; Jim Salter (@jrssnet) is an author, public speaker, small business owner, mercenary sysadmin, and father of three—not necessarily in that order. He got his first real taste of open source by running Apache on his very own dedicated FreeBSD 3.1 server back in 1999, and he's been a fierce advocate of FOSS ever since.</li><li><a title="Jim Salter on Twitter" rel="nofollow" href="https://twitter.com/jrssnet?lang=en">Jim Salter on Twitter</a></li><li><a title="Dropbox Flaws | TechSNAP | 1" rel="nofollow" href="https://www.youtube.com/watch?v=n7La9Z-XrCE&amp;t=972s">Dropbox Flaws | TechSNAP | 1</a></li><li><a title="PSN Breech Details | TechSNAP 3" rel="nofollow" href="https://www.youtube.com/watch?v=d5FCF9lpVYE">PSN Breech Details | TechSNAP 3</a></li><li><a title="2089 Days Uptime | TechSNAP 300" rel="nofollow" href="https://www.jupiterbroadcasting.com/106026/2089-days-uptime-techsnap-300/">2089 Days Uptime | TechSNAP 300</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 371: They Never Learn</title>
  <link>https://techsnap.systems/371</link>
  <guid isPermaLink="false">6c8e575e-ede8-4bae-b569-b82e0be33374</guid>
  <pubDate>Thu, 07 Jun 2018 15:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/6c8e575e-ede8-4bae-b569-b82e0be33374.mp3" length="37806547" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Microsoft puts a data center under the ocean, and they might be onto something. The Zip Slip vulnerability sneaks into your software, and VPNFilter turns out to be more complicated than first known.</itunes:subtitle>
  <itunes:duration>44:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Microsoft puts a data center under the ocean, and they might be onto something. The Zip Slip vulnerability sneaks into your software, and VPNFilter turns out to be more complicated than first known.
Plus the mass exploit of Drupalgeddon2 continues, we break down why, a batch of questions, and more. 
</description>
  <content:encoded>
    <![CDATA[<p>Microsoft puts a data center under the ocean, and they might be onto something. The Zip Slip vulnerability sneaks into your software, and VPNFilter turns out to be more complicated than first known.</p>

<p>Plus the mass exploit of Drupalgeddon2 continues, we break down why, a batch of questions, and more.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Microsoft sinks data centre off Orkney" rel="nofollow" href="https://www.bbc.com/news/technology-44368813">Microsoft sinks data centre off Orkney</a></li><li><a title="How to protect yourself from megabreaches like the one that hit Ticketfly" rel="nofollow" href="https://arstechnica.com/information-technology/2018/06/how-to-protect-yourself-from-megabreaches-like-the-one-that-hit-ticketfly/">How to protect yourself from megabreaches like the one that hit Ticketfly</a></li><li><a title="Three months later, a mass exploit of powerful Web servers continues" rel="nofollow" href="https://arstechnica.com/information-technology/2018/06/three-months-later-a-mass-exploit-of-powerful-web-servers-continues/">Three months later, a mass exploit of powerful Web servers continues</a></li><li><a title="Breach detection with Linux filesystem forensics" rel="nofollow" href="https://opensource.com/article/18/4/linux-filesystem-forensics?utm_campaign=Security%2BNewsletter&amp;utm_source=Security_Newsletter_co_79">Breach detection with Linux filesystem forensics</a></li><li><a title="Zip Slip Vulnerability" rel="nofollow" href="https://snyk.io/research/zip-slip-vulnerability">Zip Slip Vulnerability</a></li><li><a title="VPNFilter Update" rel="nofollow" href="https://blog.talosintelligence.com/2018/06/vpnfilter-update.html?m=1">VPNFilter Update</a></li><li><a title="RouterSploit: Exploitation Framework for Embedded Devices" rel="nofollow" href="https://github.com/threat9/routersploit">RouterSploit: Exploitation Framework for Embedded Devices</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Microsoft puts a data center under the ocean, and they might be onto something. The Zip Slip vulnerability sneaks into your software, and VPNFilter turns out to be more complicated than first known.</p>

<p>Plus the mass exploit of Drupalgeddon2 continues, we break down why, a batch of questions, and more.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Microsoft sinks data centre off Orkney" rel="nofollow" href="https://www.bbc.com/news/technology-44368813">Microsoft sinks data centre off Orkney</a></li><li><a title="How to protect yourself from megabreaches like the one that hit Ticketfly" rel="nofollow" href="https://arstechnica.com/information-technology/2018/06/how-to-protect-yourself-from-megabreaches-like-the-one-that-hit-ticketfly/">How to protect yourself from megabreaches like the one that hit Ticketfly</a></li><li><a title="Three months later, a mass exploit of powerful Web servers continues" rel="nofollow" href="https://arstechnica.com/information-technology/2018/06/three-months-later-a-mass-exploit-of-powerful-web-servers-continues/">Three months later, a mass exploit of powerful Web servers continues</a></li><li><a title="Breach detection with Linux filesystem forensics" rel="nofollow" href="https://opensource.com/article/18/4/linux-filesystem-forensics?utm_campaign=Security%2BNewsletter&amp;utm_source=Security_Newsletter_co_79">Breach detection with Linux filesystem forensics</a></li><li><a title="Zip Slip Vulnerability" rel="nofollow" href="https://snyk.io/research/zip-slip-vulnerability">Zip Slip Vulnerability</a></li><li><a title="VPNFilter Update" rel="nofollow" href="https://blog.talosintelligence.com/2018/06/vpnfilter-update.html?m=1">VPNFilter Update</a></li><li><a title="RouterSploit: Exploitation Framework for Embedded Devices" rel="nofollow" href="https://github.com/threat9/routersploit">RouterSploit: Exploitation Framework for Embedded Devices</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 355: Operation FreeNAS Rescue</title>
  <link>https://techsnap.systems/355</link>
  <guid isPermaLink="false">fa6f72dd-e0ec-4839-b2fb-f1651ecbeda4</guid>
  <pubDate>Thu, 08 Feb 2018 11:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/fa6f72dd-e0ec-4839-b2fb-f1651ecbeda4.mp3" length="30142642" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We save our FreeNAS Mini from the edge, and perform an emergency migration to much larger hardware. </itunes:subtitle>
  <itunes:duration>40:13</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We save our FreeNAS Mini from the edge, and perform an emergency migration to much larger hardware. 
Plus 12 tips for secure authentication, the future of network security where there is no LAN, a botnet exploiting Android ADB, and your questions.
</description>
  <content:encoded>
    <![CDATA[<p>We save our FreeNAS Mini from the edge, and perform an emergency migration to much larger hardware. </p>

<p>Plus 12 tips for secure authentication, the future of network security where there is no LAN, a botnet exploiting Android ADB, and your questions.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="In just 24 hours, 5,000 Android devices are conscripted into mining botnet" rel="nofollow" href="https://arstechnica.com/information-technology/2018/02/out-of-nowhere-currency-mining-botnet-infects-5000-android-devices/">In just 24 hours, 5,000 Android devices are conscripted into mining botnet</a> &mdash; A fast-moving botnet that appeared over the weekend has already infected thousands of Android devices with potentially destructive malware that mines digital coins on behalf of the unknown attackers, researchers said.</li><li><a title="12 best practices for user account, authorization and password management" rel="nofollow" href="https://cloudplatform.googleblog.com/2018/01/12-best-practices-for-user-account.html">12 best practices for user account, authorization and password management</a> &mdash; Account management, authorization and password management can be tricky. For many developers, account management is a dark corner that doesn't get enough attention. For product managers and customers, the resulting experience often falls short of expectations. </li><li><a title="Google’s Zero Trust &#39;BeyondCorp&#39; Infrastructure Shows Future Of Network Security" rel="nofollow" href="http://www.tomsitpro.com/articles/google-beyondcorp-future-network-security,1-3229.html">Google’s Zero Trust 'BeyondCorp' Infrastructure Shows Future Of Network Security</a> &mdash; Google started changing its network security policies to a new model of “zero trust,” which treats its own internal network as the insecure Internet. Google released a new paper detailing how this new model works for its network security policies. </li><li><a title="Google dedicates engineering team to accelerate development of WordPress ecosystem" rel="nofollow" href="https://searchengineland.com/need-speed-google-dedicates-engineering-team-accelerate-development-wordpress-ecosystem-291214">Google dedicates engineering team to accelerate development of WordPress ecosystem</a> &mdash; Google's partnership with WordPress aims to jump-start the platform's support of the latest web technologies -- particularly those involving performance &amp; mobile experience. And they're hiring WordPress experts.</li><li><a title="UNIXSurplus" rel="nofollow" href="https://unixsurplus.com/">UNIXSurplus</a> &mdash; UNIXSurplus is a multi-level provider of new and refurbished custom built servers, storage solutions and computer equipment.  </li><li><a title="FreeNAS Storage Operating System" rel="nofollow" href="http://www.freenas.org/">FreeNAS Storage Operating System</a> &mdash; FreeNAS is an operating system that can be installed on virtually any hardware platform to share data over a network. FreeNAS is the simplest way to create a centralized and easily accessible place for your data. Use FreeNAS with ZFS to protect, store, backup, all of your data. FreeNAS is used everywhere, for the home, small business, and the enterprise.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We save our FreeNAS Mini from the edge, and perform an emergency migration to much larger hardware. </p>

<p>Plus 12 tips for secure authentication, the future of network security where there is no LAN, a botnet exploiting Android ADB, and your questions.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="In just 24 hours, 5,000 Android devices are conscripted into mining botnet" rel="nofollow" href="https://arstechnica.com/information-technology/2018/02/out-of-nowhere-currency-mining-botnet-infects-5000-android-devices/">In just 24 hours, 5,000 Android devices are conscripted into mining botnet</a> &mdash; A fast-moving botnet that appeared over the weekend has already infected thousands of Android devices with potentially destructive malware that mines digital coins on behalf of the unknown attackers, researchers said.</li><li><a title="12 best practices for user account, authorization and password management" rel="nofollow" href="https://cloudplatform.googleblog.com/2018/01/12-best-practices-for-user-account.html">12 best practices for user account, authorization and password management</a> &mdash; Account management, authorization and password management can be tricky. For many developers, account management is a dark corner that doesn't get enough attention. For product managers and customers, the resulting experience often falls short of expectations. </li><li><a title="Google’s Zero Trust &#39;BeyondCorp&#39; Infrastructure Shows Future Of Network Security" rel="nofollow" href="http://www.tomsitpro.com/articles/google-beyondcorp-future-network-security,1-3229.html">Google’s Zero Trust 'BeyondCorp' Infrastructure Shows Future Of Network Security</a> &mdash; Google started changing its network security policies to a new model of “zero trust,” which treats its own internal network as the insecure Internet. Google released a new paper detailing how this new model works for its network security policies. </li><li><a title="Google dedicates engineering team to accelerate development of WordPress ecosystem" rel="nofollow" href="https://searchengineland.com/need-speed-google-dedicates-engineering-team-accelerate-development-wordpress-ecosystem-291214">Google dedicates engineering team to accelerate development of WordPress ecosystem</a> &mdash; Google's partnership with WordPress aims to jump-start the platform's support of the latest web technologies -- particularly those involving performance &amp; mobile experience. And they're hiring WordPress experts.</li><li><a title="UNIXSurplus" rel="nofollow" href="https://unixsurplus.com/">UNIXSurplus</a> &mdash; UNIXSurplus is a multi-level provider of new and refurbished custom built servers, storage solutions and computer equipment.  </li><li><a title="FreeNAS Storage Operating System" rel="nofollow" href="http://www.freenas.org/">FreeNAS Storage Operating System</a> &mdash; FreeNAS is an operating system that can be installed on virtually any hardware platform to share data over a network. FreeNAS is the simplest way to create a centralized and easily accessible place for your data. Use FreeNAS with ZFS to protect, store, backup, all of your data. FreeNAS is used everywhere, for the home, small business, and the enterprise.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 354: Here Come the Script Kiddies</title>
  <link>https://techsnap.systems/354</link>
  <guid isPermaLink="false">e2e1b46b-2f05-465f-821b-95680dc0cda0</guid>
  <pubDate>Thu, 01 Feb 2018 18:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/e2e1b46b-2f05-465f-821b-95680dc0cda0.mp3" length="38049693" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>AutoSploit has the security industry in a panic, so we give it a go. To our surprise we discover systems at the DOD, Amazon, and other places vulnerable to this automated attack. We’ll tell you all about it, and what these 400 lines of Python known as AutoSploit really do.</itunes:subtitle>
  <itunes:duration>51:59</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>AutoSploit has the security industry in a panic, so we give it a go. To our surprise we discover systems at the DOD, Amazon, and other places vulnerable to this automated attack. We’ll tell you all about it, and what these 400 lines of Python known as AutoSploit really do.
Plus injecting arbitrary waveforms into Alexa and Google Assistant commands, making WordPress bulletproof, and how to detect and prevent excessive port scan attacks.
</description>
  <content:encoded>
    <![CDATA[<p>AutoSploit has the security industry in a panic, so we give it a go. To our surprise we discover systems at the DOD, Amazon, and other places vulnerable to this automated attack. We’ll tell you all about it, and what these 400 lines of Python known as AutoSploit really do.</p>

<p>Plus injecting arbitrary waveforms into Alexa and Google Assistant commands, making WordPress bulletproof, and how to detect and prevent excessive port scan attacks.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Audio Adversarial Examples" rel="nofollow" href="https://nicholas.carlini.com/code/audio_adversarial_examples/">Audio Adversarial Examples</a> &mdash; We have constructed targeted audio adversarial examples on speech-to-text transcription neural networks: given an arbitrary waveform, we can make a small perturbation that when added to the original waveform causes it to transcribe as any phrase we choose.</li><li><a title="Keylogger found on thousands of WordPress-based sites, stealing every keypress as you type" rel="nofollow" href="https://hotforsecurity.bitdefender.com/blog/keylogger-found-on-thousands-of-wordpress-based-sites-stealing-every-keypress-as-you-type-19501.html">Keylogger found on thousands of WordPress-based sites, stealing every keypress as you type</a> &mdash; But, in a twist, this particular attack isn’t just interested in mining Monero. While the website’s front-end is digging for cryptocurrencies, the back-end is secretly hosting a keylogger designed to steal unsuspecting users’ login credentials.</li><li><a title="Qubes Air: Generalizing the Qubes Architecture | Qubes OS" rel="nofollow" href="https://www.qubes-os.org/news/2018/01/22/qubes-air/">Qubes Air: Generalizing the Qubes Architecture | Qubes OS</a> &mdash; Qubes Air is the next step on our roadmap to making the concept of “Security through Compartmentalization” applicable to more scenarios. It is also an attempt to address some of the biggest problems and weaknesses plaguing the current implementation of Qubes, specifically the difficulty of deployment and virtualization as a single point of failure. While Qubes-as-a-Service is one natural application that could be built on top of Qubes Air, it is certainly not the only one. We have also discussed running Qubes over clusters of physically isolated devices, as well as various hybrid scenarios. I believe the approach to security that Qubes has been implementing for years will continue to be valid for years to come, even in a world of apps-as-a-service.</li><li><a title="Making network authentication simple in a Bring Your Own Device environment" rel="nofollow" href="https://medium.com/@anatole.beuzon/making-network-authentication-simple-in-a-bring-your-own-device-environment-9080baf39617">Making network authentication simple in a Bring Your Own Device environment</a> &mdash; In this article, we explore in depth the challenges we faced regarding compatibility, security, and user experience, and the solutions we came up with. We explain how we combined 802.1X authentication (wired &amp; wireless) and per-subscriber VLANs to offer our users a quality Internet experience.</li><li><a title="“Autosploit” tool sparks fears of empowered “script kiddies”" rel="nofollow" href="https://arstechnica.com/information-technology/2018/02/threat-or-menace-autosploit-tool-sparks-fears-of-empowered-script-kiddies/">“Autosploit” tool sparks fears of empowered “script kiddies”</a> &mdash;  "AutoSploit attempts to automate the exploitation of remote hosts."</li><li><a title="AutoSploit: Automated Mass Exploiter" rel="nofollow" href="https://github.com/NullArray/AutoSploit">AutoSploit: Automated Mass Exploiter</a> &mdash; Clone the repo. Or deploy via Docker.</li><li><a title="How To Use psad to Detect Network Intrusion Attempts" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/how-to-use-psad-to-detect-network-intrusion-attempts-on-an-ubuntu-vps">How To Use psad to Detect Network Intrusion Attempts</a> &mdash; The key to using psad effectively is to configure danger levels and email alerts appropriately, and then follow up on any problems. This tool, coupled with other intrusion detection resources like tripwire can provide fairly good coverage to be able to detect intrusion attempts.</li><li><a title="Portainer: Simple management UI for Docker" rel="nofollow" href="https://github.com/portainer/portainer">Portainer: Simple management UI for Docker</a></li><li><a title="What is iSCSI (Internet Small Computer System Interface)" rel="nofollow" href="http://searchstorage.techtarget.com/definition/iSCSI">What is iSCSI (Internet Small Computer System Interface)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>AutoSploit has the security industry in a panic, so we give it a go. To our surprise we discover systems at the DOD, Amazon, and other places vulnerable to this automated attack. We’ll tell you all about it, and what these 400 lines of Python known as AutoSploit really do.</p>

<p>Plus injecting arbitrary waveforms into Alexa and Google Assistant commands, making WordPress bulletproof, and how to detect and prevent excessive port scan attacks.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Audio Adversarial Examples" rel="nofollow" href="https://nicholas.carlini.com/code/audio_adversarial_examples/">Audio Adversarial Examples</a> &mdash; We have constructed targeted audio adversarial examples on speech-to-text transcription neural networks: given an arbitrary waveform, we can make a small perturbation that when added to the original waveform causes it to transcribe as any phrase we choose.</li><li><a title="Keylogger found on thousands of WordPress-based sites, stealing every keypress as you type" rel="nofollow" href="https://hotforsecurity.bitdefender.com/blog/keylogger-found-on-thousands-of-wordpress-based-sites-stealing-every-keypress-as-you-type-19501.html">Keylogger found on thousands of WordPress-based sites, stealing every keypress as you type</a> &mdash; But, in a twist, this particular attack isn’t just interested in mining Monero. While the website’s front-end is digging for cryptocurrencies, the back-end is secretly hosting a keylogger designed to steal unsuspecting users’ login credentials.</li><li><a title="Qubes Air: Generalizing the Qubes Architecture | Qubes OS" rel="nofollow" href="https://www.qubes-os.org/news/2018/01/22/qubes-air/">Qubes Air: Generalizing the Qubes Architecture | Qubes OS</a> &mdash; Qubes Air is the next step on our roadmap to making the concept of “Security through Compartmentalization” applicable to more scenarios. It is also an attempt to address some of the biggest problems and weaknesses plaguing the current implementation of Qubes, specifically the difficulty of deployment and virtualization as a single point of failure. While Qubes-as-a-Service is one natural application that could be built on top of Qubes Air, it is certainly not the only one. We have also discussed running Qubes over clusters of physically isolated devices, as well as various hybrid scenarios. I believe the approach to security that Qubes has been implementing for years will continue to be valid for years to come, even in a world of apps-as-a-service.</li><li><a title="Making network authentication simple in a Bring Your Own Device environment" rel="nofollow" href="https://medium.com/@anatole.beuzon/making-network-authentication-simple-in-a-bring-your-own-device-environment-9080baf39617">Making network authentication simple in a Bring Your Own Device environment</a> &mdash; In this article, we explore in depth the challenges we faced regarding compatibility, security, and user experience, and the solutions we came up with. We explain how we combined 802.1X authentication (wired &amp; wireless) and per-subscriber VLANs to offer our users a quality Internet experience.</li><li><a title="“Autosploit” tool sparks fears of empowered “script kiddies”" rel="nofollow" href="https://arstechnica.com/information-technology/2018/02/threat-or-menace-autosploit-tool-sparks-fears-of-empowered-script-kiddies/">“Autosploit” tool sparks fears of empowered “script kiddies”</a> &mdash;  "AutoSploit attempts to automate the exploitation of remote hosts."</li><li><a title="AutoSploit: Automated Mass Exploiter" rel="nofollow" href="https://github.com/NullArray/AutoSploit">AutoSploit: Automated Mass Exploiter</a> &mdash; Clone the repo. Or deploy via Docker.</li><li><a title="How To Use psad to Detect Network Intrusion Attempts" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/how-to-use-psad-to-detect-network-intrusion-attempts-on-an-ubuntu-vps">How To Use psad to Detect Network Intrusion Attempts</a> &mdash; The key to using psad effectively is to configure danger levels and email alerts appropriately, and then follow up on any problems. This tool, coupled with other intrusion detection resources like tripwire can provide fairly good coverage to be able to detect intrusion attempts.</li><li><a title="Portainer: Simple management UI for Docker" rel="nofollow" href="https://github.com/portainer/portainer">Portainer: Simple management UI for Docker</a></li><li><a title="What is iSCSI (Internet Small Computer System Interface)" rel="nofollow" href="http://searchstorage.techtarget.com/definition/iSCSI">What is iSCSI (Internet Small Computer System Interface)</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
