<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Tue, 07 Apr 2026 16:27:57 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Zfs Compression”</title>
    <link>https://techsnap.systems/tags/zfs%20compression</link>
    <pubDate>Wed, 02 May 2018 15:00:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 366: Catching up with Allan</title>
  <link>https://techsnap.systems/366</link>
  <guid isPermaLink="false">c3a8238e-1697-4086-90d1-7b9a02d8379c</guid>
  <pubDate>Wed, 02 May 2018 15:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/c3a8238e-1697-4086-90d1-7b9a02d8379c.mp3" length="41294844" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We catch up with Allan Jude and he shares stories of hunting network bottlenecks, memories of old firewalls, and some classic ZFS updates.</itunes:subtitle>
  <itunes:duration>48:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We catch up with Allan Jude and he shares stories of hunting network bottlenecks, memories of old firewalls, and some classic ZFS updates.
Plus the vulnerabilities found in Volkswagen cars, and the lengths a security research went to create the ultimate honeypot laptop. Special Guest: Allan Jude.
</description>
  <content:encoded>
    <![CDATA[<p>We catch up with Allan Jude and he shares stories of hunting network bottlenecks, memories of old firewalls, and some classic ZFS updates.</p>

<p>Plus the vulnerabilities found in Volkswagen cars, and the lengths a security research went to create the ultimate honeypot laptop.</p><p>Special Guest: Allan Jude.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Volkswagen and Audi Cars Vulnerable to Remote Hacking" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/volkswagen-and-audi-cars-vulnerable-to-remote-hacking/">Volkswagen and Audi Cars Vulnerable to Remote Hacking</a> &mdash; esearchers also gained access to the IVI system's root account, which they say allowed them access to other car data.</li><li><a title="It’s Impossible to Prove Your Laptop Hasn’t Been Hacked. I Spent Two Years Finding Out." rel="nofollow" href="https://theintercept.com/2018/04/28/computer-malware-tampering/">It’s Impossible to Prove Your Laptop Hasn’t Been Hacked. I Spent Two Years Finding Out.</a> &mdash; For the last two years, I have carried a “honeypot” laptop with me every time I’ve traveled; this computer was intended to attract (and then detect) tampering.</li><li><a title="chipsec" rel="nofollow" href="https://github.com/chipsec/chipsec">chipsec</a> &mdash;  Platform Security Assessment Framework </li><li><a title="UEFITool" rel="nofollow" href="https://github.com/LongSoft/UEFITool">UEFITool</a> &mdash; UEFI firmware image viewer and editor </li><li><a title="Haven Project" rel="nofollow" href="https://guardianproject.github.io/haven/">Haven Project</a> &mdash; Haven is for people who need a way to protect their personal spaces and possessions without compromising their own privacy, through an Android app and on-device sensors</li><li><a title="Mr S. Delivers on his DO FreeNAS Guide" rel="nofollow" href="https://pastebin.com/sYV5pjQg">Mr S. Delivers on his DO FreeNAS Guide</a></li><li><a title="OZ Shares a War Story" rel="nofollow" href="https://pastebin.com/rWVgzd03">OZ Shares a War Story</a></li><li><a title="Dave&#39;s REALLY Close Call..." rel="nofollow" href="https://pastebin.com/mmtqt4g4">Dave's REALLY Close Call...</a></li><li><a title="Karl Gives us the CTO View on new Hires" rel="nofollow" href="https://pastebin.com/bN3SHfyv">Karl Gives us the CTO View on new Hires</a></li><li><a title="Our Approach to Employee Security Training | PagerDuty" rel="nofollow" href="https://www.pagerduty.com/blog/security-training-at-pagerduty/">Our Approach to Employee Security Training | PagerDuty</a> &mdash; These are both training courses that we developed in-house and delivered ourselves.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We catch up with Allan Jude and he shares stories of hunting network bottlenecks, memories of old firewalls, and some classic ZFS updates.</p>

<p>Plus the vulnerabilities found in Volkswagen cars, and the lengths a security research went to create the ultimate honeypot laptop.</p><p>Special Guest: Allan Jude.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Volkswagen and Audi Cars Vulnerable to Remote Hacking" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/volkswagen-and-audi-cars-vulnerable-to-remote-hacking/">Volkswagen and Audi Cars Vulnerable to Remote Hacking</a> &mdash; esearchers also gained access to the IVI system's root account, which they say allowed them access to other car data.</li><li><a title="It’s Impossible to Prove Your Laptop Hasn’t Been Hacked. I Spent Two Years Finding Out." rel="nofollow" href="https://theintercept.com/2018/04/28/computer-malware-tampering/">It’s Impossible to Prove Your Laptop Hasn’t Been Hacked. I Spent Two Years Finding Out.</a> &mdash; For the last two years, I have carried a “honeypot” laptop with me every time I’ve traveled; this computer was intended to attract (and then detect) tampering.</li><li><a title="chipsec" rel="nofollow" href="https://github.com/chipsec/chipsec">chipsec</a> &mdash;  Platform Security Assessment Framework </li><li><a title="UEFITool" rel="nofollow" href="https://github.com/LongSoft/UEFITool">UEFITool</a> &mdash; UEFI firmware image viewer and editor </li><li><a title="Haven Project" rel="nofollow" href="https://guardianproject.github.io/haven/">Haven Project</a> &mdash; Haven is for people who need a way to protect their personal spaces and possessions without compromising their own privacy, through an Android app and on-device sensors</li><li><a title="Mr S. Delivers on his DO FreeNAS Guide" rel="nofollow" href="https://pastebin.com/sYV5pjQg">Mr S. Delivers on his DO FreeNAS Guide</a></li><li><a title="OZ Shares a War Story" rel="nofollow" href="https://pastebin.com/rWVgzd03">OZ Shares a War Story</a></li><li><a title="Dave&#39;s REALLY Close Call..." rel="nofollow" href="https://pastebin.com/mmtqt4g4">Dave's REALLY Close Call...</a></li><li><a title="Karl Gives us the CTO View on new Hires" rel="nofollow" href="https://pastebin.com/bN3SHfyv">Karl Gives us the CTO View on new Hires</a></li><li><a title="Our Approach to Employee Security Training | PagerDuty" rel="nofollow" href="https://www.pagerduty.com/blog/security-training-at-pagerduty/">Our Approach to Employee Security Training | PagerDuty</a> &mdash; These are both training courses that we developed in-house and delivered ourselves.</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
