Your Watchlist could be bigger.

Add any movie or show from anywhere with your free Plex account.

Security Now

Season 1

TV-G
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Many Professors use Security in Collage courses due to its in depth study of technology.

This series started as audio and later moved to video.

Where to Watch Season 1

300 Episodes

  • As the Worm Turns — the first Internet worms of 2005
    E1
    As the Worm Turns — the first Internet worms of 2005How a never-disclosed Windows vulnerability was quickly reverse-engineered from the patches to fix it and turned into more than 12 potent and damaging Internet worms in three days. What does this mean for the future of Internet security?
  • HoneyMonkeys
    E2
    HoneyMonkeysHow Microsoft's "HoneyMonkey" system works, how it finds malicious web sites before they find you, and what Microsoft is doing (and NOT doing) with this valuable security information it is now collecting.
  • NAT Routers as Firewalls
    E3
    NAT Routers as FirewallsMost people don't think of common NAT routers as hardware firewalls, but ANY NAT router inherently provides terrific security and protection against incoming malicious traffic. Learn how and why this is, and which default settings MUST be changed to lock down the security of your NAT router.
  • Personal Password Policy (1)
    E4
    Personal Password Policy (1)Everyone who uses web-based services such as eBay, Amazon, and Yahoo, needs to authenticate their identity with passwords. Password quality is important since easily guessable passwords can be easily defeated. Leo and I recap a bit from last week's program, then discuss passwords. We suggest an approach that anyone can use to easily create unbreakable passwords.
  • Personal Password Policy (2)
    E5
    Personal Password Policy (2)Our previous episode (#4), which discussed personal password policies, generated so much great listener feedback, thoughts, ideas, and reminders about things we didn't mention, that we decided to wrap up this important topic with a final episode to share listeners' ideas and to clarify some things we left unsaid.
  • Mechanical & Electromagnetic Information Leakage
    E6
    Mechanical & Electromagnetic Information LeakageTriggered by a recent report of three UC Berkeley researchers recovering text typed at a keyboard (any keyboard) after simply listening to ten minutes of typing, Leo and I discuss the weird realm of "alternative information leakage" — from CRT glowing, to radio emissions, to LEDs lamps on the front of network equipment . . . to a microphone listening to anyone typing.
  • SPYaWAREness
    E7
    SPYaWAREnessAny contemporary discussion of threats to Internet security must discuss the history, current situation, and future of spyware. Leo and I spend a little more time than usual covering many aspects of this important topic. DON'T MISS the Episode Notes Page for this episode!
  • Denial of Service (DoS) Attacks
    E8
    Denial of Service (DoS) AttacksDistributed Denial of Service (DDoS) attacks are occurring with ever-greater frequency every day. Although these damaging attacks are often used to extort high-profile gaming and gambling sites before major gambling events, attacks are also launched against individual users who do something to annoy "zombie fleet masters" while they are online. Some router and firewall vendors claim that their devices prevent DDoS attacks. Is that possible? What can be done to dodge the bullet of a DDoS attack launched against you while you're online?
  • Rootkits
    E9
    RootkitsThis week we discuss "rootkit technology". We examine what rootkits are, why they have suddenly become a problem, and how that problem is rapidly growing in severity. We also discuss their detection and removal and point listeners to some very effective free rootkit detection solutions.
  • Open Wireless Access Points
    E10
    Open Wireless Access PointsLeo and I examine the security and privacy considerations of using non-encrypted (i.e. 'Open') wireless access points at home and in public locations. We discuss the various ways of protecting privacy when untrusted strangers can 'sniff' the data traffic flowing to and from your online PC.
  • Bad WiFi Security (WEP and MAC address filtering)
    E11
    Bad WiFi Security (WEP and MAC address filtering)Leo and I answer some questions arising from last week's episode, then plow into a detailed discussion of the lack of security value of MAC address filtering, the futility of disabling SSID's for security, and the extremely poor security offered by the first-generation WEP encryption system.
  • Sony's
    E12
    Sony'sLeo and I discuss details and consequences of Sony Corporation's alarming "Rootkit" DRM (digital rights management) copy protection scheme. This poorly written software unnecessarily employs classic rootkit technology (see episode #9) to hide from its users after installation. It can not be uninstalled easily, it can be easily misused for malicious purposes, and it has been implicated in many repeated BSOD "blue screen of death" PC crashes.
  • Unbreakable WiFi Security
    E13
    Unbreakable WiFi SecurityLeo and I follow-up on last week's discussion of the Sony Rootkit debacle with the distressing news of "phoning home" (spyware) behavior from the Sony DRM software, and the rootkit's exploitation by a new malicious backdoor Trojan. We then return to complete our discussion of WiFi security, demystifying the many confusing flavors of WPA encryption and presenting several critical MUST DO tips for WPA users.
  • Virtual Private Networks (VPN): Theory
    E14
    Virtual Private Networks (VPN): TheoryLeo and I first follow-up on the past two episodes, discussing new developments in the continuing Sony Rootkit DRM drama, and clearing up some confusion over the crackability of WPA passphrases. Then, in this first of our two-part series on VPNs, we discuss the theory of VPN connections and tunnels, explaining how they work and why they represent such a terrific solution for anyone who needs security while they're away from home.
  • VPN Secure Tunneling Solutions
    E15
    VPN Secure Tunneling SolutionsLeo and I discuss the use of SSL and SSH encrypted tunneling for providing privacy and security whenever an insecure local network is being used — such as at an open WiFi hotspot or when using a hotel's network. These solutions are not transparent and tend to be configuration intensive. They also require the use of a "server" of some sort at the user's home or office. This makes these approaches less suitable for casual users, but offers a solution for the more technically inclined road warriors.
  • Listener feedback Q&A #1
    E16
    Listener feedback Q&A #1Leo and I discuss questions asked by listeners of our previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies we have previously discussed.
  • PPTP and IPSec VPN Technology
    E17
    PPTP and IPSec VPN TechnologyIn our continuing exploration of VPN technology for protecting network users on networks they don't control, Leo and I discuss the oldest "original" VPN protocols: Industry standard IPSec, and Microsoft's own PPTP and L2TP/IPSec. We examine and explain the trouble with interconnecting Windows machines to third-party VPN routers and examine the many reasons these older technologies are probably not optimal for on-the-go road warriors.
  • Hamachi Rocks!
    E18
    Hamachi Rocks!This week Leo and I discuss and describe the brand new, ready to emerge from a its long development beta phase, ultra-secure, lightweight, high-performance, highly-polished, multi-platform, peer-to-peer and FREE! personal virtual private networking system known as "Hamachi". After two solid weeks of testing and intense dialog with Hamachi's lead developer and designer, I have fully vetted the system's security architecture and have it running on many of my systems. While I am travelling to Toronto this week, Hamachi is keeping my roaming laptop securely and directly connected to all of my machines back home. Don't miss this one!
  • VPNs Three: Hamachi, iPig, and OpenVPN
    E19
    VPNs Three: Hamachi, iPig, and OpenVPNLeo and I wrap up our multi-week, in-depth coverage of PC VPN solutions by discussing some aftermath of the zero-configuration Hamachi system; introducing "iPig," a very appealing new zero-configuration VPN contender; and describing the many faces of OpenVPN, the "Swiss army knife" of VPN solutions.
  • A SERIOUS new Windows vulnerability — and Listener Q&A
    E20
    A SERIOUS new Windows vulnerability — and Listener Q&AOn December 28th a serious new Windows vulnerability has appeared and been immediately exploited by a growing number of malicious web sites to install malware. Many worse viruses and worms are expected soon. We start off discussing this and our show notes provides a quick necesary workaround until Microsoft provides a patch. Then we spend the next 45 minutes answering and discussing interesting listener questions.
  • The Windows MetaFile (WMF) Vulnerability
    E21
    The Windows MetaFile (WMF) VulnerabilityLeo and I discuss everything known about the first serious Windows security exploits of the New Year, caused by the Windows MetaFile (WMF) vulnerability. In our show's first guest appearance, we are joined by Ilfak Guilfanov, the developer of the wildly popular -- and very necessary -- temporary patch that was used by millions of users to secure Windows systems while the world waited for Microsoft to respond.
  • The Windows MetaFile Backdoor?
    E22
    The Windows MetaFile Backdoor?Leo and I carefully examine the operation of the recently patched Windows MetaFile vulnerability. I describe exactly how it works in an effort to explain why it doesn't have the feeling of another Microsoft "coding error". It has the feeling of something that Microsoft deliberately designed into Windows. Given the nature of what it is, this would make it a remote code execution "backdoor". We will likely never know if this was the case, but the forensic evidence appears to be quite compelling.
  • GRC's
    E23
    GRC'sLeo and I "close the backdoor" on the controversial Windows WMF Metafile image code execution (MICE) vulnerability. We discuss everything that's known about it, separate the facts from the spin, explain exactly which Windows versions are vulnerable and why, and introduce a new piece of GRC freeware: MouseTrap which determines whether any Windows or Linux/WINE system has 'MICE'.
  • Listener Feedback Q&A #3
    E24
    Listener Feedback Q&A #3Leo and I discuss questions asked by listeners of our previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world "application notes" for any of the security technologies we have previously discussed.
  • How the Internet Works (1)
    E25
    How the Internet Works (1)Steve talks about the Kama Sutra virus, scheduled to strike tomorrow, and PC World's anti-virus roundup. Then we delve into How the Internet Works, part 1. We'll wrap things up next week.
  • How the Internet Works (2)
    E26
    How the Internet Works (2)Part 2 of Steve's discussion of how the fundamental Internet technologies work. This and the previous episode will provide the foundation for our future podcasts on Internet security issues.
  • How Local Area Networks Work, Part 1
    E27
    How Local Area Networks Work, Part 1Steve continues to lay a foundation on understanding networking. This week, part one of how LANs work. We cover DHCP, Subnet Masks, Routers, and hubs. We'll conclude with part two on episode 29.
  • Listener Feedback Q&A #4
    E28
    Listener Feedback Q&A #4Steve answers your questions on this episide. With further clarification on VPN security, Hamachi, and the answer to the eternal question, which operating system is the most secure.
  • Ethernet Insecurity
    E29
    Ethernet InsecurityIn this week's marathon edition Steve tackles security issues inherent to Ethernet, including ARP spoofing.
  • Cryptographic Issues
    E30
    Cryptographic IssuesThis week Steve takes a look at how cryptography is used and the difficult issues strong crypto raises.
  • Symmetric Stream Ciphers
    E31
    Symmetric Stream CiphersThis week Steve continues his discussion of crypto with a look at secret decoder rings and one-time pads.
  • Listener Feedback Q&A #5
    E32
    Listener Feedback Q&A #5Episode 32 is our monthly question and answer session.
  • Symmetric Block Ciphers
    E33
    Symmetric Block CiphersPart three of Steve's overview of cryptography looks at symmetric block ciphers.
  • Public Key Cryptography
    E34
    Public Key CryptographyThis week Steve explains how public key cryptography works, and we welcome our new sponsor, Astaro! Thanks so much for the support guys.
  • Cryptographic Hashes
    E35
    Cryptographic HashesThis week Steve talks about how cryptographic hashes work and are used to verify the integrity of files and email. We also talk about email signing and recommend the Gnu Privacy Guard.
  • Listener Feedback Q&A #6
    E36
    Listener Feedback Q&A #6As usual on every fourth episode, Steve answers listener questions.
  • Crypto Series Wrap-up
    E37
    Crypto Series Wrap-upWe wrap up our talk about cryptography with a discussion of prime number generation, key recovery, and digital certificates.
  • Browser Security
    E38
    Browser SecurityWhy is Internet Explorer so insecure? What can you do to secure it? And why is it so hard to make a secure browser? Steve talks about security policy vs. browser flaws, how he uses IE safely, and why Java and Javascript are inherently more secure than ActiveScript and ActiveX.
  • Buffer Overruns
    E39
    Buffer OverrunsBuffer overflows... they're the most common kind of security flaw, but what are they and how do they happen? Finally, how can we protect ourselves from them? Steve explains all.
  • Listener Feedback Q&A #7
    E40
    Listener Feedback Q&A #7As he does every fourth episode, Steve answers your questions. But first, an update on some recent security news...
  • TrueCrypt
    E41
    TrueCryptThe ultimate encryption program, free, open source, strong, and flexible: Truecrypt.
  • NAT Traversal
    E42
    NAT TraversalSteve explains the clever technique that Skype and other programs use to end around NAT routers.
  • Open Ports
    E43
    Open PortsEver wonder what a port is? Steve explains what they are and what terms like "stealth ports" and "port sniffing mean." Leo reads a little poetry.
  • Listener Feedback Q&A #8
    E44
    Listener Feedback Q&A #8On this episode, one dozen questons and answers
  • The 'Hosts' File
    E45
    The 'Hosts' FileThis week Steve explains the mysterious HOSTS file - part of Windows, OS X, Linux, and many other operating systems. He talks about how malicious programs may misuse it, and how you can use it to protect yourself.
  • Router Logs
    E46
    Router LogsThis week Steve tells us what to do with the router logs. What a router can (and can't) tell you about your security situation?
  • Internet Weaponry
    E47
    Internet WeaponryThis week Steve tells us about distributed denial of service attacks and how hackers use IRC botnets to create them.
  • Listener Feedback Q&A #9
    E48
    Listener Feedback Q&A #9How big can a HOSTS file get? Does a firewall slow you down? A plan to fight phishers. All on this week's edition of Security Now! with Steve Gibson.
  • The NETSTAT Command
    E49
    The NETSTAT CommandHow can you tell what your computer is doing on the net? Netstat. This handy program comes with almost all operating systems. On Windows, click Start, then select Command Prompt from the Programs->Accessories menu. To run Netstat, type netstat at the command prompt. For more readable output type netstat -ab.
  • Virtual Machine History & Technology
    E50
    Virtual Machine History & TechnologyVirtualization, its history and uses in security.
  • Vista's Virgin Stack
    E51
    Vista's Virgin StackWill Windows Vista be secure? According to a new study from Symantec, the decision to re-write the networking stack from the ground up means it will be much less secure than XP.
  • A Busy Week for Security Troubles
    E52
    A Busy Week for Security TroublesSteve normally answers questions on shows divisible by four, but not this week. There's just too much security news including javascript exploits, Ebay gaming, and the sale of Hamachi.
  • VMware
    E53
    VMwareMore on Virtualization technology, with a special focus on VMWare's Virtual Appliances.
  • Blue Pill
    E54
    Blue PillThe Blue Pill demonstrates a serious security concern with the Hypervisor mode in Windows Vista. Steve discusses the threat and arguments against it.
  • Application Sandboxes
    E55
    Application SandboxesSandboxing your browser to keep your system secure.
  • Listener Feedback Q&A #10
    E56
    Listener Feedback Q&A #10Our regular session of questions and answers deals with Vista security, remote access, the HOSTS files, and Zone Alarm.
  • Virtual PC versus VMware
    E57
    Virtual PC versus VMwareSteve wraps up his rundown of Virtualization programs with a look at Microsoft's free Virtual PC.
  • Two New Critical Windows Problems
    E58
    Two New Critical Windows ProblemsGuest: Eric Sites, VP R&D Sunbelt Software Two serious Windows flaws have surfaced today. One, a zero-day exploit, makes it possible for any web site (or HTML email) to take over a Windows machine, even if it's been fully patched. The other is a file corruption error on Windows 2000 NTFS systems introduced by a Microsoft patch.
  • Comparing
    E59
    ComparingWe conclude our coverage of virtual machine software with a review of Parallels - the fastest of the VM programs.
  • Listener Feedback Q&A #11
    E60
    Listener Feedback Q&A #11
  • ISP Privacy and Security
    E61
    ISP Privacy and SecurityFirst a review of three more zero day exploits in Windows XP, then a look at what your ISP knows about you and how to protect your privacy.
  • Internet Proxies
    E62
    Internet ProxiesHow proxy servers work to both speed up access and protect users.
  • MojoPac
    E63
    MojoPacMojoPac software lets you put your entire Windows configuration on a thumbdrive or portable disk and take it with you anywhere. It works surprisingly well, but there are some caveats. Steve reviews.
  • Listener Feedback Q&A #12
    E64
    Listener Feedback Q&A #12
  • Why Is Security So Difficult?
    E65
    Why Is Security So Difficult?What makes it so hard to secure Windows? Steve says ultimate security is ultimately impossible.
  • Windows Vista Security
    E66
    Windows Vista SecurityWhy the 64-bit version of Windows is both more secure and less compatible. Steve explains why.
  • Kernel Patch Protection
    E67
    Kernel Patch ProtectionMicrosoft is touting PatchGuard, a new security feature in 64-bit versions of XP and Vista. Steve explains how easy it is to hack, and what it's really for if it's not for deterring hackers.
  • Listener Feedback Q&A #13
    E68
    Listener Feedback Q&A #13Our monthly question and answer session goes long - but there's lots of good information.
  • The Social Implications of Internet Anonymity
    E69
    The Social Implications of Internet AnonymityIs there such a thing as anonymity on the Internet? How important is it?
  • Achieving Internet Anonymity
    E70
    Achieving Internet AnonymityTwo interesting implementations of Internet anonymization: The Freenet Project for anonymously storing and transmitting files, and Tor, "the onion router" which can anonymize all your Internet accesses.
  • SecurAble
    E71
    SecurAbleSteve's latest free security application is called Securable. It's not quite ready yet, but Steve gives us a preview in this episode.
  • Listener Feedback Q&A #14
    E72
    Listener Feedback Q&A #14Our monthly question and answer segment covers TOR details, overheating hard drives, and what happens to your data when you die...
  • Digital Rights Management (DRM)
    E73
    Digital Rights Management (DRM)Steve and Leo survey the history and evolution of media property rights and the technologies used to enforce them as they prepare for next week's show: a look at AACS, the most pervasive and invasive system for digital rights management ever created.
  • Peter Gutmann on Vista DRM
    E74
    Peter Gutmann on Vista DRMSteve and Leo interview Peter Gutmann about his paper A Cost Analysis of Windows Vista Content Protection.
  • Vista DRM Wrap-Up & Announcing “SecurAble”
    E75
    Vista DRM Wrap-Up & Announcing “SecurAble”We wrap up our discussion of the premium content protection features in Vista and announce Steve's newest free security utility: Securable.
  • Listener Feedback Q&A #15
    E76
    Listener Feedback Q&A #15Our monthly question and answer segment covers DEP on the Mac, HD-DVD decryption, and email privacy...
  • Microsoft on Vista DRM
    E77
    Microsoft on Vista DRMSteve and Leo discuss Dave Marsh's response on behalf of Microsoft to Peter Gutmann's paper about Windows Vista Content Protection.
  • DEP in Depth
    E78
    DEP in DepthHardware Data Execution Protection is one of the best ways to protect your PC from hackers. Steve discusses how it works, how to turn it on, and the possible pitfalls of using it.
  • Backtracking Spoofed Spam eMail
    E79
    Backtracking Spoofed Spam eMailHow do spambots work, why do spammers need them, and the best way to block them and prevent spam.
  • Listener Feedback Q&A #16
    E80
    Listener Feedback Q&A #16Our monthly question and answer segment covers spam spoofing, VPN mysteries, and online backup security...
  • Hard Drive Unreliability
    E81
    Hard Drive UnreliabilityGoogle's massive study of hard drive reliability yields some surprising results. Read more at http://www.grc.com/sn/notes-081.htm
  • Cyber Warfare
    E82
    Cyber WarfareSteve comments on the Federal Computer Week article Cyber officials: Chinese hackers attack 'anything and everything'.
  • UAC in Depth
    E83
    UAC in DepthA closer look at Vista's User Access Control.
  • Listener Feedback Q&A #17
    E84
    Listener Feedback Q&A #17
  • Intro to Web Code Injection
    E85
    Intro to Web Code InjectionJikto is a Javascript tool that can take over your computer and use it to find sites with vulnerabilities. We describe it and the cross-site scripting flaws it looks for.
  • Cross-Site Scripting
    E86
    Cross-Site ScriptingUpdates on the Animated Cursor Vulnerability, a recommendation for security software from eEye, and how the Sony Reader works, plus an in depth discussion of scripting vulnerabilities.
  • SQL Injection Exploits
    E87
    SQL Injection ExploitsAnother common attack vector in web software is the SQL injection. Steve explains what it is and how it happens.
  • Listener Feedback Q&A #18
    E88
    Listener Feedback Q&A #18
  • Even More Badly Broken WEP
    E89
    Even More Badly Broken WEPWEP gets even more insecure with a new cracking technique that's 1000 times faster.
  • Multifactor Authentication
    E90
    Multifactor AuthenticationSteve explains the theory and practice of multifactor authentication which uses combinations of "something you know," "something you have," and "something you are" to provide stronger remote authentication than traditional, unreliable single-factor username and password authentication.
  • Marc Maiffret
    E91
    Marc MaiffretGuest: Marc Maiffret of eEye Digital Security Marc talks about Windows and Mac security, the coming threat from web applications, and eEye's free, all-in-one protection program, Blink Personal Edition.
  • Listener Feedback Q&A #19
    E92
    Listener Feedback Q&A #19
  • Microsoft Patent Wars
    E93
    Microsoft Patent WarsSteve looks at software patents and the Microsoft challenge to open source software from the point of view of a developer, patent holder, and expert witness in patent cases.
  • The Fourth Factor
    E94
    The Fourth FactorWe've already talked about the three factors of authentication: something you know (e.g. a password), something you have (a passcard), and something you are (a fingerprint). Now Steve talks about the fourth factor of authentication: someone you know, or who knows you.
  • OpenID
    E95
    OpenIDOpen ID, how it works and what it means to you (not having to remember so many passwords for starters).
  • Listener Feedback Q&A #20
    E96
    Listener Feedback Q&A #20Steve answers listener mail on subjects like authentication and more...
  • Operation: Bot Roast
    E97
    Operation: Bot RoastThe FBI says it has uncovered one million computers that are being used by hackers without their owners' knowledge. Today Steve talks about BotNets and the FBI's Operation Bot Roast.
  • Internet Identity Metasystems
    E98
    Internet Identity MetasystemsSteve continues our discussion of authentication with a look at Internet identity metasystems.
  • Trusted Platform Module (TPM)
    E99
    Trusted Platform Module (TPM)The Trusted Platform Module - a hardware solution to security now shipping on many computers.
  • Listener Feedback Q&A #21
    E100
    Listener Feedback Q&A #21Your questions, Steve's answers as we complete 100 consecutive weeks of shows!
  • Are You Human?
    E101
    Are You Human?Steve looks at Captcha and Re-Captcha - the pros and cons of trying to distinguish humans from robots, with a side look at Alan Turing and Jeff Hawkins's On Intelligence.
  • Listener Mailbag #1
    E102
    Listener Mailbag #1Our first mailbag episode with 20 questions and comments from our listeners.
  • PayPal Security Key
    E103
    PayPal Security KeyA closer look at the Paypal Security Key with Michael Vergara, Director of Account Protections at Paypal.
  • Listener Feedback Q&A #22
    E104
    Listener Feedback Q&A #22For 16Kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written - Spinrite 6.
  • Firewall LeakTesting
    E105
    Firewall LeakTestingSteve, the creator of the original leak test program, talks about leak testing and how hackers work to get around them.
  • Listener Mailbag #2
    E106
    Listener Mailbag #2Our second mailbag episode with a dozen questions and comments from our listeners.
  • PIP & Even More Perfect Passwords
    E107
    PIP & Even More Perfect PasswordsSteve looks at Verisign's Personal Identity Provider, an OpenID service that works with the Paypal token, and talks about updates to his Perfect Password page.
  • Listener Feedback #23
    E108
    Listener Feedback #23
  • GRC's eCommerce System
    E109
    GRC's eCommerce SystemSteve talks about developing his in-house E-Commerce system, and how he solved some issues other e-commerce system handle poorly. We also talk about the pleasures of assembly language programming.
  • Listener Feedback #24
    E110
    Listener Feedback #24Our regular mailbag episode with a dozen questions and comments from our listeners, plus an extra one for fun.
  • OpenID Precautions
    E111
    OpenID PrecautionsSteve responds to criticisms of the OpenID system and offers some issues to consider when you use it.
  • Listener Feedback #25
    E112
    Listener Feedback #25
  • Roaming Authentication
    E113
    Roaming AuthenticationHow do you solve the problem of secure access to data on the road? Steve shows how he tackled roaming authentication at grc.com and proposes a general solution for everyone.
  • Listener Feedback #26
    E114
    Listener Feedback #26Our regular mailbag episode with a dozen questions and comments from our listeners including our Great Idea of the Week...
  • Perfect Paper Passwords
    E115
    Perfect Paper PasswordsFollowing up on Episode 113, Roaming Authentication, Steve proposes a great way to strengthen remote access using Perfect Paper Passwords.
  • Listener Feedback #27
    E116
    Listener Feedback #27
  • Even More Perfect paper Passwords
    E117
    Even More Perfect paper PasswordsPerfect Paper Passwords version two!
  • Listener Feedback #28
    E118
    Listener Feedback #28
  • PayPal and DoubleClick
    E119
    PayPal and DoubleClickWhy does Paypal secretly send you through Doubleclick to get to some of its web pages? Steve explains how third-party cookies can violate your privacy and what to do about it.
  • Listener Feedback #29
    E120
    Listener Feedback #29
  • Is Privacy Dead?
    E121
    Is Privacy Dead?Is it possible to preserve your privacy in the digital age? It's certainly worth trying.
  • Listener Feedback #30
    E122
    Listener Feedback #30Our regular mailbag episode with a dozen questions and comments from our listeners...
  • Jungle Disk
    E123
    Jungle DiskSteve interviews Dave Wright of JungleDisk, a data storage optimization product for Amazon's S3...
  • Listener Feedback #31
    E124
    Listener Feedback #31
  • Symmetric Ciphers
    E125
    Symmetric CiphersSteve further elaborates on symmetric ciphers, the workhorses of encryption.
  • Listener Feedback #32
    E126
    Listener Feedback #32Steve discusses Treewalkdns.com, OpenDNS, Rijndael encryption Flash animation, Ironkey, and Opera mini security FAQ.
  • Corporate Security
    E127
    Corporate SecuritySteve talks about the challenges of corporate IT security policy and enforcement and the inherent tension between IT security staff and employees.
  • Listener Feedback #33
    E128
    Listener Feedback #33Steve talks about the remote code execution exploit of the Microsoft Windows TCP/IP vulnerability and answers your questions.
  • Windows SteadyState
    E129
    Windows SteadyStateSteve discusses how network administrators can protect their systems using Windows SteadyState.
  • Listener Feedback #34
    E130
    Listener Feedback #34
  • FREE CompuSec
    E131
    FREE CompuSecMicrosoft's Super Patch Tuesday, Macintosh updates, Adobe Acrobat exploit, Firefox patch, Vista SP-1, and more.
  • Listener Feedback #35
    E132
    Listener Feedback #35
  • TrueCrypt v5.0
    E133
    TrueCrypt v5.0Steve explores whole-drive encryption and details the release of TrueCrypt 5.0.
  • Listener Feedback #36
    E134
    Listener Feedback #36
  • IronKey
    E135
    IronKeyGuest: Dave Jevans, CEO of IronKey Steve interviews Dave Jevans of IronKey.
  • Listener Feedback #37
    E136
    Listener Feedback #37
  • RAM Hijacks
    E137
    RAM HijacksSteve breaks down the concept of dynamic RAM hijacking raised by the recent Princeton study.
  • Listener Feedback #38
    E138
    Listener Feedback #38
  • Network Congestion
    E139
    Network CongestionThe logistics of network congestion, network neutrality and prioritized packets.
  • Listener Feedback #39
    E140
    Listener Feedback #39
  • RSA Conference 2008
    E141
    RSA Conference 2008ClamAV security flaw, ICQ vulnerability, Opera and more.
  • Listener Feedback #40
    E142
    Listener Feedback #40
  • YubiKey
    E143
    YubiKeyLeo and I delve into the detailed operation of the YubiKey, the coolest new secure authentication device I discovered at the recent RSA Security Conference. Our special guest during the episode is Stina Ehrensvrd, CEO and Founder of Yubico, who describes the history and genesis of the YubiKey, and Yubico's plans for this cool new technology.
  • Listener Feedback #41
    E144
    Listener Feedback #41
  • Secunia's PSI
    E145
    Secunia's PSIThe free vulnerability scanner and update management tool Secunia PSI.
  • Listener Feedback #42
    E146
    Listener Feedback #42
  • Microsoft's Baseline Security Analyzer
    E147
    Microsoft's Baseline Security AnalyzerTwo useful but lesser-known Microsoft security utilities.
  • Listener Feedback #43
    E148
    Listener Feedback #43
  • ISP Betrayal
    E149
    ISP BetrayalAn overview of next-generation behavioral tracking and profiling systems.
  • Listener Feedback #44
    E150
    Listener Feedback #44
  • Phracking Phorm
    E151
    Phracking PhormHow third parties are gaining footholds in ISP facilities in order to access your data.
  • Listener Feedback #45
    E152
    Listener Feedback #45
  • DePhormed Politics
    E153
    DePhormed PoliticsMore on the privacy threat from the Phorm system.
  • Listener Feedback #46
    E154
    Listener Feedback #46
  • Bailiwicked Domain Attack
    E155
    Bailiwicked Domain AttackThe nuts and bolts of DNS and the DNS cache poisoning attacks.
  • Listener Feedback #47
    E156
    Listener Feedback #47
  • DNS — After the Patch
    E157
    DNS — After the PatchA follow-up on the serious, and somewhat still present, DNS protocol spoofability flaw.
  • Listener Feedback #48
    E158
    Listener Feedback #48
  • Vista Security Bypass
    E159
    Vista Security BypassBlack Hat Conference revelations, where Vista's security improvements fall short, and more.
  • Listener Feedback #49
    E160
    Listener Feedback #49
  • Google's Chrome
    E161
    Google's ChromeSteve drills down to determine the security levels offered by Google Chrome.
  • Listener Feedback #50
    E162
    Listener Feedback #50
  • GoogleUpdate & DNS Security
    E163
    GoogleUpdate & DNS SecurityThe benefits, challenges, and nuances of secure DNS.
  • SockStress
    E164
    SockStressSteve explains yet another security flaw in the TCP stack.
  • Listener Feedback #51
    E165
    Listener Feedback #51Airport security checks and balances, white knuckle Disney adventures, and the limits of spyware infestations?
  • Cross-Site Request Forgery
    E166
    Cross-Site Request ForgerySteve tells you why you must always explicitly log out from banking and other important sites.
  • Listener Feedback #52
    E167
    Listener Feedback #52
  • ClickJacking
    E168
    ClickJackingSteve discusses clickjacking, aka UI redressing, which tricks users into unintended web-based actions.
  • Listener Feedback #53
    E169
    Listener Feedback #53
  • The TKIP Hack
    E170
    The TKIP HackWhy you shouldn't worry about the TKIP crack.
  • Listener Feedback #54
    E171
    Listener Feedback #54
  • Sandboxie
    E172
    SandboxieSteve and Leo return to take a much closer look at "Sandboxie", an extremely useful, powerful, and highly recommended Windows security tool they first mentioned two years ago. This time, after interviewing Sandboxie's creator, Ronen Tzur, Steve explains why he is totally hooked and why Leo is wishing it was available for his Macs.
  • Listener Feedback #55
    E173
    Listener Feedback #55
  • Sandbox Limitations
    E174
    Sandbox LimitationsThe limitations of sandboxing in preventing the negative impacts of malware.
  • Listener Feedback #56
    E175
    Listener Feedback #56
  • Drop My Rights
    E176
    Drop My RightsHow to use Microsoft's little-known DropMyRights utility for safer browsing.
  • Breaking SSL, PDP-8's & UltraCapacitors
    E177
    Breaking SSL, PDP-8's & UltraCapacitorsBreaking SSL, PDP-8s, and Ultracapacitors. Full show notes are available at grc.com.
  • Listener Feedback #57
    E178
    Listener Feedback #57
  • Cracking Security Certificates
    E179
    Cracking Security CertificatesHow security certificates are created and signed, what they do for us, and the MD5 hash.
  • Listener Feedback #58
    E180
    Listener Feedback #58
  • Crypto Rehash
    E181
    Crypto RehashSteve gives an overview of the major concepts and components of encryption.
  • Listener Feedback #59
    E182
    Listener Feedback #59
  • Modes of Encryption
    E183
    Modes of EncryptionWindows Update, IE7 Problems, ActiveX and Windows 7 issues, SQL attacks, and more.
  • Listener Feedback #60
    E184
    Listener Feedback #60
  • Cryptographic HMACs
    E185
    Cryptographic HMACsMSFT Autorun updates, FreeBSD telnetd, IE7 critical exploit, Acrobat Reader, and more.
  • Listener Feedback #61
    E186
    Listener Feedback #61
  • Windows Autorun-around
    E187
    Windows Autorun-aroundPast and recent problems with Windows Autorun.
  • Listener Feedback #62
    E188
    Listener Feedback #62
  • Internet Explorer 8
    E189
    Internet Explorer 8Internet Explorer 8 speed benchmarks, cookies, Compatibly Mode, Smart Screen filter, DEP, and more.
  • Listener Feedback #63
    E190
    Listener Feedback #63
  • GhostNet
    E191
    GhostNetA look into GhostNet, the alleged Chinese cyber-spying network.
  • Listener Feedback #64
    E192
    Listener Feedback #64This mailbag episode discusses new Firefox plugins, Conficker, buffer overflow, and more.
  • Conficker
    E193
    ConfickerSteve analyzes Conficker, the sophisticated worm that has spread to more than 10 million PCs worldwide.
  • Listener Feedback #65
    E194
    Listener Feedback #65This mailbag episode covers Conficker, Windows process control, NeXT, Ironkey, and more.
  • The SSL/TLS Protocol
    E195
    The SSL/TLS ProtocolSteve describes the Internet's most-used security protocol, SSL, now evolved into TLS.
  • Listener Feedback #66
    E196
    Listener Feedback #66This mailbag episode includes SSL/TLS, worms-resistant NATs, PDF JavaScript, nuclear power stations running Windows, and more.
  • Windows 7 Security
    E197
    Windows 7 SecuritySecurity changes, additions and enhancements to Microsoft Windows 7.
  • Listener Feedback #67
    E198
    Listener Feedback #67This mailbag episode includes FASM, scripts, sockets, SSL/TLS, HTTPS, Windows 7's XP mode, and more.
  • The Geek Atlas, IPv6 & a non-VPN
    E199
    The Geek Atlas, IPv6 & a non-VPNA good book, the IPv6 protocol, and Steve's secure TCP idea that doesn't use a VPN tunnel.
  • Listener Feedback #68
    E200
    Listener Feedback #68In this mailbag episode we discuss IPv6, Non-VPNs, Microsoft ClickOnce, expired SSL certificates, and more.
  • SecureZIP
    E201
    SecureZIPThe operation, features, and security of PKWARE?s free SecureZIP file archiving and encrypting utility.
  • Listener Feedback #69
    E202
    Listener Feedback #69In this mailbag episode we discuss SecureZip, WPA/WPA2, home-grown VPNs, foreign ATMs, and more.
  • Boyer & Moore
    E203
    Boyer & MooreSteve tells of the Bob Boyer and J Strother Moore algorithm for finding a substring in a buffer.
  • Listener Feedback #70
    E204
    Listener Feedback #70
  • Lempel & Ziv
    E205
    Lempel & ZivAn examination of Lempel-Ziv data compression, one of the most prevalent computer algorithms of all time.
  • Mega Security News Update
    E206
    Mega Security News UpdateSecurity updates in Windows Office, IAS, Virtual PC, Virtual Server, msvid control, and more.
  • Listener Feedback #71
    E207
    Listener Feedback #71Steve answers questions on AES-256, iPhone security, TrueCrypt, Firefox privacy, and more.
  • Listener Feedback #72
    E208
    Listener Feedback #72Steve answers questions on SSL encryption, 3g security, Trojans, VPNs as infection vectors, and more.
  • Vitamin D
    E209
    Vitamin DA rare off-topic discussion about Steve's research into vitamin D.
  • Listener Feedback #73
    E210
    Listener Feedback #73Security news and listeners' questions...
  • Voting Machine Hacking
    E211
    Voting Machine HackingSteve covers the security implications of electronic voting machines.
  • Listener Feedback #74
    E212
    Listener Feedback #74Steve answers questions on iPIG VPN, Flash cookies, firewalls, parents' passwords, and more.
  • Cracking GSM Cellphones
    E213
    Cracking GSM CellphonesThe inherent insecurities of GSM, the pseudo-random bitstream cipher protecting data on billions of phones.
  • Listener Feedback #75
    E214
    Listener Feedback #75Steve addresses feedback on GSM security, cookies, router admin passwords, proxy servers, and more.
  • Security Maxims
    E215
    Security MaximsSteve and Leo talk about various security maxims, what they mean, why you should follow them, and more.
  • Listener Feedback #76
    E216
    Listener Feedback #76Leo and Steve talk about Microsoft Security Essentials, your questions, and more.
  • The Fundamentally Broken Browser Model
    E217
    The Fundamentally Broken Browser ModelHow SSLs can be spoofed in man-in-the-middle attacks.
  • Listener Feedback #77
    E218
    Listener Feedback #77
  • Badly Broken Browsing
    E219
    Badly Broken BrowsingWhy patches are impossible, the Total (In)security virus, and why writing software shouldn't be too easy.
  • Listener Feedback #78
    E220
    Listener Feedback #78
  • The Oxymoron of “JavaScript Security”
    E221
    The Oxymoron of “JavaScript Security”The problem with Javascript and security. Guest John Graham-Cumming says it's the "elephant in your browser."
  • Listener Feedback #79
    E222
    Listener Feedback #79We've got the latest security news, including an SSL hack, plus eight great questions from you and Steve's answers...
  • A security vulnerability in SSL
    E223
    A security vulnerability in SSLSteve explains how a serious exploit in SSL works.
  • Listener Feedback #80
    E224
    Listener Feedback #80Security news, including the NSA's contributions to Windows 7, iPhone bot nets, plus Steve answers your questions.
  • “Same Origin” Troubles
    E225
    “Same Origin” TroublesApple fixes security flaws, Ford SYNC SDK, black screen of death, same origin troubles, and more.
  • Listener Feedback #130
    E226
    Listener Feedback #130Digital voting goes open source, patch Tuesday news, and Steve answers your questions.
  • Cyberwarfare
    E227
    CyberwarfareSteve covers what may be the future of conflict, Cyberwarfare.
  • Listener Feedback #82
    E228
    Listener Feedback #82Steve responds to questions covering Skype spam, SSL cracking, unencrypted UAV video feeds, free SSL certificates, and more.
  • The Rational Rejection of Security Advice
    E229
    The Rational Rejection of Security AdviceA hard look at the costs and benefits of following all security advice.
  • Listener Feedback #83
    E230
    Listener Feedback #83This week's questions cover packet flow, hijacking DNS queries, router DNS, Patch Tuesday, and more.
  • Mega Security Update & CES Observations
    E231
    Mega Security Update & CES ObservationsSteve catches up with a mega security update, then gives us some of his favorite (wacky) products from CES.
  • Listener Feedback #84
    E232
    Listener Feedback #84Steve answers listener questions about live Linux CDs, TrueCrypt RAM encryption, resetting Thomson modem passwords, and more.
  • Let's Design a Computer (part 1)
    E233
    Let's Design a Computer (part 1)Steve explains how computers work by designing one from first principles.
  • Listener Feedback #85
    E234
    Listener Feedback #85Internet Explorer as a file system, using Live CDs for security, and Steve takes on the iPad...
  • Machine Language
    E235
    Machine LanguageFor 16kpbs versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
  • Listener Feedback #86
    E236
    Listener Feedback #86More flash vulnerabilities, security updates, fake security software, Steve answers your questions, and more.
  • Indirection: The Power of Pointers
    E237
    Indirection: The Power of PointersAn introduction to the use of "indirection" in computer science, security news, and more.
  • Listener Feedback #87
    E238
    Listener Feedback #87Steve answers your questions about webcam privacy, unencrypted data in ram, and more.
  • Stacks, Registers & Recursion
    E239
    Stacks, Registers & RecursionHow stacks, registers and recursion are interrelated, the latest security news, and more.
  • Listener Feedback #88
    E240
    Listener Feedback #88Patch Tuesday, Opera vulnerabilities, the RSA conference, RealDVD, and more.
  • Hardware Interrupts
    E241
    Hardware InterruptsSteve continues his talk on the foundational technologies of computing. This week: how computers do more than one thing at a time using interrupts.
  • Listener Feedback #89
    E242
    Listener Feedback #89Critical updates from Microsoft and Apple, good news for Gmail security, and a warning for nudists...
  • State Subversion of SSL
    E243
    State Subversion of SSLFirefox updates, vulnerabilities in .PDFs, Steve's iPad review, SSL/TLS, and more.
  • Listener Feedback #90
    E244
    Listener Feedback #90Microsoft security updates, the FCC's jurisdiction on bandwidth shaping, Java flaws, iPhone OS security, the state of SSL security, and more.
  • The Security of Open vs CLosed
    E245
    The Security of Open vs CLosedSteve and Leo seriously examine the proven comparative security of open versus closed source and development software, and open versus closed execution platforms.
  • Listener Feedback #91
    E246
    Listener Feedback #91Stolen Google source code, GSM hacked, photocopy machine hard drive security, your questions, and more.
  • The “Multi”-verse
    E247
    The “Multi”-verseOpera vulnerabilities, Adobe PDF insecurities, malware from the US Treasury, Steve joins Twitter, and more.
  • The Portable Dog Killer
    E248
    The Portable Dog KillerPatch tuesday, laptop camera surveillance, Yahoo! messenger worm, and more.
  • Listener Feedback #92
    E249
    Listener Feedback #92Shockwave issues, Mozilla's plug-in check, weaponized email, hacking cars, your questions, and more.
  • Operating Systems
    E250
    Operating SystemsManually updating IrfanView and Free Download Manager, Google wifi litigation, how operating systems work, and more.
  • Listener Feedback #93
    E251
    Listener Feedback #93Tabnabbing, Adobe security rumors, iPad data plan changes, your questions, and more.
  • RISCy Business
    E252
    RISCy BusinessAdobe zero-day, overwrought iPad security news, the evolution of computing architectures, and more.
  • Listener Feedback #94
    E253
    Listener Feedback #94Mac update, AT&T hijinks, another zero-day vulnerability from Microsoft, Adobe delays pdf fix, your questions, and more.
  • What We'll Do for Speed
    E254
    What We'll Do for SpeedThe 25 year legacy of unbelievably complex technologies used in microprocessors to maximize performance.
  • Listener Feedback #95
    E255
    Listener Feedback #95Out of cycle Acrobat and Reader updates, Firefox improvements, flawed SSL study, internet kill switch, your questions, and more.
  • LastPass
    E256
    LastPassSteve thoroughly evaluates LastPass, explains why high-security passwords are necessary, and tells us how LastPass makes storing those passwords secure.
  • Listener Feedback #96
    E257
    Listener Feedback #96Chrome update, ClearCloud DNS, Microsoft and Russian camaraderie, LastPass, your questions, and more.
  • Five Years of Vulnerabilities
    E258
    Five Years of VulnerabilitiesWindows shell worm in the wild, Security Essentials 2.0 beta, Secunia's 5-year analysis, and more.
  • Listener Feedback #97
    E259
    Listener Feedback #97Firefox mega security update, WPA2 broken?, .LNK viruses in the wild, infected Dell motherboards, your questions and more.
  • DNS Rebinding
    E260
    DNS RebindingWindows .LNK vulnerability fixed, Google's WiFi "overcollection" in the UK, news from Blackhat, DNS rebinding, and more.
  • Listener Feedback #98
    E261
    Listener Feedback #98PayPal discontinues their virtual credit card service, RIM placing servers in Saudi Arabia, Firefox v4 updates silently, your questions and more.
  • Strict Transport Security
    E262
    Strict Transport SecurityApple fixes the jailbreak hole, trojans on Android, Strict Transport Security (STS), and more.
  • Listener Feedback #99
    E263
    Listener Feedback #99Out-Of-Cycle update from Adobe, Apple security update, binary planting, Spanair 2008 crash, your questions, and more.
  • Side-Channel Privacy Leakage
    E264
    Side-Channel Privacy LeakageConsequences of the web not being designed for privacy, including non-consensual user tracking.
  • Listener Feedback #100
    E265
    Listener Feedback #100Fix-It for .dll hijack, danger from applications changing the working directory, first successful 64-bit Windows root kit, your questions, and more.
  • Inside OAuth
    E266
    Inside OAuthMicrosoft's 2nd Tuesday update, new 0-day vulnerabilities in Adobe, Firefox fixes, "Stuxnet" worm, delegated access through OAuth, and more.
  • Listener Feedback #101
    E267
    Listener Feedback #101Flash update, Microsoft ASP .NET problem, HDCP master key leak, Twitter "OnMouseover" XSS flaw, your questions, and more.
  • CryptoSystem Backdoors
    E268
    CryptoSystem BackdoorsNew 0-day for Windows, HDCP decryption software, Stuxnet & Iran, COICA, cryptography systems and backdoors for law enforcement, and more.
  • Listener Feedback #102
    E269
    Listener Feedback #102Adobe Acrobat patched, RIM and India going 'round & 'round, Comcast VS. Bot, and more.
  • The Evercookie
    E270
    The EvercookieMicrosoft breaks Patch Tuesday update record, Facebook adds OTPs and remote signout, What is The Evercookie?, and more.
  • Listener Feedback #103
    E271
    Listener Feedback #103Microsoft reports on Java exploits, new Adobe Reader will sandbox, feedback from MSRT, your questions, and more.
  • Firesheep
    E272
    FiresheepMozilla and Real Player updates, Firefox 0-day, Wall Street Journal tracking and privacy series, session hijacking for the rest of us, and more.
  • Listener Feedback #104 & The FireStorm
    E273
    Listener Feedback #104 & The FireStormFiresheep firestorm, Flash 0-day exploit in the wild, another iPhone lock screen bypass, your questions, and more.
  • Benchmarking DNS
    E274
    Benchmarking DNSSecond Tuesday updates, critical Outlook fix, Android risks, Google expands "bug bounty", GRC's DNS Benchmark, and more.
  • Listener Feedback #105
    E275
    Listener Feedback #105Big Apple update, IE6/7 0-day unpatched, infected Chinese cell phones, Stuxnet's probable target, your questions, and more.
  • Testing DNS Spoofability
    E276
    Testing DNS SpoofabilitySafari update, HTTPS Everywhere, FBI wants to wiretap the Internet, comprehensive DNS spoofability test, and more.
  • Listener Feedback #106
    E277
    Listener Feedback #106New WIndows kernel vulnerability, Wikileaks siprnet, Vitamin D findings, your questions, and more.
  • Tag Me (with RFID)
    E278
    Tag Me (with RFID)Windows 7 SP1 reaches RC level, Google Chrome v8.0 released, What is SHIELD?, How to keep track of people using RFID tags, and more.
  • Listener Feedback #107
    E279
    Listener Feedback #107Microsoft's December security updates, backdoor in BSD, WikiLeaks DDoS, your questions, and more.
  • Bluetooth
    E280
    BluetoothOpenBSD discredits backdoor, weak net neutrality, compromised site warnings from Google, Bluetooth in depth, and more.
  • The Portable Dog Killer, Encore
    E281
    The Portable Dog Killer, EncoreAn encore presentation of an enlightening story from Steve's past.
  • Listener Feedback #108
    E282
    Listener Feedback #108Microsoft acknowledges IE problem, hacking GSM phones, Stuxnet update, your questions, and more.
  • Bluetooth Hacking
    E283
    Bluetooth HackingCross Fuzz, warrantless cell phone searches, Obama's "Unified Internet Identity", flavors of bluetooth hacking, and more.
  • Listener Feedback #109
    E284
    Listener Feedback #109Israel and US teamed up on Stuxnet, global IPv6 test coming, your questions, and more.
  • Fuzzy Browsers
    E285
    Fuzzy BrowsersGoogle awards first "Elite" security award, Facebook SSL and HTTPS, unprivileged work e-mail, stress testing browsers, and more.
  • Listener Feedback #110
    E286
    Listener Feedback #110Gingerbread data disclosure vulnerability, SourceForge hack, IPv4 depletion, zero-day attacks no more, your questions, and more.
  • BitCoin CryptoCurrency
    E287
    BitCoin CryptoCurrencyFirefox adds "Do Not Track", Verizon alters web content, McAfee on Mobile Malware, BitCoin, and more.
  • Listener Feedback #111
    E288
    Listener Feedback #111A critical Microsoft vulnerability, The differences between open and closed source software, A number of questions around BitCoin, and more.
  • Proxied Surfing
    E289
    Proxied SurfingAfter catching up with the week's security updates and other security-related news, Steve and Leo discuss the many modes of operation of "Proxied Web Surfing" which are used to bypass firewalls and Internet filters, aid free speech, and alter the contents of web pages retrieved from the Internet.
  • Listener Feedback #112
    E290
    Listener Feedback #112Windows 7 service pack 1 is out, Apple's Thunderbolt security, Facebook's HTTPS security turns itself off, and more.
  • Stuxnet
    E291
    StuxnetThe anatomy of Stuxnet, plus Pwn2Own is underway meaning updates from Apple, Google, Microsoft, and more.
  • Listener Feedback #113
    E292
    Listener Feedback #113The consequences of Pwn2Own, Issues around the Japanese earthquake, reverse DNS, and more.
  • IE9
    E293
    IE9Internet Explorer 9, RSA Security comprimised, India versus Blackberry, and more.
  • Listener Feedback #114
    E294
    Listener Feedback #114Fraudulent SSL certificates, RSA SecurID breach update, Real Player vulnerability, your questions, and more.
  • The Comodo SSL Breach
    E295
    The Comodo SSL BreachRSA SecurID Break-in, YubiHSM, Epsilon security breach, DNT gets traction, and more.
  • Listener Feedback #115
    E296
    Listener Feedback #11564 fixes from Microsoft, Another Flash exploit, Wordpress hacked, your questions, and more.
  • Pass-Sentences??
    E297
    Pass-Sentences??iOS location tracking, Pass phrase security, Dropbox authentication, and more.
  • Listener Feedback #116
    E298
    Listener Feedback #116Sony Playstation Network breach, Mobile tracking, Disc Drive steganography, your emails, and more.
  • Going Random (1)
    E299
    Going Random (1)Firefox and Chrome updates, Apple tracks differently, Bin Laden's security, relying on randomness, and more.
  • Listener Feedback #117
    E300
    Listener Feedback #117Reasons you should change your Facebook password right now, Zero Day, a new Do Not Track bill, and more.

 

  •   
  •   
  •   
  •   
  •   
  •   
  •   

Take Plex everywhere

Watch free anytime, anywhere, on almost any device.
See the full list of supported devices