Bside publiczne
[search 0]
Więcej
Download the App!
show episodes
 
Artwork
 
Get ready to experience a Bible study like never before with Pastor b.Side! This one-of-a-kind deep dive into the Bible will focus on God’s amazing characteristics, purposes, and promises. You won’t want to miss out on inspiring conversations as people share their testimonies as they relate to scripture, proving that God is real and true. This podcast is sure to cultivate hope, nourish your soul, and ignite purpose in your life!
  continue reading
 
Artwork

1
Satellite Sisters on BSide Radio

All female music producers and djs

Unsubscribe
Unsubscribe
Miesięcznie
 
Satellite Sisters Radio Show on BSide Radio. This show presents and promotes bassmusic tracks produced by Sisters & showcases one sister's DJ set in every episode! #rap #hiphop #techno #electronicmusic #house #drum&bass #bassmusic #bass #female #women #musicproducers #femaledjs
  continue reading
 
Artwork

1
Bad Guys & B-Sides

Bad Guys & B-Sides

Unsubscribe
Unsubscribe
Miesięcznie
 
When six friends share their love for Dungeons & Dragons and Music, what happens? You get a music inspired D&D podcast that follows a small town rock band's cross country tour while the magic of music wafts over the world! BGBS is about found family and finding fame, with a little Scooby-Doo and Buffy mixed in. Check us out at badguysbsides.com
  continue reading
 
Welcome to The B-Side, a podcast for The Film Stage! Here we talk about movie stars and directors. Not the movies that made them famous, or kept them famous, but the ones they made in between. From box office fiascos, to interesting curios, and hidden gems, we examine the also-rans of Hollywood and beyond.
  continue reading
 
Artwork

1
awks

H & B Productions

Unsubscribe
Unsubscribe
Miesięcznie
 
Welcome to awks, the podcast for people trying to figure out this adulting thing... one awkward moment at a time. Join lifelong friends Hannah and Bianca as they discuss all the things you swear no one warned you about before you entered the "real world." Full of stories and perspectives that will bring a smile to your lips, a nod to your head, and a bright spot to your day. _ Music by: Ci Major Support this podcast: https://podcasters.spotify.com/pod/show/awks/support
  continue reading
 
Artwork

1
Slingshots & Swords Podcast

Proper Knowledge Ministry

Unsubscribe
Unsubscribe
Miesięcznie
 
No subject is off limits – anger, sex, money, anxiety, marriage, and success. These guys are covering the personal issues, and current events that many ministries and churches won’t touch. Hosted by Pastor James ‘Havcutz’ Wright and Pastor b.Side, this podcast examines the nuances of spiritual warfare to help Godly men see the world as God does, and get equipped to respond Biblically with the spiritual weapons God provides. Candidly discussing the real-life battle grounds for Christian men, ...
  continue reading
 
Artwork

1
The Banter Blender

Ben Mandelker

Unsubscribe
Unsubscribe
Codziennie+
 
A weekly audio podcast where Ben Mandelker (bsideblog.com) banters about TV, food, pop culture, Los Angeles, and whatever else is on his mind. It will be the best time you will ever spend listening to a podcast EVER.
  continue reading
 
Artwork

1
Paul's Security Weekly (Video)

Security Weekly Productions

Unsubscribe
Unsubscribe
Co tydzień+
 
If you're looking for a bunch of us cybersecurity nerds to get together and talk shop, then Paul’s Security Weekly is for you. This show features interviews with folks in the cybersecurity community; technical segments, which are just that, very technical; and cybersecurity news, which is an open discussion forum for the hosts to express their opinions about the latest cybersecurity headlines, breaches, new exploits and vulnerabilities, “not” politics, “cyber” policies and more. The topics v ...
  continue reading
 
Loading …
show series
 
You may be vaguely aware of the term ‘quantum computing’ from media reports. But what you may not have picked up on is that one of the primary uses for quantum computers may be to break data encryption. Furthermore, you may not realize that if three-letter agencies can save off our encrypted emails and messages now, this could mean they could read …
  continue reading
 
Everyone wants safety, security, assurance, peace, prosperity, and blessing. God promises to give His people all those things, but there’s a catch. What’s the catch? We need to ensure we’re seeking access to those things and using the right tools God provides. What are those tools? That’s exactly what we’re talking about in this episode as we look …
  continue reading
 
Don't tell the FCC there is a new Flipper firmware release, unpatchable?, argv[0] and sneaking past defenses, protect your registries, someone solved my UART RX problem, PKFail update, legal threats against security researchers documented, EDR bypass whack-a-mole continues, emulating PIs, VScode moonlights as a spy, Want to clone a YubiKey? All you…
  continue reading
 
Lee comes on the show to discuss: EU CRA - https://en.wikipedia.org/wiki/CyberResilienceAct - its impact on bringing products to market and the challenges of enforcing such laws that require products to be "Secure" Recent legislation on disputes for federal agency fines - Chevron deference rule - supreme court decision, uncertainty, more or less cl…
  continue reading
 
Mis- and disinformation is just a fact of modern life, but certain events can cause the practice to significantly increase – like a big election. This is a good time to review this phenomenon, learning how to recognize it, how to avoid being drawn in, and perhaps most importantly how to reduce its spread. In other news: Telegram’s CEO was arrested …
  continue reading
 
Many people struggle to answer the question of what they expect from God when they pray. However, the Bible provides important information on how God will respond to our prayers. In this episode, I will share this information to help you pray confidently with assurance that God will answer. Tune in to learn more. For more information or Bible teach…
  continue reading
 
Exploring the Hacking Landscape with Mark Loveless, AKA SimpleNomad Dive into the intricate world of cybersecurity with our featured guest, Mark Loveless, widely known by his handle SimpleNomad. With a rich history in the realm of information security, Mark is a seasoned professional, researcher, and thought leader. Mark's journey spans decades, ma…
  continue reading
 
Proton released three major new products this summer, all within the span of about a couple months: Proton Docs, Proton Wallet and Proton Scribe. Given that Proton is a privacy-focused company, some of these offerings seemed almost at odds with that mission. So today I ask Andy Yen (Proton’s CEO) some questions about the privacy of their Bitcoin wa…
  continue reading
 
Did you know that God has A LOT of names in the Bible? God even calls Himself by several different titles. Which name should we call God by when we pray or ask for help? If God’s name is “THE NAME above all other names,” which one of God’s names is the best? The truth is, it’s not about which name we use to call out to God. The bigger issue is, do …
  continue reading
 
The headlines have been on fire with stories about 3 billion people’s data being leaked from a company you’ve never heard of. But like many such stories, the mainstream media gets a lot of the important details wrong and glosses over a lot of the important nuances. Today we’re going to dive into what really happened and what you should do about it,…
  continue reading
 
This week: YAVD: Yet Another Vulnerable Driver, why bring your own when one already exists, backdoors in MIFARE Classic, wireless hacking tips, AMD sinkclose vulnerability will keep running, you down with SLDP yea you know me, Phrack!, IoTGoats, Pixel vulnerabilities, leaking variables, a DEF CON talk that was not cancelled, Telnet is still a thing…
  continue reading
 
Every week here on the show we talk about vulnerabilities and exploits. Typically we recommend that organizations remediate these vulnerabilities in some way. But how? And more importantly, which ones? Some tools we have to help us are actually not all that helpful at time, such as: Mitre Att&ck - Don't get me wrong, this is a great project and Ada…
  continue reading
 
Finding your soul mate or even just a one-night stand can all be done digitally now – there’s an app for that. Several, in fact. But in order to find the best match, you need to turn over a lot of extremely personal information. You probably also need to let the app track your location, so you’re only matching people within some acceptable distance…
  continue reading
 
This week: Option ROMS are a novel way to compromise a system at the lowest level, Sinkclose opens AMD processors up to attacks, at home in your firmware exploiting SMM complete with examples, Sonos speakers get hacked and enable attackers to listen in on your conversations, DEF CON badges use new chips and are not without controversy, lasers that …
  continue reading
 
Early on in his career Spaf was working with microcode and continued to work on technical projects. As time went on he realized that focusing on the non-technical work, such as policies and shaping our thinking, would help move the needle. Borrowing concepts from his book on the subject, we will delve into some cybersecurity myths such as: Are user…
  continue reading
 
The power of God: It’s something we all want and it’s something we all need. What does God’s power look like when we receive it though? The Bible promises that with Jesus, we can do “all things.” How does that practically and functionally show up in life? The answers to those questions are in the portion of scripture we’re studying today. In this e…
  continue reading
 
It’s time once again for cybersecurity professionals to make the pilgrimage to the scorching desert of Las Vegas, Nevada for a week of tech conferences that we lovingly refer to as Hacker Summer Camp. Today I’ll bring you my on-the-ground reporting from BSides and DEF CON. I’ll also bring you part 2 of my series on Open Source Intelligence (OSINT) …
  continue reading
 
How do we develop and improve our relationship with God? Believe it or not, the Bible answers that question. In this episode of Getting To Know God – Thru The Psalms, we’re looking at Psalm 19:7-9 to understand how the Bible practically connects us to the Creator of all things. If you’ve ever felt like God is distant from you, or you’re in a rut wi…
  continue reading
 
This week, Downgrade attacks, bootloader fun, check your firmware before you wreck your firmware, you've got mail server issues, Ivanti is the new Rhianna, you should update your BIOS, Openwrt dominates, and attacking the security tools for fun and profit! Show Notes: https://securityweekly.com/psw-838…
  continue reading
 
Jack Daniel is a storyteller, wanderer, comic, bartender, blacksmith, luthier, historian, mechanic, and the world’s oldest millennial. He is also one of the founders of Security BSides. Jack has a colorful and interesting history, and today we’ll learn about how and why he started BSides, delve into a little hacker conference history, talk about mo…
  continue reading
 
Hacking traffic lights (for real this time), the Docker API strikes again, access Github deleted data, using EDR to elevate privileges on Windows, computers I need in my life, failed experiments and Raspberry PI access points, sitting ducks and TuDoor - its always DNS times 2, null sessions and a blast from the past, chaining UEFI vulnerabilities, …
  continue reading
 
John is one of the foremost experts in UEFI and joins us to talk about PK Fail! What happens when a vendor in the supply chain accidentally loses a key? It's one of the things that keeps me up at night. Well, now my nightmare scenario has come true as a key has been leaked. Learn how and why and what you can do about it in this segment! Show Notes:…
  continue reading
 
History shows that, for thousands of years, millions of men and women have been willing to give their lives, sometimes even to the point of violent death, because of the things written in the Bible. Some of those testimonies are written in the Bible. Why would someone ever do that? In this episode of Getting To Know God – Thru The Psalms, we’re loo…
  continue reading
 
Last week, we all learned about a company called CrowdStrike that apparently has the capability to single-handedly bring multiple airlines, hospitals and other large companies to their knees in an instant. There are many lessons we should be learning from this incident, though I’m not going to hold my breath. I’ll tell you what happened and what I …
  continue reading
 
Segment description coming soon!The Crowdstrike incident: what happened and what we can do better, people forget what 0-Day really means, shutting off the heat in January, honeypot evasion and non-functional exploits, what not to use to read eMMC, what if we don't patch DoS related vulnerabilities, a CVSS 10 deserves its own category, port shadow a…
  continue reading
 
Doug and the Security Weekly crew talk about vulnerabilities, are we patching the right things? This is the burning question. We will try to answer it. Segment Resources: https://blog.sonicwall.com/en-us/2024/04/patch-tuesday-which-vulnerabilities-really-need-prioritizing/ Show Notes: https://securityweekly.com/psw-836…
  continue reading
 
Welcome to The B-Side, from The Film Stage. Here we talk about movie stars! Not the movies that made them famous or kept them famous, but the ones that they made in between.Today we return to discuss a living legend with a big, new, ambitious project. Perhaps his most ambitious project yet! Our subject is Kevin Costner, the great American filmmaker…
  continue reading
 
If someone decided to dig into your life – perhaps even try to ‘dox’ you – how might they go about doing that? What could they find about you right now on the internet? You might be surprised at how much information is readily available from public sources, including your local government agencies and state databases. Today I’ll be talking with Jas…
  continue reading
 
Find new flaws in UEFI using STASE, combining vulnerabilities to exploit Sonicwall Devices, remote BMC exploits, Netgear patches, and not a lot of information, 22 minutes before exploited, if the secrets were lost, we'd all be in screwed, Exim has not been replaced by something better and its vulnerable, CISA's red team reports, and attackers use d…
  continue reading
 
Thinking about getting a 3D printer or have one and need a good primer? Check out this segment, we live 3D print a Captain Crunch whistle and talk all about 3D printing for hackers! Segment Resources: Slides used in this segment: https://files.scmagazine.com/wp-content/uploads/2024/07/3D-Printing-for-Hackers.pdf Major 3D Printer Websites: https://v…
  continue reading
 
Ads on the web are beyond annoying – they are actually a threat to your privacy and sometimes even your security. Ads pay for a lot of the “free” web content we consume, but until ad networks stop tracking us and selling ad space to phishing and malware groups, we need tools to block them. Today I’ll give you two solid options for doing so. In the …
  continue reading
 
Bats in your headset, Windows Wifi driver vulnerabilities, Logitech's dongles, lighthttpd is heavy with vulnerabilities, node-ip's not vulnerability, New Intel CPU non-attacks, Blast Radius, Flipper Zero alternatives, will OpenSSH be exploited, emergency Juniper patches, and the D-Link botnet grows. Show Notes: https://securityweekly.com/psw-834…
  continue reading
 
Welcome to The B-Side, from The Film Stage. Here we talk about movie stars! Not the movies that made them famous or kept them famous, but the ones that they made in between.Today we talk about the best Chris - Chris Pine of course! Our B-Sides include Small Town Saturday Night, People Like Us, The Finest Hours, Outlaw King, All The Old Knives, and …
  continue reading
 
Iceman comes on the show to talk about RFID and NFC hacking including the tools, techniques, and hardware. We'll also talk about the ethics behind the disclosure of vulnerabilities and weaknesses in these systems that are used in everything from building access to cars. Segment Resources: Youtube channel - https://www.youtube.com/@iceman1001 Proxma…
  continue reading
 
When you look up into the sky on a clear night, what do you see? What do you think about? The universe is SO big, and in context, we’re so tiny. Why did God put us here like this? What is God trying to say? The answer to that question is clearly laid out in Psalm 19:1-6. On this episode of Getting To Know God – Thru The Psalms, we’re exploring the …
  continue reading
 
We're generating a ridiculous amount of data every day. Much of it is highly personal and that's dangerous. But there are actually several Privacy Enhancing Technologies that may allow us to use this personal data to improve our collective quality of life without ruining the privacy of the data subjects. I'll be discussing these PETs with Irene Kna…
  continue reading
 
Loading …

Skrócona instrukcja obsługi