Travel Hacker สาธารณะ
[search 0]
ดาวน์โหลดแอปเลย!
show episodes
 
Artwork

1
Travel Chat with Ashley & Emily

Ashley Peterson and Emily Cooper

Unsubscribe
Unsubscribe
รายเดือน+
 
Ever wondered what really goes on when solo traveling the world? Join Emily from Emily Eats and Explores and Ashley from Ashley gets Around weekly as they air out their crazy travel stories, share travel tips, and just chat about travel! Emily Cooper is a full-time traveler and the creator behind Emily Eats and Explores. In 2022, Emily quit her job in healthcare to travel the world solo and create content. Now, she teaches women how they can make money while they travel the world! Ashley Pet ...
  continue reading
 
Artwork

1
Richie Firth: Travel Hacker

Richie Firth: Travel Hacker

Unsubscribe
Unsubscribe
รายเดือน
 
Richie Firth is a broadcaster and professional idiot. He has spent years telling millions of people about his travel solutions, but just how good are they? He is joined by friend and producer of The Bugle Chris Skinner to embark on a series of missions involving cars, trains, planes, boats and more. Expect laughs, adventure, and tannoy announcements. Help the show to continue to rewrite history via Patreon: http://patreon.com/TravelHacker A Bugle Podcasts Production. Hosted on Acast. See aca ...
  continue reading
 
Artwork

1
All the Hacks with Chris Hutchins

Chris Hutchins

Unsubscribe
Unsubscribe
รายสัปดาห์
 
Learn all the hacks to upgrade your life, money and travel – all while spending less and saving more. Host Chris Hutchins is a life hacker who has saved millions by breaking down every aspect of life, looking to maximize happiness at the lowest cost. Chris and guests like Tim Ferriss, Tony Hawk, Codie Sanchez and Gary Vaynerchuk will help you learn the strategies and tactics they used to shape their success.
  continue reading
 
Artwork

1
Nomad Tactics Podcast

B and Jack

Unsubscribe
Unsubscribe
รายเดือน
 
Nomad Tactics is a weekly podcast co-hosted by two veteran nomads. The episodes focus on providing practical how-to tips, and hacks. Best of all the hosts try to combine all tricks they discuss into a wider system that aims to optimize your nomadic life in every possible way. On an occasional basis, there are interviews with a variety of top-notch digital nomads, perpetual travelers, expats, location independent workers, remote workers, and travel hackers.
  continue reading
 
Artwork

1
Traveling on Purpose

Damondrick Jack

Unsubscribe
Unsubscribe
รายสัปดาห์
 
Welcome to the Traveling on Purpose Podcast. My name is DJ Jack. Join me as we explore the transformative stories of individuals who have harnessed the power of travel to elevate their lives and inspire others.
  continue reading
 
Artwork

1
Stolen Time

Unsubscribe
Unsubscribe
รายเดือน
 
Book 2 of the Borrowed Time Chronology Ness Relevant has traveled through time before. Now he must once again use his time machine to confront a determined foe. Only this time his personal stakes are even higher. Threatened by his future, he must find a way to save his wife and thwart a mad-man's schemes for world conquest, or he'll never regain his stolen time.
  continue reading
 
Artwork

1
Bee Cyber Fit: Simplifying Cybersecurity for Everyone

Wendy Battles/James Tucciarone

Unsubscribe
Unsubscribe
รายเดือน
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Artwork

1
The Durmcast

JOE Houde

Unsubscribe
Unsubscribe
รายเดือน
 
A series of interviews with business owners, restauranteurs, non-profit founders, community leaders and historic figures from Durham, North Carolina. A celebration of the city and an exploration of how people got here and why they stay.
  continue reading
 
Artwork

1
e-travels with e. trules

Eric Trules

Unsubscribe
Unsubscribe
รายเดือน
 
Do you like to travel? Do you like to listen to travel tales from well off the beaten path? "e-travels with e.trules" is a new, personal, idiosyncratic, and literary podcast created by Eric Trules. A longtime Huffington Post blogger and theater Professor at USC in Los Angeles, Trules has traveled our beautiful and problematic planet for decades, staying in Bedouin huts on the Red Sea, riding the rails to "Nose of the Devil" in Southern Ecuador, and meeting his future Indonesian wife on the m ...
  continue reading
 
Artwork

1
The Back to Jerusalem Podcast

Back To Jerusalem

Unsubscribe
Unsubscribe
รายสัปดาห์
 
Many mistake the idea of Back to Jerusalem as a movement of the Chinese church to evangelize Jerusalem. However, Back to Jerusalem is the goal of the Chinese church to evangelize the unreached peoples from eastern provinces of China, westwards towards Jerusalem. Our organization partners with the church of China to not only evangelize the religiously oppressed areas of Asia, but to also train and send Chinese missionaries into the unreached regions of the globe. This podcast is a publication ...
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

Unsubscribe
Unsubscribe
รายวัน
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Discover the latest news and trends in cybersecurity and fraud prevention in the Kount 5 Trends, 5 Minutes: Cyber & Fraud podcast. Each week host Lacey Briggs will bring you the top five headlines with insights from industry experts on how to protect your business from eCommerce fraud, payments fraud, bots, account takeover and more. Join us every Thursday.
  continue reading
 
Artwork

1
Armand Ptolemy and the Golden Aleph

Mark Jeffrey

Unsubscribe
Unsubscribe
รายเดือน
 
Synchronicity machines. Difference engines melded with the iChing. Geomancy: the art of making stone float with sound. The hacker collective 'Anonymous'. Secret societies … This is the world of ARMAND PTOLEMY, a new action-adventure hero. Facing an enemy armed with the Golden Aleph -- a mystical device that allows its wielder to see holographically into every point in time and space, Ptolemy must use every trick of his Oxford-educated mind and circus-trained body to succeed. But how do you f ...
  continue reading
 
Loading …
show series
 
Secure by design is more than just AppSec - it addresses how the whole business designs systems and processes to be effective and resilient. The latest report from LevelBlue on Cyber Resilience reveals security programs that are reactive, ill-equipped, and disconnected from IT and business leaders. Most security problems are out of security teams' …
  continue reading
 
New security and vulnerability research is published every day. How can security teams get ahead of the curve and build architecture to combat modern threats and threat actors? Tune-in to a lively discussion about the threat landscape and tips on how to stay ahead of the curve. Segment Resources: https://blog.qualys.com/vulnerabilities-threat-resea…
  continue reading
 
#197: Together with Kevin Rose, we'll dive into points and miles strategies, credit card optimization, travel tips, and career growth. Specifically, we'll cover everything from underrated credit card tricks, tactics for earning multiple welcome bonuses, navigating the complexities of family travel, staying updated on the best deals, our favorite po…
  continue reading
 
Looking at vulnerable code in Ivanti (Perl) and Magento (PHP), fuzzing is perfect for parsers, handling tenant isolation when training LLMs, Microsoft's small steps towards secure design, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-303…
  continue reading
 
AI Stego, uBlock, PPTP, Log4J rises again, Command Jacking, Windows 10, Principal Skinner's Feet, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-422
  continue reading
 
In today’s uncertain macroeconomic environment, security and risk leaders need practical guidance on managing existing spending and new budgetary requests. Jeff Pollard, Vice-President, Principal Analyst on the Security and Risk Team at Forrester Research, joins Business Security Weekly to review Forrester's Budget Planning Guide 2025: Security And…
  continue reading
 
This week on Travel Chat, Ashley and Emily dive into the third episode of their Travel Creator Series. Last week, they explored making money through brand partnerships. This time, they focus on products and services—covering everything from digital offerings like guides and courses to services such as group trips and one-on-one consultations. Thoug…
  continue reading
 
Cybercab, Golden Jackal, Mamba 2FA, Multi Microsoft, iPhone thieves, esims, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-421
  continue reading
 
For this interview, Ben from CyberNest joins us to talk about one of my favorite subjects: information sharing in infosec. There are so many amazing skills, tips, techniques, and intel that security professionals have to share. Sadly, a natural corporate reluctance to share information viewed as privileged and private has historically had a chillin…
  continue reading
 
In this episode, Rabbi Myles Weiss joins Eugene to discuss the state of Iran, connecting the physical war in the Middle East to the ongoing supernatural battle. They delve into the history of Iran and how God is moving within its underground church.
  continue reading
 
"Code of Honor: Embracing Ethics in Cybersecurity" by Ed Skoudis is a book that explores the ethical challenges faced by cybersecurity professionals in today's digital landscape. The book delves into the complex moral dilemmas that arise in the field of cybersecurity, offering guidance on how to navigate these issues while maintaining integrity. Th…
  continue reading
 
In this episode, Pastor Chris joins Eugene to discuss his new book *Hate Evil*. They explore the idea that love and hate must work together to combat the growing evil in the world. Pastor Chris shares his personal challenges and argues that failing to express righteous anger weakens the fight against darkness.…
  continue reading
 
#196: In this deep dive on metabolic health, Dr. Casey Means shares insights on how changes to your food, exercise, sleep, and more can improve your metabolic health. She also shares her recommendations on essential biomarkers to monitor your health and the role of functional medicine in personalized healthcare. Casey Means, MD, is a Stanford-train…
  continue reading
 
Zed Attack Proxy has been a crucial web app testing tool for decades. It's also had a struggle throughout 2024 to obtain funding that would enable the tool to add more features while remaining true to its open source history. Simon Bennetts, founder of ZAP, and Ori Bendet from Checkmarx update us on that journey, share some exploration of LLM fuzzi…
  continue reading
 
AI Fest, American Water, Broadband, Claroty, Okta, Meta, Phishing, Robocop, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-420
  continue reading
 
Does the CISO need to act like a politician? Negotiating budgets, communicating risks, and selling your strategy across the organization does sound a little like a politician. And if that's the case, are you hiring the right campaign staff? Kush Sharma, former CISO for CPR, City of Toronto, and Saputo, joins Business Security Weekly to discuss why …
  continue reading
 
In this week’s episode of Travel Chat with Ashley and Emily, they continue their inspiring story of transitioning from traditional day jobs to thriving content entrepreneurs. Last week, they explored the challenges of making that leap, and this week, they dive into the exciting topic of monetizing their followings. Emily takes the lead to discuss v…
  continue reading
 
Eugene has been living in China for over 25 years and just did something he's never done before... he entered China without a visa. On this episode, he breaks down how he did it and explains why the travel restrictions into China are the least stringent in decades.
  continue reading
 
Perfctl, Warm Cookie, Pig Butchering, Ivanti, Zimbra, BabyLockerKZ, AI gone Wild, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-419
  continue reading
 
Our latest in a series of interviews discussing cybersecurity career paths, today we talk to Jayson Grace his path into cybersecurity and his experience building red teams at national labs and purple teams at Meta. We also talk about his community impact, giving talks and building open source tools. Jayson just left Meta for an AI safety startup na…
  continue reading
 
This episode of Paul Security Weekly features John Hammond, a senior security researcher from Huntress, discussing malware analysis. Hammond dives into the analysis of Ocean Lotus attacks, highlighting the use of stealthy techniques like alternate data streams and DLL side-loading. The conversation also touches on the challenges of combating attack…
  continue reading
 
More remote car control via web interfaces, an RCE in CUPS, Microsoft reduces attack surface, migrating to memory safety, dealing with dependency confusion, getting rid of password strength calculators, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-301…
  continue reading
 
#195: Learn 50+ tactics to earn points and miles without spending extra money. From shopping portals and card-linked offers to strategies for earning points on groceries, flights, and even rent, discover how to optimize your spending and leverage partnerships between airlines, hotels, and various services to rack up points effortlessly. Link to Ful…
  continue reading
 
Death Stars are not real or are they?, Recall, Microsoft, Brocade, AI and More and More AI, Josh Marpet, and more on the Cyber Security News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-418
  continue reading
 
Hurricane Helene Podcast Came ashore around 9 pm on September 26th. Hit the big bend area of Florida and traveled across Florida, Georgia, NW South Carolina, Western North Carolina and East/Central Tennessee Massive devastation and loss of life have occurred. Death toll has exceeded 100 and it is climbing. Whole towns have been destroyed and many l…
  continue reading
 
The zero-trust security model has been billed as an ultra-safe defense against emerging, unrecognized and well-known threats. Unlike perimeter security, it doesn't assume people inside an organization are automatically safe. Instead, it requires every user and device -- inside and out -- to be authorized before any access is granted. Sounds enticin…
  continue reading
 
Join us for an unforgettable episode of Travel Chat with Ashley and Emily! Today, our dynamic duo dives deep into their journeys as full-time travel creators who have successfully turned their passion for travel into thriving careers. You’ll hear the full story of how Ashley and Emily made the leap from their 9-to-5 jobs to pursue their dreams. Ove…
  continue reading
 
Passwords, CUPS, KIA, Gilbert Gottfried, Salt Typhoon, Rob Allen from ThreatLocker, and More on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/hackers-deploy-ai-written-malware-in-targeted-attacks/ This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more abou…
  continue reading
 
The SIEM market has undergone some significant changes this summer. This is a great opportunity to talk about the current state of SIEM! In this conversation, we'll discuss: market changes and terminology: security analytics, data lakes, SIEM what is SOAR's role in the current SIEM market? machine learning and generative AI's role strategies for im…
  continue reading
 
This week in the security news, Dr. Doug and Larry explore various technological advancements and their implications with a healthy dose of nostalgia, particularly focusing on health monitoring through Wi-Fi signals, the misconceptions surrounding 5G connectivity, the importance of understanding internet speed needs, and the cybersecurity threats f…
  continue reading
 
#194: Build wealth and achieve financial freedom with three simple, actionable steps. Personal finance expert JL Collins discusses the concept of "FU" money, the importance of living on less than you earn, the power of low-cost index fund investing, and other effective strategies to create long-term wealth. JL Collins is the author of The Simple Pa…
  continue reading
 
C3pbot, Kaspersky, Octo2 Electric Boogaloo, Honkai: Star Rail, ServiceNow, LinkedIn, IoT, Josh Marpet, and more on the Cyber Security News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-416
  continue reading
 
APIs are essential to modern application architectures, driving rapid development, seamless integration, and improved user experiences. However, their widespread use has made them prime targets for attackers, especially those deploying sophisticated bots. When these bots exploit business logic, they can cause considerable financial and reputational…
  continue reading
 
Is your cybersecurity muscle strong enough to withstand digital threats? Join us as we reveal the alarming truth that a staggering 82% of data breaches are linked to human error and explore how you can fortify your digital defenses. October is Cybersecurity Awareness Month! Discover how simple, manageable actions can make a difference and why start…
  continue reading
 
Bethany joins Eugene on the podcast to talk about the latest book from BTJ, JIHAD: The Day I Died. This compelling story takes you into the dark world of the grandson of a radical Ayatollah in Iran who gave his life to Jesus.
  continue reading
 
Join Ashley and Emily on this week’s episode of Travel Chat as they dive into Ashley's unforgettable journey to the 2024 Olympics in Paris. They reminisce about a time when attending the Olympics seemed like a dream reserved only for the rich and famous. Ashley shares her personal story, starting with the disappointment of missing the 2016 Olympics…
  continue reading
 
In the leadership and communications segment, CISA Releases Cyber Defense Alignment Plan for Federal Agencies, UnitedHealth Group CISO: We had to ‘start over’ after Change Healthcare attack, 20 Essential Strategies for Leadership Development Success, and more! AI is bringing productivity gains like we’ve never seen before -- with users, security te…
  continue reading
 
Shroombots, pagers, Tor, Raptor Train, GRU, Blue Light, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-415
  continue reading
 
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
  continue reading
 
Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS locks down the kernel?, exploding pagers, more things from the past: Adobe Flash exploits, robots get rid of your data, PKFail is still a thing, Android TV malware is back: now with conspiracy theories, DMA attacks, gamers are not nation-state attacke…
  continue reading
 
#193: Unlock better opportunities, improve your emotional and physical health, and build stronger relationships by embracing “hopeful skepticism.” Dr. Jamil Zaki shares science-backed, actionable strategies to overcome the rising tide of cynicism and shift toward a positive mindset— paving the way for a more fulfilling and successful life. Dr. Jami…
  continue reading
 
When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to understand why there was so little interest and why appsec should reconsider its approach to awareness. Dustin Lehr discusses how appsec can better engage and better deliver security concepts in a way that m…
  continue reading
 
Back to the office serfs, Void Banshee, ServiceNow, Taiwan, Dlink, C++, Aaran Leyland, and more on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-414
  continue reading
 
Cybersecurity is complex. We have threats, vulnerabilities, incidents, controls, risks, etc. But how do they all connect together to drive a cyber risk program? As an industry, we've struggled for 20+ years trying to boil this ocean. Maybe we've been going about it the wrong way. Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint,…
  continue reading
 
In this episode of Travel Chat, Ashley and Emily explore the digital nomad lifestyle and its challenges. Ashley, who was once ready to take a break from constant travel, is now reconsidering becoming a nomad again. She discusses the logistics of managing a business without a U.S. address and whether to end her lease or stay put as she juggles her b…
  continue reading
 
We talk about having a special box to store supplies in case of a blackout. From flashights, lanterns and other emergency items that are ready to grab. Special thanks to Don of Sensible Prepper and Sootch00 shows. I got this idea from watching his YouTube channel. We urge you to tune in to these channels.…
  continue reading
 
Through the Fire and Li-On Flames, Lazarus, Whatsup, Scattered Spider, Hadooken, Dead People, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-413
  continue reading
 
This week, in the enterprise security news, Cribl, Zafran, and US states raise funding Cisco, Check Point, Salesforce, and Absolute Software acquire cybersecurity startups AI Security products are picking up steam You probably shouldn’t be too worried about Yubikey cloning Instead, you should be more worried about malicious npm packages! The White …
  continue reading
 
Loading …

คู่มืออ้างอิงด่วน