SE สาธารณะ
[search 0]
เพิ่มเติม

ดาวน์โหลดแอปเลย!

show episodes
 
Family Secrets. We all have them. And while the discovery of family secrets can initially be terrifying or traumatic, often these discoveries have the power to liberate, heal, and even uplift us. Join Dani Shapiro, bestselling author of the memoir Inheritance, and her guests as they explore astonishing family secrets and uncover the extraordinary lessons the truth can teach us.
 
พอดแคสต์ที่เล่าครอบคลุมทุกประเด็นสำคัญเกี่ยวกับการทำธุรกิจ และการพัฒนาตนเองของคนเป็นผู้นำ พร้อมถอดรหัสความสำเร็จในตอนท้ายทุกเอพิโสด เพื่อให้ผู้ฟังนำสูตรลับไปปรับใช้ต่อได้จริง
 
セキュリティアーキテクト・エンジニアであるken5(@ken5scal)が1人で、時にはゲストを招き、セキュリティネタをまったりと話すテック系Podcastです。通勤通学や作業のお供にお楽しみください。 ハッシュタグ:#secure旅団, おたより・アンケート:https://forms.gle/4hJNHn6ZfW5CAza9A
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over five million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
Secular Sexuality is a weekly call-in show live from Austin, Texas every Thursday at 7pm CT. Call us at 1-512-686-0279. We talk about sex from a secular perspective. Sex and sexuality are natural to all living creatures but religion takes this and twists it into something awful and to be ashamed of. Acceptance, education, and fun is what we strive for. We lay the intersection of sex and religion (and occasionally ourselves) bare, openly and honestly. We discuss a wide range of topics each we ...
 
Loading …
show series
 
Puedes descargar la transcripción completa de este podcast en la web de la Escuela de Español Quince TC: www.quincetc.es info@quincetc.es Youtube: https://www.youtube.com/channel/UCcVZzHyQJs7kg8OmlvzT3Wg Contacto: sehablaespanolpodcast@gmail.com Donaciones: https://paypal.me/sehablaespanol Facebook: www.facebook.com/sehablaespanolpodcast…
 
En el primer episodio de la novena sesión nuestros héroes Casielle “Cas” Vircan, Damash "The Desert Walker", Droplet, Johann, Iago Patchers y Basicus se preparan para la gran batalla buscando objetos que le costaran la fe y/o les dificultara el camino. Apoya nuestro contenido uniéndote a nuestro Patreon, visita www.patreon.com/culturasecuencial y d…
 
Nesse episódio, Bruno Carvalho, Edu Aurrai, Felipe Mesquita e Rodrigo Cunha falaram sobre o acordo entre SONY e Netflix, remasterização de Final Fantasy VII: Advent Children, remake de Alex KIdd, Super Mario Bros de 3,5 Milhões de reais, e muito mais.Duração: 124 minComentados:Vídeos:RELOADING AGORA ESTÁ NO PICPAY!E TAMBÉM NO SPOTIFY!Envie seus e-m…
 
Notes du podcast: https://sesentirbien.coach/podcast/183/S'inscrire à "LA communauté": https://sesentirbien.coach/communaute/Instagram (pour découvrir le projet 8 mars): https://www.instagram.com/esthertaillifet/Le shop (pour acheter les illu'):http://sesentirbien.coach/shopYoutube ma chaine historique: https://www.youtube.com/channel/UCBPuQFYds2pF…
 
Use o cupom "NSI10" e garanta 10% de desconto: www.estampei.com.br/nsicastUse o cupom "NSI" e garanta 5% de desconto em qualquer produto www.dantecapelli.com.br/Canal do podcast no youtube: www.youtube.com/channel/UCfC5HGijcmq3Y8Ibf5mmwYQMeu instagram: www.instagram.com/ninguemseimportapodcast/โดย Ninguém se importa podcast
 
In this week’s episode, co-hosts Steve Vladeck and Bobby Chesney discuss and debate: The proposed Domestic Terrorism Prevention Act (and DOJ’s January 2021 response to an earlier version of the DTPA) A pair of recent federal prosecutions involving attempt/conspiracy to provide material support to the Islamic State–and corresponding lessons about th…
 
Example of Cleartext Cobalt Strike Traffic https://isc.sans.edu/forums/diary/Example+of+Cleartext+Cobalt+Strike+Traffic+Thanks+Brad/27300/ ASA 5506 Series Security Appliances Field Notice https://www.cisco.com/c/en/us/support/docs/field-notices/720/fn72019.html Expired Certificate for PulseSecure VPN Devices https://kb.pulsesecure.net/articles/Puls…
 
This week another social media platform had a large amount of user data offered online. LinkedIn had 500 million users' information put up for sale. However, this data was not gathered through a breach but through scraping. This episode talks about the difference. Be aware, be safe. Check your email: https://cybernews.com/personal-data-leak-check/ …
 
In case you’re meeting us for the first time, we’re Invicti, the company behind Netsparker and Acunetix. Today, we are thrilled to announce some exciting changes to our visual identity that you will see rolling out over the next few weeks. We’ve made these changes... Read more The post Hello from Invicti Security: A New Identity for Our Family of P…
 
In this episode of the Social-Engineer podcast, Chris Hadnagy and Maxie Reynolds are joined by Dr. Ida Ngambeki, an Assistant Professor of Computer and Information Technology at Purdue University. Listen in as they discuss importance of empathy and the best ways to teach social engineering. April 12, 2021 Download Ep. 143- Empathetic Hugs with Ida …
 
Time to do a security test of Active Directory. Going to be using Bloodhound, Plumhound, mimikats and Ping Kastle. Never used them before. First time for everything. LINKS 1. Bloodhound 2. Plumhound 3. Mimikatz 4. PingCastle 5. BadBlood FIND US ON 1. Facebook 2. Twitter - DamienHullโดย SECTION 9
 
No Python Interpreter? This Simple RAT Installs Its Own Copy https://isc.sans.edu/forums/diary/No+Python+Interpreter+This+Simple+RAT+Installs+Its+Own+Copy/27292/ Facebook Mistakingly Suggests Adding Domains To Public Suffix List will Ease Tracking https://publicsuffix.org https://www.facebook.com/business/help/331612538028890?id=428636648170202 Fac…
 
Josh and Kurt talk to Emil Wåreus from Debricked about the future of security scanners. Debricked is doing some incredibly cool things to avoid relying on humans for vulnerability identification and cataloging. Learn what the future of security scanning is going to look like. Show Notes Debricked Emil's Linkedin…
 
今回も @ozuma5119 さんをゲストにお招きし、クレジットカードについて教えてもらっています。 感想はtwitterでハッシュタグ「#secure旅団 」やGoogle Formにいただけると嬉しいです。 内容 クレジットカード不正利用被害 https://www.j-credit.or.jp/download/news20210331b1.pdf クレカの物理的なしくみ クレカ利用時の3Dセキュアなどのオプション指定 クレカ不正利用手法の繊維 クレカIssuerごとにことなる認証手法や認証挙動 クレカ情報狙いのフィッシングサイト傾向とその目的 クレカの有効性確認 クレカ利用者の心理 なんでPINナンバーまだ印字してんの? 他 主宰: ken5(@ken5scal) ゲスト: 名無しさ…
 
การล้มลุกคลุกคลานในโลกธรุกิจเป็นเรื่องปกติ สิ่งที่สำคัญที่สุดจึงเป็นการถอดบทเรียนจากความผิดพลาดในอดีต และตั้งรับต่อทุกอุปสรรค 00:00 รับมืออนาคตด้วยทักษะแห่งความล้มเหลว เมื่อความรู้มีอายุขัยสั้นลง 44:40 ทำไมผู้บริหารมือใหม่ส่วนใหญ่มักล้มเหลว 1:19:05 หมู ณัฐวุฒิ ดีลกับความล้มเหลวอย่างไร ให้ Ookbee กลับมาทำเงินร้อยล้าน…
 
En nuestro Ep. 151, Vanesthy, Gabriel, Chizo y El Watcher hablan sobre las últimas Películas, Series de Televisión y Trailers que han visto en "Wachin' con Wacho", cubren los segmentos "Blu-Chiz" y "Awards Spotlight" y conversan sobre la película "Godzilla vs Kong" (2021). Apoya nuestro contenido uniéndote a nuestro Patreon, visita www.patreon.com/…
 
No 12º Leituras, “O Judeu negociante de sucatas”.Trata-se do capítulo 20 do livro Vivendo acima da média, de William Macdonald. Neste livro de Macdonald, cada capítulo é uma história real de um cristão da modernidade ou da contemporaneidade — um cristão dos nossos tempos.Vivendo acima da média tem como subtítulo: “Demonstrações heróicas de semelhan…
 
This week's tools, tips, and tricks talk about a new feature on HaveIBeenPwned.com. You can now search for your phone number. This episode talks about why this was added and why you should go search right now to see if you are a victim. Source - https://haveibeenpwned.com/ Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast wit…
 
durée : 00:36:02 - Secrets d’info - par : Jacques Monin - La technique de découpe de l'ADN CRISPR-Cas9, couronnée du prix Nobel en 2020, suscite d’immenses espoirs de traitement des maladies génétiques. Mais cette technologie pourrait constituer une arme redoutable entre de mauvaises mains.โดย Jacques Monin
 
durée : 00:08:16 - L'interview - La France a-t-elle fermé les yeux sur une potentielle affaire de corruption concernant la vente de Rafale à l'Inde ? Dans une série d'articles publiés sur Mediapart, le journaliste Yann Philippin estime que certains éléments auraient mérité des vérifications.โดย France Inter
 
This week in the Security News, Polish blogger sued after revealing security issue in encrypted messenger, The Facebook dump and Have I Been Pwned, LinkedIn and more_eggs, APTs targeting Fortinet, SAP Applications Are Under Active Attack again, Is your dishwasher trying to kill you?, Ubiquiti All But Confirms Breach Response Iniquity, Cyber Threat …
 
This was the first world tour of First Sunday of Every Month secular AA speaker meeting, on Zoom January 3, 2021 with Kim from Eugene OR and Declan from Dublin IE. Included is a little informal pre and post-meeting chit-chat. The plan is to visit a new city/town every month and bring a local flavor of atheist/agnostic AA to the world. February we’l…
 
จากการแพร่ระบาดของโควิด-19 ระลอกใหม่ รุนแรงมากหรือน้อยกว่าสองครั้งแรกอย่างไร ธนาคารแห่งประเทศไทยประเมินผลกระทบต่อเศรษฐกิจไทยไว้อย่างไร ความน่าจะเป็นและผลลัพธ์ที่จะตามมาของ 3 กรณี: กรณีฐาน กรณีเลวร้าย กรณีเลวร้ายที่สุด เป็นอย่างไร เคน นครินทร์ สรุปภาพรวมผลกระทบโควิด-19 ระลอก 3 ในมิติของการคาดการณ์ GDP การเปิดประเทศ การกระจายวัคซีน และมาตรการภาครัฐ…
 
This week, Lennart Koopmann, the CTO of Graylog, Inc, joins us for an interview to talk about Nzyme, a Free and Open WiFi Defense System. Then, Dutch Schwartz, Principal Security Specialist at Amazon Web Services, joins us for a discussion on the Lessons Learned When Migrating from On Prem to Cloud! In the Security News, Polish blogger sued after r…
 
Less than 15% of enterprise customers are primarily cloud native. With so many companies still in early stages of cloud migration, what are the key lessons learned from early adopters as well as digitally native companies? What are common mistakes and how can one avoid them? Visit https://www.securityweekly.com/psw for all the latest episodes! Show…
 
This podcast includes a discussion with Terry Cutler of Cyology Labs on the giveaway to crooks of information on over 500 million Facebook users, the latest LinkedIn scam and a report on security problems when organizations take to the cloudโดย ITWC
 
This week, Elon visits an audio-only virtual bar, Ubiquity denies, Accellion, ToadSuck.gov, and more, plus show wrap-ups! Show Notes: https://securityweekly.com/swn114 Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secwe…
 
This week Jason joins me to discuss hashes and how they apply to privacy, security, and OSINT, plus a quick chat about the latest Facebook data dump.Direct support for this podcast comes from sales of my books and the online video training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorsements, Pa…
 
This morning's podcast reports on ransomware being used to exploit a hole in Fortinet VPNs, the theft of credentials to streaming services from browsers and data on students stored improperly in the cloudโดย ITWC
 
Nzyme is a new kind of WiFi IDS (WIDS) that detects adversaries by looking at hard to spoof characteristics of an attacker. Existing WIDS tend to look at extremely easy to spoof metadata like channels or BSSIDs. The new approach of nzyme looks at hardware fingerprints and physical attributes like signal strengths. For example, it constantly tries t…
 
This week, In the first segment, Ryan Noon from Material Security join us for a discussion on Zero Trust! Next up, John Loucaides joins for an interview on firmware attacks, and what enterprises need to do! In the Enterprise Security News:Cyble raises $4M, ThreatQuotient raises $22.5M, OneTrust acquires Convercent, Digital Shadows announces new thr…
 
During the Cold War, cultural diplomacy was one way that the governments of the United States and the Soviet Union tried to cultivate goodwill towards their countries. As Anne Searcy explains in her book, Ballet in the Cold War: A Soviet-American Exchange (Oxford University Press, 2020), dance was part of this effort. She focuses on two tours of th…
 
The latest edition of the ISMG Security Report features an analysis of why transparent communication in the aftermath of a data breach pays off. Also featured: Mastercard on digital identity issues; building a more diverse and inclusive cybersecurity workforce.โดย BankInfoSecurity.com
 
Andy Purdy, the chief security officer for Huawei Technologies USA who formerly worked on the White House staff and in the Department of Homeland Security, discusses cybersecurity best practices.โดย BankInfoSecurity.com
 
In our ongoing quest to explore the spectrums of life and trick people into googling the phrase ‘bimodal distribution’ we return again this week to the spaces between. Author Dianna Anderson, enby writer of Damaged Goods: New Perspectives on Christian Purity and Problematic: How Toxic Callout Culture Is Destroying Feminism joins Rudy Bee and Christ…
 
Simple Powershell Ransomware Creating a 7Z Archive of your Files https://isc.sans.edu/forums/diary/Simple+Powershell+Ransomware+Creating+a+7Z+Archive+of+your+Files/27286/ HTML Lego: Hidden Phishing at Free JavaScript Site https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/html-lego-hidden-phishing-at-free-javascript-site/ Royal FLush: …
 
We are pleased to announce ... THE KING HATH RETURNED. Steve Gerben joins the cast after some time in solitude for a good old time with the D.A.W.G.Z. What a glorious return indeed. Support the D.A.W.G.Z. @ https://www.patreon.com/MSsecretpod
 
รวม 4 ตอนจากพอดแคสต์ The Secret Sauce ที่จะช่วยเปิดโลก Crypto และ Blockchain แบบลึก ครบ จบในที่เดียว 00:00 Blockchain คืออะไร Cryptocurrency จะมาจริงไหม เข้าใจที่เดียวจบ 59:08 Band Protocol สตาร์ทอัพคริปโตฯ 5 หมื่นล้าน ฝีมือคนไทยอายุ 28 ปี 2:26:39 Blockchain กับปรัชญาการเมือง เมื่อ Crypto ปฏิวัติทุนนิยม! 2:57:04 DeFi ปฏิวัติธนาคาร? Yield Farming ทำ…
 
When you want to stake your claim on the internet, you need your own web site and email address. Dom Bettinelli, Pat Scott, and Fr. Andrew Kinstetter discuss some options for choosing, what to look for, and some providers they've had experience with. The post Choosing Web Hosting, Domain Registrar, and Email Server appeared first on SQPN.com.…
 
Loading …

คู่มืออ้างอิงด่วน

Google login Twitter login Classic login