Wed, 28 December 2005
Well, the final podcast of 2005 has been wrapped up. It came in just a hair under thirty five minutes, and the new hardware sounds good. I have to go back a little later and see what the raw audio sounds like on the new iRiver iFP895. It's nice to have a backup to save me if there's ever a power failure in the middle of a podcast.
Network Security Podcast, December 27, 2005 - Episode 7
Tonight's musical selection is Shades of Blue by Tony Deziel. I hope I pronounced his last name correctly. This music is Creative Commons licensed, and found on Garageband.
DHS interest into the Little Red Book was a hoax
Using Metasploit in the real-world
Congress has big plans for technology reform in 2006
Windows Metasploid data leakage
Only one E-voting company left in NC
Iowa State University hacked ... again
Possible security breach, not details yet
This was written using Performancing for Firefox
Listen until the end of the podcast. I've got some pretty big personal news, and I'll be posting more here as the details become more solid. Have a safe and sane New Years, and I'll catch you next Tuesday.
Wed, 21 December 2005
I kept tonight short because I spent most of the evening finishing the configuration of my new server. It's a second hand system, but it's still a big upgrade from the old one. Why is it that when I chose less articles to talk about, I end up talking longer about each one and use almost the same amount of time? Please let me know if you don't see the enclosures showing up for the latest podcast. I'm also encoding the podcast at a lower rate to save space, so let me know what you think.
Network Security Podcast, December 20, 2005 - Episode 6
Tonight's music by Lazy Bones by Ben Eyler, under the Creative Common license.
All Kind Food - Dennis D. McDonald
Computer forensics tool maker hacked
Top 10 System Administrator Truths
Fortune 100 sites leaking sensitive data
Lets see some ID
Sober does something good for a change
I mentioned Writely in a blog post earlier today, and agian in the podcast. Give it a try and tell me what you think about it.
Wed, 14 December 2005
I was trying a couple of different things tonight. First off, I recorded tonight's episode using Propaganda. Second, I edited the podcast. I did the editing in Audible, but I'd made a couple of flubs that were bad enough for me to decide to do the whole thing and edit out a number of my 'umm's. I like how the podcast sounds coming out of Propaganda, now I just have to get past the problem I have with distortion being introduced during the encoding.
Network Security Podcast, December 13, 2005 - Episode 5
Tonight's podsafe music by: Steven Francque - Sanctity of Tears
Two Microsoft patches released today
Portable Firefox and the PortableApps site
Tenable released Nessus 3.0
EFF is suing North Carolina
Massachusetts and the Open Document Format
Is the Cyberterror threat credible?
Hackers take down Russia Today
Sam's Club loses credit cards from the pumps
PCI Requirements: Default configurations
As always, thanks for listening, and you can send feedback to firstname.lastname@example.org. Or you can try my new voice mail address at 916-231-9479.
Mon, 12 December 2005
Welcome to the first episode of the Podcast Roundtable. Daniel Sweet, Dennis McDonald and I tackle the issue of bypassing the IT department to get your job done. The three of us offer different view on the good and the bad about those departments that take a 'We'll just do it ourselves!' attitude.
This podcast was brought about by a question put forth on the LinkedIn Bloggers group, asking if it was okay to use free outside resources to get get a job done. Basically, with the profusion of free blogging tools, online databases and wiki's, many of the tasks that have been historically provided by IT can be found online elsewhere for free. Is it acceptable to use these resources and if so, what are some of the risks?
The audio is a little rough, with some echos, which I blame on myself and my hardware. Hopefully we'll be able to make a little cleaner recording next time.
Podcast Roundtable December 10th, 2005 - Dennis McDonald, Daniel Sweet, Martin McKeay
Daniel Sweet is a Houston-based IT consultant. His site, Houston and Texas Area IT Job Seeker Listings & Career Advice, is aimed at helping IT professionals find jobs in Texas and providing answers to people who want to start careers in IT.
Dennis D. McDonald is management consultant in Alexandria, Virginia, and runs All Kind Food. When not travelling or cheering on his favorite college football team, Dennis is also a moderator for the LinkedIn Bloggers group on Yahoo.
And I almost forgot, you can do us all a favor by providing feedback! You can either send me an email at netsecpodcast_AT_mckeay.net, or leave me a voicemail at 916-231-9479. Leave me a voicemail and I may include it in the next podcast.
Wed, 7 December 2005
Sooner or later I'm going to learn to save my work in progress; this time I closed the blog entry by accident whe I was closing a window I no longer needed open. Ah well. I'm still having some issues converting to MP3, so if you know what's causing some of the distortion once I convert, please drop me a line.
I discuss several things that caught my eye this week, like the Common Vulnerability Scoring System, more on Diebold, spear-phishing, several articles that don't say anything new, Cisco hiding bugs, Microsoft needs CISSPs, and a wrap up with the first of the PCI requirements.
Network Security Podcast, December 6, 2005 - Episode 4
Tonight's podsafe music by: Deborah Dalton - Brother's Keeper
Federal flaw database commits to grading system
Diebold loses legal case, certified anyway
Security's Shaky State
Firms face growing IT security danger from 'enemy within'
Firm Allegedly Hiding Cisco Bugs
Microsoft pads security partner competency
As always, thanks for listening, and you can send feedback to email@example.com. Hopefully next week I'll have a callin number to add.
Wed, 30 November 2005
Oy, I can't believe what I just did. I spent over an hour preparing for the podcast, recorded it, and then as I'm editing the audio, I decided to close the Firefox tabs. As I close the last one I realized I hadn't created the show notes yet. D'ohh. So, if I've missed a link, please let me know and I'll add it as soon as I can. Tonights show is just over 45 minutes, including the music at the end! At this rate, I'll have to go to a twice weekly show. Download the file and listen to me rant about Diebold voting machines, talk about the EPIC Top 10 and Chilling Effects, as well as give my own views on PCI.
As a side note, I think some of the audio effects I'm picking up are the built in sound card on my system. I thought it was pretty good, but I'll just have to buy a better sound card and find out (next year, that is).
Network Security Podcast, November 29, 2005 - Episode 3
Tonight's podsafe music by: Redshell - The Answer
DoS Exploit for MS05-053 released
Microsoft Internet Explorer "window()" Arbitrary Code Execution Vulnerability
EFF challenges Diebold exemption in North Carolina
N.C. judge declines protection for Diebold
California invites Black Box Voting to hack Diebold voting machines
Fasten your seatbelts - It's time to bring this thing in for a landing
Hoofnagle's Consumer Privacy Top 10
Efficient Process or Ã¢ï¿½ï¿½Chilling EffectsÃ¢ï¿½ï¿½?
FBI Warns the Public
PCI Data Security Standards
As always, thanks for listening, and you can send feedback to firstname.lastname@example.org.
Tue, 29 November 2005
For show notes please visit the Network Security Blog
Tue, 29 November 2005
For show notes, please go to the Network Security Blog
Tue, 29 November 2005
I'm just placing this here as a ... well, a placeholder. If you want to see my real blog and the home of my podcast, go to: http://www.mckeay.net/secure/
Category:podcasts -- posted at: 1:59 AM