Hello folks, welcome to the Security box, podcast 127. Yes, we have a long time person who made an appearance and they were along with questions and commentary.
As this is written, the RSS feed is being populated with the program, and it is possible for some adult content or language, especially during the topic at hand in our second hour.
Here is the 106.9mb file if you need it.
The possibility of adult content within the discussion is there, so we’ve got the disclaimer in place just in case. Please be aware of this.
Show notes
Welcome to the security box, podcast 127. This time, we’re going to talk about something I don’t think any podcast has ever covered. What that might be? That would be Bullet Proof Hosting. What is it? Why is it such a problem? How can you stay away from companies that allow such a thing?
We’ll take from Wikipedia’s write up on Bullet proof hosting but we aren’t taking the entire thing. This term (written as bulletproof hosting) will be also included in this week’s EMHS updates.
The podcast will also have any news and notes, updates on the particulars of screen readers and what they have to help us deal with the ongoing threats for looking at links, and much more.
If you’d like to support our efforts on what this podcast is doing, you can feel free to donate to the network, subscribing to the the security box discussion list or sending us a note through contact information throughout the podcast. You can also find contact details on our blog page found here. Thanks so much for listening, reading and learning! We can’t do this alone.
Discover more from The Technology blog and podcast
Subscribe to get the latest posts sent to your email.