go to sections menu

The Technology blog and podcast

This is for the technology blog and podcast Commentary, articles, and podcasts

header picture for Ingegno theme

You are here: podcast announcements

Go to Homepage [0], contents or to navigation menu



The Security box, podcast 10 for September 16, 2020

Hello folks,

Welcome to the security box. On this episode found on the RSS feed, we have a very nice interview with Michael in Indiana I think everyone will be interested in. The program is 3 hrs, 38 minutes but its OK to go over.

T he news wasn’t covered but that is OK, we can do a double dip of news next time. If you find anything in the news section of the following notes, please let me know what interests you.


Notes follow:


Welcome to podcast 10 of the security box. On this edition of the program, we’re going to leave room for Michael in Indiana to talk to us about phone stuff. We’ll also have some other stuff as well.

Topics

  • Phishing has all kinds of forms, and the Security Box, podcast 5 only covered a little bit. Podcast 345 of the tech podcast series also covered Phishing. Also, we’ve covered Phishing in articles that I’ve read as well. This search page from the blog will bring up everything on phishing that might be of interest to you. Recently, I’ve learned about tricky types of phishing using services out there that can produce documents and forms for free or low cost. Tricky Forms of Phishing | Tricky ‘Forms’ of Phishing is the topic on this first segment of the program today. Did you know there are 13 different sites that can produce documents and forms that could trick users in to divulging information they shouldn’t? The only one out of the 13 I’ve used is Google documents, but I’ll talk about the 13 different ones in turn. Time to learn.
  • Recently, I’ve read an article talking about doing your due diligence . Do you do yours? Looks like a scammer knows how to play it well, and the name seems to be well known. The article Due Diligence That Money Can’t Buy talkes about someone by the name of John Bernard. What a facinating story!
  • Michael in Tennessee came on about a ransomware attack effecting Neuhal. We’ll have more next week on this.
  • Michael in Indiana will be on talking about phone systems, security, and what he has seen in the landscape as an administrator.

News

Due to the time of the interview, news did not get aired this week. I’ll keep this for a show next week, and we’ll reference this next week. If you find anything from the below section you want covered, you’re welcome to have your thoughts heard. Here’s the news from this week we didn’t cover that might be of interest to you.


Thanks so much for checking out the podcast, and make it a great day!

Comments (0)

The Security box, podcast 9: Typosquatting and more

Hello folks,

The RSS feed has the podcast. Due to the length of the show notes, it is not going to fit in those notations.

I hope you enjoy the program as much as I have putting it together for you. Next week, we’ll be returning to a Wednesday schedule.


Welcome to the security box, podcast 9. This week, I think we’ll change gears a little bit and talk about the Internet in a different type of light. We’ll also have news, notes, commentary, and I believe the fix to comments left by callers is solved with an app I already give info for. If you can use the dial in number, you may use it, but turns out, not everyone may be able to use it. The days of Voice Mail services may be over. Lets get started!

Topic:

Have you ever made a mistake while typing a web site address in to your address bar? You have? Well, you’re not alone. While it is human to make mistakes, actors know this now more than ever. The term is called typosquatting when an actor picks up these types of misspelled domains and utalize it to do lots of things to you. Consequently, in “This Week in Security News” for the week ending September 4, 2020: there is an article talking about Typosquatting in it.

News, notes, and more

Other things:

  • Have you ever thought of your building on the Internet? Podcast 337 had an article I got from Sans News Bites that talked about hackers using things like elevators for DDOS attacks.

    one of the biggest topics I think you’ll want to get your paws on is buildings being connected to the Internet. I’m not kidding! I’ve got a blog post with the article of the same name: Hackers are hijacking smart building access systems to launch DDoS attacks and this is definitely something to think about.

  • From the same podcast, we’ve got the best thing ever. A dumb criminal on how Not! to get caught on crimes. I changed the show notes a little bit and decided to go after the original article.

    Also on the podcast, we’ve got a dumb criminal award for the podcast. If you’re going to commit a crime, you want to try and hide like a lot of America’s Most Wanted’s criminals did. Thats why they were hard to catch, and eventually, a lot of them were caught. Booter Boss Busted By Bacon Pizza Buy is the link to Brian Kreb’s coverage of this.

    Have fun with this one!

Have something you want to contribute? Please feel free to do so by email, imessage, or voice. The choice is yours! The file has all of the contact info on how to get ahold of me throughout the program. Thanks so much for listening, and we’ll see you next week!

Comments (0)

Tech podcast 351: Voice mail systems, Jaws, a team up, typosquatting, and more

RSS for those who want it.

Welcome to podcast 351 of the podcast. Some people can’t stand the changes in regards to one telephone system and what they did. Shaun Everiss and I team up and I created a page for it. Jaws had an update and I covered all but two. Here is the blog post on that as well. Finally, Typosquatting is discussed in preparation for the next Security Box. All this, and final thoughts and contact info on this edition of the podcast.

Comments (0)

The Security box, podcast 8: show notes reissue

I found there was an error in the notations, which I fixed in my file.

Instead of going ahead and updating the post, I’ll go ahead and make a new one.

RSS is here for you to get your copy of podcasts across the network. Remember to visit blind vms for other podcasts as we team up.


Welcome to podcast 8 of the Security Box. As you’ll see by the notes here, we’re fully packed, the show should be that way. I hope you enjoy it as much as I am bringing it together for each and every one of you.

Commentary:

  • Jennifer had quite a bit to talk about during the reairing of the Security Box from last week. Through Skype, we’ve got several messages due to Skype’s change in the way messages are taken which is news to me. We play and answer any questions asked.

Topics:

  • What do you think when you have your TV? Do you think of it as something to watch, something to possibly play games on and listen to podcasts, and that is all? We know that the apple TV allows you to watch movies and rent them through Itunes, but what about your set top box? Do you know anything about them? In an article tweeted by Security Week we are learning that several manufacturers are not fixing anything and the vulnerabilities in these set top boxes are bad. I had not envisioned this to be a malware prone set top box, and now, I am glad I don’t have a TV. Vulnerabilities Expose Popular DVB-T2 Set-Top Boxes to Botnets: Researchers is the article, and I think we need to at least know about them. Avast was responsible for this research, and I think it is important for people to read this one. It talks about the set top box, and goes in to the research that encompasses it.
  • Shaun Everiss has sent me this article from stuff.co.nz in regards to New Zealand’s issues with its stock exchange. According to the article, New Zealand had its stock exchange attacked by a well-known entity known as Fancy Bear. We know on the tech podcast that Fancy Bear has been targeting people for ransom for many years now, along with other groups like apt28 which may be the same people. Look it up. NZX back online as Government assists in helping it address cyberattacks is the post and its something we need to be concerned about although the exchange is now back online. We could be the next target. This can’t be good.
  • I was asked to cover Tik Tok. Cybersecurity expert’s take on TikTok sale is Scott Schober being interviewed about the potential sale. We’ve got an interview which is covered briefly in news notes, and this video was put out on September 1, 2020 just a day before the podcast. I found this quite interesting and you may too.

News Notes:

Lots of different items have gone on this week it’ll be hard to cover everything here. There are some things linked through the blog, but I’ll highlight a few items here.

There may be things listed here we covered as a topic, but then again, there may not be.

For a complete article list, check out the tech blog where you might find other things not covered here or in the news notes file played within the podcast.

Podcast segments

Final Thoughts:

Have anything you’d like to say? Want to leave a voice mail message? Call 641-715-3800 and when prompted dial 96-96-709. Follow the prompting to leave a voice mail in the voice mail box. While Skype allows for voice mail, this won’t work anymore due to changes unknown to me, and there aren’t that many options left. I hope you’ll enjoy the program today, and thanks for listening and checking out the notes!

Comments (0)

The Security Box, podcast 8 for September 2, 2020

Hello folks, welcome to a packed podcast here on this program. This program has lots of different links to various things that we talk about and wht they’re about. If you’re comning here from the RSS, the RSS is too small for these notes because its over 4000 characters.


Welcome to podcast 8 of the Security Box. As you’ll see by the notes here, we’re fully packed, the show should be that way. I hope you enjoy it as much as I am bringing it together for each and every one of you.

Commentary:

  • Jennifer had quite a bit to talk about during the reairing of the Security Box from last week. Through Skype, we’ve got several messages due to Skype’s change in the way messages are taken which is news to me. We play and answer any questions asked.

Topics:

  • What do you think when you have your TV? Do you think of it as something to watch, something to possibly play games on and listen to podcasts, and that is all? We know that the apple TV allows you to watch movies and rent them through Itunes, but what about your set top box? Do you know anything about them? In an article tweeted by Security Week we are learning that several manufacturers are not fixing anything and the vulnerabilities in these set top boxes are bad. I had not envisioned this to be a malware prone set top box, and now, I am glad I don’t have a TV. Vulnerabilities Expose Popular DVB-T2 Set-Top Boxes to Botnets: Researchers is the article, and I think we need to at least know about them. Avast was responsible for this research, and I think it is important for people to read this one. It talks about the set top box, and goes in to the research that encompasses it.
  • <;li> Shaun Everiss has sent me this article from stuff.co.nz in regards to New Zealand’s issues with its stock exchange. According to the article, New Zealand had its stock exchange attacked by a well-known entity known as Fancy Bear. We know on the tech podcast that Fancy Bear has been targeting people for ransom for many years now, along with other groups like apt28 which may be the same people. Look it up. NZX back online as Government assists in helping it address cyberattacks is the post and its something we need to be concerned about although the exchange is now back online. We could be the next target. This can’t be good.

  • I was asked to cover Tik Tok. Cybersecurity expert’s take on TikTok sale is Scott Schober being interviewed about the potential sale. We’ve got an interview which is covered briefly in news notes, and this video was put out on September 1, 2020 just a day before the podcast. I found this quite interesting and you may too.

News Notes:

Lots of different items have gone on this week it’ll be hard to cover everything here. There are some things linked through the blog, but I’ll highlight a few items here.

There may be things listed here we covered as a topic, but then again, there may not be.

For a complete article list, check out the tech blog where you might find other things not covered here or in the news notes file played within the podcast.

Podcast segments

Final Thoughts:

Have anything you’d like to say? Want to leave a voice mail message? Call 641-715-3800 and when prompted dial 96-96-709. Follow the prompting to leave a voice mail in the voice mail box. While Skype allows for voice mail, this won’t work anymore due to changes unknown to me, and there aren’t that many options left. I hope you’ll enjoy the program today, and thanks for listening and checking out the notes!

Comments (0)

The Security box, podcast 7 for August 26, 2020

Hello everyone, welcome to another security box podcast. This time, it was a little shorter but tried to give some good content. While there was no participation by telephone, its ok. I’m sure that people will be wanting to listen to what is said, and we play some tunes too.

The first hour, I cover what I wanted, but since I opened the lines and there was noting, I went ahead and broke out the Phishing guide and talked about some things that could be relevant to the topics I talked about on this show.

Below, please find the show notes, and I hope you enjoy the show as much as I have. Starting next week, I present a brand new intro for you, I hope you’ll enjoy it.


Welcome to podcast 7 of the Security Box. This week, let’s peruse some topics, I’ll link to some articles, and you can comment as usual. News, Notes, and much more. Thanks for listening!

  • Election officials have been warned about Typosquatting domains and how they can be used to bring trouble to their particular candidate. Typosquatting is a big problem, and in a future podcast, we’ll look in to what this is. In an article entitled Feds warn election officials of potentially malicious ‘typosquatting’ websites you’ll learn what is the danger in the election scheme of things.
  • I think its time to really bring out a topic. How many people heard of the dark web? 11.6 billion records have been breached and are on the dark web since 2005 according to this article by Lastpass. Is this something we should be concerned with as a whole, or do you think it isn’t a big deal? This can only get worse, and the box wants to hear what you think of this. Each year, more companies are breached than ever before and it is definitely a problem I think. There is a way you can scan the dark web for any type of data like an Email address, but is this enough? Lastpass has the capability of doing this for you. The article What are dark web scans? goes in to more details on how this is done.
  • News:

  • Looks like Experian can’t keep their mouth shut. According to a Cyberscoop article, 24 million South Africans are now at risk because someone potentially opened their mouth. They said the employee was tricked in to disclosing information on a unknown number of people, but the number seems to be a whopping 24 million. No hacking needed: Someone duped Experian into handing over data in breach affecting 24 million South Africans is the article and boy if Equifax and Experian haven’t learned anything from their prior U.S. things, when will they ever learn? The U.S. stuff were hacking attempts but still … human intervention is the weakest link in this whole ordeal.
  • This week in Security News from August 21st covers another article on the 24 million from South Africa and even some other stuff that might be of interest. The tech blog will also highlight things from this article that might be of interest.
  • Michael in Tennessee went ahead and gave me a heads up on this one. Turns out that a former CSO was charged in the Uber breach from 2016.

    U.S. prosecutors have charged the former Chief Security Officer at Uber with allegedly covering up a data breach at the ride-hailing company that exposed
    information tied to roughly 57 million people.

    Joe Sullivan was charged Thursday in the U.S. District Court in San Francisco with failing to disclose details of the security incident. to the proper authorities. Sullivan, who now works as the chief information security officer at Cloudflare, allegedly committed two felonies by not informing
    investigators about the hack while they probed the circumstances surrounding a prior data breach.

    This is great news, and one in which I want to cover in passing. Former Uber CSO criminally charged with covering up 2016 data breach has the full details from Cyberscoop.

Comments (0)

This week’s Security Box, podcast 6

The podcast for the Security Box is on the RSS feed for your enjoyment. This podcast has one main item, and we even have some interesting topics as part of the open forum which is the majority of the show.

Want your say? Feel free to contact me and let me know what you want to contribute.


Welcome to podcast 6 of the Security Box. On this show, we’ve got a topic, a very interesting news notes where two articles take center stage, and we’ll open the lines for comments, questions, and other things.

Topics:

  • Herbie sent me a direct message on twitter in regards to Epic games. Seems as though these guys aren’t so happy in regards to the decision made about the percentage of money each company whether Apple or Google take, so they want to side load their apps on to your device. According to the article, this is in violation of each app store’s rules. On Epic’s Fortnite Gambit is the article and it comes from the Apple Mill. The article talks about sideloading apps. Thoughts? Let’s discuss this one!

News

Open forum:

  • Michael in Tennessee came on to talk about his apartment complex and their lack of security with the WIFI setup. While they wanted to make it convenient, it could be a parking lot attack at the entire network.
  • Michael talked about updating software and how inportant it is.
  • Michael also talked about smart TV’s as well.

Comments Off on This week’s Security Box, podcast 6

Technology podcast 350: Transit App, Covid stuff, and is Epic Games mad?

The RSS feed is up with this program. I will be working on getting it up on the mixcloud as well. Below, please find the show notes.


Welcome to the technology blog and podcast, podcast 350.

  • I can’t believe that we’ve made it to 350 episodes. In 2017, I didn’t publish much because of the constant breaches, but in 2018 we’ve come to find out that we must continue this work. I reflect on this in the first official segment.
  • Several segments are videos with Covid 19 stuff as well as a short video segment from Twit dealing with Tik Tok. Nothing is set in Stone.
  • Katie Monroe from Transit App joined in the AAC meeting from August 13th’s meeting. Lots of accessibility work was made and not just for people who are blind.
  • Herbie sent me a direct message on twitter in regards to Epic games. Seems as though these guys aren’t so happy in regards to the decision made about the percentage of money each company whether Apple or Google take, so they want to side load their apps on to your device. According to the article, this is in violation of each app store’s rules. On Epic’s Fortnite Gambit is the article and it comes from the Apple Mill. The article talks about sideloading apps. Thoughts? Let’s discuss this one! If not side loading, what about the terms of service aspect?

The program lasts 1 hour, 10 minutes and I hope you enjoy!

Comments Off on Technology podcast 350: Transit App, Covid stuff, and is Epic Games mad?

The Security Box, podcast 5: Phishing and its various forms

Phishing and its various forms are covered. I didn’t cover it all, just the more familiar ones. Links are given, and we do play some tunes too.


Podcast 5 covered Phishing and its various forms. The main option we used was Wikipedia, but we also link to F-secure and a podcast talking about what this is. There is one aspect we did not cover which I think we should. Our things to ponder segment was a little adult in nature but appropriate in today’s environment of social media and the things that are allowed and not.

The show lasts 3 hours, 32 moinutes, and I hope you enjoy! No major news notes segments.


RSS has the program and its also on mixcloud for your enjoyment.

Have something to say? Contact me!

Comments Off on The Security Box, podcast 5: Phishing and its various forms

The Security box, episode 4 notes reissued

I found and corrected some formatting and Hopefully Shaun’s last name spelling based on a comment on a prior post.

Here are the corrected notes.


Welcome to podcast 4 of the Security Box. On this show, we’ve got one main topic, a very interesting talk by Shaun Everess about a big time breach which effects GPS, news, notes, and more!

Our main topic:

Our main topic is the Computer Fraud and Abuse act. What is it? How did it come about? Do you think its working?

Shaun’s topic

Shaun Everiss talks about some blog stuff, but he also talks about a big time GPS hack that could possibly be effecting all of us in some aspect. The topic is also being cross posted to the technology podcast as a whole, but I’m putting it here for comment by this podcast.

  • This blog post from the Technology blog and podcast This has to be the biggest breach to date gives my thoughts, along with Shaun’s email. It also links to the story both linked in his email, and actually linked at the bottom.

Other newsy things

Twitter News

This isn’t possibly the entire news, but some items that may be of interest. Please check the blog for more, contact me to tell me what you want discussed, and thanks for listening!

Comments Off on The Security box, episode 4 notes reissued

The Security Box, podcast 4: News, Notes, CGFAA, breaches and more

Ok a little over than three hours, we cover quite a number of things. Below, please find the show notes, and remember to go to the RSS feed to pick them up.

Here are the show notes.


Welcome to podcast 4 of the Security Box. On this show, we’ve got one main topic, a very interesting talk by Shaun Everess about a big time breach which effects GPS, news, notes, and more!

Our main topic:

Our main topic is the Computer Fraud and Abuse act. What is it? How did it come about? Do you think its working?

Shaun’s topic

Shaun Everiss talks about some blog stuff, but he also talks about a big time GPS hack that could possibly be effecting all of us in some aspect. The topic is also being cross posted to the technology podcast as a whole, but I’m putting it here for comment by this podcast.

  • This blog post from the Technology blog and podcast This has to be the biggest breach to date gives my thoughts, along with Shaun’s email. It also links to the story both linked in his email, and actually linked at the bottom.
  • Other newsy things

Twitter News

Comments Off on The Security Box, podcast 4: News, Notes, CGFAA, breaches and more

Technology podcast, podcast 349: Firefox and Jaws, Twitter, B2k, and a whole lot more

We’ve got a lot here on today’s edition of the tech podcast which is now on the RSS feed. The entire show notes are below, and I hope you enjoy the program!


Welcome to the technology podcast, podcast 349. This program is almost an hour and a half, and is packed with tons of stuff. Contact information is given throughout the program, so please get in touch!

  • Have you ever seen notations talking about fixes for screen reader users? Firefox fixed a very nasty crash with Jaws, but besides that, other screen reader updates were made to Firefox 79 which has recently been released. You don’t normally see fixes for access tech so this is quite a surprise and a welcome change. Thanks Firefox! blog post
  • Shaun Everiss, my second admin, is along with a segment talking about one of the biggest breaches I believe we’ve seen. This one, deals with a well known brand most people will be familiar with. Besides that, Shaun talks about the Spam problem I’ve been trying to fight for years. >blog post on the breach and find updates through the blog in regards to what he did for the Spam problem.
  • I have a twitter update. first blog post and second blog post
  • B2K is finally talked about on another podcast besides this one. In a long awaited podcast, Blind Bargains Interviews Jared Rimer who talks about the program, braille transcription, and more. Segment starts 15 minutes in. blog post
  • I give a talk on two different articles I’ve recently read on Krebs on Security dealing with credit and debit card fraud and EMV payment processes. This recent blog post should’ve been posted after I recorded the segment, but does link to the two articles.
  • Michael in Indiana talks about two different items. The first, is a very interesting Comcast story which turned out great. The second, an unconfirmed report about Microsoft buying Tiktok. We talk about TikTok as South Korea was fining this Chinese App maker due to Coppa violations and big time ones too. I also have comments following a video I found through the BBC. blog post

Contact information, and information on what is going on in the security box ends the podcast. The total length of the file is 1 hour, 26 minutes. I hope the wide variety of topics is of interest to you. I’ll be back with more on the tech podcast very soon. Thanks so much for listening!

Comments (2)

Podcast released, Blind bargains interviews Jared Rimer for B2K Updates

Its finally here! The podcast I’ve been wanting to do for quite a long time. On this podcast, J.J. from Blind Bargains interviews me with an update to B2K. For full details on the whole development process of B2K’s talking edition, check out the Braille2000 category on this very blog.

Want to check out the podcast? B2K isn’t the only thing covered, but their podcast 212 can now be had.

Thank you J.J. for your continued support of the effort Braille2000 is offering to the community. I hope we can continue to team up when updates worth sharing come up. We’ll be in touch!

Comments Off on Podcast released, Blind bargains interviews Jared Rimer for B2K Updates

The Security Box, podcast 3: Coppa and other newsy things

The RSS feed has the podcast. Should you have any trouble getting at it, please contact me at tech at menvi.org requesting a copy. I’ll send it through wetransfer’s service.

Please find the show notes below, and I hope you enjoy the podcasted edition of the program!


Welcome to the Security Box, podcast 3. We really only have one main topic here. We also include news, notes, and other things in passing.

We’ll have two segments on things to ponder where personal information is concerned, and we’ll also have your comments, questions, and concerns. I hope you’ll enjoy the show as much as i have putting it together!

Thanks to everyone that decided to participate during the live program. Remember that if you listen through the podcast, your voice still counts, so get those emails, imessages, texts, or whats app messages to me. Contact info is given throughout the program, and thanks so much for listening!

Comments Off on The Security Box, podcast 3: Coppa and other newsy things

The Security Box, podcast 2 for July 22, 2020

The RSS feed has this podcast and the recent released tech podcast. Enjoy!


Welcome to the security box, podcast 2. On this podcast, Twitter takes center stage as it suffered a very interesting security problem they need to solve. People have said it was a big time breach, but as you’ll soon find out, unless you read the tech blog, there is more to the breach. Yes, accounts got breached, but we know there is other info. Articles are listed here for you to review. Besides that, find out about a big time breach article which was a two year look at many different breaches within a two year period. Also, find out about a piece of malware making a huge return on how it can’t! be trackable now a days and what the threat actors are up to.

Depending on time, not everything may be covered. If you see the rundown and you want things covered we didn’t get to, please let us know!

The links to news items are in no particular order, we provide them in the order I put them in. Of course, please contact me through the contact the dj’s page on the mix or through the tech blog itself.

Thanks so much for listening to the program, and we’ll be back with you next time!

In a future podcast, let us talk about the CFAA and whether you think its been effective. Even still, lets possibly talk about Coppa. Have any topics you want discussed security wise? Have terms you don’t understand? The box wants to hear from you!

Comments Off on The Security Box, podcast 2 for July 22, 2020

Technology podcast 348: VAC, Chinese Software, and your operating systems

The podcast will be available through our RSS feed and will be available through Mixcloud as well. Below, please find the show notes.


Welcome to podcast 348 of the technology blog and podcast series. I’ve decided to change it up a little bit with a different spin on the security aspect, as well as talking about a piece of software that I’ve once used before, but yet, need it again. The setup was quite easy, and I pretty much did it on my own. Then, what do you get when you have to think about the security of your software you use to do your work? What about the type of computer you use such as Windows, Mac or Lynux? Full thoughts and links to items follow.

  • Virtual Audio Cable is a piece of software that acts like a mixer. We’ve talked about it once before, and I believe we’ve demoed it. Its back as I talk about the Security Box and how I’m putting people on air.
  • What do you think about when you think of the Mac? Its not known for viruses, trojans, and worms. However, with this latest development, I begin to wonder if the Mac will start receiving more problems like Windows has for many years. In this article entitled Updates on ThiefQuest, the Quickly-Evolving macOS Malware from Trend Micro, really makes you think. Its got lots of images for those who are sighted,, so you might want to check it out as I talk about it and other operating systems in general.
  • Finally, what do you think about if you were told to install something that you had no idea had a back door? In this article Chinese banks require clients to use tax programs laced with backdoors, report says posted on Cyberscoop, I talk about it and how I’d handle that. I never saw the day that software would be laced with malware and a bit of social engineering would have you install it just to get your work done.

The program is 1 hour and 8 minutes long, and I hope you’ll enjoy the program as much as I have putting it together for you. Thanks so much for listening!

Comments Off on Technology podcast 348: VAC, Chinese Software, and your operating systems

Technology podcast 347: Braille Transcription, Twitter, and Blue Leaks

On this podcast, a few segments, a little different than the security box.


Welcome to the technology blog and podcast, this is podcast 347 of the series. On this podcast, a longer segment on the Blue Leaks issue which I take you the article. Here is the blog post that is linked in the first Security Box which was issued yesterday. Next, Twitter apparently got hacked, or did they? We’ve been publishing blog posts as we learn more with my thoughts, and we’ll be covering this on the Security Box next week. Finally, i have a braille transcription update as I deal with assignment 19. We’ll definitely have more news coming out of the twitter camp. What a mess.


Go to the RSS to pick your copy up of the podcast.

Comments Off on Technology podcast 347: Braille Transcription, Twitter, and Blue Leaks

The Security Box, podcast 1 reissue

I found an error in the show notes but I’ll just reissue the show notes. I apologize for any inconvenience this causes you.

The security box can be found on the RSS feed for you to download and listen to.


Welcome to the security box, podcast 1. While we’re playing a wide variety of music, the music will not be part of the notations. We’re only going to link to things talked about as part of the show itself. The show will be part of the Tech podcast series, but hosted through the independent channel of the suite of servers. I hope that you’ll be enlightened by the discussion, and I encourage discussion. If listening through the podcast itself, contact me through my tech address used through the tech podcast. Mix listeners can contact me through the contact the DJ’s page of the mix. Thanks for listening!

There may be other things I reference that is not going to be specifically linked here. You can visit the tech blog to read anything of interest, as well as searching out stories for future inclusion. There are sources that I don’t have because of the amount I already have to read. As the podcast grows, we may not have so many items, but we’ll see over time. I hope you’ve enjoyed the program listening live, or the podcast if you listen that way. See you next time!

Comments Off on The Security Box, podcast 1 reissue

The Security Box, podcast 1: Introduction to Security topics and some items

As part of this podcast, we talk about some of the terms used such as dark web, and other aspects of keeping ourselves safe.

Then I bring some topics to see what people think, and we also have music sets of 10 to 15 minutes between each set.

This is going to be the home of this podcast and will be different than the regular podcast, so I hope you decide to check it out. Its OK if you don’t, this may not be for everyone.

Here are the show notes for the first show.


Welcome to the security box, podcast 1. While we’re playing a wide variety of music, the music will not be part of the notations. We’re only going to link to things talked about as part of the show itself. The show will be part of the Tech podcast series, but hosted through the independent channel of the suite of servers. I hope that you’ll be enlightened by the discussion, and I encourage discussion. If listening through the podcast itself, contact me through my tech address used through the tech podcast. Mix listeners can contact me through the contact the DJ’s page of the mix. Thanks for listening!

Comments Off on The Security Box, podcast 1: Introduction to Security topics and some items

Tech podcast 346: Transit App, Capital One, Trust No One, and Everify

Hello everyone!

Its been well over a month since I last did a technology podcast, I feel very embarrased. I’ve not been feeling the greatest, and have only recently started feeling better. Even mixcloud got this program, so we’re starting to get back to some sort of normacy.

On this podcast, I’m able to link to several blog posts talking more about the topics, and the full show notes follow.

You can get the show notes here, but the show itself is available on our RSS feed. I hope that you’ll enjoy this program, and I’ll be back with another podcast hopefully sooner than later!


Welcome to the technology blog and podcast, podcast 346. Last podcast was at the end of May, and a lot has been going on around here health wise. I’m definitely feeling better, and I’ve got quite a bit for you.

  • At the end of May, beginning of June, Transit App was announced to be the Los Angeles Metro app of choice, changing the landscape of $240,000 in costs. Here is the blog post that I wrote which also links to Los Angeles Metro’s blog as well. Let me know your thoughts on this one!
  • What does Capital One have to hide when it comes to their breach? After my health issues, I’ve been thinking about what to put in to the podcast, and I thought this would be good to talk about. This blog post links to an article that goes in to detail about this intriguing case. We already know Capital One was at fault, why are we continuing to hide it?
  • I recently penned an article asking about the state of Antivirus after someone emailed asking me to put Eset’s web site in a 2017 blog post. Instead of doing that, I mention Eset and several good antivirus products in this blog post where I quote an email that Shaun Everess wrote in a forward talking about 2004’s Windows 10 version. He’s not wrong in his thoughts in the comments, but I still think we’re at a disadvantage.
  • Michael in Indiana has every reason to get mad at TNO. TNO stands for Trust No One, and he had no idea an app he used was this way. I also leave my thoughts.
  • Finally, hot off the presses, a blog talking about another Government web site. The DHS has to be ashamed of itself! It links to an article recently penned by Brian Krebs about a web site called everify. We should be passed this ordeal when building web sites, should we not?

Do you have anything you want to comment on? Please get in touch by contacting me. The web site and blog have contact info, so please utalize it. I hope you enjoy this podcast, and I hope to get back in to podcasting more regularly.


The program lasts 1 HR, 4 minutes. Again, I apologize for the long delay, I hope this next podcast will be a lot sooner than over a month. Thanks for reading and supporting my work!

Comments Off on Tech podcast 346: Transit App, Capital One, Trust No One, and Everify

Older Posts »

go to sections menu


navigation menu

go to sections menu