Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Introduction
00:00 • 2min
Why Are Mackintosh Computers the Best?
02:13 • 3min
Eunuchs Is a Very Old System
05:12 • 2min
Mac Security - What Do You Think About It?
06:43 • 4min
Is Complexity the Enemy of Security?
10:15 • 4min
Is Apple Secretive?
13:59 • 2min
Is Apple's Focus on Usability Affected Device Security?
15:35 • 3min
Malware Analysis on Mac OS X
18:29 • 3min
The History of Mac Malware Viruses and Macintosh Malware
21:07 • 3min
The Elk Cloner Virus - What Did It Do?
24:26 • 2min
How Did Elp Cloner Spread Through Disks?
26:17 • 3min
Is There Any Effort to Write Malware for Those Chips?
29:08 • 3min
I've Been Using Macs Since 1984
31:55 • 3min
The Mouse, That Mouse Was the First Mouse
35:13 • 2min
What Do You Wish Everyone Who Doesn't Use a Mac Know About Max?
37:31 • 2min
Computer Byvers Spread Through Cloppy Disks
39:50 • 4min