Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34
Introduction
00:00 • 2min
Game January 20th, 20th.
01:39 • 2min
How to Fix Cryptographic Failures
03:27 • 3min
The Problem With Custom Inscriptions
06:00 • 3min
The Public Private Key Is a Form of a Symmetric Inscription
09:24 • 2min
The Most Common Cond Comps That You Hit at Hear
11:32 • 6min
How to Decrypt the Data on Your Lap Tops
17:03 • 4min
Is There a Consensus?
21:04 • 3min
What if You Don't Audit Your Business Data?
23:55 • 3min
Is Your Business Running on Top of a W S?
26:42 • 2min
Using Cloud Services
28:30 • 3min
Do You Citus Ali Do Citus Data?
31:34 • 5min
Is Your Data Leakage Getting Out of Control?
36:09 • 3min
The Most Recently Auted Breach List
39:16 • 2min
Using Different Passwords on Session?
41:07 • 2min
Google Account Authentication
43:14 • 4min
Data Dog Review
47:30 • 3min
Allan Underwood
50:46 • 5min
Theme Voting for the Game Jam
55:38 • 3min
Those Two Are Pleading for Me.
58:52 • 2min
Get Started on Lenod to Day With 100 Dollars and Free Credit for Listeners of Coating Blocks
01:00:28 • 2min
Secret Management
01:02:11 • 6min
Don't Put Your Passwords in Sorce Control
01:07:43 • 2min
How to Get Rid of Dependencies in Your Code
01:09:38 • 4min
Do You Need a Rekey?
01:14:03 • 3min
Short Cut - The Best Project Management Tool Ever!
01:16:49 • 2min
Is That a Gatekeeper?
01:18:36 • 2min
Can You Create Multiple Log Ends to a Data Base?
01:20:15 • 2min
Is Emal Secure?
01:21:49 • 5min
Is It the End of the World?
01:26:48 • 4min
Do You Log Anything Related to Your Secrets?
01:30:33 • 4min
Why You Might Consider Vault
01:34:57 • 3min
A Few Things I've Been Thinking About for a While Now
01:37:42 • 4min
Go Full Page Plugin - The Best Way to Get a Screen Shot of Your Page
01:41:37 • 4min