Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36
Introduction
00:00 • 3min
The Longest Show in Trow Ever!
03:03 • 2min
Slash Game Jam
05:24 • 3min
Is There a Need to Do an Equalization Check on a Class?
08:06 • 2min
A Free Tip of the Week for You!
10:16 • 3min
Prirson's Awsom - Is He a Microsof?
13:17 • 2min
You're on Again, Tisy. This Is Like It
15:28 • 2min
Pay Your Duty
17:36 • 2min
Grifana
20:01 • 3min
How to Detect a Vulnerabilty in an Open Source Environment
23:14 • 4min
How to Generate Authentication in a Hackathon Environment?
27:06 • 2min
Never Use Customer Data When You're Doing Proof of Concepts or Hackathons
28:52 • 3min
Detecting and Reacting to Security Events Is So Much More Important Than Preventing
31:37 • 5min
Session Injection
36:27 • 2min
You Can't Perameterize Everything
38:34 • 3min
The Little Bobby Tables
41:12 • 2min
Sequal Vulnerabilities and Injection Vaults - What You Shouldn't Do
42:54 • 2min
Hackers Can Be Patient, Right?
45:10 • 4min
How to Hack a Web Site?
49:27 • 2min
Unicode a Bug Against the Compilers?
51:33 • 3min
The Top of Hacker News Ranow Is a Remote Control Execution Flaw With the Log for J T
54:33 • 2min
Simplify Your Cloud Computing Solutions With Lenod
56:09 • 3min
Slash Coating Blocks Review
58:48 • 6min
The Outlaw Set It Here
01:04:36 • 6min
What Is Rainbow Tables?
01:10:18 • 5min
The Rainbow Tables Really Speed Up the Processes
01:15:07 • 5min
Password Hints
01:20:22 • 3min
Using a Salt or a Pepper?
01:23:37 • 4min
Can You Generate a Rainbow Table?
01:27:59 • 3min
The Solution Is Key Stretching
01:30:34 • 5min
Adaptive Hashing
01:35:09 • 5min
The Cost of the Eight Letters Versus Eight Characters
01:40:13 • 2min
How Big's Your Haystack?
01:42:16 • 4min
How to Optimize Your Experience With Containers
01:46:45 • 1min
Unity Technologies
01:48:14 • 5min
I've Been Using Omyz Shell, and It Won't Work on macOS X.
01:52:54 • 5min