Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
Introduction
00:00 • 2min
Slashing Security - Is This a Good Idea?
02:15 • 4min
You're a Hero, a Av for the Company
06:26 • 2min
The Chinese Report - A Grumpy Old Misanthrope?
08:32 • 2min
Can You Hand Over Your Password?
10:46 • 5min
Malware Is a Service, Is It a Telegram?
15:49 • 2min
Is It Expensive to Do This on Telegram?
17:35 • 2min
Telegrams and Cryptocurrency Scams
19:26 • 5min
Talk Space and Better Help
24:15 • 4min
Talk Space and Carrall's Cliff Notes
28:30 • 4min
Using Your Personal Information to Personalize Your Life
32:43 • 5min
Slash Collide That Slashing Security Dot Com.
37:14 • 3min
What's Your Pick of the Week?
39:47 • 3min
A Slow House, by Af Slough
42:49 • 4min
The Therapy Uncensored Podcast
46:48 • 3min
The Problem of Unmanaged Devices on the Network
49:53 • 2min
The Problem With Vulnubility Scanners
51:47 • 2min
Meta Sploit - The Open Source Network Penetration Testing Tool
54:12 • 2min
What Are the Different Uses of Kaspersky?
55:53 • 2min
Using Rumble to Find the Little Critters in Our Network
58:16 • 2min
Can Rumble Data Be Used for Cloud Hosts?
01:00:02 • 3min
Rumble Dot Run - What's Connected to My Home Network?
01:02:51 • 3min