Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
Introduction
00:00 • 2min
How to Fix a Bug in an Event
01:40 • 3min
The Power of Focusing on Your Goals
05:06 • 1min
How to Survive a Hacker's Day
06:35 • 2min
The Importance of Good Faith Security Research
08:51 • 4min
How to Contact Website Owners
12:26 • 2min
Hacking EPP Servers
14:16 • 2min
How to Hack the Internet With Engine X Configuration Files
15:46 • 4min
How to Use Location in a VLON Environment
19:44 • 3min
The Problem With Backronyms
22:15 • 2min
The Impact of XSS on Bug Bounty Programs
24:14 • 3min
How to Fix a Bug on Black Box Testing
26:45 • 2min
How to Mapping Out Vulnerabilities in Backend Code
28:53 • 3min
The Role of Documentation in Product Development
31:29 • 2min
The Disconnect Between Accepted Risk and Informed Decision Making
33:04 • 2min
How to Make a Cool Hacker Setup
34:41 • 2min
The Importance of Investing in Your Health
36:26 • 3min
How to Deal With Lower Back Pain
39:12 • 3min
The Benefits of Uplift Desks
42:23 • 2min
How to Choose the Right Desk for Your Office
44:19 • 2min
How to Use a Portable Tabletop for Hardware Hacking
46:00 • 2min
The Power of Computers
47:45 • 3min
How to Set Up a Monitor Mount for Your Computer
50:27 • 3min
How to Setup a Clamshell Dock for Your Monitor Setup
52:58 • 2min
Synergy: A Way to Save Time and Money
55:11 • 2min
How to Use a Capture Card to Display Software
57:05 • 2min
How to Use a Custom Keyboard and Mouse
59:05 • 2min
The Logitech MX Master: A Daily Driver Mouse
01:01:03 • 2min
How to Use a Chromebook for Content Creation
01:02:39 • 3min
Chromebook Support for Linux
01:05:21 • 4min
How to Optimize Your Posture
01:09:04 • 2min
The Drawbacks of Buying a Chair
01:11:07 • 3min


