Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14
Introduction
00:00 • 5min
Is That Hacking?
05:12 • 2min
Replicating the Data Base Table
07:19 • 4min
What's Happening in the Department of Defense?
11:49 • 2min
Is This a Class Action Litigation or Funding Right?
14:12 • 2min
'I'm Sewing You for My Wall'
15:55 • 3min
What Is a Hacker?
18:30 • 3min
The Governor's Last Move, I'm Suretat, I'm Certaintat
21:02 • 3min
Comet Back Up Is Your Final Stand Against Data Loss
24:07 • 3min
What Is an Esku Injection Vulnerabilty?
27:28 • 2min
A Classic Web Hacking Tool
29:43 • 5min
The Difference Between Hacking and Copyright
34:34 • 6min
What's the Point of a Bug Bounty?
40:15 • 4min
X Y Z Hacker
44:05 • 2min