User Tools

Site Tools


security_now_2006

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
security_now_2006 [2012/10/19 23:46] briancarnellsecurity_now_2006 [2014/12/04 19:01] (current) – external edit 127.0.0.1
Line 84: Line 84:
 [[Security Now Episode 60|Episode 60]] - Steve and Leo discuss questions asked by listeners of their previous episodes. They tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world “application notes” for any of the security technologies and issues they have previously discussed. [[Security Now Episode 60|Episode 60]] - Steve and Leo discuss questions asked by listeners of their previous episodes. They tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world “application notes” for any of the security technologies and issues they have previously discussed.
  
-[[Security Now Episode 61|Episode 61]]+[[Security Now Episode 61|Episode 61]] - Steve and Leo discuss two new 0-day Internet Explorer vulnerabilities (both now being exploited on the Internet); then they explore the commonly expressed privacy and security concerns presented by the need to trust Internet Service Providers (ISP).
  
-[[Security Now Episode 62|Episode 62]]+[[Security Now Episode 62|Episode 62]] - Steve and Leo discuss the entire range of applications for Internet Proxies and Proxy Servers. They describe the many different uses for proxies while discussing both the benefits and the potential security and privacy liabilities created by filtering and caching web and other Internet content.
  
-[[Security Now Episode 63|Episode 63]]+[[Security Now Episode 63|Episode 63]] - Steve and Leo get deeply into the new MojoPac product from RingCube Technologies. After spending several days plumbing the depths of this intriguing new idea for installing secure and private Windows program and file installations onto transportable USB devices, Steve tells all about what he found and what he believes it means now and in the future.
  
-[[Security Now Episode 64|Episode 64]]+[[Security Now Episode 64|Episode 64]] - Steve and Leo discuss questions asked by listeners of their previous episodes. They tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world “application notes” for any of the security technologies and issues they have previously discussed.
  
-[[Security Now Episode 65|Episode 65]]+[[Security Now Episode 65|Episode 65]] - Steve and Leo get a bit philosophical this week. They discuss the broad nature of Security – all security, not just computer security.  They propose a new definition of “Security” and flesh it out with examples to illustrate why security is so difficult, if not impossible.
  
-[[Security Now Episode 66|Episode 66]]+[[Security Now Episode 66|Episode 66]] - Steve and Leo describe the new security features Microsoft has designed and built into their new version of Windows, Vista. They examine the impact of having such features built into the base product rather than offered by third parties as add-ons. And they carefully compare the security benefits of Vista on 64-bit versus 32bit hardware platforms.
  
-[[Security Now Episode 67|Episode 67]]+[[Security Now Episode 67|Episode 67]] - Steve and Leo first discuss errata from previous episodes, correcting, among other things, Steve's first poor impression of Vista's performance. Then they discuss the results of Steve's in-depth research into the inner workings of Vista's Kernel Patch Protection (aka PatchGuard) to uncover its limitations, benefits, and real purpose.
  
-[[Security Now Episode 68|Episode 68]]+[[Security Now Episode 68|Episode 68]] - Steve and Leo discuss questions asked by listeners of their previous episodes. They tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world “application notes” for any of the security technologies and issues they have previously discussed.
  
-[[Security Now Episode 69|Episode 69]]+[[Security Now Episode 69|Episode 69]] - To create some background for next week's discussion about the significant technical challenges involved in creating true anonymity on the Internet, this week Steve and Leo discuss the consequences of use and abuse of the extreme power afforded by many different forms of Internet anonymity, privacy, and freedom of speech.
  
-[[Security Now Episode 70|Episode 70]]+[[Security Now Episode 70|Episode 70]] - Last week Steve and Leo discussed the social implications and the social power of Internet Anonymity. This week they discuss the technology of Freenet and TOR (Onion Router) networks, and Steve describes the detailed technical operation of both systems.
  
-[[Security Now Episode 71|Episode 71]]+[[Security Now Episode 71|Episode 71]] - This week Steve takes the wraps off his forthcoming security freeware utility: SecurAble. Although he's still working to get it finished, tested, and ready for initial release, Steve describes what SecurAble will do and some of the unexpected hurdles he’s encountered with the application and with details of Windows operation along the way.
  
-[[Security Now Episode 72|Episode 72]]+[[Security Now Episode 72|Episode 72]] - Steve and Leo discuss questions asked by listeners of their previous episodes. They tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world “application notes” for any of the security technologies and issues they have previously discussed.
security_now_2006.1350690361.txt.gz · Last modified: 2014/12/04 18:58 (external edit)