S2E2 drops with a discussion on DNS filtering and how to do it using cool tools like the Pi Hole.
This episode was not recorded in front of a live studio audience. The audience already left because it was very late at night. If there’s any low energy I’m attributing it to that.
Turns out DNS filtering is actually crazy cool. There’s a ton of power there and a lot of fun things you could do. There’s also a lot of practical uses we could put it to from both a home and small business perspective.
Don’t believe me? We talk about spying on your children, supplementing your income for your mom and pop shop and the Nintendo game Chronotrigger. How can that NOT have you listening already?!
Season two has kicked off Y’all with home security
I don’t get the seasons, or how they work. But whatever, that’s what’ we’re calling it.
This season we pivot to focus more on home security and all the tips tricks problems and solutions around what security minded home owners and folks who want to layer on a little protection to their home offices face.
We’re also going to try and give a little more airtime to small business since a lot of home security cross pollinates with super small businesses.
I’m not saying this is going to be the best season of this show yet.
This year’s episode is about Dev-Ops, Agile Development and a couple other interesting development methodologies that are floating around. It’s MOSTLY about Dev-Ops though.
Max found this video series, at the bottom of a dumpster and had me watch them to try and explain what Dev-Ops was. Turns out that I didn’t really get a whole lot out of the video series because frankly they were put in that dumpster for a reason.
This episode was delayed because of a toilet problem. Actually I cover that in the episode in a new segment I like to call “Explaining why the episode was so darned late”
Dial in folks, we have ourselves an episode about the internet and things. Or… of things?
The internet of things and their vulnerabilities.
That’s right some times things that make your life easier can come at a price.
A PRICE SO HIGH IT’S STAGGERING!
Then once you’ve saved up that staggering price and buy the thing you find out that there’s another secret hidden price. The one you thought I was talking about originally!!
Whatever man, who writes this nonsense anyways? Geez.
Internet of things devices can have vulnerabilities just like all computers and we’re going to discuss some of them and what you can try to do to get to enjoy these internet of things devices without giving up the whole fishtank!
This week we talk about online (spoilers: And offline) tracking and the people who do it.
It’s a banner year at the old in-security family, two count on the podcast front and another on the way?!
We discuss Microsoft, google, facebook and the way they go about collecting data from unsuspecting internet users. We also take an in-depth look at cookies and how they are now used for more than ever intended.
Delicious delicious cookies. Used for tracking? next you’re going to tell me that brownies can be used to get you stoned.
Playing catch-up is necessary sometimes. Sometimes life happens. It gets all up in your grill and tries to mess up your best laid plans. When that happens your only choice is to podcast at a much slower pace than expected.
Sometimes life happens all over your Co-Host.
So we have an elegant solution to that. That solution is, of course, to recap everything in one giant recap episode.
We don’t necessarily hit all the points, but we get some of the top ones that we thought were neat. We don’t necessarily even talk about events more than I go off on a long rambling excuse about why Windows has made my life slightly inconvenient.
Sometimes Windows happens…
But why does it always happen to ME?!
Yeah. That’s not really as important a point here. So anyways.
We have another episode where we are playing catch-up on some of the better topics that happened and as always click the thing below if one of these interests you and we can possibly go more in-depth into it!
You know that old song? Rock the boat? You know how Rock the VOTE was made popular? We want you to rock the VOTE. Just don’t pick on the voting machines? Something like that at any rate. So that’s what I was going for with this title. We have fallen so far out of practice that at this point we’re just making things up again.
At least at one time we had some sense of what we were doing. Or at least some sense.
That’s all gone.
I don’t miss it.
So yeah. Go vote. You can listen to this episode on your way to the polls, or as you wait.
If you aren’t American there is still value in this episode regardless, replace “voting machine” with “public facing machine”, replace “Counting votes” with “something that is private and shouldn’t be shared or have results tampered with.” and there you go. Baby, You’ve got a stew going. You’ve got a perfectly good show for any country!
So this episode is all about the vulnerabilities in voting machines. We aren’t here to give a historical perspective, though I agree it would be really interesting, We are here to give you the information security side of the coin.
Bloatware is out there. Swelling and expanding and taking up your valuable valuable resources and stealing your car keys and taking the family sedan out for joyrides in the middle of the night.
So I guess we should make a podcast explaining it.
DONE! That’s right, We’re going to EXPAND on the topic of BLOATware. Heh. Ugh.
Bloatware is the software installed on your new electronics direct from the manufacturer under the guise of “improving your user experience” In reality it might improve the price you pay slightly but otherwise often has very little benefit.
But we’ll get into that I don’t want to jump the gun.
I don’t want to mislead anyone. We only thought of the title at the end so there are no hootie puns throughout the episode. I am sure we could have included some references to I only wanna be with you or let her cry or something. Those jokes pretty much make themselves when you’re talking bloatware.
In case you’re wondering about Superfish. Yeah, that’s also a thing, I wasn’t just trying to avoid litigation. If you want to know more you should probably fire up your favorite listening device or devices, I am not here to limit you, and give it a digital spin.