In-Depth Series: Privacy and Security
- Number of episodes: 60
- Open/closed: open
- Date of earliest show: 2008-06-19
- Date of latest show: 2021-01-01
- Series RSS feeds: ogg, spx, mp3
In this open series, you can contribute shows that are on the topic of Privacy and Security
Released: 2021-01-01. Duration: 00:16:18. Flag: Clean.
Tags: Linux, malware, ssh.
A look at how malware is now targeting Linux, especially servers
Released: 2020-12-22. Duration: 00:21:19. Flag: Clean.
Tags: cloud,nextcloud,owncloud,server.
Nextcloud is easy. You should try it.
Released: 2020-12-21. Duration: 00:02:00. Flag: Clean.
Tags: security, usb.
Turn a Thumb drive into a Key to lock/unlock your linux machine.
Released: 2020-10-14. Duration: 00:04:37. Flag: Clean.
Tags: pentesting,security,hacking,zip.
Zipfiles can contain all kinds of evilness and unpacking them can lead to unexpected results
Released: 2020-09-09. Duration: 00:20:01. Flag: Clean.
Tags: pentesting,security,hacking,biometrics.
A story about pentesting physical security
Released: 2020-09-04. Duration: 00:11:20. Flag: Clean.
Tags: LastPass, passwords, security, monitoring.
A recent update to LastPass added a Security Dashboard
Released: 2020-08-25. Duration: 00:13:45. Flag: Clean.
Tags: security, encryption, quantum computing.
NIST has concluded Round Two of the quantum encryption search and moved to Round Three
Released: 2020-08-20. Duration: 00:12:06. Flag: Clean.
Tags: pentesting,security,hacking.
How an insecure object reference lead to a covid-related databreach
Released: 2020-01-13. Duration: 00:23:10. Flag: Explicit.
Tags: fob,2fa,onlykey,security,computers.
Onlykey more like you better have two keys!
Released: 2020-01-10. Duration: 00:17:26. Flag: Clean.
Tags: Firefox, Sync, Container.
Some recent updates to Firefox that add useful features
Released: 2019-11-22. Duration: 00:14:21. Flag: Clean.
Tags: IT Management, Security.
Looking at an object lesson for proper IT management processes and the cost of failure
Released: 2019-07-19. Duration: 00:12:37. Flag: Clean.
Tags: Encryption, Quantum Computing.
How will quantum computing affect the security of encryption?
Released: 2019-07-05. Duration: 00:28:22. Flag: Clean.
Tags: Enterprise, Security.
What NIST suggests as a framework to improve security at the Enterprise level
Released: 2019-05-24. Duration: 00:22:17. Flag: Clean.
Tags: Home Networks, Security.
What CERT recommends to mitigate security and privacy threats to your home network.
Released: 2019-04-15. Duration: 00:25:23. Flag: Clean.
Tags: encryption.
Klaatu demonstrates how to use LVM and cryptsetup to create and use portable encrypted filesystems
Released: 2019-02-21. Duration: 00:07:40. Flag: Explicit.
Tags: craigslist, scam, con, social-engineering, puppy, dog, money, moneygram, infosec, cyber-security 101.
Helped a client avoid being scammed on Craigslist and wanted to share some tips to HPR.
Released: 2019-01-15. Duration: 00:07:47. Flag: Clean.
Tags: Information Security for Everyone.
How to do passwords better.
Released: 2018-12-19. Duration: 00:22:31. Flag: Clean.
Tags: pdf, ebook, bloat, print.
Klaatu talks about manipulating PDFs with gs and pdf-stapler
Released: 2018-12-13. Duration: 00:39:40. Flag: Clean.
Tags: design, steganography, scribus, layout.
Klaatu provides an overview of Scribus in part 1 of a mini-series about steganography
Released: 2018-05-25. Duration: 00:18:37. Flag: Clean.
Tags: GDPR,General Data Protection Regulation.
The GDPR becomes enforceable today and Ken gives an overview on what it is and how it effects you.
Released: 2018-05-21. Duration: 00:42:29. Flag: Clean.
Tags: trust,social engineering,gpg,pgp,community.
Quasi-philosophical musing about how trust is built both online and in real life
Released: 2018-04-27. Duration: 00:18:42. Flag: Clean.
Tags: Ephemeral Diffie-Hellman, Encryption, TLS.
TLS 1.3 is the newest protocol standard for secure communications on the Web.
Released: 2018-03-30. Duration: 00:17:41. Flag: Explicit.
Tags: Diffie-Hellman, Encryption, Forward Secrecy.
Using Diffie-Hellman Key Exchange to implement Forward Secrecy
Released: 2018-03-16. Duration: 00:20:31. Flag: Clean.
Tags: Diffie-Hellman, Encryption.
A basic explanation of how Diffie-Hellman-Merkle Key Exchange works
Released: 2016-08-26. Duration: 00:36:29. Flag: Clean.
Tags: SSL, Certificates, encryption.
A discussion of the problems with SSL certificates, and some solutions
Released: 2016-08-12. Duration: 00:41:02. Flag: Clean.
Tags: SSL, Certificates, encryption.
A discussion of how SSL certificates work
Released: 2016-01-08. Duration: 00:57:26. Flag: Clean.
Tags: LastPass, passwords, password vaults.
An expanded discussion of the LastPass intrusion as delivered at our LUG.
Released: 2015-12-17. Duration: 00:22:46. Flag: Clean.
Tags: ssh,port forwarding,router.
In HPR 1900, Ahuka suggests changing the default ssh port, I ask why not employ port forwarding?
Released: 2015-12-11. Duration: 00:18:39. Flag: Clean.
Tags: ssh, client, encryption, keys.
We introduce the idea of using public/private key pairs for authentication
Released: 2015-11-13. Duration: 00:16:49. Flag: Clean.
Tags: ssh, client, basics.
In this we tutorial explore the basics of making an ssh connection.
Released: 2015-11-04. Duration: 00:03:45. Flag: Clean.
Tags: Lastpass, keepass, password management.
How I do password management among my devices.
Released: 2015-10-28. Duration: 00:12:38. Flag: Explicit.
Tags: security, gpg.
Demonstration of using the diceware method of passphrase generation
Released: 2015-10-02. Duration: 00:18:35. Flag: Clean.
Tags: ssh, Telnet, server.
To learn ssh it helps to experiment, so this explains setting up a simple home server.
Released: 2015-09-04. Duration: 00:17:02. Flag: Clean.
Tags: ssh, Telnet, shell, security.
ssh is the secure way of connecting to a remote computer. This is an introduction to a mini-series.
Released: 2015-08-13. Duration: 00:08:20. Flag: Clean.
Tags: Privacy, security, passwords.
How to hide a password using a password card
Released: 2015-07-10. Duration: 00:23:00. Flag: Clean.
Tags: LastPass, password vault.
LastPass was hacked, but how bad is it?
Released: 2015-05-29. Duration: 00:15:11. Flag: Clean.
Tags: TrueCrypt, GnuPGP, support.
GnuPG and TrueCrypt updated, and how we support free software.
Released: 2015-03-18. Duration: 00:20:04. Flag: Explicit.
Tags: browser extensions,firefox,noscript,https everywhere,adblock edge,librejs.
Fin talks about his favourite browser extensions.
Released: 2015-03-06. Duration: 00:18:11. Flag: Clean.
Tags: TLS, SSL, Certificates.
A look at the problems that SSL certificates can have, and offers some solutions
Released: 2014-12-26. Duration: 00:17:40. Flag: Clean.
Tags: TLS, SSL, Certificates.
This episode looks at secure connections between users and Web sites.
Released: 2014-11-14. Duration: 00:20:31. Flag: Clean.
Tags: symmetric, asymmetric, encryption.
This episode looks the two kinds of encryption keys, and why to use each one.
Released: 2014-10-17. Duration: 00:21:33. Flag: Clean.
Tags: passwords, entropy.
This episode explores the best password practices from a mathematical viewpoint with recommendations
Released: 2014-09-17. Duration: 00:26:28. Flag: Clean.
Tags: hashing, passwords.
Understanding password security begins with understanding hashing.
Released: 2014-08-25. Duration: 00:28:18. Flag: Clean.
Tags: Security and Privacy series, cost/benefit.
This episode looks at a sensible model of obtaining the right amount of security for your needs.
Released: 2014-07-22. Duration: 00:31:05. Flag: Clean.
Tags: Security and Privacy series, cost/benefit.
This episode looks at a sensible model of obtaining the right amount of security for your needs.
Released: 2014-06-12. Duration: 00:18:37. Flag: Clean.
Tags: security, Open Source.
What is needed to have security in Open Source projects.
Released: 2014-06-05. Duration: 01:29:39. Flag: Clean.
Tags: GPG,email,Thunderbird,Enigmail,encrypt,sign.
Using GPG to encrypt or sign e-mail
Released: 2014-05-02. Duration: 00:28:53. Flag: Clean.
Tags: public key encryption,GPG,keyring,key signing,Mailvelope.
Ahuka and Tony Bemus discuss key signing and how you build a web of trust.
Released: 2014-04-30. Duration: 00:38:15. Flag: Explicit.
Tags: OpenVPN,Centos6,Debian.
John Duarte talks about setting up OpenVPN
Released: 2014-04-21. Duration: 00:21:37. Flag: Clean.
Tags: heartbleed,openssl,vulnerability,security.
A summary of the "Heartbleed" OpenSSL vulnerability
Released: 2014-04-07. Duration: 00:16:27. Flag: Clean.
Tags: encryption, email.
This looks at how you can use encryption to sign email and to privately secure it in Gmail.
Released: 2014-03-24. Duration: 00:05:00. Flag: Clean.
Tags: openssl,BlowFish,encryption.
@sigflup tells us how to Encrypt Your Stuff With Blowfish with openssl on the command line
Released: 2014-03-11. Duration: 00:23:41. Flag: Clean.
Tags: encryption, email.
Ahuka discusses using Thunderbird and Enigmail to send and receive encrypted email
Released: 2014-03-10. Duration: 00:24:17. Flag: Explicit.
Tags: Security,Privacy,PGP,key,key signing.
I wanted to get my GPG key signed so I joined the FOSDEM 2014 keysigning event
Released: 2014-03-06. Duration: 00:18:58. Flag: Explicit.
Tags: pager,privacy.
deepgeek advocates the use of a pager for privacy reasons
Released: 2013-12-27. Duration: 00:30:55. Flag: Clean.
Tags: security,GPG,key,kgpg,seahorse.
How to generate keys on the command line in Linux using GPG
Released: 2013-11-29. Duration: 00:22:18. Flag: Clean.
Tags: encryption,cryptography,"asymmetric public key cryptography",RSA.
The fundamentals of encryption and asymmetric public key cryptography
Released: 2013-11-06. Duration: 00:22:23. Flag: Clean.
Tags: privacy,security.
The need for privacy and the practicality of achieving it
Released: 2008-06-27. Duration: 00:08:18. Flag: Explicit.
Tags: privacy,quotes,philosophy,definition.
Talking about different ways to define privacy.
Released: 2008-06-19. Duration: 00:19:07. Flag: Explicit.
Tags: privacy,terrorists,paper,internet,"national security",theory.
This covers the paper around internet privacy. If we don't have anything to hide, why secure it?