Jan 21 2010
Somehow we’ve managed to get Martin, Rich, and me together on a fairly regular basis. Pretty impressive (superhero-like, even). It seems as though I was full of more beans than usual, taking a few playful jabs at Rich (something about goat smuggling) and Martin (butterfly tattoos, if I recall correctly). While we had a bit of fun, and actually talked about security, I get the overwhelming sense that schedules are about to go haywire again. Oh, well. C’est la vie!
- Redacting with Confidence: How to Safely Publish Sanitized Reports Converted From Word 2007 to PDF – the NSA’s guide to scratching that nasty metadata from your documents (this came from listener feedback)
- Official Google Blog: A new approach to China – They’re movin’ out — after intruders move in.
- The attack on Google: What it means – Andy Jaquith’s distillation and take on the debacle
- Does the Fourth Amendment cover ‘the cloud’? – You may think you own your data…
- Darpa: U.S. Geek Shortage Is National Security Risk – Call of Duty: Uncle Sam Needs Nerds
- Operation “Aurora” Hit Google, Others – McAfee’s George Kurtz discusses the coordinated attacks against Google and others
- An Insight into the Aurora Communication Protocol – McAfee’s analysis of the protocol used by the malware involved in “Operation Aurora”
- Microsoft Windows NT #GP Trap Handler Allows Users to Switch Kernel Stack – Tavis Ormandy drops some privilege escalation 0day affecting all NT-based versions of Windows from 3.1 to 7
- Tonight’s music: “Devil Comes to Town” by The Hillbilly Casino
Comments Off on Network Security Podcast, Episode 182