Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

DRM Podcasts

show episodes
 
I'm Tim French and I think video game preservation is important. As is accessibility to those games. This art form is stunted by short-sighted business decisions and gamers who don't expect enough out of their purchases. This podcast is my contribution to the conversation around this exciting yet frustrating industry. We will cover emulation, piracy, FOMO (Fear of Missing Out), monetization, DRM, internet requirements, etc. I will define what it means for a game to be Virtually Immortal. Sup ...
  continue reading
 
Artwork

1
Self-Directed Research

OneVariable GmbH

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
This is the Self-Directed Research Podcast! Our hosts, James and Amos, host hyper focused technical deep dives Visit sdr-podcast.com/ for more information about the podcast, check out all episodes and learn about who we are and how to support us! Questions, comments, interested in sponsoring? Send an email to [email protected]
  continue reading
 
The A+ Audio Course is your full-spectrum audio study guide for the CompTIA A+ certification (Core 1 and Core 2). Whether you're brand new to IT or brushing up before exam day, this podcast breaks down every topic in the official exam objectives into clear, structured, and accessible episodes. Each lesson focuses on what matters most—helping you understand, retain, and apply essential IT concepts, from hardware and networking to operating systems, security, troubleshooting, and professional ...
  continue reading
 
Hello and welcome to my new podcast for movie opinions and my views on upcoming movies and how Studios are doing with their movies my episodes will be shorter than 10 minutes but may run longer depending on the topic
  continue reading
 
Artwork

1
The Navin Purohit Show

Navin Purohit, Channel Head, IND24

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Inspiring Conversations with Changemakers & Unsung Heroes: Discover the Power of Impactful Stories in The Navin Purohit Show Welcome to The Navin Purohit Show, where we celebrate extraordinary individuals who are creating meaningful change in our society! This podcast goes beyond the headlines to spotlight unsung heroes, innovators, and influencers who are shaping the world around us. Join Navin Purohit as he dives deep into candid conversations with remarkable guests, exploring their unique ...
  continue reading
 
Artwork

1
Free as in Freedom

Free as in Freedom

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A bi-weekly discussion of legal, policy, and other issues in the open source and software freedom community (including occasional interviews) from Brooklyn, New York, USA. Presented by Karen Sandler and Bradley M. Kuhn.
  continue reading
 
Advancing Health Systems in Low and Middle Income Countries Podcast. This podcast series aims to help listeners appreciate why health finance and governance must be addressed when working to improve health outcomes, and will include episodes which delve into the dynamics of topics like domestic resource mobilization for health, expanding access to healthcare through insurance, and the importance of “good governance” in creating responsive, patient-centered health systems. The Health Finance ...
  continue reading
 
Loading …
show series
 
Bhopal DRM Pankaj Tyagi ने भारतीय रेलवे के आधुनिकीकरण का खुलासा किया | The Navin Purohit | Podcast Bhopal के DRM Pankaj Tyagi भारतीय रेलवे के आधुनिकीकरण के दृष्टिकोण को साझा करने के लिए The Navin Purohit Show में शामिल हुए और इस बात पर प्रकाश डाला कि तेज़ी से विकसित हो रहे भारत की माँगों को पूरा करने के लिए यह कैसे बदल रहा है। भाप इंजनों के विकास स…
  continue reading
 
The Navin Purohit Show में IPS Officer Riyaz Iqbal के जीवन की झलक दिखाते हुए, उनके अटूट समर्पण और दृढ़ता की दुनिया में कदम रखें। यह प्रेरणादायी वार्ता आपके लिए वर्दीधारियों द्वारा सामना की जाने वाली चुनौतियों, ज़िम्मेदारियों और सफलताओं पर एक विशेष बातचीत लेकर आया है। नक्सलवाद से निपटने से लेकर कानून प्रवर्तन में Artificial Intelligence (A.I.) जैसी …
  continue reading
 
जानें कि कैसे Madhya Pradesh ने Jabalpur में भारत का सबसे लंबा केबल-आधारित फ्लाईओवर बनाकर एक अभूतपूर्व उपलब्धि हासिल की! The Navin Purohit Show के इस विशेष एपिसोड में, Navin Purohit, वरिष्ठ BJP नेता और Madhya Pradesh के PWD मंत्री राकेश सिंह के साथ एक विचारोत्तेजक बातचीत में इस प्रतिष्ठित बुनियादी ढांचा परियोजना के पीछे की दृष्टि, चुनौतियों और अभिन…
  continue reading
 
BJP के "संकटमोचक" Dr. Narottam Mishra से खास बातचीत | The Navin Purohit Show | Podcast Madhya Pradesh के पूर्व गृह मंत्री और भारतीय जनता पार्टी (BJP) के एक प्रतिष्ठित नेता डॉ. नरोत्तम मिश्रा के एक विशेष और विचारोत्तेजक एपिसोड के लिए The Navin Purohit Show में हमारे साथ जुड़ें। BJP के "संकटमोचक" कहे जाने वाले डॉ. मिश्रा भारतीय राजनीति में नेतृत्व, स…
  continue reading
 
Chhattisgarh स्वास्थ्य असमानता से कैसे निपट रहा है! | The Navin Purohit Show | Podcast Chhattisgarh में स्वास्थ्य असमानता को दूर करने के लिए क्या कदम उठाए जा रहे हैं? जानिए "The Navin Purohit Show" पर, जहाँ Chhattisgarh सरकार के स्वास्थ्य मंत्री श्री श्याम बिहारी जायसवाल जी के साथ एक प्रेरणादायक वार्ता हुई। इस विशेष बातचीत में उन्होंने स्वास्थ्य से…
  continue reading
 
GOG is a digital distribution platform with a mission to preserve video games. I spoke with 3 employees Piotr(Senior PR), Marcin (Senior Business Developer) and Adam(Technical Producer). #gog #gamepreservation #pcgaming SOCIAL MEDIA WEBSITE - https://www.gog.com/en/ X - @GOGcom NOTE: Unfortunately the guys had some technical and internet issues, so…
  continue reading
 
Automating tasks and supporting systems remotely are part of modern IT workflows. In this episode, we begin with scripting—specifically .bat and PowerShell scripts—and explain how they’re used to automate routine tasks like file transfers, user creation, or system reboots. Then we introduce remote access tools like R D P and S S H, showing how they…
  continue reading
 
Protecting sensitive data requires not only digital safeguards but also physical and procedural awareness. This episode teaches you how to properly handle confidential information, whether it's on printed documents, storage devices, or screens. We cover methods like locked cabinets, badge-restricted rooms, and screen privacy filters to prevent unau…
  continue reading
 
Technical skills are vital, but soft skills are what turn technicians into trusted professionals. This episode focuses on communication techniques that improve user experiences and foster trust. We start with active listening—how to give users your full attention and confirm your understanding through paraphrasing and clarification. Then we cover t…
  continue reading
 
This episode explores the legal and ethical responsibilities of handling data and software in IT environments. We start with licensing—understanding the difference between OEM, volume, and subscription licenses, and how misuse can result in compliance violations. Then we discuss Digital Rights Management (DRM), which limits copying or modifying med…
  continue reading
 
Maintaining the physical environment around IT systems is just as important as managing the systems themselves. This episode begins with ventilation and cooling requirements—how airflow affects server performance, what happens when heat builds up, and how to monitor environmental thresholds. We explain how to position equipment in racks, monitor fo…
  continue reading
 
Keeping yourself and your equipment safe is foundational to effective IT work. This episode covers essential safety practices beginning with Electrostatic Discharge (E S D) prevention—why grounding matters and how to properly use wrist straps, mats, and anti-static bags. We explain how improper handling can damage sensitive components like CPUs, RA…
  continue reading
 
This episode focuses on the backup strategies and data recovery techniques that every IT professional must know. We begin with the Grandfather-Father-Son (GFS) backup rotation model, explaining how it balances data redundancy and storage space. Then we dive into the 3-2-1 rule—keeping three copies of your data, on two different media types, with on…
  continue reading
 
Change is a constant in IT, but managing that change responsibly is what keeps systems stable. This episode introduces the formal change management process, starting with the identification of proposed changes and their potential impact on systems, users, and business operations. You’ll learn about documentation requirements, stakeholder approvals,…
  continue reading
 
There’s more than one kind of documentation in I T, and this episode explains the major types that appear on the A Plus exam. We start with Acceptable Use Policies (AUPs), which define what users are permitted to do with company devices and networks. These documents are key to setting boundaries and providing grounds for enforcement. Next, we cover…
  continue reading
 
Keeping track of hardware, software, and configuration data is vital for organizations of all sizes, and this episode explores how asset and inventory management supports that effort. We begin with physical asset tracking—using labels, barcodes, and location databases to monitor laptops, desktops, and peripherals. Then we move into software invento…
  continue reading
 
This episode focuses on the importance of clear, consistent documentation in every phase of IT support. We begin by explaining ticketing systems—how they track user requests, service histories, resolutions, and follow-up actions. You’ll learn what makes a good ticket entry, including timestamps, concise descriptions, and links to previous cases. We…
  continue reading
 
The final domain in the Core 2 exam is Operational Procedures, and this episode introduces its wide-ranging content. You’ll learn what this domain includes: documentation standards, safety procedures, communication skills, licensing and privacy concerns, and basic scripting. While these topics may seem non-technical, they are just as important for …
  continue reading
 
Malware isn’t limited to desktops. In this episode, we explore the types of malicious threats that target mobile devices. We begin with adware, spyware, and malicious apps that gain access to sensitive permissions—like camera, microphone, or SMS—without the user’s knowledge. Then we explain the concept of rooting or jailbreaking, which removes manu…
  continue reading
 
Mobile devices introduce their own unique troubleshooting challenges, particularly when it comes to application behavior. In this episode, we start with app crashes—why they happen, how to review logs or force close misbehaving apps, and what steps to take before uninstalling. Then we examine connectivity issues within apps, such as those that rely…
  continue reading
 
Successfully removing malware requires following the right sequence, and this episode lays out that process according to CompTIA’s expectations. We begin with identification—recognizing that malware is present—followed by isolating the system from the network to prevent spread. Then we quarantine the malicious files using antimalware software and p…
  continue reading
 
Security issues don’t always come with flashing warnings—sometimes they hide behind subtle behavior. This episode helps you identify the symptoms that often indicate malware or unauthorized access. We begin with security alerts—both real and fake—and how to distinguish between legitimate warnings and scareware popups. Then we cover unexplained file…
  continue reading
 
When something breaks in Windows, there are several tools you can use to restore functionality, and this episode breaks them down step by step. We begin with the System File Checker (SFC), which scans and repairs corrupted or missing system files using known-good versions. Next, we explain DISM and when to use it alongside or instead of SFC to fix …
  continue reading
 
This episode covers some of the most common and dramatic symptoms you'll face when troubleshooting Windows systems. We begin with the infamous Blue Screen of Death—also known as BSOD—explaining what causes it, how to interpret error codes, and what logs or tools to use when diagnosing the issue. Then we move into boot problems, such as systems gett…
  continue reading
 
Troubleshooting software problems is a core responsibility in IT, and this episode introduces Domain 3.0 of the Core 2 exam. You’ll learn what kinds of software issues are covered, including application crashes, boot problems, security alerts, and general OS instability. We explain how this domain connects to others, such as security and user suppo…
  continue reading
 
Properly disposing of storage media is a critical part of data security, and this episode outlines the methods you need to know. We begin with data wiping—using software to overwrite existing files—and explain why a single delete or format isn’t enough. Then we move on to degaussing, which uses magnetic fields to scramble data on hard drives and ma…
  continue reading
 
Mobile and embedded devices require a tailored approach to security, and this episode explains how to apply protections without compromising usability. We begin with passcodes, biometrics, and auto-lock timers as primary defenses. Next, we explore mobile device management (MDM), including how organizations use it to enforce encryption, remotely wip…
  continue reading
 
Securing a user’s workstation is about more than antivirus—it involves a full spectrum of proactive configurations. This episode outlines best practices for maintaining a secure endpoint. We begin with patch management, including automatic updates and reboot scheduling, then move to account management, such as disabling unused accounts and enforcin…
  continue reading
 
In this episode, we cover two important mechanisms for managing user access and security: User Account Control (UAC) and Single Sign-On (SSO). We begin with UAC—how it prompts users before executing administrative tasks, how to configure its sensitivity level, and what role it plays in limiting malware execution. Understanding UAC’s purpose and beh…
  continue reading
 
Securing a system starts with built-in operating system tools, and this episode walks you through three key Windows security features. First is Windows Defender, which provides real-time protection against malware, network attacks, and unwanted software changes. We explain how to configure scanning, quarantines, and exclusion lists. Next is BitLock…
  continue reading
 
This episode explains the technical underpinnings of some of the most dangerous threats and vulnerabilities in modern systems. We start with zero-day exploits, where attackers take advantage of unknown software flaws before patches can be released. These are especially damaging because traditional defenses often can’t detect them. Next, we explore …
  continue reading
 
Not all threats are technical—some are psychological. This episode focuses on social engineering attacks, which trick users into revealing information or granting access through manipulation rather than code. We start with phishing, covering both traditional email attacks and newer variants like spear phishing and smishing. You’ll learn what signs …
  continue reading
 
Preventing malware infections involves more than just scanning files—it’s about layering multiple defenses. In this episode, we start with antivirus and antimalware software, explaining how they use signature detection, heuristic analysis, and behavioral monitoring to stop threats. We describe how these tools are managed, updated, and configured fo…
  continue reading
 
This episode dives into the various types of malicious software, or malware, that technicians must be able to recognize and address. We begin with viruses, which attach to legitimate files and require user interaction to spread, then move into worms, which self-replicate across networks and can bring down systems without any user action. We explain…
  continue reading
 
Authentication protocols ensure that users are who they say they are, and this episode covers three of the most important ones for the A Plus exam. We begin with RADIUS—Remote Authentication Dial-In User Service—and explain how it centralizes authentication for wireless and VPN access. Next, we look at TACACS Plus, a Cisco-designed protocol that se…
  continue reading
 
Wireless security standards are a frequent source of exam questions, and this episode breaks down the differences between key protocols. We start with WPA2 and WPA3, explaining how each provides encryption and authentication for wireless traffic, and why WPA3 is considered more secure with protections like forward secrecy and better brute-force res…
  continue reading
 
This episode introduces Active Directory (AD), Microsoft’s central system for managing users, computers, and security in domain-based environments. We explain how AD organizes resources into domains, trees, and forests, and how Group Policy Objects (GPOs) are used to enforce settings across multiple systems automatically. You'll learn about domain …
  continue reading
 
In this episode, we move into the digital layer of defense, exploring logical security techniques that help ensure users access only what they’re authorized to. We start with multi-factor authentication (MFA), detailing its components—something you know, have, or are—and why it’s so effective. Then we look at access control lists (ACLs), which defi…
  continue reading
 
Protecting physical assets is the first line of defense in cybersecurity, and this episode explores the methods used to safeguard devices and facilities. We begin with door locks, cable locks, and biometric scanners—tools used to restrict access to equipment and data. Then we move into mantraps and security guards, which provide controlled entry to…
  continue reading
 
This episode introduces Domain 2.0 of the Core 2 exam: Security. We provide an overview of the key areas covered, including physical security measures, logical access controls, malware prevention, authentication protocols, and data destruction practices. You’ll hear how CompTIA frames security as both a technical and procedural discipline that must…
  continue reading
 
This episode focuses on disk setup and system maintenance—key areas tested on the A Plus exam and vital for support professionals. We begin with partitioning: the process of dividing a physical disk into logical sections. You’ll learn the difference between MBR and GPT partitioning, and how to configure primary, extended, and logical partitions usi…
  continue reading
 
Installing an operating system requires choosing the right method for the environment, and this episode explores all the major approaches. We start with the most familiar: bootable USB drives created using tools like Rufus or the Windows Media Creation Tool. Then we introduce PXE booting, which allows network-based installations using a centralized…
  continue reading
 
Operating systems, like all software, go through a defined life cycle—from launch to end of support—and this episode walks you through what each stage means. We begin by outlining the general stages: mainstream support, extended support, and end of life. You’ll learn how these stages affect security updates, driver support, and vendor troubleshooti…
  continue reading
 
This episode explores the filesystems used by various operating systems, each with its own capabilities and use cases. We begin with NTFS, the default for Windows, explaining its support for file permissions, compression, encryption, and large volume sizes. Then we cover exFAT, which bridges compatibility between Windows and macOS, and is commonly …
  continue reading
 
Not all operating systems are created equal, and this episode explores the strengths, purposes, and distinctions among the most common ones. We start with Windows—still the dominant OS in enterprise environments—and explore its versatility, support base, and administration tools. Next, we cover macOS, highlighting its tight hardware integration and…
  continue reading
 
This episode focuses on the broader implications of application use and performance in business environments. We begin by analyzing how resource-hungry applications can affect system performance—leading to slow response times, overheating, or reduced battery life. We also examine how apps may consume excessive network bandwidth, resulting in conges…
  continue reading
 
Installing software isn’t just about double-clicking an installer anymore—it can come from a wide range of sources and methods. In this episode, we explore the most common installation types: local setup files, network shares, Group Policy deployment, and web-based installers. We also discuss digital storefronts like the Microsoft Store and their a…
  continue reading
 
Before installing software, it’s essential to confirm that a system meets the application’s requirements. This episode explains how to assess compatibility based on OS version, architecture, memory, storage, and graphics capabilities. We also cover how to interpret software documentation and compare it against system specs to avoid installation fai…
  continue reading
 
This episode explores a variety of network connection types and how they're configured or supported within a Windows environment. We begin with Virtual Private Networks (VPNs)—how they provide secure tunneling for remote access and what authentication methods are commonly used. Next, we explain proxy settings and their effect on web access and appl…
  continue reading
 
IP addressing is the foundation of network communication, and this episode provides a deep dive into how it's configured on Windows systems. We explain how to assign a static I P address manually, including setting the subnet mask, default gateway, and primary and secondary DNS servers. Then we show how to switch back to dynamic addressing using DH…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play