Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Kernel Podcasts

show episodes
 
certainly entertaining and hopefully helpful we strive to cover the topics at the heart of the Linux gamer. From Proton to Vulkan, from Linux native to voiding the warranty. We discuss news and updates from the Linux community, our gaming habits and wanderings along with reviewing a game each week.
  continue reading
 
The Untitled Linux Show covers the week's hottest Linux news for desktop, gaming, and even enterprise. ULS is the weekly update you don't want to miss, from the latest kernel development to the updates on your favorite apps! Each episode finishes with a killer command line tip from each host. You can join Club TWiT for $10 per month and get ad-free audio and video feeds for all our shows plus everything else the club offers...or get just this podcast ad-free for $5 per month. New episodes ar ...
  continue reading
 
Artwork

1
Jackalope Tales on Radio Misfits

Charles Mooney, Lisa Umbarger

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Jackalope Tales pulls back the curtain on the strange, spooky, and sometimes shocking urban legends that lurk within the music industry. Hosts, and founding members of the platinum selling band Toadies, Charles Mooney and Lisa Umbarger explore the weird and wacky stories behind music’s biggest names. Some legends are too bizarre to be true, while others may have a kernel of truth buried beneath the hype. You’ll never listen to your favorite songs the same way again after you hear the outland ...
  continue reading
 
That's no moon; it's a podcast! Welcome to "The Nerds Podcast," where we delve deep into the realms of all things geeky and nerdy! Strap in for a hilarious journey through the worlds of movies, TV, and video games with your favorite nerdy hosts! In each episode, we bring you the juiciest reviews this side of the galaxy. From intergalactic space operas to epic superhero sagas, our hosts leave no popcorn kernel unturned. Don't forget our "Nerd News," segment. That Tyler Hunt scours the interwe ...
  continue reading
 
Artwork

1
The Podcorn Kernels

The Podcorn Kernels

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Join the Kernels as they discuss the pros and cons of movies they force each other to watch. Featuring original songs, unique games, and some movie trivia for good measure - The Podcorn Kernels Podcast is the perfect blend of creativity, comedy, and criticism. Cosy on down, and enjoy the carnage spawned from the Kernels chaotic craniums. (Listeners beware... may contain spoilers and swears.)
  continue reading
 
Welcome to ”Broadcasting Seeds,” the podcast that dares to delve into the depths of controversial, intriguing, and mind-expanding topics that skirt the edge of conspiracy, the supernatural, and the unexplained. Each episode plants a seed of curiosity, inviting you to explore the possibility that what is often dismissed as fringe or fantastical might hold a kernel of truth. From the existence of cryptids like Bigfoot and the implications of government UFO cover-ups to the mysteries of ancient ...
  continue reading
 
Artwork
 
We're trading in our controllers for some popcorn! Come on the movie watching adventure with Jon and Rose. Where they talk, "review", and ask the question, what is the kernel, the corn, and the pop?
  continue reading
 
Welcome to Betatalks the podcast, in which we talk with friends from the development community. We chat not only about technology, but what drives them, inspires them and makes them unique. Rick (Cloud Solution Architect at Microsoft) and Oscar (CTO at Virtual Vaults), invite developers, makers, Open Source maintainers and other amazing people from the .NET and Azure development community. Looking for more content? Have a look at our Betatalks video's.
  continue reading
 
Artwork

1
Ponders Over Popcorn

Emily Ward & Dora Holland

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Ponders Over Popcorn is a podcast about movies! Every other week, Dora and Emily talk about a different movie they seen recently, and…ponder, if you will, over the movie’s themes and ideas. They discuss a wide variety of films (and make a wide variety of bad jokes) but always like to try and get at the heart of each movie. At the end of the episode, they explain what “kernel of truth” they took away from the movie they watched.
  continue reading
 
Artwork

1
The Teardown

Dirty Mo Media, SiriusXM, Jeff Gluck

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
After the checkered flag waves each week, motorsports journalists from The Athletic, Jeff Gluck and Jordan Bianchi, offer instant reaction, analysis and debate straight from the racetrack.
  continue reading
 
It’s No Secret is a podcast for Kiwis who want their money questions answered. Are you wondering when the right time to get on the property ladder, whether you should invest with family or how to talk to your significant other about investing and budgeting? If yes, you’re in the right place. Join the Kernel team, alongside some special guests, as they take you through the ins and outs of all things finance, money, property, investing and building wealth so you can move towards achieving fina ...
  continue reading
 
Artwork

1
Rhythm & Brews

Andrew & Luke, Beer imbibers and music snoggers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Rhythm and Brews is the craft beer and music pairing podcast. In each episode, we match beers to music in an attempt to make the beer taste better, but in reality, we use it mostly to force people to listen to our questionable music tastes. Featuring great guests from the UK and international beer scenes, including the likes of The Kernel, Wander Beyond Brew, Signature Brew, Yeastie Boys, Fullers and Pete Brown.
  continue reading
 
Artwork
 
VoidStar Podcast is series where we talk to the top class achievers in tech and take a peek at the secrets to their excellence. Ever wondered how the top achievers got that good? Are they gifted people with extra-terrestrial abilities or are they mere mortals who share several drawbacks with the rest of us? In this podcast, I talk to top class achievers in tech and try to uncover any patterns in their habits, routines and approach. The interview format is an informal conversation with the gu ...
  continue reading
 
Welcome to Popcorn and Peril—where every kernel holds a deadly secret. Here, we serve up gripping tales of murder, mystery, and horror, each crafted to keep you on the edge of your seat. Narrated by AI, every episode takes you on a dark journey through crime and suspense, blending cinematic drama with spine-tingling intrigue.Whether you're a fan of twisted plots or a seeker of the sinister, Popcorn and Peril is your ultimate storytelling escape. So grab your popcorn, dim the lights, and prep ...
  continue reading
 
Artwork

1
The Exploring Antinatalism Podcast

Amanda Oldphan Sukenick

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Exploring Antinatalism Podcast is the world's first podcast dedicated to the subject of Antinatalism, created by Antinatalists! Antinatalism, (Or Anti-Natalism.) Is defined by Wikipedia as, “A philosophical position and social movement that assigns a negative value to birth.” The world of Antinatalism is very vast, and though most Antinatalists do share a kernel of the same core idea, what one Antinatalist believes from the next can be wildly different. What The Exploring Antinatalism Po ...
  continue reading
 
Artwork
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
Android Bytes (powered by Esper) is the podcast that dives deep into the engineering and business decisions behind the world’s most popular OS. https://www.esper.io Android powers over 3 billion devices worldwide and is the platform of choice for over a thousand companies. You’ll find Android on smartphones, tablets, watches, TV, cars, kiosks, and so much more. How does Google architect Android to run on so many form factors, and how do companies fork AOSP to make it run on even more devices ...
  continue reading
 
Artwork

1
Passing the Plate Podcast

Ashley Covelli and Lisa Lisson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Passing the Plate podcast is all about food, traditions, and the wonderful connections they create. Each week, co-hosts Ashley Covelli of Big Flavors from a Tiny Kitchen and Lisa Lisson of Are You My Cousin? will guide you on a flavor-packed adventure. Tune in to dive into family history, explore new cultures and cuisines, and preserve favorite recipes for future generations. Every episode of Passing the Plate guarantees to be a feast for the senses and a celebration of togetherness. Vis ...
  continue reading
 
ShipTalk is the podcast series on the ins, outs, ups, and downs of software delivery. This series dives into the vast ocean Software Delivery, bringing aboard industry tech leaders, seasoned engineers, and insightful customers to navigate through the currents of the ever-evolving software landscape. Each session explores the real-world challenges and victories encountered by today’s tech innovators. Whether you’re an Engineering Manager, Software Engineer, or an enthusiast in Software delive ...
  continue reading
 
Artwork

1
lwn-podcast

LWN Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Audio version of LWN.net articles. Maintained by third party, not related by LWN.net. Web-scrapping and audio conversion is done by the opensource project https://github.com/0xba1a/lwn-podcast
  continue reading
 
Artwork

1
MacResearch.org

David W. Gohara, Ph.D.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
MacResearch.org provides content for scientists designed to promote the use of Apple hardware and software in the sciences. MacResearch.org provides tutorials on Apple computing technology, forums for discussion, news and product reviews. MacResearch.org is a not-for-profit organization.
  continue reading
 
ACRO’s Good Clinical Podcast dives into topics vital to driving innovation in clinical research, from AI and other cutting-edge technology to regulatory topics that impact clinical trials around the world. ACRO's Sophia McLeod is joined by leaders from across the drug development industry to discuss the latest trends and what direction the industry must head to continue improving trials for patients
  continue reading
 
Loading …
show series
 
In this episode of Crowbar Kernel Panic, Bo and Josh break down the Top 5 homelab projects that aren’t just fun — they actually build real skills that can help you land (and grow in) an IT or DevOps career. We cover: How networking projects like Pi-hole, Unbound, and OpenSense teach fundamentals you’ll use in every IT job. Why virtualization with P…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Sep 8, 2025. (00:00) - Intro (00:20) - The MacBook has a sensor that knows the exact angle of the screen hinge (01:23) - Using Claude Code to modernize a 25-year-old kernel driver (02:42) - GPT-5 Thinking in ChatGPT (a.k.a. Research Goblin) is good at search (03:56) - I am giving up on Intel and…
  continue reading
 
Picture this: your server room has turned into a disco floor, and every drive is demanding its own spotlight. Thirty disks whirl in perfect sync, but then a rogue 31st struts in, and suddenly your operating system starts sweating like it’s at a math exam it didn’t study for. This episode dives into the hilarious chaos of kernels that choke on too m…
  continue reading
 
Microsoft is rethinking allowing endpoint security software to run in the Windows kernel (including third-party and Microsoft’s own endpoint security software). While there are benefits to running security software in the kernel, there are also serious downsides (see the CrowdStrike outage). Dan Massameno joins JJ and Drew on Packet Protector to ta…
  continue reading
 
Ransomware gangs are no longer just encrypting files and demanding payment—they are actively targeting the very defenses meant to stop them. Recent reports reveal a dramatic surge in the use of EDR killer tools, specialized malware designed to disable Endpoint Detection and Response (EDR) and antivirus systems at the kernel level. By silencing thes…
  continue reading
 
What happens when a rocket scientist decides to revolutionize home cooking? Meet Sheila Narayanan, founder of Simply Masala, whose remarkable journey took her from designing jet engines to creating innovative spice kits that make authentic Indian cuisine accessible to everyone. Join us as we chat about breaking down barriers to Indian cooking, the …
  continue reading
 
This episode explores the mysterious tale of the green children of Woolpit, who appeared in medieval England with green skin and an unknown language. The narrative delves into their arrival, the theories surrounding their existence, and the reasons why this story has endured through the centuries. It highlights the intersection of history and folkl…
  continue reading
 
In a major strategic move, Check Point Software Technologies has announced the acquisition of Lakera, a Zurich and San Francisco–based AI security firm founded by former Google and Meta AI researchers. Valued at around $300 million, the acquisition will close in late 2025 and serve as the foundation for Check Point’s new Global Center of Excellence…
  continue reading
 
A major supply chain attack is underway in the npm ecosystem. Dubbed Shai-Hulud, this worm-style campaign began with the compromise of the popular @ctrl/tinycolor package and has since infected at least 187 npm packages, including some published under CrowdStrike’s official account. The malware, designed to spread automatically, abuses the legitima…
  continue reading
 
A critical vulnerability has been uncovered in ChatGPT’s new calendar integration, exposing how attackers could exfiltrate sensitive user data—particularly emails—through a deceptively simple exploit. Security researchers at EdisonWatch, led by Eito Miyamura, demonstrated how a malicious calendar invitation could contain hidden instructions that Ch…
  continue reading
 
At Fal.Con 2025, CrowdStrike announced one of its boldest moves yet: the acquisition of AI security startup Pangea. The deal signals CrowdStrike’s intent to redefine the future of cybersecurity by protecting not just endpoints and networks, but the entire AI lifecycle. Pangea, founded in 2021, is known for cutting-edge tools like AI Guard, which pr…
  continue reading
 
Microsoft and Cloudflare have successfully dismantled RaccoonO365, a global phishing-as-a-service (PhaaS) operation that had been running for over a year. This criminal platform, marketed on Telegram and used by up to 200 subscribers, enabled attackers to craft realistic Microsoft 365 phishing campaigns, complete with fake login pages, email lures,…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Sep 17, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:18) - Top UN legal investigators conclude Israel is guilty of genocide in Gaza (01:38) - Shai-Hulud malware attack: Tinycolor and over 40 NPM packages compromised (02:51) - …
  continue reading
 
Things got messy on live TV — and we love it. In this episode, Charles revisits the infamous 1976 Sex Pistols interview with Bill Grundy, where Britain collectively clutched its pearls while punk officially announced itself to the world. Lisa brings the chaos stateside with the story of Jello Biafra and Tipper Gore going head-to-head on Oprah, turn…
  continue reading
 
Social engineering has reclaimed center stage as today’s most reliable intrusion vector—and it’s not just email anymore. Recent warnings from law enforcement and national cyber centers underscore how adversaries exploit human psychology to “log in, not hack in,” bypassing hardened perimeters with phishing, vishing (voice phishing) against IT help d…
  continue reading
 
The infamous Rowhammer vulnerability, long thought to be contained by new DRAM protections, has resurfaced with devastating force. Academic researchers, working with Google, have unveiled the Phoenix attack, a breakthrough Rowhammer variant that shatters the defenses of DDR5 memory chips. Despite the industry’s investment in Target Row Refresh (TRR…
  continue reading
 
Cybercriminals aren’t just breaking in—they’re borrowing your brand to do it. This episode dives into the critical intersection of brand protection, threat intelligence, and external attack surface management (EASM) and lays out a practical, intelligence-driven blueprint you can start applying today. We begin with the state of brand abuse: a sharp …
  continue reading
 
You can build effective, scalable detection pipelines using free and open-source tools like Zeek, Suricata, YARA, and Security Onion. Today on Packet Protector we welcome Matt Gracie, Senior Engineer at Security Onion Solutions — the team behind the open-source platform used for detection engineering, network security monitoring, and log management…
  continue reading
 
California’s Assembly Bill 566 (AB 566) has become one of the most hotly contested pieces of privacy legislation in the country. The bill would require universal “opt-out preference signals” in web browsers and mobile operating systems, allowing consumers to automatically block the sale and sharing of their personal data across the internet. Propon…
  continue reading
 
FinWise Bank is facing a double crisis—one of data security and another of public trust. Nearly 700,000 customers of American First Finance (AFF), a FinWise partner, were impacted by a massive data breach after a former employee improperly accessed sensitive records. The bank has responded with offers of free credit monitoring, but the damage to co…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the latest developments in Microsoft security technologies, particularly focusing on Entra and its features like Continuous Access Evaluation (CAE) and the integration of threat intelligence into the Global Secure Access (GSA) platform. They reflect on thei…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Sep 16, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:19) - Hosting a website on a disposable vape (01:23) - React is winning by default and slowing innovation (02:35) - Linux phones are more important now than ever (03:49) - m…
  continue reading
 
Kevin Sapiel Jr. shares his journey as the host of the podcast 'Where the Weird Ones Are,' exploring themes of the supernatural, mental health, and personal experiences with paranormal phenomena. He discusses his early encounters with strange occurrences, the motivation behind starting his podcast, and the importance of mental health in navigating …
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Sep 15, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:17) - You’re a slow thinker. Now what? (01:30) - Betty Crocker broke recipes by shrinking boxes (02:41) - Grapevine canes can be converted into plastic-like material that wi…
  continue reading
 
In this Betatalks episode, Rick and Oscar talk with Christian Peeters, a principal Cloud Architect at Betabit and a certified Microsoft trainer. They discuss the intersection of technology, teaching, and continuous learning in software development. They explore emerging tools like vector databases and Retrieval Augmented Generation (RAG), breaking …
  continue reading
 
Our first look at KDE Linux, then Chris shares the latest on Hyprvibe, while Wes braves his first install. Sponsored By: Managed Nebula: Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love. 1Password Extended Access Management: 1Password Extended Access Management is a device trust …
  continue reading
 
This week Microsoft Open Sources one of its oldest codebases, Firefox is blitzing its codebase, and Apache (the name) is no more. Pipewire, CUPS, and Fwupd all ships updates. Bcachefs's future is a bit uncertain, and VDPAU is certainly out of Mesa. For tips we have default handling with wpctl, server management with ansible, and Wine performance wi…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Sep 14, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:18) - Show HN: A store that generates products from anything you type in search (01:14) - Myocardial infarction may be an infectious disease (02:33) - Four-year wedding cras…
  continue reading
 
This episode explores the deeper meanings behind the sacrificial rituals in Leviticus, emphasizing the significance of blood as a currency in the supernatural economy, the role of the scapegoat, and the cosmic boundaries established through fire and smoke. It connects these ancient practices to the ultimate sacrifice of Jesus, illustrating how thes…
  continue reading
 
Episode 526: The Conjuring Last Rites Review – Tyler starts off the episode by discussing getting caught up with Bob’s Burgers and It’s Always Sunny in Philadelphia! Pat shares his thoughts on the new David Mackenzie film Relay. Tyler leads the discussion of the latest “Nerd News”...including a couple of new trailers (Wake up Dead Man, 28 Years Lat…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Sep 13, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:20) - EU court rules nuclear energy is clean energy (01:39) - The treasury is expanding the Patriot Act to attack Bitcoin self custody (02:57) - UTF-8 is a brilliant design …
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Sep 12, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:21) - Top model scores may be skewed by Git history leaks in SWE-bench (01:26) - Behind the scenes of Bun Install (02:44) - Why our website looks like an operating system (0…
  continue reading
 
In this engaging conversation, Chuckie Danger, host of the Danger Zone podcast, shares his insights into the ultraviolet spectrum and its connection to the paranormal, particularly Sasquatch encounters. He discusses personal experiences that led him to explore the unseen aspects of nature, including the role of mimicry in Sasquatch behavior and the…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Sep 11, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:19) - I didn't bring my son to a museum to look at screens (01:44) - Show HN: Term.everything – Run any GUI app in the terminal (02:52) - Pontevedra, Spain declares its enti…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Sep 10, 2025. (00:00) - Intro (00:21) - iPhone Air (01:37) - We all dodged a bullet (02:37) - Claude now has access to a server-side container environment (03:47) - E-paper display reaches the realm of LCD screens (04:54) - I replaced Animal Crossing's dialogue with a live LLM by hacking GameCub…
  continue reading
 
When the punks said “tear it up,” they weren’t talking about the setlist. In this episode, Charles dives headfirst into the chaos of a Dead Kennedys tour where things spiraled so far out of control that even Jello Biafra found himself on the wrong end of punk justice—blood, boots, and betrayal. Meanwhile, Lisa unpacks a festival hosted by GBH that …
  continue reading
 
Dewan Ahmed sits down with Fatih Bulut, AI Architect at Microsoft and former IBM Research Master Inventor, to separate hype from reality in AI for software delivery and cybersecurity. Fatih clarifies AI for security vs security for AI, walks through detection engineering as real software engineering, and explains proactive defense across an attack’…
  continue reading
 
Is any publicity good publicity? On today’s News Roundup we talk about how Salesloft, which makes the Drift chat agent that’s been used as a jumping-off point for credential harvesting and data breach attacks against a bunch of big-name companies, is testing that proposition. We also discuss bugs affecting industrial refrigeration controllers, and …
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam delve into the concept of FUD (Fear, Uncertainty, and Doubt) prevalent in the cybersecurity industry. They discuss the implications of sensationalized reporting, particularly around Windows Hello for Business vulnerabilities and the importance of adopting fish resistant multi…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Sep 9, 2025. (00:00) - Intro (00:18) - NPM debug and chalk packages compromised (01:31) - Signal Secure Backups (02:35) - iPhone dumbphone (03:44) - No adblocker detected (04:54) - Experimenting with Local LLMs on macOS (06:07) - Liquid Glass in the Browser: Refraction with CSS and SVG (07:11) -…
  continue reading
 
In this conversation, Seth Vandebroek, a full-time Bible Answer Man, shares his insights on high strangeness, the Nephilim, and various historical accounts of strange creatures. He discusses the three races of the Nephilim, the significance of biblical texts, and the implications of ancient history on modern understanding. The dialogue explores the…
  continue reading
 
In late August 2025, the open-source software ecosystem was rocked by a sophisticated two-phase supply chain attack, now known as “s1ngularity.” The incident began when attackers exploited a flaw in GitHub Actions workflows for the Nx repository, stealing an NPM publishing token and using it to release malicious versions of Nx packages. These packa…
  continue reading
 
Wealthsimple, one of Canada’s largest online investment platforms, has confirmed a data breach that exposed the sensitive information of fewer than 1% of its three million clients. The incident, detected on August 30, 2025, originated from a supply chain attack: a trusted third-party vendor’s compromised software package served as the entry point f…
  continue reading
 
In a year when cybercrime is projected to cost the world over $10.5 trillion, FireCompass has emerged as one of the most closely watched AI-driven cybersecurity innovators. The startup, founded in 2019, just secured $20 million in new funding—bringing its total raised to nearly $30 million. Backed in part by EC-Council’s Cybersecurity Innovation Fu…
  continue reading
 
A newly uncovered critical vulnerability, tracked as CVE-2025-42957, is sending shockwaves through the enterprise technology world. Affecting all SAP S/4HANA deployments, both on-premise and in private cloud environments, this ABAP code injection flaw carries a near-maximum CVSS score of 9.9. What makes it especially dangerous is its low complexity…
  continue reading
 
North Korean cybercriminals have escalated their social engineering operations, deploying a wave of sophisticated campaigns designed to infiltrate cryptocurrency and decentralized finance (DeFi) organizations. At the center of these operations is the “Contagious Interview” campaign, where hackers impersonate recruiters and trick job seekers into do…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play