Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

NTP Podcasts

show episodes
 
Artwork

1
NTP Podcast

NewyTechPeople

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the NTP Podcast. Each episode highlights the incredible work of talented tech professionals in Australia. We chat with people who are at the top of their game to learn all about their craft—why they’re passionate about their work and what resources help power their success. By delving into their experiences, we gain insights into the constantly evolving tech scene, explore how it has changed, and see where it may be headed.
  continue reading
 
Welcome to Engineering Success! This NTP podcast features some of the brightest engineering and manufacturing minds in the Hunter region and beyond. Join us for insightful conversations with the folks behind the region's most exciting projects. We'll dive into their career stories, the challenges they've faced, and the awesome tech they're working on. Whether you're in the industry or just curious, Engineering Success will give you a peek into the vibrant world of local engineering and manuf ...
  continue reading
 
Artwork

1
IBS Freedom Podcast

Dr. Nicole DiNezza, DC, NTP and Amy Hollenkamp, RD

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
You can treat your gut without restrictive, awful diets... You can trust us to show you how! Whether you're newly diagnosed with IBS or a veteran, the IBS Freedom Podcast will provide clarity for your healing journey. Each week your IBS experts will cover topics within the world of IBS including small intestinal bacterial overgrowth (SIBO), leaky gut syndrome, dysbiosis, the low FODMAP diet, candida, and so much more.Meet your hosts!- Dr. Nicole DiNezza, DC, NTP is a functional medicine doct ...
  continue reading
 
Artwork
 
A K12TechPro Podcast. This podcast is about trending K12 technology topics and issues. Josh, Chris, and Mark have real conversations, real arguments, and real banter on IT issues and trends in K12 Schools. Current and Past Sponsors: Absolute, Arista, HPE Aruba Networking, Blocksi, Chromebookparts.com, ClassLink, CTL, Eaton, Extreme Networks, Fortinet, Howard Technology Solutions, iDoc, Infoblox, INVZBL, Jupiter Education, Lightspeed Systems, Luma Technologies, Managed Methods, NTP, Papercut, ...
  continue reading
 
Artwork

1
Women of Calibre

Claire Fowler NTP

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This is a podcast for all the girls and women, who've ever worked for an employer or for themselves. I want to hear about your experiences of the workplace, whether it's virtual or a physical place you have to show up to every day and what it's like for you on a day-to-day basis. In the first series of episodes, I share my experience of working in a male-dominated industry in the UK. I worked as a consultant in Building Engineering and after nearly 15 years, I decided to take my talent, my e ...
  continue reading
 
Artwork
 
Welcome to the "Healthy Mom, Happy Home" podcast, a heartwarming and insightful exploration of holistic well-being for moms who believe that when they thrive, their families flourish. Hosted by Nutritional Therapy Practitioner Jenna Huff, a passionate advocate for both health and motherhood. This podcast is a place for moms seeking to embrace a healthy and joyful living, as we dive into the world of self- care, holistic health, and family life.
  continue reading
 
Artwork

1
Small Steps

Aimée Suen, NTP

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Aimée Suen, Nutritional Therapy Practitioner Nutritional Therapy Practitioner, multi-passionate creative and mixed race woman of color is here to help mono and multiracial women of color get clear on what health and wellness truly means to them and leave the dominant narratives behind to feel aligned, empowered, and seen, one small step at a time. This podcast will share a health at every size, diet-free, social justice and culturally informed approach to health and wellness, as well as touc ...
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork

1
Digitally Diverse

NewyTechPeople

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Digitally Diverse! This podcast takes a deep dive into the journeys of the movers and shakers in the design and tech industry with the help of host Ellen Bennett. Join us as we sit down with industry leaders, innovators, and creative minds to explore their unique career paths, the lessons they've learned, and the fascinating stories they have to share. Whether you're a seasoned professional, a budding designer, or simply curious about the digital landscape, our episodes offer insi ...
  continue reading
 
Artwork

1
The Between Meals Podcast

Beth Manos Brickey, RYT, NTP

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Between Meals Podcast features Beth Manos Brickey, FNTP, RWS, RYT, of TastyYummies.com. Food and nutrition, while very important, this is JUST ONE piece of a much larger puzzle. Movement, stress, sleep, emotions, spirit, community, play – these are just as crucial to our wellness and vitality. And should too, be investigated as both potential causes and as cures. What happens between meals is equally as important to our health. We are complex machines. Our system is a delicate symphony o ...
  continue reading
 
The Network+ Audio Course is your comprehensive audio training series for mastering the CompTIA Network+ certification. Designed for learners on the go, this Audio Course transforms exam objectives into clear, structured, and engaging episodes tailored for auditory learning. Whether you're walking, commuting, or studying between shifts, each episode breaks down complex networking topics into digestible segments aligned with the official CompTIA blueprint. From OSI layers and IP addressing to ...
  continue reading
 
Artwork

1
Number Two Podcast

Lourdes and Tello

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Number Two Podcast is the journey of two cousins from a dysfunctional Latino family trying to make it through life by laughing at it. Support this podcast: https://podcasters.spotify.com/pod/show/numtwopod/support
  continue reading
 
Artwork

4
The Balanced Babes Podcast

Amanda Montalvo & Kim Perez

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We're Kim & Amanda- functional nutritionists on a mission to help women learn how to nourish their bodies, balance their hormones, and feel good in their skin. Tune in every Wednesday to hear expert interviews with the best in women's health, Q&A episodes where we answer listener questions, and our deep dive episodes where we pick a topic and share our expertise. Join our Balanced Babes Community on Facebook where listeners can gather, relate, and connect with one another.
  continue reading
 
Do you worry you won’t get pregnant, stay pregnant, or have a healthy baby? Infertility rates are on the rise. Women are waiting until later in life to start a family. It is more important than ever to start understanding exactly how to take control of your fertility. Your host is Kristin Cornett, a functional nutritional therapy practitioner and fertility specialist at Tiny Feet. She dives deep into the true causes of infertility and what you can do to get your health and fertility back on ...
  continue reading
 
Loading …
show series
 
From a childhood without electricity to co-founding a listed betting company, Oliver Shanahan’s story is a masterclass in technical grit and commercial pivots. As the Group Head of Cybersecurity and Infrastructure at BetMakers Technology Group, Oliver traces his path from wiring up early ISPs and mining ERPs to building TopBetta from a two-person L…
  continue reading
 
What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu website was compromised last weekend and served malware https://floss.social/@bluesabre/115401767635718361 Squid Pro…
  continue reading
 
SANS Stormcast Wednesday, October 22nd, 2025: NTP Pool; Xubuntu Compromise; Squid Vulnerability; Lanscope Vuln; What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu webs…
  continue reading
 
Steve Heaton, founder of Xetla Consulting and co‑inventor at STAR Scientific, is demystifying the messy, exhilarating reality of R&D. In conversation with Melinda, Steve traces his winding path from Unix systems and project management to astronomy, particle physics, and muon‑catalyzed fusion, showing how curiosity compounds into career-defining opp…
  continue reading
 
Send us a text Courtney shares her transformative experience attending Dr. Joe Dispenza's advanced retreat and how it deepened her understanding of the mind-body connection for healing chronic conditions. • Six-day intensive retreat featuring 38 hours of meditation • Foundation in energy work and Chinese medicine provided helpful context • Dr. Joe …
  continue reading
 
Holy MFA, Batman! This week, the guys discuss the sentencing of the individual behind the PowerSchool data breach, the recent AI weapons detection system that mistook a bag of chips for a gun and prompted police response, and Mark's Batman mask. Yes, it's Halloween time! The main segment is an interview with the tech team from Tahoe-Truckee Unified…
  continue reading
 
X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are supposed to identify the researcher conducting the scans https://isc.sans.edu/diary/X-Request-Purpose%3A%20…
  continue reading
 
SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are sup…
  continue reading
 
How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like dd do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems/32432 Microsoft Azure Front Door Outage Today, Microsoft s Azure Front Door servi…
  continue reading
 
SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like "dd" do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%2…
  continue reading
 
Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line…
  continue reading
 
SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters…
  continue reading
 
Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vulnerability Unifi fixed a critical vulnerability in it s Access product https://community.ui.com/releases/Secu…
  continue reading
 
SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vul…
  continue reading
 
Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysis tool Kaitai Struct is now available in a web only version https://isc.sans.edu/dia…
  continue reading
 
SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysi…
  continue reading
 
In this episode, we debrief last week’s Campus Guardian Angel interview, dig into Google’s new policy to delete inactive accounts after two years, and reflect on the recent AWS/DNS outage that impacted services. Then, K12TechPro's Hayden the New Guy brings multiple on‑site interviews from the MOREnet conference! Tech Department Salary Survey View t…
  continue reading
 
Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu/diary/Infostealer%20Targeting%20Android%20Devices/32414 Attackers exploit recently patched Adobe Commerce Vulnerability CVE-2025-542…
  continue reading
 
SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu…
  continue reading
 
webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans.edu/diary/webctrlcgiBlue+Angel+Software+Suite+Exploit+Attempts+Maybe+CVE202534033+Variant/32410 Oracle Critical Patch…
  continue reading
 
SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability. webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans…
  continue reading
 
In this episode of Tech Execs, James MacDonald heads to Melbourne to sit down with Matt Vitale, former co-founder of Australia’s largest equity crowdfunding platform and now Executive Director at New Dialogue. Matt traces his winding path from nightlife promoter and sugarcane juice tinkerer to financial services lawyer, then startup pioneer, where …
  continue reading
 
Using Syscall() for Obfuscation/Fileless Activity Fileless malware written in Python can uses syscall() to create file descriptors in memory, evading signatures. https://isc.sans.edu/diary/Using%20Syscall%28%29%20for%20Obfuscation%20Fileless%20Activity/32384 AWS Outages AWS has had issues most of the day on Monday, affecting numerous services. http…
  continue reading
 
SANS Stormcast Tuesday, October 21st, 2025: Syscall() Obfuscation; AWS down; Beijing Time Attack Using Syscall() for Obfuscation/Fileless Activity Fileless malware written in Python can uses syscall() to create file descriptors in memory, evading signatures. https://isc.sans.edu/diary/Using%20Syscall%28%29%20for%20Obfuscation%20Fileless%20Activity/…
  continue reading
 
In this episode, hosts Amy and Nikki dive into a controversial discussion about folic acid and folate supplements, challenging common beliefs held within the functional medicine community. They explore the role of folate in human health, debunk myths around the MTHFR gene mutation, and emphasize the potential benefits of folic acid. They discuss va…
  continue reading
 
TikTok Videos Promoting Malware InstallationTikTok Videos Promoting Malware Installation Tiktok videos advertising ways to obtain software like Photoshop for free will instead trick users into downloading https://isc.sans.edu/diary/TikTok%20Videos%20Promoting%20Malware%20Installation/32380 Google Ads Advertise Malware Targeting MacOS Developers Hun…
  continue reading
 
SANS Stormcast Monday, October 20th, 2025: Malicious Tiktok; More Google Ad Problems; Satellite Insecurity TikTok Videos Promoting Malware InstallationTikTok Videos Promoting Malware Installation Tiktok videos advertising ways to obtain software like Photoshop for free will instead trick users into downloading https://isc.sans.edu/diary/TikTok%20Vi…
  continue reading
 
Send us a text Dr. James Kneller, cardiologist and cardiac electrophysiologist, unveils the overlooked connection between gut health and cardiovascular disease, challenging conventional approaches to high cholesterol and blood pressure. Despite decades of pharmaceutical interventions, deaths from hypertensive heart disease have increased 450% since…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play