Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
JavaScript Jabber

Charles M Wood

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
  continue reading
 
Authmaker is a tool and a curriculum that provides guiding principals for developing full stack applications. This podcast aims to explore some of those guiding principles and help new and existing developers get up to speed with building web apps incredibly quickly. To find out more about what Authmaker is, listen to the first episode of this podcast where we explore that exact question.
  continue reading
 
Artwork

1
The Undefined Podcast

Jared Palmer & Ken Wheeler

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The only engineering podcast with a 2 drink minimum! Full stack developers Jared Palmer and Ken Wheeler have peer-to-peer conversations with world-class engineers about software development.
  continue reading
 
Welcome to the Backend Engineering Show podcast with your host Hussein Nasser. If you like software engineering you’ve come to the right place. I discuss all sorts of software engineering technologies and news with specific focus on the backend. All opinions are my own. Most of my content in the podcast is an audio version of videos I post on my youtube channel here http://www.youtube.com/c/HusseinNasser-software-engineering Buy me a coffee https://www.buymeacoffee.com/hnasr 🧑‍🏫 Courses I Te ...
  continue reading
 
Artwork

1
OpenHive.JS

NearForm

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The podcast for all things JavaScript, OpenHive.JS presents conversations with key contributors and open source leaders around new developments, challenges and perspectives in JS technology. Hosted by James Snell and Matteo Collina, OpenHive.JS publishes new episodes monthly and is produced and distributed by NearForm.
  continue reading
 
Artwork

1
Evrone development

From Evrone with love

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Evrone is an engineering company successfully delivering high-quality digital products for more than nine years. With extensive experience in a wide range of modern software technologies, we are here to help you to design unique complex web projects and startups. Our websites: https://evrone.com/ https://evrone.ru
  continue reading
 
Artwork

1
bestremoteteam

digitalrm

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Since its inception in 2011, Best Remote Team, an offshore web and mobile app development company, is offering high-quality offshore software and app development services by facilitating businesses with the right and skilled technical brains. You can hire a remote team of dedicated developers with the right skills and attitude for your project. Hire dedicated developers after a thorough screening process and a personal interview to find the best match as per your expectations.
  continue reading
 
Artwork

1
Seven Peaks Speaks

Seven Peaks Speaks

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Seven Peaks Speaks is brought to you by Seven Peaks Software with the goal to share knowledge and build an ecosystem in Bangkok and Asia for software engineering, design, and marketing related topics. Follow our Podcast Seven Peaks Speaks to not miss out on new episodes! Visit our Website http://www.sevenpeakssoftware.com for more information about Seven Peaks Software Email us for any inquiries at [email protected]
  continue reading
 
Artwork

1
Spotlight

Changelog Media

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Big announcements, conferences, the hallway track. We’re in the trenches having awesome conversations with real people from the community. This show features conversations from technology and software development events such as O’Reilly’s OSCON, All Things Open, Node Interactive (covering the Future of Node.js and JavaScript), and more. Hosts Adam Stacoviak and Jerod Santo talk to software engineers, keynote speakers, industry experts, and passionate attendees about open source, software ind ...
  continue reading
 
Artwork

1
Mechanical Ink Podcast

Open Source - Open Web - Open Standards - Accessibility

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The Mechanical Ink podcast is a podcast about the open-source ecosystem. We speak to project maintainers, open-source companies, and companies who play a critical role in ensuring a healthy ecosystem. We ask the tough questions but also celebrate the wins and acknowledge open-source software's critical role in the world. schalkneethling.substack.com
  continue reading
 
Loading …
show series
 
Today, we'll be talking about some must-know JavaScript features in 2025, Google's vibe coding platform, Firebase Studio, and more! Visit ThisWeekinJavaScript.com to subscribe to our Newsletter. Make sure you subscribe to the podcast for weekly updates and share this podcast with your friends!By Jam.dev
  continue reading
 
Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20…
  continue reading
 
Today, we'll be talking about some p5.js 2.0's latest update and overhaul, new experimental React 19 features, and 10 years of Solid.js and the revolutions that came along with it. Visit ThisWeekinJavaScript.com to subscribe to our Newsletter. Make sure you subscribe to the podcast for weekly updates and share this podcast with your friends!…
  continue reading
 
Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, publishe…
  continue reading
 
Jemima Abu, Senior Product Engineer at CAIS, joins the podcast to unpack her no-fluff approach to functional programming in JavaScript. From why predictable code matters to how higher-order functions like map and reduce can save your sanity, Jemima breaks down real-world lessons on purity, immutability, and when it's okay to not be a functional pur…
  continue reading
 
AI tools are transforming how developers write code, and although it’s difficult to pinpoint how much code is now AI-generated code, estimates suggest it’s between 20% and 40%, and this figure is poised to grow in the coming years. This evolution has given rise to a new coding paradigm in which developers act as directors, guiding and refining AI-g…
  continue reading
 
Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes https://isc.sans.edu/diary/Honeypot%20Iptables%20Maintenance%20and%20DShield-SIEM%20Logging/31876 XRPL.js Compro…
  continue reading
 
xorsearch.py: Ad Hoc YARA Rules Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches https://isc.sans.edu/diary/xorsearch.py%3A%20%22Ad%20Hoc%20YARA%20Rules%22/31856 Google Spoofed via DKIM Replay Attack DKIM replay attacks are a known i…
  continue reading
 
Glean is a workplace search and knowledge discovery company that helps organizations find and access information across various internal tools and data sources. Their platform uses AI to provide personalized search results to assist members of an organization in retrieving relevant documents, emails, and conversations. The rise of LLM-based agentic…
  continue reading
 
It's 2025, so why are malicious advertising URLs still going strong? Phishing attacks continue to take advantage of Google s advertising services. Sadly, this is still the case for obviously malicious links, even after various anti-phishing services flag the URL. https://isc.sans.edu/diary/It%27s%202025...%20so%20why%20are%20obviously%20malicious%2…
  continue reading
 
In this episode, we dive into a mix of recommendations and a behind-the-scenes look at our podcasting journey. First, we share our love for Revolutions, the podcast by Mike Duncan, where he takes listeners through major historical revolutions, from the English and French Revolutions to the Russian Revolution and beyond. It's a fascinating, deep div…
  continue reading
 
Microsoft Entra User Lockout Multiple organizations reported widespread alerts and account lockouts this weekend from Microsoft Entra. The issue is caused by a new feature Microsoft enabled. This feature will lock accounts if Microsoft believes that the password for the account was compromised. https://www.bleepingcomputer.com/news/microsoft/widesp…
  continue reading
 
Today, we'll be talking about some OpenAI's newest GPT 4.1, o3 and o4-mini models, their Codex CLI Programming AI Agent, Updates from the TC39 Conference, and Hako, a new 800KB JavaScript runtime. Visit ThisWeekinJavaScript.com to subscribe to our Newsletter. Make sure you subscribe to the podcast for weekly updates and share this podcast with your…
  continue reading
 
RedTail: Remnux and Malware Management A description showing how to set up a malware analysis in the cloud with Remnux and Kasm. RedTail is a sample to illustrate how the environment can be used. https://isc.sans.edu/diary/RedTail%2C%20Remnux%20and%20Malware%20Management%20%5BGuest%20Diary%5D/31868 Critical Erlang/OTP SSH Vulnerability Researchers …
  continue reading
 
Founder of VoidZero and founder of Vue and Vite Evan You joins us to talk about the evolution of JavaScript tooling, the success of Vite, and what's coming next with VitePlus — a unified toolchain aiming to simplify dev workflows. We also touch on Nitro, multi-runtime support, and where AI might (or might not) fit into the mix. Links https://evanyo…
  continue reading
 
Martin Hellman is an American cryptographer known for co-inventing public-key cryptography with Whitfield Diffie and Ralph Merkle in the 1970s. Their groundbreaking Diffie-Hellman key exchange method allowed secure communication over insecure channels, laying the foundation for modern encryption protocols. Hellman has also contributed to cybersecur…
  continue reading
 
Apple Updates Apple released updates for iOS, iPadOS, macOS, and VisionOS. The updates fix two vulnerabilities which had already been exploited against iOS. https://isc.sans.edu/diary/Apple%20Patches%20Exploited%20Vulnerability/31866 Oracle Updates Oracle released it quarterly critical patch update. The update addresses 378 security vulnerabilities…
  continue reading
 
Online Services Again Abused to Exfiltrate Data Attackers like to abuse free online services that can be used to exfiltrate data. From the originals , like pastebin, to past favorites like anonfiles.com. The latest example is gofile.io. As a defender, it is important to track these services to detect exfiltration early https://isc.sans.edu/diary/On…
  continue reading
 
Modern cloud-native systems are highly dynamic and distributed, which makes it difficult to monitor cloud infrastructure using traditional tools designed for static environments. This has motivated the development and widespread adoption of dedicated observability platforms. Prometheus is an open-source observability tool designed for cloud-native …
  continue reading
 
xorsearch Update Diedier updated his "xorsearch" tool. It is now a python script, not a compiled binary, and supports Yara signatures. With Yara support also comes support for regular expressions. https://isc.sans.edu/diary/xorsearch.py%3A%20Searching%20With%20Regexes/31854 Shorter Lived Certificates The CA/Brower Forum passed an update to reduce t…
  continue reading
 
In this episode, we dive into an engaging conversation with Kelvin, where we explore his approach to full-stack JavaScript development and the power of using simple, stable technologies to speed up app development. Kelvin shares his exciting project, "Project 50," where he’s challenging himself to build 50 apps in 50 days, highlighting the importan…
  continue reading
 
Exploit Attempts for Recent Langflow AI Vulnerability (CVE-2025-3248) After spotting individaul attempts to exploit the recent Langflow vulnerability late last weeks, we now see more systematic internet wide scans attempting to verify the vulnerability. https://isc.sans.edu/forums/diary/Exploit+Attempts+for+Recent+Langflow+AI+Vulnerability+CVE20253…
  continue reading
 
Network Infraxploit Our undergraduate intern, Matthew Gorman, wrote up a walk through of CVE-2018-0171, an older Cisco vulnerability, that is still actively being exploited. For example, VOLT TYPHOON recently exploited this problem. https://isc.sans.edu/diary/Network+Infraxploit+Guest+Diary/31844 Windows Update Issues / Windows 10 Update Microsoft …
  continue reading
 
Mitchell Hashimoto, founder of HashiCorp, joins us to talk about his latest project, Ghostty—a terminal that’s fast, feature-rich, and truly cross-platform. Mitchell shares the vision behind Ghostty, its architecture built around the libghosty core, how it's tackling long-standing limitations in terminal emulation, and why features like quake-style…
  continue reading
 
David A. Patterson is a pioneering computer scientist known for his contributions to computer architecture, particularly as a co-developer of Reduced Instruction Set Computing, or RISC, which revolutionized processor design. He has co-authored multiple books, including the highly influential Computer Architecture: A Quantitative Approach. David is …
  continue reading
 
Getting Past PyArmor PyArmor is a python obfuscation tool used for malicious and non-malicious software. Xavier is taking a look at a sample to show what can be learned from these obfuscated samples with not too much work. https://isc.sans.edu/diary/Obfuscated%20Malicious%20Python%20Scripts%20with%20PyArmor/31840 CenterStack RCE CVE-2025-30406 Glad…
  continue reading
 
Microsoft Patch Tuesday Microsoft patched over 120 vulnerabilities this month. 11 of these were rated critical, and one vulnerability is already being exploited. https://isc.sans.edu/diary/Microsoft%20April%202025%20Patch%20Tuesday/31838 Adobe Updates Adobe released patches for 12 different products. In particular important are patches for Coldfusi…
  continue reading
 
At Uber, there are many platform teams supporting engineers across the company, and maintaining robust on-call operations is crucial to keeping services functioning smoothly. The prospect of enhancing the efficiency of these engineering teams motivated Uber to create Genie, which is an AI-powered on-call copilot. Genie assists with on-call manageme…
  continue reading
 
XORsearch: Searching With Regexes Didier explains a workaround to use his tool XORsearch to search for regular expressions instead of simple strings. https://isc.sans.edu/diary/XORsearch%3A%20Searching%20With%20Regexes/31834 MCP Security Notification: Tool Poisoning Attacks Invariant labs summarized a critical weakness in the Model Context Protocol…
  continue reading
 
This episode is a little different—thanks to a U.S. holiday, I’m flying solo. But that just means we get to have a one-on-one chat! I dive into my career journey—not to brag, but to offer insights for anyone feeling stuck, of how my inventor grandfather sparked my early interest in tech, how I transitioned from electrical engineering to computer en…
  continue reading
 
Loading …
Listen to this show while you explore
Play