Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

UNIX Podcasts

show episodes
 
Artwork

1
Going Linux

Larry Bushey and Bill Smith

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Once you become aware that there is a dependable, secure, capable, and modern computer system that rivals all others in popularity and actual use, you will want to try the Linux operating system on your computer. Perhaps you've been using a member of the Unix/Linux family - Linux, Android, ChromeOS, BSD or even OSX - for quite a while. If so, you are likely looking for new ways to optimize your technology for the way you work. Going Linux is for computer users who just want to use Linux to g ...
  continue reading
 
Artwork

1
TuxHome Podcast

Thomas Joyce

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
TuxHome is a weekly podcast (usually released on Sunday or Monday) which provides reviews and announcements of the latest and greatest Linux and Unix operating systems, and Open Source applications to use with any operating system!
  continue reading
 
The nixers community podcast tries to tackle subjects that rotate around the world of unix in a novel way, linking ideas into an interesting discussion, seeing the big picture. http://podcast.nixers.net/what
  continue reading
 
Artwork

1
Command Line TV

Christopher League and Christian Lopes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Command Line TV is a video podcast to help you learn and master the Unix shell. Informally, ‘Unix’ refers to a family of operating systems that includes GNU/Linux, Mac OS X, and FreeBSD. Operating a computer via the command line gives you tremendous power and flexibility, but it’s not easy to learn. We’re here to help! We start from the beginning, but also try to include some tips suitable for intermediate users. Each video is about 20 minutes long, and we aim to release a new episode every ...
  continue reading
 
Artwork

1
SourceTrunk

Dimitri Larmuseau

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Sourcetunk will try to demystify the beautiful beast that is Open Source and show the listeners the more practical examples of Open Source and Free Software. It will discuss software for Linux, BSD, MacOSX and Microsoft Windows systems
  continue reading
 
Artwork

1
USENIX Invited Talks Podcast

USENIX Association

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The USENIX Invited Talks Podcast brings you industry leaders covering the latest in security, system administration, systems research, and more need-to-know technology topics. USENIX, The Advanced Computing Systems Association, has been the premier forum for presenting groundbreaking technology information for over 30 years. Check out excerpts from the luminary-led invited talks programs of past USENIX Conferences.
  continue reading
 
Artwork

1
MacEnterprise Podcast

The MacEnterprise Podcast Team

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Do you support Macs in an enterprise computing environment? Our goal is to bring the experience of a conference session to you by featuring knowledgeable and experience Mac system administrators as guests. We cover everything from client management and software deployment to AD integration, server management and more!
  continue reading
 
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and sta ...
  continue reading
 
Artwork
 
Jaron Swab, a software engineer, shares tips around Linux, programming, and open source. So you can stay on top of your privacy, security, and productivity. Discover what it means to be a hacker from a self taught software engineer. You'll learn how to land a tech job, amp up your computer efficiency, and leave behind the walled gardens of big tech. Since 2005, Jaron has exercised his love for coding and taking technology into his own hands. It's Jaron and a microphone; a one on one approach ...
  continue reading
 
Artwork
 
The Zero Prime Podcast with Pete Soderling explores the early stories of top startups as seen through the eyes of their engineer-founders. In each episode we uncover insights on what it takes to start a company as an engineer in the words of the founders themselves. From the most cutting edge infrastructure companies to the newest trends in developer tooling, we introduce you to the engineer-founder personalities behind the up and coming software startups that you can’t afford to ignore.
  continue reading
 
Cloud Out Loud is a weekly discussion forum for a variety of Ruby, open source and cloud related topics. Interesting conversations with passionate folks who dedicate their time and energy to advancing open source technology they believe in.
  continue reading
 
Loading …
show series
 
Hacktivists don’t need zero-days to hurt you—they weaponize people. Host Lieuwe Jan Koning sits down with Yuri Wit (SOC analyst) and Rob Maas (Field CTO) to dissect APT Handala: how they hunt targets, deliver wipers, and brag about leaks. We map their moves to the Lockheed Martin Kill Chain and turn it into a Zero Trust defense playbook you can act…
  continue reading
 
Tonight on GeekNights, we discuss fitness tech like heart rate monitors and Strava and Dance Dance Revolution. In the news, Tik Tok has a dubious deal to keep operating in the US and the regime has plans for the algorithm. Also go see Perfect Blue remastered while you can. And read The Amazing Adventures of Kavalier & Clay. Related Links Forum Thre…
  continue reading
 
The internet has been around for more than 40 years in some form. It's outgrown its ability to handle all of the hosts and fortunately, there's a solution. IPv6 is mature and wide-spread and not only does it increase the address space to 128-bits (up from 32-bits) it is also more efficient for routing and transferring data across the net and it's b…
  continue reading
 
Welcome to the world of version control with Git and GitHub! We will walk you through the essential steps to get you started, from creating an account to making your first contribution to a project. This powerful combination of tools is fundamental for software development, but it's also incredibly useful for tracking changes in any set of files, f…
  continue reading
 
On this episode of the Zero Prime podcast, tune in to our conversation with Eldad Farkash, Co-founder and Chairman of Firebolt. With over two decades in data architecture, Eldad spent 14 years as CTO of Sisense before building Firebolt into a next-generation data warehouse. Get a glimpse into Eldad’s approach as a rare founder who's built not just …
  continue reading
 
First documented case: AI inside the breach. Promptlock marks the first time malware has used AI during execution, not just in preparation. In this Threat Talks deep dive, Rob Maas (Field CTO, ON2IT) sits down with Yuri Wit (SOC Analyst, ON2IT) to break down how it works: a Go loader calling an attacker’s LLM in real time, generating fresh payloads…
  continue reading
 
Your tools say “secure.” Your headers say “leaking.” In this Threat Talks Deep Dive, ON2IT’s Luca Cipriano (CTI & Red Team Lead) exposes Data Bouncing—a stealthy exfiltration trick that hides inside HTTP headers and abuses DNS lookups through trusted third parties. We show the demo, decode the psychology of the attack, and translate it into Zero Tr…
  continue reading
 
Tonight on GeekNights, we talk about specific mice. Mice we've used over the years, since the days of balls. In the news, Google dodges consequences in the US but not in the EU, Google is sued yet again for their advertising monopoly, and Google is looking to flood the phone lines of tiny businesses. Related Links Forum Thread Specific Mice Discord…
  continue reading
 
Bill is hopping to a different distro (big surprise, right?)Non-Windows computer does not track is the best? Tuxedo, System76, Framework, Dell XPS Series, some Lenovo Thinkpads, Linux Certified, Entroware More emails on Accessibility, Problems with Linux Mint,a printer odyssey, pivot tables, Mint XFCE on an Acer Chromebook C720 ZHN, an unintended r…
  continue reading
 
Most programmers are comfortable in their IDE but still click through file managers and manually handle repetitive tasks outside of it. You might know basic command line navigation, maybe even write the occasional script, but you're missing the real superpower: composition - the art of connecting existing tools to solve complex problems without wri…
  continue reading
 
Playing it safe with AI sounds smart, but is banning it really how you prevent data leaks? In this episode of Threat Talks, ON2IT’s Lieuwe Jan Koning (ON2IT Co-Founder) sits down with Rob Maas, Field CTO at ON2IT, to tackle the hard question: How can CISOs and security leaders embrace AI safely—without exposing their organization to destructive dat…
  continue reading
 
Zero Trust step 5A is where monitoring turns raw logs into decisive action. Hosts Lieuwe Jan Koning and Rob Maas (Field CTO, ON2IT) expose why MDR alone isn’t protection—and how context closes the gap. Learn to inspect every event, use Indicators of Good/Compromise, and set Rules of Engagement that stop lateral movement and alert fatigue. (00:00) -…
  continue reading
 
Tonight on GeekNights, we talk about the modern marvel that is video chat. In the news, Perplexity is using undeclared crawlers to scrape content, Samsung has a crazy Micro LED TV, real life ad block is possible, and Trump is forming the American SS. The next GeekNights Book Club book will be The Running Man, by Richard Backman, who you may know be…
  continue reading
 
We talk about data types and their importance in software development. Modern dynamic languages hide type information from you but it's still there, under the hood. Statically-typed languages, on the other hand, bring types right out in front of you. What are the fundamental types and why are they important? What about user defined types and aggreg…
  continue reading
 
Of course you could install Linux on a spare computer if you have one. OK, to many people the prospect of installing a new operating system can be daunting. You could also try running from a live USB drive. But fortunately, there are straightforward methods to explore what Linux has to offer directly from your Windows environment without altering y…
  continue reading
 
Russia’s most notorious cyber unit—Seashell Blizzard (also known as Sandworm, APT 44 and Iron Viking)—has taken down shipping giants, Olympic systems, and Ukraine’s power grid. In this Threat Talks deep dive, Lieuwe Jan Koning, Yuri Wit (Red Team), and Rob Maas (Blue Team) reveal exactly how these attacks unfold, why they’re so hard to stop, and ho…
  continue reading
 
One mis-typed contact detonates Signal Gate, turning “secure” messaging into a classified-data leak.Host Lieuwe Jan Koning (Co-founder, ON2IT) and Thomas Manolis (Security Officer, AMS-IX) lay out the breach blow-by-blow—then drop the Zero Trust, Shadow IT and information-governance tactics every CISO needs before the next incident hits.High stakes…
  continue reading
 
Tonight on GeekNights, we discuss audio interfaces. Rym uses a PreSonus Studio 1810c to record GeekNights, and as his general purpose "sound card" in the studio. In the news, the CEO of GitHub steps down, you can consider Forgejo if that worries you, Reddit will block the Internet Archive, and Trump illegally forces the National Guard to deploy to …
  continue reading
 
If you’re expecting AI to write entire programs for you while you sit back and watch, we're going to disappoint you right up front—that’s not what these tools do well, and chasing that fantasy will waste your time. But what if we told you there’s a tool that could help you interpret cryptic error messages, navigate tricky syntax in unfamiliar langu…
  continue reading
 
ON2IT’s Lieuwe Jan Koning goes one-on-one with AMS-IX CEO Peter van Burgel to expose why the once-open internet is splintering into rival, firewalled regions. Discover the geopolitical forces fueling this cybersecurity trend. Learn the Zero Trust resilience moves CISOs must deploy to stay sovereign in the future of the internet.Key Topics Covered• …
  continue reading
 
In this episode we talk to Dwarak Rajagopal – VP of AI Engineering and AI Research at Snowflake. Hear from Dwarak as he traces his journey from optimizing AMD processors to building AI systems at Google and now revolutionizing enterprise AI at Snowflake – discussing the real-world challenges and opportunities for bringing AI to business application…
  continue reading
 
Administrative accounts come with serious power – and serious power, comes with serious risk. In part B of our deep dive into step four of Zero Trust (create Zero Trust policy), host Lieuwe Jan Koning and ON2IT Field CTO Rob Maas unpack how to build Zero Trust policies specifically for administrative access. They explore: 1) Why admins are a high-v…
  continue reading
 
If you need to connect to remote networks, or if you are outside of your network and would like to connect into it, then almost certainly you need a VPN. In this episode we talk about various ways to connect and list some of the issues that you might run into. Take-aways from the episode: There's a difference between a "VPN" and a "VPN Service" If …
  continue reading
 
Now that you’ve defined your protect surfaces, mapped your transaction flows and built your Zero Trust architecture, it’s time for step four of Zero Trust: creating policy. In other words, it’s time to turn strategy into actual rules. In this episode of Threat Talks, host Lieuwe Jan and Koning and Field CTO of ON2IT Rob Maas talk through how to cre…
  continue reading
 
What does quantum computing mean for blockchain? And how should platforms respond before Q-day becomes reality? In this episode of Threat Talks, ON2IT Field CTO Rob Maas is joined by Jeroen Scheerder, who leads ON2IT's post-quantum cryptography research group. They explore how quantum algorithms interact with current blockchain designs, what makes …
  continue reading
 
Tonight on GeekNights, we consider why there, broadly, aren't major consumer technology developments lately. In the news, Debian reduces support for i386 and Chrome OS is combining with Android. Also we'll be live at PAX West! Related Links Forum Thread Why there's no big tech news Discord Chat Why there's no big tech news Bluesky Post Why there's …
  continue reading
 
Your programs can be better. There are lots of ways to make them better. It all starts with figuring out what matters and measuring it. Measuring it all the time. Measuring it more. This episode is about following that path. Show notes: Take-aways from the episode: Understand what you are optimizing for: (speed,memory,storage,developer, etc…) Measu…
  continue reading
 
Bill tries ZFS. Our topics: Microsoft's support for Windows 10 is about to end - to keep your computer running a fully supported OS switch to Linux, Linux on Chromebooks, CD ripping, Cosmic Desktop Environment, Pivot tables, Linux and AI, Accessibility on Linux. Episode Time Stamps 00:00 Going Linux #469 · Listener Feedback 01:35 Bill tries ZFS 03:…
  continue reading
 
Windows Recall is a new feature in Windows 11 that captures screenshots every few seconds and stores them in a local database. It’s designed to help users find what they’ve seen or done: but that convenience may come at a high cost. In this episode of Threat Talks, ON2IT Field CTO Rob Maas speaks with security expert Jeroen Scheerder about the real…
  continue reading
 
Andy Grotto (founder and director of the Program on Geopolitics, Technology and Governance at Stanford University) puts it plainly: there's a 5% chance that within the next 10 years, AI could rule over humans. That number might sound small, but it's enough to take seriously. He joins host Lieuwe Jan Koning and guest Davis Hake (Senior Director for …
  continue reading
 
Tonight on GeekNights, we consider the blinky lights and LEDs the kids are putting on everything including their computers. In the news, Windows 10 has extended security support, Broadcom is desperate to monetize VMware, and the EU forced Apple to comply, at least in the EU. Related Links Forum Thread Blinky Lights Discord Chat Blinky Lights Bluesk…
  continue reading
 
When setting up a new system there's many things to think about including choosing the filesystem. In this episode, we dive into all of the choices and describe the benefits of each. Show notes Things to think about: For Linux, ext4 is the default for many distros and it's pretty good but btrfs has some really great benefits and you should consider…
  continue reading
 
Tonight on GeekNights, we consider toilets, washlets, and bidets. (Oh my). In the news, some context on the current Iran conflict, and Apple WWDC25 was mostly uneventful other than keeping old devices going for a while yet. Related Links Forum Thread Toilets and Bidets and Washlets Discord Chat Toilets and Bidets and Washlets Bluesky Post Toilets a…
  continue reading
 
It’s time to get practical. After identifying protect surfaces and mapping flows, the third step in Zero Trust is about designing the actual architecture.In this episode of Threat Talks, Lieuwe Jan and Rob Maas talk about segmentation, control selection, and why this is the most operational step in your Zero Trust journey.They cover:✅ Why segmentat…
  continue reading
 
From sovereign clouds to Zero Trust, and from cross-border investments to threat intelligence sharing, cooperation between the US and Europe is crucial, but still complex. With differing policies, fragmented markets, and varying strategies, the cyber world remains anything but unified.In this special episode of Threat Talks, Davis Hake (Senior Dire…
  continue reading
 
People throw around the term Functional Programming but it's not always clear what they mean. In this episode, we describe what it is and how you could already be doing it. Show notes and things to think about: Functional programing isn't academic. It isn't overwhelming. It isn't impossible to use. It isn't inapplicable to ordinary problems like th…
  continue reading
 
AI vs. Human Pentesting: Who Wins?What happens when you try to automate something that’s part science, part art? In an industry rushing to adopt AI for everything from detection to response, the real question is: can a machine truly replace the craft of a human pentester?In this episode of Threat Talks, host Lieuwe Jan Koning is joined by Melanie R…
  continue reading
 
Today, we're tackling a question we hear a lot: "How can I try Linux without messing up my current computer?" It's a great question, and the answer is often simpler than you might think. One of the easiest ways is to use a USB drive. Episode Time Stamps 00:00 Going Linux #468· How to try Linux without affecting your current system Pt. 1 02:20 Bill …
  continue reading
 
PLCs with default passwords. Devices searchable online. Siloed asset inventories. These OT challenges are common, but they’re also fixable. In this episode of Threat Talks, host Lieuwe Jan Koning sits down with Venable’s Caitlin Clarke and Schneider Electric’s Patrick Ford to discuss why the OT side of your business deserves the same focus and atte…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play