Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Windows Server Podcasts

show episodes
 
Artwork

1
Compiler

Red Hat

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Compiler gives you perspectives and insights from the tech industry—free from jargon and judgment. We’re here to help tech newbies understand what’s going on. Learn more about our show at redhat.com/en/compiler-podcast
  continue reading
 
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
Artwork

1
Linux Out Loud

TuxDigital Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Linux Out Loud is a community powered podcast. We take conversations from the Community from places like the Discourse Forums, Telegram group, Discord server and more. We also take topics from other shows around the network to give our takes. Linux Out Loud podcast is brought to you by the TuxDigital Network (https://tuxdigital.com/)!
  continue reading
 
Artwork

1
Extreme Gaming Podcast

Extreme Gaming Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
In this podcast we are a group of everyday gamers who don’t take life to seriously, we like to have a laugh and talk about the games and tech that we love across all gaming platforms. We cover gaming/hardware news, games we’ve played and our own general views whilst often going off on wild tangents. We also run a free Discord server called 'Extreme Gaming Podcast' (https://discord.gg/extremegamingpodcast) or search for us on Google. Our aim is to grow and build a great community whilst havin ...
  continue reading
 
In this podcast ArticHost will show you how to get started with Virtual Private Servers, and then take you through setting them up under our platform. We will go through Windows VPS and Linux VPS instant setup. Our goal is to provide our customers, and general Virtual Server users with knowledge to get started. https://www.artichost.com/ Also check out the review blog https://techstat.net/
  continue reading
 
Artwork
 
Humorous technology demonstrations tackling design, implementation, and support of IT infrastructures. Presented by our resident geeks using video and screencasting. Nicky Curtis an IT consultant, and Microsoft Certified Trainer specialises in enterprise technologies. Nicholas Hill introduces alternative open source solutions.
  continue reading
 
Artwork

1
HowTo Linux OGG

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Artwork

1
Knee-deep in Tech

Alexander Arvidsson, Simon Binder, Heini Ilmarinen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Knee-Deep In Tech is a weekly technology podcast covering IT and technology, focusing on the Microsoft stack. We are three MVPs and Microsoft Certified Trainers with between us over 40 years of IT infrastructure experience. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
HowTo Linux MP3

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Artwork

1
Iron Sysadmin Podcast

@IronSysadmin

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
  continue reading
 
Artwork

1
Rob Lilleness

Rob Lilleness

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Robert Lilleness, also known as Rob Lilleness, is a prominent figure in the technology industry, renowned for his transformative leadership and impressive track record. He began his tech career at Microsoft, contributing to the development of Windows NT Server. Over the years, Lilleness has held executive and board roles, leaving a significant impact on companies like Panopto and Cremo Company.
  continue reading
 
Artwork

1
TechSNAP Large Video

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
TechSNAP Mobile Video

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
TechSNAP in HD

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
With more than 30 years of experience covering Microsoft, Directions on Microsoft provides unique perspectives about the shifts in Microsoft technologies, roadmaps and licensing policies that matter most to enterprise-size companies. Twice each month industry veteran Mary Jo Foley interviews a different Directions analyst for informed insights and advice to help you derive full value from your Microsoft investments.
  continue reading
 
Artwork

1
Unpacking Software

Chocolatey Software, Inc.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join our monthly Unpacking Software livestream to hear about the latest news, chat and opinion on packaging, software deployment and lifecycle management! Ask your question in the #ama-questions channel of our Community Hub Discord at https://ch0.co/community.
  continue reading
 
The UK's leading small business cybersecurity podcast helping SMEs protect against cyber threats without breaking the bank. Join cybersecurity veterans Noel Bradford (CIO at Boutique Security First MSP) and Mauven MacLeod (ex-UK Government Cyber Analyst) as they translate enterprise-level security expertise into practical, affordable solutions for UK small businesses. 🎯 WHAT YOU'LL LEARN: - Cyber Essentials certification guidance - Protecting against ransomware & phishing attacks - GDPR comp ...
  continue reading
 
Artwork

1
Cloudy SH

supporthost

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We Cloudy SH doing our Episodes to distribute awareness of Latest Cloud Technologies available in the Industry and Doing interview of entrepreneur having Business In Cloud Hosting industry. We also do Cloud Orchestration Automation and Consulting based on Popular Cloud Service Providers like AWS, Azure and GCP. We steadily grown from the last couple of years of experience and Publishing Technical Articles, videos related to Cloud Hosting. It will be useful and interesting for those New at Cl ...
  continue reading
 
Loading …
show series
 
This week on Linux Out Loud, we're plugging into the source! We kick things off with a look at the wild world of robotics competitions, from the destructive Norwalk Havoc Robot League to updates on our local FLL and FTC teams. Then, we dive into a heated discussion on the great Endianness debate shaking up the RISC-V community and what the 90-10 ru…
  continue reading
 
Building Better Defenses: RedTail Observations Defending against attacks like RedTail is more then blocking IoCs, but instead one must focus on the techniques and tactics attackers use. https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Sonicwall: It wasn t the user s fault Sonicwall admits to…
  continue reading
 
In this episode of the Extreme Gaming Podcast, the crew dives into the latest gaming hardware news, including AMD's upcoming Fluid Motion Frames 3 and the anticipated RTX 50 Super Series launch. They also discuss the impact of AI in gaming and healthcare, and share insights on the Xbox Game Pass price changes. Tune in for engaging discussions and a…
  continue reading
 
Polymorphic Python Malware Xavier discovered self-modifying Python code on Virustotal. The remote access tool takes advantage of the inspect module to modify code on the fly. https://isc.sans.edu/diary/Polymorphic%20Python%20Malware/32354 SSH ProxyCommand Vulnerability A user cloning a git repository may be tricked into executing arbitrary code via…
  continue reading
 
Oracle E-Business Suite 0-Day CVE-2025-61882 Last week, the Cl0p ransomware gang sent messages to many businesses stating that an Oracle E-Business Suite vulnerability was used to exfiltrate data. Initially, Oracle believed the root cause to be a vulnerability patched in June, but now Oracle released a patch for a new vulnerability. https://www.ora…
  continue reading
 
More .well-known scans Attackers are using API documentation automatically published in the .well-known directory for reconnaissance. https://isc.sans.edu/diary/More%20.well-known%20Scans/32340 RedHat Patches Openshift AI Services A flaw was found in Red Hat Openshift AI Service. A low-privileged attacker with access to an authenticated account, fo…
  continue reading
 
Comparing Honeypot Passwords with HIBP Most passwords used against our honeypots are also found in the Have I been pwn3d list. However, the few percent that are not found tend to be variations of known passwords, extending them to find likely mutations. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Comparing%20Honeypot%20Passwords%20with%20HIBP/…
  continue reading
 
Episode 300 marks six years of Extreme Gaming Podcast. We celebrate with community shout‑outs, surprise voice clips, and plenty of laughs, then dig into gaming and hardware news, PS5 updates, Xbox Ally, and the handheld console craze. Hands‑on impressions: Borderlands 4, Black Ops 7, Escape from Duckov, OD Knock and Fortnite. We get real on mental …
  continue reading
 
Sometimes you don t even need to log in Applications using simple, predictable cookies to verify a user s identity are still exploited, and relatively recent vulnerabilities are still due to this very basic mistake. https://isc.sans.edu/diary/%22user%3Dadmin%22.%20Sometimes%20you%20don%27t%20even%20need%20to%20log%20in./32334 Western Digital My Clo…
  continue reading
 
How do you know if one of your accounts has been part of a security breach? Richard chats with Troy Hunt about HaveIBeenPwned, a free service that allows individuals to receive notifications when their accounts appear in a security breach. Troy discusses other services available alongside HaveIBeenPwned for sysadmins, including password checking, i…
  continue reading
 
Join Steve Goodman and Paul Robichaux as they discuss Microsoft’s latest AI updates – from Copilot Chat coming to all Microsoft 365 apps (no license required) to Teams getting AI agents in meetings, channels, and communities. They also warn about the rise of “AI-generated workslop” cluttering our workflows, and dig into why many Copilot pilot proje…
  continue reading
 
Apple Patches Apple released patches for iOS, macOS, and visionOS, fixing a single font parsing vulnerability https://isc.sans.edu/diary/Apple%20Patches%20Single%20Vulnerability%20CVE-2025-43400/32330 Increase in Scans for Palo Alto Global Protect Vulnerability (CVE-2024-3400). Our honeypots detected an increase in scans for a Palo Alto Global Prot…
  continue reading
 
Converting Timestamps in .bash_history Unix shells offer the ability to add timestamps to commands in the .bash_history file. This is often done in the form of Unix timestamps. This new tool converts these timestamps into a more readable format. https://isc.sans.edu/diary/New%20tool%3A%20convert-ts-bash-history.py/32324 Cisco ASA/FRD Compromises Ex…
  continue reading
 
Webshells Hiding in .well-known Places Our honeypots registered an increase in scans for URLs in the .well-known directory, which appears to be looking for webshells. https://isc.sans.edu/diary/Webshells%20Hiding%20in%20.well-known%20Places/32320 Cisco Patches Critical Exploited Vulnerabilities Cisco released updates addressing already-exploited vu…
  continue reading
 
Join us as we explore game reviews of Silent Hill F, Dune Awakening, and Hell Is Us. What's up with Nvidia's $5 billion investment in Intel and the latest on the Tencent vs. Sony lawsuit. Join our Discord: ⁠https://discord.gg/extremegamingpodcast Look for us on YouTube, Spotify and all good podcast services. #silenthillf #duneawakening #hellisus #n…
  continue reading
 
Our trust in the internet is the lowest it’s ever been. In spite of our vigilance, we face more threats than ever before. Product security is a vital element in the defense against malicious incursions. This season of Compiler covers the particulars of product security. With some help from Emily Fox, Portfolio Security Architect at Red Hat, our hos…
  continue reading
 
Exploit Attempts Against Older Hikvision Camera Vulnerability Out honeypots observed an increase in attacks against some older Hikvision issues. A big part of the problem is weak passwords, and the ability to send credentials as part of the URL. https://isc.sans.edu/diary/Exploit%20Attempts%20Against%20Older%20Hikvision%20Camera%20Vulnerability/323…
  continue reading
 
Distracting the Analyst for Fun and Profit Our undergraduate intern, Tyler House analyzed what may have been a small DoS attack that was likely more meant to distract than to actually cause a denial of service https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Distracting%20the%20Analyst%20for%20Fun%20and%20Profit/32308 GitHub s plan for a more secur…
  continue reading
 
You're down - is it your servers, or someone else's? While at the Kansas City Developers Conference, Richard sits down with Mandi Walls from Pager Duty about her experiences dealing with incidents involving vendor services. It might be your cloud provider, or some other SaaS element of a pipeline, or even an open-source library dependency in an imp…
  continue reading
 
CISA Reports Ivanti EPMM Exploit Sightings Two different organizations submitted backdoors to CISA, which are believed to have been installed using Ivanti vulnerabilities patched in May. https://www.cisa.gov/news-events/analysis-reports/ar25-261a Lastpass Observes Impersonation on GitHub Lastpass noted a number of companies being impersonated via f…
  continue reading
 
Tonight on GeekNights, we discuss fitness tech like heart rate monitors and Strava and Dance Dance Revolution. In the news, Tik Tok has a dubious deal to keep operating in the US and the regime has plans for the algorithm. Also go see Perfect Blue remastered while you can. And read The Amazing Adventures of Kavalier & Clay. Related Links Forum Thre…
  continue reading
 
Help Wanted: What are these odd requests about? An odd request is hitting a number of our honeypots with a somewhat unusual HTTP request header. Please let me know if you no what the request is about. https://isc.sans.edu/forums/diary/Help+Wanted+What+are+these+odd+reuqests+about/32302/ Forta GoAnywhere MFT Vulnerability Forta s GoAnywhere MFT prod…
  continue reading
 
This week on Linux Out Loud, the gang gets totally rad as they dial into the mainframe and get down to business! Nate and Bill go head-to-head in a network showdown, discussing the merits of building a custom, open-source network versus the "set it and forget it" convenience of prosumer gear. The team also tackles Nate's Framework Laptop firmware w…
  continue reading
 
Exploring Uploads in a Dshield Honeypot Environment This guest diary by one of our SANS.edu undergraduate interns shows how to analyze files uploaded to Cowrie https://isc.sans.edu/diary/Exploring%20Uploads%20in%20a%20Dshield%20Honeypot%20Environment%20%5BGuest%20Diary%5D/32296 Sonicwall Breach SonicWall MySonicWall accounts were breached via crede…
  continue reading
 
In this episode of the Extreme Gaming Podcast, we dive into the latest gaming news and controversies. We'll discuss the performance issues plaguing Borderlands 4, the anticipated release of GTA 6, the challenges of optimizing games for modern hardware, the impact of AI on SSD prices and the potential of new mini PCs. Tune in for a lively discussion…
  continue reading
 
CTRL-Z DLL Hooking Attackers may use a simple reload trick to overwrite breakpoints left by analysts to reverse malicious binaries. https://isc.sans.edu/diary/CTRL-Z%20DLL%20Hooking/32294 Global Admin in every Entra ID tenant via Actor tokens As part of September s patch Tuesday, Microsoft patched CVE-2025-55241. The discoverer of the vulnerability…
  continue reading
 
Why You Need Phishing-Resistant Authentication NOW. The recent compromise of a number of high-profile npmjs.com accounts has yet again shown how dangerous a simple phishing email can be. https://isc.sans.edu/diary/Why%20You%20Need%20Phishing%20Resistant%20Authentication%20NOW./32290 S1ngularity/nx Attackers Strike Again A second wave of attacks has…
  continue reading
 
The days of the one-year SSL certificate are coming to an end - are you ready? Richard chats with Todd Gardner about the upcoming requirement from the Certification Authority Browser Forum to limit SSL certs to 200 days starting March 2026 - and they keep getting shorter until by 2029, certificates will last no longer than 47 days! If you haven't a…
  continue reading
 
Apple Updates Apple released major updates for all of its operating systems. In addition to new features, these updates patch 33 different vulnerabilities. https://isc.sans.edu/diary/Apple%20Updates%20Everything%20-%20iOS%20macOS%2026%20Edition/32286 Microsoft End of Life October 14th, support for Windows 10, Exchange 2016, and Exchange 2019 will e…
  continue reading
 
Most small business owners think CIO stands for "Chief I-Fix-Everything Officer" and CISO means "Chief I-Worry-About-Security Officer." In this episode, Noel Bradford (actual CIO/CISO) breaks down what these executive roles actually do and why your business desperately needs this strategic thinking - without the six-figure salary. Discover how frac…
  continue reading
 
Web Searches For Archives Didier observed additional file types being searched for as attackers continue to focus on archive files as they spider web pages https://isc.sans.edu/diary/Web%20Searches%20For%20Archives/32282 FBI Flash Alert: Salesforce Attacks The FBI is alerting users of Salesforce of two different threat actors targeting Salesforce. …
  continue reading
 
Join Steve Goodman and Paul Robichaux as they unpack Microsoft’s latest Copilot Studio updates, including new licensing terminology, human-in-the-loop features, and real-time protection for AI agents. Plus, hear how Jan can help you test AI agents locally before deploying them in Microsoft 365, and get their take on Microsoft’s quiet reversal of it…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play