Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Windows Server Podcasts

show episodes
 
Artwork

1
Compiler

Red Hat

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Compiler gives you perspectives and insights from the tech industry—free from jargon and judgment. We’re here to help tech newbies understand what’s going on. Learn more about our show at redhat.com/en/compiler-podcast
  continue reading
 
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
Artwork

1
Linux Out Loud

TuxDigital Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Linux Out Loud is a community powered podcast. We take conversations from the Community from places like the Discourse Forums, Telegram group, Discord server and more. We also take topics from other shows around the network to give our takes. Linux Out Loud podcast is brought to you by the TuxDigital Network (https://tuxdigital.com/)!
  continue reading
 
Artwork

1
Extreme Gaming Podcast

Extreme Gaming Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
In this podcast we are a group of everyday gamers who don’t take life to seriously, we like to have a laugh and talk about the games and tech that we love across all gaming platforms. We cover gaming/hardware news, games we’ve played and our own general views whilst often going off on wild tangents. We also run a free Discord server called 'Extreme Gaming Podcast' (https://discord.gg/extremegamingpodcast) or search for us on Google. Our aim is to grow and build a great community whilst havin ...
  continue reading
 
In this podcast ArticHost will show you how to get started with Virtual Private Servers, and then take you through setting them up under our platform. We will go through Windows VPS and Linux VPS instant setup. Our goal is to provide our customers, and general Virtual Server users with knowledge to get started. https://www.artichost.com/ Also check out the review blog https://techstat.net/
  continue reading
 
Artwork
 
Humorous technology demonstrations tackling design, implementation, and support of IT infrastructures. Presented by our resident geeks using video and screencasting. Nicky Curtis an IT consultant, and Microsoft Certified Trainer specialises in enterprise technologies. Nicholas Hill introduces alternative open source solutions.
  continue reading
 
Artwork

1
HowTo Linux OGG

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Artwork

1
Knee-deep in Tech

Alexander Arvidsson, Simon Binder, Heini Ilmarinen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Knee-Deep In Tech is a weekly technology podcast covering IT and technology, focusing on the Microsoft stack. We are three MVPs and Microsoft Certified Trainers with between us over 40 years of IT infrastructure experience. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
HowTo Linux MP3

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Artwork

1
Iron Sysadmin Podcast

@IronSysadmin

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
  continue reading
 
Artwork

1
Rob Lilleness

Rob Lilleness

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Robert Lilleness, also known as Rob Lilleness, is a prominent figure in the technology industry, renowned for his transformative leadership and impressive track record. He began his tech career at Microsoft, contributing to the development of Windows NT Server. Over the years, Lilleness has held executive and board roles, leaving a significant impact on companies like Panopto and Cremo Company.
  continue reading
 
Artwork

1
TechSNAP Large Video

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
TechSNAP Mobile Video

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
TechSNAP in HD

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
In 10 minutes daily, The Business of Tech delivers the latest IT services and MSP-focused news and commentary. Curated to stories that matter with commentary answering 'Why Do We Care?', channel veteran Dave Sobel brings you up to speed and provides resources to go deeper. With insights and analysis, this focused podcast focuses on the knowledge you need to be effective, profitable, and relevant.
  continue reading
 
With more than 30 years of experience covering Microsoft, Directions on Microsoft provides unique perspectives about the shifts in Microsoft technologies, roadmaps and licensing policies that matter most to enterprise-size companies. Twice each month industry veteran Mary Jo Foley interviews a different Directions analyst for informed insights and advice to help you derive full value from your Microsoft investments.
  continue reading
 
Artwork

1
Unpacking Software

Chocolatey Software, Inc.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join our monthly Unpacking Software livestream to hear about the latest news, chat and opinion on packaging, software deployment and lifecycle management! Ask your question in the #ama-questions channel of our Community Hub Discord at https://ch0.co/community.
  continue reading
 
The UK's leading small business cybersecurity podcast helping SMEs protect against cyber threats without breaking the bank. Join cybersecurity veterans Noel Bradford (CIO at Boutique Security First MSP) and Mauven MacLeod (ex-UK Government Cyber Analyst) as they translate enterprise-level security expertise into practical, affordable solutions for UK small businesses. 🎯 WHAT YOU'LL LEARN: - Cyber Essentials certification guidance - Protecting against ransomware & phishing attacks - GDPR comp ...
  continue reading
 
Artwork

1
Cloudy SH

supporthost

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We Cloudy SH doing our Episodes to distribute awareness of Latest Cloud Technologies available in the Industry and Doing interview of entrepreneur having Business In Cloud Hosting industry. We also do Cloud Orchestration Automation and Consulting based on Popular Cloud Service Providers like AWS, Azure and GCP. We steadily grown from the last couple of years of experience and Publishing Technical Articles, videos related to Cloud Hosting. It will be useful and interesting for those New at Cl ...
  continue reading
 
Escape into real, immersive soundscapes—recorded in the wild. The Rest is Rest brings you high-fidelity field recordings from nature, creating an authentic auditory experience that helps with deep sleep, relaxation, focus, and mental health. Unlike artificial loops or synthetic sounds, our episodes transport you to real locations—from ocean shores to deep forests, from urban rooftops to mountain streams—captured with professional recording gear to provide a truly immersive slow audio experie ...
  continue reading
 
Loading …
show series
 
Polymorphic Python Malware Xavier discovered self-modifying Python code on Virustotal. The remote access tool takes advantage of the inspect module to modify code on the fly. https://isc.sans.edu/diary/Polymorphic%20Python%20Malware/32354 SSH ProxyCommand Vulnerability A user cloning a git repository may be tricked into executing arbitrary code via…
  continue reading
 
Kaseya made headlines at DattoCon by announcing its shift to becoming an “AI-first” company, highlighted by its acquisition of INKY, a generative AI email security provider. Alongside this, the company unveiled new Datto products and teased its upcoming Cyber Resiliency Platform for 2026. While Kaseya’s vision of unified, intelligent automation sou…
  continue reading
 
OpenAI has made significant strides in the AI landscape with a series of announcements that position it as a leading platform in the industry. The introduction of new models, including the GPT-5 Pro and Sora 2, alongside app integrations like Slack and a new Apps SDK, marks a pivotal moment for the company. These developments aim to enhance user in…
  continue reading
 
Enterprises are significantly increasing their investments in AI governance as the risks associated with artificial intelligence become more apparent. A recent report indicates that 98% of organizations plan to boost their governance budgets in the coming financial year, with an average expected increase of 24%. This shift highlights the realizatio…
  continue reading
 
Full transcript and links to extended interviews is at https://businessof.tech/podcast/datto-sues-slide-2025/ What happens when a founder returns to disrupt the company he built, and that company sues him for stealing its secrets? This is the central conflict in the case of Datto v. Slide, a legal battle unfolding in Delaware. Datto, now owned by K…
  continue reading
 
Oracle E-Business Suite 0-Day CVE-2025-61882 Last week, the Cl0p ransomware gang sent messages to many businesses stating that an Oracle E-Business Suite vulnerability was used to exfiltrate data. Initially, Oracle believed the root cause to be a vulnerability patched in June, but now Oracle released a patch for a new vulnerability. https://www.ora…
  continue reading
 
Waves pound the wild Atlantic coast during a storm off the remote Outer Hebrides, filling the air with thunderous crashes and rolling surf. Captured on location at a secluded cove, this soundscape conveys the raw power of the ocean — ideal for masking distractions, deep focus, or drifting into restful sleep. 🔹 Want More? ▶ Unlock 8-Hour Versions – …
  continue reading
 
Mal Vivek, founder and CEO of Zeb, discusses the rapid growth of her firm, which has become a leader in digital and AI transformation. Zeb has established itself as one of the fastest-growing AWS Premier Tier and Databricks partners, primarily by addressing the challenges small and medium businesses face in implementing AI solutions. Vivek emphasiz…
  continue reading
 
Diving into the evolving landscape of the partner ecosystem, the discussion centers around three major forces shaping the industry by 2030. First, cloud marketplaces are projected to reach $163 billion in transactions, with nearly 60% of that being partner-led. This shift signifies a redefinition of partner value in the marketplace era, moving beyo…
  continue reading
 
Perplexity has made a significant move by dropping the price of its AI browser, Comet, from $200 a month to free, igniting what could be an AI browser war. This decision aims to help users navigate the overwhelming amount of low-quality online content by providing tools to summarize web pages and extract key information. A $5 monthly subscription w…
  continue reading
 
More .well-known scans Attackers are using API documentation automatically published in the .well-known directory for reconnaissance. https://isc.sans.edu/diary/More%20.well-known%20Scans/32340 RedHat Patches Openshift AI Services A flaw was found in Red Hat Openshift AI Service. A low-privileged attacker with access to an authenticated account, fo…
  continue reading
 
Small to medium-sized businesses (SMBs) are significantly increasing their technology budgets, focusing on strategic investments that support long-term growth. According to a study by Forrester Consulting, 88% of SMBs plan to enhance their cloud strategies and cybersecurity through increased spending on third-party services. The study also highligh…
  continue reading
 
Comparing Honeypot Passwords with HIBP Most passwords used against our honeypots are also found in the Have I been pwn3d list. However, the few percent that are not found tend to be variations of known passwords, extending them to find likely mutations. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Comparing%20Honeypot%20Passwords%20with%20HIBP/…
  continue reading
 
Episode 300 marks six years of Extreme Gaming Podcast. We celebrate with community shout‑outs, surprise voice clips, and plenty of laughs, then dig into gaming and hardware news, PS5 updates, Xbox Ally, and the handheld console craze. Hands‑on impressions: Borderlands 4, Black Ops 7, Escape from Duckov, OD Knock and Fortnite. We get real on mental …
  continue reading
 
Artificial intelligence is reshaping the technology services landscape, with leading reports from IDC, Gartner, and new offerings from ServiceNow pointing to a future where managing AI sprawl becomes as critical as delivering AI capabilities themselves. High-performing channel partners are leaning into AI specialization, driving measurable outcomes…
  continue reading
 
Sometimes you don t even need to log in Applications using simple, predictable cookies to verify a user s identity are still exploited, and relatively recent vulnerabilities are still due to this very basic mistake. https://isc.sans.edu/diary/%22user%3Dadmin%22.%20Sometimes%20you%20don%27t%20even%20need%20to%20log%20in./32334 Western Digital My Clo…
  continue reading
 
How do you know if one of your accounts has been part of a security breach? Richard chats with Troy Hunt about HaveIBeenPwned, a free service that allows individuals to receive notifications when their accounts appear in a security breach. Troy discusses other services available alongside HaveIBeenPwned for sysadmins, including password checking, i…
  continue reading
 
The episode starts with the passage of California's groundbreaking AI transparency law, marking the first legislation in the United States that mandates large AI companies to disclose their safety protocols and provide whistleblower protections. This law applies to major AI labs like OpenAI, Anthropic, and Google DeepMind, requiring them to report …
  continue reading
 
Join Steve Goodman and Paul Robichaux as they discuss Microsoft’s latest AI updates – from Copilot Chat coming to all Microsoft 365 apps (no license required) to Teams getting AI agents in meetings, channels, and communities. They also warn about the rise of “AI-generated workslop” cluttering our workflows, and dig into why many Copilot pilot proje…
  continue reading
 
Apple Patches Apple released patches for iOS, macOS, and visionOS, fixing a single font parsing vulnerability https://isc.sans.edu/diary/Apple%20Patches%20Single%20Vulnerability%20CVE-2025-43400/32330 Increase in Scans for Palo Alto Global Protect Vulnerability (CVE-2024-3400). Our honeypots detected an increase in scans for a Palo Alto Global Prot…
  continue reading
 
The global IT services market is projected to grow significantly, reaching nearly $3 trillion by 2033, driven by the increasing adoption of cloud services, digital transformation, and a rising demand for automation and cybersecurity solutions. Proactive IT services currently dominate the market, accounting for over half of the share, particularly i…
  continue reading
 
Converting Timestamps in .bash_history Unix shells offer the ability to add timestamps to commands in the .bash_history file. This is often done in the form of Unix timestamps. This new tool converts these timestamps into a more readable format. https://isc.sans.edu/diary/New%20tool%3A%20convert-ts-bash-history.py/32324 Cisco ASA/FRD Compromises Ex…
  continue reading
 
Soft rain drifts through a quiet Cotswolds forest in the middle of the night, deep in the heart of England. After weeks of record summer heat, the cool rainfall brings relief and calm. The soundscape is wide and spacious, balancing gentle rain with the stillness of the English countryside — a soothing backdrop for sleep, focus, or peaceful relaxati…
  continue reading
 
Alexander Schlager, CEO of Aiceberg.ai, discusses the intersection of artificial intelligence (AI) and cybersecurity, emphasizing the importance of securing AI-powered workflows. Aiceberg employs traditional machine learning techniques to safeguard generative AI systems, providing a deterministic and explainable approach to security. This method al…
  continue reading
 
Managed service providers (MSPs) are experiencing significant growth driven by interest in artificial intelligence (AI), with 92% reporting an uptick in business. However, a concerning trend has emerged: only about half of these providers feel equipped to assist small and mid-sized businesses in adopting AI tools, a sharp decline from 90% the previ…
  continue reading
 
Art Kleiner, co-author of "The AI Dilemma" and Principal at Kleiner Powell International, discusses the complexities of AI governance, trust, and accountability in the context of modern technology. He emphasizes the importance of being intentional about risk when deploying AI products, particularly large language models, which can inadvertently per…
  continue reading
 
Webshells Hiding in .well-known Places Our honeypots registered an increase in scans for URLs in the .well-known directory, which appears to be looking for webshells. https://isc.sans.edu/diary/Webshells%20Hiding%20in%20.well-known%20Places/32320 Cisco Patches Critical Exploited Vulnerabilities Cisco released updates addressing already-exploited vu…
  continue reading
 
Generative AI is significantly transforming technology jobs, particularly by automating repetitive tasks such as coding and data processing. A recent analysis by Indeed indicates that while many tech skills will evolve, less than 1% are likely to be fully replaced by AI. This shift is creating challenges for organizations, as employees struggle wit…
  continue reading
 
Join us as we explore game reviews of Silent Hill F, Dune Awakening, and Hell Is Us. What's up with Nvidia's $5 billion investment in Intel and the latest on the Tencent vs. Sony lawsuit. Join our Discord: ⁠https://discord.gg/extremegamingpodcast Look for us on YouTube, Spotify and all good podcast services. #silenthillf #duneawakening #hellisus #n…
  continue reading
 
Our trust in the internet is the lowest it’s ever been. In spite of our vigilance, we face more threats than ever before. Product security is a vital element in the defense against malicious incursions. This season of Compiler covers the particulars of product security. With some help from Emily Fox, Portfolio Security Architect at Red Hat, our hos…
  continue reading
 
Exploit Attempts Against Older Hikvision Camera Vulnerability Out honeypots observed an increase in attacks against some older Hikvision issues. A big part of the problem is weak passwords, and the ability to send credentials as part of the URL. https://isc.sans.edu/diary/Exploit%20Attempts%20Against%20Older%20Hikvision%20Camera%20Vulnerability/323…
  continue reading
 
The Defense Department's Cybersecurity Maturity Model Certification (CMMC) effort has uncovered that many contractors are unaware of export control violations, which could lead to significant legal and financial penalties. As the certification becomes mandatory, early assessments indicate common violations of the International Traffic in Arms Regul…
  continue reading
 
Distracting the Analyst for Fun and Profit Our undergraduate intern, Tyler House analyzed what may have been a small DoS attack that was likely more meant to distract than to actually cause a denial of service https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Distracting%20the%20Analyst%20for%20Fun%20and%20Profit/32308 GitHub s plan for a more secur…
  continue reading
 
You're down - is it your servers, or someone else's? While at the Kansas City Developers Conference, Richard sits down with Mandi Walls from Pager Duty about her experiences dealing with incidents involving vendor services. It might be your cloud provider, or some other SaaS element of a pipeline, or even an open-source library dependency in an imp…
  continue reading
 
Americans are increasingly anxious about artificial intelligence (AI), with a recent Pew Research Center study revealing that 50% of participants express more concern than excitement regarding AI's growing presence in daily life. This marks a significant rise from 37% in 2021. The study highlights skepticism about AI's impact on creativity and inte…
  continue reading
 
CISA Reports Ivanti EPMM Exploit Sightings Two different organizations submitted backdoors to CISA, which are believed to have been installed using Ivanti vulnerabilities patched in May. https://www.cisa.gov/news-events/analysis-reports/ar25-261a Lastpass Observes Impersonation on GitHub Lastpass noted a number of companies being impersonated via f…
  continue reading
 
Tonight on GeekNights, we discuss fitness tech like heart rate monitors and Strava and Dance Dance Revolution. In the news, Tik Tok has a dubious deal to keep operating in the US and the regime has plans for the algorithm. Also go see Perfect Blue remastered while you can. And read The Amazing Adventures of Kavalier & Clay. Related Links Forum Thre…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play