Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Hands-On Windows, featuring Paul Thurrott, will help you adapt to the changes made in Windows 11. From visual tweaks to performance boosts Hands-On Windows will show you how to get the most out of your Windows 11 PC. You can join Club TWiT for $7 a month and get ad-free audio and video feeds for all our shows plus everything else the club offers...or get just this podcast ad-free for $2.99 a month. New episodes every Thursday.
  continue reading
 
Artwork

1
Going Linux

Larry Bushey and Bill Smith

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Once you become aware that there is a dependable, secure, capable, and modern computer system that rivals all others in popularity and actual use, you will want to try the Linux operating system on your computer. Perhaps you've been using a member of the Unix/Linux family - Linux, Android, ChromeOS, BSD or even OSX - for quite a while. If so, you are likely looking for new ways to optimize your technology for the way you work. Going Linux is for computer users who just want to use Linux to g ...
  continue reading
 
Artwork

1
Freedom Scientific Training Podcast

Freedom Scientific Training Department

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Would you like to download Freedom Scientific’s audio training content on your smart phone or mobile device? Want the convenience of listening to the step by step instructional demos we provide on your Amazon Echo or Google Home device? The Freedom Scientific Training podcast places hours of free audio training content right at your fingertips. You can listen to free lessons on a variety of topics ranging from basic Windows 10 to Advanced tasks in Microsoft Excel. Simply subscribe wherever y ...
  continue reading
 
Do you need to get your work done with Microsoft Word smoothly, easily, and quickly? If so, you’ve picked the right podcast. This podcast is designed to help beginning and intermediate users get up to speed quickly with Word 2010 and immediately become productive with it. Released every Tuesday at midnight Pacific.
  continue reading
 
My name is Michael Sliwinski and I'm the founder of Nozbe - one of the leading productivity applications on the Internet. Every day, thousands upon thousands of busy professionals and teams are getting things done using Nozbe's web application as well as our native apps for the Mac, Windows, iPhone, iPad and Android. I'm also the editor of the Productive! Magazine - a completely free PDF and iPad magazine. In each issue I get a chance to interview some real overachievers and many people wise ...
  continue reading
 
Loading …
show series
 
Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20…
  continue reading
 
Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, publishe…
  continue reading
 
This week, Paul takes a look at some Windows 11 features that Microsoft has been promising but are still missing in action. Host: Paul Thurrott Download or subscribe to Hands-On Windows at https://twit.tv/shows/hands-on-windows Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club…
  continue reading
 
Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes https://isc.sans.edu/diary/Honeypot%20Iptables%20Maintenance%20and%20DShield-SIEM%20Logging/31876 XRPL.js Compro…
  continue reading
 
xorsearch.py: Ad Hoc YARA Rules Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches https://isc.sans.edu/diary/xorsearch.py%3A%20%22Ad%20Hoc%20YARA%20Rules%22/31856 Google Spoofed via DKIM Replay Attack DKIM replay attacks are a known i…
  continue reading
 
It's 2025, so why are malicious advertising URLs still going strong? Phishing attacks continue to take advantage of Google s advertising services. Sadly, this is still the case for obviously malicious links, even after various anti-phishing services flag the URL. https://isc.sans.edu/diary/It%27s%202025...%20so%20why%20are%20obviously%20malicious%2…
  continue reading
 
Microsoft Entra User Lockout Multiple organizations reported widespread alerts and account lockouts this weekend from Microsoft Entra. The issue is caused by a new feature Microsoft enabled. This feature will lock accounts if Microsoft believes that the password for the account was compromised. https://www.bleepingcomputer.com/news/microsoft/widesp…
  continue reading
 
Join Liz and Rachel as they dive into six essential tasks in the new Outlook experience, including searching for messages, working with attachments, spell checking, flagging emails, and managing signatures. Whether you're transitioning from classic Outlook or exploring new features, this episode offers step-by-step guidance and JAWS tips to streaml…
  continue reading
 
RedTail: Remnux and Malware Management A description showing how to set up a malware analysis in the cloud with Remnux and Kasm. RedTail is a sample to illustrate how the environment can be used. https://isc.sans.edu/diary/RedTail%2C%20Remnux%20and%20Malware%20Management%20%5BGuest%20Diary%5D/31868 Critical Erlang/OTP SSH Vulnerability Researchers …
  continue reading
 
Uncover new Windows 11 features, including the innovative Windows Sandbox 2.0., real-time language translation in live captions, an upgraded Snipping Tool steps up its game with OCR and video trimming capabilities, and Snap Assist, ensuring you unlock the full potential of your Windows 11 experience. Host: Paul Thurrott Download or subscribe to Han…
  continue reading
 
Apple Updates Apple released updates for iOS, iPadOS, macOS, and VisionOS. The updates fix two vulnerabilities which had already been exploited against iOS. https://isc.sans.edu/diary/Apple%20Patches%20Exploited%20Vulnerability/31866 Oracle Updates Oracle released it quarterly critical patch update. The update addresses 378 security vulnerabilities…
  continue reading
 
Online Services Again Abused to Exfiltrate Data Attackers like to abuse free online services that can be used to exfiltrate data. From the originals , like pastebin, to past favorites like anonfiles.com. The latest example is gofile.io. As a defender, it is important to track these services to detect exfiltration early https://isc.sans.edu/diary/On…
  continue reading
 
xorsearch Update Diedier updated his "xorsearch" tool. It is now a python script, not a compiled binary, and supports Yara signatures. With Yara support also comes support for regular expressions. https://isc.sans.edu/diary/xorsearch.py%3A%20Searching%20With%20Regexes/31854 Shorter Lived Certificates The CA/Brower Forum passed an update to reduce t…
  continue reading
 
In this episode, Ron Miller from Vispero provides a comprehensive walkthrough of the Freedom Scientific Licensing Portal for JAWS, ZoomText, and Fusion annual licenses. Learn how to activate your software, set up your portal account, register a new device, and manage or transfer licenses between computers. Whether you're a new user or need a refres…
  continue reading
 
Exploit Attempts for Recent Langflow AI Vulnerability (CVE-2025-3248) After spotting individaul attempts to exploit the recent Langflow vulnerability late last weeks, we now see more systematic internet wide scans attempting to verify the vulnerability. https://isc.sans.edu/forums/diary/Exploit+Attempts+for+Recent+Langflow+AI+Vulnerability+CVE20253…
  continue reading
 
Network Infraxploit Our undergraduate intern, Matthew Gorman, wrote up a walk through of CVE-2018-0171, an older Cisco vulnerability, that is still actively being exploited. For example, VOLT TYPHOON recently exploited this problem. https://isc.sans.edu/diary/Network+Infraxploit+Guest+Diary/31844 Windows Update Issues / Windows 10 Update Microsoft …
  continue reading
 
Could the browser you use today be holding you back from a next-generation web experience? Discover the browsers poised to transform your digital life by 2025. We explore the emerging contenders reshaping the browsing landscape following Chrome's divisive decision to cut support for certain extensions. Host: Paul Thurrott Download or subscribe to H…
  continue reading
 
Getting Past PyArmor PyArmor is a python obfuscation tool used for malicious and non-malicious software. Xavier is taking a look at a sample to show what can be learned from these obfuscated samples with not too much work. https://isc.sans.edu/diary/Obfuscated%20Malicious%20Python%20Scripts%20with%20PyArmor/31840 CenterStack RCE CVE-2025-30406 Glad…
  continue reading
 
Microsoft Patch Tuesday Microsoft patched over 120 vulnerabilities this month. 11 of these were rated critical, and one vulnerability is already being exploited. https://isc.sans.edu/diary/Microsoft%20April%202025%20Patch%20Tuesday/31838 Adobe Updates Adobe released patches for 12 different products. In particular important are patches for Coldfusi…
  continue reading
 
Bill distro hops. Larry considers a distro hop. Bill fixes his problem with Snap packages. Larry fixes his app probles. Is using AI cheating? We discuss what you get with these office suites: LibreOffice, WPS Offce, ONLYOffice, Calligra, and Microsoft 365 Online. Episode Time Stamps 00:00 Going Linux #466 · Using Linux to get things done in Work an…
  continue reading
 
XORsearch: Searching With Regexes Didier explains a workaround to use his tool XORsearch to search for regular expressions instead of simple strings. https://isc.sans.edu/diary/XORsearch%3A%20Searching%20With%20Regexes/31834 MCP Security Notification: Tool Poisoning Attacks Invariant labs summarized a critical weakness in the Model Context Protocol…
  continue reading
 
New SSH Username Report A new ssh/telnet username reports makes it easier to identify new usernames attackers are using against our telnet and ssh honeypots https://isc.sans.edu/diary/New%20SSH%20Username%20Report/31830 Quickshell Sharing is Caring: About an RCE Attack Chain on Quick Share The Google Quick Share protocol is susceptible to several v…
  continue reading
 
In this episode of 20 Minute Tech Tips, Liz and Rachel introduce exciting new enhancements to FSCompanion—Freedom Scientific’s AI-powered learning tool for JAWS, ZoomText, and Fusion. Learn how to open FSCompanion using Voice Assistant and how to ask questions with your voice using the new Dictate button. Whether you're brushing up on keyboard comm…
  continue reading
 
Exploring Statistical Measures to Predict URLs as Legitimate or Intrusive Using frequency analysis, and training the model with honeypot data as well as log data from legitimate websites allows for a fairly simple and reliable triage of web server logs to identify possible malicious activity. https://isc.sans.edu/diary/Exploring%20Statistical%20Mea…
  continue reading
 
Unlock the secrets of seamless smartphone integration with Windows 11 in our latest episode. Discover how the PhoneLink app revolutionizes your digital experience by granting direct access to your Android phone's file system through Windows' File Explorer, all without the tangled mess of cables. We're putting a spotlight on the innovative features …
  continue reading
 
Surge in Scans for Juniper t128 Default User Lasst week, we dedtect a significant surge in ssh scans for the username t128 . This user is used by Juniper s Session Smart Routing, a product they acquired from 128 Technologies which is the reason for the somewhat unusual username. https://isc.sans.edu/diary/Surge%20in%20Scans%20for%20Juniper%20%22t12…
  continue reading
 
Apple Patches Everything Apple released updates for all of its operating systems. Most were released on Monday with WatchOS patches released today on Tuesday. Two already exploited vulnerabilities, which were already patched in the latest iOS and macOS versions, are now patched for older operating systems as well. A total of 145 vulnerabilities wer…
  continue reading
 
Apache Camel Exploit Attempt by Vulnerability Scans A recently patched vulnerability in Apache Camel has been integrated into some vulnerability scanners, like for example OpenVAS. We do see some exploit attempts in our honeypots, but they appear to be part of internal vulnerablity scans https://isc.sans.edu/diary/Apache%20Camel%20Exploit%20Attempt…
  continue reading
 
A Tale of Two Phishing Sties Two phishing sites may use very different backends, even if the site itself appears to be visually very similar. Phishing kits are often copied and modified, leading to sites using similar visual tricks on the user facing site, but very different backends to host the sites and reporting data to the miscreant. https://is…
  continue reading
 
In this episode, Liz and Rachel dive deep into using the OneDrive desktop app with JAWS. Whether you're organizing files, creating folders, or collaborating with colleagues, this episode will guide you step-by-step through best practices for managing your OneDrive environment efficiently. You'll learn how to customize File Explorer views, use key c…
  continue reading
 
Sitecore "thumbnailsaccesstoken" Deserialization Scans (and some new reports) CVE-2025-27218 Our honeypots detected a deserialization attack against the CMS Sitecore using a thumnailaccesstoken header. The underlying vulnerability was patched in January, and security firm Searchlight Cyber revealed details about this vulnerability a couple of weeks…
  continue reading
 
If you've lost count of how many times Microsoft has updated the Copilot app in Windows 11, you're not alone. Indeed, even though this app has only been available since September 2023, it feels like a lifetime. And just like that annoying uncle you have to deal with every year during Thanksgiving or whatever holiday he always ruins, Copilot is alwa…
  continue reading
 
Leveraging CNNs and Entropy-Based Feature Selection to Identify Potential Malware Artifacts of Interest This diary explores a novel methodology for classifying malware by integrating entropy-driven feature selection with a specialized Convolutional Neural Network (CNN). Motivated by the increasing obfuscation tactics used by modern malware authors,…
  continue reading
 
Episode Time Stamps 00:00 Going Linux #465 · Listener Feedback 01:35 Bill can breathe again 07:40 Reid: About the Lemur Pro 11:39 George from Tulsa: Learning the lesson again - buy hardware with Linux pre-installed 16:02 Guimar: Seeking advice on Linux 25:02 Roger: Microsoft news - Solar Winds 30:03 George: Commented on computer/monitor stands 33:1…
  continue reading
 
XWiki Search Vulnerablity Exploit Attempts (CVE-2024-3721) Our honeypot detected an increase in exploit attempts for an XWiki command injection vulnerablity. The vulnerability was patched last April, but appears to be exploited more these last couple days. The vulnerability affects the search feature and allows the attacker to inject Groovy code te…
  continue reading
 
Privacy Aware Bots A botnet is using privacy as well as CSRF prevention headers to better blend in with normal browsers. However, in the process they may make it actually easier to spot them. https://isc.sans.edu/diary/Privacy%20Aware%20Bots/31796 Critical Ingress Nightmare Vulnerability ingress-nginx fixed four new vulnerabilities, one of which ma…
  continue reading
 
Critical Next.js Vulnerability CVE-2025-29927 A critical vulnerability in how the x-middleware-subrequest header is verified may lead to bypassing authorization in Next.js applications. https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware https://github.com/vercel/next.js/security/advisories/GHSA-f82v-jwr5-mffw http…
  continue reading
 
Some New Data Feeds and Little Incident We started offering additional data feeds, and an SEO spamer attempted to make us change a link from an old podcast episode. https://isc.sans.edu/diary/Some%20new%20Data%20Feeds%2C%20and%20a%20little%20%22incident%22./31786 Veeam Deserialization Vulnerability Veeam released details regarding the latest vulner…
  continue reading
 
This episode puts AI's capabilities to the test, exploring Copilot's integration within Office apps like Word. As a professional writer, Paul shares firsthand insights on how AI tools can be a game-changer for non-professional writers. With a focus on the chat-based interface and text rewriting tools, we examine the balance between AI assistance an…
  continue reading
 
Join Ron Miller as he discusses a few infightful tips on using Speech and Sound Schemes in JAWS for Microsoft Word. Learn how to customize speech settings, sound cues, and formatting feedback to enhance productivity and accessibility. Whether you're working on documents for home or work, this episode will help you navigate Word with greater efficie…
  continue reading
 
Exploit Attempts for Cisco Smart Licensing Utility CVE-2024-20439 CVE-2024-20440 Attackers added last September's Cisco Smart Licensing Utility vulnerability to their toolset. These attacks orginate most likely from botnets and the same attackers are scanning for a wide range of additional vulnerabilities. The vulnerability is a static credential i…
  continue reading
 
Python Bot Delivered Through DLL Side-Loading A "normal", but vulnerable to DLL side-loading PDF reader may be used to launch additional exploit code https://isc.sans.edu/diary/Python%20Bot%20Delivered%20Through%20DLL%20Side-Loading/31778 Tomcat RCE Correction To exploit the Tomcat RCE I mentioned yesterday, two non-default configuration options mu…
  continue reading
 
Static Analysis of GUID Encoded Shellcode Didier explains how to decode shell code embeded as GUIDs in malware, and how to feed the result to his tool 1768.py which will extract Cobal Strike configuration information from the code. https://isc.sans.edu/diary/Static%20Analysis%20of%20GUID%20Encoded%20Shellcode/31774 SAMLStorm: Critical Authenticatio…
  continue reading
 
Mirai Bot Now Incorporating Malformed DrayTek Vigor Router Exploits One of the many versions of the Mirai botnet added some new exploit strings attempting to take advantage of an old DrayTek Vigor Router vulnerability, but they got the URL wrong. https://isc.sans.edu/diary/Mirai%20Bot%20now%20incroporating%20%28malformed%3F%29%20DrayTek%20Vigor%20R…
  continue reading
 
File Hashes Analysis with Power BI Guy explains in this diary how to analyze Cowrie honeypot file hashes using Microsoft's BI tool and what you may be able to discover using this tool. https://isc.sans.edu/diary/File%20Hashes%20Analysis%20with%20Power%20BI%20from%20Data%20Stored%20in%20DShield%20SIEM/31764 Apache Camel Vulnerability Apache released…
  continue reading
 
This week, Paul explains what he knows about AI credits and where they might be relevant to you in Windows 11. Host: Paul Thurrott Download or subscribe to Hands-On Windows at https://twit.tv/shows/hands-on-windows Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members…
  continue reading
 
Log4J Scans for VMWare Hyhbrid Cloud Extensions An attacker is scanning various login pages, including the authentication feature in the VMWare HCX REST API for Log4j vulnerabilities. The attack submits the exploit string as username, hoping to trigger the vulnerability as Log4j logs the username https://isc.sans.edu/diary/Scans%20for%20VMWare%20Hy…
  continue reading
 
Microsoft Patch Tuesday Microsoft Patched six already exploited vulnerabilities today. In addition, the patches included a critical patch for Microsoft's DNS server and about 50 additional patches. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%3A%20March%202025/31756 Apple Updates iOS/macOS Apple released an update to address a single, alr…
  continue reading
 
Shellcode Encoded in UUIDs Attackers are using UUIDs to encode Shellcode. The 128 Bit (or 16 Bytes) encoded in each UUID are converted to shell code to implement a cobalt strike beacon https://isc.sans.edu/diary/Shellcode%20Encoded%20in%20UUIDs/31752 Moxa CVE-2024-12297 Expanded to PT Switches Moxa in January first releast an update to address a fr…
  continue reading
 
Commonly Probed Webshell URLs Many attackers deploy web shells to gain a foothold on vulnerable web servers. These webshells can also be taken over by parasitic exploits. https://isc.sans.edu/diary/Commonly%20Probed%20Webshell%20URLs/31748 Undocumented ESP32 Commands A recent conference presentation by Tarlogic revealed several "backdoors" or undoc…
  continue reading
 
Loading …
Listen to this show while you explore
Play