Secure Digital Life

From Paul's Security Weekly
Jump to: navigation, search


Watch Doug and Russ share their knowledge through the magic of the internet and into your brains. Check out the latest episodes in the playlist above!

Coming Soon

Episode #106 - What to do when the power is out?

Previously Recorded

Episode #105 - HateStream: Social Media in the Wake of the Christchurch Attacks

Episode #104 - Tim Broom, ITPro.TV

Episode #103 - Machine Learning (Book: Minority Report)

Episode #102 - Spying & Cyber Warfare, From Russia With Love

Episode #101 - Overview of Hacking

Episode #100 - Understanding Storage

Episode #99.5 - Terms & Acronyms pt.2

Episode #99 - Terms & Acronyms pt.1

Episode #98 - Containers

Episode #97 - Scott Coleman, Data Diode Days

Episode #96 - Quantum Computing 1

Episode #95 - Leonard Simon, Springboard

Episode #94 - New Year Resolutions

Episode #93 - Cross Site Scripting Attacks (XSS)

Episode #92 - Cybersecurity Christmas Gifts

Episode #91 - Killer Robot Special

Episode #90 - Bill Ottman, CEO & Co-Founder of Minds.com

Episode #89 - Jesse Endahl, Fleetsmith

Episode #88 - Permissions and Privileges

Episode #87 - Wireless Routers

Episode #86 - Eric Carlile, Zoom

Episode #85 - 2 Factor Authentication

Episode #84 - Robb Tracy, ActBrainy (Wiley)

Episode #83 - Zach Hill, I.T. Enthusiast

Episode #82 - Ned Pyle, Microsoft

Episode #81 - Back To School: Networking 101

Episode #80 - Codes & Languages

Episode #79 - Ed Sattar, QuickStart

Episode #78 - Understanding SSL and HTTPS

Episode #77 - Dylan Jensen, IOI Search

Episode #76 - Mark Mulvaney, Sr. Information Security Engineer

Episode #75 - Alain Nguyen, SMA

Episode #74 - Ron Gula, Gula Tech Adventures

Episode #73 - AI

Episode #72 - Warhorse

Episode #71 - Travel Security

Episode #70 - IoT

Episode #69 - Matthew Silva, RWU

Episode #68 - Digital Forensics

Episode #67 - SNAT and PAT

Episode #66 - Dangerous Grounds

Episode #65 - Firewalls

Episode #64 - Tech Interview

Episode #63 - Vulnerability Scanning pt. (Demo 2)

Episode #62 - Andy Pete, Vulnerability Scanning pt.3 (Demo)

Episode #61 - Andy Pete, Vulnerability Scanning pt.2

Episode #60 - Capture the Flag

Episode #59 - Intro to Vulnerability Scanning

Episode #58 - Virtual Labs

Episode #57 - Facebook

Episode #56 - SQL Injection

Episode #55 - Now With The NAS

Episode #54 - Online Backup Providers

Episode #53 - Stinkin' Backups

Episode #52 - Backup Strategies

Episode #51 - The Little Processor who could not...

Episode #50 - Wolf in the Fold pt.2

Episode #49 - Wolf in the Fold pt.1

Episode #48 - Fletcher Heisler, Hunter2

Episode #47 - Jim Langevin, Congressman of the Cybercaucus

Episode #46 - 2017 Wrap-Up

Episode #45 - Resume Building pt.2

Episode #44 - Resume Building

Episode #43 - Linux

Episode #42 - Cryptocurrency

Episode #41 - Jimi's Guitar and Blockchains

Episode #40 - Crypto Identities

Episode #39 - WiFi Security

Episode #38 - Encryption

Episode #37 - Wireshark Captures

Episode #36 - Wireshark and Packet Sniffing, Pt.2

Episode #35 - Packet Sniffing

Episode #34 - NMAP

Episode #33 - Port Scanning

Episode #32 - Network Attacks

Episode #31 - Killer Robots

Episode #30 - VLSM

Bonus Episode - Equifax Breach

Episode #29 - Congressman Jim Langevin

Episode #28 - Subnetting, Pt. 2

Episode #27 - Subnetting, Pt. 1

Episode #26 - IP Addresses

Episode #25 - Hexidecimal

Episode #24 - Binary (Zero and One are the Loneliest Numbers)

Episode #23 - Top 5 IoT Devices

Episode #22 - Pentesting Certification Shootout

Episode #21 - SCADA

Episode #20 - OSI Model

Episode #19 - Securing Backups

Episode #18 - College Degrees in Cybersecurity

Episode #17 - WannaCry

Episode #16 - Password Creation and Protection

Episode #15 - What you thought you knew but didn't actually know or maybe you did when it comes to Certification!

Episode #14 - Blacklists, Whitelists, and MAC filtering

Episode #13 - Port Forwarding, Pt. 2

Episode #12 - Port Forwarding and Firewalling

Episode #11 - Wireless Security at Home

Episode #10 - Net Neutrality, Pt. 2

Episode #9 - TOR

Episode #8 - Net Neutrality

Episode #7 - WikiLeaks

Episode #6 - Cybersecurity

Episode #5 - Firewalls

Episode #4 - IoT

Episode #3 - What Data Should You Submit on the Internet?

Episode #2 - VPNs

Episode #1 - How to Avoid Being Phished