1723 results. Displaying page 1 of 35.

Security Now! Episode 2

This week Steve talks about Microsoft's Strider HoneyMonkey project. It's catching bad guys, but Microsoft isn't sharing the information with the rest of the world. Is it ok to withhold security...

Security Now! Episode 3 is Live

In this edition Steve Gibson and Leo Laporte talk about the benefits of NAT routers. If you're on a broadband connection: Use a router (even if it's not labeled a "firewall" it works as one) Change...


In this edition Steve Gibson and Leo Laporte talk about passwords, but first an update from last week's show, including a look at the Smoothwall Linux distribution. Microsoft security expert,...

Keyboard Snooping

On this episode Steve and I discuss a recent report from the University of California that researchers have been able to turn audio recordings of keystrokes into the text typed with 90% accuracy....


It had to happen eventually, the man who coined the term Spyware, and wrote the first spyware removal program, addresses it. This is the ultimate spyware primer, what it is, how it works, and what...

DDoS Attacks

Steve explains how Denial of Service (DOS) attacks happen, and how the newer Distributed Denial of Services attacks (DDoS) have changed the game. Can a router protect you? No. Can a proxy server...


This week Steve and I discuss Rootkits and how spyware is beginning to used this advanced hacker technique to hide from you (and removal tools). We also recommend an excellent rootkit revealer....

Wireless Access Points

In this episode we discuss security concerns with wireless access points. First, we revisit last week's podcast on rootkits. After doing the show we tested RootkitRevealer on a number of machines...

WEP and MAC Address Filtering

In this episode Steve debunks three popular forms of Wi-Fi security: MAC address filtering, WEP encryption, and SSID hiding. He explains why none of these are effective security except against...

Sony/BMG's Rootkit DRM

The Sony/BMG DRM rootkit was first discovered by F-Secure and widely publicized by Mark Russinovich of Sysinternals in his blog. The Sony DRM hides itself by modifying the Windows kernel, names...


In this episode we wrap up Wi-Fi security with a discussion of WPA.


In this episode Steve explains how VPNs can protect you on open Wi-Fi networks. He also announces the WPA password generator.

Your Questions, Steve's Answers

In this episode Steve answers your questions on a variety of security issues including: The best way to store passwords Managing guests on your wireless network Why you should never use a public...

PPTP and IPSec

In this episode Steve continues his quest for the perfect way to secure your connection on the road. In this episode he talks about two secure protocols, PPTP and IPSec, which are commonly used for...


Steve reviews a new, free, VPN solution called Hamachi - and he likes what he sees.


Steve finishes out his search for a way to secure hotspot Internet access with a look at OpenVPN. But first, he responds to some issues from previous shows... Steve offers newsgroup style security...

Your Questions, Steve's Answers

On this show we discuss: Logging into secure sites Hamachi troubles Getting WPA security on old wi-fi equipment Securing Windows Remote Desktop The unreliabilty of fingerprint scanners Using Gmail...

Ilfak Guilanov and the WMF Flaw

As we've told you in the past two editions of Security Now! there's a very serious security flaw in all versions of Windows. This hole takes advantage of poor design choice in the Windows metafile...

The WMF Backdoor

Microsoft has patched the WMF vulnerability in Windows 2000 and XP, but in his research for a fix for Windows 95/98/Me Steve has come up with a blockbuster. It is his considered opinion that the...


It's now pretty clear that the ability to execute code in WMF graphics files was intentional - but we may never know why it's there. Steve wraps up the subject, lays a few myths to rest, explains...

Your Questions, Steve's Answers

Our monthly question and answer session with Steve Gibson...

How the Internet Works, Pt. 1

Steve talks about the Kama Sutra virus, scheduled to strike tomorrow, and PC World's anti-virus roundup. Then we delve into How the Internet Works, part 1. We'll wrap things up next week.

How the Internet Works, Pt. 2

Part 2 of Steve's discussion of how the fundamental Internet technologies work. This and the previous episode will provide the foundation for our future podcasts on Internet security issues.

How LANs Work, Pt. 1

Steve continues to lay a foundation on understanding networking. This week, part one of how LANs work. We cover DHCP, Subnet Masks, Routers, and hubs. We'll conclude with part two on episode 29.

Your Questions, Steve's Answers

Steve answers your questions on this episide. With further clarification on VPN security, Hamachi, and the answer to the eternal question, which operating system is the most secure.

Ethernet Insecurity

In this week's marathon edition Steve tackles security issues inherent to Ethernet, including ARP spoofing.

Crypto Issues

This week Steve takes a look at how cryptography is used and the difficult issues strong crypto raises.

Crypto 102

This week Steve continues his discussion of crypto with a look at secret decoder rings and one-time pads.


Episode 32 is our monthly question and answer session.

Symmetric Block Ciphers

Part three of Steve's overview of cryptography looks at symmetric block ciphers.

Public Key Cryptography

This week Steve explains how public key cryptography works, and we welcome our new sponsor, Astaro! Thanks so much for the support guys.

Cryptographic Hashes

This week Steve talks about how cryptographic hashes work and are used to verify the integrity of files and email. We also talk about email signing and recommend the Gnu Privacy Guard.

One Dozen Questions

As usual on every fourth episode, Steve answers listener questions.

Enter the Automatrix

Apple's Applescript Product Manager, Sal Soghoian, make Automator jump through hoops.

Listener Q&A 7

As he does every fourth episode, Steve answers your questions. But first, an update on some recent security news...

Automator Life Poster

Leo and Automator guru Sal Soghoian show you how to use Automator and iPhoto to create a poster-sized collection of your photos.

KFI Tech Guy #237

Apple releases Boot Camp, a program that makes it easy to run Windows on Intel Macs. But that's not all. A company called Parallels has released software that lets you run Windows programs in OS X...

KFI Tech Guy #238

Do you spend your time "screensucking"? Do you get "email voice" on the phone? I hope you're not being a "cellopain"? New words coined by Dr. Edward M. Hallowell (who also coined the term Adult...

KFI Tech Guy #239

The video tape recorder is 50 years old. Was AOL blocking email with links to

KFI Tech Guy #240

Next year's Infiniti G35 will come with a 9.5GB hard drive for ripping CDs! Yay! The Beatles are planning to offer their music online.

KFI Tech Guy #241

Yahoo turns in another Chinese dissident. According to Apple, 50% of people buying Macs at the Apple Store are new users. That's very good news for Apple, a challenge for Microsoft which won't ship...

KFI Tech Guy #242

Have you seen the Air Force One graffiti video? Looks real enough to have fooled the Air Force, but the perpatrators admit, it's a hoax. Should cities legislate for Wi-Fi security? That's what tony...

Black and White

Leo Laporte and guest Mikkel Aaland show you how to use Adobe Bridge to get fine control when converting images from color to black and white.

KFI Tech Guy 294

The Boy Scouts add a badge for copyright law, Microsoft abandons XP users, and Jack Black speaks out against piracy... For detailed show notes visit

KFI Tech Guy 299

Office 2007, Windows Vista, and the Zune - coming soon. For detailed show notes visit

KFI Tech Guy 300

President Bush watches his Dell Television, the secure version of Vista, and self-publishing on YouTube... For detailed show notes visit

KFI Tech Guy 301

Playstation 3 and Zune reviews, iPhone news, and a giant Colonel Sanders... For detailed show notes visit

KFI Tech Guy 303

Why was Wal-Mart down? why the Zune is a flop, and the best game console of them all... For detailed show notes visit Bandwidth for the Tech Guy on KFI podcast is provided by DSL Extreme ...


Welcome to a brand new podcast from hosted by former Screen Savers co-host, Megan Morrone. This first episode is just to say hello. Our show begins in earnest next Monday.

Mighty Girl Maggie Mason

Meet mom, and Mighty Girl, Maggie Mason, of Mighty, and author of "No One Cares What You Had For Lunch." Plus Megan's clicks.