2014 results. Displaying page 1 of 41.

Security Now! Episode 2

This week Steve talks about Microsoft's Strider HoneyMonkey project. It's catching bad guys, but Microsoft isn't sharing the information with the rest of the world. Is it ok to withhold security...

Security Now! Episode 3 is Live

In this edition Steve Gibson and Leo Laporte talk about the benefits of NAT routers. If you're on a broadband connection: Use a router (even if it's not labeled a "firewall" it works as one) Change...


In this edition Steve Gibson and Leo Laporte talk about passwords, but first an update from last week's show, including a look at the Smoothwall Linux distribution. Microsoft security expert,...

Keyboard Snooping

On this episode Steve and I discuss a recent report from the University of California that researchers have been able to turn audio recordings of keystrokes into the text typed with 90% accuracy....


It had to happen eventually, the man who coined the term Spyware, and wrote the first spyware removal program, addresses it. This is the ultimate spyware primer, what it is, how it works, and what...

DDoS Attacks

Steve explains how Denial of Service (DOS) attacks happen, and how the newer Distributed Denial of Services attacks (DDoS) have changed the game. Can a router protect you? No. Can a proxy server...


This week Steve and I discuss Rootkits and how spyware is beginning to used this advanced hacker technique to hide from you (and removal tools). We also recommend an excellent rootkit revealer....

Wireless Access Points

In this episode we discuss security concerns with wireless access points. First, we revisit last week's podcast on rootkits. After doing the show we tested RootkitRevealer on a number of machines...

WEP and MAC Address Filtering

In this episode Steve debunks three popular forms of Wi-Fi security: MAC address filtering, WEP encryption, and SSID hiding. He explains why none of these are effective security except against...

Sony/BMG's Rootkit DRM

The Sony/BMG DRM rootkit was first discovered by F-Secure and widely publicized by Mark Russinovich of Sysinternals in his blog. The Sony DRM hides itself by modifying the Windows kernel, names...


In this episode we wrap up Wi-Fi security with a discussion of WPA.


In this episode Steve explains how VPNs can protect you on open Wi-Fi networks. He also announces the WPA password generator.

Your Questions, Steve's Answers

In this episode Steve answers your questions on a variety of security issues including: The best way to store passwords Managing guests on your wireless network Why you should never use a public...

PPTP and IPSec

In this episode Steve continues his quest for the perfect way to secure your connection on the road. In this episode he talks about two secure protocols, PPTP and IPSec, which are commonly used for...


Steve reviews a new, free, VPN solution called Hamachi - and he likes what he sees.


Steve finishes out his search for a way to secure hotspot Internet access with a look at OpenVPN. But first, he responds to some issues from previous shows... Steve offers newsgroup style security...

Your Questions, Steve's Answers

On this show we discuss: Logging into secure sites Hamachi troubles Getting WPA security on old wi-fi equipment Securing Windows Remote Desktop The unreliabilty of fingerprint scanners Using Gmail...

Ilfak Guilanov and the WMF Flaw

As we've told you in the past two editions of Security Now! there's a very serious security flaw in all versions of Windows. This hole takes advantage of poor design choice in the Windows metafile...

The WMF Backdoor

Microsoft has patched the WMF vulnerability in Windows 2000 and XP, but in his research for a fix for Windows 95/98/Me Steve has come up with a blockbuster. It is his considered opinion that the...


It's now pretty clear that the ability to execute code in WMF graphics files was intentional - but we may never know why it's there. Steve wraps up the subject, lays a few myths to rest, explains...

Your Questions, Steve's Answers

Our monthly question and answer session with Steve Gibson...

How the Internet Works, Pt. 1

Steve talks about the Kama Sutra virus, scheduled to strike tomorrow, and PC World's anti-virus roundup. Then we delve into How the Internet Works, part 1. We'll wrap things up next week.

How the Internet Works, Pt. 2

Part 2 of Steve's discussion of how the fundamental Internet technologies work. This and the previous episode will provide the foundation for our future podcasts on Internet security issues.

How LANs Work, Pt. 1

Steve continues to lay a foundation on understanding networking. This week, part one of how LANs work. We cover DHCP, Subnet Masks, Routers, and hubs. We'll conclude with part two on episode 29.

The Road to 1080p, Part 1

Behind-the-scenes of an HD shoot. See how the next episode of MacBreak is being produced with high-end cameras and, of course, Macs!. The Pixel Corps' Alex Lindsay gives you a tour of the on-set...

Your Questions, Steve's Answers

Steve answers your questions on this episide. With further clarification on VPN security, Hamachi, and the answer to the eternal question, which operating system is the most secure.

Ethernet Insecurity

In this week's marathon edition Steve tackles security issues inherent to Ethernet, including ARP spoofing.

Crypto Issues

This week Steve takes a look at how cryptography is used and the difficult issues strong crypto raises.

Crypto 102

This week Steve continues his discussion of crypto with a look at secret decoder rings and one-time pads.

XP on Mac

Ben Durbin of the Pixel Corps followed the instructions at and got Windows XP running on one of the new Intel Mac Minis just like that. This is no kludge - it runs very well. No network...


Episode 32 is our monthly question and answer session.

Symmetric Block Ciphers

Part three of Steve's overview of cryptography looks at symmetric block ciphers.

Public Key Cryptography

This week Steve explains how public key cryptography works, and we welcome our new sponsor, Astaro! Thanks so much for the support guys.

Video Compression with QuickTime Pro

In this episode, MacBreak hosts Alex Lindsay and Emery Wells discuss video compression techniques and strategies for creating high-quality videos with the smallest file size possible.

Cryptographic Hashes

This week Steve talks about how cryptographic hashes work and are used to verify the integrity of files and email. We also talk about email signing and recommend the Gnu Privacy Guard.

One Dozen Questions

As usual on every fourth episode, Steve answers listener questions.

Primes and Certificates

We wrap up our talk about cryptography with a discussion of prime number generation, key recovery, and digital certificates.

The Road to 1080p, Part 3

Our final look behind-the-scenes at MacBreak as Alex shows us how episodes are composited in Apple Shake.

Browser Security

Why is Internet Explorer so insecure? What can you do to secure it? And why is it so hard to make a secure browser? Steve talks about security policy vs. browser flaws, how he uses IE safely, and...

Enter the Automatrix

Apple's Applescript Product Manager, Sal Soghoian, make Automator jump through hoops.

Buffer Overflows

Buffer overflows... they're the most common kind of security flaw, but what are they and how do they happen? Finally, how can we protect ourselves from them? Steve explains all.

Listener Q&A 7

As he does every fourth episode, Steve answers your questions. But first, an update on some recent security news...


The ultimate encryption program, free, open source, strong, and flexible: Truecrypt.


Leo and Emery show you how to use Transmit, the award-winning FTP software from Panic Software.

NAT Traversal

Steve explains the clever technique that Skype and other programs use to end around NAT routers.

Email Encryption

Leo and Emery survey the available tools and techniques for keeping email secure and private on your Mac.


Ever wonder what a port is? Steve explains what they are and what terms like "stealth ports" and "port sniffing mean." Leo reads a little poetry.

Twelve Questions

More on Virtualization technology, with a special focus on VMWare's Virtual Appliances.

Automator Life Poster

Leo and Automator guru Sal Soghoian show you how to use Automator and iPhoto to create a poster-sized collection of your photos.

Router Logs

This week Steve tells us what to do with the router logs. What a router can (and can't) tell you about your security situation? For 16kpbs versions, transcripts, and notes, visit Steve's site: grc...