<?xml version="1.0" encoding="utf-8" ?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <atom:link href="http://rss-feeds.eu/feeds/SecurityNow-16k-2009.xml" rel="self" type="application/rss+xml" />
    <title>Security Now 2009 - 16k MP3</title>
    <pubDate>Sat, 27 May 2017 15:46:31 +0100</pubDate>
    <lastBuildDate>Wed, 15 Apr 2020 09:58:51 +0100</lastBuildDate>
    <link>https://twit.tv/shows/security-now</link>
    <language>en-US</language>
    <copyright>
      This work is licensed under a Creative Commons License - 
      Attribution-NonCommercial-NoDerivatives 4.0 International - 
      http://creativecommons.org/licenses/by-nc-nd/4.0/
    </copyright>
    <ttl>14400</ttl>
    <category>Technology</category>
    <category>Security</category>
    <image>
      <title>Security Now 2009 - 16k MP3</title>
      <url>http://twit.cachefly.net/coverart/sn/sn144audio.jpg</url>
      <link>https://twit.tv/shows/security-now</link>
      <width>144</width>
      <height>144</height>
    </image>
    <itunes:author>TWiT</itunes:author>
    <itunes:subtitle>Steve Gibson discusses the hot topics in security today with Leo Laporte.</itunes:subtitle>
    <itunes:summary>Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.
    
    Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.</itunes:summary>
    <description>
      Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, 
      creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.
      Records live at https://twit.tv/live every Tuesday.
    </description>
    <itunes:keywords>TWiT, Technology, Steve Gibson, Leo Laporte, security, spyware, malware, hacking, cyber crime, encryption</itunes:keywords>
    <itunes:explicit>false</itunes:explicit>
    <itunes:block>no</itunes:block>
    <itunes:owner>
      <itunes:name>Leo Laporte</itunes:name>
      <itunes:email>distro@twit.tv</itunes:email>
    </itunes:owner>
    <itunes:category text="Technology" />
    <itunes:category text="News">
      <itunes:category text="Tech News" />
    </itunes:category>
    <item>
      <title>SN229: The Rational Rejection of Security Advice</title>
      <pubDate>Thu, 31 Dec 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-229-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-229-lq.mp3</guid>
      <description>Leo and I turn everything around this week to question the true economic value of security advice. We consider the various non-zero costs to the average, non-Security Now! listener. We compare those real costs with the somewhat unclear and uncertain benefits of going to all the trouble of following, sometimes painful, maximum security advice.</description>
      <enclosure url="http://media.grc.com/sn/sn-229-lq.mp3" length="8617536" type="audio/mpeg" />
    </item>
    <item>
      <title>SN228: Listener Feedback #82</title>
      <pubDate>Thu, 24 Dec 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-228-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-228-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-228-lq.mp3" length="10259352" type="audio/mpeg" />
    </item>
    <item>
      <title>SN227: Cyberwarfare</title>
      <pubDate>Thu, 17 Dec 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-227-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-227-lq.mp3</guid>
      <description>Leo and I examine the amorphous and difficult-to-grasp issue of nation-state sponsored cyberwarfare. We examine what it means when nations awaken to the many nefarious ways the global Internet can be used to gain advantage against international competitors and adversaries.</description>
      <enclosure url="http://media.grc.com/sn/sn-227-lq.mp3" length="7224840" type="audio/mpeg" />
    </item>
    <item>
      <title>SN226: Listener Feedback #81</title>
      <pubDate>Thu, 10 Dec 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-226-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-226-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-226-lq.mp3" length="7881408" type="audio/mpeg" />
    </item>
    <item>
      <title>SN225: &quot;Same Origin&quot; Troubles</title>
      <pubDate>Thu, 03 Dec 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-225-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-225-lq.mp3</guid>
      <description>This week Leo and I plow into the little understood and even less known problems that arise when user-provided content &#8212; postings, photos, videos, etc. &#8212; are uploaded to trusted web sites from which they are then subsequently served to other web users.</description>
      <enclosure url="http://media.grc.com/sn/sn-225-lq.mp3" length="8701560" type="audio/mpeg" />
    </item>
    <item>
      <title>SN224: Listener Feedback #80</title>
      <pubDate>Thu, 26 Nov 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-224-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-224-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-224-lq.mp3" length="9005616" type="audio/mpeg" />
    </item>
    <item>
      <title>SN223: A security vulnerability in SSL</title>
      <pubDate>Thu, 19 Nov 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-223-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-223-lq.mp3</guid>
      <description>This week Leo and I plow into a recently discovered serious vulnerability in the fundamental SSL protocol that provides virtually all of the Internet's communications security: SSL - the Secure Sockets Layer.  I explain exactly how an attacker can inject his or her own data into a new SSL connection and have that data authenticated under an innocent client's credentials. (That's not good.)</description>
      <enclosure url="http://media.grc.com/sn/sn-223-lq.mp3" length="9577152" type="audio/mpeg" />
    </item>
    <item>
      <title>SN222: Listener Feedback #79</title>
      <pubDate>Thu, 12 Nov 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-222-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-222-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-222-lq.mp3" length="11691144" type="audio/mpeg" />
    </item>
    <item>
      <title>SN221: The Oxymoron of &quot;JavaScript Security&quot;</title>
      <pubDate>Thu, 05 Nov 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-221-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-221-lq.mp3</guid>
      <description>This week Leo and I are joined by author (The Geek Atlas) and software developer John Graham-Cumming to discuss many specific concerns about the inherent, designed-in, insecurity of our browser's JavaScript scripting language.  Now 14 years old, JavaScript was never meant for today's high-demand Internet environment &#8212; and it's having problems.John's original presentation slides in Microsoft PowerPoint and PDF formats.</description>
      <enclosure url="http://media.grc.com/sn/sn-221-lq.mp3" length="8538408" type="audio/mpeg" />
    </item>
    <item>
      <title>SN220: Listener Feedback #78</title>
      <pubDate>Thu, 29 Oct 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-220-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-220-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-220-lq.mp3" length="9011376" type="audio/mpeg" />
    </item>
    <item>
      <title>SN219: Badly Broken Browsing</title>
      <pubDate>Thu, 22 Oct 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-219-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-219-lq.mp3</guid>
      <description>In preparation for episode #221's guest, John Graham-Cumming, who will take us on a detailed walk-through of the JavaScript language's security problems, this week Leo and I examine the sad and badly broken state of web browsing in general, and how we got to where we are.</description>
      <enclosure url="http://media.grc.com/sn/sn-219-lq.mp3" length="6888281" type="audio/mpeg" />
    </item>
    <item>
      <title>SN218: Listener Feedback #77</title>
      <pubDate>Thu, 15 Oct 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-218-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-218-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-218-lq.mp3" length="9269973" type="audio/mpeg" />
    </item>
    <item>
      <title>SN217: The Fundamentally Broken Browser Model</title>
      <pubDate>Thu, 08 Oct 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-217-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-217-lq.mp3</guid>
      <description>Alex and I discuss the serious security problems created by the way SSL connections are specified by non-secured web pages, and how easily a &quot;man in the middle&quot; attack can compromise this amazingly weak web-based security.</description>
      <enclosure url="http://media.grc.com/sn/sn-217-lq.mp3" length="9990373" type="audio/mpeg" />
    </item>
    <item>
      <title>SN216: Listener Feedback #76</title>
      <pubDate>Thu, 01 Oct 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-216-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-216-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-216-lq.mp3" length="10279266" type="audio/mpeg" />
    </item>
    <item>
      <title>SN215: Security Maxims</title>
      <pubDate>Thu, 24 Sep 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-215-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-215-lq.mp3</guid>
      <description>Leo and I discuss the first portion of a collection of pithy and apropos "Security Maxims" that were assembled by a member of the Argonne Vulnerability Assessment Team at the Nuclear Engineering Division of the Argonne National Laboratory, U.S. Department of Energy. They're great!</description>
      <enclosure url="http://media.grc.com/sn/sn-215-lq.mp3" length="7995131" type="audio/mpeg" />
    </item>
    <item>
      <title>SN214: Listener Feedback #75</title>
      <pubDate>Thu, 17 Sep 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-214-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-214-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-214-lq.mp3" length="10834227" type="audio/mpeg" />
    </item>
    <item>
      <title>SN213: Cracking GSM Cellphones</title>
      <pubDate>Thu, 10 Sep 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-213-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-213-lq.mp3</guid>
      <description>Leo and I discuss the state of GSM (Global System of Mobile communications) cracking.  I show where to purchase the required hardware, from where to download the software, and just how easy and practical it has become to "crack" the old and very weak "security" employed by the three billion cellphones now in worldwide use.</description>
      <enclosure url="http://media.grc.com/sn/sn-213-lq.mp3" length="7777561" type="audio/mpeg" />
    </item>
    <item>
      <title>SN212: Listener Feedback #74</title>
      <pubDate>Thu, 03 Sep 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-212-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-212-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-212-lq.mp3" length="13694958" type="audio/mpeg" />
    </item>
    <item>
      <title>SN211: Voting Machine Hacking</title>
      <pubDate>Thu, 27 Aug 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-211-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-211-lq.mp3</guid>
      <description>This week Leo and I describe the inner workings of one of the best designed and apparently most secure electronic voting machines &#8212; currently in use in the United States &#8212; and how a group of university researchers hacked it without any outside information to create a 100% stealth vote stealing system.</description>
      <enclosure url="http://media.grc.com/sn/sn-211-lq.mp3" length="8533834" type="audio/mpeg" />
    </item>
    <item>
      <title>SN210: Listener Feedback #73</title>
      <pubDate>Thu, 20 Aug 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-210-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-210-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-210-lq.mp3" length="5803041" type="audio/mpeg" />
    </item>
    <item>
      <title>SN209: Vitamin D</title>
      <pubDate>Thu, 13 Aug 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-209-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-209-lq.mp3</guid>
      <description>Leo and I kick off the podcast's fifth year with a rare off-topic discussion of something I have been researching for the past eight weeks and passionately believe everyone needs to know about: Vitamin D. After next week's Q&amp;amp;A, the podcast will return to topics of Internet security.Steve's &quot;Vitamin D&quot; Research page: https://www.grc.com/health/Vitamin-D.htm</description>
      <enclosure url="http://media.grc.com/sn/sn-209-lq.mp3" length="11996647" type="audio/mpeg" />
    </item>
    <item>
      <title>SN208: Listener Feedback #72</title>
      <pubDate>Thu, 06 Aug 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-208-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-208-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-208-lq.mp3" length="13859870" type="audio/mpeg" />
    </item>
    <item>
      <title>SN207: Listener Feedback #71</title>
      <pubDate>Thu, 30 Jul 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-207-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-207-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-207-lq.mp3" length="12189094" type="audio/mpeg" />
    </item>
    <item>
      <title>SN206: Mega Security News Update</title>
      <pubDate>Thu, 23 Jul 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-206-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-206-lq.mp3</guid>
      <description>A LOT of security news transpired during the three previous weeks since Steve and Leo last recorded live.  So instead of the regularly scheduled Q&amp;amp;A episode (which is moved to next week), today they catch up with this week's "mega security news update."</description>
      <enclosure url="http://media.grc.com/sn/sn-206-lq.mp3" length="10031802" type="audio/mpeg" />
    </item>
    <item>
      <title>SN205: Lempel &amp; Ziv</title>
      <pubDate>Thu, 16 Jul 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-205-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-205-lq.mp3</guid>
      <description>Leo and I examine the operation of one of the most prevalent computer algorithm inventions in history: Lempel-Ziv data compression.  Variations of this invention form the foundation of all modern data compression technologies.</description>
      <enclosure url="http://media.grc.com/sn/sn-205-lq.mp3" length="5164542" type="audio/mpeg" />
    </item>
    <item>
      <title>SN204: Listener Feedback #70</title>
      <pubDate>Thu, 09 Jul 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-204-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-204-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-204-lq.mp3" length="8174095" type="audio/mpeg" />
    </item>
    <item>
      <title>SN203: Boyer &amp; Moore</title>
      <pubDate>Thu, 02 Jul 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-203-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-203-lq.mp3</guid>
      <description>Leo and I explore the invention of the best, and very non-intuitive, means for "string searching" - finding a specific pattern of bytes within a larger buffer.  This is crucial not only for searching documents but also for finding viruses hidden within a computer's file system.</description>
      <enclosure url="http://media.grc.com/sn/sn-203-lq.mp3" length="6819466" type="audio/mpeg" />
    </item>
    <item>
      <title>SN202: Listener Feedback #69</title>
      <pubDate>Thu, 25 Jun 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-202-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-202-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-202-lq.mp3" length="7229243" type="audio/mpeg" />
    </item>
    <item>
      <title>SN201: SecureZIP</title>
      <pubDate>Thu, 18 Jun 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-201-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-201-lq.mp3</guid>
      <description>Leo and I examine the operation, features, and security of PKWARE's FREE SecureZIP file archiving and encrypting utility. This very compelling and free offering implements a complete PKI (Public Key Infrastructure) system with per-user/per-installation certificates, public and private keys, secure encryption, digital signing, and other security features we have discussed during previous podcasts.</description>
      <enclosure url="http://media.grc.com/sn/sn-201-lq.mp3" length="5080453" type="audio/mpeg" />
    </item>
    <item>
      <title>SN200: Listener Feedback #68</title>
      <pubDate>Thu, 11 Jun 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-200-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-200-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-200-lq.mp3" length="12701522" type="audio/mpeg" />
    </item>
    <item>
      <title>SN199: The Geek Atlas, IPv6 &amp; a non-VPN</title>
      <pubDate>Thu, 04 Jun 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-199-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-199-lq.mp3</guid>
      <description>Steve and Leo explore three topics this week: A terrific new book for geeks and non-geeks alike, the uncertain future of IPv6 (and a few cautions about rushing to adoption) and a idea Steve has been mulling around for a "lightweight" means for making secure Internet connections with a VPN tunnel.</description>
      <enclosure url="http://media.grc.com/sn/sn-199-lq.mp3" length="10001739" type="audio/mpeg" />
    </item>
    <item>
      <title>SN198: Listener Feedback #67</title>
      <pubDate>Thu, 28 May 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-198-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-198-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-198-lq.mp3" length="13819888" type="audio/mpeg" />
    </item>
    <item>
      <title>SN197: Windows 7 Security</title>
      <pubDate>Thu, 21 May 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-197-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-197-lq.mp3</guid>
      <description>This week, Leo and I discuss the changes, additions and enhancements Microsoft has made to the security of their forthcoming release of Windows 7.</description>
      <enclosure url="http://media.grc.com/sn/sn-197-lq.mp3" length="9250662" type="audio/mpeg" />
    </item>
    <item>
      <title>SN196: Listener Feedback #66</title>
      <pubDate>Thu, 14 May 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-196-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-196-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-196-lq.mp3" length="13963369" type="audio/mpeg" />
    </item>
    <item>
      <title>SN195: The SSL/TLS Protocol</title>
      <pubDate>Thu, 07 May 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-195-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-195-lq.mp3</guid>
      <description>Leo and I plow into the detailed operation of the Internet's most-used security protocol, originally called "SSL" and now evolved into "TLS."  The security of this crucial protocol protects all of our online logins, financial transactions, and pretty much everything else.</description>
      <enclosure url="http://media.grc.com/sn/sn-195-lq.mp3" length="9338693" type="audio/mpeg" />
    </item>
    <item>
      <title>SN194: Listener Feedback #65</title>
      <pubDate>Thu, 30 Apr 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-194-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-194-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-194-lq.mp3" length="8840931" type="audio/mpeg" />
    </item>
    <item>
      <title>SN193: Conficker</title>
      <pubDate>Thu, 23 Apr 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-193-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-193-lq.mp3</guid>
      <description>Steve and Leo discuss the week's security news; then they closely examine the detailed operation and evolution of "Conficker," the most technically sophisticated worm the Internet has ever encountered.</description>
      <enclosure url="http://media.grc.com/sn/sn-193-lq.mp3" length="11801951" type="audio/mpeg" />
    </item>
    <item>
      <title>SN192: Listener Feedback #64</title>
      <pubDate>Thu, 16 Apr 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-192-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-192-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-192-lq.mp3" length="10750596" type="audio/mpeg" />
    </item>
    <item>
      <title>SN191: GhostNet</title>
      <pubDate>Thu, 09 Apr 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-191-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-191-lq.mp3</guid>
      <description>Steve and Leo begin by discussing the week's security news. Then Steve carefully and completely describes the construction and operation of a worldwide covert cyberspace intelligence gathering network, operating in 103 countries, that was named "GhostNet" by its Canadian discoverers.</description>
      <enclosure url="http://media.grc.com/sn/sn-191-lq.mp3" length="7281566" type="audio/mpeg" />
    </item>
    <item>
      <title>SN190: Listener Feedback #63</title>
      <pubDate>Thu, 02 Apr 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-190-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-190-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-190-lq.mp3" length="11555822" type="audio/mpeg" />
    </item>
    <item>
      <title>SN189: Internet Explorer 8</title>
      <pubDate>Thu, 26 Mar 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-189-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-189-lq.mp3</guid>
      <description>Leo and I closely examine and discuss Microsoft's just released major version 8 of Internet Explorer.  Having studied this major new web browser version closely, I examine the many new features and foibles from the standpoint of its short- and long-term impact on Internet security.</description>
      <enclosure url="http://media.grc.com/sn/sn-189-lq.mp3" length="8584422" type="audio/mpeg" />
    </item>
    <item>
      <title>SN188: Listener Feedback #62</title>
      <pubDate>Thu, 19 Mar 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-188-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-188-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-188-lq.mp3" length="11373659" type="audio/mpeg" />
    </item>
    <item>
      <title>SN187: Windows Autorun-around</title>
      <pubDate>Thu, 12 Mar 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-187-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-187-lq.mp3</guid>
      <description>Leo and I discuss the inglorious past of Windows Autorun. We explain how, until recently, disabling "Autorun" never really worked, how Microsoft hoped to fix it while bringing minimal attention to the problem, and how Microsoft's documentation of their recent fix still "got it wrong."</description>
      <enclosure url="http://media.grc.com/sn/sn-187-lq.mp3" length="7848148" type="audio/mpeg" />
    </item>
    <item>
      <title>SN186: Listener Feedback #61</title>
      <pubDate>Thu, 05 Mar 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-186-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-186-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-186-lq.mp3" length="9285241" type="audio/mpeg" />
    </item>
    <item>
      <title>SN185: Cryptographic HMACs</title>
      <pubDate>Thu, 26 Feb 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-185-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-185-lq.mp3</guid>
      <description>Leo and I discuss the role, importance and operation of cryptographically-keyed message digest algorithms and their use to securely authenticate messages: Hashed Messages Authentication Codes.</description>
      <enclosure url="http://media.grc.com/sn/sn-185-lq.mp3" length="8923896" type="audio/mpeg" />
    </item>
    <item>
      <title>SN184: Listener Feedback #60</title>
      <pubDate>Thu, 19 Feb 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-184-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-184-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-184-lq.mp3" length="13496613" type="audio/mpeg" />
    </item>
    <item>
      <title>SN183: Modes of Encryption</title>
      <pubDate>Thu, 12 Feb 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-183-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-183-lq.mp3</guid>
      <description>In preparation for a deep and detailed discussion of the Secure Sockets Layer (SSL) protocol, Steve and Leo first establish some formal crypto theory and practice of encryption operating modes.</description>
      <enclosure url="http://media.grc.com/sn/sn-183-lq.mp3" length="9768515" type="audio/mpeg" />
    </item>
    <item>
      <title>SN182: Listener Feedback #59</title>
      <pubDate>Thu, 05 Feb 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-182-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-182-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-182-lq.mp3" length="11839150" type="audio/mpeg" />
    </item>
    <item>
      <title>SN181: Crypto Rehash</title>
      <pubDate>Thu, 29 Jan 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-181-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-181-lq.mp3</guid>
      <description>Before tackling the complete description of the operation of the SSL (Secure Socket Layer) protocol, this week Leo and I take a step back to survey and review much of the cryptographic material we have covered during past 3+ years of podcasts.</description>
      <enclosure url="http://media.grc.com/sn/sn-181-lq.mp3" length="7058160" type="audio/mpeg" />
    </item>
    <item>
      <title>SN180: Listener Feedback #58</title>
      <pubDate>Thu, 22 Jan 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-180-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-180-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-180-lq.mp3" length="8938773" type="audio/mpeg" />
    </item>
    <item>
      <title>SN179: Cracking Security Certificates</title>
      <pubDate>Thu, 15 Jan 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-179-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-179-lq.mp3</guid>
      <description>Steve and Leo delve into the detailed inner workings of security certificates upon which the Internet depends for establishing the identity of users, websites, and other remote entities.  After establishing how certificates perform these functions, Steve describes how a team of security researchers successfully cracked this "uncrackable" security to create fraudulent identifications.</description>
      <enclosure url="http://media.grc.com/sn/sn-179-lq.mp3" length="9018285" type="audio/mpeg" />
    </item>
    <item>
      <title>SN178: Listener Feedback #57</title>
      <pubDate>Thu, 08 Jan 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-178-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-178-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-178-lq.mp3" length="7423464" type="audio/mpeg" />
    </item>
    <item>
      <title>SN177: Breaking SSL, PDP-8's &amp; UltraCapacitors</title>
      <pubDate>Thu, 01 Jan 2009 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-177-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-177-lq.mp3</guid>
      <description>Leo and I discuss the newly discovered cracks in SSL (Secure Sockets Layer), Antique PDP-8 minicomputers, a new PDP-8 kit you can build, and the importance of next generation UltraCapacitors.</description>
      <enclosure url="http://media.grc.com/sn/sn-177-lq.mp3" length="13242234" type="audio/mpeg" />
    </item>
  </channel>
</rss>
