Category: Links you heard on the show

What is the Windows 10 Share Feature, and How Do I Use It?

Internal file sharing has been a part of the Windows operating system for years, but it’s only with the introduction of version 10 that Microsoft has finally decided to give its users the opportunity to share their content with local accounts and the world at large, all from the same place. Source: What is the […]

Microsoft comes clean(ish) on Windows 10 data collection

Windows 10 is getting a whole lot better with the Creators Update, but there’s more to it than just new features and performance improvements. Microsoft is today highlighting some changes to give users better control over their privacy. The most visible of these changes will be a new Privacy Settings screen that shows up when […]

DEF CON 23 – Marc Rogers and Kevin Mahaffey – How to Hack a Tesla Model S – YouTube

The Tesla Model S is the most connected car in the world. It might surprise you to hear that it is also one of the most secure. In this talk we will walk you through the architecture of a Tesla Model S noting things that Tesla got right as well as identifying those that they […]

Triangulation 288 Marc Rogers

Marc Rogers is the Principal Security Researcher at Cloudflare, Head of Security at Defcon, hacking adviser to Mr. Robot, and an all-around legend in the hacking world. Marc and Leo talk about Cloudbleed, building a femtocell for Mr. Robot, running security at Defcon, the possibility of cyber warfare, and how to teach your kid to […]

Security Tango™

The Security Tango is my name for the dance you have to do every time you want to assure yourself that your computer is free of viruses, spyware, keystroke loggers, backdoors, trojans, and other forms of malware (click the Definitions button in the menu to see what all those things mean). It’s something you need […]

Funny & Stupid Customer Stories – Not Always Right

Source: Funny & Stupid Customer Stories – Not Always Right

Process Hacker

A free, powerful, multi-purpose tool that helps youmonitor system resources, debug software and detect malware. Source: Overview – Process Hacker

F-Secure Freedome VPN | Protect your privacy

Trackers, advertisers and even your Internet service provider can’t see what you do online. Your real IP is hidden from the pages you visit. We do not log your traffic. Source: F-Secure Freedome VPN | Protect your privacy

SurfEasy Ultra fast VPN

The ultra fast vpn you can trust Source: SurfEasy Ultra fast VPN | VPN Service for Android, iOS, Mac & Windows – SurfEasy Ultra fast VPN | VPN Service for Android, iOS, Mac & Windows

The Joy of Tech comic… Browser history for sale!

ISP: You can’t hide your snoopy eyes! Source: The Joy of Tech comic… Browser history for sale!

« Previous PageNext Page »