inThirty show

inThirty

Summary: Join intrepid host Justin Freid as he traverses the week's biggest tech news in a rapid-fire roundtable discussion before your very ears.

Join Now to Subscribe to this Podcast

Podcasts:

 inThirty 180 – Verizon Buys AOL | File Type: audio/mpeg | Duration: 28:28

What does Verizon want from AOL? We spend too much time hypothesizing, and less time explaining what it actually means.

 inThirty 180 – Verizon Buys AOL | File Type: audio/mpeg | Duration: 28:28

What does Verizon want from AOL? We spend too much time hypothesizing, and less time explaining what it actually means.

 Security 78 – AdBlock | File Type: audio/mpeg | Duration: 28:45

We first start talking about a crazy vulnerability in some medical equipment. But we follow up with a discussion on advertising blocking software. Show Notes: Hacker News | CVE-2015-3459

 Security 77 – Alternatives to Google | File Type: audio/mpeg | Duration: 34:20

In this episode we talk about alternatives to the Google services.  We have no reason to not trust Google, but what happens if you want to explore other options.

 inThirty 179 – Apple Watch Aftermath | File Type: audio/mpeg | Duration: 30:25

https://youtu.be/2HtGZpJP0Ew It has been only a few days, and the three of us (who don't own an Apple Watch) feel the need to comment on it.  What are our initial thoughts?  

 inThirty 179 – Apple Watch Aftermath | File Type: audio/mpeg | Duration: 30:25

It has been only a few days, and the three of us (who don’t own an Apple Watch) feel the need to comment on it.  What are our initial thoughts?  

 Security 76 – DefCon East | File Type: audio/mpeg | Duration: 26:08

Chaim went to DefCon in NYC. You may be asking yourself, how can that be. Well DefCon did a special session in NYC for the TriBeCa Film Festival. What did he learn? Show Notes: TOOOL | The Open Organization Of Lockpickers DEFCON

 Security 75 – WiFi Grenade | File Type: audio/mpeg | Duration: 29:28

Fresh off his talk at OISF, Tom talks about what a wifi grenade is. It is better to watch than to listen because of the slides. NOTE: This is purely for individual use. It could get you in trouble. Show Notes: Tom's Blog Post with Disclaimer

 inThirty 178 – Trusting Google | File Type: audio/mpeg | Duration: 26:52

Paul can’t join us because he just got back from London, but we discuss how “Google-fied” our lives are, and is it really a monopoly.

 inThirty 178 – Trusting Google | File Type: audio/mpeg | Duration: 26:52

Paul can't join us because he just got back from London, but we discuss how "Google-fied" our lives are, and is it really a monopoly.

 Security 74 – The Lowest Standard | File Type: audio/mpeg | Duration: 29:41

The topics we talk about here are supposed to be for security aware people, but we forget that our standards are sometimes set too high. We spend this show talking about the very very basic things you can do. Remember, there are people who have never heard of a podcast.

 Security 73 – Disclosure | File Type: audio/mpeg | Duration: 31:32

We are joined by Charlie Kratovil, Managing Editor, of New Brunswick Today who reported that Rutgers University suffered a DDoS attack last weekend. We talk to him about the right to (not) disclose, was it handled correctly, and how good or bad is Rutgers security. Note: we went a little long.

 inThirty 177 – F8 and #Periscope | File Type: audio/mpeg | Duration: 30:24

Since there was nothing in the news for the past few weeks we felt the need to talk about F8, the Facebook conference. We finish up by talking about why #Meerkat and #Periscope are things.

 inThirty 177 – F8 and #Periscope | File Type: audio/mpeg | Duration: 30:24

Since there was nothing in the news for the past few weeks we felt the need to talk about F8, the Facebook conference. We finish up by talking about why #Meerkat and #Periscope are things.

 Security 72 – License Plate Readers | File Type: audio/mpeg | Duration: 30:28

Ars Technica did a piece on the Oakland Police Department using License Plate Readers to track cars. It caused a stir, not by the use of the device, but the visualization it gave later. Tom and I discuss is this something we should fear, or is this a good thing. Show Notes: Ars Technica

Comments

Login or signup comment.