Episode 366: Catching up with Allan




TechSNAP show

Summary: <p>We catch up with Allan Jude and he shares stories of hunting network bottlenecks, memories of old firewalls, and some classic ZFS updates.</p> <p>Plus the vulnerabilities found in Volkswagen cars, and the lengths a security research went to create the ultimate honeypot laptop.</p><p>Special Guest: Allan Jude.</p><p>Sponsored By:</p><ul> <li> <a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li> <li> <a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li> <li> <a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li> </ul><p>Links:</p><ul> <li> <a title="Volkswagen and Audi Cars Vulnerable to Remote Hacking" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/volkswagen-and-audi-cars-vulnerable-to-remote-hacking/">Volkswagen and Audi Cars Vulnerable to Remote Hacking</a> — esearchers also gained access to the IVI system's root account, which they say allowed them access to other car data.</li> <li> <a title="It’s Impossible to Prove Your Laptop Hasn’t Been Hacked. I Spent Two Years Finding Out." rel="nofollow" href="https://theintercept.com/2018/04/28/computer-malware-tampering/">It’s Impossible to Prove Your Laptop Hasn’t Been Hacked. I Spent Two Years Finding Out.</a> — For the last two years, I have carried a “honeypot” laptop with me every time I’ve traveled; this computer was intended to attract (and then detect) tampering.</li> <li> <a title="chipsec" rel="nofollow" href="https://github.com/chipsec/chipsec">chipsec</a> — Platform Security Assessment Framework </li> <li> <a title="UEFITool" rel="nofollow" href="https://github.com/LongSoft/UEFITool">UEFITool</a> — UEFI firmware image viewer and editor </li> <li> <a title="Haven Project" rel="nofollow" href="https://guardianproject.github.io/haven/">Haven Project</a> — Haven is for people who need a way to protect their personal spaces and possessions without compromising their own privacy, through an Android app and on-device sensors</li> <li><a title="Mr S. Delivers on his DO FreeNAS Guide" rel="nofollow" href="https://pastebin.com/sYV5pjQg">Mr S. Delivers on his DO FreeNAS Guide</a></li> <li><a title="OZ Shares a War Story" rel="nofollow" href="https://pastebin.com/rWVgzd03">OZ Shares a War Story</a></li> <li><a title="Dave's REALLY Close Call..." rel="nofollow" href="https://pastebin.com/mmtqt4g4">Dave's REALLY Close Call...</a></li> <li><a title="Karl Gives us the CTO View on new Hires" rel="nofollow" href="https://pastebin.com/bN3SHfyv">Karl Gives us the CTO View on new Hires</a></li> <li> <a title="Our Approach to Employee Security Training | PagerDuty" rel="nofollow" href="https://www.pagerduty.com/blog/security-training-at-pagerduty/">Our Approach to Employee Security Training | PagerDuty</a> — These are both training courses that we developed in-house and delivered ourselves.</li> </ul>