show episodes
 
Artwork

1
JavaScript Jabber

Charles M Wood

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
  continue reading
 
Authmaker is a tool and a curriculum that provides guiding principals for developing full stack applications. This podcast aims to explore some of those guiding principles and help new and existing developers get up to speed with building web apps incredibly quickly. To find out more about what Authmaker is, listen to the first episode of this podcast where we explore that exact question.
  continue reading
 
Artwork

1
The Undefined Podcast

Jared Palmer & Ken Wheeler

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The only engineering podcast with a 2 drink minimum! Full stack developers Jared Palmer and Ken Wheeler have peer-to-peer conversations with world-class engineers about software development.
  continue reading
 
Welcome to the Backend Engineering Show podcast with your host Hussein Nasser. If you like software engineering you’ve come to the right place. I discuss all sorts of software engineering technologies and news with specific focus on the backend. All opinions are my own. Most of my content in the podcast is an audio version of videos I post on my youtube channel here http://www.youtube.com/c/HusseinNasser-software-engineering Buy me a coffee https://www.buymeacoffee.com/hnasr 🧑‍🏫 Courses I Te ...
  continue reading
 
Artwork

1
OpenHive.JS

NearForm

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The podcast for all things JavaScript, OpenHive.JS presents conversations with key contributors and open source leaders around new developments, challenges and perspectives in JS technology. Hosted by James Snell and Matteo Collina, OpenHive.JS publishes new episodes monthly and is produced and distributed by NearForm.
  continue reading
 
Artwork

1
Evrone development

From Evrone with love

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Evrone is an engineering company successfully delivering high-quality digital products for more than nine years. With extensive experience in a wide range of modern software technologies, we are here to help you to design unique complex web projects and startups. Our websites: https://evrone.com/ https://evrone.ru
  continue reading
 
Artwork

1
bestremoteteam

digitalrm

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Since its inception in 2011, Best Remote Team, an offshore web and mobile app development company, is offering high-quality offshore software and app development services by facilitating businesses with the right and skilled technical brains. You can hire a remote team of dedicated developers with the right skills and attitude for your project. Hire dedicated developers after a thorough screening process and a personal interview to find the best match as per your expectations.
  continue reading
 
Artwork

1
Seven Peaks Speaks

Seven Peaks Speaks

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Seven Peaks Speaks is brought to you by Seven Peaks Software with the goal to share knowledge and build an ecosystem in Bangkok and Asia for software engineering, design, and marketing related topics. Follow our Podcast Seven Peaks Speaks to not miss out on new episodes! Visit our Website http://www.sevenpeakssoftware.com for more information about Seven Peaks Software Email us for any inquiries at [email protected]
  continue reading
 
Artwork

1
Spotlight

Changelog Media

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Big announcements, conferences, the hallway track. We’re in the trenches having awesome conversations with real people from the community. This show features conversations from technology and software development events such as O’Reilly’s OSCON, All Things Open, Node Interactive (covering the Future of Node.js and JavaScript), and more. Hosts Adam Stacoviak and Jerod Santo talk to software engineers, keynote speakers, industry experts, and passionate attendees about open source, software ind ...
  continue reading
 
Artwork

1
Mechanical Ink Podcast

Open Source - Open Web - Open Standards - Accessibility

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The Mechanical Ink podcast is a podcast about the open-source ecosystem. We speak to project maintainers, open-source companies, and companies who play a critical role in ensuring a healthy ecosystem. We ask the tough questions but also celebrate the wins and acknowledge open-source software's critical role in the world. schalkneethling.substack.com
  continue reading
 
Loading …
show series
 
Today, we'll be talking about some must-know JavaScript features in 2025, Google's vibe coding platform, Firebase Studio, and more! Visit ThisWeekinJavaScript.com to subscribe to our Newsletter. Make sure you subscribe to the podcast for weekly updates and share this podcast with your friends!By Jam.dev
  continue reading
 
Static Analysis of GUID Encoded Shellcode Didier explains how to decode shell code embeded as GUIDs in malware, and how to feed the result to his tool 1768.py which will extract Cobal Strike configuration information from the code. https://isc.sans.edu/diary/Static%20Analysis%20of%20GUID%20Encoded%20Shellcode/31774 SAMLStorm: Critical Authenticatio…
  continue reading
 
Network Infraxploit Our undergraduate intern, Matthew Gorman, wrote up a walk through of CVE-2018-0171, an older Cisco vulnerability, that is still actively being exploited. For example, VOLT TYPHOON recently exploited this problem. https://isc.sans.edu/diary/Network+Infraxploit+Guest+Diary/31844 Windows Update Issues / Windows 10 Update Microsoft …
  continue reading
 
Mitchell Hashimoto, founder of HashiCorp, joins us to talk about his latest project, Ghostty—a terminal that’s fast, feature-rich, and truly cross-platform. Mitchell shares the vision behind Ghostty, its architecture built around the libghosty core, how it's tackling long-standing limitations in terminal emulation, and why features like quake-style…
  continue reading
 
David A. Patterson is a pioneering computer scientist known for his contributions to computer architecture, particularly as a co-developer of Reduced Instruction Set Computing, or RISC, which revolutionized processor design. He has co-authored multiple books, including the highly influential Computer Architecture: A Quantitative Approach. David is …
  continue reading
 
Getting Past PyArmor PyArmor is a python obfuscation tool used for malicious and non-malicious software. Xavier is taking a look at a sample to show what can be learned from these obfuscated samples with not too much work. https://isc.sans.edu/diary/Obfuscated%20Malicious%20Python%20Scripts%20with%20PyArmor/31840 CenterStack RCE CVE-2025-30406 Glad…
  continue reading
 
Microsoft Patch Tuesday Microsoft patched over 120 vulnerabilities this month. 11 of these were rated critical, and one vulnerability is already being exploited. https://isc.sans.edu/diary/Microsoft%20April%202025%20Patch%20Tuesday/31838 Adobe Updates Adobe released patches for 12 different products. In particular important are patches for Coldfusi…
  continue reading
 
This week on the pod, we were very busy with travel, cons, and sickness! We have a news grab bag episode talking about the JS enums proposal, Deno v. Oracle, Parcel+RSCs, Firefox vulnerabilities and more! Also Please email us your feedback for your retro episode ([email protected]) 00:00 Intro 00:50 VGM Con 02:07 IGDATC Talk Wednesday April 9t…
  continue reading
 
At Uber, there are many platform teams supporting engineers across the company, and maintaining robust on-call operations is crucial to keeping services functioning smoothly. The prospect of enhancing the efficiency of these engineering teams motivated Uber to create Genie, which is an AI-powered on-call copilot. Genie assists with on-call manageme…
  continue reading
 
XORsearch: Searching With Regexes Didier explains a workaround to use his tool XORsearch to search for regular expressions instead of simple strings. https://isc.sans.edu/diary/XORsearch%3A%20Searching%20With%20Regexes/31834 MCP Security Notification: Tool Poisoning Attacks Invariant labs summarized a critical weakness in the Model Context Protocol…
  continue reading
 
This episode is a little different—thanks to a U.S. holiday, I’m flying solo. But that just means we get to have a one-on-one chat! I dive into my career journey—not to brag, but to offer insights for anyone feeling stuck, of how my inventor grandfather sparked my early interest in tech, how I transitioned from electrical engineering to computer en…
  continue reading
 
New SSH Username Report A new ssh/telnet username reports makes it easier to identify new usernames attackers are using against our telnet and ssh honeypots https://isc.sans.edu/diary/New%20SSH%20Username%20Report/31830 Quickshell Sharing is Caring: About an RCE Attack Chain on Quick Share The Google Quick Share protocol is susceptible to several v…
  continue reading
 
Today, we'll be talking about the React 19.1 update, Bare, a new JavaScript runtime, Safari's 18.4 update, and more. Visit ThisWeekinJavaScript.com to subscribe to our Newsletter. Make sure you subscribe to the podcast for weekly updates and share this podcast with your friends!By Jam.dev
  continue reading
 
Fundamentals of Operating Systems Course This video is an overview of how the operating system kernel does socket management and the different data structures it utilizes to achieve that. timestamps 0:00 Intro 1:38 Socket vs Connections 7:50 SYN and Accept Queue 18:56 Socket Sharding 23:14 Receive and Send buffers 27:00 Summary…
  continue reading
 
Exploring Statistical Measures to Predict URLs as Legitimate or Intrusive Using frequency analysis, and training the model with honeypot data as well as log data from legitimate websites allows for a fairly simple and reliable triage of web server logs to identify possible malicious activity. https://isc.sans.edu/diary/Exploring%20Statistical%20Mea…
  continue reading
 
Ben Holmes, product engineer at Warp, joins PodRocket to talk about local-first web apps and what it takes to run a database directly in the browser. He breaks down how moving data closer to the user can reduce latency, improve performance, and simplify frontend development. Learn about SQLite in the browser, syncing challenges, handling conflicts,…
  continue reading
 
John Hennessy is a computer scientist, entrepreneur, and academic known for his significant contributions to computer architecture. He co-developed the RISC architecture, which revolutionized modern computing by enabling faster and more efficient processors. Hennessy served as the president of Stanford University from 2000 to 2016 and later co-foun…
  continue reading
 
Surge in Scans for Juniper t128 Default User Lasst week, we dedtect a significant surge in ssh scans for the username t128 . This user is used by Juniper s Session Smart Routing, a product they acquired from 128 Technologies which is the reason for the somewhat unusual username. https://isc.sans.edu/diary/Surge%20in%20Scans%20for%20Juniper%20%22t12…
  continue reading
 
Apple Patches Everything Apple released updates for all of its operating systems. Most were released on Monday with WatchOS patches released today on Tuesday. Two already exploited vulnerabilities, which were already patched in the latest iOS and macOS versions, are now patched for older operating systems as well. A total of 145 vulnerabilities wer…
  continue reading
 
Sourcegraph is a powerful code search and intelligence tool that helps developers navigate and understand large codebases efficiently. It provides advanced search functionality across multiple repositories, making it easier to find references, functions, and dependencies. Additionally, Sourcegraph integrates with various development workflows to st…
  continue reading
 
Apache Camel Exploit Attempt by Vulnerability Scans A recently patched vulnerability in Apache Camel has been integrated into some vulnerability scanners, like for example OpenVAS. We do see some exploit attempts in our honeypots, but they appear to be part of internal vulnerablity scans https://isc.sans.edu/diary/Apache%20Camel%20Exploit%20Attempt…
  continue reading
 
In this episode, we dive into a fascinating mix of tech history, personal stories, and entertainment recommendations. We chat with Bob Martin, who shares insights from his new book, offering a look back at the pioneers of computing, including early breakthroughs and the industry's evolution. Bob talks about the challenges of leaving out influential…
  continue reading
 
This week on the pod, we talk all about the Bun runtime funtimes! This is a powerful new player in the JavaScript and TypeScript runtime space focusing on DX, speed, and pushing the state of the art! We dive into the details and offer some of our thoughts around when to use it at the moment. In other news we avoid phone scams and talk fun new TypeS…
  continue reading
 
A Tale of Two Phishing Sties Two phishing sites may use very different backends, even if the site itself appears to be visually very similar. Phishing kits are often copied and modified, leading to sites using similar visual tricks on the user facing site, but very different backends to host the sites and reporting data to the miscreant. https://is…
  continue reading
 
Today, we'll be talking about Next.js' security vulnerability, ChatGPT-4o's game-changing image generation features and how it can be used in JavaScript apps, and The State of Vue.js Report 2025! Visit ThisWeekinJavaScript.com to subscribe to our Newsletter. Make sure you subscribe to the podcast for weekly updates and share this podcast with your …
  continue reading
 
Sitecore "thumbnailsaccesstoken" Deserialization Scans (and some new reports) CVE-2025-27218 Our honeypots detected a deserialization attack against the CMS Sitecore using a thumnailaccesstoken header. The underlying vulnerability was patched in January, and security firm Searchlight Cyber revealed details about this vulnerability a couple of weeks…
  continue reading
 
In this first episode of our new podcast, Gordon Mullan and Govind Shukla discuss the latest news in the world of AI, plus other news from robotics, ethics, regulation, and more! NAVIGATION 00:00 - Introduction 06:42 - Google 18:15 - OpenAI 21:44 - Microsoft 40:08 - Mistral 45:16 - China: Alibaba 52:40 - China: Manus 56:30 - Windsurf Editor 57:40 -…
  continue reading
 
Luca Casanato, member of the Deno core team, delves into the intricacies of debugging applications using Deno and OpenTelemetry. Discover how Deno's native integration with OpenTelemetry enhances application performance monitoring, simplifies instrumentation compared to Node.js, and unlocks new insights for developers! Links https://lcas.dev https:…
  continue reading
 
Jeffrey Ullman is a renowned computer scientist and professor emeritus at Stanford University, celebrated for his groundbreaking contributions to database systems, compilers, and algorithms. He co-authored influential texts like Principles of Database Systems and Compilers: Principles, Techniques, and Tools (often called the “Dragon Book”), which h…
  continue reading
 
Leveraging CNNs and Entropy-Based Feature Selection to Identify Potential Malware Artifacts of Interest This diary explores a novel methodology for classifying malware by integrating entropy-driven feature selection with a specialized Convolutional Neural Network (CNN). Motivated by the increasing obfuscation tactics used by modern malware authors,…
  continue reading
 
XWiki Search Vulnerablity Exploit Attempts (CVE-2024-3721) Our honeypot detected an increase in exploit attempts for an XWiki command injection vulnerablity. The vulnerability was patched last April, but appears to be exploited more these last couple days. The vulnerability affects the search feature and allows the attacker to inject Groovy code te…
  continue reading
 
Contextual memory in AI is a major challenge because current models struggle to retain and recall relevant information over time. While humans can build long-term semantic relationships, AI systems often rely on fixed context windows, leading to loss of important past interactions. Zep is a startup that’s developing a memory layer for AI agents usi…
  continue reading
 
Privacy Aware Bots A botnet is using privacy as well as CSRF prevention headers to better blend in with normal browsers. However, in the process they may make it actually easier to spot them. https://isc.sans.edu/diary/Privacy%20Aware%20Bots/31796 Critical Ingress Nightmare Vulnerability ingress-nginx fixed four new vulnerabilities, one of which ma…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play