Category: hack the gibson

  • Hack the Gibson #90

    Read the reason for these posts. Read Steve Gibson’s response. Towards the start of the show Leo mentions that SSL certificates used by the sites to authenticate themselves to the users are single-factor. And this is true, however one has to add that there is nothing wrong with single-factor authentication as long as good security…

  • Hack the Gibson #89

    Read the reason for these posts. Read Steve Gibson’s response. Related to the SpinRite story (which are present in every episode): again, I don’t know WTF (pardon my language) people are doing with their computers, but in my 15 years of computer usage I never (knock on wood) had a hard-drive fail on me or…

  • Hack the Gibson – special edition – aka lucky 13

    I’ve been absent lately with the whole Hack the Gibson series, completely missing the 100th episode for example, not because I wouldn’t have material, but because I’m very busy (or very lazy, depending on your viewpoint :-)). However I just wanted to let you know about a usefull resource, which unfortunately seems to be dead…

  • Hack the Gibson #88

    Read the reason for these posts. Read Steve Gibson’s response. A question which popped up twice in this episode was the problem with broadband user and the answer provided was very good: even if 50% of the people who have broadband would to turn off their connection when they are not using it, the other…

  • Hack the Gibson #81 to #87

    Read the reason for these posts. Read Steve Gibson’s response. Here is again a long overdue post about the recent Security Now episodes. I have to say that the quality of the information provided in the recent episodes deteriorated (or maybe it is that they started talking about more concrete things where the errors are…

  • Hack the Gibson #73 & #74

    Well, don’t hack it. Actually the last two episodes of Security Now! were very insightful and as far as I know without major mistakes. The interview with Peter Gutmann is very interesting and if you have time you should read the original paper: A Cost Analysis of Windows Vista Content Protection. My opinion about it?…

  • Hack the Gibson – Episode #72

    Read the reason for these posts. Read Steve Gibson’s response. The first thing I want to mention is that the constant marketing push for SpinRite makes me curious. I have no way to try it (because Steve doesn’t make a demo version publicly available), but after reading a book Kurt (a very well known company…

  • Hack the Gibson – Episode #71

    Read the reason for these posts. Read Steve Gibson’s response. Hello all! Here is the latest of my rants / commentary series regarding the Security Now! podcast. This podcast is dedicated to discussing a vaporware security freeware: SecurAble. This isn’t more than a glorified CPU identification utility, similar but (based on the description) much more…

  • Hack the Gibson – Episode #68

    Read the reason for these posts. Read Steve Gibson’s response. Again, this episode was mostly technically correct (as far as I observed), there are only a couple of things I would like to comment on: ReadyBoost has nothing to do with booting. Is simply uses the flash drive (while running) to store the page file,…

  • Hack the Gibson – Episode #67

    This will be a short post, because the podcast (sorry, the netcast) was very on the spot. Also this was the first time I’ve heard that Steve included an errata. Things are definitely improving. I hope that I made a small contribution to this. One fun fact: the GRC.com website is running on Windows with…