Get the app
Help
Download the app
Anghami Plus
Browse content
Moods and genres
Podcasts
OSN Plus
May 2021
6m 32s
brute-force attack (noun) [Word Notes]
N2K Networks
Play for free
About this episode
A cryptographic hack that relies on guessing all possible letter combinations of a targeted password until the correct codeword is discovered.
Up next
Today
Abstraction layer (noun) [Word Notes]
Please enjoy this encore of Word Notes. A process of hiding the complexity of a system by providing an interface that eases its manipulation. CyberWire Glossary link: https://thecyberwire.com/glossary/abstraction-layer Audio reference link: “What Is Abstraction in Computer Sci ...
Show More
5m 36s
Oct 9
The text trap tightens.
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest ...
Show More
47m 24s
Oct 7
Identity Fabric (noun) [Word Notes]
Please enjoy this encore of Word Notes. A set of services for managing identity and access management, or IAM across all of an organization's data islands. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-fabric Audio reference link: “Leadership Compass Iden ...
Show More
7m 46s
Recommended Episodes
Dec 2020
Episode 10: Exploiting Authenticated Encryption Key Commitment!
Authenticated encryption such as AES-GCM or ChaCha20-Poly1305 is used in a wide variety of applications, including potentially in settings for which it was not originally designed. A question given relatively little attention is whether an authenticated encryption scheme guarante ...
Show More
46m 34s
Oct 2023
Passwordless authentication startup SecureW2 raises $80M from Insight Partners
Passwordless authentication offers a host of advantages over traditional pins, passphrases and passcodes. Learn more about your ad choices. Visit podcastchoices.com/adchoices
5m 1s
Nov 2021
Using bidirectionality override characters to obscure code. [Research Saturday]
Guests Nicholas Boucher and Ross Anderson from the University of Cambridge join Dave Bittner to discuss their research, "Trojan Source: Invisible Vulnerabilities." The researchers present a new type of attack in which source code is maliciously encoded so that it appears differen ...
Show More
25m 10s
Jul 2010
140 GID Keeping Track of Passwords
Find out how to remember your passwords and get tips for the best ways to keep track of your passwords when you have too many passwords to remember easily.
6m 1s
Jun 2020
Mots de passe (Passwords)
Texte: Le site de réseaux sociaux LinkedIn a déclaré que certains des mots de passe de ses membres ont été compromis après qu'il ait été observé que des millions de mots de passe ont fait l'objet de fuites. Traduction: Social networking website LinkedIn says some of its members' ...
Show More
4m 56s