During the Second World War, the Germans used what they thought to be an uncrackable encryption system.
It was a really good encryption system, and for the longest time, the Allies had a difficult time cracking the code.
However, thanks to brilliant code breakers, a powerful computing machine, and German mistakes, the British were able to break the code.
... Show More
Mar 1
Questions and Answers: Volume 40
March is upon us. Here in the northern hemisphere, the days are getting longer, temperatures are getting warmer, and people are about to go nuts over college basketball for several weeks. There is an old saying that March comes in like a lion and goes out like a lamb. That might ... Show More
16m 23s
Sep 2012
Codes! Axis Cryptography in World War II
<p>In this special episode co-hosted by TechStuff's Jonathan Strickland, the focus is on the codes, cipher machines, and cryptologists of World War II. Tune in to learn more about the Enigma Machine, Alan Turing, Code Talkers and more.</p><p> </p> Learn more about your ad-choices ... Show More
45m 47s
Mar 2023
Crypto hacker hijinks, government spyware, and Utah social media shocker
A cryptocurrency hack leads us down a maze of twisty little passages, Joe Biden's commercial spyware bill, and Utah gets tough on social media sites.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Gra ... Show More
47m 33s
Jul 2020
Jerome Hardaway + Vets Who Code
In this episode of Syntax, Scott and Wes talk with Jerome Hardaway about web dev, vets who code, diversity in tech, and more!
.TECH Domains - Sponsor If you need eyes on your project, you’ll need a domain, and .TECH is perfect for representing your brand. Find out if your .TECH ... Show More
1h 2m