Welcome to George Kagwe, where amazing things happen.
…
continue reading
Tecnología aplicada... a la vida
…
continue reading
Black Hat Digital Self Defense. Black Hat provides cutting edge content in the information and computer security field. Keep up to date with Black Hat presentations, announcements, and free content.
…
continue reading
Hosted by experienced geeks, Tech Pulse is chock full of the hottest industry news, computer tips and tricks, software and hardware picks, and more! Mac or Windows user, professional or hobbyist, you're sure to like this podcast.
…
continue reading
Past speeches and talks from the Black Hat Briefings computer security conferences. October 17-18 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Katsuya Uchida was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-japan-05/bh-jp-05-main.html Black Hat Briefings bring together a unique mix in security: t ...
…
continue reading
1
WACHA NIWAAMBIE: Bro Zone To Friend Zone To Boyfriend Zone - George Kagwe
15:19
15:19
Play later
Play later
Lists
Like
Liked
15:19
Episode 2 of Wacha Niwaambie ndyo hii hapa manze! Thank you for your amazing support. Tunashukuru sana Support Us: 0111 783 303 (Karimi Mbae) #WachaNiwaambie #GeorgeKagwe #KarimiKagwe PLEASE SUPPORT US: 0111 783 303 (KARIMI KAGWE)
…
continue reading
1
WACHA NIWAAMBIE: The Day I Met My Wife For The First Time - George Kagwe
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38
Maguuyysssss! NEW SERIES INSIDE! WACHA NIWAAAMBIE hile time I met my to be wife for the very first time! Here is to knowing us/ me better! SUBSCRIBE! #WachaNiwaambie #GeorgeKagwe #KarimiKagwe #MpesaLadyChallenge SUPPORT US PLEASE: 0111 783 303 (KARIMI MBAE)
…
continue reading
1
Nuevos AirPods Pro: Resumen de noticias 1/Nov/19
3:14
3:14
Play later
Play later
Lists
Like
Liked
3:14
Resumen de noticias tecnológicas y de cultura digital. Noviembre 1, 2019: Apple lanza sus nuevos audífonos AirPods Pro, Spotify Kids entra en beta, Samsung da acceso a desarrolladores a su plataforma de Blockchain, nuevos juegos en la tienda en línea de Nintendo, Twitter ya no aceptará publicidad pagada de políticos y nuevas apps para dueños de aut…
…
continue reading
Resumen de noticias tecnológicas y de cultura digital. Octubre 31, 2019: LinkedIn abrirá oficinas en México, reconocimiento facial de alta precisión gracias a la IA, se registró el primer recién nacido con tecnología Blockchain, LG y Qualcomm crearán tecnología para autos inteligentes, nueva app que detecta el Cyberbullying, no se aprobó la iniciat…
…
continue reading
1
Nuevas bocinas Sony: Resumen de noticias 30/Oct/19
3:26
3:26
Play later
Play later
Lists
Like
Liked
3:26
Resumen de noticias tecnológicas y de cultura digital. Octubre 30, 2019: La IA está cambiando la relación laboral con la tecnología, Minecraft Earth llega a México con acceso anticipado, Samsung e Intel anuncian dos nuevas laptops con funciones de Inteligencia Artificial, nuevo trailer de Star Wars Jedi: Fallen Order, se anuncia la llegada de los R…
…
continue reading
1
Falla la Space Selfie: Resumen de noticias 29/Oct/19
3:21
3:21
Play later
Play later
Lists
Like
Liked
3:21
Resumen de noticias tecnológicas y de cultura digital. Octubre 29, 2019: Spotify anunció ganancias para este año, Deezer lanza app dedicada al formato 360 Reality Audio de Sony, Samsung tuvo un incidente con su Space Selfie, Dominos usa IA para checar sus pizzas, llega a México el ZOOM IN PROJECT de Canon, y WD lanza discos duros para videojuegos. …
…
continue reading
1
Adware en smartphones: Resumen de noticias 28/Oct/19
3:11
3:11
Play later
Play later
Lists
Like
Liked
3:11
Resumen de noticias tecnológicas y de cultura digital. Octubre 28, 2019: Adware en Android, llega el Fan Fest de Xbox a México, Mediatek estrena chip para Smart TVs, ya viene a México el Mi A3 de Xiaomi, Adware en iPhone y reemplazos de Google Home y Mini. Noticias del 28/10/19 por Byte Podcast – Descarga directa…
…
continue reading
1
Nuevos moto g8: Resumen de noticias 25/Oct/19
3:05
3:05
Play later
Play later
Lists
Like
Liked
3:05
Resumen de noticias tecnológicas y de cultura digital. Octubre 25, 2019: Nuevos servicios de Clip, nuevos smarphones de Motorola en México, Apple TV llega al Fire TV Stick, nueva línea 2019 de Roku, el iPod cumple 18 años, y el nuevo teléfono con doble pantalla LG G8X ThinQ. Noticias del 25/10/19 por Byte Podcast – Descarga directa…
…
continue reading
1
OptiPlex 7070 Ultra: Resumen de noticias 24/Oct/19
3:17
3:17
Play later
Play later
Lists
Like
Liked
3:17
By Byte Podcast
…
continue reading
1
Yafesi Musoke: The Story Behind The Village Musicals - The Slate
17:42
17:42
Play later
Play later
Lists
Like
Liked
17:42
Yafesi Musoke talks about how he got to work on the Village Musicals and the journey behind it.#TheSlate #DigitalEmpowerment #Acting101KE
…
continue reading
1
4. Yafesi Opens Up About His Radio Host Career, Hope FM & Post Election Violence - The Slate
23:29
23:29
Play later
Play later
Lists
Like
Liked
23:29
In this video Yafesi Musoke opens up about how his radio hosting career started and how he got to work with various influential people and iconic life events.#TheSlate #DigitalEmpowerment #Acting101KE
…
continue reading
1
3. Yafesi Tells Us How He Got To Work With Chris Adwar - The Slate
16:08
16:08
Play later
Play later
Lists
Like
Liked
16:08
He went to campus and joined the Drama Club. He immediately was assigned a the chairmanship and lots of other responsibilities came with it. All that and more in the 3rd part of this series.#TheSlate #DigitalEmpowerment #Acting101KE
…
continue reading
1
2. Yafesi Musoke Shares On How He got To Be In A Musical With John Allan Namu - The Slate
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47
In this episode, Yafesi opens up about how he got to act and sing in various school musicals together with the Likes of John Alllan Namu and June Gachui.#TheSlate #DigitalEmpowerment #Acting101KE
…
continue reading
1
1. Yafesi Musoke Talks About His Childhood & Where Acting All Began - The Slate
15:10
15:10
Play later
Play later
Lists
Like
Liked
15:10
In this first episode of the Slate, we talk to Yafesi Musoke. A living legend in the film and theatre space in Kenya. Get to know where his journey all began and what influenced him into his great career as an actor. #TheSlate #DigitalEmpowerment #Acting101KE
…
continue reading
1
RSAC 2017: Robert Graham on Mirai and IoT Botnet Analysis
44:09
44:09
Play later
Play later
Lists
Like
Liked
44:09
Robert Graham discusses "Mirai and IoT Botnet Analysis." Presentation from RSA Conference USA 2017, recorded with permission. Follow along with the slides; see PDF link in show notes at techpulsepodcast.comBy the JoshMeister
…
continue reading
1
RSAC 2017: Amit Serper on OSX Pirrit and Why You Should Care about Malicious Mac Adware
53:54
53:54
Play later
Play later
Lists
Like
Liked
53:54
Amit Serper discusses "OSX Pirrit: Why You Should Care about Malicious Mac Adware." Presentation from RSA Conference USA 2017, recorded with permission. Follow along with the slides; see PDF link in show notes at techpulsepodcast.comBy the JoshMeister
…
continue reading
1
RSAC 2017: Patrick Wardle's Meet and Greet with the macOS Malware Class of 2016
48:29
48:29
Play later
Play later
Lists
Like
Liked
48:29
Patrick Wardle's "Meet and Greet with the macOS Malware Class of 2016." Presentation from RSA Conference USA 2017, recorded with permission. Follow along with the slides; see PDF link in show notes at techpulsepodcast.comBy the JoshMeister
…
continue reading
1
Tech Pulse 20101027: Podcast News and Announcements
2:43
2:43
Play later
Play later
Lists
Like
Liked
2:43
A brief update about the podcast, and a chance to meet the JoshMeister in NovemberBy the JoshMeister
…
continue reading
Nathan McFeters, Jon Heasman and Rob Carter gave a very popular and heavily covered presentation this year that introduced the world to the term "gifar." It's fascinating information, and well presented. We hope that those of you who couldn't make it to the Vegas event will get a taste of the kind of presentations attendees get to see and attendees…
…
continue reading
You can now listen David Litchfield's webcast presentation about his new Oracle database forensics tool orablock online here: Bookmarkable audio version: https://media.blackhat.com/webinars/black-hat-6-december-2008-litchfield.m4b Web Sync Version http://w.on24.com/r.htm?e=122240&s=1&k=57F93C9128D5D1BBC64B8AE7177FB981…
…
continue reading
Bookmarkable audio for all talks is now available in the Japan 08 archive. Lots of good stuff there - please enjoy. The archive link is https://www.blackhat.com/html/bh-japan-08/brief-bh-jp-08-archives.html The Keynote is enclosed with this entry, but there are lots of great presentations to check out.…
…
continue reading
in case you missed Black Hat Webcast #5 : Clickjacking and Browser Security with Jeremiah Grossman, the archived version is now online in two formats. You can listen to the audio here: https://media.blackhat.com/webinars/black-hat-webcast-5-november-08-clickjacking.m4b Or follow the slides in the live websync by following this link: http://w.on24.c…
…
continue reading
1
Tech Pulse 20071108: Does Mac Security Suck?
1:26:25
1:26:25
Play later
Play later
Lists
Like
Liked
1:26:25
Josh and Big-O discuss the Google Android phone platform announcement and the new Mac OS X Trojan spreading through porn sites, and talk at length about the pros and cons of Mac OS X vs. Windows securityBy Tech Pulse Podcasters
…
continue reading
1
Tech Pulse 20071026: Special Edition: Mac OS X Leopard Launch
40:20
40:20
Play later
Play later
Lists
Like
Liked
40:20
Josh covers the launch of Mac OS X v10.5 Leopard, talking to several people in the line (including Victor Cajiao of Typical Mac User), giving his first hands-on impressions of Leopard, and doing exclusive coverage of the wedding-day Apple Store crashers!By Tech Pulse Podcasters
…
continue reading
1
Tech Pulse 20071018: Amazon.com DRM-free MP3s, eBay Hacked, Zune Adds Podcast Support, and more!
1:13:50
1:13:50
Play later
Play later
Lists
Like
Liked
1:13:50
Lots of news including the Amazon.com DRM-free MP3 store, eBay hack led to stolen credit card info, iPhones unlocked then bricked then unlocked again, Zune adds podcast support, Bungie might split from Microsoft, Mac OS X Leopard is coming, and more!By Tech Pulse Podcasters
…
continue reading
1
Tech Pulse 20070906: Drobo Review, iPhone Price Cuts, iPod Touch, HandBrake, and more!
1:44:30
1:44:30
Play later
Play later
Lists
Like
Liked
1:44:30
A guest review of Drobo, plus tons of iPhone- and iPod-related news, details about recent Monster.com and Mobipocket server hacks, Josh offers security tips, Josh picks the multi-OS free DVD ripper HandBrake, Kyle discusses iWork and iLife 08, and more!By Tech Pulse Podcasters
…
continue reading
1
Tech Pulse 20070823: Monster.com Hacked, 700 MHz and Google, Open Letter to Palm, and more!
21:59
21:59
Play later
Play later
Lists
Like
Liked
21:59
Josh talks about Monster.com user data being stolen, Google preparing to bid on the 700 MHz spectrum, Engadget's open letter to Palm: get with the times, full screen mode in QuickTime Player without 7.2 or Pro, and the Mac browser Camino!By Tech Pulse Podcasters
…
continue reading
1
Tech Pulse 20070809: Netflix Hacked, Uninterruptible Power, Sweet Firefox Add-ons, and more!
41:40
41:40
Play later
Play later
Lists
Like
Liked
41:40
Josh talks about Apple's new iMac and other product upgrades, Netflix getting hacked, future huge-capacity notebook drives, the safety of using an uninterruptible power supply (UPS), Firefox add-ons to block ads and increase Internet safety, and more!By Tech Pulse Podcasters
…
continue reading
1
Tech Pulse 20070802: Google Galore, Apple Profits and Patches, USB vs. FireWire, IPv6, and more!
1:48:10
1:48:10
Play later
Play later
Lists
Like
Liked
1:48:10
Josh, Anthony, and Kyle chat about Apple news, Google Phone rumors, Google apps, securing VNC, multi-service IM clients, USB vs. FireWire, Intel Core 2 Quad price drops, IPv6, the annoyance of required reboots, and more!By Tech Pulse Podcasters
…
continue reading
1
Tech Pulse 20070718: New "Mac Worm," Connect to Your PC or Mac for Free, Batch Image Resizers, TextWrangler, and more!
1:09:20
1:09:20
Play later
Play later
Lists
Like
Liked
1:09:20
Josh and Big-O discuss the alleged new "Mac worm" and Mac security in general, how to remotely connect to your PC or Mac for free using VNC, batch photo resizing freeware apps for Windows and Mac, TextWrangler, and more!By Tech Pulse Podcasters
…
continue reading
1
Tech Pulse 20070711: iPhone Nano Rumors, E3, Quicksilver and Launchy, GeekHosting.com, and more!
1:07:20
1:07:20
Play later
Play later
Lists
Like
Liked
1:07:20
Josh, Anthony, and Big-O discuss rumors about an iPhone Nano and share some E3 highlights, tech tips, and picks including OpenOffice.org and NeoOffice, Growl, Quicksilver and Launchy, and GeekHosting.comBy Tech Pulse Podcasters
…
continue reading
1
Tech Pulse 20070703: iPhone Hands-on Review!
1:12:10
1:12:10
Play later
Play later
Lists
Like
Liked
1:12:10
Anthony King (MacMod.com) and special guests Quinn McHenry (Tech-Recipes.com) and Jeff Phillips (MacTechEdu.com) share their personal experiences with the iPhone, tips about instant messaging and secret button combos, and more!By Tech Pulse Podcasters with Quinn McHenry of Tech-Recipes.com and Jeff Phillips of MacTechEdu.com
…
continue reading
1
Tech Pulse 20070627: Opera Mini 4 vs. iPhone, Anti-Virus and Anti-Spyware Tips
1:01:00
1:01:00
Play later
Play later
Lists
Like
Liked
1:01:00
Opera Mini 4 Beta launches a preemptive strike against the iPhone, but can it possibly hold a candle to the iPhone's Safari browser? Josh and Kyle also discuss anti-virus and anti-spyware solutions for WindowsBy Tech Pulse Podcasters
…
continue reading
1
Tech Pulse 20070619: OpenDNS, Booqbags, DST Patches, Levelator, and more!
1:11:50
1:11:50
Play later
Play later
Lists
Like
Liked
1:11:50
Big-O introduces himself and talks about organizing the Mac OS X Applications folder and The Levelator, Josh talks about DST patches and AppleJack, Kyle gushes over OpenDNS and compares hard drives, and Anthony recommends Booqbags and ergonomic keyboardsBy Tech Pulse Podcasters
…
continue reading
1
Tech Pulse 20070616: iPhone, Safari 3, YouTube on Apple TV, and Parallels 3
1:02:10
1:02:10
Play later
Play later
Lists
Like
Liked
1:02:10
Tech Pulse podcasters Josh, Kyle, and Anthony introduce themselves and discuss the iPhone, Safari 3 Public Beta, YouTube content on the Apple TV, and Parallels Desktop 3.By Tech Pulse Podcasters
…
continue reading
1
Ejovi Nuwere: The Art of SIP fuzzing and Vulnerabilities Found in VoIP (English)
50:13
50:13
Play later
Play later
Lists
Like
Liked
50:13
"This presentation will cover SIP and VoIP related automated fuzzing techniques. Using real world vulnerabilities and audit engagements we will give a technical understanding of this emerging technology and its common attack vectors.The techniques discussed in this talk will not only be limited to SIP but will apply to methodical audit approaches f…
…
continue reading
1
Katsuya Uchida: Keynote: The Day After... (Japanese)
1:09:15
1:09:15
Play later
Play later
Lists
Like
Liked
1:09:15
"ARPANET was established in 1968. In 1971, "creeper"programmed by Bob Thomas moved from computer to computer on ARPANET and displayed on each user's screen "I'm the creeper. Catch me if you can!". Xerox PARC set up the ethernet in 1973 since researchers were interested in the concept of "distributed processing". They were testing programs whose fun…
…
continue reading
1
Dominique Brezinski: A Paranoid Perspective of an Interpreted Language (English)
1:16:22
1:16:22
Play later
Play later
Lists
Like
Liked
1:16:22
"Interpreted, dynamically-typed, and object-oriented languages like Ruby and Python are very good for many programming task in my opinion. Such languages have many benefits from rapid, easy development to increased security against memory allocation and manipulation related vulnerabilities. However, choice of programming language alone does not gua…
…
continue reading
1
Kenneth Geers: Hacking in a Foreign Language: A Network Security Guide to Russia (and Beyond) (English)
1:27:12
1:27:12
Play later
Play later
Lists
Like
Liked
1:27:12
"Has your network ever been hacked, and all you have to show for your investigative efforts is an IP address belonging to an ISP in Irkutsk? Are you tired of receiving e-mails from Citibank that resolve to Muscovite IP addresses? Would you like to hack the Kremlin? Or do you think that the Kremlin has probably owned you first? Maybe you just think …
…
continue reading
1
Jeremiah Grossman: Phishing with Super Bait (English)
1:05:44
1:05:44
Play later
Play later
Lists
Like
Liked
1:05:44
"The use of phishing/cross-site scripting (XSS) hybrid attacks for financial gain is spreading. It?s imperative that security professionals familiarize themselves with these new threats to protect their websites and confidential corporate information.This isn't just another presentation about phishing scams or cross-site scripting. We?re all very f…
…
continue reading
1
Chris Hurley: Identifying and Responding to Wireless Attacks (English)
1:04:09
1:04:09
Play later
Play later
Lists
Like
Liked
1:04:09
"This presentation details the methods attackers utilize to gain access to wireless networks and their attached resources. Examples of the traffic that typifies each attack are shown and discussed, providing attendees with the knowledge too identify each attack. Defensive measures that can be taken in real time to counter the attack are then presen…
…
continue reading
1
Hideaki Ihara: Forensics in Japan (Japanese)
1:20:44
1:20:44
Play later
Play later
Lists
Like
Liked
1:20:44
"In forensic research it is imperative to search for Japanese language strings. However many of the tools used in forensic research are being developed outside of Japan, and therefore not tuned for the Japanese language. In Japan there is research being done on using character encoding for anti-forensic countermeasures, and therefore character enco…
…
continue reading
1
Dan Kaminsky: Black Ops Of TCP/IP 2005 (English)
1:21:18
1:21:18
Play later
Play later
Lists
Like
Liked
1:21:18
"Our networks are growing. Is our understanding of them? This talk will focus on the monitoring and defense of very large scale networks, describing mechanisms for actively probing them and systems that may evade our most detailed probes. We will analyze these techniques in the context of how IPv6 affects, or fails to affect them. A number of techn…
…
continue reading
1
Satoru Koyama: Botnet survey result. "Our security depends on your security." (Japanese)
1:18:14
1:18:14
Play later
Play later
Lists
Like
Liked
1:18:14
"Many of the various attacking mechanism such as spam email, DDoS that are attacking the internet as whole in recent years can be attributed to Botnets.However there is not much information on these Botnets yet. Telecom ISAC-Japan and JPCERT/CC conducted a detailed investigation regarding botnet activity. This session will cover what was found duri…
…
continue reading
1
David Maynor: Architecture Flaws in Common Security Tools (English)
1:09:42
1:09:42
Play later
Play later
Lists
Like
Liked
1:09:42
"Look at your new device! It has a great case, plenty of buttons, and those blue LEDs - wow! But when you strip away the trappings of modern artistic design, what does it really do and how does it help you sleep at night? Perhaps most importantly, what do hackers know about this new toy that you do not? Would you be surprised to know that simple TC…
…
continue reading
1
Michael Sutton and Adam Greene: The Art of File Format Fuzzing (English)
49:04
49:04
Play later
Play later
Lists
Like
Liked
49:04
"In September 2004, much hype was made of a buffer overflow vulnerability that existed in the Microsoft engine responsible for processing JPEG files. While the resulting vulnerability itself was nothing new, the fact that a vulnerability could be caused by a non-executable file commonly traversing public and private networks was reason for concern.…
…
continue reading
1
Sherri Sparks and Jamie Butler: "Shadow Walker" Raising The Bar For Rootkit Detection (English)
53:33
53:33
Play later
Play later
Lists
Like
Liked
53:33
"Last year at Black Hat, we introduced the rootkit FU. FU took an unprecented approach to hiding not previously seen before in a Windows rootkit. Rather than patching code or modifying function pointers in well known operating system structures like the system call table, FU demonstrated that is was possible to control the execution path indirectly…
…
continue reading
1
Saumil Shah and Dave Cole: Adware/Spyware (English)
1:19:31
1:19:31
Play later
Play later
Lists
Like
Liked
1:19:31
"The Business * Timeline?how did we get into this mess? * The players * How their business works * Legislative environment The Technology * Technical overview of different types of programs (taxonomy) * Describe how the programs function * How adware/spyware is installed * Hijacking the system * How it updates itself * Proven techniques to prevent …
…
continue reading
Closing ceremonies and speech given by Jeff Moss.By Jeff Moss
…
continue reading
The Business:Timeline - how did we get into this mess? The Technology: Technical overview of different types of programs (taxonomy). Looking ahead: Market polarization, bad get worse, good get better (more white, less grey). Exploiting Adware.By feedback@blackhat.com (Black Hat Announcements)
…
continue reading