certainly entertaining and hopefully helpful we strive to cover the topics at the heart of the Linux gamer. From Proton to Vulkan, from Linux native to voiding the warranty. We discuss news and updates from the Linux community, our gaming habits and wanderings along with reviewing a game each week.
…
continue reading
news and updates
…
continue reading
Piratical Action in the Caribean
…
continue reading
The Hacker Mind is an original podcast from the makers of Mayhem Security. It’s the stories from the individuals behind the hacks you’ve read about. It’s about meeting some of the security challenges in software through advanced techniques such as fuzz testing. It’s a view of the hackers and their world that you may not have heard before.
…
continue reading
1
Episode 48: New PC build and Proxmox Cloud Init
1:22:56
1:22:56
Play later
Play later
Lists
Like
Liked
1:22:56
🚀 Tech, Gaming, Linux—Oh My! 🎮🐧 Crowbar Kernel Panic - Ep. 48 Welcome back to Crowbar Kernel Panic, your go-to hub for all things tech, gaming, and Linux! In this pre-recorded episode, we're diving deep into the digital realm to bring you the latest insights and updates. Tune in as we unpack the week's hottest news, discuss home lab adventures, and…
…
continue reading
1
Can You Set Limits on Your Gambling Activity on Judi Slot?
0:13
0:13
Play later
Play later
Lists
Like
Liked
0:13
Activity on Slot Gambling? Slot gambling is online gambling where players can play at better speed and prices. Slot gambling is available on cellphone devices without an HTML5-based application which is compatible with all Android or iPhone cellphone models, this way players can play online slot gambling games at any time without needing to create …
…
continue reading
1
Episode 47: Keyboards, Cooling Woes, and VR
1:05:54
1:05:54
Play later
Play later
Lists
Like
Liked
1:05:54
Welcome back to Crowbar Kernel Panic, where we delve deep into the tech trenches and emerge with the latest insights! 🚀 In this episode, join us as we navigate the thrilling world of keyboards, liquid cooling woes, and the fascinating frontier of virtual reality. Tune in for an exploration of the practicalities and potentials of VR for both gaming …
…
continue reading
1
Episode 46: Unveiling the Steam Deck OLED
50:22
50:22
Play later
Play later
Lists
Like
Liked
50:22
LinuxGaming #SteamDeck #GamingTech #LinuxPodcast Welcome to another riveting episode of Crowbar Kernel Panic, the premier podcast at the crossroads of Linux and gaming. In Episode 46, we're delving into the exciting world of the Steam Deck OLED. This episode is pre-recorded and will be available on YouTube, iTunes, and your favorite podcast apps. D…
…
continue reading
1
EP 85: The Rise Of Bots (and Bots As A Service)
40:49
40:49
Play later
Play later
Lists
Like
Liked
40:49
Bots are actionable scripts that can slow your day to day business, be enlisted in denial of service attacks, or even keep you from getting those tickets Taylor Swift you desperately want. Antoine Vastel from DataDome explains how it's an arms race: the better we get at detecting them, the more the bots evolve to evade detection. Transcript here.…
…
continue reading
1
EP 84: When Old Medical Devices Keep Pre-shared Keys
43:38
43:38
Play later
Play later
Lists
Like
Liked
43:38
You would think there is a procedure to End-of-Life a medical device, right? Erase personal health info. Erase network configuration info. Speaking at SecTor 2023, Deral Heiland from Rapid 7 said he found that he was able to buy infusion pumps on the secondary market with the network credentials for the original Health Care Delivery Organization in…
…
continue reading
1
Episode 45: Automation Dreams and Tech News
1:29:12
1:29:12
Play later
Play later
Lists
Like
Liked
1:29:12
Welcome to Crowbar Kernel Panic, the Podcast at the intersection of Linux and Gaming! In this pre-recorded episode, we're diving into the latest tech news and discussing what we'd automate if we could. Whether you're listening on YouTube, iTunes, or your favorite podcast app, don't forget to like, subscribe, and comment to show your support. Join t…
…
continue reading
1
EP 83: Tales From The Dark Web: Ransomware, Data Extortion, and Operational Technology
37:07
37:07
Play later
Play later
Lists
Like
Liked
37:07
With the recent Clop attack on customers of MoveIt, ransomware is now old news. Attackers are skipping the encryption and simply extorting the exfiltrated data, according to Thomas “Mannie” Wilken, from the Accenture Cyber Threat Intelligence Dark Web Reconnaissance Team. He should know; he spends his days on the Dark Web seeing the rise of new inf…
…
continue reading
Imagine a data dump of files similar to the Snowden Leaks in 2013, only this it’s not from the NSA but from NT Vulkan, a Russian contractor. And it’s a framework for targeting critical IT infrastructures. In a talk at DEF CON 31, Joe Slowick from Huntress, shares what a Russian whistleblower released in the form of emails and documents, and how we …
…
continue reading
1
Episode 44: Unity's Pricing & What It Means for Game Developers
1:13:32
1:13:32
Play later
Play later
Lists
Like
Liked
1:13:32
Welcome to another episode of Crowbar Kernel Panic, the podcast at the exciting intersection of Linux, Gaming, and Game Development. In Episode 44, we dive deep into the latest developments in the gaming industry, particularly focusing on Unity's recent pricing changes and what they mean for game developers like you. This episode is pre-recorded an…
…
continue reading
1
EP 81: Hacking Visual Studio Code Extensions
49:11
49:11
Play later
Play later
Lists
Like
Liked
49:11
Rather than use backdoor exploits, attackers are stealing credentials going through the front door. How are they gaining credentials. Sometimes it’s from the tools we trust. Paul Geste and Thomas Chauchefoin discuss their DEF CON 31 presentation Visual Studio Code is why I have (Workspace) Trust issues as well as the larger question of how much we …
…
continue reading
What if an GPC project OAUTH access token wasn’t deleted? This could expose databases to bad actors. Tal Skverer from Astrix discusses his DEF CON 31 presentation GhostToken: Exploiting Google Cloud Platform App Infrastructure to Create Unremovable Trojan Apps. Transcript here.By Robert Vamosi
…
continue reading
1
Episode 43: Is Linux good for gaming in 2023?
1:20:35
1:20:35
Play later
Play later
Lists
Like
Liked
1:20:35
Welcome to another exciting episode of Crowbar Kernel Panic, the ultimate podcast at the crossroads of Linux and gaming! In this Episode 43, we're diving deep into the world of Linux and gaming, bringing you the latest news, tech updates, and gaming insights. Join us on this journey as we explore the dynamic landscape of the Linux gaming community.…
…
continue reading
1
EP 79: Conducting Incident Response in Costa Rica Post Conti Ransomware
56:50
56:50
Play later
Play later
Lists
Like
Liked
56:50
How do you conduct an incident response for an entire country? When it’s 27 different life-critical government ministries each with up to 850 individual devices -- that’s uncharted territory. Esteban Jimenez of ATTI Cyber talks about his experience with the reconstruction of the cybersecurity system following Conti, how the country handled a second…
…
continue reading
1
EP 78: Defending Costa Rica From Conti Ransomware
56:46
56:46
Play later
Play later
Lists
Like
Liked
56:46
What is is like to hack an entire country, to take it’s government services offline, to deny a government an ability to function? Costa Rica knows. Esteban Jimenez of ATTI Cyber has been helping Costa Rica improve its cybersecurity posture for more than 16 years, and he has been helping them recently recover from a crippling ransomware attack in Ap…
…
continue reading
🔥 Join us as we dissect the gripping tale of Linuxs Media Group's controversy, ignited by a video from Gamer's Nexus. But wait, that's just the beginning! 🎮 Level up your gaming world with exclusive news: Valve's move of offering refurbished Steam Decks at unbeatable discounted rates! 💸 And that's not all – discover how ProtonDB's feature now lets …
…
continue reading
1
Episode 41: Trackball vs. Mouse Showdown
1:14:29
1:14:29
Play later
Play later
Lists
Like
Liked
1:14:29
The show kicks off with an unexpected twist - a quick diversion into the world of Magic: The Gathering and The One Ring. Who said geeks can't have diverse interests? / Trackball Mania: It's time to take sides! Join the banter as our hosts engage in a friendly, yet passionate, discussion about the advantages of trackball mice versus the traditional …
…
continue reading
1
EP 77: Security Chaos Engineering with Kelly Shortridge
40:32
40:32
Play later
Play later
Lists
Like
Liked
40:32
Speaking at Black Hat 2023, Kelly Shortridge is bringing cybersecurity out of the dark ages by infusing security by design to create secure patterns and practices. It’s a subject of her new book on Security Chaos Computing, and it’s a topic that’s long overdue to be discussed in the field. Transcript.…
…
continue reading
Are we doing enough to secure our health delivery organizations? Given the rise of ransomware attacks, one could day we are not. Karl Sigler from Trustwave SpiderLabs, talks about a new report that his team has written that is focused on the threat landscape for medical devices and the healthcare industry in general. Transcript here.…
…
continue reading
1
EP 75: Hacking .Mil And Other TLD Domains (Ethically)
48:45
48:45
Play later
Play later
Lists
Like
Liked
48:45
Internet domains are brittle. One could hack into a military, a foreign government, or even global commercial web services domain using flaws in the underlying architecture. Fredrik Nordberg Almroth, co-founder of Detectify, talks about how he did just that -- hack .mil, hack the top level domain of the Democratic Republic of Congo, and even Gmail …
…
continue reading
Phishing is everywhere. Who among us has not seen phish in their inbox? Aviv Grafi, from Votiro, gets into the weeds about how malicious documents are formed and how they might (despite good secure posture) still end up in your inbox or browser. He’s created a rather novel method to strip out the good content from the bad without affecting your ove…
…
continue reading
1
How to Play Online Serba88 Slot Casino Games
0:55
0:55
Play later
Play later
Lists
Like
Liked
0:55
Online slot casino games are a great way to pass the time and have fun. They offer a variety of options to choose from and can be played on any device. These games are easy to understand and play, so you can get started in no time. If you’re new to slots, read this article to learn how to play them and start winning big. Before you can start playin…
…
continue reading
1
Episode 40: Red Hat Closed Source Code
1:12:13
1:12:13
Play later
Play later
Lists
Like
Liked
1:12:13
This episode we review the latest news on Red Hat source code, System 76 data breach, and a community lead project to AI voice Morrowind. We also discuss plans for a home lab/NAS build and review some interesting demos from the Steam Next Fest. Red Hat links https://www.redhat.com/en/blog/furthering-evolution-centos-stream https://news.itsfoss.com/…
…
continue reading
Carbon credit exchanges are online platforms where individuals and companies can buy and sell trading carbon credits. Each credit represents one metric ton of CO2 or other greenhouse gases that have been reduced, avoided, or offset. Typically, these credits can be used by a company to meet its emissions reduction obligations under a cap-and-trade s…
…
continue reading
Could the nudges and prompts like those from our Fitbits and Apple watches be effective in enforcing good security behavior as well? Oz Alashe, CEO and founder of CybSafe, brings his experience in the UK Intelligence Community to the commercial world along with some solid science around what motivates us to make changes in our lives. It’s not just …
…
continue reading
1
EP 72: Tales From A Ransomware Negotiator
41:31
41:31
Play later
Play later
Lists
Like
Liked
41:31
Say you’re an organization that’s been hit with ransomware. At what point do you need to bring in a ransomware negotiator? Should you pay, should you not? Mark Lance, the VP of DFIR and Threat Intelligence for GuidePoint Security, provides The Hacker Mind with stories of ransomware cases he’s handled and best practices for how to handle such an eve…
…
continue reading
1
Episode 39: Fedora's Skeleton Village
1:15:28
1:15:28
Play later
Play later
Lists
Like
Liked
1:15:28
Does Redhat still believe in the Fedora project, we question the 4% let go from the company in cutbacks // Somebody tell Elon he'd be a real internet cool guy if he opensourced Tesla software updates // RPG Maker Unity asset finally luanches with suspicious comments // Valve is still crushing with good will from the Linux gaming community // 'About…
…
continue reading
Small to Medium Business are increasingly the target of APTs and ransomware. Often they lack the visibility of a SOC. Or even basic low level threat analysis. Chris Gray of Deepwatch talks about the view from the inside of a virtual SOC, the ability to see threats against a large number of SMB organizations, and the changes to cyber insurance we’re…
…
continue reading
Yes, Vbet has a dedicated mobile app that can be downloaded to iPhone and iPad devices. The app works in the same way as the desktop site, allowing punters to access all the features without any interruptions. The mobile app is free to download and it should install automatically if you have the correct settings on your device. If you encounter any…
…
continue reading
1
Is customer support available 24/7 at Vulkan Vegas casino?
2:37
2:37
Play later
Play later
Lists
Like
Liked
2:37
There are many online casinos on the Internet that can offer players quite profitable gambling games. But Vulkan Vegas is different, because it offers its users the best VIP-class slots from TOP providers like Microgaming, NetEnt, Play’n GO, Yggdrasil and Quickspin. The casino has also a lot of other useful features, like its loyalty program where …
…
continue reading
1
EP 70: Hacking Real World Criminals Online
58:00
58:00
Play later
Play later
Lists
Like
Liked
58:00
More and more criminals are identified through open source intelligence (OSINT). Sometimes a negative Yelp review can reveal their true identity. Daniel Clemens, CEO of ShadowDragon, talks about his more than two decades of digital investigations, from the origins of the Code Red worm to the mass shooter in Las Vegas, with a fair number of pedophil…
…
continue reading
A farmer is someone who cultivates or raises crops and/or animals for food, fiber, or other agricultural products. These farmers typically work on large or small farms and may use a variety of methods, equipment, and techniques in the cultivation and management of their crops. In many cases, farmers can make money from selling carbon.credit that ha…
…
continue reading
1
Episode 38: Planning a game with AI and struggling with the ARC A770
1:05:20
1:05:20
Play later
Play later
Lists
Like
Liked
1:05:20
This episode was short prepped and spontaneous. It's been a little while since our last show and we've both had several life events holding us up from doing show prep. We didn't want to keep prolonging the recording of this episode so we decided to give it a shot recording with no prep. The topic of AI in game development led me to ask Chat GPT to …
…
continue reading
Caesars is one of the leading gambling companies in the world. It owns and operates some of the most famous resorts in Las Vegas, as well as casinos in Atlantic City and other locations across the country. It is also a leading online casino operator, with real money games available in several states. The Caesars mostbet casino website has a very si…
…
continue reading
It’s time to evolve beyond the UNIX operating system. OSes today are basically ineffective database managers, so why not build an OS that’s a database manager? Michael Coden, Associate Director, Cybersecurity, MIT Sloan, along with Michael Stonebreaker will present this novel concept at RSAC 2023. You can learn more at dbos-project.github.io…
…
continue reading
Incident response in the cloud. How is it different, and why do we need to pay more attention to it today, before something major happens tomorrow. James Campbell, CEO of Cado Security, shares his experience with traditional incident response, and how the cloud, with its elastic structure, able to spin up and spin down instances, is changing incide…
…
continue reading
1
EP 67: When The Dark Web Discovered ChatGPT
40:54
40:54
Play later
Play later
Lists
Like
Liked
40:54
We’ve seen drug marketplaces and extremists use the Dark Web. Will generative AI tools like ChatGPT make things crazier by lowering the barrier to entry? Delilah Schwartz, from Cybersixgill, brings her extensive background with online extremism to The Hacker Mind to talk about how she’s seeing a lot of chatter in the dark web.about AI online. She d…
…
continue reading
1
Episode 37: ARC A770 Graphics Card - What Linux Gamers Need to Know!
54:38
54:38
Play later
Play later
Lists
Like
Liked
54:38
In this episode Josh and I both test out our new ARC A770 GPU, While it's not easily compatible with Linux just yet, this card has some exciting potential because of it's performance and cost. We dive into what Wayland support for Wine means for Linux gamers, Flathub to support purchases and donations, Fungus computing power, and much more. Contact…
…
continue reading
1
EP 66: Shattering InfoSec’s Glass Ceiling
42:55
42:55
Play later
Play later
Lists
Like
Liked
42:55
Booth babes and rampant sexism were more of a problem in infosec in the past. That is, until Chenxi Wang spoke up. And she’s not done changing the industry. She’s an amazing person who has done an incredible number of things in a short amount of time -- a PhD in Computer Engineering, inventor of a process still used by the DoD today, a successful t…
…
continue reading
1
EP 65: The Hacker Revolution Will Be Televised
50:32
50:32
Play later
Play later
Lists
Like
Liked
50:32
What if DEF CON CTFs were televised? What if you could see their screens and have interviews with the players in the moment? Turns out, you can. Jordan Wiens, from Vector 35, maker of Binary Ninja, is no stranger to CTFs. He’s played in ten final DEF CON CTFs, was a part of DARPA’s Cyber Grand Challenge, and recently he’s moderated the live broadca…
…
continue reading
1
Episode 36: Gaming on Debian or LMDE
1:05:18
1:05:18
Play later
Play later
Lists
Like
Liked
1:05:18
linuxgaming #Debian #pcgaming This week we review some news items we missed in the last few weeks as well as come to our conclusion on the Debian challenge. Topic Links Geforce RTX 4070 https://www.techspot.com/review/2601-nvidia-geforce-rtx-4070-ti/ Ryzen 5800x3D vs ryzen 7600x https://www.techspot.com/review/2592-ryzen-5800x3D-vs-ryzen-7600x/ New…
…
continue reading
1
EP 64: Gaining Persistence On Windows Boxes
38:59
38:59
Play later
Play later
Lists
Like
Liked
38:59
When we hear about bad actors on a compromised system for 200+ days, we wonder how they survived for so long. Often they hide in common misconfigurations. From her talk at SecTor 2022, Paula Januszkiewicz, CEO of Cqure, returns to The Hacker Mind and explains how a lot of little configuration errors in common Windows tools and services can open the…
…
continue reading
Deep cold storage is a term used to describe the process of storing your cryptographic private keys offline. This method is designed to keep your coins safe from unauthorized access. It can be a bit of work to retrieve your coins, but it is the safest way to store your money. You can keep your coins deep cold using a variety of methods. One of the …
…
continue reading
1
Who is Secondary Digital Asset Exchange Investor?
2:45
2:45
Play later
Play later
Lists
Like
Liked
2:45
In its purest form, a digital asset exchange is a technological gizmo that facilitates exchanges of a digital asset. A digital asset is an asset that is akin to stocks in that it is speculative, but not entirely risk free. The digital asset is typically not traded on a single exchange. However, it is gaining prominence as a viable investment vehicl…
…
continue reading
1
EP 63: What Star Wars Can Teach Us About Threat Modeling
42:57
42:57
Play later
Play later
Lists
Like
Liked
42:57
Having a common framework around vulnerabilities, around threats, helps us understand the infosec landscape better. STRIDE provides an easy mnemonic. Adam Shostack has a new book, Threats: What Every Engineer Should Learn From Star Wars. that uses both Star Wars and STRIDE to help engineers under vulnerabilities and threats in software development.…
…
continue reading
This episode we discuss the Mutalk, the new Proton, remembering Unity, Open Source Nvidia Vulkan driver, and would you believe Mozilla is changin the face of social media? We end the episode with our discussion of the first week of Debian, more to come. News Items The Mutalk - https://www.techspot.com/news/97242-someone-invented-voice-muting-vr-mic…
…
continue reading
Hacking websites is perhaps often underestimated yet is super interesting with all its potential for command injections and cross site scripting attacks. Tib3rius from White Oak Security discusses his experience as a web application security pen tester, his OSCP certification, and how he’s giving back to the community with his Twitch, Youtube, and …
…
continue reading
1
Episode 34: HDR on Linux and Debian Challenge
1:03:43
1:03:43
Play later
Play later
Lists
Like
Liked
1:03:43
This episode was a bit of a recap of 2022 and a discussion of what we want to see in 2023. We discuss the exciting potential for true HDR on Proton and we plan our debian challenge for the beginning of the year. News Items X11 is almost dead HDR on Steam Deck Red Hat hackfest for HDR Contact Us Discord - https://discord.gg/Nx6HgaAuZ3 Send us an ema…
…
continue reading
Carbon credit investing is a great way to help offset greenhouse gas emissions. It can also be a lucrative investment. But before you jump on the bandwagon, you should consider how this market works. Carbon credits are certificates issued by companies that have reduced their greenhouse gas emissions. They can be sold to other companies to make a pr…
…
continue reading
1
Are Carbon Credit Exchanges a Good Investment?
2:49
2:49
Play later
Play later
Lists
Like
Liked
2:49
Carbon credit exchanges are a good investment, but only if you understand the pitfalls. There are several key questions to ask when investing in these assets. These include the type, size, and location of your carbon offsets. They also need to be considered in relation to the overall portfolio. Depending on where you invest, the value of your carbo…
…
continue reading