Command Line Heroes

Command Line Heroes

  • 概覽
  • 聲音
概覽
himalaya
77 聲音
Stories about the people transforming technology from the command line up.
查看更多
聲音
77聲音

Our show is all about heroes making great strides in technology. But in InfoSec, not every hero expects to ride off into the sunset. In our series finale, we tackle vulnerability scans, how sharing information can be a powerful tool against cyber crime, and why it’s more important than ever for cybersecurity to have more people, more eyes, and more voices, in the fight. Wietse Venema gives us the story of SATAN, and how it didn’t destroy the world as expected. Maitreyi Sistla tells us how representation helps coders build things that work for everyone. And Mary Chaney shines a light on how hiring for a new generation can prepare us for a bold and brighter future.

What began as a supposed accounting error landed Cliff Stoll in the midst of database intrusions, government organizations, and the beginnings of a newer threat—cyber-espionage. This led the eclectic astronomer-cum-systems administrator to create what we know today as intrusion detection. And it all began at a time when people didn’t understand the importance of cybersecurity. This is a story that many in the infosec community have already heard, but the lessons from Stoll’s journey are still relevant. Katie Hafner gives us the background on this unbelievable story. Richard Bejtlich outlines the “honey pot” that finally cracked open the international case. And Don Cavender discusses the impact of Stoll’s work, and how it has inspired generations of security professionals.

It’s a strange situation when someone can hold something hostage from halfway around the world. It’s tragic when your own pictures and files are remotely encrypted. But when it’s a hospital’s system? Ransomware becomes a problem about life or death. Eddy Willems recounts his involvement in defeating an early ransomware attack that targeted AIDS researchers. At the time, there was a way to discover the encryption key. But as Moti Yung warned, asymmetric encryption would change everything. In the years since, ransomware attacks have become much more popular—thanks in part to the rise of cryptocurrencies. While criminals think it’s an anonymous way to collect payment, Sheila Warren tells us that the opposite is actually true.

All communication leaves the possibility for crossed wires. And as we become more connected, there’s a chance for those with ill intentions to steal our information and meddle in our daily lives—with devastating results. Smriti Bhatt breaks down the complexity behind machine-in-the-middle attacks. Johannes Ullrich tells us why we shouldn’t always trust that free WiFi. And the “father of SSL” Taher Elgamal notes that while cryptography can address the increasingly sophisticated nature of malware, there are no safe bets in security.

Overwhelming numbers are scary—even in the best of circumstances. You can plan for them, build up your defenses, and do everything imaginable to prepare. But when that horde of zombies hits, their sheer numbers can still cause devastation. Botnets are digital zombie hordes. Jamie Tomasello recounts the scale of the Bredolab botnet—and the many malicious kinds of missions it carried out. Martijn Grooten explains how botnets work, and why they can be so difficult to permanently dismantle. And Darren Mott shares some of the successes the FBI had in rounding up some of the world’s most prolific bot herders.

Logic bombs rarely have warning sounds. The victims mostly don’t know to expect one. And even when a logic bomb is discovered before it’s triggered, there isn’t always enough time to defuse it. But there are ways to stop them in time. Paul Ducklin recounts the race to defuse the CIH logic bomb—and the horrible realization of how widespread it was. Costin Raiu explains how logic bombs get planted, and all the different kinds of damage they can do. And Manuel Egele shares some strategies for detecting logic bombs before their conditions are met.

Sometimes a fun game, a friendly email, or an innocuous link can be the most convenient place for an enemy to hide. And its prey is none the wiser—until it strikes. The trojan horse uses many layers of deception to do damage. The ingenuity of these attacks keeps an alarming pace with the technology we use every day. But as long as we stick to trusted sites and sources, we can better the odds against those who use our trusting nature against us. Steve Weisman tells us about how trojans still keep security professionals on the defensive. Josephine Wolff details how these attacks have evolved, and keep evolving, to catch victims off guard. And Yanick Franantonio takes on the new frontier for trojan attacks.

Computer viruses and worms haunt the internet. They worm their way into a system, replicate, and spread again. It’s a simple process—with devastating consequences. But there’s a whole industry of people that rose up to fight back. Craig Schmugar recalls how he and his team responded to MyDoom, one of the fastest-spreading worms ever. Dr. Nur Zincir-Heywood reveals the inner workings of viruses and worms, and how they draw their names from the world of biology. And security expert Mikko Hypponen shares advice on avoiding malware. But he also warns that we’re in an arms race against malware developers.

Malware haunts us all. Viruses, worms, trojan horses, and the harm they do often corrupts the promise of the internet. But the world of computing continues to grow. Though it’s changed us forever, malware hasn’t stopped us from connecting. Season 9 of Command Line Heroes is the culmination of the show. We focus on security and the people who, every day, face the monsters of the digital world. They disinfect computers from viruses, defuse logic bombs, and dismantle botnets. But they can’t do it alone. It’ll take all of us working together to make the world a safer place. The first episode drops February 22, 2022. Subscribe today and sign up for the newsletter to get the latest updates.

Self-driving cars are seemingly just around the corner. These robots aren’t quite ready for the streets. For every hyped-up self-driving showcase, there’s a news story about its failure. But the good news is that we get closer every year. Alex Davies steers us through the history of autonomous vehicles. Alex Kendall maps the current self-driving landscape. And Jason Millar takes us under the hood of these robots’ computers to better understand how they make decisions.

123...8
常見問題
  • Himalaya 是什麼?
    喜馬拉雅國際版,Himalaya 是一款有聲書 App,旨在為全球華人的終身學習提供隨時、隨地、隨心的全新聽書體驗。成為會員,即可以暢聽站內 100,000+ 海量會員內容。
  • Himalaya VIP 有什麼權益?
    你僅需花費每日低至 0.16 美金,就可以立即暢聽 100,000+ 全球銷量超百萬的暢銷有聲書,每週聽一本爆款新書,還有更多預售新書等著你!另可獲得每月 5 張免費體驗卡贈親友的福利,等同於贈送 1 張年卡的價值。
  • 我怎麼享受免費試用?
    現在訂閱 Himalaya VIP 即可享受至少 7 天的免費試用! 免費試用期內,無需付費即可免費暢聽會員包中的全部內容,包含 100,000+ 全球銷量超百萬的暢銷有聲書,和世界名校教授的原聲英文課程。
  • 我該怎麼使用優惠碼?
    在 Himalaya 首⻚選擇「開啟免費體驗」註冊完成之後, 輸入「優惠碼」選擇申請,支付成功後即可開啟 Himalaya VIP 內容免費暢聽權益!
  • 可以在哪收聽?
    Himalaya 提供你隨時隨地想听就听的服務, 可以下載 Himalaya APP 使用手機享受服務,同時也支持網頁版登陸在電腦上享受暢聽服務。
  • Himalaya VIP 的價格是多少?
    Himalaya VIP 採用連續訂閱的模式,按月訂閱價格為 $11.99/月;按年訂閱價格為 $59.99/年。每天僅需 0.16 美元,讓耳朵隨時隨地步入擁有 100,000+ 書籍你的專屬圖書館。
  • 我不想訂閱了,要如何取消?
    通過網頁端訂閱如何取消?
    你可以 點擊這裡 取消訂閱。 在試用期內取消訂閱,則不會自動續費;如果你已經成功續費後取消訂閱,則下個扣款週期不會自動續費。
    通過手機端訂閱如何取消?
    你可以在iTunes/Apple或Google Play設定中取消訂閱。在試用期到期前48小時取消訂閱,則不會自動續費;如果你已經成功續費後取消訂閱,則下個扣款週期不會自動續費。你可以通過以下連結找到如何取消訂閱的詳細資訊:Apple Store取消訂閱方法  Google Play取消訂閱方法

與Himalaya一起

每天15分鐘
在碎片的時間裡,學習一個知識點;通勤時、家務時、運動時,隨時隨地暢聽
每週1本新書
優選最新最熱暢銷書,資深編輯精心挑選榜單佳作,只聽有價值的好書
每年10大系列
商業財經、歷史文化、親子育兒,同系列好書好課一網打盡,帶你深入探究一個主題
app store
google play