Security Now

From Wikipedia, the free encyclopedia
Security Now!
Presentation
Hosting Steve Gibson
Leo Laporte
Genre Computer Security
Language English
Updates Weekly
Production
Audio format MP3
Publication
Debut August 19, 2005 (2005-08-19)
License Creative Commons BY-NC-SA
Website GRC Security Now! Episodes

Security Now! is a weekly podcast hosted by Steve Gibson and Leo Laporte. The first episode, “As the Worm Turns”, was released on August 19, 2005.[1]

Streamed live online and released every Wednesday, Security Now! consists of a discussion between Gibson and Laporte of issues of computer security and, conversely, insecurity. Covered topics have included security vulnerabilities, firewalls, password security, spyware, rootkits, Wi-Fi, virtual private networks, and virtual machines.

Podcast feed

Security Now! is distributed via its main podcast RSS feed and on the GRC Security Now! page. In addition to audio, text transcriptions are published, along with Gibson distributing a low-bandwidth 16 kbit/s version of the show on his own for those with low-bandwidth sources such as satellite internet or dial-up.

Show format

The podcast runs for approximately 90 minutes, typically starting with security news. Then Gibson reads a testimonial for his software SpinRite. The remainder of the show is spent on a particular theme.

Bi-weekly "Mailbag" episodes answer questions and respond to feedback submitted by listeners.[2]

Popularity

In August 2007, Security Now! won in the People's Choice Podcast Awards Technology/Science category.[3] In August 2006, Security Now! ranked fourth in the "Top 40" of all podcasts listened to via the PodNova service.[4] Security Now! averaged around 100,000 downloads per episode throughout 2006.[5][6]

Windows Metafile Controversy

In January 2006 Steve Gibson accused Microsoft of intentionally putting a backdoor into the Windows Metafile processing code in Windows 2000 and Windows XP. Gibson claimed that while reverse engineering the Windows Metafile format, he could run arbitrary code by using a "nonsensical" value in the metafile, and concluded Microsoft had intentionally designed Windows this way so it could run code on Windows computers without the user's knowledge.[7] Microsoft's Stephen Toulouse responded in a Microsoft Security Response Center blog post the next day, saying the behavior was not intentional.[8]

References

  1. "Security Now! Episode Archive 2005". August 19, 2005. Retrieved September 13, 2013. 
  2. Steve Gibson with Leo Laporte. "First Mailbag Episode". Retrieved 2007-08-03. "Security Now!: 102" 
  3. http://www.podcastingnews.com/2007/08/16/peoples-choice-podcast-award-winners-announced/
  4. "PodNova Top 40". PodNova. August 2006. Archived from the original on 2007-03-26. Retrieved 2007-01-12. "4. Security Now!" 
  5. Leo Laporte (2006-07-19). "June Numbers". Leo Laporte's blog. TWiT.tv. Retrieved 2007-01-12. "Security Now: 103,034" 
  6. Leo Laporte (2006-11-21). "October Numbers". Leo Laporte's blog. TWiT.tv. Retrieved 2007-01-12. "Security Now 61: 99,751" 
  7. Hosts: Leo Laporte and Steve Gibson (January 12, 2006). "Security Now". Episode 22.
  8. Toulouse, Stephen (January 13, 2006). "Looking at the WMF issue, how did it get there?". Microsoft Security Response Center Blog. Microsoft. Retrieved March 18, 2006. 

External links

This article is issued from Wikipedia. The text is available under the Creative Commons Attribution/Share Alike; additional terms may apply for the media files.