S5E8: "Feeling Vulnerable"
|Previous Episode||Next Episode|
|S5E7: "SIT Tunnels? How Sixy!"||S5E9: "Chaotic Good"|
|Recorded (UTC)||Aired (UTC)||Editor|
|2020-05-31 02:32:42||2020-06-07 13:00:51||"Edita"|
We talk about vulnerability scanners/virus scanners that run on, and for, Linux.
Just the Tip
Starts at 15m12s.
I was drinking water. Paden was drinking Miller Lite. Jthan was also drinking Miller Lite.
- We talk about vulnerability scanners for Linux.
- Seems to be the best of the vuln scanners we cover (with maybe the exception of some aspects of commercial scanners, such as Nessus)
- Second-best behind Lynis.
- Dated, but still maintained.
- Extending/wrapping scanners
- Virus scanners that run on/for Linux (37m44s).
In this segment, Jthan shares with you a little slice of life. The title is a reference to this video. (2m16s in)
Starts at 46m33s.
Jthan talks about various service outages all tracing back to the AddTrust CA expiration. The blog post he references on-air is here and you can check your chain validation with this.
We talk a little about certificate chaining and cross-signing.
- We talk about Deloitte in S2E17.
- Paden hasn’t sent me pictures of the playhouse yet.
- Yes, Jthan, carpenter bees do (can) sting.
- Jthan mentions Bro, which has been renamed to Zeek.
- The Richard Stallman-esque copypasta I reference.
- Jthan doesn’t understand corner cases vs. edge cases.
- He also doesn’t understand the difference between a client certificate vs. a server certificate.
- Apple Safari indeed will not consider certs with expiry greater than one year as valid.
- By the way, Jthan, it’s erroneous to insinuate that most X509 certificates are cross-signed.
- All the solutions presented here are not guaranteed to work, Jthan and Paden. In Gnome 3, for instance, it seems that none of them work.
|Intro||Rollin'in||Initial Master Kay||click||CC-BY-NC 4.0||Outro||Lost Futures||4t Thieves||click||CC-BY-NC 4.0|
Categories Season Five
There are currently no comments on this article.