Jump to content

Security Now: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
mNo edit summary
mailbag episodes are no longer a thing
 
(17 intermediate revisions by 13 users not shown)
Line 1: Line 1:
{{Short description|Technology podcast}}
{{Multiple issues|
{{Notability|Web|date=October 2021}}
{{Self-published|date=October 2021}}
}}
{{Use mdy dates|date=May 2013}}
{{Use mdy dates|date=May 2013}}
{{Infobox Podcast
{{Infobox Podcast
Line 5: Line 10:
|host = [[Steve Gibson (computer programmer)|Steve Gibson]]<br>[[Leo Laporte]]
|host = [[Steve Gibson (computer programmer)|Steve Gibson]]<br>[[Leo Laporte]]
|url = {{url|https://twit.tv/shows/security-now}}
|url = {{url|https://twit.tv/shows/security-now}}
|rss = [http://leoville.tv/podcasts/sn.xml MP3 Feed]
|status = Weekly
|status = Weekly
|audio format = [[MP3]]
|audio format = [[MP3]]
|began = {{start date and age|2005|08|19}}
|began = {{start date and age|2005|08|19}}
|ended =
|ended = {{end date and age|2020|07|07}}
|genre = [[Computer Security]]
|genre = [[Computer Security]]
|language = English
|language = English
|ratings =
|ratings =
|license = CC-BY-NC-SA<ref name="twit.tv archived 2015-04-09 2am">{{cite web|url=http://twit.tv/ |title=twit.tv |accessdate=8 April 2015 |quote=These netcasts are released under a Creative Commons Attribution Non-Commercial Share-Alike license. |url-status=dead |archiveurl=https://web.archive.org/web/20150409013843/http://twit.tv/ |archivedate=April 9, 2015 }}</ref><small> (before 2015-04-09)</small><br/>CC-BY-NC-ND<ref name="twit.tv archived 2015-04-09 11pm">{{cite web|url=http://twit.tv/ |title=twit.tv |accessdate=9 April 2015 |quote=All TWiT streams and on-demand shows are released under a Creative Commons Attribution Non-Commercial No-Derivatives 4.0 International license. |url-status=dead |archiveurl=https://web.archive.org/web/20150409220017/http://twit.tv/ |archivedate=April 9, 2015 }}</ref>
|license = CC-BY-NC-SA<ref name="twit.tv archived 2015-04-09 2am">{{cite web|url=http://twit.tv/ |title=TWiT |access-date=8 April 2015 |quote=These netcasts are released under a Creative Commons Attribution Non-Commercial Share-Alike license. |url-status=dead |archive-url=https://web.archive.org/web/20150409013843/http://twit.tv/ |archive-date=April 9, 2015 }}</ref><small> (before 2015-04-09)</small><br/>CC-BY-NC-ND<ref name="twit.tv archived 2015-04-09 11pm">{{cite web|url=http://twit.tv/ |title=TWiT |access-date=9 April 2015 |quote=All TWiT streams and on-demand shows are released under a Creative Commons Attribution Non-Commercial No-Derivatives 4.0 International license. |url-status=dead |archive-url=https://web.archive.org/web/20150409220017/http://twit.tv/ |archive-date=April 9, 2015 }}</ref>
}}
}}


'''''Security Now!''''' is a weekly [[podcast]] hosted by [[Steve Gibson (computer programmer)|Steve Gibson]] and [[Leo Laporte]]. It was the second show to premiere on the [[TWiT.tv|TWiT Network]], launching in summer 2005. The first episode, “As the Worm Turns”, was released on August 19, 2005.<ref>{{cite web|title=Security Now! Episode Archive 2005 |url=https://www.grc.com/sn/past/2005.htm|date=August 19, 2005|accessdate=September 13, 2013}}</ref>
'''''Security Now!''''' is a weekly [[podcast]] hosted by [[Steve Gibson (computer programmer)|Steve Gibson]] and [[Leo Laporte]]. It was the second show to premiere on the [[TWiT.tv|TWiT Network]], launching in summer 2005. The first episode, “As the Worm Turns”, was released on August 19, 2005.<ref>{{cite web|title=Security Now! Episode Archive 2005 |url=https://www.grc.com/sn/past/2005.htm|date=August 19, 2005|access-date=September 13, 2013}}</ref>


''Security Now!'' consists of a discussion between Gibson and Laporte on issues of [[computer security]] and, conversely, [[computer insecurity|insecurity]]. Covered topics have included security [[security vulnerability|vulnerabilities]], [[Firewall (computing)|firewall]]s, [[password]] security, [[spyware]], [[rootkit]]s, [[Wi-Fi]], [[virtual private network]]s, and [[virtual machine]]s.
''Security Now!'' consists of a discussion between Gibson and Laporte on issues of [[computer security]] and, conversely, [[computer insecurity|insecurity]]. Covered topics have included security [[security vulnerability|vulnerabilities]], [[Firewall (computing)|firewall]]s, [[password]] security, [[spyware]], [[rootkit]]s, [[Wi-Fi]], [[virtual private network]]s, and [[virtual machine]]s.


==Podcast feed==
==Podcast feed==
''Security Now!'' is distributed via its main podcast [[RSS (file format)|RSS feed]] and on the GRC ''Security Now!'' page. In addition to audio, text transcriptions are published, along with Gibson distributing a low-bandwidth 16 kbit/s version of the show on his own for those with low-bandwidth sources such as satellite internet or dial-up.
''Security Now!'' is distributed via its main podcast [[RSS (file format)|RSS feed]] and on the GRC ''Security Now!'' page. In addition to audio, text transcriptions are published, along with Gibson distributing a low-bandwidth 16&nbsp;kbit/s version of the show on his own for those with low-bandwidth sources such as satellite internet or dial-up.


The podcast runs for approximately two hours, typically starting with security news. Then Gibson reads a testimonial for his software [[SpinRite]]. The remainder of the show is spent on a particular theme. During the show some advertisements for 3rd party commercial products or services are read out, by co-host Leo Laporte.
The podcast runs for approximately two hours, typically starting with security news. Then Gibson reads a testimonial for his software [[SpinRite]]. The remainder of the show is spent on a particular theme. During the show some advertisements for 3rd party commercial products or services are read out, by co-host Leo Laporte.

Bi-weekly "Mailbag" episodes answer questions and respond to feedback submitted by listeners.<ref>{{cite web| url = http://www.grc.com/sn/past/2007.htm#102| title = First Mailbag Episode| accessdate = 2007-08-03| author = Steve Gibson with Leo Laporte| quote = Security Now!: 102}}</ref>


==Popularity==
==Popularity==
Line 31: Line 33:
| url = http://www.podnova.com/index_top40.srf
| url = http://www.podnova.com/index_top40.srf
| title = PodNova Top 40
| title = PodNova Top 40
| accessdate = 2007-01-12
| access-date = 2007-01-12
|date=August 2006
|date=August 2006
| publisher = [[PodNova]]
| publisher = [[PodNova]]
| quote = 4. Security Now!
| quote = 4. Security Now!
|archiveurl = https://web.archive.org/web/20070326195908/http://www.podnova.com/index_top40.srf
|archive-url = https://web.archive.org/web/20070326195908/http://www.podnova.com/index_top40.srf
|archivedate = 2007-03-26}}</ref> ''Security Now!'' averaged around 100,000 downloads per episode throughout 2006.<ref>{{cite web
|archive-date = 2007-03-26}}</ref> ''Security Now!'' averaged around 100,000 downloads per episode throughout 2006.<ref>{{cite web
| url = http://www.twit.tv/2006/07/19/june_numbers
| url = http://www.twit.tv/2006/07/19/june_numbers
| title = June Numbers
| title = June Numbers
| accessdate = 2007-01-12
| access-date = 2007-01-12
| author = Leo Laporte
| author = Leo Laporte
| authorlink = Leo Laporte
| author-link = Leo Laporte
| date = 2006-07-19
| date = 2006-07-19
| work = Leo Laporte's blog
| work = Leo Laporte's blog
| publisher = TWiT.tv
| publisher = TWiT.tv
| quote = Security Now: 103,034}}</ref><ref>{{cite web
| quote = Security Now: 103,034}}</ref><ref>{{cite web
|url = http://www.twit.tv/2006/11/20/october_numbers
|url = https://twit.tv/posts/inside-twit/october-numbers
|title = October Numbers
|title = October Numbers
|accessdate = 2007-01-12
|access-date = 2007-01-12
|author = Leo Laporte
|author = Leo Laporte
|authorlink = Leo Laporte
|author-link = Leo Laporte
|date = 2006-11-21
|date = 2006-11-21
|work = Leo Laporte's blog
|work = Leo Laporte's blog
|publisher = TWiT.tv
|publisher = TWiT.tv
|quote = Security Now 61: 99,751
|quote = Security Now 61: 99,751
|url-status = dead
|url-status = live
|archiveurl = https://archive.is/20120913060819/http://www.twit.tv/2006/11/20/october_numbers
|archive-url = https://archive.today/20120913060819/http://www.twit.tv/2006/11/20/october_numbers
|archivedate = September 13, 2012
|archive-date = September 13, 2012
|df = mdy-all
|df = mdy-all
}}</ref>
}}</ref>
At the end of 2015, Security Now was number 4 on the Top 40 US Technology Podcasts, making it the highest weekly [[Twit.tv]] podcast.<ref name=itunes>{{cite web|url=http://www.itunescharts.net/us/charts/podcasts/technology/|title=iTunes Charts Top 40|publisher=iTunecharts.net|accessdate=18 December 2015}}</ref>
At the end of 2015, Security Now was number 4 on the Top 40 US Technology Podcasts, making it the highest weekly [[TWiT.tv]] podcast.<ref name=itunes>{{cite web|url=http://www.itunescharts.net/us/charts/podcasts/technology/|title=iTunes Charts Top 40|publisher=iTunecharts.net|access-date=18 December 2015}}</ref> In October 2021 it was #6 on Apple Podcasts — US tech news,<ref>{{Cite web|url=https://chartable.com/charts/itunes/us-tech-news-podcasts-6e902e97-576f-429f-8322-372aad6c8de0|title = Apple Podcasts : United States of America : Tech News Podcast Charts - Top}}</ref> and #330 of global all podcasts.<ref>{{Cite web|url=https://chartable.com/podcasts/security-now-mp3|title = Security Now (Audio) Podcast - Listen, Reviews, Charts}}</ref>


==Windows Metafile controversy==
==Windows Metafile controversy==
{{further|Windows Metafile vulnerability}}
{{further|Windows Metafile vulnerability}}
In January 2006 Steve Gibson accused [[Microsoft]] of intentionally putting a [[Backdoor (computing)|backdoor]] into the [[Windows Metafile]] processing code in [[Windows 2000]] and [[Windows XP]]. Gibson claimed that while [[reverse engineering]] the Windows Metafile format, he could run [[arbitrary code]] by using a "nonsensical" value in the metafile, and concluded Microsoft had intentionally designed Windows this way so it could run code on Windows computers without the user's knowledge.<ref>{{cite episode |title=Security Now
In January 2006, Steve Gibson accused [[Microsoft]] of intentionally putting a [[Backdoor (computing)|backdoor]] into the [[Windows Metafile]] processing code in [[Windows 2000]] and [[Windows XP]]. Gibson claimed that while [[reverse engineering]] the Windows Metafile format, he could run [[arbitrary code]] by using a "nonsensical" value in the metafile, and concluded Microsoft had intentionally designed Windows this way so it could run code on Windows computers without the user's knowledge.<ref>{{cite episode |transcript=The Windows MetaFile Backdoor? |series=Security Now
|credits=Hosts: [[Leo Laporte]] and [[Steve Gibson (computer programmer)|Steve Gibson]]
|credits=Hosts: [[Leo Laporte]] and [[Steve Gibson (computer programmer)|Steve Gibson]]
|transcripturl=http://www.grc.com/sn/SN-022.htm
|transcript-url=http://www.grc.com/sn/SN-022.htm
|number=22
|number=22
|airdate=January 12, 2006
|airdate=January 12, 2006
}}</ref> Microsoft's Stephen Toulouse responded in a Microsoft Security Response Center blog post the next day, saying the behavior was not intentional.<ref>{{cite web | last=Toulouse |first=Stephen | title=Looking at the WMF issue, how did it get there? | date=January 13, 2006 |url=http://blogs.technet.com/msrc/archive/2006/01/13/417431.aspx | work=Microsoft Security Response Center Blog | publisher=[[Microsoft]] | accessdate=March 18, 2006 }}</ref>
}}</ref> Microsoft's Stephen Toulouse responded in a Microsoft Security Response Center blog post the next day, saying the behavior was not intentional.<ref>{{cite web | last=Toulouse |first=Stephen | title=Looking at the WMF issue, how did it get there? | date=January 13, 2006 |url=http://blogs.technet.com/msrc/archive/2006/01/13/417431.aspx | work=Microsoft Security Response Center Blog | publisher=[[Microsoft]] | access-date=March 18, 2006 }}</ref>


==References==
==References==
Line 79: Line 81:
{{TWiT podcasts}}
{{TWiT podcasts}}


[[Category:TWiT podcasts]]
[[Category:Technology podcasts]]
[[Category:Technology podcasts]]
[[Category:2005 podcast debuts]]
[[Category:2005 podcast debuts]]

Latest revision as of 00:21, 14 October 2024

Security Now!
Presentation
Hosted bySteve Gibson
Leo Laporte
GenreComputer Security
LanguageEnglish
UpdatesWeekly
Production
Audio formatMP3
Publication
Original releaseAugust 19, 2005; 19 years ago (2005-08-19)
LicenseCC-BY-NC-SA[1] (before 2015-04-09)
CC-BY-NC-ND[2]

Security Now! is a weekly podcast hosted by Steve Gibson and Leo Laporte. It was the second show to premiere on the TWiT Network, launching in summer 2005. The first episode, “As the Worm Turns”, was released on August 19, 2005.[3]

Security Now! consists of a discussion between Gibson and Laporte on issues of computer security and, conversely, insecurity. Covered topics have included security vulnerabilities, firewalls, password security, spyware, rootkits, Wi-Fi, virtual private networks, and virtual machines.

Podcast feed

[edit]

Security Now! is distributed via its main podcast RSS feed and on the GRC Security Now! page. In addition to audio, text transcriptions are published, along with Gibson distributing a low-bandwidth 16 kbit/s version of the show on his own for those with low-bandwidth sources such as satellite internet or dial-up.

The podcast runs for approximately two hours, typically starting with security news. Then Gibson reads a testimonial for his software SpinRite. The remainder of the show is spent on a particular theme. During the show some advertisements for 3rd party commercial products or services are read out, by co-host Leo Laporte.

Popularity

[edit]

In August 2007, Security Now! won in the People's Choice Podcast Awards Technology/Science category.[4] In August 2006, Security Now! ranked fourth in the "Top 40" of all podcasts listened to via the PodNova service.[5] Security Now! averaged around 100,000 downloads per episode throughout 2006.[6][7] At the end of 2015, Security Now was number 4 on the Top 40 US Technology Podcasts, making it the highest weekly TWiT.tv podcast.[8] In October 2021 it was #6 on Apple Podcasts — US tech news,[9] and #330 of global all podcasts.[10]

Windows Metafile controversy

[edit]

In January 2006, Steve Gibson accused Microsoft of intentionally putting a backdoor into the Windows Metafile processing code in Windows 2000 and Windows XP. Gibson claimed that while reverse engineering the Windows Metafile format, he could run arbitrary code by using a "nonsensical" value in the metafile, and concluded Microsoft had intentionally designed Windows this way so it could run code on Windows computers without the user's knowledge.[11] Microsoft's Stephen Toulouse responded in a Microsoft Security Response Center blog post the next day, saying the behavior was not intentional.[12]

References

[edit]
  1. ^ "TWiT". Archived from the original on April 9, 2015. Retrieved April 8, 2015. These netcasts are released under a Creative Commons Attribution Non-Commercial Share-Alike license.
  2. ^ "TWiT". Archived from the original on April 9, 2015. Retrieved April 9, 2015. All TWiT streams and on-demand shows are released under a Creative Commons Attribution Non-Commercial No-Derivatives 4.0 International license.
  3. ^ "Security Now! Episode Archive 2005". August 19, 2005. Retrieved September 13, 2013.
  4. ^ "People's Choice Podcast Award Winners Announced". August 17, 2007.
  5. ^ "PodNova Top 40". PodNova. August 2006. Archived from the original on March 26, 2007. Retrieved January 12, 2007. 4. Security Now!
  6. ^ Leo Laporte (July 19, 2006). "June Numbers". Leo Laporte's blog. TWiT.tv. Retrieved January 12, 2007. Security Now: 103,034
  7. ^ Leo Laporte (November 21, 2006). "October Numbers". Leo Laporte's blog. TWiT.tv. Archived from the original on September 13, 2012. Retrieved January 12, 2007. Security Now 61: 99,751
  8. ^ "iTunes Charts Top 40". iTunecharts.net. Retrieved December 18, 2015.
  9. ^ "Apple Podcasts : United States of America : Tech News Podcast Charts - Top".
  10. ^ "Security Now (Audio) Podcast - Listen, Reviews, Charts".
  11. ^ Hosts: Leo Laporte and Steve Gibson (January 12, 2006). Security Now. Episode 22. The Windows MetaFile Backdoor?.
  12. ^ Toulouse, Stephen (January 13, 2006). "Looking at the WMF issue, how did it get there?". Microsoft Security Response Center Blog. Microsoft. Retrieved March 18, 2006.
[edit]