goodlisten

Clip

Accidentally Clever with Eric Lawrence
listen on Spotify
1:00:21 - 1:02:28 (02:07)

Eric Lawrence shares how his early internet shenanigans led him to accidentally create a tool for detecting cross-site scripting attacks, and how that ultimately led to a career in web security.

Similar Clips
Clay suspects that the hack might have occurred due to the root user being logged into the server.
31:22 - 33:55 (02:33)
listen on Spotify
Server Security
Summary

Clay suspects that the hack might have occurred due to the root user being logged into the server. They identified pages on the website through which the hacker might have gotten in, and are considering kicking out the root user to prevent future hacks.

Chapter
Risks of Allowing Root User Access
Episode
Ep 42: Mini-Stories: Vol 2
Podcast
Darknet Diaries
The host explains the meaning of 'deface' and how it is used in website hacking, and gives an example of a hacker who defaced a website to prove that he was responsible for hacking it.
12:17 - 14:17 (01:59)
listen on Spotify
Cybersecurity
Summary

The host explains the meaning of 'deface' and how it is used in website hacking, and gives an example of a hacker who defaced a website to prove that he was responsible for hacking it.

Chapter
The Early Days of Hacking with Guest Mark Bowden
Episode
60: dawgyg
Podcast
Darknet Diaries
This transcript covers a range of news articles on Soldier Boy, including leaked nudes, a promise to focus on acting, and influence on the rap industry.
03:15 - 09:21 (06:05)
listen on Spotify
Soldier Boy
Summary

This transcript covers a range of news articles on Soldier Boy, including leaked nudes, a promise to focus on acting, and influence on the rap industry.

Chapter
The Rise and Fall of Vine and the Hamster that Out-Traded Everyone in Crypto
Episode
Worst Piece of Sh*t Episode Ever
Podcast
Distractible
The process of tracking and identifying internet users involves analyzing various signals such as mouse movements, keystrokes, operating system, fonts, and headers to uniquely identify individuals, even without cookies.
24:26 - 25:21 (00:54)
listen on SpotifyListen on Youtube
Internet Privacy
Summary

The process of tracking and identifying internet users involves analyzing various signals such as mouse movements, keystrokes, operating system, fonts, and headers to uniquely identify individuals, even without cookies. Despite being crackable, it's an ongoing cat and mouse game for high-security places on the web.

Chapter
The Importance of Cybersecurity and VPNs
Episode
#307 – Brian Armstrong: Coinbase, Cryptocurrency, and Government Regulation
Podcast
Lex Fridman Podcast
A security expert shares his concerns about the recent data leak at Ring, where hackers posted over a thousand usernames and passwords of the company's customers, along with their addresses, and the potential harm such information can cause.
30:51 - 35:06 (04:14)
listen on Spotify
Ring, security
Summary

A security expert shares his concerns about the recent data leak at Ring, where hackers posted over a thousand usernames and passwords of the company's customers, along with their addresses, and the potential harm such information can cause.

Chapter
Ring camera users’ security breached
Episode
108: Marq
Podcast
Darknet Diaries