goodlisten

Clip

Infiltrating Corporations: The Art of Cyber Espionage
listen on Spotify
41:39 - 46:14 (04:34)

This podcast episode details the experience of a security analyst who successfully infiltrated a corporation using a device and left without being caught, highlighting the importance of physical security measures.

Similar Clips
In this episode, the host discusses the importance of communication in relationships, including the dangers of talking behind your partner's back and using excuses for bad behavior.
50:56 - 53:02 (02:05)
listen on Spotify
Relationships
Summary

In this episode, the host discusses the importance of communication in relationships, including the dangers of talking behind your partner's back and using excuses for bad behavior.

Chapter
Signs of a Toxic Relationship
Episode
12. Red Flags
Podcast
Aware & Aggravated
The speaker discusses how he introduced innovation to live TV shows through his idea of using a Windows 95 computer, despite initial skepticism from his colleagues, and his work on SMS-to-TV and other projects at MTV games.
15:15 - 17:25 (02:10)
listen on Spotify
Innovation
Summary

The speaker discusses how he introduced innovation to live TV shows through his idea of using a Windows 95 computer, despite initial skepticism from his colleagues, and his work on SMS-to-TV and other projects at MTV games.

Chapter
Hilarious home storage spots in New York
Episode
#23 - Disney for Dogs
Podcast
My First Million
The speaker shares how they successfully bypassed security cameras and got into a secure location using an underdoor tool.
58:42 - 1:03:29 (04:47)
listen on Spotify
Security
Summary

The speaker shares how they successfully bypassed security cameras and got into a secure location using an underdoor tool.

Chapter
An Unsuccessful Attempt at Physical Pentesting
Episode
95: Jon & Brian's Big Adventure
Podcast
Darknet Diaries
The process of investigating an infected computer after an attack is akin to the scene from Mr.
34:19 - 35:54 (01:35)
listen on Spotify
Cybersecurity
Summary

The process of investigating an infected computer after an attack is akin to the scene from Mr. Robot, where Elliot looks into a server directory containing malware files. It is necessary to be sure whether to remove the malware or leave it untouched.

Chapter
Cyberattack on the US Department of Defense
Episode
103: Cloud Hopper
Podcast
Darknet Diaries
This is the story of how personal computers, collectively known now as Macs and PCs, came to be.
51:58 - 54:11 (02:12)
listen on Spotify
Computers
Summary

This is the story of how personal computers, collectively known now as Macs and PCs, came to be. In the first installment, we look at the invention of the GUI and the circumstances that led to its creation and eventual mass production.

Chapter
The Origin of the Personal Computer
Episode
SPECIAL: Steve Jobs (Part 1)
Podcast
My First Million