Remember when a 16 GB flash drive was considered BIG? Imagine a drive that's the equivalent of about 125 of those, yet still fits in your shirt pocket. Kingston has done it again and broken through the flash media storage ceiling with a whopping 2 TB USB flash drive!
Watch NowWe all remember the Floating Light Bulb from Kickstarter, but now the company has taken what they've learned from their first version and have launched the Smart Air Lamp: a new and improved light that hovers in the air above its base.
Watch NowEver want your pictures to all show up the same size on WordPress? We'll use GIMP to answer a viewer question and help you understand how the aspect ratio of our images is key when uploading to WordPress.
Watch NowWe all love to save money, but it can be difficult to figure out where to save. Sometimes it means cutting back on guilty pleasures, but other times it simply means knowing which appliances in your house are running a ridiculous bill. Learn how to use the device, and be blown away by what Robbie's home server is costing him.
Watch NowEver need a proxy service to bypass a firewall or access a private network from another country? We'll use SSH to create a SOCKS tunnel on Linux.
Watch NowLast week we learned to convert a standard USB drive into a LUKS-encrypted storage device for Linux. The drive then requires a user to enter the password in order to mount or access the drive and its contents. This week we finish the series by setting up our own computer as a trusted device, allowing the encrypted drive to be mounted there without a password (ideal for server backups).
Watch NowSince we discussed the WannaCry threat on last week's show, ESET has released a tool to detect the EternalBlue vulnerability and Microsoft has released the patches for free to the public. We'll also expand on an analogy used during the interview to clarify what Robbie meant.
Watch NowWe all know that keeping backups is crucial in today's digital world. But what happens if someone steals your flash drive or external hard drive that contains all those confidential files? We'll use the Linux terminal to encrypt the filesystem so your private files can't be accessed without first entering the password to open the drive.
Watch NowCybersecurity researcher, Mark Skilton joins us to dig deeper into the threat of the WannaCry malware. Mark explains what WannaCryptor is and what makes it so different from ransomware attacks we've seen in the past. We'll discuss the NSA's involvement in the EternalBlue exploit that made it possible, the smokescreen WannaCrypt is creating for the next big cyber attack, why so many companies are still susceptible, and what needs to change as we enter this new era of cyber threats.
Watch NowStephen Cobb, Senior Security Researcher at ESET North America joins us to shed light on what makes the WannaCryptor malware so much different from past ransomware attacks: worm capabilities. We'll also learn more about the distinction between the EternalBlue code from the NSA used by WannaCry and how it helps the malware break into systems that would otherwise be protected. We'll also clear up mainstream media's reporting of Russia as a target, and discuss scenarios of WannaCry's creation, how it spreads, and whether Mac or Linux are in danger of being attacked by WannaCry.
Watch Now