Full Circle Side-Pod #4: Global Stuxnet Apocalypse

Full Circle Side-Pod #4: Global Stuxnet Apocalypse

83
4

Full Circle Podcast LogoFull Circle Side-Pod #4: Global Stuxnet Apocalypse

In this episode, LibreOffice, Android domination and Google Defamation

Full Circle Podcast is also a proud member of the Tech Podcasts Network.

This is an extra, irregular, short-form podcast, which is intended to be a side-branch of the main Full Circle Podcast. Somewhere to put all the general technology, non-Ubuntu news and opinions, hobby-horses and general kipple that doesn’t fit anywhere else. Be prepared for a healthy dose of British sarcasm.

News: Lawsuits, little green robots and… we’re all doomed!

Expert Spot: Editing the Full Circle Podcast pt. 4: Assembly

Feeds for both MP3 and OGG:

RSS feed MP3RSS feed, MP3: http://fullcirclemagazine.org/category/podcast/feed

RSS feed OGG audio   fileRSS feed, OGG: http://fullcirclemagazine.org/category/podcast/feed/atom

The podcast is in MP3 and OGG formats. You can either play the podcast in-browser if you have Flash and/or Java, or you can download the podcast with the link underneath the player. Show notes after the jump.

Your Hosts:

Additional audio by Victoria Pritchard

Show Notes

This episode is by way of a place holder until we get Ubuntu 10.10 next week. Until then, a little news, opinion and shameless plugging.

1:04 | WELCOME and INTRO

2:01 | SHAMELESS PLUGGING

2:50 | NEWS:

12:44 | EXPERT SPOT: Editing the Full Circle Podcast – Part 4: Assembly

18:36 | FEEDBACK: How to get in touch with us

19:18 | WRAP and OUTRO

Comments: on this page, using the comment form, OR; Send us a comment to podcast@fullcirclemagazine.org.
You can also send us a comment by recording an audio clip of no more than 30 seconds and sending it to the same address.
Comments and audio may be edited for length. Please remember this is a family-friendly show.

Please note: this podcast is provided with absolutely no warranty whatsoever; neither the producers nor Full Circle Magazine accept any responsibility or liability for content or interaction which readers and listeners may enter into using external links gleaned from this forum or podcast series.

Creative Commons Music Tracks

File Sizes:

OGG 11.2Mb
mp3 9.4Mb

Runtime: 20 minutes 07 seconds

4 COMMENTS

  1. Stuxnet has been around for a while. To transfer the program it must be moved from PC to PC by USB flash drive. The machine is infected during the auto scan of the drive. Therefore, a person must physically have access to the machine. In addition most standard virus scan software will catch this worm.

    This is real simple on mission critical systems, lock down the physical ports, software, and location.

    Don’t leave your Active Directory Server in a hallway with a post-it note displaying the administrator password.

    • Buck: you’d think the sysdamins would be wise to this after 10 months, but evidently there’s a shift in thinking to make so everyone including industrial users embeds secure computing practices into their everyday routine. It shouldn’t be beyond our capability. RC

  2. My friend recommend me to search your website Full Circle Side-Pod #4: Global Stuxnet Apocalypse Full Circle Magazine, in my opinion, it is quite perfect! I will absorb it my personal favorites. Usually, I believe you can put your own good article content to digg.com, it wil increase your sites rate.

Comments are closed.