show episodes
 
Join Father Robert Ballecer and Lou Maresca on Coding 101, a weekly instructional, project-oriented programming show with appeal for beginning to intermediate programmers. Using a combination of classroom-style teaching, guest programmers, and special interest segments, Coding 101 offers beginner, intermediate, and "applied" programming topics within several interchangeable modules. Learn programming languages such as Java, C++, Visual Basic, PHP, Perl, and more! Although the show is no long ...
 
Join Father Robert Ballecer and Lou Maresca on Coding 101, a weekly instructional, project-oriented programming show with appeal for beginning to intermediate programmers. Using a combination of classroom-style teaching, guest programmers, and special interest segments, Coding 101 offers beginner, intermediate, and "applied" programming topics within several interchangeable modules. Learn programming languages such as Java, C++, Visual Basic, PHP, Perl, and more! Although the show is no long ...
 
Loading …
show series
 
Chinese government asking chipmakers to prioritize Chinese clients Looks like Nvidia's Arm acquisition is heading for the dumpster New ransomware group copies files into password-protected archives to bypass encryption protection Is iPhone Wi-Fi 6E adoption going to stall due to chip shortage? Tracking spy cameras with your smartphone Spending more…
 
Chinese government asking chipmakers to prioritize Chinese clients Looks like Nvidia's Arm acquisition is heading for the dumpster New ransomware group copies files into password-protected archives to bypass encryption protection Is iPhone Wi-Fi 6E adoption going to stall due to chip shortage? Tracking spy cameras with your smartphone Spending more…
 
Vulnerabilities affecting code compilers What if hackers could turn back time? Ukrainian National charged for Kaseya ransomware attack Detecting internet censorship in real-time A new application security toolkit to uncover dependency confusion attacks Mike Fong, CEO, and founder of Privoro talks about hardware to protect phones from eavesdropping,…
 
Vulnerabilities affecting code compilers What if hackers could turn back time? Ukrainian National charged for Kaseya ransomware attack Detecting internet censorship in real-time A new application security toolkit to uncover dependency confusion attacks Mike Fong, CEO, and founder of Privoro talks about hardware to protect phones from eavesdropping,…
 
The Justice Department is stepping up to combat ransomware and cybercrime Google and Salesforce: How companies should use MVSP Updating your service address a few feet delays Starlink orders Hackers are breaking into networks today for more data tomorrow Questions to ask to help reduce risk and understand SaaS security Rajeev Shah, CEO of Celona ta…
 
The Justice Department is stepping up to combat ransomware and cybercrime Google and Salesforce: How companies should use MVSP Updating your service address a few feet delays Starlink orders Hackers are breaking into networks today for more data tomorrow Questions to ask to help reduce risk and understand SaaS security Rajeev Shah, CEO of Celona ta…
 
Linux and FreeBSD can be encrypted by Hive ransomware SEO Poisoning distributes ransomware Cardboard shortages add to supply chain issues Chip shortage could still go on for years Enterprise cybersecurity strategies are getting more attention A SASE: Secure Access Service Edge roundtable with Lou Maresca, Curt Franklin, and Brian Chee Hosts: Louis …
 
Linux and FreeBSD can be encrypted by Hive ransomware SEO Poisoning distributes ransomware Cardboard shortages add to supply chain issues Chip shortage could still go on for years Enterprise cybersecurity strategies are getting more attention A SASE: Secure Access Service Edge roundtable with Lou Maresca, Curt Franklin, and Brian Chee Hosts: Louis …
 
Paying the ransomware piper, security spending, and is it the era of the virtual desktop? Ransomware Gang Masquerades as Real Company to Recruit Tech Talent Tech Vendors Target Enterprise ESG Reporting 2021 State of Ransomware Report Reveals 83% of Victims Paid to Get Data Restored Thanks to a nasty GPSD bug, real-life time travel trouble arrives t…
 
Paying the ransomware piper, security spending, and is it the era of the virtual desktop? Ransomware Gang Masquerades as Real Company to Recruit Tech Talent Tech Vendors Target Enterprise ESG Reporting 2021 State of Ransomware Report Reveals 83% of Victims Paid to Get Data Restored Thanks to a nasty GPSD bug, real-life time travel trouble arrives t…
 
Preventing ransomware attacks when the cyber criminals are already in your network Analysis of the BlackByte ransomware Acer launches antimicrobial PCs Pentagon official resigns because US AI can't compete with China Active Directory security using choke-point analysis Raj Krishna, VP of Strategy & Planning for Cisco Meraki talks SASE solutions and…
 
Preventing ransomware attacks when the cyber criminals are already in your network Analysis of the BlackByte ransomware Acer launches antimicrobial PCs Pentagon official resigns because US AI can't compete with China Active Directory security using choke-point analysis Raj Krishna, VP of Strategy & Planning for Cisco Meraki talks SASE solutions and…
 
PCIe 6.0 spec is almost complete 'FontOnLake' malware targets Linux systems Civil Cyber-Fraud Initiative mandates government contractors to disclose data-breaches Russia behind 58% of detected state-backed hacks Why did Facebook disconnect its data centers from the internet? Triveni Gandhi, Dataiku's Senior Industry Data Scientist, Life Sciences an…
 
PCIe 6.0 spec is almost complete 'FontOnLake' malware targets Linux systems Civil Cyber-Fraud Initiative mandates government contractors to disclose data-breaches Russia behind 58% of detected state-backed hacks Why did Facebook disconnect its data centers from the internet? Triveni Gandhi, Dataiku's Senior Industry Data Scientist, Life Sciences an…
 
Hackers stole cryptocurrency from thousands of Coinbase customers because of insecure MFA Merck says its experimental COVID-19 treatment reduces hospitalizations and deaths by 50% Intel's next-gen neuromorphic processor GM's BrightDrop EV600 electric delivery van 91.5% of malware detections in Q2 2021 arrived over HTTPS-encrypted connections EFF to…
 
Hackers stole cryptocurrency from thousands of Coinbase customers because of insecure MFA Merck says its experimental COVID-19 treatment reduces hospitalizations and deaths by 50% Intel's next-gen neuromorphic processor GM's BrightDrop EV600 electric delivery van 91.5% of malware detections in Q2 2021 arrived over HTTPS-encrypted connections EFF to…
 
Source code published for unpatched iPhone exploits Google finds new way to sneak malware past detection tools What Facebook's latest apology reveals about its security and safety Should manufacturers update their software forever? The Microsoft Airband Initiative wants to increase broadband access to rural areas Jeff Gray, CEO and Co-founder of Gl…
 
Source code published for unpatched iPhone exploits Google finds new way to sneak malware past detection tools What Facebook's latest apology reveals about its security and safety Should manufacturers update their software forever? The Microsoft Airband Initiative wants to increase broadband access to rural areas Jeff Gray, CEO and Co-founder of Gl…
 
Does Adam Selipsky have to worry about the AWS exodus? OMIGOD: a new OMI vulnerability for Azure services ISPs try to stop ban on exclusive wiring deals between providers and landlords Man gets 12 years in prison for unlocking nearly 2 million AT&T phones Is it time to go without passwords? Microsoft thinks so. Jeremy Fitzpatrick, VP of sales for N…
 
Does Adam Selipsky have to worry about the AWS exodus? OMIGOD: a new OMI vulnerability for Azure services ISPs try to stop ban on exclusive wiring deals between providers and landlords Man gets 12 years in prison for unlocking nearly 2 million AT&T phones Is it time to go without passwords? Microsoft thinks so. Jeremy Fitzpatrick, VP of sales for N…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login