<?xml version="1.0" encoding="UTF-8"?>

<rss version="2.0"
  xmlns:atom="http://www.w3.org/2005/Atom"
  xmlns:cc="http://web.resource.org/cc/"
  xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
  xmlns:media="http://search.yahoo.com/mrss/"
  xmlns:content="http://purl.org/rss/1.0/modules/content/"
  xmlns:podcast="https://podcastindex.org/namespace/1.0"
  xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"
  xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">

  <channel>
    <atom:link href="https://rss.libsyn.com/shows/18135/destinations/11283.xml" rel="self" type="application/rss+xml"/>
    <title>CyberSpeak&apos;s Podcast</title>
    <pubDate>Sat, 13 Dec 2025 12:00:46 +0000</pubDate>
    <lastBuildDate>Sat, 13 Dec 2025 12:00:46 +0000</lastBuildDate>
    <generator>Libsyn RSSgen 1.0</generator>
    <link></link>
    <language>en</language>
    <copyright><![CDATA[fairuse]]></copyright>
    <docs></docs>
    <itunes:summary><![CDATA[Hosted by two former federal agents who investigated computer crime, this is a technology Podcast covering Computer Security, Computer Crime and Computer Forensics Topics.]]></itunes:summary>
    <image>
      <url>https://static.libsyn.com/p/assets/7/2/9/b/729be523b38a3998/sph.jpg</url>
      <title>CyberSpeak&apos;s Podcast</title>
      <link><![CDATA[]]></link>
    </image>
    <itunes:author>Bret Padres and Ovie Carroll</itunes:author>
		<itunes:category text="Technology" />
<itunes:category text="News">
  <itunes:category text="Tech News" />
</itunes:category>
    <itunes:image href="https://static.libsyn.com/p/assets/7/2/9/b/729be523b38a3998/sph.jpg" />
    <itunes:explicit>false</itunes:explicit>
    <itunes:owner>
      <itunes:name>Bret Padres and Ovie Carroll</itunes:name>
      <itunes:email>cyberspeak@gmail.com</itunes:email>
    </itunes:owner>
    <description><![CDATA[Hosted by two former federal agents who investigated computer crime, this is a technology Podcast covering Computer Security, Computer Crime and Computer Forensics Topics.]]></description>
    
    <itunes:type>episodic</itunes:type>
    

    <itunes:keywords />

    

    
    <podcast:locked owner="cyberspeak@gmail.com">no</podcast:locked>
    
    
    
    
    
    <item>
      <title>HackerNinjaScissors - Lauren Pearce - Journey of a Malware Analyst</title>
      <itunes:title>HackerNinjaScissors - Lauren Pearce - Journey of a Malware Analyst</itunes:title>
      <pubDate>Thu, 16 Mar 2017 00:17:09 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[bdbb7183cd60bc857ef1de447e378a8c]]></guid>
      <link><![CDATA[https://cyberspeak.libsyn.com/hackerninjascissors-lauren-pearce-journey-of-a-malware-analyst]]></link>
      <description><![CDATA[<p><span style="font-size: 14pt;">HackerNinjaScissors --</span>  With Bret Padres. <a href= "http://www.crypsisgroup.com">www.crypsisgroup.com</a></p> <p>Today we talk with Lauren Pearce - a member of the IR team and a malware analyst for Los Alamos National Labs.  Lauren shares with us her journey to become a malware analyst and talks about the importance of flailing and mentorship.</p> <p>I have a few free tickets to give out, so let me know if you want free tickets to the <strong>2017 Incident Response Forum</strong> on April 4th, 2017, at the Mayflower Hotel in Washington DC.  </p> <p>More info here -> <a href= "http://incidentresponseforum.com">incidentresponseforum.com</a> and use Speak100 for $100 off the ticket price.</p> <p>Crypsis is hiring talented IR consultants!!  Apply on our website: <a href= "http://www.crypsisgroup.com">www.crypsisgroup.com</a></p> <p> </p>]]></description>
      
      <content:encoded><![CDATA[<p>HackerNinjaScissors -- With Bret Padres. <a href= "http://www.crypsisgroup.com">www.crypsisgroup.com</a></p> <p>Today we talk with Lauren Pearce - a member of the IR team and a malware analyst for Los Alamos National Labs. Lauren shares with us her journey to become a malware analyst and talks about the importance of flailing and mentorship.</p> <p>I have a few free tickets to give out, so let me know if you want free tickets to the 2017 Incident Response Forum on April 4th, 2017, at the Mayflower Hotel in Washington DC. </p> <p>More info here -&gt; <a href= "http://incidentresponseforum.com">incidentresponseforum.com</a> and use Speak100 for $100 off the ticket price.</p> <p>Crypsis is hiring talented IR consultants!! Apply on our website: <a href= "http://www.crypsisgroup.com">www.crypsisgroup.com</a></p> <p> </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/HNS_Podcast_2_Final.mp3?dest-id=11283" length="52606558" type="audio/mpeg" />
      <itunes:duration>36:29</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/f/1/5/6/f1564f6d93762338/HNS_Podcast_2_Final.jpg" />
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>HackerNinjaScissors - Robert M Lee - Cyber Threat Intel</title>
      <itunes:title>HackerNinjaScissors - Robert M Lee - Cyber Threat Intel</itunes:title>
      <pubDate>Sat, 04 Feb 2017 08:52:51 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[65187c2ea8f11a8a24d89affc5988e97]]></guid>
      <link><![CDATA[https://cyberspeak.libsyn.com/hackerninjascissors-robert-m-lee-cyber-threat-intel]]></link>
      <description><![CDATA[<p><strong>New show in the Feed!</strong></p> <p><span style="font-size: 14pt;">HackerNinjaScissors --</span>  With Bret Padres. <a href= "http://www.crypsisgroup.com">www.crypsisgroup.com</a></p> <p>New CyberSpeak Podcast reboot in the works.  In the mean time check out this new show.</p> <p>In the inaugural show of HackerNinjaScissors, Bret Padres interviews Robert M Lee.</p> <p>Robert M. Lee is the CEO and Founder of the critical infrastructure cyber security company Dragos where he has a passion for control system traffic analysis, digital forensics, and threat intelligence research. He is also a non-resident National Cybersecurity Fellow at New America focusing on policy issues relating to the cyber security of critical infrastructure. For his research and focus areas, Robert was named one of Passcode's Influencers, awarded EnergySec's Cyber Security Professional of the Year (2015), and inducted into Forbes' 30 under 30 for Enterprise Technology (2016).</p> <p>Links mentioned in the show:</p> <p>- dragos.com<br /> - @RobertMLee<br /> - robertmlee.org<br /> - littlebobbycomic.com<br /> - @_LittleBobby<br /> - https://www.amazon.com/Threat-Intelligence-Me-Children-Analysts/dp/1541148819</p>]]></description>
      
      <content:encoded><![CDATA[<p>New show in the Feed!</p> <p>HackerNinjaScissors -- With Bret Padres. <a href= "http://www.crypsisgroup.com">www.crypsisgroup.com</a></p> <p>New CyberSpeak Podcast reboot in the works. In the mean time check out this new show.</p> <p>In the inaugural show of HackerNinjaScissors, Bret Padres interviews Robert M Lee.</p> <p>Robert M. Lee is the CEO and Founder of the critical infrastructure cyber security company Dragos where he has a passion for control system traffic analysis, digital forensics, and threat intelligence research. He is also a non-resident National Cybersecurity Fellow at New America focusing on policy issues relating to the cyber security of critical infrastructure. For his research and focus areas, Robert was named one of Passcode's Influencers, awarded EnergySec's Cyber Security Professional of the Year (2015), and inducted into Forbes' 30 under 30 for Enterprise Technology (2016).</p> <p>Links mentioned in the show:</p> <p>- dragos.com - @RobertMLee - robertmlee.org - littlebobbycomic.com - @_LittleBobby - https://www.amazon.com/Threat-Intelligence-Me-Children-Analysts/dp/1541148819</p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/HNS_Podcast_1_Final.mp3?dest-id=11283" length="70515723" type="audio/mpeg" />
      <itunes:duration>48:55</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/b/d/c/6/bdc6db2a27fc5ed4/SAC63N02a_HackerNinja_sm.png" />
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Aug 31 2015 - SRUM</title>
      <itunes:title>CyberSpeak Aug 31 2015 - SRUM</itunes:title>
      <pubDate>Sun, 30 Aug 2015 21:43:31 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[1c7fc9ad6596bfd26cedeabc8864e26d]]></guid>
      <link><![CDATA[https://cyberspeak.libsyn.com/cyberspeak-aug-31-2015-srum]]></link>
      <description><![CDATA[<p>CyberSpeak is BACK and we hope to publish a monthly podcast (more if I'm lucky).</p>
<p>This episode on CyberSpeak we briefly discuss possible implications to U.S. forensicators with the release of the Ashley Madison database (hopefully not). We also have a great interview with <a href="http://www.champlain.edu/academics/our-faculty/khatri-yogesh">Yogesh Khatri</a>, an assistant professor at Champlain College and a security researcher about the SRUM or System Resourse Usage Monitor forensic artifact. Website of the week: Has your email been Pwned? Check it out here -> <a href="https://haveibeenpwned.com" target="_blank">Have I Been Pwned</a></p>]]></description>
      
      <content:encoded><![CDATA[<p>CyberSpeak is BACK and we hope to publish a monthly podcast (more if I'm lucky).</p> <p>This episode on CyberSpeak we briefly discuss possible implications to U.S. forensicators with the release of the Ashley Madison database (hopefully not). We also have a great interview with <a href="http://www.champlain.edu/academics/our-faculty/khatri-yogesh">Yogesh Khatri</a>, an assistant professor at Champlain College and a security researcher about the SRUM or System Resourse Usage Monitor forensic artifact. Website of the week: Has your email been Pwned? Check it out here -&gt; <a href="https://haveibeenpwned.com" target="_blank">Have I Been Pwned</a></p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-146-2015-08-24.mp3?dest-id=11283" length="39472960" type="audio/mpeg" />
      <itunes:duration>54:49</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/3/5/3/6/353642e3d3b73013/CyberSpeak_Icon.jpg" />
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Feb 18, 2013 - Recon Mission</title>
      <itunes:title>CyberSpeak Feb 18, 2013 - Recon Mission</itunes:title>
      <pubDate>Mon, 18 Feb 2013 00:13:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[949ceaafe5d4e9d926fced8f8576190d]]></guid>
      <link><![CDATA[https://cyberspeak.libsyn.com/cyber-speak-feb-18-2013-recon-mission]]></link>
      <description><![CDATA[<p><span style="font-size: large;">This episode of CyberSpeak we conduct recon on <a href="http://www.linkedin.com/in/markspencer" target="_blank">Mark Spencer</a> and his new Windows registry analysis tool <a href="http://arsenalrecon.com/apps/" target="_blank">Registry Recon</a>.  Mark is the President of <a href="http://www.arsenalexperts.com/" target="_blank">Arsenal Consulting</a>.  This new registry tool could change the way we analyze the Windows registry.  No longer will you be satisfied just looking st the current/active registry.   </span></p>]]></description>
      
      <content:encoded><![CDATA[<p>This episode of CyberSpeak we conduct recon on <a href="http://www.linkedin.com/in/markspencer" target="_blank">Mark Spencer</a> and his new Windows registry analysis tool <a href="http://arsenalrecon.com/apps/" target="_blank">Registry Recon</a>. Mark is the President of <a href="http://www.arsenalexperts.com/" target="_blank">Arsenal Consulting</a>. This new registry tool could change the way we analyze the Windows registry. No longer will you be satisfied just looking st the current/active registry. </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-145-2013-02-16.mp3?dest-id=11283" length="28465482" type="audio/mpeg" />
      <itunes:duration>39:32</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>January 2013 CyberSpeak - Solid State Hard Drives Interview w/James Wiebe</title>
      <itunes:title>January 2013 CyberSpeak - Solid State Hard Drives Interview w/James Wiebe</itunes:title>
      <pubDate>Sat, 02 Feb 2013 23:48:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[ac98f0854a4b387043b57a0a5201b536]]></guid>
      <link><![CDATA[https://cyberspeak.libsyn.com/january-2013-cyber-speak-solid-state-hard-drives-interview-w-james-webie]]></link>
      <description><![CDATA[<p><span style="font-size: medium;">Happy 2013!  I'm back and going to try to start getting some more shows out for you. This show we talk to James Wiebe, Director of Foensic Business Devleopment at<a href="http://www.wiebetech.com/" target="_blank"> WiebeTech</a> about solid state hard drives, his research and the forensic implications. Email me at cyberspeak at gmail dot com if you have some suggestions for future show topics you want to hear.</span></p>]]></description>
      
      <content:encoded><![CDATA[<p>Happy 2013! I'm back and going to try to start getting some more shows out for you. This show we talk to James Wiebe, Director of Foensic Business Devleopment at<a href="http://www.wiebetech.com/" target="_blank"> WiebeTech</a> about solid state hard drives, his research and the forensic implications. Email me at cyberspeak at gmail dot com if you have some suggestions for future show topics you want to hear.</p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-144-2013-02-02.mp3?dest-id=11283" length="23266279" type="audio/mpeg" />
      <itunes:duration>32:19</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak May 7, 2012 - Volume Shadow Copies</title>
      <itunes:title>CyberSpeak May 7, 2012 - Volume Shadow Copies</itunes:title>
      <pubDate>Tue, 08 May 2012 00:30:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[ba0d96d04da1b0404dab1bc466551a4e]]></guid>
      <link><![CDATA[https://cyberspeak.libsyn.com/cyber-speak-may-7-2012-volume-shadow-copies]]></link>
      <description><![CDATA[<p class="MsoNormal"><span style="font-size: 10.0pt; font-family: Verdana; mso-bidi-font-family: Verdana;">This episode we discuss running AV and malware detection software on your forensic workstation and have an interview with Corey Harrell and discuss analyzing Volume Shadow Copies.  </span><o:p></o:p></p>]]></description>
      
      <content:encoded><![CDATA[<p class="MsoNormal">This episode we discuss running AV and malware detection software on your forensic workstation and have an interview with Corey Harrell and discuss analyzing Volume Shadow Copies. </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-143-2012-05-07.mp3?dest-id=11283" length="39740976" type="audio/mpeg" />
      <itunes:duration>55:12</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak - Special New Tool Release</title>
      <itunes:title>CyberSpeak - Special New Tool Release</itunes:title>
      <pubDate>Thu, 01 Dec 2011 11:57:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[bebfeec85ccd7df6a6cff2446eceb805]]></guid>
      <link><![CDATA[https://cyberspeak.libsyn.com/cyber-speak-special-new-tool-release]]></link>
      <description><![CDATA[<p><span style="font-size: small;">This special episode of CyberSpeak is an interview with Ken Privette with <a href="http://www.nuix.com">NUIX</a> about their new tool release this morning called <a href="http://www.prooffinder.com">Proof Finder</a>.  They are releasing 1,000 copies for $100 each of this new tool. Go get a copy before they are all gone at <a href="http://www.prooffinder.com">www.prooffinder.com</a>. This special limited edition tool is limited to 10G of data. What does 10G of data look like, Nuix says it is an average of 241,165 Emails or 20333 Documents or 7069 Spreadsheets or 25514 Images. It can ingest all major forensic images (E01, DD, etc)<br /></span></p>
<p><span style="font-size: small;">Listen to the show for more details.  100% of all sales go to charity "<a href="http://www.roomtoread.org/">Room to Read</a>", an organization that works in collaboration with communities and local governments in developing countries to develop literacy skills and a habit of reading among primary school children, and support girls to complete secondary school with the life skills they’ll need to succeed in school and beyond.</span></p>
<p><span style="font-size: small;">ALERT-Download and install on the computer you want it registered to.  Initial installation will lock it to that computer.</span></p>]]></description>
      
      <content:encoded><![CDATA[<p>This special episode of CyberSpeak is an interview with Ken Privette with <a href="http://www.nuix.com">NUIX</a> about their new tool release this morning called <a href="http://www.prooffinder.com">Proof Finder</a>. They are releasing 1,000 copies for $100 each of this new tool. Go get a copy before they are all gone at <a href="http://www.prooffinder.com">www.prooffinder.com</a>. This special limited edition tool is limited to 10G of data. What does 10G of data look like, Nuix says it is an average of 241,165 Emails or 20333 Documents or 7069 Spreadsheets or 25514 Images. It can ingest all major forensic images (E01, DD, etc)</p> <p>Listen to the show for more details. 100% of all sales go to charity "<a href="http://www.roomtoread.org/">Room to Read</a>", an organization that works in collaboration with communities and local governments in developing countries to develop literacy skills and a habit of reading among primary school children, and support girls to complete secondary school with the life skills they’ll need to succeed in school and beyond.</p> <p>ALERT-Download and install on the computer you want it registered to. Initial installation will lock it to that computer.</p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-142-2011-11-30.mp3?dest-id=11283" length="14266258" type="audio/mpeg" />
      <itunes:duration>19:49</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Sep 26 2011 Registry Decoder</title>
      <itunes:title>CyberSpeak Sep 26 2011 Registry Decoder</itunes:title>
      <pubDate>Mon, 26 Sep 2011 00:36:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[36ab8285c84cdd999f36b6ab9a4c92b8]]></guid>
      <link><![CDATA[https://cyberspeak.libsyn.com/cyber-speak-sep-26-2011-registry-browser]]></link>
      <description><![CDATA[<p>This week on CyberSpeak I interview Andrew Case, one of the developers of Registry Decoder, a National Institute of Justice sponsored application. Find it at www.registrydecoder.com</p>]]></description>
      
      <content:encoded><![CDATA[<p>This week on CyberSpeak I interview Andrew Case, one of the developers of Registry Decoder, a National Institute of Justice sponsored application. Find it at www.registrydecoder.com</p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-141-2011-09-25.mp3?dest-id=11283" length="27239505" type="audio/mpeg" />
      <itunes:duration>37:50</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak August 28 2011</title>
      <itunes:title>CyberSpeak August 28 2011</itunes:title>
      <pubDate>Mon, 29 Aug 2011 00:25:50 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[2639243dda6310f2fcebe90421ada20a]]></guid>
      <link><![CDATA[https://cyberspeak.libsyn.com/cyber-speak-august-28-2011]]></link>
      <description><![CDATA[<p><span style="font-size: small;">This week on CyberSpeak, a quick thanks to <span class="Apple-style-span" style="font-family: Verdana;">everyone for pitching in on the ForensicsWiki - I saw over 100 new entries on everything from Sticky not</span></span><span style="color: #000000;"><span class="Apple-style-span" style="font-family: Verdana; font-size: small;">es, mounting images, jump lists to people's BIOS.  </span><span style="font-size: small;"><span class="Apple-style-span" style="font-family: Verdana;">Jim Emailed asking who the mystery voice was in out CyberSpeak Sweepers - </span><span class="Apple-style-span" style="font-family: Verdana;">Karl over from CyberCon Security Solutions said wrote in to say he </span><span class="Apple-style-span" style="font-family: Verdana;">just ran across this site today and thought it might be a great resource for the listeners.  It is not focused on Cyber Security but the concepts are the similar to help prepare for trial.  </span><span class="Apple-style-span" style="font-family: Verdana;"><span style="color: #000000;"><a href="http://www.dna.gov/training/law101">LAW 101: LEGAL GUIDE FOR THE FORENSIC EXPERT</a>. </span></span></span></span><span class="Apple-style-span" style="font-family: Verdana; color: #000000; font-size: small;">Shout out to Charles.  </span><span class="Apple-style-span" style="font-family: Verdana; font-size: small;">Finally, Loren Wrote in and said d</span><span class="Apple-style-span" style="font-family: Verdana; font-size: small;">uring the interview, Keith Jones mentioned preparing for court by asking others for their opinions. Are there any ramifications of bringing others </span><span class="Apple-style-span" style="font-family: Verdana; font-size: small;">into the case like that? </span></p>
<p><span class="Apple-style-span" style="font-family: Verdana; font-size: small;"></span><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-family: Verdana;">In the News, </span><span class="Apple-style-span" style="color: #333233; font-family: Monaco;">Google, </span><span class="Apple-style-span" style="color: #333233; font-family: Monaco;">The Company with the motto - DO NO EVIL - agreed to forfeit $500 million to the U.S. Government for allowing -- and assisting in many case -- online Canadian pharmacies to place AdWords ads targeting customers in the United States resulting in the unlawful importation of controlled and non-controlled prescription drugs into the United States.  </span></span></p>
<p><span class="Apple-style-span" style="color: #333233; font-family: Monaco; font-size: small;">This weeks interview is with Chris Pogue, Mr. Sniper Forensics!</span></p>
<p><span style="font-size: small;">Thanks to Dan Website of the week is Workflowy <span class="Apple-style-span" style="font-family: Verdana;"><a href="https://workflowy.com/" target="_blank">https://workflowy.com/</a> </span></span></p>
<div style="margin-top: 0px; margin-bottom: 0px;"></div>]]></description>
      
      <content:encoded><![CDATA[<p>This week on CyberSpeak, a quick thanks to everyone for pitching in on the ForensicsWiki - I saw over 100 new entries on everything from Sticky notes, mounting images, jump lists to people's BIOS. Jim Emailed asking who the mystery voice was in out CyberSpeak Sweepers - Karl over from CyberCon Security Solutions said wrote in to say he just ran across this site today and thought it might be a great resource for the listeners. It is not focused on Cyber Security but the concepts are the similar to help prepare for trial. <a href="http://www.dna.gov/training/law101">LAW 101: LEGAL GUIDE FOR THE FORENSIC EXPERT</a>. Shout out to Charles. Finally, Loren Wrote in and said during the interview, Keith Jones mentioned preparing for court by asking others for their opinions. Are there any ramifications of bringing others into the case like that? </p> <p>In the News, Google, The Company with the motto - DO NO EVIL - agreed to forfeit $500 million to the U.S. Government for allowing -- and assisting in many case -- online Canadian pharmacies to place AdWords ads targeting customers in the United States resulting in the unlawful importation of controlled and non-controlled prescription drugs into the United States. </p> <p>This weeks interview is with Chris Pogue, Mr. Sniper Forensics!</p> <p>Thanks to Dan Website of the week is Workflowy <a href="https://workflowy.com/" target="_blank">https://workflowy.com/</a> </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-140-2011-08-28.mp3?dest-id=11283" length="38996801" type="audio/mpeg" />
      <itunes:duration>54:10</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak August 21, 2011</title>
      <itunes:title>CyberSpeak August 21, 2011</itunes:title>
      <pubDate>Sun, 21 Aug 2011 21:25:44 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[6c6a31066a1497f821d08aa61dd2d439]]></guid>
      <link><![CDATA[https://cyberspeak.libsyn.com/cyber-speak-august-21-2011]]></link>
      <description><![CDATA[<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">CYBERSPEAK Notes - Aug 21st, 2011</p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica; min-height: 14.0px;">Administrative</p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">I attended a nice Apple Forensic Event this week in Reston VA - Saw a lot of friends and had a good time.  Ryan gave a great presentation on Apple forensics.  Ryan runs the AppleExaminer.com </p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica; min-height: 14.0px;"></p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">Paraben's Forensic Innovation Conference </p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">PFIC is fast approaching and you know, it's becoming one of the the must attend conference each year for digital forensic and eDiscovery professionals. This year, there are seven pre-conference bootcamps that are included in your conference registration fee of $399.00. You can attend any single bootcamp and then the rest of the conference tracks and labs for this rate.  This is all being brought to you by our friends over at the Paraben Corporation (Amber Schroader). </p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">You can register by heading over to pfic-conference.com</p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica; min-height: 14.0px;"></p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">http://www.forensicswiki.org - We all should go check this site out, sign up for an account and start contributing.  This is the way we can all give back to the community.  Write a How-To or something to give back to the forensic community. </p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica; min-height: 14.0px;"></p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">Listener Email -</p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">Richardo from Navada Concerned about those performing collateral duty of doing digital forensic examinations.  Frustrated to read article after article in digital forensic publications that cover the deconstruction of a complicated piece of malware. he would rather have articles that rehashed digital forensic basics and covered free automated/low cost tools that help me do my job efficiently and reliably.</p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica; min-height: 14.0px;"></p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">News-</p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">London Police are using Flicker to allow the public to help identify people involved in the looting following riots in London. </p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">http://www.flickr.com/photos/metropolitanpolice/sets/72157627267892973/</p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">http://thenextweb.com/uk/2011/08/09/police-use-flickr-to-identify-london-riot-suspects/</p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;"> </p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">INTERVIEW -</p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">Welcome back to the show Drew Fahey, VP of Products at Blackbag Technologies. </p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica; min-height: 14.0px;"></p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">Web Sites of the Week-</p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">http://www.forensicswiki.org</p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">http://t.co/vEmtzCA - A guide to FaceBook Security</p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica; min-height: 14.0px;"></p>
<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">KEEP THE EMAILS COMING to CyberSpeak@gmail.com</p>]]></description>
      
      <content:encoded><![CDATA[<p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">CYBERSPEAK Notes - Aug 21st, 2011</p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica; min-height: 14.0px;">Administrative</p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">I attended a nice Apple Forensic Event this week in Reston VA - Saw a lot of friends and had a good time. Ryan gave a great presentation on Apple forensics. Ryan runs the AppleExaminer.com </p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica; min-height: 14.0px;"></p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">Paraben's Forensic Innovation Conference </p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">PFIC is fast approaching and you know, it's becoming one of the the must attend conference each year for digital forensic and eDiscovery professionals. This year, there are seven pre-conference bootcamps that are included in your conference registration fee of $399.00. You can attend any single bootcamp and then the rest of the conference tracks and labs for this rate. This is all being brought to you by our friends over at the Paraben Corporation (Amber Schroader). </p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">You can register by heading over to pfic-conference.com</p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica; min-height: 14.0px;"></p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">http://www.forensicswiki.org - We all should go check this site out, sign up for an account and start contributing. This is the way we can all give back to the community. Write a How-To or something to give back to the forensic community. </p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica; min-height: 14.0px;"></p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">Listener Email -</p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">Richardo from Navada Concerned about those performing collateral duty of doing digital forensic examinations. Frustrated to read article after article in digital forensic publications that cover the deconstruction of a complicated piece of malware. he would rather have articles that rehashed digital forensic basics and covered free automated/low cost tools that help me do my job efficiently and reliably.</p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica; min-height: 14.0px;"></p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">News-</p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">London Police are using Flicker to allow the public to help identify people involved in the looting following riots in London. </p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">http://www.flickr.com/photos/metropolitanpolice/sets/72157627267892973/</p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">http://thenextweb.com/uk/2011/08/09/police-use-flickr-to-identify-london-riot-suspects/</p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;"> </p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">INTERVIEW -</p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">Welcome back to the show Drew Fahey, VP of Products at Blackbag Technologies. </p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica; min-height: 14.0px;"></p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">Web Sites of the Week-</p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">http://www.forensicswiki.org</p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">http://t.co/vEmtzCA - A guide to FaceBook Security</p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica; min-height: 14.0px;"></p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">KEEP THE EMAILS COMING to CyberSpeak@gmail.com</p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-139-2011-08-21.mp3?dest-id=11283" length="43619569" type="audio/mpeg" />
      <itunes:duration>01:00:33</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak August 15, 2011</title>
      <itunes:title>CyberSpeak August 15, 2011</itunes:title>
      <pubDate>Mon, 15 Aug 2011 00:12:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[aba1fc0eacf5e0ee4cfec171b6c623b4]]></guid>
      <link><![CDATA[https://cyberspeak.libsyn.com/cyber-speak-august-15-2011]]></link>
      <description><![CDATA[<p class="MsoNormal"><span face="Arial" style="font-family: Arial;"> <!--[if gte mso 9]><xml>
 <o:OfficeDocumentSettings>
  <o:AllowPNG/>
 </o:OfficeDocumentSettings>
</xml><![endif]--> <!--[if gte mso 9]><xml>
 <w:WordDocument>
  <w:View>Normal</w:View>
  <w:Zoom>0</w:Zoom>
  <w:TrackMoves/>
  <w:TrackFormatting/>
  <w:PunctuationKerning/>
  <w:ValidateAgainstSchemas/>
  <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
  <w:IgnoreMixedContent>false</w:IgnoreMixedContent>
  <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
  <w:DoNotPromoteQF/>
  <w:LidThemeOther>EN-US</w:LidThemeOther>
  <w:LidThemeAsian>JA</w:LidThemeAsian>
  <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
  <w:Compatibility>
   <w:BreakWrappedTables/>
   <w:SnapToGridInCell/>
   <w:WrapTextWithPunct/>
   <w:UseAsianBreakRules/>
   <w:DontGrowAutofit/>
   <w:SplitPgBreakAndParaMark/>
   <w:EnableOpenTypeKerning/>
   <w:DontFlipMirrorIndents/>
   <w:OverrideTableStyleHps/>
   <w:UseFELayout/>
  </w:Compatibility>
  <m:mathPr>
   <m:mathFont m:val="Cambria Math"/>
   <m:brkBin m:val="before"/>
   <m:brkBinSub m:val="--"/>
   <m:smallFrac m:val="off"/>
   <m:dispDef/>
   <m:lMargin m:val="0"/>
   <m:rMargin m:val="0"/>
   <m:defJc m:val="centerGroup"/>
   <m:wrapIndent m:val="1440"/>
   <m:intLim m:val="subSup"/>
   <m:naryLim m:val="undOvr"/>
  </m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
  DefSemiHidden="true" DefQFormat="false" DefPriority="99"
  LatentStyleCount="276">
  <w:LsdException Locked="false" Priority="0" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 1"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 2"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 3"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 4"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 5"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 6"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 7"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 8"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 9"/>
  <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
  <w:LsdException Locked="false" Priority="10" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Title"/>
  <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
  <w:LsdException Locked="false" Priority="11" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
  <w:LsdException Locked="false" Priority="22" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
  <w:LsdException Locked="false" Priority="20" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
  <w:LsdException Locked="false" Priority="59" SemiHidden="false"
   UnhideWhenUsed="false" Name="Table Grid"/>
  <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
  <w:LsdException Locked="false" Priority="1" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 1"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
  <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
  <w:LsdException Locked="false" Priority="34" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
  <w:LsdException Locked="false" Priority="29" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
  <w:LsdException Locked="false" Priority="30" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 1"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 2"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 2"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 3"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 3"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 4"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 4"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 5"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 5"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 6"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 6"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="19" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
  <w:LsdException Locked="false" Priority="21" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
  <w:LsdException Locked="false" Priority="31" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
  <w:LsdException Locked="false" Priority="32" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
  <w:LsdException Locked="false" Priority="33" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
  <w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
  <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
 </w:LatentStyles>
</xml><![endif]--> <!--[if gte mso 10]>
<style>
 /* Style Definitions */
table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:Cambria;
	mso-ascii-font-family:Cambria;
	mso-ascii-theme-font:minor-latin;
	mso-hansi-font-family:Cambria;
	mso-hansi-theme-font:minor-latin;}
</style>
<![endif]--> <!--StartFragment--></span></p>
<p class="MsoNormal"><span style="font-size: 14.0pt; font-family: Arial;">This week on CyberSpeak, Luby and Jared Save the GMail Planet, <a href="http://www.cybercrime101.com/"><span style="color: #0000f7;">Detective Garcia</span></a> uncovers <a href="http://www.huffingtonpost.com/pablo-andreu/forensic-evidence-suggest_b_925525.html"><span style="color: #0000f7;">Fraud on Sesame Street</span></a>.  Congrats to the <a href="http://www.secretservice.gov/"><span style="color: #0000f7;">Secret Service</span></a> and <a href="http://www.fbi.gov/"><span style="color: #0000f7;">FBI</span></a> on a great <a href="http://www.cybercrime.gov/OliverasPlea.pdf"><span style="color: #0000f7;">investigation of a 26 year old Brooklyn</span></a> man who plead guilty in U.S. District Court in Alexandria, VA for his role in managing a credit card fraud operation that operated throughout the East Coast of the United States. <span style="color: #262626;">California Prosecutors will not file charges against Gizmodo for its purchase of an iPhone 4 prototype (boo).  Interview this week is Keith Jones</span>, Co-Owner and Senior Partner at <a href="http://www.jonesdykstra.com/"><span style="color: #0000f7;">Jones Dykstra and Associates</span></a> Inc., about the do's and don'ts of testifying.  Tech topic, <a href="http://www.moonsols.com/2011/07/18/moonsols-dumpit-goes-mainstream"><span style="color: #0000f7;">MoonSol's Dumpit</span></a> released for FREE.  Perfect for imaging RAM on 32 or 64 bit Windows System.  It just does not get any easier than this-Check it out.  Web pick of the week is http://Infosecupdate.com. KEEP THE EMAILS COMING!<o:p></o:p></span></p>
<p class="MsoNormal"></p>
<p><span face="Verdana" size="3" style="font-family: Verdana; font-size: small;"><br /></span></p>]]></description>
      
      <content:encoded><![CDATA[<p class="MsoNormal"> </p> <p class="MsoNormal">This week on CyberSpeak, Luby and Jared Save the GMail Planet, <a href="http://www.cybercrime101.com/">Detective Garcia</a> uncovers <a href="http://www.huffingtonpost.com/pablo-andreu/forensic-evidence-suggest_b_925525.html">Fraud on Sesame Street</a>. Congrats to the <a href="http://www.secretservice.gov/">Secret Service</a> and <a href="http://www.fbi.gov/">FBI</a> on a great <a href="http://www.cybercrime.gov/OliverasPlea.pdf">investigation of a 26 year old Brooklyn</a> man who plead guilty in U.S. District Court in Alexandria, VA for his role in managing a credit card fraud operation that operated throughout the East Coast of the United States. California Prosecutors will not file charges against Gizmodo for its purchase of an iPhone 4 prototype (boo). Interview this week is Keith Jones, Co-Owner and Senior Partner at <a href="http://www.jonesdykstra.com/">Jones Dykstra and Associates</a> Inc., about the do's and don'ts of testifying. Tech topic, <a href="http://www.moonsols.com/2011/07/18/moonsols-dumpit-goes-mainstream">MoonSol's Dumpit</a> released for FREE. Perfect for imaging RAM on 32 or 64 bit Windows System. It just does not get any easier than this-Check it out. Web pick of the week is http://Infosecupdate.com. KEEP THE EMAILS COMING!</p> <p class="MsoNormal"></p> <p></p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-138-2011-08-14.mp3?dest-id=11283" length="51041235" type="audio/mpeg" />
      <itunes:duration>01:10:53</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/b/7/3/4/b734d12dfe63cd60/cookie-monster.jpg" />
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak August 8 2011</title>
      <itunes:title>CyberSpeak August 8 2011</itunes:title>
      <pubDate>Mon, 08 Aug 2011 10:23:56 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[e952a0928801c0367e1935b28c1a0195]]></guid>
      <link><![CDATA[https://cyberspeak.libsyn.com/cyber-speak-august-8-2011-]]></link>
      <description><![CDATA[<p>Chris Hanesn caught cheating...on his mistress Launch of the CDFS www.cdfs.org, DFirst starts this week and more.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Chris Hanesn caught cheating...on his mistress Launch of the CDFS www.cdfs.org, DFirst starts this week and more.</p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-137-2011-08-07.mp3?dest-id=11283" length="35897843" type="audio/mpeg" />
      <itunes:duration>49:51</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak July 18, 2011</title>
      <itunes:title>CyberSpeak July 18, 2011</itunes:title>
      <pubDate>Mon, 18 Jul 2011 03:54:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[3586b52ed6d5e4187ac442c0ad72b2a5]]></guid>
      <link><![CDATA[https://cyberspeak.libsyn.com/cyber-speak-june-18-2011]]></link>
      <description><![CDATA[<div style="color: #000000; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: #ffffff; margin: 8px;">
<p class="MsoNormal"><span style="font-size: 10.0pt; font-family: Verdana; mso-bidi-font-family: Verdana;">A quick show with George Starcher discussing his experience with password cracking using Access Data’s DNA and Amazon’s Elastic Compute Cloud.<span style="mso-spacerun: yes;">  </span>Check out his video tutorials at <a href="https://www.georgestarcher.com/?tag=amazon-ec2"><span style="color: windowtext; text-decoration: none; text-underline: none;">https://www.georgestarcher.com/?tag=amazon-ec2</span></a>.<span style="mso-spacerun: yes;">  </span>We also discussed his Crowbar tool, <a href="https://www.georgestarcher.com/?page_id=256"><span style="color: windowtext; text-decoration: none; text-underline: none;">https://www.georgestarcher.com/?page_id=256</span></a>,</span></p>
<p class="MsoNormal" style="mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;"><span style="font-size: 10.0pt; font-family: Verdana; mso-bidi-font-family: Verdana;">Web picks of the weeks are <a href="http://www.threatexpert.com/"><span style="color: windowtext; text-decoration: none; text-underline: none;">www.threatexpert.com</span></a> and <a href="http://www.thumbtack.com">www.thumbtack.com</a><o:p></o:p></span></p>
</div>]]></description>
      
      <content:encoded><![CDATA[<p class="MsoNormal">A quick show with George Starcher discussing his experience with password cracking using Access Data’s DNA and Amazon’s Elastic Compute Cloud. Check out his video tutorials at <a href="https://www.georgestarcher.com/?tag=amazon-ec2">https://www.georgestarcher.com/?tag=amazon-ec2</a>. We also discussed his Crowbar tool, <a href="https://www.georgestarcher.com/?page_id=256">https://www.georgestarcher.com/?page_id=256</a>,</p> <p class="MsoNormal" style="mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;">Web picks of the weeks are <a href="http://www.threatexpert.com/">www.threatexpert.com</a> and <a href="http://www.thumbtack.com">www.thumbtack.com</a></p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-136-2011-07-17.mp3?dest-id=11283" length="27493415" type="audio/mpeg" />
      <itunes:duration>38:11</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak-Forensics and the 4th Amendment</title>
      <itunes:title>CyberSpeak-Forensics and the 4th Amendment</itunes:title>
      <pubDate>Sun, 26 Jun 2011 22:59:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[248f64c113ff3c7cf92b6a4beccf8038]]></guid>
      <link><![CDATA[https://cyberspeak.libsyn.com/cyber-speak-forensics-and-the-4th-amendment]]></link>
      <description><![CDATA[<div style="color: #000000; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: #ffffff; margin: 8px;">
<p class="MsoNormal">This week on CyberSpeak, a listener alerted me to my faux pas with the names on the Casey Anthony case, the two that testified about computer forensics were Sandy and Kevin (not Steve) and of all things, I called the Bresident of Access Data Brian Carrier instead of Brian Karney. Sorry guys!</p>
<p class="MsoNormal">This weeks interview of Josh Goldfoot, an attorney and author of the recent paper titled ”<a href="http://www.bjcl.org/current/16_1/3_Goldfoot_draft1.pdf">The Physical Computer and the Fourth Amendment</a>” published in the Berkley Journal of Criminal Law.<span>  </span>This paper discusses how the forth amendment applies to computer forensics and how we may be hurting ourselves by using certain words and explanations.</p>
<p class="MsoNormal">Web site of the week is a neat little web browsing and twitter application called <a href="http://www.aplus-app.com">A+</a> that give you your feeds on the left and browser on the right. Click on any twitter message the web page they linked to shoes up in your browser window automatically. <span> </span>Check it out at http://www.aplus-app.com</p>
</div>]]></description>
      
      <content:encoded><![CDATA[<p class="MsoNormal">This week on CyberSpeak, a listener alerted me to my faux pas with the names on the Casey Anthony case, the two that testified about computer forensics were Sandy and Kevin (not Steve) and of all things, I called the Bresident of Access Data Brian Carrier instead of Brian Karney. Sorry guys!</p> <p class="MsoNormal">This weeks interview of Josh Goldfoot, an attorney and author of the recent paper titled ”<a href="http://www.bjcl.org/current/16_1/3_Goldfoot_draft1.pdf">The Physical Computer and the Fourth Amendment</a>” published in the Berkley Journal of Criminal Law. This paper discusses how the forth amendment applies to computer forensics and how we may be hurting ourselves by using certain words and explanations.</p> <p class="MsoNormal">Web site of the week is a neat little web browsing and twitter application called <a href="http://www.aplus-app.com">A+</a> that give you your feeds on the left and browser on the right. Click on any twitter message the web page they linked to shoes up in your browser window automatically. Check it out at http://www.aplus-app.com</p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-135-2011-06-25.mp3?dest-id=11283" length="34117336" type="audio/mpeg" />
      <itunes:duration>47:23</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak June 20 2011</title>
      <itunes:title>CyberSpeak June 20 2011</itunes:title>
      <pubDate>Sun, 19 Jun 2011 21:42:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[f65d9c3300a28d075656479ed0fb0372]]></guid>
      <link><![CDATA[https://cyberspeak.libsyn.com/cyber-speak-june-20-2011]]></link>
      <description><![CDATA[<p style="text-align: left;"><span style="font-size: small; color: #000000;">This week (OK, this quarter) on CyberSpeak, FTK 4 coming out using Postgres database rather than Oracle. During listener email we discuss if special language is needed for search warrants when collecting volatile data, imaging RAM or conducting on scene triage. Imaging SSD drives using the <a href="http://winfe.wordpress.com" target="_blank"><span style="color: #000000;">WinFE boot disk solution </span></a>(</span></p>
<p style="text-align: left;"></p>
<p style="text-align: left;"><span style="font-size: small; color: #000000;"><a href="http://winfe.wordpress.com/"><span style="color: #000000;"><span style="text-decoration: underline;"><span style="color: #0000ff;" color="#0000ff" size="3"><span style="color: #0000ff;" color="#0000ff" size="3"><span lang="">http://winfe.wordpress.com</span></span></span></span><span style="color: #0000ff;" color="#0000ff" size="3"><span style="color: #0000ff;" color="#0000ff" size="3"></span></span></span></a><span size="3"><span lang="">) and a shout out to Sandy and Steve for their great testimony in the Casey Anthony trial. Check it out at</span></span><span size="3"><span lang=""> on <a href="http://www.wftv.com/caseyanthony/28083402/detail.html" target="_blank"><span style="color: #000000;">Day 24 segment 4-6</span></a>.</span></span></span></p>
<p style="text-align: left;"></p>
<p style="text-align: left;"></p>
<p><span style="font-size: small; color: #000000;">In the news, A <a href="http://latimesblogs.latimes.com/lanow/2011/06/computer-repairman-arrested-for-allegedly-taking-hundreds-of-nude-pictures-of-women-remotely.html" target="_blank"><span style="color: #000000;">computer repairman was arrested for allegedly planting spyware on dozens of computers </span></a>he fixed and remotely taking hundreds of photos of women in their homes partially clothed or naked. If you see the message "You should fix your internal sensor soon. If unsure what to do, try putting your laptop near hot steam for several minutes to clean the sensor." DONT take your laptop into the shower. Check it out at</span></p>
<p style="text-align: left;"></p>
<p style="text-align: left;"></p>
<p style="text-align: left;"><span style="font-size: small; color: #000000;"><a href="http://latimesblogs.latimes.com/lanow/2011/06/computer-repairman-arrested-for-allegedly-taking-hundreds-of-nude-pictures-of-women-remotely.html"><span style="color: #000000;"><span style="text-decoration: underline;"><span style="color: #0000ff;" color="#0000ff" size="3"><span style="color: #0000ff;" color="#0000ff" size="3"><span lang="">http://latimesblogs.latimes.com/lanow/2011/06/computer-repairman-arrested-for-allegedly-taking-hundreds-of-nude-pictures-of-women-remotely.html</span></span></span></span><span style="color: #0000ff;" color="#0000ff" size="3"><span style="color: #0000ff;" color="#0000ff" size="3"></span></span></span></a></span></p>
<p style="text-align: left;"></p>
<p style="text-align: left;"></p>
<p><span style="font-size: small; color: #000000;">I got fooled into readng an article because of a Miss-leading article about Seals using forensic tools on Osama Bin Ladin's compters.</span></p>
<p style="text-align: left;"></p>
<p style="text-align: left;"></p>
<p style="text-align: left;"><span style="font-size: small; color: #000000;"><a href="http://www.1105newsletters.com/t.do?id=7979845:3405472"><span style="color: #000000;"><span style="text-decoration: underline;"><span style="color: #0000ff;" color="#0000ff" size="3"><span style="color: #0000ff;" color="#0000ff" size="3"><span lang="">http://www.1105newsletters.com/t.do?id=7979845:3405472</span></span></span></span><span style="color: #0000ff;" color="#0000ff" size="3"><span style="color: #0000ff;" color="#0000ff" size="3"></span></span></span></a></span></p>
<p style="text-align: left;"></p>
<p style="text-align: left;"></p>
<p><span style="font-size: small; color: #000000;">Interview this week is with Mike and Mike about Carbon Black.</span></p>
<p style="text-align: left;"></p>
<p><span style="font-size: small; color: #000000;">An absolutly MUST read article "<a href="http://www.bjcl.org/current/16_1/3_Goldfoot_draft1.pdf" target="_blank"><span style="color: #000000;">The Physical Computer and the Fourth Amendment</span></a>" by <a href="http://nextdigitaldecade.com/authors#Goldfoot" target="_blank"><span style="color: #000000;">Josh Goldfoot</span></a>. Awesome document that is Brilliantly referenced. It is a long read but a MUST read. We will discuss next week. Read up before next podcast (who thought you would get Home Work from CyberSpeak?).</span></p>
<p style="text-align: left;"></p>
<p></p>
<p style="text-align: left;"></p>
<p><span style="font-size: small; color: #000000;">Website of the week:</span></p>
<p style="text-align: left;"><span style="font-size: small; color: #000000;"><span size="3"></span><span size="3"><span lang="">Steve Gibson’s <a href="https://www.grc.com/haystack.htm" target="_blank"><span style="color: #000000;">password checker </span></a>– how long would it take to crack your password and the best HTML5 webpage I have seen. Check out this personalized music video staring any address you tell it to. </span></span><a href="http://thewildernessdowntown.com/"><span style="color: #000000;"><span style="text-decoration: underline;"><span style="color: #0000ff;" color="#0000ff" size="3"><span style="color: #0000ff;" color="#0000ff" size="3"><span lang="">http://TheWildernessDowntown.com</span></span></span></span><span style="color: #0000ff;" color="#0000ff" size="3"><span style="color: #0000ff;" color="#0000ff" size="3"></span></span></span></a></span></p>
<p style="text-align: left;"></p>
<p><span style="font-size: small; color: #000000;">I will be teaching another SANS <a href="http://www.sans.org/vlive/details.php?nid=25009" target="_blank"><span style="color: #000000;">408 Forensics-Windows in Depth VLIVE</span></a> course starting Tuesday August 23rd (Every Tuesday and Thursday Night for 3 hours a night)</span></p>
<p style="text-align: left;"></p>
<p><span style="font-size: small; color: #000000;">DONT FORGET TO USE OUR DISCOUNT CODE OF<b> COINS-OC </b>for 10% off.</span></p>
<p style="text-align: left;"></p>
<p><span style="font-size: small; color: #000000;">But wait, sign up before this week, before June 22, you can get a 16 gig iPad2. The codes are <b>0526_iPad2BLK</b> (for a black iPad) or <b>0526_iPad2WHT</b> (for white)</span></p>
<p style="text-align: left;"></p>]]></description>
      
      <content:encoded><![CDATA[<p style="text-align: left;">This week (OK, this quarter) on CyberSpeak, FTK 4 coming out using Postgres database rather than Oracle. During listener email we discuss if special language is needed for search warrants when collecting volatile data, imaging RAM or conducting on scene triage. Imaging SSD drives using the <a href="http://winfe.wordpress.com" target="_blank">WinFE boot disk solution </a>(</p> <p style="text-align: left;"></p> <p style="text-align: left;"><a href="http://winfe.wordpress.com/">http://winfe.wordpress.com</a>) and a shout out to Sandy and Steve for their great testimony in the Casey Anthony trial. Check it out at on <a href="http://www.wftv.com/caseyanthony/28083402/detail.html" target="_blank">Day 24 segment 4-6</a>.</p> <p style="text-align: left;"></p> <p style="text-align: left;"></p> <p>In the news, A <a href="http://latimesblogs.latimes.com/lanow/2011/06/computer-repairman-arrested-for-allegedly-taking-hundreds-of-nude-pictures-of-women-remotely.html" target="_blank">computer repairman was arrested for allegedly planting spyware on dozens of computers </a>he fixed and remotely taking hundreds of photos of women in their homes partially clothed or naked. If you see the message "You should fix your internal sensor soon. If unsure what to do, try putting your laptop near hot steam for several minutes to clean the sensor." DONT take your laptop into the shower. Check it out at</p> <p style="text-align: left;"></p> <p style="text-align: left;"></p> <p style="text-align: left;"><a href="http://latimesblogs.latimes.com/lanow/2011/06/computer-repairman-arrested-for-allegedly-taking-hundreds-of-nude-pictures-of-women-remotely.html">http://latimesblogs.latimes.com/lanow/2011/06/computer-repairman-arrested-for-allegedly-taking-hundreds-of-nude-pictures-of-women-remotely.html</a></p> <p style="text-align: left;"></p> <p style="text-align: left;"></p> <p>I got fooled into readng an article because of a Miss-leading article about Seals using forensic tools on Osama Bin Ladin's compters.</p> <p style="text-align: left;"></p> <p style="text-align: left;"></p> <p style="text-align: left;"><a href="http://www.1105newsletters.com/t.do?id=7979845:3405472">http://www.1105newsletters.com/t.do?id=7979845:3405472</a></p> <p style="text-align: left;"></p> <p style="text-align: left;"></p> <p>Interview this week is with Mike and Mike about Carbon Black.</p> <p style="text-align: left;"></p> <p>An absolutly MUST read article "<a href="http://www.bjcl.org/current/16_1/3_Goldfoot_draft1.pdf" target="_blank">The Physical Computer and the Fourth Amendment</a>" by <a href="http://nextdigitaldecade.com/authors#Goldfoot" target="_blank">Josh Goldfoot</a>. Awesome document that is Brilliantly referenced. It is a long read but a MUST read. We will discuss next week. Read up before next podcast (who thought you would get Home Work from CyberSpeak?).</p> <p style="text-align: left;"></p> <p></p> <p style="text-align: left;"></p> <p>Website of the week:</p> <p style="text-align: left;">Steve Gibson’s <a href="https://www.grc.com/haystack.htm" target="_blank">password checker </a>– how long would it take to crack your password and the best HTML5 webpage I have seen. Check out this personalized music video staring any address you tell it to. <a href="http://thewildernessdowntown.com/">http://TheWildernessDowntown.com</a></p> <p style="text-align: left;"></p> <p>I will be teaching another SANS <a href="http://www.sans.org/vlive/details.php?nid=25009" target="_blank">408 Forensics-Windows in Depth VLIVE</a> course starting Tuesday August 23rd (Every Tuesday and Thursday Night for 3 hours a night)</p> <p style="text-align: left;"></p> <p>DONT FORGET TO USE OUR DISCOUNT CODE OF<b> COINS-OC </b>for 10% off.</p> <p style="text-align: left;"></p> <p>But wait, sign up before this week, before June 22, you can get a 16 gig iPad2. The codes are <b>0526_iPad2BLK</b> (for a black iPad) or <b>0526_iPad2WHT</b> (for white)</p> <p style="text-align: left;"></p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-134-2011-06-19.mp3?dest-id=11283" length="26599087" type="audio/mpeg" />
      <itunes:duration>36:57</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak April 5, 2011 Watch out, Here Comes the Garbage Collector</title>
      <itunes:title>CyberSpeak April 5, 2011 Watch out, Here Comes the Garbage Collector</itunes:title>
      <pubDate>Tue, 05 Apr 2011 21:54:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[3eff32cb26f21f44fd3d84616a7292ae]]></guid>
      <link><![CDATA[https://cyberspeak.libsyn.com/cyber-speak-april-5-2011-solid-state-drive-forensics]]></link>
      <description><![CDATA[<p><span style="font-size: small;">Interview with Scott Moulton, leading forensic authority on Solid State Drive Forensics</span></p>]]></description>
      
      <content:encoded><![CDATA[<p>Interview with Scott Moulton, leading forensic authority on Solid State Drive Forensics</p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-133-2011-04-04.mp3?dest-id=11283" length="46808458" type="audio/mpeg" />
      <itunes:duration>01:05:01</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Jan 16, 2011 - Prefetch Yourself</title>
      <itunes:title>CyberSpeak Jan 16, 2011 - Prefetch Yourself</itunes:title>
      <pubDate>Sun, 16 Jan 2011 15:16:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[cfc244720f4cabc93d61fda3ca3221b9]]></guid>
      <link><![CDATA[https://cyberspeak.libsyn.com/cyber-speak-jan-16-2011-prefetch-yourself]]></link>
      <description><![CDATA[<p><span style="font-size: large;"><strong><span style="font-weight: normal; font-size: small;">FREE 16Gig IPADs for everyone!!! </span></strong></span><span style="mso-bidi-font-size: 13.0pt; mso-bidi-font-family: Verdana; color: black;">Have I got a deal for you.  Have you experienced a feeling of inadequacy?  Feel like you're not in the "In Crowd"?  When sitting at a Starbucks, on the metro or just lounging around the house, do you feel like you could be so much more productive but something's missing.  Don't despair, SANS is coming to the rescue.  That's right, book your SANS 408, 414, 560 Class or ANY 4-5-or 6 Day course offered via ONDEMAND n</span><span style="mso-bidi-font-size: 13.0pt; mso-bidi-font-family: Arial; color: black;">ow through February 2, and receive a FREE 16GB WiFi enabled iPad(TM). I am teaching SANS FOR408: Computer Forensic Essentials vLive! course starts March 1 and meets Tue/Thu evenings <a href="http://www.sans.org/info/66203"><span style="color: black;">http://www.</span><span style="text-decoration: underline;"><span style="color: black; text-underline: none; text-decoration: none;">sans</span></span><span style="color: black;">.org/info/66203</span></a>. </span></p>
<!--StartFragment-->
<p class="MsoNormal" style="mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;"><span style="mso-bidi-font-size: 16.0pt; mso-bidi-font-family: Verdana; color: black;">So what do you call yourself?  </span><span style="mso-bidi-font-family: Verdana; color: black;"></span></p>
<p class="MsoNormal" style="mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;"><span style="mso-bidi-font-size: 16.0pt; mso-bidi-font-family: Verdana; color: black;">A computer/Digital Evidence forensic technician</span><span style="mso-bidi-font-family: Verdana; color: black;"></span></p>
<p class="MsoNormal" style="mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;"><span style="mso-bidi-font-size: 16.0pt; mso-bidi-font-family: Verdana; color: black;">A computer/Digital Evidence forensic examiner</span><span style="mso-bidi-font-family: Verdana; color: black;"></span></p>
<p class="MsoNormal" style="mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;"><span style="mso-bidi-font-size: 16.0pt; mso-bidi-font-family: Verdana; color: black;">A computer/Digital Evidence forensic analyst</span><span style="mso-bidi-font-family: Verdana; color: black;"></span></p>
<p class="MsoNormal" style="mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;"><span style="mso-bidi-font-size: 16.0pt; mso-bidi-font-family: Verdana; color: black;">A computer/Digital Evidence forensic expert</span><span style="mso-bidi-font-family: Verdana; color: black;"></span></p>
<p class="MsoNormal" style="mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;"><span style="mso-bidi-font-size: 16.0pt; mso-bidi-font-family: Verdana; color: black;">We need to define these terms.</span><span style="mso-bidi-font-family: Verdana; color: black;"></span></p>
<p class="MsoNormal" style="mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;">Paraben has released a new version of P2 Commander. Version 1.7 now supports Mac file format as well as vmWare and VirtualPC images. Users will notice an increase in the speed of processing evidence in v1.7. visit www.paraben.com</p>
<p class="MsoNormal" style="mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;"><span style="mso-bidi-font-size: 24.0pt; mso-bidi-font-family: Arial; color: black;">Mark Wade is a Digital Forensic Analyst with Harris Corporation (Crucial Security Programs), performing digital forensics for a Federal Law Enforcement agency as a government contractor.</span><span style="mso-bidi-font-size: 16.0pt; mso-bidi-font-family: Verdana; color: black;"></span></p>
<p class="MsoNormal" style="margin-bottom: 12.0pt; mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;"><span style="mso-bidi-font-size: 16.0pt; mso-bidi-font-family: Verdana; color: black; mso-bidi-font-weight: bold;">permits law enforcement officers, approximately 90 minutes after lawfully arresting a suspect and transporting him to a detention facility, to conduct a warrantless search of the text message folder of a cell phone they take from his person after the arrest. </span><span style="mso-bidi-font-size: 18.0pt; mso-bidi-font-family: Verdana; color: black; mso-bidi-font-weight: bold;">http://www.courtinfo.ca.gov/opinions/documents/S166600.PDF</span><span style="mso-bidi-font-family: Verdana; color: black;"></span></p>
<p class="MsoNormal"><span style="mso-bidi-font-size: 16.0pt; mso-bidi-font-family: Helvetica; color: black;">Web site of the week is www.passpack.com  - Free Online password manager for groups</span><span style="color: black;"></span></p>
<!--EndFragment-->
<p>
<p style="background-color: transparent; background-image: initial; border-color: initial; border-style: initial; font-size: 14px; vertical-align: baseline; font-family: Verdana; margin: 0px;"> </p>
</p>]]></description>
      
      <content:encoded><![CDATA[<p>FREE 16Gig IPADs for everyone!!! Have I got a deal for you. Have you experienced a feeling of inadequacy? Feel like you're not in the "In Crowd"? When sitting at a Starbucks, on the metro or just lounging around the house, do you feel like you could be so much more productive but something's missing. Don't despair, SANS is coming to the rescue. That's right, book your SANS 408, 414, 560 Class or ANY 4-5-or 6 Day course offered via ONDEMAND now through February 2, and receive a FREE 16GB WiFi enabled iPad(TM). I am teaching SANS FOR408: Computer Forensic Essentials vLive! course starts March 1 and meets Tue/Thu evenings <a href="http://www.sans.org/info/66203">http://www.sans.org/info/66203</a>. </p> <p class="MsoNormal" style="mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;">So what do you call yourself? </p> <p class="MsoNormal" style="mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;">A computer/Digital Evidence forensic technician</p> <p class="MsoNormal" style="mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;">A computer/Digital Evidence forensic examiner</p> <p class="MsoNormal" style="mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;">A computer/Digital Evidence forensic analyst</p> <p class="MsoNormal" style="mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;">A computer/Digital Evidence forensic expert</p> <p class="MsoNormal" style="mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;">We need to define these terms.</p> <p class="MsoNormal" style="mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;">Paraben has released a new version of P2 Commander. Version 1.7 now supports Mac file format as well as vmWare and VirtualPC images. Users will notice an increase in the speed of processing evidence in v1.7. visit www.paraben.com</p> <p class="MsoNormal" style="mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;">Mark Wade is a Digital Forensic Analyst with Harris Corporation (Crucial Security Programs), performing digital forensics for a Federal Law Enforcement agency as a government contractor.</p> <p class="MsoNormal" style="margin-bottom: 12.0pt; mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;">permits law enforcement officers, approximately 90 minutes after lawfully arresting a suspect and transporting him to a detention facility, to conduct a warrantless search of the text message folder of a cell phone they take from his person after the arrest. http://www.courtinfo.ca.gov/opinions/documents/S166600.PDF</p> <p class="MsoNormal">Web site of the week is www.passpack.com - Free Online password manager for groups</p> <p> <p style="background-color: transparent; background-image: initial; border-color: initial; border-style: initial; font-size: 14px; vertical-align: baseline; font-family: Verdana; margin: 0px;"> </p> </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-132-2011-01-15.mp3?dest-id=11283" length="26972742" type="audio/mpeg" />
      <itunes:duration>37:27</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak November 16, 2010</title>
      <itunes:title>CyberSpeak November 16, 2010</itunes:title>
      <pubDate>Tue, 16 Nov 2010 04:04:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[5c5e967ccfe361210f0d960a77162668]]></guid>
      <link><![CDATA[https://cyberspeak.libsyn.com/cyber-speak-november-16-2010]]></link>
      <description><![CDATA[<p>Last show for two weeks. I'm traveling to Bangkok and Singapore.  See you in 2 weeks. Send me Email.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Last show for two weeks. I'm traveling to Bangkok and Singapore. See you in 2 weeks. Send me Email.</p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-131-2010-11-15.mp3?dest-id=11283" length="31377927" type="audio/mpeg" />
      <itunes:duration>43:34</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/2/8/3/6/2836f16ac8879ae5/AlbumArtSmall.jpg" />
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak November 8, 2010</title>
      <itunes:title>CyberSpeak November 8, 2010</itunes:title>
      <pubDate>Sun, 07 Nov 2010 18:25:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[10e0961f6f73151ef90017e272c463a3]]></guid>
      <link><![CDATA[https://cyberspeak.libsyn.com/cyber-speak-november-8-2010]]></link>
      <description><![CDATA[<p><!--StartFragment--></p>
<p class="MsoNormal" style="mso-pagination: none; tab-stops: 28.0pt 56.0pt 84.0pt 112.0pt 140.0pt 168.0pt 196.0pt 224.0pt 3.5in 280.0pt 308.0pt 336.0pt; mso-layout-grid-align: none; text-autospace: none;"><span style="font-size: medium;"><span style="font-family: Optima; mso-bidi-font-family: Verdana;">This week we have interview with Kristinn Gudjonsson, developer of Log2TimeLine.  Kristinn gives us an update on what is on the road ahead for Log2TimeLine.  In Listener Email </span><span style="mso-bidi-font-size: 10.0pt; font-family: Optima; mso-bidi-font-family: Monaco;">Joe from Northeast Wisconsin Technical College wrote in to say that blanking the password or even cracking the password is possible without the LiveView LE version.  Luby Wrote in to tell how much he enjoyed SANS 508 and learning about SuperTimelines. Luby also explains how open wireless access points can eliminate the threat of Firesheep. We also give Luby a “special ringtone” for his wife’s phone.<span style="mso-spacerun: yes;">  </span>In News we talk about an iPhone bug and an <a href="http://online.wsj.com/article/SB10001424052748703506904575592782874885808.html#ixzz14YGfA8VT" target="_blank">vulnerability to PayPal’s ap</a>p that could cost you money. <span style="mso-spacerun: yes;"> </span>In Legal News, 2 cases send criminals to jail. Tech Topics cover Windows LNK files and the Web Site of the Week is a <a href="http://www.qwiki.com" target="_blank">Qwiki</a></span></span><span style="font-family: Optima; mso-bidi-font-family: Verdana;"> </span></p>
<!--EndFragment-->
<p> </p>]]></description>
      
      <content:encoded><![CDATA[<p></p> <p class="MsoNormal" style="mso-pagination: none; tab-stops: 28.0pt 56.0pt 84.0pt 112.0pt 140.0pt 168.0pt 196.0pt 224.0pt 3.5in 280.0pt 308.0pt 336.0pt; mso-layout-grid-align: none; text-autospace: none;">This week we have interview with Kristinn Gudjonsson, developer of Log2TimeLine. Kristinn gives us an update on what is on the road ahead for Log2TimeLine. In Listener Email Joe from Northeast Wisconsin Technical College wrote in to say that blanking the password or even cracking the password is possible without the LiveView LE version. Luby Wrote in to tell how much he enjoyed SANS 508 and learning about SuperTimelines. Luby also explains how open wireless access points can eliminate the threat of Firesheep. We also give Luby a “special ringtone” for his wife’s phone. In News we talk about an iPhone bug and an <a href="http://online.wsj.com/article/SB10001424052748703506904575592782874885808.html#ixzz14YGfA8VT" target="_blank">vulnerability to PayPal’s ap</a>p that could cost you money. In Legal News, 2 cases send criminals to jail. Tech Topics cover Windows LNK files and the Web Site of the Week is a <a href="http://www.qwiki.com" target="_blank">Qwiki</a> </p> <p> </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-130-2010-11-06.mp3?dest-id=11283" length="27106907" type="audio/mpeg" />
      <itunes:duration>37:38</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/9/f/7/8/9f7855fedacaad9a/AF_CyberSpeak.png" />
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak November 1, 2010</title>
      <itunes:title>CyberSpeak November 1, 2010</itunes:title>
      <pubDate>Sun, 31 Oct 2010 23:19:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[7a38ec78222fead932f491ddcae10854]]></guid>
      <link><![CDATA[https://cyberspeak.libsyn.com/cyber-speak-november-1-2010http-adfsolutions-com-]]></link>
      <description><![CDATA[<p>This week on CyberSpeak we have listener email, an interview with <a href="http://www.linkedin.com/profile/view?id=315459&authType=NAME_SEARCH&authToken=AbTF&locale=en_US&srchid=4bc40a94-3723-4049-b575-b84517ab5eed-0&srchindex=1&srchtotal=3&pvs=ps&pohelp=&goback=%2Efps_*1_Raphael_Bousquet_*1_*1_*1_*1_*51_*1_Y_*1_*1_*1_false_1_R_true_CC%2CN%2CI%2CG%2CPC%2CED%2CL%2CFG%2CTE%2CFA%2CSE%2CP%2CCS%2CF%2CDR_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2" target="_blank">Raphael Bousquet</a>, CTO and Co-Founder of <a href="http://adfsolutions.com/" target="_blank">ADF Solutions</a> , Web site of the week is a real productivity app called <a href="http://www.rescuetime.com/" target="_blank">Rescuetime</a>.  P.S.  Sorry for the slight audio problem, I accidentally turned up my gain knob on my mixer.  George did his usual magic to fix it. One, last thing, Rob lee and SANS provided a 50% discount code for LOCAL LAW ENFORCEMENT ONLY, good on any SANS training class.  Listen to the show for the code....and no, they do verify so ONLY Local LE can use it. </p>]]></description>
      
      <content:encoded><![CDATA[<p>This week on CyberSpeak we have listener email, an interview with <a href="http://www.linkedin.com/profile/view?id=315459&authType=NAME_SEARCH&authToken=AbTF&locale=en_US&srchid=4bc40a94-3723-4049-b575-b84517ab5eed-0&srchindex=1&srchtotal=3&pvs=ps&pohelp=&goback=%2Efps_*1_Raphael_Bousquet_*1_*1_*1_*1_*51_*1_Y_*1_*1_*1_false_1_R_true_CC%2CN%2CI%2CG%2CPC%2CED%2CL%2CFG%2CTE%2CFA%2CSE%2CP%2CCS%2CF%2CDR_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2" target="_blank">Raphael Bousquet</a>, CTO and Co-Founder of <a href="http://adfsolutions.com/" target="_blank">ADF Solutions</a> , Web site of the week is a real productivity app called <a href="http://www.rescuetime.com/" target="_blank">Rescuetime</a>. P.S. Sorry for the slight audio problem, I accidentally turned up my gain knob on my mixer. George did his usual magic to fix it. One, last thing, Rob lee and SANS provided a 50% discount code for LOCAL LAW ENFORCEMENT ONLY, good on any SANS training class. Listen to the show for the code....and no, they do verify so ONLY Local LE can use it. </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-2010-10-31.mp3?dest-id=11283" length="33746502" type="audio/mpeg" />
      <itunes:duration>46:52</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/1/4/e/f/14efff49c36602d6/Folder.jpg" />
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak October 25, 2010</title>
      <itunes:title>CyberSpeak October 25, 2010</itunes:title>
      <pubDate>Sun, 24 Oct 2010 21:37:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[1e19a8f181e1aac5cb534a9690f52432]]></guid>
      <link><![CDATA[https://cyberspeak.libsyn.com/cyber-speak-october-25-2010]]></link>
      <description><![CDATA[<p>This week on CyberSpeak, I discuss the leak of another 400,000 classified military documents by Wikileaks. I also discuss listener email where we have comments about Mount Image Pro's Virtual Forensic Computer (VCF) and what it does that FTK Imager and Live View do not do.  This weeks interview is with Sean Morrisey, the Managing Director of <a href="http://www.katanaforensics.com" target="_blank">Katana Forensics</a>, maker of the iPhone Forensic Software called Katana.  Also discuss Katana's new Hammerhead program to monitor blackberry phones.  Also, this week I briefly discuss the forensic implications of the new Mac Book Airs.  I also talk about Eddie Sheehy's article on DFI News web site titled <a href="http://www.dfinews.com/article/5-ways-increase-efficiency-digital-forensic-investigations?page=0,1" target="_blank">5 Ways to Increase Efficiency of Digital Forensics</a> .  I also give out a 50% discount code to SANS training classes. My web pick of the week is <a href="http://www.teamviewer.com" target="_blank">Team Viewer</a>.  This is a web site that will help you control computers across the network when you are helping friends or giving presentations.  </p>]]></description>
      
      <content:encoded><![CDATA[<p>This week on CyberSpeak, I discuss the leak of another 400,000 classified military documents by Wikileaks. I also discuss listener email where we have comments about Mount Image Pro's Virtual Forensic Computer (VCF) and what it does that FTK Imager and Live View do not do. This weeks interview is with Sean Morrisey, the Managing Director of <a href="http://www.katanaforensics.com" target="_blank">Katana Forensics</a>, maker of the iPhone Forensic Software called Katana. Also discuss Katana's new Hammerhead program to monitor blackberry phones. Also, this week I briefly discuss the forensic implications of the new Mac Book Airs. I also talk about Eddie Sheehy's article on DFI News web site titled <a href="http://www.dfinews.com/article/5-ways-increase-efficiency-digital-forensic-investigations?page=0,1" target="_blank">5 Ways to Increase Efficiency of Digital Forensics</a> . I also give out a 50% discount code to SANS training classes. My web pick of the week is <a href="http://www.teamviewer.com" target="_blank">Team Viewer</a>. This is a web site that will help you control computers across the network when you are helping friends or giving presentations. </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-128-2010-10-23.mp3?dest-id=11283" length="25489092" type="audio/mpeg" />
      <itunes:duration>35:24</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/a/f/e/b/afeb65a8eb7c350f/Folder.jpg" />
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Oct 18, 2010</title>
      <itunes:title>CyberSpeak Oct 18, 2010</itunes:title>
      <pubDate>Sun, 17 Oct 2010 09:30:27 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[cf74cf9c48b55c176470627caf1299dd]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/d87Nq8p2zoU/cyber-speak-oct-18-2010]]></link>
      <description><![CDATA[<p>Hey Gang, we are back.  Thank you for your patience.  Bret and I have both been traveling so much and been so busy but we are back and it feels good.  Now, fire up those email clients and send us emails about what you want to hear about, who you want interviewed and what technology you want to know more about.  We live off YOUR emails so what are you waiting for. </p>
                <p>This week, I discuss Access Data's two new products.  Web sites of the week include www.pipl.com and www.peekyou.com.  Check them out if you are looking for info on someone. </p>]]></description>
      
      <content:encoded><![CDATA[<p>Hey Gang, we are back. Thank you for your patience. Bret and I have both been traveling so much and been so busy but we are back and it feels good. Now, fire up those email clients and send us emails about what you want to hear about, who you want interviewed and what technology you want to know more about. We live off YOUR emails so what are you waiting for. </p> <p>This week, I discuss Access Data's two new products. Web sites of the week include www.pipl.com and www.peekyou.com. Check them out if you are looking for info on someone. </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-127-2010-10-16.mp3?dest-id=11283" length="35843926" type="audio/mpeg" />
      <itunes:duration>49:46</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak May 24 2010</title>
      <itunes:title>CyberSpeak May 24 2010</itunes:title>
      <pubDate>Sun, 23 May 2010 09:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[0d65ece0135b8b5cd82d799e7632f55b]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/SClg6jeTzEc/cyber_speak_may_24_2010]]></link>
      <description><![CDATA[PURCHASERS OF THE CYBERSPEAK IPHONE APP - CHECK OUT THE EXTRAS BUTTON FOR SPECIAL BONUS CONTENT THIS WEEK!!!  LET ME KNOW WHAT YOU THINK.<div>This week on CyberSpeak we interview Sam Guttman, President of the <a href="http://www.ncfs.org/dfcb">Digital Forensics Certification Board</a>, an international vendor neutral computer forensic certification authority.  We also discuss listener email, cell phone spyware, upcoming <a href="http://www.sans.org/forensics-incident-response-summit-2010/?utm_source=web&utm_medium=text-ad&utm_content=FE_Links_Homepage_forensics_summit_2010_fe&utm_campaign=_SANS_What_Works_in_Forensics_and_Incident_Response_Summit_2010&ref=55879">SANS Forensic Summit</a>, <a href="http://www.sans.org/sansfire-2010/">SANS Fire in Baltimore</a> and a listener taught <a href="http://www.sans.org/info/58893">SANS CISSP course</a>.  Don'f forget to user your CyberSpeak DISCOUNT CODE of "COINS-OC" for 10% off any SANS course.<div><br></div><div>We also start a dialog on the future of expectation of privacy in this world of social networking where everyone is telling everyone where they are, what they are doing, etc. Is this going to change privacy laws.  Also, what are YOU doing about identifying "Cloud" evidence during an investigation.  Web sites of the week: <a href="http://www.YourOpenBook.org">YourOpenBook.org</a> and <a href="http://www.TweetCalories.com">TweetCalories.com</a></div></div>]]></description>
      
      <content:encoded><![CDATA[PURCHASERS OF THE CYBERSPEAK IPHONE APP - CHECK OUT THE EXTRAS BUTTON FOR SPECIAL BONUS CONTENT THIS WEEK!!! LET ME KNOW WHAT YOU THINK.This week on CyberSpeak we interview Sam Guttman, President of the <a href="http://www.ncfs.org/dfcb">Digital Forensics Certification Board</a>, an international vendor neutral computer forensic certification authority. We also discuss listener email, cell phone spyware, upcoming <a href="http://www.sans.org/forensics-incident-response-summit-2010/?utm_source=web&utm_medium=text-ad&utm_content=FE_Links_Homepage_forensics_summit_2010_fe&utm_campaign=_SANS_What_Works_in_Forensics_and_Incident_Response_Summit_2010&ref=55879">SANS Forensic Summit</a>, <a href="http://www.sans.org/sansfire-2010/">SANS Fire in Baltimore</a> and a listener taught <a href="http://www.sans.org/info/58893">SANS CISSP course</a>. Don'f forget to user your CyberSpeak DISCOUNT CODE of "COINS-OC" for 10% off any SANS course.We also start a dialog on the future of expectation of privacy in this world of social networking where everyone is telling everyone where they are, what they are doing, etc. Is this going to change privacy laws. Also, what are YOU doing about identifying "Cloud" evidence during an investigation. Web sites of the week: <a href="http://www.YourOpenBook.org">YourOpenBook.org</a> and <a href="http://www.TweetCalories.com">TweetCalories.com</a>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-126-2010-05-24.mp3?dest-id=11283" length="30136902" type="audio/mpeg" />
      <itunes:duration>41:51</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak April 19 2010</title>
      <itunes:title>CyberSpeak April 19 2010</itunes:title>
      <pubDate>Mon, 19 Apr 2010 01:26:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[daa46fbe321e8bd37270a082ee8a57a8]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/hwDxtJi-C-I/cyber_speak_april_19_2010]]></link>
      <description><![CDATA[In this weeks show we have an i<span style="font-family: arial, sans-serif; ">nterview with NICK FERNEAU, developer of Skypx, a free utility that recovers Skype artifacts from RAM images, a discussion about the possibility of a surgical imaging rather than whole disk imaging, <span style="font-family: Arial, sans-serif; line-height: 22px; ">British spies have reportedly discovered FEMALE
                suicide bombers are being fitted with exploding breast implants and Reintoxication.  Web Sites of the week have an email tracking theme with www.readnotify.com; www.bigstring.com; www.spypig.com and www.spokeo.com</span><!--StartFragment--><p class="MsoNormal" style="line-height:17.0pt;mso-pagination:none;mso-layout-grid-align:
                none;text-autospace:none"><b><span style="font-size:17.0pt;font-family:Arial;
                mso-bidi-font-family:Arial"><o:p></o:p></span></b></p>
                <!--EndFragment-->
                </span>]]></description>
      
      <content:encoded><![CDATA[In this weeks show we have an interview with NICK FERNEAU, developer of Skypx, a free utility that recovers Skype artifacts from RAM images, a discussion about the possibility of a surgical imaging rather than whole disk imaging, British spies have reportedly discovered FEMALE suicide bombers are being fitted with exploding breast implants and Reintoxication. Web Sites of the week have an email tracking theme with www.readnotify.com; www.bigstring.com; www.spypig.com and www.spokeo.com<p class="MsoNormal" style="line-height:17.0pt;mso-pagination:none;mso-layout-grid-align: none;text-autospace:none"><b></b></p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-2010-04-19.mp3?dest-id=11283" length="40299266" type="audio/mpeg" />
      <itunes:duration>55:58</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak April 4, 2010</title>
      <itunes:title>CyberSpeak April 4, 2010</itunes:title>
      <pubDate>Sun, 04 Apr 2010 15:46:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[2f6d948d5f5be63149d7ce6e29522119]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/fvIEXpPnDr8/cyber_speak_april_4_2010]]></link>
      <description><![CDATA[<span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px;"><b><font size="4"><font size="3">Listener Email</font><br></font></b> - Thanks to all for the great feedback on the Internet Predator Tracker interview. Also, Timothy, who clearly does not know us because he started his email "Hello GENTLEMEN".  Just kidding, keep the emails coming.<br><br><font size="3"><b>News and Commentary</b></font><font color="#0000ff" face="'Comic Sans MS', sans-serif"><span style="font-size: medium; text-decoration: underline;"><br></span></font>Aaron sent us an interesting link to an <span style="font-family: 'Comic Sans MS',sans-serif; font-size: medium; color: rgb(0, 0, 255);"><span style="text-decoration: underline;">article from the Times Argus</span></span> discussing forensics and the backlog.</span><div><span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px;">Bret and I discuss a really interesting <a href="http://scc.lexum.umontreal.ca/en/2010/2010scc8/2010scc8.html">ruling from the Canadian courts</a> on computer forensics.  This is a long read but some very interesting reading. Check it out <a href="http://scc.lexum.umontreal.ca/en/2010/2010scc8/2010scc8.html">here.</a></span></div><div><span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px;"><a href="http://scc.lexum.umontreal.ca/en/2010/2010scc8/2010scc8.html"></a><br><b><font size="3">Exclusive Interview</font></b><br><span style="font-size: small;">Today we have an interview with </span><span style="font-family: arial,sans-serif;"><span style="font-size: small;">Kristtinn G who works for a company called Skigner in ICELAND and in Kristinn in collaboration with Rob Lee, or friend from SANS and former OSI colleague created a wonderful new tool called Log2Timeline.  You don't want to miss that interview because if you are not using Log2Timeline you are missing the boat in forensic analysis of Windows based systems.</span></span><span style="font-family: arial,sans-serif;"><span style="font-size: small;"> </span></span><span style="font-family: arial,sans-serif; font-size: 16px; font-weight: bold;"> </span><br><br><b><font size="3">Legal News<br></font></b>Well, look above about the Canadian Court Ruling on computer forensics.  We think that is enough legal today.<br><br><b><font size="3">Website of the Week</font></b></span></div><div><font face="Verdana, Arial, Helvetica, sans-serif"><span style="font-size: medium;"><b><span style="font-family: Verdana,sans-serif; font-weight: normal; font-size: 16px;"><p style="margin: 0px;"><span style="font-size: small;">Ovie recommends taking a look at the new Microsoft MESH (https://www.mesh.com) to help sync all your files across all operating systems AND</span></p><p style="margin: 0px;"><span style="font-size: small;">Ovie took the <a href="http://www.oprah.com/questionaire/ipledge.html?id=4">no texting while driving Oprah Pledge</a> and challenges YOU ALL to take it too. <a href="http://www.oprah.com/questionaire/ipledge.html?id=4">Check it out here</a> and save a life. </span></p><p style="margin: 0px;"><span style="font-size: small;"><br></span></p><p style="margin: 0px;"><span style="font-size: small;">Bret recommends <a href="www.sixrevisions.com/infographs/browser-performance/">this website</a> to test your browser performance.</span></p><p style="margin: 0px;"><span style="font-size: small;"><br></span></p><p style="margin: 0px;"><span style="font-size: small;"><br></span></p><p style="margin: 0px;"><span style="font-size: small;"><br></span></p></span></b></span></font></div>]]></description>
      
      <content:encoded><![CDATA[<b>Listener Email</b> - Thanks to all for the great feedback on the Internet Predator Tracker interview. Also, Timothy, who clearly does not know us because he started his email "Hello GENTLEMEN". Just kidding, keep the emails coming.<b>News and Commentary</b>Aaron sent us an interesting link to an article from the Times Argus discussing forensics and the backlog.Bret and I discuss a really interesting <a href="http://scc.lexum.umontreal.ca/en/2010/2010scc8/2010scc8.html">ruling from the Canadian courts</a> on computer forensics. This is a long read but some very interesting reading. Check it out <a href="http://scc.lexum.umontreal.ca/en/2010/2010scc8/2010scc8.html">here.</a><a href="http://scc.lexum.umontreal.ca/en/2010/2010scc8/2010scc8.html"></a><b>Exclusive Interview</b>Today we have an interview with Kristtinn G who works for a company called Skigner in ICELAND and in Kristinn in collaboration with Rob Lee, or friend from SANS and former OSI colleague created a wonderful new tool called Log2Timeline. You don't want to miss that interview because if you are not using Log2Timeline you are missing the boat in forensic analysis of Windows based systems. <b>Legal News</b>Well, look above about the Canadian Court Ruling on computer forensics. We think that is enough legal today.<b>Website of the Week</b><b><p style="margin: 0px;">Ovie recommends taking a look at the new Microsoft MESH (https://www.mesh.com) to help sync all your files across all operating systems AND</p><p style="margin: 0px;">Ovie took the <a href="http://www.oprah.com/questionaire/ipledge.html?id=4">no texting while driving Oprah Pledge</a> and challenges YOU ALL to take it too. <a href="http://www.oprah.com/questionaire/ipledge.html?id=4">Check it out here</a> and save a life. </p><p style="margin: 0px;"></p><p style="margin: 0px;">Bret recommends <a href="www.sixrevisions.com/infographs/browser-performance/">this website</a> to test your browser performance.</p><p style="margin: 0px;"></p><p style="margin: 0px;"></p><p style="margin: 0px;"></p></b>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-Show-2010-04-03.mp3?dest-id=11283" length="46126662" type="audio/mpeg" />
      <itunes:duration>01:04:03</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak March 21, 2010</title>
      <itunes:title>CyberSpeak March 21, 2010</itunes:title>
      <pubDate>Mon, 22 Mar 2010 18:36:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[538ba1728d7c27ecbf35ab7ab69e07e0]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/XuYp1bUIQKE/cyber_speak_march_21_2010]]></link>
      <description><![CDATA[Ovie's SANS Forensic 408 class is coming up in Nashville, TN on May 3-7. If you're staying at the Marriott be sure you use the CyberSpeak Discount, COINS-OC.<br><br><b><font size="4"><font size="3">Listener Email</font><br></font></b> - Luke sent us a photo showing him listening to the podcast from his Blackberry while on the beach in Miami<br> - Aaron, thanks for the email alerting us about the webpage<br> - Sorry we broke your CyberSpeak mood in the last show!<br> - Paul wrote us to say that while drinking his Shamrock Shake, Ovie scared the crap out of him when he screamed<br> - Bobby wrote in to tell us about his new Pro-Lite 2 from Amazon. Let us know how it works out Bobby!<br><br><font size="3"><b>News and Commentary</b></font><br><a href="http://news.discovery.com/animals/cat-fur-forensics-crime.html">Snowball the Cat Helps Solve Murder Mystery</a> <br>A murder suspect was caught based on cat fur picked up while at the victims house.<br><br><a href="http://news.yahoo.com/s/ap/us_hacker_sabotaged_cars">A Ex-Employee in Texas Remotely Disables Customer Cars</a> <br>A man fired from a Texas auto dealership used an Internet service to remotely disable cars and set off car horns of more than 100 vehicles.<br><br><b><font size="3">Exclusive Interview</font></b><br>Today we have an interview with Joe Seanor, a former Senior AOL Investigator.  Joe has developed the <a href="http://www.internetpredatortracker.com/">Internet Predator Tracker</a>  software.  Joe spent 10 years with the CIA and also 7 years with AOL in investigative roles.  Now he has developed a number of pieces of software to aid investigators in keeping notes on Internet investigations. <br><br><b><font size="3">Legal News<br></font></b>U.S. v. McAteer, 2010 WL 551412 (D.N.J.)<br>After obtaining consent, two FBI agents searched a suspect computer for child pornography.  After a "preview scan" failed to turn up any evidence, the suspect gave consent for a manual search.  During trial the defendant moved to suppress CP discovered during the manual search on the grounds that it exceeded the consent.  The court, however, disagreed and found the defendant's consent not so limited.<br><br><b><font size="3">Website of the Week</font></b><br><a href="http://dunk3d.tumblr.com">http://dunk3d.tumblr.com</a><br><a href="http://www.labnol.org">http://www.labnol.org</a><br><a href="http://chdk.wikia.com/wiki/CHDK">http://chdk.wikia.com/wiki/CHDK</a><br><br>]]></description>
      
      <content:encoded><![CDATA[Ovie's SANS Forensic 408 class is coming up in Nashville, TN on May 3-7. If you're staying at the Marriott be sure you use the CyberSpeak Discount, COINS-OC.<b>Listener Email</b> - Luke sent us a photo showing him listening to the podcast from his Blackberry while on the beach in Miami - Aaron, thanks for the email alerting us about the webpage - Sorry we broke your CyberSpeak mood in the last show! - Paul wrote us to say that while drinking his Shamrock Shake, Ovie scared the crap out of him when he screamed - Bobby wrote in to tell us about his new Pro-Lite 2 from Amazon. Let us know how it works out Bobby!<b>News and Commentary</b><a href="http://news.discovery.com/animals/cat-fur-forensics-crime.html">Snowball the Cat Helps Solve Murder Mystery</a> A murder suspect was caught based on cat fur picked up while at the victims house.<a href="http://news.yahoo.com/s/ap/us_hacker_sabotaged_cars">A Ex-Employee in Texas Remotely Disables Customer Cars</a> A man fired from a Texas auto dealership used an Internet service to remotely disable cars and set off car horns of more than 100 vehicles.<b>Exclusive Interview</b>Today we have an interview with Joe Seanor, a former Senior AOL Investigator. Joe has developed the <a href="http://www.internetpredatortracker.com/">Internet Predator Tracker</a> software. Joe spent 10 years with the CIA and also 7 years with AOL in investigative roles. Now he has developed a number of pieces of software to aid investigators in keeping notes on Internet investigations. <b>Legal News</b>U.S. v. McAteer, 2010 WL 551412 (D.N.J.)After obtaining consent, two FBI agents searched a suspect computer for child pornography. After a "preview scan" failed to turn up any evidence, the suspect gave consent for a manual search. During trial the defendant moved to suppress CP discovered during the manual search on the grounds that it exceeded the consent. The court, however, disagreed and found the defendant's consent not so limited.<b>Website of the Week</b><a href="http://dunk3d.tumblr.com">http://dunk3d.tumblr.com</a><a href="http://www.labnol.org">http://www.labnol.org</a><a href="http://chdk.wikia.com/wiki/CHDK">http://chdk.wikia.com/wiki/CHDK</a>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_123_Mar_21_2010.mp3?dest-id=11283" length="40542903" type="audio/mpeg" />
      <itunes:duration>56:18</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak February 28, 2010</title>
      <itunes:title>CyberSpeak February 28, 2010</itunes:title>
      <pubDate>Thu, 04 Mar 2010 07:19:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[38a3584e6cad4826f03f4dfbb560794e]]></guid>
      <link><![CDATA[https://cyberspeak.libsyn.com/cyber_speak_february_28_2010]]></link>
      <description><![CDATA[- Bret talks about his new toys<br>- Ovie flees the country, again<br><br><b><font size="3">News and Commentary</font></b><br><a href="http://www.bristolpress.com/articles/2010/02/27/news/doc4b8895abb53a9392320007.txt">New Britain Youth Bureau Gets Conviction</a><br>After a two year long investigation, two individuals have been sentenced to jail time for child molestation.<br><br><a href="http://viaforensics.com/android-forensics/viaforensics-announces-release-android-forensics-application.html">Via Forensics Released Android Forensics Application</a><br>Via Forensics has released a beta version of its open source Android Forensics application.<br><br><b><font size="3">Exclusive Interview</font></b><br>This week we speak with <a href="http://www.christammiller.com/">Christa Miller</a> about the need for law enforcement and digital forensics specialists to manage their online resumes. With so many different social networking sites, it's important that they all appear consistent in voice and purpose.<br><b><font size="3"><br>Tech Topics</font></b><br><a href="http://blogs.sans.org/computer-forensics/2010/02/10/freebsd-computer-forensic-tips-tricks/">FreeBSD Tips on SANS Forensic Blog</a><br>Hal Pomeranz has a great post on the SANS forensic blog detailing tips for how to conduct a forensics investigation against a FreeBSD system.<br><br><a href="http://forensic-software.co.uk/">FireFox Internet History Analysis</a><br>A new FireFox Internet history analysis program, dubbed FoxAnalysis, has been released.  This software purports to gather all kinds of interesting goodies from FireFox history files.<br><br><font style="font-weight: bold;" size="3">Website of the Week</font><br><a href="http://grc.com/passwords.htm">http://grc.com/passwords.htm</a> - Randomly generated passwords (Thanks Ralph)<br><a href="http://www.readitlaterlist.com/">Read It Later</a> - Keep a list of web pages your want to read from your computer or iPhone<br><a href="http://www.instapaper.com/">InstaPaper</a> - Allow you to read a webpage later from your computer, Kindle or iPhone<br><a href="http://www.gazelle.com/">Gazelle</a> - Get cash for your old gadgets<br><br>Check out our iPhone App!]]></description>
      
      <content:encoded><![CDATA[- Bret talks about his new toys- Ovie flees the country, again<b>News and Commentary</b><a href="http://www.bristolpress.com/articles/2010/02/27/news/doc4b8895abb53a9392320007.txt">New Britain Youth Bureau Gets Conviction</a>After a two year long investigation, two individuals have been sentenced to jail time for child molestation.<a href="http://viaforensics.com/android-forensics/viaforensics-announces-release-android-forensics-application.html">Via Forensics Released Android Forensics Application</a>Via Forensics has released a beta version of its open source Android Forensics application.<b>Exclusive Interview</b>This week we speak with <a href="http://www.christammiller.com/">Christa Miller</a> about the need for law enforcement and digital forensics specialists to manage their online resumes. With so many different social networking sites, it's important that they all appear consistent in voice and purpose.<b>Tech Topics</b><a href="http://blogs.sans.org/computer-forensics/2010/02/10/freebsd-computer-forensic-tips-tricks/">FreeBSD Tips on SANS Forensic Blog</a>Hal Pomeranz has a great post on the SANS forensic blog detailing tips for how to conduct a forensics investigation against a FreeBSD system.<a href="http://forensic-software.co.uk/">FireFox Internet History Analysis</a>A new FireFox Internet history analysis program, dubbed FoxAnalysis, has been released. This software purports to gather all kinds of interesting goodies from FireFox history files.Website of the Week<a href="http://grc.com/passwords.htm">http://grc.com/passwords.htm</a> - Randomly generated passwords (Thanks Ralph)<a href="http://www.readitlaterlist.com/">Read It Later</a> - Keep a list of web pages your want to read from your computer or iPhone<a href="http://www.instapaper.com/">InstaPaper</a> - Allow you to read a webpage later from your computer, Kindle or iPhone<a href="http://www.gazelle.com/">Gazelle</a> - Get cash for your old gadgetsCheck out our iPhone App!]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_122_Feb_28_2010.mp3?dest-id=11283" length="27668931" type="audio/mpeg" />
      <itunes:duration>57:38</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Febuary 21, 2010</title>
      <itunes:title>CyberSpeak Febuary 21, 2010</itunes:title>
      <pubDate>Mon, 22 Feb 2010 06:24:58 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[1fd1c553cbb45a9b7e85cf73e730836d]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/RSKbFxTWA4Y/cyber_speak_febuary_21_2010]]></link>
      <description><![CDATA[- Check out our iPhone App on the Apple App Store.<br><br><br><b><font size="3">Listener Email</font></b><br> - Darrell asks how to build your forensics business<br> - Bobby wants to know what computer bag Ovie recommends, check out the <a href="http://www.amazon.com/dp/B000RPEK7W?tag=cyberspeakpod-20&camp=213381&creative=390973&linkCode=as4&creativeASIN=B000RPEK7W&adid=1H9XMF7YVJC37SGD1Z56&">Brenthaven Prolite II </a><br><br><b><font size="3"><br>News and Commentary</font></b><br><b><a href="http://articles.latimes.com/2010/jan/11/nation/la-na-rape-craigslist11-2010jan11">Craig's List Rapist</a></b><br>Former boyfriend posts an ad on Craig's List pretending to be his ex-girlfriend and leads viewers to believe the female is asking to be raped. One individual then broke into her home and raped her in response to the ad.<br><br><br><b><a href="http://techcrunch.com/2010/02/18/foursquare-please-rob-me/">Online Personal Information Security</a></b><br>Bret and Ovie discuss a number of websites related that give people a little too much information on where you are.<br><br><br><b><a href="http://www.fbi.gov/page2/feb10/forensic_021210.html">Non-Metadata Clues in Video and Audio Files</a></b><br>Remember to look beyond the metadata when looking at audio and video files. An FBI investigator reviewed 14 video tapes and found evidence that lead to a sexual abuse conviction.<br><br><br><br><font size="3"><b>Exclusive Interview<br></b></font><br>This week we speak with Sean Morrissey of <a href="http://katanaforensics.com/">Katana Forensics</a>.  Katana produces forensic imaging software for the iPhone called "Lantern."  The Lantern software is a Mac based tool that purports to provide a "legally defensible forensic methodology for the iPhone." <br><br><br><br><font size="3"><b>Website of the Week</b></font><br><a href="http://itunes.apple.com/us/app/cyberspeak-podcast/id355724240?mt=8">CyberSpeak iPhone App</a><br><a href="http://integriography.wordpress.com/">David Kovar's Blog</a> <br>]]></description>
      
      <content:encoded><![CDATA[- Check out our iPhone App on the Apple App Store.<b>Listener Email</b> - Darrell asks how to build your forensics business - Bobby wants to know what computer bag Ovie recommends, check out the <a href="http://www.amazon.com/dp/B000RPEK7W?tag=cyberspeakpod-20&camp=213381&creative=390973&linkCode=as4&creativeASIN=B000RPEK7W&adid=1H9XMF7YVJC37SGD1Z56&">Brenthaven Prolite II </a><b>News and Commentary</b><b><a href="http://articles.latimes.com/2010/jan/11/nation/la-na-rape-craigslist11-2010jan11">Craig's List Rapist</a></b>Former boyfriend posts an ad on Craig's List pretending to be his ex-girlfriend and leads viewers to believe the female is asking to be raped. One individual then broke into her home and raped her in response to the ad.<b><a href="http://techcrunch.com/2010/02/18/foursquare-please-rob-me/">Online Personal Information Security</a></b>Bret and Ovie discuss a number of websites related that give people a little too much information on where you are.<b><a href="http://www.fbi.gov/page2/feb10/forensic_021210.html">Non-Metadata Clues in Video and Audio Files</a></b>Remember to look beyond the metadata when looking at audio and video files. An FBI investigator reviewed 14 video tapes and found evidence that lead to a sexual abuse conviction.<b>Exclusive Interview</b>This week we speak with Sean Morrissey of <a href="http://katanaforensics.com/">Katana Forensics</a>. Katana produces forensic imaging software for the iPhone called "Lantern." The Lantern software is a Mac based tool that purports to provide a "legally defensible forensic methodology for the iPhone." <b>Website of the Week</b><a href="http://itunes.apple.com/us/app/cyberspeak-podcast/id355724240?mt=8">CyberSpeak iPhone App</a><a href="http://integriography.wordpress.com/">David Kovar's Blog</a>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_121_Feb_21_2010.mp3?dest-id=11283" length="50625638" type="audio/mpeg" />
      <itunes:duration>01:10:18</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak February 7, 2010</title>
      <itunes:title>CyberSpeak February 7, 2010</itunes:title>
      <pubDate>Sun, 07 Feb 2010 17:24:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[b1fa6bd9ad5e868fadee043b2223503c]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/Y3aypN9rU7A/cyber_speak_february_7_2010]]></link>
      <description><![CDATA[Listener Email<br> - Aaron sends us to tell about using Stitcher feed<br> - Paul writes to ask how someone without forensics background should go about starting out. Ovie and Bret give some pointers.<br> - Ovie is starting a <a href="http://www.sans.org/vlive/">SANS vLive</a> course on <a href="http://www.sans.org/vlive/details.php?nid=20703">June 8th</a>!<br><br>News and Commentary<br><a href="http://www.kingmandailyminer.com/main.asp?SectionID=1&subsectionID=1&articleID=35879">GPS Forensics Used to Find Body</a><br>A fugitive wanted for questioning about a number of murders committed suicide before law enforcement officers were able to find the bodies of the victims.  Using computer forensics, however, the officers were able to recover GPS data and locate the remains.<br><br>Exclusive Interview<br>Todd Shipley, president and CEO of <a href="http://veresoftware.com/">Vere Software</a> speaks to use about looking into the cloud to find forensics data.  He speaks to use about products from his company to assist in capturing this kind of evidence.<br><br>Website of the Week<br><a href="http://www.georgestarcher.com/">CrowbarPGP</a>  - A new tool by George Starcher to brute force PGP passphrases<br><a href="http://DigitalCertainty.Biz">DigitalCertainty.Biz</a> - WiFi Investigator to identify the location of WiFi devices<br>]]></description>
      
      <content:encoded><![CDATA[Listener Email - Aaron sends us to tell about using Stitcher feed - Paul writes to ask how someone without forensics background should go about starting out. Ovie and Bret give some pointers. - Ovie is starting a <a href="http://www.sans.org/vlive/">SANS vLive</a> course on <a href="http://www.sans.org/vlive/details.php?nid=20703">June 8th</a>!News and Commentary<a href="http://www.kingmandailyminer.com/main.asp?SectionID=1&subsectionID=1&articleID=35879">GPS Forensics Used to Find Body</a>A fugitive wanted for questioning about a number of murders committed suicide before law enforcement officers were able to find the bodies of the victims. Using computer forensics, however, the officers were able to recover GPS data and locate the remains.Exclusive InterviewTodd Shipley, president and CEO of <a href="http://veresoftware.com/">Vere Software</a> speaks to use about looking into the cloud to find forensics data. He speaks to use about products from his company to assist in capturing this kind of evidence.Website of the Week<a href="http://www.georgestarcher.com/">CrowbarPGP</a> - A new tool by George Starcher to brute force PGP passphrases<a href="http://DigitalCertainty.Biz">DigitalCertainty.Biz</a> - WiFi Investigator to identify the location of WiFi devices]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_120_Feb_07_2010.mp3?dest-id=11283" length="31462416" type="audio/mpeg" />
      <itunes:duration>43:41</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak January 31, 2010</title>
      <itunes:title>CyberSpeak January 31, 2010</itunes:title>
      <pubDate>Sun, 31 Jan 2010 17:52:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[201784d6d003af95e46607bbc6a657aa]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/IqluIjPXOrg/cyber_speak_january_31_2010]]></link>
      <description><![CDATA[DoD CyberCrime Conference was last week in St Louis MO and was their biggest event ever with over 1100 attendees, 175 presentations and 15 simultaneous tracks. Check out the SANS website (http://www.sans.org/) for the SANS 2010 Orlando coming up March 6-15.<br><br>News and Commentary<br><a href="http://www.computerworld.com/s/article/9143504/More_flash_drive_firms_warn_of_security_flaw_NIST_investigates">SanDisk Corp and Verbatim join Kingston in a Crypto No-no</a><br>A hole found in the AES-256 encryption on USB flash drives from these three companies allows unauthorized access to the devices without knowing the password.<br><br><a href="http://www.computerworld.com/s/article/9147100/Storage_wrinkle_4_500_flash_drives_left_at_the_cleaners">Creedent Finds 4,500 Drives Sent to Dry Cleaners</a><br>UK based company Creedent finds large amounts of devices left in pockets of clothes sent to dry cleaners and left behind in taxis.<br><br>Exclusive Interview<br>Robert Botcheck, founder and owner of Tableau, joins us today.  Tableau, makes some of the most popular and reasonably priced write-blocking devices.  Their newest product is a software imaging program that promises such features as multi-threading and sequential scheduling.  Check out the interview for more information.<br><br>Website of the Week<br> - <a href="http://insidethecore.com/">The Macintosh Forensics Podcast</a>]]></description>
      
      <content:encoded><![CDATA[DoD CyberCrime Conference was last week in St Louis MO and was their biggest event ever with over 1100 attendees, 175 presentations and 15 simultaneous tracks. Check out the SANS website (http://www.sans.org/) for the SANS 2010 Orlando coming up March 6-15.News and Commentary<a href="http://www.computerworld.com/s/article/9143504/More_flash_drive_firms_warn_of_security_flaw_NIST_investigates">SanDisk Corp and Verbatim join Kingston in a Crypto No-no</a>A hole found in the AES-256 encryption on USB flash drives from these three companies allows unauthorized access to the devices without knowing the password.<a href="http://www.computerworld.com/s/article/9147100/Storage_wrinkle_4_500_flash_drives_left_at_the_cleaners">Creedent Finds 4,500 Drives Sent to Dry Cleaners</a>UK based company Creedent finds large amounts of devices left in pockets of clothes sent to dry cleaners and left behind in taxis.Exclusive InterviewRobert Botcheck, founder and owner of Tableau, joins us today. Tableau, makes some of the most popular and reasonably priced write-blocking devices. Their newest product is a software imaging program that promises such features as multi-threading and sequential scheduling. Check out the interview for more information.Website of the Week - <a href="http://insidethecore.com/">The Macintosh Forensics Podcast</a>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak_119_Jan_31_2010.mp3?dest-id=11283" length="25735243" type="audio/mpeg" />
      <itunes:duration>35:44</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak January 24, 2010</title>
      <itunes:title>CyberSpeak January 24, 2010</itunes:title>
      <pubDate>Sun, 24 Jan 2010 12:57:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=574165#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/2z8-022UykM/index.php]]></link>
      <description><![CDATA[This week on CyberSpeak, Bret or Ovie are both regretful that they are not going to the DoD CyberCrime Conference.  CyberSpeak is not on STITCHER.  Now you can listen to the latest show, on demand from your cell phone.  You can also go directly there by going to this link
                http://stitcher.com/listen.php?fid=11119
                Bret and Ovie briefly discuss Apple's big announcement, everyone is thinking it is the ipad/slate.  Bret says he don not know exactly what it is but he is getting one....with his wife's permission. 
                <br/>Listener Email - Tom sent us an email saying : Hi fellas, and suggest we check out his UK forensic blog called <a href="http://happyasamonkey.wordpress.com" target="_blank">Happy as a Monkey</a>. 
                <br/>In the news, <a href="http://www.forensicfocus.com/computer-forensics-education-directoryâ" target="_blank">Forensic Focus</a> have compiled a directory that details all the academic institutions worldwide that offer computer forensics courses. 
                We discuss an <a href="http://www.washingtonpost.com/wp-dyn/content/article/2010/01/14/AR2010011402962.html " target="_blank">interesting murder trial</a> in Waco TX that has some great forensics work, nice job to the forensic examiner, Neal Kersh.
                We also discuss a <a href="http://www.independent.co.uk/news/uk/home-news/twitter-joke-led-to-terror-act-arrest-and-airport-life-ban-1870913.html " target="_blank">Twitter Jokester being banned for life from an airport</a> after twittering "Robin Hood airport is closed," he wrote. "You've got a week and a bit to get your shit together, otherwise I'm blowing the airport sky high!!"
                We also talk about Secretary of State Hillary Clinton's speech last week where she said that her department will introduce several initiatives aimed at <a href="http://www.nytimes.com/2010/01/22/world/asia/22diplo.html " target="_blank">fighting Internet censorship.</a> Clinton said: âThose who disrupt the free flow of information in our society pose a threat to our economy, our government and our civil society. Countries or individuals that engage in cyber-attacks should face consequences and international condemnation.â
                Last, we talk about the latest <a href="http://news.cnet.com/8301-27080_3-10438924-245.html " target="_blank">Microsoft vulnerability</a> that affects all 32 bit versions of Windows 7, Vista, XP, 2000, and Server 2003 and 2008. <br/>Our Web Sites of the week are
                <a href="https://www.mobiledefense.com" target="_blank">https://www.mobiledefense.com</a> and <a href="http://www.domystuff.com" target="_blank">http://www.domystuff.com</a>. <br/>]]></description>
      
      <content:encoded><![CDATA[This week on CyberSpeak, Bret or Ovie are both regretful that they are not going to the DoD CyberCrime Conference. CyberSpeak is not on STITCHER. Now you can listen to the latest show, on demand from your cell phone. You can also go directly there by going to this link http://stitcher.com/listen.php?fid=11119 Bret and Ovie briefly discuss Apple's big announcement, everyone is thinking it is the ipad/slate. Bret says he don not know exactly what it is but he is getting one....with his wife's permission. Listener Email - Tom sent us an email saying : Hi fellas, and suggest we check out his UK forensic blog called <a href="http://happyasamonkey.wordpress.com" target="_blank">Happy as a Monkey</a>. In the news, <a href="http://www.forensicfocus.com/computer-forensics-education-directoryâ" target="_blank">Forensic Focus</a> have compiled a directory that details all the academic institutions worldwide that offer computer forensics courses. We discuss an <a href="http://www.washingtonpost.com/wp-dyn/content/article/2010/01/14/AR2010011402962.html " target="_blank">interesting murder trial</a> in Waco TX that has some great forensics work, nice job to the forensic examiner, Neal Kersh. We also discuss a <a href="http://www.independent.co.uk/news/uk/home-news/twitter-joke-led-to-terror-act-arrest-and-airport-life-ban-1870913.html " target="_blank">Twitter Jokester being banned for life from an airport</a> after twittering "Robin Hood airport is closed," he wrote. "You've got a week and a bit to get your shit together, otherwise I'm blowing the airport sky high!!" We also talk about Secretary of State Hillary Clinton's speech last week where she said that her department will introduce several initiatives aimed at <a href="http://www.nytimes.com/2010/01/22/world/asia/22diplo.html " target="_blank">fighting Internet censorship.</a> Clinton said: âThose who disrupt the free flow of information in our society pose a threat to our economy, our government and our civil society. Countries or individuals that engage in cyber-attacks should face consequences and international condemnation.â Last, we talk about the latest <a href="http://news.cnet.com/8301-27080_3-10438924-245.html " target="_blank">Microsoft vulnerability</a> that affects all 32 bit versions of Windows 7, Vista, XP, 2000, and Server 2003 and 2008. Our Web Sites of the week are <a href="https://www.mobiledefense.com" target="_blank">https://www.mobiledefense.com</a> and <a href="http://www.domystuff.com" target="_blank">http://www.domystuff.com</a>.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-118_Jan_24_2010.mp3?dest-id=11283" length="20593171" type="audio/mpeg" />
      <itunes:duration>28:36</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak January 17, 2010</title>
      <itunes:title>CyberSpeak January 17, 2010</itunes:title>
      <pubDate>Sun, 17 Jan 2010 18:48:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=571595#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/FnsTZ1XWkmM/index.php]]></link>
      <description><![CDATA[Listener Email<br/><br/> - PGP released PGP10 with one license for all operating systems<br/> - Expunging data vs destruction of data<br/> - Reaction of the industry to push-button tools like Paraben's Porn Detection Stick<br/><br/><br/>News and Commentary<br/><br/><a href="http://www.businessinsider.com/did-the-chinese-government-hack-google-2010-1">Google Grows a Pair</a><br/>Last week brought computer security into the spotlight when Google announced it was no longer going to abide by the Chinese censorship rules and might be pulling out of China all together.  This news was closely followed by reports that Google, and many other US companies, had their computer networks compromised by agents of the Chinese government.<br/><br/><br/>Exclusive Interview<br/><a href="http://blog.didierstevens.com/">Didier Stevens</a> joins us this week to talk about some of his recent forensic tools and research, including the changes to the UserAssist registry keys in Windows 7 and his malicious PDF tools.  He speaks about some of his other tools like his SafeMode restore tool.<br/><br/>Website of the Week<br/><a href="http://l5technology.com/">L5 Technology</a> <br/><a href="http://stitcher.com/">Stitcher.com</a> <br/><a href="http://www.woany.co.uk/">WoanWare</a><br/><br/>]]></description>
      
      <content:encoded><![CDATA[Listener Email - PGP released PGP10 with one license for all operating systems - Expunging data vs destruction of data - Reaction of the industry to push-button tools like Paraben's Porn Detection StickNews and Commentary<a href="http://www.businessinsider.com/did-the-chinese-government-hack-google-2010-1">Google Grows a Pair</a>Last week brought computer security into the spotlight when Google announced it was no longer going to abide by the Chinese censorship rules and might be pulling out of China all together. This news was closely followed by reports that Google, and many other US companies, had their computer networks compromised by agents of the Chinese government.Exclusive Interview<a href="http://blog.didierstevens.com/">Didier Stevens</a> joins us this week to talk about some of his recent forensic tools and research, including the changes to the UserAssist registry keys in Windows 7 and his malicious PDF tools. He speaks about some of his other tools like his SafeMode restore tool.Website of the Week<a href="http://l5technology.com/">L5 Technology</a> <a href="http://stitcher.com/">Stitcher.com</a> <a href="http://www.woany.co.uk/">WoanWare</a>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_117_Jan_10_2010.mp3?dest-id=11283" length="40079144" type="audio/mpeg" />
      <itunes:duration>55:39</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak January 3, 2010</title>
      <itunes:title>CyberSpeak January 3, 2010</itunes:title>
      <pubDate>Sat, 02 Jan 2010 20:02:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=566916#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/Nv41QuBF9yo/index.php]]></link>
      <description><![CDATA[Thanks for all the Decaf feedback<br/><br/>News and Commentary<br/><a href="http://www.dfrws.org/2009/challenge/results.shtml">Digital Forensic Research Challenge</a><br/><br/>Results are in from the DFRWS Forensics challenge. This year contestants look at forensics of a Sony Playstation.<br/><br/><a href="http://news.bbc.co.uk/2/hi/technology/8429233.stm">GSM Vulnerability Released</a><br/><br/>At the recent 26th Computer Chaos Conference Chris Paget and Karsten Nohl presented a new crack in the GSM armor. By using an equivalent of rainbow tables they can economically crack GSM encryption.<br/><br/><br/>Exclusive Interview<br/>Ovie interviews CEO of Paraben Forensics, Amber Schroader.  Schroader talks about and what's going on at Paraben and what we have to look forward to!<br/><br/>Website of the Week<br/><a href="http://www.ifixit.com">iFixIt.Com</a> - Repair manuals, now for FREE!<br/><br/><a href="http://securitytube.net/Anti-Forensics-techniques-for-OSX-%28Vincenzo-Blackhat-DC%29-video.aspx">Anti-Forensics for Mac OSX</a> from BlackHat DC<br/>]]></description>
      
      <content:encoded><![CDATA[Thanks for all the Decaf feedbackNews and Commentary<a href="http://www.dfrws.org/2009/challenge/results.shtml">Digital Forensic Research Challenge</a>Results are in from the DFRWS Forensics challenge. This year contestants look at forensics of a Sony Playstation.<a href="http://news.bbc.co.uk/2/hi/technology/8429233.stm">GSM Vulnerability Released</a>At the recent 26th Computer Chaos Conference Chris Paget and Karsten Nohl presented a new crack in the GSM armor. By using an equivalent of rainbow tables they can economically crack GSM encryption.Exclusive InterviewOvie interviews CEO of Paraben Forensics, Amber Schroader. Schroader talks about and what's going on at Paraben and what we have to look forward to!Website of the Week<a href="http://www.ifixit.com">iFixIt.Com</a> - Repair manuals, now for FREE!<a href="http://securitytube.net/Anti-Forensics-techniques-for-OSX-%28Vincenzo-Blackhat-DC%29-video.aspx">Anti-Forensics for Mac OSX</a> from BlackHat DC]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak_116_Jan_03_2010.mp3?dest-id=11283" length="25486202" type="audio/mpeg" />
      <itunes:duration>35:23</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak December 20, 2009</title>
      <itunes:title>CyberSpeak December 20, 2009</itunes:title>
      <pubDate>Sun, 20 Dec 2009 16:25:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=562164#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/MaVJv-GczPo/index.php]]></link>
      <description><![CDATA[Listener Email<br/>- Lots of email this week regarding the DECAF product and Interview<br/>- Ovie is not against transparency, just wants responsible disclosure<br/><br/>Exclusive Interview<br/>Michael, one of the creators and developers of DECAF product spills the beans to Ovie.<br/><br/>News and Commentary<br/>DECAF<br/>There's been a lot of coverage of this, most of it bad. But we've compiled a list of accurate stories for ya:<br/>    - Lots of media coverage, most bad, but a few good sources:<br/>    - <a href="http://windowsir.blogspot.com/">Harlan Carvey's Windows IR</a> <br/>    - <a href="http://www.forensicfocus.com/">Forensics Focus</a> <br/>    - <a href="http://www.dfinews.com/"></a><a href="http://www.dfinews.com/">Digital Forensic Investigator</a><br/>    - <a href="http://www.praetorianprefect.com/">Praetorian Prefect</a><br/>        - Reactivating DECAF in two minutes<br/><br/><a href="http://www.dfinews.com/">Collection of Evidence From the Internet</a><br/>Todd Shipley over at DFI News has a great article about collecting evidence from the Internet.<br/><br/><a href="http://www.swgde.org/">Scientific Working Group on Digital Evidence</a> (SWGDE)<br/>The folks over at SWGDE have done some great work on creating standards and strenthening the handling of digital evidence.  Check out their recommendations and responses to other industry movments at their website.<br/><br/>Also check out the Forensics Certification board at <a href="http://www.ncfs.org/dfcb">http://www.ncfs.org/dfcb</a>.<br/><br/><br/>Website of the Week<br/> Ovie: <a href="http://www.mint.com/">http://www.mint.com/</a> - Best free way to manage your money. Basically an online Quicken<br/> Bret: <a href="http://www.dfinews.com/">http://www.dfinews.com/</a> - Great resource for forensic news<br/><br/>Check out <a href="http://www.friendsintech.com/index.php/archives/291">Friends in Tech's Geek Christmas Story</a>!<br/>]]></description>
      
      <content:encoded><![CDATA[Listener Email- Lots of email this week regarding the DECAF product and Interview- Ovie is not against transparency, just wants responsible disclosureExclusive InterviewMichael, one of the creators and developers of DECAF product spills the beans to Ovie.News and CommentaryDECAFThere's been a lot of coverage of this, most of it bad. But we've compiled a list of accurate stories for ya: - Lots of media coverage, most bad, but a few good sources: - <a href="http://windowsir.blogspot.com/">Harlan Carvey's Windows IR</a> - <a href="http://www.forensicfocus.com/">Forensics Focus</a> - <a href="http://www.dfinews.com/"></a><a href="http://www.dfinews.com/">Digital Forensic Investigator</a> - <a href="http://www.praetorianprefect.com/">Praetorian Prefect</a> - Reactivating DECAF in two minutes<a href="http://www.dfinews.com/">Collection of Evidence From the Internet</a>Todd Shipley over at DFI News has a great article about collecting evidence from the Internet.<a href="http://www.swgde.org/">Scientific Working Group on Digital Evidence</a> (SWGDE)The folks over at SWGDE have done some great work on creating standards and strenthening the handling of digital evidence. Check out their recommendations and responses to other industry movments at their website.Also check out the Forensics Certification board at <a href="http://www.ncfs.org/dfcb">http://www.ncfs.org/dfcb</a>.Website of the Week Ovie: <a href="http://www.mint.com/">http://www.mint.com/</a> - Best free way to manage your money. Basically an online Quicken Bret: <a href="http://www.dfinews.com/">http://www.dfinews.com/</a> - Great resource for forensic newsCheck out <a href="http://www.friendsintech.com/index.php/archives/291">Friends in Tech's Geek Christmas Story</a>!]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak_115_Dec_20_2009.mp3?dest-id=11283" length="37213876" type="audio/mpeg" />
      <itunes:duration>51:41</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Exclusive Decaf Interview</title>
      <itunes:title>CyberSpeak Exclusive Decaf Interview</itunes:title>
      <pubDate>Thu, 17 Dec 2009 18:04:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=561335#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/W0L_kgz0N_k/index.php]]></link>
      <description><![CDATA[Full interview of Developer of Decaf]]></description>
      
      <content:encoded><![CDATA[Full interview of Developer of Decaf]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_114_Decaf-Interview.mp3?dest-id=11283" length="30501132" type="audio/mpeg" />
      <itunes:duration>50:50</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak December 13, 2009</title>
      <itunes:title>CyberSpeak December 13, 2009</itunes:title>
      <pubDate>Sun, 13 Dec 2009 14:04:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=559607#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/btK4Q1AHkyY/index.php]]></link>
      <description><![CDATA[Only 9 shopping days until Christmas!!.  In today's show Ovie lets slip details from his latest incident response job, Bret interviews Simson Garfinkel, and lots of great forensics talk. And at the end, Ovie tells you how you can save your marriage!
                Website of the Week
                Ovie: http://www.familylife.com - Check out great holiday romance ideas
                Bret:  Check out the Digital Forensics wave on Google Wave, search for "with:public forensics"]]></description>
      
      <content:encoded><![CDATA[Only 9 shopping days until Christmas!!. In today's show Ovie lets slip details from his latest incident response job, Bret interviews Simson Garfinkel, and lots of great forensics talk. And at the end, Ovie tells you how you can save your marriage! Website of the Week Ovie: http://www.familylife.com - Check out great holiday romance ideas Bret: Check out the Digital Forensics wave on Google Wave, search for "with:public forensics"]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_114_Dec_13_2009.mp3?dest-id=11283" length="50228401" type="audio/mpeg" />
      <itunes:duration>52:19</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak December 6, 2009</title>
      <itunes:title>CyberSpeak December 6, 2009</itunes:title>
      <pubDate>Sun, 06 Dec 2009 14:53:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=557072#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/Rt6nKr4zu6Q/index.php]]></link>
      <description><![CDATA[Show Notes for December 6th 2009, we have a great show for you today.
                Today we have an interview with Brian Karney the COO of AccessData.  Brian talks with us about FTK 3.0 and support for Helix. <br/><br/>Ovie makes a stunning confession, listener email, new important changes to Rule 41 of Search and Seizure, Passware Kit 9.5 Decrypts BitLocker Hard Drives, Supports PGP, and Windows 7.
                <br/><br/>Web Sites of the Week:
                <br/><a href="http://">http://www.zagg.com/accessories/zaggsparq.php
                </a><br/><a href="http://">http://ralphlosey.wordpress.com</a> - great resource for legal cyber information
                <br/><a href="http://">http://audiko.net/</a>]]></description>
      
      <content:encoded><![CDATA[Show Notes for December 6th 2009, we have a great show for you today. Today we have an interview with Brian Karney the COO of AccessData. Brian talks with us about FTK 3.0 and support for Helix. Ovie makes a stunning confession, listener email, new important changes to Rule 41 of Search and Seizure, Passware Kit 9.5 Decrypts BitLocker Hard Drives, Supports PGP, and Windows 7. Web Sites of the Week: <a href="http://">http://www.zagg.com/accessories/zaggsparq.php </a><a href="http://">http://ralphlosey.wordpress.com</a> - great resource for legal cyber information <a href="http://">http://audiko.net/</a>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak-113_Dec_12_2009.mp3?dest-id=11283" length="44581448" type="audio/mpeg" />
      <itunes:duration>01:01:55</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak November 29, 2009</title>
      <itunes:title>CyberSpeak November 29, 2009</itunes:title>
      <pubDate>Tue, 01 Dec 2009 14:08:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=555367#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/-eWiQ80LnCc/index.php]]></link>
      <description><![CDATA[CYBERSPEAK Notes - November 29, 2009
                This week in Listener Email, we talk about an alternative way our friends in DOD can listen to the show - Just call (510) 495-6339 and you will hear the latest podcast over the phone.  Twitter as a life line for information during Ft Hood shooting, more on Internet connected jury members and online recon when choosing juries. In the news we discuss Virus planting porn and there is nothing wrong with working with defense.
                This weeks Interview with Drew Fahey - formerly from e-Fense, maker of Helix, now with BLACKBOX.
                **************Web Sites of the Week:
                Ovie:
                http://sixminutes.dlugan.com  - A great public speaking website
                Bret:
                www.lala.com - listen to any song full length...one time
                Â]]></description>
      
      <content:encoded><![CDATA[CYBERSPEAK Notes - November 29, 2009 This week in Listener Email, we talk about an alternative way our friends in DOD can listen to the show - Just call (510) 495-6339 and you will hear the latest podcast over the phone. Twitter as a life line for information during Ft Hood shooting, more on Internet connected jury members and online recon when choosing juries. In the news we discuss Virus planting porn and there is nothing wrong with working with defense. This weeks Interview with Drew Fahey - formerly from e-Fense, maker of Helix, now with BLACKBOX. **************Web Sites of the Week: Ovie: http://sixminutes.dlugan.com - A great public speaking website Bret: www.lala.com - listen to any song full length...one time Â]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak_112_Nov_30_2009.mp3?dest-id=11283" length="33377679" type="audio/mpeg" />
      <itunes:duration>46:21</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak November 22, 2009</title>
      <itunes:title>CyberSpeak November 22, 2009</itunes:title>
      <pubDate>Mon, 23 Nov 2009 15:22:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=552701#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/MlXgUfHEYCU/index.php]]></link>
      <description><![CDATA[Show Notes Here Soon..]]></description>
      
      <content:encoded><![CDATA[Show Notes Here Soon..]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak_111_Nov_22_2009.mp3?dest-id=11283" length="40728571" type="audio/mpeg" />
      <itunes:duration>56:34</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak November 14th 2009</title>
      <itunes:title>CyberSpeak November 14th 2009</itunes:title>
      <pubDate>Sun, 15 Nov 2009 02:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=549266#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/anxhJFqLw7A/index.php]]></link>
      <description><![CDATA[Welcome to CyberSpeak, your computer forensics, computer security, and computer crime podcast.  I am Ovie Carroll, and I am Bret Padres, today is November 14st 2009, and we have a great show for you today.  We have a short show for you this week.  Ovie's on vacation but we are trying not to miss another week so we thought we would bring you a shorter show rather than missing a week. <br/>  <br/>**************Administrative <br/><br/>Ovie<br/>That's right, as we speak I am touring around in the mountains of North Carolina and Tennessee.  me the wife and the dog  <br/><br/>  <br/>**************Listener Email<br/>  <br/>Jim - What affect do you see the buzz word "Cloud Computing" having on computer forensics. <br/>Incident Response<br/>Identify Social Networking, chat clients (twitter and others) web based email, file storage space, etc <br/>identify and issue preservation order<br/><br/><br/>**************News  <br/><br/>http://www.star-telegram.com/local/story/1719591.html<br/>The <a href="http://www.star-telegram.com/local/story/1719591.html">Texas Department of Public Safety</a> plans to reduce its "unacceptable" backlog of computer examinations that are crucial in child pornography investigations, agency Director Steven C. McCraw announced Wednesday.  Currently, 45 examinations are pending at the crime lab, and about half of those involve possible child pornography, according to DPS.<br/>Each examination takes 30 days to several months, depending on the caseâs complexity. <br/><br/>The agency has not set goals on how quickly it hopes to complete examinations because each is different, said Tom Vinger, a DPS spokesman.<br/><br/>Some agencies are actually outsourcing some of their forensic work which i think can be a good thing.<br/><a href="http://www.google.com/dashboard"><br/>www.google.com/dashboard</a><br/>  <br/><br/>**************Tech Topics  <br/><br/>File Saving saving process.<br/>See Documentation at the following links:<br/><br/><a href="http://dl.dropbox.com/u/460886/Timing%20of%20Creating%20phoenix1%20Word%20Document.pdf">Documentation of Creating File 1<br/></a><br/><a href="http://dl.dropbox.com/u/460886/Timing%20of%20Creating%20eggplant%20Word%20Document.pdf">Documentation of Creating File 2</a><br/><a target="_blank" href="http://dl.dropbox.com/u/460886/Timing Chart to Creat File.pdf"><br/>See Chart of File Creation</a><br/><br/><a href="http://dl.dropbox.com/u/460886/create%20eggplant.mov">Watch the movie</a> of how I did it.<br/>  <br/>**************Web Sites  <br/><br/><a href="http://www.Bringfido.com">www.bringfido.com</a><br/><br/><a href="http://www.informationleak.net">www.informationleak.net</a><br/><br type="_moz"/>]]></description>
      
      <content:encoded><![CDATA[Welcome to CyberSpeak, your computer forensics, computer security, and computer crime podcast. I am Ovie Carroll, and I am Bret Padres, today is November 14st 2009, and we have a great show for you today. We have a short show for you this week. Ovie's on vacation but we are trying not to miss another week so we thought we would bring you a shorter show rather than missing a week. **************Administrative OvieThat's right, as we speak I am touring around in the mountains of North Carolina and Tennessee. me the wife and the dog **************Listener Email Jim - What affect do you see the buzz word "Cloud Computing" having on computer forensics. Incident ResponseIdentify Social Networking, chat clients (twitter and others) web based email, file storage space, etc identify and issue preservation order**************News http://www.star-telegram.com/local/story/1719591.htmlThe <a href="http://www.star-telegram.com/local/story/1719591.html">Texas Department of Public Safety</a> plans to reduce its "unacceptable" backlog of computer examinations that are crucial in child pornography investigations, agency Director Steven C. McCraw announced Wednesday. Currently, 45 examinations are pending at the crime lab, and about half of those involve possible child pornography, according to DPS.Each examination takes 30 days to several months, depending on the caseâs complexity. The agency has not set goals on how quickly it hopes to complete examinations because each is different, said Tom Vinger, a DPS spokesman.Some agencies are actually outsourcing some of their forensic work which i think can be a good thing.<a href="http://www.google.com/dashboard">www.google.com/dashboard</a> **************Tech Topics File Saving saving process.See Documentation at the following links:<a href="http://dl.dropbox.com/u/460886/Timing%20of%20Creating%20phoenix1%20Word%20Document.pdf">Documentation of Creating File 1</a><a href="http://dl.dropbox.com/u/460886/Timing%20of%20Creating%20eggplant%20Word%20Document.pdf">Documentation of Creating File 2</a><a target="_blank" href="http://dl.dropbox.com/u/460886/Timing Chart to Creat File.pdf">See Chart of File Creation</a><a href="http://dl.dropbox.com/u/460886/create%20eggplant.mov">Watch the movie</a> of how I did it. **************Web Sites <a href="http://www.Bringfido.com">www.bringfido.com</a><a href="http://www.informationleak.net">www.informationleak.net</a>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak_110_Nov_14_2009.mp3?dest-id=11283" length="22384784" type="audio/mpeg" />
      <itunes:duration>31:05</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>Cyber Speak November 7, 2009</title>
      <itunes:title>Cyber Speak November 7, 2009</itunes:title>
      <pubDate>Sun, 08 Nov 2009 13:47:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=546888#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/6WTt84KGqrY/index.php]]></link>
      <description><![CDATA[<p>Today on Cyberspeak we have an interview with Matt Shannon from <a href="http:///www.f-response.com">f-Response</a> about the new, soon to be released Tactical edition of <a href="http://www.f-response.com">f-Response</a>. Ovieâs on <a href="http://wave.google.com">Google Wave</a> - but no one else is. Listeners email, Windows 7 sold over 200% more in first week of sales than Vista. Sofoâs lab says you still need to run anti-virus on Windows 7. Microsoft, in the Microsoft Security Intelligence Report released yesterday, stated that "The infection rate of Windows Vista SP1 was 61.9 percent less than that of Windows XP SP3." Firefox 3.6 Beta (for Mac Win & Lin) is out for those who like living on the edge and for those forensic examiners that like testing new versions to identify .  <a href="http://www.lawofficer.com/news-and-articles/articles/lom/0508/caught_in_the_web.html">Forensic Evidence Secures Death Penalty-Gang</a> Members use Social Networking Too.  <a href="http://www.ic3.gov/media/2009/091103-1.aspx">IC3 reports</a> increase in compromise of user's online banking credentials target commercial bank accounts </p>
                <p><a href="http://www.computerworld.com/s/article/9140408/Federal_data_protection_law_inches_forward?source=rss_security ">The Personal Data Privacy and Security Act was approved</a> by the Senate Judiciary Committee by a vote of 15-5 The bill would required notifications of not just individuals affected by a data breach, but also, in some cases, credit reporting agencies and the U.S. Secret Service (not FBI). It would establish a new Office of Federal Identity Protection within the FTC. Let's get ready to Rumble earns 400 million in IP revenue. </p>
                <p>Web Sites of the Week: </p>
                <p><a href="http://statbrain.com">http://statbrain.com</a> </p>
                <p><a href="http://www.searchlores.org/defpasslist1.htm">http://www.searchlores.org/defpasslist1.htm</a> </p>]]></description>
      
      <content:encoded><![CDATA[<p>Today on Cyberspeak we have an interview with Matt Shannon from <a href="http:///www.f-response.com">f-Response</a> about the new, soon to be released Tactical edition of <a href="http://www.f-response.com">f-Response</a>. Ovieâs on <a href="http://wave.google.com">Google Wave</a> - but no one else is. Listeners email, Windows 7 sold over 200% more in first week of sales than Vista. Sofoâs lab says you still need to run anti-virus on Windows 7. Microsoft, in the Microsoft Security Intelligence Report released yesterday, stated that "The infection rate of Windows Vista SP1 was 61.9 percent less than that of Windows XP SP3." Firefox 3.6 Beta (for Mac Win & Lin) is out for those who like living on the edge and for those forensic examiners that like testing new versions to identify . <a href="http://www.lawofficer.com/news-and-articles/articles/lom/0508/caught_in_the_web.html">Forensic Evidence Secures Death Penalty-Gang</a> Members use Social Networking Too. <a href="http://www.ic3.gov/media/2009/091103-1.aspx">IC3 reports</a> increase in compromise of user's online banking credentials target commercial bank accounts </p> <p><a href="http://www.computerworld.com/s/article/9140408/Federal_data_protection_law_inches_forward?source=rss_security ">The Personal Data Privacy and Security Act was approved</a> by the Senate Judiciary Committee by a vote of 15-5 The bill would required notifications of not just individuals affected by a data breach, but also, in some cases, credit reporting agencies and the U.S. Secret Service (not FBI). It would establish a new Office of Federal Identity Protection within the FTC. Let's get ready to Rumble earns 400 million in IP revenue. </p> <p>Web Sites of the Week: </p> <p><a href="http://statbrain.com">http://statbrain.com</a> </p> <p><a href="http://www.searchlores.org/defpasslist1.htm">http://www.searchlores.org/defpasslist1.htm</a> </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak_109_Nov_07_2009.mp3?dest-id=11283" length="37928350" type="audio/mpeg" />
      <itunes:duration>52:40</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Nov 1, 2009</title>
      <itunes:title>CyberSpeak Nov 1, 2009</itunes:title>
      <pubDate>Sun, 01 Nov 2009 17:16:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=544398#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/RyHgQNnp56o/index.php]]></link>
      <description><![CDATA[Today Ovie and Bret talk about SANS What Works in Incident Detection, SSD Drives, Data Breach Notification Laws, Rob Lee in Computer World, Tips for the Courtroom, Interview of Joseph Mykytyn from Sky Catcher Solutions, and Linux Boot Disk Forensics Research.
                Web Sites of the Week:
                http://www.zdziarski.com/projects/amberalert/
                http://ceevee.com/
                http://www.bing-vs-google.com/]]></description>
      
      <content:encoded><![CDATA[Today Ovie and Bret talk about SANS What Works in Incident Detection, SSD Drives, Data Breach Notification Laws, Rob Lee in Computer World, Tips for the Courtroom, Interview of Joseph Mykytyn from Sky Catcher Solutions, and Linux Boot Disk Forensics Research. Web Sites of the Week: http://www.zdziarski.com/projects/amberalert/ http://ceevee.com/ http://www.bing-vs-google.com/]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak_108_Nov_1_2009.mp3?dest-id=11283" length="40291614" type="audio/mpeg" />
      <itunes:duration>55:57</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Oct 25 2009</title>
      <itunes:title>CyberSpeak Oct 25 2009</itunes:title>
      <pubDate>Sun, 25 Oct 2009 12:35:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=541580#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/wdbttmAclZQ/index.php]]></link>
      <description><![CDATA[We're BAAAACCCKKK!  After a summer hiatus we are back in the studio again.  Catch up on what we have been doing while we were gone, why Bret did this podcast in the nude, how Bret used F-Response to boot a LiveView image across the network, FTK 3.0, some iPhone apps, and web sites of the week.  We missed you and glad to be back. Send us email at cyberspeak at gmail dot com.  SPECIAL THANKS to George Starcher for doing our audio!!!]]></description>
      
      <content:encoded><![CDATA[We're BAAAACCCKKK! After a summer hiatus we are back in the studio again. Catch up on what we have been doing while we were gone, why Bret did this podcast in the nude, how Bret used F-Response to boot a LiveView image across the network, FTK 3.0, some iPhone apps, and web sites of the week. We missed you and glad to be back. Send us email at cyberspeak at gmail dot com. SPECIAL THANKS to George Starcher for doing our audio!!!]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak_107_Oct_25_2009.mp3?dest-id=11283" length="40830227" type="audio/mpeg" />
      <itunes:duration>56:42</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>Cyber Speak Aug 2009 - The Podcast from the Grave!!</title>
      <itunes:title>Cyber Speak Aug 2009 - The Podcast from the Grave!!</itunes:title>
      <pubDate>Mon, 07 Sep 2009 19:06:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=523753#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/pldv8YcAiH8/index.php]]></link>
      <description><![CDATA[Our live show from SANS What works in Incident Response and Forensics 2009 if here!!!   Lost in a freak Snow Leopard accident involving several rolls of duct tape and a back of Frito's - it has be resurrected!   Audio quality still sketchy but it is here.<br/><br/>So, now you can stop with all of the emails...   Enjoy.<br/><br/>Bret <br/>]]></description>
      
      <content:encoded><![CDATA[Our live show from SANS What works in Incident Response and Forensics 2009 if here!!! Lost in a freak Snow Leopard accident involving several rolls of duct tape and a back of Frito's - it has be resurrected! Audio quality still sketchy but it is here.So, now you can stop with all of the emails... Enjoy.Bret]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Aug_2009_SANS09.mp3?dest-id=11283" length="54289784" type="audio/mpeg" />
      <itunes:duration>56:33</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak July 3, 2009</title>
      <itunes:title>CyberSpeak July 3, 2009</itunes:title>
      <pubDate>Fri, 03 Jul 2009 15:19:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=499143#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/JIsWCh0haAk/index.php]]></link>
      <description><![CDATA[BACK!!!<br/><br/>Bret and Ovie discuss SANS What Works in Forensics and Incident Response Summit 2009, Drive Hell, Firefox 3.5, U.S. Supreme Court ruling on lab analysts in court, and new data breach notification laws on the books.<br/><br/><br type="_moz"/>]]></description>
      
      <content:encoded><![CDATA[BACK!!!Bret and Ovie discuss SANS What Works in Forensics and Incident Response Summit 2009, Drive Hell, Firefox 3.5, U.S. Supreme Court ruling on lab analysts in court, and new data breach notification laws on the books.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_105_Jul_2_2009.mp3?dest-id=11283" length="46445003" type="audio/mpeg" />
      <itunes:duration>48:22</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak April 23, 2009-Caffeine Induced</title>
      <itunes:title>CyberSpeak April 23, 2009-Caffeine Induced</itunes:title>
      <pubDate>Sun, 26 Apr 2009 06:29:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=463624#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/i_3qYn4B__E/index.php]]></link>
      <description><![CDATA[<p style="margin: 0in 0in 0pt;" id="cx7b1" class="MsoNormal">This week on CyberSpeak,
                Autographed Washington Wizards Basketball for sale to support charity
                Samaritans Feet, www.samaritansfeet.org, SANS Forensic Summit Discount
                CodeCYBERSPEAK10, new EnScripts at 42LLC http://42llc.net/index.php?option=com_myblog&Itemid=39, Digital Forensic Challenge www.dfrws.org, discussions about the 2009 Cyber Security Act, Philly RCFL gets ASCLAD, Ft Smith Police Dept overwhelmed with Child Porn cases, Ikena's new video forensics software http://www.matek.co.uk/#/ikena/4532507196, and web picks are: <br/>
                </p>
                <p style="margin: 0in 0in 0pt;" id="zspn4" class="MsoNormal">
                http://www.trapcall.com/
                </p>
                <p style="margin: 0in 0in 0pt;" id="zspn4" class="MsoNormal">
                http://www.google.com/insights/search/#</p>
                http://www.msisac.org/dashboard/Show Notes... Hey Ovie... Show notes got wasted fixing the feed..  I think they were messing it up somehow...
                Good news.. Feed Fixed...
                Bad news... Notes are gone.. :(]]></description>
      
      <content:encoded><![CDATA[<p style="margin: 0in 0in 0pt;" id="cx7b1" class="MsoNormal">This week on CyberSpeak, Autographed Washington Wizards Basketball for sale to support charity Samaritans Feet, www.samaritansfeet.org, SANS Forensic Summit Discount CodeCYBERSPEAK10, new EnScripts at 42LLC http://42llc.net/index.php?option=com_myblog&Itemid=39, Digital Forensic Challenge www.dfrws.org, discussions about the 2009 Cyber Security Act, Philly RCFL gets ASCLAD, Ft Smith Police Dept overwhelmed with Child Porn cases, Ikena's new video forensics software http://www.matek.co.uk/#/ikena/4532507196, and web picks are: </p> <p style="margin: 0in 0in 0pt;" id="zspn4" class="MsoNormal"> http://www.trapcall.com/ </p> <p style="margin: 0in 0in 0pt;" id="zspn4" class="MsoNormal"> http://www.google.com/insights/search/#</p> http://www.msisac.org/dashboard/Show Notes... Hey Ovie... Show notes got wasted fixing the feed.. I think they were messing it up somehow... Good news.. Feed Fixed... Bad news... Notes are gone.. :(]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_104_Apr_23_2009_without.mp3?dest-id=11283" length="21272346" type="audio/mpeg" />
      <itunes:duration>41:20</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak March 22, 2009</title>
      <itunes:title>CyberSpeak March 22, 2009</itunes:title>
      <pubDate>Sun, 22 Mar 2009 18:11:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=446176#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/kgeGBKFIqVc/index.php]]></link>
      <description><![CDATA[Welcome to CyberSpeak, your computer forensics, computer security, and computer crime podcast.  I am Ovie Carroll, and I am Bret Padres, today is March 22, 2009<br/><br/>*****Administrative*****<br/>The <a href="http://www.sans.org/pentesting09_summit/">Sans Forensic Summit</a> is now on the books and scheduled for July 7-8 2009 in Washington DC and <a href="http://www.sans.org/training/bylocation/index_all.php">SANS new Sec 408 Computer Forensics Course</a>.  Also check out the <a href="http://sansforensics.wordpress.com/">Sans Forensic Blog</a> for some GREAT forensic reading. <br/><br/>*****Listener Email*****<br/><br/>*****News*****  <br/><br/><a href="http://">Reading keystrokes with a laser....</a><br/><br/>*****Interview*****<br/>Mark Menz on MFT Ripper â Send email to markmenz@mykeytech.com<br/>2009 HTCIA Conference â <a href="http://www.htcia.org">www.htcia.org</a> or <a href="http://www.htcia2009.com">www.htcia2009.com</a> <br/><br/>*****Tech Topics*****<br/><a href="http://voomtech.com/hc3.html">VOOM TECH HARD COPY III</a><br/><br/><a href="http://www.logicubeforensics.com/products/banner_ads/dfi_ads/dossier.asp">LOGICUBE DOSSIER</a><br/><br/>*****Web Sites******<br/>www.getsatisfaction.com<br/>http://www.newseum.org/todaysfrontpages/ <br/><br type="_moz"/>]]></description>
      
      <content:encoded><![CDATA[Welcome to CyberSpeak, your computer forensics, computer security, and computer crime podcast. I am Ovie Carroll, and I am Bret Padres, today is March 22, 2009*****Administrative*****The <a href="http://www.sans.org/pentesting09_summit/">Sans Forensic Summit</a> is now on the books and scheduled for July 7-8 2009 in Washington DC and <a href="http://www.sans.org/training/bylocation/index_all.php">SANS new Sec 408 Computer Forensics Course</a>. Also check out the <a href="http://sansforensics.wordpress.com/">Sans Forensic Blog</a> for some GREAT forensic reading. *****Listener Email**********News***** <a href="http://">Reading keystrokes with a laser....</a>*****Interview*****Mark Menz on MFT Ripper â Send email to markmenz@mykeytech.com2009 HTCIA Conference â <a href="http://www.htcia.org">www.htcia.org</a> or <a href="http://www.htcia2009.com">www.htcia2009.com</a> *****Tech Topics*****<a href="http://voomtech.com/hc3.html">VOOM TECH HARD COPY III</a><a href="http://www.logicubeforensics.com/products/banner_ads/dfi_ads/dossier.asp">LOGICUBE DOSSIER</a>*****Web Sites******www.getsatisfaction.comhttp://www.newseum.org/todaysfrontpages/]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_103_23_Mar_2009.mp3?dest-id=11283" length="67717937" type="audio/mpeg" />
      <itunes:duration>01:10:32</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak March 15, 2009</title>
      <itunes:title>CyberSpeak March 15, 2009</itunes:title>
      <pubDate>Sun, 15 Mar 2009 14:34:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=443629#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/H16suEVdSak/index.php]]></link>
      <description><![CDATA[Show notes for March 15, 2009<br/>Welcome back CyberSpeak, your computer forensics, computer security, and computer crime podcast.  I am Ovie Carroll, and I am Bret Padres, today is March 15, 2009.<br/><br/>*****Administrative*****<br/>The new Windows Forensic Analysis DVD Toolkit, Second Edition (Paperback)<br/>by Harlan Carvey (Author) is available for preorder through Amazon.<br/><br/><a href="http://www.amazon.com/gp/product/1597494224?tag=multimecom-20]Windows">http://www.amazon.com/gp/product/1597494224?tag=multimecom-20]Windows</a><br/><br/>Put it on your calendar - The Sans 2009 Forensic Summit is now on the books and scheduled for July 7-8 2009 in Washington DC.  Ovie will be there speaking about Current Trends and the Future of Forensics.<br/><br/>*****News*****  <br/><br/>The Digital Forensics Certification Board (DFCB) founded by the National Institute of Justice through a Cooperative<br/>Agreement at the University of Central Florida's National Center for Forensic Science are accepting applications for Founders certification.<br/>For a limited time, March 2, 2009 through August 30, 2009 experienced members of the digital forensics community can achieve these certifications through the Founders Process. Go to <a href="http://www.ncfs.org/dfcb/index.html">http://www.ncfs.org/dfcb/index.html</a> for more information.<br/><br/>The New version of iLook PI is available at <a href="http://www.perlustro.com/">http://www.perlustro.com/</a><br/><br/>*****Interview *****  <br/><br/>Interview With Drew Fahey, Chief Technology Officer for <a href="http://e-fense.com/" target="_blank">e-fense</a> about the new <a href="http://e-fense.com/products.php">Helix3</a><br/><br/>*****Web Sites*****  <br/><br/><a href="http://www.google.com">http://www.google.com</a><br/><a href="http://www.adrive.com/">http://www.adrive.com/</a><br/><br type="_moz"/>Windows powershell 2.0 http://www.microsoft.com/downloadS/details.aspx?familyid=60DEAC2B-975B-41E6-9FA0-C2FD6AA6BC89&displaylang=en]]></description>
      
      <content:encoded><![CDATA[Show notes for March 15, 2009Welcome back CyberSpeak, your computer forensics, computer security, and computer crime podcast. I am Ovie Carroll, and I am Bret Padres, today is March 15, 2009.*****Administrative*****The new Windows Forensic Analysis DVD Toolkit, Second Edition (Paperback)by Harlan Carvey (Author) is available for preorder through Amazon.<a href="http://www.amazon.com/gp/product/1597494224?tag=multimecom-20]Windows">http://www.amazon.com/gp/product/1597494224?tag=multimecom-20]Windows</a>Put it on your calendar - The Sans 2009 Forensic Summit is now on the books and scheduled for July 7-8 2009 in Washington DC. Ovie will be there speaking about Current Trends and the Future of Forensics.*****News***** The Digital Forensics Certification Board (DFCB) founded by the National Institute of Justice through a CooperativeAgreement at the University of Central Florida's National Center for Forensic Science are accepting applications for Founders certification.For a limited time, March 2, 2009 through August 30, 2009 experienced members of the digital forensics community can achieve these certifications through the Founders Process. Go to <a href="http://www.ncfs.org/dfcb/index.html">http://www.ncfs.org/dfcb/index.html</a> for more information.The New version of iLook PI is available at <a href="http://www.perlustro.com/">http://www.perlustro.com/</a>*****Interview ***** Interview With Drew Fahey, Chief Technology Officer for <a href="http://e-fense.com/" target="_blank">e-fense</a> about the new <a href="http://e-fense.com/products.php">Helix3</a>*****Web Sites***** <a href="http://www.google.com">http://www.google.com</a><a href="http://www.adrive.com/">http://www.adrive.com/</a>Windows powershell 2.0 http://www.microsoft.com/downloadS/details.aspx?familyid=60DEAC2B-975B-41E6-9FA0-C2FD6AA6BC89&displaylang=en]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_102_15_2009.mp3?dest-id=11283" length="60543468" type="audio/mpeg" />
      <itunes:duration>01:03:03</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak March 1 2009</title>
      <itunes:title>CyberSpeak March 1 2009</itunes:title>
      <pubDate>Mon, 02 Mar 2009 05:36:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=438897#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/tef-W5-CBWI/index.php]]></link>
      <description><![CDATA[<span lang="EN"><p align="left" dir="ltr">Welcome back to CyberSpeak. Bret and Ovie are back in the country. This show we have an interview with the developers of Highlighter, a new log analysis tool, Jed Mitten - Senior Consultant and Jason Luttgens - Principal Consultant from Mandiant. Check out this free tool at <a href="http://www.mandiant.com/software/highlighter.htm"><font face="Cambria"><span lang="EN">www.mandiant.com/software/highlighter.htm</span></font></a><font face="Cambria"><span lang="EN">. Also, check out the </span></font><a href="http://blog.mandiant.com/"><font face="Cambria"><span lang="EN">Mandiant blog</span></font></a><font face="Cambria"><span lang="EN"> for some other tools. In listener email we discuss U3 thumb drives and encryption and schools doing data recovery without a private investigatorÃs license. </span></font><a href="http://www.youtube.com/watch?v=soBNib2ydt0"><font face="Cambria"><span lang="EN">Helix pro is being released</span></font></a><font face="Cambria"><span lang="EN"> and the Polytechnic University in Brooklyn has discovered a </span></font><a href="http://www.newscientist.com/article/mg20026826.200-digital-images-contain-their-makers-mark.html"><font face="Cambria"><span lang="EN">digital fingerprint</span></font></a><font face="Cambria"><span lang="EN"> that will allow you to tie a digital image to a specific made and model of camera. Web picks are </span></font><a href="http://www.tineye.com/"><font face="Cambria"><span lang="EN">www.tineye.com</span></font></a><font face="Cambria"><span lang="EN"> and </span></font><a href="http://www.spokeo.com/"><font face="Cambria"><span lang="EN">www.spokeo.com</span></font></a><font face="Cambria"><span lang="EN"> . </span></font></p>
                </span><br/>]]></description>
      
      <content:encoded><![CDATA[<p align="left" dir="ltr">Welcome back to CyberSpeak. Bret and Ovie are back in the country. This show we have an interview with the developers of Highlighter, a new log analysis tool, Jed Mitten - Senior Consultant and Jason Luttgens - Principal Consultant from Mandiant. Check out this free tool at <a href="http://www.mandiant.com/software/highlighter.htm">www.mandiant.com/software/highlighter.htm</a>. Also, check out the <a href="http://blog.mandiant.com/">Mandiant blog</a> for some other tools. In listener email we discuss U3 thumb drives and encryption and schools doing data recovery without a private investigatorÃs license. <a href="http://www.youtube.com/watch?v=soBNib2ydt0">Helix pro is being released</a> and the Polytechnic University in Brooklyn has discovered a <a href="http://www.newscientist.com/article/mg20026826.200-digital-images-contain-their-makers-mark.html">digital fingerprint</a> that will allow you to tie a digital image to a specific made and model of camera. Web picks are <a href="http://www.tineye.com/">www.tineye.com</a> and <a href="http://www.spokeo.com/">www.spokeo.com</a> . </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_101_Mar_1_2009.mp3?dest-id=11283" length="64143784" type="audio/mpeg" />
      <itunes:duration>01:06:48</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak January 4 2009</title>
      <itunes:title>CyberSpeak January 4 2009</itunes:title>
      <pubDate>Wed, 31 Dec 2008 20:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=418027#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/4Z9eOC9FULw/index.php]]></link>
      <description><![CDATA[Show notes for January 4, 2009<br/>  <br/>Administrative <br/> <br/>Ovie got a new editing setup for Christmas and his new years resolution is to stop posting substandard chopped up podcasts. :)<br/><br/><a href="http://www.dodcybercrime.com/9CC">DoD Cybercrime Conference</a> â January 26-30, 2009<br/><br/>Review of 2008 New Year predictions...?<br/><br/>Listener Email  <br/><br/>A federal agent sent us an email and a nice donation and said thank you both for the great podcast.  Drake wrote in to make a quick correction :)  Windows Steady State (previously branded as shared access) doesn't require a special partition or unpartitioned space, in fact I don't see that it makes any visible changes to the drive partition setup at all.<br/><br/><a target="_blank" href="http://42llc.net">42 LLC</a> developed some EnScripts that they are offering up to the community for open beta.  If you register an account on our forums you will be able to download the scripts and any updates we publish.<br/>http://42llc.net<br/><br/>News  <br/><br/>If Santa left you a <a href="http://">Samsung digital picture frame, you might want to check it for virus</a>.  The gift giving culprits is the SPF-85H 8-Inch Digital Photo Frames w/1GB Internal Memory, designed to work with Windows-based PCs via a USB connector sold between October and December 2008 for about $150 through Amazon.  <br/><br/><a href="http://www.silicon.com/publicsector/0,3800010403,39363836,00.htm?r=2">Breathalizer for your PC</a>?<br/><br/><a href="http://">New HP Windows Home Server to backup MAC OSX systems</a><br/>December 29, 2008 Hewlett-Packard Co. is adapting its latest MediaSmart Windows home servers to back up customers' Mac computers using the OS X's Time Machine auto-backup feature.<br/><br/>Tech Topics  <br/><br/><a href="http://">VoomTech releases their Hard Copy 3</a>.  Can output to 2 drives without slowing down.  The new SHA256 hashing offers greater strength then the MD5 hash.  At 7.5 GB per minute, HardCopy 3 is the hands-down fastest forensic hard drive duplicator anywhere!  And HardCopy 3 still costs less than our over-priced competitors ($1599)<br/><br/>Web Sites  of the Week<br/><br/>http://now.sprint.com/widget/<br/>http://blip.fm<br/>http://letmegooglethatforyou.com/<br/><br/>]]></description>
      
      <content:encoded><![CDATA[Show notes for January 4, 2009 Administrative Ovie got a new editing setup for Christmas and his new years resolution is to stop posting substandard chopped up podcasts. :)<a href="http://www.dodcybercrime.com/9CC">DoD Cybercrime Conference</a> â January 26-30, 2009Review of 2008 New Year predictions...?Listener Email A federal agent sent us an email and a nice donation and said thank you both for the great podcast. Drake wrote in to make a quick correction :) Windows Steady State (previously branded as shared access) doesn't require a special partition or unpartitioned space, in fact I don't see that it makes any visible changes to the drive partition setup at all.<a target="_blank" href="http://42llc.net">42 LLC</a> developed some EnScripts that they are offering up to the community for open beta. If you register an account on our forums you will be able to download the scripts and any updates we publish.http://42llc.netNews If Santa left you a <a href="http://">Samsung digital picture frame, you might want to check it for virus</a>. The gift giving culprits is the SPF-85H 8-Inch Digital Photo Frames w/1GB Internal Memory, designed to work with Windows-based PCs via a USB connector sold between October and December 2008 for about $150 through Amazon. <a href="http://www.silicon.com/publicsector/0,3800010403,39363836,00.htm?r=2">Breathalizer for your PC</a>?<a href="http://">New HP Windows Home Server to backup MAC OSX systems</a>December 29, 2008 Hewlett-Packard Co. is adapting its latest MediaSmart Windows home servers to back up customers' Mac computers using the OS X's Time Machine auto-backup feature.Tech Topics <a href="http://">VoomTech releases their Hard Copy 3</a>. Can output to 2 drives without slowing down. The new SHA256 hashing offers greater strength then the MD5 hash. At 7.5 GB per minute, HardCopy 3 is the hands-down fastest forensic hard drive duplicator anywhere! And HardCopy 3 still costs less than our over-priced competitors ($1599)Web Sites of the Weekhttp://now.sprint.com/widget/http://blip.fmhttp://letmegooglethatforyou.com/]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_100_Jan_4_2009.mp3?dest-id=11283" length="33863437" type="audio/mpeg" />
      <itunes:duration>35:16</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>Repost Dec 21 Show to fix audio levels</title>
      <itunes:title>Repost Dec 21 Show to fix audio levels</itunes:title>
      <pubDate>Sat, 27 Dec 2008 15:52:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=416640#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/UPa78yklZns/index.php]]></link>
      <description><![CDATA[This is a reposting of the Dec 21, 2008 show to fix the audio levels.  Many thanks to George Starcher!!!  Ovie goofed up the levels.]]></description>
      
      <content:encoded><![CDATA[This is a reposting of the Dec 21, 2008 show to fix the audio levels. Many thanks to George Starcher!!! Ovie goofed up the levels.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Dec20_CyberSpeak.mp3?dest-id=11283" length="20273237" type="audio/mpeg" />
      <itunes:duration>42:14</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak November 16, 2008</title>
      <itunes:title>CyberSpeak November 16, 2008</itunes:title>
      <pubDate>Sat, 15 Nov 2008 16:06:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=403520#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/FbkGXt09rfg/index.php]]></link>
      <description><![CDATA[<span style="font-style: italic;">"Dude, where's my Podcast?!"</span><br/><br/>Today Bret and Ovie talk to Matthew Shannon from <a href="http://www.f-response.com">F-Response</a>!  We discuss a <a href="http://arstechnica.com/news.ars/post/20081029-court-rules-hash-analysis-is-a-fourth-amendment-search.html">ruling</a> on 4th Amendment Search with Hashsets.  <br/><br/><a href="http://www.123people.com/s/harlan+carvey">Harlan Carvey</a> teaches Knitting.<br/><br/><span style="font-weight: bold;">Websites of the Week</span><br/><a href="http://dotsgloves.com">Dots Gloves</a><br/><a href="http://mail.google.com/videochat">Google Video</a><br/><a href="http://oopsimlate.com">Opps I Am Late</a><br/><a href="http://www.google.com/tenthbirthday/#start">Google Tenth Birthday</a><br/><br style="color: rgb(153, 0, 0);"/><span style="color: rgb(153, 0, 0);">And don't forget to go to F-Response.com and take a look at the videos!!</span><br/>]]></description>
      
      <content:encoded><![CDATA["Dude, where's my Podcast?!"Today Bret and Ovie talk to Matthew Shannon from <a href="http://www.f-response.com">F-Response</a>! We discuss a <a href="http://arstechnica.com/news.ars/post/20081029-court-rules-hash-analysis-is-a-fourth-amendment-search.html">ruling</a> on 4th Amendment Search with Hashsets. <a href="http://www.123people.com/s/harlan+carvey">Harlan Carvey</a> teaches Knitting.Websites of the Week<a href="http://dotsgloves.com">Dots Gloves</a><a href="http://mail.google.com/videochat">Google Video</a><a href="http://oopsimlate.com">Opps I Am Late</a><a href="http://www.google.com/tenthbirthday/#start">Google Tenth Birthday</a>And don't forget to go to F-Response.com and take a look at the videos!!]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_98_Nov_16_2008.mp3?dest-id=11283" length="65190590" type="audio/mpeg" />
      <itunes:duration>01:07:54</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Oct 20, 2008</title>
      <itunes:title>CyberSpeak Oct 20, 2008</itunes:title>
      <pubDate>Sat, 25 Oct 2008 11:38:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=396354#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/4sXJNklpg_Q/index.php]]></link>
      <description><![CDATA[This week Ovie and Bret talk about the SANS What Works in Forensics and Incident Response Summit.  We also cover memory imaging with MDD and Volatility.  Website of the week 123people.com.  <br/><br/>Take Care!<br/>]]></description>
      
      <content:encoded><![CDATA[This week Ovie and Bret talk about the SANS What Works in Forensics and Incident Response Summit. We also cover memory imaging with MDD and Volatility. Website of the week 123people.com. Take Care!]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_97_Oct_20_2008.mp3?dest-id=11283" length="30562699" type="audio/mpeg" />
      <itunes:duration>31:50</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak September 28, 2008</title>
      <itunes:title>CyberSpeak September 28, 2008</itunes:title>
      <pubDate>Sun, 28 Sep 2008 19:25:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=385639#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/fUNlkafvC-4/index.php]]></link>
      <description><![CDATA[<p style="margin: 0in 0in 0pt; line-height: normal;" class="MsoNormal"><b id="uuae10"><span style="font-family: 'Courier New';" id="uuae11"><font size="3" id="uuae12">Today, Kevin Mandia is on the show talking about the State of the Incident Response, CyberSpeak Listeners get big discount to <a id="wb73" href="http://www.sans.org/forensics08_summit/" title="SANS Forensic Summit (CODE: Cyberspeak10)">SANS Forensic Summit (CODE: Cyberspeak10)</a>, Ovie and Bret discuss listener email, <a id="h1eb" href="http://www.pcmag.com/article2/0,2704,2329604,00.asp" title="PC Magazine's Cybercrime hall of fame">PC Magazine's Cybercrime hall of fame</a> hackers, <a id="re0e" href="http://www.fbi.gov/pressrel/pressrel08/henry090808.htm" title="Shaun Henry gets a promotion as the new FBI AD Cyber-Division">Shawn Henry gets a promotion as the new FBI AD Cyber-Division</a> and legalalities of boarder searches. Web site picks of the week are </font></span></b>http://vajachoice.com/index1.html and <a href="http://privnote.com/">http://privnote.com</a> </p>]]></description>
      
      <content:encoded><![CDATA[<p style="margin: 0in 0in 0pt; line-height: normal;" class="MsoNormal"><b id="uuae10">Today, Kevin Mandia is on the show talking about the State of the Incident Response, CyberSpeak Listeners get big discount to <a id="wb73" href="http://www.sans.org/forensics08_summit/" title="SANS Forensic Summit (CODE: Cyberspeak10)">SANS Forensic Summit (CODE: Cyberspeak10)</a>, Ovie and Bret discuss listener email, <a id="h1eb" href="http://www.pcmag.com/article2/0,2704,2329604,00.asp" title="PC Magazine's Cybercrime hall of fame">PC Magazine's Cybercrime hall of fame</a> hackers, <a id="re0e" href="http://www.fbi.gov/pressrel/pressrel08/henry090808.htm" title="Shaun Henry gets a promotion as the new FBI AD Cyber-Division">Shawn Henry gets a promotion as the new FBI AD Cyber-Division</a> and legalalities of boarder searches. Web site picks of the week are </b>http://vajachoice.com/index1.html and <a href="http://privnote.com/">http://privnote.com</a> </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_96_Sep_22_2008.mp3?dest-id=11283" length="57746766" type="audio/mpeg" />
      <itunes:duration>01:00:09</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak September 6 2008</title>
      <itunes:title>CyberSpeak September 6 2008</itunes:title>
      <pubDate>Sun, 07 Sep 2008 07:49:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=375507#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/-Gi-5ctWPZE/index.php]]></link>
      <description><![CDATA[<strong><font face="Courier New" size="3">This week, Bret and Ovie talk with Jesse Kornblum about...Fun tricks with computer memory.</font></strong>  In listener email we hear about a 2 year old April Fools joke that is still fooling people, we discuss how a <a id="cf6u" title="Texas law requiring private investigator licenses" href="http://www.brownsvilleherald.com/news/computer_88519___article.html/repairmen_legislators.html" target="_blank">Texas law requiring private investigator licenses</a> could be putting geek squad and other innocent people in violation of the law.  Help is on the way as <a id="smoh" title="FBI opens a new RCFL in Houston" href="http://www.tradingmarkets.com/.site/news/Stock%20News/1761006/" target="_blank">FBI opens a new RCFL in Houston</a>.  In tech topics we discuss an <a id="omr-" title="information leakage paper" href="http://www.darkreading.com/document.asp?doc_id=159192" target="_blank">information leakage paper</a> on <a id="p2yf" title="TrueCrypt" href="http://www.truecrypt.org/" target="_blank">TrueCrypt</a>.  Keep those emails coming at cyberspeak *at* gmail.com.]]></description>
      
      <content:encoded><![CDATA[This week, Bret and Ovie talk with Jesse Kornblum about...Fun tricks with computer memory. In listener email we hear about a 2 year old April Fools joke that is still fooling people, we discuss how a <a id="cf6u" title="Texas law requiring private investigator licenses" href="http://www.brownsvilleherald.com/news/computer_88519___article.html/repairmen_legislators.html" target="_blank">Texas law requiring private investigator licenses</a> could be putting geek squad and other innocent people in violation of the law. Help is on the way as <a id="smoh" title="FBI opens a new RCFL in Houston" href="http://www.tradingmarkets.com/.site/news/Stock%20News/1761006/" target="_blank">FBI opens a new RCFL in Houston</a>. In tech topics we discuss an <a id="omr-" title="information leakage paper" href="http://www.darkreading.com/document.asp?doc_id=159192" target="_blank">information leakage paper</a> on <a id="p2yf" title="TrueCrypt" href="http://www.truecrypt.org/" target="_blank">TrueCrypt</a>. Keep those emails coming at cyberspeak *at* gmail.com.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_95_Sep_6_2008.mp3?dest-id=11283" length="65264178" type="audio/mpeg" />
      <itunes:duration>01:07:59</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak August 3, 2008</title>
      <itunes:title>CyberSpeak August 3, 2008</itunes:title>
      <pubDate>Sat, 02 Aug 2008 21:36:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=365272#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/-aidHmgP-T4/index.php]]></link>
      <description><![CDATA[Today Ovie and Bret clean out the mail bag!  We talk about free forensic tools, the stimulus check, Gadget Track, bypassing the BIOS, imaging RAM and www.getmooh.com.
                <br/><br/>Video instructing people to never talk to the Police is at  http://video.google.com/videoplay?docid=-4097602514885833865<br/><br/>Give us your thoughts about the video....<br/><br/>CYBERSPEAK -at- GMAIL dot COM<br type="_moz"/>]]></description>
      
      <content:encoded><![CDATA[Today Ovie and Bret clean out the mail bag! We talk about free forensic tools, the stimulus check, Gadget Track, bypassing the BIOS, imaging RAM and www.getmooh.com. Video instructing people to never talk to the Police is at http://video.google.com/videoplay?docid=-4097602514885833865Give us your thoughts about the video....CYBERSPEAK -at- GMAIL dot COM]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_94_Aug_3_2008.mp3?dest-id=11283" length="49418827" type="audio/mpeg" />
      <itunes:duration>51:28</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak July 19, 2008</title>
      <itunes:title>CyberSpeak July 19, 2008</itunes:title>
      <pubDate>Sat, 19 Jul 2008 13:03:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=360462#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/Ms6CtYjUwBo/index.php]]></link>
      <description><![CDATA[Bret and Ovie are back!  (Yeah, Bret and Ovie - Not Ovie and Bret)  :)
                Today they talk about low cost forensic imaging, <a href=" http://blog.wired.com/cars/2008/06/hackers-crack-l.html    ">hacking the London Tube</a>, American Boat Co v. Unknown Sunken Barget I & II, modify your <a href="http://tnkgrl.wordpress.com/">Macbook Air DVD drive</a>, the <a href=" http://www.eye.fi/ ">Eye-Fi card</a>, <a href="http://www.gadgettrak.com">Gadget Track</a>, <a href="http://tripit.com">Tripit</a>, and <a href="http://glassdoor.com">Glassdoor</a>.
                <br/><br/>The forensic exam report we refer to is here:  http://blogs.csoonline.com/files/Forensic%20Report.pdf<br/><br/>Ovie and I are back from travel and hope to have more new shows soon!!<br/><br/>OUR EMAIL ADDRESS IS CYBERSPEAK -at- GMAIL.COM<br type="_moz"/>]]></description>
      
      <content:encoded><![CDATA[Bret and Ovie are back! (Yeah, Bret and Ovie - Not Ovie and Bret) :) Today they talk about low cost forensic imaging, <a href=" http://blog.wired.com/cars/2008/06/hackers-crack-l.html ">hacking the London Tube</a>, American Boat Co v. Unknown Sunken Barget I & II, modify your <a href="http://tnkgrl.wordpress.com/">Macbook Air DVD drive</a>, the <a href=" http://www.eye.fi/ ">Eye-Fi card</a>, <a href="http://www.gadgettrak.com">Gadget Track</a>, <a href="http://tripit.com">Tripit</a>, and <a href="http://glassdoor.com">Glassdoor</a>. The forensic exam report we refer to is here: http://blogs.csoonline.com/files/Forensic%20Report.pdfOvie and I are back from travel and hope to have more new shows soon!!OUR EMAIL ADDRESS IS CYBERSPEAK -at- GMAIL.COM]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSPeak_93_July_19_2008.mp3?dest-id=11283" length="59138153" type="audio/mpeg" />
      <itunes:duration>01:01:36</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak June 28, 2008</title>
      <itunes:title>CyberSpeak June 28, 2008</itunes:title>
      <pubDate>Sun, 29 Jun 2008 16:54:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=354187#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/Ib_zzSPXWZI/index.php]]></link>
      <description><![CDATA[<p class="MsoNormal"><font face="Calibri"><font size="3">This
                week we discuss Brets new Kendle, Ovieâs new neat receipts and givce a
                secret to listen to podcasts twice as fast as before.<span>   </span>The episode focused on forensic news and legal decisions of interest, specifically a APC pirate being convicted, a <a href="http://news.zdnet.co.uk/security/0,1000000189,39429909,00.htm">study that </a></font><span><a href="http:///">reports 68 percent</a> of all internet-based malware was now being hosted on legitimate sites, <a href="http://www.theregister.co.uk/2008/06/11/botherder_admits_to_ddos_assault/print.html">Bot-herder Greg King</a> is found guilty on two counts for launching a DDOS against <a href="http://www.castlecops.com/">Castel Cops</a>, and <a href="http://cyberforensics.purdue.edu/">Perdue offering Mac Forensics training</a> for 100 law enforcement.<span>  </span>In legal news, we discuss Reasonable expectation of privacy and an <a href="http://circuit9.blogspot.com/2008/06/case-o-week-computer-containers-theory.html">allegation a warrant did not have probable cause</a> for a <a href="http://www.deanboland.com/files.cfm?fileID=69">computer search.</a> Web sites of the week included </span></font><a href="http://www.zinio.com/"><span><font face="Calibri" color="#0000ff">www.zinio.com</font></span></a><font face="Calibri"><span> and </span><span><a href="http://fedorahosted.org/liveusb-creator">http://fedorahosted.org/liveusb-creator</a>.  <br/></span></font></p>
                Mac Forensic Training at Purdue university, Email Marcus for more info at rogersmk@purdue.edu.
                Study reports 68 percent of all internet-based malware was now being hosted on legitimate sites. http://news.zdnet.co.uk/security/0,1000000189,39429909,00.htm
                Barry Gitarts, 25, of Brooklyn, N.Y., was convicted today by a jury in the Eastern District of Virginia of conspiracy to commit criminal copyright infringement
                Fedora live cd creator https://fedorahosted.org/liveusb-creator]]></description>
      
      <content:encoded><![CDATA[<p class="MsoNormal">This week we discuss Brets new Kendle, Ovieâs new neat receipts and givce a secret to listen to podcasts twice as fast as before. The episode focused on forensic news and legal decisions of interest, specifically a APC pirate being convicted, a <a href="http://news.zdnet.co.uk/security/0,1000000189,39429909,00.htm">study that </a><a href="http:///">reports 68 percent</a> of all internet-based malware was now being hosted on legitimate sites, <a href="http://www.theregister.co.uk/2008/06/11/botherder_admits_to_ddos_assault/print.html">Bot-herder Greg King</a> is found guilty on two counts for launching a DDOS against <a href="http://www.castlecops.com/">Castel Cops</a>, and <a href="http://cyberforensics.purdue.edu/">Perdue offering Mac Forensics training</a> for 100 law enforcement. In legal news, we discuss Reasonable expectation of privacy and an <a href="http://circuit9.blogspot.com/2008/06/case-o-week-computer-containers-theory.html">allegation a warrant did not have probable cause</a> for a <a href="http://www.deanboland.com/files.cfm?fileID=69">computer search.</a> Web sites of the week included <a href="http://www.zinio.com/">www.zinio.com</a> and <a href="http://fedorahosted.org/liveusb-creator">http://fedorahosted.org/liveusb-creator</a>. </p> Mac Forensic Training at Purdue university, Email Marcus for more info at rogersmk@purdue.edu. Study reports 68 percent of all internet-based malware was now being hosted on legitimate sites. http://news.zdnet.co.uk/security/0,1000000189,39429909,00.htm Barry Gitarts, 25, of Brooklyn, N.Y., was convicted today by a jury in the Eastern District of Virginia of conspiracy to commit criminal copyright infringement Fedora live cd creator https://fedorahosted.org/liveusb-creator]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_92_June_28_2008.mp3?dest-id=11283" length="44364130" type="audio/mpeg" />
      <itunes:duration>46:12</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak June 15, 2008</title>
      <itunes:title>CyberSpeak June 15, 2008</itunes:title>
      <pubDate>Fri, 20 Jun 2008 03:43:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=351361#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/0iRgnaR1wGw/index.php]]></link>
      <description><![CDATA[This is a repost to fix bad audio file.
                <p class="MsoNormal"><font face="Calibri"><font size="3">Happy Fathers Day!<span>  </span>This week we discuss Brets new Kendle, Ovieâs new neat receipts and givce a secret to listen to podcasts twice as fast as before.<span>   </span>The episode focused on forensic news and legal decisions of interest, specifically a APC pirate being convicted, a <a href="http://news.zdnet.co.uk/security/0,1000000189,39429909,00.htm">study that </a></font><span><a href="http://">reports 68 percent</a> of all internet-based malware was now being hosted on legitimate sites, <a href="http://www.theregister.co.uk/2008/06/11/botherder_admits_to_ddos_assault/print.html">Bot-herder Greg King</a> is found guilty on two counts for launching a DDOS against <a href="http://www.castlecops.com/">Castel Cops</a>, and <a href="http://cyberforensics.purdue.edu/">Perdue offering Mac Forensics training</a> for 100 law enforcement.<span>  </span>In legal news, we discuss Reasonable expectation of privacy and an <a href="http://circuit9.blogspot.com/2008/06/case-o-week-computer-containers-theory.html">allegation a warrant did not have probable cause</a> for a <a href="http://www.deanboland.com/files.cfm?fileID=69">computer search.</a> Web sites of the week included </span></font><a href="http://www.zinio.com/"><span><font face="Calibri" color="#0000ff">www.zinio.com</font></span></a><font face="Calibri"><span> and </span><span><a href="http://fedorahosted.org/liveusb-creator">http://fedorahosted.org/liveusb-creator</a>.  </span></font></p>]]></description>
      
      <content:encoded><![CDATA[This is a repost to fix bad audio file. <p class="MsoNormal">Happy Fathers Day! This week we discuss Brets new Kendle, Ovieâs new neat receipts and givce a secret to listen to podcasts twice as fast as before. The episode focused on forensic news and legal decisions of interest, specifically a APC pirate being convicted, a <a href="http://news.zdnet.co.uk/security/0,1000000189,39429909,00.htm">study that </a><a href="http://">reports 68 percent</a> of all internet-based malware was now being hosted on legitimate sites, <a href="http://www.theregister.co.uk/2008/06/11/botherder_admits_to_ddos_assault/print.html">Bot-herder Greg King</a> is found guilty on two counts for launching a DDOS against <a href="http://www.castlecops.com/">Castel Cops</a>, and <a href="http://cyberforensics.purdue.edu/">Perdue offering Mac Forensics training</a> for 100 law enforcement. In legal news, we discuss Reasonable expectation of privacy and an <a href="http://circuit9.blogspot.com/2008/06/case-o-week-computer-containers-theory.html">allegation a warrant did not have probable cause</a> for a <a href="http://www.deanboland.com/files.cfm?fileID=69">computer search.</a> Web sites of the week included <a href="http://www.zinio.com/">www.zinio.com</a> and <a href="http://fedorahosted.org/liveusb-creator">http://fedorahosted.org/liveusb-creator</a>. </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_91-2_June_15_2008.mp3?dest-id=11283" length="44273222" type="audio/mpeg" />
      <itunes:duration>46:07</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak_June_1_2008</title>
      <itunes:title>CyberSpeak_June_1_2008</itunes:title>
      <pubDate>Sun, 01 Jun 2008 16:25:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=345398#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/U0PJtwLF_cY/index.php]]></link>
      <description><![CDATA[<p>Memorial Day Posdcast and interview tih Mark McKinnon from <a href="http://redwolfcomputerforensics.com">Red Wolf Computer Forensics</a> about his <a href="http://redwolfcomputerforensics.com/downloads/CSC_Parser.zip">CSC Parser</a>.  It can be downloaded from here <a href="http://redwolfcomputerforensics.com/downloads/CSC_Parser.zip">http://redwolfcomputerforensics.com/downloads/CSC_Parser.zip</a> . Also check out his blog at <a href="http://cfed-ttf.blogspot.com">http://cfed-ttf.blogspot.com</a> </p>]]></description>
      
      <content:encoded><![CDATA[<p>Memorial Day Posdcast and interview tih Mark McKinnon from <a href="http://redwolfcomputerforensics.com">Red Wolf Computer Forensics</a> about his <a href="http://redwolfcomputerforensics.com/downloads/CSC_Parser.zip">CSC Parser</a>. It can be downloaded from here <a href="http://redwolfcomputerforensics.com/downloads/CSC_Parser.zip">http://redwolfcomputerforensics.com/downloads/CSC_Parser.zip</a> . Also check out his blog at <a href="http://cfed-ttf.blogspot.com">http://cfed-ttf.blogspot.com</a> </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak_May_29_with_Mark.mp3?dest-id=11283" length="26233920" type="audio/mpeg" />
      <itunes:duration>36:26</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak May 10 2008</title>
      <itunes:title>CyberSpeak May 10 2008</itunes:title>
      <pubDate>Mon, 12 May 2008 10:42:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=338588#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/IrzE05KejNs/index.php]]></link>
      <description><![CDATA[This week, Bret and Ovie interview Al Lewis from <a href="http://subrosasoft.com/">Subrosasoft</a> http://www.macforensicslab.com about the <a href="http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=product_info&cPath=12&products_id=2&zenid=5d755aff7982e332efa950329709c88a">Mac Lockpick</a>. We discuss the new Mac lockpick that can be preconfigured to collect volatile data on Windows, Mac and Linux System. This is the first cross platform utility we have seen. Web sites of the week include <a href=" http://www.flyclear.com/referafriend">www.flyclear.com</a> - use refer a friend code: DSCAM1127098<br/>and Ovie gets an extra month free. Oh, and I forgot Bret's web site but will find it and get it posted soon....I am sure it was a MAC website.]]></description>
      
      <content:encoded><![CDATA[This week, Bret and Ovie interview Al Lewis from <a href="http://subrosasoft.com/">Subrosasoft</a> http://www.macforensicslab.com about the <a href="http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=product_info&cPath=12&products_id=2&zenid=5d755aff7982e332efa950329709c88a">Mac Lockpick</a>. We discuss the new Mac lockpick that can be preconfigured to collect volatile data on Windows, Mac and Linux System. This is the first cross platform utility we have seen. Web sites of the week include <a href=" http://www.flyclear.com/referafriend">www.flyclear.com</a> - use refer a friend code: DSCAM1127098and Ovie gets an extra month free. Oh, and I forgot Bret's web site but will find it and get it posted soon....I am sure it was a MAC website.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_89_May_10_2008.mp3?dest-id=11283" length="40797317" type="audio/mpeg" />
      <itunes:duration>42:29</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak April 27 2008</title>
      <itunes:title>CyberSpeak April 27 2008</itunes:title>
      <pubDate>Sun, 27 Apr 2008 16:57:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=333395#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/5L9jg7HeM70/index.php]]></link>
      <description><![CDATA[<p>This week, Ovie's back from SANS, Bret's on his way back to Kuwait. This week Ovie and Bret answer some great listener email.  Imaging an Apple XRaid, <a href="http://www.siliconvalley.com/opinion/ci_8917598?nclick_check=1&forced=true" title="Google getting into the game of image recognition">Google getting into the game of image recognition</a> to help identify people exploiting children, Andrew sent in a <a href="http://www.garykessler.net/library/file_sigs.html" title="website with a great collection of file signatures">website with a great collection of file signatures</a>, and Web Sites of the week are <a href="http://www.krischeonline.com/index.php?option=com_content&view=article&id=46" title="Netflix Thief Caught in the Act">Netflix Thief Caught in the Act</a> and <a href="http://www.southparkstudios.com/"><font color="#551a8b">http://www.southparkstudios.com/</font></a> and <a href="http://www.mesh.com/" title="Windows Live Mesh">Windows Live Mesh</a> </p>
                <p>  </p>]]></description>
      
      <content:encoded><![CDATA[<p>This week, Ovie's back from SANS, Bret's on his way back to Kuwait. This week Ovie and Bret answer some great listener email. Imaging an Apple XRaid, <a href="http://www.siliconvalley.com/opinion/ci_8917598?nclick_check=1&forced=true" title="Google getting into the game of image recognition">Google getting into the game of image recognition</a> to help identify people exploiting children, Andrew sent in a <a href="http://www.garykessler.net/library/file_sigs.html" title="website with a great collection of file signatures">website with a great collection of file signatures</a>, and Web Sites of the week are <a href="http://www.krischeonline.com/index.php?option=com_content&view=article&id=46" title="Netflix Thief Caught in the Act">Netflix Thief Caught in the Act</a> and <a href="http://www.southparkstudios.com/">http://www.southparkstudios.com/</a> and <a href="http://www.mesh.com/" title="Windows Live Mesh">Windows Live Mesh</a> </p> <p> </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_88_Apr_26_2008.mp3?dest-id=11283" length="48031370" type="audio/mpeg" />
      <itunes:duration>50:01</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak April 13, 2008</title>
      <itunes:title>CyberSpeak April 13, 2008</itunes:title>
      <pubDate>Sun, 13 Apr 2008 14:42:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=328191#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/A9_pQnaXHmY/index.php]]></link>
      <description><![CDATA[Bret and Ovie discuss Didier's email and the possibility of web browser prefetching links in an FBI sting operation. Michael helps clarify the OLD phpBB vulnerability, the UK's founding <a href="http://www.vnunet.com/vnunet/news/2214044/uk-top-computer-forensics">forensic father escapes a jail</a> sentence for fraud and Kerry sent in a <a href="http://www.e-evidence.info/thiefs_page.html">list of hundreds of forensic PDF files</a> and makes sure we knew about Quickview Plus (we also suggest <a href="http://www.cerious.com/thumbnails.shtml">Thumbs plus</a> for reviewing large number of graphics). Symantec Corporation released their <a href="http://arstechnica.com/news.ars/post/20080410-report-microsoft-fastest-to-issue-os-patches-sun-slowest.html">comprehensive security report</a> on the malware industry and Microsoft turns out to be the Best at patching vulnerabilities the quickest. <a href="http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xiii_04-2008.en-us.pdf">The full report is available here</a>.  Bret and Ovie discuss Skype and the technical data points of interest when conducting forensics.  Web sites of the week include <a href="https://www1.teleflip.com/">Teleflip</a> and <a href="http://twitter.com/">Twitter</a> as we are now trying to tweetâ.erâtwitter.  Follow <a href="http://twitter.com/bpadres">Bret</a> and <a href="http://twitter.com/ovie">Ovie</a>.]]></description>
      
      <content:encoded><![CDATA[Bret and Ovie discuss Didier's email and the possibility of web browser prefetching links in an FBI sting operation. Michael helps clarify the OLD phpBB vulnerability, the UK's founding <a href="http://www.vnunet.com/vnunet/news/2214044/uk-top-computer-forensics">forensic father escapes a jail</a> sentence for fraud and Kerry sent in a <a href="http://www.e-evidence.info/thiefs_page.html">list of hundreds of forensic PDF files</a> and makes sure we knew about Quickview Plus (we also suggest <a href="http://www.cerious.com/thumbnails.shtml">Thumbs plus</a> for reviewing large number of graphics). Symantec Corporation released their <a href="http://arstechnica.com/news.ars/post/20080410-report-microsoft-fastest-to-issue-os-patches-sun-slowest.html">comprehensive security report</a> on the malware industry and Microsoft turns out to be the Best at patching vulnerabilities the quickest. <a href="http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xiii_04-2008.en-us.pdf">The full report is available here</a>. Bret and Ovie discuss Skype and the technical data points of interest when conducting forensics. Web sites of the week include <a href="https://www1.teleflip.com/">Teleflip</a> and <a href="http://twitter.com/">Twitter</a> as we are now trying to tweetâ.erâtwitter. Follow <a href="http://twitter.com/bpadres">Bret</a> and <a href="http://twitter.com/ovie">Ovie</a>.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_87_Apr_13_2008.mp3?dest-id=11283" length="47862261" type="audio/mpeg" />
      <itunes:duration>49:51</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak March 31 2008</title>
      <itunes:title>CyberSpeak March 31 2008</itunes:title>
      <pubDate>Tue, 01 Apr 2008 21:50:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=323918#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/PX4rer7pIIU/index.php]]></link>
      <description><![CDATA[Bret and Ovie discuss a listeners question about a <a href="http://">sting operation to lure people wanting to look at child porn to click on a fake web link</a> and get busted for âattempted possession of child pornâ?.  What do you think? Fair or Unfair? We think it is NOT entrapment but could be too close to the line.  Itâs <a href="http://blogs.guardian.co.uk/technology/2008/03/28/macbook_air_first_to_fall_in_hacking_contest_vs_vista_and_linux.html">Miller Time after hacking an Apple in 2 minutes</a> and <a href="http://www.securityfocus.com/brief/703">Vista proves more secure than apple in CanSecWest</a>. The government can now <a href="http://www.securityfocus.com/brief/703">wiretap for a week before submitting a request to wiretap suspected terrorist</a>.  <a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9068778&source=rss_topic17">The King of Spam gets 26 years in jail</a>.  A new <a href="http://www.vnunet.com/vnunet/news/2212123/second-mass-hack-reported">vulnerability affecting PHPbb sites,</a> 30 months in prison for <a href="http://www.securityfocus.com/brief/702">spoofing telephone numbers and placing phony emergency calls to manipulate police SWAT</a> teams, Websites of the week include <a href="http://stuffwhitepeoplelike.wordpress.com/">Stuff White People Like</a>,  and
                A special tech tip - append â<span style="color: rgb(204, 0, 0);">&fmt=6</span>â? (NO QUOTES) to the URL of your You Tube Video for better resolution.]]></description>
      
      <content:encoded><![CDATA[Bret and Ovie discuss a listeners question about a <a href="http://">sting operation to lure people wanting to look at child porn to click on a fake web link</a> and get busted for âattempted possession of child pornâ?. What do you think? Fair or Unfair? We think it is NOT entrapment but could be too close to the line. Itâs <a href="http://blogs.guardian.co.uk/technology/2008/03/28/macbook_air_first_to_fall_in_hacking_contest_vs_vista_and_linux.html">Miller Time after hacking an Apple in 2 minutes</a> and <a href="http://www.securityfocus.com/brief/703">Vista proves more secure than apple in CanSecWest</a>. The government can now <a href="http://www.securityfocus.com/brief/703">wiretap for a week before submitting a request to wiretap suspected terrorist</a>. <a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9068778&source=rss_topic17">The King of Spam gets 26 years in jail</a>. A new <a href="http://www.vnunet.com/vnunet/news/2212123/second-mass-hack-reported">vulnerability affecting PHPbb sites,</a> 30 months in prison for <a href="http://www.securityfocus.com/brief/702">spoofing telephone numbers and placing phony emergency calls to manipulate police SWAT</a> teams, Websites of the week include <a href="http://stuffwhitepeoplelike.wordpress.com/">Stuff White People Like</a>, and A special tech tip - append â&fmt=6â? (NO QUOTES) to the URL of your You Tube Video for better resolution.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_86_Mar_29_2008.mp3?dest-id=11283" length="41247892" type="audio/mpeg" />
      <itunes:duration>42:57</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak March 31 2008</title>
      <itunes:title>CyberSpeak March 31 2008</itunes:title>
      <pubDate>Tue, 01 Apr 2008 17:50:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=323918#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/PX4rer7pIIU/index.php]]></link>
      <description><![CDATA[Bret and Ovie discuss a listeners question about a <a href="http://">sting operation to lure people wanting to look at child porn to click on a fake web link</a> and get busted for âattempted possession of child pornâ?.  What do you think? Fair or Unfair? We think it is NOT entrapment but could be too close to the line.  Itâs <a href="http://blogs.guardian.co.uk/technology/2008/03/28/macbook_air_first_to_fall_in_hacking_contest_vs_vista_and_linux.html">Miller Time after hacking an Apple in 2 minutes</a> and <a href="http://www.securityfocus.com/brief/703">Vista proves more secure than apple in CanSecWest</a>. The government can now <a href="http://www.securityfocus.com/brief/703">wiretap for a week before submitting a request to wiretap suspected terrorist</a>.  <a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9068778&source=rss_topic17">The King of Spam gets 26 years in jail</a>.  A new <a href="http://www.vnunet.com/vnunet/news/2212123/second-mass-hack-reported">vulnerability affecting PHPbb sites,</a> 30 months in prison for <a href="http://www.securityfocus.com/brief/702">spoofing telephone numbers and placing phony emergency calls to manipulate police SWAT</a> teams, Websites of the week include <a href="http://stuffwhitepeoplelike.wordpress.com/">Stuff White People Like</a>,  and
                A special tech tip - append â<span style="color: rgb(204, 0, 0);">&fmt=6</span>â? (NO QUOTES) to the URL of your You Tube Video for better resolution.]]></description>
      
      <content:encoded><![CDATA[Bret and Ovie discuss a listeners question about a <a href="http://">sting operation to lure people wanting to look at child porn to click on a fake web link</a> and get busted for âattempted possession of child pornâ?. What do you think? Fair or Unfair? We think it is NOT entrapment but could be too close to the line. Itâs <a href="http://blogs.guardian.co.uk/technology/2008/03/28/macbook_air_first_to_fall_in_hacking_contest_vs_vista_and_linux.html">Miller Time after hacking an Apple in 2 minutes</a> and <a href="http://www.securityfocus.com/brief/703">Vista proves more secure than apple in CanSecWest</a>. The government can now <a href="http://www.securityfocus.com/brief/703">wiretap for a week before submitting a request to wiretap suspected terrorist</a>. <a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9068778&source=rss_topic17">The King of Spam gets 26 years in jail</a>. A new <a href="http://www.vnunet.com/vnunet/news/2212123/second-mass-hack-reported">vulnerability affecting PHPbb sites,</a> 30 months in prison for <a href="http://www.securityfocus.com/brief/702">spoofing telephone numbers and placing phony emergency calls to manipulate police SWAT</a> teams, Websites of the week include <a href="http://stuffwhitepeoplelike.wordpress.com/">Stuff White People Like</a>, and A special tech tip - append â&fmt=6â? (NO QUOTES) to the URL of your You Tube Video for better resolution.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_86_Mar_29_2008.mp3?dest-id=11283" length="41247892" type="audio/mpeg" />
      <itunes:duration>42:57</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak March 16 2008</title>
      <itunes:title>CyberSpeak March 16 2008</itunes:title>
      <pubDate>Mon, 24 Mar 2008 16:21:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=320998#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/CHqulCKRjuI/index.php]]></link>
      <description><![CDATA[This week Ovie talks about Samaritans Feet in South East DC, calendar syncing problems, Plaxo suggested by two listeners.   A programming mistake leads to a G-Archiver reveationâand 1700 other peopleâs passwords. Ovie and Bret discuss WiebeTechâs fantastic new forensic combo dock.  Web site of the week is Programmers Notepad]]></description>
      
      <content:encoded><![CDATA[This week Ovie talks about Samaritans Feet in South East DC, calendar syncing problems, Plaxo suggested by two listeners. A programming mistake leads to a G-Archiver reveationâand 1700 other peopleâs passwords. Ovie and Bret discuss WiebeTechâs fantastic new forensic combo dock. Web site of the week is Programmers Notepad]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_85_Mar_16_2008.mp3?dest-id=11283" length="47573287" type="audio/mpeg" />
      <itunes:duration>49:33</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak March 8, 2008</title>
      <itunes:title>CyberSpeak March 8, 2008</itunes:title>
      <pubDate>Mon, 10 Mar 2008 09:50:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=316018#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/d1tzOK0bLls/index.php]]></link>
      <description><![CDATA[Today Bret and Ovie talk with Dr. Simson Garfinkel about the Advanced Forensic Format (AFF).  We also cover listener feedback and a Judge raps forensic expert for delaying child-porn cases.
                LINKS:  www.afflib.org
                www.alberteinstein.info/
                google.com/calendar
                We apologize for some of the audio quality during the interview with Dr. Garfinkel.
                Thanks again for listening!!! Spread the word!]]></description>
      
      <content:encoded><![CDATA[Today Bret and Ovie talk with Dr. Simson Garfinkel about the Advanced Forensic Format (AFF). We also cover listener feedback and a Judge raps forensic expert for delaying child-porn cases. LINKS: www.afflib.org www.alberteinstein.info/ google.com/calendar We apologize for some of the audio quality during the interview with Dr. Garfinkel. Thanks again for listening!!! Spread the word!]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_84_Mar_8_2008.mp3?dest-id=11283" length="67984112" type="audio/mpeg" />
      <itunes:duration>01:10:49</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Feb 17 2008</title>
      <itunes:title>CyberSpeak Feb 17 2008</itunes:title>
      <pubDate>Mon, 18 Feb 2008 16:52:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=308794#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/ZJmDeNFfm7k/index.php]]></link>
      <description><![CDATA[Show notes soon]]></description>
      
      <content:encoded><![CDATA[Show notes soon]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_83_Feb17_2008.mp3?dest-id=11283" length="44491804" type="audio/mpeg" />
      <itunes:duration>46:20</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>Cyberspeak Feb 10, 2008</title>
      <itunes:title>Cyberspeak Feb 10, 2008</itunes:title>
      <pubDate>Sun, 10 Feb 2008 14:43:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=305836#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/ZveOOiMlnQw/index.php]]></link>
      <description><![CDATA[<p class="MsoNormal"><span>This week on Cyberspeak, Ovieâs <a href="http://www.invisibleshield.com/"><font color="#800080">Invisible Shield</font></a> came in for his blackberry and he loves it. We discuss <a href="http://www.volokh.com/archives/archive_2007_12_16-2007_12_22.shtml#1197763604">US v Boucher</a> and the Fifth Amendment protection not to be compelled to disclose passwords. For some great reading on the issue, <a href="http://cyb3rcrim3.blogspot.com/2007/12/court-upholds-using-fifth-amendment-to.html"><font color="#800080">check out Susan Brennerâs blog post</font></a>. Department of Defense considers <a href="http://www.fcw.com/online/news/151440-1.html">cutting off all non-official Internet access</a>.<span>  </span><span> </span>We discuss whole disk encryption and new advertised features in <a href="http://www.truecrypt.org/"><font color="#800080">True Crypt V5</font></a>.<span>  </span>We discuss <a href="http://www.nuix.com/Forensic-Desktop.asp?active_page_id=114"><font color="#800080">Nuix, a new forensic utility</font></a> with special application for analysis of emails.<span>  </span>Do you encrypt you forensic images before transport?<span>  </span>Ovieâs Web site pick of the week is <a href="http://www.bureauofcommunication.com/compose/apology">http://www.bureauofcommunication.com/compose/apology</a></span><span> </span><span>and Bretâs is</span><span> </span><span><a href="http://www.fourmilab.ch/hackdiet/www/hackdietf.html">Hackers Diet</a>. </span></p>]]></description>
      
      <content:encoded><![CDATA[<p class="MsoNormal">This week on Cyberspeak, Ovieâs <a href="http://www.invisibleshield.com/">Invisible Shield</a> came in for his blackberry and he loves it. We discuss <a href="http://www.volokh.com/archives/archive_2007_12_16-2007_12_22.shtml#1197763604">US v Boucher</a> and the Fifth Amendment protection not to be compelled to disclose passwords. For some great reading on the issue, <a href="http://cyb3rcrim3.blogspot.com/2007/12/court-upholds-using-fifth-amendment-to.html">check out Susan Brennerâs blog post</a>. Department of Defense considers <a href="http://www.fcw.com/online/news/151440-1.html">cutting off all non-official Internet access</a>. We discuss whole disk encryption and new advertised features in <a href="http://www.truecrypt.org/">True Crypt V5</a>. We discuss <a href="http://www.nuix.com/Forensic-Desktop.asp?active_page_id=114">Nuix, a new forensic utility</a> with special application for analysis of emails. Do you encrypt you forensic images before transport? Ovieâs Web site pick of the week is <a href="http://www.bureauofcommunication.com/compose/apology">http://www.bureauofcommunication.com/compose/apology</a> and Bretâs is <a href="http://www.fourmilab.ch/hackdiet/www/hackdietf.html">Hackers Diet</a>. </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_82_Feb_9_2008.mp3?dest-id=11283" length="43731194" type="audio/mpeg" />
      <itunes:duration>45:33</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak January 14, 2008</title>
      <itunes:title>CyberSpeak January 14, 2008</itunes:title>
      <pubDate>Tue, 15 Jan 2008 15:50:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=297144#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/_4j9Hiegrgg/index.php]]></link>
      <description><![CDATA[Happy New Year...Today Bret and Ovie talk about 2008 Predictions.  We also talk about Bret breaking his IPhone, <a href="http://www.blackhat.com">Black Hat</a> DC, <a href="http://events.apple.com.edgesuite.net/f27853y2/event/index.html?internal=fj2l3s9dm">Mac World 2008</a>, security vulnerabilities in the new <a href="http://www.wired.com/politics/security/news/2008/01/dreamliner_security">Boeing 787</a>, Bill Gates retirement <a href="http://gizmodo.com/341380/bill-gates-envisions-life-after-microsoft-in-keynote-video">video</a>, <a href="http://www.cybercrime.gov">www.cybercrime.gov</a>, very quick way to wipe a hard drive with badblocks, <a href="http://www.baselinemag.com/article2/0,1540,2242720,00.asp ">private investigator story</a> in the news again, search of computer in tax fraud investigation was ruled valid, Alienware 30 inch curved <a href="http://http://www.engadget.com/2008/01/07/alienware-curved-display-rocks-crysis-at-2880-x-900/ ">monitor</a>, and Ovie saves the world with <a href="http://www.invisibleshield.com">invisibleshield</a>.<br/><br/><br/>]]></description>
      
      <content:encoded><![CDATA[Happy New Year...Today Bret and Ovie talk about 2008 Predictions. We also talk about Bret breaking his IPhone, <a href="http://www.blackhat.com">Black Hat</a> DC, <a href="http://events.apple.com.edgesuite.net/f27853y2/event/index.html?internal=fj2l3s9dm">Mac World 2008</a>, security vulnerabilities in the new <a href="http://www.wired.com/politics/security/news/2008/01/dreamliner_security">Boeing 787</a>, Bill Gates retirement <a href="http://gizmodo.com/341380/bill-gates-envisions-life-after-microsoft-in-keynote-video">video</a>, <a href="http://www.cybercrime.gov">www.cybercrime.gov</a>, very quick way to wipe a hard drive with badblocks, <a href="http://www.baselinemag.com/article2/0,1540,2242720,00.asp ">private investigator story</a> in the news again, search of computer in tax fraud investigation was ruled valid, Alienware 30 inch curved <a href="http://http://www.engadget.com/2008/01/07/alienware-curved-display-rocks-crysis-at-2880-x-900/ ">monitor</a>, and Ovie saves the world with <a href="http://www.invisibleshield.com">invisibleshield</a>.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_81_Jan_14_2008.mp3?dest-id=11283" length="56260987" type="audio/mpeg" />
      <itunes:duration>58:36</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak 21 December 2007</title>
      <itunes:title>CyberSpeak 21 December 2007</itunes:title>
      <pubDate>Fri, 21 Dec 2007 15:35:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=289862#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/WoZZ-xDo6Vc/index.php]]></link>
      <description><![CDATA[<p class="MsoNoSpacing"><span><a href="http://www.planebuzz.com/2007/11/we_knew_this_was_going_to_happ.html"><b><span>Elitist iPhone news</span></b></a>, </span><span><a href="http://www.wiebetech.com/products/Drive_eRazer.php"><b><span>Drive Eraser and Drive Eraser PRO</span></b></a>, <a href="http://www.tampabays10.com/news/local/article.aspx?storyid=68565"><b><span>Florida State Troopers need your help</span></b></a>, <span><a href="http://sans.org/top20/?portal=a2d65c8d3857648f135a3dbf64899ccc"><font color="#0000ff">SANS Top-20 2007 Security Risks (2007 Annual Update)</font></a><i>, </i><a href="http://www.taipeitimes.com/News/taiwan/archives/2007/11/11/2003387202"><font color="#0000ff">Trojan infected hard drives</font></a> phoning home to China, <a href="http://www.laptopgiving.org/"><font color="#0000ff">One Laptop per Child Extended</font></a>, Web Picks: </span></span><b><span><a href="http://everyscape.com/"><font face="Calibri" color="#0000ff" size="3">http://Everyscape.com</font></a><font face="Calibri" size="3"> and <a href="http://elfyourself.com">http://elfyourself.com</a><span>.  </span>Merry Christmas!!</font></span></b><i><span>  </span></i><span> </span></p>]]></description>
      
      <content:encoded><![CDATA[<p class="MsoNoSpacing"><a href="http://www.planebuzz.com/2007/11/we_knew_this_was_going_to_happ.html"><b>Elitist iPhone news</b></a>, <a href="http://www.wiebetech.com/products/Drive_eRazer.php"><b>Drive Eraser and Drive Eraser PRO</b></a>, <a href="http://www.tampabays10.com/news/local/article.aspx?storyid=68565"><b>Florida State Troopers need your help</b></a>, <a href="http://sans.org/top20/?portal=a2d65c8d3857648f135a3dbf64899ccc">SANS Top-20 2007 Security Risks (2007 Annual Update)</a><i>, </i><a href="http://www.taipeitimes.com/News/taiwan/archives/2007/11/11/2003387202">Trojan infected hard drives</a> phoning home to China, <a href="http://www.laptopgiving.org/">One Laptop per Child Extended</a>, Web Picks: <b><a href="http://everyscape.com/">http://Everyscape.com</a> and <a href="http://elfyourself.com">http://elfyourself.com</a>. Merry Christmas!!</b><i> </i> </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak_Dec_21.mp3?dest-id=11283" length="14866581" type="audio/mpeg" />
      <itunes:duration>20:38</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak November 12 2007</title>
      <itunes:title>CyberSpeak November 12 2007</itunes:title>
      <pubDate>Sun, 11 Nov 2007 21:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=277144#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/5lRulagT3kI/index.php]]></link>
      <description><![CDATA[<p class="MsoNormal"><font face="Calibri" size="3">This week we show you how you can </font><a href="http://www.laptopgiving.org/"><font face="Calibri" size="3">donate a laptop to a child</font></a><font face="Calibri" size="3"> in an under privileged country and get </font><a href="http://home.businesswire.com/portal/site/google/index.jsp?ndmViewId=news_view&newsId=20071102005824&newsLang=en"><font face="Calibri" size="3">12 months free -Mobile WiFi hotspot access</font></a><font face="Calibri" size="3">, </font><a href="http://www.engadget.com/2007/10/29/apple-not-just-refusing-cash-also-refusing-apple-gift-cards-for/"><font face="Calibri" size="3">apple will not take your cash</font></a><font face="Calibri" size="3">, apple is so secure they are turning off their firewall and the </font><a href="http://www.ironkey.com/"><font face="Calibri" color="#0000ff" size="3">CEO of IronKey talks about the security features of their IronKey thumb drive</font></a><font face="Calibri" size="3">.<span>  </span>Web pick of the week is </font><a href="http://www.binaryfortress.com/displayfusion/"><font face="Calibri" size="3">Display Fusion</font></a><font face="Calibri" size="3">.</font></p>]]></description>
      
      <content:encoded><![CDATA[<p class="MsoNormal">This week we show you how you can <a href="http://www.laptopgiving.org/">donate a laptop to a child</a> in an under privileged country and get <a href="http://home.businesswire.com/portal/site/google/index.jsp?ndmViewId=news_view&newsId=20071102005824&newsLang=en">12 months free -Mobile WiFi hotspot access</a>, <a href="http://www.engadget.com/2007/10/29/apple-not-just-refusing-cash-also-refusing-apple-gift-cards-for/">apple will not take your cash</a>, apple is so secure they are turning off their firewall and the <a href="http://www.ironkey.com/">CEO of IronKey talks about the security features of their IronKey thumb drive</a>. Web pick of the week is <a href="http://www.binaryfortress.com/displayfusion/">Display Fusion</a>.</p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CybrSpeak_78_12_Nov_2007.mp3?dest-id=11283" length="22627999" type="audio/mpeg" />
      <itunes:duration>31:25</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak 15 October 2007</title>
      <itunes:title>CyberSpeak 15 October 2007</itunes:title>
      <pubDate>Sun, 14 Oct 2007 19:10:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=266740#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/aHPk6hQxdnY/index.php]]></link>
      <description><![CDATA[<p class="MsoNormal"><font face="Calibri" size="3">This week on CyberSpeak we discuss the </font><a href="http://www.thetrainingco.com/html/TechnoForensics2007.html"><font face="Calibri" size="3">Techno Forensics Conference Oct 29-31</font></a><font face="Calibri" size="3">, Guidance Softwareâs policy on replacing dongles, Vista Recycle bin forensics, ways to securely </font><a href="http://www.microsoft.com/technet/sysinternals/Security/SDelete.mspx"><font face="Calibri" color="#0000ff" size="3">wipe unallocated or free space</font></a><font face="Calibri" size="3">, and the </font><a href="http://www.securityfocus.com/brief/603"><font face="Calibri" size="3">first class action law suit</font></a><font face="Calibri" size="3"> against Apples for bricking the iPhone.<span>  </span>This weeks tech segment is all about Windows Mail, Vistaâs replacement to Outlook Express.<span>  </span>Bretâs web picks of the week are a </font><a href="http://techdune.com/2007/10/09/amazing-xp-tools-to-arm-your-pc/"><font face="Calibri" size="3">great list of security tools</font></a><font face="Calibri" size="3">, an </font><a href="http://www.bimbambanana.com/index.php?p=&side=visProd&prod_id=321"><font face="Calibri" size="3">iPod toilet roll holder</font></a><font face="Calibri" size="3"> and a cool </font><a href="http://bbspot.com/video/rube-machine.html"><font face="Calibri" color="#0000ff" size="3">Rube Goldberg Machine</font></a><font face="Calibri" size="3">. <span> </span>Ovieâs web site of the week gives you a way to listen to the latest CyberSpeak podcast without an Internet connection.<span>  </span>Just call (214) 283-8997 and you can listen from anywhere. </font></p>]]></description>
      
      <content:encoded><![CDATA[<p class="MsoNormal">This week on CyberSpeak we discuss the <a href="http://www.thetrainingco.com/html/TechnoForensics2007.html">Techno Forensics Conference Oct 29-31</a>, Guidance Softwareâs policy on replacing dongles, Vista Recycle bin forensics, ways to securely <a href="http://www.microsoft.com/technet/sysinternals/Security/SDelete.mspx">wipe unallocated or free space</a>, and the <a href="http://www.securityfocus.com/brief/603">first class action law suit</a> against Apples for bricking the iPhone. This weeks tech segment is all about Windows Mail, Vistaâs replacement to Outlook Express. Bretâs web picks of the week are a <a href="http://techdune.com/2007/10/09/amazing-xp-tools-to-arm-your-pc/">great list of security tools</a>, an <a href="http://www.bimbambanana.com/index.php?p=&side=visProd&prod_id=321">iPod toilet roll holder</a> and a cool <a href="http://bbspot.com/video/rube-machine.html">Rube Goldberg Machine</a>. Ovieâs web site of the week gives you a way to listen to the latest CyberSpeak podcast without an Internet connection. Just call (214) 283-8997 and you can listen from anywhere. </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_78_October_13_2007.mp3?dest-id=11283" length="45128181" type="audio/mpeg" />
      <itunes:duration>47:00</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak 30 September 2007</title>
      <itunes:title>CyberSpeak 30 September 2007</itunes:title>
      <pubDate>Tue, 02 Oct 2007 17:39:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=262408#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/4vlJodHHP_I/index.php]]></link>
      <description><![CDATA[<p class="MsoNormal"><font face="Calibri" size="3">This week apple deals another blow to their sorry customers, Bret still loves Steve Jobs, Kevin Manson donates a laptop and </font><span><a href="http://www.shanghaidaily.com/sp/article/2007/200709/20070925/article_332460.htm"><font color="#800080">Jushu Technology</font></a>, </span><font face="Calibri" size="3">a Chinese company loses their mind and offers a convicted virus writer a job.<span>  </span>A listener sends an email link to an article about Apple feeling bad about ripping off their customers and offers a </font><a href="http://www.bbspot.com/News/2007/09/jobs-offers-apple-lisa-early-adopters-store-credit.html"><font face="Calibri" size="3">$7000 rebate for Lisa customers</font></a><font face="Calibri" size="3">. <span> </span>Ovie and Bret discuss forensics issues about the Vista Recycle Bin.<span>  </span>Web sites of the week include a link to the Department of Justice </font><a href="http://www.cybercrime.gov/forensics_chart.pdf"><font face="Calibri" size="3">Computer Forensic Methodology Flow Chart</font></a><font face="Calibri" size="3">, a </font><a href="http://sentencing.us/"><font face="Calibri" size="3">US Sentencing calculator</font></a><font face="Calibri" size="3"> web site and an </font><a href="http://iphone.nullriver.com/beta"><font face="Calibri" size="3">iPhone hacking web site</font></a><font face="Calibri" size="3">.</font></p>]]></description>
      
      <content:encoded><![CDATA[<p class="MsoNormal">This week apple deals another blow to their sorry customers, Bret still loves Steve Jobs, Kevin Manson donates a laptop and <a href="http://www.shanghaidaily.com/sp/article/2007/200709/20070925/article_332460.htm">Jushu Technology</a>, a Chinese company loses their mind and offers a convicted virus writer a job. A listener sends an email link to an article about Apple feeling bad about ripping off their customers and offers a <a href="http://www.bbspot.com/News/2007/09/jobs-offers-apple-lisa-early-adopters-store-credit.html">$7000 rebate for Lisa customers</a>. Ovie and Bret discuss forensics issues about the Vista Recycle Bin. Web sites of the week include a link to the Department of Justice <a href="http://www.cybercrime.gov/forensics_chart.pdf">Computer Forensic Methodology Flow Chart</a>, a <a href="http://sentencing.us/">US Sentencing calculator</a> web site and an <a href="http://iphone.nullriver.com/beta">iPhone hacking web site</a>.</p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_77_30Sep2007.mp3?dest-id=11283" length="34118723" type="audio/mpeg" />
      <itunes:duration>35:32</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak 23 Sep 2007</title>
      <itunes:title>CyberSpeak 23 Sep 2007</itunes:title>
      <pubDate>Sun, 23 Sep 2007 18:56:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=258951#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/SRYxVPa_HgY/index.php]]></link>
      <description><![CDATA[<p class="MsoNormal"><span>We are back!!!<span>  </span>Thanks to all that wrote in concerned about our wellbeing.  Todays show we discuss listener email, <a href="http://www.iht.com/articles/ap/2007/06/28/america/NA-GEN-US-Sex-Predator-Sting.php"><font color="#0000ff">ABC News report</font></a> on how Dateline NBCâs âTo Catch a Predatorâ? is making it difficult for law enforcement to prosecute child predators because they are using illegal techniques to initiate sexual talk with predators. <span> </span>Iam wants us to start an IRC chat channel, Andre started a <a href="http://www.google.com/coop/cse?cx=003583825449080011189:gic0utkdhyg"><font color="#0000ff">Google Computer Crime</font></a> web page. In the News, <a href="http://www.emporiagazette.com/news/2007/aug/27/forensics_expert_shows_cell_phone_evidence/"><font color="#0000ff">Forensics Expert Shows Cell Phone Evidence in Rape Case</font></a>, Bret is quoted in <a href="http://www.fcw.com/article103745-09-17-07-Print"><font color="#0000ff">Federal Computer Weekly</font></a> article, Ovie and Bret discuss the recent news coverage on <a href="http://www.youtube.com/watch?v=HgrFSHZfD1o"><font color="#0000ff">police use of stun guns</font></a>. Didier Stevens released his new version 2.3.0 of his <a href="http://didierstevens.wordpress.com/programs/userassist/"><font color="#0000ff">UserAssist tool</font></a>. <span> </span>We discuss WiebeTechâs new âHot Plugâ? device that allows investigators to seize and transport a running computer without having to shut it down. Also discuss is WiebeTechâs new <a href="http://wiebetech.com/products/rtx.php">RTX 400 and 600</a> portable storage devices.<span>  </span>Bretâs web sites of the week was an iPhone site, <span> </span><a title="http://ibypass.net/" href="http://ibypass.net/"><span><font color="#0000ff">http://ibypass.net/</font></span></a> and <a href="http://freelanceswitch.com/working/35-absolutely-essential-mac-apps/">35 absolutely essential Mac applications</a> and Ovieâs pick was a web site that <a href="http://www.spywareguide.com/analyze/analyzer.php"><font color="#0000ff">analyzes EULAâs</font></a>.<span>  </span>KEEP THOSE EMAILS COMING TO CyberSpeak at Gmail dot Com.<br/><br/></span></p>]]></description>
      
      <content:encoded><![CDATA[<p class="MsoNormal">We are back!!! Thanks to all that wrote in concerned about our wellbeing. Todays show we discuss listener email, <a href="http://www.iht.com/articles/ap/2007/06/28/america/NA-GEN-US-Sex-Predator-Sting.php">ABC News report</a> on how Dateline NBCâs âTo Catch a Predatorâ? is making it difficult for law enforcement to prosecute child predators because they are using illegal techniques to initiate sexual talk with predators. Iam wants us to start an IRC chat channel, Andre started a <a href="http://www.google.com/coop/cse?cx=003583825449080011189:gic0utkdhyg">Google Computer Crime</a> web page. In the News, <a href="http://www.emporiagazette.com/news/2007/aug/27/forensics_expert_shows_cell_phone_evidence/">Forensics Expert Shows Cell Phone Evidence in Rape Case</a>, Bret is quoted in <a href="http://www.fcw.com/article103745-09-17-07-Print">Federal Computer Weekly</a> article, Ovie and Bret discuss the recent news coverage on <a href="http://www.youtube.com/watch?v=HgrFSHZfD1o">police use of stun guns</a>. Didier Stevens released his new version 2.3.0 of his <a href="http://didierstevens.wordpress.com/programs/userassist/">UserAssist tool</a>. We discuss WiebeTechâs new âHot Plugâ? device that allows investigators to seize and transport a running computer without having to shut it down. Also discuss is WiebeTechâs new <a href="http://wiebetech.com/products/rtx.php">RTX 400 and 600</a> portable storage devices. Bretâs web sites of the week was an iPhone site, <a title="http://ibypass.net/" href="http://ibypass.net/">http://ibypass.net/</a> and <a href="http://freelanceswitch.com/working/35-absolutely-essential-mac-apps/">35 absolutely essential Mac applications</a> and Ovieâs pick was a web site that <a href="http://www.spywareguide.com/analyze/analyzer.php">analyzes EULAâs</a>. KEEP THOSE EMAILS COMING TO CyberSpeak at Gmail dot Com.</p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_76_23Sep2007.mp3?dest-id=11283" length="45768073" type="audio/mpeg" />
      <itunes:duration>47:40</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak 23 Sep 2007</title>
      <itunes:title>CyberSpeak 23 Sep 2007</itunes:title>
      <pubDate>Sun, 23 Sep 2007 14:56:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=258951#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/SRYxVPa_HgY/index.php]]></link>
      <description><![CDATA[<p class="MsoNormal"><span>We are back!!!<span>  </span>Thanks to all that wrote in concerned about our wellbeing.  Todays show we discuss listener email, <a href="http://www.iht.com/articles/ap/2007/06/28/america/NA-GEN-US-Sex-Predator-Sting.php"><font color="#0000ff">ABC News report</font></a> on how Dateline NBCâs âTo Catch a Predatorâ? is making it difficult for law enforcement to prosecute child predators because they are using illegal techniques to initiate sexual talk with predators. <span> </span>Iam wants us to start an IRC chat channel, Andre started a <a href="http://www.google.com/coop/cse?cx=003583825449080011189:gic0utkdhyg"><font color="#0000ff">Google Computer Crime</font></a> web page. In the News, <a href="http://www.emporiagazette.com/news/2007/aug/27/forensics_expert_shows_cell_phone_evidence/"><font color="#0000ff">Forensics Expert Shows Cell Phone Evidence in Rape Case</font></a>, Bret is quoted in <a href="http://www.fcw.com/article103745-09-17-07-Print"><font color="#0000ff">Federal Computer Weekly</font></a> article, Ovie and Bret discuss the recent news coverage on <a href="http://www.youtube.com/watch?v=HgrFSHZfD1o"><font color="#0000ff">police use of stun guns</font></a>. Didier Stevens released his new version 2.3.0 of his <a href="http://didierstevens.wordpress.com/programs/userassist/"><font color="#0000ff">UserAssist tool</font></a>. <span> </span>We discuss WiebeTechâs new âHot Plugâ? device that allows investigators to seize and transport a running computer without having to shut it down. Also discuss is WiebeTechâs new <a href="http://wiebetech.com/products/rtx.php">RTX 400 and 600</a> portable storage devices.<span>  </span>Bretâs web sites of the week was an iPhone site, <span> </span><a title="http://ibypass.net/" href="http://ibypass.net/"><span><font color="#0000ff">http://ibypass.net/</font></span></a> and <a href="http://freelanceswitch.com/working/35-absolutely-essential-mac-apps/">35 absolutely essential Mac applications</a> and Ovieâs pick was a web site that <a href="http://www.spywareguide.com/analyze/analyzer.php"><font color="#0000ff">analyzes EULAâs</font></a>.<span>  </span>KEEP THOSE EMAILS COMING TO CyberSpeak at Gmail dot Com.<br/><br/></span></p>]]></description>
      
      <content:encoded><![CDATA[<p class="MsoNormal">We are back!!! Thanks to all that wrote in concerned about our wellbeing. Todays show we discuss listener email, <a href="http://www.iht.com/articles/ap/2007/06/28/america/NA-GEN-US-Sex-Predator-Sting.php">ABC News report</a> on how Dateline NBCâs âTo Catch a Predatorâ? is making it difficult for law enforcement to prosecute child predators because they are using illegal techniques to initiate sexual talk with predators. Iam wants us to start an IRC chat channel, Andre started a <a href="http://www.google.com/coop/cse?cx=003583825449080011189:gic0utkdhyg">Google Computer Crime</a> web page. In the News, <a href="http://www.emporiagazette.com/news/2007/aug/27/forensics_expert_shows_cell_phone_evidence/">Forensics Expert Shows Cell Phone Evidence in Rape Case</a>, Bret is quoted in <a href="http://www.fcw.com/article103745-09-17-07-Print">Federal Computer Weekly</a> article, Ovie and Bret discuss the recent news coverage on <a href="http://www.youtube.com/watch?v=HgrFSHZfD1o">police use of stun guns</a>. Didier Stevens released his new version 2.3.0 of his <a href="http://didierstevens.wordpress.com/programs/userassist/">UserAssist tool</a>. We discuss WiebeTechâs new âHot Plugâ? device that allows investigators to seize and transport a running computer without having to shut it down. Also discuss is WiebeTechâs new <a href="http://wiebetech.com/products/rtx.php">RTX 400 and 600</a> portable storage devices. Bretâs web sites of the week was an iPhone site, <a title="http://ibypass.net/" href="http://ibypass.net/">http://ibypass.net/</a> and <a href="http://freelanceswitch.com/working/35-absolutely-essential-mac-apps/">35 absolutely essential Mac applications</a> and Ovieâs pick was a web site that <a href="http://www.spywareguide.com/analyze/analyzer.php">analyzes EULAâs</a>. KEEP THOSE EMAILS COMING TO CyberSpeak at Gmail dot Com.</p>]]></content:encoded>
      
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak 16 September 2007</title>
      <itunes:title>CyberSpeak 16 September 2007</itunes:title>
      <pubDate>Sun, 16 Sep 2007 08:15:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=256308#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/pVqVdUx2-kE/index.php]]></link>
      <description><![CDATA[The DEFCON SHOW!!
                Wow... Bet you didn't think it was ever going to happen...  Its here...  Thanks Geoff for getting this out...  I am posting this from my hotel room in Texas..  Thanks again to everyone for hanging in there...
                Bret]]></description>
      
      <content:encoded><![CDATA[The DEFCON SHOW!! Wow... Bet you didn't think it was ever going to happen... Its here... Thanks Geoff for getting this out... I am posting this from my hotel room in Texas.. Thanks again to everyone for hanging in there... Bret]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_75_16Sep2007.mp3?dest-id=11283" length="22663235" type="audio/mpeg" />
      <itunes:duration>47:12</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak 29 Jul 2007</title>
      <itunes:title>CyberSpeak 29 Jul 2007</itunes:title>
      <pubDate>Mon, 30 Jul 2007 16:54:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=240442#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/9ZJx2xWGuX0/index.php]]></link>
      <description><![CDATA[Show notes will follow.  We are off to Defcon!!]]></description>
      
      <content:encoded><![CDATA[Show notes will follow. We are off to Defcon!!]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_74_29Jul2007.mp3?dest-id=11283" length="52231811" type="audio/mpeg" />
      <itunes:duration>54:24</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak July 22, 2007</title>
      <itunes:title>CyberSpeak July 22, 2007</itunes:title>
      <pubDate>Sun, 22 Jul 2007 16:33:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=237797#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/qoQShRNYyBQ/index.php]]></link>
      <description><![CDATA[Today Ovie talks with Didier Stevens about is <a href="http://didierstevens.wordpress.com/programs/userassist/">UserAssist registry parser</a>.  Also, Bret and Ovie talk about the <a href="http://iphone.com">IPHONE</a>!  In addition they talk about <a href="http://faronics.com">Deep Freeze</a>, <a href="http://www.abanet.org/journal/ereport/jy13tkjasn.html">Vista Forensics</a>, <a href="http://forensicir.blogspot.com">HogFly's blog forensic blog</a>, NAMBLA convention, The Unofficial Apple <a href="http://tuaw.com">Webblog</a>, <a href="http://shadowserver.org">shadowserver.org</a>, <a href="http://myfirstmac.com">myfirstmac.com</a>, <a href="http://energyfiend.com">energyfiend.com</a>, and <a href="http://streetviewR.com">streetviewR.com</a>.<br/><br/>Ovie agrees that everyone should own an Iphone and that he sleeps in a black tshirt with jeans. (I love being the one that posts the show notes)<br/><br/>]]></description>
      
      <content:encoded><![CDATA[Today Ovie talks with Didier Stevens about is <a href="http://didierstevens.wordpress.com/programs/userassist/">UserAssist registry parser</a>. Also, Bret and Ovie talk about the <a href="http://iphone.com">IPHONE</a>! In addition they talk about <a href="http://faronics.com">Deep Freeze</a>, <a href="http://www.abanet.org/journal/ereport/jy13tkjasn.html">Vista Forensics</a>, <a href="http://forensicir.blogspot.com">HogFly's blog forensic blog</a>, NAMBLA convention, The Unofficial Apple <a href="http://tuaw.com">Webblog</a>, <a href="http://shadowserver.org">shadowserver.org</a>, <a href="http://myfirstmac.com">myfirstmac.com</a>, <a href="http://energyfiend.com">energyfiend.com</a>, and <a href="http://streetviewR.com">streetviewR.com</a>.Ovie agrees that everyone should own an Iphone and that he sleeps in a black tshirt with jeans. (I love being the one that posts the show notes)]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_73_22Jul2007.mp3?dest-id=11283" length="57063854" type="audio/mpeg" />
      <itunes:duration>59:26</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak July 1, 2007</title>
      <itunes:title>CyberSpeak July 1, 2007</itunes:title>
      <pubDate>Fri, 13 Jul 2007 18:54:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=235018#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/rxeBy9SlL34/index.php]]></link>
      <description><![CDATA[Finally...it's here...the July 1st show!!!  <br/><br/>Technical problems plagued this release...now it is here.<br/><br/>Ovie and Bret talk about lots of stuff.<br/>]]></description>
      
      <content:encoded><![CDATA[Finally...it's here...the July 1st show!!! Technical problems plagued this release...now it is here.Ovie and Bret talk about lots of stuff.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_72_1Jul2007.mp3?dest-id=11283" length="48516133" type="audio/mpeg" />
      <itunes:duration>50:32</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>Cyberspeak June 24, 2007</title>
      <itunes:title>Cyberspeak June 24, 2007</itunes:title>
      <pubDate>Mon, 25 Jun 2007 17:34:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=229168#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/wc0rAmd1vZI/index.php]]></link>
      <description><![CDATA[<p class="MsoNormal"><span>This weeks show Bret and Ovie discuss the <a href="http://rawstory.com/news/2007/Pentagon_confirms_email_system_hacked_0621.html"><font color="#0000ff">Pentagonâs Confirmation of Hacked Email System </font></a>, an e-mail scam that includes a <a href="http://www.fbi.gov/page2/jan07/threat_scam011507.htm"><font color="#0000ff">Hit-Man Threat</font></a>, and Microsoftâs new Groove collaboration application.<span>  </span>Ovie test and reports the forensic results of surfing the web with Safariâs Private Browser and answer a question from the episode 72 of the Paul Dot Com show.</span></p>
                <p class="MsoNormal"><span>Ovies web sites of the week - <a href="http://instantdomainsearch.com/">Instant Domain Search</a> and <span> </span></span></p>
                <p class="MsoNormal"><span><a href="http://redkid.net/graffiti/engine.php">Graffiti</a> and Bretâs pick was <a href="http://www.plinko.net/404/links.asp?type=cat&key=16">http://www.plinko.net/404/links.asp?type=cat&key=16</a> <br/><br/></span></p>]]></description>
      
      <content:encoded><![CDATA[<p class="MsoNormal">This weeks show Bret and Ovie discuss the <a href="http://rawstory.com/news/2007/Pentagon_confirms_email_system_hacked_0621.html">Pentagonâs Confirmation of Hacked Email System </a>, an e-mail scam that includes a <a href="http://www.fbi.gov/page2/jan07/threat_scam011507.htm">Hit-Man Threat</a>, and Microsoftâs new Groove collaboration application. Ovie test and reports the forensic results of surfing the web with Safariâs Private Browser and answer a question from the episode 72 of the Paul Dot Com show.</p> <p class="MsoNormal">Ovies web sites of the week - <a href="http://instantdomainsearch.com/">Instant Domain Search</a> and </p> <p class="MsoNormal"><a href="http://redkid.net/graffiti/engine.php">Graffiti</a> and Bretâs pick was <a href="http://www.plinko.net/404/links.asp?type=cat&key=16">http://www.plinko.net/404/links.asp?type=cat&key=16</a> </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_71_27Jun2007.mp3?dest-id=11283" length="14496145" type="audio/mpeg" />
      <itunes:duration>30:12</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>Cyberspeak June 17, 2007</title>
      <itunes:title>Cyberspeak June 17, 2007</itunes:title>
      <pubDate>Sun, 17 Jun 2007 14:51:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=226384#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/ofi2ddjF1-U/index.php]]></link>
      <description><![CDATA[<p class="MsoNormal"><font face="Calibri" size="3">In todayâs show, Ovie and Bret discuss listener email, discuss hard drive write blocks and imaging devices, </font><a href="http://www.sleuthkit.org/sleuthkit/download.php"><font face="Calibri" color="#0000ff" size="3">sleuthkit V2.09</font></a><font face="Calibri" size="3"> is out, </font><a href="http://www.apple.com/safari"><font face="Calibri" color="#0000ff" size="3">Safari for Windows</font></a><font face="Calibri" size="3"> is but you </font><a href="http://www.scmagazine.com/us/news/article/664849/apple-updates-safari-window"><font face="Calibri" color="#0000ff" size="3">better patch quickly</font></a><font face="Calibri" size="3">, </font></p>
                <p class="MsoNormal"><font face="Calibri" size="3">In the news, </font><a href="http://www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/print.html"><font face="Calibri" color="#0000ff" size="3">the first spammer sentenced under</font></a><font face="Calibri" size="3"> CAN-SPAM act, </font><a href="http://www.govexec.com/story_page.cfm?articleid=37191&dcn=todaysnews"><font face="Calibri" color="#0000ff" size="3">VA budgets 20 million</font></a><font face="Calibri" size="3"> for credit protection for its victims, Secret Service agent spins a tale but</font><a href="http://www.nowpublic.com/nightmare_at_reagan_national_airport_a_security_story_to_end_all_security_stories"><font face="Calibri" color="#0000ff" size="3"> surveillance video</font></a><font face="Calibri" size="3"> unravels her story, and </font><a href="http://www.yomiuri.co.jp/dy/national/20070614TDY01004.htm"><font face="Calibri" color="#0000ff" size="3">Japanese police</font></a><font face="Calibri" size="3"> learn a lesson in security.<span>  </span>The </font><a href="http://geektechnique.org/projectlab/781/slurpr-the-mother-of-all-wardrive-boxes"><font face="Calibri" size="3">Slurper</font></a><font face="Calibri" size="3"> aggregates 6 unsecure WiFi access points <span> </span>and web sites of the week: </font><a href="http://www.drobo.com/"><font face="Calibri" size="3">Drobo robotic storage</font></a><font face="Calibri" size="3">, </font><a href="http://www.gasapp.com/"><font face="Calibri" color="#0000ff" size="3">Cheapest Gas</font></a><font face="Calibri" size="3">, and </font><a href="http://www.consumerreports.org/cro/cars/safety-recalls/carcrashtest/crashtestvideo.htm"><font face="Calibri" color="#0000ff" size="3">Vehicle crash test</font></a><font face="Calibri" size="3"> site.</font></p>]]></description>
      
      <content:encoded><![CDATA[<p class="MsoNormal">In todayâs show, Ovie and Bret discuss listener email, discuss hard drive write blocks and imaging devices, <a href="http://www.sleuthkit.org/sleuthkit/download.php">sleuthkit V2.09</a> is out, <a href="http://www.apple.com/safari">Safari for Windows</a> is but you <a href="http://www.scmagazine.com/us/news/article/664849/apple-updates-safari-window">better patch quickly</a>, </p> <p class="MsoNormal">In the news, <a href="http://www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/print.html">the first spammer sentenced under</a> CAN-SPAM act, <a href="http://www.govexec.com/story_page.cfm?articleid=37191&dcn=todaysnews">VA budgets 20 million</a> for credit protection for its victims, Secret Service agent spins a tale but<a href="http://www.nowpublic.com/nightmare_at_reagan_national_airport_a_security_story_to_end_all_security_stories"> surveillance video</a> unravels her story, and <a href="http://www.yomiuri.co.jp/dy/national/20070614TDY01004.htm">Japanese police</a> learn a lesson in security. The <a href="http://geektechnique.org/projectlab/781/slurpr-the-mother-of-all-wardrive-boxes">Slurper</a> aggregates 6 unsecure WiFi access points and web sites of the week: <a href="http://www.drobo.com/">Drobo robotic storage</a>, <a href="http://www.gasapp.com/">Cheapest Gas</a>, and <a href="http://www.consumerreports.org/cro/cars/safety-recalls/carcrashtest/crashtestvideo.htm">Vehicle crash test</a> site.</p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_70_17Jun2007.mp3?dest-id=11283" length="18327576" type="audio/mpeg" />
      <itunes:duration>38:10</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>Cyberspeak June 10 2007</title>
      <itunes:title>Cyberspeak June 10 2007</itunes:title>
      <pubDate>Tue, 12 Jun 2007 01:42:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=224562#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/76Uet2ywHE8/index.php]]></link>
      <description><![CDATA[Listener email, an interview with Paul Ohm, <span>Associate Professor, </span><span>University of Colorado Law School about his friends of the court brief. New <a href="http://csrc.nist.gov/publications/nistpubs/#sp800-101">cell phone forensics document released</a> and web sites of the week, <a href="http://www.1-click.jp/">www.1-click.jp</a>, <a href="http://wiihaveaproblem.com/">Wii have a problem</a>, <a href="http://www.securityanalogies.com/">securityanalogies</a>,  and Google Street View </span>]]></description>
      
      <content:encoded><![CDATA[Listener email, an interview with Paul Ohm, Associate Professor, University of Colorado Law School about his friends of the court brief. New <a href="http://csrc.nist.gov/publications/nistpubs/#sp800-101">cell phone forensics document released</a> and web sites of the week, <a href="http://www.1-click.jp/">www.1-click.jp</a>, <a href="http://wiihaveaproblem.com/">Wii have a problem</a>, <a href="http://www.securityanalogies.com/">securityanalogies</a>, and Google Street View]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_69_10Jun2007.mp3?dest-id=11283" length="34161960" type="audio/mpeg" />
      <itunes:duration>01:11:10</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak June 2, 2007</title>
      <itunes:title>CyberSpeak June 2, 2007</itunes:title>
      <pubDate>Tue, 05 Jun 2007 16:01:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=222408#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/hPprmBEKmZY/index.php]]></link>
      <description><![CDATA[Today Ovie and Bret talk about listener email.  They talk about <a href="http://www.google.com/products?q=monster+power+to+go&hl=en&safe=off&client=firefox-a&rls=org.mozilla:en-US:official&hs=Mh3&pwst=1&um=1&sa=X&oi=froogle&ct=title">portable monster power strip</a>, <a href="http://www.freenigma.com">freenigma GPG for webmail</a>, <a href="http://www.sandboxie.com">sandboxie</a>, <a href="http://www.mountimage.com/virtual-forensic-computing-vfc.php">VFC for booting from encase files</a>, <a href="http://www.bit-tech.net/news/2007/05/21/radiation-proof_underwear_/1">radiation proof underwear,</a>  wiping data, <a href="http://www.whitedust.net/eve/">network visualization tool Eve</a>, <a href="http://www.phoenixdatagroup.com">Mac forensics class at phoenixdatagroup.com</a>,  <a href="http://www.ex-parrot.com/~pete/upside-down-ternet.html">upside down and fuzy neighbor wireless Internet access</a>, <a href="http://www.tubesnow.com">tubesnow</a>, <a href="http://www.fuelcostcalculator.com">fuelcostcalculator.com</a>, and <a href="http://www.key-port.com">key-port.com</a>.<br/><br/>Good to be back!!!  Thanks for hanging in there!!!]]></description>
      
      <content:encoded><![CDATA[Today Ovie and Bret talk about listener email. They talk about <a href="http://www.google.com/products?q=monster+power+to+go&hl=en&safe=off&client=firefox-a&rls=org.mozilla:en-US:official&hs=Mh3&pwst=1&um=1&sa=X&oi=froogle&ct=title">portable monster power strip</a>, <a href="http://www.freenigma.com">freenigma GPG for webmail</a>, <a href="http://www.sandboxie.com">sandboxie</a>, <a href="http://www.mountimage.com/virtual-forensic-computing-vfc.php">VFC for booting from encase files</a>, <a href="http://www.bit-tech.net/news/2007/05/21/radiation-proof_underwear_/1">radiation proof underwear,</a> wiping data, <a href="http://www.whitedust.net/eve/">network visualization tool Eve</a>, <a href="http://www.phoenixdatagroup.com">Mac forensics class at phoenixdatagroup.com</a>, <a href="http://www.ex-parrot.com/~pete/upside-down-ternet.html">upside down and fuzy neighbor wireless Internet access</a>, <a href="http://www.tubesnow.com">tubesnow</a>, <a href="http://www.fuelcostcalculator.com">fuelcostcalculator.com</a>, and <a href="http://www.key-port.com">key-port.com</a>.Good to be back!!! Thanks for hanging in there!!!]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_68_02Jun2007.mp3?dest-id=11283" length="28933291" type="audio/mpeg" />
      <itunes:duration>01:00:16</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak May 20, 2007</title>
      <itunes:title>CyberSpeak May 20, 2007</itunes:title>
      <pubDate>Sun, 20 May 2007 22:36:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=216950#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/SDt5KSLtDUk/index.php]]></link>
      <description><![CDATA[In todays show Bret talks about selling his Vette on CraigsList.  Ovie wins the lottery (ok he didn't).  We get some great listener analogies.  Ovie and Bret bust the hard drive wiping myth.  <a href="http://www.techworld.com/security/news/index.cfm?RSS&NewsID=8709">New Vista attacks,</a> <a href="http://www.theregister.co.uk/2007/05/09/computer_expert_pleads_guilty/">man could get 10 years for lying about background</a>, <a href="http://www.allheadlinenews.com/articles/7007308238">Cybersleuth named best of 2007,</a> one in 10 web pages have malicious code, <a href="http://www.visual-literacy.org/periodic_table/periodic_table.html">visual periodic table,</a> and <a href="http://www.touchgraph.com/TGGoogleBrowser.html">TouchGraph</a>.<br/><hr style="width: 100%; height: 2px;"/><br/><span style="font-weight: bold;">Bret is in London, England and Ovie is somewhere in Malaysia this week...So if your a listener in one of these places, drop us a line!</span><br/>]]></description>
      
      <content:encoded><![CDATA[In todays show Bret talks about selling his Vette on CraigsList. Ovie wins the lottery (ok he didn't). We get some great listener analogies. Ovie and Bret bust the hard drive wiping myth. <a href="http://www.techworld.com/security/news/index.cfm?RSS&NewsID=8709">New Vista attacks,</a> <a href="http://www.theregister.co.uk/2007/05/09/computer_expert_pleads_guilty/">man could get 10 years for lying about background</a>, <a href="http://www.allheadlinenews.com/articles/7007308238">Cybersleuth named best of 2007,</a> one in 10 web pages have malicious code, <a href="http://www.visual-literacy.org/periodic_table/periodic_table.html">visual periodic table,</a> and <a href="http://www.touchgraph.com/TGGoogleBrowser.html">TouchGraph</a>.Bret is in London, England and Ovie is somewhere in Malaysia this week...So if your a listener in one of these places, drop us a line!]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_67_20May2007.mp3?dest-id=11283" length="27919740" type="audio/mpeg" />
      <itunes:duration>58:09</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak May 13, 2007</title>
      <itunes:title>CyberSpeak May 13, 2007</itunes:title>
      <pubDate>Sun, 13 May 2007 17:18:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=214438#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/9O1bXTXv9SU/index.php]]></link>
      <description><![CDATA[<span><strong>Today we have an interview of Russell Yawn,Chief Investigator, Office of Prosecutorial Services for the State of Alabama and panel mamber for the National Computer Forensics Institute. Also, check out <a href="http://www.mountimage.com/virtual-forensic-computing-vfc.php">Mount image Pro's new Virtual Forensic Computer</a> that gives you the ability to virtually boot EnCase, DD, and Smart images.  Sorry for any hissing sound on Ovie's side, we are exchanging a defective mixer</strong></span>]]></description>
      
      <content:encoded><![CDATA[Today we have an interview of Russell Yawn,Chief Investigator, Office of Prosecutorial Services for the State of Alabama and panel mamber for the National Computer Forensics Institute. Also, check out <a href="http://www.mountimage.com/virtual-forensic-computing-vfc.php">Mount image Pro's new Virtual Forensic Computer</a> that gives you the ability to virtually boot EnCase, DD, and Smart images. Sorry for any hissing sound on Ovie's side, we are exchanging a defective mixer]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak12_May_2007M.mp3?dest-id=11283" length="28775520" type="audio/mpeg" />
      <itunes:duration>47:57</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak April 29, 2007</title>
      <itunes:title>CyberSpeak April 29, 2007</itunes:title>
      <pubDate>Sun, 29 Apr 2007 16:51:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=210910#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/DubfeSBCkdE/index.php]]></link>
      <description><![CDATA[Man!!!Busy week...Show notes may not make it...But at least the show got posted!!!]]></description>
      
      <content:encoded><![CDATA[Man!!!Busy week...Show notes may not make it...But at least the show got posted!!!]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_65_29April1007.mp3?dest-id=11283" length="28598630" type="audio/mpeg" />
      <itunes:duration>59:34</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak April 22, 2007</title>
      <itunes:title>CyberSpeak April 22, 2007</itunes:title>
      <pubDate>Sun, 22 Apr 2007 05:22:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=206805#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/i7KNNnKQVm4/index.php]]></link>
      <description><![CDATA[Bret and Ovie talk to Jesse Kornblum, Pricipal Computer Forensic Engineer, ManTech International, about <a href="http://www.forensicswiki.org">Forensicswiki.org</a>. Ovie talks about <a href="http://en.wikipedia.org/wiki/Analogy">analogies</a> (tastes like butter.)   Listener email.  If you have a question for Kevin Mitnick send it to cyberspeak.gmail.com.  Bret and Ovie talk about Vmware differences, Vmware Ace, <a href="http://www.virb.com">Virb.com</a>, get your <a href="http://www.opendns.com">freedns</a> here, and create timelines with <a href="http://simile.mit.edu/timeline/">timelines</a>.<br/>]]></description>
      
      <content:encoded><![CDATA[Bret and Ovie talk to Jesse Kornblum, Pricipal Computer Forensic Engineer, ManTech International, about <a href="http://www.forensicswiki.org">Forensicswiki.org</a>. Ovie talks about <a href="http://en.wikipedia.org/wiki/Analogy">analogies</a> (tastes like butter.) Listener email. If you have a question for Kevin Mitnick send it to cyberspeak.gmail.com. Bret and Ovie talk about Vmware differences, Vmware Ace, <a href="http://www.virb.com">Virb.com</a>, get your <a href="http://www.opendns.com">freedns</a> here, and create timelines with <a href="http://simile.mit.edu/timeline/">timelines</a>.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_64_22April2007.mp3?dest-id=11283" length="18176066" type="audio/mpeg" />
      <itunes:duration>37:52</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak April 15, 2007</title>
      <itunes:title>CyberSpeak April 15, 2007</itunes:title>
      <pubDate>Sun, 15 Apr 2007 13:28:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=202328#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/VyUBYe8wtjU/index.php]]></link>
      <description><![CDATA[<p class="MsoNormal"><font face="Calibri" size="3">Ovie is in the dog house, Bret lets listeners off on the April Fools Joke -- Forensicator Pro --Gotcha!!!<span>  </span><a href="http://news.com.com/After+setback%2C+Vonage+wins+temporary+relief/2100-1036_3-6173991.html">Vonage gets a reprieve</a> and can still recruit customers, federal <a href="http://news.com.com/2102-1028_3-6173540.html?tag=st.util.print">appeals court rules</a> no reasonable expectation of privacy on personal computer at work.<span>  </span>Be nice to your sister and don't offer her up for sexual favors on craigslist.<span>  </span>Tell it to the Bank says <a href="http://news.bbc.co.uk/2/hi/programmes/moneybox/6513835.stm">UK Fraud Act</a> which requires victims to stop reporting online fraud to police.<span>  </span>Interview with <a href="http://en.wikipedia.org/wiki/Jim_Christy">Jim Christy</a>, <a href="http://www.dc3.mil/">Defense Cyber Crime Center</a> Director of Futures Exploration and Bret talked about an investigation solved by tracking down the USB drive.<span>  </span>web site picks: Trace from <a href="http://www.x-ways.com">www.x-ways.com</a> .<span>  </span>Stop by  <a href="http://multimediaforensics.com/index.php?PHPSESSID=8c1aa869feb00068f6b2914443699d78&board=17.0">MultimediaForensics</a></font><font face="Calibri" size="3"><a href="http://"> </a>for full show notes.</font></p>]]></description>
      
      <content:encoded><![CDATA[<p class="MsoNormal">Ovie is in the dog house, Bret lets listeners off on the April Fools Joke -- Forensicator Pro --Gotcha!!! <a href="http://news.com.com/After+setback%2C+Vonage+wins+temporary+relief/2100-1036_3-6173991.html">Vonage gets a reprieve</a> and can still recruit customers, federal <a href="http://news.com.com/2102-1028_3-6173540.html?tag=st.util.print">appeals court rules</a> no reasonable expectation of privacy on personal computer at work. Be nice to your sister and don't offer her up for sexual favors on craigslist. Tell it to the Bank says <a href="http://news.bbc.co.uk/2/hi/programmes/moneybox/6513835.stm">UK Fraud Act</a> which requires victims to stop reporting online fraud to police. Interview with <a href="http://en.wikipedia.org/wiki/Jim_Christy">Jim Christy</a>, <a href="http://www.dc3.mil/">Defense Cyber Crime Center</a> Director of Futures Exploration and Bret talked about an investigation solved by tracking down the USB drive. web site picks: Trace from <a href="http://www.x-ways.com">www.x-ways.com</a> . Stop by <a href="http://multimediaforensics.com/index.php?PHPSESSID=8c1aa869feb00068f6b2914443699d78&board=17.0">MultimediaForensics</a><a href="http://"> </a>for full show notes.</p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_63_15Apr2007.mp3?dest-id=11283" length="27968014" type="audio/mpeg" />
      <itunes:duration>58:16</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak April 1, 2007</title>
      <itunes:title>CyberSpeak April 1, 2007</itunes:title>
      <pubDate>Sun, 01 Apr 2007 14:25:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=198931#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/6OCCvBhUfLo/index.php]]></link>
      <description><![CDATA[Today Bret and Ovie talk with Kevin Smith from <a href="http://www.ltutech.com/en/">LTU Technologies</a> about <a href="http://www.ltutech.com/en/technology-and-products.image-seeker.html">Image-Seeker.</a>  They also talk about listener email, <a href="http://rainbowcrack-online.com">rainbowcrack-online.com</a>, TOR not really broken, Bret loves Twitchy, virustotal.com, and <a href="http://linuxtracker.org/torrents-details.php?id=3840">GParted-Clonezilla-LiveCD</a>.<br/>]]></description>
      
      <content:encoded><![CDATA[Today Bret and Ovie talk with Kevin Smith from <a href="http://www.ltutech.com/en/">LTU Technologies</a> about <a href="http://www.ltutech.com/en/technology-and-products.image-seeker.html">Image-Seeker.</a> They also talk about listener email, <a href="http://rainbowcrack-online.com">rainbowcrack-online.com</a>, TOR not really broken, Bret loves Twitchy, virustotal.com, and <a href="http://linuxtracker.org/torrents-details.php?id=3840">GParted-Clonezilla-LiveCD</a>.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_62_1Apr2007..mp3?dest-id=11283" length="25504665" type="audio/mpeg" />
      <itunes:duration>53:08</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak March 25, 2007</title>
      <itunes:title>CyberSpeak March 25, 2007</itunes:title>
      <pubDate>Sun, 25 Mar 2007 18:51:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=196411#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/Jz9CL5bR6h0/index.php]]></link>
      <description><![CDATA[Our first Live Show at ShmooCon2007!!!<br/><br/>Lots of interviews on the floor of the show...<br/><br/><br/>]]></description>
      
      <content:encoded><![CDATA[Our first Live Show at ShmooCon2007!!!Lots of interviews on the floor of the show...]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_61_25Mar2007.mp3?dest-id=11283" length="24483697" type="audio/mpeg" />
      <itunes:duration>51:00</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak March 18, 2007</title>
      <itunes:title>CyberSpeak March 18, 2007</itunes:title>
      <pubDate>Sun, 18 Mar 2007 18:05:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=193897#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/nnSe4rPsbjI/index.php]]></link>
      <description><![CDATA[Today Bret and Ovie talk with Tony Hogeveen, Sales Director for <a href="http://www.deepspar.com/">Deepspar</a> Data Recovery Systems.  Bret and Ovie also talk about the <a href="http://froogle.google.com/froogle?q=linksys+cit400&hl=en&btnG=Search">Linksys CIT-400</a>, the <a href="http://www.jawbone.com/">Jawbone</a> bluetooth headset (hey what kinda show is this anyway), <a href="http://www.shmoocon.org/">ShmooCon</a> 2007 meetup, listener email, <a href="http://www.engadget.com/2007/02/14/hitachis-rfid-powder-freaks-us-the-heck-out/">RFID Powder</a>, DHS <a href="http://www.fcw.com/article97894-03-12-07-Web&printLayout">launches national center for computer forensics training</a>, <a href="http://www.informationweek.com/news/showArticle.jhtml?articleID=198000229">Information Week</a> story on Vista being banned, <a href="http://www.boston.com/business/globe/articles/2007/03/13/tjx_faces_scrutiny_by_ftc/">Congressman Ed Markey asks for FTC investigation</a>, <a href="http://www.nirsoft.net/utils/usb_devices_view.html">Nirsoft USB utility</a>, <a href="http://www.informit.com/articles/article.asp?p=706210&rl=1http://www.informit.com/articles/article.asp?p=706210&rl=1">Max OS X Security Part 1</a>, and a Mac forensics <a href="http://lists.apple.com/mailman/listinfo/appleforensics">mailing list</a>.<br/><br/>See you all at the Meetup this Friday!<br/><br/>   9 PM on March 23rd @ Chipotle<br/>   2600 Connecticut Ave<br/>   Washington, DC 20008<br/><br/><br/><br/>]]></description>
      
      <content:encoded><![CDATA[Today Bret and Ovie talk with Tony Hogeveen, Sales Director for <a href="http://www.deepspar.com/">Deepspar</a> Data Recovery Systems. Bret and Ovie also talk about the <a href="http://froogle.google.com/froogle?q=linksys+cit400&hl=en&btnG=Search">Linksys CIT-400</a>, the <a href="http://www.jawbone.com/">Jawbone</a> bluetooth headset (hey what kinda show is this anyway), <a href="http://www.shmoocon.org/">ShmooCon</a> 2007 meetup, listener email, <a href="http://www.engadget.com/2007/02/14/hitachis-rfid-powder-freaks-us-the-heck-out/">RFID Powder</a>, DHS <a href="http://www.fcw.com/article97894-03-12-07-Web&printLayout">launches national center for computer forensics training</a>, <a href="http://www.informationweek.com/news/showArticle.jhtml?articleID=198000229">Information Week</a> story on Vista being banned, <a href="http://www.boston.com/business/globe/articles/2007/03/13/tjx_faces_scrutiny_by_ftc/">Congressman Ed Markey asks for FTC investigation</a>, <a href="http://www.nirsoft.net/utils/usb_devices_view.html">Nirsoft USB utility</a>, <a href="http://www.informit.com/articles/article.asp?p=706210&rl=1http://www.informit.com/articles/article.asp?p=706210&rl=1">Max OS X Security Part 1</a>, and a Mac forensics <a href="http://lists.apple.com/mailman/listinfo/appleforensics">mailing list</a>.See you all at the Meetup this Friday! 9 PM on March 23rd @ Chipotle 2600 Connecticut Ave Washington, DC 20008]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_60_18Mar_2007.mp3?dest-id=11283" length="63015774" type="audio/mpeg" />
      <itunes:duration>01:05:38</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak March 12, 2007</title>
      <itunes:title>CyberSpeak March 12, 2007</itunes:title>
      <pubDate>Sun, 11 Mar 2007 18:29:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=191265#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/HjP1K4DZZ-U/index.php]]></link>
      <description><![CDATA[Ovie flys solo today.  On todays show Bret and Ovie interview Trevor Fairchild.  Complete show notes as soon as Ovie gets around to it.]]></description>
      
      <content:encoded><![CDATA[Ovie flys solo today. On todays show Bret and Ovie interview Trevor Fairchild. Complete show notes as soon as Ovie gets around to it.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_59_12Mar07.mp3?dest-id=11283" length="23812037" type="audio/mpeg" />
      <itunes:duration>49:36</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak March 4, 2007</title>
      <itunes:title>CyberSpeak March 4, 2007</itunes:title>
      <pubDate>Sun, 04 Mar 2007 14:55:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=188728#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/7BqZIxnym1k/index.php]]></link>
      <description><![CDATA[Technical problems on my end have prevented us from recording the show this week.  We should be back up and running for next weeks show.  In the mean time <a href="http://media.libsyn.com/media/cyberspeak/IOActive.mp3">check out our recording of the press conference</a> at Blackhat about the <a href="http://www.newsfactor.com/story.xhtml?story_id=0020002HD6KG">IOActive RFID talk that never was</a> (Warning:  Audio quality of the recording is not good.)<br/><br/> Ovie and I will see you next week..
                <br/><br/>-Bret]]></description>
      
      <content:encoded><![CDATA[Technical problems on my end have prevented us from recording the show this week. We should be back up and running for next weeks show. In the mean time <a href="http://media.libsyn.com/media/cyberspeak/IOActive.mp3">check out our recording of the press conference</a> at Blackhat about the <a href="http://www.newsfactor.com/story.xhtml?story_id=0020002HD6KG">IOActive RFID talk that never was</a> (Warning: Audio quality of the recording is not good.) Ovie and I will see you next week.. -Bret]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_58_4Mar07.mp3?dest-id=11283" length="3579097" type="audio/mpeg" />
      <itunes:duration>03:43</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak February 25, 2007</title>
      <itunes:title>CyberSpeak February 25, 2007</itunes:title>
      <pubDate>Mon, 26 Feb 2007 18:17:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=186649#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/byc-0xGEHz4/index.php]]></link>
      <description><![CDATA[Today Ovie and Bret talk with Mark Menz from MyKey Technology Inc.  We also drop in on Jeff Moss as he prepares for Black Hat Federal.<br/><br/>In the interest of getting the show out, show notes are <a href="http://multimediaforensics.com/index.php/topic,163.0.html">HERE</a>..<br/><br/>Get well soon Mike.<br/>]]></description>
      
      <content:encoded><![CDATA[Today Ovie and Bret talk with Mark Menz from MyKey Technology Inc. We also drop in on Jeff Moss as he prepares for Black Hat Federal.In the interest of getting the show out, show notes are <a href="http://multimediaforensics.com/index.php/topic,163.0.html">HERE</a>..Get well soon Mike.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_57_26Feb07.mp3?dest-id=11283" length="40003585" type="audio/mpeg" />
      <itunes:duration>41:40</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak February 18, 2007</title>
      <itunes:title>CyberSpeak February 18, 2007</itunes:title>
      <pubDate>Tue, 20 Feb 2007 02:42:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=184068#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/fy7cWKMWOP0/index.php]]></link>
      <description><![CDATA[Today, in an extended show, Bret and Ovie talk with <a href="http://www.philzimmermann.com/">Phil Zimmermann</a>, creator of PGP encryption software.  Phil talks about his new <a href="http://zfoneproject.com/">Zfone</a> project.  Bret and Ovie also talk about a <a href="http://edition.cnn.com/2007/LAW/02/13/teacher.porn.ap/index.html">UK teacher who is fired</a> for showing porn to students, steps of a forensic exam, new Microsoft Word <a href="http://www.informationweek.com/showArticle.jhtml?articleID=197006393&cid=RSS">vulnerability</a>, Shaw Carpenter gets <a href="http:///">4.3 million for wrongful termination</a>, a man <a href="http://charlotte.bizjournals.com/philadelphia/stories/2007/02/12/daily17.html">sentenced</a> for stealing data from the American College of Physicians, another laptop missing; this time from <a href="http://www.baltimoresun.com/news/local/bal-te.md.identity13feb13,1,271722,print.story?coll=bal-home-headlines&ctrack=1&cset=true">St. Marys Hospital emergency care center</a>, <a href="http://www.vnunet.com/vnunet/news/2183150/belgian-newspapers-claim-final">Belgian court upheld ruling that prohibits Google</a> from using snippets of headlines, <a href="http://www.apple.com/downloads/macosx/ipod_itunes/tubesock.html">TubeSock</a>, <a href="http:///">Mac Media Center Project</a>, <a href="http:///">Ext2 in Windows</a>, <a href="http:///">Metalosis Maligna,</a> and <a href="http://www.empressr.com/">online presentations</a>.<br/>]]></description>
      
      <content:encoded><![CDATA[Today, in an extended show, Bret and Ovie talk with <a href="http://www.philzimmermann.com/">Phil Zimmermann</a>, creator of PGP encryption software. Phil talks about his new <a href="http://zfoneproject.com/">Zfone</a> project. Bret and Ovie also talk about a <a href="http://edition.cnn.com/2007/LAW/02/13/teacher.porn.ap/index.html">UK teacher who is fired</a> for showing porn to students, steps of a forensic exam, new Microsoft Word <a href="http://www.informationweek.com/showArticle.jhtml?articleID=197006393&cid=RSS">vulnerability</a>, Shaw Carpenter gets <a href="http:///">4.3 million for wrongful termination</a>, a man <a href="http://charlotte.bizjournals.com/philadelphia/stories/2007/02/12/daily17.html">sentenced</a> for stealing data from the American College of Physicians, another laptop missing; this time from <a href="http://www.baltimoresun.com/news/local/bal-te.md.identity13feb13,1,271722,print.story?coll=bal-home-headlines&ctrack=1&cset=true">St. Marys Hospital emergency care center</a>, <a href="http://www.vnunet.com/vnunet/news/2183150/belgian-newspapers-claim-final">Belgian court upheld ruling that prohibits Google</a> from using snippets of headlines, <a href="http://www.apple.com/downloads/macosx/ipod_itunes/tubesock.html">TubeSock</a>, <a href="http:///">Mac Media Center Project</a>, <a href="http:///">Ext2 in Windows</a>, <a href="http:///">Metalosis Maligna,</a> and <a href="http://www.empressr.com/">online presentations</a>.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_56_18Feb07.mp3?dest-id=11283" length="38607103" type="audio/mpeg" />
      <itunes:duration>01:20:25</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak February 11, 2007</title>
      <itunes:title>CyberSpeak February 11, 2007</itunes:title>
      <pubDate>Sun, 11 Feb 2007 16:19:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=181009#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/3b8o0uwEkwM/index.php]]></link>
      <description><![CDATA[Today we talk with <a href="http://myharddrivedied.com/">Scott Moulton</a> from Forensic Strategy Services.  Scott talks about advanced hard drive recovery topics.  In addition, Bret and Ovie talk about detection of full disk encryption with <a href="http://toorcon.techpathways.com/uploads/zeroview.zip">ZeroView</a>, Danny Garcia didn't <a href="http://www.pcworld.com/article/id,128750-c,cybercrime/article.html">hack the SuperBowl</a>, <a href="http://www.scmagazine.com.au/news/45262,myspace-superworm-creator-sentenced-to-probation-community-service.aspx">MySpace worm creator sentenced</a> to probation, <a href="http://news.bbc.co.uk/1/hi/england/6331517.stm">three men who used internet chat room to hatch a plot to rape</a>, decode your <a href="http://www.eff.org/Privacy/printers/docucolor/">printers secret code</a>, <a href="http://www.paypal.com/cgi-bin/webscr?cmd=xpt/cps/securitycenter/general/PPSecurityKey-outside">paypal security key</a>, google.com/searchhistory, www.freewareosx.com, and www.xslimmer.com. <br/>]]></description>
      
      <content:encoded><![CDATA[Today we talk with <a href="http://myharddrivedied.com/">Scott Moulton</a> from Forensic Strategy Services. Scott talks about advanced hard drive recovery topics. In addition, Bret and Ovie talk about detection of full disk encryption with <a href="http://toorcon.techpathways.com/uploads/zeroview.zip">ZeroView</a>, Danny Garcia didn't <a href="http://www.pcworld.com/article/id,128750-c,cybercrime/article.html">hack the SuperBowl</a>, <a href="http://www.scmagazine.com.au/news/45262,myspace-superworm-creator-sentenced-to-probation-community-service.aspx">MySpace worm creator sentenced</a> to probation, <a href="http://news.bbc.co.uk/1/hi/england/6331517.stm">three men who used internet chat room to hatch a plot to rape</a>, decode your <a href="http://www.eff.org/Privacy/printers/docucolor/">printers secret code</a>, <a href="http://www.paypal.com/cgi-bin/webscr?cmd=xpt/cps/securitycenter/general/PPSecurityKey-outside">paypal security key</a>, google.com/searchhistory, www.freewareosx.com, and www.xslimmer.com.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_55_-_11Feb07.mp3?dest-id=11283" length="37674071" type="audio/mpeg" />
      <itunes:duration>01:18:29</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak January 28, 2007</title>
      <itunes:title>CyberSpeak January 28, 2007</itunes:title>
      <pubDate>Sun, 28 Jan 2007 12:16:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=175719#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/tptoh-Tea28/index.php]]></link>
      <description><![CDATA[Ovie is back!!  Today Ovie and Bret talk with Jesse Kornblum, Principal Computer Forensics Engineer at <a href="http://mantech.com/">ManTech</a> about his Buffalo paper on memory analysis.  Also they talk about listener email, <a href="http://www.fletc.gov/training/programs/legaldivision/podcasts">fletc legal division podcasts</a>, <a href="http://lifehacker.com/software/privacy/geek-to-live--hide-data-in-files-with-easy-steganography-tools-230915.php">stego</a>, <a href="http://www.randi.org/research/index.html">the million dollar paranormal challenge</a>, <a href="http://dheera.net/projects/blur.php">why blurring data can be bad</a>, and see who is stealing your laptop at <a href="http://www.slappingturtle.com">slappingturtle.com</a>.<br/>]]></description>
      
      <content:encoded><![CDATA[Ovie is back!! Today Ovie and Bret talk with Jesse Kornblum, Principal Computer Forensics Engineer at <a href="http://mantech.com/">ManTech</a> about his Buffalo paper on memory analysis. Also they talk about listener email, <a href="http://www.fletc.gov/training/programs/legaldivision/podcasts">fletc legal division podcasts</a>, <a href="http://lifehacker.com/software/privacy/geek-to-live--hide-data-in-files-with-easy-steganography-tools-230915.php">stego</a>, <a href="http://www.randi.org/research/index.html">the million dollar paranormal challenge</a>, <a href="http://dheera.net/projects/blur.php">why blurring data can be bad</a>, and see who is stealing your laptop at <a href="http://www.slappingturtle.com">slappingturtle.com</a>.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_54_-_28Jan07.mp3?dest-id=11283" length="53750679" type="audio/mpeg" />
      <itunes:duration>55:59</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak January 17, 2007</title>
      <itunes:title>CyberSpeak January 17, 2007</itunes:title>
      <pubDate>Wed, 17 Jan 2007 16:21:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=172098#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/TE5rFD2iwKc/index.php]]></link>
      <description><![CDATA[Today Bret talks with <a href="http://www.chadanthonymcmillan.com/">Chad McMillan</a>, Principal Security Engineer and <a href="http://www.mandiant.com">Mandiant</a>.  Chad talks about his new entropy tool for malware detection.  Bret also talks about listener feedback, <a href="http://www.shmoocon.org">ShmooCon</a>, <a href="http://blackhat.org">Blackhat Federal</a>, <a href="http://www.eset.com/">ESETs NOD32</a>, <a href="http://news.com.com/2100-1041_3-6147032.html?part=rss&tag=2547-1_3-0-20&subj=news">flash drives for laptops</a>, Jim Christy in WIRED Magazine, <a href="http://www.itsecurity.com/features/nastiest-malware-trends-011207/">malware trends,</a> <a href="http://www.thestar.com/article/169413">canadian coins with RFID chips</a>, <a href="http://www.securityfocus.com/brief/405">iDefense annouced they will pay 800 for each remotely exploitable flaw in Vista and IE</a>, and <a href="http://www.delicious-monster.com">Delicious Monster</a>.<br/>]]></description>
      
      <content:encoded><![CDATA[Today Bret talks with <a href="http://www.chadanthonymcmillan.com/">Chad McMillan</a>, Principal Security Engineer and <a href="http://www.mandiant.com">Mandiant</a>. Chad talks about his new entropy tool for malware detection. Bret also talks about listener feedback, <a href="http://www.shmoocon.org">ShmooCon</a>, <a href="http://blackhat.org">Blackhat Federal</a>, <a href="http://www.eset.com/">ESETs NOD32</a>, <a href="http://news.com.com/2100-1041_3-6147032.html?part=rss&tag=2547-1_3-0-20&subj=news">flash drives for laptops</a>, Jim Christy in WIRED Magazine, <a href="http://www.itsecurity.com/features/nastiest-malware-trends-011207/">malware trends,</a> <a href="http://www.thestar.com/article/169413">canadian coins with RFID chips</a>, <a href="http://www.securityfocus.com/brief/405">iDefense annouced they will pay 800 for each remotely exploitable flaw in Vista and IE</a>, and <a href="http://www.delicious-monster.com">Delicious Monster</a>.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak_January_15_2007.mp3?dest-id=11283" length="23559590" type="audio/mpeg" />
      <itunes:duration>49:04</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak January 7, 2006</title>
      <itunes:title>CyberSpeak January 7, 2006</itunes:title>
      <pubDate>Sun, 07 Jan 2007 15:38:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=168508#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/yEn-TJ9BoT4/index.php]]></link>
      <description><![CDATA[Today, Bret talks with Jamie Butler, Principal Software Engineer at <a href="http://www.mandiant.com">Mandiant</a>.  Jamie is the co-author of <a href="http://www.amazon.com/Rootkits-Subverting-Addison-Wesley-Software-Security/dp/0321294319">Rootkits: Subverting the Windows Kernel</a>.  He talks with Bret about the state of rootkit technology.  Bret also talks about a man who stumbles into an online law enforcement training class and ends up with an <a href="http://www.newsleader.com/apps/pbcs.dll/article?AID=/20070105/NEWS01/701050310/1002">indictment,</a> <a href="http://mapsexoffenders.com">mapsexoffenders.com</a>, <a href="http://www.securityfocus.com/infocus/1884">wireless forensics</a>, <a href="http://http://www.gearthblog.com/blog/archives/2007/01/watch_remote_control.html">remote control plane to capture images for Google Earth,</a> <a href="https://www.sapotek.com">DesktopTwo</a>, and a <a href="http://bytemycode.com">neat code repository website</a>.  Bret also talks about his lovely wife Jill buying him a <a href="http://www.usa.canon.com/consumer/controller?act=ModelDetailAct&fcategoryid=139&modelid=14256">Canon Rebel XTI</a> and <a href="http://mindstorms.lego.com/">Lego Mindstorms NXT</a> for christmas!<br/><br/>Also Congratulations to Ken Pryor for <a href="http://multimediaforensics.com/viewtopic.php?t=43">his "Where's Ovie" submission</a>.  He will be receiving a "one of a kind" autographed <a href="http://www.cafepress.com/cyberspeak.43582885">CyberSpeak mousepad</a>.  Thanks Ken!!<br/><br/>I had a REAL OVIE SIGHTING the other day.  Hmmmmm...is he coming back soon!?!?!?!<br/><br/>We are light on mail this week...send us your ideas, thoughts, praise, scorn, or whatever.   CYBERSPEAK at GMAIL dot COM<br/><br/>]]></description>
      
      <content:encoded><![CDATA[Today, Bret talks with Jamie Butler, Principal Software Engineer at <a href="http://www.mandiant.com">Mandiant</a>. Jamie is the co-author of <a href="http://www.amazon.com/Rootkits-Subverting-Addison-Wesley-Software-Security/dp/0321294319">Rootkits: Subverting the Windows Kernel</a>. He talks with Bret about the state of rootkit technology. Bret also talks about a man who stumbles into an online law enforcement training class and ends up with an <a href="http://www.newsleader.com/apps/pbcs.dll/article?AID=/20070105/NEWS01/701050310/1002">indictment,</a> <a href="http://mapsexoffenders.com">mapsexoffenders.com</a>, <a href="http://www.securityfocus.com/infocus/1884">wireless forensics</a>, <a href="http://http://www.gearthblog.com/blog/archives/2007/01/watch_remote_control.html">remote control plane to capture images for Google Earth,</a> <a href="https://www.sapotek.com">DesktopTwo</a>, and a <a href="http://bytemycode.com">neat code repository website</a>. Bret also talks about his lovely wife Jill buying him a <a href="http://www.usa.canon.com/consumer/controller?act=ModelDetailAct&fcategoryid=139&modelid=14256">Canon Rebel XTI</a> and <a href="http://mindstorms.lego.com/">Lego Mindstorms NXT</a> for christmas!Also Congratulations to Ken Pryor for <a href="http://multimediaforensics.com/viewtopic.php?t=43">his "Where's Ovie" submission</a>. He will be receiving a "one of a kind" autographed <a href="http://www.cafepress.com/cyberspeak.43582885">CyberSpeak mousepad</a>. Thanks Ken!!I had a REAL OVIE SIGHTING the other day. Hmmmmm...is he coming back soon!?!?!?!We are light on mail this week...send us your ideas, thoughts, praise, scorn, or whatever. CYBERSPEAK at GMAIL dot COM]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_January_7_2006.mp3?dest-id=11283" length="26370745" type="audio/mpeg" />
      <itunes:duration>54:56</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak December 31, 2006</title>
      <itunes:title>CyberSpeak December 31, 2006</itunes:title>
      <pubDate>Sun, 31 Dec 2006 17:10:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=166380#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/fzS8jfy6fbo/index.php]]></link>
      <description><![CDATA[Last show of 2006!!  Today on a short show, Bret talks about <a href="http://www.techweb.com/showArticle.jhtml;?articleID=196701659">Sony's settlement</a> with seveal states, January 2007 is the month of <a href="http://blog.washingtonpost.com/securityfix/2006/12/january_2007_month_of_apple_bu.html">Apple Security Bugs,</a> <a href="http://www.eweek.com/article2/0,1895,2073611,00.asp#">Vista exploits selling for 50K</a>, <a href="http://www.networkworld.com/community/?q=node/9999">congressional aid caught</a> trying to get his grades changed, <a href="http://ninjawords.com/">a fast dictionary</a>, <a href="http://www.hackergames.net/">hacker challanges and puzzles</a>, <a href="http://www.guerrillamail.com/">email address that will expire in 15 mins</a>, and a virtual <a href="http://www.thinkature.com">collaboration whiteboard.</a><br/><br/>You still have time to submit you "where is Ovie" picture at www.multimediaforensics.com.<br/><br/>Happy New Year!!<br/>]]></description>
      
      <content:encoded><![CDATA[Last show of 2006!! Today on a short show, Bret talks about <a href="http://www.techweb.com/showArticle.jhtml;?articleID=196701659">Sony's settlement</a> with seveal states, January 2007 is the month of <a href="http://blog.washingtonpost.com/securityfix/2006/12/january_2007_month_of_apple_bu.html">Apple Security Bugs,</a> <a href="http://www.eweek.com/article2/0,1895,2073611,00.asp#">Vista exploits selling for 50K</a>, <a href="http://www.networkworld.com/community/?q=node/9999">congressional aid caught</a> trying to get his grades changed, <a href="http://ninjawords.com/">a fast dictionary</a>, <a href="http://www.hackergames.net/">hacker challanges and puzzles</a>, <a href="http://www.guerrillamail.com/">email address that will expire in 15 mins</a>, and a virtual <a href="http://www.thinkature.com">collaboration whiteboard.</a>You still have time to submit you "where is Ovie" picture at www.multimediaforensics.com.Happy New Year!!]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_December_31_2006.mp3?dest-id=11283" length="7214793" type="audio/mpeg" />
      <itunes:duration>15:01</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak December 17, 2006</title>
      <itunes:title>CyberSpeak December 17, 2006</itunes:title>
      <pubDate>Mon, 18 Dec 2006 17:33:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=162911#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/BFUgQWooQSs/index.php]]></link>
      <description><![CDATA[On this festive pre-Christmas show Bret talks with Mike Younger and Geoff Michelli.  They talk about a <a href="http://news.bbc.co.uk/2/hi/business/6179117.stm">Skype lie detector</a>, <a href="http://devices.natetrue.com/macshift">mac changing utility</a>, <a href="http://www.aplusproxy.com">anonymous</a> surfing <a href="http://www.slyuser.com">websites</a>, <a href="http://freepops.sourceforge.net ">a pop3 aggrigator</a>, <a href="http://locknote.steganos.com ">secure notepad</a>, the VA Army National Guard members <a href="http://wowktv.com/story.cfm?func=viewstory&storyid=17093">personal data stolen</a> on a laptop, class president at <a href="http://www.sun-sentinel.com/news/local/broward/sfl-sgrades13dec13,0,5928437.story?coll=sfla-news-broward">Cooper City High charged with chaging grades</a>, Hackthissite.org founder <a href="http://www.hackthissite.org/chicagotribunecapture.txt">sentenced</a> to 24 months, <a href="http://www.schneier.com/blog/archives/2006/12/realworld_passw.html">interesting password article</a>, <a href="http://users.erols.com/gmgarner/forensics/">imaging Windows memory</a>, <a href="http://www.hackerslab.org/eorg/hackingzone/hackingzone.htm">hack free zone</a>, your browser information <a href="http://ipid.shat.net/">site</a>, and how to hack a master lock <a href="http://www.i-hacked.com/">at i-hacked</a>.  <a href="http://www.mit.edu/~vona/bass/bass.html">How to make your bass say "PORK"?</a><br/><br/>Where is Ovie?!  Check out these submissions and enter the contest!!<br/><br/><a href="http://multimediaforensics.com/viewtopic.php?t=43">http://multimediaforensics.com/viewtopic.php?t=43</a><br/><br/>The winner will get an autographed CyberSpeak mousepad!!<br/>]]></description>
      
      <content:encoded><![CDATA[On this festive pre-Christmas show Bret talks with Mike Younger and Geoff Michelli. They talk about a <a href="http://news.bbc.co.uk/2/hi/business/6179117.stm">Skype lie detector</a>, <a href="http://devices.natetrue.com/macshift">mac changing utility</a>, <a href="http://www.aplusproxy.com">anonymous</a> surfing <a href="http://www.slyuser.com">websites</a>, <a href="http://freepops.sourceforge.net ">a pop3 aggrigator</a>, <a href="http://locknote.steganos.com ">secure notepad</a>, the VA Army National Guard members <a href="http://wowktv.com/story.cfm?func=viewstory&storyid=17093">personal data stolen</a> on a laptop, class president at <a href="http://www.sun-sentinel.com/news/local/broward/sfl-sgrades13dec13,0,5928437.story?coll=sfla-news-broward">Cooper City High charged with chaging grades</a>, Hackthissite.org founder <a href="http://www.hackthissite.org/chicagotribunecapture.txt">sentenced</a> to 24 months, <a href="http://www.schneier.com/blog/archives/2006/12/realworld_passw.html">interesting password article</a>, <a href="http://users.erols.com/gmgarner/forensics/">imaging Windows memory</a>, <a href="http://www.hackerslab.org/eorg/hackingzone/hackingzone.htm">hack free zone</a>, your browser information <a href="http://ipid.shat.net/">site</a>, and how to hack a master lock <a href="http://www.i-hacked.com/">at i-hacked</a>. <a href="http://www.mit.edu/~vona/bass/bass.html">How to make your bass say "PORK"?</a>Where is Ovie?! Check out these submissions and enter the contest!!<a href="http://multimediaforensics.com/viewtopic.php?t=43">http://multimediaforensics.com/viewtopic.php?t=43</a>The winner will get an autographed CyberSpeak mousepad!!]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_December_17_2006.mp3?dest-id=11283" length="29185947" type="audio/mpeg" />
      <itunes:duration>01:00:48</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak December 10, 2006</title>
      <itunes:title>CyberSpeak December 10, 2006</itunes:title>
      <pubDate>Sun, 10 Dec 2006 14:53:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=160007#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/5iViJOUOzwE/index.php]]></link>
      <description><![CDATA[Today Bret has Mike Younger on the show.  Bret and Mike talk about <a href="http://www.infosecurity-magazine.com/news/061205_spam_Postini_research.htm">spam</a> statistics, IT <a href="http://www.informationweek.com/news/showArticle.jhtml;jsessionid=EBA3IT0NZBRMWQSNDLPSKH0CJUNN2JVN?articleID=196602415">background checks</a>, Blackberry forensics, gmail <a href="http://mail.google.com/support/bin/answer.py?ctx=%67mail&hl=en&answer=21288">mail fetcher,</a> <a href="http://preview.local.live.com">preview.local.live.com</a>, and <a href="http://www.tmto.org">www.tmto.org</a>.<br/><br/>Remember <a href="http://">www.multimediaforensics.com!</a><br/>]]></description>
      
      <content:encoded><![CDATA[Today Bret has Mike Younger on the show. Bret and Mike talk about <a href="http://www.infosecurity-magazine.com/news/061205_spam_Postini_research.htm">spam</a> statistics, IT <a href="http://www.informationweek.com/news/showArticle.jhtml;jsessionid=EBA3IT0NZBRMWQSNDLPSKH0CJUNN2JVN?articleID=196602415">background checks</a>, Blackberry forensics, gmail <a href="http://mail.google.com/support/bin/answer.py?ctx=%67mail&hl=en&answer=21288">mail fetcher,</a> <a href="http://preview.local.live.com">preview.local.live.com</a>, and <a href="http://www.tmto.org">www.tmto.org</a>.Remember <a href="http://">www.multimediaforensics.com!</a>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_December_10_2006.mp3?dest-id=11283" length="18193390" type="audio/mpeg" />
      <itunes:duration>37:54</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak December 3, 2006</title>
      <itunes:title>CyberSpeak December 3, 2006</itunes:title>
      <pubDate>Sun, 03 Dec 2006 12:45:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=157657#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/Z8VyyJbPyzU/index.php]]></link>
      <description><![CDATA[Today Bret talks with Brian Dykstra, CIO and Director of Education at <a href="http://www.mandiant.com">Mandiant</a>, about the ediscovery rule changes.  Bret also talks about <a href="http://weblog.infoworld.com/virtualization/archives/2006/11/virtual_machine_1.html">virtual machine detection in malware</a>, <a href="http://www.spamgourmet.com">spamgourmet</a>, <a href="http://www.careerjournal.com/columnists/theorypractice/20061114-theorypractice.html">employee comensation</a>, <a href="http://www.guidancesoftware.com">Encase version 6</a>, <a href="http://www.foxnews.com/story/0,2933,232500,00.html">Nigerian scam still works</a>, <a href="http://www.indystar.com/apps/pbcs.dll/article?AID=/20061128/LOCAL/61128029">FBI dropps boarding pass generator investigation</a>, <a href="http://forum.parallels.com/thread5997.html">Parallels build 3036</a>, <a href="http://sharjeelsayed.blogspot.com/2006/03/beat-censorship-using-these-proxies.html">proxy site lists</a>, <a href="http://www.thesimpledollar.com/2006/12/01/30-essential-pieces-of-free-and-open-software-for-windows/">30-essential pieces of free and open software</a> for Windows.<br/><br/>Please take the time to give us a review on <a href="http://phobos.apple.com/WebObjects/MZStore.woa/wa/viewPodcast?id=108218375">iTunes.</a><br/><br/>Drop by Brian Dykstra's site at <a href="http://www.virtualwar.com">www.virtualwar.com</a><br/><br/><br type="_moz"/>]]></description>
      
      <content:encoded><![CDATA[Today Bret talks with Brian Dykstra, CIO and Director of Education at <a href="http://www.mandiant.com">Mandiant</a>, about the ediscovery rule changes. Bret also talks about <a href="http://weblog.infoworld.com/virtualization/archives/2006/11/virtual_machine_1.html">virtual machine detection in malware</a>, <a href="http://www.spamgourmet.com">spamgourmet</a>, <a href="http://www.careerjournal.com/columnists/theorypractice/20061114-theorypractice.html">employee comensation</a>, <a href="http://www.guidancesoftware.com">Encase version 6</a>, <a href="http://www.foxnews.com/story/0,2933,232500,00.html">Nigerian scam still works</a>, <a href="http://www.indystar.com/apps/pbcs.dll/article?AID=/20061128/LOCAL/61128029">FBI dropps boarding pass generator investigation</a>, <a href="http://forum.parallels.com/thread5997.html">Parallels build 3036</a>, <a href="http://sharjeelsayed.blogspot.com/2006/03/beat-censorship-using-these-proxies.html">proxy site lists</a>, <a href="http://www.thesimpledollar.com/2006/12/01/30-essential-pieces-of-free-and-open-software-for-windows/">30-essential pieces of free and open software</a> for Windows.Please take the time to give us a review on <a href="http://phobos.apple.com/WebObjects/MZStore.woa/wa/viewPodcast?id=108218375">iTunes.</a>Drop by Brian Dykstra's site at <a href="http://www.virtualwar.com">www.virtualwar.com</a>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_December_3_2006.mp3?dest-id=11283" length="24533987" type="audio/mpeg" />
      <itunes:duration>51:06</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak November 26, 2006</title>
      <itunes:title>CyberSpeak November 26, 2006</itunes:title>
      <pubDate>Sun, 26 Nov 2006 12:55:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=155453#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/wHJVYgcc3v8/index.php]]></link>
      <description><![CDATA[Today we have a short Thanksgving weekend show.  Bret talks about a Mac remote control program called <a href="http://www.apple.com/downloads/macosx/networking_security/iforgot.html">iForgot</a>, a <a href="http://yro.slashdot.org/article.pl?sid=06/11/21/158207">decision</a> by the Florida Supreme Court upholding the conviction of Michael Simmons, <a href="http://hype-free.blogspot.com/2006/11/to-pack-or-not-to-pack.html">Hype-Free article on packing</a>, <a href="http://www.securityfocus.com/brief/366">F-Secure publishes IAdware</a>, <a href="http://www.securityfocus.com/brief/361">Virus in Second Life</a>, <a href="http://www.microsoft.com/technet/sysinternals/SystemInformation/processmonitor.mspx">Procmon</a> from Microsoft, <a href="http://www.safepasswd.com">safe passwords</a>, <a href="http://www.rayninfo.co.uk/vimtips.html">VIM Tips</a> , <a href="http://www.socketsoft.net/SpoofMAC">MacSpoof</a>, and <a href="http://video.google.com/videoplay?docid=2747795879540679409&q=forest+gump">Speed Talker video</a>.<br/><br/>Don't forget to checkout www.multimediaforensics.com for more detailed show notes.<br type="_moz"/>]]></description>
      
      <content:encoded><![CDATA[Today we have a short Thanksgving weekend show. Bret talks about a Mac remote control program called <a href="http://www.apple.com/downloads/macosx/networking_security/iforgot.html">iForgot</a>, a <a href="http://yro.slashdot.org/article.pl?sid=06/11/21/158207">decision</a> by the Florida Supreme Court upholding the conviction of Michael Simmons, <a href="http://hype-free.blogspot.com/2006/11/to-pack-or-not-to-pack.html">Hype-Free article on packing</a>, <a href="http://www.securityfocus.com/brief/366">F-Secure publishes IAdware</a>, <a href="http://www.securityfocus.com/brief/361">Virus in Second Life</a>, <a href="http://www.microsoft.com/technet/sysinternals/SystemInformation/processmonitor.mspx">Procmon</a> from Microsoft, <a href="http://www.safepasswd.com">safe passwords</a>, <a href="http://www.rayninfo.co.uk/vimtips.html">VIM Tips</a> , <a href="http://www.socketsoft.net/SpoofMAC">MacSpoof</a>, and <a href="http://video.google.com/videoplay?docid=2747795879540679409&q=forest+gump">Speed Talker video</a>.Don't forget to checkout www.multimediaforensics.com for more detailed show notes.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_November_26_2006.mp3?dest-id=11283" length="7314647" type="audio/mpeg" />
      <itunes:duration>15:14</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak November 19, 2006</title>
      <itunes:title>CyberSpeak November 19, 2006</itunes:title>
      <pubDate>Sun, 19 Nov 2006 06:38:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=153162#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/1ROn9Gpj9HA/index.php]]></link>
      <description><![CDATA[This show we interview Kris Kendall, Principal Consultant for <a href="http://www.mandiant.com">Mandiant</a>.  He talks about unpacking binaries when conducting malware analysis.   Bret talks about a <a href="http://www.armfor.uscourts.gov/opinions/2006Term/05-5002.pdf">recent court decision</a> from the Military Courts of Appeals, <a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9005165&source=NLT_SEC&nlid=38">Guidance Software settles complaint filed by the FTC</a>, <a href="http://www.securityfocus.com/news/11424">malware in the movies</a>, <a href="http://www.securityfocus.com/brief/360">malware on video cards</a>, toon site <a href="http://www.homestarrunner.com">www.homestarrunner.com</a>, and a site with linux tutorials <a href="http://www.howtoforge.com/">www.howtoforge.com</a>.<br/><br/>Thanks again to Geoff Michelli our new Sound Engineer.  <br/><br/>Detailed show notes can be found at <a href="http://www.multimediaforensics.com">www.multimediaforensics.com</a><br/>]]></description>
      
      <content:encoded><![CDATA[This show we interview Kris Kendall, Principal Consultant for <a href="http://www.mandiant.com">Mandiant</a>. He talks about unpacking binaries when conducting malware analysis. Bret talks about a <a href="http://www.armfor.uscourts.gov/opinions/2006Term/05-5002.pdf">recent court decision</a> from the Military Courts of Appeals, <a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9005165&source=NLT_SEC&nlid=38">Guidance Software settles complaint filed by the FTC</a>, <a href="http://www.securityfocus.com/news/11424">malware in the movies</a>, <a href="http://www.securityfocus.com/brief/360">malware on video cards</a>, toon site <a href="http://www.homestarrunner.com">www.homestarrunner.com</a>, and a site with linux tutorials <a href="http://www.howtoforge.com/">www.howtoforge.com</a>.Thanks again to Geoff Michelli our new Sound Engineer. Detailed show notes can be found at <a href="http://www.multimediaforensics.com">www.multimediaforensics.com</a>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_November_19_2006.mp3?dest-id=11283" length="17509708" type="audio/mpeg" />
      <itunes:duration>36:28</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak November 12, 2006</title>
      <itunes:title>CyberSpeak November 12, 2006</itunes:title>
      <pubDate>Sat, 11 Nov 2006 16:25:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=150690#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/StcfAQ7LaTI/index.php]]></link>
      <description><![CDATA[Today Bret talks with Jesse Kornblum, Principle Computer Forensics Engineer for ManTech's Computer Forensics and Intrusion Analysis Division, about his paper, Eploiting the Rootkit Paradox with Windows Memory Analysis.  Complete show notes can be found <a href="http://www.multimediaforensics.com/viewforum.php?f=17&sid=2c8761fa9bf81928a1c1c539237e0198">here</a>.]]></description>
      
      <content:encoded><![CDATA[Today Bret talks with Jesse Kornblum, Principle Computer Forensics Engineer for ManTech's Computer Forensics and Intrusion Analysis Division, about his paper, Eploiting the Rootkit Paradox with Windows Memory Analysis. Complete show notes can be found <a href="http://www.multimediaforensics.com/viewforum.php?f=17&sid=2c8761fa9bf81928a1c1c539237e0198">here</a>.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_November_12_2006.show.mp3?dest-id=11283" length="30597623" type="audio/mpeg" />
      <itunes:duration>31:52</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak October 29, 2006</title>
      <itunes:title>CyberSpeak October 29, 2006</itunes:title>
      <pubDate>Sun, 29 Oct 2006 17:07:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=146122#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/xCerkYVrh9M/index.php]]></link>
      <description><![CDATA[This short show we talk about upcoming interviews and some behind the scenes info from CyberSpeak.  Also checkout http://www.pcnames.com/ and http://www.cheapmacapps.com.<br/><br/>Bret<br type="_moz"/>]]></description>
      
      <content:encoded><![CDATA[This short show we talk about upcoming interviews and some behind the scenes info from CyberSpeak. Also checkout http://www.pcnames.com/ and http://www.cheapmacapps.com.Bret]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_October_29_2006.mp3?dest-id=11283" length="8083817" type="audio/mpeg" />
      <itunes:duration>08:25</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak October 15, 2006</title>
      <itunes:title>CyberSpeak October 15, 2006</itunes:title>
      <pubDate>Tue, 17 Oct 2006 04:14:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=141606#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/8PGs3R-mHhc/index.php]]></link>
      <description><![CDATA[Today Mike and Bret talk about listener feedback, google fully adopting Writly, Tchnalign releases linux based computer forensics system, Purdue researchers receive funding for digital forensics, www.internetfrog.com, perian.org, and Mike says hi to Seth.
                <br/><br/>PS.  You might have noticed that we have added a subscribe button to our page.  This will allow listeners to donate $2 a month to help support the show.  Thanks to all that have already chipped in!]]></description>
      
      <content:encoded><![CDATA[Today Mike and Bret talk about listener feedback, google fully adopting Writly, Tchnalign releases linux based computer forensics system, Purdue researchers receive funding for digital forensics, www.internetfrog.com, perian.org, and Mike says hi to Seth. PS. You might have noticed that we have added a subscribe button to our page. This will allow listeners to donate $2 a month to help support the show. Thanks to all that have already chipped in!]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_October_15_2006.mp3?dest-id=11283" length="25019157" type="audio/mpeg" />
      <itunes:duration>26:03</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak October 8, 2006</title>
      <itunes:title>CyberSpeak October 8, 2006</itunes:title>
      <pubDate>Sun, 08 Oct 2006 17:54:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=138553#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/h3ZRUR-TMWo/index.php]]></link>
      <description><![CDATA[Today we have an interview with Tom Gallagher, Microsoft Office Security Test Team Lead about his new book <a href="http://www.amazon.com/Hunting-Security-Bugs-Pro-Developer-Paperback/dp/073562187X">Hunting Security Bugs</a>.  Tom tells an interesting story about how Microsoft almost balked at allowing some of the reverse engineering content in the book.  Bret and Mike talk about listener email, <a href="http://www.infoworld.com/article/06/10/03/HNmozilladuped_1.html">Firefox flaw joke</a>, another conversation about <a href="http://www.hack247.co.uk/2006/10/05/hacking-an-atm-machine/">hacking ATMs</a>, the <a href="http://www.hak5.org/wiki/USB_Hacksaw">USB Hacksaw</a>,  <a href="http://myslak.bonsonno.org">MySlax</a> utility, <a href="http://www.dappit.com">www.dappit.com</a>, and <a href="http://www.cl1p.net">www.cl1p.net.</a>]]></description>
      
      <content:encoded><![CDATA[Today we have an interview with Tom Gallagher, Microsoft Office Security Test Team Lead about his new book <a href="http://www.amazon.com/Hunting-Security-Bugs-Pro-Developer-Paperback/dp/073562187X">Hunting Security Bugs</a>. Tom tells an interesting story about how Microsoft almost balked at allowing some of the reverse engineering content in the book. Bret and Mike talk about listener email, <a href="http://www.infoworld.com/article/06/10/03/HNmozilladuped_1.html">Firefox flaw joke</a>, another conversation about <a href="http://www.hack247.co.uk/2006/10/05/hacking-an-atm-machine/">hacking ATMs</a>, the <a href="http://www.hak5.org/wiki/USB_Hacksaw">USB Hacksaw</a>, <a href="http://myslak.bonsonno.org">MySlax</a> utility, <a href="http://www.dappit.com">www.dappit.com</a>, and <a href="http://www.cl1p.net">www.cl1p.net.</a>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeakOct-8.mp3?dest-id=11283" length="53279304" type="audio/mpeg" />
      <itunes:duration>55:29</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak October 1, 2006</title>
      <itunes:title>CyberSpeak October 1, 2006</itunes:title>
      <pubDate>Sun, 01 Oct 2006 16:46:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=136127#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/oGSzr9YkYbs/index.php]]></link>
      <description><![CDATA[Interview with <a href="http://liveview.sf.net">LiveView</a> author, Brian Kaplan from CERT.  Also Bret talks about a <a href="http://news.zdnet.com/2100-1009_22-6121608.html">zero-day Firefox exploit</a>, <a href="http://www.nzherald.co.nz/section/story.cfm?c_id=1&objectid=10403297">a New Zealand man who recently escaped a hacking conviction</a>, <a href="http://www.zdnetasia.com/insight/security/0,39044829,61955207,00.htm">would you hire a black hat?</a>, <a href="http://www.tvsquad.com/2006/10/01/where-to-find-your-favorite-shows-online/">great TV shows online</a>, and <a href="http://www.remote-exploit.org">backtrack bootable CD at remote-exploit.org</a>.<br/><br/>I apologize in advance for the audio quality of the interview with Brian Kaplan.  I tried my best to clean it up.<br/><br/>rm -rf *<br/><br/>]]></description>
      
      <content:encoded><![CDATA[Interview with <a href="http://liveview.sf.net">LiveView</a> author, Brian Kaplan from CERT. Also Bret talks about a <a href="http://news.zdnet.com/2100-1009_22-6121608.html">zero-day Firefox exploit</a>, <a href="http://www.nzherald.co.nz/section/story.cfm?c_id=1&objectid=10403297">a New Zealand man who recently escaped a hacking conviction</a>, <a href="http://www.zdnetasia.com/insight/security/0,39044829,61955207,00.htm">would you hire a black hat?</a>, <a href="http://www.tvsquad.com/2006/10/01/where-to-find-your-favorite-shows-online/">great TV shows online</a>, and <a href="http://www.remote-exploit.org">backtrack bootable CD at remote-exploit.org</a>.I apologize in advance for the audio quality of the interview with Brian Kaplan. I tried my best to clean it up.rm -rf *]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_October_1_2006.mp3?dest-id=11283" length="27856459" type="audio/mpeg" />
      <itunes:duration>29:01</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak September 24, 2006</title>
      <itunes:title>CyberSpeak September 24, 2006</itunes:title>
      <pubDate>Sun, 24 Sep 2006 07:57:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=133549#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/RkeWyqtzsqs/index.php]]></link>
      <description><![CDATA[Today Bret talks about listener experiences with <a href="http://liveview.sourceforge.net/">LiveView</a> (Harlan Carvey posted <a href="http://windowsir.blogspot.com/2006/08/liveview.html">his experiences</a><a href="http://windowsir.blogspot.com/2006/08/liveview.html"> here </a>and Richard Betlich <a href="http://taosecurity.blogspot.com/2006/08/liveview.html">posted here</a>),  the <a href="http://www.techsec.com/html/TechnoForensics2006.htm">Techno Forensics Conference 2006</a>, the <a href="http://www.mce.com/shop/product_detail/product_id/22690/category_id/1545">Highpoint X4 Multi-lane 4 Bay External SATA Enclosure with PCI-X Controller</a> for multi-terrabyte external storage, an individual who posted <a href="http://www.xkcd.com/c155.html">his google search history</a>, <a href="http://passivemode.net/updates/2006/9/22/atm-master-passwords-list.html">ATM manual and default password list</a>, <a href="http://www.jgc.org/blog/2006/09/watching-phishing-attack-live.html">hunting phishers</a>, <a href="http://itpolicy.princeton.edu/voting">security of Diabold's evoting machine</a>, metadata tools, <a href="http://www.networkworld.com/news/2006/091806-cross-site-scripting-the-top-security.html">cross site scripting</a>, <a href="http://passivemode.net/updates/2006/6/5/windows-xp-privilege-escalation-exploit.html">escalating your privileges</a> on a windows XP system, a <a href="http://www.squarefree.net/htmledit/">real time HTML editor</a>, and an <a href="http://www.farecast.com/">airline ticket forecasting</a> site.  <br/><br/>We are giving away a copy of <a href="http://www.oreilly.com/catalog/1597491292/">Enemy at the Watercooler</a> to the best listener email.  <br/><br/>Also, don't forget to support Mandiant First Response and go to <a href="http://www.scmagazine.com/us/awards/categories/26164/best-computer-forensics-solution/">SC Magazine's Best Computer Forensic Solution.</a> VOTING IS NOW ON, check it out <a href="http://www.scmagazine.com/us/awards/categories/26164/best-computer-forensics-solution/">here</a>.<br/>]]></description>
      
      <content:encoded><![CDATA[Today Bret talks about listener experiences with <a href="http://liveview.sourceforge.net/">LiveView</a> (Harlan Carvey posted <a href="http://windowsir.blogspot.com/2006/08/liveview.html">his experiences</a><a href="http://windowsir.blogspot.com/2006/08/liveview.html"> here </a>and Richard Betlich <a href="http://taosecurity.blogspot.com/2006/08/liveview.html">posted here</a>), the <a href="http://www.techsec.com/html/TechnoForensics2006.htm">Techno Forensics Conference 2006</a>, the <a href="http://www.mce.com/shop/product_detail/product_id/22690/category_id/1545">Highpoint X4 Multi-lane 4 Bay External SATA Enclosure with PCI-X Controller</a> for multi-terrabyte external storage, an individual who posted <a href="http://www.xkcd.com/c155.html">his google search history</a>, <a href="http://passivemode.net/updates/2006/9/22/atm-master-passwords-list.html">ATM manual and default password list</a>, <a href="http://www.jgc.org/blog/2006/09/watching-phishing-attack-live.html">hunting phishers</a>, <a href="http://itpolicy.princeton.edu/voting">security of Diabold's evoting machine</a>, metadata tools, <a href="http://www.networkworld.com/news/2006/091806-cross-site-scripting-the-top-security.html">cross site scripting</a>, <a href="http://passivemode.net/updates/2006/6/5/windows-xp-privilege-escalation-exploit.html">escalating your privileges</a> on a windows XP system, a <a href="http://www.squarefree.net/htmledit/">real time HTML editor</a>, and an <a href="http://www.farecast.com/">airline ticket forecasting</a> site. We are giving away a copy of <a href="http://www.oreilly.com/catalog/1597491292/">Enemy at the Watercooler</a> to the best listener email. Also, don't forget to support Mandiant First Response and go to <a href="http://www.scmagazine.com/us/awards/categories/26164/best-computer-forensics-solution/">SC Magazine's Best Computer Forensic Solution.</a> VOTING IS NOW ON, check it out <a href="http://www.scmagazine.com/us/awards/categories/26164/best-computer-forensics-solution/">here</a>.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Sep_24_2006.mp3?dest-id=11283" length="24942507" type="audio/mpeg" />
      <itunes:duration>25:58</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak September 17, 2006</title>
      <itunes:title>CyberSpeak September 17, 2006</itunes:title>
      <pubDate>Mon, 18 Sep 2006 06:06:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=131575#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/heQ-Mg_hgXw/index.php]]></link>
      <description><![CDATA[<p>Today Bret and Mike talk about Forensic Imaging issues.  We also discuss a <a href="http://home.hamptonroads.com/stories/story.cfm?story=110889&ran=223062">man who reprograms an ATM</a>, <a href="http://www.projectleadership.net/documents/ComputerForensicsTrainingSeriesPR.pdf">free forensics training</a>, <a href="http://www.news-press.com/apps/pbcs.dll/article?AID=/20060823/NEWS01/60823017/1075">child porn found after 911 call</a>, liveview, how to create a context menu to print filelistings in Windows XP, creating gmail spam filters, <a href="http://www.derlien.com/">a Mac OS X disk inventory utility</a>, and <a href="http://www.techsec.com/html/TechnoForensics2006.htm">Techno Forensics 2006</a>.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Today Bret and Mike talk about Forensic Imaging issues. We also discuss a <a href="http://home.hamptonroads.com/stories/story.cfm?story=110889&ran=223062">man who reprograms an ATM</a>, <a href="http://www.projectleadership.net/documents/ComputerForensicsTrainingSeriesPR.pdf">free forensics training</a>, <a href="http://www.news-press.com/apps/pbcs.dll/article?AID=/20060823/NEWS01/60823017/1075">child porn found after 911 call</a>, liveview, how to create a context menu to print filelistings in Windows XP, creating gmail spam filters, <a href="http://www.derlien.com/">a Mac OS X disk inventory utility</a>, and <a href="http://www.techsec.com/html/TechnoForensics2006.htm">Techno Forensics 2006</a>.</p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_September_17_2006.mp3?dest-id=11283" length="51181341" type="audio/mpeg" />
      <itunes:duration>53:18</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak September 10</title>
      <itunes:title>CyberSpeak September 10</itunes:title>
      <pubDate>Sun, 10 Sep 2006 17:58:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=129038#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/aI7hkDOoLAA/index.php]]></link>
      <description><![CDATA[Show notes will be posted soon<br/>]]></description>
      
      <content:encoded><![CDATA[Show notes will be posted soon]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak_Sep_10-Final.mp3?dest-id=11283" length="36608167" type="audio/mpeg" />
      <itunes:duration>50:50</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak September 3, 2006 (Repeat)</title>
      <itunes:title>CyberSpeak September 3, 2006 (Repeat)</itunes:title>
      <pubDate>Wed, 06 Sep 2006 06:47:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=127575#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/9kgV50t-K_0/index.php]]></link>
      <description><![CDATA[This is a repeat of the September 3rd posting.  There was a problem with the file being posted.  If you have the September 3rd edition of the show with the Keith Jones interview you can delete this one.]]></description>
      
      <content:encoded><![CDATA[This is a repeat of the September 3rd posting. There was a problem with the file being posted. If you have the September 3rd edition of the show with the Keith Jones interview you can delete this one.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Sep_3_2006.mp3?dest-id=11283" length="59081707" type="audio/mpeg" />
      <itunes:duration>01:01:32</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak August 27, 2006</title>
      <itunes:title>CyberSpeak August 27, 2006</itunes:title>
      <pubDate>Sun, 27 Aug 2006 16:36:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=124252#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/cfJ9JIf5WCk/index.php]]></link>
      <description><![CDATA[<p><span>Back from vacation.  This week we talk with Special Agent David Farquhar from the <a href="http://www.fbi.gov/">Federal Bureau of Investigations</a> about his recent successful <a href="http://seattlepi.nwsource.com/local/282674_botnet26.html"><em><strong>botnet</strong></em> case</a> in Seattle Washington.<span>  </span>We also talk about the <a href="http://www.mortorola.com/support/q">Motorola Q</a>, <a href="http://defcon.org/">DefCon</a>, <a href="http://speedtest.net/">speedtest.net</a>, <a href="http://thinkfree.com/">thinkfree.com</a>, and listener email.</span></p>]]></description>
      
      <content:encoded><![CDATA[<p>Back from vacation. This week we talk with Special Agent David Farquhar from the <a href="http://www.fbi.gov/">Federal Bureau of Investigations</a> about his recent successful <a href="http://seattlepi.nwsource.com/local/282674_botnet26.html"><em>botnet</em> case</a> in Seattle Washington. We also talk about the <a href="http://www.mortorola.com/support/q">Motorola Q</a>, <a href="http://defcon.org/">DefCon</a>, <a href="http://speedtest.net/">speedtest.net</a>, <a href="http://thinkfree.com/">thinkfree.com</a>, and listener email.</p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Aug_27th_CyberspeakEDITED_With_intro.mp3?dest-id=11283" length="58299519" type="audio/mpeg" />
      <itunes:duration>01:00:43</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak August 13, 2006</title>
      <itunes:title>CyberSpeak August 13, 2006</itunes:title>
      <pubDate>Sun, 13 Aug 2006 16:04:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=119799#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/zMlD8c4wXS0/index.php]]></link>
      <description><![CDATA[This show we have a special guest Richard Bejtlich, founder of <a href="http://www.taosecurity.com">TAO Security</a>, who talks about his <a href="http://taosecurity.blogspot.com/">security blog</a> and his book Real Digital Forensics (see link on cyberspeak page).  Bret has a short show this week, Ovie is recovering from his Blackhat hangover (ok really he is working this weekend, but hangover sounds more interesting).  Bret talks about <a href="http://www.blackhat.com">BlackHat</a> 2006, changes on the <a href="http://cyberspeak.libsyn.com">cyberspeak</a> site, Kevin Mandia's <a href="http://www.scmagazine.com/us/news/article/568364/what-pill-i-cyber-insecurity/">SC Magazine article "What pill can I take for cyber insecurity?"</a>,  and <a href="http://www.java.com/en/everywhere/airportmonitor.jsp">real time airport monitoring</a>.<br/>]]></description>
      
      <content:encoded><![CDATA[This show we have a special guest Richard Bejtlich, founder of <a href="http://www.taosecurity.com">TAO Security</a>, who talks about his <a href="http://taosecurity.blogspot.com/">security blog</a> and his book Real Digital Forensics (see link on cyberspeak page). Bret has a short show this week, Ovie is recovering from his Blackhat hangover (ok really he is working this weekend, but hangover sounds more interesting). Bret talks about <a href="http://www.blackhat.com">BlackHat</a> 2006, changes on the <a href="http://cyberspeak.libsyn.com">cyberspeak</a> site, Kevin Mandia's <a href="http://www.scmagazine.com/us/news/article/568364/what-pill-i-cyber-insecurity/">SC Magazine article "What pill can I take for cyber insecurity?"</a>, and <a href="http://www.java.com/en/everywhere/airportmonitor.jsp">real time airport monitoring</a>.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Show_Aug_13_2006.mp3?dest-id=11283" length="28789446" type="audio/mpeg" />
      <itunes:duration>29:59</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak August 10, 2006</title>
      <itunes:title>CyberSpeak August 10, 2006</itunes:title>
      <pubDate>Thu, 10 Aug 2006 17:09:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=118940#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/Wir1HxoVnNs/index.php]]></link>
      <description><![CDATA[This show we interview Brian Contos, Chief Security Officer for <a href="http://www.arcsight.com/">ArcSight</a>.  He talks about his new book <a href="http://www.syngress.com/catalog/?pid=4240 ">Insider Threat: Enemy at the Watercooler</a>.  Also on this show we discuss the new <a href="http://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2006.pdf">FBI computer crime survey results</a>, <a href="http://www.mandiant.com/webhistorian.htm">Web Historian 1.3</a>, new look to <a href="http://cyberspeak.libsyn.com">CyberSpeak</a> site, and a couple of websites of the week.  This show is dedicated to Tim Poole's "bloody left mouse clicking finger."<br/>]]></description>
      
      <content:encoded><![CDATA[This show we interview Brian Contos, Chief Security Officer for <a href="http://www.arcsight.com/">ArcSight</a>. He talks about his new book <a href="http://www.syngress.com/catalog/?pid=4240 ">Insider Threat: Enemy at the Watercooler</a>. Also on this show we discuss the new <a href="http://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2006.pdf">FBI computer crime survey results</a>, <a href="http://www.mandiant.com/webhistorian.htm">Web Historian 1.3</a>, new look to <a href="http://cyberspeak.libsyn.com">CyberSpeak</a> site, and a couple of websites of the week. This show is dedicated to Tim Poole's "bloody left mouse clicking finger."]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Aug_6_2006.mp3?dest-id=11283" length="58674659" type="audio/mpeg" />
      <itunes:duration>01:01:07</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak July 30, 2006</title>
      <itunes:title>CyberSpeak July 30, 2006</itunes:title>
      <pubDate>Sun, 30 Jul 2006 15:22:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=115142#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/Onc6sURyKgI/index.php]]></link>
      <description><![CDATA[This episode we have an exclusive talk with Jesse Kornblum about his new SSDeep tool for piecewise fuzzy hashing!!  This is a revolutionary way to approach computer forensics!  We also talk about antivirus solutions <a href="http://www.clamwin.com/">clamav</a> and <a href="http://free.grisoft.com/doc/2/lng/us/tpl/v5">AVG</a>, <a href="http://www.zdnet.com.au/blogs/securifythis/soa/Why_popular_antivirus_apps_do_not_work_/0,39033341,39264249,00.htm  ">why antivirus doesn't work</a>, <a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9001885 ">CISCO to get  new vulnerabilities released at BlackHat</a>, <a href="http://www.wugnet.com/myspeed/speedtest.asp">speedtest website</a>, and <a href=" http://www.ccc.de/biometrie/fingerabdruck_kopieren.xml?language=en">how to make fake biometrically sound fingerprints</a>.  Extra credit this show goes out to our Producer/Editor Tim Poole.<br/>]]></description>
      
      <content:encoded><![CDATA[This episode we have an exclusive talk with Jesse Kornblum about his new SSDeep tool for piecewise fuzzy hashing!! This is a revolutionary way to approach computer forensics! We also talk about antivirus solutions <a href="http://www.clamwin.com/">clamav</a> and <a href="http://free.grisoft.com/doc/2/lng/us/tpl/v5">AVG</a>, <a href="http://www.zdnet.com.au/blogs/securifythis/soa/Why_popular_antivirus_apps_do_not_work_/0,39033341,39264249,00.htm ">why antivirus doesn't work</a>, <a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9001885 ">CISCO to get new vulnerabilities released at BlackHat</a>, <a href="http://www.wugnet.com/myspeed/speedtest.asp">speedtest website</a>, and <a href=" http://www.ccc.de/biometrie/fingerabdruck_kopieren.xml?language=en">how to make fake biometrically sound fingerprints</a>. Extra credit this show goes out to our Producer/Editor Tim Poole.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak_July30_2006.mp3?dest-id=11283" length="62623660" type="audio/mpeg" />
      <itunes:duration>01:05:13</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak July 18, 2006</title>
      <itunes:title>CyberSpeak July 18, 2006</itunes:title>
      <pubDate>Tue, 18 Jul 2006 19:58:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=111586#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/cyjUfLKAN7w/index.php]]></link>
      <description><![CDATA[<p class="MsoNormal">This show we speak with the <span style="font-weight: bold;">Dark Tangent</span> about changes this year for <a href="http://defcon.org">DEF CON</a> and <a href="http://blackhat.com">BlackHat</a>.  Also in this episode we discuss the <a href="http://www.informationweek.com/industries/showArticle.jhtml?articleID=189602693&pgno=1&queryText">UBS Painwebber logicbomb trial</a>, <a href="http://entmag.com/news/rss.asp?editorialsid=7618">consultant hacks FBI</a>, <a href="http://blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html">two-factor authentication phishing</a> attacks, <a href="http://www.dailytech.com/article.aspx?newsid=3389">Semantec says Windows Vista is less secure than Windows XP</a>, t<a href="http://www.spambox.us">hrow away email account</a>s, t<a href="http://www.teqhead.com/node/7 ">ruecrypt flash toutoria</a>l, <a href="http://www.sodaplay.com/constructor/player.htm">sodaplay</a> (<span style="font-style: italic;">let me know what this is</span>), <a href="http://4shared.com">website to transer and share files</a>, t<a href="http://www.thecableguy.tv/ ">v on the we</a>b, <a href="http://www.ensuretech.com ">Xyloc devices</a>, and a <a href="http://www.nerdparadise.com/index.php?content_id=95 ">tool to obfuscate your email address in javascript</a> code.  The show is 61 mins long.  This show is brought to you by the letter 45.<br/></p>]]></description>
      
      <content:encoded><![CDATA[<p class="MsoNormal">This show we speak with the Dark Tangent about changes this year for <a href="http://defcon.org">DEF CON</a> and <a href="http://blackhat.com">BlackHat</a>. Also in this episode we discuss the <a href="http://www.informationweek.com/industries/showArticle.jhtml?articleID=189602693&pgno=1&queryText">UBS Painwebber logicbomb trial</a>, <a href="http://entmag.com/news/rss.asp?editorialsid=7618">consultant hacks FBI</a>, <a href="http://blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html">two-factor authentication phishing</a> attacks, <a href="http://www.dailytech.com/article.aspx?newsid=3389">Semantec says Windows Vista is less secure than Windows XP</a>, t<a href="http://www.spambox.us">hrow away email account</a>s, t<a href="http://www.teqhead.com/node/7 ">ruecrypt flash toutoria</a>l, <a href="http://www.sodaplay.com/constructor/player.htm">sodaplay</a> (let me know what this is), <a href="http://4shared.com">website to transer and share files</a>, t<a href="http://www.thecableguy.tv/ ">v on the we</a>b, <a href="http://www.ensuretech.com ">Xyloc devices</a>, and a <a href="http://www.nerdparadise.com/index.php?content_id=95 ">tool to obfuscate your email address in javascript</a> code. The show is 61 mins long. This show is brought to you by the letter 45.</p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Show_July_18_2006.mp3?dest-id=11283" length="58544127" type="audio/mpeg" />
      <itunes:duration>01:00:59</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak July 9, 2006</title>
      <itunes:title>CyberSpeak July 9, 2006</itunes:title>
      <pubDate>Tue, 11 Jul 2006 15:46:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=109314#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/XHTFxy-57rM/index.php]]></link>
      <description><![CDATA[Today we send Ovie overseas and talk with Johnny Long.  Johnny talks about his upcoming talks at Blackhat and DEFCON this year.  We also cover how to detect if you are being spied on by the NSA, the VA gets it laptop back, and guess what, Microsoft is getting sued!<br/>]]></description>
      
      <content:encoded><![CDATA[Today we send Ovie overseas and talk with Johnny Long. Johnny talks about his upcoming talks at Blackhat and DEFCON this year. We also cover how to detect if you are being spied on by the NSA, the VA gets it laptop back, and guess what, Microsoft is getting sued!]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_July_9_2006_-_final.mp3?dest-id=11283" length="41611347" type="audio/mpeg" />
      <itunes:duration>43:20</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak July 1, 2006</title>
      <itunes:title>CyberSpeak July 1, 2006</itunes:title>
      <pubDate>Mon, 03 Jul 2006 15:15:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=106845#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/MwaOeN3C4U8/index.php]]></link>
      <description><![CDATA[This week we talk about Mandiant's webinar, vmware, <a href="http://cybercrime.gov">DOJ CCIPS</a>, <a href="http://www.securityfocus.com/brief/233">police using data brokers</a>,  <a href="http://blackhat.org">Blackhat</a>,  <a href="http://sectools.org/">the top 100 security tools</a>, <a href="http://www.eweek.com/article2/0,1895,1979756,00.asp">Windows call back</a>, a <a href="http://www.washingtonpost.com/wp-dyn/content/article/2006/06/21/AR2006062101854_pf.html">Washington Post story incorrectly quoting Kevin Mandia</a>, and <a href="http://zohoshow.com">ZoHoShow</a>.<br/>]]></description>
      
      <content:encoded><![CDATA[This week we talk about Mandiant's webinar, vmware, <a href="http://cybercrime.gov">DOJ CCIPS</a>, <a href="http://www.securityfocus.com/brief/233">police using data brokers</a>, <a href="http://blackhat.org">Blackhat</a>, <a href="http://sectools.org/">the top 100 security tools</a>, <a href="http://www.eweek.com/article2/0,1895,1979756,00.asp">Windows call back</a>, a <a href="http://www.washingtonpost.com/wp-dyn/content/article/2006/06/21/AR2006062101854_pf.html">Washington Post story incorrectly quoting Kevin Mandia</a>, and <a href="http://zohoshow.com">ZoHoShow</a>.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_July_1_2006_-_final.mp3?dest-id=11283" length="40201385" type="audio/mpeg" />
      <itunes:duration>41:52</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak June 24, 2006</title>
      <itunes:title>CyberSpeak June 24, 2006</itunes:title>
      <pubDate>Fri, 23 Jun 2006 20:04:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=104707#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/HLIIKpuT7nw/index.php]]></link>
      <description><![CDATA[<p>Show notes coming soon!?</p>]]></description>
      
      <content:encoded><![CDATA[<p>Show notes coming soon!?</p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/June_24_CyberSpeak_-_final.mp3?dest-id=11283" length="38759861" type="audio/mpeg" />
      <itunes:duration>40:22</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak June 17, 2006</title>
      <itunes:title>CyberSpeak June 17, 2006</itunes:title>
      <pubDate>Sun, 18 Jun 2006 18:49:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=102116#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/tcawAJcjfpQ/index.php]]></link>
      <description><![CDATA[<p>We have Mr Younger back in the studio!  Bret gives out <a href="https://appsecinc.webex.com/mw0302l/mywebex/default.do?service=1&siteurl=appsecinc&main_url=%2Fmc0703l%2Fe.do%3Fsiteurl%3Dappsecinc%26AT%3DMI%26EventID%3D90330432%26Host%3D107c5f5c7a5b1918%26RG%3D1">link</a> to free <a href="http://www.mandiant.com/">MANDIANT</a> webinar on database intrusions.  We talk about Microsoft updates, theft of laptops with sensitive data from AIG, <a href="http://www.tuaw.com/2006/06/17/apples-windows-site-mentions-parallels-desktop-instead-of-boot/">Parallels on Apple</a>, <a href="http://www.hackaday.com/entry/1234000107073749/">USB hacking</a>, <a href="http://blogs.techrepublic.com.com/Ou/?p=43">dumb ways to secure wireless</a>, <a href="http://www.techcrunch.com/2006/06/13/ebay-announces-skype-integration/">Skype integrated into Ebay</a>, <a href="http://merged.ca/monetize/flat/how-to-get-billions-of-pages-indexed-by-Google.html">getting millions of pages indexed by Google</a>, <a href="http://www.gizmodo.com/archives/sushi-usb-flash-drives-023561.php">sushi USB drives</a>, and <a href="http://www.darkreading.com/document.asp?doc_id=97378">research on quick hard drive destruction</a>.  Websites of the day include <a href="http://www.ojp.usdoj.gov/nij/">National Institue of Justice</a> and <a href="http://beta.zoomr.com/home">Zoomr geo-photo gallery</a>.  Sorry for all the sound effects.  We (Bret) got carried away.</p>]]></description>
      
      <content:encoded><![CDATA[<p>We have Mr Younger back in the studio! Bret gives out <a href="https://appsecinc.webex.com/mw0302l/mywebex/default.do?service=1&siteurl=appsecinc&main_url=%2Fmc0703l%2Fe.do%3Fsiteurl%3Dappsecinc%26AT%3DMI%26EventID%3D90330432%26Host%3D107c5f5c7a5b1918%26RG%3D1">link</a> to free <a href="http://www.mandiant.com/">MANDIANT</a> webinar on database intrusions. We talk about Microsoft updates, theft of laptops with sensitive data from AIG, <a href="http://www.tuaw.com/2006/06/17/apples-windows-site-mentions-parallels-desktop-instead-of-boot/">Parallels on Apple</a>, <a href="http://www.hackaday.com/entry/1234000107073749/">USB hacking</a>, <a href="http://blogs.techrepublic.com.com/Ou/?p=43">dumb ways to secure wireless</a>, <a href="http://www.techcrunch.com/2006/06/13/ebay-announces-skype-integration/">Skype integrated into Ebay</a>, <a href="http://merged.ca/monetize/flat/how-to-get-billions-of-pages-indexed-by-Google.html">getting millions of pages indexed by Google</a>, <a href="http://www.gizmodo.com/archives/sushi-usb-flash-drives-023561.php">sushi USB drives</a>, and <a href="http://www.darkreading.com/document.asp?doc_id=97378">research on quick hard drive destruction</a>. Websites of the day include <a href="http://www.ojp.usdoj.gov/nij/">National Institue of Justice</a> and <a href="http://beta.zoomr.com/home">Zoomr geo-photo gallery</a>. Sorry for all the sound effects. We (Bret) got carried away.</p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_June_17_-_final.mp3?dest-id=11283" length="45386604" type="audio/mpeg" />
      <itunes:duration>47:16</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak June 10, 2006</title>
      <itunes:title>CyberSpeak June 10, 2006</itunes:title>
      <pubDate>Sun, 11 Jun 2006 17:15:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=99796#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/PXKDOWZVt8U/index.php]]></link>
      <description><![CDATA[<p class="MsoNormal">Bret discusses his quad-monitor display unit, Wal-Mart is a chick magnet, Mercury's Free Evidence Mover, Nic Harbor updating DCFLDD.<span>  </span>A story about Best Buy's Geek Squad failing to destroy old hard drives and they wind up at a flea Market. Eraser programs- <a href="http://dban.sourceforge.net/">Derick's Boot and Nuke</a>, <a href="http://www.heidi.ie/eraser">www.heidi.ie/eraser</a> .<span>  </span>New version to Skeuthkit found at <a href="http://www.sleuthkit.org">www.sleuthkit.org</a>, and Harlan Carvey give a go-by for his Forensic Server Project which can be found at <a href="http://windowsir.blogspot.com/">http://windowsir.blogspot.com/</a>. <span> </span></p>]]></description>
      
      <content:encoded><![CDATA[<p class="MsoNormal">Bret discusses his quad-monitor display unit, Wal-Mart is a chick magnet, Mercury's Free Evidence Mover, Nic Harbor updating DCFLDD. A story about Best Buy's Geek Squad failing to destroy old hard drives and they wind up at a flea Market. Eraser programs- <a href="http://dban.sourceforge.net/">Derick's Boot and Nuke</a>, <a href="http://www.heidi.ie/eraser">www.heidi.ie/eraser</a> . New version to Skeuthkit found at <a href="http://www.sleuthkit.org">www.sleuthkit.org</a>, and Harlan Carvey give a go-by for his Forensic Server Project which can be found at <a href="http://windowsir.blogspot.com/">http://windowsir.blogspot.com/</a>. </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak_June_10_-_final.mp3?dest-id=11283" length="53878260" type="audio/mpeg" />
      <itunes:duration>56:07</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak June 3, 2006</title>
      <itunes:title>CyberSpeak June 3, 2006</itunes:title>
      <pubDate>Tue, 06 Jun 2006 05:20:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=98104#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/_1zIg1iNYuY/index.php]]></link>
      <description><![CDATA[This show we have a great inteview with Jesse Kornblum about memory analysis.  We also talk with Steve Bunting about LogParser 2.2 from Microsoft.  Ovie and Bret recite an Apple cartoon.<br/>]]></description>
      
      <content:encoded><![CDATA[This show we have a great inteview with Jesse Kornblum about memory analysis. We also talk with Steve Bunting about LogParser 2.2 from Microsoft. Ovie and Bret recite an Apple cartoon.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Show_Jun_3_2006.mp3?dest-id=11283" length="69668246" type="audio/mpeg" />
      <itunes:duration>01:12:34</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak May 29, 2006</title>
      <itunes:title>CyberSpeak May 29, 2006</itunes:title>
      <pubDate>Mon, 29 May 2006 17:38:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=95639#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/Y1HpcLAoXX0/index.php]]></link>
      <description><![CDATA[This show we have Mike Younger in the studio.  We talk with Mike about stuff.  Mike talks about stuff.  And then we talked about more stuff.]]></description>
      
      <content:encoded><![CDATA[This show we have Mike Younger in the studio. We talk with Mike about stuff. Mike talks about stuff. And then we talked about more stuff.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Show_May_29_2006.mp3?dest-id=11283" length="45913756" type="audio/mpeg" />
      <itunes:duration>47:49</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak May 21, 2006</title>
      <itunes:title>CyberSpeak May 21, 2006</itunes:title>
      <pubDate>Mon, 22 May 2006 06:06:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=93051#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/0GF6gKNmUsM/index.php]]></link>
      <description><![CDATA[This week we have Mike Younger drop in on us.   We talk about Microsoft patch Tuesday, MAC vulnerabilities, Pentagon is hacked, Football player beats up nerd, ABC to start showing programs on the web, and free webbased storage.]]></description>
      
      <content:encoded><![CDATA[This week we have Mike Younger drop in on us. We talk about Microsoft patch Tuesday, MAC vulnerabilities, Pentagon is hacked, Football player beats up nerd, ABC to start showing programs on the web, and free webbased storage.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Show_May_21_2006.mp3?dest-id=11283" length="59851543" type="audio/mpeg" />
      <itunes:duration>01:02:20</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak May 13, 2006</title>
      <itunes:title>CyberSpeak May 13, 2006</itunes:title>
      <pubDate>Sat, 13 May 2006 16:44:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=90491#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/EWaLTFLkzBM/index.php]]></link>
      <description><![CDATA[<p>The episode we talk with Steve Bunting about his new <a href="http://www.amazon.com/gp/product/0782144357/sr=8-1/qid=1147654172/ref=pd_bbs_1/104-9849137-9342349?%5Fencoding=UTF8">ENCE Study Guide</a>.  We also talk about the <a href="http://science.slashdot.org/article.pl?sid=06/05/06/1247236">UK hacker Gary McKinnon,</a> <a href="http://ideas.live.com/">Microsoft Live Answers</a>, and <a href="http://www.valleyschwag.com/">Valley Schwag</a> for $15 a month. Rep. <a target="_blank" href="http://news.zdnet.com/2100-9595_22-6069210.html">Joe Barton</a> of Texas,
                who chairs the House committee responsible for writing Internet and
                telecommunications law, has pledged to work on legislation related to mandatory
                data retention.  <span>A <a href="http://news.zdnet.com/2100-1009_22-6069238.html">20-year-old California man has pleaded guilty</a> to launching a bot network attack that compromised
                computers at a Seattle hospital and several universities.  We also discuss poor Patrick Kennedy and his recent memory loss after his traffic accident.  We also answer a question from George from <a href="http://www.kevindevin.com/">In the Trenches podcast</a>.  </span> </p>
                <p> </p>
                <p>A great web site pick of the week is at <a href="http://remote-exploit.org">Remote Exploit.org</a>.  <br/></p>]]></description>
      
      <content:encoded><![CDATA[<p>The episode we talk with Steve Bunting about his new <a href="http://www.amazon.com/gp/product/0782144357/sr=8-1/qid=1147654172/ref=pd_bbs_1/104-9849137-9342349?%5Fencoding=UTF8">ENCE Study Guide</a>. We also talk about the <a href="http://science.slashdot.org/article.pl?sid=06/05/06/1247236">UK hacker Gary McKinnon,</a> <a href="http://ideas.live.com/">Microsoft Live Answers</a>, and <a href="http://www.valleyschwag.com/">Valley Schwag</a> for $15 a month. Rep. <a target="_blank" href="http://news.zdnet.com/2100-9595_22-6069210.html">Joe Barton</a> of Texas, who chairs the House committee responsible for writing Internet and telecommunications law, has pledged to work on legislation related to mandatory data retention. A <a href="http://news.zdnet.com/2100-1009_22-6069238.html">20-year-old California man has pleaded guilty</a> to launching a bot network attack that compromised computers at a Seattle hospital and several universities. We also discuss poor Patrick Kennedy and his recent memory loss after his traffic accident. We also answer a question from George from <a href="http://www.kevindevin.com/">In the Trenches podcast</a>. </p> <p> </p> <p>A great web site pick of the week is at <a href="http://remote-exploit.org">Remote Exploit.org</a>. </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Show_May_13_2006.mp3?dest-id=11283" length="62657810" type="audio/mpeg" />
      <itunes:duration>01:05:16</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak May 6, 2006  FINALLY!</title>
      <itunes:title>CyberSpeak May 6, 2006  FINALLY!</itunes:title>
      <pubDate>Sun, 07 May 2006 18:44:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=88085#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/rNyO_K7b_fM/index.php]]></link>
      <description><![CDATA[<p>Sorry about the slip of a week, but we are now back on track.  We talk to Mark Rache columnist for Security Focus and Senior Vice President and Chief Security Counsel at Solutionary Inc. about his "<a href="http://www.securityfocus.com/columnists/399">Forensic felonies</a>" article.  We also talk with Dave Merkel, Vice President of Products at <a href="http://www.mandiant.com/">MANDIANT</a> about the release of <a href="http://www.mandiant.com/firstresponse.htm">First Response version 1.1</a>, <a href="http://www.sophos.com/pressoffice/news/articles/2006/04/ransom.html">trojans that hold your computer for ransom</a>, <a href="http://www.watchyourend.com/2006/04/29/hacking-applications-that-run-on-thumb-drive/">USB ported security applications</a>, <a href="http://www.pcworld.com/news/article/0,aid,125587,00.asp">residential WiFi sharing</a>, <a href="http://www.eweek.com/article2/0,1895,1945808,00.asp">impossible to recover from spyware and viruses</a>, <a href="http://freenetproject.org/">Freenet version 0.7</a>, and <a href="http://www.securitywizardry.com/radar.htm">SecurityWizardry.com.</a></p>]]></description>
      
      <content:encoded><![CDATA[<p>Sorry about the slip of a week, but we are now back on track. We talk to Mark Rache columnist for Security Focus and Senior Vice President and Chief Security Counsel at Solutionary Inc. about his "<a href="http://www.securityfocus.com/columnists/399">Forensic felonies</a>" article. We also talk with Dave Merkel, Vice President of Products at <a href="http://www.mandiant.com/">MANDIANT</a> about the release of <a href="http://www.mandiant.com/firstresponse.htm">First Response version 1.1</a>, <a href="http://www.sophos.com/pressoffice/news/articles/2006/04/ransom.html">trojans that hold your computer for ransom</a>, <a href="http://www.watchyourend.com/2006/04/29/hacking-applications-that-run-on-thumb-drive/">USB ported security applications</a>, <a href="http://www.pcworld.com/news/article/0,aid,125587,00.asp">residential WiFi sharing</a>, <a href="http://www.eweek.com/article2/0,1895,1945808,00.asp">impossible to recover from spyware and viruses</a>, <a href="http://freenetproject.org/">Freenet version 0.7</a>, and <a href="http://www.securitywizardry.com/radar.htm">SecurityWizardry.com.</a></p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeakShow__Apr_29_2006.mp3?dest-id=11283" length="56555355" type="audio/mpeg" />
      <itunes:duration>01:18:32</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Apr 22, 2006</title>
      <itunes:title>CyberSpeak Apr 22, 2006</itunes:title>
      <pubDate>Sun, 23 Apr 2006 18:54:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=83304#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/IY8Iu0bWZGs/index.php]]></link>
      <description><![CDATA[<p>In this show we interview Jaime Florence from <a href="http://www.microforensics.com/">MicroForensics</a> about Mercury, a new forensic text indexing product.  We also talk about the <a href="http://www.itworld.com/Man/2681/060421usdoj/">DOJ's initiative to fight child porn</a>, <a href="http://snapshot.opera.com/">Opera version 9 Beta</a>, <a href="http://www.fcw.com/article94067-04-13-06-Web">Texas Governor Issued executive order prohibiting P2P</a>, <a href="http://www.techcrunch.com/2006/04/20/microsoft-live-drive-may-launch-before-google-drive/">Microsoft Live Drive</a>, <a href="http://arstechnica.com/news.ars/post/20060421-6647.html">new wifi law</a>, data<a href="http://news.com.com/U.S.+attorney+general+calls+for+reasonable+data+retention/2100-1030_3-6063185.html?tag=st.rn"> retention for ISPs</a>, <a href="http://news.yahoo.com/s/ap/20060422/ap_on_hi_te/air_force_one_hoax">video showing graffiti on Air Force One</a>, and <a href="http://www.free411.com/">free 411</a>.  </p>
                <p>Upcoming Conferences:</p>
                <pre>LayerOne 2006<br/>Apr 15-16, Los Angeles, CA<br/><a class="moz-txt-link-freetext" href="http://www.layerone.info/index.html">http://www.layerone.info/index.html</a>
                2006 GFIRST Conference
                Apr 30-May 05, Orlando, FL
                <a class="moz-txt-link-freetext" href="http://www.us-cert.gov/GFIRST">http://www.us-cert.gov/GFIRST</a>
                Computer and Enterprise Investigations Conference (CEIC) 2006
                May 03-06, Las Vegas, NV
                <a class="moz-txt-link-freetext" href="http://www.ceic2006.com/">http://www.ceic2006.com</a></pre><p><em>The show is about 1 hour 9 mins long.  Thanks to <strong>Brian</strong> for pointing out how to put links in the show notes!  Thanks to <strong>Tim</strong> for editing the show again!</em></p>]]></description>
      
      <content:encoded><![CDATA[<p>In this show we interview Jaime Florence from <a href="http://www.microforensics.com/">MicroForensics</a> about Mercury, a new forensic text indexing product. We also talk about the <a href="http://www.itworld.com/Man/2681/060421usdoj/">DOJ's initiative to fight child porn</a>, <a href="http://snapshot.opera.com/">Opera version 9 Beta</a>, <a href="http://www.fcw.com/article94067-04-13-06-Web">Texas Governor Issued executive order prohibiting P2P</a>, <a href="http://www.techcrunch.com/2006/04/20/microsoft-live-drive-may-launch-before-google-drive/">Microsoft Live Drive</a>, <a href="http://arstechnica.com/news.ars/post/20060421-6647.html">new wifi law</a>, data<a href="http://news.com.com/U.S.+attorney+general+calls+for+reasonable+data+retention/2100-1030_3-6063185.html?tag=st.rn"> retention for ISPs</a>, <a href="http://news.yahoo.com/s/ap/20060422/ap_on_hi_te/air_force_one_hoax">video showing graffiti on Air Force One</a>, and <a href="http://www.free411.com/">free 411</a>. </p> <p>Upcoming Conferences:</p> LayerOne 2006Apr 15-16, Los Angeles, CA<a class="moz-txt-link-freetext" href="http://www.layerone.info/index.html">http://www.layerone.info/index.html</a> 2006 GFIRST Conference Apr 30-May 05, Orlando, FL <a class="moz-txt-link-freetext" href="http://www.us-cert.gov/GFIRST">http://www.us-cert.gov/GFIRST</a> Computer and Enterprise Investigations Conference (CEIC) 2006 May 03-06, Las Vegas, NV <a class="moz-txt-link-freetext" href="http://www.ceic2006.com/">http://www.ceic2006.com</a><p><em>The show is about 1 hour 9 mins long. Thanks to Brian for pointing out how to put links in the show notes! Thanks to Tim for editing the show again!</em></p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Show_Apr_22_2006.mp3?dest-id=11283" length="59603884" type="audio/mpeg" />
      <itunes:duration>01:02:05</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak April 15</title>
      <itunes:title>CyberSpeak April 15</itunes:title>
      <pubDate>Mon, 17 Apr 2006 05:24:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=81018#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/91yv0263Qfw/index.php]]></link>
      <description><![CDATA[<p class="MsoNormal">In this show we discuss recent computer crime news, Micro Forensicâs
                Mercury indexing software, upcoming conferences and more. </p>
                <span style="font-weight: bold; color: rgb(255, 0, 0);">SANS Fire 2006 </span><strong>July 5 - 13, 2006 Washington , DC</strong><span style="font-weight: bold; color: rgb(255, 0, 0);">- CyberSpeak Listeners get 5% off - that is a savings of $150+ <br/><br/>CyberSpeal Listeners get $50.00 off purchase of Mercury - htt[://www.microforensics.com<br/><br/></span><span style="font-weight: bold;"><span style="color: rgb(0, 0, 153);">Guidance Software has partnered with Sybex, a John Wiley imprint, to release the industryâs first in-depth study guide for EnCEâ</span><br/><br/></span>http://www.forensicswiki.org<br/><a href="http://blog.outer-court.com/archive/2006-04-14-n59.html"></a>http://www.dexterity.com/articles/overcoming-procrastination.htm <span style="font-weight: bold; color: rgb(255, 0, 0);"><br/><br/></span>]]></description>
      
      <content:encoded><![CDATA[<p class="MsoNormal">In this show we discuss recent computer crime news, Micro Forensicâs Mercury indexing software, upcoming conferences and more. </p> SANS Fire 2006 July 5 - 13, 2006 Washington , DC- CyberSpeak Listeners get 5% off - that is a savings of $150+ CyberSpeal Listeners get $50.00 off purchase of Mercury - htt[://www.microforensics.comGuidance Software has partnered with Sybex, a John Wiley imprint, to release the industryâs first in-depth study guide for EnCEâhttp://www.forensicswiki.org<a href="http://blog.outer-court.com/archive/2006-04-14-n59.html"></a>http://www.dexterity.com/articles/overcoming-procrastination.htm]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_April_15_2006_-_final.mp3?dest-id=11283" length="28404822" type="audio/mpeg" />
      <itunes:duration>29:35</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak April 8th</title>
      <itunes:title>CyberSpeak April 8th</itunes:title>
      <pubDate>Wed, 12 Apr 2006 17:50:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=79515#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/rnZJCbKKS5c/index.php]]></link>
      <description><![CDATA[<p class="MsoNormal">In this short show we talk about some Microsoft initiatives,
                shared access, deciphering information in the Windows/prefetch directory,
                live.com, expo.live.com.<span>  </span>Weâve been
                Zinged by <a href="http://www.podzinger.com/">www.podzinger.com</a>. <span> </span>We also briefly discuss a new indexing tool
                that works with EnCase called Mercury from <a href="http://www.microforensics.com/">www.microforensics.com</a> â ALL CyberSpeak
                listeners can get $50 off by emailing the owner and saying that you heard about
                Mercury on CyberSpeak.<span>  </span><span> </span>We also discuss Appleâs âBoot Campâ?.<span>  </span>Appleâs sanctioned application to dul boot
                and run Windows XP on your MacBook.<span>  </span>We
                also have a new SOUND engineer editing our podcast.<span>  </span></p>]]></description>
      
      <content:encoded><![CDATA[<p class="MsoNormal">In this short show we talk about some Microsoft initiatives, shared access, deciphering information in the Windows/prefetch directory, live.com, expo.live.com. Weâve been Zinged by <a href="http://www.podzinger.com/">www.podzinger.com</a>. We also briefly discuss a new indexing tool that works with EnCase called Mercury from <a href="http://www.microforensics.com/">www.microforensics.com</a> â ALL CyberSpeak listeners can get $50 off by emailing the owner and saying that you heard about Mercury on CyberSpeak. We also discuss Appleâs âBoot Campâ?. Appleâs sanctioned application to dul boot and run Windows XP on your MacBook. We also have a new SOUND engineer editing our podcast. </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak_Show__April8.mp3?dest-id=11283" length="29102847" type="audio/mpeg" />
      <itunes:duration>30:18</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak April 8th</title>
      <itunes:title>CyberSpeak April 8th</itunes:title>
      <pubDate>Wed, 12 Apr 2006 13:50:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=79515#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/rnZJCbKKS5c/index.php]]></link>
      <description><![CDATA[<p class="MsoNormal">In this short show we talk about some Microsoft initiatives,
                shared access, deciphering information in the Windows/prefetch directory,
                live.com, expo.live.com.<span>  </span>Weâve been
                Zinged by <a href="http://www.podzinger.com/">www.podzinger.com</a>. <span> </span>We also briefly discuss a new indexing tool
                that works with EnCase called Mercury from <a href="http://www.microforensics.com/">www.microforensics.com</a> â ALL CyberSpeak
                listeners can get $50 off by emailing the owner and saying that you heard about
                Mercury on CyberSpeak.<span>  </span><span> </span>We also discuss Appleâs âBoot Campâ?.<span>  </span>Appleâs sanctioned application to dul boot
                and run Windows XP on your MacBook.<span>  </span>We
                also have a new SOUND engineer editing our podcast.<span>  </span></p>]]></description>
      
      <content:encoded><![CDATA[<p class="MsoNormal">In this short show we talk about some Microsoft initiatives, shared access, deciphering information in the Windows/prefetch directory, live.com, expo.live.com. Weâve been Zinged by <a href="http://www.podzinger.com/">www.podzinger.com</a>. We also briefly discuss a new indexing tool that works with EnCase called Mercury from <a href="http://www.microforensics.com/">www.microforensics.com</a> â ALL CyberSpeak listeners can get $50 off by emailing the owner and saying that you heard about Mercury on CyberSpeak. We also discuss Appleâs âBoot Campâ?. Appleâs sanctioned application to dul boot and run Windows XP on your MacBook. We also have a new SOUND engineer editing our podcast. </p>]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak_Show__April8.mp3?dest-id=11283" length="29102847" type="audio/mpeg" />
      <itunes:duration>30:18</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Apr 1, 2006</title>
      <itunes:title>CyberSpeak Apr 1, 2006</itunes:title>
      <pubDate>Sat, 01 Apr 2006 13:58:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=75940#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/JsmhBiHVW7U/index.php]]></link>
      <description><![CDATA[In this show we interview Harlan Carvey author of the Forensic Server Project.  Also we talk about SansFire 2006, CyberSpeak is good for CISSP credits, piggybacking wireless, and cute overload.]]></description>
      
      <content:encoded><![CDATA[In this show we interview Harlan Carvey author of the Forensic Server Project. Also we talk about SansFire 2006, CyberSpeak is good for CISSP credits, piggybacking wireless, and cute overload.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Show_Apr_1_2006.mp3?dest-id=11283" length="47462448" type="audio/mpeg" />
      <itunes:duration>01:05:55</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Mar 25, 2006</title>
      <itunes:title>CyberSpeak Mar 25, 2006</itunes:title>
      <pubDate>Sat, 25 Mar 2006 16:08:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=73444#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/OFSYpc5IXb8/index.php]]></link>
      <description><![CDATA[In this show we give a walkthrough of MANDIANT's First Response tool.  We also talk about Microsoft creating C# for the Mac, Firefox 2 Alpha 1, spray on fabric, on10.net,  and listener email.]]></description>
      
      <content:encoded><![CDATA[In this show we give a walkthrough of MANDIANT's First Response tool. We also talk about Microsoft creating C# for the Mac, Firefox 2 Alpha 1, spray on fabric, on10.net, and listener email.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Show_Mar25_2006.mp3?dest-id=11283" length="52924416" type="audio/mpeg" />
      <itunes:duration>55:07</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Mar 18, 2006</title>
      <itunes:title>CyberSpeak Mar 18, 2006</itunes:title>
      <pubDate>Sat, 18 Mar 2006 10:17:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=70876#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/5jx1Qujp3p4/index.php]]></link>
      <description><![CDATA[In this show we play the second part of our interview with Kris Kendal from Mandiant about malware analysis.  Also we talk about the FBIs new computer system, reaffirmation of computer forensic tools, does gmail ever delete your email, RFID tag vulnerabilities and listener email.  This show is 58 minutes 17 seconds.]]></description>
      
      <content:encoded><![CDATA[In this show we play the second part of our interview with Kris Kendal from Mandiant about malware analysis. Also we talk about the FBIs new computer system, reaffirmation of computer forensic tools, does gmail ever delete your email, RFID tag vulnerabilities and listener email. This show is 58 minutes 17 seconds.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Show_Mar_18_2006.mp3?dest-id=11283" length="41964590" type="audio/mpeg" />
      <itunes:duration>58:17</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Mar 11, 2006</title>
      <itunes:title>CyberSpeak Mar 11, 2006</itunes:title>
      <pubDate>Sun, 12 Mar 2006 11:49:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=68485#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/ZrIqS9V-KXo/index.php]]></link>
      <description><![CDATA[This show Bret announces his marriage to Jill, we talk to forensic equipment manufactures at FOSE; James Wiebe from Wiebetech.com about 2 new devices, a CD/DVD automated imaging device and a new SCSI to fire wire 400 write block device. We also talk to Todd Bellows, a sales representative from LogiCube.com about the CellDek, a new cell phone imaging device and the new Triton which is the next generation LogiCube.  We discuss free forensic tools, analysis of RAM, and GoodMail. Bret hacks his wife's Prius car area network (CAN). This show is 62 minutes.]]></description>
      
      <content:encoded><![CDATA[This show Bret announces his marriage to Jill, we talk to forensic equipment manufactures at FOSE; James Wiebe from Wiebetech.com about 2 new devices, a CD/DVD automated imaging device and a new SCSI to fire wire 400 write block device. We also talk to Todd Bellows, a sales representative from LogiCube.com about the CellDek, a new cell phone imaging device and the new Triton which is the next generation LogiCube. We discuss free forensic tools, analysis of RAM, and GoodMail. Bret hacks his wife's Prius car area network (CAN). This show is 62 minutes.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/March_11_CyberSpeak-mono.mp3?dest-id=11283" length="44746848" type="audio/mpeg" />
      <itunes:duration>01:02:08</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Mar 4, 2006</title>
      <itunes:title>CyberSpeak Mar 4, 2006</itunes:title>
      <pubDate>Sat, 04 Mar 2006 17:39:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=65976#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/zSr6ha3CO-w/index.php]]></link>
      <description><![CDATA[This show we talk to Dave Merkel, Vice President of Products at MANDIANT.  He talks about the release of their First Response tool for incident response.  We also talk about Microsoft Anti-Spyware, Javascript bug in Gmail, where Bret shops for his clothes, and the color purple.  This show is 51mins 46 secs.]]></description>
      
      <content:encoded><![CDATA[This show we talk to Dave Merkel, Vice President of Products at MANDIANT. He talks about the release of their First Response tool for incident response. We also talk about Microsoft Anti-Spyware, Javascript bug in Gmail, where Bret shops for his clothes, and the color purple. This show is 51mins 46 secs.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Show_Mar_4_2006.mp3?dest-id=11283" length="37287120" type="audio/mpeg" />
      <itunes:duration>51:47</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Feb 25, 2006</title>
      <itunes:title>CyberSpeak Feb 25, 2006</itunes:title>
      <pubDate>Sat, 25 Feb 2006 09:28:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=63014#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/yjiJCFeeJQM/index.php]]></link>
      <description><![CDATA[This week part one of our talk with Kris Kendall from Mandiant about malware analysis.  Also Mike Younger from Stroz Friedberg, LLC joins us for a chat.  We cover a question about USC 2703, how to build a keylogger, and an update on the Washington Post story about the botmaster.]]></description>
      
      <content:encoded><![CDATA[This week part one of our talk with Kris Kendall from Mandiant about malware analysis. Also Mike Younger from Stroz Friedberg, LLC joins us for a chat. We cover a question about USC 2703, how to build a keylogger, and an update on the Washington Post story about the botmaster.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak_Show_Feb_25_2006.mp3?dest-id=11283" length="51946592" type="audio/mpeg" />
      <itunes:duration>01:12:08</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Feb 18, 2006</title>
      <itunes:title>CyberSpeak Feb 18, 2006</itunes:title>
      <pubDate>Sat, 18 Feb 2006 03:46:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=60190#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/RFCX4rJqt3k/index.php]]></link>
      <description><![CDATA[In this show we interview Bruce Potter founder of the Shmoo Group, a non-profit think-tank of computer security professionals.  We also talk about Max OS X viruses, interview with a botmaster, indictment of a botmaster, file registary, Web Historian, and listener email.]]></description>
      
      <content:encoded><![CDATA[In this show we interview Bruce Potter founder of the Shmoo Group, a non-profit think-tank of computer security professionals. We also talk about Max OS X viruses, interview with a botmaster, indictment of a botmaster, file registary, Web Historian, and listener email.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Show_Feb_18_2006.mp3?dest-id=11283" length="55159824" type="audio/mpeg" />
      <itunes:duration>01:16:36</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Feb 11, 2006</title>
      <itunes:title>CyberSpeak Feb 11, 2006</itunes:title>
      <pubDate>Sat, 11 Feb 2006 04:09:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=57717#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/jOTQ3Xfxq1I/index.php]]></link>
      <description><![CDATA[In this show we talk again to Mr Jesse Kornblum.  Also we discuss slipstreaming, dynamic drive partitioning, caffeine naps, and Google Desktop Beta 3.  Bret and Ovie talk a little about their backgrounds.  This show is approx 1hr 2mins.]]></description>
      
      <content:encoded><![CDATA[In this show we talk again to Mr Jesse Kornblum. Also we discuss slipstreaming, dynamic drive partitioning, caffeine naps, and Google Desktop Beta 3. Bret and Ovie talk a little about their backgrounds. This show is approx 1hr 2mins.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Show_Feb_11_2006.mp3?dest-id=11283" length="45260544" type="audio/mpeg" />
      <itunes:duration>01:02:51</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Feb 4, 2006</title>
      <itunes:title>CyberSpeak Feb 4, 2006</itunes:title>
      <pubDate>Sat, 04 Feb 2006 09:50:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=55496#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/1UerAB77omQ/index.php]]></link>
      <description><![CDATA[This week we talk with Brian Carrier, author of File System Forensic Analysis.  Also we dicuss NTFS performance, TOR FTK, and the TI-99/4a.]]></description>
      
      <content:encoded><![CDATA[This week we talk with Brian Carrier, author of File System Forensic Analysis. Also we dicuss NTFS performance, TOR FTK, and the TI-99/4a.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Show_Feb_4_2006.mp3?dest-id=11283" length="46874496" type="audio/mpeg" />
      <itunes:duration>01:05:06</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Jan 28, 2006</title>
      <itunes:title>CyberSpeak Jan 28, 2006</itunes:title>
      <pubDate>Sat, 28 Jan 2006 09:50:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=52645#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/4TFQirX6JMI/index.php]]></link>
      <description><![CDATA[In this episode we interview President of Red Cliff Consulting, Mr. Kevin Mandia, about trends in incident response.  Also we talk about the windows registry, what not to do when interviewing for a tech job, brief talk with Nicholas Harbour about new version of DCFLDD, and NSA document redaction guidelines.]]></description>
      
      <content:encoded><![CDATA[In this episode we interview President of Red Cliff Consulting, Mr. Kevin Mandia, about trends in incident response. Also we talk about the windows registry, what not to do when interviewing for a tech job, brief talk with Nicholas Harbour about new version of DCFLDD, and NSA document redaction guidelines.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Show_Jan_28_2006.mp3?dest-id=11283" length="50737440" type="audio/mpeg" />
      <itunes:duration>01:10:28</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Jan 21 2006</title>
      <itunes:title>CyberSpeak Jan 21 2006</itunes:title>
      <pubDate>Sat, 21 Jan 2006 23:07:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=50333#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/yzbOuUgXFeA/index.php]]></link>
      <description><![CDATA[This show features an interview with Johnny Long.  Johnny talks about his work with GoogleHacking and his new book OS X for Hackers at Heart.  Also in this episode, web based network tools, how to trace an email, more info on WMF vulnerability, and sticky note Firefox extension.]]></description>
      
      <content:encoded><![CDATA[This show features an interview with Johnny Long. Johnny talks about his work with GoogleHacking and his new book OS X for Hackers at Heart. Also in this episode, web based network tools, how to trace an email, more info on WMF vulnerability, and sticky note Firefox extension.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Show_Jan_21_2006.mp3?dest-id=11283" length="38387424" type="audio/mpeg" />
      <itunes:duration>53:18</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak Special Vulnerability Report</title>
      <itunes:title>CyberSpeak Special Vulnerability Report</itunes:title>
      <pubDate>Wed, 18 Jan 2006 00:03:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=49424#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/F1TD5_mTRTc/index.php]]></link>
      <description><![CDATA[Microsoft Windows Silent Adhoc Network Advertisement Vulnerability.  Last weekend Simple Nomad, hacker and security researcher, announced a new Windows wireless vulnerability during his "Hacking the Friendly Skies" presentation at ShmooCon 2006.  CyberSpeak interviews Nomad about his findings and how to protect your systems.  This show is abbreviated and is released out of sequence to get this information to our listeners quickly.  We will be releasing our full length show as usual later this coming weekend.]]></description>
      
      <content:encoded><![CDATA[Microsoft Windows Silent Adhoc Network Advertisement Vulnerability. Last weekend Simple Nomad, hacker and security researcher, announced a new Windows wireless vulnerability during his "Hacking the Friendly Skies" presentation at ShmooCon 2006. CyberSpeak interviews Nomad about his findings and how to protect your systems. This show is abbreviated and is released out of sequence to get this information to our listeners quickly. We will be releasing our full length show as usual later this coming weekend.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Show_Jan18_2006.mp3?dest-id=11283" length="18331824" type="audio/mpeg" />
      <itunes:duration>25:27</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>Jan 14 2006 CyberSpeak</title>
      <itunes:title>Jan 14 2006 CyberSpeak</itunes:title>
      <pubDate>Sat, 14 Jan 2006 23:50:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=48189#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/TLOeXwdA2Tc/index.php]]></link>
      <description><![CDATA[This show features how to run other operating systems on your PC, Windows Password Reset, Pinball, Core Force Firewall, ZoHo Writer, Senuti, Windows Font Vulnerability and discussions on methods forensic examiners can use to process Email and large data sets.]]></description>
      
      <content:encoded><![CDATA[This show features how to run other operating systems on your PC, Windows Password Reset, Pinball, Core Force Firewall, ZoHo Writer, Senuti, Windows Font Vulnerability and discussions on methods forensic examiners can use to process Email and large data sets.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Show_Jan14_2006.mp3?dest-id=11283" length="39314720" type="audio/mpeg" />
      <itunes:duration>54:36</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>Jan 7 2006 CyberSpeak</title>
      <itunes:title>Jan 7 2006 CyberSpeak</itunes:title>
      <pubDate>Sat, 07 Jan 2006 08:47:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=46167#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/rfO8a6p5IRc/index.php]]></link>
      <description><![CDATA[This show features an interview with Helix creator, Mr. Drew Fahey.  Also, new OpenOffice portable applications, what's a zero day, student arrested for recommending the F5 key and listener email.]]></description>
      
      <content:encoded><![CDATA[This show features an interview with Helix creator, Mr. Drew Fahey. Also, new OpenOffice portable applications, what's a zero day, student arrested for recommending the F5 key and listener email.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Jan_7_2006_Cyberspeak.mp3?dest-id=11283" length="33051996" type="audio/mpeg" />
      <itunes:duration>45:54</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak December 31, 2005</title>
      <itunes:title>CyberSpeak December 31, 2005</itunes:title>
      <pubDate>Sat, 31 Dec 2005 15:53:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=44734#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/g9x-PDElIvU/index.php]]></link>
      <description><![CDATA[This podcast features an interview with Mr. Jesse Kornblum about his work with open source forensic tools. Also in this episode man says he is a victim of a "drive by upload", SMS indictments, a zeroday computer security exploit for IE and WMF files, and a discussion about the reasonable expectation of privacy of employees.]]></description>
      
      <content:encoded><![CDATA[This podcast features an interview with Mr. Jesse Kornblum about his work with open source forensic tools. Also in this episode man says he is a victim of a "drive by upload", SMS indictments, a zeroday computer security exploit for IE and WMF files, and a discussion about the reasonable expectation of privacy of employees.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/Cyberspeak_Show_Dec_31_2005-4.mp3?dest-id=11283" length="43264368" type="audio/mpeg" />
      <itunes:duration>01:00:05</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak December 23, 2005</title>
      <itunes:title>CyberSpeak December 23, 2005</itunes:title>
      <pubDate>Sat, 24 Dec 2005 17:32:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=43300#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/jkgzXhhjs0Q/index.php]]></link>
      <description><![CDATA[This show covers Guidance Software hack, Hackthissite hack, and child porn offender turns him self in because of worm.]]></description>
      
      <content:encoded><![CDATA[This show covers Guidance Software hack, Hackthissite hack, and child porn offender turns him self in because of worm.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Show_December23_2005-2.mp3?dest-id=11283" length="31619808" type="audio/mpeg" />
      <itunes:duration>43:54</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak December 18, 2005</title>
      <itunes:title>CyberSpeak December 18, 2005</itunes:title>
      <pubDate>Sun, 18 Dec 2005 16:43:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=41743#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/X5MNQJPihCw/index.php]]></link>
      <description><![CDATA[This show covers an update on the Sober worm, a hard drive destruction device, an update on the Best Buy hacker, and an appearance by opensource forensics tool author Nicholas Harbour.]]></description>
      
      <content:encoded><![CDATA[This show covers an update on the Sober worm, a hard drive destruction device, an update on the Best Buy hacker, and an appearance by opensource forensics tool author Nicholas Harbour.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Show_December18_2005.mp3?dest-id=11283" length="36051600" type="audio/mpeg" />
      <itunes:duration>50:04</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak December 09, 2005</title>
      <itunes:title>CyberSpeak December 09, 2005</itunes:title>
      <pubDate>Wed, 14 Dec 2005 19:18:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=40873#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/XrDZOM4m5-4/index.php]]></link>
      <description><![CDATA[Two former federal agents speak about comptuer crime, computer security and computer forensics. This show covers USB write blockers, Firefox vulnerability, MD5 hashing, and tests of a new hard drive imager.]]></description>
      
      <content:encoded><![CDATA[Two former federal agents speak about comptuer crime, computer security and computer forensics. This show covers USB write blockers, Firefox vulnerability, MD5 hashing, and tests of a new hard drive imager.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Show_2.mp3?dest-id=11283" length="40487218" type="audio/mpeg" />
      <itunes:duration>42:10</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
    <item>
      <title>CyberSpeak December 04, 2005</title>
      <itunes:title>CyberSpeak December 04, 2005</itunes:title>
      <pubDate>Wed, 14 Dec 2005 19:04:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[http://cyberspeak.libsyn.com/index.php?post_id=40871#]]></guid>
      <link><![CDATA[http://feedproxy.google.com/~r/Cyberspeak/~3/1zPf4zdvQ5c/index.php]]></link>
      <description><![CDATA[Technology Podcast with computer security, computer crime, and computer forensics topics.  Hosted by Ovie Carroll and Bret Padres. Today we talk about Gmail virus protection, botnets, and digital camera ripoffs.]]></description>
      
      <content:encoded><![CDATA[Technology Podcast with computer security, computer crime, and computer forensics topics. Hosted by Ovie Carroll and Bret Padres. Today we talk about Gmail virus protection, botnets, and digital camera ripoffs.]]></content:encoded>
      
      
      <enclosure url="https://traffic.libsyn.com/secure/cyberspeak/CyberSpeak_Show_1.mp3?dest-id=11283" length="55008800" type="audio/mpeg" />
      <itunes:duration>57:18</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords />
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    </item>
    
  </channel>
</rss>
