Date: Wed, 02 Mar 2016 14:00:00 +0000
<div class="trix-content"> <div>02:32 - Troy Hunt Introduction</div><ul> <li> <a href="https://twitter.com/troyhunt">Twitter</a> </li> <li> <a href="https://github.com/troyhunt">GitHub</a> </li> <li><a href="http://www.troyhunt.com/">Blog</a></li> <li><a href="https://www.pluralsight.com/authors/troy-hunt">Troy Hunt's Pluralsight Courses</a></li> </ul><div>04:12 - Why should people care about security?</div><div>06:19 - When People/Businesses Get Hacked</div><div>09:47 - “Hacking”</div><ul><li> <a href="https://en.wikipedia.org/wiki/Social_engineering_(security)">Social Engineering</a><ul><li><a href="http://beefproject.com/">BeEF</a></li></ul> </li></ul><div>11:42 - Inventive “Hacks”</div><ul> <li> <a href="https://en.wikipedia.org/wiki/SQL_injection">SQL Injection</a><ul><li><a href="http://sqlmap.org/">sqlmap</a></li></ul> </li> <li> <a href="https://en.wikipedia.org/wiki/Stuxnet">Stuxnet</a> </li> </ul><div>13:24 - Motivation for Hacking/Can hacking be valuable?</div><div>17:08 - Consequences and Retribution</div><div>19:10 - How to Build Secure Applications</div><div>20:47 - Weighing in UX</div><div>22:50 - Common Misconceptions</div><ul> <li>Password Storage<ul><li><a href="http://hashcat.net/">hashcat</a></li></ul> </li> <li>Encoding</li> <li>Cookies</li> </ul><div>31:27 - Passwords (Cont’d)</div><div>33:16 - Justifying the Importance of Security</div><div>35:24 - Client-side Security</div><ul> <li><a href="https://en.wikipedia.org/wiki/Cross-site_scripting">Cross-side Scripting</a></li> <li>DOM Based Cross-side Scripting<ul><li><a href="https://developer.mozilla.org/en-US/docs/Web/Security/CSP">Content Security Policy (CSP)</a></li></ul> </li> </ul><div>44:10 - Resources</div><ul> <li><a href="https://www.pluralsight.com/courses/angularjs-security-fundamentals">AngularJS Security Fundamentals</a></li> <li><a href="https://www.pluralsight.com/courses/hack-yourself-first">Hack Yourself First </a></li> </ul><div>45:27 - Routing</div><div>47:21 - Timeouts</div><div>51:36 - Cached Data</div><div>Picks</div><div> <a href="https://github.com/enaqx/awesome-react">awesome-react</a> (Aimee)<br /> <a href="https://en.wikiquote.org/wiki/Edsger_W._Dijkstra">Edsger W. Dijkstra Quotes</a> (Jamison)<br /> <a href="http://samnewman.io/blog/2016/02/10/telstra_outage/">Sam Newman: Telstra, Human Error and Blame Culture</a> (Jamison)<br /> <a href="http://www.amazon.com/Infinite-Jest-David-Foster-Wallace/dp/0316066524">Infinite Jest by David Foster Wallace</a> (Jamison)<br /> <a href="https://boardgamegeek.com/boardgame/146508/time-stories">T.I.M.E Stories</a> (Joe)<br /> <a href="http://www.amazon.com/We-Are-Anonymous-LulzSec-Insurgency/dp/0316213527">We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency Paperback by Parmy Olson</a> (Troy)<br /> <a href="https://haveibeenpwned.com/">The Have I been pwned Project</a> (Troy)</div><div>Special Guest: Troy Hunt.</div> </div> Support this podcast at — https://redcircle.com/javascript-jabber/donations Advertising Inquiries: https://redcircle.com/brands Privacy & Opt-Out: https://redcircle.com/privacy