PLAY PODCASTS
Security

Security

Security

Python Podcast · Jochen Wersdörfer / Dominik Geldmacher

November 27, 20202h 0m

Show Notes

<article class="post-detail"> <header> <h2 class="post-title"> <a href="https://python-podcast.de/show/security/">Security</a> (click here to comment) </h2> <!-- link is on one line to avoid underlined whitespace --> <div class="post-card-meta"> <a href="https://python-podcast.de/show/security/"><time datetime="2020-11-28T00:00:00+01:00">28. November 2020</time>,</a> <span class="author">Jochen</span> </div> </header> <div class="post-body"> <section class="block-overview"> <section class="block-paragraph"> Mit <a href="https://phihag.de">Philipp</a> und&nbsp;<a href="https://twitter.com/theuni">Christian</a>&nbsp;haben wir uns heute&nbsp;&uuml;ber Security unterhalten und am Schluss noch einen kleinen Ausflug Richtung&nbsp;<a href="https://yt-dl.org/">Youtube-DL</a>&nbsp;unternommen. Wahrscheinlich werden wir auch zu diesem Thema noch ein paar Mal zusammen setzen m&uuml;ssen :).<br /> <br /> </section> <section class="block-audio"> </section> <section class="block-paragraph"> &nbsp; </section> </section> <section class="block-detail"> <section class="block-paragraph"> <h2>Shownotes</h2> <p>Unsere E-Mail f&uuml;r Fragen, Anregungen &amp; Kommentare: <a href="mailto:[email protected]">[email protected]</a></p> <h3>Security</h3> <ul> <li><a href="https://www.cn.hhu.de/lehre-und-abschlussarbeiten/fruehere-lehrveranstaltungen/vorlesungen/ss-2017/netsec.html">Vorlesung Netzwerksicherheit (HHU)</a></li> <li><a href="https://tonies.de">Boxine (Toniebox..)</a></li> <li><a href="https://inst.eecs.berkeley.edu/~cs161/fa08/papers/stack_smashing.pdf">Smashing The Stack For Fun And Profit</a></li> <li><a href="https://de.wikipedia.org/wiki/Von-Neumann-Architektur">Von-Neumann-Architektur</a>&nbsp;/&nbsp;<a href="https://de.wikipedia.org/wiki/Harvard-Architektur">Harvard-Architektur</a></li> <li><a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization">Address space layout randomization</a>&nbsp;/&nbsp;<a href="https://en.wikipedia.org/wiki/Executable_space_protection">Executable space protection</a></li> <li><a href="https://en.wikipedia.org/wiki/SQL_injection">SQL injection</a></li> <li><a href="https://www.psycopg.org">psycopg</a></li> <li><a href="https://en.wikipedia.org/wiki/Denial-of-service_attack">Denial-of-service attack</a></li> <li><a href="https://blog.fefe.de/?ts=a19dfb18">Ransomware-Befall Uniklinik D&uuml;sseldorf</a></li> <li><a href="https://en.wikipedia.org/wiki/Adversarial_machine_learning">Adversarial machine learning</a></li> <li><a href="https://de.wikipedia.org/wiki/Ada_(Programmiersprache)">Ada</a></li> <li><a href="https://de.wikipedia.org/wiki/Ariane_V88">Ariane V88 Absturz</a></li> <li>Zertifizierung nach&nbsp;<a href="https://en.wikipedia.org/wiki/Common_Criteria">Common Criteria</a>&nbsp;/&nbsp;<a href="https://en.wikipedia.org/wiki/Evaluation_Assurance_Level">Evaluation Assurance Level</a></li> <li><a href="https://de.wikipedia.org/wiki/Penetrationstest_(Informatik)">Pentest</a></li> <li><a href="https://de.wikipedia.org/wiki/Web_Application_Firewall">Web Application Firewall (WAF)</a></li> <li><a href="https://xkcd.com/538/">xkcd zu security</a></li> <li><a href="https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures">Common Vulnerabilities and Exposures (CVEs)</a></li> <li><a href="https://realpython.com/podcasts/rpp/18/">Episode 18: Ten Years of Flask: Conversation With Creator Armin Ronacher</a></li> <li><a href="https://phihag.de/2018/pyddf-5vulns/#/">Command injection etc</a></li> <li><a href="https://en.wikipedia.org/wiki/Directory_traversal_attack">Directory traversal attack</a></li> <li><a href="https://www.graylog.org/products/open-source">graylog</a>&nbsp;/&nbsp;<a href="https://www.elastic.co/de/what-is/elk-stack">kibana elk stack</a>&nbsp;/&nbsp;<a href="https://sentry.io/welcome/">sentry</a></li> <li><a href="https://www.djangoproject.com/weblog/2009/oct/09/security/">Django regex denial of service security advisory</a></li> <li><a href="https://simonwillison.net/2020/Nov/18/indieauth/">Indiauth f&uuml;r datasette</a>&nbsp;/&nbsp;<a href="https://oauth.net/2/">oauth2</a>&nbsp;/&nbsp;<a href="https://openid.net/connect/">openid connect</a></li> <li><a href="https://en.wikipedia.org/wiki/Defense_in_depth_(computing)">Defense in depth</a></li> <li>Password hashing via:&nbsp;<a href="https://docs.python.org/3/library/hashlib.html#hashlib.scrypt">scrypt</a>&nbsp;/&nbsp;<a href="https://docs.python.org/3/library/hashlib.html#hashlib.pbkdf2_hmac">pbkdf2</a></li> </ul> <h3>Picks / Youtube-DL</h3> <ul> <li><a href="https://yt-dl.org/">youtube-dl</a></li> <li><a href="https://rg3.name/202011071352.html">Origins of the youtube-dl project</a></li> <li><a href="https://netzpolitik.org/2020/youtube-dl-musikindustrie-schiesst-mit-der-schrotflinte-auf-open-source/">Musikindustrie schie&szlig;t mit der Schrotflinte auf Open Source</a>&nbsp;/&nbsp;<a href="https://news.ycombinator.com/item?id=24887282">Philipp Hagemeister, former YouTube-dl maintainer re: takedown</a></li> <li><a href="https://de.wikipedia.org/wiki/Streisand-Effekt">Streisand-Effekt</a></li> <li><a href="https://dateutil.readthedocs.io/en/stable/">dateutil</a></li> <li><a href="https://de.wikipedia.org/wiki/Bcrypt">bcrypt</a></li> <li><a href="https://tonies.de/jobs/">Tonies - offene Stellen</a></li> </ul> <br /> <a href="https://konektom.org/tags/68701/">&Ouml;ffentliches Tag auf konektom</a><br /> </section> </section> </div> </article>

Topics

securitybuffer_overflowpythonphrackyoutube-dl