We have a huge show today. Steve’s put out two more video interviews from NAB in Las Vegas, I’ve got a pretty big announcement about Chit Chat Across the Pond, and we’ve got another giant Security Bits with Bart Busschots. I told him maybe when there’s such a big security news week we should call it Security Blobs!
There are five Security Mediums in this episode. We’ll talk about a remote code execution built in Intel CPUs, Bart will explain what can go wrong with two-factor authentication through SMS, we’ll cover the Google Docs phishing worm and how Google could have prevented it, we’ll learn about how the beloved Handbrake servers got hacked causing distribution of malware, and as if that isn’t enough we’ll talk about the WannaCry worm that has indiscriminately taken down networks across the globe.
12 years ago, on May 13th, 2005, I decided to start the NosillaCast. Somewhere along the lines I met the wonderful Bart Busschots and he started to be a regular on the show, in a segment we affectionately called Chit Chat Across the Pond. Bart and I talked about photography and security and Macs and just about everything geeky that interested us.
Eventually we started doing Chit Chat Across the Pond together every other week and on the opposite weeks I’d have other tech guests on the show. Bart started his own shows, Let’s Talk Apple and Let’s Talk Photography.
In April of 2013, Bart decided to start a sub-series of Chit Chat Across the Pond called Taming the Terminal. This was the beginning of what we like to call our “propeller beanie” shows, where we get real geeky and learn how to conquer some of the harder tech topics.
In this week’s episode of Chit Chat Across the Pond we have Bart Busschots with another installment of Programming by Stealth. He covers the syntax for images and links in HTML and the attributes you can apply and more importantly why you should apply them. He promises that with the first 5 episodes under our belts we’ll be ready to move on to understanding CSS, or Cascading Style Sheets. You can read along with his detailed tutorial and download the example files at \bartbusschots.ie/s/2015/12/27/programming-by-stealth-5-of-x-images-links/.