
Sign up to save your podcasts
Or


Bash exploit allows an attacker to take complete control of a computer, upgrading your Video Card, VLAN's on a personal network, SSD Media Center, and make a custom watch face for your Android Wear Device.
Bash, Bash, Bash!
What is Bash
What is the vulnerability?
Why is it Bad?
Padre's Network
Android Wear
Facer
Free Squarespace Giveaway for TWIT Network Audience Members
See official sweepstakes rules here. http://player.podtrac.com/rules-twit
Hosts: Fr. Robert Ballecer, SJ and Bryan Burnett
Don't forget to check out our large library of projects at https://twit.tv/shows/know-how.
Tweet at us at @padresj, @Cranky_Hippo, and @Anelf3
Sponsors:
By TWiT4
44 ratings
Bash exploit allows an attacker to take complete control of a computer, upgrading your Video Card, VLAN's on a personal network, SSD Media Center, and make a custom watch face for your Android Wear Device.
Bash, Bash, Bash!
What is Bash
What is the vulnerability?
Why is it Bad?
Padre's Network
Android Wear
Facer
Free Squarespace Giveaway for TWIT Network Audience Members
See official sweepstakes rules here. http://player.podtrac.com/rules-twit
Hosts: Fr. Robert Ballecer, SJ and Bryan Burnett
Don't forget to check out our large library of projects at https://twit.tv/shows/know-how.
Tweet at us at @padresj, @Cranky_Hippo, and @Anelf3
Sponsors:

202 Listeners

78 Listeners

356 Listeners

8 Listeners

3 Listeners

7 Listeners

3 Listeners