Chao público
[search 0]
Más
Download the App!
show episodes
 
Artwork

1
Successfully Chaotic

Successfully Chaotic

Unsubscribe
Unsubscribe
Mensual
 
Successfully Chaotic Podcast is hosted by Maria Daniels, an expert on out-of-the-box marketing, advocate for wellness and natural foods, and speaker on finding success in the chaos of life.
  continue reading
 
Artwork
 
Ignorance of the law is no excuse! That’s true for a traffic stop, and it’s true if you want to participate in whatever’s left of American democracy. If the events since the 2016 election taught us anything, it’s that tuning out is not an option. Legal journalists Liz Dye and Andrew Torrez break down the week’s most important courtroom stories, so you can keep on top of this crazy news cycle. Whether it’s Texas giving two middle fingers to the Supreme Court, or Donald Trump in all the courts ...
  continue reading
 
Artwork

1
Chaos&Couture

Paige & Madelyn Smith

Unsubscribe
Unsubscribe
Mensual+
 
Where styles, moms, and chaos collide! Stylishly navigating the hot mess of motherhood Keeping it real, stylishly messy and always fun! Therapeutic for us, entertaining for you!
  continue reading
 
Artwork

1
CHAOSScast

CHAOSS Project

Unsubscribe
Unsubscribe
Mensual
 
This CHAOSS Community podcast features members who spent considerable time and effort to understand open source community health and how we can measure it through metrics, analytics, and software. We invite guests to this podcast to talk about how they use open source community health metrics and software in their own open source communities, companies, or foundations. This podcast fills the gap with open source community metric definitions and software on one side and their use on the other ...
  continue reading
 
WELCOME to Chrissy Chaos! Remember to rate us on iTunes and Join our Patreon for a WEEKLY bonus ep! patreon.com/chrisdcomedy CHRISDCOMEDY.COM for all upcoming live comedy show dates FOLLOW Chris Distefano On Social Media Instagram - https://www.instagram.com/chrisdcomedy/​ Twitter - https://twitter.com/chrisdcomedy​​ ​ Filmed and Edited by THEHOMELESSPIMP https://www.instagram.com/thehomeless... Twitter - https://twitter.com/homelesspimp?lang=en
  continue reading
 
Artwork

1
Kaffee & Chaos

Kaffee & Chaos

Unsubscribe
Unsubscribe
Semanalmente
 
Kaffee & Chaos – zu privat, zu lustig, zu viel. Tauche mit uns in die bunte Welt von komplettem Chaos ein! Wir, Mark und Vanessa, plaudern über alles, was man vielleicht besser nicht teilen sollte – mit einer ordentlichen Portion Humor. Ob peinliche Geschichten, tiefe Gedanken oder die großen Fragen des Lebens: Bei uns bleibt nichts ungesagt (und manches vielleicht besser ungehört). Ungefiltert, witzig und immer ein bisschen drüber – genau wie das Leben!
  continue reading
 
Artwork

1
Chaos Springs Eternal

quartermastersofthetabletop

Unsubscribe
Unsubscribe
Semanalmente
 
Chaos Springs Eternal is a Delta Green Actual Play podcast. QuarterMasters of the TableTop is a group of four friends who take turns DMing/GMing/otherwise leading each other through various TTRPG Systems https://twitter.com/QMoftheTableTop https://www.instagram.com/quartermastersofthetabletop/
  continue reading
 
Artwork

1
Feminine Chaos

Phoebe Maltz Bovy and Kat Rosenfield

Unsubscribe
Unsubscribe
Mensual+
 
Problematic faves, dissident feminism, and poodle interruptions: this is Feminine Chaos, featuring cultural commentary from Phoebe Maltz Bovy and Kat Rosenfield. femchaospod.substack.com
  continue reading
 
Artwork
 
Der Podcast für Kreative und Macher. Es geht von Selbstständigkeit über Persönlichkeitsentwicklung bis hin zu Videoproduktion und digitalem Marketing. Aber wir sind neugierig und schauen auch gerne mal über Adobe Premiere und PPTs hinaus. Häufig erscheinen uns Dinge zu Beginn etwas chaotisch, aber dann lernt man etwas Neues und geht es eben “Weiter im Chaos”. Wir sind Christian (Content Creator) und Kevin (Berater). Begleitet uns doch auf dieser Reise, hört einfach mal rein und folgt uns auf ...
  continue reading
 
The Tao of Chao Podcast focuses on contemporary issues, regulations and class action cases impacting pension and defined contribution retirement plan fiduciaries. Philip Chao and his guests will discuss relevant issues that a plan fiduciary should pay attention to and how such challenges are relevant in operating their retirement plans while serving in the sole interest of participants and beneficiaries.
  continue reading
 
Artwork

1
D&D with the Chaotically Neutral Canucks

Kenny Hayter, Kris Muggins, Smat Muggins, Ryleigh Cameron, Ben Whynot and Paul Hayes

Unsubscribe
Unsubscribe
Semanalmente
 
"D&D with the Chaotically Neutral Canucks" guarantees a rollercoaster of hilarity as our zany crew tackles dungeons with a flair of comedy and drama! Check us out where you get your podcasting fix every Monday, at 12PM AST.
  continue reading
 
Podcast dla wszystkich, którzy chcą wyjść z przepracowania i zacząć robić to co naprawdę ważne. Dedykowany dla menedżerów, przedsiębiorców i wysokopłatnych specjalistów, czyli osób wykonujących pracę umysłową. W podcastcie poruszane są tematy na temat nowoczesych metod produktwności osób wykonujących pracę umysłową. Słuchając tego podcastu poznasz najlepsze praktyki organizacji pracy, gospodarowania własnym czasem, zwiększania własnej efektywności, osiągania celów, technologii wspierających ...
  continue reading
 
Learn how busy and overwhelmed professionals can rediscover their passion, so they can redefine their purpose, and gain the courage to do something about it. We will discuss how to cut through the whirlwinds of life to rise above the chaos and discover a path to significance and ultimately peace.
  continue reading
 
Artwork

1
Ringside Chaos

The Bear of Texas Podcast

Unsubscribe
Unsubscribe
Semanalmente
 
The pro wrestling discussion segment of The Bear of Texas Podcast and Pain Train Pipebomb Productions! Ringside Chaos is a pro wrestling podcast committed and dedicated to covering pro wrestling in the most well-educated, knowledgable, and sophisticated way. Ringside Chaos is about talking pro wrestling not only passionately, but correctly.
  continue reading
 
Artwork

1
Chaos Lever Podcast

Ned Bellavance and Chris Hayner

Unsubscribe
Unsubscribe
Semanalmente+
 
Chaos Lever examines emerging trends and new technology for the enterprise and beyond. Hosts Ned Bellavance and Chris Hayner examine the tech landscape through a skeptical lens based on over 40 combined years in the industry. Are we all doomed? Yes. Will the apocalypse be streamed on TikTok? Probably. Does Joni still love Chachi? Decidedly not.
  continue reading
 
Artwork

1
F1 Chaos

Chaos Global

Unsubscribe
Unsubscribe
Semanalmente
 
Welcome to F1 Chaos, the ultimate podcast for Formula 1 enthusiasts and casual fans alike! Join your host, JJ Chaos, as he dives deep into the thrilling, high-octane world of F1 racing. Each episode, JJ brings you the latest news, race recaps, and insider insights, all wrapped in his signature style of humour and passion. From the adrenaline-pumping races to the behind-the-scenes drama, F1 Chaos covers it all! Whether you're a die-hard fan or just curious about the sport, JJ's engaging comme ...
  continue reading
 
Artwork

1
Engineering Chaos

KC & Ashley Brooke

Unsubscribe
Unsubscribe
Mensual+
 
Join us as the hosts, who are two female engineers working in an industry run by and set up for the MAN, navigate and talk through problems in the industry, life, relationships, and the differences between Millennial and Gen Z workforce habits.
  continue reading
 
Artwork

1
Crime, Wine & Chaos

Amber Clifton | Naomi Lackaff

Unsubscribe
Unsubscribe
Semanalmente
 
Crime, Wine & Chaos is a true crime and chaos, comedy podcast hosted by sisters, Amber Rae and Naomi Lackaff. Join us for a drink as we dive deep into these harrowing stories. Cheers! - EXPLICIT CONTENT - 18 years and older listener advised
  continue reading
 
Welcome to Very Random Encounters, a show where we play pen and paper RPGs in which we've randomly determined as many things as is possible, including characters, villains, names, places, and other weirder stuff! It all comes together to be a very random encounter. We're an actual play roleplaying game podcast by four friends who love the challenge of telling a story whose details are all prompted by random rolls. You can start with the first episode in any given season.
  continue reading
 
Artwork

1
Chaos Magick News

Chaos Magick News

Unsubscribe
Unsubscribe
Mensual+
 
Chaos Magick News offers a glimpse into current events through the lense of Occultism and a look at greater occulture both online and offline. Occasionally insightful and always comedic CMN is the dose of self awareness and humor to cure your Magus-itis or bring back your inspiration for the Magickal worldview.
  continue reading
 
Artwork
 
Ever wonder what it would be like raising enough children to fill a short bus? Chaotic Harmony is a podcast that will give you that fly on the wall experience into our household. Our blended family of ten has gone through it all and we are still standing tall! Even if that means someone is holding us up from behind OR we are standing on stilts. Let's be real, with a family like ours you HAVE to expect the unexpected! I'm Angela Schultz and I will be sharing our story with you and all the way ...
  continue reading
 
Artwork

1
Chaos Crew 5e

Little Chomp

Unsubscribe
Unsubscribe
Semanalmente
 
We're an actual play D&D group who almost exclusively uses homebrew setting expansions in our games. Our first season is set in a world based on Eiichiro Oda's One Piece, and our second one is set in the Star Wars universe. No matter where we end up, we're just a pack of chaos goblins in pretty hats. I have no idea how the DMs stay sane.
  continue reading
 
“Cool, Calm, & Chaotic”…The New Podcast Thats Talking All Things… - Health - Food - Music - Positivity - Myths - Truths - Randomness - Top 10 Lists - Pet Peeves - More Food Probably ***ANY & ALL THINGS LIFE! … Ya Know… All Things Awesome! LIFE IS GOOD!
  continue reading
 
Calming the Chaos is a podcast by Licensed Mental Health Counselor Tracy Kenela, who interviews a variety of professionals around the world in an effort to find different ways to help people (and herself!) find peace in a chaotic world. Each episode contains Information, tips, tools, and resources that come from different schools of thought, and are presented as a fun and entertaining way to help you move toward a more peaceful and enjoyable life.
  continue reading
 
Artwork

1
Lords of Chaos Podcast

Lords of Chaos Podcast

Unsubscribe
Unsubscribe
Diariamente
 
In Lords of Chaos Podcast, Lawrence brings humor and wit to the chaos of life, uncovering the comedy hidden in even the most intense situations. The podcast dives into gritty topics—crime, addiction, and jaw-dropping life experiences—but Lawrence’s knack for finding the laugh-out-loud moments keeps things from getting too dark. With guests who are unafraid to share their wildest, funniest stories, each episode feels like a rollercoaster of emotions, where listeners are just as likely to laug ...
  continue reading
 
Loading …
show series
 
Daniel Close, Lead Portfolio Manager for High-Yield Municipal Strategies at Nuveen, joins host Philip Chao in this episode of Tao of Chao to explore the evolving landscape of high-yield municipals. They discuss the effects of the Fed's rate cuts, differences between municipal and treasury yield curves, and the future of fixed-income solutions. Dani…
  continue reading
 
As we head to Utah, we discuss which NHL owners we most want to watch a game with and which players look most like their teams. Plus, Alex DeBrincat sits down with Pete for some small talk. 0:00 Intro 0:45 Welcome to What Chaos! 5:38 Small Talk w/ Alex DeBrincat 12:08 NHLPA merchandise 21:08 Owners we want to watch games with 42:46 Players that loo…
  continue reading
 
Web security is increasingly an opt-in approach, leaving developers with both the opportunity and the responsibility to protect their applications. This talk will explore why and how developers can secure their sites against evolving threats.We'll delve into the nuances of cross-site leaks (xs-leaks) and discuss the Cross-Origin Resource Policy (CO…
  continue reading
 
Web security is increasingly an opt-in approach, leaving developers with both the opportunity and the responsibility to protect their applications. This talk will explore why and how developers can secure their sites against evolving threats.We'll delve into the nuances of cross-site leaks (xs-leaks) and discuss the Cross-Origin Resource Policy (CO…
  continue reading
 
Web security is increasingly an opt-in approach, leaving developers with both the opportunity and the responsibility to protect their applications. This talk will explore why and how developers can secure their sites against evolving threats.We'll delve into the nuances of cross-site leaks (xs-leaks) and discuss the Cross-Origin Resource Policy (CO…
  continue reading
 
Web security is increasingly an opt-in approach, leaving developers with both the opportunity and the responsibility to protect their applications. This talk will explore why and how developers can secure their sites against evolving threats.We'll delve into the nuances of cross-site leaks (xs-leaks) and discuss the Cross-Origin Resource Policy (CO…
  continue reading
 
Browser extensions are powerful tools that enhance the web browsing experience, offering their users a wide range of functionalities. However, these features can also introduce security and privacy issues for their users, mainly through a technique known as extension fingerprinting — where malicious websites track users based on the extensions they…
  continue reading
 
Browser extensions are powerful tools that enhance the web browsing experience, offering their users a wide range of functionalities. However, these features can also introduce security and privacy issues for their users, mainly through a technique known as extension fingerprinting — where malicious websites track users based on the extensions they…
  continue reading
 
Browser extensions are powerful tools that enhance the web browsing experience, offering their users a wide range of functionalities. However, these features can also introduce security and privacy issues for their users, mainly through a technique known as extension fingerprinting — where malicious websites track users based on the extensions they…
  continue reading
 
Browser extensions are powerful tools that enhance the web browsing experience, offering their users a wide range of functionalities. However, these features can also introduce security and privacy issues for their users, mainly through a technique known as extension fingerprinting — where malicious websites track users based on the extensions they…
  continue reading
 
Recent developments in web technologies have seen a paradigm shift from monolithic server-based applications to REST-based microservices with feature-rich browser-based frontends. This progression has brought with it novel classes of security flaws. In this talk we review how client-side variants of injection vulnerabilities such as cross-site scri…
  continue reading
 
Recent developments in web technologies have seen a paradigm shift from monolithic server-based applications to REST-based microservices with feature-rich browser-based frontends. This progression has brought with it novel classes of security flaws. In this talk we review how client-side variants of injection vulnerabilities such as cross-site scri…
  continue reading
 
Recent developments in web technologies have seen a paradigm shift from monolithic server-based applications to REST-based microservices with feature-rich browser-based frontends. This progression has brought with it novel classes of security flaws. In this talk we review how client-side variants of injection vulnerabilities such as cross-site scri…
  continue reading
 
Recent developments in web technologies have seen a paradigm shift from monolithic server-based applications to REST-based microservices with feature-rich browser-based frontends. This progression has brought with it novel classes of security flaws. In this talk we review how client-side variants of injection vulnerabilities such as cross-site scri…
  continue reading
 
Web apps use Server-Side Requests to request data from other servers, e.g., for link previews. However, they are exploited by attackers who might request internal resources or non-public services. This attack is called Server-Side Request Forgery (SSRF).The talk explains what SSRF is, how it can be used to exploit servers, and how to defend against…
  continue reading
 
Web apps use Server-Side Requests to request data from other servers, e.g., for link previews. However, they are exploited by attackers who might request internal resources or non-public services. This attack is called Server-Side Request Forgery (SSRF).The talk explains what SSRF is, how it can be used to exploit servers, and how to defend against…
  continue reading
 
Web apps use Server-Side Requests to request data from other servers, e.g., for link previews. However, they are exploited by attackers who might request internal resources or non-public services. This attack is called Server-Side Request Forgery (SSRF).The talk explains what SSRF is, how it can be used to exploit servers, and how to defend against…
  continue reading
 
Web apps use Server-Side Requests to request data from other servers, e.g., for link previews. However, they are exploited by attackers who might request internal resources or non-public services. This attack is called Server-Side Request Forgery (SSRF).The talk explains what SSRF is, how it can be used to exploit servers, and how to defend against…
  continue reading
 
This episode of Ringside Chaos delves into Bully Ray's legacy, exploring his extensive career in professional wrestling, his impact on the industry, and his storytelling prowess. The hosts discuss Bully Ray's contributions to wrestling, including his time in ECW, TNA, and WWE, and his current role in the wrestling community. They also touch on pote…
  continue reading
 
The need for comprehensive measurements of security and privacy risks on the Web is undeniable as it helps developers in focusing on emerging trends in security. However, large-scale scans for server-side vulnerabilities remains a sensitive topic, due to their potential to harm servers, disrupt services, and incur financial losses. Even smaller, si…
  continue reading
 
The need for comprehensive measurements of security and privacy risks on the Web is undeniable as it helps developers in focusing on emerging trends in security. However, large-scale scans for server-side vulnerabilities remains a sensitive topic, due to their potential to harm servers, disrupt services, and incur financial losses. Even smaller, si…
  continue reading
 
The need for comprehensive measurements of security and privacy risks on the Web is undeniable as it helps developers in focusing on emerging trends in security. However, large-scale scans for server-side vulnerabilities remains a sensitive topic, due to their potential to harm servers, disrupt services, and incur financial losses. Even smaller, si…
  continue reading
 
The need for comprehensive measurements of security and privacy risks on the Web is undeniable as it helps developers in focusing on emerging trends in security. However, large-scale scans for server-side vulnerabilities remains a sensitive topic, due to their potential to harm servers, disrupt services, and incur financial losses. Even smaller, si…
  continue reading
 
CR295: Über Digitalpolitik in Sachsen, mit Daniel Gerber Seit ab dem vergangenen Jahr auch der Podcast „Dicke Bretter“ beim Chaosradio läuft, gab es nur eine Live-Sendung, nämlich vom Chaos Communication Congress. Jetzt folgt die zweite Live-Aufnahme von den Datenspuren in Dresden. „Dicke Bretter“ will über die Entstehung von Gesetzen und Standards…
  continue reading
 
As organizations increasingly rely on SAP systems to manage critical business processes, the security of these environments is an increasing challenge for companies and has also been recognized by the OWASP Core Business Application Security (CBAS) project. This talk will explore the security of SAP systems from an attacker's perspective, uncoverin…
  continue reading
 
As organizations increasingly rely on SAP systems to manage critical business processes, the security of these environments is an increasing challenge for companies and has also been recognized by the OWASP Core Business Application Security (CBAS) project. This talk will explore the security of SAP systems from an attacker's perspective, uncoverin…
  continue reading
 
As organizations increasingly rely on SAP systems to manage critical business processes, the security of these environments is an increasing challenge for companies and has also been recognized by the OWASP Core Business Application Security (CBAS) project. This talk will explore the security of SAP systems from an attacker's perspective, uncoverin…
  continue reading
 
As organizations increasingly rely on SAP systems to manage critical business processes, the security of these environments is an increasing challenge for companies and has also been recognized by the OWASP Core Business Application Security (CBAS) project. This talk will explore the security of SAP systems from an attacker's perspective, uncoverin…
  continue reading
 
This is a free preview of a paid episode. To hear more, visit femchaospod.substack.com Kat and Phoebe discuss extruding our intestines (or not) in the wake of the election, and the history and future of woke media. LINKS: 'Challah for Ceasefire'?: Phoebe Maltz Bovy on watching women's media walk the political tightrope Kat urges artists not “to all…
  continue reading
 
Network fingerprinting exists for a while and some methods such as JA3 have achieved wide adoption across the industry. Introducing network fingerprinting into login flows can help you stave off attackers. However, there are various challenges that you need to overcome: technical, organizational and regulatory.In this talk we will take a look at th…
  continue reading
 
Network fingerprinting exists for a while and some methods such as JA3 have achieved wide adoption across the industry. Introducing network fingerprinting into login flows can help you stave off attackers. However, there are various challenges that you need to overcome: technical, organizational and regulatory.In this talk we will take a look at th…
  continue reading
 
Network fingerprinting exists for a while and some methods such as JA3 have achieved wide adoption across the industry. Introducing network fingerprinting into login flows can help you stave off attackers. However, there are various challenges that you need to overcome: technical, organizational and regulatory.In this talk we will take a look at th…
  continue reading
 
Network fingerprinting exists for a while and some methods such as JA3 have achieved wide adoption across the industry. Introducing network fingerprinting into login flows can help you stave off attackers. However, there are various challenges that you need to overcome: technical, organizational and regulatory.In this talk we will take a look at th…
  continue reading
 
In early 2024, hundreds of DKIM setups still used cryptographic keys vulnerable to a bug from 2008 in Debian's OpenSSL package. Vulnerable hosts included prominent names like Cisco, Oracle, Skype, and Github.In 2022, it was discovered that printers generated TLS keys that could be trivially broken with an over 300-year-old algorithm by Pierre de Fe…
  continue reading
 
In early 2024, hundreds of DKIM setups still used cryptographic keys vulnerable to a bug from 2008 in Debian's OpenSSL package. Vulnerable hosts included prominent names like Cisco, Oracle, Skype, and Github.In 2022, it was discovered that printers generated TLS keys that could be trivially broken with an over 300-year-old algorithm by Pierre de Fe…
  continue reading
 
In early 2024, hundreds of DKIM setups still used cryptographic keys vulnerable to a bug from 2008 in Debian's OpenSSL package. Vulnerable hosts included prominent names like Cisco, Oracle, Skype, and Github.In 2022, it was discovered that printers generated TLS keys that could be trivially broken with an over 300-year-old algorithm by Pierre de Fe…
  continue reading
 
In early 2024, hundreds of DKIM setups still used cryptographic keys vulnerable to a bug from 2008 in Debian's OpenSSL package. Vulnerable hosts included prominent names like Cisco, Oracle, Skype, and Github.In 2022, it was discovered that printers generated TLS keys that could be trivially broken with an over 300-year-old algorithm by Pierre de Fe…
  continue reading
 
Viele Teams stehen vor der Herausforderung, beim Threat Modeling relevante Bedrohungen zu identifizieren, insbesondere wenn nur wenig Security-Expertise vorhanden ist. Die Auswahl und Bewertung von potenziellen Risiken kann für Nicht-Experten schwierig sein. Dieser Lightning Talk zeigt, wie Generative AI (GenAI) hier unterstützen kann, indem sie Be…
  continue reading
 
Viele Teams stehen vor der Herausforderung, beim Threat Modeling relevante Bedrohungen zu identifizieren, insbesondere wenn nur wenig Security-Expertise vorhanden ist. Die Auswahl und Bewertung von potenziellen Risiken kann für Nicht-Experten schwierig sein. Dieser Lightning Talk zeigt, wie Generative AI (GenAI) hier unterstützen kann, indem sie Be…
  continue reading
 
Viele Teams stehen vor der Herausforderung, beim Threat Modeling relevante Bedrohungen zu identifizieren, insbesondere wenn nur wenig Security-Expertise vorhanden ist. Die Auswahl und Bewertung von potenziellen Risiken kann für Nicht-Experten schwierig sein. Dieser Lightning Talk zeigt, wie Generative AI (GenAI) hier unterstützen kann, indem sie Be…
  continue reading
 
Viele Teams stehen vor der Herausforderung, beim Threat Modeling relevante Bedrohungen zu identifizieren, insbesondere wenn nur wenig Security-Expertise vorhanden ist. Die Auswahl und Bewertung von potenziellen Risiken kann für Nicht-Experten schwierig sein. Dieser Lightning Talk zeigt, wie Generative AI (GenAI) hier unterstützen kann, indem sie Be…
  continue reading
 
Loading …

Guia de referencia rapida