4.9 • 696 Ratings
🗓️ 21 November 2016
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, November 21st, 2016 edition of the Sands and it's Storms anders Stormcast. My name is Johannes Ulrich and I am recording from Jacksonville, Florida. |
0:12.3 | Most operating systems track time as the difference from a certain start date. Now, the most famous one is probably here, Unix with the January 1st 1970 start date, but it's far from the only one. |
0:28.6 | Also the resolution isn't always seconds, it could be milliseconds, microseconds, or tenth of microseconds. |
0:35.6 | All depends. Well, Pascal now has a nice Python script for you |
0:40.8 | that you can use to convert a given timestamp |
0:44.3 | into these different formats. |
0:47.8 | So all you have to do is you run the timestamp |
0:50.3 | that you found through his script, |
0:52.3 | and then it gives you a list of all the different operating systems and what time, this particular timestamp that you found through his script and then it gives you a list of all the different operating systems and what time this particular timestamp represents. Of course, if you don't |
1:00.7 | know what operating system the timestamp came from, just by looking at the date, it may give |
1:04.7 | you a decent idea which one is the right one. And starting with OS10-L Capitan, Apple introduced a system integrity protection |
1:15.1 | feature that did prevent users even root from modifying certain parts of the system. Now, |
1:24.4 | apparently this feature is turned off on some new MacBooks that were just delivered. |
1:32.3 | These are the brand new ones with the touchbar. |
1:36.3 | Doesn't appear to happen to all of them just to some of them, so it appears to be some oversight |
1:41.3 | in loading the operating system. |
1:44.8 | You can easily enable this feature if you would like to, of course. |
1:49.0 | A lot of people actually got somewhat frustrated with the feature and then disable it. |
1:54.0 | It does provide a nice additional meaningful protection of the core operating system from malicious |
2:00.7 | manipulation. |
2:02.6 | And Microsoft apparently had interesting vulnerability in its Outlook 365 service that would allow |
2:09.2 | you to spoof Microsoft.com emails. The way this particular vulnerability would be exploited is that you do set up an Outlook.com account |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.