
The 3 Best Command Line Heroes Podcast Episodes
1) The Infrastructure Effect: COBOL and Go
Languages used for IT infrastructure don’t have expiration dates. COBOL’s been around for 60 years—and isn’t going anywhere anytime soon. We maintain billions of lines of classic code for mainframes. ...Show More
2) Dr. Gladys West: The Mathematician Who Reshaped Our World
Aristotle and Eratosthenes are big names in geodesy. They got pretty close to measuring the size of the Earth. But the woman who got it done? She grew up a farmer, dreaming of something bigger. And he...Show More
3) Ready to Commit: Contributing to Open Source
Looking to get into open source but not sure where to start? Are you a contributor trying to understand why only some pull requests get accepted? Or are you a maintainer who’s feeling overwhelmed? Thi...Show More
4) All Together Now
Our show is all about heroes making great strides in technology. But in InfoSec, not every hero expects to ride off into the sunset. In our series finale, we tackle vulnerability scans, how sharing in...Show More
5) Invisible Intruders
What began as a supposed accounting error landed Cliff Stoll in the midst of database intrusions, government organizations, and the beginnings of a newer threat—cyber-espionage. This led the eclectic ...Show More
6) Ruthless Ransomers
It’s a strange situation when someone can hold something hostage from halfway around the world. It’s tragic when your own pictures and files are remotely encrypted. But when it’s a hospital’s system? ...Show More
7) Menace in the Middle
All communication leaves the possibility for crossed wires. And as we become more connected, there’s a chance for those with ill intentions to steal our information and meddle in our daily lives—with ...Show More
8) Dawn of the Botnets
Overwhelming numbers are scary—even in the best of circumstances. You can plan for them, build up your defenses, and do everything imaginable to prepare. But when that horde of zombies hits, their she...Show More
9) Lurking Logic Bombs
Logic bombs rarely have warning sounds. The victims mostly don’t know to expect one. And even when a logic bomb is discovered before it’s triggered, there isn’t always enough time to defuse it. But th...Show More
10) Terrifying Trojans
Sometimes a fun game, a friendly email, or an innocuous link can be the most convenient place for an enemy to hide. And its prey is none the wiser—until it strikes. The trojan horse uses many layers o...Show More