Jump to content
People were interested in these podcasts
Play Episode
2min
One Minute Podcast Tips
How to Sound Like a Pro with a Podcast Editing Chain
When it comes to your podcast audio, an editing chain can help turn decent audio into great audio. Here's what to look for and when to use.Mentioned in this episode:How to Edit Podcasts - iZotope7 Tips for Mixing Stellar Podcast VocalsA Guide to Audio Processing and FX For PodcastingProducts I Use for One Minute Podcast TipsNote: these may contain affiliate links, so I get a small percentage of any product you buy when using my link.My equipment:Shure SM7B dynamic micTZ Audio Stellar X2 condenser micRodecaster Pro II audio production studioSony MDR-7506 Studio Monitor HeadphonesJOBY Wavo Boom ArmElgato Wave Mic Arm Low ProfileRecommended resources:Captivate.fm podcast hosting, distribution, analytics, and monetizationKit email marketingBoomcaster remote recording and live streamingHindenburg Pro recording and editingOne Minute Podcast Tips is a podcast education show brought to you by Danny Brown. If you enjoy the show, I'd love for you to leave a rating or review on your favourite podcast app!And please let your friends and other podcasters know they can listen for free on Spotify and Apple Podcasts, as well as their preferred podcast app, or online at One Minute Podcast Tips.Mentioned in this episode:If you enjoy One Minute Podcast Tips, here's how to support the show!If you enjoy One Minute Podcast Tips and get value from the show and want to support it, you can do that with a donation of your choosing over at OneMinutePodcastTips.com/support. Thank you! Support One Minute Podcast TipsRecommend the showHelp your friends and other podcasters discover One Minute Podcast Tips, by sharing/recommending this episode and/or the show with them!Share the showThis podcast uses the
Code Reds - Breaking Down All Things Cincinnati Baseball with Mike Petraglia
Code Reds Pitchers and Catchers Report in Goodyear, Rhett Lowder Update, Terry Francona Gets Going
Pitchers and catchers have reported for the start of Cincinnati Reds spring training in Goodyear, Arizona and already there's news concerning one of the young projected starters in the rotation. Trags is joined by Gordon Wittenmyer of the Cincinnati Enquirer to discuss Rhett Lowder, Spencer Steer, the best possible defensive lineups and why depth and roster flexibility, not the starting lineup, is the most important thing to new manager Terry Francona.
Podcasting Insights with The Podmaster: growth advice for people and brands
Podcast Listener Pet Peeves: What Bugs Us Most?
"Be authentic - just publish" is terrible adviceWhat’s worse than a bad hair day? A bad podcast! If you want to read the report this episode is based on, go to podmastery.co/peevesIf you’ve ever hit play on your favourite podcast only to have your ears assaulted by terrible audio or a host that rambles like they’re auditioning for a talk show, you’re not alone. We put our feelers out there with a survey of 300 podcast lovers to find out exactly what makes them rage-quit a show. Spoiler alert: bad audio is the number one culprit. In this episode, we’re not just airing grievances; we’re giving you the tools to fix them! Links referenced in this episode:Podmastery.co/newsletterpodknows.co.ukMentioned in this episode:Podmaster Free TipsBook your Podmaster auditWanna get unstuck from the sub 100 downloads per month doldrums. Fancy getting closer to top 2% podcaster glory? Sounds like you need one of my Podmaster audits. Go to podmastery.co/lite and within 5 business days you’ll get a full video and written report on my findings. That's podmastery.co/lite Podmaster auditA Podknows ProductionPodknows helps brands and creators to build their podcasts into virtual sales and marketing teams which get them results even when they're sleeping. Find out more at https://podknows.co.uk/Free tipsWant to get free insightful actionable tips on how to get closer to 'podmastery'? Sign up! I promise not to spam you!Podmaster Free TipsThis podcast uses the following third-party services for analysis: Podder - https://www.podderapp.com/privacy-policy
The ASHHRA Podcast
#138 - Transforming Healthcare Talent Management at Wellstar
We are excited to share insights from our latest episode of The ASHHRA Podcast featuring the dynamic Laura Dannels, Chief Talent Officer at Wellstar Health System in Atlanta.In this episode, we dive deep into Laura’s inspiring journey and her innovative approach to talent acquisition and management in the healthcare industry. With a rich history in HR, Laura’s expertise spans talent acquisition, management, and learning, all underpinned by her academic background as a PhD and MBA. Laura shares her deep commitment to improving the healthcare environment, inspired by personal experiences and a passion for meaningful impact.Key Highlights:Nurturing Future Talent:Laura emphasizes the importance of not waiting for titles to make impactful change. Whether you're in healthcare or another industry, this episode is filled with valuable insights on taking ownership and driving initiatives that matter.Building Internal Universities:Drawing from her foundational work at Kaiser Permanente, Laura sheds light on the significance of internal learning systems and offers tips for organizations looking to implement such programs.Flexible Work Models in Healthcare:Learn about innovative ways Wellstar Health System is rethinking work models, including AI integration and flexible scheduling, to meet modern challenges and attract top talent.The Power of Mindset:Laura highlights the importance of self-care, gratitude, and mindful practices to ensure leaders are at their best, ready to drive success and inspire those around them.We also get personal with Laura as she discusses her morning rituals and how she maintains a growth mindset amidst the pressures of leading in a rapidly evolving industry.Laura’s contributions go beyond just her professional endeavors as she also serves as an adjunct professor, inspiring a new generation of HR leaders at Columbia University.This episode is packed with inspiration and actionable advice for anyone looking to make a meaningful impact in their fiel

Tech learning roadmaps…


dasari4kntr

Recommended Posts

HTTPS (HTTP Secure) is a protocol used to provide secure communication over the internet between a client (such as a web browser) and a server (such as a web server). Here's how HTTPS communication works between a client and a server:

1. The client initiates a connection to the server by sending a request to the server using the HTTPS protocol. The request includes the URL of the website the client wants to access.

2. The server responds by sending its SSL/TLS certificate to the client. The certificate contains the server's public key and is used to establish a secure connection between the client and server.

3. The client's browser verifies the SSL/TLS certificate to ensure that it is valid and belongs to the server. This involves checking the certificate's validity period, digital signature, and the certificate chain.

4. If the certificate is valid, the client's browser generates a symmetric encryption key and encrypts it using the server's public key. This ensures that only the server can decrypt the key.

5. The client's browser sends the encrypted symmetric key to the server.

6. The server decrypts the symmetric key using its private key.

7. The client's browser and the server use the symmetric key to encrypt and decrypt all data exchanged between them during the session. This includes the request and response data, headers, cookies, and any other information transmitted between them.

8. When the session is complete, the symmetric key is discarded and a new one is generated for the next session.

9. By using HTTPS, all data exchanged between the client and server is encrypted and cannot be intercepted by third parties. This helps to protect sensitive information such as login credentials, personal information, and financial data from being stolen or compromised during transit.


I am confused with 3 & 4 points. 

-- How does the server know if it is a good or bad client as long as both can generate the symmetric keys?. 
-- on what basis can the client validate the server certificate? What is the source that the client knows is a valid certificate sent by the server. 

for 9th point 

any request that is going through the browser, we can see the payload/requests by checking browser/ developer tools in the network tab then
how it is secure/encrypted both from the web browser and http call made from POSTMAN? 
 

@dasari4kntr @ramudu @Spartan@Vaampire   Can you help me to understand 3,4, 9 points above?

Link to comment
Share on other sites

  On 3/26/2023 at 2:29 AM, Hindhustani said:

HTTPS (HTTP Secure) is a protocol used to provide secure communication over the internet between a client (such as a web browser) and a server (such as a web server). Here's how HTTPS communication works between a client and a server:

1. The client initiates a connection to the server by sending a request to the server using the HTTPS protocol. The request includes the URL of the website the client wants to access.

2. The server responds by sending its SSL/TLS certificate to the client. The certificate contains the server's public key and is used to establish a secure connection between the client and server.

3. The client's browser verifies the SSL/TLS certificate to ensure that it is valid and belongs to the server. This involves checking the certificate's validity period, digital signature, and the certificate chain.

4. If the certificate is valid, the client's browser generates a symmetric encryption key and encrypts it using the server's public key. This ensures that only the server can decrypt the key.

5. The client's browser sends the encrypted symmetric key to the server.

6. The server decrypts the symmetric key using its private key.

7. The client's browser and the server use the symmetric key to encrypt and decrypt all data exchanged between them during the session. This includes the request and response data, headers, cookies, and any other information transmitted between them.

8. When the session is complete, the symmetric key is discarded and a new one is generated for the next session.

9. By using HTTPS, all data exchanged between the client and server is encrypted and cannot be intercepted by third parties. This helps to protect sensitive information such as login credentials, personal information, and financial data from being stolen or compromised during transit.


I am confused with 3 & 4 points. 

-- How does the server know if it is a good or bad client as long as both can generate the symmetric keys?. 
-- on what basis can the client validate the server certificate? What is the source that the client knows is a valid certificate sent by the server. 

for 9th point 

any request that is going through the browser, we can see the payload/requests by checking browser/ developer tools in the network tab then
how it is secure/encrypted both from the web browser and http call made from POSTMAN? 
 

@dasari4kntr @ramudu @Spartan@Vaampire   Can you help me to understand 3,4, 9 points above?

Expand  

is this diagram helpful to you..?to  understand 3 and 4 points..?

 

FV0DW-WUAAA9621?format=jpg&name=4096x409

Link to comment
Share on other sites

  On 3/26/2023 at 2:29 AM, Hindhustani said:

HTTPS (HTTP Secure) is a protocol used to provide secure communication over the internet between a client (such as a web browser) and a server (such as a web server). Here's how HTTPS communication works between a client and a server:

1. The client initiates a connection to the server by sending a request to the server using the HTTPS protocol. The request includes the URL of the website the client wants to access.

2. The server responds by sending its SSL/TLS certificate to the client. The certificate contains the server's public key and is used to establish a secure connection between the client and server.

3. The client's browser verifies the SSL/TLS certificate to ensure that it is valid and belongs to the server. This involves checking the certificate's validity period, digital signature, and the certificate chain.

4. If the certificate is valid, the client's browser generates a symmetric encryption key and encrypts it using the server's public key. This ensures that only the server can decrypt the key.

5. The client's browser sends the encrypted symmetric key to the server.

6. The server decrypts the symmetric key using its private key.

7. The client's browser and the server use the symmetric key to encrypt and decrypt all data exchanged between them during the session. This includes the request and response data, headers, cookies, and any other information transmitted between them.

8. When the session is complete, the symmetric key is discarded and a new one is generated for the next session.

9. By using HTTPS, all data exchanged between the client and server is encrypted and cannot be intercepted by third parties. This helps to protect sensitive information such as login credentials, personal information, and financial data from being stolen or compromised during transit.


I am confused with 3 & 4 points. 

-- How does the server know if it is a good or bad client as long as both can generate the symmetric keys?. 
-- on what basis can the client validate the server certificate? What is the source that the client knows is a valid certificate sent by the server. 

for 9th point 

any request that is going through the browser, we can see the payload/requests by checking browser/ developer tools in the network tab then
how it is secure/encrypted both from the web browser and http call made from POSTMAN? 
 

@dasari4kntr @ramudu @Spartan@Vaampire   Can you help me to understand 3,4, 9 points above?

Expand  

neeku ee comedy scene telusu kadha , Nag and Darmavarapu kalisinappudu , conversarion start chesee mundu , Darmavarapu code word aduguthadu , idhi kuda same ... "aakasam erraga undi" is the public key "adi desha drohula raktam valla vachina erupu" is private key , 

so when browser send request to server , server first send a public key and authority that issuesthe certificate  , browser verifies it (how it verifies is different path) and send confirmation to browser (refer @dasari4kntr answer / image for details ) .... thsi is called handshake 

one handshake established (in below comedy scene once nag and  Darmavarapu exchange the codes and confirm both knows each other) .... browser send thsi public key along with request , and on server side there is secure private key which can decrypt the message using the public and private key combinations ( simplifies version lo cheppa)

 

 

 

 

  • Haha 1
  • Upvote 1
Link to comment
Share on other sites

@Hindhustani

SSL TLS handshake set ayye concept is point 3-4.

-- How does the server know if it is a good or bad client as long as both can generate the symmetric keys?. 

 Server will trust and initiate connection with any client to set up that handshake. Kaani once that handshake is setup (that is exchange of symmetric keys and session generation) a tarvata vere client vachi cannot continue the communication on same channel. this is happy path.

kaani man in the middle attack, Session hijacking comes into picture when the symmetric key or the session key is cracked. There are other ways to prevent that.

 

--- on what basis can the client validate the server certificate? What is the source that the client knows is a valid certificate sent by the server. 

Server send chese SSL certificate should always be provided by a trustworthy CA (Certificate Authority) like VeriSign, Amazon, Google etc. Client will be able to verify that certificate form the server.

Ala kaadu Self Signed certificates vadali ante, both Server and Client should have that certificates stored, for validating the connection. (not a widely used scenario, but konni companies intranet lo vadutai ilantivi).

Link to comment
Share on other sites

  On 3/26/2023 at 2:49 AM, ramudu said:

neeku ee comedy scene telusu kadha , Nag and Darmavarapu kalisinappudu , conversarion start chesee mundu , Darmavarapu code word aduguthadu , idhi kuda same ... "aakasam erraga undi" is the public key "adi desha drohula raktam valla vachina erupu" is private key , 

so when browser send request to server , server first send a public key and authority that issuesthe certificate  , browser verifies it (how it verifies is different path) and send confirmation to browser (refer @dasari4kntr answer / image for details ) .... thsi is called handshake 

one handshake established (in below comedy scene once nag and  Darmavarapu exchange the codes and confirm both knows each other) .... browser send thsi public key along with request , and on server side there is secure private key which can decrypt the message using the public and private key combinations ( simplifies version lo cheppa)

 

 

 

 

Expand  

exact ga ilanti example kosame vetukutununde to explain. and u posted it. ;)  @ramudu

uncle and relative son madhya phone call :D

Link to comment
Share on other sites

for 9th point 

any request that is going through the browser, we can see the payload/requests by checking browser/ developer tools in the network tab then
how it is secure/encrypted both from the web browser and http call made from POSTMAN? 

 

Encrypted Data chudalevu, any browser or network tracer like Wireshark. On Network tab what you see is Request and response. (which are not encrypted, but binded to the cookies and sessions) .

Link to comment
Share on other sites

  On 3/26/2023 at 2:49 AM, ramudu said:

neeku ee comedy scene telusu kadha , Nag and Darmavarapu kalisinappudu , conversarion start chesee mundu , Darmavarapu code word aduguthadu , idhi kuda same ... "aakasam erraga undi" is the public key "adi desha drohula raktam valla vachina erupu" is private key , 

so when browser send request to server , server first send a public key and authority that issuesthe certificate  , browser verifies it (how it verifies is different path) and send confirmation to browser (refer @dasari4kntr answer / image for details ) .... thsi is called handshake 

one handshake established (in below comedy scene once nag and  Darmavarapu exchange the codes and confirm both knows each other) .... browser send thsi public key along with request , and on server side there is secure private key which can decrypt the message using the public and private key combinations ( simplifies version lo cheppa)

 

 

 

 

Expand  

subject meeda ento grip vunte kaani inta simple gaa cheppaleru…

kudos…

Link to comment
Share on other sites

@Hindhustani

I am confused with 3 & 4 points. 

-- How does the server know if it is a good or bad client as long as both can generate the symmetric keys? -  it really doesn't care , if you get public key  and generate symmetric key and use that to encrypt your data and send to server , server can decrypt it because only private key can decrypt it ... browsers does this backend for us (encrypting data using symmetric key) ..... 


-- on what basis can the client validate the server certificate? What is the source that the client knows is a valid certificate sent by the server.  - issue authority , time , validity period and few other parameters , this certificate is digitally signed by issuing authority like RSA , DigiCert etc... , browser validate with those authorities 

for 9th point 

any request that is going through the browser, we can see the payload/requests by checking browser/ developer tools in the network tab then
how it is secure/encrypted both from the web browser and http call made from POSTMAN? --- when you see the data means it is not in transmit mode ,before data enter to network , data is encrypted by public / symmetric keys , once it is encryipted , you can still see it using network tools like wireshark in encrypted format but you can not edit it , if you edit decryption with private key fail ... that is the whole concept of encryption here 
 

  • Upvote 1
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...