Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/bf/8b/06/bf8b060a-66f8-1f3b-77af-573451f039c0/mza_6172341089823690659.jpg/600x600bb.jpg
Surviving the 9 to 5
Dead Inside by 9:05
72 episodes
4 days ago
“Surviving the 9 to 5” isn’t about hustling harder or chasing the next big thing—it’s a raw, no-bull guide for anyone stuck in the daily grind. Each episode delivers real-life hacks to protect your energy, reclaim tiny bursts of sanity, and make it through workday hell without losing yourself. No pep talks. No sugarcoating. Just straight-up survival tips for worn-out souls who refuse to disappear behind their desks.
Show more...
Self-Improvement
Education
RSS
All content for Surviving the 9 to 5 is the property of Dead Inside by 9:05 and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
“Surviving the 9 to 5” isn’t about hustling harder or chasing the next big thing—it’s a raw, no-bull guide for anyone stuck in the daily grind. Each episode delivers real-life hacks to protect your energy, reclaim tiny bursts of sanity, and make it through workday hell without losing yourself. No pep talks. No sugarcoating. Just straight-up survival tips for worn-out souls who refuse to disappear behind their desks.
Show more...
Self-Improvement
Education
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_nologo/43760002/43760002-1748355233471-cfc8c271c28be.jpg
Demystifying Cybersecurity
Surviving the 9 to 5
7 minutes 46 seconds
1 month ago
Demystifying Cybersecurity

This video episode provides an extensive introduction to cybersecurity, defining it as the practice of protecting systems, networks, and programs from cyber attacks and distinguishing it from the broader concept of information security. The tutorial explains the motives of cyber criminals, illustrating that they target systems based on vulnerability and the potential value of the data. Core networking fundamentals are covered, including the definitions of networks, the internet, and essential protocols like TCP/IP, IP addresses, MAC addresses, and DNS, before shifting focus to the diverse landscape of cyber threats. Finally, the source details various forms of malware (such as viruses, worms, and botnets) and common attack types, including Distributed Denial of Service (DDoS), Man-in-the-Middle (MITM), and different password attacks, often concluding with defense strategies and practical demonstrations of exploit creation.

Surviving the 9 to 5
“Surviving the 9 to 5” isn’t about hustling harder or chasing the next big thing—it’s a raw, no-bull guide for anyone stuck in the daily grind. Each episode delivers real-life hacks to protect your energy, reclaim tiny bursts of sanity, and make it through workday hell without losing yourself. No pep talks. No sugarcoating. Just straight-up survival tips for worn-out souls who refuse to disappear behind their desks.