Some podcasts have massive amounts of ".txt" files of deleted podcasts episodes. These files apparently carry the text description of the episode and are labeled exactly the same as the episode.
These are downloaded with the podcast, but when you delete a podcast episode it doesn't delete the related ".txt" file.
Would it be possible to have those files deleted when a podcast is downloaded, as I found you can accumulate a large number of files in the folders.
I have tried deleting the .txt file but the description from the file is still listed in MusicBee. I don't know how the program works so I am unsure if the info is stored before in a database.
Thank you.
Example Podcast:
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Podcast URL:
https://isc.sans.edu/dailypodcast.xmlExample:
ISC StormCast for Monday, January 20th, 2025.mp3
ISC StormCast for Monday, January 20th, 2025.txt
Contents of Text File:
SANS ISC Stormcast, Jan 20, 2025: Honeypots for Offense; SimpleHelp and UEFI Secure Boot Vulnerabilities
In this episode, we cover how to use honeypot data to keep your offensive infrastructure alive longer, three critical vulnerabilities in SimpleHelp that must be patched now, and an interesting vulnerability affecting many systems allowing UEFI Secure Boot bypass.
Leveraging Honeypot Data for Offensive Security Operations [Guest Diary] A recent guest diary on the SANS Internet Storm Center discusses how offensive security professionals can utilize honeypot data to enhance their operations. The diary highlights the detection of scans from multiple IP addresses, emphasizing the importance of monitoring non-standard user-agent strings in web requests.
https://isc.sans.edu/diary/Leveraging%20Honeypot%20Data%20for%20Offensive%20Security%20Operations%20%5BGuest%20Diary%5D/31596
Security Vulnerabilities in SimpleHelp 5.5.7 and Earlier SimpleHelp has released version 5.5.8 to address critical security vulnerabilities present in versions 5.5.7 and earlier. Users are strongly advised to upgrade to the latest version to prevent potential exploits. Detailed information and upgrade instructions are available on SimpleHelp's official website.
https://simple-help.com/kb---security-vulnerabilities-01-2025#send-us-your-questions
Under the Cloak of UEFI Secure Boot: Introducing CVE-2024-7344 ESET researchers have identified a new vulnerability, CVE-2024-7344, that allows attackers to bypass UEFI Secure Boot on most UEFI-based systems. This flaw enables the execution of untrusted code during system boot, potentially leading to the deployment of malicious UEFI bootkits. Affected users should apply available patches to mitigate this risk.
https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/
keywords: uefi; simplehelp; honeypots