Player FM - Internet Radio Done Right
24 subscribers
Checked 14h ago
nine 年前已添加!
内容由HPR Volunteer and Hacker Public Radio提供。所有播客内容(包括剧集、图形和播客描述)均由 HPR Volunteer and Hacker Public Radio 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal。
Player FM -播客应用
使用Player FM应用程序离线!
使用Player FM应用程序离线!
HPR4276: PWNED
Manage episode 457061584 series 108988
内容由HPR Volunteer and Hacker Public Radio提供。所有播客内容(包括剧集、图形和播客描述)均由 HPR Volunteer and Hacker Public Radio 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal。
Time Event 11:14 PM 12/7/2024 RDP Brute force for username "internet" password "notyours" 8:20 AM 12/11/2024 paypal charge for uber cash 8:23 AM 12/11/2024 text from uber for MFA to google voice 9:09 AM 12/11/2024 G2A pwned tried to buy 200$ worth of games etc 9:21 AM 12/11/2024 email from google play saying I added Kathys card to my account 9:22 AM 12/11/2024 email from amazon saying gift card canceled . Top 10 Source IP Addresses: Source IP Count --------- ----- 3.17.166.66 13165 44.222.204.3 2213 18.189.189.191 1748 52.26.221.152 1662 91.238.181.77 972 88.214.25.72 600"
…
continue reading
4345集单集
Manage episode 457061584 series 108988
内容由HPR Volunteer and Hacker Public Radio提供。所有播客内容(包括剧集、图形和播客描述)均由 HPR Volunteer and Hacker Public Radio 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal。
Time Event 11:14 PM 12/7/2024 RDP Brute force for username "internet" password "notyours" 8:20 AM 12/11/2024 paypal charge for uber cash 8:23 AM 12/11/2024 text from uber for MFA to google voice 9:09 AM 12/11/2024 G2A pwned tried to buy 200$ worth of games etc 9:21 AM 12/11/2024 email from google play saying I added Kathys card to my account 9:22 AM 12/11/2024 email from amazon saying gift card canceled . Top 10 Source IP Addresses: Source IP Count --------- ----- 3.17.166.66 13165 44.222.204.3 2213 18.189.189.191 1748 52.26.221.152 1662 91.238.181.77 972 88.214.25.72 600"
…
continue reading
4345集单集
所有剧集
×This show has been flagged as Clean by the host. If you you take a lot of photos, some of them will show problems. But you don't need to throw them away. With GIMP, you can fix these common problems and restore your photos. In this episode I look at getting rid of fingers in photos, fixing red eyes in photos, and fixing common artefacts caused by a speck of dust or damage to the negative. Links: https://www.youtube.com/watch?v=4VcthL001Uc Provide feedback on this episode .…
This show has been flagged as Clean by the host. Maintaining The Remote System I have renamed the project Libre Indie Archive because the name theindiearchive is already someone else's domain. I never would have renamed The Indie Archive but I do think that Libre Indie Archive is more descriptive, hence, better. I am getting close to a pre beta push up to codeberg. Anyone following along who wants to help test, you can do this with two or three old systems. Let me know. Email hairylarry@gmail.com or on Mastodon I am @hairylarry@gamerplus.org. I have decided to develop and document for Xubuntu first and here's the reasons why. I bought an older HP small form factor office system with 4 Gigabytes of ram. HP Compaq 4000 Pro Pentium Dual-Core E6600 3.06GHz 4GB RAM Thirty dollars on ebay with shipping and taxes. I was testing Libre Indie Archive on it. Because of the age of the system Ubuntu wouldn't install. I tested it with some BSD systems and installed Indie Archive without a GUI. Ghost BSD didn't install but Midnight BSD did install so I used the Midnight BSD GUI and installed Indie Archive. None of this was easy for me because I'm a BSD newb and unless you already use BSD I can't recommend it for Libre Indie Archive. Remember, not all indie producers are computer programmers, and I want Indie Archive to work for those producers as well as for the computer savvy. Then on a whim I thought I would try the Xubuntu 24.04 distro and it installed no problems. Thanks XFCE for keeping it light. The other reason I am developing and documenting for Xubuntu is that I can use the Xubuntu install document and install on Ubuntu or Debian with only minor differences. I know because I tried it. This is probably also true for other Debian and Ubuntu derived distributions. So, if you want to help, you could take the Xubuntu install document and see if it works on other distributions. Write down what you had to change and let me know. I plan on making an install checklist out of the install document and it would be great to have a checklist with the actual commands for several distributions. So, that was the intro. Now on to the topic. I am planning on installing remotenear and remotefar systems, remotenear being a short drive away (or maybe in your home if your studio is not in your home, like mine) and the remotefar further away to avoid losing data in the case of a regional catastrophe like flood, fire, tornado, or hurricane. Still even a short drive is not what I want to do any time there might be something I need to check on a remote system so I have devised a way to manage it from the secondary system. When a remote system is delivered to a new location it will be headless. No monitor, no keyboard, and no mouse. At the remote location it is plugged into a UPS and attached to the network with an ethernet cable and attached to the UPS with a usb cable. Then it is turned on. Even without a keyboard or a mouse there is still some local control of the system available. As part of the remote system install we go into the power management settings and next to "when power button is pressed" we select shutdown. So, a short press on the power button initiates a Xubuntu shutdown just like the shutdown that you get from the menu or Alt F4. If that doesn't work a long press of the power button will turn the system off. This is like unplugging the system or losing power and is not recommended but Xubuntu will rebuild the file structure when the system is restarted. And if you do lose power the UPS will send a signal to the computer shutting it down with a controlled shutdown, just like a short press of the power button or a shutdown from the menu. I would like to carry this one step further and enable automatic power up for the computer. A quick search shows cyberpower PowerPanel software for linux. Also you can set a power restore function in the BIOS to restart the system when the power is restored. I just checked and this worked on my little HP. So ... with just the power button and an attached UPS you can get both manual and automatic control of shutting the remote system down and restarting it. Pretty cool for a rather sparse interface. If you know more about how to set this up please let me know. There's a big jump between doing a search to see if something is possible and actually implementing it. Okay, that was the easy part. Now for the fun part. First off, the remote system is probably not going to be at your place but at the home or business of friends or family. And they probably don't have a static IP, and they may not be able to implement port forwarding in their router, and they may not be able to control their firewall. So we can't go, "I'll just ssh in when I need to fix a problem". And you don't really want to change their setup anyway because all of the above add to their security risk. Also their router undoubtedly gives dynamic IP addresses so we want the remote system to use that because when we are setting it up we might not even know what subnet their LAN uses. But, at the same time it doesn't make any sense at all to try to maintain a remote system that you can't log into. So, the tool for setting up a terminal session on the remote system is called a remote tunnel reverse shell. The remote system is already connecting to the secondary system with rsync ssh when the cron job fires off every day to update the files. So, the secondary system is running an ssh server and the remote system has the public key that allows access without entering a password. There are two parts to setting up a remote tunnel reverse shell. The secondary system has to be listening for the remote system on a port, I use port 7070. And then the remote system runs a bash command with the -i parameter that means reverse shell, and with the port, 7070. I'm using nc to set up the listener. nc -lvnp 7070 -l is --listen -v is --verbose -n means the port is restricted to numeric values. -p is --port 7070 is the port I chose the port number, 7070. You can use any available port but the listener has to use the same port as the remote system uses in the bash call. Which is this. bash -i >& /dev/tcp/your-static-ip-from-your-isp/7070 0>&1 This is the order of events. On the secondary system I start listening. nc -lvnp 7070 Then a script runs on the remote system. bash -i >& /dev/tcp/your-static-ip-from-your-isp/7070 0>&1 And then a command prompt opens up in the terminal on the secondary system that's listening. And you are logged into the remote system and you can look around and check things out and even move or delete files until you exit. Except it didn't work. Of course not, nothing ever works the first time. Two other things have to be changed that we're going to talk about now, the firewall and port forwarding. These things are already discussed in install.txt because we had to fix the firewall and port forwarding for the remote system to log into the secondary system to pick up the new files. To set up port forwarding, log into your router from a browser attached to the router. Like, for instance, a browser on your secondary system. You open the browser and type into the address bar, 192.168.1.1 Which is right most of the time. On my setup I type 192.168.2.1 because the isp's router uses the 192.168.1 subnet. How do I know which to use??? This also is covered in install.txt because to connect from the primary system to the secondary system I have to connect to the static ip that I assigned to the secondary system. So my primary system has the static ip 192.168.2.11 and my secondary system has the static ip 192.168.2.12 which allows me to ssh into the secondary system from the primary system. And this means my router is at 192.168.2.1 Your router is likely at 192.168.1.1 because that's the most common LAN subnet. Anyway, in the browser I open the router's control console and then I have to enter the password. If you don't know what it is you have to find out and write it down. Check what the defaults are for your router by searching on the internet. The defaults might work. If they do change your login and password and write them down! Do not leave your router defaults in place. That's a big security risk. After you're logged into the control console check around in the menus for Port Forwarding. I already had to do this to make ssh work from the remote system to the secondary system. In that case I had to forward port 22 (the ssh port) from the internet to the secondary system. Here's how that works. On the remote system I type. ssh indiearchive@your-static-ip-from-your-isp Since it's coming in as ssh that means the router sees port 22. The router checks the port forwarding table and sees that incoming traffic using port 22 should go to the secondary system, in my case 192.168.2.12 So the incoming ssh goes to the secondary system which is my ssh server. What a coincidence. So in order to use port 7070 to open a tunnel from the remote system to the secondary system I have to add a row to the port forwarding table with 7070 as the port and 192.168.2.12 as the ip. Except on your LAN the ip address may be different. Except it doesn't work. I bet you guessed why. It's the firewall. On the secondary system type. sudo ufw status It should show you that port 22 is allowed because otherwise you wouldn't be getting ssh traffic. It probably won't show you that port 7070 is allowed. So type. sudo ufw allow 7070 Then check the status again and see if it shows 7070. Here's a nice firewall link with instructions. https://www.digitalocean.com/community/tutorials/ufw-essentials-common-firewall-rules-and-commands It still might not work even though it should. Why? Operator error. You may have typed 7000 instead of 7070. (I did that.) Or any other little typo in any of the commands. When this works you are ready to test the reverse shell. The remote system can ssh into the secondary system and we have added port 7070 to the port forwarding table on the router and to the firewall on the secondary system. This is great! But how do I know when to listen and how do I get the remote system to issue the bash command that sets up the reverse shell? Remember, in the future the remote system is going to be sitting somewhere with no monitor, keyboard, or mouse. Only computer programmers are required to remember the future. After all that setup, here's the clever bit. I have a text file on the secondary system named letmein.txt and it's a flag with two values. The text file either reads yes or no. If it reads yes it means I'm here at the secondary system and I want to log into the remote system. If it reads no. Not so much. I'm not really trying to log in to the remote system at all. The remote system has ssh access to the secondary system since that's the way it picks up the new files, with rsync ssh. So the remote system can use rsync to copy the letmein.txt file over to it's hard drive. And it does this every five minutes, with a cron job. On the remote system type sudo -s to become root. crontab -e to edit the root crontab. Add this line */5 * * * * /home/indiearchive/check.sh Every 5 minutes the remote system runs check.sh which grabs the letmein.txt file and checks to see if it says yes or no. If it says yes it starts the reverse shell, assuming I remembered to start listening to port 7070 on the secondary system. After I'm done working on the remote system while sitting at the secondary system I type exit to close the remote terminal and come back to the terminal on the secondary system. If I forgot to do something I can start listening again but if I'm done I edit letmein.txt to say no and the remote system will quit trying to set up a reverse shell every 5 minutes. But wait! There's more. Email notifications. I set up email notifications with mailersend for file integrity reports using curl. To do that I wrote a script called send.sh that takes a file name as an argument and then sends me an email with the contents of the file in the body of the email. So when I run my file integrity program if the log files are larger than they should be, it means there is a discrepancy and that log file gets emailed to me so I can check things out. (Maybe with my remote tunnel reverse shell.) I also check diskspace with df and send a disk space report. Using send.sh when I run check.sh and detect a yes in letmein.txt I call send.sh with letmein.txt as the parameter and I get an email that says yes, meaning the remote system is trying to set up a reverse shell. So if I change letmein.txt to yes on the secondary system and I wait five or ten minutes without getting notified I may just have to make a call. Maybe the nice people who are hosting my remote system have lost power. Or internet. Or maybe they will have to push a button. If that doesn't work I may have to make a trip. I hope it's remotenear and not remotefar. So when I was testing the email notifications part of check.sh and fiddling around with the code all of a sudden I quit getting notifications at all. I learned a lot about bash scripting trying to figure out what I did wrong and it turned out it wasn't me. After I sent myself numerous emails saying yes from a weird email address gmail decided they were spam. So I went into my spam folder and marked the notification email as not spam. That fixed it for me but if you are setting up email notifications for Libre Indie Archive or for anything be sure you white list the email address so that the email powers that be don't suddenly decide that your notifications are spam and you quit getting important notifications. In gmail you set up a filter entry with the notifier's email address and set the action to be "Never send it to Spam". Because getting these emails is important. First they remind me to have the secondary system listen. Then they remind me to change letmein.txt from yes to no after I'm done with the remote terminal. And while you're changing letmein.txt to no make sure the listener is off. Leaving it listening for an extended period of time is a security risk. So there's a lot of little moving parts involved in this. Kind of complicated but still fascinating. Almost done. I didn't think this would be so long and now I'm exhausted. I am including slightly redacted and well commented copies of check.sh and send.sh in the show notes which will be on Hacker Public Radio and on my Delta Boogie Network-Gamer+ blog at home.gamerplus.org. As always, I appreciate your comments. Thanks Provide feedback on this episode .…
This show has been flagged as Clean by the host. The most basic security toggle on your Linux computer is the setenforce command. Using just a single setenforce instruction, you can configure SELinux to allow a violation it would normally prevent. There are two states: Enabled and Permissive. By default, SELinux is Enabled (also represented as 1 when using Boolean values). To set SELinux to permissive mode: $ sudo setenforce Permissive When something works in Permissive mode, you've successfully identified the symptom, but you haven't fixed the problem yet. Activate Enforcing mode again: $ sudo setenforce Enforcing Check the status of SELinux You can check the state of SELinux at any time using the sestatus command: $ sestatus SELinux status: enabled SELinuxfs mount: /sys/fs/selinux SELinux root directory: /etc/selinux Loaded policy name: targeted Current mode: enforcing [...] Look at labels and contexts If you have a running Linux system, then you have an example of what SELinux requires for normal operation. You don't have to learn about security contexts or memorize labels. For most anything you try to do on your computer, there are likely already files doing something similar. Use those files as templates. You can look at the security labels of any file you have access to by using the -Z (that's a capital Z) option of ls : $ touch hellotouch hello.txt $ ls -Z hello.txt unconfined_u:object_r:user_home_t:s0 hello An empty file created by a user in the user's own home directory has, as you might expect, a very specific security profile. Even with the executable bit set, that file would not be permitted to run as a systemwide service. It just doesn't have the correct security context. If you use an ll alias, try adding the -Z option to its option list so you get used to seeing SELinux labels. The more you see what labels exist on your system, and how they relate to various system roles, you're more likely to recognize when they're wrong. Copy contexts Suppose you were developing a custom SELinux service for your laptop. You've written a shell script, a service file, and you've placed them in the appropriate system locations. You're also careful to set ownership and permissions correctly. But no matter what you do, you get errors when attempting to start the service. You suspect that SELinux might be preventing an unrecognized service from running. That would normally be appreciated, but in this case you want to make an exception. First, confirm that the service runs successfully with SELinux in Permissive mode: $ sudo setenforce Permissive $ sestatus | grep Current Current mode: permissive $ sudo systemctl start hello.service || echo "fail" $ $ sudo setenforce Enforcing Then look at the files you've created using the -Z and compare them with other files that you know to be working properly. Note the differences: $ ls -Z /usr/lib/systemd/system/hello.service unconfined_u:object_r:systemd_unit_file_t:s0 $ ls -Z /usr/lib/systemd/system/rdisc.service system_u:object_r:rdisc_unit_file_t:s0 The working service ( rdisc.service in this example, chosen at random) features the system_u label as well as a special rdisc_unit_file_t label. Suppose you know from previous experience with ls -Z that a common SELinux label for systemd service files is systemd_unit_file_t so you ignore that difference. However, unconfined_u and system_u seem to be important. Use the chcon ("change context") command to change the security context of your service file: $ sudo chcon system_u:object_r:systemd_unit_file_t:s0 \ /usr/lib/systemd/system/hello.service $ ls -Z /usr/lib/systemd/system/hello.service system_u:object_r:systemd_unit_file_t:s0 Your systemd service is probably triggering some executable file on your system. If you created that yourself, it probably also has the incorrect security context. Comparing it to a known working script: $ ls -Z /usr/bin/example.sh unconfined_u:object_r:gconf_home_t:s0 $ ls -Z /usr/bin/brltty-prologue.sh system_u:object_r:bin_t:s0 Again, there's one obvious difference, which you can correct with chcon : $ chcon system_u:object_r:bin_t:s0 \ /usr/bin/example.sh Provide feedback on this episode .…
This show has been flagged as Explicit by the host. Chatting wth Sgoti Sgoti talks about SSH and Github. openbsd: PreferredAuthentications \ Specifies the order in which the client should try authentication methods. \ gssapi-with-mic,hostbased,publickey,keyboard-interactive,password openbsd: HostKeyAlgorithms \ $ssh -Q HostKeyAlgorithms; ssh-ed25519 ssh-ed25519-cert-v01@openssh.com sk-ssh-ed25519@openssh.com sk-ssh-ed25519-cert-v01@openssh.com ssh-rsa rsa-sha2-256 rsa-sha2-512 ssh-dss ecdsa-sha2-nistp256 ecdsa-sha2-nistp384 ecdsa-sha2-nistp521 sk-ecdsa-sha2-nistp256@openssh.com webauthn-sk-ecdsa-sha2-nistp256@openssh.com ssh-rsa-cert-v01@openssh.com rsa-sha2-256-cert-v01@openssh.com rsa-sha2-512-cert-v01@openssh.com ssh-dss-cert-v01@openssh.com ecdsa-sha2-nistp256-cert-v01@openssh.com ecdsa-sha2-nistp384-cert-v01@openssh.com ecdsa-sha2-nistp521-cert-v01@openssh.com sk-ecdsa-sha2-nistp256-cert-v01@openssh.com openbsd: IdentitiesOnly \ Specifies that ssh(1) should only use the configured authentication identity and certificate files (either the default files, or those explicitly configured in the ssh_config files or passed on the ssh(1) command-line), even if ssh-agent(1) or a PKCS11Provider or SecurityKeyProvider offers more identities. The argument to this keyword must be yes or no (the default). This option is intended for situations where ssh-agent offers many different identities. \ Sample ssh config. \ #Github Primary Yubikey Host github User git HostName github.com Port 22 IdentityFile ~/.ssh/github-yubikey -0 #Github Secondary Yubikey Host github User git HostName github.com Port 22 IdentityFile ~/.ssh/github-yubikey -1 #Global properties. Host * PubkeyAuthentication=yes PreferredAuthentications=publickey,keyboard-interactive PubkeyAcceptedAlgorithms=sk-ssh-ed25519@openssh.com,ssh-ed25519,rsa-sha2 -512 #ssh-ed25519 #ssh-ed25519-cert-v01@openssh.com #sk-ssh-ed25519@openssh.com #sk-ssh-ed25519-cert-v01@openssh.com #ssh-rsa ssh-keygen -t ed25519-sk -C "user@domain.tld" -f ~ /.ssh/gi thub-yubikey- 0 ; ssh-keygen -t ed25519-sk -C "user@domain.tld" -f ~ /.ssh/gi thub-yubikey- 1 ; chmod --change = 400 ~ /.ssh/gi thub*; #Owner only! lawrencesystems: SSH with YubiKey FIDO U2F Authentication. \ yubico: YubiKey 5 Series \ github: Generating a new SSH key and adding it to the ssh-agent. \ EOF Provide feedback on this episode .…
This show has been flagged as Explicit by the host. New hosts Welcome to our new hosts: Antoine , Shane - StrandedOutput . Last Month's Shows Id Day Date Title Host 4306 Mon 2025-02-03 HPR Community News for January 2025 HPR Volunteers 4307 Tue 2025-02-04 Chat with Sgoti Some Guy On The Internet 4308 Wed 2025-02-05 What tech Kevie would spend £2000 on Kevie 4309 Thu 2025-02-06 Talking with Yorik Trollercoaster 4310 Fri 2025-02-07 Playing Civilization IV, Part 6 Ahuka 4311 Mon 2025-02-10 LoRaWAN and the Things Stack Lee 4312 Tue 2025-02-11 What Is The Indie Archive? hairylarry 4313 Wed 2025-02-12 Why I made a 1-episode podcast about a war story Antoine 4314 Thu 2025-02-13 24-25 New Years Eve show Honkeymagoo 4315 Fri 2025-02-14 How I got into the wonderful world of hackery Shane - StrandedOutput 4316 Mon 2025-02-17 Is Scratch a real programming language? Trollercoaster 4317 Tue 2025-02-18 Recording an episode of HPR Kevie 4318 Wed 2025-02-19 What's up with the dates on the HPR future feed in AntennaPod? dnt 4319 Thu 2025-02-20 Am Rande - on the edge folky 4320 Fri 2025-02-21 Switching my Mastodon account Ahuka 4321 Mon 2025-02-24 Crux Linux Klaatu 4322 Tue 2025-02-25 Fighting smartphone addiction Celeste 4323 Wed 2025-02-26 Good Samaritan laws, Duty to rescue in the Netherlands Ken Fallon 4324 Thu 2025-02-27 24-25 New Years Eve show episode 2 Honkeymagoo 4325 Fri 2025-02-28 Two Software I use- Futo Keyboard and Inoreader Antoine Comments this month These are comments which have been made during the past month, either to shows released during the month or to past shows. There are 24 comments in total. Past shows There are 6 comments on 6 previous shows: hpr4106 (2024-04-29) " My tribute to feeds " by Henrik Hemrin . Comment 3 : Sem luz em Saint Louis on 2025-02-06: "Valid!" hpr4129 (2024-05-30) " How I found Hacker Public Radio " by Henrik Hemrin . Comment 2 : Sem luz em Saint Louis on 2025-02-06: "Thanks, Henrik!" hpr4168 (2024-07-24) " Beyond Economic Recovery " by Trixter . Comment 3 : Sem Luz em Saint Louis on 2025-02-14: "Piracy may be not so straight-forward" hpr4204 (2024-09-12) " LibreOffice Importing External Data " by gemlog . Comment 1 : Windigo on 2025-02-09: "Phenomenal tip" hpr4269 (2024-12-12) " What is on My Podcast Player 2024, Part 2 " by Ahuka . Comment 2 : elmussol on 2025-02-21: "Mike Duncan, Revolutions & Mars" hpr4302 (2025-01-28) " New Campaign Trail Playthrough " by Lochyboy . Comment 2 : Sem luz em Saint Louis on 2025-02-06: "Played it!" This month's shows There are 18 comments on 10 of this month's shows: hpr4306 (2025-02-03) " HPR Community News for January 2025 " by HPR Volunteers . Comment 1 : Lee on 2025-02-05: "Whiplash" hpr4310 (2025-02-07) " Playing Civilization IV, Part 6 " by Ahuka . Comment 1 : Ken Fallon on 2025-01-15: "Not a gamer" Comment 2 : Kevin O'Brien on 2025-01-15: "Well, it is math, really" hpr4311 (2025-02-10) " LoRaWAN and the Things Stack " by Lee . Comment 1 : Ken Fallon on 2025-01-15: "Great insignt into LoRaWAN" hpr4312 (2025-02-11) " What Is The Indie Archive? " by hairylarry . Comment 1 : Kevie on 2025-02-11: "Excellent show" Comment 2 : hairylarry on 2025-02-13: "The Indie Archive" hpr4313 (2025-02-12) " Why I made a 1-episode podcast about a war story " by Antoine . Comment 1 : dnt on 2025-02-28: "Welcome" Comment 2 : Antoine on 2025-02-28: "Thank you!" hpr4314 (2025-02-13) " 24-25 New Years Eve show " by Honkeymagoo . Comment 1 : Dave Morriss on 2025-02-14: "My 'fix_tags' script and Ken's difficulties with it." Comment 2 : freeplay on 2025-02-17: "Transcode script dependencies" Comment 3 : Operat0r on 2025-02-26: "HPR" hpr4315 (2025-02-14) " How I got into the wonderful world of hackery " by Shane - StrandedOutput . Comment 1 : Trey on 2025-02-14: "Welcome!" Comment 2 : SolusSpider - Peter Paterson on 2025-02-14: "Feeling older & impressed" Comment 3 : Steve Barnes on 2025-02-17: "Hi and merci!" Comment 4 : Torin Doyle on 2025-02-21: "Bliss of discovering GNU/Linux for the first time." hpr4317 (2025-02-18) " Recording an episode of HPR " by Kevie . Comment 1 : Reto on 2025-02-25: "Previous shows on tricks and apps for recording" hpr4320 (2025-02-21) " Switching my Mastodon account " by Ahuka . Comment 1 : Ken Fallon on 2024-11-25: "Target Audience of 1" hpr4322 (2025-02-25) " Fighting smartphone addiction " by Celeste . Comment 1 : Antoine on 2025-02-26: "Nice, and my experience is..." Mailing List discussions Policy decisions surrounding HPR are taken by the community as a whole. This discussion takes place on the Mailing List which is open to all HPR listeners and contributors. The discussions are open and available on the HPR server under Mailman . The threaded discussions this month can be found here: https://lists.hackerpublicradio.com/pipermail/hpr/2025-February/thread.html Events Calendar With the kind permission of LWN.net we are linking to The LWN.net Community Calendar . Quoting the site: This is the LWN.net community event calendar, where we track events of interest to people using and developing Linux and free software. Clicking on individual events will take you to the appropriate web page. Provide feedback on this episode .…
This show has been flagged as Clean by the host. 2 software recommendations: one online, one an Android app No one is free software (important disclaimer for a community of hackers) FUTO KEYBOARD for android Without internet permission, it has: word prediction speech to text swipe typing Functions very well. =) https://keyboard.futo.org/ (available at Google Play Store) INOREADER: Free, online feed reader, and you have: no ads (essential!) up to 150 feeds beautiful and very customizable display, for clutter-free or very cluttered experience, to your liking as online, you can have a continuous experience between PC and mobile If that's not enough, you can get a paid plan to more. =) Link: https://www.inoreader.com/ Mentioned service and link: Kill-The-Newsletter Provide feedback on this episode .…
This show has been flagged as Explicit by the host. mumble: Official website of the Mumble project wikipedia: ) Mumble (software) from Wikipedia ncbi: Generalisable 3D printing error detection and correction via multi-head neural networks liqcreate: Resin 3D-printing: Ec, Dp, cure depth & more explained tomshardware: How to Fix 3D Prints Not Sticking to the Bed simplify3d: Not Sticking to the Bed tinkercad: Tinkercad is a free web app for 3D design, electronics, and coding. etherpad: Etherpad is a highly customizable open source online editor providing collaborative editing in really real-time. jitsi: More secure, more flexible, and completely free video conferencing openai: Whisper is an automatic speech recognition (ASR) system raspberrypi: We are Raspberry Pi. We make computers. wikipedia: ESP32 hamuniverse: Tools, test equipment and shack accessories for the new ham radio operator dxzone: Radio Tools and Utilities for amateur radio operators dxengineering: Amateur Radio Equipment & Tools morsecode: Morse Code Keyer wikipedia: Morse code inksystem: CISS - continuous ink supply system wikipedia: Continuous ink system wikipedia: Three-phase electric power archives: Housing in New Zealand teara: Early houses... of New Zealand freedesktop: PulseAudio Volume Control kde: Plasma is a Desktop f-droid: What is F-Droid? i3wm: i3 is a tiling window manager, completely written from scratch. samsung: Galaxy S23 android: Android Debug Bridge (adb) wikipedia: Android Debug Bridge (adb) dolby: Dolby On: Record Dolby Sound and Video slackware: The Slackware Linux Project fedoraproject: Fedora Linux | The Fedora Project qtractor: Qtractor An Audio/MIDI multi-track sequencer ardour: Recording - Ardour DAW snapcraft: Snapcraft - Snaps are universal Linux packages wikipedia: ) Advanced Package Tool (APT) is a free-software user interface that works with core libraries... discord: Discord - Group Chat That's All Fun & Games telegram: Telegram Messenger mumla-app: Mumble app for Android kd4c: HamClock – A Shack’s Best Friend wikipedia: New Jersey Pine Barrens wikipedia: ) Piney (Pine Barrens resident) blackriflecoffee: Veteran Founded - Black Rifle Coffee Company gfs: Beverages - Gordon Food Service homegoods: Home Decor Store and More | HomeGoods deathwishcoffee: Death Wish Coffee creality: Ender-5 Pro is a cubic-constructure 3D printer kit oggcamp: OGGCAMP southeastlinuxfest: SouthEast LinuxFest | Linux in the GNU/South dev: BSD / OS conferences 2025 / 2026 olfconference: OLF (formerly known as Ohio LinuxFest) is a grassroots conference for the GNU/Linux... wikipedia: Security clearance state: Security Clearances - United States Department of State wikipedia: Underground soft-rock mining investopedia: Day Trading: The Basics and How To Get Started investor: Thinking of Day Trading? Know the Risks. wikipedia: Peter Zeihan youtube: Zeihan on Geopolitics britannica: F-4, two-seat, twin-engine jet fighter-bomber wikipedia: Lockheed C-130 Hercules monroeengineering: Ball Bearings: Inner vs Outer Races Explained ibm: Tape storage is used for data backup in case of... q4os: Q4OS - desktop operating system opensuse: openSUSE is a Linux distribution that offers... wikipedia: OS/2 is a proprietary computer operating system for... selinc: SEL-3351 System Computing Platform wikipedia: List of Microsoft Windows versions mxlinux: MX Linux is a Linux distribution based on Debian stable wikipedia: Squid Game - Wikipedia starlabs: Linux Laptops - Powered by Open Source – Star Labs® xubuntu: Xubuntu is a stable, light and configurable desktop... Provide feedback on this episode .…
H
Hacker Public Radio

This show has been flagged as Explicit by the host. This is a response show to hpr4216 :: Down the rabbit hole. "Sgoti talks about Good Samaritan laws. Good Heavens!" We talk to Johan Audiffred about the legal requirement to assist people in need in the Netherlands. You are required to assist people in need and can be prosecuted if you do not. Expenses to the hospital are covered by the State. Expenses in the hospital are covered by the mandatory Health Insurance, which is provided by the state for those that can't afford it. Damages are covered by mandatory public liability insurance. As a citizen you do not need respect Do Not Resuscitate wishes, but medical professionals will. This episode does not constitute legal advice. Listeners are urged to consult a legal expert for more information. Provide feedback on this episode .…
This show has been flagged as Clean by the host. Despite not having any social media, muscle memory in unlocking the screen and getting stuck watching the screen is harder to fight than I thought. OpenTimeLimit can be found at F-droid https://f-droid.org/packages/io.timelimit.android.open/ Provide feedback on this episode .…
This show has been flagged as Clean by the host. Crux Linux is a minimal distribution using a BSD-style init, and a BSD-style ports system with tarball packaging. Its install process is very much a manual process, but it's fun! You should try it. https://crux.nu/Main/About CRUX is a lightweight Linux distribution for the x86-64 architecture targeted at experienced Linux users. The primary focus of this distribution is keeping it simple , which is reflected in a straightforward tar.gz-based package system, BSD-style initscripts, and a relatively small collection of trimmed packages. The secondary focus is utilization of new Linux features and recent tools and libraries. CRUX also has a ports system which makes it easy to install and upgrade applications. Provide feedback on this episode .…
One way in which the Fediverse is different from corporate social media is that there is no center. By definition, these platforms are a federation of independent servers. This has consequences in that you may have a server that is run by a single person and if that person gets tired of doing it, or faces life situations that get in the way, your server may have to go away. But the mechanisms are in place to handle this situation. I am going to explain in this short episode how you migrate from one server to another. Links: https://fedi.tips/ https://fedi.tips/transferring-your-mastodon-account-to-another-server/ https://fedi.garden/ https://freeradical.zone/explore https://www.zwilnik.com/switching-my-mastodon-account/…
https://github.com/rhasspy/piper A fast, local neural text to speech system that sounds great and is optimized for the Raspberry Pi 4 https://www.rockbox.org/ Rockbox is a free replacement firmware for digital music players. https://en.wikipedia.org/wiki/Alexander_Volkov_(writer) Alexander Melentyevich Volkov (Russian: Александр Мелентьевич Волков (14 June 1891 – 3 July 1977) was a Soviet novelist, playwright, university lecturer. He was an author of novels, short stories, plays and poems for children, mostly remembered for the Magic Land series of books, based on L. Frank Baum's The Wonderful Wizard of Oz. https://de.wikipedia.org/wiki/Klaus_Fr%C3%BChauf Klaus Frühauf (* 12 October 1933 in Halle (Saale) ; † 11 November 2005 in Rostock ) was a German author and one of the most important science fiction authors in the GDR.…
H
Hacker Public Radio

Some stuff I found out when I was trying to understand why the HPR Future feed in Antenna Pod shows the release date for each show as the date I refreshed the podcast, instead of the actual release date that's in the RSS file. It's because AntennaPod ignores dates whenever any future date appears in the RSS file... https://forum.antennapod.org/t/filter-against-future-episodes/939…
In this episode Kevie talks about the basic steps of recording an HPR episode. The first step is to plan the episode. What will it be about and also consider the purpose of the show: is it to introduce a topic, give information, entertain, be a tutorial or instructional, an informal yarn. Write down the points that you want to cover and any links that you are going to reference. This will help you when it comes to recording and also it can act as your show notes. For early stage simple and effective recording use your mobile phone. I recommend Audio Recorder as it allows you to record in WAV, you can change the sample rate and it doesn't include adverts or any features that are paid for only. For recording on a Linux desktop I would recommend using something simple like Reco . If you want to record a show with somebody else then you will need to use a PC as Google banned applications that have the ability to record calls. To do this with Reco you simply click on the Record from button and you are given the choice of microphone, system audio or both. Set this to both and whichever way you chat Reco will record the conversation. Once you have recorded your file then simply head to the HPR website: Click upload (top left) Pick an available slot Complete the show notes Upload the file Click submit That's it, we look forward to hearing your first show.…
What is Scratch? Who made it? How does it work? What can it do? What are the blocks and how they relate to coding? Can be dragged and placed Different shapes/colours represent different aspects Round ones are analogous to Functions Sharp ones are variables Control ones are Logic/Conditions Why is this good? Allows kids to focus on logic and the mindset of coding without having to learn or care about Syntax/lines of code Allows for direct visualisation of what the code does My own experience Started with blocks in Lego Mindstorm Evolved to C HTML/PHP and then Python The workshop Kids made 2 games that covered all basics Triggers/Input Functions Variables Were all customised by them Explain that each kid made their version the football crazy one turned my cat and balloon game into a Football Match They got to take them home The games covered the basics on this way Input using keyboard for triggering functions Use Functions to modify location parameters If/Then Conditions for when sprites are touching each other/the walls Variables for storing points Operands to increase Points in variable End conditions Loops for permanently checking the If/Then Conditions Ask about the organisation Mora Mundus Download and learn more about Scratch .…
欢迎使用Player FM
Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。