diff --git a/sql/hpr-db-part-0c.sql b/sql/hpr-db-part-0c.sql index b56c586..0f75c5e 100644 --- a/sql/hpr-db-part-0c.sql +++ b/sql/hpr-db-part-0c.sql @@ -596,7 +596,7 @@ CREATE TABLE `comments` ( `last_changed` datetime NOT NULL DEFAULT current_timestamp(), PRIMARY KEY (`id`), KEY `comments_eps_id_idx` (`eps_id`) -) ENGINE=MyISAM AUTO_INCREMENT=3825 DEFAULT CHARSET=utf8mb3 COLLATE=utf8mb3_unicode_ci COMMENT='New comments table populated from c5t_* tables'; +) ENGINE=MyISAM AUTO_INCREMENT=3826 DEFAULT CHARSET=utf8mb3 COLLATE=utf8mb3_unicode_ci COMMENT='New comments table populated from c5t_* tables'; /*!40101 SET character_set_client = @saved_cs_client */; -- diff --git a/sql/hpr-db-part-10.sql b/sql/hpr-db-part-10.sql index 426663b..f353191 100644 --- a/sql/hpr-db-part-10.sql +++ b/sql/hpr-db-part-10.sql @@ -424,7 +424,8 @@ (3821,3941,'2023-10-24 20:22:01','Windigo','Great conversation','I thoroughly enjoyed this episode! The comedian you discussed is Hannah Gadsby; she\'s an autistic Australian comedian, and her stories about misreading social situations are one of my favorite bits of her comedy specials!\r\n\r\nAs for Reto\'s views on climate change... the global scientific consensus seems to disagree with you. They may not have checked for \"extra green\" and how heavy CO2 is, though. You might want to give scientists the heads-up before the waste any more time.','2023-10-24 20:54:13'), (3822,3971,'2023-10-28 22:48:22','kdmurray','Great Series','Really enjoying the series sgoti. I appreciate that you\'ve gone to the trouble of gathering people together to try to expand the number of voices for this topic and all the ancillary things as well like the role of the Internet in how people think about their offline relationships.','2023-10-29 10:25:45'), (3823,3978,'2023-11-05 18:50:42','Kevin O\'Brien','Good show','This was interesting and I enjoyed seeing the perspective of an operator. I have made it a practice to be courteous to truck drivers because they have enough weird stuff to deal with.','2023-11-05 19:06:21'), -(3824,3981,'2023-11-06 10:42:23','Hobson Lane (hobs)','Ken\'s comment about demand avoidance','Love the monthly Community News shows. Ken\'s comment about resisting the demands of his past self from reminders apps struck a chord with me. I\'ve been struggling with PDA (persistent/pathological demand avoidance) myself. I\'ll record a response show to summarize some things I\'ve learned from other podcasts that help boost my intrinsic motivation -- things like random rewards (to prevent external rewards from swamping your intrinsic motivation dopamine high). Dave\'s idea to use rituals and habits is also something that sometimes works for me. Rely admire the high quality open source technical infrastructure that keeps this community thriving and the supportive vibe of all the hosts and contributors. It gives me hope for the future of social media and the Internet.','2023-11-06 10:45:43'); +(3824,3981,'2023-11-06 10:42:23','Hobson Lane (hobs)','Ken\'s comment about demand avoidance','Love the monthly Community News shows. Ken\'s comment about resisting the demands of his past self from reminders apps struck a chord with me. I\'ve been struggling with PDA (persistent/pathological demand avoidance) myself. I\'ll record a response show to summarize some things I\'ve learned from other podcasts that help boost my intrinsic motivation -- things like random rewards (to prevent external rewards from swamping your intrinsic motivation dopamine high). Dave\'s idea to use rituals and habits is also something that sometimes works for me. Rely admire the high quality open source technical infrastructure that keeps this community thriving and the supportive vibe of all the hosts and contributors. It gives me hope for the future of social media and the Internet.','2023-11-06 10:45:43'), +(3825,3984,'2023-11-09 15:21:35','Trey','Really? You are sharing this with the world?','Dude! I thought we were keeping this on the down low? And you are naming names?\r\n\r\nNow I need to contact witness protection AGAIN!\r\n\r\nSMH...','2023-11-09 15:26:35'); /*!40000 ALTER TABLE `comments` ENABLE KEYS */; UNLOCK TABLES; /*!50003 SET @saved_cs_client = @@character_set_client */ ; @@ -997,4 +998,3 @@ INSERT INTO `eps` (`id`, `date`, `title`, `duration`, `summary`, `notes`, `hosti (518,'2010-02-17','Life Without a GUI',3317,'Getting Things Done - Life Without a GUI by Jared Bernard','\r\n\r\nGetting Things Done - Life Without a GUI\r\nby Jared Bernard
\r\nOct 9th 2009 at the Utah Open source conference \r\n
\r\n\r\n https://2009.utosc.com/presentation/44/
\r\n https://www.jaredandcoralee.com/ \r\n',110,0,1,'CC-BY-NC-SA','command line,screen,wordgrinder,LaTex,antiword,framebuffer,mutt,alpine,youtube-dl',0,1512,1), (519,'2010-02-18','TiT Radio 018 - moooo! Baby',4103,'Monsterb and friends host TiT Radio','

TiT Radio 018 - moooo! Baby.

\r\n

monsterb, klaatu, Peter64, Azimuth, and JMan talk about search enigines, codecs, \r\nvideo editing, and so much more!

\r\n

Please visit https://titradio.info/018.html for shownotes.

\r\n',99,30,1,'CC-BY-NC-SA','search engines,media players,video-meta,perl,slackermedia,slackbuilds,kdenlive,Slackware,screen,screenrc,cron,xprop',0,1393,1), (520,'2010-02-19',' Selecting Talks for PyCon 2010',1302,'Discussion on how talks were selected for the upcoming PyCon 2010 conference','\r\nSelecting Talks for PyCon 2010
\r\nIn this episode, we discuss how talks were selected for the upcoming PyCon conference, and what else is being planned.',121,38,1,'CC-BY-NC-SA','python,pycon 2010',0,1911,1), -(521,'2010-02-23','Talk Geek to me Ep 07 ',1965,'Deepgeek talks geek to his fans about nuclear power','In this episode I discuss my opinions on Nuclear Power. I give a brief history as well as assess the problems of the Industry.
\r\n\r\nClosing Music is Stian-2003001.',73,34,1,'CC-BY-NC-SA','Nuclear,Nuclear power,Nuclear waste,Nuclear weapons,mining process,exposure risks',0,2020,1), diff --git a/sql/hpr-db-part-11.sql b/sql/hpr-db-part-11.sql index 966e08f..1fffe8f 100644 --- a/sql/hpr-db-part-11.sql +++ b/sql/hpr-db-part-11.sql @@ -1,3 +1,4 @@ +(521,'2010-02-23','Talk Geek to me Ep 07 ',1965,'Deepgeek talks geek to his fans about nuclear power','In this episode I discuss my opinions on Nuclear Power. I give a brief history as well as assess the problems of the Industry.
\r\n\r\nClosing Music is Stian-2003001.',73,34,1,'CC-BY-NC-SA','Nuclear,Nuclear power,Nuclear waste,Nuclear weapons,mining process,exposure risks',0,2020,1), (522,'2010-02-26','Piratprat Ep 02',354,'Discussion on the internal Pirate Party election fraud','Piratprat - Subjects related to the Swedish Pirate Party\r\n\r\n

\r\n\r\nIn this episode from February 18 we discuss the internal Pirate Party election fraud. Extra short episode due to cold weather. (recorded under the winter sky)\r\n

\r\nShow page\r\n

',122,0,1,'CC-BY-NC-SA','Piratprat,Swedish Pirate Party',0,1231,1), (523,'2010-03-01','Miscellaneous Radio Theater ',2959,'Miscellaneous Radio Theater 4096 - Teaching Kids Math With Petunia','AUTHOR: SigFLUP\r\nTITLE: Miscellaneous Radio Theater 4096- Teaching Kids Math With Petunia
\r\nDESCRIPTION:
\r\nIn this episode we talk with Petunia about teaching kids math. You may contact either Petunia or SigFLUP at pantsbutt@gmail.com\r\n',115,0,1,'CC-BY-NC-SA','education,math,science',0,1373,1), (524,'2010-03-04','TiT Radio 019 - interview with sigFLUP',1818,'monsterb chats with sigFLUP','TiT Radio 019 - interview with sigFLUP
\r\n
\r\nmonsterb chats with sigFLUP about the demoscene, old gaming consoles, and so much more.
\r\n
\r\nPlease visit https://titradio.info/019.html for shownotes.',99,30,1,'CC-BY-NC-SA','demoscene,old gaming consoles,retro computing',0,2100,1), @@ -997,4 +998,3 @@ INSERT INTO `eps` (`id`, `date`, `title`, `duration`, `summary`, `notes`, `hosti (1593,'2014-09-10','Why C++?',745,'Introduction to the C++ programming language main features','

\r\nIn this episode, Garjola presents the C++ programming language by\r\nintroducing its main features for object orientation, generic\r\nprogramming and functional style.\r\n

',197,25,0,'CC-BY-SA','programming languages, c++',0,0,1), (1479,'2014-04-03','01 What is on my podcast player',974,'Ahuka begins to tell us about the podcasts he listens to','

\r\nWhat is on my podcast player\r\n

\r\n\r\n\r\n

My web site is at https://www.zwilnik.com/.

\r\n\r\n

Remember to support free software!

\r\n',198,75,0,'CC-BY-SA','podcasts,recommendations ',0,1420,1), (1482,'2014-04-08','02 What is on my podcast player',938,'Ahuka continues with the list of podcasts he listens to','

What is on my podcast player

\r\n\r\n

My web site is at https://www.zwilnik.com/.

\r\n

Remember to support free software!

\r\n',198,75,0,'CC-BY-SA','podcasts,recommendations',0,1398,1), -(1484,'2014-04-10','TuxJam31',4878,'Andrew Conway presents TuxJam episode 31, a special for HPR','

\r\nTuxJam is a podcast that reviews lesser known Free and Open Source Software\r\nprojects interspersed with Creative Commons licensed music. TuxJam 31\r\nis a special for HPR.\r\n

\r\n

\r\nSee https://unseenstudio.co.uk/tuxjam-ogg/tuxjam-episode-31/\r\n

',268,0,0,'CC-BY-SA','astronomy',0,1421,1), diff --git a/sql/hpr-db-part-12.sql b/sql/hpr-db-part-12.sql index d86ed42..1977f58 100644 --- a/sql/hpr-db-part-12.sql +++ b/sql/hpr-db-part-12.sql @@ -1,3 +1,4 @@ +(1484,'2014-04-10','TuxJam31',4878,'Andrew Conway presents TuxJam episode 31, a special for HPR','

\r\nTuxJam is a podcast that reviews lesser known Free and Open Source Software\r\nprojects interspersed with Creative Commons licensed music. TuxJam 31\r\nis a special for HPR.\r\n

\r\n

\r\nSee https://unseenstudio.co.uk/tuxjam-ogg/tuxjam-episode-31/\r\n

',268,0,0,'CC-BY-SA','astronomy',0,1421,1), (1486,'2014-04-14','Linux Luddites Episode 11 - Interview with Rob Landley',7222,'Ken Fallon promotes the \"Linux Luddites\" podcast','

\r\nThis show is is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.\r\n

\r\n\r\n

\r\nAs stated on the HPR Contribution page\r\n

\r\n

\r\nWe will continue to promote new podcasts and other creative commons material but due to a lack of slots, we are only releasing material created exclusively for HPR. If there is a piece of creative commons content that you would like to promote, then feel free to record a regular show where you introduce the content and explain why it is important, providing links to where we can get more information. \r\n

\r\n

\r\nToday I am doing just that. As a member of the HPR community, I would like to bring the podcast LINUX LUDDITES with the tag line \"Not all change is progress\". Taking their name from \"Linux\" the an operating system kernel by Linus Torvalds, and \"Luddites\" from the 19th-century English textile artisans who protested against newly developed labour-saving machinery.\r\n

\r\n

\r\nI am submitting Episode 11 as it includes a fascinating interview with Rob Landley, former maintainer of BusyBox and covers among other things his experiences of GPL enforcement. For complete episode show notes see https://linuxluddites.com/shows/episode-11/ \r\n

\r\n

\r\nIf this podcast is not in your feed, you would do very well to add it.\r\n

\r\n

\r\nIf there is a show is new to the scene, ie not on the linuxlink.net, then contact us about it and also consider submitting an episode as a featured podcast.\r\n

\r\n\r\n

Links

\r\n\r\n',30,78,1,'CC-BY-NC','linux,busybox,podcast',0,1457,1), (1487,'2014-04-15','How I Found Linux',376,'New host x1101 describes how he got into Linux','In today\'s show new host x1101, fulfils his promise made at NELF on the Community News and submits his first show on on how he got into Linux.',276,29,0,'CC-BY-SA','linux',0,1479,1), (1488,'2014-04-16','What\'s on My Podcatcher',1116,'Keith Murray talks about his favourite podcasts','

\r\nAfter listening to Ahuka describe his favourite podcasts on HPR1479 and HPR1482 I was surprised to see how few of the shows we listen to overlap. There are so many podcasts out there it\'s always good to be able to get recommendations. I present to you my list of 30 podcasts (I had to cull the list down a bit).\r\n

\r\n\r\n',266,75,0,'CC-BY-SA','podcast,feed',0,1433,1), @@ -997,4 +998,3 @@ INSERT INTO `eps` (`id`, `date`, `title`, `duration`, `summary`, `notes`, `hosti (2503,'2018-03-07','My journey into podcasting',868,'Dave takes us on his journey into 10 years of podcasting','

How I Got Into Podcasting

\r\n

The Background

\r\n

Audio production has always been an interest of mine: my late grandfather was an audiophile, my dad ran an AV studio in Woking (the one where the Spice Girls were formed - my dad got mentioned in a couple of their autobiographies) and now runs his own AV consultancy business, and my cousin also runs an AV consultancy... so there’s a definite family history in there.

\r\n

I dabbled briefly with hospital radio (as a technician, rather than a presenter) in the late 80’s, and I was a technician and presenter on College Radio in the early 90’s where I hosted a show called “The Barry Manilow Fan Club” on Friday lunchtimes.

\r\n

Yes, I am a huge fan of Barry Manilow - he’s given me a lot of inspiration as a musician - no, I didn’t play any Barry on the College Radio show.

\r\n

I’d also had a few people say that I had a good radio voice. Others say a good radio face, but I don’t like them anymore.

\r\n

The Catalyst

\r\n

In 2007, I discovered this podcasting lark through a couple of friends who had their own podcasts. One was The Random Three: a personal musical journey where Mark - the host - would play three seemingly-random pieces of music from his own collection (thus, not podsafe) and explain the reasons why he chose them. Most of the time, these seemingly-random tracks actually had a theme, but it didn’t necessarily become apparent until after the second track. It was a great show - now sadly defunct - and I really miss it. I even submitted my own music choices for Mark to present.

\r\n

The other was Dumbed Down Life: three chaps nattering about “stuff” and playing some music along with it. Another great show, which - although it still exists - currently releases episodes every year or so.

\r\n

What drew me to these shows - apart from being friends, was the fact that these were regular guys, not professionals.

\r\n

That led me to think “I can do that”, so I set about proving - to myself, mostly - that I could.

\r\n

The Start

\r\n

One Thursday in early March 2008, when the wife had gone to the gym for a couple of hours, I grabbed my Logitech headset, my Linux laptop, a handful of tracks from the Podsafe Music Network, and a piece of software called IDJC, and recorded the first ever episode of The Bugcast. It was just over 22 minutes long, and it was dire. Utterly dire. Every so often, I go back to it and listen and cringe and marvel at how much better the show is now!

\r\n

The music back then wasn’t strictly podsafe either: the first track I played was Moloko’s Sing It Back… but I didn’t worry about it then, as I got the track from a source that gave implicit permission for use in podcasts.

\r\n

I did do a show - episode 20 - which was a nostalgic trip back to my college years, where I played tracks by Chad Jackson, Japan, and Dream Warriors. This was a complete and intentional violation of copyright on my part, which led me to pull the show only a few weeks later. I did rerelease the show two years after that, but with the offending tracks removed. However, there is a story to the show, so I would recommend you go listen.

\r\n

Back then, it was just me and a small listener-base of friends, their family, their families’ servants; their families’ servants’ tennis partners, and some chap I bumped into in the mess the other day called Bernard. But as time went on and I got more experience, I was really enjoying what I was doing, and started to experiment.

\r\n

One thing I did discover by about episode 16 is that I wasn’t editing my shows in post, aside from topping and tailing silence. This made it so much easier for me as I was recording the shows as-live from the very beginning, but taking out the vocal gaps, gaffes and the like. So there was really only one place to go from there...

\r\n

Going live

\r\n

So in August 2008, on episode 24, to an audience of about 10 people, I streamed the first LIVE episode of the podcast. Wow, that was such a buzz! It was a major turning point in the show as I committed myself to do a regular show at a set time each week... turning a fun hobby into something a little step beyond amateur. There were a couple of non-live shows that I had to put together using the wife’s Windows machine when my laptop went bang and had to be repaired, but I hated doing that because I didn’t like the piecemeal sticky-tape method of production. There was little flow, and my spoken links between the music sounded very much like a bad Radio 4 anchor.

\r\n

In late September 2008, I was accepted as a member of the now-defunct Association of Music Podcasting. This was another major step for me. All member of the Association were peer-reviewed as part of the criteria for membership. This meant that my podcast was sufficiently good to be accepted. That meant so much to me, and made me take things so much more seriously (and was the main reason why I pulled episode 20 just prior)

\r\n

It also meant that the show was becoming more music-oriented - something I really did not have a problem with! Particularly as I was starting to strike up good relationships with some of the artists that I was featuring on the show. This led to me prerecording an interview with one of the bands in January 2009, and then again with another artist in March.

\r\n

Having registered a proper domain for the podcast (rather than piggybacking my own personal domain) and then celebrated the first anniversary of the show... you could say that the show was fuelling its own progression. And I was enjoying that journey immensely!

\r\n

Over the next 6 months, I joined the Made In The UK Show collective, interviewed an artist LIVE on the show, had the show syndicated on an internet radio station in the UK, and launched a new, independent chatroom for the website.

\r\n

The Major Change

\r\n

And then, in September of 2009, the 18 month anniversary of the show, and two days before my birthday, something happened to totally turn the show upside down.

\r\n

I decided that I wanted to improve the show. Bearing in mind that I was still using my Logitech headset, my Linux laptop, and a piece of software called IDJC to record and stream the show, I felt it was time for a change. So I spent a small fortune on a mixer, microphones, stands, audio interface, and cables.

\r\n

Yes, microphones. Plural.

\r\n

Up to this point my wife, Caroline, had progressed from occasional listener, to regular distraction (I don’t think details are appropriate!), to researcher. So I asked her a question... if I bought two microphones, would you join the show as a permanent co-host? She said yes.

\r\n

That really changed things. The dynamic of me talking to an imaginary audience (bar the activity in the live chatroom) changing to me bouncing off someone in the same room was electric! The show was totally transformed by that fairly simple change. Our listener figures jumped up, the music on the show was more varied, existing listeners enjoyed the show more... it was amazing.

\r\n

There have been occasions where Caroline hasn’t been able to join the show (illness, kids, etc) and the listeners (and I) have really noticed her absence.

\r\n

Since Then

\r\n\r\n

So there’s a potted history of how I got into podcasting.

\r\n

Beyond The Bugcast

\r\n

Outside the realms of The Bugcast, which is still my primary podcast:

\r\n\r\n

Also ran:

\r\n\r\n

I’m always happy to answer any questions or provide help with regard to podcasting, you can find various ways to find me over at my Contact page

\r\n

Thanks for listening! :-)

\r\n',314,0,0,'CC-BY-SA','podcasting, anniversary, history, journey',0,0,1), (2498,'2018-02-28','Life without Google',266,'Quvmoh goes a month without G apps on his phone','',110,0,0,'CC-BY-SA','google free, F-droid, LineageOS, magic device tool',0,0,1), (2499,'2018-03-01','Tuning around the HF 40Mtr band',767,'In this episode I give an example of what sort of things you can expect hear on the HF band','

Tuning around the band

\r\n

In this episode I tune around a small portion of the HF (High Frequency) band in the 40 Meters section which in the UK covers 7 to 7.2Mhz.

\r\n

Equipment details

\r\n

The mode being used was mostly LSB (Lower Side Band)
\r\nhttps://en.wikipedia.org/wiki/Sideband

\r\n

At the end of the recording I briefly switch mode to to listen to a commercial station on AM (Amplitude modulation).
\r\nhttps://en.wikipedia.org/wiki/Amplitude_modulation

\r\n

The radio being used is my trusty and much loved Kenwood TS 940S
\r\nhttps://www.universal-radio.com/catalog/hamhf/ts940s.html

\r\n

The antenna used is a dipole tuned for the 40 Meter band.
\r\nhttps://en.wikipedia.org/wiki/Dipole_antenna

\r\n

I used my trusty Dictaphone and internal microphone to do the recording
\r\nhttps://www.amazon.co.uk/HccToo-Multifunctional-Rechargeable-Dictaphone-Conversation/dp/B015H9JP6S/ref=sr_1_1?ie=UTF8&qid=1502381150&sr=8-1&keywords=dictation+machines

\r\n

If you want to hold private conversations with another party over radio then perhaps amateur radio is not for you as this goes against the whole principle of Amateur Radio.

\r\n

Listening to amateur radio broadcasts is actively encouraged, and in the UK a licence is not required for listening.

\r\n

A simple receiver capable of listening to sideband broadcasts and odd bit of long wire is all that\'s required.

\r\n

In the past it was common to hear an Amateur operator saying goodbye to any short wave listeners at the end of their conversation. If you listen carefully at about 10 minutes in the station DF2BO says goodbye to anybody still listening.

\r\n

Stations received

\r\n\r\n',201,43,1,'CC-BY-SA','ham radio, amateur radio, radio, hf',0,0,1), -(2502,'2018-03-06','Volume Of Thought',440,'Lostnbronx attempts to measure the \"volume\" of his own thoughts.','

Lostnbronx measures how loud his own thoughts are -- or rather, how loud outside noise has to be before they are disrupted.

\r\n

It turns out that unwanted music in his ears at -30 dB is when his train of thought starts to derail.

',107,0,0,'CC-BY-SA','lostnbronx,thinking,thoughts,volume,noise,music,confusion',0,0,1), diff --git a/sql/hpr-db-part-13.sql b/sql/hpr-db-part-13.sql index c1c5cde..8273de5 100644 --- a/sql/hpr-db-part-13.sql +++ b/sql/hpr-db-part-13.sql @@ -1,3 +1,4 @@ +(2502,'2018-03-06','Volume Of Thought',440,'Lostnbronx attempts to measure the \"volume\" of his own thoughts.','

Lostnbronx measures how loud his own thoughts are -- or rather, how loud outside noise has to be before they are disrupted.

\r\n

It turns out that unwanted music in his ears at -30 dB is when his train of thought starts to derail.

',107,0,0,'CC-BY-SA','lostnbronx,thinking,thoughts,volume,noise,music,confusion',0,0,1), (2504,'2018-03-08','Intro to Git with pen and paper',2205,'Klaatu introduces Git using pen and paper.','
git add\r\n\r\ngit commit -m "some useful message"\r\n\r\ngit push origin HEAD
\r\n',78,104,0,'CC-BY-SA','git',0,0,1), (2497,'2018-02-27','2017-2018 New Years Eve show part 1',13200,'Part one of the sixth annual HPR New Year Show.','

HPR NYE 2017 - 1

\r\n\r\n',159,121,1,'CC-BY-SA','HPR new year show 2017',0,0,1), (2505,'2018-03-09','The power of GNU Readline - part 3',1631,'More useful key combinations','

The power of GNU Readline - part 3

\r\n

In part 2 we looked at deleting text in various ways and pasting it back, using GNU Readline key sequences.

\r\n

The full-length notes (available here) contain some new terms and features of GNU Readline, and introduce some further ways of manipulating text, with some examples.

\r\n

Links

\r\n',225,102,1,'CC-BY-SA','command line,cli,GNU Readline',0,0,1), @@ -997,4 +998,3 @@ INSERT INTO `eps` (`id`, `date`, `title`, `duration`, `summary`, `notes`, `hosti (3488,'2021-12-15','Binaural 3d audio recording, please listen at normal speed with good head phones.',302,'recorded November 19 2021 quick storm.','

Recorded November 19 2021 quick storm. Please search Binaural on HPR for similar recordings and description of procedure, enjoy and have a glorious 2022.

\r\n

Links

\r\n\r\n',110,101,0,'CC-BY-SA','Binaural, storm, thunder',0,0,1), (3479,'2021-12-02','Linux Inlaws S01E49: Version Control Systems and why bother',3414,'Version Control Systems and why bother','

In this episode our two heroes contemplate the ins and outs of version\r\ncontrol systems (VCS) and how to maintain sanity using them. Particular focus\r\nis on the newer generation of such as git which enabled large-scale community\r\nprojects such as the Linux kernel, programming languages like Rust and Python\r\nand other shenanigans. Including a crash course on version control systems\r\n- you may credits at your local third-level education facility for listening\r\nto this episode. Just tell them the Inlaws sent you :-). Plus Martin reveals\r\nhis favourite Pay TV channel and his gun-buying habits being a minor. Don\'t\r\nmiss this episode if you\'re a minor and want to buy a gun in certain countries\r\n(details as part of the episode! :-).

\r\n\r\n

Links:

\r\n\r\n',384,111,1,'CC-BY-SA','Version control systems, git, subversion, mercurial, bazaar, how to buy guns as a minor in NL',0,0,1), (3483,'2021-12-08','Pinephone64 review',563,'Sigflup got a pinephone and wants to talk about it. ','

ringtone location: /usr/share/sounds/freedesktop/stereo

\r\n\r\n

\r\n
\r\nGimp on a cellphone, for obvious reasons.

\r\n\r\n\r\n

Links

\r\n\r\n\r\n',115,0,0,'CC-BY-SA','linux,cellphone,pinephone,mobie phone',0,0,1), -(3505,'2022-01-07','A DX with Hotel Bravo 9 Hotel November Tango',2890,'Ken (PA7KEN) and Beni (HB9HNT) talk about getting your HAM ticket in Switzerland','

HAM Radio Organizations

\r\n

\r\nThe HAM Page of the Swiss Federal Office of Communications, BAKOM: https://www.bakom.admin.ch/bakom/de/home/frequenzen-antennen/frequenznutzung-mit-oder-ohne-konzessionen/amateurfunk.html\r\n

\r\n

\r\nUnion of Swiss Short Wave Amateurs, they manage the local associations and the use of the frequencies for relays and automated stations: https://www.uska.ch/en/\r\n

\r\n\r\n

Training

\r\n\r\n

\r\nMost likely the best way to prepare for the exam is attending a preparation course from a local Association, of have a brother who did and forwarded all the background info and documents to me. ;) But apart from having a brother I did the following:\r\n

\r\n

\r\nThe online version of the books I read: https://www.darc.de/der-club/referate/ajw/darc-online-lehrgang/ - again in German. They\'re mainly geared towards the German exams but the knowledge contained is useful for the Swiss exams, too.\r\n

\r\n

\r\nI mainly used the HamRadioTrainer to prepare for the exam. This is a Windows application which however works pretty well in wine. I was told that the Swiss questions are rather old, 2017ish.\r\n

\r\n

\r\nI was told that there are mobile apps with more recent questions but I couldn\'t be bothered to check whether they exist on F-Droid.\r\n

\r\n

\r\nThe BAKOM also has a site about the exams, containing PDFs with example questions, of course again everything in German: https://www.bakom.admin.ch/bakom/de/home/frequenzen-antennen/funkerpruefungen/amateurfunk-pruefungen.html\r\n

',288,43,0,'CC-BY-SA','Swiss,BAKOM,HamRadioTrainer,HB9',0,0,1), diff --git a/sql/hpr-db-part-14.sql b/sql/hpr-db-part-14.sql index f1a6912..71c0664 100644 --- a/sql/hpr-db-part-14.sql +++ b/sql/hpr-db-part-14.sql @@ -1,3 +1,4 @@ +(3505,'2022-01-07','A DX with Hotel Bravo 9 Hotel November Tango',2890,'Ken (PA7KEN) and Beni (HB9HNT) talk about getting your HAM ticket in Switzerland','

HAM Radio Organizations

\r\n

\r\nThe HAM Page of the Swiss Federal Office of Communications, BAKOM: https://www.bakom.admin.ch/bakom/de/home/frequenzen-antennen/frequenznutzung-mit-oder-ohne-konzessionen/amateurfunk.html\r\n

\r\n

\r\nUnion of Swiss Short Wave Amateurs, they manage the local associations and the use of the frequencies for relays and automated stations: https://www.uska.ch/en/\r\n

\r\n\r\n

Training

\r\n\r\n

\r\nMost likely the best way to prepare for the exam is attending a preparation course from a local Association, of have a brother who did and forwarded all the background info and documents to me. ;) But apart from having a brother I did the following:\r\n

\r\n

\r\nThe online version of the books I read: https://www.darc.de/der-club/referate/ajw/darc-online-lehrgang/ - again in German. They\'re mainly geared towards the German exams but the knowledge contained is useful for the Swiss exams, too.\r\n

\r\n

\r\nI mainly used the HamRadioTrainer to prepare for the exam. This is a Windows application which however works pretty well in wine. I was told that the Swiss questions are rather old, 2017ish.\r\n

\r\n

\r\nI was told that there are mobile apps with more recent questions but I couldn\'t be bothered to check whether they exist on F-Droid.\r\n

\r\n

\r\nThe BAKOM also has a site about the exams, containing PDFs with example questions, of course again everything in German: https://www.bakom.admin.ch/bakom/de/home/frequenzen-antennen/funkerpruefungen/amateurfunk-pruefungen.html\r\n

',288,43,0,'CC-BY-SA','Swiss,BAKOM,HamRadioTrainer,HB9',0,0,1), (3482,'2021-12-07','Introduction to Post Apocalyptic Robotics Meta Technology',810,'Building robots from junk parts and tech prepping','

https://solarbotics.net/bftgu/default.htm
\r\nhttps://www.bitchute.com/video/jwD4sZhnXrEk/

\r\n

Hail to my Loyal Henchmen and fellow SuperVillains, welcome new recruits and greetings to the hackers of HPR.

\r\n

This is Mechatroniac the mechatronics maniac with the zeroth installment of Robot Warlords of the Apocalypse, where I will talk about post apocalyptic robotics and share my projects, philosophy and future ambitions.

\r\n

I am doing this podcast contribution for hacker public radio.

\r\n

hackerpublicradio.org

\r\n

After this has aired on HPR I will be adding video and to this presentation which will be uploaded to my channel at:

\r\n

https://bitchute.com/channel/mechatroniac point youtube-dl at it and download them all.

\r\n

Mechatronics is code, electronics and mechanics working together as a system. I am weak in all 3, but have built mini battlebot style robots completely from scratch, with every chassis part, every motor and wheel, and every circuit that drives them sourced for free from junk like discarded printers, dvds, tvs, computers and UPS.

\r\n

I am calling this ethos and the resultant aesthetic, Post Apocalyptic Robotics, that is robots that can be built by reclaiming existing post consumer products to create something new.

\r\n

Currently they are confined to smooth surfaces like battlebot arenas, but more rugged terrain bots are currently also being worked on, and I want to work towards autonomous and swarm robots as well.

\r\n

The recipes I release here, can be followed by anyone to build their own robots and devices, by simply gathering the required scrap units or similar as described; then disassembling, then finally reassembling into a new meta technological device.

\r\n

I hope that others will do the same, and come up with their own innovations and new recipes that can be added to our incipient swarms of meta-technological bots as they evolve ever more sophistication.

\r\n

Welcome to post apocalyptic robotics.

\r\n

Introduction to Post-Apocalypse Robotics Meta-technology

\r\n

Tech Prepping, Building a \'battlebot\' out of junk

\r\n

Meteors, asteroids, comets. Cataclysmic solar flares, massive volcanic eruptions and earthquakes triggering massive tsunamis, social unrest, runaway climate change, ransomware and EMPs attacks striking electric grids, deadly viral pandemics, mass hysteria, big boats blocking waterways, obscured malware in a systemd update, management engines at the heart of CPUs providing backdoors to Intel and AMD hardware at root -3 privilege... what could go wrong there?

\r\n

There are a large number of looming events which could collapse technological society as it is, wiping out most of the internet and shipping and transport and hopefully maybe even the government.

\r\n

Tech Prepping is more important than food prepping

\r\n

While most survivalist and prepper types concentrate on stacking cans of beans, seeds, fuel and ammo, the robot prepper will also be hoarding books on pdf, component datasheets, software libraries, breakout boards and every post EOL electronics product they can get their hands on.

\r\n

In a semi apocalyptic scenario where the trucks stop rolling, a lot of people who save seeds will be able to grow food in their communities, so food won\'t be such a big deal.

\r\n

There might even be some that figure out how to make petroleum from wood like mrteslonian channel on youtube.

\r\n

But a real crux will be analog, digital electronics technology, IT and mechatronics. Those communities with working electronics, mechatronics, and information technology infrastructure, will be at a distinct competitive advantage. They will be able to leverage this in such things as automation of agriculture, from watering schedules to weed pulling along with many other applications that will make the PAR communities ascendant. All else being equal, PAR will be a force multiplier vs hostile neighbours starved of their slaveslabs swiping because facebook no longer exists, or remnants of the tyrannical state coming out of their DUMB bunkers and thinking they still have the right to rule.

\r\n

It\'s a good thing then, that we have a boost up to a mechatronic technological society all around us in the electronic consumer devices that although they may be decrepit, soiled and/or dead, nonetheless contain a wealth of component parts -most of which are hardy enough to function for a very long time, components that can be reused in new applications.

\r\n

It\'s like there is a supply chain for robot factories all around us. It\'s not infinite but it is very plentiful at the moment. Sadly, our society is blind to the current and future worth of the technological legacy in our midst and the electronics recycling is electronics destruction.

\r\n

Meta technology

\r\n

Antecedents: BEAM, cyberpunk, road warrior

\r\n

Fellow Travellers/Parallels: Maker, Right to repair, hardware hacking(Valerio De Giampietro - Hardware Hacking Tutorial), CollapseOS

\r\n

One of this new meta technology\'s main antecedents is BEAM(Biology Evolution Aesthetics Mechanics) robotics, Mark Tilden\'s robot projects that eschewed microprocessors in favour of circuits built of discrete components that mimic biological nerves and can react to environmental stimuli. There is a nice archive of BEAM related documents on the solarbotics site.

\r\n

Mark Tilden even wrote a book called \'Junk Bots\', so must have had some of the same ideas I have... but where Mark uses transistors as the nerves and brains, I am using arduino since microprocessors are now very inexpensive.

\r\n

The use of arduino is the only thing keeping my projects from being completely PAR, but one day wish to have entirely PAR

\r\n

Thus right to repair and hardware hacking are thus two important aspects to utilizing the processors inside consumer products to run other operating systems for our use. Unless we hoard thousands of atmega328p chips, it will be difficult to find processors that we can use unless they have been liberated via techniques described by Valerio De Giampietro. Reusing processors from printers and other products is a goal for the future, but right now, let\'s have some fun.

\r\n

FUN and Education The first arduino PAR battlebot I built - the herald/interceptor; is powered by 5 18650 cells from trashed laptops, powertrain is a custom hybrid relay/MOSFET H-bridge, and it is driven by four electric motors and wheels harvested from PA printers. It has IR remote control and is very fast to the extent that I had to add rubber bumpers to it to keep it and others safe.

\r\n

I departed somewhat from the PAR ethos, with added front and rear ultrasonic sensors, and an mp3 player powering a tv speaker. Hence, it is the herald/interceptor

\r\n

I think it has an interesting road warrior cyberpunk aesthetic, with the grey steel, aluminum and black ABS parts, and but for the wheels; star wars for the bolted on look of it

\r\n

Can we set up PAR tournaments where we can bring our bots and battle it out? Cost is no longer a barrier.

\r\n

I could see a challenging new sport that is a cross between battlebots and junkyard wars, where contestants would have a set amount of time to build a bot from junk, and then compete in racing or sumo matches.

\r\n

Obviously you are going to learn a lot building a robot and the best way to learn is by doing.

\r\n

Alright, now that I have shown some of the important strategic and fun implications of PAR meta technology, by raiding trashed consumer electronics for their components: I hope at the very least that everyone hearing this never again take their post use electronics to one of those recycling centers where all those precious components are destroyed, instead of keeping it in your basement where it belongs. You\'d do better taking it to a landfill where perhaps some future wretched mutant can discover and make use of it, than take it to electronics recycling.

\r\n

Next episode I\'ll show you how to build your PAR laboratory and give you the ingredients to the herald/interceptor battlebot, but if you\'re already excited to get started you can order an arduino Uno or nano, or an arduino kit with a bunch of sensors like I did when I got started. You can also start gathering things like printers, tvs, dvds, UPS and other waste, and get a soldering station if you don\'t already have one.

\r\n

In the coming episodes I will share the detailed recipe for my first post apocalyptic battlebot style robot I built complete with arduino code, and will show you how to build your own robot for free except for the arduino*. I\'ll also do email tech support for anyone having problems.

\r\n

I also want to go further into other tech prepper archiving, in case all or large parts of the internet are no longer accessible, and this may be where you programming specialists might be able to help. They kind of gave me weird looks on the arduino forums when I asked for a way to download all the libraries but was finally able to beg a script that let me download a lot of them, if not all.

\r\n

Also, all the component datasheets would be handy... it seems it would be prudent to have datasheets on all the components and microprocessors that you possibly can, and to have all the software libraries it would be practical to archive.

\r\n

I\'ll also go into more aspects and implications of this exciting meta technology, and I hope you will join me in building post apocalypse robotics and mechatronics fun.

\r\n',401,0,1,'CC-BY-SA','beam,righttorepair,robots,mechatronics',0,0,1), (3489,'2021-12-16','Equality of structured errors',776,'Tuula talks about equality in Haskell','

Equality of structured errors

\r\n

Background

\r\n

In previous episode, I built a system where error codes weren\'t defined in one huge type. This made compilation times faster and maintenance quite a bit more easier.

\r\n

Problem

\r\n

I wanted to write a test to see that parameters passed to validatePatchApiPersonR are validated correctly. patchApiPersonR is used by client to do partial updates on a Person entity. There\'s three different cases I wanted to check:

\r\n\r\n

Code is shown below and the last 2 lines are the interesting ones. There I\'m using equality to compare if a given error exists in a list of errors created by validatePatchApiPersonR.

\r\n
spec :: Spec\r\nspec = do\r\n    describe "people" $ do\r\n        describe "life focus" $ do\r\n            describe "Validating requests" $ do\r\n                it "All errors are reported" $ do\r\n                    forAll anyCompletelyFaultyRequest $\r\n                        \\(userE, personE, msg, date) ->\r\n                            let res = validatePatchApiPersonR (userE ^. entityKeyL, userE ^. entityValL, personE, msg, date)\r\n                                newFocus = msg ^? patchPersonRequestLifeFocus . _Just . _Just\r\n                            in\r\n                                case res of\r\n                                    V.Success _ ->\r\n                                        expectationFailure "Invalid request was not detected"\r\n\r\n                                    V.Failure errs -> do\r\n                                        errs `shouldSatisfy` (\\xs -> any (\\x -> "CanNotChangeLifeFocusSoSoon" `isInfixOf` (pack $ show x)) xs)\r\n                                        errs `shouldContain` [ canNotReselectSameLifeFocus newFocus ]\r\n                                        errs `shouldContain` [ insufficientRights ]\r\n
\r\n

Detour on equality

\r\n

Equality in Haskell works slightly differently compared to for example C#. There is no built in, default implementation that gets used when the programmer hasn\'t written their own. If you want to compare equality, there needs to be implementation specific to your data types. This is done by making an instance of type class Eq (https://hackage.haskell.org/package/base-4.15.0.0/docs/Data-Eq.html).

\r\n
class Eq a where\r\n  (==) :: a -> a -> Bool\r\n  (/=) :: a -> a -> Bool\r\n
\r\n

There\'s two functions: == for equality and /= for inequality. You need to implement either one.

\r\n

Back to problem

\r\n

ECode is our structured error code type and defined as follows (this is short recap of previous episode):

\r\n
data ECode where\r\n    ECode :: (ErrorCodeClass a, ToJSON a, Eq a, Show a) => a -> ECode\r\n
\r\n

It can wrap anything that has correct type class instances and you will always get ECode as a result. It hides the specific type of thing being wrapped and only functions defined in type classes are available.

\r\n

First try

\r\n

Peel away ECode and compare what\'s inside and compare wrapped values:

\r\n
instance Eq ECode where\r\n    ECode a == ECode b =\r\n        a == b\r\n
\r\n

This will lead into a error \"Couldn\'t match expected type ‘a’ with actual type ‘a1’. ‘a1’ is a rigid type variable bound by a pattern with constructor...\". This is because ECode can wrap many different types, there is no quarantee that you\'re comparing values of same type. The whole error is show below for reference:

\r\n
[35 of 76] Compiling Errors           ( src/Errors.hs, .stack-work/dist/x86_64-linux/Cabal-2.2.0.1/build/Errors.o )\r\n\r\n/home/tuula/programming/sky/src/Errors.hs:148:14: error:\r\n    • Couldn't match expected type ‘a’ with actual type ‘a1’\r\n      ‘a1’ is a rigid type variable bound by\r\n        a pattern with constructor:\r\n          ECode :: forall a.\r\n                   (ErrorCodeClass a, ToJSON a, Eq a, Show a) =>\r\n                   a -> ECode,\r\n        in an equation for ‘==’\r\n        at src/Errors.hs:147:16-22\r\n      ‘a’ is a rigid type variable bound by\r\n        a pattern with constructor:\r\n          ECode :: forall a.\r\n                   (ErrorCodeClass a, ToJSON a, Eq a, Show a) =>\r\n                   a -> ECode,\r\n        in an equation for ‘==’\r\n        at src/Errors.hs:147:5-11\r\n    • In the second argument of ‘(==)’, namely ‘b’\r\n      In the expression: a == b\r\n      In an equation for ‘==’: ECode a == ECode b = a == b\r\n    • Relevant bindings include\r\n        b :: a1 (bound at src/Errors.hs:147:22)\r\n        a :: a (bound at src/Errors.hs:147:11)\r\n    |\r\n148 |         a == b\r\n    |\r\n
\r\n

Second try

\r\n

We can use Show to turn ECode into string and compare them. This is what I did initially.

\r\n
instance Eq ECode where\r\n    a == b = show a == show b\r\n
\r\n

While this works, it feels hacky. It relies on string representations being different. If you accidentally write Show instance in a way that produces same string with two different values, the comparison breaks down.

\r\n

Third time is a charm

\r\n

After pondering a bit, I asked myself a question \"When are two ECode equal?\". The answer I arrived is \"When they have same http status code and description.\" Then I could write yet different take on equality:

\r\n
instance Eq ECode where\r\n    a == b =\r\n        httpStatusCode a == httpStatusCode b\r\n        &&  description a == description b\r\n
\r\n

This states that to two ECode values are equal, if they have same httpStatusCode and description.

\r\n

Thanks for listening, if you have any questions or comments, you can reach me via email or in fediverse, where I\'m Tuula@tech.lgbt. Or even better, you could record your own hacker public radio episode.

\r\n

Ad astra!

\r\n',364,107,1,'CC-BY-SA','haskell, eq',0,0,1), (3487,'2021-12-14','Installing a cat door',1446,'Rho`n installs a cat door in his interior basement door','

Synopsis

\r\n

In today\'s episode, Rho`n installs a cat door in the basement door separating the finished side of the basement from the utility side. Follow along as he learns once again that it is best to read all the instructions before starting a project, and also learns that modern, inexpensive, interior doors are not made of wood.

\r\n\r\n

The following are the pictures taken during the project.

\r\n\r\n
\r\n
\r\n \"Basement\r\n
Basement door laid out on a table with the cat door template applied
\r\n
\r\n
\r\n \"Basement\r\n
Basement door after cutting a hole through it. Showing the hole and the interior of the door.
\r\n
\r\n
\r\n \"View\r\n
View from the finished side of the basement showing the installed cat door.
\r\n
\r\n
\r\n \"View\r\n
View from the utility side of the basement showing the installed cat door.
\r\n
\r\n
\r\n

Attribution

\r\n\r\n

The transition sound used between audio clips is found on freesound.org:
\r\nName: Harp Transition Music Cue
\r\nAuthor: DanJFilms
\r\nLicense: Creative Commons Zero

\r\n',293,0,0,'CC-BY-SA','Install, cat door',0,0,1), @@ -230,7 +231,7 @@ INSERT INTO `eps` (`id`, `date`, `title`, `duration`, `summary`, `notes`, `hosti (3712,'2022-10-25','The last ever CCHits.net Show',5756,'The team talk about the nearly 12 years of producing CCHits.net.','

Over 12 years ago, Jon \"The Nice Guy\"\nSpriggs went to a \"Pod Crawl\" with (among others) Dave \"The Love Bug\" Lee, where he\npitched the idea of a daily music promotion show, with a twist - it\nwould all be automated, and use text-to-speech to introduce\neverything.

\n

The first show was released\non 2010-10-24 and the last ever show (this one) was released on\n2022-10-12.

\n

Over the twelve years, Jon would go on to meet to meet Yannick and Ken Fallon, both\nof whom would go on to shape changes (big and small) to CCHits.

\n

This year, the cracks started to re-appear in the architecture\nunderneath CCHits - between APIs shutting down that were used to load\ntracks to CCHits, and the general framework being used to write CCHits\nnot receiving the care and attention it needed... and the team finally\ndecided to stop adding new tracks, and let the process build the last\nfew shows.

\n

This podcast gives you a peek behind the curtain to the team involved\nin the system, and gives you some of the high- and low-lights in the 12\nyears the site ran for.

\n',413,0,0,'CC-BY','music,creative commons,podcast',0,0,1), (3724,'2022-11-10','My top Android apps',579,'I walk through the top apps on my phone','

My most used apps

\n

AIO Launcher

\n\n

\"Main

\n

\n

\n

Termux: Terminal\nemulator with packages

\n\n

QKSMS Messaging

\n\n

Firefox browser

\n\n

Opera browser

\n\n

Brave browser

\n\n

Clear Scanner PDF scanner and\nOCR

\n\n

Antennapod

\n\n

Tusky

\n\n

K-9 mail client

\n\n

Viber

\n\n

Audio recorder

\n\n

X-plore dual-pane file\nmanager

\n\n

Librera E-book Reader: for\nPDF, EPUB

\n\n

Multi Timer

\n\n

US Amateur Radio Band Plan

\n\n',318,0,0,'CC-BY-SA','Android, Android apps, Mobile phone, Custom launcher',0,0,1), (3725,'2022-11-11','How to use OSMAnd with Public Transport ',124,'Ken shows you how to use this mapping tool to display transit routes in your area.','

\r\n\"\"
\r\nMap of Dublin showing the Temple Bar tourist area. A red arrow points to where you can change the profile.\r\n

\r\n

\r\n\"\"
\r\nWith the Configure Map > Profile selection menu open, a red square surrounds the Bus icon to indicate the \"public transport\" profile is now selected.\r\n

\r\n

\r\n\"\"
\r\nThe map now opens to show more information about public transport is now displayed on the map. This is highlighted with a red square.
\r\nClicking the bustop (highlighted with a red circle ) will show more information about the routes available at this location.\r\n

\r\n

\r\n\"\"
\r\nOnce the transport stop is selected, a list of all the routes that service this location are displayed. Along with other routes that are available within a short distance.\r\n

\r\n

\r\n\"\"
\r\nClicking any of the routes numbers/names will give a zoomed out map showing in red the route many of the stops towards it\'s source and destination.\r\n

\r\n',30,0,0,'CC-BY-SA','OSMAnd, OSM, Maps, Public Transport',0,0,1), -(4001,'2023-12-04','HPR Community News for November 2023',0,'HPR Volunteers talk about shows released and comments posted in November 2023','\n\n

New hosts

\n

\nThere were no new hosts this month.\n

\n\n

Last Month\'s Shows

\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
IdDayDateTitleHost
3978Wed2023-11-01Driving in Virginia.Some Guy On The Internet
3979Thu2023-11-02FireStick and ad blockingoperat0r
3980Fri2023-11-03Huntsville to VicksburgAhuka
3981Mon2023-11-06HPR Community News for October 2023HPR Volunteers
3982Tue2023-11-07Conversation with ChatGPTArcher72
3983Wed2023-11-08ChatGPT Output is not compatible with CC-BY-SAKen Fallon
3984Thu2023-11-09Whoppers. How Archer72 and I made moonshine. Volume one.Some Guy On The Internet
3985Fri2023-11-10Bash snippet - be careful when feeding data to loopsDave Morriss
3990Fri2023-11-17Playing Alpha Centauri, Part 2Ahuka
3991Mon2023-11-20YOU ARE A PIRATE operat0r
3992Tue2023-11-21Test recording on a wireless micArcher72
\n\n

Comments this month

\n\n

These are comments which have been made during the past month, either to shows released during the month or to past shows.\nThere are 2 comments in total.

\n\n

This month\'s shows

\n

There are 2 comments on 2 of this month\'s shows:

\n\n\n

Mailing List discussions

\n

\nPolicy decisions surrounding HPR are taken by the community as a whole. This\ndiscussion takes place on the Mail List which is open to all HPR listeners and\ncontributors. The discussions are open and available on the HPR server under\nMailman.\n

\n

The threaded discussions this month can be found here:

\nhttps://lists.hackerpublicradio.com/pipermail/hpr/2023-November/thread.html\n\n\n

Events Calendar

\n

With the kind permission of LWN.net we are linking to\nThe LWN.net Community Calendar.

\n

Quoting the site:

\n
This is the LWN.net community event calendar, where we track\nevents of interest to people using and developing Linux and free software.\nClicking on individual events will take you to the appropriate web\npage.
\n\n

Any other business

\n

Example section

\n\n\n\n',159,47,1,'CC-BY-SA','Community News',0,0,1), +(4001,'2023-12-04','HPR Community News for November 2023',0,'HPR Volunteers talk about shows released and comments posted in November 2023','\n\n

New hosts

\n

\nThere were no new hosts this month.\n

\n\n

Last Month\'s Shows

\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
IdDayDateTitleHost
3978Wed2023-11-01Driving in Virginia.Some Guy On The Internet
3979Thu2023-11-02FireStick and ad blockingoperat0r
3980Fri2023-11-03Huntsville to VicksburgAhuka
3981Mon2023-11-06HPR Community News for October 2023HPR Volunteers
3982Tue2023-11-07Conversation with ChatGPTArcher72
3983Wed2023-11-08ChatGPT Output is not compatible with CC-BY-SAKen Fallon
3984Thu2023-11-09Whoppers. How Archer72 and I made moonshine. Volume one.Some Guy On The Internet
3985Fri2023-11-10Bash snippet - be careful when feeding data to loopsDave Morriss
3990Fri2023-11-17Playing Alpha Centauri, Part 2Ahuka
3991Mon2023-11-20YOU ARE A PIRATE operat0r
3992Tue2023-11-21Test recording on a wireless micArcher72
\n\n

Comments this month

\n\n

These are comments which have been made during the past month, either to shows released during the month or to past shows.\nThere are 3 comments in total.

\n\n

This month\'s shows

\n

There are 3 comments on 3 of this month\'s shows:

\n\n\n

Mailing List discussions

\n

\nPolicy decisions surrounding HPR are taken by the community as a whole. This\ndiscussion takes place on the Mail List which is open to all HPR listeners and\ncontributors. The discussions are open and available on the HPR server under\nMailman.\n

\n

The threaded discussions this month can be found here:

\nhttps://lists.hackerpublicradio.com/pipermail/hpr/2023-November/thread.html\n\n\n

Events Calendar

\n

With the kind permission of LWN.net we are linking to\nThe LWN.net Community Calendar.

\n

Quoting the site:

\n
This is the LWN.net community event calendar, where we track\nevents of interest to people using and developing Linux and free software.\nClicking on individual events will take you to the appropriate web\npage.
\n\n

Any other business

\n

Example section

\n\n\n\n',159,47,1,'CC-BY-SA','Community News',0,0,1), (3714,'2022-10-27','The News with Some Guy On the Internet',609,'Threat Analysis','

Threat Analysis; your\nattack surface.

\n

The Hacker News

\nNew\nChinese Malware Attack Framework Targets Windows, macOS, and Linux\nSystems.\n

A previously undocumented command-and-control (C2) framework dubbed\nAlchimist is likely being used in the wild to target Windows, macOS, and\nLinux systems.

\n

\"Alchimist C2 has a web interface written in Simplified Chinese and\ncan generate a configured payload, establish remote sessions, deploy\npayloads to the remote machines, capture screenshots, perform remote\nshellcode execution, and run arbitrary commands,\" Cisco Talos said in a\nreport shared with The Hacker News. Written in GoLang, Alchimist is\ncomplemented by a beacon implant called Insekt, which comes with remote\naccess features that can be instrumented by the C2 server.”

\n

\"Since Alchimist is a single-file based ready-to-go C2 framework, it\nis difficult to attribute its use to a single actor such as the authors,\nAPTs, or crimeware syndicates.\"

\n

The trojan, for its part, is equipped with features typically present\nin backdoors of this kind, enabling the malware to get system\ninformation, capture screenshots, run arbitrary commands, and download\nremote files, among others.

\n

Alchimist C2 panel further features the ability to generate first\nstage payloads, including PowerShell and wget code snippets for Windows\nand Linux, potentially allowing an attacker to flesh out their infection\nchains to distribute the Insekt RAT binary. The instructions could then\nbe potentially embedded in a maldoc attached to a phishing email that,\nwhen opened, downloads and launches the backdoor on the compromised\nmachine. What\'s more, the Linux version of Insekt is capable of listing\nthe contents of the \".ssh\" directory and even adding new SSH keys to the\n\"~/.ssh/authorized_keys\" file to facilitate remote access over SSH.

\n

The Hacker News

\nHackers\nUsing Vishing to Trick Victims into Installing Android Banking\nMalware.\n

Malicious actors are resorting to voice phishing (vishing) tactics to\ndupe victims into installing Android malware on their devices.

\n

The Dutch mobile security company said it identified a network of\nphishing websites targeting Italian online-banking users that are\ndesigned to get hold of their contact details.

\n

Telephone-oriented attack delivery (TOAD), as the social engineering\ntechnique is called, involves calling the victims using previously\ncollected information from the fraudulent websites.

\n

The caller, who purports to be a support agent for the bank,\ninstructs the individual on the other end of the call to install a\nsecurity app and grant it extensive permissions, when, in reality, it\'s\nmalicious software intended to gain remote access or conduct financial\nfraud.

\n

What\'s more, the infrastructure utilized by the threat actor has been\nfound to deliver a second malware named SMS Spy that enables the\nadversary to gain access to all incoming SMS messages and intercept\none-time passwords (OTPs) sent by banks.

\n

The new wave of hybrid fraud attacks presents a new dimension for\nscammers to mount convincing Android malware campaigns that have\notherwise relied on traditional methods such as Google Play Store\ndroppers, rogue ads, and smishing.

\n

The Hacker News

\n64,000\nAdditional Patients Impacted by Omnicell Data Breach - What is Your Data\nBreach Action Plan?\n

Founded in 1992, Omnicell is a leading provider of medication\nmanagement solutions for hospitals, long-term care facilities, and\nretail pharmacies. On May 4, 2022, Omnicell\'s IT systems and third-party\ncloud services were affected by ransomware attacks which may lead to\ndata security concerns for employees and patients. While it is still\nearly in the investigation, this appears to be a severe breach with\npotentially significant consequences for the company.

\n

Omnicell began informing individuals whose information may have been\ncompromised on August 3, 2022. Hackers may be able to access and sell\npatient-sensitive information, such as social security numbers, due to\nthe time delay between the breach and the company\'s report of affected\npatients.

\n

The type of information that may be exposed are:

\n
    \n
  • Credit card information.
  • \n
  • Financial information.
  • \n
  • Social security numbers.
  • \n
  • Driver\'s license numbers.
  • \n
  • Health insurance details.
  • \n
\n

The healthcare industry is one of the most targeted sectors globally,\nwith attacks doubling year over year. And these costs are measured in\nmillions or even billions of dollars - not to mention increased risks\nfor patients\' privacy (and reputation).

\n

The Washington Post

\n

How to\nprotect schools getting whacked by ransomware.

\n

Ransomware gangs are taking Americans to school. So far this year,\nhackers have taken hostage at least 1,735 schools in 27 districts; the\nmassive Los Angeles Unified School District is their latest target.

\n

Ransomware hackers breach computers, lock them up, steal sensitive\ndata and demand money to release their hold on organizations’ critical\nsystems. These criminals often attack schools because they are\nprofitable targets. If all ransomware victims refused to pay, the\nattacks would stop. Indeed, paying up might be illegal: The Treasury\nDepartment released guidance last year noting that giving money to\nglobal criminal organizations can violate sanctions law.

\n

The trouble is, saying no isn’t always easy. Los Angeles didn’t\ncapitulate, and the criminals leaked a trove of data — a consequence\nthat can prove more or less serious depending on the sensitivity of the\nstolen information.

\n

“Because we can,” said a representative of the ransomware gang that\ntook down Los Angeles Unified School District, explaining the\ncollective’s motivations to a Bloomberg News reporter. Schools’ task is\nto turn “can” to “can’t” — or, at least, to make success pay a whole lot\nless.

\n

CNET News.

\nVerizon\nAlerts Prepaid Customers to Recent Security Breach.\n

Verizon notified prepaid customers this week of a recent cyberattack\nthat granted third-party actors access to their accounts, as reported\nearlier Tuesday by BleepingComputer. The attack occurred between Oct. 6\nand Oct. 10 and affected 250 Verizon prepaid customers.

\n

The breach exposed the last four digits of customers\' credit cards\nused to make payments on their prepaid accounts. While no full credit\ncard information was accessible, the information was enough to grant the\nattackers access to Verizon user accounts, which hold semi-sensitive\ndata such \"name, telephone number, billing address, price plans, and\nother service-related information,\" per a notice from Verizon.

\n

Account access also potentially enabled attackers to process\nunauthorized SIM card changes on prepaid lines. Also known as SIM\nswapping, unauthorized SIM card changes can allow for the transfer of an\nunsuspecting person\'s phone number to another phone.

\n

From there, the counterfeit phone can be used to receive SMS messages\nfor password resets and user identification verifications on other\naccounts, giving attackers potential access to any account they have, or\ncan guess, the username for. Consequently, Verizon recommended affected\ncustomers secure their non-Verizon accounts such as social media,\nfinancial, email and other accounts that allow for password resets by\nphone.

\n',391,0,0,'CC-BY-SA','Threat Analysis, Security Breach, Ransomware, Data Breach, TOAD',0,0,1), (3717,'2022-11-01','Video editing with Shotcut on a low end PC',695,'In this episode I explain how I use the shotcut video editor to edit video on a low end PC.','

Links

\n

Shotcut video editor website

\n

Useful\nShortcut keys for the Shotcut video editor

\n
C = copy\nV = paste\nA = duplicate\nX = ripple delete\nCtrl + X = ripple delete but send to clipboard\nS = split
\n

Tip not covered in my\nPodcast

\n

Splits are not fixed and can be adjusted. Once you\'ve split up clips\nand put them in the right order on the timeline you can still adjust the\ncut point even though you previously split the clip because the clip is\nreferenced to the original file in the playlist.

\n

Introduction

\n

Hello and welcome Hacker Public Radio audience my name is Mr X\nwelcome to this podcast. As per usual I\'d like to start by thanking the\npeople at HPR for making this podcast possible. HPR is a Community led\npodcast provided by the community for the community that means you can\ncontribute to. The HPR team have gone to great deal of effort to\nsimplify and streamline the process of providing podcasts. There are\nmany ways to record an episode these days using phones tablets PCs and\nalike. The hardest barrier is sending in your first show. Don\'t get too\nhung up about quality, it\'s more important just to send something in.\nThe sound quality of some of my early shows wasn\'t very good. If I can\ndo it anyone can and you might just get hooked in the process.

\n

Well it\'s been almost a year since I\'ve sent in a show. Looking at\nthe HPR site my last episode was back in November 2021. I suspect like\nmany others life has become more complicated and I find I have much less\nspare time and because I have much less spare time I have much less time\nto pursue my hobbies and because of this I have less to speak about and\nbecause of this I have less time to record what I\'ve been doing and it\nall turns into to vicious circle. Fortunately I recently had some time\noff work and had a lovely holiday. During the holiday I ended up\nrecording some video which I decided I wanted to edit. I\'ve done some\nvideo editing in the past using various video editing packages. The best\nand most recent of which is shotcut.

\n

Specific details and\nequipment

\n

Video resolution 1920 x 1080, Codec h264 mpeg-4, Frame rate 30 frames\nper second.

\n

Computer Dell Optiplex 780. Fitted with 4 GB of internal RAM and\nonboard video graphics card.

\n

Shotcut version 22.06.23 Shotcut is a free open-source cross-platform\nvideo editor licenced under the GNU general public licence version\n3.0

\n

This episode will only cover basic shotcut video editing techniques.\nShotcut contains many advanced features and effects that will not be\ncovered in this episode. A lot of the workflow I’ll share with you today\nis intended to get around limitations imposed by my low spec PC

\n

I\'ll try my best to cover the video editing process in this podcast\nusing words alone; however I am conscious that an accompanying video\nwould make it easier to follow along.

\n

Shotcut workflow

\n

Start by creating a folder to hold all the required media files.\nAudio tracks and sound effects can be added to this folder later. Make\nsure all your video files are using the same frame rate in my case 30\nframes per second.

\n

Open each video file in VLC one at a time going through each video\nfile looking for the best portions of video. Make a note of where the\nbest portions of the video are by writing down the start and end points\nin minutes and seconds.

\n

I do this because the interface of VLC is more responsive than\nshortcut and the resolution of displayed video is far greater than the\npreview in shortcut. This makes it quicker and easier to find the best\nportions of video.

\n

Open shortcut and make sure the new project is set to the same frames\nper second as the media files you\'re working with, in my case 30 frames\nper second. You can check the frame rate of your project by looking at\nthe selected video mode in the new projects window. If you select\nautomatic it will ensure the project resolution and frame rate\nautomatically match that of your media files.

\n

Start by adding all the video files to the playlist, this can be done\nin a number of ways for example it can be done by clicking on the open\nfile button in the top toolbar or within the open files menu.\nAlternatively you can drag and drop files into the playlist. I find this\nto be the easiest way to add media files to a project. Once this is done\nsave your project.

\n

Drag the first file from the Playlist to the timeline making sure\nthat the start of the video starts at 0 seconds.

\n

Click on the timeline in the position where the first start point of\ninterest is needed. Use the S key to split the video at this point.\nDon\'t worry about being too accurate as this can be moved at a later\nstage.

\n

Repeat this process for the end point of interest.

\n

Repeat this again for all the other sections of start and end points\nof interest.

\n

Remove the unwanted sections of video by clicking on a section then\nhitting the delete key. This will remove the unwanted section leaving an\nempty space behind.

\n

Once all the unwanted sections are removed click on the sections of\nvideo and pull them to the left to close the gaps up. I find it useful\nto leave some space between the good sections of video as it makes it\neasier to see where splits are and makes it easier later on to rearrange\nthe order of the individual clips.

\n

Check the start and end points of the remaining sections of video to\nsee that the start and end points stop in the correct place. You can do\nthis by clicking the play button on the preview window. The video start\nand end points can be adjusted by dragging the section left or right in\nin the timeline section; this is where leaving spaces Between each\nsection of video can be handy as it allows for fine tuning.

\n

Add a new blank video track to the timeline to hold the next video.\nNote this wasn\'t required when adding the first video track but it is\nneeded for each subsequent track. A video track can be added by right\nclicking on an empty portion of the timeline and selecting add video\ntrack. Alternatively use the ctrl + I key.

\n

Drag your second video from the playlist onto the newly created blank\nvideo track in the timeline. As before make sure that the start of the\nvideo starts at 0 seconds.

\n

Before previewing any section of the second video track click the\nsmall eye shaped hide icon in the left section of the first video track\nlabelled output. This will prevent previewing both video tracks at the\nsame time.

\n

Repeat the process above of chopping the second video track into\nsections using the S key to split the video up. Remove the unwanted\nsections. Finally adjust the start and end points of the remaining\nsections.

\n

Repeat the steps above to add the remaining video files one at a time\nfrom the playlist to the timeline.

\n

When complete you end up with separate video tracks in the timeline\neach containing good sections of video.

\n

At this stage I can\'t be too specific about how to continue as there\nare a number of different options depending on your particular Project.\nYou can for example start by combining the good sections of video into\none video track by dragging them from one track to another then add if\nrequired an audio track or you can add the audio track first and then\ntry to sync things up to the audio track moving bits and pieces of video\ninto one video track remembering to hide the unwanted sections of video\nby clicking on the small hide eye icons. Don\'t do too much editing\nwithout saving the project. If you get a message about low memory save\nthe project then reopen it.

\n

To export the final video click on the export button in the toolbar.\nI pick the default option, this creates an H.264/AAC MP4 file suitable\nfor most users and purposes. You can check the frame rate is the same as\nyour original media files by clicking on the advanced tab. Click the\nexport file button and give it a file name. It may take some time to\ncreate the export file. This will be dependent on the speed of your\ncomputer and the length and resolution of your project.

\n

While Shotcut is far from perfect on my puny PC it is surprisingly\nusable and stable and is the best option I’ve found so far.

\n

Finally here are some general shotcut tips I have when doing video\nediting on a puny PC with limited ram, slow processor and built in\ngraphics card such as mine.

\n

General Tips\nwhen working with a low powered PC

\n

Close all open applications leaving only shortcut open this helps\nwith RAM usage

\n

Shortcut is surprisingly stable with a feeble PC such as mine. I\nwould still recommend saving your project regularly as it is quick and\nvery easy to do.

\n

If you get a message about running out of RAM then try not to do too\nmuch more editing before saving the project. Once saved close shotcut\nand then reopen it. The longer your project is and the higher your\nproject resolution the more RAM you will need.

\n

When you are about to export your final video save the project close\nshortcut reopen shotcut and immediately export your project as any\nprevious editing may be taking up precious ram.

\n

Be patient when clicking on the timeline to repositioned the play\nhead. Always wait for the preview window to update. This can sometimes\ntake a few seconds.

\n

When trying to sync video to audio you need to zoom in in quite a\nlong way before getting an audio preview. When doing this and moving the\nplay head you\'ll get a choppy version of the audio with this it is still\nperfectly possible to find the beat of the music allowing you to sync\nyour video to the music. If this doesn\'t seem to work for you then try\nzooming in closer.

\n

Ok that\'s about it for this podcast. Hope it wasn\'t too boring and it\nmade some sense. If you want to contact me I can be contacted at\nmrxathpr at googlemail.

\n

Thank you and goodbye.

\n',201,0,0,'CC-BY-SA','workflow, tips, video, editing, application',0,0,1), (3719,'2022-11-03','HPR News',594,'InfoSec; the language of security.','

InfoSec; the language of\nsecurity.

\n

What\nis Typosquatting and How Do Scammers Use it?

\n
    \n
  • Typosquatting, as an attack, uses modified or misspelled domain\nnames to trick users into visiting fraudulent websites; the heart of\nthis attack is domain name registration. Typosquatting is deployed by\nscammers to defraud unaware users. Attackers will attempt to: mimic\nlogin pages, redirect traffic, download malware, and extort users.
  • \n
  • Past Known Typosquatting Attacks.\n
      \n
    • Several\nMalicious Typosquatted Python Libraries Found On PyPI\nRepository
    • \n
    • Over\n700 Malicious Typosquatted Libraries Found On RubyGems\nRepository
    • \n
    • Security\nadvisory: malicious crate rustdecimal
    • \n
    • This\nWeek in Malware-Malicious Rust crate, \'colors\' Typosquats
    • \n
  • \n
  • Solutions to Typosquatting.\n
  • \n
  • DNS monitoring services.\n
      \n
    • Link to dnstwister: https://dnstwister.report/
    • \n
    • Link to whois: https://www.whois.com/whois
    • \n
  • \n
  • Password Managers.\n
      \n
    • Link to bitwarden: https://bitwarden.com/
    • \n
    • Link to keepassxc: https://keepassxc.org/
    • \n
  • \n
\n
\n

Two-factor and\nMultifactor Authentication.

\n
    \n
  • First, authentication. This is the process of verifying the\nvalidity of something; in our case, user credentials/identity. The most\ncommon way to authenticate is: USERNAME and PASSWORD.\nThis is just a single layer (single-factor authentication) and isn’t\nenough to discourage attackers.

  • \n
  • Second, 2FA (Two-factor Authentication). 2FA increases the\ndifficulty for attackers by providing users an additional layer of\nsecurity to accomplish authentication. Common 2FA methods are: TOTP/OTP\n(the One Time Password), Authenticator\nApplications (Bitwarden, KeePassXC,...), and Security Keys (Yubikey). This works similar to ATMs;\nto authenticate the user must provide both knowledge (account\nPIN) and a physical object (bank card).

  • \n
  • Last, but not least, MFA (Multifactor Authentication). Similar to\n2FA, MFA offers users security with the addition of biometrics\n(fingerprint scan, retina scan, facial recognition, and voice\nrecognition). Attackers must overcome the knowledge factor, Possession\nfactor, Inherence/Biometric factor, Time factor, and sometimes Location\nfactor.

  • \n
  • MORE helpful security information.

    \n
  • \n
  • 2FA/MFA Known Attacks.

    \n
      \n
    • Bots\nThat Steal Your 2FA Codes.
    • \n
    • hackers\nare cracking two-factor authentication
    • \n
  • \n
\n',391,0,0,'CC-BY-SA','InfoSec, Typosquatting, SFA, 2FA, MFA, Security',0,0,1), @@ -997,4 +998,3 @@ INSERT INTO `miniseries` (`id`, `name`, `description`, `private`, `image`, `vali (29,'How I got into tech','Started by monsterb, this series invites people to share with us how they found Linux. It has become traditional for first time hosts to share with us their journey to Linux. Indeed it has morphed to be way to share your journey in tech right up to your first contribution to HPR.',0,'',1), (30,'Tit Radio','Welcome to TiT Radio! The only Hacker Public Radio show with super cow powers broadcasting live on ddphackradio.org every utter Saturday night at 11pm CST. You may be asking yourself \"What in tarnation is Tit Radio?\" Well, it\'s a potluck style roundtable of geeks talking about Free Software, GNU + Linux, and anything geeky the TiTs bring to the table. Chat with the TiTs over at irc.freenode.net #linuxcranks. Thats no bull.',1,'',1), (34,'Talk Geek to me','deepgeek talks geek to his fans',1,'',1), -(35,'SELF Talks 2009','South East Linux Fest talks 2009',1,'',1), diff --git a/sql/hpr-db-part-15.sql b/sql/hpr-db-part-15.sql index 18d0fef..a85dbc7 100644 --- a/sql/hpr-db-part-15.sql +++ b/sql/hpr-db-part-15.sql @@ -1,3 +1,4 @@ +(35,'SELF Talks 2009','South East Linux Fest talks 2009',1,'',1), (36,'Software Freedom Day Dundee 2009','Software Freedom Day Dundee 2009',1,'',1), (38,'A Little Bit of Python','

\r\nInitially based on the podcast \"A Little Bit of Python\", by Michael Foord, Andrew Kuchling, Steve Holden, Dr. Brett Cannon and Jesse Noller. https://www.voidspace.org.uk/python/weblog/arch_d7_2009_12_19.shtml#e1138\r\n

\r\n

\r\nNow the series is open to all.\r\n

',0,'',1), (42,'Bash Scripting','This is an open series in which Hacker Public Radio Listeners can share their Bash scripting knowledge and experience with the community. General programming topics and Bash commands are explored along with some tutorials for the complete novice.',0,'',1), @@ -408,4 +409,4 @@ UNLOCK TABLES; /*!40014 SET UNIQUE_CHECKS=@OLD_UNIQUE_CHECKS */; /*!40111 SET SQL_NOTES=@OLD_SQL_NOTES */; --- Dump completed on 2023-11-09 6:51:17 +-- Dump completed on 2023-11-10 8:15:58 diff --git a/sql/hpr.sql b/sql/hpr.sql index d40e782..e579eb6 100644 --- a/sql/hpr.sql +++ b/sql/hpr.sql @@ -12596,7 +12596,7 @@ CREATE TABLE `comments` ( `last_changed` datetime NOT NULL DEFAULT current_timestamp(), PRIMARY KEY (`id`), KEY `comments_eps_id_idx` (`eps_id`) -) ENGINE=MyISAM AUTO_INCREMENT=3825 DEFAULT CHARSET=utf8mb3 COLLATE=utf8mb3_unicode_ci COMMENT='New comments table populated from c5t_* tables'; +) ENGINE=MyISAM AUTO_INCREMENT=3826 DEFAULT CHARSET=utf8mb3 COLLATE=utf8mb3_unicode_ci COMMENT='New comments table populated from c5t_* tables'; /*!40101 SET character_set_client = @saved_cs_client */; -- @@ -16424,7 +16424,8 @@ INSERT INTO `comments` (`id`, `eps_id`, `comment_timestamp`, `comment_author_nam (3821,3941,'2023-10-24 20:22:01','Windigo','Great conversation','I thoroughly enjoyed this episode! The comedian you discussed is Hannah Gadsby; she\'s an autistic Australian comedian, and her stories about misreading social situations are one of my favorite bits of her comedy specials!\r\n\r\nAs for Reto\'s views on climate change... the global scientific consensus seems to disagree with you. They may not have checked for \"extra green\" and how heavy CO2 is, though. You might want to give scientists the heads-up before the waste any more time.','2023-10-24 20:54:13'), (3822,3971,'2023-10-28 22:48:22','kdmurray','Great Series','Really enjoying the series sgoti. I appreciate that you\'ve gone to the trouble of gathering people together to try to expand the number of voices for this topic and all the ancillary things as well like the role of the Internet in how people think about their offline relationships.','2023-10-29 10:25:45'), (3823,3978,'2023-11-05 18:50:42','Kevin O\'Brien','Good show','This was interesting and I enjoyed seeing the perspective of an operator. I have made it a practice to be courteous to truck drivers because they have enough weird stuff to deal with.','2023-11-05 19:06:21'), -(3824,3981,'2023-11-06 10:42:23','Hobson Lane (hobs)','Ken\'s comment about demand avoidance','Love the monthly Community News shows. Ken\'s comment about resisting the demands of his past self from reminders apps struck a chord with me. I\'ve been struggling with PDA (persistent/pathological demand avoidance) myself. I\'ll record a response show to summarize some things I\'ve learned from other podcasts that help boost my intrinsic motivation -- things like random rewards (to prevent external rewards from swamping your intrinsic motivation dopamine high). Dave\'s idea to use rituals and habits is also something that sometimes works for me. Rely admire the high quality open source technical infrastructure that keeps this community thriving and the supportive vibe of all the hosts and contributors. It gives me hope for the future of social media and the Internet.','2023-11-06 10:45:43'); +(3824,3981,'2023-11-06 10:42:23','Hobson Lane (hobs)','Ken\'s comment about demand avoidance','Love the monthly Community News shows. Ken\'s comment about resisting the demands of his past self from reminders apps struck a chord with me. I\'ve been struggling with PDA (persistent/pathological demand avoidance) myself. I\'ll record a response show to summarize some things I\'ve learned from other podcasts that help boost my intrinsic motivation -- things like random rewards (to prevent external rewards from swamping your intrinsic motivation dopamine high). Dave\'s idea to use rituals and habits is also something that sometimes works for me. Rely admire the high quality open source technical infrastructure that keeps this community thriving and the supportive vibe of all the hosts and contributors. It gives me hope for the future of social media and the Internet.','2023-11-06 10:45:43'), +(3825,3984,'2023-11-09 15:21:35','Trey','Really? You are sharing this with the world?','Dude! I thought we were keeping this on the down low? And you are naming names?\r\n\r\nNow I need to contact witness protection AGAIN!\r\n\r\nSMH...','2023-11-09 15:26:35'); /*!40000 ALTER TABLE `comments` ENABLE KEYS */; UNLOCK TABLES; /*!50003 SET @saved_cs_client = @@character_set_client */ ; @@ -20230,7 +20231,7 @@ INSERT INTO `eps` (`id`, `date`, `title`, `duration`, `summary`, `notes`, `hosti (3712,'2022-10-25','The last ever CCHits.net Show',5756,'The team talk about the nearly 12 years of producing CCHits.net.','

Over 12 years ago, Jon \"The Nice Guy\"\nSpriggs went to a \"Pod Crawl\" with (among others) Dave \"The Love Bug\" Lee, where he\npitched the idea of a daily music promotion show, with a twist - it\nwould all be automated, and use text-to-speech to introduce\neverything.

\n

The first show was released\non 2010-10-24 and the last ever show (this one) was released on\n2022-10-12.

\n

Over the twelve years, Jon would go on to meet to meet Yannick and Ken Fallon, both\nof whom would go on to shape changes (big and small) to CCHits.

\n

This year, the cracks started to re-appear in the architecture\nunderneath CCHits - between APIs shutting down that were used to load\ntracks to CCHits, and the general framework being used to write CCHits\nnot receiving the care and attention it needed... and the team finally\ndecided to stop adding new tracks, and let the process build the last\nfew shows.

\n

This podcast gives you a peek behind the curtain to the team involved\nin the system, and gives you some of the high- and low-lights in the 12\nyears the site ran for.

\n',413,0,0,'CC-BY','music,creative commons,podcast',0,0,1), (3724,'2022-11-10','My top Android apps',579,'I walk through the top apps on my phone','

My most used apps

\n

AIO Launcher

\n\n

\"Main

\n

\n

\n

Termux: Terminal\nemulator with packages

\n\n

QKSMS Messaging

\n\n

Firefox browser

\n
    \n
  • Firefox browser
  • \n
\n

Opera browser

\n
    \n
  • Opera browser
  • \n
\n

Brave browser

\n
    \n
  • Brave browser
  • \n
\n

Clear Scanner PDF scanner and\nOCR

\n\n

Antennapod

\n\n

Tusky

\n\n

K-9 mail client

\n\n

Viber

\n
    \n
  • Viber

    \n
      \n
    • Android and Fedora/Ubuntu desktop app
    • \n
    • App image
    • \n
  • \n
\n

Audio recorder

\n\n

X-plore dual-pane file\nmanager

\n
    \n
  • X-plore dual-pane file\nmanager
  • \n
\n

Librera E-book Reader: for\nPDF, EPUB

\n
    \n
  • Librera E-book Reader

    \n
      \n
    • Books\n
        \n
      • Star Wars: Dark Tide I: Onslaught

        \n

        The New Jedi Order #2

        \n
          \n
        • Star Wars Dark Tide I:\nOnslaught
        • \n
      • \n
      • Boba Fett: A Practical Man

        \n
          \n
        • Boba Fett: A Practical Man
        • \n
      • \n
    • \n
  • \n
\n

Multi Timer

\n
    \n
  • Multi Timer
  • \n
\n

US Amateur Radio Band Plan

\n
    \n
  • US Amateur Radio Band Plan

    \n
      \n
    • Quick reference of band and privilege restrictions
    • \n
  • \n
\n',318,0,0,'CC-BY-SA','Android, Android apps, Mobile phone, Custom launcher',0,0,1), (3725,'2022-11-11','How to use OSMAnd with Public Transport ',124,'Ken shows you how to use this mapping tool to display transit routes in your area.','

\r\n\"\"
\r\nMap of Dublin showing the Temple Bar tourist area. A red arrow points to where you can change the profile.\r\n

\r\n

\r\n\"\"
\r\nWith the Configure Map > Profile selection menu open, a red square surrounds the Bus icon to indicate the \"public transport\" profile is now selected.\r\n

\r\n

\r\n\"\"
\r\nThe map now opens to show more information about public transport is now displayed on the map. This is highlighted with a red square.
\r\nClicking the bustop (highlighted with a red circle ) will show more information about the routes available at this location.\r\n

\r\n

\r\n\"\"
\r\nOnce the transport stop is selected, a list of all the routes that service this location are displayed. Along with other routes that are available within a short distance.\r\n

\r\n

\r\n\"\"
\r\nClicking any of the routes numbers/names will give a zoomed out map showing in red the route many of the stops towards it\'s source and destination.\r\n

\r\n',30,0,0,'CC-BY-SA','OSMAnd, OSM, Maps, Public Transport',0,0,1), -(4001,'2023-12-04','HPR Community News for November 2023',0,'HPR Volunteers talk about shows released and comments posted in November 2023','\n\n

New hosts

\n

\nThere were no new hosts this month.\n

\n\n

Last Month\'s Shows

\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
IdDayDateTitleHost
3978Wed2023-11-01Driving in Virginia.Some Guy On The Internet
3979Thu2023-11-02FireStick and ad blockingoperat0r
3980Fri2023-11-03Huntsville to VicksburgAhuka
3981Mon2023-11-06HPR Community News for October 2023HPR Volunteers
3982Tue2023-11-07Conversation with ChatGPTArcher72
3983Wed2023-11-08ChatGPT Output is not compatible with CC-BY-SAKen Fallon
3984Thu2023-11-09Whoppers. How Archer72 and I made moonshine. Volume one.Some Guy On The Internet
3985Fri2023-11-10Bash snippet - be careful when feeding data to loopsDave Morriss
3990Fri2023-11-17Playing Alpha Centauri, Part 2Ahuka
3991Mon2023-11-20YOU ARE A PIRATE operat0r
3992Tue2023-11-21Test recording on a wireless micArcher72
\n\n

Comments this month

\n\n

These are comments which have been made during the past month, either to shows released during the month or to past shows.\nThere are 2 comments in total.

\n\n

This month\'s shows

\n

There are 2 comments on 2 of this month\'s shows:

\n\n\n

Mailing List discussions

\n

\nPolicy decisions surrounding HPR are taken by the community as a whole. This\ndiscussion takes place on the Mail List which is open to all HPR listeners and\ncontributors. The discussions are open and available on the HPR server under\nMailman.\n

\n

The threaded discussions this month can be found here:

\nhttps://lists.hackerpublicradio.com/pipermail/hpr/2023-November/thread.html\n\n\n

Events Calendar

\n

With the kind permission of LWN.net we are linking to\nThe LWN.net Community Calendar.

\n

Quoting the site:

\n
This is the LWN.net community event calendar, where we track\nevents of interest to people using and developing Linux and free software.\nClicking on individual events will take you to the appropriate web\npage.
\n\n

Any other business

\n

Example section

\n
    \n
  • Bulleted list item 1

  • \n
  • Bulleted list item 2

  • \n
\n\n\n',159,47,1,'CC-BY-SA','Community News',0,0,1), +(4001,'2023-12-04','HPR Community News for November 2023',0,'HPR Volunteers talk about shows released and comments posted in November 2023','\n\n

New hosts

\n

\nThere were no new hosts this month.\n

\n\n

Last Month\'s Shows

\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
IdDayDateTitleHost
3978Wed2023-11-01Driving in Virginia.Some Guy On The Internet
3979Thu2023-11-02FireStick and ad blockingoperat0r
3980Fri2023-11-03Huntsville to VicksburgAhuka
3981Mon2023-11-06HPR Community News for October 2023HPR Volunteers
3982Tue2023-11-07Conversation with ChatGPTArcher72
3983Wed2023-11-08ChatGPT Output is not compatible with CC-BY-SAKen Fallon
3984Thu2023-11-09Whoppers. How Archer72 and I made moonshine. Volume one.Some Guy On The Internet
3985Fri2023-11-10Bash snippet - be careful when feeding data to loopsDave Morriss
3990Fri2023-11-17Playing Alpha Centauri, Part 2Ahuka
3991Mon2023-11-20YOU ARE A PIRATE operat0r
3992Tue2023-11-21Test recording on a wireless micArcher72
\n\n

Comments this month

\n\n

These are comments which have been made during the past month, either to shows released during the month or to past shows.\nThere are 3 comments in total.

\n\n

This month\'s shows

\n

There are 3 comments on 3 of this month\'s shows:

\n\n\n

Mailing List discussions

\n

\nPolicy decisions surrounding HPR are taken by the community as a whole. This\ndiscussion takes place on the Mail List which is open to all HPR listeners and\ncontributors. The discussions are open and available on the HPR server under\nMailman.\n

\n

The threaded discussions this month can be found here:

\nhttps://lists.hackerpublicradio.com/pipermail/hpr/2023-November/thread.html\n\n\n

Events Calendar

\n

With the kind permission of LWN.net we are linking to\nThe LWN.net Community Calendar.

\n

Quoting the site:

\n
This is the LWN.net community event calendar, where we track\nevents of interest to people using and developing Linux and free software.\nClicking on individual events will take you to the appropriate web\npage.
\n\n

Any other business

\n

Example section

\n
    \n
  • Bulleted list item 1

  • \n
  • Bulleted list item 2

  • \n
\n\n\n',159,47,1,'CC-BY-SA','Community News',0,0,1), (3714,'2022-10-27','The News with Some Guy On the Internet',609,'Threat Analysis','

Threat Analysis; your\nattack surface.

\n

The Hacker News

\nNew\nChinese Malware Attack Framework Targets Windows, macOS, and Linux\nSystems.\n

A previously undocumented command-and-control (C2) framework dubbed\nAlchimist is likely being used in the wild to target Windows, macOS, and\nLinux systems.

\n

\"Alchimist C2 has a web interface written in Simplified Chinese and\ncan generate a configured payload, establish remote sessions, deploy\npayloads to the remote machines, capture screenshots, perform remote\nshellcode execution, and run arbitrary commands,\" Cisco Talos said in a\nreport shared with The Hacker News. Written in GoLang, Alchimist is\ncomplemented by a beacon implant called Insekt, which comes with remote\naccess features that can be instrumented by the C2 server.”

\n

\"Since Alchimist is a single-file based ready-to-go C2 framework, it\nis difficult to attribute its use to a single actor such as the authors,\nAPTs, or crimeware syndicates.\"

\n

The trojan, for its part, is equipped with features typically present\nin backdoors of this kind, enabling the malware to get system\ninformation, capture screenshots, run arbitrary commands, and download\nremote files, among others.

\n

Alchimist C2 panel further features the ability to generate first\nstage payloads, including PowerShell and wget code snippets for Windows\nand Linux, potentially allowing an attacker to flesh out their infection\nchains to distribute the Insekt RAT binary. The instructions could then\nbe potentially embedded in a maldoc attached to a phishing email that,\nwhen opened, downloads and launches the backdoor on the compromised\nmachine. What\'s more, the Linux version of Insekt is capable of listing\nthe contents of the \".ssh\" directory and even adding new SSH keys to the\n\"~/.ssh/authorized_keys\" file to facilitate remote access over SSH.

\n

The Hacker News

\nHackers\nUsing Vishing to Trick Victims into Installing Android Banking\nMalware.\n

Malicious actors are resorting to voice phishing (vishing) tactics to\ndupe victims into installing Android malware on their devices.

\n

The Dutch mobile security company said it identified a network of\nphishing websites targeting Italian online-banking users that are\ndesigned to get hold of their contact details.

\n

Telephone-oriented attack delivery (TOAD), as the social engineering\ntechnique is called, involves calling the victims using previously\ncollected information from the fraudulent websites.

\n

The caller, who purports to be a support agent for the bank,\ninstructs the individual on the other end of the call to install a\nsecurity app and grant it extensive permissions, when, in reality, it\'s\nmalicious software intended to gain remote access or conduct financial\nfraud.

\n

What\'s more, the infrastructure utilized by the threat actor has been\nfound to deliver a second malware named SMS Spy that enables the\nadversary to gain access to all incoming SMS messages and intercept\none-time passwords (OTPs) sent by banks.

\n

The new wave of hybrid fraud attacks presents a new dimension for\nscammers to mount convincing Android malware campaigns that have\notherwise relied on traditional methods such as Google Play Store\ndroppers, rogue ads, and smishing.

\n

The Hacker News

\n64,000\nAdditional Patients Impacted by Omnicell Data Breach - What is Your Data\nBreach Action Plan?\n

Founded in 1992, Omnicell is a leading provider of medication\nmanagement solutions for hospitals, long-term care facilities, and\nretail pharmacies. On May 4, 2022, Omnicell\'s IT systems and third-party\ncloud services were affected by ransomware attacks which may lead to\ndata security concerns for employees and patients. While it is still\nearly in the investigation, this appears to be a severe breach with\npotentially significant consequences for the company.

\n

Omnicell began informing individuals whose information may have been\ncompromised on August 3, 2022. Hackers may be able to access and sell\npatient-sensitive information, such as social security numbers, due to\nthe time delay between the breach and the company\'s report of affected\npatients.

\n

The type of information that may be exposed are:

\n
    \n
  • Credit card information.
  • \n
  • Financial information.
  • \n
  • Social security numbers.
  • \n
  • Driver\'s license numbers.
  • \n
  • Health insurance details.
  • \n
\n

The healthcare industry is one of the most targeted sectors globally,\nwith attacks doubling year over year. And these costs are measured in\nmillions or even billions of dollars - not to mention increased risks\nfor patients\' privacy (and reputation).

\n

The Washington Post

\n

How to\nprotect schools getting whacked by ransomware.

\n

Ransomware gangs are taking Americans to school. So far this year,\nhackers have taken hostage at least 1,735 schools in 27 districts; the\nmassive Los Angeles Unified School District is their latest target.

\n

Ransomware hackers breach computers, lock them up, steal sensitive\ndata and demand money to release their hold on organizations’ critical\nsystems. These criminals often attack schools because they are\nprofitable targets. If all ransomware victims refused to pay, the\nattacks would stop. Indeed, paying up might be illegal: The Treasury\nDepartment released guidance last year noting that giving money to\nglobal criminal organizations can violate sanctions law.

\n

The trouble is, saying no isn’t always easy. Los Angeles didn’t\ncapitulate, and the criminals leaked a trove of data — a consequence\nthat can prove more or less serious depending on the sensitivity of the\nstolen information.

\n

“Because we can,” said a representative of the ransomware gang that\ntook down Los Angeles Unified School District, explaining the\ncollective’s motivations to a Bloomberg News reporter. Schools’ task is\nto turn “can” to “can’t” — or, at least, to make success pay a whole lot\nless.

\n

CNET News.

\nVerizon\nAlerts Prepaid Customers to Recent Security Breach.\n

Verizon notified prepaid customers this week of a recent cyberattack\nthat granted third-party actors access to their accounts, as reported\nearlier Tuesday by BleepingComputer. The attack occurred between Oct. 6\nand Oct. 10 and affected 250 Verizon prepaid customers.

\n

The breach exposed the last four digits of customers\' credit cards\nused to make payments on their prepaid accounts. While no full credit\ncard information was accessible, the information was enough to grant the\nattackers access to Verizon user accounts, which hold semi-sensitive\ndata such \"name, telephone number, billing address, price plans, and\nother service-related information,\" per a notice from Verizon.

\n

Account access also potentially enabled attackers to process\nunauthorized SIM card changes on prepaid lines. Also known as SIM\nswapping, unauthorized SIM card changes can allow for the transfer of an\nunsuspecting person\'s phone number to another phone.

\n

From there, the counterfeit phone can be used to receive SMS messages\nfor password resets and user identification verifications on other\naccounts, giving attackers potential access to any account they have, or\ncan guess, the username for. Consequently, Verizon recommended affected\ncustomers secure their non-Verizon accounts such as social media,\nfinancial, email and other accounts that allow for password resets by\nphone.

\n',391,0,0,'CC-BY-SA','Threat Analysis, Security Breach, Ransomware, Data Breach, TOAD',0,0,1), (3717,'2022-11-01','Video editing with Shotcut on a low end PC',695,'In this episode I explain how I use the shotcut video editor to edit video on a low end PC.','

Links

\n

Shotcut video editor website

\n

Useful\nShortcut keys for the Shotcut video editor

\n
C = copy\nV = paste\nA = duplicate\nX = ripple delete\nCtrl + X = ripple delete but send to clipboard\nS = split
\n

Tip not covered in my\nPodcast

\n

Splits are not fixed and can be adjusted. Once you\'ve split up clips\nand put them in the right order on the timeline you can still adjust the\ncut point even though you previously split the clip because the clip is\nreferenced to the original file in the playlist.

\n

Introduction

\n

Hello and welcome Hacker Public Radio audience my name is Mr X\nwelcome to this podcast. As per usual I\'d like to start by thanking the\npeople at HPR for making this podcast possible. HPR is a Community led\npodcast provided by the community for the community that means you can\ncontribute to. The HPR team have gone to great deal of effort to\nsimplify and streamline the process of providing podcasts. There are\nmany ways to record an episode these days using phones tablets PCs and\nalike. The hardest barrier is sending in your first show. Don\'t get too\nhung up about quality, it\'s more important just to send something in.\nThe sound quality of some of my early shows wasn\'t very good. If I can\ndo it anyone can and you might just get hooked in the process.

\n

Well it\'s been almost a year since I\'ve sent in a show. Looking at\nthe HPR site my last episode was back in November 2021. I suspect like\nmany others life has become more complicated and I find I have much less\nspare time and because I have much less spare time I have much less time\nto pursue my hobbies and because of this I have less to speak about and\nbecause of this I have less time to record what I\'ve been doing and it\nall turns into to vicious circle. Fortunately I recently had some time\noff work and had a lovely holiday. During the holiday I ended up\nrecording some video which I decided I wanted to edit. I\'ve done some\nvideo editing in the past using various video editing packages. The best\nand most recent of which is shotcut.

\n

Specific details and\nequipment

\n

Video resolution 1920 x 1080, Codec h264 mpeg-4, Frame rate 30 frames\nper second.

\n

Computer Dell Optiplex 780. Fitted with 4 GB of internal RAM and\nonboard video graphics card.

\n

Shotcut version 22.06.23 Shotcut is a free open-source cross-platform\nvideo editor licenced under the GNU general public licence version\n3.0

\n

This episode will only cover basic shotcut video editing techniques.\nShotcut contains many advanced features and effects that will not be\ncovered in this episode. A lot of the workflow I’ll share with you today\nis intended to get around limitations imposed by my low spec PC

\n

I\'ll try my best to cover the video editing process in this podcast\nusing words alone; however I am conscious that an accompanying video\nwould make it easier to follow along.

\n

Shotcut workflow

\n

Start by creating a folder to hold all the required media files.\nAudio tracks and sound effects can be added to this folder later. Make\nsure all your video files are using the same frame rate in my case 30\nframes per second.

\n

Open each video file in VLC one at a time going through each video\nfile looking for the best portions of video. Make a note of where the\nbest portions of the video are by writing down the start and end points\nin minutes and seconds.

\n

I do this because the interface of VLC is more responsive than\nshortcut and the resolution of displayed video is far greater than the\npreview in shortcut. This makes it quicker and easier to find the best\nportions of video.

\n

Open shortcut and make sure the new project is set to the same frames\nper second as the media files you\'re working with, in my case 30 frames\nper second. You can check the frame rate of your project by looking at\nthe selected video mode in the new projects window. If you select\nautomatic it will ensure the project resolution and frame rate\nautomatically match that of your media files.

\n

Start by adding all the video files to the playlist, this can be done\nin a number of ways for example it can be done by clicking on the open\nfile button in the top toolbar or within the open files menu.\nAlternatively you can drag and drop files into the playlist. I find this\nto be the easiest way to add media files to a project. Once this is done\nsave your project.

\n

Drag the first file from the Playlist to the timeline making sure\nthat the start of the video starts at 0 seconds.

\n

Click on the timeline in the position where the first start point of\ninterest is needed. Use the S key to split the video at this point.\nDon\'t worry about being too accurate as this can be moved at a later\nstage.

\n

Repeat this process for the end point of interest.

\n

Repeat this again for all the other sections of start and end points\nof interest.

\n

Remove the unwanted sections of video by clicking on a section then\nhitting the delete key. This will remove the unwanted section leaving an\nempty space behind.

\n

Once all the unwanted sections are removed click on the sections of\nvideo and pull them to the left to close the gaps up. I find it useful\nto leave some space between the good sections of video as it makes it\neasier to see where splits are and makes it easier later on to rearrange\nthe order of the individual clips.

\n

Check the start and end points of the remaining sections of video to\nsee that the start and end points stop in the correct place. You can do\nthis by clicking the play button on the preview window. The video start\nand end points can be adjusted by dragging the section left or right in\nin the timeline section; this is where leaving spaces Between each\nsection of video can be handy as it allows for fine tuning.

\n

Add a new blank video track to the timeline to hold the next video.\nNote this wasn\'t required when adding the first video track but it is\nneeded for each subsequent track. A video track can be added by right\nclicking on an empty portion of the timeline and selecting add video\ntrack. Alternatively use the ctrl + I key.

\n

Drag your second video from the playlist onto the newly created blank\nvideo track in the timeline. As before make sure that the start of the\nvideo starts at 0 seconds.

\n

Before previewing any section of the second video track click the\nsmall eye shaped hide icon in the left section of the first video track\nlabelled output. This will prevent previewing both video tracks at the\nsame time.

\n

Repeat the process above of chopping the second video track into\nsections using the S key to split the video up. Remove the unwanted\nsections. Finally adjust the start and end points of the remaining\nsections.

\n

Repeat the steps above to add the remaining video files one at a time\nfrom the playlist to the timeline.

\n

When complete you end up with separate video tracks in the timeline\neach containing good sections of video.

\n

At this stage I can\'t be too specific about how to continue as there\nare a number of different options depending on your particular Project.\nYou can for example start by combining the good sections of video into\none video track by dragging them from one track to another then add if\nrequired an audio track or you can add the audio track first and then\ntry to sync things up to the audio track moving bits and pieces of video\ninto one video track remembering to hide the unwanted sections of video\nby clicking on the small hide eye icons. Don\'t do too much editing\nwithout saving the project. If you get a message about low memory save\nthe project then reopen it.

\n

To export the final video click on the export button in the toolbar.\nI pick the default option, this creates an H.264/AAC MP4 file suitable\nfor most users and purposes. You can check the frame rate is the same as\nyour original media files by clicking on the advanced tab. Click the\nexport file button and give it a file name. It may take some time to\ncreate the export file. This will be dependent on the speed of your\ncomputer and the length and resolution of your project.

\n

While Shotcut is far from perfect on my puny PC it is surprisingly\nusable and stable and is the best option I’ve found so far.

\n

Finally here are some general shotcut tips I have when doing video\nediting on a puny PC with limited ram, slow processor and built in\ngraphics card such as mine.

\n

General Tips\nwhen working with a low powered PC

\n

Close all open applications leaving only shortcut open this helps\nwith RAM usage

\n

Shortcut is surprisingly stable with a feeble PC such as mine. I\nwould still recommend saving your project regularly as it is quick and\nvery easy to do.

\n

If you get a message about running out of RAM then try not to do too\nmuch more editing before saving the project. Once saved close shotcut\nand then reopen it. The longer your project is and the higher your\nproject resolution the more RAM you will need.

\n

When you are about to export your final video save the project close\nshortcut reopen shotcut and immediately export your project as any\nprevious editing may be taking up precious ram.

\n

Be patient when clicking on the timeline to repositioned the play\nhead. Always wait for the preview window to update. This can sometimes\ntake a few seconds.

\n

When trying to sync video to audio you need to zoom in in quite a\nlong way before getting an audio preview. When doing this and moving the\nplay head you\'ll get a choppy version of the audio with this it is still\nperfectly possible to find the beat of the music allowing you to sync\nyour video to the music. If this doesn\'t seem to work for you then try\nzooming in closer.

\n

Ok that\'s about it for this podcast. Hope it wasn\'t too boring and it\nmade some sense. If you want to contact me I can be contacted at\nmrxathpr at googlemail.

\n

Thank you and goodbye.

\n',201,0,0,'CC-BY-SA','workflow, tips, video, editing, application',0,0,1), (3719,'2022-11-03','HPR News',594,'InfoSec; the language of security.','

InfoSec; the language of\nsecurity.

\n

What\nis Typosquatting and How Do Scammers Use it?

\n
    \n
  • Typosquatting, as an attack, uses modified or misspelled domain\nnames to trick users into visiting fraudulent websites; the heart of\nthis attack is domain name registration. Typosquatting is deployed by\nscammers to defraud unaware users. Attackers will attempt to: mimic\nlogin pages, redirect traffic, download malware, and extort users.
  • \n
  • Past Known Typosquatting Attacks.\n
      \n
    • Several\nMalicious Typosquatted Python Libraries Found On PyPI\nRepository
    • \n
    • Over\n700 Malicious Typosquatted Libraries Found On RubyGems\nRepository
    • \n
    • Security\nadvisory: malicious crate rustdecimal
    • \n
    • This\nWeek in Malware-Malicious Rust crate, \'colors\' Typosquats
    • \n
  • \n
  • Solutions to Typosquatting.\n
  • \n
  • DNS monitoring services.\n
      \n
    • Link to dnstwister: https://dnstwister.report/
    • \n
    • Link to whois: https://www.whois.com/whois
    • \n
  • \n
  • Password Managers.\n
      \n
    • Link to bitwarden: https://bitwarden.com/
    • \n
    • Link to keepassxc: https://keepassxc.org/
    • \n
  • \n
\n
\n

Two-factor and\nMultifactor Authentication.

\n
    \n
  • First, authentication. This is the process of verifying the\nvalidity of something; in our case, user credentials/identity. The most\ncommon way to authenticate is: USERNAME and PASSWORD.\nThis is just a single layer (single-factor authentication) and isn’t\nenough to discourage attackers.

  • \n
  • Second, 2FA (Two-factor Authentication). 2FA increases the\ndifficulty for attackers by providing users an additional layer of\nsecurity to accomplish authentication. Common 2FA methods are: TOTP/OTP\n(the One Time Password), Authenticator\nApplications (Bitwarden, KeePassXC,...), and Security Keys (Yubikey). This works similar to ATMs;\nto authenticate the user must provide both knowledge (account\nPIN) and a physical object (bank card).

  • \n
  • Last, but not least, MFA (Multifactor Authentication). Similar to\n2FA, MFA offers users security with the addition of biometrics\n(fingerprint scan, retina scan, facial recognition, and voice\nrecognition). Attackers must overcome the knowledge factor, Possession\nfactor, Inherence/Biometric factor, Time factor, and sometimes Location\nfactor.

  • \n
  • MORE helpful security information.

    \n
  • \n
  • 2FA/MFA Known Attacks.

    \n
      \n
    • Bots\nThat Steal Your 2FA Codes.
    • \n
    • hackers\nare cracking two-factor authentication
    • \n
  • \n
\n',391,0,0,'CC-BY-SA','InfoSec, Typosquatting, SFA, 2FA, MFA, Security',0,0,1), @@ -21408,4 +21409,4 @@ UNLOCK TABLES; /*!40014 SET UNIQUE_CHECKS=@OLD_UNIQUE_CHECKS */; /*!40111 SET SQL_NOTES=@OLD_SQL_NOTES */; --- Dump completed on 2023-11-09 6:51:17 +-- Dump completed on 2023-11-10 8:15:58