diff --git a/sql/hpr-db-part-0c.sql b/sql/hpr-db-part-0c.sql
index b56c586..0f75c5e 100644
--- a/sql/hpr-db-part-0c.sql
+++ b/sql/hpr-db-part-0c.sql
@@ -596,7 +596,7 @@ CREATE TABLE `comments` (
`last_changed` datetime NOT NULL DEFAULT current_timestamp(),
PRIMARY KEY (`id`),
KEY `comments_eps_id_idx` (`eps_id`)
-) ENGINE=MyISAM AUTO_INCREMENT=3825 DEFAULT CHARSET=utf8mb3 COLLATE=utf8mb3_unicode_ci COMMENT='New comments table populated from c5t_* tables';
+) ENGINE=MyISAM AUTO_INCREMENT=3826 DEFAULT CHARSET=utf8mb3 COLLATE=utf8mb3_unicode_ci COMMENT='New comments table populated from c5t_* tables';
/*!40101 SET character_set_client = @saved_cs_client */;
--
diff --git a/sql/hpr-db-part-10.sql b/sql/hpr-db-part-10.sql
index 426663b..f353191 100644
--- a/sql/hpr-db-part-10.sql
+++ b/sql/hpr-db-part-10.sql
@@ -424,7 +424,8 @@
(3821,3941,'2023-10-24 20:22:01','Windigo','Great conversation','I thoroughly enjoyed this episode! The comedian you discussed is Hannah Gadsby; she\'s an autistic Australian comedian, and her stories about misreading social situations are one of my favorite bits of her comedy specials!\r\n\r\nAs for Reto\'s views on climate change... the global scientific consensus seems to disagree with you. They may not have checked for \"extra green\" and how heavy CO2 is, though. You might want to give scientists the heads-up before the waste any more time.','2023-10-24 20:54:13'),
(3822,3971,'2023-10-28 22:48:22','kdmurray','Great Series','Really enjoying the series sgoti. I appreciate that you\'ve gone to the trouble of gathering people together to try to expand the number of voices for this topic and all the ancillary things as well like the role of the Internet in how people think about their offline relationships.','2023-10-29 10:25:45'),
(3823,3978,'2023-11-05 18:50:42','Kevin O\'Brien','Good show','This was interesting and I enjoyed seeing the perspective of an operator. I have made it a practice to be courteous to truck drivers because they have enough weird stuff to deal with.','2023-11-05 19:06:21'),
-(3824,3981,'2023-11-06 10:42:23','Hobson Lane (hobs)','Ken\'s comment about demand avoidance','Love the monthly Community News shows. Ken\'s comment about resisting the demands of his past self from reminders apps struck a chord with me. I\'ve been struggling with PDA (persistent/pathological demand avoidance) myself. I\'ll record a response show to summarize some things I\'ve learned from other podcasts that help boost my intrinsic motivation -- things like random rewards (to prevent external rewards from swamping your intrinsic motivation dopamine high). Dave\'s idea to use rituals and habits is also something that sometimes works for me. Rely admire the high quality open source technical infrastructure that keeps this community thriving and the supportive vibe of all the hosts and contributors. It gives me hope for the future of social media and the Internet.','2023-11-06 10:45:43');
+(3824,3981,'2023-11-06 10:42:23','Hobson Lane (hobs)','Ken\'s comment about demand avoidance','Love the monthly Community News shows. Ken\'s comment about resisting the demands of his past self from reminders apps struck a chord with me. I\'ve been struggling with PDA (persistent/pathological demand avoidance) myself. I\'ll record a response show to summarize some things I\'ve learned from other podcasts that help boost my intrinsic motivation -- things like random rewards (to prevent external rewards from swamping your intrinsic motivation dopamine high). Dave\'s idea to use rituals and habits is also something that sometimes works for me. Rely admire the high quality open source technical infrastructure that keeps this community thriving and the supportive vibe of all the hosts and contributors. It gives me hope for the future of social media and the Internet.','2023-11-06 10:45:43'),
+(3825,3984,'2023-11-09 15:21:35','Trey','Really? You are sharing this with the world?','Dude! I thought we were keeping this on the down low? And you are naming names?\r\n\r\nNow I need to contact witness protection AGAIN!\r\n\r\nSMH...','2023-11-09 15:26:35');
/*!40000 ALTER TABLE `comments` ENABLE KEYS */;
UNLOCK TABLES;
/*!50003 SET @saved_cs_client = @@character_set_client */ ;
@@ -997,4 +998,3 @@ INSERT INTO `eps` (`id`, `date`, `title`, `duration`, `summary`, `notes`, `hosti
(518,'2010-02-17','Life Without a GUI',3317,'Getting Things Done - Life Without a GUI by Jared Bernard','\r\n\r\nGetting Things Done - Life Without a GUI\r\nby Jared Bernard
\r\nOct 9th 2009 at the Utah Open source conference \r\n
\r\n\r\n https://2009.utosc.com/presentation/44/
\r\n https://www.jaredandcoralee.com/ \r\n',110,0,1,'CC-BY-NC-SA','command line,screen,wordgrinder,LaTex,antiword,framebuffer,mutt,alpine,youtube-dl',0,1512,1),
(519,'2010-02-18','TiT Radio 018 - moooo! Baby',4103,'Monsterb and friends host TiT Radio','
monsterb, klaatu, Peter64, Azimuth, and JMan talk about search enigines, codecs, \r\nvideo editing, and so much more!
\r\nPlease visit https://titradio.info/018.html for shownotes.
\r\n',99,30,1,'CC-BY-NC-SA','search engines,media players,video-meta,perl,slackermedia,slackbuilds,kdenlive,Slackware,screen,screenrc,cron,xprop',0,1393,1), (520,'2010-02-19',' Selecting Talks for PyCon 2010',1302,'Discussion on how talks were selected for the upcoming PyCon 2010 conference','\r\nSelecting Talks for PyCon 2010\r\n\r\nIn this episode from February 18 we discuss the internal Pirate Party election fraud. Extra short episode due to cold weather. (recorded under the winter sky)\r\n
\r\nShow page\r\n
',122,0,1,'CC-BY-NC-SA','Piratprat,Swedish Pirate Party',0,1231,1), (523,'2010-03-01','Miscellaneous Radio Theater ',2959,'Miscellaneous Radio Theater 4096 - Teaching Kids Math With Petunia','AUTHOR: SigFLUP\r\nTITLE: Miscellaneous Radio Theater 4096- Teaching Kids Math With Petunia\r\nIn this episode, Garjola presents the C++ programming language by\r\nintroducing its main features for object orientation, generic\r\nprogramming and functional style.\r\n
',197,25,0,'CC-BY-SA','programming languages, c++',0,0,1), (1479,'2014-04-03','01 What is on my podcast player',974,'Ahuka begins to tell us about the podcasts he listens to','\r\nWhat is on my podcast player\r\n
\r\nMy web site is at https://www.zwilnik.com/.
\r\n\r\nRemember to support free software!
\r\n',198,75,0,'CC-BY-SA','podcasts,recommendations ',0,1420,1), (1482,'2014-04-08','02 What is on my podcast player',938,'Ahuka continues with the list of podcasts he listens to','What is on my podcast player
\r\nMy web site is at https://www.zwilnik.com/.
\r\nRemember to support free software!
\r\n',198,75,0,'CC-BY-SA','podcasts,recommendations',0,1398,1), -(1484,'2014-04-10','TuxJam31',4878,'Andrew Conway presents TuxJam episode 31, a special for HPR','\r\nTuxJam is a podcast that reviews lesser known Free and Open Source Software\r\nprojects interspersed with Creative Commons licensed music. TuxJam 31\r\nis a special for HPR.\r\n
\r\n\r\nSee https://unseenstudio.co.uk/tuxjam-ogg/tuxjam-episode-31/\r\n
',268,0,0,'CC-BY-SA','astronomy',0,1421,1), diff --git a/sql/hpr-db-part-12.sql b/sql/hpr-db-part-12.sql index d86ed42..1977f58 100644 --- a/sql/hpr-db-part-12.sql +++ b/sql/hpr-db-part-12.sql @@ -1,3 +1,4 @@ +(1484,'2014-04-10','TuxJam31',4878,'Andrew Conway presents TuxJam episode 31, a special for HPR','\r\nTuxJam is a podcast that reviews lesser known Free and Open Source Software\r\nprojects interspersed with Creative Commons licensed music. TuxJam 31\r\nis a special for HPR.\r\n
\r\n\r\nSee https://unseenstudio.co.uk/tuxjam-ogg/tuxjam-episode-31/\r\n
',268,0,0,'CC-BY-SA','astronomy',0,1421,1), (1486,'2014-04-14','Linux Luddites Episode 11 - Interview with Rob Landley',7222,'Ken Fallon promotes the \"Linux Luddites\" podcast','\r\nThis show is is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.\r\n
\r\n\r\n\r\nAs stated on the HPR Contribution page\r\n
\r\n\r\nWe will continue to promote new podcasts and other creative commons material but due to a lack of slots, we are only releasing material created exclusively for HPR. If there is a piece of creative commons content that you would like to promote, then feel free to record a regular show where you introduce the content and explain why it is important, providing links to where we can get more information. \r\n
\r\n\r\nToday I am doing just that. As a member of the HPR community, I would like to bring the podcast LINUX LUDDITES with the tag line \"Not all change is progress\". Taking their name from \"Linux\" the an operating system kernel by Linus Torvalds, and \"Luddites\" from the 19th-century English textile artisans who protested against newly developed labour-saving machinery.\r\n
\r\n\r\nI am submitting Episode 11 as it includes a fascinating interview with Rob Landley, former maintainer of BusyBox and covers among other things his experiences of GPL enforcement. For complete episode show notes see https://linuxluddites.com/shows/episode-11/ \r\n
\r\n\r\nIf this podcast is not in your feed, you would do very well to add it.\r\n
\r\n\r\nIf there is a show is new to the scene, ie not on the linuxlink.net, then contact us about it and also consider submitting an episode as a featured podcast.\r\n
\r\n\r\n\r\nAfter listening to Ahuka describe his favourite podcasts on HPR1479 and HPR1482 I was surprised to see how few of the shows we listen to overlap. There are so many podcasts out there it\'s always good to be able to get recommendations. I present to you my list of 30 podcasts (I had to cull the list down a bit).\r\n
\r\n\r\nAudio production has always been an interest of mine: my late grandfather was an audiophile, my dad ran an AV studio in Woking (the one where the Spice Girls were formed - my dad got mentioned in a couple of their autobiographies) and now runs his own AV consultancy business, and my cousin also runs an AV consultancy... so there’s a definite family history in there.
\r\nI dabbled briefly with hospital radio (as a technician, rather than a presenter) in the late 80’s, and I was a technician and presenter on College Radio in the early 90’s where I hosted a show called “The Barry Manilow Fan Club” on Friday lunchtimes.
\r\nYes, I am a huge fan of Barry Manilow - he’s given me a lot of inspiration as a musician - no, I didn’t play any Barry on the College Radio show.
\r\nI’d also had a few people say that I had a good radio voice. Others say a good radio face, but I don’t like them anymore.
\r\nIn 2007, I discovered this podcasting lark through a couple of friends who had their own podcasts. One was The Random Three: a personal musical journey where Mark - the host - would play three seemingly-random pieces of music from his own collection (thus, not podsafe) and explain the reasons why he chose them. Most of the time, these seemingly-random tracks actually had a theme, but it didn’t necessarily become apparent until after the second track. It was a great show - now sadly defunct - and I really miss it. I even submitted my own music choices for Mark to present.
\r\nThe other was Dumbed Down Life: three chaps nattering about “stuff” and playing some music along with it. Another great show, which - although it still exists - currently releases episodes every year or so.
\r\nWhat drew me to these shows - apart from being friends, was the fact that these were regular guys, not professionals.
\r\nThat led me to think “I can do that”, so I set about proving - to myself, mostly - that I could.
\r\nOne Thursday in early March 2008, when the wife had gone to the gym for a couple of hours, I grabbed my Logitech headset, my Linux laptop, a handful of tracks from the Podsafe Music Network, and a piece of software called IDJC, and recorded the first ever episode of The Bugcast. It was just over 22 minutes long, and it was dire. Utterly dire. Every so often, I go back to it and listen and cringe and marvel at how much better the show is now!
\r\nThe music back then wasn’t strictly podsafe either: the first track I played was Moloko’s Sing It Back… but I didn’t worry about it then, as I got the track from a source that gave implicit permission for use in podcasts.
\r\nI did do a show - episode 20 - which was a nostalgic trip back to my college years, where I played tracks by Chad Jackson, Japan, and Dream Warriors. This was a complete and intentional violation of copyright on my part, which led me to pull the show only a few weeks later. I did rerelease the show two years after that, but with the offending tracks removed. However, there is a story to the show, so I would recommend you go listen.
\r\nBack then, it was just me and a small listener-base of friends, their family, their families’ servants; their families’ servants’ tennis partners, and some chap I bumped into in the mess the other day called Bernard. But as time went on and I got more experience, I was really enjoying what I was doing, and started to experiment.
\r\nOne thing I did discover by about episode 16 is that I wasn’t editing my shows in post, aside from topping and tailing silence. This made it so much easier for me as I was recording the shows as-live from the very beginning, but taking out the vocal gaps, gaffes and the like. So there was really only one place to go from there...
\r\nSo in August 2008, on episode 24, to an audience of about 10 people, I streamed the first LIVE episode of the podcast. Wow, that was such a buzz! It was a major turning point in the show as I committed myself to do a regular show at a set time each week... turning a fun hobby into something a little step beyond amateur. There were a couple of non-live shows that I had to put together using the wife’s Windows machine when my laptop went bang and had to be repaired, but I hated doing that because I didn’t like the piecemeal sticky-tape method of production. There was little flow, and my spoken links between the music sounded very much like a bad Radio 4 anchor.
\r\nIn late September 2008, I was accepted as a member of the now-defunct Association of Music Podcasting. This was another major step for me. All member of the Association were peer-reviewed as part of the criteria for membership. This meant that my podcast was sufficiently good to be accepted. That meant so much to me, and made me take things so much more seriously (and was the main reason why I pulled episode 20 just prior)
\r\nIt also meant that the show was becoming more music-oriented - something I really did not have a problem with! Particularly as I was starting to strike up good relationships with some of the artists that I was featuring on the show. This led to me prerecording an interview with one of the bands in January 2009, and then again with another artist in March.
\r\nHaving registered a proper domain for the podcast (rather than piggybacking my own personal domain) and then celebrated the first anniversary of the show... you could say that the show was fuelling its own progression. And I was enjoying that journey immensely!
\r\nOver the next 6 months, I joined the Made In The UK Show collective, interviewed an artist LIVE on the show, had the show syndicated on an internet radio station in the UK, and launched a new, independent chatroom for the website.
\r\nAnd then, in September of 2009, the 18 month anniversary of the show, and two days before my birthday, something happened to totally turn the show upside down.
\r\nI decided that I wanted to improve the show. Bearing in mind that I was still using my Logitech headset, my Linux laptop, and a piece of software called IDJC to record and stream the show, I felt it was time for a change. So I spent a small fortune on a mixer, microphones, stands, audio interface, and cables.
\r\nYes, microphones. Plural.
\r\nUp to this point my wife, Caroline, had progressed from occasional listener, to regular distraction (I don’t think details are appropriate!), to researcher. So I asked her a question... if I bought two microphones, would you join the show as a permanent co-host? She said yes.
\r\nThat really changed things. The dynamic of me talking to an imaginary audience (bar the activity in the live chatroom) changing to me bouncing off someone in the same room was electric! The show was totally transformed by that fairly simple change. Our listener figures jumped up, the music on the show was more varied, existing listeners enjoyed the show more... it was amazing.
\r\nThere have been occasions where Caroline hasn’t been able to join the show (illness, kids, etc) and the listeners (and I) have really noticed her absence.
\r\nSo there’s a potted history of how I got into podcasting.
\r\nOutside the realms of The Bugcast, which is still my primary podcast:
\r\nAlso ran:
\r\nI’m always happy to answer any questions or provide help with regard to podcasting, you can find various ways to find me over at my Contact page
\r\nThanks for listening! :-)
\r\n',314,0,0,'CC-BY-SA','podcasting, anniversary, history, journey',0,0,1), (2498,'2018-02-28','Life without Google',266,'Quvmoh goes a month without G apps on his phone','Zenphone 2 https://forum.xda-developers.com/zenfone2/general/guide-brick-soft-hard-bricked-zenfone-2-t3284256
Magic Device Tool https://github.com/MariusQuabeck/magic-device-tool
F-Droid https://f-droid.org/en/
Protonmail https://protonmail.com/
Signal https://signal.org/
Syncthing https://syncthing.net/
In this episode I tune around a small portion of the HF (High Frequency) band in the 40 Meters section which in the UK covers 7 to 7.2Mhz.
\r\nThe mode being used was mostly LSB (Lower Side Band)
\r\nhttps://en.wikipedia.org/wiki/Sideband
At the end of the recording I briefly switch mode to to listen to a commercial station on AM (Amplitude modulation).
\r\nhttps://en.wikipedia.org/wiki/Amplitude_modulation
The radio being used is my trusty and much loved Kenwood TS 940S
\r\nhttps://www.universal-radio.com/catalog/hamhf/ts940s.html
The antenna used is a dipole tuned for the 40 Meter band.
\r\nhttps://en.wikipedia.org/wiki/Dipole_antenna
I used my trusty Dictaphone and internal microphone to do the recording
\r\nhttps://www.amazon.co.uk/HccToo-Multifunctional-Rechargeable-Dictaphone-Conversation/dp/B015H9JP6S/ref=sr_1_1?ie=UTF8&qid=1502381150&sr=8-1&keywords=dictation+machines
If you want to hold private conversations with another party over radio then perhaps amateur radio is not for you as this goes against the whole principle of Amateur Radio.
\r\nListening to amateur radio broadcasts is actively encouraged, and in the UK a licence is not required for listening.
\r\nA simple receiver capable of listening to sideband broadcasts and odd bit of long wire is all that\'s required.
\r\nIn the past it was common to hear an Amateur operator saying goodbye to any short wave listeners at the end of their conversation. If you listen carefully at about 10 minutes in the station DF2BO says goodbye to anybody still listening.
\r\nDF2BO speaking to Peter VK4ZP in Brisbane Queensland, on 7.16209 MHz
CW station calling CQ on 7.00994 MHz, I don\'t know the callsign or details of the station as I can\'t read Morse code however I did recognise the distinctive rhythm of the letters C and Q.
Transmitting the letters CQ on a particular radio frequency is used as an invitation for any operators listening on that frequency to respond. It is widely used in amateur radio.
German station unidentified on 7.15794 MHz
DF2BO name, Tom, near Stuttgart speaking to Rob VK2XZ who I can\'t hear on 7.16200 MHz, then speaking briefly with Chris VK2SR who I can\'t hear
Another brief bit of morse code
An unknown commercial station broadcasting on 7.35520 on AM
Lostnbronx measures how loud his own thoughts are -- or rather, how loud outside noise has to be before they are disrupted.
\r\nIt turns out that unwanted music in his ears at -30 dB is when his train of thought starts to derail.
',107,0,0,'CC-BY-SA','lostnbronx,thinking,thoughts,volume,noise,music,confusion',0,0,1), diff --git a/sql/hpr-db-part-13.sql b/sql/hpr-db-part-13.sql index c1c5cde..8273de5 100644 --- a/sql/hpr-db-part-13.sql +++ b/sql/hpr-db-part-13.sql @@ -1,3 +1,4 @@ +(2502,'2018-03-06','Volume Of Thought',440,'Lostnbronx attempts to measure the \"volume\" of his own thoughts.','Lostnbronx measures how loud his own thoughts are -- or rather, how loud outside noise has to be before they are disrupted.
\r\nIt turns out that unwanted music in his ears at -30 dB is when his train of thought starts to derail.
',107,0,0,'CC-BY-SA','lostnbronx,thinking,thoughts,volume,noise,music,confusion',0,0,1), (2504,'2018-03-08','Intro to Git with pen and paper',2205,'Klaatu introduces Git using pen and paper.','git add\r\n\r\ngit commit -m "some useful message"\r\n\r\ngit push origin HEAD
\r\n',78,104,0,'CC-BY-SA','git',0,0,1),
(2497,'2018-02-27','2017-2018 New Years Eve show part 1',13200,'Part one of the sixth annual HPR New Year Show.','Ken and Casper chat about the new year show and space
Pirate drops in and Casper gets a new job
Amazon\'s Giant Glass Balls
\r\nhttps://www.google.com/search?q=bezos+giant+glass+balls&tbm=isch&source=iu&ictx=1&fir=EW1kjYgk7lISlM%253A%252CTgFNxH0jr8vQLM%252C_&usg=__XtnxMzguAWZinVFgvLoiwvN7qvg%3D&sa=X&ved=0ahUKEwiXr6n2grTYAhUJx2MKHTugBL0Q9QEIKzAA#imgrc=EW1kjYgk7lISlM
ExplicitNess, and ratings and stuff
Ken is tidying his room
Microcenter
SS Virgina5 - pirate makes the boat go. Do not ride!!!!
Ken Tweets https://twitter.com/HPR/status/947415023500001280
NetMiner
Old Time Steam Powered Machine Shop: https://www.youtube.com/watch?v=9WXHNBMLZZM
FDroid
Copy APKs for your kids
Ken replaces battery in OMRON EAR MC 510 - THERMOMETER
Cool pcb ruler from Adafruit
https://www.adafruit.com/product/1554
SparkyLinux - supports 32bit architecture, web browsers, Debian based, one old P4
Bootsteap - sparky command line installer, small package. Will allow you to install a desktop, can bootstrap to whatever you want.
GNU - DOS
https://www.youtube.com/results?search_query=amiga+documentary
xKlaatu signs on
Discuss New Years in New Zealand!!!!
Gun Control
SHOW NOTES ARE(NOT?) Important
xklaatu does not like shownotes
Ken encourages them
HoneyMagoo REALLY joins
Markdown vs. non-markdown HTML5,
Heated topic - trigger point discovered
xklaatu owes ken a show on Git
Why 36 bits? Because all letters were upper case, which only required 6 bits, 6*6
Casper\'s first graphics card was a rendition vérité
Casper gets kicked off due to Van Allen Belt interference
Fascism
Late night programming in the states
\r\nhttps://youtu.be/58mhPaUL3Uc?t=6m45s
Android MTP / KDEConnect
Use a protocol that works like SFTP
Back to shownote discussion
Russia Discussion
https://www.infowars.com/media-completely-ignores-bombshell-seymour-hersh-revelations-on-seth-rich/
https://jackpineradicals.com/boards/topic/seymour-hersch-audio-says-seth-rich-was-wikileaks-source/
American music New Zealand
https://www.dailydot.com/debug/tesla-south-australia-battery/
The pirate bay AFK
Proposal: rename "smart phone" to Smart Bugs
Cryptonomicon
Quantum Computing / Encryption / Reality
https://www.thomhartmann.com/forum/2013/10/6th-mass-extinction
In part 2 we looked at deleting text in various ways and pasting it back, using GNU Readline key sequences.
\r\nThe full-length notes (available here) contain some new terms and features of GNU Readline, and introduce some further ways of manipulating text, with some examples.
\r\nRecorded November 19 2021 quick storm. Please search Binaural on HPR for similar recordings and description of procedure, enjoy and have a glorious 2022.
\r\nIn this episode our two heroes contemplate the ins and outs of version\r\ncontrol systems (VCS) and how to maintain sanity using them. Particular focus\r\nis on the newer generation of such as git which enabled large-scale community\r\nprojects such as the Linux kernel, programming languages like Rust and Python\r\nand other shenanigans. Including a crash course on version control systems\r\n- you may credits at your local third-level education facility for listening\r\nto this episode. Just tell them the Inlaws sent you :-). Plus Martin reveals\r\nhis favourite Pay TV channel and his gun-buying habits being a minor. Don\'t\r\nmiss this episode if you\'re a minor and want to buy a gun in certain countries\r\n(details as part of the episode! :-).
\r\n\r\nringtone location: /usr/share/sounds/freedesktop/stereo
\r\n
\r\nGimp on a cellphone, for obvious reasons.
\r\nThe HAM Page of the Swiss Federal Office of Communications, BAKOM: https://www.bakom.admin.ch/bakom/de/home/frequenzen-antennen/frequenznutzung-mit-oder-ohne-konzessionen/amateurfunk.html\r\n
\r\n\r\nUnion of Swiss Short Wave Amateurs, they manage the local associations and the use of the frequencies for relays and automated stations: https://www.uska.ch/en/\r\n
\r\n\r\n\r\nMost likely the best way to prepare for the exam is attending a preparation course from a local Association, of have a brother who did and forwarded all the background info and documents to me. ;) But apart from having a brother I did the following:\r\n
\r\n\r\nThe online version of the books I read: https://www.darc.de/der-club/referate/ajw/darc-online-lehrgang/ - again in German. They\'re mainly geared towards the German exams but the knowledge contained is useful for the Swiss exams, too.\r\n
\r\n\r\nI mainly used the HamRadioTrainer to prepare for the exam. This is a Windows application which however works pretty well in wine. I was told that the Swiss questions are rather old, 2017ish.\r\n
\r\n\r\nI was told that there are mobile apps with more recent questions but I couldn\'t be bothered to check whether they exist on F-Droid.\r\n
\r\n\r\nThe BAKOM also has a site about the exams, containing PDFs with example questions, of course again everything in German: https://www.bakom.admin.ch/bakom/de/home/frequenzen-antennen/funkerpruefungen/amateurfunk-pruefungen.html\r\n
',288,43,0,'CC-BY-SA','Swiss,BAKOM,HamRadioTrainer,HB9',0,0,1), diff --git a/sql/hpr-db-part-14.sql b/sql/hpr-db-part-14.sql index f1a6912..71c0664 100644 --- a/sql/hpr-db-part-14.sql +++ b/sql/hpr-db-part-14.sql @@ -1,3 +1,4 @@ +(3505,'2022-01-07','A DX with Hotel Bravo 9 Hotel November Tango',2890,'Ken (PA7KEN) and Beni (HB9HNT) talk about getting your HAM ticket in Switzerland','\r\nThe HAM Page of the Swiss Federal Office of Communications, BAKOM: https://www.bakom.admin.ch/bakom/de/home/frequenzen-antennen/frequenznutzung-mit-oder-ohne-konzessionen/amateurfunk.html\r\n
\r\n\r\nUnion of Swiss Short Wave Amateurs, they manage the local associations and the use of the frequencies for relays and automated stations: https://www.uska.ch/en/\r\n
\r\n\r\n\r\nMost likely the best way to prepare for the exam is attending a preparation course from a local Association, of have a brother who did and forwarded all the background info and documents to me. ;) But apart from having a brother I did the following:\r\n
\r\n\r\nThe online version of the books I read: https://www.darc.de/der-club/referate/ajw/darc-online-lehrgang/ - again in German. They\'re mainly geared towards the German exams but the knowledge contained is useful for the Swiss exams, too.\r\n
\r\n\r\nI mainly used the HamRadioTrainer to prepare for the exam. This is a Windows application which however works pretty well in wine. I was told that the Swiss questions are rather old, 2017ish.\r\n
\r\n\r\nI was told that there are mobile apps with more recent questions but I couldn\'t be bothered to check whether they exist on F-Droid.\r\n
\r\n\r\nThe BAKOM also has a site about the exams, containing PDFs with example questions, of course again everything in German: https://www.bakom.admin.ch/bakom/de/home/frequenzen-antennen/funkerpruefungen/amateurfunk-pruefungen.html\r\n
',288,43,0,'CC-BY-SA','Swiss,BAKOM,HamRadioTrainer,HB9',0,0,1), (3482,'2021-12-07','Introduction to Post Apocalyptic Robotics Meta Technology',810,'Building robots from junk parts and tech prepping','https://solarbotics.net/bftgu/default.htm
\r\nhttps://www.bitchute.com/video/jwD4sZhnXrEk/
Hail to my Loyal Henchmen and fellow SuperVillains, welcome new recruits and greetings to the hackers of HPR.
\r\nThis is Mechatroniac the mechatronics maniac with the zeroth installment of Robot Warlords of the Apocalypse, where I will talk about post apocalyptic robotics and share my projects, philosophy and future ambitions.
\r\nI am doing this podcast contribution for hacker public radio.
\r\nhackerpublicradio.org
\r\nAfter this has aired on HPR I will be adding video and to this presentation which will be uploaded to my channel at:
\r\nhttps://bitchute.com/channel/mechatroniac point youtube-dl at it and download them all.
\r\nMechatronics is code, electronics and mechanics working together as a system. I am weak in all 3, but have built mini battlebot style robots completely from scratch, with every chassis part, every motor and wheel, and every circuit that drives them sourced for free from junk like discarded printers, dvds, tvs, computers and UPS.
\r\nI am calling this ethos and the resultant aesthetic, Post Apocalyptic Robotics, that is robots that can be built by reclaiming existing post consumer products to create something new.
\r\nCurrently they are confined to smooth surfaces like battlebot arenas, but more rugged terrain bots are currently also being worked on, and I want to work towards autonomous and swarm robots as well.
\r\nThe recipes I release here, can be followed by anyone to build their own robots and devices, by simply gathering the required scrap units or similar as described; then disassembling, then finally reassembling into a new meta technological device.
\r\nI hope that others will do the same, and come up with their own innovations and new recipes that can be added to our incipient swarms of meta-technological bots as they evolve ever more sophistication.
\r\nWelcome to post apocalyptic robotics.
\r\nIntroduction to Post-Apocalypse Robotics Meta-technology
\r\nTech Prepping, Building a \'battlebot\' out of junk
\r\nMeteors, asteroids, comets. Cataclysmic solar flares, massive volcanic eruptions and earthquakes triggering massive tsunamis, social unrest, runaway climate change, ransomware and EMPs attacks striking electric grids, deadly viral pandemics, mass hysteria, big boats blocking waterways, obscured malware in a systemd update, management engines at the heart of CPUs providing backdoors to Intel and AMD hardware at root -3 privilege... what could go wrong there?
\r\nThere are a large number of looming events which could collapse technological society as it is, wiping out most of the internet and shipping and transport and hopefully maybe even the government.
\r\nTech Prepping is more important than food prepping
\r\nWhile most survivalist and prepper types concentrate on stacking cans of beans, seeds, fuel and ammo, the robot prepper will also be hoarding books on pdf, component datasheets, software libraries, breakout boards and every post EOL electronics product they can get their hands on.
\r\nIn a semi apocalyptic scenario where the trucks stop rolling, a lot of people who save seeds will be able to grow food in their communities, so food won\'t be such a big deal.
\r\nThere might even be some that figure out how to make petroleum from wood like mrteslonian channel on youtube.
\r\nBut a real crux will be analog, digital electronics technology, IT and mechatronics. Those communities with working electronics, mechatronics, and information technology infrastructure, will be at a distinct competitive advantage. They will be able to leverage this in such things as automation of agriculture, from watering schedules to weed pulling along with many other applications that will make the PAR communities ascendant. All else being equal, PAR will be a force multiplier vs hostile neighbours starved of their slaveslabs swiping because facebook no longer exists, or remnants of the tyrannical state coming out of their DUMB bunkers and thinking they still have the right to rule.
\r\nIt\'s a good thing then, that we have a boost up to a mechatronic technological society all around us in the electronic consumer devices that although they may be decrepit, soiled and/or dead, nonetheless contain a wealth of component parts -most of which are hardy enough to function for a very long time, components that can be reused in new applications.
\r\nIt\'s like there is a supply chain for robot factories all around us. It\'s not infinite but it is very plentiful at the moment. Sadly, our society is blind to the current and future worth of the technological legacy in our midst and the electronics recycling is electronics destruction.
\r\nMeta technology
\r\nAntecedents: BEAM, cyberpunk, road warrior
\r\nFellow Travellers/Parallels: Maker, Right to repair, hardware hacking(Valerio De Giampietro - Hardware Hacking Tutorial), CollapseOS
\r\nOne of this new meta technology\'s main antecedents is BEAM(Biology Evolution Aesthetics Mechanics) robotics, Mark Tilden\'s robot projects that eschewed microprocessors in favour of circuits built of discrete components that mimic biological nerves and can react to environmental stimuli. There is a nice archive of BEAM related documents on the solarbotics site.
\r\nMark Tilden even wrote a book called \'Junk Bots\', so must have had some of the same ideas I have... but where Mark uses transistors as the nerves and brains, I am using arduino since microprocessors are now very inexpensive.
\r\nThe use of arduino is the only thing keeping my projects from being completely PAR, but one day wish to have entirely PAR
\r\nThus right to repair and hardware hacking are thus two important aspects to utilizing the processors inside consumer products to run other operating systems for our use. Unless we hoard thousands of atmega328p chips, it will be difficult to find processors that we can use unless they have been liberated via techniques described by Valerio De Giampietro. Reusing processors from printers and other products is a goal for the future, but right now, let\'s have some fun.
\r\nFUN and Education The first arduino PAR battlebot I built - the herald/interceptor; is powered by 5 18650 cells from trashed laptops, powertrain is a custom hybrid relay/MOSFET H-bridge, and it is driven by four electric motors and wheels harvested from PA printers. It has IR remote control and is very fast to the extent that I had to add rubber bumpers to it to keep it and others safe.
\r\nI departed somewhat from the PAR ethos, with added front and rear ultrasonic sensors, and an mp3 player powering a tv speaker. Hence, it is the herald/interceptor
\r\nI think it has an interesting road warrior cyberpunk aesthetic, with the grey steel, aluminum and black ABS parts, and but for the wheels; star wars for the bolted on look of it
\r\nCan we set up PAR tournaments where we can bring our bots and battle it out? Cost is no longer a barrier.
\r\nI could see a challenging new sport that is a cross between battlebots and junkyard wars, where contestants would have a set amount of time to build a bot from junk, and then compete in racing or sumo matches.
\r\nObviously you are going to learn a lot building a robot and the best way to learn is by doing.
\r\nAlright, now that I have shown some of the important strategic and fun implications of PAR meta technology, by raiding trashed consumer electronics for their components: I hope at the very least that everyone hearing this never again take their post use electronics to one of those recycling centers where all those precious components are destroyed, instead of keeping it in your basement where it belongs. You\'d do better taking it to a landfill where perhaps some future wretched mutant can discover and make use of it, than take it to electronics recycling.
\r\nNext episode I\'ll show you how to build your PAR laboratory and give you the ingredients to the herald/interceptor battlebot, but if you\'re already excited to get started you can order an arduino Uno or nano, or an arduino kit with a bunch of sensors like I did when I got started. You can also start gathering things like printers, tvs, dvds, UPS and other waste, and get a soldering station if you don\'t already have one.
\r\nIn the coming episodes I will share the detailed recipe for my first post apocalyptic battlebot style robot I built complete with arduino code, and will show you how to build your own robot for free except for the arduino*. I\'ll also do email tech support for anyone having problems.
\r\nI also want to go further into other tech prepper archiving, in case all or large parts of the internet are no longer accessible, and this may be where you programming specialists might be able to help. They kind of gave me weird looks on the arduino forums when I asked for a way to download all the libraries but was finally able to beg a script that let me download a lot of them, if not all.
\r\nAlso, all the component datasheets would be handy... it seems it would be prudent to have datasheets on all the components and microprocessors that you possibly can, and to have all the software libraries it would be practical to archive.
\r\nI\'ll also go into more aspects and implications of this exciting meta technology, and I hope you will join me in building post apocalypse robotics and mechatronics fun.
\r\n',401,0,1,'CC-BY-SA','beam,righttorepair,robots,mechatronics',0,0,1), (3489,'2021-12-16','Equality of structured errors',776,'Tuula talks about equality in Haskell','Equality of structured errors
\r\nIn previous episode, I built a system where error codes weren\'t defined in one huge type. This made compilation times faster and maintenance quite a bit more easier.
\r\nI wanted to write a test to see that parameters passed to validatePatchApiPersonR
are validated correctly. patchApiPersonR
is used by client to do partial updates on a Person
entity. There\'s three different cases I wanted to check:
Code is shown below and the last 2 lines are the interesting ones. There I\'m using equality to compare if a given error exists in a list of errors created by validatePatchApiPersonR
.
spec :: Spec\r\nspec = do\r\n describe "people" $ do\r\n describe "life focus" $ do\r\n describe "Validating requests" $ do\r\n it "All errors are reported" $ do\r\n forAll anyCompletelyFaultyRequest $\r\n \\(userE, personE, msg, date) ->\r\n let res = validatePatchApiPersonR (userE ^. entityKeyL, userE ^. entityValL, personE, msg, date)\r\n newFocus = msg ^? patchPersonRequestLifeFocus . _Just . _Just\r\n in\r\n case res of\r\n V.Success _ ->\r\n expectationFailure "Invalid request was not detected"\r\n\r\n V.Failure errs -> do\r\n errs `shouldSatisfy` (\\xs -> any (\\x -> "CanNotChangeLifeFocusSoSoon" `isInfixOf` (pack $ show x)) xs)\r\n errs `shouldContain` [ canNotReselectSameLifeFocus newFocus ]\r\n errs `shouldContain` [ insufficientRights ]\r\n
\r\nEquality in Haskell works slightly differently compared to for example C#. There is no built in, default implementation that gets used when the programmer hasn\'t written their own. If you want to compare equality, there needs to be implementation specific to your data types. This is done by making an instance of type class Eq
(https://hackage.haskell.org/package/base-4.15.0.0/docs/Data-Eq.html).
class Eq a where\r\n (==) :: a -> a -> Bool\r\n (/=) :: a -> a -> Bool\r\n
\r\nThere\'s two functions: ==
for equality and /=
for inequality. You need to implement either one.
ECode
is our structured error code type and defined as follows (this is short recap of previous episode):
data ECode where\r\n ECode :: (ErrorCodeClass a, ToJSON a, Eq a, Show a) => a -> ECode\r\n
\r\nIt can wrap anything that has correct type class instances and you will always get ECode
as a result. It hides the specific type of thing being wrapped and only functions defined in type classes are available.
Peel away ECode
and compare what\'s inside and compare wrapped values:
instance Eq ECode where\r\n ECode a == ECode b =\r\n a == b\r\n
\r\nThis will lead into a error \"Couldn\'t match expected type ‘a’ with actual type ‘a1’. ‘a1’ is a rigid type variable bound by a pattern with constructor...\". This is because ECode
can wrap many different types, there is no quarantee that you\'re comparing values of same type. The whole error is show below for reference:
[35 of 76] Compiling Errors ( src/Errors.hs, .stack-work/dist/x86_64-linux/Cabal-2.2.0.1/build/Errors.o )\r\n\r\n/home/tuula/programming/sky/src/Errors.hs:148:14: error:\r\n • Couldn't match expected type ‘a’ with actual type ‘a1’\r\n ‘a1’ is a rigid type variable bound by\r\n a pattern with constructor:\r\n ECode :: forall a.\r\n (ErrorCodeClass a, ToJSON a, Eq a, Show a) =>\r\n a -> ECode,\r\n in an equation for ‘==’\r\n at src/Errors.hs:147:16-22\r\n ‘a’ is a rigid type variable bound by\r\n a pattern with constructor:\r\n ECode :: forall a.\r\n (ErrorCodeClass a, ToJSON a, Eq a, Show a) =>\r\n a -> ECode,\r\n in an equation for ‘==’\r\n at src/Errors.hs:147:5-11\r\n • In the second argument of ‘(==)’, namely ‘b’\r\n In the expression: a == b\r\n In an equation for ‘==’: ECode a == ECode b = a == b\r\n • Relevant bindings include\r\n b :: a1 (bound at src/Errors.hs:147:22)\r\n a :: a (bound at src/Errors.hs:147:11)\r\n |\r\n148 | a == b\r\n |\r\n
\r\nWe can use Show
to turn ECode
into string and compare them. This is what I did initially.
instance Eq ECode where\r\n a == b = show a == show b\r\n
\r\nWhile this works, it feels hacky. It relies on string representations being different. If you accidentally write Show
instance in a way that produces same string with two different values, the comparison breaks down.
After pondering a bit, I asked myself a question \"When are two ECode
equal?\". The answer I arrived is \"When they have same http status code and description.\" Then I could write yet different take on equality:
instance Eq ECode where\r\n a == b =\r\n httpStatusCode a == httpStatusCode b\r\n && description a == description b\r\n
\r\nThis states that to two ECode
values are equal, if they have same httpStatusCode
and description
.
Thanks for listening, if you have any questions or comments, you can reach me via email or in fediverse, where I\'m Tuula@tech.lgbt
. Or even better, you could record your own hacker public radio episode.
Ad astra!
\r\n',364,107,1,'CC-BY-SA','haskell, eq',0,0,1), (3487,'2021-12-14','Installing a cat door',1446,'Rho`n installs a cat door in his interior basement door','In today\'s episode, Rho`n installs a cat door in the basement door separating the finished side of the basement from the utility side. Follow along as he learns once again that it is best to read all the instructions before starting a project, and also learns that modern, inexpensive, interior doors are not made of wood.
\r\n\r\nThe following are the pictures taken during the project.
\r\n\r\nThe transition sound used between audio clips is found on freesound.org:
\r\nName: Harp Transition Music Cue
\r\nAuthor: DanJFilms
\r\nLicense: Creative Commons Zero
Over 12 years ago, Jon \"The Nice Guy\"\nSpriggs went to a \"Pod Crawl\" with (among others) Dave \"The Love Bug\" Lee, where he\npitched the idea of a daily music promotion show, with a twist - it\nwould all be automated, and use text-to-speech to introduce\neverything.
\nThe first show was released\non 2010-10-24 and the last ever show (this one) was released on\n2022-10-12.
\nOver the twelve years, Jon would go on to meet to meet Yannick and Ken Fallon, both\nof whom would go on to shape changes (big and small) to CCHits.
\nThis year, the cracks started to re-appear in the architecture\nunderneath CCHits - between APIs shutting down that were used to load\ntracks to CCHits, and the general framework being used to write CCHits\nnot receiving the care and attention it needed... and the team finally\ndecided to stop adding new tracks, and let the process build the last\nfew shows.
\nThis podcast gives you a peek behind the curtain to the team involved\nin the system, and gives you some of the high- and low-lights in the 12\nyears the site ran for.
\n',413,0,0,'CC-BY','music,creative commons,podcast',0,0,1), (3724,'2022-11-10','My top Android apps',579,'I walk through the top apps on my phone','Connect to the home network
\nVim editor
Secure files
\nClear Scanner PDF scanner and\nOCR
\nStar Wars: Dark Tide I: Onslaught
\nThe New Jedi Order #2
\nBoba Fett: A Practical Man
\nUS Amateur Radio Band Plan
\n\r\n
\r\nMap of Dublin showing the Temple Bar tourist area. A red arrow points to where you can change the profile.\r\n
\r\n
\r\nWith the Configure Map > Profile selection menu open, a red square surrounds the Bus icon to indicate the \"public transport\" profile is now selected.\r\n
\r\n
\r\nThe map now opens to show more information about public transport is now displayed on the map. This is highlighted with a red square.
\r\nClicking the bustop (highlighted with a red circle ) will show more information about the routes available at this location.\r\n
\r\n
\r\nOnce the transport stop is selected, a list of all the routes that service this location are displayed. Along with other routes that are available within a short distance.\r\n
\r\n
\r\nClicking any of the routes numbers/names will give a zoomed out map showing in red the route many of the stops towards it\'s source and destination.\r\n
\nThere were no new hosts this month.\n
\n\nId | \nDay | \nDate | \nTitle | \nHost | \n
---|---|---|---|---|
3978 | \nWed | \n2023-11-01 | \nDriving in Virginia. | \nSome Guy On The Internet | \n
3979 | \nThu | \n2023-11-02 | \nFireStick and ad blocking | \noperat0r | \n
3980 | \nFri | \n2023-11-03 | \nHuntsville to Vicksburg | \nAhuka | \n
3981 | \nMon | \n2023-11-06 | \nHPR Community News for October 2023 | \nHPR Volunteers | \n
3982 | \nTue | \n2023-11-07 | \nConversation with ChatGPT | \nArcher72 | \n
3983 | \nWed | \n2023-11-08 | \nChatGPT Output is not compatible with CC-BY-SA | \nKen Fallon | \n
3984 | \nThu | \n2023-11-09 | \nWhoppers. How Archer72 and I made moonshine. Volume one. | \nSome Guy On The Internet | \n
3985 | \nFri | \n2023-11-10 | \nBash snippet - be careful when feeding data to loops | \nDave Morriss | \n
3990 | \nFri | \n2023-11-17 | \nPlaying Alpha Centauri, Part 2 | \nAhuka | \n
3991 | \nMon | \n2023-11-20 | \nYOU ARE A PIRATE | \noperat0r | \n
3992 | \nTue | \n2023-11-21 | \nTest recording on a wireless mic | \nArcher72 | \n
These are comments which have been made during the past month, either to shows released during the month or to past shows.\nThere are 2 comments in total.
\n\nThere are 2 comments on 2 of this month\'s shows:
\n\nPolicy decisions surrounding HPR are taken by the community as a whole. This\ndiscussion takes place on the Mail List which is open to all HPR listeners and\ncontributors. The discussions are open and available on the HPR server under\nMailman.\n
\nThe threaded discussions this month can be found here:
\nhttps://lists.hackerpublicradio.com/pipermail/hpr/2023-November/thread.html\n\n\nWith the kind permission of LWN.net we are linking to\nThe LWN.net Community Calendar.
\nQuoting the site:
\nThis is the LWN.net community event calendar, where we track\nevents of interest to people using and developing Linux and free software.\nClicking on individual events will take you to the appropriate web\npage.\n\n
Bulleted list item 1
Bulleted list item 2
\nThere were no new hosts this month.\n
\n\nId | \nDay | \nDate | \nTitle | \nHost | \n
---|---|---|---|---|
3978 | \nWed | \n2023-11-01 | \nDriving in Virginia. | \nSome Guy On The Internet | \n
3979 | \nThu | \n2023-11-02 | \nFireStick and ad blocking | \noperat0r | \n
3980 | \nFri | \n2023-11-03 | \nHuntsville to Vicksburg | \nAhuka | \n
3981 | \nMon | \n2023-11-06 | \nHPR Community News for October 2023 | \nHPR Volunteers | \n
3982 | \nTue | \n2023-11-07 | \nConversation with ChatGPT | \nArcher72 | \n
3983 | \nWed | \n2023-11-08 | \nChatGPT Output is not compatible with CC-BY-SA | \nKen Fallon | \n
3984 | \nThu | \n2023-11-09 | \nWhoppers. How Archer72 and I made moonshine. Volume one. | \nSome Guy On The Internet | \n
3985 | \nFri | \n2023-11-10 | \nBash snippet - be careful when feeding data to loops | \nDave Morriss | \n
3990 | \nFri | \n2023-11-17 | \nPlaying Alpha Centauri, Part 2 | \nAhuka | \n
3991 | \nMon | \n2023-11-20 | \nYOU ARE A PIRATE | \noperat0r | \n
3992 | \nTue | \n2023-11-21 | \nTest recording on a wireless mic | \nArcher72 | \n
These are comments which have been made during the past month, either to shows released during the month or to past shows.\nThere are 3 comments in total.
\n\nThere are 3 comments on 3 of this month\'s shows:
\n\nPolicy decisions surrounding HPR are taken by the community as a whole. This\ndiscussion takes place on the Mail List which is open to all HPR listeners and\ncontributors. The discussions are open and available on the HPR server under\nMailman.\n
\nThe threaded discussions this month can be found here:
\nhttps://lists.hackerpublicradio.com/pipermail/hpr/2023-November/thread.html\n\n\nWith the kind permission of LWN.net we are linking to\nThe LWN.net Community Calendar.
\nQuoting the site:
\nThis is the LWN.net community event calendar, where we track\nevents of interest to people using and developing Linux and free software.\nClicking on individual events will take you to the appropriate web\npage.\n\n
Bulleted list item 1
Bulleted list item 2
A previously undocumented command-and-control (C2) framework dubbed\nAlchimist is likely being used in the wild to target Windows, macOS, and\nLinux systems.
\n\"Alchimist C2 has a web interface written in Simplified Chinese and\ncan generate a configured payload, establish remote sessions, deploy\npayloads to the remote machines, capture screenshots, perform remote\nshellcode execution, and run arbitrary commands,\" Cisco Talos said in a\nreport shared with The Hacker News. Written in GoLang, Alchimist is\ncomplemented by a beacon implant called Insekt, which comes with remote\naccess features that can be instrumented by the C2 server.”
\n\"Since Alchimist is a single-file based ready-to-go C2 framework, it\nis difficult to attribute its use to a single actor such as the authors,\nAPTs, or crimeware syndicates.\"
\nThe trojan, for its part, is equipped with features typically present\nin backdoors of this kind, enabling the malware to get system\ninformation, capture screenshots, run arbitrary commands, and download\nremote files, among others.
\nAlchimist C2 panel further features the ability to generate first\nstage payloads, including PowerShell and wget code snippets for Windows\nand Linux, potentially allowing an attacker to flesh out their infection\nchains to distribute the Insekt RAT binary. The instructions could then\nbe potentially embedded in a maldoc attached to a phishing email that,\nwhen opened, downloads and launches the backdoor on the compromised\nmachine. What\'s more, the Linux version of Insekt is capable of listing\nthe contents of the \".ssh\" directory and even adding new SSH keys to the\n\"~/.ssh/authorized_keys\" file to facilitate remote access over SSH.
\nMalicious actors are resorting to voice phishing (vishing) tactics to\ndupe victims into installing Android malware on their devices.
\nThe Dutch mobile security company said it identified a network of\nphishing websites targeting Italian online-banking users that are\ndesigned to get hold of their contact details.
\nTelephone-oriented attack delivery (TOAD), as the social engineering\ntechnique is called, involves calling the victims using previously\ncollected information from the fraudulent websites.
\nThe caller, who purports to be a support agent for the bank,\ninstructs the individual on the other end of the call to install a\nsecurity app and grant it extensive permissions, when, in reality, it\'s\nmalicious software intended to gain remote access or conduct financial\nfraud.
\nWhat\'s more, the infrastructure utilized by the threat actor has been\nfound to deliver a second malware named SMS Spy that enables the\nadversary to gain access to all incoming SMS messages and intercept\none-time passwords (OTPs) sent by banks.
\nThe new wave of hybrid fraud attacks presents a new dimension for\nscammers to mount convincing Android malware campaigns that have\notherwise relied on traditional methods such as Google Play Store\ndroppers, rogue ads, and smishing.
\nFounded in 1992, Omnicell is a leading provider of medication\nmanagement solutions for hospitals, long-term care facilities, and\nretail pharmacies. On May 4, 2022, Omnicell\'s IT systems and third-party\ncloud services were affected by ransomware attacks which may lead to\ndata security concerns for employees and patients. While it is still\nearly in the investigation, this appears to be a severe breach with\npotentially significant consequences for the company.
\nOmnicell began informing individuals whose information may have been\ncompromised on August 3, 2022. Hackers may be able to access and sell\npatient-sensitive information, such as social security numbers, due to\nthe time delay between the breach and the company\'s report of affected\npatients.
\nThe type of information that may be exposed are:
\nThe healthcare industry is one of the most targeted sectors globally,\nwith attacks doubling year over year. And these costs are measured in\nmillions or even billions of dollars - not to mention increased risks\nfor patients\' privacy (and reputation).
\nRansomware gangs are taking Americans to school. So far this year,\nhackers have taken hostage at least 1,735 schools in 27 districts; the\nmassive Los Angeles Unified School District is their latest target.
\nRansomware hackers breach computers, lock them up, steal sensitive\ndata and demand money to release their hold on organizations’ critical\nsystems. These criminals often attack schools because they are\nprofitable targets. If all ransomware victims refused to pay, the\nattacks would stop. Indeed, paying up might be illegal: The Treasury\nDepartment released guidance last year noting that giving money to\nglobal criminal organizations can violate sanctions law.
\nThe trouble is, saying no isn’t always easy. Los Angeles didn’t\ncapitulate, and the criminals leaked a trove of data — a consequence\nthat can prove more or less serious depending on the sensitivity of the\nstolen information.
\n“Because we can,” said a representative of the ransomware gang that\ntook down Los Angeles Unified School District, explaining the\ncollective’s motivations to a Bloomberg News reporter. Schools’ task is\nto turn “can” to “can’t” — or, at least, to make success pay a whole lot\nless.
\nVerizon notified prepaid customers this week of a recent cyberattack\nthat granted third-party actors access to their accounts, as reported\nearlier Tuesday by BleepingComputer. The attack occurred between Oct. 6\nand Oct. 10 and affected 250 Verizon prepaid customers.
\nThe breach exposed the last four digits of customers\' credit cards\nused to make payments on their prepaid accounts. While no full credit\ncard information was accessible, the information was enough to grant the\nattackers access to Verizon user accounts, which hold semi-sensitive\ndata such \"name, telephone number, billing address, price plans, and\nother service-related information,\" per a notice from Verizon.
\nAccount access also potentially enabled attackers to process\nunauthorized SIM card changes on prepaid lines. Also known as SIM\nswapping, unauthorized SIM card changes can allow for the transfer of an\nunsuspecting person\'s phone number to another phone.
\nFrom there, the counterfeit phone can be used to receive SMS messages\nfor password resets and user identification verifications on other\naccounts, giving attackers potential access to any account they have, or\ncan guess, the username for. Consequently, Verizon recommended affected\ncustomers secure their non-Verizon accounts such as social media,\nfinancial, email and other accounts that allow for password resets by\nphone.
\n',391,0,0,'CC-BY-SA','Threat Analysis, Security Breach, Ransomware, Data Breach, TOAD',0,0,1), (3717,'2022-11-01','Video editing with Shotcut on a low end PC',695,'In this episode I explain how I use the shotcut video editor to edit video on a low end PC.','C = copy\nV = paste\nA = duplicate\nX = ripple delete\nCtrl + X = ripple delete but send to clipboard\nS = split
\nSplits are not fixed and can be adjusted. Once you\'ve split up clips\nand put them in the right order on the timeline you can still adjust the\ncut point even though you previously split the clip because the clip is\nreferenced to the original file in the playlist.
\nHello and welcome Hacker Public Radio audience my name is Mr X\nwelcome to this podcast. As per usual I\'d like to start by thanking the\npeople at HPR for making this podcast possible. HPR is a Community led\npodcast provided by the community for the community that means you can\ncontribute to. The HPR team have gone to great deal of effort to\nsimplify and streamline the process of providing podcasts. There are\nmany ways to record an episode these days using phones tablets PCs and\nalike. The hardest barrier is sending in your first show. Don\'t get too\nhung up about quality, it\'s more important just to send something in.\nThe sound quality of some of my early shows wasn\'t very good. If I can\ndo it anyone can and you might just get hooked in the process.
\nWell it\'s been almost a year since I\'ve sent in a show. Looking at\nthe HPR site my last episode was back in November 2021. I suspect like\nmany others life has become more complicated and I find I have much less\nspare time and because I have much less spare time I have much less time\nto pursue my hobbies and because of this I have less to speak about and\nbecause of this I have less time to record what I\'ve been doing and it\nall turns into to vicious circle. Fortunately I recently had some time\noff work and had a lovely holiday. During the holiday I ended up\nrecording some video which I decided I wanted to edit. I\'ve done some\nvideo editing in the past using various video editing packages. The best\nand most recent of which is shotcut.
\nVideo resolution 1920 x 1080, Codec h264 mpeg-4, Frame rate 30 frames\nper second.
\nComputer Dell Optiplex 780. Fitted with 4 GB of internal RAM and\nonboard video graphics card.
\nShotcut version 22.06.23 Shotcut is a free open-source cross-platform\nvideo editor licenced under the GNU general public licence version\n3.0
\nThis episode will only cover basic shotcut video editing techniques.\nShotcut contains many advanced features and effects that will not be\ncovered in this episode. A lot of the workflow I’ll share with you today\nis intended to get around limitations imposed by my low spec PC
\nI\'ll try my best to cover the video editing process in this podcast\nusing words alone; however I am conscious that an accompanying video\nwould make it easier to follow along.
\nStart by creating a folder to hold all the required media files.\nAudio tracks and sound effects can be added to this folder later. Make\nsure all your video files are using the same frame rate in my case 30\nframes per second.
\nOpen each video file in VLC one at a time going through each video\nfile looking for the best portions of video. Make a note of where the\nbest portions of the video are by writing down the start and end points\nin minutes and seconds.
\nI do this because the interface of VLC is more responsive than\nshortcut and the resolution of displayed video is far greater than the\npreview in shortcut. This makes it quicker and easier to find the best\nportions of video.
\nOpen shortcut and make sure the new project is set to the same frames\nper second as the media files you\'re working with, in my case 30 frames\nper second. You can check the frame rate of your project by looking at\nthe selected video mode in the new projects window. If you select\nautomatic it will ensure the project resolution and frame rate\nautomatically match that of your media files.
\nStart by adding all the video files to the playlist, this can be done\nin a number of ways for example it can be done by clicking on the open\nfile button in the top toolbar or within the open files menu.\nAlternatively you can drag and drop files into the playlist. I find this\nto be the easiest way to add media files to a project. Once this is done\nsave your project.
\nDrag the first file from the Playlist to the timeline making sure\nthat the start of the video starts at 0 seconds.
\nClick on the timeline in the position where the first start point of\ninterest is needed. Use the S key to split the video at this point.\nDon\'t worry about being too accurate as this can be moved at a later\nstage.
\nRepeat this process for the end point of interest.
\nRepeat this again for all the other sections of start and end points\nof interest.
\nRemove the unwanted sections of video by clicking on a section then\nhitting the delete key. This will remove the unwanted section leaving an\nempty space behind.
\nOnce all the unwanted sections are removed click on the sections of\nvideo and pull them to the left to close the gaps up. I find it useful\nto leave some space between the good sections of video as it makes it\neasier to see where splits are and makes it easier later on to rearrange\nthe order of the individual clips.
\nCheck the start and end points of the remaining sections of video to\nsee that the start and end points stop in the correct place. You can do\nthis by clicking the play button on the preview window. The video start\nand end points can be adjusted by dragging the section left or right in\nin the timeline section; this is where leaving spaces Between each\nsection of video can be handy as it allows for fine tuning.
\nAdd a new blank video track to the timeline to hold the next video.\nNote this wasn\'t required when adding the first video track but it is\nneeded for each subsequent track. A video track can be added by right\nclicking on an empty portion of the timeline and selecting add video\ntrack. Alternatively use the ctrl + I key.
\nDrag your second video from the playlist onto the newly created blank\nvideo track in the timeline. As before make sure that the start of the\nvideo starts at 0 seconds.
\nBefore previewing any section of the second video track click the\nsmall eye shaped hide icon in the left section of the first video track\nlabelled output. This will prevent previewing both video tracks at the\nsame time.
\nRepeat the process above of chopping the second video track into\nsections using the S key to split the video up. Remove the unwanted\nsections. Finally adjust the start and end points of the remaining\nsections.
\nRepeat the steps above to add the remaining video files one at a time\nfrom the playlist to the timeline.
\nWhen complete you end up with separate video tracks in the timeline\neach containing good sections of video.
\nAt this stage I can\'t be too specific about how to continue as there\nare a number of different options depending on your particular Project.\nYou can for example start by combining the good sections of video into\none video track by dragging them from one track to another then add if\nrequired an audio track or you can add the audio track first and then\ntry to sync things up to the audio track moving bits and pieces of video\ninto one video track remembering to hide the unwanted sections of video\nby clicking on the small hide eye icons. Don\'t do too much editing\nwithout saving the project. If you get a message about low memory save\nthe project then reopen it.
\nTo export the final video click on the export button in the toolbar.\nI pick the default option, this creates an H.264/AAC MP4 file suitable\nfor most users and purposes. You can check the frame rate is the same as\nyour original media files by clicking on the advanced tab. Click the\nexport file button and give it a file name. It may take some time to\ncreate the export file. This will be dependent on the speed of your\ncomputer and the length and resolution of your project.
\nWhile Shotcut is far from perfect on my puny PC it is surprisingly\nusable and stable and is the best option I’ve found so far.
\nFinally here are some general shotcut tips I have when doing video\nediting on a puny PC with limited ram, slow processor and built in\ngraphics card such as mine.
\nClose all open applications leaving only shortcut open this helps\nwith RAM usage
\nShortcut is surprisingly stable with a feeble PC such as mine. I\nwould still recommend saving your project regularly as it is quick and\nvery easy to do.
\nIf you get a message about running out of RAM then try not to do too\nmuch more editing before saving the project. Once saved close shotcut\nand then reopen it. The longer your project is and the higher your\nproject resolution the more RAM you will need.
\nWhen you are about to export your final video save the project close\nshortcut reopen shotcut and immediately export your project as any\nprevious editing may be taking up precious ram.
\nBe patient when clicking on the timeline to repositioned the play\nhead. Always wait for the preview window to update. This can sometimes\ntake a few seconds.
\nWhen trying to sync video to audio you need to zoom in in quite a\nlong way before getting an audio preview. When doing this and moving the\nplay head you\'ll get a choppy version of the audio with this it is still\nperfectly possible to find the beat of the music allowing you to sync\nyour video to the music. If this doesn\'t seem to work for you then try\nzooming in closer.
\nOk that\'s about it for this podcast. Hope it wasn\'t too boring and it\nmade some sense. If you want to contact me I can be contacted at\nmrxathpr at googlemail.
\nThank you and goodbye.
\n',201,0,0,'CC-BY-SA','workflow, tips, video, editing, application',0,0,1), (3719,'2022-11-03','HPR News',594,'InfoSec; the language of security.','First, authentication. This is the process of verifying the\nvalidity of something; in our case, user credentials/identity. The most\ncommon way to authenticate is: USERNAME and PASSWORD.\nThis is just a single layer (single-factor authentication) and isn’t\nenough to discourage attackers.
Second, 2FA (Two-factor Authentication). 2FA increases the\ndifficulty for attackers by providing users an additional layer of\nsecurity to accomplish authentication. Common 2FA methods are: TOTP/OTP\n(the One Time Password), Authenticator\nApplications (Bitwarden, KeePassXC,...), and Security Keys (Yubikey). This works similar to ATMs;\nto authenticate the user must provide both knowledge (account\nPIN) and a physical object (bank card).
Last, but not least, MFA (Multifactor Authentication). Similar to\n2FA, MFA offers users security with the addition of biometrics\n(fingerprint scan, retina scan, facial recognition, and voice\nrecognition). Attackers must overcome the knowledge factor, Possession\nfactor, Inherence/Biometric factor, Time factor, and sometimes Location\nfactor.
MORE helpful security information.
\n2FA/MFA Known Attacks.
\n\r\nInitially based on the podcast \"A Little Bit of Python\", by Michael Foord, Andrew Kuchling, Steve Holden, Dr. Brett Cannon and Jesse Noller. https://www.voidspace.org.uk/python/weblog/arch_d7_2009_12_19.shtml#e1138\r\n
\r\n\r\nNow the series is open to all.\r\n
',0,'',1), (42,'Bash Scripting','This is an open series in which Hacker Public Radio Listeners can share their Bash scripting knowledge and experience with the community. General programming topics and Bash commands are explored along with some tutorials for the complete novice.',0,'',1), @@ -408,4 +409,4 @@ UNLOCK TABLES; /*!40014 SET UNIQUE_CHECKS=@OLD_UNIQUE_CHECKS */; /*!40111 SET SQL_NOTES=@OLD_SQL_NOTES */; --- Dump completed on 2023-11-09 6:51:17 +-- Dump completed on 2023-11-10 8:15:58 diff --git a/sql/hpr.sql b/sql/hpr.sql index d40e782..e579eb6 100644 --- a/sql/hpr.sql +++ b/sql/hpr.sql @@ -12596,7 +12596,7 @@ CREATE TABLE `comments` ( `last_changed` datetime NOT NULL DEFAULT current_timestamp(), PRIMARY KEY (`id`), KEY `comments_eps_id_idx` (`eps_id`) -) ENGINE=MyISAM AUTO_INCREMENT=3825 DEFAULT CHARSET=utf8mb3 COLLATE=utf8mb3_unicode_ci COMMENT='New comments table populated from c5t_* tables'; +) ENGINE=MyISAM AUTO_INCREMENT=3826 DEFAULT CHARSET=utf8mb3 COLLATE=utf8mb3_unicode_ci COMMENT='New comments table populated from c5t_* tables'; /*!40101 SET character_set_client = @saved_cs_client */; -- @@ -16424,7 +16424,8 @@ INSERT INTO `comments` (`id`, `eps_id`, `comment_timestamp`, `comment_author_nam (3821,3941,'2023-10-24 20:22:01','Windigo','Great conversation','I thoroughly enjoyed this episode! The comedian you discussed is Hannah Gadsby; she\'s an autistic Australian comedian, and her stories about misreading social situations are one of my favorite bits of her comedy specials!\r\n\r\nAs for Reto\'s views on climate change... the global scientific consensus seems to disagree with you. They may not have checked for \"extra green\" and how heavy CO2 is, though. You might want to give scientists the heads-up before the waste any more time.','2023-10-24 20:54:13'), (3822,3971,'2023-10-28 22:48:22','kdmurray','Great Series','Really enjoying the series sgoti. I appreciate that you\'ve gone to the trouble of gathering people together to try to expand the number of voices for this topic and all the ancillary things as well like the role of the Internet in how people think about their offline relationships.','2023-10-29 10:25:45'), (3823,3978,'2023-11-05 18:50:42','Kevin O\'Brien','Good show','This was interesting and I enjoyed seeing the perspective of an operator. I have made it a practice to be courteous to truck drivers because they have enough weird stuff to deal with.','2023-11-05 19:06:21'), -(3824,3981,'2023-11-06 10:42:23','Hobson Lane (hobs)','Ken\'s comment about demand avoidance','Love the monthly Community News shows. Ken\'s comment about resisting the demands of his past self from reminders apps struck a chord with me. I\'ve been struggling with PDA (persistent/pathological demand avoidance) myself. I\'ll record a response show to summarize some things I\'ve learned from other podcasts that help boost my intrinsic motivation -- things like random rewards (to prevent external rewards from swamping your intrinsic motivation dopamine high). Dave\'s idea to use rituals and habits is also something that sometimes works for me. Rely admire the high quality open source technical infrastructure that keeps this community thriving and the supportive vibe of all the hosts and contributors. It gives me hope for the future of social media and the Internet.','2023-11-06 10:45:43'); +(3824,3981,'2023-11-06 10:42:23','Hobson Lane (hobs)','Ken\'s comment about demand avoidance','Love the monthly Community News shows. Ken\'s comment about resisting the demands of his past self from reminders apps struck a chord with me. I\'ve been struggling with PDA (persistent/pathological demand avoidance) myself. I\'ll record a response show to summarize some things I\'ve learned from other podcasts that help boost my intrinsic motivation -- things like random rewards (to prevent external rewards from swamping your intrinsic motivation dopamine high). Dave\'s idea to use rituals and habits is also something that sometimes works for me. Rely admire the high quality open source technical infrastructure that keeps this community thriving and the supportive vibe of all the hosts and contributors. It gives me hope for the future of social media and the Internet.','2023-11-06 10:45:43'), +(3825,3984,'2023-11-09 15:21:35','Trey','Really? You are sharing this with the world?','Dude! I thought we were keeping this on the down low? And you are naming names?\r\n\r\nNow I need to contact witness protection AGAIN!\r\n\r\nSMH...','2023-11-09 15:26:35'); /*!40000 ALTER TABLE `comments` ENABLE KEYS */; UNLOCK TABLES; /*!50003 SET @saved_cs_client = @@character_set_client */ ; @@ -20230,7 +20231,7 @@ INSERT INTO `eps` (`id`, `date`, `title`, `duration`, `summary`, `notes`, `hosti (3712,'2022-10-25','The last ever CCHits.net Show',5756,'The team talk about the nearly 12 years of producing CCHits.net.','Over 12 years ago, Jon \"The Nice Guy\"\nSpriggs went to a \"Pod Crawl\" with (among others) Dave \"The Love Bug\" Lee, where he\npitched the idea of a daily music promotion show, with a twist - it\nwould all be automated, and use text-to-speech to introduce\neverything.
\nThe first show was released\non 2010-10-24 and the last ever show (this one) was released on\n2022-10-12.
\nOver the twelve years, Jon would go on to meet to meet Yannick and Ken Fallon, both\nof whom would go on to shape changes (big and small) to CCHits.
\nThis year, the cracks started to re-appear in the architecture\nunderneath CCHits - between APIs shutting down that were used to load\ntracks to CCHits, and the general framework being used to write CCHits\nnot receiving the care and attention it needed... and the team finally\ndecided to stop adding new tracks, and let the process build the last\nfew shows.
\nThis podcast gives you a peek behind the curtain to the team involved\nin the system, and gives you some of the high- and low-lights in the 12\nyears the site ran for.
\n',413,0,0,'CC-BY','music,creative commons,podcast',0,0,1), (3724,'2022-11-10','My top Android apps',579,'I walk through the top apps on my phone','Connect to the home network
\nVim editor
Secure files
\nClear Scanner PDF scanner and\nOCR
\nStar Wars: Dark Tide I: Onslaught
\nThe New Jedi Order #2
\nBoba Fett: A Practical Man
\nUS Amateur Radio Band Plan
\n\r\n
\r\nMap of Dublin showing the Temple Bar tourist area. A red arrow points to where you can change the profile.\r\n
\r\n
\r\nWith the Configure Map > Profile selection menu open, a red square surrounds the Bus icon to indicate the \"public transport\" profile is now selected.\r\n
\r\n
\r\nThe map now opens to show more information about public transport is now displayed on the map. This is highlighted with a red square.
\r\nClicking the bustop (highlighted with a red circle ) will show more information about the routes available at this location.\r\n
\r\n
\r\nOnce the transport stop is selected, a list of all the routes that service this location are displayed. Along with other routes that are available within a short distance.\r\n
\r\n
\r\nClicking any of the routes numbers/names will give a zoomed out map showing in red the route many of the stops towards it\'s source and destination.\r\n
\nThere were no new hosts this month.\n
\n\nId | \nDay | \nDate | \nTitle | \nHost | \n
---|---|---|---|---|
3978 | \nWed | \n2023-11-01 | \nDriving in Virginia. | \nSome Guy On The Internet | \n
3979 | \nThu | \n2023-11-02 | \nFireStick and ad blocking | \noperat0r | \n
3980 | \nFri | \n2023-11-03 | \nHuntsville to Vicksburg | \nAhuka | \n
3981 | \nMon | \n2023-11-06 | \nHPR Community News for October 2023 | \nHPR Volunteers | \n
3982 | \nTue | \n2023-11-07 | \nConversation with ChatGPT | \nArcher72 | \n
3983 | \nWed | \n2023-11-08 | \nChatGPT Output is not compatible with CC-BY-SA | \nKen Fallon | \n
3984 | \nThu | \n2023-11-09 | \nWhoppers. How Archer72 and I made moonshine. Volume one. | \nSome Guy On The Internet | \n
3985 | \nFri | \n2023-11-10 | \nBash snippet - be careful when feeding data to loops | \nDave Morriss | \n
3990 | \nFri | \n2023-11-17 | \nPlaying Alpha Centauri, Part 2 | \nAhuka | \n
3991 | \nMon | \n2023-11-20 | \nYOU ARE A PIRATE | \noperat0r | \n
3992 | \nTue | \n2023-11-21 | \nTest recording on a wireless mic | \nArcher72 | \n
These are comments which have been made during the past month, either to shows released during the month or to past shows.\nThere are 2 comments in total.
\n\nThere are 2 comments on 2 of this month\'s shows:
\n\nPolicy decisions surrounding HPR are taken by the community as a whole. This\ndiscussion takes place on the Mail List which is open to all HPR listeners and\ncontributors. The discussions are open and available on the HPR server under\nMailman.\n
\nThe threaded discussions this month can be found here:
\nhttps://lists.hackerpublicradio.com/pipermail/hpr/2023-November/thread.html\n\n\nWith the kind permission of LWN.net we are linking to\nThe LWN.net Community Calendar.
\nQuoting the site:
\nThis is the LWN.net community event calendar, where we track\nevents of interest to people using and developing Linux and free software.\nClicking on individual events will take you to the appropriate web\npage.\n\n
Bulleted list item 1
Bulleted list item 2
\nThere were no new hosts this month.\n
\n\nId | \nDay | \nDate | \nTitle | \nHost | \n
---|---|---|---|---|
3978 | \nWed | \n2023-11-01 | \nDriving in Virginia. | \nSome Guy On The Internet | \n
3979 | \nThu | \n2023-11-02 | \nFireStick and ad blocking | \noperat0r | \n
3980 | \nFri | \n2023-11-03 | \nHuntsville to Vicksburg | \nAhuka | \n
3981 | \nMon | \n2023-11-06 | \nHPR Community News for October 2023 | \nHPR Volunteers | \n
3982 | \nTue | \n2023-11-07 | \nConversation with ChatGPT | \nArcher72 | \n
3983 | \nWed | \n2023-11-08 | \nChatGPT Output is not compatible with CC-BY-SA | \nKen Fallon | \n
3984 | \nThu | \n2023-11-09 | \nWhoppers. How Archer72 and I made moonshine. Volume one. | \nSome Guy On The Internet | \n
3985 | \nFri | \n2023-11-10 | \nBash snippet - be careful when feeding data to loops | \nDave Morriss | \n
3990 | \nFri | \n2023-11-17 | \nPlaying Alpha Centauri, Part 2 | \nAhuka | \n
3991 | \nMon | \n2023-11-20 | \nYOU ARE A PIRATE | \noperat0r | \n
3992 | \nTue | \n2023-11-21 | \nTest recording on a wireless mic | \nArcher72 | \n
These are comments which have been made during the past month, either to shows released during the month or to past shows.\nThere are 3 comments in total.
\n\nThere are 3 comments on 3 of this month\'s shows:
\n\nPolicy decisions surrounding HPR are taken by the community as a whole. This\ndiscussion takes place on the Mail List which is open to all HPR listeners and\ncontributors. The discussions are open and available on the HPR server under\nMailman.\n
\nThe threaded discussions this month can be found here:
\nhttps://lists.hackerpublicradio.com/pipermail/hpr/2023-November/thread.html\n\n\nWith the kind permission of LWN.net we are linking to\nThe LWN.net Community Calendar.
\nQuoting the site:
\nThis is the LWN.net community event calendar, where we track\nevents of interest to people using and developing Linux and free software.\nClicking on individual events will take you to the appropriate web\npage.\n\n
Bulleted list item 1
Bulleted list item 2
A previously undocumented command-and-control (C2) framework dubbed\nAlchimist is likely being used in the wild to target Windows, macOS, and\nLinux systems.
\n\"Alchimist C2 has a web interface written in Simplified Chinese and\ncan generate a configured payload, establish remote sessions, deploy\npayloads to the remote machines, capture screenshots, perform remote\nshellcode execution, and run arbitrary commands,\" Cisco Talos said in a\nreport shared with The Hacker News. Written in GoLang, Alchimist is\ncomplemented by a beacon implant called Insekt, which comes with remote\naccess features that can be instrumented by the C2 server.”
\n\"Since Alchimist is a single-file based ready-to-go C2 framework, it\nis difficult to attribute its use to a single actor such as the authors,\nAPTs, or crimeware syndicates.\"
\nThe trojan, for its part, is equipped with features typically present\nin backdoors of this kind, enabling the malware to get system\ninformation, capture screenshots, run arbitrary commands, and download\nremote files, among others.
\nAlchimist C2 panel further features the ability to generate first\nstage payloads, including PowerShell and wget code snippets for Windows\nand Linux, potentially allowing an attacker to flesh out their infection\nchains to distribute the Insekt RAT binary. The instructions could then\nbe potentially embedded in a maldoc attached to a phishing email that,\nwhen opened, downloads and launches the backdoor on the compromised\nmachine. What\'s more, the Linux version of Insekt is capable of listing\nthe contents of the \".ssh\" directory and even adding new SSH keys to the\n\"~/.ssh/authorized_keys\" file to facilitate remote access over SSH.
\nMalicious actors are resorting to voice phishing (vishing) tactics to\ndupe victims into installing Android malware on their devices.
\nThe Dutch mobile security company said it identified a network of\nphishing websites targeting Italian online-banking users that are\ndesigned to get hold of their contact details.
\nTelephone-oriented attack delivery (TOAD), as the social engineering\ntechnique is called, involves calling the victims using previously\ncollected information from the fraudulent websites.
\nThe caller, who purports to be a support agent for the bank,\ninstructs the individual on the other end of the call to install a\nsecurity app and grant it extensive permissions, when, in reality, it\'s\nmalicious software intended to gain remote access or conduct financial\nfraud.
\nWhat\'s more, the infrastructure utilized by the threat actor has been\nfound to deliver a second malware named SMS Spy that enables the\nadversary to gain access to all incoming SMS messages and intercept\none-time passwords (OTPs) sent by banks.
\nThe new wave of hybrid fraud attacks presents a new dimension for\nscammers to mount convincing Android malware campaigns that have\notherwise relied on traditional methods such as Google Play Store\ndroppers, rogue ads, and smishing.
\nFounded in 1992, Omnicell is a leading provider of medication\nmanagement solutions for hospitals, long-term care facilities, and\nretail pharmacies. On May 4, 2022, Omnicell\'s IT systems and third-party\ncloud services were affected by ransomware attacks which may lead to\ndata security concerns for employees and patients. While it is still\nearly in the investigation, this appears to be a severe breach with\npotentially significant consequences for the company.
\nOmnicell began informing individuals whose information may have been\ncompromised on August 3, 2022. Hackers may be able to access and sell\npatient-sensitive information, such as social security numbers, due to\nthe time delay between the breach and the company\'s report of affected\npatients.
\nThe type of information that may be exposed are:
\nThe healthcare industry is one of the most targeted sectors globally,\nwith attacks doubling year over year. And these costs are measured in\nmillions or even billions of dollars - not to mention increased risks\nfor patients\' privacy (and reputation).
\nRansomware gangs are taking Americans to school. So far this year,\nhackers have taken hostage at least 1,735 schools in 27 districts; the\nmassive Los Angeles Unified School District is their latest target.
\nRansomware hackers breach computers, lock them up, steal sensitive\ndata and demand money to release their hold on organizations’ critical\nsystems. These criminals often attack schools because they are\nprofitable targets. If all ransomware victims refused to pay, the\nattacks would stop. Indeed, paying up might be illegal: The Treasury\nDepartment released guidance last year noting that giving money to\nglobal criminal organizations can violate sanctions law.
\nThe trouble is, saying no isn’t always easy. Los Angeles didn’t\ncapitulate, and the criminals leaked a trove of data — a consequence\nthat can prove more or less serious depending on the sensitivity of the\nstolen information.
\n“Because we can,” said a representative of the ransomware gang that\ntook down Los Angeles Unified School District, explaining the\ncollective’s motivations to a Bloomberg News reporter. Schools’ task is\nto turn “can” to “can’t” — or, at least, to make success pay a whole lot\nless.
\nVerizon notified prepaid customers this week of a recent cyberattack\nthat granted third-party actors access to their accounts, as reported\nearlier Tuesday by BleepingComputer. The attack occurred between Oct. 6\nand Oct. 10 and affected 250 Verizon prepaid customers.
\nThe breach exposed the last four digits of customers\' credit cards\nused to make payments on their prepaid accounts. While no full credit\ncard information was accessible, the information was enough to grant the\nattackers access to Verizon user accounts, which hold semi-sensitive\ndata such \"name, telephone number, billing address, price plans, and\nother service-related information,\" per a notice from Verizon.
\nAccount access also potentially enabled attackers to process\nunauthorized SIM card changes on prepaid lines. Also known as SIM\nswapping, unauthorized SIM card changes can allow for the transfer of an\nunsuspecting person\'s phone number to another phone.
\nFrom there, the counterfeit phone can be used to receive SMS messages\nfor password resets and user identification verifications on other\naccounts, giving attackers potential access to any account they have, or\ncan guess, the username for. Consequently, Verizon recommended affected\ncustomers secure their non-Verizon accounts such as social media,\nfinancial, email and other accounts that allow for password resets by\nphone.
\n',391,0,0,'CC-BY-SA','Threat Analysis, Security Breach, Ransomware, Data Breach, TOAD',0,0,1), (3717,'2022-11-01','Video editing with Shotcut on a low end PC',695,'In this episode I explain how I use the shotcut video editor to edit video on a low end PC.','C = copy\nV = paste\nA = duplicate\nX = ripple delete\nCtrl + X = ripple delete but send to clipboard\nS = split
\nSplits are not fixed and can be adjusted. Once you\'ve split up clips\nand put them in the right order on the timeline you can still adjust the\ncut point even though you previously split the clip because the clip is\nreferenced to the original file in the playlist.
\nHello and welcome Hacker Public Radio audience my name is Mr X\nwelcome to this podcast. As per usual I\'d like to start by thanking the\npeople at HPR for making this podcast possible. HPR is a Community led\npodcast provided by the community for the community that means you can\ncontribute to. The HPR team have gone to great deal of effort to\nsimplify and streamline the process of providing podcasts. There are\nmany ways to record an episode these days using phones tablets PCs and\nalike. The hardest barrier is sending in your first show. Don\'t get too\nhung up about quality, it\'s more important just to send something in.\nThe sound quality of some of my early shows wasn\'t very good. If I can\ndo it anyone can and you might just get hooked in the process.
\nWell it\'s been almost a year since I\'ve sent in a show. Looking at\nthe HPR site my last episode was back in November 2021. I suspect like\nmany others life has become more complicated and I find I have much less\nspare time and because I have much less spare time I have much less time\nto pursue my hobbies and because of this I have less to speak about and\nbecause of this I have less time to record what I\'ve been doing and it\nall turns into to vicious circle. Fortunately I recently had some time\noff work and had a lovely holiday. During the holiday I ended up\nrecording some video which I decided I wanted to edit. I\'ve done some\nvideo editing in the past using various video editing packages. The best\nand most recent of which is shotcut.
\nVideo resolution 1920 x 1080, Codec h264 mpeg-4, Frame rate 30 frames\nper second.
\nComputer Dell Optiplex 780. Fitted with 4 GB of internal RAM and\nonboard video graphics card.
\nShotcut version 22.06.23 Shotcut is a free open-source cross-platform\nvideo editor licenced under the GNU general public licence version\n3.0
\nThis episode will only cover basic shotcut video editing techniques.\nShotcut contains many advanced features and effects that will not be\ncovered in this episode. A lot of the workflow I’ll share with you today\nis intended to get around limitations imposed by my low spec PC
\nI\'ll try my best to cover the video editing process in this podcast\nusing words alone; however I am conscious that an accompanying video\nwould make it easier to follow along.
\nStart by creating a folder to hold all the required media files.\nAudio tracks and sound effects can be added to this folder later. Make\nsure all your video files are using the same frame rate in my case 30\nframes per second.
\nOpen each video file in VLC one at a time going through each video\nfile looking for the best portions of video. Make a note of where the\nbest portions of the video are by writing down the start and end points\nin minutes and seconds.
\nI do this because the interface of VLC is more responsive than\nshortcut and the resolution of displayed video is far greater than the\npreview in shortcut. This makes it quicker and easier to find the best\nportions of video.
\nOpen shortcut and make sure the new project is set to the same frames\nper second as the media files you\'re working with, in my case 30 frames\nper second. You can check the frame rate of your project by looking at\nthe selected video mode in the new projects window. If you select\nautomatic it will ensure the project resolution and frame rate\nautomatically match that of your media files.
\nStart by adding all the video files to the playlist, this can be done\nin a number of ways for example it can be done by clicking on the open\nfile button in the top toolbar or within the open files menu.\nAlternatively you can drag and drop files into the playlist. I find this\nto be the easiest way to add media files to a project. Once this is done\nsave your project.
\nDrag the first file from the Playlist to the timeline making sure\nthat the start of the video starts at 0 seconds.
\nClick on the timeline in the position where the first start point of\ninterest is needed. Use the S key to split the video at this point.\nDon\'t worry about being too accurate as this can be moved at a later\nstage.
\nRepeat this process for the end point of interest.
\nRepeat this again for all the other sections of start and end points\nof interest.
\nRemove the unwanted sections of video by clicking on a section then\nhitting the delete key. This will remove the unwanted section leaving an\nempty space behind.
\nOnce all the unwanted sections are removed click on the sections of\nvideo and pull them to the left to close the gaps up. I find it useful\nto leave some space between the good sections of video as it makes it\neasier to see where splits are and makes it easier later on to rearrange\nthe order of the individual clips.
\nCheck the start and end points of the remaining sections of video to\nsee that the start and end points stop in the correct place. You can do\nthis by clicking the play button on the preview window. The video start\nand end points can be adjusted by dragging the section left or right in\nin the timeline section; this is where leaving spaces Between each\nsection of video can be handy as it allows for fine tuning.
\nAdd a new blank video track to the timeline to hold the next video.\nNote this wasn\'t required when adding the first video track but it is\nneeded for each subsequent track. A video track can be added by right\nclicking on an empty portion of the timeline and selecting add video\ntrack. Alternatively use the ctrl + I key.
\nDrag your second video from the playlist onto the newly created blank\nvideo track in the timeline. As before make sure that the start of the\nvideo starts at 0 seconds.
\nBefore previewing any section of the second video track click the\nsmall eye shaped hide icon in the left section of the first video track\nlabelled output. This will prevent previewing both video tracks at the\nsame time.
\nRepeat the process above of chopping the second video track into\nsections using the S key to split the video up. Remove the unwanted\nsections. Finally adjust the start and end points of the remaining\nsections.
\nRepeat the steps above to add the remaining video files one at a time\nfrom the playlist to the timeline.
\nWhen complete you end up with separate video tracks in the timeline\neach containing good sections of video.
\nAt this stage I can\'t be too specific about how to continue as there\nare a number of different options depending on your particular Project.\nYou can for example start by combining the good sections of video into\none video track by dragging them from one track to another then add if\nrequired an audio track or you can add the audio track first and then\ntry to sync things up to the audio track moving bits and pieces of video\ninto one video track remembering to hide the unwanted sections of video\nby clicking on the small hide eye icons. Don\'t do too much editing\nwithout saving the project. If you get a message about low memory save\nthe project then reopen it.
\nTo export the final video click on the export button in the toolbar.\nI pick the default option, this creates an H.264/AAC MP4 file suitable\nfor most users and purposes. You can check the frame rate is the same as\nyour original media files by clicking on the advanced tab. Click the\nexport file button and give it a file name. It may take some time to\ncreate the export file. This will be dependent on the speed of your\ncomputer and the length and resolution of your project.
\nWhile Shotcut is far from perfect on my puny PC it is surprisingly\nusable and stable and is the best option I’ve found so far.
\nFinally here are some general shotcut tips I have when doing video\nediting on a puny PC with limited ram, slow processor and built in\ngraphics card such as mine.
\nClose all open applications leaving only shortcut open this helps\nwith RAM usage
\nShortcut is surprisingly stable with a feeble PC such as mine. I\nwould still recommend saving your project regularly as it is quick and\nvery easy to do.
\nIf you get a message about running out of RAM then try not to do too\nmuch more editing before saving the project. Once saved close shotcut\nand then reopen it. The longer your project is and the higher your\nproject resolution the more RAM you will need.
\nWhen you are about to export your final video save the project close\nshortcut reopen shotcut and immediately export your project as any\nprevious editing may be taking up precious ram.
\nBe patient when clicking on the timeline to repositioned the play\nhead. Always wait for the preview window to update. This can sometimes\ntake a few seconds.
\nWhen trying to sync video to audio you need to zoom in in quite a\nlong way before getting an audio preview. When doing this and moving the\nplay head you\'ll get a choppy version of the audio with this it is still\nperfectly possible to find the beat of the music allowing you to sync\nyour video to the music. If this doesn\'t seem to work for you then try\nzooming in closer.
\nOk that\'s about it for this podcast. Hope it wasn\'t too boring and it\nmade some sense. If you want to contact me I can be contacted at\nmrxathpr at googlemail.
\nThank you and goodbye.
\n',201,0,0,'CC-BY-SA','workflow, tips, video, editing, application',0,0,1), (3719,'2022-11-03','HPR News',594,'InfoSec; the language of security.','First, authentication. This is the process of verifying the\nvalidity of something; in our case, user credentials/identity. The most\ncommon way to authenticate is: USERNAME and PASSWORD.\nThis is just a single layer (single-factor authentication) and isn’t\nenough to discourage attackers.
Second, 2FA (Two-factor Authentication). 2FA increases the\ndifficulty for attackers by providing users an additional layer of\nsecurity to accomplish authentication. Common 2FA methods are: TOTP/OTP\n(the One Time Password), Authenticator\nApplications (Bitwarden, KeePassXC,...), and Security Keys (Yubikey). This works similar to ATMs;\nto authenticate the user must provide both knowledge (account\nPIN) and a physical object (bank card).
Last, but not least, MFA (Multifactor Authentication). Similar to\n2FA, MFA offers users security with the addition of biometrics\n(fingerprint scan, retina scan, facial recognition, and voice\nrecognition). Attackers must overcome the knowledge factor, Possession\nfactor, Inherence/Biometric factor, Time factor, and sometimes Location\nfactor.
MORE helpful security information.
\n2FA/MFA Known Attacks.
\n