From fa00ae9db72f0fc0a818608e9ff1198132ab725e Mon Sep 17 00:00:00 2001 From: Ken Fallon Date: Thu, 23 Nov 2023 06:11:40 +0100 Subject: [PATCH] 2023-11-23_05-11-40Z_Thursday database changed --- sql/hpr-db-part-0c.sql | 14 +++++++------- sql/hpr-db-part-0d.sql | 12 ++++++------ sql/hpr-db-part-0e.sql | 12 ++++++------ sql/hpr-db-part-0f.sql | 12 ++++++------ sql/hpr-db-part-10.sql | 12 ++++++------ sql/hpr-db-part-11.sql | 12 ++++++------ sql/hpr-db-part-12.sql | 12 ++++++------ sql/hpr-db-part-13.sql | 12 ++++++------ sql/hpr-db-part-14.sql | 14 +++++++------- sql/hpr-db-part-15.sql | 8 +++++++- sql/hpr.sql | 12 +++++++++--- 11 files changed, 72 insertions(+), 60 deletions(-) diff --git a/sql/hpr-db-part-0c.sql b/sql/hpr-db-part-0c.sql index 442f32e..1983ed2 100644 --- a/sql/hpr-db-part-0c.sql +++ b/sql/hpr-db-part-0c.sql @@ -641,7 +641,13 @@ (4006,'hpr4006.spx','spx',909921,'3a61ab30e756ce5d1c33970eced6169cde9ee8c5','audio/ogg; charset=binary','setgid Ogg data, Speex audio'), (4006,'hpr4006.flac','flac',19101167,'64b13a3f4060e4dec63b6b7f7fee8be0ca0e2fd1','audio/flac; charset=binary','setgid FLAC audio bitstream data, 16 bit, mono, 192 kHz, 46243858 samples'), (4006,'hpr4006.opus','opus',2124972,'817c11021caf97869d3fa6e778168ca7a4d97071','audio/ogg; charset=binary','setgid Ogg data, Opus audio,'), -(4006,'hpr4006.wav','wav',92487818,'d457cc79a14ceaa1fdf818603e729bd182f4563a','audio/x-wav; charset=binary','setgid RIFF (little-endian) data, WAVE audio, mono 192000 Hz'); +(4006,'hpr4006.wav','wav',92487818,'d457cc79a14ceaa1fdf818603e729bd182f4563a','audio/x-wav; charset=binary','setgid RIFF (little-endian) data, WAVE audio, mono 192000 Hz'), +(4005,'hpr4005.mp3','mp3',7794476,'16aa67ee2f5daff091d9eb50e10d583b4866d6b3','audio/mpeg; charset=binary','setgid Audio file with ID3 version 2.4.0, contains:MPEG ADTS, layer III, v1, 64 kbps, 48 kHz, Monaural'), +(4005,'hpr4005.ogg','ogg',9047916,'14499bc44163d3641faa3a4e232f2c1dea4420cf','audio/ogg; charset=binary','setgid Ogg data, Opus audio,'), +(4005,'hpr4005.spx','spx',3679989,'f2558f723a16ad5032721594bbd7cbf7f3256c57','audio/ogg; charset=binary','setgid Ogg data, Speex audio'), +(4005,'hpr4005.flac','flac',74471548,'0252c0250691eac54a5fccd897ce3474a07e67de','audio/flac; charset=binary','setgid FLAC audio bitstream data, 16 bit, mono, 192 kHz, 187056031 samples'), +(4005,'hpr4005.opus','opus',9047916,'09e4d148aca52fb63a7ce69ed1fc4dd6cc3e5c1e','audio/ogg; charset=binary','setgid Ogg data, Opus audio,'), +(4005,'hpr4005.wav','wav',374112164,'387a5b0e00d3186dfc866a164ddcc3fdb0ea1e11','audio/x-wav; charset=binary','setgid RIFF (little-endian) data, WAVE audio, mono 192000 Hz'); /*!40000 ALTER TABLE `assets` ENABLE KEYS */; UNLOCK TABLES; @@ -992,9 +998,3 @@ INSERT INTO `comments` (`id`, `eps_id`, `comment_timestamp`, `comment_author_nam (319,818,'2011-10-02 18:03:49','Fragilematter','Workarounds','Hey guys/Pokey! Sorry for joining the party so late, but I\'ve been behind on my podcasts lately.\r\nI\'ll get down to the subject, and that can be resumed in one acronim: R(F)TM. Rockbox is a complex piece of software and a lot of its functionality isn\'t obvious.\r\nFor instance, to lock the keys on the clip you need to press both the middle button (select) and home at the same time, while you are playing a song (rockbox devs name that the WPS - while playing screen). Also, if you are somewhere in the menus and you want to return to the wps you use the same key combo - home + select.\r\nAlso, at least on my Sansa e200, you can have it charge from a computer without accessing the disk by holding select while you plug in the usb cable. I don\'t know if it\'s the same for the Clip Plus.\r\nAs a closing note, if I recall correctly, the Clip Plus is still under development, especially the usb side of things, so you can expect improvements with each new release (unless you\'re using the current build, like I do).\r\n\r\nHere\'s hoping you have a nice day,\r\nFragilematter','2017-09-09 07:41:22'), (320,818,'2011-10-03 05:52:49','sgtron','Thanks','Fragilematter, thanks for the reply and I\'ll try the current release to see what I think of that too.. I see the rockbox stable builds are released quarterly and the current one was just last month, so months to go before next release. ','2017-09-09 07:41:22'), (321,818,'2011-10-10 16:13:26','lostnbronx','Your Idea Works','Pokey, a few years ago, I glued two paint-stirrers together to make a handle; cut the handle to size, sanded it down, and painted it. Then I put Velcro on one end and Velcro on the acrylic case that I have my Fuze in, and stuck it on. I hold the earbud cable to the handle with an elastic. The Fuze has has never fallen off by accident. \r\n\r\nThis is perfect for recording, and even general use, and the Velcro/handle combo helps to cut down on handling noise. The only change I\'d make now is that I should have stained the handle instead of painting it, as the paint began to wear badly almost immediately.','2017-09-09 07:41:22'), -(322,818,'2011-10-26 15:13:39','pokey','Thanks for the feedback guys','Those are all great suggestions. I may need to use the velcro one, as i broke the clip off of my clip. \r\n\r\nThe lock screen function is a new one to me. I\'ll have to try it.\r\n\r\nYes you can charge the Clip without it booting into the stock firmware if it\'s powered on in Rockbox. That\'s how I charge it.','2017-09-09 07:41:22'), -(323,820,'2011-09-24 03:50:08','DeepGeek','A Big-Name server you may not have considered','Hi, Klaatu,\r\nLoved the podcast. Your idea of urging listeners to try different servers was great, but your choices of nginx, apache, and lighttpd seemed to indicate an interest in \"big name\" webservers.\r\nI thought you might want to consider something else \"big name.\" Did you know that the webserver that powers AOL, aolserver4, is an open-source project? Check out aolserver.com. They boast not of some obscure benchmark, but rather of extreme scalability and a huge number of languages embedded and multiple API\'s, and multiple database platform support.\r\nI haven\'t tired it myself, but I thought you\'d like to know...\r\n---\r\nDeepGeek','2017-09-09 07:41:22'), -(324,820,'2011-09-26 02:43:53','klaatu','aolserver','well let\'s wait for AOL to prove themselves before we go jumping to adopt their server. I\'ve personally not heard of them but I\'ll keep an eye out.','2017-09-09 07:41:22'), -(325,820,'2011-10-04 12:34:23','klaatu','ADDENDUM','It was brought to my attention that I say something like \"it\'s better to have your server doing things like DHCP than to let your router handle it\"\r\n\r\nWhat I meant to say was...\r\n\"it\'s better FOR ME to have my server to DHCP and stuff than to let some little under-powered router do it\" -- but of course your network will be different from mine, with different needs and different loads and all that...so for you, it might make sense for you to just let your router handle DHCP.\r\n\r\nIf you have questions of course you can always email me and I\'ll answer whatever I can. klaatu-at-goListenToGnuWorldOrderOggcastForMyEmailAddress.com','2017-09-09 07:41:22'), -(326,820,'2011-10-05 21:14:50','Philip Durbin','sites-enabled, sites-available','Being a Red Hat guy, I hadn\'t heard of Debian\'s sites-enabled, sites-available convention, but I found some more about it here: https://www.control-escape.com/web/configuring-apache2-debian.html\r\n\r\nOn Red Hat systems, you could keep your VirtualHost config in /etc/httpd/conf.d/com_mysite_www.conf and disable it by changing the name to /etc/httpd/conf.d/com_mysite_www.conf.disabled. *.conf files in /etc/httpd/conf.d are included by default, as described here: https://www.cyberciti.biz/faq/howto-disable-apache-modules-under-linux-unix/','2022-02-14 13:15:35'), -(327,820,'2011-10-06 13:07:52','klaatu','nice tip','Thanks for the tip. It has just so happened that I haven\'t really run that many web servers on RHEL or Fedora. I\'d like to do more but as long as I keep inheriting powerPC boxen I imagine it will continue to be Debian-based servers (thank you Debian!)\r\n\r\nBut I like this tip, so thanks.\r\n\r\nBTW if anyone is messing around with Drupal on a Fedora server, there\'s a nifty rpm, i think called drupal7, which centralizes the core drupal stuff into /usr/shared/ and allows you to symlink stuff in /var/www to point to the drupal sites. Really fun stuff.\r\n\r\n\r\n','2017-09-09 07:41:22'), diff --git a/sql/hpr-db-part-0d.sql b/sql/hpr-db-part-0d.sql index 13c1883..339d042 100644 --- a/sql/hpr-db-part-0d.sql +++ b/sql/hpr-db-part-0d.sql @@ -1,3 +1,9 @@ +(322,818,'2011-10-26 15:13:39','pokey','Thanks for the feedback guys','Those are all great suggestions. I may need to use the velcro one, as i broke the clip off of my clip. \r\n\r\nThe lock screen function is a new one to me. I\'ll have to try it.\r\n\r\nYes you can charge the Clip without it booting into the stock firmware if it\'s powered on in Rockbox. That\'s how I charge it.','2017-09-09 07:41:22'), +(323,820,'2011-09-24 03:50:08','DeepGeek','A Big-Name server you may not have considered','Hi, Klaatu,\r\nLoved the podcast. Your idea of urging listeners to try different servers was great, but your choices of nginx, apache, and lighttpd seemed to indicate an interest in \"big name\" webservers.\r\nI thought you might want to consider something else \"big name.\" Did you know that the webserver that powers AOL, aolserver4, is an open-source project? Check out aolserver.com. They boast not of some obscure benchmark, but rather of extreme scalability and a huge number of languages embedded and multiple API\'s, and multiple database platform support.\r\nI haven\'t tired it myself, but I thought you\'d like to know...\r\n---\r\nDeepGeek','2017-09-09 07:41:22'), +(324,820,'2011-09-26 02:43:53','klaatu','aolserver','well let\'s wait for AOL to prove themselves before we go jumping to adopt their server. I\'ve personally not heard of them but I\'ll keep an eye out.','2017-09-09 07:41:22'), +(325,820,'2011-10-04 12:34:23','klaatu','ADDENDUM','It was brought to my attention that I say something like \"it\'s better to have your server doing things like DHCP than to let your router handle it\"\r\n\r\nWhat I meant to say was...\r\n\"it\'s better FOR ME to have my server to DHCP and stuff than to let some little under-powered router do it\" -- but of course your network will be different from mine, with different needs and different loads and all that...so for you, it might make sense for you to just let your router handle DHCP.\r\n\r\nIf you have questions of course you can always email me and I\'ll answer whatever I can. klaatu-at-goListenToGnuWorldOrderOggcastForMyEmailAddress.com','2017-09-09 07:41:22'), +(326,820,'2011-10-05 21:14:50','Philip Durbin','sites-enabled, sites-available','Being a Red Hat guy, I hadn\'t heard of Debian\'s sites-enabled, sites-available convention, but I found some more about it here: https://www.control-escape.com/web/configuring-apache2-debian.html\r\n\r\nOn Red Hat systems, you could keep your VirtualHost config in /etc/httpd/conf.d/com_mysite_www.conf and disable it by changing the name to /etc/httpd/conf.d/com_mysite_www.conf.disabled. *.conf files in /etc/httpd/conf.d are included by default, as described here: https://www.cyberciti.biz/faq/howto-disable-apache-modules-under-linux-unix/','2022-02-14 13:15:35'), +(327,820,'2011-10-06 13:07:52','klaatu','nice tip','Thanks for the tip. It has just so happened that I haven\'t really run that many web servers on RHEL or Fedora. I\'d like to do more but as long as I keep inheriting powerPC boxen I imagine it will continue to be Debian-based servers (thank you Debian!)\r\n\r\nBut I like this tip, so thanks.\r\n\r\nBTW if anyone is messing around with Drupal on a Fedora server, there\'s a nifty rpm, i think called drupal7, which centralizes the core drupal stuff into /usr/shared/ and allows you to symlink stuff in /var/www to point to the drupal sites. Really fun stuff.\r\n\r\n\r\n','2017-09-09 07:41:22'), (328,821,'2011-09-26 21:16:28','TheL0grus','','This has to be one of the worst reviews I have ever heard. I am typing this on my Acre a500 tablet. I spent a lot of time researching the tablet I wanted before I purchased one which the reviewer clearly didn\'t do. My first choice is this one ','2017-09-09 07:41:22'), (329,821,'2011-09-28 16:46:37','Brad','Amazon Kindle Fire','I\'m excited to say that Amazon has their \'Android\' Kindle Fire tablet available for pre-order. I found out about it while listening to your tablet rant, and thought it would make a good update. \r\n\r\nThanks for all the content Mr. Gadget, keep up the good work!','2017-09-09 07:41:22'), (330,821,'2011-09-29 02:09:27','John','I agree... ','This is a copy of a post I made a while back about Android stuff...\r\nJohn Zimm - Aug 22, 2011 - Limited\r\n\"This is my response to Bryan on LAS and his ideas on HP and Linux ect.. I am a newbie to Linux. I have completely switched over to it. So, here I am enjoying my old HP desktop with Pentium 4. Then I learn about the bearded dude, and I loved what he is saying about GNU. So I started to feel like this whole Linux thing isn’t fake and is not lying to me. That is important. For example, I got made when I heard new ideas were formulated and High schools did not teach me these new things because they were not what we had been taught in the past… no flexibility, no courage and no respect for us to change the school books to reflect how history really looked or what led up to it. Or how we are animals ect. ect. You get the picture. So, now, after watching LAS and listening to other shows, I am interested in paying the data plan (for the first time) and getting a smart phone. So, I was really confused when I heard everyone talk about Android this and Android that. I don’t give a shit about a cheap knock-off of Linux, or something that runs Linux in the background, or how ever you say it. I wanted to stick with what I just learned… LINUX. Everyone was talking about how flexible and scalable Linux is, but I can’t have it on my phone? So, I moved on. I started to get interested in tablets… HOLLY SHIT, THOSE RUN THAT STUPID ANDROID, FAKE LINUX TOO. Remember, I am a newbie, so I don’t have a sense of where things in Linux came from or started, or how great Android is. Sorry if I don’t appreciate Android. But let\'s get real, The big company Google, didn\'t fit into my new found ideals. But, I want my Mint 11 on a tablet. Is that to much to ask for. I hate that I am not smart. I am just a geek-wanna-be. I hate that I can’t pick one device at a time, (phone or tablet) and make Mint 11 run on it, then upload an iso for everyone to use. So, when I heard Bryan say that about how we should not be relying on other OSs that can be pulled after 46 days… I am totally , totally totally, on board. I do have other skills, and maybe I can help in some way. Let’s get this BITCH rolling. When I used to daydream about this, I came up with naming the device that I was going to invent… wait for it… “L”. And after watching the LAS show, I came up with calling the distro, “GLD”, for GNU Linux Debian. PS,as I am about to hit share, I see a post below my,that says, \"Touchdroid, Android for HP Touchpad Project Started\". Why not Linux, for HP Touchpad project??????????????????????????\"','2017-09-09 07:41:22'), @@ -992,9 +998,3 @@ (1316,1881,'2015-10-19 20:24:03','Fin','Music fail','Why did the default theme play at the end, when clacke\'s a capella version was so good!\r\n\r\nInteresting journey BTW. The audio wasn\'t that bad.','2017-09-09 07:41:28'), (1317,1881,'2015-10-23 16:00:35','Dave Morriss','Great episode','This was a very interesting show. I knew very little of what you spoke about, never having had an Amiga, nor having used dial-up with Linux. Thanks for the insight.','2017-09-09 07:41:28'), (1318,1881,'2015-10-26 11:35:10','clacke','Thanks','Cool! Glad I added something new. I was worried that yet another Linux backstory might be redundant, but I guess everyone comes from their own direction.','2017-09-09 07:41:28'), -(1319,1884,'2015-10-27 19:07:10','Frank','','Thank you, Dave. A very nice piece of work.\r\n\r\nI\'ve been trying to understand regular expressions (I guess because I like puzzles). In addition to giving me a better understanding of bash, the examples you gave show similarity with some regular expression syntax, which in turn gives some context to regular expression syntax, so that it does not seem to be quite so foreign a language.\r\n','2017-09-09 07:41:28'), -(1320,1884,'2015-10-27 19:49:37','Dave Morriss','Thanks Frank, glad you enjoyed it','The regular expression subject is a complex one. I\'ve been wondering whether I should try and pass on what I know about it. \r\n\r\nStrictly this brace expansion topic is in the area of using patterns to match filenames. Confusingly this is similar but not the same as regular expressions. In later episodes in this (not-)series I want to talk more about filename matching then look at regular expressions in the context of Bash.\r\n\r\nReally, the regular expression subject could (should?) be stand-alone and should look at what\'s available in Bash, grep, sed, awk, etc. I use Perl regular expresions the most but I hesitate to go too deep there because they are mind-blowing :-)','2017-09-09 07:41:28'), -(1321,1884,'2015-10-28 22:01:14','Frank','','Indeed regular expressions are complex. They make my brain hurt.\r\n\r\nSeeing some kinship with shell commands--some indication that whoever perpetrated regex did not just make it up from the whole cloth--is somehow comforting.\r\n\r\nI recently stumbled over a great *beginner\'s* tutorial.\r\nhttps://www.digitalocean.com/community/tutorials/using-grep-regular-expressions-to-search-for-text-patterns-in-linux#basic-usage\r\n\r\nWhat makes it so good is that it uses the GPL text found on every Linux computer for the exercises, so you can practice the examples and try different options as you read along.','2017-09-09 07:41:28'), -(1322,1884,'2015-10-29 11:44:38','Dave Morriss','Regular expressions','I skimmed through that tutorial, and it looks very good. Thanks for the pointer.','2017-09-09 07:41:28'), -(1323,1887,'2015-11-08 21:50:51','Bob Jonkman','Aerating boiling water','Hi JustMe: You mention that boiling the water will aerate it. Actually, just the opposite is true: Heating the water drives out the dissolved air, since gases are more soluble in cold liquid than hot liquid. Think of a carbonated soda, which is bubbly when it comes out of the fridge, but goes flat as it warms up.\r\n\r\nThe bubbles you see in water at a roiling boil is actually water vapour, the water itself turned to gas. If this gas cools it just becomes liquid water again. When you let boiled water cool down to drinking temperature it has a peculiar flat taste, which I think is because it has less dissolved air than fresh water from a mountain stream. If you vigorously stir previously boiled water with a whisk it\'ll re-aerate it, and remove some of that peculiar flat taste.\r\n\r\nThanx for the episode!\r\n\r\n--Bob, who needs to record his own HPR episode','2017-09-09 07:41:28'), -(1324,1889,'2015-10-30 05:48:08','GNULinuxRTM','Execellent Episode.','Just listened while walking the Dog, on a cloudy, spooky night days before Halloween.\r\n\r\nLoved the delivery and working in all the HPR references.\r\n\r\nNow I gotta learn more about the meegopad T-02.','2017-09-09 07:41:28'), diff --git a/sql/hpr-db-part-0e.sql b/sql/hpr-db-part-0e.sql index 7295e41..91edb6e 100644 --- a/sql/hpr-db-part-0e.sql +++ b/sql/hpr-db-part-0e.sql @@ -1,3 +1,9 @@ +(1319,1884,'2015-10-27 19:07:10','Frank','','Thank you, Dave. A very nice piece of work.\r\n\r\nI\'ve been trying to understand regular expressions (I guess because I like puzzles). In addition to giving me a better understanding of bash, the examples you gave show similarity with some regular expression syntax, which in turn gives some context to regular expression syntax, so that it does not seem to be quite so foreign a language.\r\n','2017-09-09 07:41:28'), +(1320,1884,'2015-10-27 19:49:37','Dave Morriss','Thanks Frank, glad you enjoyed it','The regular expression subject is a complex one. I\'ve been wondering whether I should try and pass on what I know about it. \r\n\r\nStrictly this brace expansion topic is in the area of using patterns to match filenames. Confusingly this is similar but not the same as regular expressions. In later episodes in this (not-)series I want to talk more about filename matching then look at regular expressions in the context of Bash.\r\n\r\nReally, the regular expression subject could (should?) be stand-alone and should look at what\'s available in Bash, grep, sed, awk, etc. I use Perl regular expresions the most but I hesitate to go too deep there because they are mind-blowing :-)','2017-09-09 07:41:28'), +(1321,1884,'2015-10-28 22:01:14','Frank','','Indeed regular expressions are complex. They make my brain hurt.\r\n\r\nSeeing some kinship with shell commands--some indication that whoever perpetrated regex did not just make it up from the whole cloth--is somehow comforting.\r\n\r\nI recently stumbled over a great *beginner\'s* tutorial.\r\nhttps://www.digitalocean.com/community/tutorials/using-grep-regular-expressions-to-search-for-text-patterns-in-linux#basic-usage\r\n\r\nWhat makes it so good is that it uses the GPL text found on every Linux computer for the exercises, so you can practice the examples and try different options as you read along.','2017-09-09 07:41:28'), +(1322,1884,'2015-10-29 11:44:38','Dave Morriss','Regular expressions','I skimmed through that tutorial, and it looks very good. Thanks for the pointer.','2017-09-09 07:41:28'), +(1323,1887,'2015-11-08 21:50:51','Bob Jonkman','Aerating boiling water','Hi JustMe: You mention that boiling the water will aerate it. Actually, just the opposite is true: Heating the water drives out the dissolved air, since gases are more soluble in cold liquid than hot liquid. Think of a carbonated soda, which is bubbly when it comes out of the fridge, but goes flat as it warms up.\r\n\r\nThe bubbles you see in water at a roiling boil is actually water vapour, the water itself turned to gas. If this gas cools it just becomes liquid water again. When you let boiled water cool down to drinking temperature it has a peculiar flat taste, which I think is because it has less dissolved air than fresh water from a mountain stream. If you vigorously stir previously boiled water with a whisk it\'ll re-aerate it, and remove some of that peculiar flat taste.\r\n\r\nThanx for the episode!\r\n\r\n--Bob, who needs to record his own HPR episode','2017-09-09 07:41:28'), +(1324,1889,'2015-10-30 05:48:08','GNULinuxRTM','Execellent Episode.','Just listened while walking the Dog, on a cloudy, spooky night days before Halloween.\r\n\r\nLoved the delivery and working in all the HPR references.\r\n\r\nNow I gotta learn more about the meegopad T-02.','2017-09-09 07:41:28'), (1325,1889,'2015-10-30 10:38:34','Jon Kulp ','Tremendous! ','Loved it! The HPR answer to Guy Noir, Private Eye. Looking forward to the follow-up. Nice work! ','2017-09-09 07:41:28'), (1326,1889,'2015-10-30 12:35:52','Fin','Fantastic!','Fantastic production quality! More of the same please!','2017-09-09 07:41:28'), (1327,1889,'2015-10-31 08:01:32','A Shadowy Figure','Like your work as well GNULinuxRTM',' Gotta admit, I\'ve never seen RTM without the other letter following the \"T\". \r\nThe Meegopad T-02 doesn\'t quit fulfill it\'s promises, but can be useful for limited purposes.\r\nI\'d wait to hear my follow up episode, before thinking seriously about owning one.\r\n\r\n Btw, I enjoy your delightfully cheesy transitions on your show.\r\nGood job over all. \r\n\r\n\r\n May stochasticity fall in your favor,\r\n\r\nA Shadowy Figure','2017-09-09 07:41:28'), @@ -992,9 +998,3 @@ INSERT INTO `comments` (`id`, `eps_id`, `comment_timestamp`, `comment_author_nam (2316,2482,'2018-02-06 00:35:08','Clinton Roy','How on earth did I do that? :(','I\'ve somehow managed to upload both interviews in the one show :(\r\n\r\nI haven\'t even edited the second interview yet.','2018-02-06 07:42:54'), (2317,2489,'2018-02-15 19:18:06','Ken Fallon','Bin there done that. (Deliberate typo Dave)','1. Yes you describe why I hate forums.\r\n2. Why did you not record a show describing the peoblem? I know several hosts that have ffmpeg foo. We have the exact same needs for hpr itself','2018-02-15 19:44:39'), (2318,2482,'2018-02-18 07:17:13','Clinton Roy','Thank you to the admins','I would just like to publicly say thank you to the admins to fixed my mistake, in a way that will force them to read it aloud ;)','2018-02-18 09:54:50'), -(2319,2492,'2018-02-20 00:30:09','Clinton Roy','Swapping in..','It\'s been many a year since I was in Canada: are these the rubber wheeled ones?','2018-02-20 08:34:34'), -(2320,2488,'2018-02-20 05:40:00','Windigo','Welcome','Quite a topic for a first episode!\r\n\r\nI enjoyed it, and look forward to your next submission. :)','2018-02-20 08:34:34'), -(2321,2477,'2018-02-20 06:15:08','Windigo','Also distractable','Thanks for the tip! I am also very distract-able, and find myself rewinding HPR episodes constantly to catch what I just missed. I tried looping an episode (this one, in fact) and saw a real difference in what I remembered.\r\n\r\nI was curious about the roosters, but didn\'t mind them too much. Perhaps just list them as a co-host next time? ;)','2018-02-20 08:34:34'), -(2322,2492,'2018-02-20 12:13:39','RWA','hpr2492 :: An Evening Subway Ride','I recently moved to Atlanta, GA USA and it had been years since I used the local subway. Here they call it MARTA - Metropolitan Atlanta Rapid Transit Authority. It is a combination of subways and buses. This past weekend I decided to give MARTA a try. The Toronto subway sounds just like the Atlanta subway and no I didn\'t fall asleep. I rode the subway for three hours and only saw one person asleep.','2018-02-20 12:42:29'), -(2323,2492,'2018-02-20 12:36:07','MPardo','Screeching Steel Wheels','The Toronto subway trains have steel wheels. The Montreal subway trains have rubber tires.\r\n\r\nMore details here - https://en.wikipedia.org/wiki/Rubber-tyred_metro','2018-02-20 12:42:29'), -(2324,2493,'2018-02-22 07:42:48','Hipstre','Entertained!','I can\'t wait to look into these youtube pages. So many interesting subjects. Thanks!','2018-02-22 08:01:20'), diff --git a/sql/hpr-db-part-0f.sql b/sql/hpr-db-part-0f.sql index 17deb2a..fea6765 100644 --- a/sql/hpr-db-part-0f.sql +++ b/sql/hpr-db-part-0f.sql @@ -1,3 +1,9 @@ +(2319,2492,'2018-02-20 00:30:09','Clinton Roy','Swapping in..','It\'s been many a year since I was in Canada: are these the rubber wheeled ones?','2018-02-20 08:34:34'), +(2320,2488,'2018-02-20 05:40:00','Windigo','Welcome','Quite a topic for a first episode!\r\n\r\nI enjoyed it, and look forward to your next submission. :)','2018-02-20 08:34:34'), +(2321,2477,'2018-02-20 06:15:08','Windigo','Also distractable','Thanks for the tip! I am also very distract-able, and find myself rewinding HPR episodes constantly to catch what I just missed. I tried looping an episode (this one, in fact) and saw a real difference in what I remembered.\r\n\r\nI was curious about the roosters, but didn\'t mind them too much. Perhaps just list them as a co-host next time? ;)','2018-02-20 08:34:34'), +(2322,2492,'2018-02-20 12:13:39','RWA','hpr2492 :: An Evening Subway Ride','I recently moved to Atlanta, GA USA and it had been years since I used the local subway. Here they call it MARTA - Metropolitan Atlanta Rapid Transit Authority. It is a combination of subways and buses. This past weekend I decided to give MARTA a try. The Toronto subway sounds just like the Atlanta subway and no I didn\'t fall asleep. I rode the subway for three hours and only saw one person asleep.','2018-02-20 12:42:29'), +(2323,2492,'2018-02-20 12:36:07','MPardo','Screeching Steel Wheels','The Toronto subway trains have steel wheels. The Montreal subway trains have rubber tires.\r\n\r\nMore details here - https://en.wikipedia.org/wiki/Rubber-tyred_metro','2018-02-20 12:42:29'), +(2324,2493,'2018-02-22 07:42:48','Hipstre','Entertained!','I can\'t wait to look into these youtube pages. So many interesting subjects. Thanks!','2018-02-22 08:01:20'), (2325,2495,'2018-02-23 02:38:28','Clinton Roy','Wow','Congratulations! That is a milestone I can work towards.','2018-02-23 08:08:01'), (2326,2492,'2018-02-23 16:56:39','Ken Fallon','Meta','Sitting in a train, listening to a podcast of someone in a train.','2018-02-23 17:29:11'), (2327,2418,'2018-02-25 14:36:23','MrX','re great infos','Hi Klaatu, many thanks for the kind words, glad you found it enjoyable and sorry for taking so long to reply, I only just noticed the comment I really should check for comments more often.','2018-02-25 14:39:26'), @@ -992,9 +998,3 @@ (3316,3473,'2021-11-24 01:06:54','Trey','Congrats','Congrats on earning your amateur radio license. It is always interesting to learn some of the differences between operations in different countries. For example, here in the USA, it is generally frowned upon to call \"CQ\" on the 10M and 70cm bands as these are littered with repeaters. We often simply transmit our call sign.\r\n\r\nI look forward to additional amateur radio episodes, and am planning to post one about my Go Box build, assuming I ever get out of the planning phase and into the building phase.\r\n\r\n73','2021-11-24 20:59:36'), (3317,3485,'2021-11-24 15:52:56','monochromec','The show','Great show - this of course is an ugly mirror showing exactly how time flies and how we have been getting old ever since...','2021-11-24 20:59:36'), (3318,3472,'2021-11-27 11:59:41','Kevin O\'Brien','I loved the show','I think this is a perfect example of hacking. Fantastic!','2021-11-27 19:11:13'), -(3319,3474,'2021-11-27 12:19:46','Ken Fallon','No please don\'t add silence to the audio','Hi All,\r\n\r\nIt is a great idea to record a piece of silence to use as a \"Noise profile\" for using with the \"Effect > Noise Reduction\" feature in Audacity. However please do this *before* you upload it to HPR. \r\n\r\nIt is opening a can of worms to ask hosts to submit this before having a process in place to deal with it. If we learned anything from is it included or not Intro Outro thing, is that everyone will do their own thing. Will the silence be at the beginning or the end ? What if it\'s in the middle ? Was the silence intentional ? Will truncate silence work ? \r\n\r\nSo great idea for a host but please, please, please do not do this.','2021-11-27 19:11:13'), -(3320,3459,'2021-11-29 15:37:08','Oliver','TerminusDB Link','Hey,\r\nI see you have a link to one of our blogs here and I\'m just writing to let you know that we\'ve changed URLs so wondered if you could change:\r\n\r\nhttps://blog.terminusdb.com/we-love-gplv3-but-are-switching-license-to-apache-2-0-terminusdb\r\n\r\nto\r\n\r\nhttps://terminusdb.com/blog/we-love-gplv3-but-are-switching-license-to-apache-2-0-terminusdb/\r\n\r\nThanks,\r\nOliver','2021-11-30 20:59:09'), -(3321,3478,'2021-12-01 03:27:16','Trey','I am sure the Audio/Video department loves you','Thanks for sharing this great little hack. It may have a negative impact on the impedance matching for this audio input channel, but it shouldn\'t be overtly noticeable when listening.\r\nThanks, again, for sharing.','2021-12-01 23:01:27'), -(3322,3473,'2021-12-02 13:38:33','Trey','UGH! Correction.','I just glanced at my comment and realized I meant 2M (meter) bands instead of 10M (meter) bands.','2021-12-02 19:20:28'), -(3323,3479,'2021-12-02 19:43:35','Trey','Thanks for sharing.','I have been managing versions of configuration files locally on my system, and you have inspired me to try to use GitHub instead.\r\n\r\nWe shall see how it goes.\r\n\r\nKeep up the awesome work.','2021-12-02 20:40:41'), -(3324,3493,'2021-12-04 23:43:11','DNT','Great episode','Thanks for the podcast recommendation, great name for it too!','2021-12-05 21:24:43'), diff --git a/sql/hpr-db-part-10.sql b/sql/hpr-db-part-10.sql index ce1c576..a4ee445 100644 --- a/sql/hpr-db-part-10.sql +++ b/sql/hpr-db-part-10.sql @@ -1,3 +1,9 @@ +(3319,3474,'2021-11-27 12:19:46','Ken Fallon','No please don\'t add silence to the audio','Hi All,\r\n\r\nIt is a great idea to record a piece of silence to use as a \"Noise profile\" for using with the \"Effect > Noise Reduction\" feature in Audacity. However please do this *before* you upload it to HPR. \r\n\r\nIt is opening a can of worms to ask hosts to submit this before having a process in place to deal with it. If we learned anything from is it included or not Intro Outro thing, is that everyone will do their own thing. Will the silence be at the beginning or the end ? What if it\'s in the middle ? Was the silence intentional ? Will truncate silence work ? \r\n\r\nSo great idea for a host but please, please, please do not do this.','2021-11-27 19:11:13'), +(3320,3459,'2021-11-29 15:37:08','Oliver','TerminusDB Link','Hey,\r\nI see you have a link to one of our blogs here and I\'m just writing to let you know that we\'ve changed URLs so wondered if you could change:\r\n\r\nhttps://blog.terminusdb.com/we-love-gplv3-but-are-switching-license-to-apache-2-0-terminusdb\r\n\r\nto\r\n\r\nhttps://terminusdb.com/blog/we-love-gplv3-but-are-switching-license-to-apache-2-0-terminusdb/\r\n\r\nThanks,\r\nOliver','2021-11-30 20:59:09'), +(3321,3478,'2021-12-01 03:27:16','Trey','I am sure the Audio/Video department loves you','Thanks for sharing this great little hack. It may have a negative impact on the impedance matching for this audio input channel, but it shouldn\'t be overtly noticeable when listening.\r\nThanks, again, for sharing.','2021-12-01 23:01:27'), +(3322,3473,'2021-12-02 13:38:33','Trey','UGH! Correction.','I just glanced at my comment and realized I meant 2M (meter) bands instead of 10M (meter) bands.','2021-12-02 19:20:28'), +(3323,3479,'2021-12-02 19:43:35','Trey','Thanks for sharing.','I have been managing versions of configuration files locally on my system, and you have inspired me to try to use GitHub instead.\r\n\r\nWe shall see how it goes.\r\n\r\nKeep up the awesome work.','2021-12-02 20:40:41'), +(3324,3493,'2021-12-04 23:43:11','DNT','Great episode','Thanks for the podcast recommendation, great name for it too!','2021-12-05 21:24:43'), (3325,3474,'2021-12-06 22:02:50','Operat0r','replace Ken Fallon with a script','\"Cannot be automated!!!?!??!\" Ooohhhhhh Shame !!! Alexa? Siri? Neural networks?? Everything can (and will....) be automated! I would start with detection of \"notes\" similar how singing autotune can make people almost sound like they can sing. Where the audio is checked for n length of music .. id it\'s near the beginning and matches the intro music by n% then they included the intro and if the notes don\'t match maybe it\'s some other \"music\" or \"singing\" ? Same for outro. \r\n\r\nTHE ONLY LIMIT IS YOURSELF!\r\n\r\nhttps://www.zombo.com/\r\n\r\n**Struck a nerve there** <3\r\n\r\nYou make a good point about messing with people\'s audio.\r\n\r\nI imagine a fully automated system that will manage at least 75% of uploads ;)\r\n\r\nWhat if you only had to answer one question?\r\n\r\nChoose an option:\r\n\r\n1) Let HPR edit your audio:\r\n- remove noise\r\n- detect presence intro\r\n- detect presence outro\r\n- ???\r\n\r\n2) do not edit my audio','2021-12-06 22:05:45'), (3326,3474,'2021-12-07 12:19:28','Ken Fallon','Thanks for Volunteering','Hi Operat0r,\r\n\r\nThanks for volunteering to do this. Once we have the script up and running then we can announce it to the general population.\r\n\r\nKen','2021-12-07 20:52:53'), (3327,3474,'2021-12-10 00:50:25','Operat0r','fun','Yah. I caught the Spanish episode and thought I could try a rough translation to English with the script I wrote to speech to text \"any\" media.\r\n\r\nhttps://github.com/freeload101/SCRIPTS/blob/master/Bash/Stream_to_Text_with_Keywords.sh\r\n\r\nDetection of standard HPR intro should be possible and if I\'m lucky I can detect any non standard like humming etc but I only ever done basic darknet training with images.','2021-12-10 20:42:47'), @@ -992,9 +998,3 @@ INSERT INTO `eps` (`id`, `date`, `title`, `duration`, `summary`, `notes`, `hosti (444,'2009-09-14','Cherokee And Asyncronous Servers',1424,'Thistleweb discusses the Cherokee server','

ThistleWeb discusses the difference between process based and asynchronous servers, then goes on to talk about Cherokee server and a few flat file PHP applications.

The Admin process:

I kept refering to \"spawn-cgi\" in the recording. This is supposed to be \"spawn-fcgi\". I also inferred that it didn\'t use config files, it does; it just generates them via the admin web GUI and will overwrite any changes made manually.

My new blog is thistleweb.co.uk, my new email is gordon (at) thistleweb (dot) co (dot) uk.

',106,0,1,'CC-BY-NC-SA','Cherokee webserver,webservers,asynchronous',0,3653,1), (445,'2009-09-15','HAR Update with Chris n\' Frank',2632,'Hacking at Random interview with Chris and Frank','Finux interviews Frank and Chris for an update after the Hacking At Random (HAR) event. What is Hacking At Random? listen to the episode!\r\n\r\nYou can download the ogg version here --> download the ogg version.',85,0,1,'CC-BY-NC-SA','Hacking at random,ham radio',0,2116,1), (446,'2009-09-16','Building Live CDs with Fedora',1633,'Clint Savage at SouthEast Linux Fest 2009 on how to build Live CDs','

Clint Savage at SouthEast Linux Fest 2009 on how to build Live CDs and Live USB sticks (\"remixes\" and \"respins\") using Fedora tools like kickstart, live usb creator, revisor, and more.

\r\n\r\n

Note that this is Klaatu\'s edit and is shorter than the source audio on southeastlinuxfest.org because the delay due to technical difficulty has been chopped out.

\r\n\r\n

Ogg is available here:\r\nhpr0446.ogg

',158,35,1,'CC-BY-NC-SA','Fedora,Live CD',0,1692,1), -(447,'2009-09-17','Lord Drachenblut Recovers Data After a Failed Dist-Upgrade',408,'Lord Drachenblut learns about data recovery','

Daring to upgrade to an Alpha version of Kubuntu, Lord Drachenblut learns the finer points of data recovery.

\r\n

\r\nOGG VORBIS

',24,0,1,'CC-BY-NC-SA','data recovery,dist-upgrade',0,2558,1), -(448,'2009-09-18','TiT Radio 008 - Something Kinda Tacky',4363,'Monsterb and friends host TiT Radio','

Recorded Live Sept. 5th, 2009; monsterb and friends talk about a perl\r\nscript called exiftool,  Jibbed a NetBSD livecd,  something\r\nshocking on Planet Gnome,  Hannah Montana distro, and so much\r\nmore.  Please take a look at the shownotes for detailed\r\ninformation.  https://titradio.info/008.html
\r\n

',99,30,1,'CC-BY-NC-SA','BSD,exiftool,Chrome OS,Quake Live',0,2114,1), -(449,'2009-09-21','Fericyde and Damin talk about Ohio Linux Fest',2571,'A trip down memory lane with Fericyde and Damin.','

Ah, a trip down memory lane with Fericyde and Damin. They talk about geek fests and the upcoming Ohio Linux Fest.

\r\n

ogg version

',109,0,1,'CC-BY-NC-SA','Ohio Linux Fest,geek,Ubuntu',0,3588,1), -(450,'2009-09-23','TiT Radio 009 - peggy, piggy, and pat',5294,'Monsterb and friends host TiT Radio','Recorded Live Sept. 19th, 2009;  The TiTs talk about QT 4.6,\r\nDreamScreen 100, new Arch Magazine, Sexism in FOSS, and so much\r\nmore.  Please take a look at the shownotes for detailed\r\ninformation.  https://titradio.info/009.html',99,30,1,'CC-BY-NC-SA','DreamScreen 100,Arch Magazine,qt project,sexism in FOSS,Archos 5 tablet,accessibility,barcodes,audiobooks,bittorrent,media frontends,Ohio Linux Fest',0,1993,1), -(451,'2009-09-23','Podcasting: From Mic to Audience',1328,'Finux talks about podcasting','Podcasting: From Mic to Audience finux talks all about podcasting',85,36,1,'CC-BY-NC-SA','podcasting,Audacity,blog',0,2261,1), -(452,'2009-09-24','Demo or Bust 2010 Part 4',6844,'SigFLUP talks about software rendering and then interviews blackpawn of xplsv','In this episode SigFLUP talks about software rendering and then interviews blackpawn of xplsv. Leave you feedback at +1-206-312-1618 or email pantsbutt@gmail.com',115,0,1,'CC-BY-NC-SA','Demo or Bust 2010',0,1683,1), diff --git a/sql/hpr-db-part-11.sql b/sql/hpr-db-part-11.sql index c080859..631c887 100644 --- a/sql/hpr-db-part-11.sql +++ b/sql/hpr-db-part-11.sql @@ -1,3 +1,9 @@ +(447,'2009-09-17','Lord Drachenblut Recovers Data After a Failed Dist-Upgrade',408,'Lord Drachenblut learns about data recovery','

Daring to upgrade to an Alpha version of Kubuntu, Lord Drachenblut learns the finer points of data recovery.

\r\n

\r\nOGG VORBIS

',24,0,1,'CC-BY-NC-SA','data recovery,dist-upgrade',0,2558,1), +(448,'2009-09-18','TiT Radio 008 - Something Kinda Tacky',4363,'Monsterb and friends host TiT Radio','

Recorded Live Sept. 5th, 2009; monsterb and friends talk about a perl\r\nscript called exiftool,  Jibbed a NetBSD livecd,  something\r\nshocking on Planet Gnome,  Hannah Montana distro, and so much\r\nmore.  Please take a look at the shownotes for detailed\r\ninformation.  https://titradio.info/008.html
\r\n

',99,30,1,'CC-BY-NC-SA','BSD,exiftool,Chrome OS,Quake Live',0,2114,1), +(449,'2009-09-21','Fericyde and Damin talk about Ohio Linux Fest',2571,'A trip down memory lane with Fericyde and Damin.','

Ah, a trip down memory lane with Fericyde and Damin. They talk about geek fests and the upcoming Ohio Linux Fest.

\r\n

ogg version

',109,0,1,'CC-BY-NC-SA','Ohio Linux Fest,geek,Ubuntu',0,3588,1), +(450,'2009-09-23','TiT Radio 009 - peggy, piggy, and pat',5294,'Monsterb and friends host TiT Radio','Recorded Live Sept. 19th, 2009;  The TiTs talk about QT 4.6,\r\nDreamScreen 100, new Arch Magazine, Sexism in FOSS, and so much\r\nmore.  Please take a look at the shownotes for detailed\r\ninformation.  https://titradio.info/009.html',99,30,1,'CC-BY-NC-SA','DreamScreen 100,Arch Magazine,qt project,sexism in FOSS,Archos 5 tablet,accessibility,barcodes,audiobooks,bittorrent,media frontends,Ohio Linux Fest',0,1993,1), +(451,'2009-09-23','Podcasting: From Mic to Audience',1328,'Finux talks about podcasting','Podcasting: From Mic to Audience finux talks all about podcasting',85,36,1,'CC-BY-NC-SA','podcasting,Audacity,blog',0,2261,1), +(452,'2009-09-24','Demo or Bust 2010 Part 4',6844,'SigFLUP talks about software rendering and then interviews blackpawn of xplsv','In this episode SigFLUP talks about software rendering and then interviews blackpawn of xplsv. Leave you feedback at +1-206-312-1618 or email pantsbutt@gmail.com',115,0,1,'CC-BY-NC-SA','Demo or Bust 2010',0,1683,1), (453,'2009-09-26','Talk Geek to me Ep 2',2044,'Deepgeek talks geek to his fans about HTML','Deepgeek discusses upgrading from old style HTML to Modern HTML. He uses, as a feature example, device independence between Cell Phone Micro Browsers and Desktop Browsers like Firefox.',73,34,1,'CC-BY-NC-SA','HTML,css,stylesheets,micro browser,mobile browsing',0,1983,1), (454,'2009-09-29','BruCon Interview',2663,'Finux interviewing Benny from BruCON','finux interviewing Benny from BruCON',85,78,1,'CC-BY-NC-SA','BruCON,unconference,hacking',0,1938,1), (455,'2009-09-30','Interview with Dann at OLF',805,'Pegwole interviews Dann at the Ohio Linux Fest','pegwole interviews Dann at OLF',120,78,1,'CC-BY-NC-SA','OLF 2009,interview',0,1478,1), @@ -992,9 +998,3 @@ INSERT INTO `eps` (`id`, `date`, `title`, `duration`, `summary`, `notes`, `hosti (1416,'2014-01-06','2013-2014 HPR New Year Show Part 1 2013-12-31T10:00:00Z to 2013-12-31T16:00:00Z',21595,'New Year Show 2014, part 1','

2013-12-31T10:00:00Z

\r\n\r\nGeneral links / references mentioned on the show for the show notes:\r\n\r\n

2013-12-31T10:15:00Z

\r\n\r\n

2013-12-31T11:00:00Z

\r\n\r\n

2013-12-31T12:00:00Z

\r\n\r\n

2013-12-31T12:30:00Z

\r\n\r\n

2013-12-31T13:00:00Z

\r\n\r\n

2013-12-31T13:30:00Z

\r\n\r\n

2013-12-31T14:00:00Z

\r\n\r\n

2013-12-31T14:30:00Z

\r\n\r\n

2013-12-31T15:00:00Z

\r\n\r\n

2013-12-31T15:15:00Z

\r\n',159,121,1,'CC-BY-SA','New Year,2014',0,1554,1), (1417,'2014-01-07','2013-2014 HPR New Year Show Part 2 2013-12-31T16:00:00Z to 2013-12-31T21:00:00Z',19158,'New Year Show 2014, part 2','

2013-12-31T16:00:00Z

\n \n

2013-12-31T17:00:00Z

\n \n

2013-12-31T17:30:00Z

\n \n

2013-12-31T18:00:00Z

\n \n

2013-12-31T18:15:00Z

\n \n

2013-12-31T18:30:00Z

\n \n

2013-12-31T19:00:00Z

\n \n

2013-12-31T19:30:00Z

\n \n

2013-12-31T20:00:00Z

\n \n

2013-12-31T20:30:00Z

\n \n

2013-12-31T21:00:00Z

\n
\n

HPR COMMUNITY NEWS DECEMBER 2013

\n
A monthly look at what has been going on in the HPR community. This is on the Saturday before the first Monday of the month.
\n

New hosts

\n

Welcome to our new hosts: Honkeymagoo, and Thaj Sara.

\n

Show Updates

\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
iddatetitlehost
13912013-12-02Google Play Music All AccessAhuka
13922013-12-03Beginner\'s guide to the night skyAndrew Conway
13932013-12-04Audio Metadata in Ogg, MP3, and othersEpicanis
13942013-12-05Setting Up Your Own BlogKeith Murray
13952013-12-0617 - LibreOffice Writer Overview of Page Layout OptionsAhuka
13962013-12-09First Thoughts of the Google ChromecastCurtis Adkins (CPrompt^)
13972013-12-10HPR Community News for November 2013Various Hosts
13982013-12-11Batteries Part 1MrX
13992013-12-12Interview with Ben Everard https://www.linuxvoice.comCurtis Adkins (CPrompt^)
14002013-12-13How We Use LinuxHonkeymagoo
14012013-12-16Huawei Mate reviewKnightwise
14022013-12-17How I Started Using Linux and Free and Open Source SoftwareThaj Sara
14032013-12-18hiro from GamingGrannar at RetrospelsmässanSeetee
14042013-12-19Editing pre-recorded audio in AudacityKen Fallon
14052013-12-2018 - LibreOffice Writer Page Styles IntroducedAhuka
14062013-12-23ORCA fundraiserAhuka
14072013-12-24Mars Needs Women, and Hacker Public Radio Needs ShowsAhuka
14082013-12-25Drupal in Gothenburg with Addison Berry and othersSeetee
14092013-12-26Xircom PE pocket ethernet adapterKen Fallon
14102013-12-27Generating Keys on the Command LineAhuka
14112013-12-30ohmroep live 1, 31-06-2013, pirate partiesNido Media
14122013-12-31ohmroep hpr live 2, 31-06-2013, advancing local communitiesNido Media
\n

Other News

\nDownloads in 2013 = 1,134,478\nPer episode download = 4,364\n

Other News

\n \n
\n ',159,121,1,'CC-BY-SA','New Year,2014',0,1380,1), (1418,'2014-01-08','2013-2014 HPR New Year Show Part 3 2013-12-31T22:00:00Z to 2014-01-01T04:00:00Z',20552,'New Year Show 2014, part 3','

2013-12-31T22:00:00Z

\r\n\r\n

2013-12-31T23:00:00Z

\r\n\r\n

2014-01-01T00:00:00Z

\r\n\r\n

2014-01-01T01:00:00Z

\r\n\r\n

2014-01-01T02:00:00Z

\r\n\r\n

2014-01-01T03:00:00Z

\r\n\r\n

2014-01-01T03:30:00Z

\r\n\r\n',159,121,1,'CC-BY-SA','ORCA,FocusWriter,DarkTable,LightZone,GIMP,Sound Converter,Maelstrom,TuxPaint,mtpaint,Jitsi,kid3,EasyTag,Audacity,gPodder,PuddleTag,avidemux,OpenShot,EtherPad,WordPress,Abiword,gnumeric,LibreOffice',0,1672,1), -(1419,'2014-01-09','2013-2014 HPR New Year Show Part 4 2014-01-01T04:00:00Z to 2014-01-01T10:00:00Z',18739,'New Year Show 2014, part 4','

2014-01-01T04:00:00Z

\r\n\r\n

2014-01-01T04:30:00Z

\r\n\r\n

2014-01-01T05:00:00Z

\r\n\r\n

2014-01-01T06:00:00Z

\r\n\r\n

2014-01-01T07:00:00Z

\r\n\r\n

2014-01-01T08:00:00Z

\r\n\r\n

2014-01-01T09:00:00Z

\r\n\r\n

2014-01-01T09:30:00Z

\r\n\r\n',159,121,1,'CC-BY-SA','New Year,2014',0,1377,1), -(1420,'2014-01-10','2013-2014 HPR New Year Show Part 5 2014-01-01T10:00:00Z to 2014-01-01T12:00:00Z',6699,'New Year Show 2014, part 5','

2014-01-01T10:00:00Z

\r\n\r\n

2014-01-01T11:00:00Z

\r\n\r\n

2014-01-01T12:00:00Z

\r\n\r\n

\r\nShould auld acquaintance be forgot,
\r\nand never brought to mind?
\r\nShould auld acquaintance be forgot,
\r\nand auld lang syne*?

\r\n\r\n

CHORUS

\r\n

\r\nFor auld lang syne, my jo,
\r\nfor auld lang syne,
\r\nwe’ll tak a cup o’ kindness yet,
\r\nfor auld lang syne.

\r\n\r\n

And surely ye’ll be your pint-stowp!
\r\nand surely I’ll be mine!
\r\nAnd we’ll tak a cup o’ kindness yet,
\r\nfor auld lang syne.

\r\n\r\n

CHORUS

\r\n

We twa hae run about the braes,
\r\nand pu’d the gowans fine;
\r\nBut we’ve wander’d mony a weary fit,
\r\nsin auld lang syne.

\r\n\r\n

CHORUS

\r\n

We twa hae paidl’d i\' the burn,
\r\nfrae morning sun till dine;
\r\nBut seas between us braid hae roar’d
\r\nsin auld lang syne.

\r\n\r\n

CHORUS

\r\n

And there’s a hand, my trusty fiere!
\r\nand gie\'s a hand o’ thine!
\r\nAnd we’ll tak a right gude-willy waught,
\r\nfor auld lang syne.

\r\n\r\n

CHORUS

\r\n

',159,121,1,'CC-BY-SA','New Year,2014',0,1419,1), -(1423,'2014-01-15','Monty - The man behind your databases',843,'Tune in to today\'s episode of #HPR and hear Monty talk about YOUR database!','

Listen to the man who created the database YOU use every day, today on Hacker Public Radio.

\n

\"There\'s no reasons to use MySQL anymore.\"
-- Monty

\n

Michael Widenius at FSCONS 2013

\n

A couple of months ago I attended FSCONS 2013. There I met Michael \"Monty\" Widenius, the driving force behind both MySQL and MariaDB. This is a guy who loves being a developer and he loves Open Source software. He named MySQL after his daughter My, and the new fork MariaDB got its name from his other daughter Maria.

\n

Monty was invited to FSCONS 2013 to give a speech entitled \"The MySQL and MariaDB story\", and the synopsis on fscons.org says:

\n
\"The story of how MySQL was created, why it was successful and how it grew until it was sold to Sun, who was then overtaken by Oracle.
It will also cover how and why MariaDB was created and what we are doing to ensure that there will always be a free version of MySQL (under the name of MariaDB).
The talk will also explain the challenges we have had to do this fork, especially the merge with MySQL 5.5, and the various systems (like buildbot) that we used to build the binaries and how we are working with the MariaDB/MySQL community.\"
\n
-- https://frab.fscons.org/en/fscons13/public/events/51

That presentation can be found on YouTube, and I encourage you all to have a look at it. \"Michael Monty Widenius: The MySQL and MariaDB story\": https://youtu.be/JxyBNdwmpzM
\n

\n

If you have not yet made the switch to MariaDB, now is the time!

\n

Monty also asks everyone who uses MariaDB to activate the anonymous plug-in, so that the developers might know what to focus their attention on.

\n

If you wish to look Monty in the eyes, you have the opportunity to do so, as this interview was video recorded and will be released on YouTube or similar. Follow All In IT Radio on Google+, Twitter and Identi.ca for updates on when that will be released.

\n

Stuff referenced in the episode

\n \n

How to reach me

\n

You should follow me and subscribe to All In IT Radio:

\n \n',192,0,0,'CC-BY-SA','fscons, monty, mysql, mariadb, oracle, interview',0,1555,1), -(1592,'2014-09-09','An Open Source News Break from Opensource.com',782,'Open source CMS, tools for making presentations, WikiProject Med','

In this episode: Open source CMS applications go head-to-head, open source tools for making presentations, and WikiProject Med.

\n

Links:

\n ',280,28,0,'CC-BY-SA','CMS,presentation software,Wiki Project Med',0,0,1), -(1428,'2014-01-22','Coffee Stain Studios and the Sanctum games',757,'Will #Sanctum2 come to #Linux? Hear @ArminPosts\' answer in the latest #HPR!','

Do you know the Sanctum games? You should! Listen to Armin from Coffee Stain Studios on todays episode of Hacker Public Radio!

\n

\"We\'re actually working on Linux support. *pause* I don\'t know if I\'m supposed to say that.\"
-- Armin

\n

Coffee Stain Studios

\n

In 2010 a few students from the University of Skövde created the Indie game developing company \"Coffee Stain Studios\". In 2011 they released the game \"Sanctum\" on Steam, and in May of 2013 they released \"Sanctum 2\". These games are most often described as a mix between First-person shooter and Tower defense. You find yourself in a futuristic setting, fighting aliens with a fair bit of humor. The player chooses how much resources to distribute on automatic towers or his or her own weapons. Both games featured the possibility to collaborate with your friends to beat the levels.

\n

One of the founders, Armin Ibrisagic, was at DreamHack in November 2013, where I got a chance to talk to him.

\n

DreamHack

\n

\"What is DreamHack?\" you ask? Only the world\'s largest computer festival, held multiple times a year in Jönköping, Sweden. According to Wikipedia \"It holds the world record (as recognized by the Guinness Book of Records and Twin Galaxies) for the world\'s largest LAN party and computer festival, and has held the record for the world\'s fastest Internet connection, and the record in most generated traffic.\"

\n

I also got an interview with one of the organizers of DreamHack, but that you will hear another day. Today we focus on Sanctum, and how the market looks for smaller game developers.

\n

Stuff referenced in the episode

\n \n

How to reach me

\n

You should follow me and subscribe to All In IT Radio:

\n \n',192,0,0,'CC-BY-SA','dreamhack, coffee stain studios, sanctum, games, indie, interview',0,1611,1), -(1422,'2014-01-14','Setting up and using SSH and SOCKS',1432,'Advice on setting up and using SSH and SOCKS proxy','

\r\nIn this episode I go through how I set up SSH and SOCKS. This is very useful when you need to feel a bit more secure in your internet traffic and need to keep out of prying eyes. I also go over some tools used to access your home network from a Windows computer.\r\n

\r\n

\r\nLinks:\r\n

\r\n\r\n',252,0,0,'CC-BY-SA','SSH,SOCKS proxy,DynDNS,DDClient,PuTTy',0,1588,1), diff --git a/sql/hpr-db-part-12.sql b/sql/hpr-db-part-12.sql index be46d9c..652d03e 100644 --- a/sql/hpr-db-part-12.sql +++ b/sql/hpr-db-part-12.sql @@ -1,3 +1,9 @@ +(1419,'2014-01-09','2013-2014 HPR New Year Show Part 4 2014-01-01T04:00:00Z to 2014-01-01T10:00:00Z',18739,'New Year Show 2014, part 4','

2014-01-01T04:00:00Z

\r\n\r\n

2014-01-01T04:30:00Z

\r\n\r\n

2014-01-01T05:00:00Z

\r\n\r\n

2014-01-01T06:00:00Z

\r\n\r\n

2014-01-01T07:00:00Z

\r\n\r\n

2014-01-01T08:00:00Z

\r\n\r\n

2014-01-01T09:00:00Z

\r\n\r\n

2014-01-01T09:30:00Z

\r\n\r\n',159,121,1,'CC-BY-SA','New Year,2014',0,1377,1), +(1420,'2014-01-10','2013-2014 HPR New Year Show Part 5 2014-01-01T10:00:00Z to 2014-01-01T12:00:00Z',6699,'New Year Show 2014, part 5','

2014-01-01T10:00:00Z

\r\n\r\n

2014-01-01T11:00:00Z

\r\n\r\n

2014-01-01T12:00:00Z

\r\n\r\n

\r\nShould auld acquaintance be forgot,
\r\nand never brought to mind?
\r\nShould auld acquaintance be forgot,
\r\nand auld lang syne*?

\r\n\r\n

CHORUS

\r\n

\r\nFor auld lang syne, my jo,
\r\nfor auld lang syne,
\r\nwe’ll tak a cup o’ kindness yet,
\r\nfor auld lang syne.

\r\n\r\n

And surely ye’ll be your pint-stowp!
\r\nand surely I’ll be mine!
\r\nAnd we’ll tak a cup o’ kindness yet,
\r\nfor auld lang syne.

\r\n\r\n

CHORUS

\r\n

We twa hae run about the braes,
\r\nand pu’d the gowans fine;
\r\nBut we’ve wander’d mony a weary fit,
\r\nsin auld lang syne.

\r\n\r\n

CHORUS

\r\n

We twa hae paidl’d i\' the burn,
\r\nfrae morning sun till dine;
\r\nBut seas between us braid hae roar’d
\r\nsin auld lang syne.

\r\n\r\n

CHORUS

\r\n

And there’s a hand, my trusty fiere!
\r\nand gie\'s a hand o’ thine!
\r\nAnd we’ll tak a right gude-willy waught,
\r\nfor auld lang syne.

\r\n\r\n

CHORUS

\r\n

',159,121,1,'CC-BY-SA','New Year,2014',0,1419,1), +(1423,'2014-01-15','Monty - The man behind your databases',843,'Tune in to today\'s episode of #HPR and hear Monty talk about YOUR database!','

Listen to the man who created the database YOU use every day, today on Hacker Public Radio.

\n

\"There\'s no reasons to use MySQL anymore.\"
-- Monty

\n

Michael Widenius at FSCONS 2013

\n

A couple of months ago I attended FSCONS 2013. There I met Michael \"Monty\" Widenius, the driving force behind both MySQL and MariaDB. This is a guy who loves being a developer and he loves Open Source software. He named MySQL after his daughter My, and the new fork MariaDB got its name from his other daughter Maria.

\n

Monty was invited to FSCONS 2013 to give a speech entitled \"The MySQL and MariaDB story\", and the synopsis on fscons.org says:

\n
\"The story of how MySQL was created, why it was successful and how it grew until it was sold to Sun, who was then overtaken by Oracle.
It will also cover how and why MariaDB was created and what we are doing to ensure that there will always be a free version of MySQL (under the name of MariaDB).
The talk will also explain the challenges we have had to do this fork, especially the merge with MySQL 5.5, and the various systems (like buildbot) that we used to build the binaries and how we are working with the MariaDB/MySQL community.\"
\n
-- https://frab.fscons.org/en/fscons13/public/events/51

That presentation can be found on YouTube, and I encourage you all to have a look at it. \"Michael Monty Widenius: The MySQL and MariaDB story\": https://youtu.be/JxyBNdwmpzM
\n

\n

If you have not yet made the switch to MariaDB, now is the time!

\n

Monty also asks everyone who uses MariaDB to activate the anonymous plug-in, so that the developers might know what to focus their attention on.

\n

If you wish to look Monty in the eyes, you have the opportunity to do so, as this interview was video recorded and will be released on YouTube or similar. Follow All In IT Radio on Google+, Twitter and Identi.ca for updates on when that will be released.

\n

Stuff referenced in the episode

\n \n

How to reach me

\n

You should follow me and subscribe to All In IT Radio:

\n \n',192,0,0,'CC-BY-SA','fscons, monty, mysql, mariadb, oracle, interview',0,1555,1), +(1592,'2014-09-09','An Open Source News Break from Opensource.com',782,'Open source CMS, tools for making presentations, WikiProject Med','

In this episode: Open source CMS applications go head-to-head, open source tools for making presentations, and WikiProject Med.

\n

Links:

\n ',280,28,0,'CC-BY-SA','CMS,presentation software,Wiki Project Med',0,0,1), +(1428,'2014-01-22','Coffee Stain Studios and the Sanctum games',757,'Will #Sanctum2 come to #Linux? Hear @ArminPosts\' answer in the latest #HPR!','

Do you know the Sanctum games? You should! Listen to Armin from Coffee Stain Studios on todays episode of Hacker Public Radio!

\n

\"We\'re actually working on Linux support. *pause* I don\'t know if I\'m supposed to say that.\"
-- Armin

\n

Coffee Stain Studios

\n

In 2010 a few students from the University of Skövde created the Indie game developing company \"Coffee Stain Studios\". In 2011 they released the game \"Sanctum\" on Steam, and in May of 2013 they released \"Sanctum 2\". These games are most often described as a mix between First-person shooter and Tower defense. You find yourself in a futuristic setting, fighting aliens with a fair bit of humor. The player chooses how much resources to distribute on automatic towers or his or her own weapons. Both games featured the possibility to collaborate with your friends to beat the levels.

\n

One of the founders, Armin Ibrisagic, was at DreamHack in November 2013, where I got a chance to talk to him.

\n

DreamHack

\n

\"What is DreamHack?\" you ask? Only the world\'s largest computer festival, held multiple times a year in Jönköping, Sweden. According to Wikipedia \"It holds the world record (as recognized by the Guinness Book of Records and Twin Galaxies) for the world\'s largest LAN party and computer festival, and has held the record for the world\'s fastest Internet connection, and the record in most generated traffic.\"

\n

I also got an interview with one of the organizers of DreamHack, but that you will hear another day. Today we focus on Sanctum, and how the market looks for smaller game developers.

\n

Stuff referenced in the episode

\n \n

How to reach me

\n

You should follow me and subscribe to All In IT Radio:

\n \n',192,0,0,'CC-BY-SA','dreamhack, coffee stain studios, sanctum, games, indie, interview',0,1611,1), +(1422,'2014-01-14','Setting up and using SSH and SOCKS',1432,'Advice on setting up and using SSH and SOCKS proxy','

\r\nIn this episode I go through how I set up SSH and SOCKS. This is very useful when you need to feel a bit more secure in your internet traffic and need to keep out of prying eyes. I also go over some tools used to access your home network from a Windows computer.\r\n

\r\n

\r\nLinks:\r\n

\r\n\r\n',252,0,0,'CC-BY-SA','SSH,SOCKS proxy,DynDNS,DDClient,PuTTy',0,1588,1), (1445,'2014-02-14','22 - LibreOffice Writer Other Frame Styles',606,'This continues our look at frames by looking at frame styles for things other than text.','

\r\nThis continues our look at frames by looking at frame styles for things other than text.\r\n

\r\n\r\n

LibreOffice Writer Other Frame Styles

\r\n

In the previous tutorial we looked at using the frame style for text, which is not called the Text style, but the Frame style, which may be confusing. This is a very common use of frames, but there are others. To start the discussion, let’s get back to the basic concept of objects. LibreOffice is an object-oriented program and you should keep this in mind when dealing with this software.

\r\n

A piece of text can be an object, and it can contain other objects (paragraphs, sentences, words, characters), or it can be contained within other objects (section, chapter, document). In the case we are looking at, a frame is an object, which contains other objects, and is in turn contained within larger objects (page, section, document). Depending on the objects being contained, the frame styles can be different, and that is what we need to look at now.

\r\n

\r\nPlease see https://www.ahuka.com/?page_id=671 for the rest of the article\r\n

',198,70,0,'CC-BY-SA','LibreOffice, Writer, Word Processing, Page Layout',0,1312,1), (1465,'2014-03-14','24 - LibreOffice Writer A Brochure Project',1572,'This concludes our look at page layout by showing these techniques at use in creating a Tri-fold bro','

\r\nThe written version of this show can be found at https://www.ahuka.com/?page_id=676\r\nThe European version of the brochure.\r\nThe American version of the brochure.\r\n

',198,70,0,'CC-BY-SA','LibreOffice, Writer, Word Processing, Page Layout',0,1339,1), (1475,'2014-03-28','25 - LibreOffice Calc What Is A Spreadsheet',820,'The origins and history of the spreadsheet','

LibreOffice Calc: What is a Spreadsheet?

\r\n

There are different ways to answer this question. Functionally, spreadsheets are a tool for mathematical calculations, but have branched out into related areas like data analysis. Some people even use them as a quick-and-dirty database tool. If you are in a financial profession of some kind you probably live in spreadsheets all day.

\r\n

Spreadsheets are original “killer app”. Early examples were implemented on mainframe computers in the 1960s, but the big step was the creation of VisiCalc for the Apple II in 1979, which was then ported to the IBM PC in 1981. VisiCalc set the conventions that guided all subsequent spreadsheets, and the essential methods have not changed since then. VisiCalc was called the first killer app because people would buy the computer just to run the program, and the usefulness of spreadsheets is what promoted the initial entry of personal computers into the corporate world, with all of the change that has caused.

\r\n

\r\nFor the remainder of this article please see https://www.ahuka.com/?page_id=699\r\n

',198,70,0,'CC-BY-SA','LibreOffice, Calc, Spreadsheet',0,1454,1), @@ -992,9 +998,3 @@ INSERT INTO `eps` (`id`, `date`, `title`, `duration`, `summary`, `notes`, `hosti (2430,'2017-11-24','Scanning books',740,'Ken explains how and why he is scanning school books','

\r\nI want to scan my Son\'s school books so that he doesn\'t get back problems lugging books to and from school. Something that for now at least remains legal in the Netherlands.\r\n

\r\n

Steps involved

\r\n
    \r\n
  1. Scan all the images using the entire length of your scanner. I use scantoimage.bash
  2. \r\n
  3. Confirm that there are no missing pages, and that every other page is upright and then upside down etc. If they are scan them and rename them so the name fits in between the pages
  4. \r\n
  5. Back up all the scanned images
  6. \r\n
  7. Manually crop the areas of the scans outside the area of the page. Usually this is on the side and bottom of the flat bed. Save is as something like ~/x.jpg
  8. \r\n
  9. Use GraphicsMagick Image Processing System to identify the dimensions of the cropped image.
    \r\n\r\ngm identify ~/x.jpg
    \r\n/home/me/x.jpg JPEG 2477x2609+0+0 DirectClass 8-bit 3.2Mi 0.000u 0m:0.000002s
    \r\n
  10. \r\n
  11. Crop all the images to that dimension
    \r\ngm mogrify -crop 2477x2609+0+0 *.jpg\r\n
  12. \r\n
  13. Rotate every second image by 180 degrees. rotate-every-second-image.bash
  14. \r\n
  15. Create a directory for the book and in there create a subdirectory for each section of the book. Manually copy all the images to the sub directory for that section.
  16. \r\n
  17. Then go to the root where there are no files only subdirs and run the command
    \r\nfor i in *;do echo $i;gm convert \"${i}/*.jpg\" \"${i}.pdf\"; done
  18. \r\n
\r\n

\r\nAt the end you will have a pdf file for each section of the book.\r\n

',30,0,1,'CC-BY-SA','book scanning',0,0,1), (2424,'2017-11-16','Interface Zero RPG Play',3010,'Klaatu, Lobath, and Thaj play the Interface Zero RPG','

Klaatu, Lobath, and Thaj play a session of Interface Zero, a role playing game using the Pathfinder rules.\r\n

\r\n

\r\nIf you\'re new to RPG and want to hear how it\'s done, or you\'re just bored and want to hear some nerds play through a cyberpunk adventure, this is for you! Also - for one lucky listener - we have an RPG starter kit. Listen for details.

',78,95,0,'CC-BY-SA','Interface Zero,actual play,rpg,gaming,live play',0,0,1), (2425,'2017-11-17','Intro to XSL',2502,'A brief introduction to XSL and xsltproc','

\r\nSure, you can use pandoc to process your Docbook XML, but why not learn a little XSL this weekend?\r\n

\r\n

Requirements

\r\n

\r\nYou must have xsltproc installed. It\'s available from your software repository.\r\n

\r\n

\r\nHere is some sample XML for you:\r\n

\r\n
\r\n<xml version=\"1.0\">\r\n  <para>\r\n    My name is <author>Foo</author>.\r\n  </para>\r\n\r\n  <para>\r\n    You're listening to <emphasis role=\"bold\">Hacker Public\r\n    Radio</emphasis>.\r\n  </para>\r\n</xml>\r\n
\r\n

\r\nAnd here\'s the complete XSL as demonstrated:\r\n

\r\n
\r\n<xsl:stylesheet xmlns:xsl=\"https://www.w3.org/1999/XSL/Transform\" version=\"1.0\">\r\n\r\n  <xsl:template match=\"para\">\r\n    <p><span><xsl:apply-templates/></span></p>\r\n  </xsl:template>\r\n\r\n  <xsl:template match=\"emphasis\">\r\n    <em><xsl:apply-templates/></em>\r\n  </xsl:template>\r\n\r\n  <xsl:template match=\"emphasis[@role=\'bold\']\">\r\n    <strong><xsl:apply-templates/></strong>\r\n  </xsl:template>\r\n\r\n  <xsl:template match=\"author\" name=\"host\">\r\n    <xsl:choose>\r\n\r\n      <xsl:when test=\"$host = \'Klaatu\'\">\r\n        <xsl:text>Klaatu</xsl:text>\r\n      </xsl:when>\r\n\r\n      <xsl:when test=\"$host = \'Gort\'\">\r\n        <xsl:text>Gort</xsl:text>\r\n      </xsl:when>\r\n    </xsl:choose>\r\n  </xsl:template>\r\n</xsl:stylesheet>\r\n
\r\n

Links

\r\n\r\n',78,0,0,'CC-BY-SA','docbook,xml,xsl',0,0,1), -(2427,'2017-11-21','Server Basics 101',2590,'Klaatu endeavours to explain the basics of server administration.','

Klaatu covers the very very basics of servers: what they are, how to know one when you see one, what one ought to run, and why we have them.

',78,0,0,'CC-BY-SA','server,admin,sys admin,linux',0,0,1), -(2429,'2017-11-23','Interface Zero RPG Play',1902,'Klaatu, Lobath, and Thaj play the Interface Zero RPG part 2','

The second session of Interface Zero RPG live play with Klaatu, Lobath, and Thaj.

\r\n\r\n

This week, Chiawei and Syd reach Peter\'s apartment and do some quick detective work, and a little bit of minor bone-breaking.

\r\n\r\n

\r\nIf you\'re really keen to play, send Klaatu an email (Klaatu at the domain of this podcast, or member.fsf.org). The recording schedule is inflexible, Klaatu has oddly high standards for audio that he is inevitably compresses down to 64kbps, and the game has already started, but a new character or guest character is not out of the question!

\r\n\r\n

No give-away this week, but we\'ll be giving a (digital) Pathfinder starter kit out next week.

',78,95,0,'CC-BY-SA','Interface Zero,actual play,rpg,gaming,live play',0,0,1), -(2435,'2017-12-01','Server Basics 102',2926,'Klaatu talks about SSH configuration on the server you set up in 101.','

Klaatu talks about SSH, changing SSH ports, and using SSH keys for the server you presumably set up after hearing Server Basics 101 in this series.

',78,0,0,'CC-BY-SA','server,admin,sys admin,linux',0,0,1), -(2441,'2017-12-11','Server Basics 103',1773,'Firewalls and fail2ban','

Klaatu walks you through installing, configuring, and running fail2ban, and discusses the basics about firewalls.

\r\n\r\n',78,0,0,'CC-BY-SA','server,admin,sys admin,linux',0,0,1), -(2433,'2017-11-29','You were right, I was wrong',519,'Ken eats humble pie','

\r\nKen puts the record straight after inaccurate comments during hpr2416 :: HPR Community News for October 2017 about \r\n hpr2406 :: Putting Ends onto CAT6 Ethernet Cables by Shane Shennan.

\r\n\r\n

Links

\r\n\r\n',30,0,0,'CC-BY-SA','Correction',0,0,1), -(2432,'2017-11-28','Living with the Nokia 6 – an update to HPR 2405',316,'An update to my show on the Nokia 6 phone','

Living with the Nokia 6 – an update to HPR 2405

\r\n

I’ve now been using the Nokia 6 for about 2 months and just wanted to update listeners to my thoughts on the phone.

\r\n

First a response to Dave who said on the Community News that as he had a OnePlus 1 he was surprised I found it inadequate. The One+1 is a great phone, my problem with it was it does not support O2’s 4G network although it supports EE’s and 3’s 4G networks here in the UK, as I use GiffGaff which runs on the O2 network I have not been able to benefit from their 4G offer and I don’t want to change provider. Also the One+1 was stuck on CyanogenMod 13.1 (Android 6) and no longer got updates, so this was the reason for the new phone purchase. I’ve now flashed Lineage OS onto the One+1 and have a secure backup phone or one I can pass on to my Wife at some stage.

\r\n

Back to the Nokia, now I’ve lived with the phone for a few weeks I can say I am more than happy with it, and some of the issues with battery life I have found are unfounded once you configure some of the settings to be more battery friendly, such as restricting background access to the net for most aps the battery life is well over a day\'s use. At night in stand by mode over 8 hours battery use is less than 1% so even with moderate to heavy use I can get a day out of the phone without any risk of running out. Also if the official charger and cable are used a 1 hour charge gives about a 30-40% battery capacity, so not as slow as the reviews I’ve read. Would I still buy it having used it for 2 months, I would say yes to that, and I also have no issues with recommending it as a large format phone at a budget price.

',338,57,0,'CC-BY-SA','Android, Nokia 6, Phones, New Kit, OnePlus1',0,0,1), diff --git a/sql/hpr-db-part-13.sql b/sql/hpr-db-part-13.sql index e5d5e58..233f9e6 100644 --- a/sql/hpr-db-part-13.sql +++ b/sql/hpr-db-part-13.sql @@ -1,3 +1,9 @@ +(2427,'2017-11-21','Server Basics 101',2590,'Klaatu endeavours to explain the basics of server administration.','

Klaatu covers the very very basics of servers: what they are, how to know one when you see one, what one ought to run, and why we have them.

',78,0,0,'CC-BY-SA','server,admin,sys admin,linux',0,0,1), +(2429,'2017-11-23','Interface Zero RPG Play',1902,'Klaatu, Lobath, and Thaj play the Interface Zero RPG part 2','

The second session of Interface Zero RPG live play with Klaatu, Lobath, and Thaj.

\r\n\r\n

This week, Chiawei and Syd reach Peter\'s apartment and do some quick detective work, and a little bit of minor bone-breaking.

\r\n\r\n

\r\nIf you\'re really keen to play, send Klaatu an email (Klaatu at the domain of this podcast, or member.fsf.org). The recording schedule is inflexible, Klaatu has oddly high standards for audio that he is inevitably compresses down to 64kbps, and the game has already started, but a new character or guest character is not out of the question!

\r\n\r\n

No give-away this week, but we\'ll be giving a (digital) Pathfinder starter kit out next week.

',78,95,0,'CC-BY-SA','Interface Zero,actual play,rpg,gaming,live play',0,0,1), +(2435,'2017-12-01','Server Basics 102',2926,'Klaatu talks about SSH configuration on the server you set up in 101.','

Klaatu talks about SSH, changing SSH ports, and using SSH keys for the server you presumably set up after hearing Server Basics 101 in this series.

',78,0,0,'CC-BY-SA','server,admin,sys admin,linux',0,0,1), +(2441,'2017-12-11','Server Basics 103',1773,'Firewalls and fail2ban','

Klaatu walks you through installing, configuring, and running fail2ban, and discusses the basics about firewalls.

\r\n\r\n',78,0,0,'CC-BY-SA','server,admin,sys admin,linux',0,0,1), +(2433,'2017-11-29','You were right, I was wrong',519,'Ken eats humble pie','

\r\nKen puts the record straight after inaccurate comments during hpr2416 :: HPR Community News for October 2017 about \r\n hpr2406 :: Putting Ends onto CAT6 Ethernet Cables by Shane Shennan.

\r\n\r\n

Links

\r\n\r\n',30,0,0,'CC-BY-SA','Correction',0,0,1), +(2432,'2017-11-28','Living with the Nokia 6 – an update to HPR 2405',316,'An update to my show on the Nokia 6 phone','

Living with the Nokia 6 – an update to HPR 2405

\r\n

I’ve now been using the Nokia 6 for about 2 months and just wanted to update listeners to my thoughts on the phone.

\r\n

First a response to Dave who said on the Community News that as he had a OnePlus 1 he was surprised I found it inadequate. The One+1 is a great phone, my problem with it was it does not support O2’s 4G network although it supports EE’s and 3’s 4G networks here in the UK, as I use GiffGaff which runs on the O2 network I have not been able to benefit from their 4G offer and I don’t want to change provider. Also the One+1 was stuck on CyanogenMod 13.1 (Android 6) and no longer got updates, so this was the reason for the new phone purchase. I’ve now flashed Lineage OS onto the One+1 and have a secure backup phone or one I can pass on to my Wife at some stage.

\r\n

Back to the Nokia, now I’ve lived with the phone for a few weeks I can say I am more than happy with it, and some of the issues with battery life I have found are unfounded once you configure some of the settings to be more battery friendly, such as restricting background access to the net for most aps the battery life is well over a day\'s use. At night in stand by mode over 8 hours battery use is less than 1% so even with moderate to heavy use I can get a day out of the phone without any risk of running out. Also if the official charger and cable are used a 1 hour charge gives about a 30-40% battery capacity, so not as slow as the reviews I’ve read. Would I still buy it having used it for 2 months, I would say yes to that, and I also have no issues with recommending it as a large format phone at a budget price.

',338,57,0,'CC-BY-SA','Android, Nokia 6, Phones, New Kit, OnePlus1',0,0,1), (2437,'2017-12-05','Interface Zero Play-through Part 3',2543,'Klaatu, Lobath, and Thaj play the Interface Zero RPG','

\r\nKlaatu, Lobath, and Thaj continue their play-through of the Interface Zero RPG, using the Job InSecurity adventure.\r\n

\r\n\r\n

\r\nLyphrygerator composed by William Kenlon, used with permission.\r\n

\r\n\r\n

\r\nAll other music by Klaatu.\r\n

\r\n\r\n

Some sounds from freesound.org used for texture. Obligatory credits will appear in final episode.\r\n

',78,95,1,'CC-BY-SA','Interface Zero,cyberpunk,rpg,game',0,0,1), (2428,'2017-11-22','git Blobs',1982,'Klaatu talks about git-media and git-annex','

How do you manage large binary blobs, like pictures or video or sounds, when using git?

\r\n\r\n

In this episode, Klaatu explains two popular options:

\r\n\r\n\r\n\r\n

Thanks to CapsLok at freesound.org for the sound effect.

\r\n',78,81,0,'CC-BY-SA','git',0,0,1), (2444,'2017-12-14','Interface Zero Play-through Part 4',1927,'Klaatu, Lobath, and Thaj play the Interface Zero RPG','

The investigation continues!

\r\n

Guest voice in this and episode 3 by Gort.

',78,95,0,'CC-BY-SA','Interface Zero,rpg,game,play,pathfinder,dnd',0,0,1), @@ -992,9 +998,3 @@ INSERT INTO `eps` (`id`, `date`, `title`, `duration`, `summary`, `notes`, `hosti (3393,'2021-08-04','We need to talk about XML',1885,'An extensible markup language? This is too good to be true!','

Klaatu introduces XML.

\r\n\r\n

\r\nThe sample XML document discussed in this episode is:\r\n

\r\n\r\n
\r\n\r\n<xml>\r\n  <sol>\r\n    <planet>\r\n      <name>\r\n        Mercury\r\n      </name>\r\n      <albedo>\r\n        0.11\r\n      </albedo>\r\n    </planet>\r\n    <planet>\r\n      <name>\r\n        Venus\r\n      </name>\r\n      <albedo>\r\n        0.7\r\n      </albedo>\r\n    </planet>\r\n    <planet>\r\n      <name>\r\n        Terra\r\n      </name>\r\n      <albedo>\r\n        0.39\r\n      </albedo>\r\n    </planet>\r\n  </sol>\r\n</xml>\r\n\r\n
\r\n',78,0,0,'CC-BY-SA','xml,data,markup,markdown',0,0,1), (3394,'2021-08-05','Be an XML star with xmlstarlet',1591,'Parse XML from the terminal','

See the layout of an XML document

\r\n\r\n
\r\n$ xmlstarlet elements planets.xml\r\nxml\r\nxml/sol\r\nxml/sol/planet\r\nxml/sol/planet/name\r\nxml/sol/planet/albedo\r\nxml/sol/planet\r\nxml/sol/planet/name\r\nxml/sol/planet/albedo\r\nxml/sol/planet\r\nxml/sol/planet/name\r\nxml/sol/planet/albedo\r\n\r\n
\r\n\r\n

See content of the planet node

\r\n\r\n
\r\n$ xmlstarlet select -t --value-of \'/xml/sol/planet\' planets.xml\r\n\r\n        Mercury\r\n        0.11\r\n\r\n        Venus\r\n        0.7\r\n\r\n        Terra\r\n        0.39\r\n
\r\n\r\n

Get the third instance of the planet node

\r\n\r\n
\r\n$ xmlstarlet select -t --value-of \'/xml/sol/planet[3]\' planets.xml\r\nTerra\r\n0.39\r\n
\r\n\r\n

Get only the planets with an albedo greater than 0.25

\r\n\r\n
\r\n$ xmlstarlet select -t --value-of \'/xml/sol/planet[albedo > 0.25]\' planets.xml\r\n\r\nVenus\r\n0.7\r\n\r\nTerra\r\n0.39\r\n
\r\n\r\n

Get only the planets closer to Sol than the third planet

\r\n\r\n
\r\n$ xmlstarlet select -t --value-of \'/xml/sol/planet[position() < 3]\' planets.xml\r\n\r\nMercury\r\n0.11\r\n\r\nVenus\r\n0.7\r\n
\r\n\r\n

Learn more XPath functions at Mozilla Developer Network.

\r\n\r\n

Download xmlstarlet from xmlstar.sourceforge.net (https://sourceforge.net/projects/xmlstar/).\r\n

\r\n',78,0,0,'CC-BY-SA','xml,data,markup,markdown',0,0,1), (3441,'2021-10-11','Murphy Work Bench',842,'Operator talks about hitting his head on his work bench','\r\n\r\n\r\n

\"https://hackerpublicradio.org/eps/hpr3441/WorkBench.gif\"

\r\n',36,0,1,'CC-BY-SA','DIY,wood working,hacking',0,0,1), -(3396,'2021-08-09','Card roles in Magic the Gathering',2367,'There are over 25,000 cards in MTG. You only need 60 to play.','

Cutting to the chase:

\r\n

When getting into Magic the Gathering, it's easy to get overwhelmed and confused by choice. Instead of thinking about cards, I've learnt to think about the game mechanic roles that a deck needs to have satisfied, and then I look for cards that fill those roles.\r\n

\r\n\r\n

My list is by no means definitive, but I think these are the basic universal roles you need, regardless of how you play:

\r\n\r\n\r\n\r\n

There are other card types that can be useful, but they may be best for specific strategies. The ones I list here are, I believe, pretty universal.\r\n

\r\n\r\n

You can find lists of cards that fill specific roles with a simple Internet search. For instance, if you realize you have no cards that let you replenish your hand, you might search for "best cards to draw cards MTG" and get directed to a site like TappedOut.net or magic.wizards.com.

\r\n\r\n

Go to your local game store or an online vendor to buy just the cards you need. Because there are so many to choose from in any given category, you get to control the price. I have a rule for myself that do not spend over $2 on any single card.\r\n

\r\n\r\n

When trying to fill roles, I generally aim to get 4 cards that do the thing I need. Sometimes I get exactly the same card 4 times, other times I get a variety of cards to fill the role. Either way, 4 usually feels like a good draw frequency for each role.

\r\n\r\n',78,0,0,'CC-BY-SA','magic, mtg, card, tcg',0,0,1), -(3401,'2021-08-16','Mana hacks',1924,'Klaatu muses about mana ramping in Magic the Gathering','

The categories of mana ramps I have defined for myself are:

\r\n\r\n',78,95,0,'CC-BY-SA','magic, mtg, card, tcg, mana',0,0,1), -(3397,'2021-08-10','What is a PineTime',595,'In this podcast I talk a little bit about the pinetime.','

\r\nThis is the first impression of a PineTime watch that I bought about a week ago and have already done some changes to the underlying code. I think this is an interesting project and open source so you can contribute.\r\n

\r\n

\r\nGithub repository:\r\nhttps://github.com/JF002/InfiniTime\r\n

\r\n

\r\nSales page:\r\nhttps://www.pine64.org/pinetime/\r\n

',382,0,0,'CC-BY-SA','open source, watch, coding',0,0,1), -(3406,'2021-08-23','A study of cards in games',1633,'Currency, deterrent, coersion, clutter, rules','

What function cards have in games.

',78,95,0,'CC-BY-SA','card, game',0,0,1), -(3402,'2021-08-17','Reading a manifesto: Declaration of Digital Autonomy',877,'Reading and brief commentary and background on Molly DeBlanc\'s and Karen Sandler\'s techautonomy.org','

This episode, as its source material, is licensed under the Creative Commons Attribution-ShareAlike 4.0 International license.

\r\n

Previously

\r\n\r\n

Free Software Timeline

\r\n\r\n

Further sources for timeline:

\r\n\r\n

People

\r\n

Molly DeBlanc

\r\n

https://deblanc.net/blog/about/

\r\n\r\n

Karen Sandler

\r\n

https://en.wikipedia.org/wiki/Karen_Sandler

\r\n\r\n

Manifesto

\r\n

https://techautonomy.org/

\r\n

Declaration of Digital Autonomy (draft 0.1)

\r\n

We demand a world in which technology is created to protect and empower the people who use it. Our technology must respect the rights and freedoms of those users. We need to take control for the purpose of collectively building a better world in which technology works in service to the good of human kind, protecting our rights and digital autonomy as individuals.

\r\n

We have become more reliant than ever on technology that we intertwine into every aspect of our lives. That technology is currently made not for us, those using it. Rather, it is for the companies who intend to monetize its use and whoever owns the associated copyrights and patents. Services are run via networked software on computers we never directly interact with. Our devices are designed to only function while broadcasting our intimate information regardless of whether the transmission of that information is necessary functionality. We generate data that we do not have access to, that is bought, sold, and traded between corporations and governments. Technologies we\'re increasingly being forced to use reinforce and amplify social inequalities. As schools and jobs go online, high speed computing, centralized services and Internet become inescapably necessary. Technology is designed and implemented to oppress, often with sexist, classist, and racist implications. Rather than being served by these tools, we are instead in service to them. These gatekeepers of our technology are not individual people or public organizations who think about the wellbeing of others, but instead are corporations, governments and others with agendas that do not include our best interests. Our technology has become the basic infrastructure on which our society functions, and yet the individuals who use it have no say or control over its function.

\r\n

It\'s time to change our digital destiny.

\r\n

We believe it is necessary for technology to provide opportunity for: informed consent of use; transparent development and operation; privacy and security from bad actors; interaction without fear of surveillance; technology to work primarily on the terms of the people using it; functionality inside and outside of connected networks; use with other services and other software, repair; and connection, and not alienation, from the technology itself and that which is created from it.

\r\n

We therefore call for the adoption of the following principles for ethical technology:

\r\n\r\n

We, as individuals, collectives, cultures, and societies, are making this call in the rapidly changing face of technology and its deepening integration into our lives. Technology must support us as we forge our own digital destinies as our connectivity to digital networks and one another changes in ways we anticipate and in ways we have yet to imagine. Technology makers and those who use this technology can form the partnerships necessary to build the equitable, hopeful future we dream of.

\r\n

We\'d love to hear what you think! Let us know by emailing thoughts@ this domain.

\r\n

The Declaration of Digital Autonomy is (c) Molly de Blanc and Karen M. Sandler, 2020, licensed under Creative Commons Attribution-ShareAlike 4.0 International.

\r\n',311,0,1,'CC-BY-SA','manifesto, community, free software, open source, politics, philosophy, digital autonomy',0,0,1), -(3398,'2021-08-11','Anacron',949,'Put down that crontab and get started with anacron','

Setup

\r\n\r\n
\r\n$ mkdir -p ~/.local/etc/cron.daily ~/.var/spool/anacron\r\n
\r\n\r\n\r\n

Create a file called anacrontab:

\r\n\r\n
\r\n$ touch /.local/etc/anacrontab\r\n
\r\n\r\n

Set it up to trigger scripts in your cron.daily folder:\r\n

\r\n\r\n
\r\nSHELL=/bin/sh\r\nPATH=/sbin:/bin:/usr/sbin:/usr/bin\r\n1  0  cron.daily   run-parts $HOME/.local/etc/cron.daily/\r\n
\r\n\r\n

\r\nValidate your anacrontab:\r\n

\r\n\r\n
\r\n$ anacron -T -t ~/.local/etc/anacrontab -S ~/.var/spool/anacron\r\n
\r\n\r\n

Start anacron in a file that gets triggered at login, such as ~/.profile:\r\n

\r\n\r\n
\r\nanacron -t $HOME/.local/etc/anacrontab -S $HOME/.var/spool/anacron\r\n
\r\n\r\n

Using

\r\n\r\n

Now that everything is set up, just put scripts you want to run regularly in cron.daily, and make them executable.\r\n

\r\n\r\n

You can set up a weekly directory, too. Just set the time interval in your anacrontab to:\r\n

\r\n\r\n
\r\nSHELL=/bin/sh\r\nPATH=/sbin:/bin:/usr/sbin:/usr/bin\r\n7  0  cron.weekly   run-parts $HOME/.local/etc/cron.weekly/\r\n
',78,0,0,'CC-BY-SA','cron, linux, service, automation',0,0,1), diff --git a/sql/hpr-db-part-14.sql b/sql/hpr-db-part-14.sql index 723c2c5..74980db 100644 --- a/sql/hpr-db-part-14.sql +++ b/sql/hpr-db-part-14.sql @@ -1,3 +1,9 @@ +(3396,'2021-08-09','Card roles in Magic the Gathering',2367,'There are over 25,000 cards in MTG. You only need 60 to play.','

Cutting to the chase:

\r\n

When getting into Magic the Gathering, it's easy to get overwhelmed and confused by choice. Instead of thinking about cards, I've learnt to think about the game mechanic roles that a deck needs to have satisfied, and then I look for cards that fill those roles.\r\n

\r\n\r\n

My list is by no means definitive, but I think these are the basic universal roles you need, regardless of how you play:

\r\n\r\n\r\n\r\n

There are other card types that can be useful, but they may be best for specific strategies. The ones I list here are, I believe, pretty universal.\r\n

\r\n\r\n

You can find lists of cards that fill specific roles with a simple Internet search. For instance, if you realize you have no cards that let you replenish your hand, you might search for "best cards to draw cards MTG" and get directed to a site like TappedOut.net or magic.wizards.com.

\r\n\r\n

Go to your local game store or an online vendor to buy just the cards you need. Because there are so many to choose from in any given category, you get to control the price. I have a rule for myself that do not spend over $2 on any single card.\r\n

\r\n\r\n

When trying to fill roles, I generally aim to get 4 cards that do the thing I need. Sometimes I get exactly the same card 4 times, other times I get a variety of cards to fill the role. Either way, 4 usually feels like a good draw frequency for each role.

\r\n\r\n',78,0,0,'CC-BY-SA','magic, mtg, card, tcg',0,0,1), +(3401,'2021-08-16','Mana hacks',1924,'Klaatu muses about mana ramping in Magic the Gathering','

The categories of mana ramps I have defined for myself are:

\r\n\r\n',78,95,0,'CC-BY-SA','magic, mtg, card, tcg, mana',0,0,1), +(3397,'2021-08-10','What is a PineTime',595,'In this podcast I talk a little bit about the pinetime.','

\r\nThis is the first impression of a PineTime watch that I bought about a week ago and have already done some changes to the underlying code. I think this is an interesting project and open source so you can contribute.\r\n

\r\n

\r\nGithub repository:\r\nhttps://github.com/JF002/InfiniTime\r\n

\r\n

\r\nSales page:\r\nhttps://www.pine64.org/pinetime/\r\n

',382,0,0,'CC-BY-SA','open source, watch, coding',0,0,1), +(3406,'2021-08-23','A study of cards in games',1633,'Currency, deterrent, coersion, clutter, rules','

What function cards have in games.

',78,95,0,'CC-BY-SA','card, game',0,0,1), +(3402,'2021-08-17','Reading a manifesto: Declaration of Digital Autonomy',877,'Reading and brief commentary and background on Molly DeBlanc\'s and Karen Sandler\'s techautonomy.org','

This episode, as its source material, is licensed under the Creative Commons Attribution-ShareAlike 4.0 International license.

\r\n

Previously

\r\n\r\n

Free Software Timeline

\r\n\r\n

Further sources for timeline:

\r\n\r\n

People

\r\n

Molly DeBlanc

\r\n

https://deblanc.net/blog/about/

\r\n\r\n

Karen Sandler

\r\n

https://en.wikipedia.org/wiki/Karen_Sandler

\r\n\r\n

Manifesto

\r\n

https://techautonomy.org/

\r\n

Declaration of Digital Autonomy (draft 0.1)

\r\n

We demand a world in which technology is created to protect and empower the people who use it. Our technology must respect the rights and freedoms of those users. We need to take control for the purpose of collectively building a better world in which technology works in service to the good of human kind, protecting our rights and digital autonomy as individuals.

\r\n

We have become more reliant than ever on technology that we intertwine into every aspect of our lives. That technology is currently made not for us, those using it. Rather, it is for the companies who intend to monetize its use and whoever owns the associated copyrights and patents. Services are run via networked software on computers we never directly interact with. Our devices are designed to only function while broadcasting our intimate information regardless of whether the transmission of that information is necessary functionality. We generate data that we do not have access to, that is bought, sold, and traded between corporations and governments. Technologies we\'re increasingly being forced to use reinforce and amplify social inequalities. As schools and jobs go online, high speed computing, centralized services and Internet become inescapably necessary. Technology is designed and implemented to oppress, often with sexist, classist, and racist implications. Rather than being served by these tools, we are instead in service to them. These gatekeepers of our technology are not individual people or public organizations who think about the wellbeing of others, but instead are corporations, governments and others with agendas that do not include our best interests. Our technology has become the basic infrastructure on which our society functions, and yet the individuals who use it have no say or control over its function.

\r\n

It\'s time to change our digital destiny.

\r\n

We believe it is necessary for technology to provide opportunity for: informed consent of use; transparent development and operation; privacy and security from bad actors; interaction without fear of surveillance; technology to work primarily on the terms of the people using it; functionality inside and outside of connected networks; use with other services and other software, repair; and connection, and not alienation, from the technology itself and that which is created from it.

\r\n

We therefore call for the adoption of the following principles for ethical technology:

\r\n\r\n

We, as individuals, collectives, cultures, and societies, are making this call in the rapidly changing face of technology and its deepening integration into our lives. Technology must support us as we forge our own digital destinies as our connectivity to digital networks and one another changes in ways we anticipate and in ways we have yet to imagine. Technology makers and those who use this technology can form the partnerships necessary to build the equitable, hopeful future we dream of.

\r\n

We\'d love to hear what you think! Let us know by emailing thoughts@ this domain.

\r\n

The Declaration of Digital Autonomy is (c) Molly de Blanc and Karen M. Sandler, 2020, licensed under Creative Commons Attribution-ShareAlike 4.0 International.

\r\n',311,0,1,'CC-BY-SA','manifesto, community, free software, open source, politics, philosophy, digital autonomy',0,0,1), +(3398,'2021-08-11','Anacron',949,'Put down that crontab and get started with anacron','

Setup

\r\n\r\n
\r\n$ mkdir -p ~/.local/etc/cron.daily ~/.var/spool/anacron\r\n
\r\n\r\n\r\n

Create a file called anacrontab:

\r\n\r\n
\r\n$ touch /.local/etc/anacrontab\r\n
\r\n\r\n

Set it up to trigger scripts in your cron.daily folder:\r\n

\r\n\r\n
\r\nSHELL=/bin/sh\r\nPATH=/sbin:/bin:/usr/sbin:/usr/bin\r\n1  0  cron.daily   run-parts $HOME/.local/etc/cron.daily/\r\n
\r\n\r\n

\r\nValidate your anacrontab:\r\n

\r\n\r\n
\r\n$ anacron -T -t ~/.local/etc/anacrontab -S ~/.var/spool/anacron\r\n
\r\n\r\n

Start anacron in a file that gets triggered at login, such as ~/.profile:\r\n

\r\n\r\n
\r\nanacron -t $HOME/.local/etc/anacrontab -S $HOME/.var/spool/anacron\r\n
\r\n\r\n

Using

\r\n\r\n

Now that everything is set up, just put scripts you want to run regularly in cron.daily, and make them executable.\r\n

\r\n\r\n

You can set up a weekly directory, too. Just set the time interval in your anacrontab to:\r\n

\r\n\r\n
\r\nSHELL=/bin/sh\r\nPATH=/sbin:/bin:/usr/sbin:/usr/bin\r\n7  0  cron.weekly   run-parts $HOME/.local/etc/cron.weekly/\r\n
',78,0,0,'CC-BY-SA','cron, linux, service, automation',0,0,1), (3411,'2021-08-30','Dominion card game',1673,'Klaatu talks about the Dominion card game','

Dominion is a card game. Lots of fun. You should try it.

\r\n\r\n

You can even play online for free at dominion.games\r\n

',78,95,0,'CC-BY-SA','card, game',0,0,1), (3409,'2021-08-26','Linux Inlaws S01E37: All about Hacker Public Radio',5738,'An interview with Ken Fallon, Janitor at Hacker Public Radio','

\r\n In this episode of our beloved open source podcast rapidly approaching its\r\n zenith of popularity (with hopefully not an equally rapid decline afterwards)\r\n our two elderly heroes pay tribute to Hacker Public Radio in general and\r\n Ken Fallon in particular. Plus: a never-heard-of-before peek into Martin\'s\r\n very own private life (we lift the veil and reveal it all - don\'t miss this!)\r\n

\r\n\r\n

Links:

\r\n\r\n',384,111,1,'CC-BY-SA','HPR, cleaning, janitoring, having a good time, Richard M. Stallman, stats',0,0,1), (3417,'2021-09-07','Ceph cluster hardware',729,'Looking into the hardware behind my ceph cluster ','

In this video I talk about 4 different computers that could be used in a ceph cluster and what I use and what could be good solutions. If you want to have a visual aid I\'ve created a youtube video talking about the same thing.

\r\n\r\n',382,0,0,'CC-BY-SA','ceph, cluster, hardware',0,0,1), @@ -565,7 +571,7 @@ INSERT INTO `eps` (`id`, `date`, `title`, `duration`, `summary`, `notes`, `hosti (3999,'2023-11-30','Holiday Challenges Series Ep 02 TryHackMe Advent of Cyber Challenge',183,'Discussing the TryHackMe Advent of Cyber challenge to help you enjoy the holiday season','Holiday\nChallenges Series - Ep 2 - TryHackMe Advent of Cyber Challenge\n

Since some of the information you are about to hear is time specific,\nI want to let you know that I am recording this near the end of November\nin 2023.

\n

If you missed the first episode, which introduces this series, you\ncan go back and listen to HPR3996

\n

I have been using TryHackMe for several years, and I recommend it to\nall of my students. It is a great environment where people can get hands\non experience with technology that relates to cyber security, all from\nthe comfort of their browser and free year-round.

\n

The TryHackMe Advent of Cyber challenge is a free gamified\nenvironment which focuses on penetration testing, security\noperations/engineering, forensics/incident response, malware analysis,\nmachine learning, and more!

\n

This year\'s challenge opens on December 1, 2023 (Which is the reason\nwhy I am posting twice this week). Typically, the Advent of Cyber\nchallenge includes daily beginner-friendly exercises for people new to\ncybersecurity. These can consist of walkthroughs, video tutorials, and\nchallenges. There are also prizes available based on random drawings and\non participant success.

\n

Infosec personalities like John Hammond, Gerald Auger, InsiderPHD,\nand InfoSec Pat are featured in this year\'s challenge.

\n

You can play with last year\'s Advent of Cyber challenge by visiting\nhttps://tryhackme.com/room/adventofcyber4. It outlines\nthe overall story and shows all of the tasks last year\'s participants\nexperienced, including both offensive and defensive topics like: log\nanalysis, OSINT, scanning, brute force attacks, email analysis,\nCyberChef, blockchain smart contracts, malware analysis, memory\nforensics, packet analysis, web application hacking, and more!

\n

Everything can be done with a free account from within a browser.

\n

If you want to learn more about cybersecurity, transition your career\ninto infosec, or just have fun playing with cyber challenges, you can\ngive it a try by visiting tryhackme.com or https://tryhackme.com/r/christmas

\n

Please note: I am not affiliated with TryHackMe in any way, other\nthan having been a paying member for many years. Students and others who\nhave participated in previous year\'s Advent of Cyber challenges have\ntold me how much they enjoyed it and learned from it. Even though I have\nbeen an infosec practitioner for more years than I would like to admit,\nI also have enjoyed taking part in this challenge.

\n

If this is not for you, I will be sharing another option for a\nholiday challenge in my next episode.

\n',394,0,0,'CC-BY-SA','Advent of Cyber, TryHackMe, Hands on, cyber, cybersecurity, infosec, holiday, challenge',0,0,1), (4006,'2023-12-11','Holiday Challenges Ep 3 SANS Holiday Hack Challenge & KringleCon',160,'Discussing the SANS Holiday Hack Challenge & KringleCon to help you enjoy the holiday season','Holiday\nChallenges Series - Ep 3 - SANS Holiday Hack Challenge with\nKringleCon\n

Since some of the information you are about to hear is time specific,\nI want to let you know that I am recording this near the end of November\nin 2023.

\n

If you missed the first episode, which introduces this series, you\ncan go back and listen to HPR3996

\n

The SANS Holiday Hack Challenge is an interactive online technology\nand hacking game combined with a virtual security conference, beginning\nin the second week of December. By the time this episode drops, it may\nalready be live. You can tour the North Pole conference facilities,\nmeeting people, interactive non-player characters (NPC), and maybe even\nsome villains from Holiday Hack Challenges past, as you solve problems\nand gather clues which you use to help save Christmas.

\n

Everything can be done from within the browser, and did I mention\nthere is a virtual security conference, called KringleCon? Some of the\nbiggest rock stars (and most humble and brilliant people) in\nCyberSecurity speak each year at KringleCon. Many of their talks also\nprovide clues to solving game challenges.

\n

Ed Skoudis and his team (The same people who build SANS NetWars) work\ntirelessly year after year to create the most amazing experience,\ncomplete with custom music! This has become one of my favorite holiday\ntraditions each year. You can learn more about the 2023 challenge by\nwatching Ed\'s Inside SANS Holiday Hack Challenge 2023 YouTube video at\nhttps://www.youtube.com/watch?v=X9Gmdr_CxzQ

\n

You can access this year\'s challenge by visiting sans.org/holidayhack\nor https://www.sans.org/mlp/holiday-hack-challenge-2023/

\n

There, you will learn more about all things Holiday Hack before the\ngame opens in the second week of December. If you want to play now, or\njust get a feel for it, you can access three of the previous years\'\nchallenges right now at the same site.

\n

I am not associated with SANS or the Holiday Hack Challenge in any\nway, other than to have participated for several years now, and I have\nwatched other people learn and grow by taking part in it.

\n

I hope that you have enjoyed this short series. If there are other\nonline challenges you find interesting or informative, I encourage you\nto record a show about them.

\n

Have a wonderful day.

\n',394,0,0,'CC-BY-SA','SANS, KringleCon, holiday, challenge',0,0,1), (3997,'2023-11-28','The Oh No! News.',875,'Sgoti talks about Malware distributed via Google\'s Dynamic Ads and more.','

The Oh No! news.

\n

Oh No! News is Good\nNews.

\n
    \n
  • TAGS: Oh No, News, Threat analysis, InfoSec, Google\nDynamic Search Ads
  • \n
\n
\n

Threat analysis;\nyour attack surface.

\n
    \n
  • Source: Former\nNHS secretary found guilty of illegally accessing medical\nrecords
    \n

    \n
      \n
    • A former NHS employee has been found guilty and fined for illegally\naccessing the medical records of over 150 people.
      \n
    • \n
    • Loretta Alborghetti, from Redditch, worked as a medical secretary\nwithin the Ophthalmology department at Worcestershire Acute Hospitals\nNHS Trust when she illegally accessed the records.
      \n
    • \n
  • \n
  • Supporting Source: Open\nStreet Map link to Redditch Worcestershire.
    \n

  • \n
  • Source: NetSupport\nRAT Infections on the Rise. Targeting Government and Business\nSectors
    \n

    \n
      \n
    • While NetSupport Manager started off as a legitimate remote\nadministration tool for technical assistance and support, malicious\nactors have misappropriated the tool to their own advantage, using it as\na beachhead for subsequent attacks.
      \n
    • \n
  • \n
  • Source: Beware:\nMalicious Google Ads Trick WinSCP Users into Installing\nMalware
    \n

    \n
      \n
    • The threat actors are believed to leverage Google\'s Dynamic Search\nAds (DSAs), which automatically generates ads based on a site\'s content\nto serve the malicious ads that take the victims to the infected\nsite.
      \n
    • \n
  • \n
  • Source: Trojanized\nPyCharm Software Version Delivered via Google Search Ads.
    \n

    \n
      \n
    • Victims who clicked on the ad were taken to a hacked web page with a\nlink to download the application, which turned out to install over a\ndozen different pieces of malware instead.
      \n
    • \n
  • \n
\n
\n

InfoSec; the language\nof security.

\n
    \n
  • Source: Why\nDefenders Should Embrace a Hacker Mindset
    \n
  • \n
\n
\n
    \n
  • Additional Information.\n
      \n
    • What is a \"Data\nBreach\"? A data breach is a security violation, in which sensitive,\nprotected or confidential data is copied, transmitted, viewed, stolen,\naltered or used by an individual unauthorized to do so.
      \n
    • \n
    • What is \"Malware\"?\nMalware (a portmanteau for\nmalicious software) is any software intentionally designed to cause\ndisruption to a computer, server, client, or computer network, leak\nprivate information, gain unauthorized access to information or systems,\ndeprive access to information, or which unknowingly interferes with the\nuser\'s computer security and privacy.
      \n
    • \n
    • What is a \"Payload\"?\nIn the context of a computer virus or worm, the payload is the portion\nof the malware which performs malicious action; deleting data, sending\nspam or encrypting data. In addition to the payload, such malware also\ntypically has overhead code aimed at simply spreading itself, or\navoiding detection.
      \n
    • \n
    • What is \"Phishing\"?\nPhishing is a form of social engineering\nwhere attackers deceive people into revealing sensitive information or\ninstalling malware such as ransomware. Phishing\nattacks have become increasingly sophisticated and often transparently\nmirror the site being targeted, allowing the attacker to observe\neverything while the victim is navigating the site, and transverse any\nadditional security boundaries with the victim.
      \n
    • \n
    • Social\nengineering (security) In the context of information security,\nsocial engineering is the psychological\nmanipulation of people into performing actions or divulging\nconfidential information. A type of confidence trick for the purpose of\ninformation gathering, fraud, or system access, it differs from a\ntraditional \"con\" in that it is often one of many steps in a more\ncomplex fraud scheme.
      \n
    • \n
    • What is \"Information\nSecurity\" (InfoSec)? Information security, sometimes shortened to\nInfoSec, is the practice of protecting information by mitigating information risks. It\nis part of information risk\nmanagement.\n
        \n
      • Information Security Attributes: Confidentiality, Integrity and Availability (C.I.A.).\nInformation Systems are composed in three main portions, hardware,\nsoftware and communications with the purpose to help identify and apply\ninformation security industry standards, as mechanisms of protection and\nprevention, at three levels or layers: physical, personal and\norganizational. Essentially, procedures or policies are implemented to\ntell administrators, users and operators how to use products to ensure\ninformation security within the organizations.
        \n
      • \n
    • \n
    • What is \"Risk\nmanagement\"? Risk management is the identification, evaluation, and\nprioritization of risks followed by coordinated and economical\napplication of resources to minimize, monitor, and control the\nprobability or impact of unfortunate events or to maximize the\nrealization of opportunities.
      \n
    • \n
    • What is a \"Vulnerability\"\n(computing)? Vulnerabilities are flaws in a computer system that\nweaken the overall security of the device/system. Vulnerabilities can be\nweaknesses in either the hardware itself, or the software that runs on\nthe hardware.
      \n
    • \n
    • What is an \"Attack\nSurface\"? The attack surface of a software environment is the sum of\nthe different points (for \"attack vectors\") where an unauthorized user\n(the \"attacker\") can try to enter data to or extract data from an\nenvironment. Keeping the attack surface as small as possible is a basic\nsecurity measure.
      \n
    • \n
    • What is an \"Attack\nVector\"? In computer security, an attack vector is a specific path,\nmethod, or scenario that can be exploited to break into an IT system,\nthus compromising its security. The term was derived from the\ncorresponding notion of vector in biology. An attack vector may be\nexploited manually, automatically, or through a combination of manual\nand automatic activity.
      \n
    • \n
    • What is\n\"Standardization\"? Standardization is the process of implementing\nand developing technical standards based on the consensus of different\nparties that include firms, users, interest groups, standards\norganizations and governments. Standardization can help maximize\ncompatibility, interoperability, safety, repeatability, or quality. It\ncan also facilitate a normalization of formerly custom processes.\n
    • \n
    • What is a \"Replay\nattack\"? A replay attack is a form of network attack in which valid\ndata transmission is maliciously or fraudulently repeated or delayed.\nAnother way of describing such an attack is: \"an attack on a security\nprotocol using a replay of messages from a different context into the\nintended (or original and expected) context, thereby fooling the honest\nparticipant(s) into thinking they have successfully completed the\nprotocol run.\"
      \n
    • \n
    • What is a\n\"Man-in-the-middle attack\"? In cryptography and computer security, a\nman-in-the-middle, ..., attack is a cyberattack where the attacker\nsecretly relays and possibly alters the communications between two\nparties who believe that they are directly communicating with each\nother, as the attacker has inserted themselves between the two\nparties.
      \n
    • \n
    • What is \"Transport Layer\nSecurity\" (TLS)? Transport Layer Security (TLS) is a cryptographic\nprotocol designed to provide communications security over a computer\nnetwork. The protocol is widely used in applications such as email,\ninstant messaging, and voice over IP, but its use in securing HTTPS\nremains the most publicly visible.
      \n
    • \n
    • What is a \"Handshake\"\n(computing)?. In computing, a handshake is a signal between two\ndevices or programs, used to, e.g., authenticate, coordinate. An example\nis the handshaking between a hypervisor and an application in a guest\nvirtual machine.
      \n
    • \n
    • What is Security\ntheater? The practice of taking security measures that are\nconsidered to provide the feeling of improved security while doing\nlittle or nothing to achieve it.
      \n
    • \n
  • \n
\n
\n\n',391,74,0,'CC-BY-SA','Oh No News, Threat analysis, InfoSec, Google Dynamic Search Ads',0,0,1), -(4005,'2023-12-08','Sgoti\'s reply to multiple shows.',893,'Sgoti replies to a few HPR Shows.','

Sgoti\'s reply to multiple\nshows.

\n

Sgoti replies to a few HPR\nShows.

\n
    \n
  • Tags: Reply show, password managers, lastpass.

  • \n
  • Reply to: hpr3988\n:: Beeper.com
    \n

  • \n
  • Supporting Source: Beeper chat application
    \n

  • \n
  • Supporting Source: Beeper Github page
    \n

  • \n
  • Supporting Source: Work with us at\nBeeper
    \n

  • \n
  • Reply to: hpr3989 :: LastPass\nSecurity Update 1 November 2023
    \n

  • \n
  • Reply to: hpr3994 ::\nLastpass Response
    \n

  • \n
  • Source: The\nTHREE STOOGES - A Plumbing We Will Go
    \n

  • \n
  • Source: Whitest Kids U Know:\nLeg Peeing
    \n

    \n
      \n
    • This was just funny. I found it while searching for, \"why the\nBritish say things like taking a piss\".
    • \n
  • \n
\n

This work is licensed under a Creative Commons\nAttribution-ShareAlike 4.0 International License.

\n',391,0,0,'CC-BY-SA','reply show, password managers, lastpass',0,0,0); +(4005,'2023-12-08','Sgoti\'s reply to multiple shows.',893,'Sgoti replies to a few HPR Shows.','

Sgoti\'s reply to multiple\nshows.

\n

Sgoti replies to a few HPR\nShows.

\n
    \n
  • Tags: Reply show, password managers, lastpass.

  • \n
  • Reply to: hpr3988\n:: Beeper.com
    \n

  • \n
  • Supporting Source: Beeper chat application
    \n

  • \n
  • Supporting Source: Beeper Github page
    \n

  • \n
  • Supporting Source: Work with us at\nBeeper
    \n

  • \n
  • Reply to: hpr3989 :: LastPass\nSecurity Update 1 November 2023
    \n

  • \n
  • Reply to: hpr3994 ::\nLastpass Response
    \n

  • \n
  • Source: The\nTHREE STOOGES - A Plumbing We Will Go
    \n

  • \n
  • Source: Whitest Kids U Know:\nLeg Peeing
    \n

    \n
      \n
    • This was just funny. I found it while searching for, \"why the\nBritish say things like taking a piss\".
    • \n
  • \n
\n

This work is licensed under a Creative Commons\nAttribution-ShareAlike 4.0 International License.

\n',391,0,0,'CC-BY-SA','reply show, password managers, lastpass',0,0,1); /*!40000 ALTER TABLE `eps` ENABLE KEYS */; UNLOCK TABLES; @@ -992,9 +998,3 @@ INSERT INTO `hosts` (`hostid`, `host`, `email`, `profile`, `license`, `local_ima (71,'Will Jason','willjasen.nospam@nospam.charter.net','','CC-BY-SA',0,'',1,'Will Jason'), (411,'Paul J','hpr.nospam@nospam.pauljohnstone.com','I am a full-stack developer','CC-BY-SA',0,'',1,'Paul J'), (412,'m0dese7en','m0dese7en.nospam@nospam.mykolab.com','','CC-BY-SA',0,'',1,'Mode Seven'), -(413,'CCHits.net Team','show.nospam@nospam.cchits.net','CCHits.net is a website which produces a daily, weekly and sometimes even a monthly music podcast. Find out more at cchits.net','CC-BY',0,'',1,'CCHits dot net Team'), -(415,'enistello','enistello.nospam@nospam.tuta.io','@enistello@fosstodon.org','CC-BY-SA',0,'',1,'ennis tello'), -(417,'StarshipTux','wakko222.nospam@nospam.gmail.com','Linux Enthusiast, Podcast Addict','CC-BY-SA',0,'',1,'Star ship Tux'), -(418,'David Thrane Christiansen','david.nospam@nospam.davidchristiansen.dk','

\r\nI love programming languages and their implementations, and I especially love exploring new paradigms of writing programs. I\'m online at https://davidchristiansen.dk.\r\n

','CC-BY',0,'',1,'David Thrane Christiansen'), -(419,'Ryuno-Ki','andre.jaenisch.nospam@nospam.posteo.de','Web-Developer and Consultant as a freelancer since 2023.\r\n\r\nHomepage: https://jaenis.ch/\r\nProfessional email: andre.jaenisch.wdc@posteo.net','CC-BY-SA',0,'',1,'Ryuno-Ki'), -(422,'Fred Black','fredrik.nospam@nospam.svenskaa.net','','CC-BY-SA',0,'',1,'Fred Black'), diff --git a/sql/hpr-db-part-15.sql b/sql/hpr-db-part-15.sql index 985419f..30b8dd7 100644 --- a/sql/hpr-db-part-15.sql +++ b/sql/hpr-db-part-15.sql @@ -1,3 +1,9 @@ +(413,'CCHits.net Team','show.nospam@nospam.cchits.net','CCHits.net is a website which produces a daily, weekly and sometimes even a monthly music podcast. Find out more at cchits.net','CC-BY',0,'',1,'CCHits dot net Team'), +(415,'enistello','enistello.nospam@nospam.tuta.io','@enistello@fosstodon.org','CC-BY-SA',0,'',1,'ennis tello'), +(417,'StarshipTux','wakko222.nospam@nospam.gmail.com','Linux Enthusiast, Podcast Addict','CC-BY-SA',0,'',1,'Star ship Tux'), +(418,'David Thrane Christiansen','david.nospam@nospam.davidchristiansen.dk','

\r\nI love programming languages and their implementations, and I especially love exploring new paradigms of writing programs. I\'m online at https://davidchristiansen.dk.\r\n

','CC-BY',0,'',1,'David Thrane Christiansen'), +(419,'Ryuno-Ki','andre.jaenisch.nospam@nospam.posteo.de','Web-Developer and Consultant as a freelancer since 2023.\r\n\r\nHomepage: https://jaenis.ch/\r\nProfessional email: andre.jaenisch.wdc@posteo.net','CC-BY-SA',0,'',1,'Ryuno-Ki'), +(422,'Fred Black','fredrik.nospam@nospam.svenskaa.net','','CC-BY-SA',0,'',1,'Fred Black'), (423,'Noodlez','contact.nospam@nospam.nathanielbarragan.xyz','Hello all! I\'m Noodlez, an HPR listener and now contributor. I like anything to do with Linux and Linux-adjacent (Like other Unixes), and programming, and other random things like retro gaming.','CC-BY-SA',0,'',1,'Noodlez'); /*!40000 ALTER TABLE `hosts` ENABLE KEYS */; UNLOCK TABLES; @@ -489,4 +495,4 @@ UNLOCK TABLES; /*!40014 SET UNIQUE_CHECKS=@OLD_UNIQUE_CHECKS */; /*!40111 SET SQL_NOTES=@OLD_SQL_NOTES */; --- Dump completed on 2023-11-22 20:01:07 +-- Dump completed on 2023-11-23 5:10:28 diff --git a/sql/hpr.sql b/sql/hpr.sql index 03b7c05..31c8743 100644 --- a/sql/hpr.sql +++ b/sql/hpr.sql @@ -12641,7 +12641,13 @@ INSERT INTO `assets` (`episode_id`, `filename`, `extension`, `size`, `sha1sum`, (4006,'hpr4006.spx','spx',909921,'3a61ab30e756ce5d1c33970eced6169cde9ee8c5','audio/ogg; charset=binary','setgid Ogg data, Speex audio'), (4006,'hpr4006.flac','flac',19101167,'64b13a3f4060e4dec63b6b7f7fee8be0ca0e2fd1','audio/flac; charset=binary','setgid FLAC audio bitstream data, 16 bit, mono, 192 kHz, 46243858 samples'), (4006,'hpr4006.opus','opus',2124972,'817c11021caf97869d3fa6e778168ca7a4d97071','audio/ogg; charset=binary','setgid Ogg data, Opus audio,'), -(4006,'hpr4006.wav','wav',92487818,'d457cc79a14ceaa1fdf818603e729bd182f4563a','audio/x-wav; charset=binary','setgid RIFF (little-endian) data, WAVE audio, mono 192000 Hz'); +(4006,'hpr4006.wav','wav',92487818,'d457cc79a14ceaa1fdf818603e729bd182f4563a','audio/x-wav; charset=binary','setgid RIFF (little-endian) data, WAVE audio, mono 192000 Hz'), +(4005,'hpr4005.mp3','mp3',7794476,'16aa67ee2f5daff091d9eb50e10d583b4866d6b3','audio/mpeg; charset=binary','setgid Audio file with ID3 version 2.4.0, contains:MPEG ADTS, layer III, v1, 64 kbps, 48 kHz, Monaural'), +(4005,'hpr4005.ogg','ogg',9047916,'14499bc44163d3641faa3a4e232f2c1dea4420cf','audio/ogg; charset=binary','setgid Ogg data, Opus audio,'), +(4005,'hpr4005.spx','spx',3679989,'f2558f723a16ad5032721594bbd7cbf7f3256c57','audio/ogg; charset=binary','setgid Ogg data, Speex audio'), +(4005,'hpr4005.flac','flac',74471548,'0252c0250691eac54a5fccd897ce3474a07e67de','audio/flac; charset=binary','setgid FLAC audio bitstream data, 16 bit, mono, 192 kHz, 187056031 samples'), +(4005,'hpr4005.opus','opus',9047916,'09e4d148aca52fb63a7ce69ed1fc4dd6cc3e5c1e','audio/ogg; charset=binary','setgid Ogg data, Opus audio,'), +(4005,'hpr4005.wav','wav',374112164,'387a5b0e00d3186dfc866a164ddcc3fdb0ea1e11','audio/x-wav; charset=binary','setgid RIFF (little-endian) data, WAVE audio, mono 192000 Hz'); /*!40000 ALTER TABLE `assets` ENABLE KEYS */; UNLOCK TABLES; @@ -20565,7 +20571,7 @@ INSERT INTO `eps` (`id`, `date`, `title`, `duration`, `summary`, `notes`, `hosti (3999,'2023-11-30','Holiday Challenges Series Ep 02 TryHackMe Advent of Cyber Challenge',183,'Discussing the TryHackMe Advent of Cyber challenge to help you enjoy the holiday season','Holiday\nChallenges Series - Ep 2 - TryHackMe Advent of Cyber Challenge\n

Since some of the information you are about to hear is time specific,\nI want to let you know that I am recording this near the end of November\nin 2023.

\n

If you missed the first episode, which introduces this series, you\ncan go back and listen to HPR3996

\n

I have been using TryHackMe for several years, and I recommend it to\nall of my students. It is a great environment where people can get hands\non experience with technology that relates to cyber security, all from\nthe comfort of their browser and free year-round.

\n

The TryHackMe Advent of Cyber challenge is a free gamified\nenvironment which focuses on penetration testing, security\noperations/engineering, forensics/incident response, malware analysis,\nmachine learning, and more!

\n

This year\'s challenge opens on December 1, 2023 (Which is the reason\nwhy I am posting twice this week). Typically, the Advent of Cyber\nchallenge includes daily beginner-friendly exercises for people new to\ncybersecurity. These can consist of walkthroughs, video tutorials, and\nchallenges. There are also prizes available based on random drawings and\non participant success.

\n

Infosec personalities like John Hammond, Gerald Auger, InsiderPHD,\nand InfoSec Pat are featured in this year\'s challenge.

\n

You can play with last year\'s Advent of Cyber challenge by visiting\nhttps://tryhackme.com/room/adventofcyber4. It outlines\nthe overall story and shows all of the tasks last year\'s participants\nexperienced, including both offensive and defensive topics like: log\nanalysis, OSINT, scanning, brute force attacks, email analysis,\nCyberChef, blockchain smart contracts, malware analysis, memory\nforensics, packet analysis, web application hacking, and more!

\n

Everything can be done with a free account from within a browser.

\n

If you want to learn more about cybersecurity, transition your career\ninto infosec, or just have fun playing with cyber challenges, you can\ngive it a try by visiting tryhackme.com or https://tryhackme.com/r/christmas

\n

Please note: I am not affiliated with TryHackMe in any way, other\nthan having been a paying member for many years. Students and others who\nhave participated in previous year\'s Advent of Cyber challenges have\ntold me how much they enjoyed it and learned from it. Even though I have\nbeen an infosec practitioner for more years than I would like to admit,\nI also have enjoyed taking part in this challenge.

\n

If this is not for you, I will be sharing another option for a\nholiday challenge in my next episode.

\n',394,0,0,'CC-BY-SA','Advent of Cyber, TryHackMe, Hands on, cyber, cybersecurity, infosec, holiday, challenge',0,0,1), (4006,'2023-12-11','Holiday Challenges Ep 3 SANS Holiday Hack Challenge & KringleCon',160,'Discussing the SANS Holiday Hack Challenge & KringleCon to help you enjoy the holiday season','Holiday\nChallenges Series - Ep 3 - SANS Holiday Hack Challenge with\nKringleCon\n

Since some of the information you are about to hear is time specific,\nI want to let you know that I am recording this near the end of November\nin 2023.

\n

If you missed the first episode, which introduces this series, you\ncan go back and listen to HPR3996

\n

The SANS Holiday Hack Challenge is an interactive online technology\nand hacking game combined with a virtual security conference, beginning\nin the second week of December. By the time this episode drops, it may\nalready be live. You can tour the North Pole conference facilities,\nmeeting people, interactive non-player characters (NPC), and maybe even\nsome villains from Holiday Hack Challenges past, as you solve problems\nand gather clues which you use to help save Christmas.

\n

Everything can be done from within the browser, and did I mention\nthere is a virtual security conference, called KringleCon? Some of the\nbiggest rock stars (and most humble and brilliant people) in\nCyberSecurity speak each year at KringleCon. Many of their talks also\nprovide clues to solving game challenges.

\n

Ed Skoudis and his team (The same people who build SANS NetWars) work\ntirelessly year after year to create the most amazing experience,\ncomplete with custom music! This has become one of my favorite holiday\ntraditions each year. You can learn more about the 2023 challenge by\nwatching Ed\'s Inside SANS Holiday Hack Challenge 2023 YouTube video at\nhttps://www.youtube.com/watch?v=X9Gmdr_CxzQ

\n

You can access this year\'s challenge by visiting sans.org/holidayhack\nor https://www.sans.org/mlp/holiday-hack-challenge-2023/

\n

There, you will learn more about all things Holiday Hack before the\ngame opens in the second week of December. If you want to play now, or\njust get a feel for it, you can access three of the previous years\'\nchallenges right now at the same site.

\n

I am not associated with SANS or the Holiday Hack Challenge in any\nway, other than to have participated for several years now, and I have\nwatched other people learn and grow by taking part in it.

\n

I hope that you have enjoyed this short series. If there are other\nonline challenges you find interesting or informative, I encourage you\nto record a show about them.

\n

Have a wonderful day.

\n',394,0,0,'CC-BY-SA','SANS, KringleCon, holiday, challenge',0,0,1), (3997,'2023-11-28','The Oh No! News.',875,'Sgoti talks about Malware distributed via Google\'s Dynamic Ads and more.','

The Oh No! news.

\n

Oh No! News is Good\nNews.

\n
    \n
  • TAGS: Oh No, News, Threat analysis, InfoSec, Google\nDynamic Search Ads
  • \n
\n
\n

Threat analysis;\nyour attack surface.

\n
    \n
  • Source: Former\nNHS secretary found guilty of illegally accessing medical\nrecords
    \n

    \n
      \n
    • A former NHS employee has been found guilty and fined for illegally\naccessing the medical records of over 150 people.
      \n
    • \n
    • Loretta Alborghetti, from Redditch, worked as a medical secretary\nwithin the Ophthalmology department at Worcestershire Acute Hospitals\nNHS Trust when she illegally accessed the records.
      \n
    • \n
  • \n
  • Supporting Source: Open\nStreet Map link to Redditch Worcestershire.
    \n

  • \n
  • Source: NetSupport\nRAT Infections on the Rise. Targeting Government and Business\nSectors
    \n

    \n
      \n
    • While NetSupport Manager started off as a legitimate remote\nadministration tool for technical assistance and support, malicious\nactors have misappropriated the tool to their own advantage, using it as\na beachhead for subsequent attacks.
      \n
    • \n
  • \n
  • Source: Beware:\nMalicious Google Ads Trick WinSCP Users into Installing\nMalware
    \n

    \n
      \n
    • The threat actors are believed to leverage Google\'s Dynamic Search\nAds (DSAs), which automatically generates ads based on a site\'s content\nto serve the malicious ads that take the victims to the infected\nsite.
      \n
    • \n
  • \n
  • Source: Trojanized\nPyCharm Software Version Delivered via Google Search Ads.
    \n

    \n
      \n
    • Victims who clicked on the ad were taken to a hacked web page with a\nlink to download the application, which turned out to install over a\ndozen different pieces of malware instead.
      \n
    • \n
  • \n
\n
\n

InfoSec; the language\nof security.

\n
    \n
  • Source: Why\nDefenders Should Embrace a Hacker Mindset
    \n
  • \n
\n
\n
    \n
  • Additional Information.\n
      \n
    • What is a \"Data\nBreach\"? A data breach is a security violation, in which sensitive,\nprotected or confidential data is copied, transmitted, viewed, stolen,\naltered or used by an individual unauthorized to do so.
      \n
    • \n
    • What is \"Malware\"?\nMalware (a portmanteau for\nmalicious software) is any software intentionally designed to cause\ndisruption to a computer, server, client, or computer network, leak\nprivate information, gain unauthorized access to information or systems,\ndeprive access to information, or which unknowingly interferes with the\nuser\'s computer security and privacy.
      \n
    • \n
    • What is a \"Payload\"?\nIn the context of a computer virus or worm, the payload is the portion\nof the malware which performs malicious action; deleting data, sending\nspam or encrypting data. In addition to the payload, such malware also\ntypically has overhead code aimed at simply spreading itself, or\navoiding detection.
      \n
    • \n
    • What is \"Phishing\"?\nPhishing is a form of social engineering\nwhere attackers deceive people into revealing sensitive information or\ninstalling malware such as ransomware. Phishing\nattacks have become increasingly sophisticated and often transparently\nmirror the site being targeted, allowing the attacker to observe\neverything while the victim is navigating the site, and transverse any\nadditional security boundaries with the victim.
      \n
    • \n
    • Social\nengineering (security) In the context of information security,\nsocial engineering is the psychological\nmanipulation of people into performing actions or divulging\nconfidential information. A type of confidence trick for the purpose of\ninformation gathering, fraud, or system access, it differs from a\ntraditional \"con\" in that it is often one of many steps in a more\ncomplex fraud scheme.
      \n
    • \n
    • What is \"Information\nSecurity\" (InfoSec)? Information security, sometimes shortened to\nInfoSec, is the practice of protecting information by mitigating information risks. It\nis part of information risk\nmanagement.\n
        \n
      • Information Security Attributes: Confidentiality, Integrity and Availability (C.I.A.).\nInformation Systems are composed in three main portions, hardware,\nsoftware and communications with the purpose to help identify and apply\ninformation security industry standards, as mechanisms of protection and\nprevention, at three levels or layers: physical, personal and\norganizational. Essentially, procedures or policies are implemented to\ntell administrators, users and operators how to use products to ensure\ninformation security within the organizations.
        \n
      • \n
    • \n
    • What is \"Risk\nmanagement\"? Risk management is the identification, evaluation, and\nprioritization of risks followed by coordinated and economical\napplication of resources to minimize, monitor, and control the\nprobability or impact of unfortunate events or to maximize the\nrealization of opportunities.
      \n
    • \n
    • What is a \"Vulnerability\"\n(computing)? Vulnerabilities are flaws in a computer system that\nweaken the overall security of the device/system. Vulnerabilities can be\nweaknesses in either the hardware itself, or the software that runs on\nthe hardware.
      \n
    • \n
    • What is an \"Attack\nSurface\"? The attack surface of a software environment is the sum of\nthe different points (for \"attack vectors\") where an unauthorized user\n(the \"attacker\") can try to enter data to or extract data from an\nenvironment. Keeping the attack surface as small as possible is a basic\nsecurity measure.
      \n
    • \n
    • What is an \"Attack\nVector\"? In computer security, an attack vector is a specific path,\nmethod, or scenario that can be exploited to break into an IT system,\nthus compromising its security. The term was derived from the\ncorresponding notion of vector in biology. An attack vector may be\nexploited manually, automatically, or through a combination of manual\nand automatic activity.
      \n
    • \n
    • What is\n\"Standardization\"? Standardization is the process of implementing\nand developing technical standards based on the consensus of different\nparties that include firms, users, interest groups, standards\norganizations and governments. Standardization can help maximize\ncompatibility, interoperability, safety, repeatability, or quality. It\ncan also facilitate a normalization of formerly custom processes.\n
    • \n
    • What is a \"Replay\nattack\"? A replay attack is a form of network attack in which valid\ndata transmission is maliciously or fraudulently repeated or delayed.\nAnother way of describing such an attack is: \"an attack on a security\nprotocol using a replay of messages from a different context into the\nintended (or original and expected) context, thereby fooling the honest\nparticipant(s) into thinking they have successfully completed the\nprotocol run.\"
      \n
    • \n
    • What is a\n\"Man-in-the-middle attack\"? In cryptography and computer security, a\nman-in-the-middle, ..., attack is a cyberattack where the attacker\nsecretly relays and possibly alters the communications between two\nparties who believe that they are directly communicating with each\nother, as the attacker has inserted themselves between the two\nparties.
      \n
    • \n
    • What is \"Transport Layer\nSecurity\" (TLS)? Transport Layer Security (TLS) is a cryptographic\nprotocol designed to provide communications security over a computer\nnetwork. The protocol is widely used in applications such as email,\ninstant messaging, and voice over IP, but its use in securing HTTPS\nremains the most publicly visible.
      \n
    • \n
    • What is a \"Handshake\"\n(computing)?. In computing, a handshake is a signal between two\ndevices or programs, used to, e.g., authenticate, coordinate. An example\nis the handshaking between a hypervisor and an application in a guest\nvirtual machine.
      \n
    • \n
    • What is Security\ntheater? The practice of taking security measures that are\nconsidered to provide the feeling of improved security while doing\nlittle or nothing to achieve it.
      \n
    • \n
  • \n
\n
\n\n',391,74,0,'CC-BY-SA','Oh No News, Threat analysis, InfoSec, Google Dynamic Search Ads',0,0,1), -(4005,'2023-12-08','Sgoti\'s reply to multiple shows.',893,'Sgoti replies to a few HPR Shows.','

Sgoti\'s reply to multiple\nshows.

\n

Sgoti replies to a few HPR\nShows.

\n
    \n
  • Tags: Reply show, password managers, lastpass.

  • \n
  • Reply to: hpr3988\n:: Beeper.com
    \n

  • \n
  • Supporting Source: Beeper chat application
    \n

  • \n
  • Supporting Source: Beeper Github page
    \n

  • \n
  • Supporting Source: Work with us at\nBeeper
    \n

  • \n
  • Reply to: hpr3989 :: LastPass\nSecurity Update 1 November 2023
    \n

  • \n
  • Reply to: hpr3994 ::\nLastpass Response
    \n

  • \n
  • Source: The\nTHREE STOOGES - A Plumbing We Will Go
    \n

  • \n
  • Source: Whitest Kids U Know:\nLeg Peeing
    \n

    \n
      \n
    • This was just funny. I found it while searching for, \"why the\nBritish say things like taking a piss\".
    • \n
  • \n
\n

This work is licensed under a Creative Commons\nAttribution-ShareAlike 4.0 International License.

\n',391,0,0,'CC-BY-SA','reply show, password managers, lastpass',0,0,0); +(4005,'2023-12-08','Sgoti\'s reply to multiple shows.',893,'Sgoti replies to a few HPR Shows.','

Sgoti\'s reply to multiple\nshows.

\n

Sgoti replies to a few HPR\nShows.

\n
    \n
  • Tags: Reply show, password managers, lastpass.

  • \n
  • Reply to: hpr3988\n:: Beeper.com
    \n

  • \n
  • Supporting Source: Beeper chat application
    \n

  • \n
  • Supporting Source: Beeper Github page
    \n

  • \n
  • Supporting Source: Work with us at\nBeeper
    \n

  • \n
  • Reply to: hpr3989 :: LastPass\nSecurity Update 1 November 2023
    \n

  • \n
  • Reply to: hpr3994 ::\nLastpass Response
    \n

  • \n
  • Source: The\nTHREE STOOGES - A Plumbing We Will Go
    \n

  • \n
  • Source: Whitest Kids U Know:\nLeg Peeing
    \n

    \n
      \n
    • This was just funny. I found it while searching for, \"why the\nBritish say things like taking a piss\".
    • \n
  • \n
\n

This work is licensed under a Creative Commons\nAttribution-ShareAlike 4.0 International License.

\n',391,0,0,'CC-BY-SA','reply show, password managers, lastpass',0,0,1); /*!40000 ALTER TABLE `eps` ENABLE KEYS */; UNLOCK TABLES; @@ -21489,4 +21495,4 @@ UNLOCK TABLES; /*!40014 SET UNIQUE_CHECKS=@OLD_UNIQUE_CHECKS */; /*!40111 SET SQL_NOTES=@OLD_SQL_NOTES */; --- Dump completed on 2023-11-22 20:01:07 +-- Dump completed on 2023-11-23 5:10:28