Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use - Search episodes, transcripts, hosts, and series - 4,511 episodes with metadata and transcripts - Data loader with in-memory JSON storage 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
6
.gitignore
vendored
Normal file
6
.gitignore
vendored
Normal file
@@ -0,0 +1,6 @@
|
||||
node_modules/
|
||||
.DS_Store
|
||||
*.log
|
||||
npm-debug.log*
|
||||
.env
|
||||
.vscode/
|
||||
241
README.md
Normal file
241
README.md
Normal file
@@ -0,0 +1,241 @@
|
||||
# Hacker Public Radio Knowledge Base MCP Server
|
||||
|
||||
An MCP (Model Context Protocol) server providing access to the Hacker Public Radio (HPR) knowledge base, including episodes, transcripts, hosts, series, and community comments.
|
||||
|
||||
## About HPR
|
||||
|
||||
Hacker Public Radio is a community-driven podcast where hosts contribute content on topics of interest to hackers. All content is released under Creative Commons licenses, making it freely available for learning and sharing.
|
||||
|
||||
## Features
|
||||
|
||||
This MCP server provides:
|
||||
|
||||
- **Episode Search**: Search through thousands of HPR episodes by title, summary, tags, or host notes
|
||||
- **Transcript Search**: Full-text search across all episode transcripts
|
||||
- **Episode Details**: Get complete information about any episode including transcript and comments
|
||||
- **Host Information**: Look up hosts and see all their contributions
|
||||
- **Series Browsing**: Explore mini-series of related episodes
|
||||
- **Statistics**: View overall HPR statistics and recent episodes
|
||||
|
||||
## Installation
|
||||
|
||||
### Prerequisites
|
||||
|
||||
- Node.js 18 or higher
|
||||
- The HPR data files:
|
||||
- `hpr_metadata/` directory containing JSON files
|
||||
- `hpr_transcripts/` directory containing transcript files
|
||||
|
||||
### Setup
|
||||
|
||||
1. Install dependencies:
|
||||
|
||||
```bash
|
||||
npm install
|
||||
```
|
||||
|
||||
2. Make the server executable:
|
||||
|
||||
```bash
|
||||
chmod +x index.js
|
||||
```
|
||||
|
||||
## Usage
|
||||
|
||||
### Running Locally
|
||||
|
||||
You can test the server directly:
|
||||
|
||||
```bash
|
||||
npm start
|
||||
```
|
||||
|
||||
### Using with Claude Desktop
|
||||
|
||||
Add this to your Claude Desktop configuration file:
|
||||
|
||||
**macOS**: `~/Library/Application Support/Claude/claude_desktop_config.json`
|
||||
**Windows**: `%APPDATA%/Claude/claude_desktop_config.json`
|
||||
**Linux**: `~/.config/Claude/claude_desktop_config.json`
|
||||
|
||||
```json
|
||||
{
|
||||
"mcpServers": {
|
||||
"hpr-knowledge-base": {
|
||||
"command": "node",
|
||||
"args": ["/absolute/path/to/knowledge_base/index.js"]
|
||||
}
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
Replace `/absolute/path/to/knowledge_base/` with the actual path to this directory.
|
||||
|
||||
### Using with Other MCP Clients
|
||||
|
||||
Any MCP-compatible client can connect to this server via stdio. The server will load all HPR data on startup and make it available through tools and resources.
|
||||
|
||||
## Available Tools
|
||||
|
||||
### 1. `search_episodes`
|
||||
|
||||
Search for episodes by keywords in title, summary, tags, or notes.
|
||||
|
||||
**Parameters:**
|
||||
- `query` (string): Search query
|
||||
- `limit` (number, optional): Maximum results (default: 20)
|
||||
- `hostId` (number, optional): Filter by specific host
|
||||
- `seriesId` (number, optional): Filter by specific series
|
||||
- `tag` (string, optional): Filter by tag
|
||||
- `fromDate` (string, optional): Filter from date (YYYY-MM-DD)
|
||||
- `toDate` (string, optional): Filter to date (YYYY-MM-DD)
|
||||
|
||||
**Example:**
|
||||
```
|
||||
Search for episodes about "linux kernel" from 2020 onwards
|
||||
```
|
||||
|
||||
### 2. `get_episode`
|
||||
|
||||
Get detailed information about a specific episode.
|
||||
|
||||
**Parameters:**
|
||||
- `episodeId` (number, required): Episode ID
|
||||
- `includeTranscript` (boolean, optional): Include transcript (default: true)
|
||||
- `includeComments` (boolean, optional): Include comments (default: true)
|
||||
|
||||
**Example:**
|
||||
```
|
||||
Get details for episode 16 including transcript and comments
|
||||
```
|
||||
|
||||
### 3. `search_transcripts`
|
||||
|
||||
Search through episode transcripts for specific keywords.
|
||||
|
||||
**Parameters:**
|
||||
- `query` (string, required): Search query
|
||||
- `limit` (number, optional): Maximum episodes to return (default: 20)
|
||||
- `contextLines` (number, optional): Lines of context around matches (default: 3)
|
||||
|
||||
**Example:**
|
||||
```
|
||||
Search transcripts for mentions of "virtual machine"
|
||||
```
|
||||
|
||||
### 4. `get_host_info`
|
||||
|
||||
Get information about a host and their episodes.
|
||||
|
||||
**Parameters:**
|
||||
- `hostId` (number, optional): Host ID
|
||||
- `hostName` (string, optional): Host name to search for
|
||||
- `includeEpisodes` (boolean, optional): Include episode list (default: true)
|
||||
|
||||
**Example:**
|
||||
```
|
||||
Get information about host "klaatu" including all their episodes
|
||||
```
|
||||
|
||||
### 5. `get_series_info`
|
||||
|
||||
Get information about a series and all its episodes.
|
||||
|
||||
**Parameters:**
|
||||
- `seriesId` (number, required): Series ID
|
||||
|
||||
**Example:**
|
||||
```
|
||||
Get information about series 4 (Databases series)
|
||||
```
|
||||
|
||||
## Available Resources
|
||||
|
||||
### `hpr://stats`
|
||||
Overall statistics about the HPR knowledge base
|
||||
|
||||
### `hpr://episodes/recent`
|
||||
List of 50 most recent episodes
|
||||
|
||||
### `hpr://hosts/all`
|
||||
List of all HPR hosts with episode counts
|
||||
|
||||
### `hpr://series/all`
|
||||
List of all HPR series with descriptions
|
||||
|
||||
## Data Structure
|
||||
|
||||
The server expects the following directory structure:
|
||||
|
||||
```
|
||||
knowledge_base/
|
||||
├── index.js
|
||||
├── data-loader.js
|
||||
├── package.json
|
||||
├── hpr_metadata/
|
||||
│ ├── episodes.json
|
||||
│ ├── hosts.json
|
||||
│ ├── comments.json
|
||||
│ └── series.json
|
||||
└── hpr_transcripts/
|
||||
├── hpr0001.txt
|
||||
├── hpr0002.txt
|
||||
└── ...
|
||||
```
|
||||
|
||||
## Development
|
||||
|
||||
### Project Structure
|
||||
|
||||
- `index.js` - Main MCP server implementation
|
||||
- `data-loader.js` - Data loading and searching functionality
|
||||
- `package.json` - Node.js package configuration
|
||||
|
||||
### Extending the Server
|
||||
|
||||
You can add new tools or resources by:
|
||||
|
||||
1. Adding new methods to `HPRDataLoader` in `data-loader.js`
|
||||
2. Registering new tools in the `ListToolsRequestSchema` handler
|
||||
3. Implementing tool logic in the `CallToolRequestSchema` handler
|
||||
|
||||
## License
|
||||
|
||||
This MCP server code is released under CC-BY-SA to match the HPR content license.
|
||||
|
||||
The Hacker Public Radio content itself is released under various Creative Commons licenses as specified in each episode's metadata.
|
||||
|
||||
## Credits
|
||||
|
||||
- **Hacker Public Radio**: https://hackerpublicradio.org
|
||||
- **MCP SDK**: https://modelcontextprotocol.io
|
||||
|
||||
## Contributing
|
||||
|
||||
Contributions are welcome! This server can be extended with:
|
||||
|
||||
- Advanced search features (fuzzy matching, relevance ranking)
|
||||
- Tag cloud generation
|
||||
- Episode recommendations
|
||||
- Audio file access
|
||||
- Web interface for browsing
|
||||
|
||||
## Support
|
||||
|
||||
For issues related to:
|
||||
- **This MCP server**: Open an issue in this repository
|
||||
- **HPR content**: Visit https://hackerpublicradio.org
|
||||
- **MCP protocol**: Visit https://modelcontextprotocol.io
|
||||
|
||||
## Example Queries
|
||||
|
||||
Here are some example queries you can try with an MCP client:
|
||||
|
||||
1. "Find episodes about Python programming from 2023"
|
||||
2. "Show me all episodes by Ken Fallon"
|
||||
3. "Search transcripts for discussions about encryption"
|
||||
4. "What is the Database 101 series about?"
|
||||
5. "Show me recent episodes about Linux"
|
||||
6. "Find episodes tagged with 'security'"
|
||||
|
||||
Enjoy exploring the Hacker Public Radio knowledge base!
|
||||
179
USAGE.md
Normal file
179
USAGE.md
Normal file
@@ -0,0 +1,179 @@
|
||||
# HPR Knowledge Base MCP Server - Usage Guide
|
||||
|
||||
## Quick Start
|
||||
|
||||
Once you've configured the MCP server in Claude Desktop (see README.md), you can start asking questions about Hacker Public Radio content.
|
||||
|
||||
## Example Queries
|
||||
|
||||
### Searching for Episodes
|
||||
|
||||
**Simple keyword search:**
|
||||
```
|
||||
Find episodes about Python programming
|
||||
```
|
||||
|
||||
**Search with filters:**
|
||||
```
|
||||
Show me episodes about Linux from 2023
|
||||
Find episodes tagged with "security"
|
||||
Search for episodes by Ken Fallon about LPI certification
|
||||
```
|
||||
|
||||
### Getting Episode Details
|
||||
|
||||
```
|
||||
Show me details for episode 16
|
||||
What is HPR episode 1 about?
|
||||
Get the transcript for episode 500
|
||||
```
|
||||
|
||||
### Searching Transcripts
|
||||
|
||||
```
|
||||
Search transcripts for mentions of "virtual machine"
|
||||
Find episodes where "encryption" is discussed in the transcript
|
||||
What episodes mention "Raspberry Pi" in their transcripts?
|
||||
```
|
||||
|
||||
### Host Information
|
||||
|
||||
```
|
||||
Tell me about host Ken Fallon
|
||||
Show me all episodes by klaatu
|
||||
Who is deepgeek and what episodes have they done?
|
||||
```
|
||||
|
||||
### Series Information
|
||||
|
||||
```
|
||||
What is the Database 101 series about?
|
||||
Show me the episodes in series 4
|
||||
Tell me about the Bash Scripting series
|
||||
```
|
||||
|
||||
### Browsing and Statistics
|
||||
|
||||
```
|
||||
Show me the most recent HPR episodes
|
||||
What are the HPR statistics?
|
||||
List all HPR series
|
||||
Who are the top contributors to HPR?
|
||||
```
|
||||
|
||||
## Understanding the Results
|
||||
|
||||
### Episode Information Includes:
|
||||
- Episode ID (HPR####)
|
||||
- Title and summary
|
||||
- Host information
|
||||
- Duration
|
||||
- Publication date
|
||||
- Tags
|
||||
- License
|
||||
- Download count
|
||||
- Host notes (detailed description)
|
||||
- Full transcript (when available)
|
||||
- Community comments
|
||||
|
||||
### Host Information Includes:
|
||||
- Host name and ID
|
||||
- Contact information
|
||||
- License preference
|
||||
- Profile/bio
|
||||
- Complete list of their episodes
|
||||
|
||||
### Series Information Includes:
|
||||
- Series name and description
|
||||
- All episodes in chronological order
|
||||
- Host information for each episode
|
||||
|
||||
## Tips for Better Results
|
||||
|
||||
1. **Be specific with dates**: Use year ranges like "from 2020 to 2023"
|
||||
|
||||
2. **Use tags for focused searches**: Common tags include:
|
||||
- linux, python, security, hardware
|
||||
- podcast, review, tutorial, howto
|
||||
- programming, networking, database
|
||||
|
||||
3. **Search transcripts for detailed content**: The transcript search is powerful for finding specific discussions or topics within episodes
|
||||
|
||||
4. **Explore series for themed content**: Series group related episodes together:
|
||||
- Database 101 (series 4)
|
||||
- Bash Scripting (series 42)
|
||||
- LPI Certification (series 7)
|
||||
- And many more!
|
||||
|
||||
5. **Combine searches**: You can refine searches by host, date, series, and tags
|
||||
|
||||
## Data Coverage
|
||||
|
||||
The knowledge base contains:
|
||||
- **4,511 episodes** spanning from 2007 to present
|
||||
- **432 hosts** from the community
|
||||
- **4,481 transcripts** (most episodes have transcripts)
|
||||
- **4,462 community comments**
|
||||
- **91 mini-series** covering various topics
|
||||
|
||||
## Common Use Cases
|
||||
|
||||
### Learning Topics
|
||||
"Find all episodes about [topic]" - Great for discovering educational content
|
||||
|
||||
### Following Hosts
|
||||
"Show me all episodes by [host]" - Follow your favorite contributors
|
||||
|
||||
### Series Learning
|
||||
"What's in the [series name] series?" - Follow structured learning paths
|
||||
|
||||
### Research
|
||||
"Search transcripts for [keyword]" - Deep dive into specific discussions
|
||||
|
||||
### Discovery
|
||||
"Show me recent episodes" - Keep up with new content
|
||||
|
||||
## Advanced Features
|
||||
|
||||
### Date Filtering
|
||||
Search within specific time periods to find historical or recent content
|
||||
|
||||
### Tag-based Discovery
|
||||
Tags help categorize content - use them to find related episodes
|
||||
|
||||
### Cross-referencing
|
||||
Find episodes that reference specific technologies, people, or concepts
|
||||
|
||||
### Community Engagement
|
||||
See what the community thought about episodes through comments
|
||||
|
||||
## Getting Help
|
||||
|
||||
If you're not sure what to ask, try:
|
||||
```
|
||||
Show me HPR statistics
|
||||
List recent episodes
|
||||
Tell me about the Database 101 series
|
||||
```
|
||||
|
||||
These will give you a sense of what's available and help you formulate better queries.
|
||||
|
||||
## About the Data
|
||||
|
||||
All HPR content is:
|
||||
- Community-contributed
|
||||
- Released under Creative Commons licenses
|
||||
- Free to use, share, and learn from
|
||||
- Focused on topics of interest to hackers (in the original, positive sense)
|
||||
|
||||
Topics range from:
|
||||
- Technology and programming
|
||||
- Hardware hacking and electronics
|
||||
- Linux and open source
|
||||
- Security and privacy
|
||||
- DIY projects
|
||||
- Reviews and tutorials
|
||||
- Philosophy and methodology
|
||||
- And much more!
|
||||
|
||||
Enjoy exploring the wealth of knowledge in Hacker Public Radio!
|
||||
10
claude_desktop_config.example.json
Normal file
10
claude_desktop_config.example.json
Normal file
@@ -0,0 +1,10 @@
|
||||
{
|
||||
"mcpServers": {
|
||||
"hpr-knowledge-base": {
|
||||
"command": "node",
|
||||
"args": [
|
||||
"/home/user/Code/OpenSource/hpr/knowledge_base/index.js"
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
250
data-loader.js
Normal file
250
data-loader.js
Normal file
@@ -0,0 +1,250 @@
|
||||
import { readFileSync, readdirSync } from 'fs';
|
||||
import { join, dirname } from 'path';
|
||||
import { fileURLToPath } from 'url';
|
||||
|
||||
const __filename = fileURLToPath(import.meta.url);
|
||||
const __dirname = dirname(__filename);
|
||||
|
||||
class HPRDataLoader {
|
||||
constructor() {
|
||||
this.episodes = [];
|
||||
this.hosts = [];
|
||||
this.comments = [];
|
||||
this.series = [];
|
||||
this.transcripts = new Map(); // Map of episode id to transcript text
|
||||
}
|
||||
|
||||
/**
|
||||
* Load all data from JSON files and transcripts
|
||||
*/
|
||||
async load() {
|
||||
console.error('Loading HPR data...');
|
||||
|
||||
// Load JSON files
|
||||
this.episodes = this.loadJSON('hpr_metadata/episodes.json');
|
||||
this.hosts = this.loadJSON('hpr_metadata/hosts.json');
|
||||
this.comments = this.loadJSON('hpr_metadata/comments.json');
|
||||
this.series = this.loadJSON('hpr_metadata/series.json');
|
||||
|
||||
console.error(`Loaded ${this.episodes.length} episodes`);
|
||||
console.error(`Loaded ${this.hosts.length} hosts`);
|
||||
console.error(`Loaded ${this.comments.length} comments`);
|
||||
console.error(`Loaded ${this.series.length} series`);
|
||||
|
||||
// Load transcripts
|
||||
this.loadTranscripts();
|
||||
|
||||
console.error(`Loaded ${this.transcripts.size} transcripts`);
|
||||
console.error('HPR data loading complete!');
|
||||
}
|
||||
|
||||
/**
|
||||
* Load a JSON file
|
||||
*/
|
||||
loadJSON(relativePath) {
|
||||
const filePath = join(__dirname, relativePath);
|
||||
try {
|
||||
const data = readFileSync(filePath, 'utf-8');
|
||||
return JSON.parse(data);
|
||||
} catch (error) {
|
||||
console.error(`Error loading ${relativePath}:`, error.message);
|
||||
return [];
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Load all transcript files
|
||||
*/
|
||||
loadTranscripts() {
|
||||
const transcriptsDir = join(__dirname, 'hpr_transcripts');
|
||||
try {
|
||||
const files = readdirSync(transcriptsDir);
|
||||
|
||||
for (const file of files) {
|
||||
if (file.endsWith('.txt')) {
|
||||
// Extract episode ID from filename (e.g., hpr0016.txt -> 16)
|
||||
const match = file.match(/hpr(\d+)\.txt/);
|
||||
if (match) {
|
||||
const episodeId = parseInt(match[1], 10);
|
||||
const filePath = join(transcriptsDir, file);
|
||||
try {
|
||||
const content = readFileSync(filePath, 'utf-8');
|
||||
this.transcripts.set(episodeId, content);
|
||||
} catch (error) {
|
||||
console.error(`Error loading transcript ${file}:`, error.message);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
} catch (error) {
|
||||
console.error('Error loading transcripts directory:', error.message);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Get episode by ID
|
||||
*/
|
||||
getEpisode(id) {
|
||||
return this.episodes.find(ep => ep.id === id);
|
||||
}
|
||||
|
||||
/**
|
||||
* Get host by ID
|
||||
*/
|
||||
getHost(id) {
|
||||
return this.hosts.find(host => host.hostid === id);
|
||||
}
|
||||
|
||||
/**
|
||||
* Get series by ID
|
||||
*/
|
||||
getSeries(id) {
|
||||
return this.series.find(s => s.id === id);
|
||||
}
|
||||
|
||||
/**
|
||||
* Get transcript for episode
|
||||
*/
|
||||
getTranscript(episodeId) {
|
||||
return this.transcripts.get(episodeId);
|
||||
}
|
||||
|
||||
/**
|
||||
* Get comments for episode
|
||||
*/
|
||||
getCommentsForEpisode(episodeId) {
|
||||
return this.comments.filter(c => c.eps_id === episodeId);
|
||||
}
|
||||
|
||||
/**
|
||||
* Get episodes by host
|
||||
*/
|
||||
getEpisodesByHost(hostId) {
|
||||
return this.episodes.filter(ep => ep.hostid === hostId);
|
||||
}
|
||||
|
||||
/**
|
||||
* Get episodes in a series
|
||||
*/
|
||||
getEpisodesInSeries(seriesId) {
|
||||
return this.episodes.filter(ep => ep.series === seriesId);
|
||||
}
|
||||
|
||||
/**
|
||||
* Search episodes by keyword in title, summary, or tags
|
||||
*/
|
||||
searchEpisodes(query, options = {}) {
|
||||
const {
|
||||
limit = 20,
|
||||
hostId = null,
|
||||
seriesId = null,
|
||||
tag = null,
|
||||
fromDate = null,
|
||||
toDate = null
|
||||
} = options;
|
||||
|
||||
const queryLower = query.toLowerCase();
|
||||
let results = this.episodes.filter(ep => {
|
||||
// Basic text search
|
||||
const matchesQuery = !query ||
|
||||
ep.title.toLowerCase().includes(queryLower) ||
|
||||
ep.summary.toLowerCase().includes(queryLower) ||
|
||||
ep.tags.toLowerCase().includes(queryLower) ||
|
||||
ep.notes.toLowerCase().includes(queryLower);
|
||||
|
||||
// Filter by host
|
||||
const matchesHost = !hostId || ep.hostid === hostId;
|
||||
|
||||
// Filter by series
|
||||
const matchesSeries = seriesId === null || ep.series === seriesId;
|
||||
|
||||
// Filter by tag
|
||||
const matchesTag = !tag || ep.tags.toLowerCase().includes(tag.toLowerCase());
|
||||
|
||||
// Filter by date range
|
||||
const matchesDateRange = (!fromDate || ep.date >= fromDate) &&
|
||||
(!toDate || ep.date <= toDate);
|
||||
|
||||
return matchesQuery && matchesHost && matchesSeries && matchesTag && matchesDateRange;
|
||||
});
|
||||
|
||||
// Sort by date (newest first)
|
||||
results.sort((a, b) => b.date.localeCompare(a.date));
|
||||
|
||||
return results.slice(0, limit);
|
||||
}
|
||||
|
||||
/**
|
||||
* Search transcripts by keyword
|
||||
*/
|
||||
searchTranscripts(query, options = {}) {
|
||||
const { limit = 20, contextLines = 3 } = options;
|
||||
const queryLower = query.toLowerCase();
|
||||
const results = [];
|
||||
|
||||
for (const [episodeId, transcript] of this.transcripts) {
|
||||
const lines = transcript.split('\n');
|
||||
const matches = [];
|
||||
|
||||
// Find all matching lines
|
||||
lines.forEach((line, index) => {
|
||||
if (line.toLowerCase().includes(queryLower)) {
|
||||
// Get context around the match
|
||||
const start = Math.max(0, index - contextLines);
|
||||
const end = Math.min(lines.length, index + contextLines + 1);
|
||||
const context = lines.slice(start, end).join('\n');
|
||||
|
||||
matches.push({
|
||||
lineNumber: index + 1,
|
||||
line: line.trim(),
|
||||
context: context
|
||||
});
|
||||
}
|
||||
});
|
||||
|
||||
if (matches.length > 0) {
|
||||
const episode = this.getEpisode(episodeId);
|
||||
if (episode) {
|
||||
results.push({
|
||||
episode,
|
||||
matches: matches.slice(0, 5) // Limit matches per episode
|
||||
});
|
||||
}
|
||||
}
|
||||
|
||||
if (results.length >= limit) break;
|
||||
}
|
||||
|
||||
return results;
|
||||
}
|
||||
|
||||
/**
|
||||
* Search hosts by name or email
|
||||
*/
|
||||
searchHosts(query) {
|
||||
const queryLower = query.toLowerCase();
|
||||
return this.hosts.filter(host =>
|
||||
host.host.toLowerCase().includes(queryLower) ||
|
||||
host.email.toLowerCase().includes(queryLower)
|
||||
);
|
||||
}
|
||||
|
||||
/**
|
||||
* Get statistics
|
||||
*/
|
||||
getStats() {
|
||||
return {
|
||||
totalEpisodes: this.episodes.length,
|
||||
totalHosts: this.hosts.length,
|
||||
totalComments: this.comments.length,
|
||||
totalSeries: this.series.length,
|
||||
totalTranscripts: this.transcripts.size,
|
||||
dateRange: {
|
||||
earliest: this.episodes.reduce((min, ep) => ep.date < min ? ep.date : min, this.episodes[0]?.date || ''),
|
||||
latest: this.episodes.reduce((max, ep) => ep.date > max ? ep.date : max, this.episodes[0]?.date || '')
|
||||
}
|
||||
};
|
||||
}
|
||||
}
|
||||
|
||||
export default HPRDataLoader;
|
||||
4463
hpr_metadata/comments.json
Normal file
4463
hpr_metadata/comments.json
Normal file
File diff suppressed because one or more lines are too long
4512
hpr_metadata/episodes.json
Normal file
4512
hpr_metadata/episodes.json
Normal file
File diff suppressed because one or more lines are too long
433
hpr_metadata/hosts.json
Normal file
433
hpr_metadata/hosts.json
Normal file
@@ -0,0 +1,433 @@
|
||||
[
|
||||
{"hostid":1,"host":"droops","email":"droops.nospam@nospam.gmail.com","profile":"nomicon.info","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"droops"},
|
||||
{"hostid":2,"host":"Kn1ghtl0rd","email":"kn1ghtl0rd.nospam@nospam.hotmail.com","profile":"https://www.kn1ghtl0rd.org","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Kn1ghtl0rd"},
|
||||
{"hostid":3,"host":"dosman","email":"dosman.nospam@nospam.packetsniffers.org","profile":"packetsniffers.org","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"dosman"},
|
||||
{"hostid":4,"host":"Phizone","email":"phizone.nospam@nospam.infonomicon.org","profile":"https://infonomicon.org","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Phizone"},
|
||||
{"hostid":5,"host":"Scedha","email":"scheda.nospam@nospam.gmail.com","profile":"https://underfirenetwork.com","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Scedha"},
|
||||
{"hostid":6,"host":"J-Hood","email":"JHood.nospam@nospam.JHood.biz","profile":"https://tehshow.org","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"J-Hood"},
|
||||
{"hostid":7,"host":"Dann","email":"dann.nospam@nospam.tllts.org","profile":"<p><a href=\"http://www.thelinuxlink.net/\">http://www.thelinuxlink.net/</a></p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Dann"},
|
||||
{"hostid":8,"host":"LinLin","email":"will.nospam@nospam.techcentric.org","profile":"https://www.techcentric.org","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"LinLin"},
|
||||
{"hostid":9,"host":"Irongeek","email":"irongeek.nospam@nospam.irongeek.com","profile":"https://irongeek.com","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Irongeek"},
|
||||
{"hostid":10,"host":"p0trill0","email":"p0trill023.nospam@nospam.gmail.com","profile":"https://twatech.org","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"potrillo"},
|
||||
{"hostid":11,"host":"Pat from TLLTS","email":"patrickmdavila.nospam@nospam.gmail.com","profile":"Co-host of the The Linux Link Tech Show. Former host of the MythTVCast.","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Pat from The Linux Link Tech Show"},
|
||||
{"hostid":12,"host":"livinded","email":"livinded.nospam@nospam.gmail.com","profile":"https://deadbytes.net","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"livinded"},
|
||||
{"hostid":13,"host":"Jason Scott","email":"jason.nospam@nospam.textfiles.com","profile":"https://www.textfiles.com","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Jason Scott"},
|
||||
{"hostid":14,"host":"Blackratchet","email":"blackratchet.nospam@nospam.blackratchet.org","profile":"https://www.binrev.com","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Blackratchet"},
|
||||
{"hostid":15,"host":"Merk","email":"Merk.nospam@nospam.iname.com","profile":"https://google.com","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Merk"},
|
||||
{"hostid":16,"host":"Madjimisimi","email":"madjimisimi.nospam@nospam.gmail.com","profile":"https://google.com","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Madjimisimi"},
|
||||
{"hostid":17,"host":"Pixelfiend","email":"pxfiend.nospam@nospam.gmail.com","profile":"https://google.com","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Pixelfiend"},
|
||||
{"hostid":18,"host":"Seal","email":"julien.nospam@nospam.jmcardle.com","profile":"jmcardle.com","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Seal"},
|
||||
{"hostid":19,"host":"Luminaire","email":"salveya.nospam@nospam.gmail.com","profile":"https://google.com","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Luminaire"},
|
||||
{"hostid":20,"host":"Dominic Uilano","email":"123.nospam@nospam.gmail.com","profile":"https://google.com","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Dominic Uilano"},
|
||||
{"hostid":21,"host":"Killersmurf","email":"ksmurf99.nospam@nospam.gmail.com","profile":"https://google.com","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Killersmurf"},
|
||||
{"hostid":22,"host":"Electroman","email":"electroman37.nospam@nospam.gmail.com","profile":"https://electrostuff.net","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Electroman"},
|
||||
{"hostid":23,"host":"Lowtek Mystik","email":"lowtekmystik.nospam@nospam.walla.com","profile":"https://ninjanightschool.com/","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Lowtek Mystik"},
|
||||
{"hostid":24,"host":"Lord Drachenblut (R.I.P.)","email":"lord.drachenblut.nospam@nospam.gmail.com","profile":"thedigitaldragonslair.net/","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Lord Drachenblut"},
|
||||
{"hostid":25,"host":"Morgellon","email":"morgellon.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Morgellon"},
|
||||
{"hostid":26,"host":"ponyboy","email":"cliffstoll.nospam@nospam.gmail.com","profile":"https://bellcoreradio.net/","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"ponyboy"},
|
||||
{"hostid":27,"host":"Dr^ZigMan","email":"drzigman.nospam@nospam.bellsouth.net","profile":"https://binrev.com","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Dr^ZigMan"},
|
||||
{"hostid":28,"host":"Kynan Dent","email":"kynan.nospam@nospam.kynan.org","profile":"https://kynan.org","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Kynan Dent"},
|
||||
{"hostid":29,"host":"willjasen","email":"willjasen.nospam@nospam.charter.net","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":0,"espeak_name":"willjasen"},
|
||||
{"hostid":30,"host":"Ken Fallon","email":"ken.nospam@nospam.fallon.ie","profile":"<p>No longer completely Irish, not yet completely Dutch, trying to be completely FLOSS.\n</p><ul><li>Website: <a href=\"https://kenfallon.com\">https://kenfallon.com</a></li><li>Mastodon: <a rel=\"me\" href=\"https://mastodon.sdf.org/@ken_fallon\">@ken_fallon@mastodon.sdf.org</a></li><li>Facebook: <a href=\"https://www.facebook.com/ken.fallon\">https://www.facebook.com/ken.fallon</a></li><li>LinkedIn: <a href=\"https://nl.linkedin.com/in/kenfallon\">https://nl.linkedin.com/in/kenfallon</a></li><li>Twitter: @ken_fallon <a href=\"https://twitter.com/ken_fallon\">https://twitter.com/ken_fallon</a></li></ul>","license":"CC-BY-SA","local_image":0,"gpg":"23B68D4377311169","valid":1,"espeak_name":"Ken Falun"},
|
||||
{"hostid":31,"host":"Xcalibur","email":"xcalibur1337.nospam@nospam.gmail.com","profile":"https://www.google.com","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Xcalibur"},
|
||||
{"hostid":32,"host":"Metatron","email":"metatron.nospam@nospam.fbillradio.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Metatron"},
|
||||
{"hostid":33,"host":"dual_parallel","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"dual_parallel"},
|
||||
{"hostid":34,"host":"Coder365","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Coder365"},
|
||||
{"hostid":35,"host":"Cottonballs","email":"cottonballz.nospam@nospam.gmail.com","profile":"https://www.google.com","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Cottonballs"},
|
||||
{"hostid":36,"host":"operat0r","email":"freeload101.nospam@nospam.yahoo.com","profile":"<p><a href=\"https://rmccurdy.com\" rel=\"noopener noreferrer\" target=\"_blank\">https://rmccurdy.com</a></p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"operator"},
|
||||
{"hostid":37,"host":"Haq","email":"burnmytime.nospam@nospam.gmail.com","profile":"https://www.google.com","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Haq"},
|
||||
{"hostid":38,"host":"Silver","email":"silverballz.nospam@nospam.gmail.com","profile":"silverballz.com","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Silver"},
|
||||
{"hostid":39,"host":"Enigma","email":"eth0enigma.nospam@nospam.gmail.com","profile":"hackerpublicradio.org","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Enigma"},
|
||||
{"hostid":40,"host":"coldsteal","email":"antonnid.nospam@nospam.gmail.com","profile":"https://www.i-trash.org","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"coldsteal"},
|
||||
{"hostid":41,"host":"kitche","email":"kitche.nospam@nospam.reddphoenix.com","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":0,"espeak_name":"kitche"},
|
||||
{"hostid":42,"host":"slick0","email":"slick0.nospam@nospam.slick0.net","profile":"","license":"CC-0","local_image":0,"gpg":"","valid":1,"espeak_name":"slick0"},
|
||||
{"hostid":43,"host":"GeoNine","email":"projektdiscon.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"GeoNine"},
|
||||
{"hostid":44,"host":"spiffytech","email":"spiffytech.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"spiffytech"},
|
||||
{"hostid":45,"host":"L3pprd/ocCode","email":"l3pprd.nospam@nospam.gmail.com","profile":"https://occ0de.wordpress.com","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"L3pprd/ocCode"},
|
||||
{"hostid":46,"host":"blackmath","email":"blckmth.nospam@nospam.gmail.com","profile":"https://blackmath.org","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"blackmath"},
|
||||
{"hostid":47,"host":"cid","email":"cidviscous.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"cid"},
|
||||
{"hostid":48,"host":"mirovengi","email":"mirovengi.nospam@nospam.gmail.com","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"mirovengi"},
|
||||
{"hostid":49,"host":"kotrin","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"kotrin"},
|
||||
{"hostid":50,"host":"Dospod","email":"drewmarin.nospam@nospam.gmail.com","profile":"https://dospod.i-trash.org","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Dospod"},
|
||||
{"hostid":51,"host":"Messyman","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Messyman"},
|
||||
{"hostid":52,"host":"javatard","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"javatard"},
|
||||
{"hostid":53,"host":"Zach","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"https://packetsniffers.org","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Zach"},
|
||||
{"hostid":54,"host":"skrye","email":"skrye.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"skrye"},
|
||||
{"hostid":55,"host":"StankDawg","email":"stankdawg.nospam@nospam.stankdawg.com","profile":"stankdawg.com","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"StankDawg"},
|
||||
{"hostid":56,"host":"riscphree","email":"riscphree.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"riscphree"},
|
||||
{"hostid":57,"host":"Plexi","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Plexi"},
|
||||
{"hostid":58,"host":"Drake Anubis","email":"drake.anubis.nospam@nospam.gmail.com","profile":"drakeanubis.com","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Drake Anubis"},
|
||||
{"hostid":59,"host":"MrE","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"MrE"},
|
||||
{"hostid":60,"host":"Faceman","email":"lt.faceman.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Faceman"},
|
||||
{"hostid":61,"host":"DarkShadow","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"DarkShadow"},
|
||||
{"hostid":62,"host":"Mubix","email":"jd.mubix.nospam@nospam.gmail.com","profile":"room362.com/","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Mubix"},
|
||||
{"hostid":63,"host":"spaceout","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"spaceout"},
|
||||
{"hostid":64,"host":"Alk3","email":"mr.alk3.nospam@nospam.gmail.com","profile":"exitstatusone.com/","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Alk3"},
|
||||
{"hostid":65,"host":"ThoughtPhreaker","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"ThoughtPhreaker"},
|
||||
{"hostid":66,"host":"Adam","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Adam"},
|
||||
{"hostid":67,"host":"Draven","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Draven"},
|
||||
{"hostid":68,"host":"Mc Frontalot","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"https://frontalot.com","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Mc Frontalot"},
|
||||
{"hostid":69,"host":"thewtex","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"thewtex"},
|
||||
{"hostid":70,"host":"TheYellow1","email":"TheYellow1.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"The Yellow One"},
|
||||
{"hostid":71,"host":"Will Jason","email":"willjasen.nospam@nospam.charter.net","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Will Jason"},
|
||||
{"hostid":73,"host":"deepgeek","email":"hpr.nospam@nospam.deepgeek.us","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"deepgeek"},
|
||||
{"hostid":74,"host":"Peter","email":"freshubuntu.nospam@nospam.gmail.com","profile":"freshubuntu.org/","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Peter"},
|
||||
{"hostid":75,"host":"fawkesfyre","email":"purplepentester.nospam@nospam.gmail.com","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"fawkesfyre"},
|
||||
{"hostid":76,"host":"Chess Griffin","email":"chess.nospam@nospam.chessgriffin.com","profile":"linuxreality.com","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Chess Griffin"},
|
||||
{"hostid":77,"host":"Dave Yates","email":"dsyates.nospam@nospam.lottalinuxlinks.com","profile":"lottalinuxlinks.com","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Dave Yates"},
|
||||
{"hostid":78,"host":"Klaatu","email":"klaatu.nospam@nospam.mixedsignals.ml","profile":"<p><br></p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"klaatu"},
|
||||
{"hostid":79,"host":"Xoke","email":"Xokesoru.nospam@nospam.gmail.com","profile":"Xoke.org","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Xoke"},
|
||||
{"hostid":80,"host":"W3lshrarebit","email":"W3lshrarebit.nospam@nospam.do-not-contact.gmail.com","profile":"","license":"CC-BY-NC","local_image":0,"gpg":"","valid":1,"espeak_name":"W3lshrarebit"},
|
||||
{"hostid":81,"host":"Bitviper","email":"bitviper.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Bitviper"},
|
||||
{"hostid":82,"host":"DjBoo","email":"KP101ST.nospam@nospam.gmail.com","profile":"zombie.el.cx/music/","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"DjBoo"},
|
||||
{"hostid":83,"host":"MadRush","email":"madrush.nospam@nospam.comcast.net","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"MadRush"},
|
||||
{"hostid":84,"host":"Lunarsphere","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Lunarsphere"},
|
||||
{"hostid":85,"host":"finux","email":"podcast.nospam@nospam.finux.co.uk","profile":"finux.co.uk","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"finux"},
|
||||
{"hostid":86,"host":"rowinggolfer","email":"rowinggolfer.nospam@nospam.googlemail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"RowingGolfer"},
|
||||
{"hostid":87,"host":"Tottenkoph","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Tottenkoph"},
|
||||
{"hostid":88,"host":"Skirlet","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"fiercelyindependent.org","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Skirlet"},
|
||||
{"hostid":89,"host":"MC Smedley","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"MC Smedley"},
|
||||
{"hostid":90,"host":"jelkimantis","email":"linux.cli.oggcast.nospam@nospam.gmail.com","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"jelkimantis"},
|
||||
{"hostid":91,"host":"Cybercod","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Cybercod"},
|
||||
{"hostid":92,"host":"threethirty","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"threethirty"},
|
||||
{"hostid":93,"host":"EC Lug","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"EC Lug"},
|
||||
{"hostid":94,"host":"riddlebox","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"riddlebox"},
|
||||
{"hostid":95,"host":"UberChick","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"UberChick"},
|
||||
{"hostid":96,"host":"Jrullo","email":"jrullo.nospam@nospam.jonasrullo.net","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Jrullo"},
|
||||
{"hostid":97,"host":"Jeremy","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"distrocast.org","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Jeremy"},
|
||||
{"hostid":98,"host":"weex","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"weex"},
|
||||
{"hostid":99,"host":"monsterb","email":"bill.nospam@nospam.monsterb.org","profile":"linuxcranks.info","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"MonsterB"},
|
||||
{"hostid":100,"host":"UTOSC","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"U T O S C "},
|
||||
{"hostid":101,"host":"Chad","email":"chad.nospam@nospam.linuxbasement.com","profile":"linuxbasement.com","license":"CC-BY","local_image":0,"gpg":"","valid":1,"espeak_name":"Chad"},
|
||||
{"hostid":102,"host":"dwick","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"dwick"},
|
||||
{"hostid":103,"host":"Roadrunner","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Roadrunner"},
|
||||
{"hostid":104,"host":"pixel Juice","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"pixel Juice"},
|
||||
{"hostid":105,"host":"Wintermute21","email":"mute.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Wintermute21"},
|
||||
{"hostid":106,"host":"Thistleweb","email":"gordon.nospam@nospam.thistleweb.co.uk","profile":"thistleweb.co.uk/","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Thistleweb"},
|
||||
{"hostid":107,"host":"lostnbronx","email":"lostnbronx.nospam@nospam.gmail.com","profile":"<p> I'm a writer, podcaster, and voice actor. My family and I live in the mountains of Arizona, with a cat and a dog. The days here are sunny (not always), the winters are mild (they often aren't), and the people are nice (for the most part).\n\nWhat the heck, you gotta live somewhere.<br /><a href=\"https://davidcollinsrivera.com/\">https://davidcollinsrivera.com/</a></p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"lostnbronx"},
|
||||
{"hostid":109,"host":"Various Hosts","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Various Hosts"},
|
||||
{"hostid":110,"host":"Quvmoh","email":"quvmoh.nospam@nospam.gmail.com","profile":"<p>\nold geek and fan of building things, spends the work day polishing fiber optics and staring through scopes listening to podcasts.</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Quvmoh"},
|
||||
{"hostid":111,"host":"knightwise","email":"knightwise.nospam@nospam.knightwise.com","profile":"<p>\nKnightwise.com is a website with hacks tips and tweaks for cross platform geeks. The home of the Knightwise.com cross platform podcast that makes technology work for you and not the other way around. A place to go for all geeks who slide between Mac, iOS, Android, Linux and Windows offering an essential mix of hacks, tips, howtos and tweaks spiced up with a dash of geek culture.\n</p>\n<p>\nWhat is our philosophy?\nIn our daily lives, on the internet, whether we want it or not, hundreds of new inventions, thousands of websites and millions of bits of information engulf us as the tsunami of progress sweeps along the shores of time.\nYou have the choice: Be washed away on by the virtual surf or turn technology into a tool that works for you.\n</p>\n<p>\nHere at Knightwise.com we think that YOU are the most important element in the technology that surrounds you. Technology should enable you and not lock you in to some vendor or product. That is why we focus on cross platform solutions that work on any operating system or mobile device you might be using, making YOU and what you want to DO the focus of our content. We dont believe in fanboys, we dont believe in vendor lock-ins and we dont believe in brands. We cater to the geeks who slide from operating system to operating system, free their data and communications and let technology work for them instead of the other way around.\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"knightwise"},
|
||||
{"hostid":112,"host":"Mark Clarke","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Mark Clarke"},
|
||||
{"hostid":113,"host":"Kevin Benko","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Kevin Benko"},
|
||||
{"hostid":114,"host":"rkirk","email":"zugzwang.seven.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"rkirk"},
|
||||
{"hostid":115,"host":"sigflup","email":"pantsbutt.nospam@nospam.gmail.com","profile":"<p>\n<a href=\"https://theadesilva.com\">https://theadesilva.com</a>\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"sigflup"},
|
||||
{"hostid":116,"host":"janedoc","email":"njwrightmd.nospam@nospam.yahoo.com","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"janedoc"},
|
||||
{"hostid":117,"host":"PhreakerD7","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"PhreakerD7"},
|
||||
{"hostid":118,"host":"df99","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"df99"},
|
||||
{"hostid":120,"host":"pegwole","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"pegwole"},
|
||||
{"hostid":121,"host":"Michael Foord ","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Michael Foord "},
|
||||
{"hostid":122,"host":"Urban Koistinen","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Urban Koistinen"},
|
||||
{"hostid":123,"host":"tmacuk ","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"tmacuk "},
|
||||
{"hostid":124,"host":"Patrick L Archibald (R.I.P.)","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Patrick L Archibald"},
|
||||
{"hostid":125,"host":"elel","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"elel"},
|
||||
{"hostid":126,"host":"cobra2","email":"cobra2.nospam@nospam.linuxbasement.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"cobra2"},
|
||||
{"hostid":127,"host":"KFive","email":"k5tux.nospam@nospam.k5tux.us","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"KFive"},
|
||||
{"hostid":128,"host":"pokey","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"pokey"},
|
||||
{"hostid":129,"host":"JWP","email":"jwp5.nospam@nospam.hotmail.com","profile":"<p>JWP is a linux follower - has a linux job and lives the life of a free Texan in the World making Texas where ever he might be.</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"JWP"},
|
||||
{"hostid":130,"host":"Jared Mayes","email":"mayesja.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Jared Mayes"},
|
||||
{"hostid":131,"host":"FiftyOneFifty (R.I.P.)","email":"fiftyonefifty.nospam@nospam.linuxbasement.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"FiftyOneFifty"},
|
||||
{"hostid":132,"host":"Flaviu Simihaian","email":"flaviu.nospam@nospam.closedbracket.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Flaviu Simihaian"},
|
||||
{"hostid":133,"host":"sp0rus","email":"sp0rus.cs.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"sporus"},
|
||||
{"hostid":134,"host":"PipeManMusic","email":"PipeManMusic.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"PipeManMusic"},
|
||||
{"hostid":135,"host":"Johninsc","email":"johninsc.nospam@nospam.myway.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Johninsc"},
|
||||
{"hostid":136,"host":"Curbuntu","email":"curbuntu.nospam@nospam.cox.net","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Curbuntu"},
|
||||
{"hostid":137,"host":"guitarman","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"GuitarMan"},
|
||||
{"hostid":138,"host":"arfab","email":"clearnitesky.nospam@nospam.gmail.com","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"arfab"},
|
||||
{"hostid":139,"host":"Ruji","email":"toiletresin.nospam@nospam.gmail.com","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Ruji"},
|
||||
{"hostid":140,"host":"brother mouse","email":"fratermus+hpr.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"brother mouse"},
|
||||
{"hostid":141,"host":"Dismal Science","email":"dismal.science.hpr.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Dismal Science"},
|
||||
{"hostid":142,"host":"N50","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"N50"},
|
||||
{"hostid":143,"host":"Broam","email":"brian.kemp.nospam@nospam.member.fsf.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Broam"},
|
||||
{"hostid":144,"host":"sp0rus and biosshadow","email":"sp0rus.cs.nospam@nospam.gmail.com","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"sporus and BiosShadow"},
|
||||
{"hostid":145,"host":"Heisenbug","email":"matt_hew.nospam@nospam.rocketmail.com","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Heisenbug"},
|
||||
{"hostid":146,"host":"JBu92","email":"jbucky1092.nospam@nospam.gmail.com","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"JBu92"},
|
||||
{"hostid":147,"host":"Sven","email":"sven.nospam@nospam.noblanks.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Sven"},
|
||||
{"hostid":148,"host":"Mark Katerberg and Courtney Schauer","email":"mark.katerberg.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Mark Katerberg and Courtney Schauer"},
|
||||
{"hostid":149,"host":"Trixter","email":"trixter.nospam@nospam.oldskool.org","profile":"<p>I am a child of the early 1980s, defined by the personal computer explosion, new wave music, and post-modern artistic style of that era. Co-founded MobyGames. I'm an assembly programmer, demoscener, unix systems engineer, husband, and father. I sometimes write things of dubious value at <a href=\"https://trixter.oldskool.org/\">https://trixter.oldskool.org/</a>.</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"Trixter"},
|
||||
{"hostid":150,"host":"Bariman","email":"anthony.denton.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Bariman"},
|
||||
{"hostid":151,"host":"dodddummy","email":"jason.s.dodd.nospam@nospam.gmail.com","profile":"Just your average dummy.","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"D O D D Dummy"},
|
||||
{"hostid":152,"host":"Claudio Miranda","email":"quadsix50.nospam@nospam.gmail.com","profile":"<p>Mastodon: @claudiom@bsd.network\nBlog: https://claudiomiranda.wordpress.com</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Claudio Miranda"},
|
||||
{"hostid":153,"host":"Doug Farrell","email":"doug.farrell.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Doug Farrell"},
|
||||
{"hostid":154,"host":"MrsXoke","email":"MrsXoke.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"MrsXoke"},
|
||||
{"hostid":155,"host":"MrGadgets","email":"hpr.nospam@nospam.mrgadgets.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"MrGadgets"},
|
||||
{"hostid":156,"host":"marcoz","email":"marcoz.nospam@nospam.osource.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"marcoz"},
|
||||
{"hostid":157,"host":"HPR_AudioBookClub","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"HPR_AudioBookClub"},
|
||||
{"hostid":158,"host":"Various Creative Commons Works","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Various Creative Commons Works"},
|
||||
{"hostid":159,"host":"HPR Volunteers","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"HPR Volunteers"},
|
||||
{"hostid":160,"host":"Robin Catling","email":"fullcirclepodcast.nospam@nospam.googlemail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Robin Catling"},
|
||||
{"hostid":161,"host":"Jonathan Nadeau","email":"feedback.nospam@nospam.frostbitemedia.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Jonathan Nadeau"},
|
||||
{"hostid":162,"host":"code.cruncher","email":"code.cruncher_hpr.nospam@nospam.yahoo.ca","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"code.cruncher"},
|
||||
{"hostid":163,"host":"Brad Carter","email":"brad.nospam@nospam.notla.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Brad Carter"},
|
||||
{"hostid":164,"host":"scriptmunkee","email":"scriptmunkee.nospam@nospam.gmail.com","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"scriptmunkee"},
|
||||
{"hostid":165,"host":"Bob Evans","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Bob Evans"},
|
||||
{"hostid":167,"host":"imahuph","email":"imahuph.nospam@nospam.imahuph.net","profile":"","license":"CC-0","local_image":0,"gpg":"","valid":1,"espeak_name":"ImAHuph"},
|
||||
{"hostid":168,"host":"sikilpaake and badbit","email":"info.nospam@nospam.carlosduarte.info","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"sikilpaake and badbit"},
|
||||
{"hostid":169,"host":"Slurry","email":"williams.jayson.nospam@nospam.gmail.com","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Slurry"},
|
||||
{"hostid":170,"host":"Dismal Science and Sunzofman1","email":"dismal.science.hpr.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Dismal Science and SunzOfMan1"},
|
||||
{"hostid":171,"host":"Brotherred","email":"goy.ben.regesh.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Brotherred"},
|
||||
{"hostid":172,"host":"ArigornStrider","email":"arigornstrider.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"ArigornStrider"},
|
||||
{"hostid":173,"host":"Joel","email":"gorkon.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Joel"},
|
||||
{"hostid":174,"host":"Josh Knapp","email":"jknapp85.nospam@nospam.gmail.com","profile":"<p>\nSysadmin/Developer /Contractor/Consultant\n</p>","license":"CC-0","local_image":0,"gpg":"","valid":1,"espeak_name":"Josh Knapp"},
|
||||
{"hostid":175,"host":"Dave","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Dave"},
|
||||
{"hostid":176,"host":"finux and code.cruncher","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"finux and code.cruncher"},
|
||||
{"hostid":177,"host":"NewAgeTechnoHippie","email":"newagetechnohippie.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"NewAgeTechnoHippie"},
|
||||
{"hostid":178,"host":"Downer","email":"downer.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Downer"},
|
||||
{"hostid":182,"host":"Epicanis","email":"epicanis+hpr.nospam@nospam.dogphilosophy.net","profile":"<p>\n\"Epicanis\" has been this correspondent's pseudonym on the internet for enough years to make him feel old and to make it an established enough identity to not want to change it now.\n</p>\n<p>\nA self-described Penguinista with a long career as a compu-janitor/systems administrator, Epicanis is broad-spectrum, \n multi-purpose \"Swiss-Army Nerd\", with a B.S. in Microbiology, an A.S. in Chemistry, a quarter-century of continuous\n I.T. experience and a desire to escape the economic roach-motel of rural northern Maine, so if you're looking to hire,\n let him know.\n</p>\n<p>\nYou can find him on Twitter and Google Plus via his pseudonym, and at (among other places) <a href=\"https://hpr.dogphilosophy.net\">https://hpr.dogphilosophy.net</a>\n</p>\n<p>\n<ul>\n<li>Website: <a href=\"https://hpr.dogphilosophy.net\">https://hpr.dogphilosophy.net</a>\n</li>\n<li>Twitter: @Epicanis <a href=\"https://twitter.com/Epicanis\">https://twitter.com/Epicanis</a>\n</li>\n<li>Google+: <a href=\"https://plus.google.com/u/0/117231980905216630589/posts\">https://plus.google.com/u/0/117231980905216630589/posts</a>\n</li>\n</ul\n</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"EpiCaynis"},
|
||||
{"hostid":184,"host":"diablomarcus","email":"mark.katerberg.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"DiabloMarcus"},
|
||||
{"hostid":185,"host":"Mike Hingley","email":"computa_mike.nospam@nospam.hotmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Mike Hingley"},
|
||||
{"hostid":186,"host":"Germ","email":"jeremythegeek.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Germ"},
|
||||
{"hostid":187,"host":"Sunzofman1","email":"agreen.nospam@nospam.bkaeg.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"SunzOfMan1"},
|
||||
{"hostid":188,"host":"saras fox","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"saras fox"},
|
||||
{"hostid":189,"host":"Joe Wakumara","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Joe Wakumara"},
|
||||
{"hostid":190,"host":"Tracy Holz_Holzster","email":"workingintheopen.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Tracy Holz_Holzster"},
|
||||
{"hostid":191,"host":"AukonDK","email":"aukondk.nospam@nospam.aukondk.com","profile":"<p>\nStephen Ward, a Brit in Croatia. Accidental specialist subject: Internet Radio.\n</p>\n<p>\nMore info at <a href=\"https://aukondk.com\">https://aukondk.com</a>\n</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"AukonDK"},
|
||||
{"hostid":192,"host":"Seetee","email":"kenneth.nospam@nospam.aiit.se","profile":"<p>\nKenneth \"Seetee\" Frantzen\n</p>\n<p>\nAn IT professional and teacher living in Gothenburg, the second largest city of Sweden. Listen to my own podcast as well, the All In IT Radio!\n</p>\n<ul>\n<li>Podcast: <a href=\"https://aiit.se/radio/\">https://aiit.se/radio/</a>\n</li>\n<li>Website: <a href=\"https://frantzen.se/\">https://frantzen.se/</a>\n</li>\n<li>Twitter: @alltinomit <a href=\"https://twitter.com/alltinomit\">https://twitter.com/alltinomit</a>\n</li>\n<li>Identica: <a href=\"https://identi.ca/alltinomit\">https://identi.ca/alltinomit</a>\n</li>\n<li>Google+: <a href=\"https://plus.google.com/+KennethFrantzen\">https://plus.google.com/+KennethFrantzen</a> \n</li>\n</ul>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Seetee"},
|
||||
{"hostid":193,"host":"Kevin Granade","email":"kevin.granade.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Kevin Granade"},
|
||||
{"hostid":194,"host":"Deltaray","email":"deltaray.nospam@nospam.slugbug.org","profile":"From the \"mid-west\" of the US. I am the creator/host of the @climagic account on Mastodon and (cough) Twitter.","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Deltaray"},
|
||||
{"hostid":195,"host":"Frank Bell","email":"frank.nospam@nospam.pineviewfarm.net","profile":"<p>\nA Linux enthusiast who enjoys making stuff work.\n<br />\n<a https://=\"https://www.pineviewfarm.net\">https://www.pineviewfarm.net</a>\n</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"Frank Bell"},
|
||||
{"hostid":196,"host":"Windigo","email":"jacob.nospam@nospam.fragdev.com","profile":"<p> A dork that likes Minecraft, FLOSS development, and coffee. Not in that order. </p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Windigo"},
|
||||
{"hostid":197,"host":"garjola","email":"garjola.nospam@nospam.garjola.net","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"garjola"},
|
||||
{"hostid":198,"host":"Ahuka","email":"zwilnik.nospam@nospam.zwilnik.com","profile":"<p>I am a long-time office software geek, and also a promoter of Free Software, so LibreOffice is a natural fit for me. I also have a series on HPR called Security and Privacy, and occasionally record shows that are non-series. I am also the former Tech Track organizer for Penguicon, an event in southeast Michigan, USA. Since I retired my interests have shifted to Travel, computer games, and Science Fiction.Visit one of my sites at:\n</p><p>\n</p><ul><li><a href=\"https://www.ahuka.com\">https://www.ahuka.com</a>\n</li><li><a href=\"https://www.palain.com\">https://www.palain.com</a>\n</li><li><a href=\"https://www.zwilnik.com\">https://www.zwilnik.com</a>\n</li></ul>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"ah-who-ca"},
|
||||
{"hostid":199,"host":"Akranis","email":"hexagenic.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Akranis"},
|
||||
{"hostid":200,"host":"mordancy","email":"hpr.nospam@nospam.mordancy.com","profile":"mordancy.com","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"mordancy"},
|
||||
{"hostid":201,"host":"MrX","email":"mrxathpr.nospam@nospam.googlemail.com","profile":"<p><br></p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Mister X"},
|
||||
{"hostid":202,"host":"BrocktonBob","email":"bhpcrepair.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"BrocktonBob"},
|
||||
{"hostid":203,"host":"dmfrey","email":"dmfrey.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"dmfrey"},
|
||||
{"hostid":205,"host":"Jezra and NYbill","email":"nybill.nospam@nospam.gunmonkeynet.net","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Jezra and N_Y_bill"},
|
||||
{"hostid":206,"host":"Bob Wooden","email":"rbrtewdn.nospam@nospam.comcast.net","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Bob Wooden"},
|
||||
{"hostid":207,"host":"rootoutcast","email":"rootoutcast.nospam@nospam.hushmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"RootOutcast"},
|
||||
{"hostid":208,"host":"Digital Maniac","email":"destinydesignlabs.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Digital Maniac"},
|
||||
{"hostid":209,"host":"David Whitman","email":"davidglennwhitman.nospam@nospam.gmail.com","profile":"<p>\nI am a normal person with good taste from Oregon, USA. I like black coffee and FREE Software. I use Linux as my operating system of choice.\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"David Whitman"},
|
||||
{"hostid":210,"host":"Neodragon","email":"linuxgeekster.stahl.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Neodragon"},
|
||||
{"hostid":212,"host":"DoorToDoorGeek","email":"doortodoorgeek.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"DoorToDoorGeek"},
|
||||
{"hostid":213,"host":"bgryderclock","email":"bgryderclock.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"bgryderclock"},
|
||||
{"hostid":214,"host":"Nido Media","email":"nido.nospam@nospam.foxserver.be","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Nido Media"},
|
||||
{"hostid":216,"host":"goibhniu","email":"goibhniu.nospam@nospam.fsfe.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"goibhniu"},
|
||||
{"hostid":217,"host":"aparanoidshell","email":"aparanoidshell.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"aparanoidshell"},
|
||||
{"hostid":218,"host":"Famicoman","email":"famicoman.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Famicoman"},
|
||||
{"hostid":219,"host":"ccmusique","email":"ccmusique.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"ccmusique"},
|
||||
{"hostid":220,"host":"doubi","email":"ryan.jendoubi.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"doubi"},
|
||||
{"hostid":221,"host":"cleavey","email":"cleavey.nospam@nospam.ic24.net","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"cleavey"},
|
||||
{"hostid":222,"host":"The Air Staff of Erie Looking Productions","email":"skellat.nospam@nospam.fastmail.net","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"The Air Staff of Erie Looking Productions"},
|
||||
{"hostid":223,"host":"Frederic Couchet","email":"fcouchet.nospam@nospam.april.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Frederic Couchet"},
|
||||
{"hostid":224,"host":"Zachary De Santos","email":"niisa.nospam@nospam.gmx.co.uk","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Zachary De Santos"},
|
||||
{"hostid":225,"host":"Dave Morriss","email":"perloid.nospam@nospam.autistici.org","profile":"<p>Old Geek, lives in Scotland, writes scripts and stuff for amusement</p>\n\n<ul>\n<li>Mastodon: @perloid@mastodon.sdf.org <a href=\"https://mastodon.sdf.org/@perloid\">https://mastodon.sdf.org/@perloid</a></li>\n</ul>\r","license":"CC-BY-SA","local_image":0,"gpg":"4825C90A45758A21","valid":1,"espeak_name":"Dave Morriss"},
|
||||
{"hostid":226,"host":"bobobex","email":"bobobex.nospam@nospam.bobobex.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"BoBoBex"},
|
||||
{"hostid":227,"host":"Dick Thomas","email":"Dick.nospam@nospam.xpd259.co.uk","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Dick Thomas"},
|
||||
{"hostid":228,"host":"Delwin","email":"delwin.nospam@nospam.skyehaven.net","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Delwin"},
|
||||
{"hostid":229,"host":"Charles in NJ","email":"catintp.nospam@nospam.yahoo.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Charles in NJ"},
|
||||
{"hostid":230,"host":"Dude-man","email":"hpr.nospam@nospam.dudmanovi.cz","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Dude-man"},
|
||||
{"hostid":231,"host":"Beto","email":"beto.nospam@nospam.haventfoundme.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Beto"},
|
||||
{"hostid":232,"host":"Peter64","email":"peter.nospam@nospam.peter64.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Peter64"},
|
||||
{"hostid":233,"host":"johanv","email":"johan.vervloet.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"johanv"},
|
||||
{"hostid":234,"host":"Emilien Klein","email":"emilien+hpr.nospam@nospam.klein.st","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Emilien Klein"},
|
||||
{"hostid":235,"host":"NYbill","email":"nybill.nospam@nospam.gunmonkeynet.net","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"N Y bill"},
|
||||
{"hostid":237,"host":"Tgtm News Team","email":"hpr.nospam@nospam.deepgeek.us","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Tgtm News Team"},
|
||||
{"hostid":238,"host":"Jon Kulp","email":"jonlancekulp.nospam@nospam.gmail.com","profile":"<p>\nMusic professor, open-source software enthusiast, Lafayette, LA. <br />\n<a href=\"https://jonathankulp.org \">https://jonathankulp.org </a>\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Jon Kulp"},
|
||||
{"hostid":239,"host":"b1ackcr0w","email":"alistair.nospam@nospam.amunro.net","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"blackcrow"},
|
||||
{"hostid":240,"host":"Steve Bickle","email":"steve.nospam@nospam.bickle.co.uk","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Steve Bickle"},
|
||||
{"hostid":241,"host":"Christopher M. Hobbs","email":"cmhobbs.nospam@nospam.member.fsf.org","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Christopher M. Hobbs"},
|
||||
{"hostid":242,"host":"Russ Wenner","email":"russwenner.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Russ Wenner"},
|
||||
{"hostid":243,"host":"Jezra","email":"Jezra.nospam@nospam.jezra.net","profile":"<p><br></p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Jezra"},
|
||||
{"hostid":244,"host":"Helvetin","email":"reiststefan.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Helvetin"},
|
||||
{"hostid":245,"host":"Deb Nicholson","email":"dnicholson.nospam@nospam.openinventionnetwork.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Deb Nicholson"},
|
||||
{"hostid":246,"host":"Beeza","email":"nigelverity.nospam@nospam.hotmail.com","profile":"<p>\nBeeza has worked in just about every area of software development over the last 30+ years, including long spells in the defence and finance industries. He is now relatively impoverished but far happier working for himself on a number of tech and non-tech projects. \n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Beeza"},
|
||||
{"hostid":247,"host":"Toby Meehan","email":"conman53095.nospam@nospam.yahoo.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Toby Meehan"},
|
||||
{"hostid":248,"host":"Alek Grigorian","email":"alek.grigorian.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Alek Grigorian"},
|
||||
{"hostid":249,"host":"Accipiter","email":"Accipiter81M.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Accsipiter"},
|
||||
{"hostid":250,"host":"Shane Shennan","email":"shaneshennan.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Shane Shennan"},
|
||||
{"hostid":251,"host":"Bob Tregilus","email":"elaterite.nospam@nospam.yahoo.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Bob Tregilus"},
|
||||
{"hostid":252,"host":"Curtis Adkins (CPrompt^)","email":"curtadkins.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Curtis Adkins (CPrompt^)"},
|
||||
{"hostid":253,"host":"jrobb","email":"jfrobbins.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"jrobb"},
|
||||
{"hostid":254,"host":"Stitch","email":"Stitch.nospam@nospam.hack42.nl","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Stitch"},
|
||||
{"hostid":255,"host":"Matt McGraw (g33kdad)","email":"matty.nospam@nospam.thestrangeland.net","profile":"<p>\nstay-home dad, child of God, Progressive Christian, technology enthusiast, homeschool parent, mostly harmless\n</p>\n<p>\n<a href=\"https://g33kdad.thestrangeland.net\">https://g33kdad.thestrangeland.net</a>\n</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"Matt McGraw (g33kdad)"},
|
||||
{"hostid":256,"host":"Julian Neuer","email":"jln.neuer.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Julian Neuer"},
|
||||
{"hostid":257,"host":"laindir","email":"carl.hamann.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"laindir"},
|
||||
{"hostid":258,"host":"Riley Gelwicks (glwx)","email":"riley.gelwicks.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Riley Gelwicks (glwx)"},
|
||||
{"hostid":259,"host":"Gabriel Evenfire","email":"evenfire.nospam@nospam.sdf.org","profile":"","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"Gabriel Evenfire"},
|
||||
{"hostid":260,"host":"James Michael DuPont (h4ck3rm1k3)","email":"JamesMikeDuPont.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"James Michael DuPont (hackermike)"},
|
||||
{"hostid":261,"host":"David Willson","email":"DLWillson.nospam@nospam.thegeek.nu","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"David Willson"},
|
||||
{"hostid":262,"host":"Neandergeek","email":"rkline1963.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Neandergeek"},
|
||||
{"hostid":263,"host":"Tony Pelaez","email":"tony.nospam@nospam.pelaez.me","profile":"<p>\nI feel information should be free, so I created <a href=\"https://ilearnthings.com\">https://ilearnthings.com</a>\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Tony Pelaez"},
|
||||
{"hostid":264,"host":"Richard Hughes","email":"richardhughes260.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Richard Hughes"},
|
||||
{"hostid":265,"host":"Kevin Wisher","email":"kevin.wisher.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Kevin Wisher"},
|
||||
{"hostid":266,"host":"Keith Murray","email":"kdmurray.nospam@nospam.kdmurray.com","profile":"Canadian geek from the west coast. Converting calories to code.\n\n@kdmurray nearly everywhere\n\nhtttps://kdmurray.com/","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Keith Murray"},
|
||||
{"hostid":267,"host":"Underruner","email":"plushgeek.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Underruner"},
|
||||
{"hostid":268,"host":"Andrew Conway","email":"nalumc.nospam@nospam.gmail.com","profile":"<p>\nInterested in computers, science, economics, writing and er, well, um, humans I suppose.<br />\n<a href=\"https://blog.mcnalu.net/\">blog.mcnalu.net</a>\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Andrew Conway"},
|
||||
{"hostid":269,"host":"Honkeymagoo","email":"honkeymagoo01.nospam@nospam.gmail.com","profile":"<p><br></p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"HonkeyMagoo"},
|
||||
{"hostid":270,"host":"Thaj Sara","email":"thajasara.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Thaj Sara"},
|
||||
{"hostid":271,"host":"mirwi","email":"mirwi.nospam@nospam.binary-kitchen.de","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"mirwi"},
|
||||
{"hostid":272,"host":"cyan","email":"cyantech.nospam@nospam.yandex.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"cyan"},
|
||||
{"hostid":273,"host":"ToeJet","email":"james.nospam@nospam.toebesacademy.com","profile":"<p>\nDabbling in a bit of this and that.\n\nFind me at https://james.toebesacademy.com\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Toe Jet"},
|
||||
{"hostid":274,"host":"J. A. Mathis","email":"jamathis.nospam@nospam.riseup.net","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"J. A. Mathis"},
|
||||
{"hostid":275,"host":"Bill_MI","email":"Bill_MI.nospam@nospam.mi.ath.cx","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Bill_M_I"},
|
||||
{"hostid":276,"host":"x1101","email":"x1101.nospam@nospam.gmx.com","profile":"<p>\nFather | Husband | Hacker | Cook | Podcaster | DevOps\n</p>\n<p>\n<a href=\"https://reflections.x1101.net/\">https://reflections.x1101.net/</a><br />\n<a href=\"https://urandom-podcast.info/\">https://urandom-podcast.info/</a>\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"x 1 1 0 1 "},
|
||||
{"hostid":277,"host":"John Duarte","email":"john.nospam@nospam.duarte-dailey.us","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"John Duarte"},
|
||||
{"hostid":279,"host":"Mark Waters","email":"mark.nospam@nospam.collective-b.org.uk","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Mark Waters"},
|
||||
{"hostid":280,"host":"semioticrobotic","email":"bryan.nospam@nospam.semioticrobotic.net","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"259E2719E0EC869B","valid":1,"espeak_name":"semioticrobotic"},
|
||||
{"hostid":281,"host":"Scyner","email":"person65278.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Scyner"},
|
||||
{"hostid":282,"host":"Mike Ray","email":"mike.nospam@nospam.raspberryvi.org","profile":"<p><a href=\"https://raspberryvi.org/pages/about.html\">https://raspberryvi.org/pages/about.html</a></p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Mike Ray"},
|
||||
{"hostid":283,"host":"Inscius","email":"mikael.nospam@nospam.inscius.se","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"97517ADC315AB7B6","valid":1,"espeak_name":"Inscius"},
|
||||
{"hostid":284,"host":"Steve Smethurst","email":"ssmethurst.nospam@nospam.tiscali.co.uk","profile":"","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"Steve Smethurst"},
|
||||
{"hostid":285,"host":"2BFrank","email":"frank.durr.nospam@nospam.mailoo.org","profile":"Our own podcast \"Linux ohne Angst\" (in German, Linux without fear): https://linuxohneangst.net","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"2BFrank"},
|
||||
{"hostid":286,"host":"cjm","email":"colin.j.mills96.nospam@nospam.gmail.com","profile":"<pre>\n* Unix Enthusiast \n\n* Nixers Frequent\n\n* Coffee Drinker\n</pre>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"cjm"},
|
||||
{"hostid":287,"host":"corenominal","email":"corenominal.nospam@nospam.corenominal.org","profile":"<p>\n<a href=\"https://corenominal.org\" title=\"Link to Philip's blog.\">Philip Newborough</a>\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"CoreNominal"},
|
||||
{"hostid":288,"host":"beni","email":"hpr.nospam@nospam.hb9hnt.ch","profile":"<p><br></p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"beni"},
|
||||
{"hostid":289,"host":"pyrrhic","email":"notrofise.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"pyrrhic"},
|
||||
{"hostid":290,"host":"Al","email":"al.nospam@nospam.adminadminpodcast.co.uk","profile":"<p>A very laid back podcasters from the UK.</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Al"},
|
||||
{"hostid":291,"host":"Rill","email":"jefa.nospam@nospam.lajefa.net","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Rill"},
|
||||
{"hostid":292,"host":"Michal Cieraszynski","email":"planet444.nospam@nospam.gmail.com","profile":"I am a electronics and technology enthusiast as well as hobbyist who likes to mess around with computer hardware, video games, and other things in my spare time. https://www.planet444.com, my very neglected website. I only mention it here because one day I may actually update it.","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Michal Cieraszynski"},
|
||||
{"hostid":293,"host":"Rho`n","email":"roan.horning.nospam@nospam.gmail.com","profile":"<p>How grey does your beard need to be to be a grey beard?</p><ul><li>Mastodon: @roan@fosstodon.org</li><li>Matrix: @rho_n:matrix.org\n</li></ul>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"rowen"},
|
||||
{"hostid":294,"host":"daw","email":"douglasawh.nospam@nospam.gmail.com","profile":"<p>\n<a href=\"https://www.musicmanumit.com\">https://www.musicmanumit.com</a> and <a href=\"https://micro.fragdev.com/daw\">https://micro.fragdev.com/daw</a> are probably all you need. Although, I will say I am moving to Cincinnati summer 2015 and looking for work there (or telecommuting). So, you if you know something, let me know!\n</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"daw"},
|
||||
{"hostid":295,"host":"Cibola Jerry","email":"cibolajerry.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Cibola Jerry"},
|
||||
{"hostid":296,"host":"Kevie","email":"kmacphail.nospam@nospam.yahoo.com","profile":"<p>I'm a proud father, husband and Christian. I enjoy beer, reading, fishing, cooking and podcasting (co-host of TuxJam). I'm a big follower of the NFL (Saints), NCAAF (Navy Midshipmen) and football (Rangers FC). Linux user since 2007, M$ free since 2008.</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"Kevie"},
|
||||
{"hostid":297,"host":"Swift110","email":"anthonyvenable110.nospam@nospam.tutanota.com","profile":"<p>My telegram is t.me/forthenerdsremix\nirc is #forthenerds on libera</p><p><br></p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"swift one hundred and ten"},
|
||||
{"hostid":298,"host":"tcuc","email":"infotcuc.nospam@nospam.gmail.com","profile":"<p>The American viking.</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"T C U C "},
|
||||
{"hostid":299,"host":"Fin","email":"finlaygmitchell.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"Fin"},
|
||||
{"hostid":300,"host":"Mr. Young","email":"by33zi.nospam@nospam.protonmail.com","profile":"<p>\nI am a dad, small-business owner, scientist, and Linux enthousiast with a lust for knowledge. You can find me on Mastadon at @ryoung39@mastodon.online\n</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"Mister Young"},
|
||||
{"hostid":301,"host":"Amunizp","email":"amunizp.nospam@nospam.member.fsf.org","profile":"<p>\nI am a scientist as my day job and in my free time I enjoy being with my family. I also contribute to my local hacerspace/makerspace: <a href=\"https://wiki.richmondmakerlabs.uk/index.php?title=Main_Page\">https://wiki.richmondmakerlabs.uk/index.php?title=Main_Page</a>\n</p>\n<p>\nmy handle at gnusocial is @andresinmp@loadaverage.org\n</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"A MunizP"},
|
||||
{"hostid":302,"host":"Stilvoid","email":"steve.nospam@nospam.offend.me.uk","profile":"<p>\nDoes things with servers. Deeply embedded in the Linux world with no way out and sees that as a great thing. Father of one. Often too polite.\n</p>\n<p>\nIf you want to know more about me, look here: <a href=\"https://offend.me.uk/about/\">https://offend.me.uk/about/</a> and feel free to get in touch.\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Stilvoid"},
|
||||
{"hostid":303,"host":"Alpha32","email":"andrew.neher1.nospam@nospam.gmail.com","profile":"<p>\nJust a guy with a microphone. And a computer. and some other stuff, but that's not important.\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Alpha32"},
|
||||
{"hostid":305,"host":"kurakura","email":"kurakuradave.nospam@nospam.gmail.com","profile":"<p>\nLong time listener of HPR, drawn to Linux in 2008, because of the accessibility features (Orca, font size and mouse pointer customizability) which I continue to use daily until today, now plus the screen magnifier. \n</p>\n<p>\nLately, started work on ChorusText, a device built with Arduino, Linux SBC and some sliders, and text-to-speech - an open assistive device for users with visual impairment. The main goal for ChorusText is as a non-visual text editor. Plase see <a href=\"https://www.chorustext.org\">www.chorustext.org</a> for more details\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"kurakura"},
|
||||
{"hostid":306,"host":"GNULinuxRTM","email":"GNULinuxRTM.nospam@nospam.gmail.com","profile":"<p>\nStarted on the Altair 8800 in 1979 in Middle School (Very lucky to have a teacher who had a Comp Sci Degree).\n</p>\n<p>\nStarted my Comp/Sci Degree in 1984. They ran UNIX System V with VT220 terminals. Had to learn VI editor, shell commands and C in first 2 weeks to complete the Lab. Did some Co-ops Work-Terms, graduated in 1990.\n</p>\n<p>\nDay Job is mostly Microsoft Environment, switched to Linux Mint at home summer of 2014.\n</p>\n<p>\nJust Started an Educational Youtube Channel (April 2015). I am the Voice of the GNU Bull and my daughter is the voice for the Linux Penguin. Later added the Blog and Podcast. Trying to make it Family Friendly and bring life to relatively dry topic - Documentation.\n</p>\n\n<h3>Links</h3>\n\n<ul>\n<li>Blog: <a href=\"https://GNULinuxRTM.blogspot.com\">https://GNULinuxRTM.blogspot.com</a>\n</li>\n<li>RSS Feed: <a href=\"https://feeds.feedburner.com/GNULinuxRTM\">https://feeds.feedburner.com/GNULinuxRTM</a>\n</li>\n<li>Youtube Channel: <a href=\"https://www.youtube.com/c/GNULinuxRTMblogspotPlus\">https://www.youtube.com/c/GNULinuxRTMblogspotPlus</a>\n</li>\n<li>Google+: <a href=\"https://plus.google.com/+GNULinuxRTMblogspotPlus\">https://plus.google.com/+GNULinuxRTMblogspotPlus</a>\n</li>\n</ul>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"GNULinuxRTM"},
|
||||
{"hostid":307,"host":"cheeto4493","email":"Travis.nospam@nospam.travestylabs.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"cheeto4 4 9 3"},
|
||||
{"hostid":308,"host":"A Shadowy Figure","email":"hpr.saxz.nospam@nospam.9ox.net","profile":"<p>\nfrom parts unknown, weight unknown, a shadowy figure has a murky past, with a questionable alibi for his whereabouts at any particular time.\n</p>\n<p>\nLikes: hacking, and lurking in shadows.\n</p>\n<p>\nDislikes: Corporate greed, and revealing things about himself.\n</p>\n<p>\nUses Linux as main computing device, windows and mac as back-ups\n</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"A Shadowy Figure"},
|
||||
{"hostid":309,"host":"folky","email":"hpr.nospam@nospam.svenskaa.net","profile":"<p>\nEveryday GNU/Linux-user, german-speaking, living in northern Europe.\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"folky"},
|
||||
{"hostid":310,"host":"Geddes","email":"geddes.linux.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"Geddes"},
|
||||
{"hostid":311,"host":"clacke","email":"hpr.nospam@nospam.clacke.user.lysator.liu.se","profile":"<p>On GNU/Linux since <a href=\"https://www.linux-m68k.org/faq/saynotowatchtower.html\">Amiga Watchtower</a>, using it as my primary OS since Debian Slink, been on Ubuntu ever since it fulfilled the derailed UserLinux dream.</p>\n<p>These days I'm running Ubuntu-Gnome, but I'm considering NixOS+Guix as my primary OS, with a Debian chroot for the pieces that are missing.</p>\n<p>You can find me on the Free social web at <a href=\"https://libranet.de/~clacke\">clacke@libranet.de</a>.</p>\n","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"clacke"},
|
||||
{"hostid":312,"host":"Moral Volcano","email":"vsubhash.nospam@nospam.gmail.com","profile":"<p>\nBlogger. Writer. Developer.\n</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"Moral Volcano"},
|
||||
{"hostid":313,"host":"JustMe","email":"easlingml.nospam@nospam.aliyun.com","profile":"<p>I've been in & out of computing since the late 70s.</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"JustMe"},
|
||||
{"hostid":314,"host":"thelovebug","email":"hpr.nospam@nospam.thelovebug.org","profile":"<p><strong>Professionally:</strong> works in InfoSec and AppSec.</p><p><strong>Spare time: </strong>podcasting, amateur radio, 3D printing, musician.\n<strong>Lives: </strong>South Yorkshire in the UK.\n</p><p>\n</p><p><strong>Mastodon: </strong><a href=\"https://mastodon.me.uk/@thelovebug\">@thelovebug@mastodon.me.uk</a>\n<strong>Telegram: </strong><a href=\"https://telegram.me/thelovebug\">thelovebug</a></p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"TheLoveBug"},
|
||||
{"hostid":315,"host":"Clinton Roy","email":"clinton.roy.nospam@nospam.gmail.com","profile":"<p>Clinton Roy is an Open Source engineer.</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Clinton Roy"},
|
||||
{"hostid":317,"host":"Eric Duhamel","email":"ericxdu23.nospam@nospam.gmail.com","profile":"<p>\nI'm a 30-something programming/computer hobbyist in Southern California.\n<br />\nSee more on my webpage <a href=\"https://www.noxbanners.net/\">https://www.noxbanners.net/</a> and follow me on <a href=\"https://loadaverage.org/ericxdu23\">https://loadaverage.org/ericxdu23</a>\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Eric Duhamel"},
|
||||
{"hostid":318,"host":"Archer72","email":"ricemark20.nospam@nospam.gmail.com","profile":"I got started in Linux in 2002, with a set of Mandriva KDE CD's and have enjoyed using variations ever since. \n\nCurrently switched to Debian 13 testing.\n\nContact:\n\n • archer72 on IRC on libera.chat at #oggcastplanet\n • Mastodon at @archer72@mastodon.sdf.org\n • Telegram at @archer7201","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"Archer Seventy Two"},
|
||||
{"hostid":319,"host":"OnlyHalfTheTime","email":"onlyhalfthetime.nospam@nospam.gmail.com","profile":"<p>The Reluctant Windows Admin</a>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"OnlyHalfTheTime"},
|
||||
{"hostid":320,"host":"The Linux Experiment","email":"editor.nospam@nospam.thelinuxexperiment.com","profile":"<p>Help us take The Linux Experiment to the next level!</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"The Linux Experiment"},
|
||||
{"hostid":322,"host":"Cov","email":"cov.nospam@nospam.mykolab.com","profile":"<p>\nChristopher \"Cov\" Covington is a fan of libre projects, currently living in North Carolina, United States of America. His personal site is <a href=\"https://covlibre.net/\">https://covlibre.net/</a>\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Cov"},
|
||||
{"hostid":323,"host":"Nacho Jordi","email":"ijordiatienza.nospam@nospam.yahoo.es","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Nacho Jordi"},
|
||||
{"hostid":324,"host":"Jon Doe","email":"jondoelocksmith.nospam@nospam.gmail.com","profile":"<p>A locksmith by training, I work in physical and digital security, and have some fun with the same by night. </p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Jon Doe"},
|
||||
{"hostid":325,"host":"m1rr0r5h4d35","email":"m1rr0r5h4d35.nospam@nospam.gmx.com","profile":"<p>I'm this guy who likes computers. Computers and Burger King. </p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"MirrorShades"},
|
||||
{"hostid":326,"host":"Brian-in-Ohio","email":"bknavarette.nospam@nospam.gmail.com","profile":"<p><br></p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Brian in Ohio"},
|
||||
{"hostid":327,"host":"noplacelikeslashhome","email":"nathanpublicinbox.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"NoPlaceLikeSlashHome"},
|
||||
{"hostid":328,"host":"Joe","email":"jsilino.nospam@nospam.gmail.com","profile":"<p>\nHi, I'm Joe Silino and I live in Upstate NY. I've been using Linux since the late 90's and have recently entered the world of sound production. I'm currently introducing my tech team at church to the benefits of the Open Source world and finding it very useful for many of my projects.\n<br />\n<a href=https://soundcloud.com/calvaryworshipandtech\">https://soundcloud.com/calvaryworshipandtech</a><br />\n<a href=\"https://soundcloud.com/ccsyracuse\">https://soundcloud.com/ccsyracuse</a>\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Joe"},
|
||||
{"hostid":329,"host":"brian","email":"venant.nospam@nospam.protonmail.ch","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"brian"},
|
||||
{"hostid":330,"host":"Bitbox","email":"bitbox.nospam@nospam.member.fsf.org","profile":"<p>\nI'm a long haul trucker who runs all 48 states here in the US. I really enjoy tinkering with my laptops and used to do a lot of nuke and pave. I am afraid you wont find me on social media nor do I have a website. I don't really have much time for that stuff, and I have never been a big social butterfly, anyway. I live in north east Indiana, in the US. I am a father 3 times over, and Grampa twice over. Been married 26 years (yeah,... a VERY patient woman there). I work between 75 and 85 hrs a week, roughly 70 of it driving. I've been an HPR listener for about 2-3 years now, but as of 15 April 2016, I am just now contributing my first episode (shame...). I will strive to do better, Ken...!<br />\n<strong>PS: I really hate seeing people get scraped off the highways. I like tech too, but STOP TEXTING AND PLAYING WITH PHONES WHILE YOU DRIVE, EVERYONE. PLEASE!</strong>\n</p>\n","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Bitbox"},
|
||||
{"hostid":331,"host":"njulian","email":"njulianmallog.nospam@nospam.yahoo.de","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"njulian"},
|
||||
{"hostid":332,"host":"schism","email":"alarmdude9.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"schism"},
|
||||
{"hostid":333,"host":"pope523","email":"joseph.harris.nospam@nospam.jlharris.net","profile":"<p>Former network engineer, now delivery driver.</a>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"pope5 2 3"},
|
||||
{"hostid":334,"host":"Steve Saner","email":"hpr.nospam@nospam.saner.net","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Steve Saner"},
|
||||
{"hostid":335,"host":"matthew","email":"matthew.nospam@nospam.fairvega.com","profile":"<p>I'm a family guy, a pilot, and a compulsive programmer.</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"matthew"},
|
||||
{"hostid":336,"host":"Lyle Lastinger","email":"lylelastinger.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Lyle Lastinger"},
|
||||
{"hostid":337,"host":"handsome_pirate","email":"jdulaney.nospam@nospam.fedoraproject.org","profile":"<p>handsome_pirate (John Dulaney) is a long time contributor to the Fedora Project. He is an avid rail enthusiast, and considers his model ships to be his artwork.</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"handsome_pirate"},
|
||||
{"hostid":338,"host":"Tony Hughes AKA TonyH1212","email":"tonyhughes1958.nospam@nospam.gmail.com","profile":"<p>\nI'm a middle age bloke who enjoys using and talking about computers and open source software. I started using Linux in 2006 and have been using it as my Operating System on all my PC's for the last 7 years. I'm also an avid cook and enjoy creating new vegetarian recipes as I have been a vegetarian for over 26 years. <br />\nI have an occasional Blog at: <a href=\"https://tony-hughes.blogspot.co.uk/\">https://tony-hughes.blogspot.co.uk/<a/>\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Tony Hughes A.K.A TonyH1 2 1 2"},
|
||||
{"hostid":339,"host":"Todd Mitchell","email":"Todd.nospam@nospam.codewriteplay.com","profile":"<p>\nMidwest US-based freelance entertainment journalist focused on the game industry. Former professional software developer and current indie game hobbyist. \n</p>\n<p>\nTwitter: <a href=\"https://twitter.com/Mechatodzilla\">@Mechatodzilla</a>\n</p>\n<p>\n<a href=\"https://CodeWritePlay.com\">CodeWritePlay.com</a>\n</p>\n","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"Todd Mitchell"},
|
||||
{"hostid":340,"host":"mattkingusa","email":"Matt.nospam@nospam.autumnstreetrecords.com","profile":"<p>\nHi im matt king. I produce music on linux and i try and code wesites. :)\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"MattKingUSA"},
|
||||
{"hostid":342,"host":"norrist","email":"norrist.nospam@nospam.gmail.com","profile":"<p>https://noc.social/@norrist</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"norrist"},
|
||||
{"hostid":343,"host":"The Bishop","email":"bishop-hpr.nospam@nospam.mondkalbantrieb.de","profile":"<p>\nHi, i am The Bishop from Berlin/Germany.<br />\nMy computer experience started more than 30 years ago with Commodore Plus 4 and Commodore 64. Later on i continued with Commodore Amiga 500 and Amiga 1200. My first PC was an 80286-based. I started using Linux with Slackware 3.2(?) and Kernel 2.0.20.\n</p>\n<p>\nMy favourite topics are compression technology and cryptography. I'm a guy interested in low level stuff down to the raw bits, i leave the modern GUI-programming for others.\n</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"The Bishop"},
|
||||
{"hostid":344,"host":"spaceman","email":"admin.nospam@nospam.hackerpublicradio.org","profile":"<ul>\n<li><a href=\"https://qzc3ou3vccr3yjyg.onion/\">https://qzc3ou3vccr3yjyg.onion/</a></li>\n<li><a href=\"https://loadaverage.org/spaceman\">https://loadaverage.org/spaceman</a></li>\n</ul>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"spaceman"},
|
||||
{"hostid":346,"host":"Bill \"NFMZ1\" Miller","email":"thenfmz1.nospam@nospam.gmail.com","profile":"<p>\nOld man who loves tech and discussing everything tech wise. A master of none. Love the outdoors and being a dad.\n</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"Bill \"NFMZ1\" Miller"},
|
||||
{"hostid":348,"host":"Reg A","email":"krtariles.nospam@nospam.gmail.com","profile":"<p>\nI'm an old retired dude. Former US Air Force and US Army living in the state of Georgia, USA with plenty time on my hands to mess with computers and electronic devices.\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Reg A"},
|
||||
{"hostid":349,"host":"Hannah, of Terra, of Sol","email":"spacehanners.nospam@nospam.gmail.com","profile":"<p>\nI'm down with the space, and ASIC. Let's look at the stars with python and an antenna. \n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Hannah, of Terra, of Sol"},
|
||||
{"hostid":350,"host":"BobJonkman","email":"bjonkman+hpr.nospam@nospam.sobac.com","profile":"<p>Bob Jonkman works with computers. He's an instructor, project manager and system administrator. In another life he dabbles in politics, too.</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"BobJonkman"},
|
||||
{"hostid":351,"host":"@einebiene","email":"postfach.nospam@nospam.einebiene.de","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"@EinerBeener"},
|
||||
{"hostid":352,"host":"fth","email":"freakdoesgeek.nospam@nospam.gmail.com","profile":"<p>\nA free and libre software end user with admiration for the community.\n</p>\n<p>\n@fth_nix on twitter\n</p>\n","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"fth"},
|
||||
{"hostid":353,"host":"venam","email":"patrick.nospam@nospam.iotek.org","profile":"<ul>\n<li>venam from <a href=\"https://nixers.net\">https://nixers.net</a>\n</li>\n<li>Patreon: <a href=\"https://www.patreon.com/venam\">https://www.patreon.com/venam</a>\n</li>\n<li>Blog: <a href=\"https://venam.nixers.net\">https://venam.nixers.net</a>\n</li>\n</ul>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"venam"},
|
||||
{"hostid":354,"host":"TheDUDE","email":"jstahlman13.nospam@nospam.gmail.com","profile":"<pre>\nTheD|_|D3\n</pre>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"TheDUDE"},
|
||||
{"hostid":355,"host":"Knox","email":"jrknox1977.nospam@nospam.gmail.com","profile":"<p>\nI am a life long tech geek. I love all things tech. I started with a TRS-80 Model 3 in 6th grade and have never looked back! \n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Knox"},
|
||||
{"hostid":356,"host":"Mongo","email":"mongo.nospam@nospam.mailfence.com","profile":"<p>\nI am a retired former Systems Administrator. The last almost 20 years was supporting Windows servers. After retiring, I still wanted to play with computers, but need to keep costs reasonable. When Windows XP went unsupported, I found a nice Linux replacement for my old netbook. Now, a couple years later, I am getting serious about switching. This project is part of my path to freedom.\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Mongo"},
|
||||
{"hostid":357,"host":"bjb","email":"bjb.nospam@nospam.sourcerer.ca","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"bjb"},
|
||||
{"hostid":358,"host":"Ironic Sodium","email":"ironic.sodium.42.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Ironic Sodium"},
|
||||
{"hostid":359,"host":"The Alien Brothers Podcast (ABP)","email":"alienbrotherspc.nospam@nospam.gmail.com","profile":"<p>\nThe Alien Brothers Podcast is written?, recorded, and produced? by Rutiger and Casper. Check out their noise experiments here (on hpr)\n</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"The Alien Brothers Podcast (ABP)"},
|
||||
{"hostid":360,"host":"Joey Hess","email":"id.nospam@nospam.joeyh.name","profile":"<p><a href=\"https://joeyh.name/\">https://joeyh.name/</a></p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Joey Hess"},
|
||||
{"hostid":361,"host":"Aaressaar","email":"sundaryourfriend.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Aaressaar"},
|
||||
{"hostid":362,"host":"MPardo","email":"mpardohpr.nospam@nospam.gmail.com","profile":"","license":"CC-0","local_image":0,"gpg":"","valid":1,"espeak_name":"MPardo"},
|
||||
{"hostid":363,"host":"the_remora","email":"HPR+the_remora.nospam@nospam.theremora.me","profile":"<p>\nI enjoy messing with Linux, Playing Board Games, Role-Playing Games and LARPING\n</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"the_remora"},
|
||||
{"hostid":364,"host":"Tuula","email":"tuukka.turto.nospam@nospam.oktaeder.net","profile":"<!-- test --><p>\nEternal tinkerer of code, who occasionally writes things down at <a href=\"https://engineersjourney.wordpress.com/\">https://engineersjourney.wordpress.com/</a>\n or contributes to hylang project at <a href=\"https://github.com/hylang/hy\">https://github.com/hylang/hy</a>\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Tuula"},
|
||||
{"hostid":365,"host":"Bookewyrmm","email":"tasettle.nospam@nospam.gmail.com","profile":"A man, out, standing, in his field","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"bookworm"},
|
||||
{"hostid":366,"host":"Philip","email":"philip.nospam@nospam.shutdown.network","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Philip"},
|
||||
{"hostid":368,"host":"Xtrato","email":"james.nospam@nospam.jamesdotcom.com","profile":"<p>Interested in Network security and Technology</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Xtrato"},
|
||||
{"hostid":369,"host":"Jeroen Baten","email":"jbaten.nospam@nospam.i2rs.nl","profile":"<p>I have been in IT for more than 40 years and since 1998 mainly in open source and Linux doing technical stuff. Lately I do more with burn-out prevention.</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Jeroen Baten"},
|
||||
{"hostid":370,"host":"Yannick","email":"yannick.nospam@nospam.frenchguy.ch","profile":"<p>\nI'm Yannick. I'm french, I live in Switzerland. Hence, the french guy from Switzerland !<br />\nI'm a geek, a father, a podcaster.<br />\nI'm interested in programming, of all sorts, in all kinds of languages.<br />\nI like to tinker with basic electronics components, especially LEDs !<br />\nI have half a dozen Raspberry Pis, and probably twice that amount of micro controllers of all sorts.<br />\nI have many websites :\n</p>\n<ul>\n<li><a href=\"https://frenchguy.ch\">https://frenchguy.ch</a></li>\n<li><a href=\"https://theawesomejinglefactory.frenchguy.ch/\">https://theawesomejinglefactory.frenchguy.ch/</a></li>\n<li><a href=\"https://euterpiaradio.ch\">https://euterpiaradio.ch</a></li>\n</ul>","license":"CC-0","local_image":0,"gpg":"","valid":1,"espeak_name":"Yannick"},
|
||||
{"hostid":371,"host":"desearcher","email":"desearcher.nospam@nospam.gmail.com","profile":"<p> Hello, World! </p> <p> I'm just a TRS-80 that grows algae while my code compiles. </p> <p> Sometimes I beep. </p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"de searcher"},
|
||||
{"hostid":372,"host":"Edward Miro / c1ph0r","email":"c1ph0r.nospam@nospam.protonmail.com","profile":"<p>\nJust an old dude from the internet.\n<br />\n<br />\nI gave a talk at a local hacker con once about vehicle based surveillance.\nI also contributed to a privacy/hacking project called <a href=\"https://shadowlinkit.com/\">Shadowlink </a>with the main focus being the NetP Wiki (The NetP Wiki is a fully collaborative and dynamic guide designed to help navigate the world of privacy & anonymity).\n<br />\n<br />\nCurrently moving prior blogs and content over to my GitHub Page:\n<a href=\"https://c1ph0r.github.io/\">https://c1ph0r.github.io/ </a>\n<br />\n<br />\nPrevious episodes:<br />\n<a href=\"https://hackerpublicradio.org/eps.php?id=2707\">hpr2707 :: Steganalysis 101 </a>\n</p>\n","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Edward Miero"},
|
||||
{"hostid":373,"host":"Floyd C Poynter","email":"Floyd.C.Poynter.nospam@nospam.protonmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Floyd C Poynter"},
|
||||
{"hostid":374,"host":"aldenp","email":"alden.peeters.nospam@nospam.leagueh.xyz","profile":"<p>\nOpen source and decentralization/P2P enthusiast\n</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"aldenp"},
|
||||
{"hostid":375,"host":"minnix","email":"minnix.nospam@nospam.minnix.dev","profile":"find me on mastodon: @minnix@upallnight.minnix.dev\n\nfind me on matrix: @minnix:minnix.dev\n\nfind me on peertube: https://nightshift.minnix.dev/c/nightshift/videos?s=1\n\nfind me on funkwhale: @minnix@allnightlong.minnix.dev\n\nfind me in your ears: https://linuxlugcast.com/","license":"CC-0","local_image":0,"gpg":"","valid":1,"espeak_name":"minnix"},
|
||||
{"hostid":376,"host":"Joel D","email":"joel.nospam@nospam.jdueck.net","profile":"<p>\nI'm a dad and programmer in Minnesota. I enjoy publishing small books, small websites and small programs, sometimes all at once! I am at <a href=\"https://joeldueck.com\">https://joeldueck.com</a>, <a href=\"https://twitter.com/joeld\">@joeld</a> on Twitter, or <a href=\"https://icosahedron.website/@joeld\">@joeld@icosahedron.website</a> on Mastodon.\n</p>\n","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Joel D"},
|
||||
{"hostid":377,"host":"Zen_Floater2","email":"zen_floater2.nospam@nospam.yahoo.com","profile":"<p>My name is Zen_Floater2, I am a former human being, converted into a Squirrel by {ALIENS} in the 1960's and placed in a magical forest in Eastern Oklahoma. Green Country; I think they call it.<br />\nI started developing software in 1975 post Vietnam. Atheist and complainer about HUMANS and their STUFF</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Zen Floater two"},
|
||||
{"hostid":378,"host":"Shannon Wright","email":"support.nospam@nospam.wrighttechnical.net","profile":"<p>\nI have been using technology since the early 90s. I love anything tech. My career started in technical phone support in the 90s. I have since moved into areas such as: content manager, technical training, business systems analyst, systems administrator and systems engineer. I love solving problems and continue to learn something new all the time.</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"Shannon Wright"},
|
||||
{"hostid":379,"host":"mightbemike","email":"mightbemike.nospam@nospam.protonmail.com","profile":"<p>Jack of all trades, master of none. Usually discuss computer stuff, hopefully in a way that is accessible and informative.</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"might be mike"},
|
||||
{"hostid":380,"host":"Carl","email":"online.nospam@nospam.chave.us","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Carl"},
|
||||
{"hostid":381,"host":"Nihilazo","email":"nico.nospam@nospam.itwont.work","profile":"<p>I'm just a person. I blog @ <a href=\"itwont.work\">https://itwont.work/</a></p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"Niel azo"},
|
||||
{"hostid":382,"host":"Daniel Persson","email":"mailto.woden.nospam@nospam.gmail.com","profile":"<p> I'm a developer that loves creating code, talking about different solutions, and learning new things. </p> <p> During the workday, I create systems to extract text from media assets, structure them, and produce different results to make the media accessible to everyone. </p> <p> In my time off, I like to create small prototypes and try different techniques and libraries. </p> <p> I'm also creating some Youtube videos to inspire and help developers to improve their skills. Not that I know everything, but we learn by teaching. </p> <p> Other than these hobbies, I run some open-source projects. To mention a few, I developed the Android SQRL client and the Wordpress plugin for SQRL. I've also contributed to projects creating braille text, epubs, and PDFs as these subjects are close to my daily work. I usually say that I know too much about the PDF file structure as I've worked six years on a tool to extract text from PDFs. </p>","license":"CC-BY-SA","local_image":0,"gpg":"<p>I’m a developer that loves creating code, talking about different solutions, and learning new things.</p>\n<p>During the workday, I create systems to extract text from media assets, structure them, and produce different results to make the media accessible to everyone.</p>\n<p>In my time off, I like to create small prototypes and try different techniques and libraries.</p>\n<p>I’m also creating some Youtube videos to inspire and help developers to improve their skills. Not that I know everything, but we learn by teaching.</p>\n<p>Other than these hobbies, I run some open-source projects. To mention a few, I developed the Android SQRL client and the Wordpress plugin for SQRL. I’ve also contributed to projects creating braille text, epubs, and PDFs as these subjects are close to my daily work. I usually say that I know too much about the PDF file structure as I’ve worked six years on a tool to extract text from PDFs.</p>\n","valid":1,"espeak_name":"Daniel Persson"},
|
||||
{"hostid":383,"host":"Paul Quirk","email":"paul.nospam@nospam.pquirk.com","profile":"<p>I'm a licensed electrician, but my hobbies include open source software and retro computing. After listening to Hacker Public Radio for almost a year, I decided to become a contributor.</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"Paul Quirk"},
|
||||
{"hostid":384,"host":"monochromec","email":"monochromec.nospam@nospam.gmail.com","profile":"<p>\nTwo old wise men talking about free and open source software, life in general and having a bit of fun along the way.\n</p>","license":"CC-BY","local_image":0,"gpg":"","valid":1,"espeak_name":"monochromec"},
|
||||
{"hostid":385,"host":"crvs","email":"carvas.f.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"c r v s"},
|
||||
{"hostid":386,"host":"DanNixon","email":"dan.nospam@nospam.dan-nixon.com","profile":"<p>Software engineer, hacker, maker, open source activist.</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Dan Nixon"},
|
||||
{"hostid":387,"host":"Cedric De Vroey","email":"cedric.nospam@nospam.n0b0t.com","profile":"<p>\nHi, I'm Cedric, and I work as a professional pentester. Social engineering, bypassing access controls both physical and digital, that's what I live for :-)\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Cedric De Vroey"},
|
||||
{"hostid":388,"host":"Padraig Jeroen Fallon","email":"pakie+hpr.nospam@nospam.bussum.org","profile":"<p>I like DND.</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Padraig Jeroen Fallon"},
|
||||
{"hostid":389,"host":"TrumpetJohn","email":"john.nospam@nospam.biblicaltrumpets.org","profile":"<p>\nI am a trumpet player/musician/and worship leader with a PhD in church music. I enjoy \"life hacking\" and understanding how systems can influence our daily life, and free us to be more creative beings. My blog site is <a href=\"https://biblicaltrumpets.org\">biblicaltrumpets.org</a>.\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Trumpet John"},
|
||||
{"hostid":390,"host":"o9l","email":"amanda1usernamesarehard.nospam@nospam.protonmail.com","profile":"<p>\nI'm o9l! The name comes from... well... that's a story for another time.\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"o9l"},
|
||||
{"hostid":391,"host":"Some Guy On The Internet","email":"Lyunpaw.nospam@nospam.gmail.com","profile":"<p>- <strong>Mastodon:</strong> @Yung_Lyun@mastodon.social \n- <strong>Matrix:</strong> @sgoti:matrix.org \n- <strong>Mumble</strong> (chatter.skyehaven.net): SGOTI \n- All messages, created by SGOTI, published on the Social Media \nplatforms: <strong>Mastodon, Matrix, and Mumble</strong> are licensed under \nCreative Commons Attribution-ShareAlike 4.0 International (CC-BY-SA). </p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Some Guy On The Internet"},
|
||||
{"hostid":392,"host":"timttmy","email":"marshall.cleave.nospam@nospam.tiscali.co.uk","profile":"<p>\nPlease contact me on my pleroma account @timttmy@the-pit.uk</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"timttmy"},
|
||||
{"hostid":393,"host":"Anonymous Host","email":"Anonymous.Host.nospam@nospam.hackerpublicradio.org","profile":"A catch all account for those who wish to submit content anonymously.","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Anonymous Host"},
|
||||
{"hostid":394,"host":"Trey","email":"jttrey3.nospam@nospam.yahoo.com","profile":"<p><br></p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Trey"},
|
||||
{"hostid":395,"host":"CoGo","email":"cogocogocogocogo.nospam@nospam.gmail.com","profile":"<p>\nBorn Again Christian<br />\nCNC hobbyist, worker<br />\nLove but can't afford aviation.\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Co Go"},
|
||||
{"hostid":396,"host":"BlacKernel","email":"izzyleibowitz.nospam@nospam.pm.me","profile":"<p>\n<strong>Name:</strong> Izzy Leibowitz \n<strong>Handle:</strong> BlacKernel</p>\n<hr />\n<h3>Bio</h3>\n<p>I was born at a very young age and, from there, the rest is history.</p>\n<p>It's not a skill set, it's a compultion.</p>\n<p>Just your average korn kob on the internet; strangely not using ksh.</p>\n<h3>System Fetch</h3>\n<p>\n<strong>Prefered Pronouns:</strong> Any (He/She/They/It/Your Majesty/Feared Ruler of the Forbidden Languages/etc)<br />\n<strong>Prefered Languages:</strong> Rust (compuled), Lua (scripting), Fish (shell scripting)<br />\n<strong>Prefered Shell:</strong> fish<br />\n<strong>Prefered OS:</strong> Slackware<br />\n<strong>Prefered DE:</strong> -XFCE- KDE (you guys were right after all)</p>\n<hr />\n<h4>Other Projects</h4>\n<p>\n<strong>SCP Foundation:</strong> <a href=\"https://scpwiki.com/drleibowitz\">Dr. Izzy Leibowitz</a></p>\n<h4>Contact Me</h4>\n<p>\n<strong>Email:</strong> <a href=\"mailto@izzyleibowitz@pm.me.html\">izzyleibowitz at pm dot me</a> \n<strong>Mastodon:</strong> <a href=\"https://nixnet.social/BlacKernel\">at blackernel at nixnet dot social</a>\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Black Kernel"},
|
||||
{"hostid":397,"host":"hakerdefo","email":"forever.jekyll.nospam@nospam.disroot.org","profile":"<ul>\n<li>Blog => <a href=\"https://hakerdefo.github.io/\">https://hakerdefo.github.io/</a></li>\n<li>Code => <a href=\"https://github.com/hakerdefo\">https://github.com/hakerdefo</a></li>\n</ul>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"haker de fo"},
|
||||
{"hostid":398,"host":"one_of_spoons","email":"hpr.nospam@nospam.spoons.one","profile":"<p>Mastodon, though very rarely:<br />\n@one_of_spoons@hispagatos.space\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"one of spoons"},
|
||||
{"hostid":399,"host":"dnt","email":"dnt.nospam@nospam.revolto.net","profile":"<ul><li><br></li></ul>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"D. N. T."},
|
||||
{"hostid":401,"host":"Mechatroniac","email":"anarch0re.nospam@nospam.tutanota.com","profile":"<p>\nThe Mechatronics Maniac\n<br />\n<a href=\"https://www.bitchute.com/channel/mechatroniac/\">https://www.bitchute.com/channel/mechatroniac/</a>\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Mechatroniac"},
|
||||
{"hostid":402,"host":"takov751","email":"takov751.nospam@nospam.protonmail.com","profile":"<ul>\n<li>Twitter: <a href=\"https://twitter.com/takov751\">@takov751</a></li>\n<li>matrix: <a href=\"https://matrix.to/#/@takov751:matrix.org\">takov751:matrix.org</a></li>\n<li>email: takov751+hpr@protonmail.com</li>\n</ul>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"takov 7 5 1"},
|
||||
{"hostid":403,"host":"Lee","email":"leehanken.nospam@nospam.gmail.com","profile":"<p style=\"--editable-content-background-color: rgb(0, 0, 0); --editable-content-color: rgb(209, 203, 199); --original-color: rgb(209, 203, 199); --original-background-color: rgb(34, 36, 37); color: rgb(209, 203, 199) !important; --noir-bg-editable-content-background-color: #000000; --noir-text-editable-content-background-color: #e8e6e3; --noir-border-editable-content-background-color: #8c8273; --noir-bg-editable-content-color: #2d373d; --noir-text-editable-content-color: #c8c3bc; --noir-border-editable-content-color: #38464c; --noir-bg-original-color: #2d373d; --noir-text-original-color: #c8c3bc; --noir-border-original-color: #38464c; --noir-bg-original-background-color: #181e21; --noir-text-original-background-color: #d2cec8; --noir-border-original-background-color: #807769; --noir-inline-color: #c8c3bc;\" data-noir-inline-color=\"\"><br style=\"--original-color: rgb(209, 203, 199); --original-background-color: rgb(34, 36, 37); --noir-bg-original-color: #2d373d; --noir-text-original-color: #c8c3bc; --noir-border-original-color: #38464c; --noir-bg-original-background-color: #181e21; --noir-text-original-background-color: #d2cec8; --noir-border-original-background-color: #807769;\"></p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Lee"},
|
||||
{"hostid":404,"host":"Sarah","email":"sarah.nospam@nospam.giammarco.ca","profile":"<p>Librarian. Spends too much time on the internet.</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Sarah"},
|
||||
{"hostid":405,"host":"Lurking Prion","email":"LurkingPrion.nospam@nospam.gmail.com","profile":"<p>\nLurking Prion (He/Him/His) is a cybersecurity enthusiast, evangelist, mentor, and professional with 20+ years experience in the Healthcare, Financial, Telecommunications, Managed Security Services Provider (MSSP), Hybrid Cloud Service Provider (CSP), and other unspecified business sectors...\n</p>\n<p>\nBeginning as a network administrator, Lurking Prion's career followed security as it progressed throughout the years in roles including:\n<ul>\n<li>Linux/Windows Systems Administrator</li>\n<li>Network Engineer</li>\n<li>Telecommunications Engineer</li>\n<li>Security Engineer and Architect</li>\n<li>Ethical Hacker</li>\n<li>Security Consultant</li>\n</ul>\n</p>\n<p>\nLurking Prion also has a passion for teaching. It is his mission to help build a new generation of cyber security professionals with a security mindset.\n</p>\n<p>\nLurking Prion may occasionally refer to himself as Robert.<br />\nLurking Prion likes coffee, dark beer, and dirty martinis.<br />\nLurking Prion only refers to himself in the third person when there is a lack of coffee or an abundance of stupidity.<br />\nLurking Prion's eye starts to twitch when all hell is about to break loose.<br />\nLurking Prion's spirit animal is DeadPool.\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Lurking Prion"},
|
||||
{"hostid":406,"host":"binrc","email":"binrc.nospam@nospam.protonmail.com","profile":"https://0x19.org\nthanks for listening :)","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"bin R. C."},
|
||||
{"hostid":407,"host":"Celeste","email":"zceleste.nospam@nospam.protonmail.com","profile":"<p>I once made a hand-crocheted goose named Celeste in my free time and the \"Goose Celeste\" has since become a sort of online nickname for me.</p>","license":"CC-BY-NC-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Celeste"},
|
||||
{"hostid":408,"host":"Stache_AF","email":"stache.nospam@nospam.duck.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Stash A. F"},
|
||||
{"hostid":410,"host":"Hipernike","email":"hipernike.nospam@nospam.proton.me","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Hipernike"},
|
||||
{"hostid":411,"host":"Paul J","email":"hpr.nospam@nospam.pauljohnstone.com","profile":"I am a full-stack developer","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Paul J"},
|
||||
{"hostid":412,"host":"m0dese7en","email":"m0dese7en.nospam@nospam.mykolab.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Mode Seven"},
|
||||
{"hostid":413,"host":"CCHits.net Team","email":"show.nospam@nospam.cchits.net","profile":"CCHits.net is a website which produces a daily, weekly and sometimes even a monthly music podcast. Find out more at cchits.net","license":"CC-BY","local_image":0,"gpg":"","valid":1,"espeak_name":"CCHits dot net Team"},
|
||||
{"hostid":414,"host":"Kinghezy","email":"cbart387.nospam@nospam.gmail.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Kinghezy"},
|
||||
{"hostid":415,"host":"enistello","email":"enistello.nospam@nospam.tuta.io","profile":"@enistello@fosstodon.org","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"ennis tello"},
|
||||
{"hostid":416,"host":"screwtape","email":"screwtape.nospam@nospam.sdf.org","profile":"Hi everyone! I like to write on the gopher and in common lisp. I am experimenting with idiomatic inclusion of formal ACL2 first order logic as part of larger ASDF3 common lisp system definitions that include side-effect modules.\n\nYou might know me from the gopher. gopher.club/1/users/screwtape\nI normally use openbsd, but in different contexts I often use NetBSD or FreeBSD and I also use Gentoo and Debian linux.","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"screw tape"},
|
||||
{"hostid":417,"host":"StarshipTux","email":"wakko222.nospam@nospam.gmail.com","profile":"Linux Enthusiast, Podcast Addict","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Star ship Tux"},
|
||||
{"hostid":418,"host":"David Thrane Christiansen","email":"david.nospam@nospam.davidchristiansen.dk","profile":"<p>\nI love programming languages and their implementations, and I especially love exploring new paradigms of writing programs. I'm online at <a href=\"https://davidchristiansen.dk\">https://davidchristiansen.dk</a>.\n</p>","license":"CC-BY","local_image":0,"gpg":"","valid":1,"espeak_name":"David Thrane Christiansen"},
|
||||
{"hostid":419,"host":"Ryuno-Ki","email":"andre.jaenisch.nospam@nospam.posteo.de","profile":"Web-Developer and Consultant as a freelancer since 2023.\n\nHomepage: https://jaenis.ch/\nProfessional email: andre.jaenisch.wdc@posteo.net","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Ryuno-Ki"},
|
||||
{"hostid":420,"host":"HopperMCS","email":"gage.nospam@nospam.gages.blog","profile":"I science the computers! https://madcompscientist.com","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"gage hopper"},
|
||||
{"hostid":421,"host":"Reto","email":"reto007.nospam@nospam.yahoo.com","profile":"<p>Tech enthusiast from Switzerland</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"ray toe"},
|
||||
{"hostid":422,"host":"FredBlack","email":"fred.nospam@nospam.svenskaa.net","profile":"<p>A nonbinary musician who can't stop yapping about their nyckelharpa...</p><p><br></p><p>Pronouns page https://en.pronouns.page/@fred_black</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Fred Black"},
|
||||
{"hostid":423,"host":"Noodlez","email":"contact.nospam@nospam.nathanielbarragan.xyz","profile":"Hello all! I'm Noodlez, an HPR listener and now contributor. I like anything to do with Linux and Linux-adjacent (Like other Unixes), and programming, and other random things like retro gaming.","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Noodlez"},
|
||||
{"hostid":424,"host":"hobs","email":"hobson.nospam@nospam.tangibleai.com","profile":"<p>\nPassion: Open source, open data, teachable AI that that you can trust.<br />\nCoauthor: _Natural Language Processing in Action_ 1st and 2nd Ed<br />\nCTO: Social impact chatbots at Tangible AI (<a href=\"https://tangibleai.com\">https://tangibleai.com</a>) <br />\nAdjunct Professor: Data Science (UCSD Extension), Computer Science (Mesa College)<br />\nMentor: Data Science (Springboard)<br />\nEducation: Robotics (MS, Georgia Tech)<br />\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"hobs"},
|
||||
{"hostid":425,"host":"gemlog","email":"hpr.nospam@nospam.gemlog.ca","profile":"<p>I may be found on <a href=\"https://sdf.org\">sdf.org</a> as gemlog and on mastodon as <a href=\"https://mastodon.sdf.org/@gemlog@tilde.zone\">@gemlog@tilde.zone</a></p>","license":"CC-BY-SA","local_image":1,"gpg":" ","valid":1,"espeak_name":"gem log"},
|
||||
{"hostid":426,"host":"Ne01sfree","email":"incontinentgirl.nospam@nospam.proton.me","profile":"I have no onlne pressence, I am anti social media, as socialmedia and is anti me I am not a great conversationalist, and not good at making friends.\n\nI say what I think I am very honest and forward and open. \nSimplifying things is not easy for me.\nExplaining things is not easy for me.\n\nI am a Neuro Divergant Ecentric individual who is tapped by the British Care system, because I do not wish to abide by societys ideas of a model citizen. Because being a perfect individual does not intrest me, I fail capacity assesments and so I am trapped under the care act 2014.\nRegardless, i can play a piano, build a desktop, debate contextual ideas in physics and technology and create the most imaginitive tech and science ideas you may ever here, in 10 seconds flat.","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Neo is Free"},
|
||||
{"hostid":427,"host":"thompsgj","email":"thompsgj.nospam@nospam.gmail.com","profile":"I'm a conversation designer and engineer with a background in education.\n\nhttp://www.linkedin.com/in/greg-thompson-10287a1b\nhttps://chatbotdesign.substack.com/","license":"CC-BY-SA","local_image":0,"gpg":" ","valid":1,"espeak_name":"thom p s g j"},
|
||||
{"hostid":428,"host":"geospart","email":"geospart.nospam@nospam.gmail.com","profile":"<p>Linux Nerd [since 1995ish]</p>\n<p>Retired IT Guy</p>\n<p>Amateur film [analog] and digital photographer [since 1983]</p>\n<p>Favorited Movie Quote \"I Drank What\" - the last words of Socrates [from Real Genius]</p>\n<p><a href=\"http://geospart.com\">http://geospart.com</a></p>\n<p><a href=\"http://techandcoffee.info\">http://techandcoffee.info</a></p>\n","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"geo spart"},
|
||||
{"hostid":429,"host":"Henrik Hemrin","email":"hehemrin.nospam@nospam.hemrin.com","profile":"<p>My profession is telecom engineer. I live in Sweden. My website has content in English and Swedish: <a href=\"https://www.hemrin.com/\">https://www.hemrin.com/</a></p><p> \n</p><p>You can find Mastodon and other contact methods in the footer of my web site. </p><p>\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Henrik Hemrin"},
|
||||
{"hostid":430,"host":"Dave Hingley","email":"anim8or_2000.nospam@nospam.yahoo.co.uk","profile":"<p>Comic book artist using primarily open source and free resources to make comics.\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Dave Hingley"},
|
||||
{"hostid":431,"host":"Moss Bliss","email":"bardmoss.nospam@nospam.pm.me","profile":"<p>Linux User since 2002, podcaster since 2018. Currently featured on Full Circle Weekly News and mintCast, and I have stepped away after 50 episodes of Distrohoppers' Digest. I live in Eastern Tennessee, not far from Knoxville.</p>","license":"CC-BY-SA","local_image":0,"gpg":" ","valid":1,"espeak_name":"Moss Bliss"},
|
||||
{"hostid":432,"host":"mnw","email":"mnw.nospam@nospam.member.fsf.org","profile":"I like beer, computers, and motorcycles. I'm never really good at these things. My SDF about me page kind of sums it up \n\nhttps://mnw.sdf.org\n","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"M. N. W."},
|
||||
{"hostid":433,"host":"Trollercoaster","email":"jurgen.nospam@nospam.digitalfreedomfoundation.org","profile":"<p>Enthusiastic about Software Freedom Day and Digital Freedoms!</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"Troller coaster"},
|
||||
{"hostid":434,"host":"Lochyboy","email":"alexandersmacphail.nospam@nospam.gmail.com","profile":"<p>Son of Kevie. I'm a gamer and Linux user from the Isle of Lewis. My interests are History, YouTube and classic TV comedies.</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Lochy boy"},
|
||||
{"hostid":435,"host":"Bob","email":"omsfpmqo.nospam@nospam.sharklasers.com","profile":"","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"bob"},
|
||||
{"hostid":436,"host":"hairylarry","email":"hairylarry.nospam@nospam.gmail.com","profile":"<p>Hairy Larry is my stage name. I'm into music, gaming, free culture, and programming the internet. On mastodon @hairylarry@gamerplus.org</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"hairy larry"},
|
||||
{"hostid":437,"host":"SolusSpider","email":"mintspider.nospam@nospam.gmail.com","profile":"<p>Real name: Peter Paterson</p><p>A Scotsman in Kentucky, USA</p><p>Employed by God's Pantry Food Bank</p><p>Linux user: PCLinuxOS & Solus</p>","license":"CC-BY-SA","local_image":1,"gpg":" ","valid":1,"espeak_name":"Solus Spider"},
|
||||
{"hostid":438,"host":"Paulj","email":"Paul.nospam@nospam.teulu.org","profile":"<p>Blog: https://teulu.org\n\nMastodon: @paul_j@hachyderm.io\n\nHam radio contact details:\nCallsign: MW7PAJ\nHamshack hotline: 5501062\nHamsOverIP: 200307\n</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Paul Jay"},
|
||||
{"hostid":439,"host":"Jon The Nice Guy","email":"jon.nospam@nospam.sprig.gs","profile":"<p>He/Him. Linux advocating Geek. Co-Host on the Admin Admin Podcast. Occasional Conference Speaker.</p>","license":"CC-0","local_image":0,"gpg":"","valid":1,"espeak_name":"Jon The Nice Guy"},
|
||||
{"hostid":440,"host":"iota","email":"davidfung.nospam@nospam.amgcomputing.com","profile":"<p><br></p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"iota"},
|
||||
{"hostid":441,"host":"Antoine","email":"antoine.nospam@nospam.antoine.com.br","profile":"<p>Love learning.</p><p>Thanks!</p>","license":"CC-BY-NC","local_image":1,"gpg":"","valid":1,"espeak_name":"Antoine"},
|
||||
{"hostid":442,"host":"Shane - StrandedOutput","email":"info.nospam@nospam.strandedoutput.com","profile":"<p>Hi, I'm an omni-nerd known as Shane but I also go by StrandedOutput on that there interwebs. I host a podcast called Linux Lads, I'm involved in the Dublin Linux Community and TOG Hackerspace. I also love technology, making music, electronics, history, politics, science fiction, game development, Blender and more.</p>","license":"CC-BY-SA","local_image":1,"gpg":" ","valid":1,"espeak_name":"Shane A.K.A Stranded Output"},
|
||||
{"hostid":443,"host":"Marc W. Abel","email":"hpr2025.nospam@nospam.marcabel.com","profile":"<p><br></p>","license":"CC-BY","local_image":0,"gpg":"","valid":1,"espeak_name":"Marc W. Abel"},
|
||||
{"hostid":444,"host":"murph","email":"murph.nospam@nospam.weirdness.com","profile":"<p>You can find me on the fediverse at <a href=\"https://hackers.town/@murph\">@murph@hackers.town</a></p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"murph"},
|
||||
{"hostid":445,"host":"Jerm","email":"jerm.nospam@nospam.the-wyrms-hoard.com","profile":"<p><br></p>","license":"CC-BY-SA","local_image":0,"gpg":" ","valid":1,"espeak_name":"Jerm"},
|
||||
{"hostid":446,"host":"Elsbeth","email":"dolphinraver.nospam@nospam.gmail.com","profile":"<p><br></p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Elsbeth"},
|
||||
{"hostid":447,"host":"ko3moc","email":"ante.nospam@nospam.ko3moc.com","profile":"<p><br></p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"koemoc"},
|
||||
{"hostid":448,"host":"oxo","email":"2oxo.nospam@nospam.protonmail.com","profile":"<p><br></p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"oxo"},
|
||||
{"hostid":449,"host":"Manon","email":"manon.nospam@nospam.fallon.ie","profile":"<p><br></p>","license":"CC-BY-SA","local_image":0,"gpg":" ","valid":1,"espeak_name":"manon"},
|
||||
{"hostid":450,"host":"Wojciech","email":"wojciech.nospam@nospam.pisarski.org","profile":"<p>Hi, I'm a nerd from Poland working as a software engineer.</p>\n<p>You can reach me on the Fediverse at <a href=\"https://fosstodon.org/@wpisarski\">wpisarski@fosstodon.org</a></p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Wojciech"},
|
||||
{"hostid":451,"host":"Major_Ursa","email":"kuszmar.dave.nospam@nospam.gmail.com","profile":"<p>One of the members of the League of Better Villains</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Major Ursa"},
|
||||
{"hostid":452,"host":"Kirbotica","email":"kirbotica.nospam@nospam.protonmail.com","profile":"<p>A self-proclaimed success story in the tradition of Tom Vu, <strong>Kirbotica </strong>is living the hacker dream surrounded by the rich and beautiful things that matter most: family, friends, pets, computers, old signs and obsolete electronics. When he is not found endlessly walking the local streets and ravines, much of Kirbotica's time is spent trying to convince others to get involved in one of his \"great\" new ideas. On weekends, he works early in the morning at the local science centre while listening to his favorite podcasts echoing loudly through the empty halls. The voices of Hacker Public Radio, Late Night Linux, Off the Hook, Malicious Life and Darknet Diaries all keep him company as he gets the exhibits and artifacts ready for the day's visitors. A 30 year veteran in the computer industry, Kirbotica’s artistic sense has been so toned down by ex-employers, that he can only see in 2 bit color without the use of special glasses.</p>","license":"CC-BY-SA","local_image":1,"gpg":"","valid":1,"espeak_name":"Kir botica"},
|
||||
{"hostid":453,"host":"Thibaut","email":"thibaut.nospam@nospam.thibaut.dev","profile":"<p><br></p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Tea Bow"},
|
||||
{"hostid":454,"host":"candycanearter","email":"candycanearter.nospam@nospam.gmail.com","profile":"<p>tech nerd and long time linux user, likes hacking scripts together</p>","license":"CC-BY-SA","local_image":0,"gpg":"","valid":1,"espeak_name":"Candy can arder"}]
|
||||
92
hpr_metadata/series.json
Normal file
92
hpr_metadata/series.json
Normal file
@@ -0,0 +1,92 @@
|
||||
[
|
||||
{"id":0,"name":"general","description":"","private":0,"image":"","valid":1},
|
||||
{"id":4,"name":"Databases","description":"This series will attempt to discuss various different aspects of Database design and operation.","private":0,"image":"","valid":1},
|
||||
{"id":5,"name":"This Old Hack","description":"fawkesfyre tales of hacking","private":1,"image":"","valid":1},
|
||||
{"id":6,"name":"The Linux Boot Process","description":"Dann talks about the linux boot process","private":1,"image":"","valid":1},
|
||||
{"id":7,"name":"LPI Certifications","description":"A series focusing on Linux Professional Institute Certifications (LPIC) <br><a href=\"https://www.lpi.org/\">https://www.lpi.org/ </a>","private":0,"image":"","valid":1},
|
||||
{"id":8,"name":"Virtualization","description":"Initiated by Deepgeek, this series contains contributions from many hosts on the topic of Virtualization\n","private":0,"image":"","valid":1},
|
||||
{"id":11,"name":"Lightweight Apps","description":"Reviews of light weight applications","private":0,"image":"","valid":1},
|
||||
{"id":14,"name":"Beverages","description":"The making and consuming of all types of fermented drinks, such as: brewing your own beer, beer tasting and home wine making","private":0,"image":"","valid":1},
|
||||
{"id":19,"name":"SourceCast","description":"<a href=\"https://sourcecast.org/\"> https://sourcecast.org/ </a> <br>","private":1,"image":"","valid":1},
|
||||
{"id":21,"name":"Vulgar Esperanto","description":"klaatu talks about Esperanto","private":0,"image":"","valid":1},
|
||||
{"id":22,"name":"All Songs Considered","description":"A Collection of Songs by various artists","private":0,"image":"","valid":1},
|
||||
{"id":23,"name":"What's in My Toolkit","description":"This is an open series where Hacker Public Radio Listeners can share with the community the items that they can't live without, what they find useful in day to day life.","private":0,"image":"toolkit","valid":1},
|
||||
{"id":25,"name":"Programming 101","description":"A series focusing on concepts and the basics of programming","private":0,"image":"","valid":1},
|
||||
{"id":26,"name":"RoundTable","description":"Panelists dicuss a topic each month.","private":0,"image":"","valid":1},
|
||||
{"id":28,"name":"NewsCast","description":"What's happening in the News world","private":1,"image":"","valid":1},
|
||||
{"id":29,"name":"How I got into tech","description":"Started by monsterb, this series invites people to share with us how they found Linux. It has become traditional for first time hosts to share with us their journey to Linux. Indeed it has morphed to be way to share your journey in tech right up to your first contribution to HPR.","private":0,"image":"","valid":1},
|
||||
{"id":30,"name":"Tit Radio","description":"Welcome to TiT Radio! The only Hacker Public Radio show with super cow powers broadcasting live on ddphackradio.org every utter Saturday night at 11pm CST. You may be asking yourself \"What in tarnation is Tit Radio?\" Well, it's a potluck style roundtable of geeks talking about Free Software, GNU + Linux, and anything geeky the TiTs bring to the table. Chat with the TiTs over at irc.freenode.net #linuxcranks. Thats no bull.","private":1,"image":"","valid":1},
|
||||
{"id":34,"name":"Talk Geek to me","description":"deepgeek talks geek to his fans","private":1,"image":"","valid":1},
|
||||
{"id":35,"name":"SELF Talks 2009","description":"South East Linux Fest talks 2009","private":1,"image":"","valid":1},
|
||||
{"id":36,"name":"Software Freedom Day Dundee 2009","description":"Software Freedom Day Dundee 2009","private":1,"image":"","valid":1},
|
||||
{"id":38,"name":"A Little Bit of Python","description":"<p>\nInitially based on the podcast \"A Little Bit of Python\", by Michael Foord, Andrew Kuchling, Steve Holden, Dr. Brett Cannon and Jesse Noller. <a href=\"https://www.voidspace.org.uk/python/weblog/arch_d7_2009_12_19.shtml#e1138\">https://www.voidspace.org.uk/python/weblog/arch_d7_2009_12_19.shtml#e1138</a>\n</p>\n<p>\nNow the series is open to all.\n</p>","private":0,"image":"","valid":1},
|
||||
{"id":42,"name":"Bash Scripting","description":"This is an open series in which Hacker Public Radio Listeners can share their Bash scripting knowledge and experience with the community. General programming topics and Bash commands are explored along with some tutorials for the complete novice.","private":0,"image":"","valid":1},
|
||||
{"id":43,"name":"HAM radio","description":"A series about all things Amateur Radio/HAM Radio.","private":0,"image":"","valid":1},
|
||||
{"id":44,"name":"Read 'n Code","description":"The Read 'n Code podcast, the only podcast about literature and computer programming.","private":0,"image":"","valid":1},
|
||||
{"id":45,"name":"Podcasting HowTo","description":"This series is designed to help the new host begin podcasting and to give the experienced host some tips and tricks.<br />The series is open to all.","private":0,"image":"","valid":1},
|
||||
{"id":46,"name":"Urban Camping","description":"Tips and tricks for the Urban Camper","private":1,"image":"","valid":1},
|
||||
{"id":47,"name":"HPR Community News","description":"A monthly look at what has been going on in the HPR community. This is a regular show scheduled for the first Monday of the month.","private":1,"image":"","valid":1},
|
||||
{"id":48,"name":"The Language Frontier","description":"In this miniseries Skirlet discusses various different aspects of language.","private":1,"image":"","valid":1},
|
||||
{"id":52,"name":"THEATER OF THE IMAGINATION","description":"<p></p>\n<p>This is my series on Dramatic Audio Media, such as Old Time Radio (\"The Shadow\", \"Gunsmoke\", etc.), BBC Radio, and other classics -- but also, and most especially, the current renaissance of this art form, and how a person (like me, like you) can begin producing your own audio fiction or poetry or whatever for the enjoyment of countless others. This will be a learning process for me, and my mistakes might very well help you avoid any similar such in your own endeavors.</p>\n<p></p>","private":1,"image":"","valid":1},
|
||||
{"id":53,"name":"HPR_AudioBookClub","description":"HPR AudioBook Club","private":1,"image":"","valid":1},
|
||||
{"id":54,"name":"Syndicated Thursdays","description":"A chance to showcase other Creative Commons works. We try to expose podcasts, speeches, presentations, music, etc that you may not have heard. If you have suggestions for items then send your recommendation to admin at hpr and we'll add it to the queue.","private":0,"image":"","valid":1},
|
||||
{"id":57,"name":"Hardware upgrades","description":"Hosts share their experiences when upgrading their equipment.","private":0,"image":"","valid":1},
|
||||
{"id":58,"name":"spics on tech","description":"sikilpaake & badbit team up to give us a Mexican view of the hacker world.","private":1,"image":"","valid":1},
|
||||
{"id":61,"name":"Networking","description":"This series will try and explain the basics of networking to the listener as well as introduce more detailed topics.","private":0,"image":"","valid":1},
|
||||
{"id":62,"name":"OggCamp","description":"OggCamp<br />A Free Culture Unconference","private":0,"image":"","valid":1},
|
||||
{"id":63,"name":"Packaging applications for GNU Linux and BSD","description":"Klaatu submits a series on packaging applications for GNU Linux and BSD.","private":0,"image":"","valid":1},
|
||||
{"id":65,"name":"Talk Geek to me News","description":"","private":1,"image":"","valid":1},
|
||||
{"id":67,"name":"Linux in the Shell","description":"Linux In The Shell aims to explore the use of many commands a user can run in the Bash Shell. Tutorials include a write up with examples, an audio component about the write up, and a video component to demonstrate the usage of the command.<br />\nThe website is <a href=\"https://www.linuxintheshell.com/\">https://www.linuxintheshell.com/</a>","private":1,"image":"","valid":1},
|
||||
{"id":69,"name":"Freedom is not Free ","description":"Examining the difference between <b>freedom</b> and <b>free of cost</b>. In the world of free software the main emphasis is on the freedom to run, copy, distribute, study, change and improve the software, not on its lack of cost.","private":0,"image":"","valid":1},
|
||||
{"id":70,"name":"LibreOffice","description":"In this in-depth series on LibreOffice we examine Writer, Calc and Impress","private":0,"image":"","valid":1},
|
||||
{"id":71,"name":"Mental Health","description":"In this series we discuss issues surrounding mental health.","private":0,"image":"","valid":1},
|
||||
{"id":72,"name":"Practical Math","description":"Goal for the series: Embracing units, and carrying them along as you go, can help you work with confidence in using maths in your life.","private":0,"image":"","valid":1},
|
||||
{"id":73,"name":"LinuxJAZZ","description":"Shows about Bariman's experience as a jazz musician using Linux","private":1,"image":"","valid":1},
|
||||
{"id":74,"name":"Privacy and Security","description":"In this open series, you can contribute shows that are on the topic of Privacy and Security","private":0,"image":"","valid":1},
|
||||
{"id":75,"name":"Podcast recommendations","description":"This is an open series where Hacker Public Radio listeners can share and recommend podcasts that they listen to.","private":0,"image":"podcasts","valid":1},
|
||||
{"id":77,"name":"Filesystems","description":"In this series we explore various different filesystems.","private":0,"image":"filesystems","valid":1},
|
||||
{"id":78,"name":"Interviews","description":"HPR Correspondents bring you Interviews from interesting people and projects","private":0,"image":"","valid":1},
|
||||
{"id":79,"name":"Accessibility","description":"Shows about tearing down the barriers for our fellow hackers.","private":0,"image":"","valid":1},
|
||||
{"id":80,"name":"5150 Shades of Beer","description":"FiftyOneFifty leads this open series on all aspects of the Beer.","private":0,"image":"","valid":1},
|
||||
{"id":81,"name":"Version Control","description":"This is an open series in which Hacker Public Radio Listeners can share their knowledge and experience of version or revision control systems such as Bazaar, Mercurial, Subversion, CVS and Git.","private":0,"image":"","valid":1},
|
||||
{"id":82,"name":"Vim Hints","description":"<p>\nVarious contributors lead us on a journey of discovery of the Vim (and vi) editors.\n</p>\n<p>\nVim is a highly configurable text editor built to enable efficient text editing. It is an improved version of the vi editor distributed with most UNIX systems.\n</p>\n<p>\n<a href=\"https://www.vim.org/about.php\">https://www.vim.org/about.php</a>\n</p>","private":0,"image":"","valid":1},
|
||||
{"id":83,"name":"April Fools Shows","description":"","private":1,"image":"","valid":1},
|
||||
{"id":84,"name":"Compilers - how they work","description":"In this series we examine how compilers work","private":0,"image":"","valid":1},
|
||||
{"id":87,"name":"Uber Leet Hacker Force Radio","description":"In this series sigFLUP speaks about her latest coding projects, plays music and conducts interviews","private":1,"image":"","valid":1},
|
||||
{"id":88,"name":"Coffee","description":"All aspects of making the perfect cup of Coffee","private":0,"image":"","valid":1},
|
||||
{"id":90,"name":"Learning sed","description":"Episodes about using sed, the Stream Editor. It's a non-interactive editor which you can use to make simple changes to data, which is how many people use it. However, sed also has a lot of hidden power, especially in the GNU version.","private":0,"image":"","valid":1},
|
||||
{"id":91,"name":"Arduino and related devices","description":"In this series various contributors talk about how to use and program Arduino single-board microcontrollers and related devices.<br />\nSee the Wikipedia article\n<a href=\"https://en.wikipedia.org/wiki/List_of_Arduino_boards_and_compatible_systems\">https://en.wikipedia.org/wiki/List_of_Arduino_boards_and_compatible_systems</a> for details of the range of devices.\n","private":0,"image":"","valid":1},
|
||||
{"id":93,"name":"Cooking","description":"Cooking techniques, recipes, recommendations and cooking equipment","private":0,"image":"","valid":1},
|
||||
{"id":94,"name":"Learning Awk","description":"Episodes about using Awk, the text manipulation language. It comes in various forms called awk, nawk, mawk and gawk, but the standard version on Linux is GNU Awk (gawk). It's a programming language optimised for the manipulation of delimited text.","private":0,"image":"","valid":1},
|
||||
{"id":95,"name":"Tabletop Gaming","description":"<p>In this series, initiated by klaatu, analog games of various sorts are described and reviewed. See <a href=\"https://en.wikipedia.org/wiki/Tabletop_game\">https://en.wikipedia.org/wiki/Tabletop_game</a> for details.</p>\n","private":0,"image":"","valid":1},
|
||||
{"id":96,"name":"Penguicon","description":"Penguicon is a Non-Profit, Open Source - Science Fiction Convention held in Southfield, Michigan.\n\nSee the website at <a href=\"https://www.penguicon.org/\">https://www.penguicon.org/</a> or the Wikipedia page at <a href=\"https://en.wikipedia.org/wiki/Penguicon\">https://en.wikipedia.org/wiki/Penguicon</a>\n","private":0,"image":"","valid":1},
|
||||
{"id":98,"name":"Apt Spelunking","description":"<p>\n\"Apt spelunking\" is a silly term I made up for the act of searching through your package manager, App Store, Code Repo, etc with vague terms, and trying out random applications therein. <br />\n\nA public series started by Windigo.\n</p>","private":0,"image":"","valid":1},
|
||||
{"id":99,"name":"Information Underground","description":"Deepgeek, Klaatu, and Lostnbronx discuss things.","private":0,"image":"","valid":1},
|
||||
{"id":100,"name":"Health and Healthcare","description":"A open series about Health and Healthcare","private":0,"image":"","valid":1},
|
||||
{"id":101,"name":"Sound Scapes","description":"Come with us on a journey through sound.","private":0,"image":"","valid":1},
|
||||
{"id":102,"name":"GNU Readline","description":"GNU Readline is a software library that provides line-editing and history capabilities for interactive programs with a command-line interface, such as Bash. It is currently maintained by Chet Ramey as part of the GNU Project. This series looks at some of the features of this powerful library.","private":0,"image":"","valid":1},
|
||||
{"id":103,"name":"Hobby Electronics","description":"Building electronic devices and kits, repairing electronics and\nlearning about components and their uses.","private":0,"image":"","valid":1},
|
||||
{"id":104,"name":"Introduction to Git","description":"Initiated by Klaatu, this open series introduces Git and the concepts behind its use in a collaborative environment.","private":0,"image":"","valid":1},
|
||||
{"id":105,"name":"Random Elements of Storytelling","description":"lostnbronx leads us on an investigation of the fundamentals of story telling.","private":1,"image":"","valid":1},
|
||||
{"id":106,"name":"YouTube Subscriptions","description":"Where the HPR community members share their YouTube Subscriptions","private":0,"image":"","valid":1},
|
||||
{"id":107,"name":"Haskell","description":"<p>A series looking into the <a href=\"https://en.wikipedia.org/wiki/Haskell_(programming_language)\"> Haskell (programming language)</a></p>","private":0,"image":"","valid":1},
|
||||
{"id":108,"name":"Social Media","description":"Looking at aspects of Social Media - platforms, histories, popularity, philosophies, etc.","private":0,"image":"","valid":1},
|
||||
{"id":109,"name":"Lord D Film Reviews","description":"<p>A memorial series dedicated to our late host <a href=\"https://hackerpublicradio.org/correspondents.php?hostid=24\">Lord Drachenblut</a></p>\n\n<p>Five categories, each rated 0, 1, or 2, so that the final reviews range anywhere from 0 to 10, with 0 being the worst film ever, and 10, the best.</p>\n\n<p>Each category asks two yes-or-no questions. If the answer to both is no, that category gets a 0. If only one is a yes, it gets a 1. If both are a yes, it gets a 2.</p>\n\n<h4>Plot</h4>\n<ul>\n<li>Does it make sense, and/or is free of huge holes?</li>\n<li>Does it seem like it has not been done too often?</li>\n</ul>\n<h4>Main characters</h4>\n<ul>\n<li>Are they realistic?</li>\n<li>Do you care about them?</li>\n</ul>\n<h4>Genre</h4>\n<ul>\n<li>Does it work for the plot?</li>\n<li>Would this tale have been better in another genre?</li>\n</ul>\n<h4>Construction</h4>\n<ul>\n<li>Is the acting competent for the tale?</li>\n<li>Are the production and/or editing competent?</li>\n</ul>\n<h4>Payoff</h4>\n<ul>\n<li>Did the film makers manage to do what they seemed to be intending?</li>\n<li>Are you emotionally satisfied when the film is over?</li>\n</ul>\n","private":0,"image":"","valid":1},
|
||||
{"id":110,"name":"Blockchain","description":"A open series on the Blockchain, cryptographic hash, cryptocurrency, bitcoin etc","private":0,"image":"","valid":1},
|
||||
{"id":111,"name":"Linux Inlaws","description":"This is Linux Inlaws, a series on free and open source software, black humour, the revolution and freedom in general (this includes ideas and software) and generally having fun. ","private":1,"image":"","valid":1},
|
||||
{"id":112,"name":"The art of writing","description":"An open series on writing tools, media, supplies and techniques.","private":0,"image":"","valid":1},
|
||||
{"id":113,"name":"GIMP","description":"An overview of this open-source graphics program, with a focus on photographic issues.","private":0,"image":"","valid":1},
|
||||
{"id":114,"name":"Model Hacking","description":"Creating, restoring, painting all sorts of models from RPG characters to model cars.","private":1,"image":"","valid":1},
|
||||
{"id":115,"name":"Bicycle Hacking","description":"Maintaining, enhancing and repairing bikes; also the creation of new bikes from recycled ones.","private":0,"image":"","valid":1},
|
||||
{"id":116,"name":"Languages","description":"About human languages, including learning them and speaking them","private":0,"image":"","valid":1},
|
||||
{"id":117,"name":"DOS","description":"DOS is a general acronym for \"Disk Operating System\", though it came to refer to the operating system used in the IBM PC, particularly Microsoft's MS-DOS.","private":0,"image":"","valid":1},
|
||||
{"id":118,"name":"Hack Radio Live","description":"A series of syndicated shows about hacking, also available on https://hackradiolive.org/","private":1,"image":"","valid":1},
|
||||
{"id":119,"name":"Travel","description":"This is an open series where our hosts can document their travel experiences","private":0,"image":"","valid":1},
|
||||
{"id":120,"name":"Battling with English","description":"Looking at the English language and highlighting some common anomalies, mistakes, mispellings, grammar problems and similar.","private":0,"image":"","valid":1},
|
||||
{"id":121,"name":"HPR New Year Show","description":"Our community welcomes in every time zone to the New Year in this annual event.","private":1,"image":"","valid":1},
|
||||
{"id":122,"name":"Computer Strategy Games","description":"<p>This series is about Computer Strategy Games or Video Games as defined by <a href=\"https://en.wikipedia.org/wiki/Video_game\">https://en.wikipedia.org/wiki/Video_game</a></p>","private":0,"image":"","valid":1},
|
||||
{"id":123,"name":"Today I Learnt","description":"A series where hosts speak about recent discoveries they have made which they consider might be of interest to the HPR Community.","private":0,"image":"","valid":1},
|
||||
{"id":124,"name":"Science Fiction and Fantasy","description":"A series where hosts talk about Science Fiction and Fantasy in the form of books, movies, TV series, etc.","private":0,"image":"","valid":1},
|
||||
{"id":125,"name":"Home Automation","description":"A open series on anything related to Smart Home, or Internet Of Things","private":0,"image":"","valid":1},
|
||||
{"id":126,"name":"Business Applications","description":"A open series on Business specific Applications","private":0,"image":"","valid":1},
|
||||
{"id":127,"name":"Religion and Spirituality","description":"Discussions on the intersection of Hacking and Belief","private":0,"image":"","valid":1}]
|
||||
405
hpr_transcripts/hpr0001.txt
Normal file
405
hpr_transcripts/hpr0001.txt
Normal file
@@ -0,0 +1,405 @@
|
||||
Episode: 1
|
||||
Title: HPR0001: Introduction to HPR
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0001/hpr0001.mp3
|
||||
Transcribed: 2025-10-07 09:58:56
|
||||
|
||||
---
|
||||
|
||||
next episode!
|
||||
Hello there, everybody, and welcome to Binary Revolution Radio Episode No. 201, I am
|
||||
Thank you very, very, very, wait. It's not in my radio. We use it that round, it's 200.
|
||||
This isn't 201? No, no, no. What are we?
|
||||
Hacker Public Radio. What is it? What's Hacker Public Radio?
|
||||
Not sure, remember, you know, you and boom, talking about it way back in the day, and we decided to do this
|
||||
Hacker Radio thing and combine it and make Hacker Public Radio.
|
||||
Oh, yes, now I remember. Actually, yes, we are doing episode one of Hacker Public Radio, and the other voice you heard is that of our good friend, Enigma.
|
||||
Yes, yes, thank you.
|
||||
And we are going to do Hacker Episode One, and this is going to be an overview of exactly what is Hacker Public Radio joking aside.
|
||||
This is the debut episode of a new show, and we're going to tell you all about what the show is about, how it came about,
|
||||
what the future is and the plans we have for the show, and hopefully answer any questions we might have so that we can get a lot of participation
|
||||
and a lot of great content for what we hope will be a very long running show.
|
||||
Now...
|
||||
The community-related show that we also love with the topic is now going to be Hacker Public Radio because I taste my topic name.
|
||||
Not true. Actually, it goes back a little bit further than that.
|
||||
The name HPR, or the idea that HPR Hacker Public Radio actually stems back from the old RFA days, Radio Freak America.
|
||||
When Duel and I, Duel was going to be wrapping up Radio Freak America.
|
||||
The Revolution Radio was just starting or had just started, and Duel was going to take a little time off.
|
||||
And hopefully he and I had the idea of coming back with another show called HPR Hacker Public Radio, which was going to be a little bit more of a serious show.
|
||||
And actually what I had originally envisioned for the show was it was going to be more of a roundtable group discussion show.
|
||||
And that may actually happen, but we'll come back that later.
|
||||
What I envisioned for Hacker Public Radio was more of a crossfire style show with one mediator and people from opposing sides
|
||||
discussing different topics like high-resue, good, or bad.
|
||||
And we try to get some representatives who supported one view and people who supported a different view and have kind of an actual intelligent conversation and debate about the topic.
|
||||
We wanted to do something a little bit more serious.
|
||||
We have a lot of fun on the shows that we've done from Ben Rav to RFA to TWA Tech and all that.
|
||||
But we wanted to try to get something a little bit more serious and a little bit more mainstream as far as the overall feel of the show.
|
||||
Now we're still going to have fun, don't get me wrong.
|
||||
But that's what the original idea was.
|
||||
And we wanted it to be more community-based and so far as we would have a bunch of different guests on it,
|
||||
it wasn't always going to be about the host.
|
||||
If anything, the host was just a mediator and it was always the guests, the community, that were providing the content.
|
||||
Well, that was the original idea, but it kind of spun a little bit from there when dual-ended radio-freech America.
|
||||
And we were full into radio, full into binary revolution radio.
|
||||
It was actually the guys over at Infonomicon Groups, Enigma, who started a show called TWA Tech.
|
||||
And why don't you talk a little bit about that show?
|
||||
Because I know Drubes has said that us mentioning HPR on RFA is what kind of motivated him.
|
||||
And that was his idea for TWA Tech all along.
|
||||
Was it community-based show?
|
||||
And the only reason he didn't call it HPR then is because he thought we were going to be coming out with it soon.
|
||||
So he went with TWA Tech.
|
||||
Well, originally Goss Man and Drubes started this show called TWA Tech Radio.
|
||||
And it was a joke of the name. It was based off of TWA Tech.
|
||||
I forget the acronym.
|
||||
The acronym is for TWA Tech.
|
||||
I'll find it while you speak again.
|
||||
This week in Tech, that's it.
|
||||
I think it was, yeah, this week in Tech.
|
||||
So we called it today with a Techie sort of topic for short.
|
||||
And I wasn't around at this time.
|
||||
I'm a lecturer.
|
||||
Another intern, a non-con member, was a admin for that site for about a year.
|
||||
For he had real rights come up, like I would let's do.
|
||||
And decided to step back and I took it over.
|
||||
And it's been a really community-based radio.
|
||||
We have a ton of different hosts.
|
||||
It's very in-content.
|
||||
My clip shows and everyone wants to know why I mix it up with a old, yeah,
|
||||
I've done video and RFA, I've done, I did it with Jason Scott.
|
||||
That's how I'm presentation.
|
||||
So I've done pretty much, did you dam it?
|
||||
I want to do, I want to get back to the platform.
|
||||
That's what you did with the telephonic lab lecturer.
|
||||
I want to do things like that.
|
||||
I do clip shows.
|
||||
And I also do, you know, serious content of a lot of the mix that we want for a lot.
|
||||
Well, and that's actually a good point.
|
||||
The one of the things that's great about HBR,
|
||||
and I always enjoyed this listener of Tawtech was the fact that we don't really have set topics
|
||||
so far as we don't have a limit on no politics, or no this, or no that,
|
||||
or only talk about hacking, or only emphasize freaking.
|
||||
We're actually pretty open-minded on these shows,
|
||||
and we want people to contact us with anything hacking-related.
|
||||
And what I mean by hacking-related, it's very loosely defined.
|
||||
There's going to be a lot of episodes about Linux,
|
||||
because it's very near and dear to the hearts of hackers everywhere.
|
||||
So there's going to be a lot of shows that are just Linux-centric.
|
||||
There are going to be a lot of shows that talk about hacking.
|
||||
There's going to be a lot of shows that talk about different programming concepts and techniques.
|
||||
But there's also going to be the occasional show.
|
||||
Like I always enjoyed some of the shows that were done about actually survival.
|
||||
I thought those were some great shows.
|
||||
There was a show about caffeine one time, which I thought was interesting.
|
||||
That's something that, you know, you got to admit is certainly in the hacking community,
|
||||
and an interest in the hacking community.
|
||||
So all those type of things.
|
||||
Anything that's even loosely related.
|
||||
We're even looking ahead to some music-based shows, some hacker-centric music, if you will.
|
||||
Lots of different topics and ideas of what we can do for the show.
|
||||
So if you're listening and you're thinking about, you know, what to expect for the show,
|
||||
well, expect the unexpected.
|
||||
And you might be surprised.
|
||||
If you are listening to this, you might actually have some good ideas,
|
||||
contact us, and let us know.
|
||||
So you might actually have some ideas that would fit in really well with the rotation.
|
||||
So let us know if there's a topic that you want to discuss or want someone else to discuss.
|
||||
Right.
|
||||
We've had shows about, we've had the music shows.
|
||||
I believe not quicker.
|
||||
And there was another one I can't remember off.
|
||||
I thought my head is back in the archive.
|
||||
That was just somebody playing music.
|
||||
Yeah.
|
||||
And it was, you know, hacker-related.
|
||||
I believe doctors are used different tones.
|
||||
And there was a show about Esplanade II, I want to say.
|
||||
Like the language that's active from the back of the universe.
|
||||
It's very interesting, not necessarily acting topic, but.
|
||||
And I believe Plexi did some one-on-chat box and AI.
|
||||
And we moved from the gambit with the topic.
|
||||
So I expect more of that with hacker public radio.
|
||||
Yeah. A lot of variety.
|
||||
A lot of variety is what we're hoping for.
|
||||
And as a listener, that's something that I always like.
|
||||
So the more variety, the better.
|
||||
So kind of keep in mind.
|
||||
There might be some stuff.
|
||||
Basically anything, it doesn't have to be hacking-related or about hacking.
|
||||
It just has to be something that may be of interest to hackers.
|
||||
Something that a hacker would enjoy listening to.
|
||||
Even gaming.
|
||||
A lot of hackers are into gaming.
|
||||
Anime.
|
||||
Stuff like that.
|
||||
Maybe anime movie reviews.
|
||||
I know there's a lot of people out there listening that say,
|
||||
oh, I don't know much about hacking.
|
||||
I can't contribute.
|
||||
Well, I know a lot of you watch a lot of anime movies.
|
||||
That kind of stuff I would find interesting, you know,
|
||||
reviews of maybe some of the technologically themed or technologically themed anime movies
|
||||
that are out there or shows and things like that.
|
||||
Recaps.
|
||||
Movie reviews.
|
||||
Anything like that that's all the interest to hackers is perfectly acceptable as a topic.
|
||||
So we don't want to put limits or caps on it.
|
||||
Your imagination, whatever you can come up with, just contact us.
|
||||
And actually, that's probably the next thing we should talk about is,
|
||||
how do they contact us?
|
||||
Enigma, how do they contact you, myself, or any other stuff?
|
||||
If they wanted A, well, actually we have a couple of ways for them to contact us.
|
||||
Why don't you explain?
|
||||
Well, you can email us directly.
|
||||
You have Stankblogger.
|
||||
Stankblog.com.
|
||||
I have my ETNH0 and enigma.gmail.com.
|
||||
Well, you can go the hacker public radio route.
|
||||
And there's an admin and hacker public radio.
|
||||
And a feedback and hacker public radio.
|
||||
Now, the difference is, admin is this, like, I have a sure idea
|
||||
and I want to run it by one of us.
|
||||
Then I would throw it to the admin at the hacker public radio.
|
||||
If I had some type of feedback or question or comment about one of the specific shows,
|
||||
I would email the feedback at hacker public radio.
|
||||
And then myself or you or droops would throw that along to the specific host for that day.
|
||||
Yeah, so if you had comments or feedback on a particular topic,
|
||||
what we'll do is try to put that, we'll pour that on to the appropriate person.
|
||||
Maybe they can do a follow-up episode later on in clarify.
|
||||
The thing about this show is because it has so many hosts mixed in,
|
||||
it's kind of hard to do email each episode and follow up,
|
||||
like we've always done with BenRef Radio and other shows,
|
||||
because the hosts are all constantly rotating and makes that difficult.
|
||||
However, we do still want the feedback.
|
||||
Feel free to send it in anytime you want to and it just may take a while.
|
||||
It'll be probably an upcoming episode by that same host,
|
||||
which may be a day later and may be a couple weeks later,
|
||||
but we will forward everything through.
|
||||
And also since we mentioned, in case it was obvious to you,
|
||||
website of course would be hackerpublicradio.org.
|
||||
So if you email admin at or feedback at hackerpublicradio.org,
|
||||
you'll also be the two main email addresses.
|
||||
And as an English said, you can contact us directly if you have any problems.
|
||||
But admin will probably be the main point of contact for everything.
|
||||
Sight related, show related, you want to volunteer to do episodes,
|
||||
any technical difficulties, anything like that.
|
||||
Most of it is going to slide in through admin at hackerpublicradio.org.
|
||||
Finally, obviously this is a radio show.
|
||||
Our goal here is to be Monday through Friday.
|
||||
Is that correct? I'll let you speak. I don't want to put words in your mouth here.
|
||||
Yes, we want to do Monday through Friday.
|
||||
I usually don't put a shirt out on a higher day,
|
||||
but that could change depending on the volume of shows I have.
|
||||
We could theoretically go seven days a week if we have a volume of shows.
|
||||
But again, we're going to stick with a five day rotation right now.
|
||||
Yeah, things may change in the future,
|
||||
but for right now we're going to do a daily show weekdays only.
|
||||
So you'll probably get 20 to 22, 23 episodes a month somewhere in that ballpark range.
|
||||
And the other great thing too is we've really gone to great lengths over the past few months.
|
||||
Not only in reorganizing and putting all the show together and everything,
|
||||
but we've contacted some great, great people who have volunteered already in advance
|
||||
to start doing episodes at the show, have already given this their commitment
|
||||
that they're going to try to do some shows.
|
||||
So I think we have so many people that we're not going to have too much of a problem with that.
|
||||
So you'll hear from Enigma and myself occasionally,
|
||||
but give them a few samples of some other great people that are going to be on the shows
|
||||
that have already committed.
|
||||
So we've got a walker, Dr. Zigman, operator, Tom Aikon,
|
||||
movie, Dan and Pat Run, the Wink-Wink Tech Show,
|
||||
Bill Perro, Jason Scott,
|
||||
Dr. Manojak from the packet sniffers,
|
||||
CEO of the Creator of the Piracy Documentary,
|
||||
Ten Valorant Peter from the Fresh Ubuntu Podcast,
|
||||
and David Gibbs from a lot of Wink's,
|
||||
a lot of Wink's link podcast,
|
||||
which is a tongue twister and stuff.
|
||||
Yeah, actually, Drutes and I were just on that show too.
|
||||
So he's looking forward to do some episodes on it.
|
||||
And as well as, you know, a lot of the people that had been doing DWH Tech,
|
||||
some people have done an episode here and there,
|
||||
some new people that are joining on as well.
|
||||
So it's going to be just a lot of people.
|
||||
I mean, just from the list you named there,
|
||||
just from all those people I'm looking forward to hearing a lot of great topics from them.
|
||||
So that should be something to look forward to.
|
||||
So the website again, hackerpublicradio.org.
|
||||
We've mentioned email addresses.
|
||||
You know what to expect as far as the show content.
|
||||
And in case we haven't emphasized it enough,
|
||||
the most important thing to emphasize about hacker public radio.
|
||||
And the reason that it's called a dot org is a dot organization.
|
||||
This is a hacker community.
|
||||
An organization that we're trying to get people together.
|
||||
We want this to be community based.
|
||||
We do not want this to be despite the fact that we opened up with a little bit of humor
|
||||
and a joke about Ben Rev Radio.
|
||||
This is a show in and of itself.
|
||||
It's nothing to do with binary revolution radio.
|
||||
It's nothing to do with radio freak America.
|
||||
There's no strict format.
|
||||
You don't have to obey any specific restrictions or content guides,
|
||||
other than what we said as far as being adventurous to hackers.
|
||||
But you don't have to do email segment and housekeeping unless you want to or choose to.
|
||||
But it's important to understand that this is a community based thing
|
||||
and everybody's going to do a show a little bit differently.
|
||||
The other thing that's kind of related to that,
|
||||
that I'm looking forward to,
|
||||
and this is going to be really interesting to see how this works out.
|
||||
Enigma is the mini series idea that we're going to be incorporating into the show.
|
||||
Yeah, it seems to be a really good idea.
|
||||
Troops is going to implement that,
|
||||
and it should be quite interesting.
|
||||
Of course, that would be, you know,
|
||||
we do have all these shotgun type topics
|
||||
where one day you may hear about C-programming,
|
||||
and the next day you may hear about a new exploit.
|
||||
On the next day you may hear some sort of web hacking topic,
|
||||
and then a movie review or whatever, all over the board.
|
||||
But sometimes there are running topics.
|
||||
Like I know the best example that I can come up with is what Troops was talking about,
|
||||
and that is some Linux distribution reviews.
|
||||
Troops likes to try a bunch of bootable Linux distros,
|
||||
and do a review who wanted to do some reviews of those as episodes of the show.
|
||||
Well, it's a great idea that, yeah, those can be individual episodes
|
||||
that wouldn't be cool if we could group them all together on the site.
|
||||
And I guess for lack of a better word,
|
||||
let's just call it a keyword system.
|
||||
It's a little more than that,
|
||||
but basically putting a keyword or a title for this series of reviews,
|
||||
or whatever the topic may be.
|
||||
Like I'm already looking at doing some database topics.
|
||||
So I may record one episode talking about some database basics.
|
||||
Troops may do one talking about a Linux review,
|
||||
and then two weeks later I might do a second topic that actually builds on the first one.
|
||||
I may do something a little bit more advanced on databases.
|
||||
Troops may do another Linux distro review,
|
||||
but we want them to be kind of tied back to the previous one,
|
||||
especially if they build on each other.
|
||||
Like I'd like to start with some basic database stuff,
|
||||
and then as it goes on,
|
||||
go into some more advanced things that build on it.
|
||||
So if you listen to the later episode,
|
||||
it would be really handy if you had listened to the first episode,
|
||||
the earlier episode first.
|
||||
So we're going to have these many series where we flag these
|
||||
and put them together in sort of a stream in and of themselves.
|
||||
So episode 7, 14, 18, and then maybe not until 32,
|
||||
may all actually be part of one mini series,
|
||||
and I'm making up the word mini series.
|
||||
Although it's got a ring to it,
|
||||
if you can listen to that mini series in order,
|
||||
and have it make sense,
|
||||
even though they may have been recorded and streamed
|
||||
at different times on the actual show,
|
||||
or on the actual podcast itself.
|
||||
And I think that opens a lot of mini series and or mini series,
|
||||
and I hope so you can even get to it two days,
|
||||
but you're kind of neat with a little mini series,
|
||||
but in theory, two of us could be doing a mini series
|
||||
and be grouped into that same,
|
||||
like I could do a little bit of this episode.
|
||||
You could do this episode with the time together.
|
||||
Absolutely.
|
||||
So it is with the same mini series backpack.
|
||||
Right. Same thing with the Linux reviews,
|
||||
other people could do some as well.
|
||||
Tie them all under that same banner.
|
||||
And some of the more, I guess, stable
|
||||
or long-running ones might be highlighted on the web page
|
||||
so you could find them easily and searchable
|
||||
and all that kind of good stuff.
|
||||
All right.
|
||||
So, again, if you want to participate, contact us.
|
||||
And is there anything else that we want to mention
|
||||
on this premiere episode?
|
||||
No, I think we've covered it.
|
||||
All I wanted to say was that shows usually we run about,
|
||||
you know, five to twenty minutes,
|
||||
but that's just a guideline, not a hard rule.
|
||||
I have shows go for an hour,
|
||||
like your state, but we won't go there.
|
||||
Yes, we won't run the one yet.
|
||||
And that's worth doing a couple of plastic episodes
|
||||
to get the general idea of what we're doing for them.
|
||||
They're actually going to be the same format.
|
||||
So you can check that out and just be enough.
|
||||
You have any ideas?
|
||||
Yeah, and actually that's a good point to bring up, too,
|
||||
is that there's no time limit.
|
||||
Again, it goes back to what I said earlier about.
|
||||
Whatever you want to format, however,
|
||||
you want to format your show that's great.
|
||||
And related to the mini-series,
|
||||
perhaps you have a style that you always want to do.
|
||||
Maybe you do always want to open up with,
|
||||
I don't know, a joke or a mini-review or something
|
||||
that you want to do on every episode that you do,
|
||||
you have the freedom to do that.
|
||||
So you can put those all together,
|
||||
and it can all, not only is it a mini-series,
|
||||
but it's almost like a show within a show.
|
||||
So that's kind of an interesting possibility as well.
|
||||
There is no time limit.
|
||||
So, you know, some topics may be five minute episodes.
|
||||
Some topics may be two hour episodes.
|
||||
I really don't even think we have a maximum.
|
||||
I mean, I'm not concerned with it.
|
||||
So I guess we'll worry about that as the time comes.
|
||||
But, you know, I can certainly see maybe some presentations
|
||||
that are hour long being put on the podcast
|
||||
or recaps of presentations, things like that.
|
||||
And the only thing formatting,
|
||||
and this is probably a good way to close out
|
||||
this first premiere episode.
|
||||
The only thing as far as formatting is
|
||||
there will be a regular opening theme music
|
||||
done by our good French Flicko,
|
||||
which really, really is awesome.
|
||||
I love it.
|
||||
I have to say.
|
||||
So every episode will open.
|
||||
You don't have to worry about bringing your own theme music
|
||||
or closing song or any of that kind of stuff,
|
||||
just the content.
|
||||
And then we'll take care of the rest.
|
||||
We're going to put the 30-second opening theme
|
||||
at the beginning of every episode,
|
||||
like the one you heard starting today's show.
|
||||
And then the full version of that same song
|
||||
closing out every show,
|
||||
and add probably at the end of each show,
|
||||
depending on if we have sponsors or not.
|
||||
And to help pay for the website and bandwidth
|
||||
that this is going to inevitably cause on our server.
|
||||
And that's about it.
|
||||
So definitely just a Slicko for some great, great music.
|
||||
I really like it.
|
||||
And I'm looking forward to this show.
|
||||
I hope everybody listening is.
|
||||
And Nigma, thank you for doing all the work behind the scenes.
|
||||
You don't get nearly enough credit.
|
||||
So thank you for that.
|
||||
And unless you have anything else.
|
||||
No, I just wanted to shout out all the former hosts of TWAT.
|
||||
And hopefully we can have most of them back for HDR.
|
||||
And that's pretty much it.
|
||||
I'm sure we will.
|
||||
All of them.
|
||||
And then some more.
|
||||
And then some new ones.
|
||||
And hopefully we'll be still around to maybe do it.
|
||||
And update a one year anniversary and see how the whole thing went a year from now.
|
||||
But until then that's going to be on my calendar.
|
||||
There you go.
|
||||
Until then that's going to do it for this premiere episode of HPR Hacker Public Radio.
|
||||
Thank you for listening.
|
||||
And we'll see you next week.
|
||||
Same hack time.
|
||||
Same hack.
|
||||
No, no, no.
|
||||
This is all right.
|
||||
We'll see everybody tomorrow on the next episode of HPR.
|
||||
Thank you for listening to Hacker Public Radio.
|
||||
HPR is sponsored by Pharaoh.net.
|
||||
So head on over to C-A-R-O-DOT-E-T for all your hosting needs.
|
||||
.
|
||||
.
|
||||
.
|
||||
96
hpr_transcripts/hpr0002.txt
Normal file
96
hpr_transcripts/hpr0002.txt
Normal file
@@ -0,0 +1,96 @@
|
||||
Episode: 2
|
||||
Title: HPR0002: Customization the Lost Reason
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0002/hpr0002.mp3
|
||||
Transcribed: 2025-10-07 09:59:47
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
Welcome to today's hacker public radio I will be I will be your host Deep Geek.
|
||||
Today's topic is customization the lost reason for switching to Linux from Windows.
|
||||
Now we've all heard the mantra I'm sure that Linux is the free alternative to Windows.
|
||||
It is faster and more secure and as hackers and geeks we all know about the faster part.
|
||||
And the more secure part has been generally conceded by the public and yet Windows dominates.
|
||||
So this must not be the driving factor and what makes people choose their operating system.
|
||||
So you know I mean it wasn't for me either I used Windows 95 and then Windows 2000 for the longest time.
|
||||
Having known about Linux and heard about it and being curious about it but never having gone through with it going through with changing to it until I encountered software registration.
|
||||
I was actually doing my annual reinstall of Windows to make it go faster at the time and could not get free access to the Norton database and had to go out and buy a copy and register it in short form.
|
||||
Because as we all know Windows just needs antivirus.
|
||||
And that the fact that some web page out there could just turn a part of my computer off left such a sour taste in my mouth that I went ahead and became a Linux person.
|
||||
So you know when we talk about advocacy of Linux first of all no one says you have to try to to advocate Linux.
|
||||
You can just if you want it's very cool to just be a Linux person and not try to advocate Linux to your friends and coworkers etc.
|
||||
And Windows 2000 is a solid operating system although because of software activation I never followed through with any of the post Windows 2000 Microsoft operating systems.
|
||||
But for those of us who are asked why or want to advocate it I think we should work out more than just having you know what what sounds like a party line after a while.
|
||||
So I'd like to talk to you about customization as a reason to switch.
|
||||
I mean like I said I switch was a software registration but what keeps me in Linux is customization.
|
||||
Now it used to be that the Linux did not have a GUI and then after that it used the Unix style X Windows system GUIs which were not quite the same.
|
||||
You know they were a little bit more scientifically oriented than the home user GUI that Windows users have grown to love.
|
||||
But now modern day and age and this is recorded in 2008 you know with the advent of desktop environments like KDE and GNOME.
|
||||
It's very Windows-like you know it's there's something that functions as a start for on a menu.
|
||||
It brings up a menuing system and you choose your application and for people who either have a tech support guy or have a big geek in the family who sets up their computer for them what would be the difference.
|
||||
You know if they're using a desktop environment but the thing I advocate the reason I come back to customization is because Windows
|
||||
it's something GUI customization Windows has theme ability in other words you know background colors wallpapers font selection you know windows and Linux has them both.
|
||||
But Linux customization goes much much deeper and I want to tell you guys a story you guys listening a story about a friend I have who used to be more deeply into computers and he is now and back in me and my buddies windows 95 days.
|
||||
We were a big fan of what they called the power tools suite in those days which was a series of small programs that allowed you to customize different aspects of Windows 95.
|
||||
And when he went as time went on he went to XP Windows 2000 XP and I went Windows 2000 Linux I was looking to buy him a gift a Christmas present and I said gee we both like that that power tools.
|
||||
So I went to the to my ultimate source for computer software bonds in Noble and I found a book and it was something it was called something different I want you.
|
||||
The term power tools was no longer in Vogue but I found something that had a disk with a with a similar amount of programs years later my friend said to me you know I still use that book you gave me not for the software disk.
|
||||
But in the back is an appendix that lists all the windows services and what they do and I can go into XP and disable the services that I don't use and make my computer go faster and further than it would otherwise.
|
||||
And you know I was impressed with the statement you know this is windows strength I believe and I'm talking you know personally here is its standardization in other words people who are institutionalized in employment or education you know by compelling the members of the institution to use windows.
|
||||
They get forced onto the same software suite and to the same issues as the computer management group within that institution want them to be on.
|
||||
This is windows true strength you know the most compelling reason not to switch is because everybody at work or everybody at school has to use it.
|
||||
Okay but you know I'd like to my answer to that is to remind people that the name of the device is no longer the main frame the main frame error is behind us.
|
||||
We call them now personal computers personal computers not the boss is computer not build gates is system the idea is to have a computer for you you as a person set up the way you wanted to and if you are compelled to use windows.
|
||||
You can only go so far like I said wallpapers plants you know but but still you open up your you knew out of the box computer and it's up a certain way certain services or demons as we call them in Linux start and you know they're all the same they are not personalized in any way.
|
||||
They are not personalized in any way and then people some usually just change the wallpaper well Linux is different Linux is different.
|
||||
If you don't want to use the standard GUI you can just change your GUI and they're you know the big two arcade and gnom and for those who don't know Linux these offer a windows like experiences you can put folders and bookmarks on your desktop as well as background wallpapers but you can get away from that those facilities actually run you know use resources.
|
||||
If you're a speed hacker like me like anything and circumventing any limit and speed you know you want to get my attention talk to me about that I'm into it whereas a lot of people talk about hacker there think about people who are looking to circumvent the limits and security I'm a guy who wants to push the computer to the edge and so I don't want folders on my on my desktop.
|
||||
To tell the truth I don't want a desktop because it's constantly being used sometimes I want to turn off the graphical user interface and just use the command line you know it's a personal thing for me.
|
||||
In Linux you can you can you have your window manager which is what's responsible for you know allowing you to shift between different applications is sharing your desktop.
|
||||
Then you can have a desktop environment which integrates everything and provides you things like you know files virtual files trash cans file shredders on your desktop drag and drop stuff.
|
||||
And you can customize you can customize by not having a regular GUI. I for instance prefer to use as my window manager I SWM I SWM is a lightweight window manager it puts a task bar on your screen it does not support folders on the desktop does support wallpaper does support.
|
||||
Click the start button and hit the menu and I can elect to use I SWM white which doesn't have the task bar and I find this to be a fantastic thing for me personally not only because it's faster which I like but because when I purchased my first laptop I discovered that I hate mouse pads.
|
||||
I despise the mouse pad it is trying to make a square peg fit into a round hole and sometimes I feel like carrying around a spare wireless mouse and I SWM also has nearly every function of the window manager is mapped to a control key.
|
||||
So I can open a closed windows by like pushing alt f 10 or something you know if I want to so that's great for me some other examples you know for people really much older computers that they want to keep alive and we all know that Linux is great for keeping alive and older piece of software.
|
||||
There's fast lightweight window manager F L W M and this thing is boss you you you log in you type in your password and click log in and boom it's on you know that's because there's nothing nothing
|
||||
nothing running in the background and with these kinds of window managers you usually typically take your mouse and push you know the right click button and your menu pops up that way.
|
||||
But you know there's there's things that go further than that there is for instance a very obscure but used by a small clique of people window manager called rat poison.
|
||||
And yeah it sounds bad you know it's like the old skull and cross bones you know image you know rat poison but rat poison is specifically a window manager for people who hate using the mouse device you know and they're used to the word rat and rat poison is actually a derogatory reference to the mouse.
|
||||
So I have not used this one personally but you know I think it speaks volumes to the mentality of Linux community that they have a window manager just for people who hate their mice you know that speaks an incredible level of care you know for small groups within the Linux community.
|
||||
Now for those of you who don't want the full window and experience but do like you know a fast and lightweight solution but want more than a bare bones thing a very popular alternative is flux box which is very popular especially in the hacker community.
|
||||
There have been a huge variety of themes written for flux box there have been got themes hacker themes you know all kinds of things like that you know it allows very interesting use such as a fonts fading grad graduations and colors and menus stuff like that.
|
||||
But flux box is based on black box which was a light white alternative I believe to window maker and window maker is interesting because it allows it allows what's called applet boxes which means you could actually say you want a clock something mind your disc usage and something
|
||||
mind your internet bandwidth usage you can actually pull up and run in the background these little applets which show up as boxes in the bottom of the screen and flux box or wherever you like on the screen and open in window maker and they will be running constantly in the background.
|
||||
I believe I'm 100% sure that this was the predecessor to what windows people sometimes call active active desktop.
|
||||
One of my favorite applets I've used is myself one of my favorite applets is called is a fish monitor is a ducky fish monitor believe it was cold and this thing had a icon it would run constantly that had a water level.
|
||||
Bubbles in the water and a duck floating on it and the more memory you use the higher the water level went up if you used all your memory the water went up to the top and the duck flipped upside down.
|
||||
And if you used a lot of CPU time the water would boil to different amounts of of rapidity as you used more and more CPU resources I got such a kick out of that thing.
|
||||
Fluxbox is really a cool thing for your artistic moods and on your login screen in Linux and it's normally called the desktop manager like kdm or typical defaults.
|
||||
There's usually an options button for your graphical login that you open up and it's a session type and if you install several of these in your Linux system you can go in there and as you log in you type in your username and password or click it or click your username if you like and you can choose what kind of window manager you'll use for that session and log in and you're right in it.
|
||||
It's a beautiful system that customize itself extremely to your individual tastes. Now the other thing I mentioned earlier about customization is background processes and you know I'm not a gnome or kve guy these are the big heavy windows like desktop environments and white windows they take a long time to boot when you have them fully installed.
|
||||
So in Linux if you use you know I'm a Debian centric so in Linux is perfectly okay for you to never install a Damon process that you don't want.
|
||||
Now for instance there's a new background thing called ever high client and it's supposed to be some alternative to sitting up a stack network at home.
|
||||
I normally use only one box on my home network I don't need this I kind of resent you know if I have to install an application and it automatically loads this.
|
||||
So on my laptop I'm developed I'm trying different things of software and I am learning what things install a lot of background processes and choosing light more lightweight alternatives to those things.
|
||||
So you know I've chosen for instance not to load Katie at all not to load Katie includes a web browser called conquerer which is also a file manager which causes a lot of this heavy stuff in the background to load.
|
||||
So I'm learning to use links to on my laptop so I don't have to install that heavy heavy thing on my thing. Now this has side effects you know because of this I don't have a file manager I'm used to.
|
||||
So I'm learning to use what's more like a midnight command a kind of file manager you know and it works for me.
|
||||
Now I'm not saying because you know you hear this kind of podcast or this kind of internet radio program that you have to be like me and enjoy customization for this level but I want to submit it out there to you in listeners as an alternative reason to switch from windows to Linux because I think the more reasons we find that windows doesn't have.
|
||||
The more persuasive those of us who advocate Linux can be and that's the that's the beginning of the end of this episode of hacker public radio.
|
||||
One thing and format that I deep geek your host for today want to have for my contributions is I want to have I want to close out with a geek tidbit I'm going to call it and you know it's just going to be food for further.
|
||||
For further thought kind of thing a geek you should you should look into to learn about historically perhaps a geek high coup yes there are people who write poetry about the geek experience out there and it's open ended I can extend this in the future if I like.
|
||||
So today's geek tidbit from the deep geek is a historical geek you guys really ought to know about his name is Seymour Cray S-E-Y-M-O-U-R space C-R-A-Y.
|
||||
Seymour Cray is was born in 1925 and passed away in 1996 there's a wonderful Wikipedia article on him you can use as a jumping off point and he is the father of the supercomputer that's right big iron fast processes all that stuff that they don't really do anymore because there's so little demand for it and the market has been changed.
|
||||
And the market has been changed so much people who want super computers now even even the company that is his legacy really supports clusters at this point but this is a guy who squeezed every bit of speed out of a computer he could.
|
||||
It was a maniacal madness in the days when the mainframe died the mainframe had about as much power as a pentium and now we're up to pentium force and beyond and some of us are going on to 64 bit processing.
|
||||
Back in the day before the personal computer was a business reality they needed faster and faster and Seymour Cray built computers with this company that was so fast that IBM had to say we can't compete on the basis of speed.
|
||||
IBM owned a Cray they used for benchmarks but IBM strength you know it was kind of like you know the Microsoft has become the IBM of today they really you know were a sales and support organization more so than you know a high speed computer company.
|
||||
You know one of the Cray computers one of his innovations was when you use supercomputing and you compute that fast you generate a lot of heat and one of his big innovations was the use of Florent for cooling and Florent was a liquid developed by 3M for medical uses and it was a non-conductive liquid that was meant to have medical applications for filling and gaps.
|
||||
When they did organ transplants I believe but what he did was he submerged the insides of the computer was actually a water type tank and filled with Florent and used a circulation of Florent to pull the heat out of the computer when it ran fast and the fast the computer ran the more the Florent bubbles.
|
||||
And that's how come many of the Cray's were nicknamed by their computer operators as bubbles and excellent book and I read it and got a lot of my background information about Seymour Cray and the big computers was called Superman the story of Seymour Cray and the technical wizards behind the supercomputer.
|
||||
Author Charles J. Mary M. U. R. A. Y. Pubbier 1997.
|
||||
A excellent and fast read for those of you who are looking for book reviews and that concludes this episode of Hacker Public Radio.
|
||||
Thank you for listening. This is the Deep Geek Signing Off.
|
||||
Thank you for listening to Hacker Public Radio.
|
||||
HBR is sponsored by Carol.net so head on over to C-A-R-O dot N-E-T for all your hosting here.
|
||||
Thank you.
|
||||
409
hpr_transcripts/hpr0003.txt
Normal file
409
hpr_transcripts/hpr0003.txt
Normal file
@@ -0,0 +1,409 @@
|
||||
Episode: 3
|
||||
Title: HPR0003: Lost Haycon Audio
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0003/hpr0003.mp3
|
||||
Transcribed: 2025-10-07 10:01:15
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
.
|
||||
.
|
||||
Hey, christen fresh, I am Morgan the low-tech mystic, and you, well you, my friends, would
|
||||
be listening to Hacker Public Radio for January 3rd, 2008.
|
||||
Today's topic. Lost audio from Heycombe.
|
||||
All right, thank y'all for tuning in for another wonderful. I got to use those
|
||||
air quotes. Wonderful. At least when it's more delin' doing this. Now the
|
||||
wonderful episode of Hacker Public Radio. Thank y'all for inviting me into your
|
||||
audio players and here we go. Today's audio is going to be some pre-recorded
|
||||
audio. I'm feeling a little bit under the weather so instead of doing the
|
||||
original audio I'd plan for. What we're going to do is I'm going to play back
|
||||
some audio from Heycombe, which was a use those air quotes again. It was a
|
||||
computer conference that the Infonomicon Computer Club. We put together, we
|
||||
had the fancy idea that it'd be fun to do a computer conference like out in
|
||||
the middle of the field like where everybody comes and camps out instead of doing
|
||||
it like in a hotel. So we decided to do a little test run this year in
|
||||
Mississippi and basically what it boils down to is just an excuse for a bunch of
|
||||
a bunch of us to get together and camp out in a beautiful area of Mississippi
|
||||
during some beer and hang out and kind of just unplug for a couple days and
|
||||
just enjoy one another's company. It was a really good time. We had overall
|
||||
a good time. What we're going to do now is I'm going to play some audio of one
|
||||
night. There was alcohol involved obviously. We decided to go on a midnight
|
||||
geocache. So if you're familiar with geocaching then you know what's up. If
|
||||
you've never heard of geocaching then you need to be hitting Google right
|
||||
now and typing in geocaching but basically what geocaching is is people go
|
||||
out to random locations either in the woods or in urban environments and they
|
||||
hide things in a little boxes. Sometimes camouflage very covertly and they put
|
||||
the coordinates of the item up on a little trail or a website and then give
|
||||
you clues and you kind of have to give a starting point and then you follow the
|
||||
trails and they vary from cash to cash and it's something fun to do if you've
|
||||
got a GPS receiver it's definitely something to check out if you don't have one
|
||||
and hey be something to look into GPS receivers are getting cheap that'd be a
|
||||
good way to get out of the house and have some fun and still not betray the
|
||||
nerd instincts there so without any further ado without any further ado
|
||||
please enjoy this audio of myself droops and five big tramsing around the
|
||||
woods in the middle of the night in the middle of the Mississippi as I
|
||||
probably say 400 times in this audio clip like beep that out but you guys get
|
||||
to enjoy it yeah this was just a little background I guess before we go into
|
||||
it droops is from Mississippi or was and he had a bunch of geocaches that he had
|
||||
done in the area and he had several night geocaches which meant they were only
|
||||
really applicable to be done at night they involved using a flashlight and
|
||||
reflectors and you'll hear more about it but it was a really good time so
|
||||
basically it's the three of us myself droops five big tramsing around in the
|
||||
woods I grabbed my laptop as we were going down to the geocache so here I've
|
||||
got my tablet PC and tramsing around in the middle of the woods and it was just
|
||||
kind of it was it was a really fun time so I hope that comes through in the
|
||||
audio with nothing else and yeah nothing else I don't know somebody else will
|
||||
be here tomorrow
|
||||
and time coordinates right now well for time it is 1148 on Friday in November
|
||||
9 2008 and we're currently at Haycon and I am looking back up buddy left
|
||||
with that little geocache that we're getting ready to do in the middle of the
|
||||
night which is involving reflectors and we're looking for the reflector as we
|
||||
speak to mark the geocache
|
||||
and it's low like a high foot so we're riding around right now I'm not sure how
|
||||
much battery life I have I hope this doesn't die in the middle but I'd like to do
|
||||
a little see what we can't find here maybe this will be horribly terrible to
|
||||
listen to and maybe this will be entertaining and this is the good stuff
|
||||
that goes on here at Haycon in the middle of Mississippi in the middle of the
|
||||
night and you thought it'd just be all about penises
|
||||
and it's a little doubt reflectors and so we're looking what color are they just
|
||||
white we're looking for a clear reflector like a bicycle reflector for listeners
|
||||
at home perhaps like a thumbtack reflector yeah as we what's our kind of
|
||||
velocity 25 miles an hour as we spotlight trees on a gravel road
|
||||
and I'm going to pause for the silk of our battery life here because we are
|
||||
recording with all the acidity and hopefully this isn't clippin too much
|
||||
out and around yeah I've gone on super low power mode so we can't
|
||||
reflectors are something to the gravel you will be back in just a second
|
||||
hey guys we are back and it is currently just to give a little roster here it
|
||||
is myself more going groups and five big and we have successfully located the
|
||||
reflectors and troops has located his walking staff perhaps he will speak
|
||||
softly but he always carries a big stick that's right in a me run with the
|
||||
laptop but so here we are in the middle of the night and these reflectors to
|
||||
give you an idea of the size of the reflectors these these look like
|
||||
thumbtacks basically so like a thumbtack that you use to to post posters up on
|
||||
your wall but so as we swap through the woods in the middle of the night here in
|
||||
the middle of Mississippi in the middle of nowhere what's what you explain a
|
||||
little bit if you will about this geocache what's involved and motivation
|
||||
behind it what are what are we doing here trotting through the woods looking at
|
||||
reflectors okay people hide shit and they post coordinates for such things with
|
||||
their GPS and they think it's a really cool spot or really cool hide and this
|
||||
one's a night cash which means it's really hard to do during the day because of
|
||||
the reflectors obviously and what I did this I was with my dogs and my wife and my dogs
|
||||
got down the bottom of the still and broke something and then we ran through the
|
||||
woods chasing after them putting reflectors on trees until we got pretty lost
|
||||
and then we said between a good spot so basically we were living a wild moment
|
||||
we traced with if you will Hansel and Gretel breadcrumbs yeah and hundreds of
|
||||
people before us have also lived this moment excellent and so do we do we have a
|
||||
it it was merely there weren't a lot of there weren't any nightcashes in the
|
||||
area other than what I hit really far away from town so one of when closing
|
||||
the town to people to get to explore do I find it really hard to find a good
|
||||
moment no good reason and a lot of people come out here at night looking for
|
||||
these things and I hope it doesn't disappoint
|
||||
and this one has a surprise ending shall we say
|
||||
but some people figure out these guys didn't I wouldn't have
|
||||
let's see now it'll be instructions on this or to follow the reflectors until you get to a big
|
||||
like x marks the spot kind of thing and two were definitely not an x negative but from the
|
||||
school right out of recent college I know that two points do make it back to if we can find
|
||||
two other points maybe right here and to our left we know it's a whole lot more dots
|
||||
so somebody's been sneaky or the the quarry that was being chased on this particular day was uh
|
||||
well I'm providing this cash for a second to be a complete jackass but I'll tell
|
||||
it over the whole tree whenever you see two dots in the tree that means um
|
||||
so not only is it shopping through the woods in the middle of the night but we're also
|
||||
it's like a it's like a little puzzle yeah you can you can see one two three four five six dots ahead
|
||||
of you correct so in a way it's just kind of like we're getting to uh
|
||||
to live life for a few scant moments as if we were uh say our favorite hero from the legend of
|
||||
Zelda maybe mr. Link was stomping around the woods in the middle of the night or
|
||||
other uh suck set adventures mr. Link would definitely be our favorite hero from
|
||||
wise and Zelda seeing it how they're such a wise selection
|
||||
there's a good ravine there and some bars
|
||||
and if you're lucky that's all you'll take home from hay con
|
||||
and
|
||||
and uh yeah do we have quite this little ravine here and the laptop we're going to pass the
|
||||
laptop got it oh got it all right into bars
|
||||
and oh it burns it burns there we go
|
||||
too bad we can't see the same thing for syphilis
|
||||
hopefully we won't find that avoid the blue bales just just like in Zelda you know
|
||||
oh
|
||||
we continue on we're um we hit another one of these really far out of town where it was raining
|
||||
and i got piss drunk we had a bottle of coke and a bottle of jack and we just traded the whole way
|
||||
there each taking a sip and then go into the next one
|
||||
all right so here as we come along the trial and we see two dots so since we've had our little
|
||||
spoiler hint we know to look for a change of direction there which we see again which is
|
||||
once again crossing the uh the big change which is a little more little friendlier this time
|
||||
but it was frankly called it's raining and while you and i went to hide this thing is drunk and
|
||||
apparently we went in a bunch of circles and in reflection
|
||||
so it was a uh especially mean one because the geocache was actually a tree
|
||||
suspended from the road and in daylight you can do much pure sight but at night time no one's
|
||||
going to be like oh what's that hand in that rope in the tree
|
||||
well there's a bit of a jackass name a bunch of hills up and down slippery and uh
|
||||
a lot of people went out there couldn't find it but it just made it better
|
||||
better for you and maybe not so better for them possibly but we noticed here our dots have come
|
||||
to another symbol which appears to be um across we've got three vertical and five horizontal
|
||||
and we also have a fallen tree with a tack in it the uh we must update our quest
|
||||
the thumbtack
|
||||
I wonder pretty damn well built because these are several years old in the woods
|
||||
excellent so this cache has existed four years it's rusted all around it
|
||||
the thumbtacks and the same path
|
||||
so as we approach the tree here with the uh the cross on it
|
||||
you notice that uh she's also right next to the road
|
||||
and uh i don't know all these reflectors yeah are they oh there they are i'm right across this tree
|
||||
again hints yeah the big circles but uh so possibly we've discovered another signal that a cross
|
||||
means maybe you're crossing something oh yeah
|
||||
the thumbtack through the woods here and running into each other
|
||||
it's the middle of the mile and the middle of the second one the middle of the darkness itself
|
||||
so far uh our listeners at home while they i guess listen to us if they're still listening
|
||||
listening to that it is yeah and then and the clipping that that's me carrying around the uh the
|
||||
the tablet as if it were a pizza pie i'm trying to have a Brian Fessig crap that we are
|
||||
you're pretty brave do you have a skin on that tablet no don't
|
||||
which which was bringing me into our next point for those uh at home listening if they'd like to play
|
||||
an at home game perhaps we could uh wager which is more crazy the fact that we are in the middle of
|
||||
the woods and uh random Mississippi or we are in the woods in the middle of the night which is
|
||||
flashlights or the fact that i am in the woods in the middle of the night
|
||||
my laptop is logging around i'm trying not to fall in trenches and
|
||||
at least you can't fall in the syphilis right okay
|
||||
all right all right yeah all right we got it going across another trench here i'd like to really
|
||||
apologize for i'm sure all the clipping that i'm getting but uh we've noticed that oh there's
|
||||
our for a second there it looked like we lost our tap look at that hand really but our our
|
||||
direction our direction our vector because we have both momentum and direction so we have a vector
|
||||
but there's a necessarily mean we're going anywhere right now the first rule of geodash is first in mark
|
||||
where you went into the woods that yeah you can find a way back to be a thing
|
||||
yeah which which is a good point to uh bring up that if you're going to take your laptop out into
|
||||
the middle of the woods you know it might have been a good idea to bring the GPS receiver you know
|
||||
in the middle of the woods in the middle of the night in the middle of the bryers or your friendly
|
||||
or the friendly sharper neither which are present tonight
|
||||
oh we do hey there's a mushroom and it is a i don't know it is not a type of mushroom that grows
|
||||
in the area that i'm from so i'm not familiar with it as there are many edible and non-edible
|
||||
along with magic i'm not just talking about magic but i'm talking more about being able to
|
||||
live off the area that you're passing through and so if you had to be stuck out in the woods because
|
||||
you've got lost with reflectors because you at least know what to use they wouldn't kill you then
|
||||
why big notes is a big cluster we notice some particular shape let's see
|
||||
now this cluster perhaps the cluster fuck
|
||||
i'm gonna stomp
|
||||
let's see we have a stomp they kind of looks like a cross
|
||||
or more of a plus what can i say bucket there's a bucket so i can see
|
||||
reflectors i hope that's all the vehicle okay so we have cleverly just walk day
|
||||
have it on you've been listening to this minus a little bit of editing out
|
||||
i'm walking in a big circle so at least you're catching this uh
|
||||
along with using our creativity to find the bucket that's right on the ground in front of us
|
||||
i also get a little exercise so we've had the container possibly upgraded let's just
|
||||
bet that's kind of neat somebody's going to come behind the geocache and i don't know is that
|
||||
is that a good thing yeah there's probably something wrong with the container or someone sold the
|
||||
container no oh so we have apparently someone is replaced to container with a container that's
|
||||
in a container so they have upgraded so not only that they enjoyed your cash but noticed that
|
||||
you know hey oh something's going wrong here and let's uh do something one of the positive
|
||||
things about the geocache community here Mississippi is they will look after other people's stuff
|
||||
so as as uh we open the the container if you will five it will you explain what you're what
|
||||
you're seeing there in uh in the second bucket uh in the second bucket you have your basic uh
|
||||
geocache goodies of course in your zip lock bag we have the logbook and uh it's like a little
|
||||
fun coin okay cool and then of course uh on the inside of the container you have your various
|
||||
trading trinkets uh you've got a little like tupperware thing very small tupperware
|
||||
might have been something in there at one point uh you've got a nice bag clip for the Mississippi
|
||||
Department of Agriculture at agriculture and commerce and uh in case you're wondering lester
|
||||
spelled junior is the commissioner of that and uh we've got a little key ring here uh some cars
|
||||
we had a cash that was a name plastic container yeah it was one of the oldest caches in the state
|
||||
and they do a lot of control burning around here and apparently it was found after a control barn
|
||||
mm-hmm and the gentleman working for the park service that found it looked into what was going on
|
||||
and actually replaced it with a metal ammo can and much better than it had been so not only
|
||||
maintained but upgraded but upgraded because i mean fire and a melt stuff what inside this
|
||||
so yeah let's let's open this uh sip lock bag which has our well-preserved uh toy coin
|
||||
and a memo book and let's let's read through here it was a cash fairly replaced bring up 2007
|
||||
and push mataha found it and webchimp found it and since it's been replaced two people have found
|
||||
three people we have another thing so what are the dates that it's been found on October 20
|
||||
October 21 and uh it's September 2
|
||||
so all three recent finds after they would have an ink pen and there was an ink pen included
|
||||
in the bag awesome so let us uh we record the fact that we are located this geocache
|
||||
right now who we are and that we're at the beginning of the uh the broadcast here but I will
|
||||
verify the current time coordinates it's based time coordinates it is now 1210 on November 10th 2007
|
||||
spectacular so our sign your name though temporal shipping and that's currently my geocaching name
|
||||
trying to have uh the same name in different organizations because as we learned
|
||||
earlier our hero link you know i mean he he changed his name up you know every game wasn't the same
|
||||
you got to do something to keep it fresh so otherwise uh gaining can easily track you down as
|
||||
you're reborn through the many generations of Hyrule and uh you don't just sign an
|
||||
name if you want to write something inspirational or anything you're welcome to do such things
|
||||
take a moment to uh inspire the young here oh that's kind of convenient how the truck's right there
|
||||
that that it is as seen as how it was just brought up that uh we didn't have a GPS device in that
|
||||
we could be stranded after a walking very far in the woods following reflectors that are no longer
|
||||
facing the direction that we were walking so i'm going to leave a note here in this pattern and say
|
||||
uh more gallon was here and take on hey con beta because this is a beta test of our con
|
||||
and uh so alphalus this summer mean you living together i guess so yeah yeah so i don't know
|
||||
what night's what syphilis is released candidate one okay yeah yeah okay and uh yeah
|
||||
enjoy what's something that you die of an organ trail
|
||||
oh syphilis you know syphilis this is Terry this is Terry oh dude okay apparently this one should
|
||||
be called dysentery no we're gonna replace everything back into the bag and try to hide it better
|
||||
when we found it because apparently it's not supposed to be just laying on the ground even though
|
||||
when it is on the ground and right in front of you it is still a challenge to find it
|
||||
thanks this tree and it was um probably kind of far would like a lot of
|
||||
and uh it looks like it had a little termite damage though yeah it's definitely uh
|
||||
i'm not gonna miss your steam car whatever these three it's free and uh cash and
|
||||
handers probably tell me metal ammo cans are usually uh pretty left over by the red necking people
|
||||
all right let's hide this thing good let's off this ground or that that was it was what
|
||||
looks like we can see it was buried several inches yeah covered with leaves yeah and not
|
||||
to mention that we have the fact of darkness yeah to aid in this uh endeavor exactly see and once
|
||||
again we find ourselves just like Link we're traveling back and forth between worlds of lighting dark far away from the cash
|
||||
yeah
|
||||
so we've placed a uh a nice log on top of our can and they covered everything up with the leaves
|
||||
which were not taken directly from the area of the can because that would be kind of obvious
|
||||
so and we're making it quite more hidden so not only do you have the darkness but you have the
|
||||
evil powers much like Ganon working against you now too too too many sticks is obvious
|
||||
so if the leaves are good leaves are good too many sticks look like you're hiding something under
|
||||
some sticks so we have a professional tip here we had a um cash and a city that apparently was near
|
||||
park and some young folks found it and decided to steal it and move at about 20 feet
|
||||
covered out with stuff and hide cigarras inside of it still in their individual wrappers
|
||||
which they apparently didn't know what was going on because they were hiding a metal container in
|
||||
the woods from guys who for a sport find metal containers in the woods so uh yeah it was found
|
||||
pretty quick and I had a bunch of free cigarras that's it excellent
|
||||
so we are we are now we have completed our quest for the geocache five they get successfully
|
||||
re-hidden okay very skillfully and we are now going to go see a cemetery it's kind of makes
|
||||
it a little bit more sense in the middle of the night I don't know whatever I don't know if
|
||||
anything makes sense at this point but you know lack of sleep makes full fun stuff and hopefully
|
||||
fun listening so we're going to walk back to the truck and uh maybe we'll pick back up here if we
|
||||
can locate the cemetery uh if we can find the reflectors I don't know do souls have reflectors
|
||||
I don't think they might in some form maybe maybe some spirit orbs I don't know we don't have any
|
||||
real uh real-time technology here but no I don't just rambling oh thank you
|
||||
okay
|
||||
brothers we're driving down the road and I'm sure we're clippings some more we're going to get a
|
||||
little description here of the uh the cemetery that we're headed towards
|
||||
all right this cemetery this whole park is very here in a place I still live and after I
|
||||
quit living there um I drove past and on the big highway going home from it on out and this
|
||||
cemetery is on the USGS map and it's several acres large and I really think they had just
|
||||
there they were like it's sitting here so it took me a long time to find this thing
|
||||
and took a lot of research and noticing the way the land is laid out to figure out where they
|
||||
would build a cemetery because in my mind building a cemetery on the hillside is really dumb
|
||||
right so the first thing I did was check all the flat land inside that big area they'd
|
||||
marked out
|
||||
and it wasn't there so then I went looking around and the trip was up and down and I had friends come out
|
||||
and eventually we found where we thought a house had been so we said maybe the cemetery is near
|
||||
this house you should be a community here a hundred years ago there was a post office in there here
|
||||
and uh there's nothing now just a couple of mobile homes in the old shop
|
||||
um and the cemetery only is map I've only found two or three tombstones here but they're
|
||||
cool looking and uh it's nice to walk down this nice easy walk excellent so not maybe searching
|
||||
for reflectors no just searching for buyers excellent thanks for the tour
|
||||
thanks lord hey no problem there's a very creative pie that damn near a pumpkin find it now
|
||||
now it'll take you i'll see tomorrow that is the dryer ant kick trip
|
||||
and um which are all still better than syphilis
|
||||
they're all still better than syphilis the guy that I hit it with um I think stole it hey there's a
|
||||
shotgun in the ship yeah is he got kind of mad at me one day and the stick that I'm carrying right
|
||||
now there was one very similar to it hitting hitting at this cache in its inception and I think he wanted
|
||||
it and um he usually went up there and took it and took the cache because as we'll find out
|
||||
tomorrow no one stumbled upon this randomly a week after it was hidden
|
||||
and I actually found this cemetery at night with a flashlight on the way home to see my girlfriend
|
||||
I just stopped by I thought it did my hat I know where it is and it was exactly where it was
|
||||
after months of searching it's not constant searching but
|
||||
so preparation was this just like a uh a moment of revelation when you just
|
||||
sitting class daydreaming and I realized hey a picnic that's where it is and that's what it was
|
||||
and we'd actually walk through the area but we were looking for a much larger cemetery
|
||||
um according to the park lady it had a gate and uh she was referring to it completely different
|
||||
when apparently she couldn't read the map that I showed her I think what's this cemetery look like
|
||||
where is it she's like oh it's got to be gate but there's one about the same spot
|
||||
if you turn south off of this road on the left hand side so I turn the door I think I'll win my
|
||||
okay but you're off according to the map you're in the cemetery right now you've been so
|
||||
since we parked and uh we found on the left here what we thought was a house it's a little way
|
||||
out here and I've yet to figure out where exactly this road ends up to walk till we could walk
|
||||
anymore and it just kind of keeps going like this and it's a road and this just clearly looks like
|
||||
an old road for what I don't know but it's deterioration-weezing way okay across from this
|
||||
across the little part graveyard that will road ride is a continuation of this road
|
||||
and see how it's like these banks really high right this is an old road that this is wagons on this
|
||||
fire and uh I think this is the road that just continued on to the next town and now we you know
|
||||
drive past it 65 miles an hour you know right over there and it lays forgotten that it used to be
|
||||
this road I mean the banks now taller than we are all right we're looking at a bank that's
|
||||
eight feet nine feet yeah at least in the dark and both sides and no reflectors no
|
||||
reflectors
|
||||
which walking and cemetery in the middle of the night is always fun
|
||||
that's good that's spooky
|
||||
I used to remember he never wrote you a trouble pod that is true
|
||||
and if I came across some guy that decided he was going to shoot me for best classic on
|
||||
federal land then by damn I was going to get the shit out of him as I'm running away
|
||||
so
|
||||
so while we're out here walking around and well after midnight in the middle of the night
|
||||
searching for uh the destinations to old forgotten roads, cemeteries and stuff like that
|
||||
one maybe led to the question of not only why you do this but what would inspire somebody to
|
||||
go out what what's what's the what draws you to do this what got you interested in this kind of
|
||||
thing because it's definitely interesting and we clearly are out along with you sharing
|
||||
in the experience and enjoying it so but what gets one interested in um student of history and
|
||||
this is a lot of forgotten history and I can't really you know do a lot of history discovery
|
||||
you know just as a college student are now self-employed dude we're going all the time
|
||||
so I can do simple things like this
|
||||
yeah I think we definitely won't pass it go a little farther um
|
||||
this is history that people don't know that we can find and it's like um
|
||||
discovering something again which is what history kind of it is
|
||||
um there's a lot of cemeteries that now they were destroyed or the buildings around
|
||||
were destroyed during civil war or the aftermath of the civil war
|
||||
okay during the day I think it's good obviously good I think
|
||||
well let's see trees but Mark I don't know if that's now quenched in on um if you notice the bank
|
||||
kind of slopes like somebody's walked up this a bunch times and during the day you can see a lot
|
||||
better the trees are just a little different like someone have planted them for a purpose
|
||||
apparently somebody's hutted through here because yeah we do see you
|
||||
so now we find ourselves let's get on another quest
|
||||
possible hunting trail possible geocache
|
||||
possible uh vampires zombies
|
||||
six yeah awesomeness six and we have a cemetery
|
||||
and we have one two markers three so we have one it's almost kind of like a small obelisk
|
||||
it's about three and a half to four feet no three feet inside or on space and then uh
|
||||
the regular tombstone on September 11 1861
|
||||
civil war started 1861 and died 1909 good deal it was amazing apparently
|
||||
as we noticed by the symbols on the on the tombstone and this is the one that is
|
||||
as I thought from a distance was shaped like an obelisk but it's not an obelisk this is violet the
|
||||
wife of Monroe Stevens who died august 28 1905 63 years old gone but not forgotten
|
||||
the people that weren't supposed to forget are apparently dead too but she clearly is not
|
||||
forgotten because we are here and in some way in this any bitty little stone next to it
|
||||
initials is the center and an m and an a it appears uh let's say maybe her granddaughter
|
||||
is this one which is buried on top of the old lady
|
||||
very popular thing
|
||||
and this is the only tree I've ever found are three
|
||||
for this you know multi-acre cemetery
|
||||
you know if there's anything you're in the day and night
|
||||
oh this is definitely very nice first thing
|
||||
and it's definitely a nice refresher from the Worgum of Roleman for the day
|
||||
well um I used to ball here for USGS mapping service
|
||||
and a map corn or we would identify things to be to go on map my government makes maps of
|
||||
everything and they are strategic maps with nothing else um we used a compass to orient where you're
|
||||
going you need something to identify on the map that you can see so like a church or a water tower
|
||||
something has a reference point yes the guide you clone and they like to keep these things
|
||||
updated this church is coming up a dead people don't move and there's a lot of
|
||||
cemeteries on these things and I was really into the cemetery thing and I thought hey
|
||||
I can get free maps and I can add all these cemeteries to these USGS maps
|
||||
but apparently after I got the information they don't give a shit about cemeteries
|
||||
which makes me believe this is not a map of the area this is a strategic map
|
||||
that if they ever have to take them as a sippy they want to know where the the high points are
|
||||
the strategic locations yeah or where they want to be and not necessarily what the history
|
||||
what was once here
|
||||
which I think if they're going to have a quad map of everything in the United States they need to have
|
||||
stuff on it like they build they you know put little squares where there's houses
|
||||
but they can do that satellites and I think this should keep track of where cemeteries are
|
||||
just a point in sight the old nasal live-in was defied or defiled because it was one of these
|
||||
hidden old lost cemeteries and someone stole all the tombstones and built a land development
|
||||
you know housing development on top of it and during the project they discovered they were
|
||||
building it on top of the graveyard fortunately and then they found all the tombstones
|
||||
dumping the creek very nearby and the lady that told me this story I think had defiled the guy that
|
||||
had started you know the land development and she felt it moved all the tombstones I think she
|
||||
had moved his in the whole night because you know what goes on comes around and I'm not into
|
||||
desecrating the dead but you move some ice tombstone to be a jackass makes some money then you
|
||||
don't really deserve to have one which also goes back to you know I mean put yourself in
|
||||
some golden rule you know do you want others that you would wish done to you yeah
|
||||
she's a one crazy lady as apparently the three of us are yeah
|
||||
um scroood this is a ninja night school radio sorry no no ninja night school long since
|
||||
died okay leave that died um let me sure it died just if you go back and check the date as we
|
||||
have uh we've actually experienced two days in this recording our temple shifting all at once
|
||||
as we uh this is a supernatural supernatural yes this is a supernatural sound tour of uh the
|
||||
acorn experience well tomorrow night I will take you all to a uh massive abandon cemetery
|
||||
that tells us we're here in this little thing and uh we'll go around and read all the names
|
||||
well I'm definitely gonna have to recharge my laptop battery so that we can share this
|
||||
experience with the listeners if there are any listeners yeah all this recording them out in
|
||||
the cemetery we've been making pretty good time for everyone you know flat ground since then
|
||||
that's the trail that it is a very old road which is it's kind of interesting and we're walking
|
||||
along some parts are very soft much like sand well worn in some some places are more like a like an
|
||||
old cracked stone pavement you know just want a natural ridge is that what I'm seeing here
|
||||
is it stark oh well there's those but it goes you far on either side you're gonna fall down
|
||||
the hill okay like that tombstone or those gray yards were or they go go it was on the hill
|
||||
which leads me to believe maybe there were more tombstones and they've either been knocked over
|
||||
walled away right and up barefoot tram from the through there looking for them and those are
|
||||
all three
|
||||
and the battery died
|
||||
well I hope everybody enjoyed the audio of the midnight rambling in the woods
|
||||
and if nothing else well you have a new party game so everybody take a drink anytime I mention
|
||||
Mississippi or being in the woods double shot for syphilis you know you guys build on from there
|
||||
and guys are creative bunch but nothing else thanks for tuning in today for a hacker public radio
|
||||
and stay tuned for another fantastic episode no air quotes needed when it's not me and wonderful
|
||||
episode of hacker public radio coming at you tomorrow
|
||||
thank you for listening to hacker public radio hbr sponsored by caro.net so head on over to
|
||||
c-a-r-o jacking tree for all the folks in the
|
||||
you
|
||||
83
hpr_transcripts/hpr0004.txt
Normal file
83
hpr_transcripts/hpr0004.txt
Normal file
@@ -0,0 +1,83 @@
|
||||
Episode: 4
|
||||
Title: HPR0004: Firefox Profiles
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0004/hpr0004.mp3
|
||||
Transcribed: 2025-10-07 10:11:36
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
Welcome to Hacker Public Radio. This is Peter Nicolitis from the Fresh
|
||||
Ubuntu podcast and I'm your host for this episode. Today I am going to cover how to
|
||||
move your Firefox profile from one computer to another. Now if you're like me,
|
||||
Firefox is your preferred web browser, regardless of what platform you're running it on.
|
||||
I run Firefox on my Linux desktops, my Macintosh machines, and my Windows PCs.
|
||||
So one of the things that I like to do is maintain a consistent set of settings
|
||||
across all of those machines. And I'm not talking about just bookmarks but add-ons
|
||||
and all sorts of other preferences. All of these things for Firefox are stored
|
||||
in a single directory. So you can basically, as long as you know where to find it,
|
||||
move your entire Firefox profile around from one computer to another.
|
||||
Now it doesn't matter whether you're working on Windows or Mac or Linux,
|
||||
you can take all of your extensions, your bookmarks, etc. and move them to any
|
||||
computer that you're using as long as you know where to look for them.
|
||||
And that's the trick. To find your Firefox profile on a Mac,
|
||||
it's pretty easy. Basically if you open up your Macintosh hard drive,
|
||||
then open up users, your username right there will be your home directory,
|
||||
and then library, application support, Firefox, and profiles.
|
||||
If you have only one Firefox profile, then there will be one folder there.
|
||||
And it usually is a random name. It's composed of a bunch of random letters and numbers.
|
||||
On my computer, for instance, my Firefox profile is named IJAWGK1.Default.
|
||||
That's on my Mac. So now you know where it is.
|
||||
Now if that's the profile that you want to move to another machine,
|
||||
you would just open up that folder, grab all of the files contents,
|
||||
and then maybe put them on a thumb drive or copy them across a network
|
||||
or store them in some centralized place, and name it something meaningful like Firefox profile.
|
||||
Then what you want to do is find your profile on your other machines.
|
||||
So on Windows, for instance, my profile is located under C,
|
||||
slash documents and settings. My username, just Peter on my machine,
|
||||
application data, Mozilla, Firefox, profiles.
|
||||
And again, if you have one profile on your system,
|
||||
you're going to see a directory under there, which again will be a random gibberish.
|
||||
Now it's not going to be the same as what it was called on the Mac.
|
||||
So here, for example, if you are moving everything out,
|
||||
you don't want to take the entire directory, the entire profile directory,
|
||||
that random alpha numeric string, you want to take whatever is in that folder,
|
||||
and then overwrite whatever is in the other machines folder.
|
||||
And what I generally do is I clear them out first.
|
||||
So on my target machine, I'll delete everything that's in that profile directory,
|
||||
and then just take the contents of my source machines,
|
||||
and then put the profile directory and put them in there.
|
||||
So once you've found those, let's see, we should cover out how you find it on Linux.
|
||||
Now on Linux, the profiles are a little easier to find.
|
||||
In your home directory, there will be a hidden directory called dot Mozilla.
|
||||
And under that, you should see your profile right there.
|
||||
So again, just look for a default, or sorry, something dot default.
|
||||
So on my Linux box, my profile was named VKUXFIT.default.
|
||||
The name doesn't matter, as long as you can look at it
|
||||
and identify it as a profile directory, then you're all set.
|
||||
So once again, what I do is I generally fire up Firefox one time on a new machine,
|
||||
and then I go into the profiles directory, so I know where I'm copying my files too,
|
||||
and I delete everything that's in there, and then I go back to my old Windows box,
|
||||
or Mac, or whatever I'm copying my profile from, grab up all the files,
|
||||
and either copy them over a network or stick them on a thumb drive,
|
||||
and then just dump the contents of that profile's folder into my target.
|
||||
The next time you fire up Firefox, it should look very much the same as it did on your original machine.
|
||||
And this includes, if you have it configured to open tabs for sites that you were last visiting,
|
||||
you'll get the same tabs opening up.
|
||||
All of your cookies will come along, so your stored passwords are all there, and all of your add-ons.
|
||||
And that's the biggest thing that I find is that, you know, if my save preferences and stuff are there,
|
||||
it's just like coming home every time you fire up your browser.
|
||||
It's really nice not to have to reconfigure everything.
|
||||
So that's it. That's all you need to do to keep your Firefox profile with you
|
||||
when you move from computer to computer.
|
||||
You can do the same thing for Thunderbird, which will probably cover in a future episode.
|
||||
And there are also ways that you can use tools such as R-Sync to keep your profile synchronized with you automatically.
|
||||
But those are topics for another day.
|
||||
So that's it for this episode.
|
||||
Until next time, you can follow me at fresubuntu.org,
|
||||
that's the fresubuntu podcast, or on my blog at pn72.com.
|
||||
Thanks for listening and have a great day.
|
||||
Thank you for listening to Half Republic Radio.
|
||||
HPR is sponsored by caro.net.
|
||||
So head on over to caro.enet for all your hopes and needs.
|
||||
Thanks for watching.
|
||||
Thanks for watching.
|
||||
237
hpr_transcripts/hpr0005.txt
Normal file
237
hpr_transcripts/hpr0005.txt
Normal file
@@ -0,0 +1,237 @@
|
||||
Episode: 5
|
||||
Title: HPR0005: Database 101 Part 1
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0005/hpr0005.mp3
|
||||
Transcribed: 2025-10-07 10:12:22
|
||||
|
||||
---
|
||||
|
||||
The
|
||||
Hello everybody, this is Spankdog and this is Hacker Public Radio.
|
||||
On today's episode we're going to start a new series, a new in-depth series on databases.
|
||||
We're going to start off with some very basic understanding of what databases are, some
|
||||
basic terminology, and with each subsequent episode we are going to build on those fundamentals
|
||||
and go into more detail as the year progresses.
|
||||
So we're going to start off today talking about some very, very basic terminology because
|
||||
it is very important that you understand some of the basic terms and exactly what a database
|
||||
is.
|
||||
It is in visual concept very simple but there are some details.
|
||||
Some details that a lot of people may not know or understand about the databases as we
|
||||
know them today.
|
||||
First thing we really should define when we talk about databases is, well, the first word
|
||||
or the first part of the word database is data.
|
||||
So what exactly is data?
|
||||
And it kind of may sound like a silly question but there is a common misconception people
|
||||
throw the word data around very loosely but they're when they actually mean information
|
||||
and they are actually two different terms altogether.
|
||||
Data and information are not necessarily the same thing, not usually the same thing.
|
||||
Data, if you want to go by a textbook definition of data, data is that which is extracted from
|
||||
a compilation of data in response to a specific need.
|
||||
All right, well that's a little, okay, you can think about that for a second if you want
|
||||
to.
|
||||
My favorite definition is to say that data is, it's a collection of facts from which conclusions
|
||||
may be drawn.
|
||||
These are like those minuscule or insignificant little events, tiny details that you store,
|
||||
like in the case of computers, for example, log file details, Apache logs, any kind of
|
||||
log file details, the time stamps that are in there, any observations, anything that's
|
||||
stored that's just this minuscule insignificant data that by itself doesn't really have a whole
|
||||
lot of value.
|
||||
That's what data is.
|
||||
So if you go out, you can do a little research and look up data and information.
|
||||
Be careful.
|
||||
If you look up data on you, you're going to get a lot of Star Trek references, data played
|
||||
by Brent Spiner, but I digress.
|
||||
So like here's an example of data.
|
||||
Let's say that, let's say I were to sit down at, I don't know, a mall or something with
|
||||
a pen in the paper and I logged details of every person that walked in such as their
|
||||
height, their gender, what kind of clothes they were wearing, what color their hair was,
|
||||
things like that.
|
||||
This is data, little bits of information that in and of themselves, okay, so what?
|
||||
A guy with black hair that's five foot eight walked into the mall, that's not really that
|
||||
big of, it's not really that useful information.
|
||||
Unless you're looking for that particular guy, but I digress.
|
||||
Now to make that leap from data, which is insignificant, unapplied material, we come
|
||||
to information and again, people throw these two together, but they are two different things.
|
||||
Information is really applied data.
|
||||
Information is the result of processing, manipulating and organizing data in a way that adds to the
|
||||
knowledge of the person receiving it and that that's a quote that I think is pretty
|
||||
on the money.
|
||||
It's basically, well, I kind of said it earlier, it's application of data, useful extracts.
|
||||
For example, let's use what I just said earlier, I'm standing at the mall logging people
|
||||
that walk in and out of the mall and their information on it, well, that may not be all
|
||||
that useful individually, but let's say that I was doing some sort of market research,
|
||||
that information could be useful to somebody who was, I don't know, maybe selling clothes,
|
||||
they wanted to know how, what the average height of most people is, you know, census type
|
||||
material.
|
||||
When you actually analyze all the data and come up with averages, average heights, what
|
||||
total percentage, like male versus female, maybe you'll, maybe you'd be surprised to find
|
||||
out that 75% of people that come to the mall are males age 21 to 31, I don't know.
|
||||
You would not know that unless you actually sit down and gather data and then analyze
|
||||
said data.
|
||||
To come back to something a little bit closer to home, probably for a lot of our listeners,
|
||||
let's go back to Apache logs.
|
||||
If you are looking through your Apache logs, you might find you're getting a lot of new
|
||||
hits from a particular website, you know, if you see one hit in your log, it's no big
|
||||
deal, but you notice a pattern or a certain percentage increase of something that people
|
||||
are finding on your site, that becomes useful information and that's the difference between
|
||||
the two terms.
|
||||
So applied data is what I think is the best way to talk about information.
|
||||
So now we've gotten that out of the way, the next question, of course, is where do you
|
||||
store data?
|
||||
Well, in a database, that's what we're talking about here.
|
||||
So database is another term that can be thrown around very loosely because fundamentally
|
||||
a database is a very simple thing.
|
||||
A database is a very simple generic term that describes a collection of data.
|
||||
That's it.
|
||||
Collection of data, data again being those tiny little bits of material that you gather
|
||||
over time that are logged, that are observed, whatever the case may be.
|
||||
It can be a spreadsheet, a CSV file, comma, separated value file, even a text file, a
|
||||
word document.
|
||||
It doesn't really matter.
|
||||
You can have a word document that has all of your favorite recipes in it or something
|
||||
like that.
|
||||
That's a database of recipes.
|
||||
It could be a spreadsheet of your CD collection or DVD collection or something like that.
|
||||
That is a database that is a collection of data that's compiled and stored in one place.
|
||||
That is the most simple example of a database.
|
||||
But that's not really the way most people use the word database.
|
||||
When you think of databases, especially in large scale applications or websites or things
|
||||
like that, it's not quite that simple.
|
||||
To run any kind of application or even web applications, even whether it be a forum, content
|
||||
management system, anywhere up to, I don't know, the DMV or the IRS are running huge databases.
|
||||
They're not storing them in text files.
|
||||
They're not storing them in Excel spreadsheets because there's limits on those things.
|
||||
When it comes to programming, it's difficult to read and write to those files because there's
|
||||
no organization.
|
||||
You have a text file.
|
||||
It's literally line after line after line of information.
|
||||
If I have a line of text file with 10 lines of data, let's say I have 10 people coming
|
||||
in out of the mall and I logged their height and weight and level of attractiveness or
|
||||
whatever the case may be.
|
||||
Yeah, there's 10 records there.
|
||||
I can look at that with my eyes.
|
||||
I can parse through that data with my eyes and I may be able to pull out information
|
||||
such as, hey, but everybody that came in was less than six feet tall or more than six
|
||||
feet tall.
|
||||
It's easy and you can do it in your head.
|
||||
But what happens when that text file or that list goes from 10 people to 100 people?
|
||||
You still may be able to glance at it and notice some patterns, but it makes it a little
|
||||
bit harder.
|
||||
What about that 100 jumps to 1,000 or 100,000 or millions?
|
||||
And when you're talking about Apache logs and all the hits, you're talking of millions
|
||||
of records on any decent size website.
|
||||
When you talk about the internal revenue service and government databases, you're talking
|
||||
out millions upon billions of records of data.
|
||||
So you've got these huge collections of data, but if you were to put all of those into
|
||||
a text file, and let's go back again to my text file of Mall example, I log 10 people
|
||||
coming into the mall and you tell me, okay, well, tell me what was the tallest person.
|
||||
I can look at it with my eyes.
|
||||
I can pick out, okay, I see the heights, that guy's the tallest.
|
||||
This woman was the tallest, whatever the case may be.
|
||||
If I had 1,000 people on that list and you asked me to do the same thing, well, that's
|
||||
going to take me a little bit more time, isn't it?
|
||||
I'm going to have to go through page by page.
|
||||
I'm going to have to point to the screen and go, okay, right now this guy is six foot,
|
||||
one, and let me go, there's nobody, oh, here's how many six foot, three, that's the tallest,
|
||||
now I have to keep going and looking further and then I have to keep, and by the time I've
|
||||
looked through a thousand, it's taken a long time to get the information out of that data.
|
||||
So you can imagine when you get into millions and you ask the question, who is the tallest
|
||||
person, what is the average weight, things like that, it's not something you can do in your
|
||||
head and it's a little bit trickier, and obviously that's where computers come in, they
|
||||
can be very helpful with that.
|
||||
Even there are also limitations of there when you start talking about millions of records
|
||||
of data, you have to have an efficient way to read that data.
|
||||
I can have that text file for example, or a comma separated value file, and write a program
|
||||
that will go through and find the highest or the tallest person based on the height that
|
||||
I've recorded, the data that I have on people's heights.
|
||||
Well, if I write that for a very simple program to read and write from a text file which
|
||||
is basic programming of any language, one of the things you learn in any basic programming
|
||||
class, you'll realize that it's going to have to parse one record at a time, starting
|
||||
at the top, it's going to keep going through.
|
||||
You can write maybe some algorithms to help it out, but your data has to be sorted and
|
||||
there's a lot of other factors, but trying to find that proverbial needle in a haystack,
|
||||
even with a computer program, is not efficient because you have to keep reading and keep reading
|
||||
and store stuff and information, store data in working storage variables and in memory,
|
||||
and then keep looking through the rest of the data, and you have to look at all one million
|
||||
records, even though the second one, ironically, may have had the highest height or the information
|
||||
that you want to use.
|
||||
You still have to read all the rest of it, which is not the most efficient way to do that.
|
||||
Well, this is where something called a relational database, or actually, let's just take that,
|
||||
let's just say a database management system comes into play.
|
||||
A database management system helps organize all of that data to make collecting that information
|
||||
from that data simpler and easier.
|
||||
An example might be, let's see, maybe you wrote a backup software, backup system that
|
||||
backs up your hard drive and writes it as a file name and automates the whole thing
|
||||
and dates it and everything.
|
||||
Something that would maintain a list of that data and that you could easily look up, okay,
|
||||
here's the data, I want to go back to this backup file.
|
||||
Earlier I mentioned having a CD collection, if you had, there are custom, you know, anybody
|
||||
can put it into a spreadsheet of some kind, but there are also applications out there that
|
||||
are custom designed to store a lot more information about your CD collection and you can look
|
||||
stuff up more quickly and easily because they have something besides a text file behind
|
||||
and they actually have database engines, database management systems to help you read and write
|
||||
that data and there's many different theories by which these databases can operate and different
|
||||
methods of storing and accessing the data and the most common type of database is what
|
||||
I was just kind of referred to a minute ago and that is called an RGBMS or relational database
|
||||
management system and this is the most common type of database and when most people say
|
||||
database these days, this is what they're referring to.
|
||||
I understand what I said earlier, database is in a very simple collection of data, fundamentally
|
||||
that's all it is, but when people use the term database now and they say, oh, it's all
|
||||
in the database, it's stored in the database blah, blah, blah, blah, blah, they're usually
|
||||
talking about a relational database management system or some sort of database management
|
||||
system.
|
||||
Some examples of relational database management systems are oracles, probably the biggest
|
||||
one right now, Microsoft SQL Server.
|
||||
These are two of the big commercial products, DB2 is another one, but also included in
|
||||
that are open source and other freely available databases like mySQL, Postgres, Postgres SQL,
|
||||
database and too many more to go into, but any time you hear somebody refer to database
|
||||
they're usually referring to one of those.
|
||||
Now what a relational database management system will do is it basically takes all of your
|
||||
information and we'll get into more detail in some of this in future episodes of the
|
||||
HPR of the series, but suffice it to say their relational database management system gives
|
||||
you a lot of tools and a very powerful engine to store all of the data.
|
||||
Again, we're using very simple examples, a list of people walking in and out of them
|
||||
all, but what if someone else in another state altogether has a bunch of information that
|
||||
they've stored and then you buy a database from another company and you want to merge
|
||||
all that together and do some analysis to see if there's any information useful information
|
||||
out of all that data that's been collected, see if you can find something there that's
|
||||
useful.
|
||||
A relational database management system is a powerful program from maintaining that database
|
||||
and will allow you to go in there and run queries and you've heard the word query before
|
||||
you're querying the database or asking the database literally is what it means, but
|
||||
S-Q-L is a programming language to choose to interface with databases and help pull back
|
||||
information in a timely and efficient manner.
|
||||
Instead of, let's go back to what I said earlier about having a million records and you
|
||||
ask me to find the highest height out of all of those.
|
||||
Well, manually it would be tough to do.
|
||||
If I wrote a generic little C program, command line or something like that to find me the
|
||||
highest one, it's going to have to read every single record of data and if the second
|
||||
record had the highest data, it still has to read all of the others, assuming the highest
|
||||
height, still has to read all of the others and it's not efficient.
|
||||
A database management system has a lot of functionality built in that will make it much
|
||||
faster to read the same information because it's stored in a different format and it's
|
||||
easier to read and access that data.
|
||||
So that's probably a good place to stop with this episode.
|
||||
We're going to go into more detail about how those things are stored, talk about some
|
||||
concepts like indexes and foreign keys in general and some different ways of accessing
|
||||
databases and probably some examples along the way.
|
||||
But I think that's a good stopping point for today and hope that brought a lot of people
|
||||
up to speed and cleared up a few misconceptions about database terminology because it's important
|
||||
to understand those basics and those fundamentals because a lot of people will use the database
|
||||
and they don't realize why.
|
||||
Don't blindly buy Oracle for an application you're using or force it because maybe you
|
||||
learned Oracle in college or maybe you learned my SQL because of some open source app.
|
||||
You really may not need it.
|
||||
Sometimes it's perfectly fine to read and write from a text file or a comma separated
|
||||
value file or an XML file.
|
||||
Sometimes you don't need a big database engine.
|
||||
Sometimes you may be using a text file when you should be using a big database engine
|
||||
or some sort of database engine because it will make your program more efficient and
|
||||
faster.
|
||||
So understanding all that and keep that in mind that will help you make decisions in future
|
||||
projects of whether you need a database, what type you may need, what size and if it's
|
||||
really going to be worth your while to do so.
|
||||
So tune in for future episodes in this many series.
|
||||
You can always find those on hackerpublicradio.org and if you have any questions you can find the
|
||||
contact information on the site and I look forward to seeing you guys in the future episode.
|
||||
Thank you for listening to hackerpublicradio.htl-sponsored by carrow.net so head on over to
|
||||
the C-A-R-O-L-E-P for all your personal needs.
|
||||
419
hpr_transcripts/hpr0006.txt
Normal file
419
hpr_transcripts/hpr0006.txt
Normal file
@@ -0,0 +1,419 @@
|
||||
Episode: 6
|
||||
Title: HPR0006: Part 15 Broadcasting
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0006/hpr0006.mp3
|
||||
Transcribed: 2025-10-07 10:14:14
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
You are turned into 16 to 80 AM, the Ocho.
|
||||
The North County's latest Mark 15 radio station.
|
||||
The Ocho is technology 24 hours a day fully automated.
|
||||
The Ocho is music.
|
||||
Music that you've never heard that you would like to hear.
|
||||
The Ocho is an information.
|
||||
Information news, whether gas report, the Ocho is fired.
|
||||
It is fine.
|
||||
Hello!
|
||||
Hello!
|
||||
This is Dawson Man.
|
||||
And Zach.
|
||||
And we're the Packest Nifers.
|
||||
And you're listening to Hacker Public Radio.
|
||||
So, yeah, I guess this is our first edition of Hacker Public Radio we're putting on.
|
||||
I think we're going to talk about part 15 broadcasting.
|
||||
Non-licensed broadcasting, basically.
|
||||
Licensed free.
|
||||
Yes.
|
||||
Sticked by the power rules and get all the equipment you need and then pump up the volume.
|
||||
Yes.
|
||||
So, okay.
|
||||
So, I guess the first thing question is what is part 15?
|
||||
And if you're ever seeing pump up the volume, that's not really has anything to do with part 15.
|
||||
Yeah, there's nothing to do with it.
|
||||
I just wanted to make the reference because it's not as glamorous or as exciting.
|
||||
But it's still just as fun as Christians later.
|
||||
Happy Harry Hardon.
|
||||
No.
|
||||
So, yeah.
|
||||
So, part 15 is the part of the US federal code that governs our radio wave power and emissions and such that allows you to,
|
||||
part 15 is what allows you to use a wireless device without a license, like say cordless phone or things like that.
|
||||
You know, your little FM transmitter from your iPod, your car stereo, that's part 15.
|
||||
Also, governs the RF output on your VCR.
|
||||
Yes.
|
||||
Yes, things of that nature.
|
||||
Or your DVD player, rather.
|
||||
Yes.
|
||||
Jump into the current decade.
|
||||
So, yeah, yeah.
|
||||
So, anything that uses electricity creates some RF noise, but it has to be contained in a certain way and has to meet certain guidelines.
|
||||
Only certain things are allowed to actually emit the RF and enough for other people to pick up.
|
||||
And there's some special guidelines here for part 15 AM broadcasting, which basically lets you get a half mile to a mile away, basically.
|
||||
We've had some experience this summer.
|
||||
We set up our own station for about nine months or so.
|
||||
Yeah.
|
||||
It was definitely a good project to see exactly how far you could get, how advanced you could get using the bare minimum, basically as much as you could possibly do on the AM frequency without needing a license or any other special permits or FCC tracking.
|
||||
There's also guidelines as to what kind of antenna you can use there.
|
||||
And we'll get into that in a little bit.
|
||||
Because you can do a lot with your antenna to make your signal get further, but they severely limit that to make sure that you're not getting across the counting with your part 15 unlicensed rig.
|
||||
Because you don't want to be dominating a channel that the FCC could be making tens of thousands of dollars on to another bigger company.
|
||||
So I guess the first thing we're going to, well the second thing I guess we'll dive into is why would you want to get into this?
|
||||
I don't know, a couple of different reasons is like, you know, for support of your community?
|
||||
Yeah, I've seen high schools and I've seen churches use these local, basically campus-only radio stations that are for the immediate area.
|
||||
Or some kind of small, maybe a trailer community, I've seen them used to promote community awareness and current events and things like that.
|
||||
Yeah, and another place that's popular, the road signs that you see on the side of the highway or the interstate that tell you to tune into such and such, you know, 5 30 AM for news and traffic updates.
|
||||
Sometimes local municipalities will run those.
|
||||
And that's actually that falls under a slightly different section of the rules because they can run a little bit higher power with those.
|
||||
Still pretty local, you're only talking, you know, 5 miles range or something with something like that.
|
||||
Another area in which you can use part 15 broadcasts, especially mainly radios, like for specific events, like I've seen special races, stuff like that.
|
||||
They could be doing commentary or stuff over a low frequency, maybe something that's having like a row of speakers or maybe a band, they could be re-broadcasting out for the parking lot or something over a low power frequency.
|
||||
Yeah, yeah.
|
||||
So specific events, stuff for your community, you know, traffic updates.
|
||||
And then also that the main reason that most people get into it is just for fun, I think.
|
||||
That's definitely why we got into it.
|
||||
But there's other aspects of playing to that.
|
||||
We wanted to, you know, provide some type of community service, you know.
|
||||
And there's not really no variety or profit unless you're going to be saying things you're not allowed to say and you're going to be blackmailing people over it.
|
||||
Unfortunately, I don't think you can really get away with it that long and under part 15 rules, you know, you wouldn't have that large of an audience.
|
||||
Yeah, yeah.
|
||||
So, you know, a lot of times I guess we'll move into transmitters and stuff, you know.
|
||||
There's a couple different transmitters and your transmitter and your tenor set up governs how much range you have.
|
||||
And they'll advertise you can get two to four miles.
|
||||
Yeah, right.
|
||||
If you've got a lot of antenna experience, you might be able to cram, you know, two miles.
|
||||
And you live on a mountain?
|
||||
Yes.
|
||||
So the transmitter we went with was you get these things as kits.
|
||||
Well, you don't have to.
|
||||
The one we got comes as a kit.
|
||||
It's AMD 3000 by SS Tran.
|
||||
100 bucks, you put it together yourself, you know, two hours one evening, four hours, depending on your soldering skills.
|
||||
And it was, I found it to be a super easy kit to assemble.
|
||||
The directions are top notch.
|
||||
So if you're kind of not so sure, you can do some kit electronic assembly soldering.
|
||||
But you're not sure if you want to do like an actual radio versus like a little dice game or something that you've done in the past.
|
||||
This is a very excellent kit to assemble.
|
||||
The directions are top notch.
|
||||
You know, the guy is easy to work with if you have trouble.
|
||||
The guy that runs the company that sells these.
|
||||
Other transmitters out there.
|
||||
There's of course the Ramsey kits, Ramsey electronic sells some AM transmitter kits.
|
||||
If you have one, you can play with it.
|
||||
But from one, everything I've read, the AMD 3000 is a much better kit for the same price.
|
||||
It has a built-in compression, modulation and gain.
|
||||
You might not know what those things are immediately, but you can play with them.
|
||||
And you'll understand why those things are important.
|
||||
The other, the top of the line radio for AM, part 15 AM broadcasting is called the Range Master.
|
||||
However, I'm not really sure where the market for this is.
|
||||
They try to sell it as, you know, it's a pre-assembled kit.
|
||||
It's FCC certified and all this stuff.
|
||||
I'm sure it's a wonderful transmitter.
|
||||
But for 800 to $1,000 for 100 milliwatt transmitter,
|
||||
I just, you've got to have a lot of money to be able to throw away at your hobby if you can afford one of those.
|
||||
If you're able to actually turn your part 15 station into a profit, you know,
|
||||
a for-profit company or something and you're selling advertisements and stuff,
|
||||
yeah, you might be able to justify one of those, but most hobby enthusiasts, you know,
|
||||
don't really have an interest in something like that.
|
||||
So I think we would heavily recommend the AMD 3000.
|
||||
So the next next step, the transmitters goes antennas.
|
||||
And if you're actually going to try to get some range with your transmitter kit,
|
||||
what you're going to want to do, you set up a mast in your backyard and you do what's called a whip and mast setup.
|
||||
You're going to build yourself a base loaded coil.
|
||||
It's basically a piece of PVC with wire wrapped around it.
|
||||
There's going to be directions on like a lot of different sites.
|
||||
The site that sells AMD 3000 has some really good directions on how to build the base loaded antenna.
|
||||
Your transmitter has to be attached to the base of the antenna.
|
||||
So you've got to actually have your transmitter in a weather proof enclosure mounted on the pole.
|
||||
And that's because you're limited to an antenna length of three meters for part 15 AM broadcasting.
|
||||
And as well as a hundred milliwatt output into your final stage.
|
||||
Now, the thing that's going to be, you've seen a socket and a steel legal star, you know,
|
||||
the antenna we've ever advertised doing, it's going to take a little work.
|
||||
It's not an exact science.
|
||||
The AMT, the S-Train website, has pre-users and directions on how to drill some holes
|
||||
and wires coming through and to seal it up really good.
|
||||
40 bucks on hard disk and hard disk and PVC.
|
||||
And then you just run your coax and your power openings.
|
||||
Your power for the plants.
|
||||
And I'll say that it will take a little bit of work if you have a friend that's a AM radio operator
|
||||
or someone else that has some experience with antennas and electronics.
|
||||
It'd be very good to help out with if you're good and you don't mind messing around with electronics at all.
|
||||
And it's really not a whole lot of electronics that involve, per se, to set up the antenna and get it tuned.
|
||||
But it will test your patience.
|
||||
And you know, just give it some time.
|
||||
Come back to it when you're ready to mess with it a second time, you know, whatever.
|
||||
I don't know. I'd probably spend maybe the course of like two months getting ours tuned
|
||||
where it would actually get, you know, a quarter mile.
|
||||
So, you know, fine.
|
||||
I think we got what a half mile from the transmitter.
|
||||
So a mile distance coverage.
|
||||
About a half.
|
||||
Yeah. So, well, a half mile in one inch direction.
|
||||
Oh, yeah.
|
||||
So, a mile total, maybe.
|
||||
Yeah. So, you know, it'll take some work and you need a good grounding rod.
|
||||
I'll get you, you know, self an eight foot grounding rod.
|
||||
All the directions are on the side and there's a lot of different help.
|
||||
And we'll have some links on the HPR site for...
|
||||
I will tell you that it is hard getting that grounding rod in.
|
||||
But it's even worse getting the grounding rod out.
|
||||
We tried to use a floor jack to pull it out because our station, Zach, Zach is moving
|
||||
and we had to take down the antenna here.
|
||||
So, we never did actually get it out of the canal.
|
||||
I think that's going to be under ownership of the new tenets.
|
||||
Hopefully they pay mind to it when they move the yard.
|
||||
A chopper stopper.
|
||||
Yeah, an eight foot grounding rod sticking three inches above the surface of the ground for the mowers.
|
||||
The mower loses.
|
||||
So, okay, so that's enough about antennas and stuff.
|
||||
So, the next stage, once you get the hardware down, that's when the real fun begins.
|
||||
And that's your station automation and the content.
|
||||
The first thing we use for automating the station, sure you can set up wind amp and with a playlist,
|
||||
but that's not really dynamic enough.
|
||||
If you want like weather and news and stuff to happen at specific times during the day,
|
||||
probably what you're going to end up with is a software package for when it was called Zera Radio.
|
||||
It's free, it's not open source, but it's free.
|
||||
It's a very, very dynamic piece of software.
|
||||
And we did a number of different things with it.
|
||||
What kind of music did we use?
|
||||
Oh, we used a whole mix of stuff.
|
||||
We used CID remixes.
|
||||
We used various techno.
|
||||
Other free licensed songs.
|
||||
What I enjoyed and had fun with is a great deal of original Esperanto music.
|
||||
And that's found various places on the internet.
|
||||
Because usually from unsigned people that have no problem with you putting their music online
|
||||
or on the air and to share with everybody else because as they figure it, it's free advertisement.
|
||||
Yep, yep.
|
||||
So, you know, I'm definitely a big fan of the CID remixes.
|
||||
And I think that there's a place called RKO or remix.quad.org.
|
||||
And we used most of their archives.
|
||||
We had about six months of music without repeats.
|
||||
The other good place to look online is her for clocked remixes.
|
||||
They've got some good songs also.
|
||||
And a lot of NES songs and game remixes for many of us.
|
||||
And I do urge people unless it's stated.
|
||||
Don't play the guessing game.
|
||||
Actually, email the artists of the song.
|
||||
The little extra work really pays off because they'll more than likely be.
|
||||
Sure, yeah, use my song here some more.
|
||||
And they'll give you a lot more music than you could have ever asked for.
|
||||
And another thing that I had a lot of fun with as far as content.
|
||||
There's a little site out on the internet called gasbuddy.com.
|
||||
And the gist of it is you go to the website.
|
||||
And as you drive on your way to work, on your way home from work.
|
||||
You see the gas prices, all the gas stations as you pass.
|
||||
So you write them down.
|
||||
You log onto the website with a free account.
|
||||
And you update the site with the gas prices from around your town.
|
||||
And everybody does this.
|
||||
So you end up with a pretty reasonable listing of gas prices around town on this website.
|
||||
So I've got a script that I wrote that downloads all this information.
|
||||
And then performs a text to speech on it.
|
||||
Now, of course, they post the data as image files.
|
||||
You have to do a little OCR there to get it into text and then you can read it.
|
||||
So I had a pretty, pretty robust script that would read.
|
||||
And it would mix in different comments and stuff.
|
||||
So it wasn't just a static, same exact thing said every day.
|
||||
And the next thing, of course, is reading RSS feeds for slash dot,
|
||||
AP news, Russia today, and whatever you want like that.
|
||||
So you have your morning ADM news for people.
|
||||
You get your tech news.
|
||||
You've got some more less tech-centric news with the AP world news and stuff.
|
||||
I also would also do the current events calendar for our city website.
|
||||
They had a eGov package and they would put news and stuff.
|
||||
So it would just pull their page and read the current news for that week,
|
||||
the events on the town calendar.
|
||||
Gosh, I think I even had some more stuff.
|
||||
I would do weather updates.
|
||||
I was reading weather.com's news, although I'd rather switch to weather.gov
|
||||
and get the data in a more static, better format.
|
||||
The last thing that I was working on, I didn't have time to finish this before we took the station down,
|
||||
was I found someone on an IBM site had a couple of purl scripts that would read
|
||||
weather.gov radar image maps.
|
||||
It would actually be a couple of purl scripts that would read for a set of coordinates.
|
||||
You could tell if there was rain over a specific set of coordinates.
|
||||
So I was going to use this as a...
|
||||
His scripts were set up to email you when weather was bad,
|
||||
weather was approaching your location and when it was directly over and stuff.
|
||||
So I was going to turn this into an automated weatherman and have it reading
|
||||
a current weather situation for our one-mile radius.
|
||||
It is now raining in this one-mile area, although I think our users would have seen it at that moment.
|
||||
Yeah, but it was a cool feature nonetheless.
|
||||
So someday when we get the Ocho back up on the air, we will have weather updates as well.
|
||||
And the last thing I was trying to do was tie it in to the emergency alert system.
|
||||
And there are a couple of different ways to do that.
|
||||
I wanted to tie in actually a weather radio and have it be able to switch the audio feed over when storm,
|
||||
when there is emergency situation for our locality.
|
||||
It may end up probably it would be easier to get the information off the Internet
|
||||
and I started trying to find that.
|
||||
But anyway, so if there is a tornado, people would still find out about that
|
||||
even though they are listening to your little AM station rather than a big commercial outlet.
|
||||
So a lot of the fun that we had was on the station automation instead.
|
||||
There are other things that you can do such as bumpers and tags for your show
|
||||
that you can really spend a lot of time and have a lot of fun with.
|
||||
I know that is what I had the most fun with was getting a firing up cool edit pro
|
||||
and making just a whole slew of commercial station identification tags
|
||||
show promotional bumpers and just other weird things that could be played on there.
|
||||
It really gives a personal touch to your station.
|
||||
And you can have a pretty professional persona with a pretty unprofessional setup.
|
||||
And I will also go in of course it is a lot more fun I think to actually make your own bumpers
|
||||
and jingles and stuff.
|
||||
However, you can actually go and all the stuff that you hear on your local radio station.
|
||||
All those voice actors can have websites and you can go and for 30 or 40 bucks
|
||||
you can buy your own tag and they will do all the soundscaping and everything
|
||||
and make it sound just like a professional station if you want.
|
||||
If you want to buy two or three of those commercials at 30 or 40 bucks a pop
|
||||
but it is a lot more fun I think to make your own if you can be creative.
|
||||
I guess the next last thing I guess is some of the lore of you versus the man,
|
||||
the man being the FCC.
|
||||
This is the point where you get your inverter, your AM transmitter
|
||||
and your computer and you ride around in your Jeep and run away from the box trucks
|
||||
all at 200mW.
|
||||
If you are going to be running from the MIA you will be running over power.
|
||||
Yes, about 200mW.
|
||||
100mW is the legal limit for a part 15 but yeah.
|
||||
Once you hit that 2 mile mark all hell breaks loose and you have little yellow tracks after you.
|
||||
So realistically the only time that the FCC is going to care about your rig is if someone complains.
|
||||
The FCC only responds to complaints.
|
||||
How do you get a complaint against you?
|
||||
Well that is by either a running or stomping on another channel,
|
||||
another frequency that someone's already got a station on which is a bad idea anyway
|
||||
because that's going to kill your range.
|
||||
You want a station that a pre-selected frequency where there are no stations that you can pick up
|
||||
or at least the frequency with the fewest stations that you can hear because there is pretty much no
|
||||
completely empty frequencies anymore.
|
||||
Even though they are outside your range, you can still hear that Spanish station in the background or something.
|
||||
We have had experiences with that although we had set up and were enjoying our frequency immensely
|
||||
and then come to find out what Chicago or somewhere we had a radio Disney that sprouted up.
|
||||
And so we were constantly doing battle with Mickey Mouse and his crew of thugs.
|
||||
But I think that will subside now with the move and finding a new place for the radio station.
|
||||
Oh what was the other thing I was going to bring up?
|
||||
Well Zach thinks about that interference at sucks, your range is going to change day to day.
|
||||
And another way that you get complaints is just having generally offensive stuff on your station.
|
||||
You got to remember even though you're underneath, you know, you're under the requirements for a permit for the FCC,
|
||||
you are not above the FCC guidelines in their code of decency and things like that.
|
||||
So you need to be sure that you pre-select and that you pre-list into stuff that you're just putting out of the air
|
||||
because you don't need any soccer moms coming and finding their kids listening to something
|
||||
they're a little AM radio that they didn't want them to hear.
|
||||
And it's like if you've got a station that's dedicated to overthrowing the government,
|
||||
that will get you more attention than you want.
|
||||
If you're doing that, you don't even care about being part 15 legal anyway.
|
||||
So we'll get a better transmitter.
|
||||
Again, more other things to get you noticed.
|
||||
If you set your rig up on a station that's already, a frequency that's already got a main station there,
|
||||
well the other thing is if you do that unintentionally and that's where harmonics come into play.
|
||||
Harmonic is a multiple of your existing frequencies.
|
||||
So what you're going to want to do is have a scanner available.
|
||||
And let's say you set up on, you know, like our channel was 1680 AM, that's 1.68 megahertz
|
||||
and you want to multiply that times 2, I don't know what that is off hand,
|
||||
but then you want to tune your scanner into that frequency and see can I pick up my station there.
|
||||
And then multiply your base frequency times 3.
|
||||
And then tune your scanner into that channel and listen there.
|
||||
Can you hear your station on that frequency?
|
||||
And that's why that's where pirates really get themselves into trouble
|
||||
because they don't really understand or they don't know about what they're stomping on people outside
|
||||
of their, you know, the broadcast band.
|
||||
Like if you're doing a FM station and let's say you're, you know, you're 100 megahertz
|
||||
and you've got a harmonic at 200 megahertz, well that's into the air band.
|
||||
That's actually above the air band, but that's not a frequency that you want to be messing with.
|
||||
Especially if you get into the, you start bumping up against ham operators
|
||||
and you're getting into a ham band, they will track you down quickly and with high prejudice.
|
||||
You know, the only thing that makes angry old men even angrier is not when all the food's gone at the buffet.
|
||||
It's when you're stomping all over their ham frequencies.
|
||||
Don't do it.
|
||||
Yeah, so, you know, harmonics that's something to watch for, get yourself a scanner,
|
||||
multiply your frequency by 2, by 3, by 4, by 5, check up to the fifth harmonic, you know.
|
||||
Also, just tune around your existing channel like, you know, 1680 to down to 1670, 1650
|
||||
and see how much splatter you're getting around the existing, your main frequency.
|
||||
And see how far away you're getting that splatter.
|
||||
If you're getting a little bit of splatter right next to the antenna, you know,
|
||||
where you can pick up your station up on, you know, several kilohertz down from where you're broadcasting.
|
||||
Yeah, it's not too bad.
|
||||
As long as you can't pick it up very far away, you know, with a regular receiver, hopefully you'll be okay.
|
||||
And if it's a regular kit, you shouldn't have, you know, too much trouble if you've got a proper operating transmitter kit.
|
||||
Also, another thing to get into is state, state and a few bumpers here and there that you are a part 15 radio station.
|
||||
Maybe don't go and need not to be doing this every five minutes or something.
|
||||
Maybe one or two times in the middle of the night and early in the morning.
|
||||
You know, state that you're a part 15 radio station.
|
||||
Maybe even quote the section of the law that allows you to be there.
|
||||
Don't give people any reason to think that you are a pirate if you're just doing part 15 stuff.
|
||||
And I'll pretty much leave you alone.
|
||||
You know, the sound, like, professionality in the sound of your station also plays a key role.
|
||||
Because if Joe blow down the road that just likes to call the feds just because, you know, here's you on there.
|
||||
And, you know, he thinks that there is just a couple of kids making noise and this, that and the other.
|
||||
Then he could call and he could have somebody harass you.
|
||||
But if it actually sounds like a legitimate station and that really has this stuff together, it'll deeter him from saying anything because it's probably not a fight that he wants to pick.
|
||||
Yeah, yeah, you know, and remember, you know, you're having fun, but it's cool to be a positive contributor to your community also.
|
||||
I know I really wanted to run a lot of bin rev and other podcasts and stuff, but quite frankly, that wasn't going to be possible.
|
||||
You know, a lot of f-bombs dropped and stuff and that's fine.
|
||||
That's the time to censor it for part 15, yes.
|
||||
Shame on you dirty birds.
|
||||
So, you know, that's that's some a lot of the considerations trying to be legitimate and being a good station, you know, and all that.
|
||||
So again, you know, the FCC, they're only going to come after you if either some type of complaint against you and that means either a you've got content that is somehow offensive to someone or be your, you're on a frequency that you're not supposed to be on or, or the extra options, you know, if you're actually even accidentally running an antenna.
|
||||
That's too too efficient, which is a basically either it's too high or it's too long or you're running too much output power, but we're assuming you're trying to be compliant with part 15 here.
|
||||
So, as long as you're within all those things, you really shouldn't have any problems as far as legal repercussions.
|
||||
Again, the FCC, they're really, if they do come knocking on your door, it all depends on your demeanor how they're going to react.
|
||||
If you're trying to be legitimate, they'll recognize that technically they can claim your transmitter and everything it's attached to, which is your house and they can be real heavy handed.
|
||||
However, generally reading a lot of the enforcement and stuff, as long as you're trying to be legitimate and you immediately reply to their letters and stuff, you're probably, you're not going to have any serious fines or repercussions, you know.
|
||||
You're attempting to be legitimate, you're attempting to fall within the guidelines.
|
||||
If they tell you to turn your system off, you don't have a lot of choice with that at that point, but you can comply with that and then try to come up with another way to be compliant with the rig and still go and be on the air.
|
||||
Again, as long as you're trying to work with them, trying to be a positive influence, they'll definitely recognize that I think and play a part in how they respond if there are complaints.
|
||||
I think that pretty much is the gist of part 15 broadcast and what you can do with the technology and the laws at hand.
|
||||
I don't know, we might come up with some more to talk about next time.
|
||||
There are other types of low power broadcasting. The reason why we went with part 15 AM is because that's really the only way to be legitimate and get enough distance to get more than just your house covered.
|
||||
Part 15 FM, basically the little iPod transmitter to your car radio is the most powerful as you can get.
|
||||
And that's just the way the law is broken out and that's because they don't want a lot of people being able to reach lots of other people without some type of licensing.
|
||||
Without some kind of governmental monitoring, they don't want you talking to anybody else.
|
||||
The other thing, television, that's the next frontier. Technically, if you're a ham radio operator, you can transmit a slow scan, which is basically a single frame pictures, back and forth over some higher UHF frequencies that your TV can pick up.
|
||||
However, that is again, that's a ham radio transmission that has to be part of a two-way conversation between two operators. It's not intended for broadcast.
|
||||
So in other words, you have to be responding to someone's goatsy with your tub girl.
|
||||
And obviously, technically, there's really no way to actually do low power TV broadcasting the way you would think of like a regular TV station.
|
||||
It's interesting that it's really not that hard. It looks like to get on the air with a transmitter, just surfing eBay TV transmitters, broadcast transmitters and stuff.
|
||||
If you've got a little bit of cash to splash around.
|
||||
The other alternative, if you really want to try to dance around part 15 rules and stuff, they do have UHF transmitters for, let's say, sharing a video source from one satellite box to another TV in your home.
|
||||
That would be a good place to start. It's basically just a little transmitter with a couple click buttons in the front to choose your station.
|
||||
You could possibly crack the top open and see what could be done with the antenna setup, things like that for them that's deviating from the part 15 design of it.
|
||||
But it's still keeping it at that power.
|
||||
And again, like 2.4 gigahertz, that's why Wi-Fi lands, wireless and 2.4 gigahertz cordless phones.
|
||||
That's another band that's allowed to transmit at a little bit higher power than other frequencies without a license.
|
||||
And so that's why they've got the little Zach's talking about the little AV transmitters. You can send audio and video with those on reach your local community with those.
|
||||
They have to have a special receiver unit. Just the next 10 receiver, you know, to receive that.
|
||||
Yeah, I think we've nailed about everything on that we can think of a talk about.
|
||||
Yeah, I think that's about it. You'll have to look for more episodes, maybe if we decide to venture a little into video transmission.
|
||||
We'll definitely have more episodes in regards to that.
|
||||
Yep, yep. All right. Do you have any words for the wires go to?
|
||||
Don't let your means fan.
|
||||
So, all right. I guess I'm Dossman.
|
||||
I'm Zach.
|
||||
And we're the packets niffers. And this is our first edition of Hacker Public Radio.
|
||||
And I guess we're signing off.
|
||||
Yes, have a good day, good night, and God bless. Don't get arrested.
|
||||
We'll leave you with some of our bumpers for our station, the Ocho.
|
||||
Every day, 8 a.m. and 12 noon, the Ocho presents the latest slashed-out headlines. World National News from the Associated Press.
|
||||
News from Russia Day. And upcoming events for the City of Bloomington, only on 16 a.m.
|
||||
The Espranto Music Out.
|
||||
In the mornings, only on 16 a.m. the Ocho.
|
||||
You're listening to the 16 music remix, only on 16 a.m. the Ocho.
|
||||
The people have spoken and they want their means.
|
||||
16 a.m. presents news brought to you by Russian Today.com.
|
||||
You're listening to the 16 a.m. Ocho.
|
||||
16 a.m. the Ocho.
|
||||
News and War Station.
|
||||
Hello and welcome to the Glass Republic for Sunday, January 6, 2008, generated at 8 p.m., only on 16 a.m. the Ocho.
|
||||
Is it that land, the room is standing still, but you are still spinning? Let's get spotted.
|
||||
Glass prices are subject to change, and are not guaranteed for accuracy.
|
||||
At Speedway located at 3585, West Stable 46 and North Smith, like the prices, $3.09.
|
||||
At Speedway located at 3000 and 21 East St, and Kingston Drive south the prices, $3.12.
|
||||
At Speedway located at 2700 North Walnut Street, near suburban lane the prices, $3.12.
|
||||
At Speedway located at 503, South College Mall Road, and East Second Street, the prices, $3.12.
|
||||
At Speedway located at 3,939 West St, and South Curry Pike the prices, $3.17.
|
||||
At Shell located at 2650 East St, and South College Mall Road the prices, $3.18.
|
||||
At BP located at 7,314 North Walnut Road, and Stable 37 the prices, $3.19.
|
||||
That is the Gas Repo, for Sunday, January 6th, 2000 and 8th.
|
||||
Tune of the hour and hour, for the latest gas prices, from around town only in 1680 A.M., virtue.
|
||||
I would like to send shout outs, to Indiana Gas Prices.com, my homeboy lamestore roads, for my OS, image magic and go see L, for my character recognition, and festival for my lovely voice.
|
||||
Please, silly gas body, or see others for kids.
|
||||
Thank you for listening to Hector Public Radio.
|
||||
This is Joe, sponsored by Garrow.net, so head on over to C, A, R, O, dot, N, E, T, for all your hopes and needs.
|
||||
Thank you.
|
||||
Thank you.
|
||||
86
hpr_transcripts/hpr0007.txt
Normal file
86
hpr_transcripts/hpr0007.txt
Normal file
@@ -0,0 +1,86 @@
|
||||
Episode: 7
|
||||
Title: HPR0007: Orwell Rolled over in his grave
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0007/hpr0007.mp3
|
||||
Transcribed: 2025-10-07 10:12:53
|
||||
|
||||
---
|
||||
|
||||
Let's dance!
|
||||
Hello and welcome to today's episode of Hacker Public Radio.
|
||||
I will be your host for today, Deep Geek.
|
||||
Over my several years I have enjoyed many rants while listening to the podcasts and the
|
||||
internet radio shows that we've come familiar with.
|
||||
And I hope you can imagine my surprise when I found a documentary that showed how
|
||||
the situation all these rants were about came about to be.
|
||||
I have enjoyed listening to the rants of dual about how the media has become a wasteland
|
||||
about how lousy clear channel communication stations are and how we should become the
|
||||
media.
|
||||
I've also enjoyed thanks rants about the corruption of our government in Washington and how bad
|
||||
the RIA and MPAR.
|
||||
I was searching through some bit torrent search engines to see if I could possibly find
|
||||
out about a documentary mentioned on binary revolution radio about George Orwell's life.
|
||||
But instead I found something else that I thought was so informative to us as Geeks
|
||||
and hackers and I found it only because it had Orwell in its title.
|
||||
So I want to give a detailed review of a film that documents the merging of the following
|
||||
elites in American society, the financial elite, the political elite, and the media elite.
|
||||
And the film I want to review for you today is called Orwell Roles in His Grave and came
|
||||
out in 2003.
|
||||
It was directed by Robert K. Papas and many notable people appeared in this documentary.
|
||||
There's Charles Lewis who is a former 60 minutes producer, Peter Mitchell Moore, a former
|
||||
editor of the New York Post, Professor Robert Mick Chasney, founder of mediareform.net.
|
||||
Michael Moore, which we all know as a documentary director and is also an author, a representative
|
||||
from Vermont, representative Bernie Sanders, U.S. congressman, Vincent Bugliosi, who's a legal
|
||||
scholar who successfully prosecuted Charles Manson and wrote the book The Betrayal of
|
||||
America.
|
||||
And I will go through several main points and also list several of the scandals that were
|
||||
documented by this film.
|
||||
Main points that the media is now a special interest, a lot like the tobacco and automotive lobbies,
|
||||
they function a lot like the Ministry of Truth in George Orwell's novel 1984, although
|
||||
it is enhanced by their usage of what we call valorization.
|
||||
Valorization is a term that refers to the fact that if enough people repeat the same
|
||||
lie enough times, people will believe them no matter what.
|
||||
Another main point is that the financial elite and the political elite have merged.
|
||||
Most of the powers that be has dropped to less than 25% of the American people trusting
|
||||
their government.
|
||||
This figure, this 25% is a third of the same figure at the height of our country's Vietnam
|
||||
war scandal.
|
||||
So this figure which is so low is the symptom or the problem that caused the symptom of
|
||||
people just refusing to vote, people feeling that they have no representation of Washington
|
||||
that they cannot have a voice in our government.
|
||||
That's because of this.
|
||||
The consolidation of the media, whether it be the thousands of radio stations or the hundreds
|
||||
of cable channels, does not represent a diversity of viewpoint because they are owned by the
|
||||
same small number, less than a dozen of media companies.
|
||||
That the media is the largest lobbyist in Washington and they also have a unique ability
|
||||
to sense with politicians at will.
|
||||
And also the media is owned by the wealthiest percentiles of our country.
|
||||
Conservatives and Republicans are funding think tanks which create a future, our country's
|
||||
future, right ring propagandists, let's have trouble saying that right ring propagandists.
|
||||
This constitutes an a form of ideological warfare against the American people.
|
||||
And this is where our interests should peak that the internet is being changed from open
|
||||
access to closed access.
|
||||
By the telcos, the cable and media interests.
|
||||
This from a movie in 2003 which successfully predicts the reasons that will be given
|
||||
to try to sell this to the American people.
|
||||
This has become known as the net neutrality debate.
|
||||
So this documentary, you know, it elucidates on those main points, but also shows those
|
||||
main points through several scandals of recent times that it documents.
|
||||
The scandals such as the Bush Brother Collusion to disenfranchise voters in Florida in 2000.
|
||||
The involvement of the Supreme Court justices to squelch all efforts of a fair vote count
|
||||
in Florida on behalf of a party which so often speaks of state rights.
|
||||
The October surprise to out present Jimmy Carter and replace him with the Republican president.
|
||||
Also documents another scandal how FCC regulations being changed against the will of the American
|
||||
people to allow for the mass purchases of radio stations by monopoly style companies such
|
||||
as clear channel communications.
|
||||
How legal bribes actually work for both FCC officials as well as congressmen and senators.
|
||||
Also the subsequent ability of senate organizations to financially punish those who publicly disagree
|
||||
with them.
|
||||
So I think this documentary is a fantastic documentary.
|
||||
I hope you all will try to rent a coffee or borrow a coffee from a library or perhaps even
|
||||
purchase a coffee to check out and enjoy.
|
||||
And that I hope this enhances your understanding of the world and which we live in.
|
||||
Today's geek tidbit, I promised you guys a little bit of poetry so I'm going to share
|
||||
with you a geek high coup written by Charlie Gibbs.
|
||||
Eris have occurred.
|
||||
We won't tell you where or why lazy programmers.
|
||||
Thank you and that concludes today's episode of Hacker Public Radio.
|
||||
226
hpr_transcripts/hpr0008.txt
Normal file
226
hpr_transcripts/hpr0008.txt
Normal file
@@ -0,0 +1,226 @@
|
||||
Episode: 8
|
||||
Title: HPR0008: Asus EeePC
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0008/hpr0008.mp3
|
||||
Transcribed: 2025-10-07 10:14:33
|
||||
|
||||
---
|
||||
|
||||
Music
|
||||
Welcome to Hacker Public Radio. This is an episode of Unknown Proportions since I
|
||||
do not have it pulled up and I can't tell you. But we got a special episode for
|
||||
you today either way. We have a special guest that would be Red and Threx, if I
|
||||
pronounced it correctly. Say hi. Today we'll be talking about the EEPC. Aces is
|
||||
little, ultramobile, not ultramobile PC. It is a complete fully functional laptop
|
||||
and we'll also be talking about its use with Backtrack 3 Beta. So Red, if you don't
|
||||
mind me calling it, you don't have the EEPC correct? Not yet. Not yet, but you're
|
||||
planning on getting it. Do you know the differences? We'll just go over the
|
||||
differences real quick and it might help you decide which one you want. They
|
||||
actually have four models out right now. The 4G in surf and galaxy, I'm sorry,
|
||||
the surf and I guess it's galaxy. There's two models and they're $50 different
|
||||
on the 4G. You get webcam, no webcam, carrying case, no carrying case, and I mean
|
||||
the carrying case is not that big of a deal. Yeah, whatever. So they also have the 8G
|
||||
and the 2G. The 2 4G's are 399 and 349. The 8G is 499 and the 2G is 299. And then
|
||||
what these G's are alluding to is the amount of solid-state disk drive or the
|
||||
only hard drive that it has, space that has available. So that's not very much
|
||||
when it comes to the size of drives out there today. But it's enough. They're solid-state
|
||||
aren't they? Exactly. And the great thing, there's one thing that everybody knows
|
||||
that solid-state is ultra-fast and low power. That's a lot of what the hype is
|
||||
about these things right now. But the thing that isn't really out there and isn't very
|
||||
well talked about is its durability. Like the EEPC is a tiny little laptop. But the
|
||||
great thing about it is that there are no moving parts. There's no optical drive,
|
||||
which is downfall in some aspects, but an up or a positive in others. It has, like
|
||||
I said, no optical drive. So what you're looking at is not a single moving part on this thing.
|
||||
That's great because if you're a road warrior, you're looking at
|
||||
Jocelyn's thing around in your backpack for days, like 20 days out of the month.
|
||||
Oh, right, right. You go through laptops like gravy.
|
||||
One of the recent movies that I saw featured a kid running around in all kinds of
|
||||
actions. He probably looked like he had something like the EEPC. But I was
|
||||
also kind of reminded about it from I think it was the $100 laptop project.
|
||||
Oh, the OMPC one laptop per child, OLPC one laptop per child.
|
||||
Oh, right. Right. Yeah. I guess I was supposed to be ultra durable too.
|
||||
Right. It's supposed to survive Africa.
|
||||
Right. Right.
|
||||
And the 4G. Oh, go ahead. I'm sorry.
|
||||
Well, it was just one of my concerns about the solid state drive is how easy it is for
|
||||
data to get corrupted on a solid state drive.
|
||||
You know, I don't know. I'll be honest. I don't know if that's an issue at all.
|
||||
Is that would there be a difference in the in the corruption ratio or how have
|
||||
you want to speak of it between solid state disc and regular hard disk?
|
||||
I mean, it doesn't really determine. It's not really determined on the head.
|
||||
What is it? Is it determined by the operating system, correct?
|
||||
I wouldn't be sure if it was a file system.
|
||||
No, it was just a rumor or something that I heard, but I'm not too positive on it.
|
||||
Okay. Well, after the show, I'll look into it and we'll include in the show notes.
|
||||
Let me write that down real quick.
|
||||
All right. So also today we'll be talking about Backtrack 3 Beta.
|
||||
And we talked a little bit before the show.
|
||||
You said that you tried Backtrack 2 quite extensively, but not had the chance for
|
||||
for Backtrack 3 yet.
|
||||
Yeah. I just haven't. I just haven't. I'll be. So yeah, I guess.
|
||||
So they released the beta and it is beta in two forms in the USB form and in ISO form, like always.
|
||||
The USB form is pretty cool. What you can do with it is plug in any USB stick that's a gig or larger into
|
||||
your Windows XP or Linux distro and it doesn't have to be XP, any Windows distro.
|
||||
And you run this BAT file or the shell script depending on if you're running Linux.
|
||||
And it'll install the Master Boot record. It'll install Backtrack.
|
||||
Well, it really doesn't install. It just edits the Master Boot record of the USB stick and has those two folders
|
||||
that are pushed or copied onto the USB stick.
|
||||
And that's it. And you run, and you boot to it and it works fantastically.
|
||||
Wow, that sounds pretty easy. You have to specify the drive letter in the boot file or...
|
||||
Whenever you run the script, it'll ask you for it. But normally it's just...
|
||||
What it'll default to is where it's being run from. So if you copy the two folders over first and then run it,
|
||||
it'll default to the USB stick that you currently have in. So you won't have to figure out what drive or HDHDCs, SDA, whatever it is.
|
||||
It pretty much does it all for you then.
|
||||
Yeah, it's pretty dubbing proof. I'm really happy with how it turned out and what they did with it.
|
||||
So how this all ties in with the EEPC is...
|
||||
The EEPC has a solid state risk, but it also has an SD card slot.
|
||||
And this SD card slot is SDHC, so you can put high capacity SD cards in there and run operating systems off of the SD card
|
||||
because they can boot directly to the SD card. So on my EEPC, and I have the 4G, the Galaxy, the Black 4G with the webcam, like everybody else.
|
||||
And I boot Backtrack 3 beta off of the SD card. I have XP on the 4G solid state just for testing because I am part of the...
|
||||
And I guess I have to get the plugs in now. But EEHackers.com group, and I'm doing some reviews and some testing out on this thing.
|
||||
But the cool thing is that Backtrack 3, I got word that they delayed the release of beta for one specific reason.
|
||||
And that was for the compatibility with the EEEPC. So they designed at the end stages of Backtrack 3 beta so that they designed Backtrack so that it would work with the EEEPC.
|
||||
And it really does. It works flawlessly. The resolution hits it perfect. And it's an odd resolution. It's 800 by 480 on the 7-inch screen.
|
||||
And it just comes up perfectly. The only thing I don't like about the distro at an in its current state is that it automatically connects to an access point that's open no matter what it's called.
|
||||
So it's good and bad in some cases where it will find an access point and get you internet access. So some people might like it. But I don't like to be connecting myself to everything as soon as I turn on my PC.
|
||||
There's no setting or anything to change that right now. Well, the USB version doesn't have a static, it has a static point of reference for settings. So whenever you, every time you boot, it's not different. It's not how you saved it the last time.
|
||||
It's Backtrack normal. It's like booting the live CD. So they're working on the installation portion now. I tried it and it didn't work so well for me.
|
||||
So that's partially why they're in beta. You know, you got to test things out. Make sure they work.
|
||||
That's a whole bunch of data to get all that stuff worked out. Right.
|
||||
So a couple of other cool things about the EPCs, other than instability, its battery life is amazing. It's rated to have a, let me see, let me pull up the stats real quick.
|
||||
It's rated to have a 3.5 hour battery life where it really is so much more. I had it going for probably five plus hours. And all I was doing was surfing the web. I wasn't pushing it hard.
|
||||
And it did amazing. It had like 20% battery life left when I turned this thing off. It was crazy.
|
||||
Well, I heard it was only going to have like two hours or is that like a different model.
|
||||
The 4G surf, the lower non webcam version and the 2G surf, that's at 399.
|
||||
Suppose we have a 2.8 hour battery life. I don't know why. And that's for an electrician to kind of explain.
|
||||
But battery must be stronger, bigger, better in the 4G galaxies and above. Can't tell you I have no idea why.
|
||||
Like you know, with a $50 difference, why go with the cheaper crappier lawn?
|
||||
Yeah, quite literally. I guess cost. I really don't, I don't see why you'd want it.
|
||||
I mean, some of the downfalls is one, the RAM also, supposedly according to EEuser.com's wiki and they got a great wiki.
|
||||
It says that the RAM slot on the 4G surf and the 2G surf looks like it's soldered on so you can't change it.
|
||||
So it's 512, no matter what you got. Whereas my 4G galaxy, I instantly upgraded it from 512 to get 2 gigs.
|
||||
Yeah, definitely. But that's amazing that your battery power still lasts that long, even with that much of an increase.
|
||||
Yeah, I have no idea, like I said, I have no idea how it does so well, but it does.
|
||||
Well, it might have something to do with the fall and sleep drive thing too.
|
||||
Yeah. I remember when I first heard about it, it was only supposed to be like 250 bucks or something like that.
|
||||
Yeah. Well, the RAM's so much into this thing that 400 bucks is a steal for what it can do.
|
||||
It really is. It has 3 USB ports, it has a VGA out, so technically you could have this thing closed, have an extra monitor, keyboard and mouse and just use it as a desktop PC that runs.
|
||||
The only bad part is it's a 900 MHz Seller on M, ULV.
|
||||
But it doesn't run like a 900 MHz machine. I had a 900 MHz tablet. It's old piece of crap tablet at work.
|
||||
And this thing flies faster than it. I mean, tons faster.
|
||||
Oh, yeah. But the, the, the extra USB slots, because anybody tried running the OS off of like an external drive.
|
||||
Yes. The way I installed Backtrack on to the SD card, since I didn't, it comes with Xandros, which is a fully functional Linux distro as soon as you.
|
||||
Get it out of easy mode or whatever it's called. They have an advanced mode that it's, that there's plenty of wiki articles or, or, or tutorials on how to get it out of.
|
||||
But I wanted to put XP on there so I could use it for war. Other means, the various means.
|
||||
So, what was I saying? I just lost my train of thought. So I got XP on the, on the solid status.
|
||||
But before I did, I had no other way of getting Backtrack on my SD card because I didn't have a high capacity slot anywhere.
|
||||
I didn't have one just lying around that I could plug into a computer or anything.
|
||||
Oh, right.
|
||||
So what I did was I installed Backtrack 3 Beta on my USB stick, my one gig USB stick, plugged it in, booted to it, then had the SD card slot plugged in there.
|
||||
Copy all the files over, ran the USB, the shell script this time because it works within Linux.
|
||||
Run the shell script this time and it installed to the SD card just fine. It runs perfectly.
|
||||
Oh, that's good.
|
||||
So how does it feel there?
|
||||
XP runs all right. The default install of XP cuts close because it's a two gig install and it has in it defaults to having two hundred percent of the paging file of your RAM.
|
||||
So I had two gigs of RAM so it took up all four gigs of my of my solid state disk which made it boot like dog slow.
|
||||
I'm talking just freaking slow.
|
||||
And all I did was set the paging file just no paging file because I didn't really need it on this PC with two gigs of RAM in there.
|
||||
I'm not going to be running wow and freaking Thunderbird and Firefox all at the same time taking up all that RAM.
|
||||
So I don't really need a paging file.
|
||||
Once I did that it freed up the two gigs. I had two gigs of extra space. I also had the extra space on the SD card because installing Backtrack on the SD card didn't reformat it.
|
||||
I had it in Fat 32. It stayed in Fat 32. I can still boot to it in Fat 32.
|
||||
So I used that extra space that I had from the seven gigs left from the SD card as extra space on XP.
|
||||
So I threw Firefox portable on there. I threw a couple other programs on there.
|
||||
And now I have fully functional XP installed with Backtrack at my fingertips.
|
||||
And literally to take words out of the mouth of one of my buddies I used the Escape Key which is change boot preferences as my boot loader.
|
||||
If I want Backtrack I go down to the SD card. If I want freaking XP I just leave it going.
|
||||
So I don't really need to grow anymore.
|
||||
That's pretty cool. What applications did you use in Backtrack? Did you do any hard-core testing at all?
|
||||
Yeah and thanks for the segue actually. I was trying to get it over to it.
|
||||
There are so many absolutely crazy amount of applications in Backtrack 3 now.
|
||||
A couple of them that I'd like to touch on, particularly is Multigo.
|
||||
If you watch Hack 5 or are adamant with the news Multigo is evolution.
|
||||
And I did an episode on Hack 5 about evolution.
|
||||
And evolution for some reason had to change their name and called Patebra, the company who made evolution, changed it to Multigo.
|
||||
And what Multigo is is basically a information gathering tool that correlates data.
|
||||
So you search a user name and it takes all these transforms which are basically API calls to different websites and collects everything about that email address or a username or whatever you decide to put into Multigo.
|
||||
So then you can hop off of that. Yes, it's very powerful. It's amazing that they put it into Backtrack 3.
|
||||
Also, the only downfall is Multigo really needs a lot of desktop real estate.
|
||||
You really need to have that space and running it on the EPC is not as great.
|
||||
But you get that external resolution.
|
||||
Yeah, you just get that external video card or the external monitor and you're all set.
|
||||
A couple of the other ones I wanted to point out was FastTrack and in Guma.
|
||||
I don't know how to pronounce in Guma correctly, so I apologize if I'm doing it wrong.
|
||||
FastTrack. When I first tried out FastTrack I was actually looking for Metasploit framework 3.
|
||||
I accidentally went down to FastTrack and what it did was opened up a terminal.
|
||||
In this terminal I gave you a couple of options.
|
||||
FastTrack updates, external hacking and internal hacking.
|
||||
So I got instantly, instantly interested in what this actually does.
|
||||
So, in FastTrack updates, it's amazing what this thing does.
|
||||
And all it is, it has to be some kind of proscript.
|
||||
I'm not sure, or Python script or proscript or some kind of script.
|
||||
But it does some automated things that you wouldn't find in anything that costs less than 25 grand core impact.
|
||||
So, it updates Metasploit 3, it updates AircrackNG, it updates Kismet, it updates Millworm, it installs SlapGetGet, which is basically AppGet for Backtrack.
|
||||
So that's just one of the update features.
|
||||
When you go into external or internal hacking, you're looking at something called Metasploit AutoPone.
|
||||
And what Metasploit AutoPone is, it correlates and map with Metasploit and uses those together.
|
||||
If you have internal IDS, I'd recommend not ever trying this out because you'll pop on every single thing possible.
|
||||
And it's very loud.
|
||||
But it scans the network, whatever you point it at, it can be a single IP or network.
|
||||
And it uses EndMap to scan it, takes those XML outputs from EndMap, pushes it into Metasploit as data.
|
||||
Scans those boxes and those services, particularly for the exploits that are available for those services.
|
||||
It then opens a session so that you have a remote shell into them.
|
||||
Now, you run this on a whole network, it's going to take a while.
|
||||
But the cool thing is, it'll open those sessions and keep them open.
|
||||
And while it's doing the scan...
|
||||
Did you have a chance to test it on like a gigabit network?
|
||||
See, the EEPC doesn't have a gigabit ethernet port.
|
||||
I have not tried it on a laptop or PC that has a gigabit, but that is a point to make.
|
||||
I'll try that out.
|
||||
So while it's still scanning, and if there's a session that gets opened, you can connect to that session while the scan continues on.
|
||||
Tell me that isn't cool.
|
||||
That is really cool, but I know a lot of workplaces, like now, what I've seen lately,
|
||||
a lot of workplaces have Wi-Fi set up.
|
||||
So you must have had a chance to test out the Wi-Fi gigabit network.
|
||||
Instantly, that's the first thing anybody does whenever there's a new backtrack release.
|
||||
You got a crack wet.
|
||||
Of course.
|
||||
So the first thing I did was I did some war driving crack web on a 64-bit key, which was rather simple and fast.
|
||||
And you know, just got my feet wet with it.
|
||||
But it works wonderfully. The EPC has an atheros-based card, which does injection perfectly.
|
||||
And it's an all-inclusive hacking box, really.
|
||||
And you can take it around in a case that does not look like a laptop case.
|
||||
You can take it around in a purse if you wanted to.
|
||||
Well, if you surround that with binder.
|
||||
You can take it around in a binder and be having aircrack just have at it, really.
|
||||
If you write, I don't know if a fast track, let me look real quick, has an aircrack automatic aircrack.
|
||||
Let's see.
|
||||
Expectation not upon port scanning.
|
||||
No, it doesn't have it.
|
||||
I'm sure you could write a script that would find, well, Y-Crawl does it.
|
||||
You could run Y-Crawl during the whole thing.
|
||||
Y-Crawl will automatically crack web.
|
||||
I'm pretty sure it's around that three-bit.
|
||||
Yep, and Y-Crawl is in there, and fully functional, and backtrack three beta.
|
||||
Wow. So the data is a backtrack on every month.
|
||||
You talked about how the already created all the hardware works perfectly,
|
||||
and everything works nicely with it. That's awesome.
|
||||
Yeah, I am amazed at just how well they made backtrack three work on.
|
||||
Not only the EPC, I have some other hardware that it works well on as well.
|
||||
Some old hardware that backtrack two didn't work on.
|
||||
I'm sitting on an HP civilian DV9000.
|
||||
Oh, yeah, those DVs are pain in the ass.
|
||||
Yeah, getting the Wi-Fi card to work, and it was a really pain in the ass to try to figure out.
|
||||
Well, you got to try out backtrack three, see if it works out.
|
||||
Oh, totally.
|
||||
Alright, we're coming up on 27 minutes.
|
||||
So I'm going to wrap this up real quick.
|
||||
You got any questions about the EPC, or FastTrack, or Backtrack three?
|
||||
You can email me at www.muvicsatHack5.org, www.jd.muvicsatgmail.com, either or.
|
||||
You can also find me at room3602.com.
|
||||
Where can they find you?
|
||||
I'm usually hanging out at the EIC and VIN rev, and that's pretty much it.
|
||||
Alright, well, this is Fred Edtracks.
|
||||
Fred Edtracks, and this is Muvics signing out.
|
||||
Thanks for tuning in to Hacker Public Radio.
|
||||
You guys have a nice night.
|
||||
See you next time.
|
||||
415
hpr_transcripts/hpr0009.txt
Normal file
415
hpr_transcripts/hpr0009.txt
Normal file
@@ -0,0 +1,415 @@
|
||||
Episode: 9
|
||||
Title: HPR0009: This old Hack 4
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0009/hpr0009.mp3
|
||||
Transcribed: 2025-10-07 10:16:40
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
Welcome to another exciting edition of this old hack.
|
||||
This is Foxfire and you'll be listening to this old hack part 4.
|
||||
We skipped number 3 and that was the dumpster diving special.
|
||||
Now we're on episode 4 and let's see, first I know there's been some listener feedback
|
||||
concerning the lack of commentary in the show.
|
||||
I guess I'm supposed to explain how all this is supposed to work.
|
||||
Alright, this is Foxfire and I'm killing in for Adam.
|
||||
Welcome to episode 4 of this old hack.
|
||||
We're going to consider dumpster diving episode number 3 so we don't have to go back and edit the third part of the desktop hacking series.
|
||||
If you're not familiar with that series, it was started on twat tech last year sometime.
|
||||
This is the boring part of the show.
|
||||
According to listener feedback, we've not spent enough time actually explaining what is going on.
|
||||
Instead, just jumping into y'all holding my beer, I'm going to play with some power tools.
|
||||
We'll take a minute to explain this show to you.
|
||||
Current events, stair wood use, performance enhancing drugs.
|
||||
It used to be a day-bruth played baseball.
|
||||
The only performance enhancing drugs they had were hookers, booze, and cigars.
|
||||
So tonight in a memory of the old tradition, I've got beer and cigarettes.
|
||||
My home, it's enhancing drugs for the evening.
|
||||
Obviously, this show was pre-recorded.
|
||||
As a matter of fact, it's January, and the show was recorded back in, I don't know, fucking July.
|
||||
Sometime in the back of the summertime, it was like 105 degrees outside, and well, it was pretty fucking hot.
|
||||
Today it was actually in the 70s, and it's the first week of January, so it's kind of interesting.
|
||||
What does this have to do with hacking?
|
||||
Well, there's a switch involved, hackers like switches.
|
||||
I know you guys like switches.
|
||||
Otherwise, it comes down to the fact that everything's like a system.
|
||||
You got your electrical system, you got your electronics and your computers.
|
||||
You got mechanical systems, like hogs, gears, wheels, internal combustion engines, that kind of thing.
|
||||
Mechanical systems, electro-mechanical systems.
|
||||
In my opinion, hacking is not just a computer, and what you can do with it, or what you can do to it.
|
||||
It's also any kind of system, like social engineering, you're hacking people.
|
||||
So, what this has to do with hacking, it's analyzing and fixing a system.
|
||||
That's about it, really, and it's something I did, and I have recorded it because, well, what the fuck, why not?
|
||||
Back at this show being pre-recorded, and performance enhancing drugs that I'm taking tonight,
|
||||
we'll plan on recording a second part to this show.
|
||||
I'm going to work on a little project here, and it'll be the closing section of the this old hack podcast.
|
||||
Where I will play with boat torches while drinking beer.
|
||||
Y'all hold them up here, listen to this.
|
||||
Today, we're taking a break from the desk installation project.
|
||||
Still a little work outside with the well.
|
||||
Most of you people live in the city, and you've never had to work with the well before.
|
||||
It's not like what you see in the movies.
|
||||
There's not a giant hole in the ground, and I don't want the whole buckets of water up to the surface with the rope.
|
||||
Today, the diameter of the hole is, let's say, about six inches, but actually I can't see the whole lot.
|
||||
I can see as the top of the pump enclosure, but it's about six inches around, and there's some PVC pipe coming up.
|
||||
There's a motor.
|
||||
It's down inside the hole there, and there's a long hose that runs down.
|
||||
However, many hundreds of feet, they had to drill down to the water table there.
|
||||
So, there's a small hole, but like I said, there's a pump, and it comes.
|
||||
The process normally runs it to a pressure tank, and then there's a pressure switch.
|
||||
Now, what happens is the switch senses the pressure in the line, and if the pressure gets below a certain point, it causes the pump to run.
|
||||
So, this way, when you turn on the faucet in the house, the pressure tank keeps the pressure up until the pump starts running.
|
||||
And then the pump kicks on, and it runs until you turn the faucet off, and then it will shut off once the pressure in the tank has reached the appropriate level.
|
||||
And last year, about this time, I redid all of the plumbing inside of the well house, where I've got the pipes that run to the underground pipe from the pressure tank,
|
||||
and the pipe that runs to the water hose, and the spiket for the water hose, and the pipes that run from the pump to the pressure tank.
|
||||
For pretty much everything there was.
|
||||
Well, recently, the fitting that goes to the, so there's like an elbow that comes up out of the ground, makes a 90 degree angle, goes on for about six inches, and then makes another 90 degree angle back down.
|
||||
And that, where it goes back down, runs into the actual pipe that goes to the pressure tank.
|
||||
Well, the fitting, not the pipe itself, but the actual fitting, recently, ruptured to where it was spraying water everywhere in the well house here.
|
||||
So, I took a piece of thick saddle leather, and it's a vice-cribs, and made up kind of a clamp tarniquet kind of deal to keep it from spraying, because it makes the lack of pressure makes the pump run.
|
||||
Well, with it dripping instead of spraying, it maintains the pressure and doesn't waste a lot of water, and it wasn't a big deal.
|
||||
Well, recently the drip got worse, and there was probably about an inch of water in the bottom of the well house today, and my wife happened to notice it, and I was going to work on it anyway, so it was a good thing that she got me out of bed to work on it.
|
||||
What I've already done is I have broken the nipple off of the pipe going from the pump, and because it's glued in with plumbers glue, and there's no way I could, it's not threaded, it's all plastic.
|
||||
So, I had to break the nipple off, it goes to the black roll pipe, black roll pipe is flexible, black pipe, as opposed to the stiffer colored PVC that I've got to work with today.
|
||||
So, right now I'm just making sure that I know what I need, I've got a sample elbow, so I pretty much know what size of fitting I'm going to need.
|
||||
So, right now I'm getting ready to drive to town, and go to the supply store, and pick up the parts that I need.
|
||||
And it's only about, you know, 96, 98 degrees outside today, it's not as bad as it was a couple weeks ago when it was 105 degrees, not including the heat and disease, the heat index, and so I'm getting ready to go to town.
|
||||
So, that's all the project that I'm listening to, we're participating.
|
||||
Paul.com here, and I'm on the iPod, and I will have some vacation last week.
|
||||
Listen to the show, and I will happen to the security industry back when I get to beat down the car store.
|
||||
Ready?
|
||||
You want to go out and drive to town now?
|
||||
No, I'm not.
|
||||
It's a hard drive.
|
||||
Is that?
|
||||
I want to go out and drive.
|
||||
Probably about 45 people at 70, 45, I'm not sure.
|
||||
It gets a little high sometimes.
|
||||
It doesn't act right, just sometimes it doesn't shut off, but I can do it.
|
||||
I can do it as well.
|
||||
Yeah, I can do it as well.
|
||||
You know, at least 45 people are driving.
|
||||
That's what the switches are saying.
|
||||
45 people are driving.
|
||||
45 people are driving here.
|
||||
24 people are driving here.
|
||||
45 people are driving here.
|
||||
Where are you going?
|
||||
Where are you going?
|
||||
Where are you going?
|
||||
Yeah, I don't know how to put together.
|
||||
What's your problem?
|
||||
I think I'm going to have to go to the party.
|
||||
I've got a white PDC in the house.
|
||||
I don't know if I can bring this piece off.
|
||||
Bring it up and try it on my side.
|
||||
What else can we do?
|
||||
I don't know.
|
||||
You're worthless.
|
||||
Is it in the equipment or is it in the PDC pipe?
|
||||
It goes from the door to the elbow.
|
||||
Then it goes down to a piece.
|
||||
It's in here and it goes back up to a piece.
|
||||
It's actually the right door.
|
||||
Nice.
|
||||
And then, if it goes to something like that.
|
||||
Just, uh, wind what do you do?
|
||||
Just gotta build a base here.
|
||||
You're ready to keep your seat fit.
|
||||
If anyone has had something running,
|
||||
and a piece of wind up to the other one goes up
|
||||
to a piece in here.
|
||||
It goes up to a piece.
|
||||
1 liters of 10 size up the door.
|
||||
And, you know, to be safe.
|
||||
I gotta take something to do here.
|
||||
Yeah.
|
||||
You're a pretty missed, because whatever we got with it was worth it.
|
||||
It's still got a bit inside, but it's not that I have it.
|
||||
You have to get out too.
|
||||
That's going to be bad.
|
||||
Got it rough, because there's no way out there.
|
||||
Get that to stay in there.
|
||||
It's not the first.
|
||||
I know it went well to get something done not doing anything well.
|
||||
You don't know.
|
||||
You can't say I have 20 steps left because of you.
|
||||
Keep going, don't worry about what I've been doing.
|
||||
We have an hour and hour and a half today.
|
||||
That's on the Escort Tire.
|
||||
I've got a couple of categories to get stuffed together.
|
||||
Maybe you may spend this a lot of gold,
|
||||
You can see for the pressure back, the shoulders, the ultimate, for the pressure, you've got to pay me, say, yeah, but you can see it okay now.
|
||||
Take it out of there, I can see you guys later, I don't have to do it.
|
||||
Okay, as you just heard, that was a complete failure.
|
||||
Spend the last 15 minutes in the supply store here and nothing.
|
||||
So now I've got to go pick up my, uh, all my dad's truck.
|
||||
So I'm going to do that. I just noticed I've got a, well, I noticed earlier that there was a spider.
|
||||
Made a web in my pads and just see it in my car overnight.
|
||||
And, uh, you know, I figured 70, 75 miles an hour would have, uh, stepped his little ass right at the window.
|
||||
But, you know, that spider web's pretty, um, pretty tough stuff and he's still kicking it over here in there.
|
||||
And the pads and your seat, I had to fuck them up a little bit because he was put web over to the iPod there.
|
||||
I went to grab the iPod and kind of plucked everything up for him.
|
||||
But, anyway, that's it for now. I guess I'm going to get the truck.
|
||||
So, 115 and I've got, you know, no water at the house.
|
||||
And I've got a few hours before I have to get ready for my job.
|
||||
So, um, and it's in a good 45 minute drive to and from the auto park store.
|
||||
And I bought a bunch to open to the, uh, nearest other supply stores.
|
||||
So, that's an hour and a half drive, um, which we put me back at the house at quarter to three.
|
||||
So, I think I have to leave it for work before I sew it.
|
||||
And I get this done and I have to get it done.
|
||||
Yeah, you heard it coming out.
|
||||
What do I do for you?
|
||||
Well, you get a lot of things going on here and there and there.
|
||||
Okay, you have to do one that.
|
||||
Straighter is it an elbow or?
|
||||
Yeah, but it's a straight piece of bread.
|
||||
But like this?
|
||||
That's as you've got.
|
||||
Yeah.
|
||||
What did this break?
|
||||
Actually, it broke off in something that was actually two things.
|
||||
There's one more thing like a hex down.
|
||||
That's a little bit here.
|
||||
What is that?
|
||||
There's white PVC elbow.
|
||||
What you'll be here.
|
||||
Yeah, this is what's coming off of the, um, this is what's coming off the well.
|
||||
So, I need something that's moving around like this.
|
||||
It's going to fit in here.
|
||||
I'm also going to lift this down to that side.
|
||||
Okay.
|
||||
Now, here's this bit here.
|
||||
Now I need something that's going to, I can glue this in.
|
||||
Yeah, I need something I can glue in here that's going to be the...
|
||||
I don't have a car going though, I don't think.
|
||||
I think we're going to have to glue something in there.
|
||||
Because this will screw on too.
|
||||
No, that's kind of...
|
||||
No, just a little bit like that.
|
||||
What we don't have to do is, uh...
|
||||
This is going to be kind of complicated.
|
||||
Because we use it two different types of...
|
||||
Well, the one that was on there was kind of a nylon feel.
|
||||
It was white and nylon.
|
||||
Yeah.
|
||||
It's always there.
|
||||
But what do you got in here?
|
||||
That's just a couple of different things.
|
||||
It's like a white nylon feel.
|
||||
Yeah, like something like that.
|
||||
It's going to be like screwing...
|
||||
But now that she mentioned it, there's a piece of this...
|
||||
Um, great pipe that's smooth as we can glue that in.
|
||||
Maybe she's here something for her, right?
|
||||
I didn't see that.
|
||||
But I don't see any of that.
|
||||
That's not a car.
|
||||
Alright, this is nylon.
|
||||
It's the same size.
|
||||
It looks like it's robbed.
|
||||
And the other two are...
|
||||
This is really into that.
|
||||
Sure will.
|
||||
This is he is.
|
||||
Thank you very much.
|
||||
You're welcome.
|
||||
Fantastic.
|
||||
Alright, so this should be the last segment of this episode of this old hack.
|
||||
What you've missed off the air was me cutting the old elbow off of the...
|
||||
previous...
|
||||
cutting the previous elbow off of the pipe and trimming down the existing black roll pipe.
|
||||
And now...
|
||||
And I used a device called the pipe cutter, which is...
|
||||
It's like a demented C-clamp.
|
||||
It clamps on.
|
||||
The same method as a C-clamp.
|
||||
Only it's got a roller.
|
||||
It's got two rollers and a cutting disc.
|
||||
And you apply pressure.
|
||||
C-clamp fashion.
|
||||
And the rollers...
|
||||
I help it keep a track around the edge.
|
||||
While the cutting disc, of course, cuts into the plastic pipe there.
|
||||
And I think it's possible to use it on metal pipe.
|
||||
I don't know.
|
||||
I've not tried that yet.
|
||||
And now I'm just tightening up this little clamp on the PVC there on the roll pipe.
|
||||
And that should be it now.
|
||||
I had to get parts of the part at the hardware store and I got some glue.
|
||||
I think you guys heard all that.
|
||||
And...
|
||||
So...
|
||||
The part you missed was the...
|
||||
Glueing, which we glued it to.
|
||||
You apply liberally...
|
||||
The purple stuff, which is the cleaner primer for 15 seconds.
|
||||
And then...
|
||||
And a moment later, you apply the cement and stick it all together.
|
||||
And...
|
||||
I'll update on whether or not this is successful.
|
||||
It's supposed to sit for 24 to 48 hours.
|
||||
But...
|
||||
We really can't go with no water for that long.
|
||||
So we're going to try to do it in 12 hours since it's real hot and see what happens.
|
||||
At least if it does mess up on what I need to get...
|
||||
What I'm going to do tonight is I'm going to make a didgeridoo.
|
||||
First I've got to go find the stuff to make the didgeridoo.
|
||||
So...
|
||||
Dark out.
|
||||
I've got one of those flashlights that you have to shake up to make work.
|
||||
And I can just turn it on before I go walking around.
|
||||
Instead of shaking it and walking around in the dark.
|
||||
But I actually don't know how well this is going to work because...
|
||||
I've seen it done with campfires.
|
||||
I have never...
|
||||
I've seen it done with campfires in...
|
||||
I've seen it done with...
|
||||
Torches or...
|
||||
But I have never used a torch.
|
||||
And I've never made a didgeridoo before, but...
|
||||
There's the first time for everything and what's the worst that could happen?
|
||||
I could blow some shit up.
|
||||
Something you know.
|
||||
Okay, I've got my torch here and a bottle of gas.
|
||||
Let's see.
|
||||
It's dark, so of course.
|
||||
Let's see what the label says.
|
||||
Oh, the label fell off.
|
||||
So actually, it sounds like there's stuff in there.
|
||||
So I actually don't know.
|
||||
It's some kind of torch compound that people normally use for...
|
||||
soldering joints on pipes.
|
||||
And such.
|
||||
Speaking of pipes, I've got my pipe cutter here,
|
||||
which probably would have been faster for me just to grab it.
|
||||
That's awesome.
|
||||
I don't really care if it's a flush cutter nut.
|
||||
All I want is...
|
||||
I'm fucking chunk of pipe.
|
||||
I have a hexal handy.
|
||||
And now I know I saw some pipes over here.
|
||||
And the woods, earlier than day, that was going to be perfect.
|
||||
At least I thought it was going to be perfect.
|
||||
And...
|
||||
A, I need a better light.
|
||||
My mag light died.
|
||||
And I'm waiting until I can afford to get one of those LED mag lights.
|
||||
Now my dog thinks I'm going to attack her.
|
||||
I'm going to get attacked here.
|
||||
And my own dog, obviously.
|
||||
Not a good thing.
|
||||
It's great, you guys.
|
||||
All right.
|
||||
Well, this will cut me off a good chunk of this stuff.
|
||||
Yeah, that was a lot quicker than using the pipe cutter.
|
||||
Which is great for metal pipe because you can't just saw right through metal pipe.
|
||||
Now, against my better judgment, I'm going to smoke cigarettes, consume alcohol,
|
||||
and play with a blowtorch.
|
||||
And a large piece of glass to cover and check the insides.
|
||||
I'm telling you what, I'm going to live in inside of it.
|
||||
I'm going to take in some kind of gillian space, creatures inside of the house.
|
||||
I can't see through the goddamn thing.
|
||||
Okay, well, and what?
|
||||
It'd better just be okay.
|
||||
I'm going to get all my shit together here.
|
||||
Here it is.
|
||||
Got my stuff together.
|
||||
The first thing I want to do is crack a beer.
|
||||
Take a shot.
|
||||
And see if I can't refine my lighter.
|
||||
And I'm going to go test to see if I can even make this blowtorch machine.
|
||||
I don't know if there's any kind of safety precautions.
|
||||
I'm supposed to be taken here.
|
||||
I'll never handle this stuff before.
|
||||
I'm going to empty bottle there.
|
||||
I'm just going to chuck that out the back door.
|
||||
I've got what could possibly be.
|
||||
A full bottle of gas here.
|
||||
And I'm going to attempt to attach it.
|
||||
Here, let's see.
|
||||
Well, it does in fact have gas in it.
|
||||
Now, I'm going to turn it into gas on and attempt to light it with a lighter and see what happens.
|
||||
Okay, well, I have no torch action.
|
||||
Good, actually.
|
||||
Now that's going to be established.
|
||||
I'm going to go take my oversized length of roll pipe, which roll pipe is.
|
||||
I don't think I explained it in the show.
|
||||
Roll pipe is like black PVC tubing that obviously comes on a roll instead of in lengths.
|
||||
So I'm going to turn the shower on here because it's dark.
|
||||
I don't know if I'm working out in the yard.
|
||||
And I'm just going to light the mud off of this piece of pipe.
|
||||
I'm just going to sit him out in the ground, on the ground, for diagnosed how long.
|
||||
There was some rush.
|
||||
There was some water through it.
|
||||
Make sure there's no clearers living inside.
|
||||
Before I go doing anything weird to it because I'm going to be putting my metal on one end of it.
|
||||
And I'm going to be putting a torch torch to the other end of it.
|
||||
And now I'm not smoking the world's second biggest bomb here.
|
||||
But that's part of the process.
|
||||
Finding these are good.
|
||||
And so in order to make it custom, make it sound right.
|
||||
I will definitely not want some kind of larger magnets crawling up my throat.
|
||||
Well, welcome this day.
|
||||
If I was a good drunk, I'd have 40 bottle sitting around somewhere.
|
||||
And I would use a 40 bottle for my next step.
|
||||
But I don't have any 40 sitting around here.
|
||||
So I'm going to try to use this lemon juice bottle.
|
||||
Now what I'm going to do with the lemon juice bottle is pick an end of the tube.
|
||||
This would actually sound better if I had a bigger piece of larger diameter piece of tubing.
|
||||
But since I don't, then I'm not just working with what I've got.
|
||||
Now what I'm going to do is I'm going to heat one end of the pipe with the blow torch.
|
||||
And I'm going to slide it over the top of the bottle and create a bell shaped end to make the sound better.
|
||||
So lighting up the torch line here.
|
||||
Okay, here we go.
|
||||
I'm doing kind of spinning the pipe around, heating it as I go.
|
||||
I'm going to try not to catch it on fire.
|
||||
Oh, shit.
|
||||
Oh, shit.
|
||||
Come to happen.
|
||||
Oh, god damn it.
|
||||
Well, two mistakes so far.
|
||||
First mistake is I was twisting the tube counterclockwise and I managed to unscrew the cat to the lemon juice.
|
||||
And now it is firmly lodged inside the tube.
|
||||
I'll try to extract the cap.
|
||||
Reattach it in from that one I will be turning the tube clockwise.
|
||||
Second mistake was overheating the plastic.
|
||||
And setting it on fire and pushing too hard too fast.
|
||||
If I was a good drunk I'd have 40 bottle sitting around somewhere and I would use a 40 bottle for my next step.
|
||||
But I don't have any 40 sitting around here.
|
||||
So I'm going to try to use this lemon juice bottle.
|
||||
Now what I'm going to do with the lemon juice bottle is pick an end of the tube.
|
||||
This would actually sound better if I had a bigger piece of larger diameter piece of tubing.
|
||||
But since I don't then I'm going to just work with what I've got.
|
||||
Now what I'm going to do is I'm going to heat one end of the pipe with the blow torch.
|
||||
And I'm going to slide it over the top of the bottle and create a bell shaped end to make the sound better.
|
||||
So I'm lighting up the torch line here.
|
||||
Okay here we go.
|
||||
I'm going to kind of spinning the pipe around, heating it as I go.
|
||||
Try not to catch it on fire.
|
||||
Oh shit.
|
||||
Oh my god.
|
||||
Come to happen.
|
||||
Oh god damn it.
|
||||
Oh god damn it.
|
||||
Well two mistakes so far.
|
||||
First mistake is I was twisting the tube counterclockwise and I managed to unscrew the cat to the lemon juice.
|
||||
And now it is firmly lodged inside the tube.
|
||||
I'll try to extract the cap.
|
||||
Reattach it in for now and I will be turning the tube clockwise.
|
||||
Second mistake was by overheating the plastic and setting it on fire.
|
||||
And pushing too hard too fast.
|
||||
That is the learning experience so far.
|
||||
I'm going to try working with the other end now since I just cut the first end that I was working with.
|
||||
I'll just cut it off and start over.
|
||||
That's where I cut it off an extra long piece.
|
||||
Since I've never done this before then I will see if it works.
|
||||
Oh and the knob is working off of the bottle.
|
||||
Okay the bottle has come on fire and I'm throwing it outside because something just doesn't seem safe about that.
|
||||
I think this concludes the homemade didgeridoo portion of this old hack.
|
||||
I will be throwing away the bottle of lemon juice because I think it has past its expiration date.
|
||||
I will be throwing the piece of rope out of the back door until I can get a new torch nozzle that I did not just kind of find.
|
||||
Luckily I did not blow my testicles off and y'all hold my beer and watch this.
|
||||
Thank you for listening to Hack with Public Radio.
|
||||
HBR is sponsored by Hero.net so head on over to C-A-R-O-DOT-E-C for all those in the world.
|
||||
Thank you for watching.
|
||||
234
hpr_transcripts/hpr0010.txt
Normal file
234
hpr_transcripts/hpr0010.txt
Normal file
@@ -0,0 +1,234 @@
|
||||
Episode: 10
|
||||
Title: HPR0010: The Linux Boot Process Part 1
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0010/hpr0010.mp3
|
||||
Transcribed: 2025-10-07 10:16:11
|
||||
|
||||
---
|
||||
|
||||
Music
|
||||
Music
|
||||
Welcome to Hacker Public Radio, my name is Dan Washgo, and today I am going to begin
|
||||
a series of shows, of episodes that discuss the Linux boot and initialization process.
|
||||
Now, I can't recall whether I did a similar show focusing on the differences between System
|
||||
5 and VSD style boot processes under Linux for today with a techie, but I figure what
|
||||
I would like to do is to give an overview of the Linux boot process from start to finish
|
||||
and then go back and detail significant sections of the boot process in future episodes, including
|
||||
and not limited to how the device file system gets initialized.
|
||||
Looking at technology such as how the hardware abstraction layer Damon and UDev and hotplugging
|
||||
how that all works and different portions of how services are configured and actually
|
||||
started on the Linux style system.
|
||||
So today what I am going to do is just do a cursory high level view of the Linux boot
|
||||
process and all the way up until you get to the command prompt.
|
||||
Now what's interesting about the different distributions of Linux by and large which
|
||||
you are going to find, they are all the same, Linux is pretty much Linux, but when you
|
||||
are looking at the different distributions, primary differences occur quite frankly in
|
||||
the boot process and how the system is configured and whether it is System 5 or VSD style
|
||||
system and the actual boot process, in which we will detail in a few minutes here, there
|
||||
are subtle differences between Debian style systems, Red Hat based systems and of course
|
||||
Slackware and Arch Linux and other different distributions.
|
||||
Beyond the boot process and the configuration files, some of the other differences would
|
||||
be what patches they apply to the kernel.
|
||||
For the most part, distributions generally support the same hardware although commercial
|
||||
distributions may extend hardware support for certain binary only drive hardware components.
|
||||
Sussan may include different patches or stuff to their kernel than a Red Hat for support
|
||||
for different operating systems.
|
||||
By and large you could still get all those patches if you wanted to collect them yourself
|
||||
and apply them from the different manufacturers, hardware, driver websites or from the kernel
|
||||
enhancements at kernel.org, different kernels out there and pull all those together.
|
||||
It's a little bit of a task but it can have its benefits and you get to actually learn
|
||||
what you're doing or what's going on inside your system.
|
||||
Aside from that, patching certain applications is a possibility but generally there isn't
|
||||
that much of a difference between distributions.
|
||||
So what we're going to do is just start at the beginning when you turn on your computer.
|
||||
The first thing that the system does is does a hardware check and runs through post and
|
||||
the BIOS initializes the boot device.
|
||||
Unlike some other operating systems, Linux primarily uses the BIOS to initiate the boot
|
||||
loader process and then that's it.
|
||||
It does not probe the BIOS to detect hardware or anything else but just to initialize the
|
||||
boot loader off the preferred boot device.
|
||||
Now let's just assume we're going to be booting off of a hard disk here.
|
||||
There are other types of boot devices, flash drives, CDE or DVDs that you can boot from
|
||||
but we're going to focus primarily on booting from a hard drive, be it scouser or ID, whatever.
|
||||
What it does is it looks for an initialization of boot loader program and the two main programs
|
||||
you're going to find on Linux are LILO and it's LILO and GRUB, GRUB.
|
||||
Now LILO was the old standard that was used way back in the day.
|
||||
It's one of the first ones I cut my teeth on and GRUB has been its predecessor not so much
|
||||
by the same group but has essentially replaced LILO as the preferred boot loader of choice
|
||||
for most distributions.
|
||||
Now there's a third way to boot Linux and that's out of a Windows or DAW session using
|
||||
the LoadLin which will initialize the boot loader but we're not going to cover that right
|
||||
now.
|
||||
We're just going to look at probably the primary difference between LILO and GRUB is that
|
||||
GRUB allows for a dynamic loading or configuration on the fly at the boot process.
|
||||
Both of them present you with a menu of options or images, kernel images that you have or other
|
||||
operating systems that are available that have been configured to boot from but GRUB takes
|
||||
in one step further which allows you to actually specify through an edit option a kernel
|
||||
that might not be present or an operating system that might not be in the actual menu file
|
||||
provided you know the parameters to get that thing running.
|
||||
LILO on the other hand the only thing you could actually do is pass a boot time option
|
||||
parameter like Linux single to the image sets you're going to be booting.
|
||||
The benefit of using LILO as opposed to or actually using GRUB as opposed to LILO is
|
||||
that on some distributions that don't like leave it up to you to initialize the boot loading
|
||||
process if you're using LILO most modern distributions like Ubuntu, Debian, when you upgrade
|
||||
the kernel or something will make sure that everything is ready to go but you take a system
|
||||
like Slackware or Arch Linux which requires more hands on you install a new kernel and
|
||||
you run a LILO you actually have to initialize LILO if you don't do that and you don't have
|
||||
a default kernel or anything you get kind of hose there you can't boot your system as
|
||||
you can't find a kernel.
|
||||
Now GRUB on the other hand like I said you can dynamically load that kernel put that information
|
||||
in there right from the get go and you're good to go it'll allow you to boot the kernel
|
||||
that's on the system.
|
||||
So GRUB is definitely a lot more flexible and in addition to the enhanced booting process
|
||||
there you are able to provide this similar parameters to the boot process that you can
|
||||
in LILO.
|
||||
Well anyway once the boot loader initializes the kernel or kicks off the kernel it also
|
||||
may or may not load what is called a ram initializing ram disk it's a virtual disk an
|
||||
image that goes hand in hand with the kernel there are two kind of two kernels that you
|
||||
can run on a Linux system there's a monolithic and a modular or a modular kernel now monolithic
|
||||
kernel has everything compiled into it that you would absolutely need and when you are providing
|
||||
a distribution for a myriad number of systems you're not going to go with a monolithic
|
||||
kernel you're going to go with a modular kernel which makes more sense what a modular
|
||||
kernel does is provide just enough in the kernel to get things going and then everything
|
||||
else is loaded in via modules.
|
||||
Now a modular kernel has one disadvantage that if you don't compile in the necessary hardware
|
||||
support for your system or it's not compiled in it makes it difficult to boot your system
|
||||
up using that modular kernel that's pretty slim down therefore they use what's called
|
||||
an initializing ram disk and that provides a virtual image so to speak of modules that
|
||||
pretty much cover the majority of systems out there which then does not require the
|
||||
need for a monolithic kernel or most hardware to be compiled into the kernel at boot
|
||||
time so it's a system of getting around being able to initialize the required components
|
||||
of your hardware like your file system the drivers for your disks hard disk scusy disks
|
||||
whatever the necessary components to boot the system it gets you just enough to get up
|
||||
and initialize your file system and load the drivers or modules that are on your distributions
|
||||
or your modules directory and get you onto the process of running the rest of the machine.
|
||||
Now there are some systems that don't need an initial ram disk again if you're going
|
||||
to use a monolithic kernel with has everything compiled in or your own kernel you may not
|
||||
have to worry about there being a missing driver or anything and you can forgo the use
|
||||
of an initial ram disk initializing ram disk but by and large most distributions out there
|
||||
today do do that and stick with a modular kernel the advantage of a modular kernel it's
|
||||
a lot smaller and it only loads in the play exactly what you need modular wise so it takes
|
||||
up a lot of space and resources in the long run so the bootloader passes off control
|
||||
to the kernel and the initial ram disk gets loaded and the image actually gets mounted
|
||||
virtually as the kernel boots and initializes the hardware and the file system comes up
|
||||
it can unmount the initial ram disk and begin to mount the root partition read only to start
|
||||
to continue loading the modules required for the rest of the system doing some hardware
|
||||
program and everything to match modules with the hardware that's the kernel has found
|
||||
or the scripts have found at which point then the kernel turns over control to the
|
||||
espn init application unit application is executed now that's of course short for initialization
|
||||
you can say and what that does is it begins the process of loading up the actual software
|
||||
that you're going to interact with on the computer it starts the services that's the
|
||||
beginning level right here of actually getting the rest of the tools of your operating system
|
||||
running because as we know Linux is the name of the kernel and it comes with a whole suite
|
||||
of tools in it which is one of them so what in it does is it uses an application or uses
|
||||
a configuration file and most systems called the Etsy init tab file now here's where we
|
||||
start to get a difference between red hat devian Ubuntu slackware arch Linux type distributions
|
||||
at the init level by large majority of distributions red hat slackware red hats derivatives are
|
||||
using the init tab file I believe some older distributions of devian devian are still using
|
||||
the init tab which is a a file that you'll find in the Etsy directory that begins to describe
|
||||
how this system is going to be running what init tab one of the main things it does is set the
|
||||
run level of your Linux system now a run level defines what applications and what what you're going
|
||||
to be running for the rest of your session there are seven run levels zero through six now zero
|
||||
is halt okay stop shut down machine has a run level of zero six on the other hand is reboot okay so
|
||||
you'd never want to set your init directory or your init file to set the default run level the
|
||||
zero or six that would be ridiculous it would start up shut down start up shut down now run level
|
||||
one is the Linux single user mode no services are started no network started it's essentially repair
|
||||
mode you can get into it by calling the kernel image that you want from your boot loader and
|
||||
specifying sig single after it you generally don't want to run in Linux single user mode you can
|
||||
also use the tel init program to drop down in a single user mode by passing tel init and the
|
||||
number one to the system it's good during an upgrade process or if you need to configure something
|
||||
or stop a service that requires in that gets a little funky you can bring it down the
|
||||
single user mode and you can bring it back up from single user mode to any other level like for
|
||||
instance let run level two is multi user with no networking one and two generally aren't used
|
||||
for anything other than troubleshooting configuration repair stuff you well once primarily used
|
||||
now three is what the majority of systems used to be set for and there's some controversy I
|
||||
noticed today as to what exactly is run level three run level three is a multi user with networking
|
||||
okay now on slackware based systems run level three that's it multi user with with
|
||||
networking the standard system you boot up into a virtual council you type start x if you want to
|
||||
start the x windows subsystem and run with a graphical x system now on debian systems for instance
|
||||
run level three actually starts the graphical interface using gdm kdm or xdm so they kind of
|
||||
what I consider run level three is not the same run level three and debian okay run level four
|
||||
is used not used by most distributions otherwise run level four is the same as run level five which is
|
||||
what I was accustomed to is a multi user system running the x sub system or x session using gdm xdm
|
||||
or kdm as a login window as a login manager right there that was what I considered run level five
|
||||
which debian considers run level three or runs at run level three so on a slackware system run level
|
||||
five will put you into your graphical login and initialize your services for running x on login
|
||||
and of course we just said run level six is reboot now once the
|
||||
sis in it or the initialization file is called the init tab and specifies what run level is
|
||||
going to run at it then init runs the initialization scripts and here again is a difference
|
||||
between slackware and other Linux systems which will actually say it's a difference between the
|
||||
bs style bsd style and system five style of initialization scripts on a top level what you have
|
||||
with a bsd style is you have a a bunch of scripts in a directory on slackware is the etc rc.d
|
||||
directory run control dot directory in there it's a series of scripts that get run based upon
|
||||
what run level that you have chosen this difference from the system five style of
|
||||
initialization in that as opposed to an etc rc.d directory with a series of scripts you have an
|
||||
etc init dot d directory that has a whole bunch of scripts in there for starting and stopping
|
||||
certain processes now those those scripts don't get called out of the init dot d directory instead
|
||||
what happens is based upon what run level you have chosen that runs or executes looks in a
|
||||
directory called etc slash rc dot d slash r and the run level dot d of of whatever run level
|
||||
you're running it so for instance run level three we'll look at r3 dot d now not all distributions
|
||||
of here to putting it under the etc slash rc dot d slash r run level some of them just put it in
|
||||
etc r2 dot d or whatever anyway what it is is you go to that run level directory and in there
|
||||
is a series of sim links back to the files in the etc dot init dot d directory and they're either
|
||||
preceded with an capital s or a capital k and what these do is an s starts the service whereas
|
||||
k kills the service so if you're running at run level one zero or one level one or we switch to run
|
||||
level six it has a bunch of kills links in there that will kill the process that's running
|
||||
or and for run like run level one it might kill some processes and verify that some other ones
|
||||
are started whereas in something like run level three four five you're going to see a lot more
|
||||
assets for starting a lot of different processes and subsystems in there so that's primarily the
|
||||
big difference there you have one primarily one directory for initialization scripts or startup
|
||||
scripts in a bsd style system whereas on a system five initialization system you have a
|
||||
bunch of sim links in a run level directory that actually get executed now there's some other
|
||||
differences in there like for instance there's one file in particular called the sys init file
|
||||
most distributions still use which is an etc can be an etc sys init is a configuration for it or
|
||||
etc rcd slash rc sys init which is where you find it in the red hat system slackware is the etc
|
||||
rc dot d slash rc dot s file in the rc dot d directory and arch Linux has a etc slash rc dot sys
|
||||
init file now if you have an init tab and you look in there you're going to find where the system
|
||||
initialization file is which calls some other basic system initializations prior to running
|
||||
the run level scripts one thing I think I need to make clear about the bsd or the slackware
|
||||
style of initialization is in addition to whatever run level script are if you look in a slackware
|
||||
directory you're going to see a number of files in the etc dash rc dot d directory is you're
|
||||
going to find a number of files in there called rc some number dot s which is the script for
|
||||
and those are your run level files right there rc dot four rc dot five rc dot six if they're
|
||||
available you'll find those in there for specific run levels there's some other subtle
|
||||
differences but we're not going to go into those right now anyway I'm getting back to the sys
|
||||
in a file now on Ubuntu and some Debian based systems or more modern Debian systems you're not
|
||||
going to find a sys in a file or you're not going to find an init tab in a tab file instead you're
|
||||
going to find the etc event dot d directory which essentially has the similar startup files that
|
||||
we have discussed it breaks it down in the individual files in there and begins to set your run
|
||||
level from there and start the necessary applications that you'll run on boot once the scripts are run
|
||||
in either your bsd style or system five style of initialization all the scripts are run the
|
||||
init then creates a handful of virtual councils based particularly using the mingeti program
|
||||
most times you'll have six virtual councils that you can log into if you're running a
|
||||
graphical session using xdm gdm you're still going to get those six virtual councils you'll find
|
||||
them on one two three four five and six whereas seven will be the x system that you're currently
|
||||
running and also most likely the first session the first virtual council will be where x is
|
||||
actually running from in that council you won't actually be able to use the first council it'll
|
||||
have some debugging information or your session information in x in some cases actually you know
|
||||
what it might not be on one it might be on another one like seven or I'm sorry six or eight so
|
||||
it's not necessarily but one of them is going to contain your x session debugging information if
|
||||
you were to start x after you have booted your system and you'll be running what I call run
|
||||
level three you log into a virtual council and start x your your information of the session that's
|
||||
going on will be available in that virtual council session that you started x from and then you
|
||||
will actually run x on virtual council seven it could be on a different council eight nine or ten
|
||||
whatever by standard is seven for that so that's the entire Linux boot process in a nutshell
|
||||
we focused a little more on what differences between system five and vst styles which is
|
||||
primarily what I wanted to get through as a little more focus on that in addition to the high
|
||||
level view of the boot process to recap you have your you turn your system on those posts the
|
||||
BIOS passes or actually initializes the boot device and control gets handed over to the boot load
|
||||
or which allows you to choose what image you want to load or what operating system from that point
|
||||
control gets passed to the kernel which you typically uses an initialization ram disk to
|
||||
initialize some hardware that's required for booting which may not be compiled into the kernel
|
||||
and virtual drivers like your array or your file systems so that it would be able to mount
|
||||
the root file system at that point and begin the rest of the loading of the modules that you have
|
||||
and identifying your hardware so that it can pass off control to the init program which defines
|
||||
run level you're going to run at and from there begins the process of kicking off
|
||||
be it a bsd style system or system five style system the scripts to run the applications and
|
||||
processes and demons that you prefer to run at that specified run level it completes that whole
|
||||
initialization process by providing a number of virtual terminals that you can log into using
|
||||
a mingeti program and or it set you up for graphical login using gdm kdm or xdm so that you can log
|
||||
into an x session that's in a nutshell so next time we come back we're probably going to look at
|
||||
another subsystem or look at one of those those processes in detail I'm not might not stick with
|
||||
going from poo loaders to clearly defining the init tab stage I might just jump right into some
|
||||
other subsystems not necessarily going to go into order but keep on listening and keep on
|
||||
participating and have a great one bye thank you for listening to hacker public radio
|
||||
hpr-sponsored by caro.net so head on over to caro.net for all your hosting needs
|
||||
90
hpr_transcripts/hpr0011.txt
Normal file
90
hpr_transcripts/hpr0011.txt
Normal file
@@ -0,0 +1,90 @@
|
||||
Episode: 11
|
||||
Title: HPR0011: dd_rhelp
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0011/hpr0011.mp3
|
||||
Transcribed: 2025-10-07 10:16:44
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
Hello and welcome to this episode of Hack and Public Radio with your host, Operator.
|
||||
This episode is going to be over DD underscore rescue and DD underscore our help,
|
||||
which is a helper script for DD rescue.
|
||||
And DD underscore rescue is not to be confused with DD rescue.
|
||||
So here, from here on out, when I say DD rescue, I'm referring to DD underscore rescue.
|
||||
So first off, what state does a drive have to be in?
|
||||
You have a drive that picked up by the BIOS first off.
|
||||
It needs to be at least picked up by the BIOS and that something can talk to it.
|
||||
Be it hopefully, if it's an NTFS partition, windows can at least mount the drive as a readable drive
|
||||
and see the partitions.
|
||||
Or secondly, you can use something like F is to be able to display inside of units Linux
|
||||
what the partition information is and see if you can at least pull that much off of it.
|
||||
So the setup I have is IDE zero or the first IDE is the CD-ROM and second unslave
|
||||
is going to be the backup drive.
|
||||
And then that lead the other IDE channel open to I put the backup drive that I'm going to drive.
|
||||
I'm going to actually image the bad drive and then the drive that's known good that I'm going to image two,
|
||||
which is going to be the same size or larger, that's going to be the secondary.
|
||||
So this will allow you to once you've actually made a good image of the drive,
|
||||
you can go ahead without rebooting anything and push that image straight on to your known good drive.
|
||||
Along with this, I've got the laptop to IDE and also the SATA IDE converter plugged into that same chain.
|
||||
So if I need to do any of that prior, then it'll all be set up good to go.
|
||||
Also, you'll want to, if you can format the drive, you're going to put the image on to something Unix Linux compatible,
|
||||
EXT3 or UFS, whatever.
|
||||
This will work a little bit better as far as mounting it and then we'll have to worry about closing it or cross-platform stuff.
|
||||
So the drive's picked up, you've got everything set up.
|
||||
And the first thing you want to notice is check FDisk or whatever partition manager you want to use.
|
||||
And look and see where your partition started and where they stopped and things like that.
|
||||
So this way, if you have to, you can just back up from the beginning.
|
||||
You can back up the actual partitions and master boot record and all that good stuff before you start to actually touch the disk.
|
||||
Next thing is, it's going to take some time.
|
||||
Just depending on how bad the drive is, where the bad parts are, how often they are, how slow it is, transfer rate, how big the drive is.
|
||||
160 gig drive took at right at about three days to make an image of.
|
||||
And probably it's a total of four days to once restoration and putting it on the new drive.
|
||||
So, easiest thing, I use a live CD called G-Parted.
|
||||
It's similar to a commercial version of partition magic.
|
||||
And also a USB stick with a few noted items on there about different things where boot sectors are.
|
||||
Then just notes I have on the USB stick.
|
||||
And also, I have the DD underscore R help, which is also in the show note.
|
||||
And this is what the cast is mainly going to be about.
|
||||
The helper application for DD rescue called DD underscore R help.
|
||||
Like I said, I had no problems running it off of G-Parted live distribution, off of a thumb drive.
|
||||
Once you've verified that you're riding to the right disk and trying to read from the right bad disk or known disk with errors on it.
|
||||
You'll see the basic command line options for DD underscore R help.
|
||||
Just pretty much the same thing as DD rescue, except there's a few other switches for it.
|
||||
The first thing is it will automatically create a log file.
|
||||
And this log file is sort of kind of hard to read at first.
|
||||
But essentially, if you read the documentation and the FAQ and everything for DD underscore R help,
|
||||
it'll tell you exactly what it's doing, what it's doing in the log files.
|
||||
And it'll be a little bit clearer, good, you know, halfway into it.
|
||||
You'll understand how it works.
|
||||
Mainly, you're going to look through FDISC and see how big the partition is or disk is that you're copying.
|
||||
How many blocks it has total?
|
||||
From there, you'll be able to read where DD rescue is at any given time and how much it's actually copied.
|
||||
If it goes from one end to the disk to the other, it will show the image will show a full size of the actual disk.
|
||||
Being as that, it's skipping over parts that it kind of fails at.
|
||||
It's going to display kind of a false information that's, oh, my disk is completely backed up.
|
||||
No, what you want to do is read the log files and look for a line called EOS in caps.
|
||||
This will tell you where DD underscore R help is at how much it's, how many blocks it's copied or at least tried to copy,
|
||||
and all that good stuff.
|
||||
And after a while, you'll see something inside of the log and also from the actual command line, you'll see bar.
|
||||
And it'll detects representation of where it's at on the disk.
|
||||
At first, basically, you'll see a bunch of dots.
|
||||
And as it goes over, they'll turn it to x's.
|
||||
So the dots are not parsed.
|
||||
Jump points are going to be stars.
|
||||
And parsed is means parts that it's already tried to go over or has gone over.
|
||||
And how it works, if you go to the documentation, it starts off, hits an error, skips a little bit,
|
||||
and then once it's gone through the whole disk, it goes back and picks the biggest chunk that it missed.
|
||||
Starts in the middle and goes from the middle to the left to the middle to the right, meaning from the middle reverse and from the middle forward.
|
||||
And I will leave some, in the show notes, I'll leave some example of the bar output.
|
||||
So you'll kind of see what it looks like further down the road.
|
||||
Also, there's some other things I didn't have to do, tweak any settings.
|
||||
But you can do things like disable or enable DMA to make things go faster or slower.
|
||||
The whole idea of DD underscore our help is to make the process faster.
|
||||
And instead of sitting there, then, for on the same, you know, 500 blocks, it's going to skip over those portions and come back to it later.
|
||||
So this utilizes the time that it takes to run a full DD rescue scan or DD scan or copy.
|
||||
Pretty much wraps up this episode of Packer Public Radio.
|
||||
Anybody has any questions about the episode or any other previous episodes?
|
||||
You can contact me from the website, and I will try and help you. That's like it.
|
||||
Thank you for listening to Packer Public Radio.
|
||||
We are sponsored by caro.net. So head on over to caro.nc for all the hopes and needs.
|
||||
Thanks for watching.
|
||||
157
hpr_transcripts/hpr0012.txt
Normal file
157
hpr_transcripts/hpr0012.txt
Normal file
@@ -0,0 +1,157 @@
|
||||
Episode: 12
|
||||
Title: HPR0012: Xen
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0012/hpr0012.mp3
|
||||
Transcribed: 2025-10-07 10:17:44
|
||||
|
||||
---
|
||||
|
||||
music
|
||||
Hello and welcome to Hacker Public Radio.
|
||||
My name is Miro Vinci and I'll be your host today.
|
||||
Previously in episodes of Today with a Techie, I discussed using VMware and virtualization
|
||||
as a potential solution to different problems or to different test networks such as that
|
||||
as you might need.
|
||||
I believe I listed the example of a virtual cluster that I had built completely inside
|
||||
of VMware.
|
||||
I had a master node to slave nodes and all of the networking necessary to actually run
|
||||
to actually test the cluster and it saved me bundles in terms of hardware because I only
|
||||
needed one machine with one piece of software, you know, I'll be at VMware.
|
||||
But this past semester, I took a class at the university, simply titled virtualization
|
||||
and we spent the entire semester going through different journal articles and discussing
|
||||
the technology of virtualization, a lot of the theory behind virtualization and a lot
|
||||
of a lot of very interesting stuff and we concluded the semester with individual projects.
|
||||
And so I hope to over the next few episodes that I have with Hacker Public Radio to explore
|
||||
some of the things that we discussed in class and even potentially hopefully share my
|
||||
project with you, with the community because it's a simple project, it was something that
|
||||
I whipped together in the application that I'll actually be talking about here shortly and
|
||||
has a potential, I feel to be a real benefit and hopefully in the coming months, I will
|
||||
be able to talk about that some more coming weeks rather.
|
||||
So today I wanted to discuss more and depthly of virtualization solution known as Zinn.
|
||||
Now Zinn is spelled X-E-N and actually started with a professional article, a journal article
|
||||
that came out in 2003 called Zinn and the Art of Virtualization, you know, and the main
|
||||
authors on that were Paul Barham, Boris Dragovic and Kair Fraser and I would definitely
|
||||
encourage you to go on the internet and you can go to websites like site seer at C-I-T-E-S-E-E-R.
|
||||
You have to Google that or just use Google or Google Scholar to actually find this article.
|
||||
It's 40 pages long and it really is an introduction, a good introduction to Zinn and how Zinn
|
||||
works as a virtualization system or virtualization solution.
|
||||
Some of you might be wondering what exactly is a virtualization software or virtualization
|
||||
system to start with VMware as an example.
|
||||
VMware will allow you to install their software onto your current operating system and then
|
||||
install what they refer to as guest operating systems inside of that program.
|
||||
Ultimately though what is going on is that guest operating system is installing completely
|
||||
within software, installing completely within software to where it has no direct access
|
||||
to any physical hardware because to the guest operating system, it has a complete set
|
||||
of physical hardware which is completely being emulated by VMware.
|
||||
Yes it is possible inside of say VMware workstation or VMware server to allow the guest
|
||||
operating system to have access directly to pieces of hardware whether that is a CD-ROM
|
||||
drive, USB hubs or USB devices, network cards, network interface devices.
|
||||
You can allow that sort of access but by default and by its overall operation it is trying
|
||||
to contain the guest operating system completely within emulated hardware or virtual hardware.
|
||||
So now if you think about it, if you try and run just let's say a CD player application
|
||||
within your guest operating system but you want to play it on the physical or you want to
|
||||
play the physical CD-ROM drive, the CD player application has to send its you know system calls
|
||||
and hardware calls and all that stuff through the guest operating system which gets down
|
||||
to the virtual hardware which then VMware interprets those requests and then allows it
|
||||
allows from that software application to take those hardware calls and hardware requests
|
||||
down through the real operating system which is the operating system that lies beneath
|
||||
the VMware, not above it, but beneath the VMware that allows then access to the physical
|
||||
hardware.
|
||||
So we've now added multiple layers that system calls and things like that have to get
|
||||
through before they get to now comparing Zen to this virtualization model or virtualization
|
||||
example, Zen is actually rather different.
|
||||
Now for VMware Workstation and VMware Server it is a guest operating system installed
|
||||
of a piece of software that was installed on top of a real operating system.
|
||||
Now with Zen the guest operating system is installed onto what is referred to as a hypervisor.
|
||||
Now the hypervisor is technically a piece of the Zen software that translates or handles
|
||||
the system calls between the guest operating system and the hardware.
|
||||
Now so this basically removes a lot of those layers between you know the software operating
|
||||
system or software operating system, virtualization software, the true operating system down
|
||||
to the real hardware and allows for a more direct access to the hardware.
|
||||
Now even though a guest operating system has this more direct access access to hardware
|
||||
is still controlled by Zen.
|
||||
So just like in the VMware example if you want to allow a piece of hardware to have direct
|
||||
access to a guest OS you can certainly do that and conversely if you don't want the
|
||||
guest OS to have direct access or any access whatsoever to a piece of hardware you have
|
||||
the ability to block that access and to deny access to that hardware or to that hardware
|
||||
device.
|
||||
If you were if you're following or if you get a chance to download the papers in the
|
||||
virtualization figure one is a better description of you know of the Zen hypervisor and how
|
||||
it fits into I guess the operating system model I don't know I don't this has a technical
|
||||
term that I'm not familiar with but you'll see what's going on here.
|
||||
Now to control the actual hypervisor as you'll see in this picture is and as you read in
|
||||
this paper is something referred to as domain zero.
|
||||
Within the Zen software guest operating systems are referred to as domains and all of all
|
||||
of these things installing guest operating systems starting and stopping guest operating
|
||||
systems as well as setting up hardware for guest operating systems or domains is all
|
||||
controlled by domain zero and domain zero is a you know is a is a Linux is basically I mean
|
||||
it it's Linux that has access to the Zen hypervisor and that allows these controls.
|
||||
Okay so now we're aware of two different virtualizing solutions that are currently on the
|
||||
market what's you know why would you choose one over the other well the answer comes
|
||||
down to performance and performance issues as well as you know what you're going to do
|
||||
with it now in terms of performance the Zen you know appears to do very very well and if
|
||||
you look in in the article there's a complete section of evaluation and testing and figure
|
||||
three is is a it's a graph that shows shows a benchmarks comparing native Linux so Linux
|
||||
on a physical machine to what they call Zeno Linux which is their which is their Zen client
|
||||
a VMware workstation but to be fair this is VMware workstation 3.2 and then user mode
|
||||
Linux in all of these cases the Zeno Linux the Zen does almost as well as the native Linux
|
||||
does or as the native hardware does and that's simply because it doesn't have the overhead of an
|
||||
of an additional operating system operating underneath of Zen and underneath of what you know Zen
|
||||
is trying to accomplish now to be fair though you can't really use this article to compare Zen
|
||||
to VMware because in the article they use VMware workstation 3.2 and I don't know if it's
|
||||
explained in this article or if it was in different articles that we read but you can go to and you
|
||||
can go to the VMware website and you can find this in their in their in user license agreement
|
||||
that you are not allowed to do benchmarking without VMware's express permission and I think in some
|
||||
of their or in a recent change to their you know you know it's you you can you can do your own
|
||||
benchmarks but they ask that you not publish the results and so even though they're up to like
|
||||
VMware workstation 5.5 at the time this people was written VMware workstation 3.2
|
||||
was the only version of VMware that VMware would license or allow them to do this benchmark on
|
||||
and use the results in this article so you know so to to be fair to VMware I do want to point out
|
||||
point out that difference and point out that thing but comparing Zen to native Linux so Linux
|
||||
on a physical machine the numbers are incredible and that Zen performs very very well and so
|
||||
they continued on with more benchmarks into let's see section 4.3 with running concurrent virtual
|
||||
machines so they tested running running instances simultaneous instances of you know this benchmarking
|
||||
program on you know Linux or native Linux and Zen and it's remarkable that looking in figure 4
|
||||
and they're running what's called spec web 99 which was a a stress test of Apache servers or
|
||||
a stress test for Apache servers and whenever there was one instance of the Apache server running
|
||||
on Linux and Zen you know the native Linux did better than Zen did and it does that for the
|
||||
two instances and for four instances but once we get to eight concurrent Apache servers that are
|
||||
running the stress test analyzer now we get to a point where Zen actually performs better than
|
||||
the native Linux does and I mean then that and that's because they're you know for each instance
|
||||
of the Apache they're running it on different um different um domains and so you know so there's
|
||||
not this conflicting overhead of software costs you know from from one instance to the other
|
||||
azures with the native Linux or the you know the Linux on a physical machine and so Zen performs
|
||||
very very well and you know if you read another pieces of literature depending on the application
|
||||
that you're doing Zen runs incredibly well now again to be fair to VMware not that I by any way
|
||||
I'm trying to um give plugs to VMware to encourage you to buy VMware's product or VMware products
|
||||
they do have something called ESX server which is which is in in my opinion not that I've had direct
|
||||
experience with it but appears to be very similar if not the same to this idea of pair of virtualization
|
||||
now to completely you know reiterate that I don't want to give plugs to VMware because I mean
|
||||
their products are commercial they cost and you know I am a free open source kind of guy I like
|
||||
to support the open source community and Zen is actually an open source product now they do have a
|
||||
apparent company or a the company the the people who created Zen you know created their own
|
||||
company which was bought out by Citrix last year and so Zen does have a commercial solution
|
||||
but they still have all of their source code online available for download for you know
|
||||
absolutely free and I will definitely include a link in the show notes but that link is
|
||||
Zen.org xen.org now you can go to ZenSource.org and that'll take you to the you know to the new
|
||||
parent company Citrix but Zen.org xen.org is where you can get you can download it you can download
|
||||
the user manual they have a wiki you know all sorts of that general open source communal
|
||||
so that you can communicate that you can talk with others and that you can work with others
|
||||
on your Zen project I'll also include a link in in a how to forge article that I use initially
|
||||
when I got started with Zen and and if you just go to Zen or go to how to forge.com and you can
|
||||
do a search for Zen devian it should be like the first link I used devian as my domain zero
|
||||
to control my Zen and control the hypervisor it was able to install other devian domains or other
|
||||
devian guest operating systems on my on my system on my Zen virtualized system I know there are
|
||||
articles in the how to forge about how to install multiple versions of Linux or multiple flavors of
|
||||
Linux onto our into a Zen environment including Ubuntu and Fedora core devian obviously etc so
|
||||
definitely a worthwhile tool feel free also if you have any more questions you can email me directly
|
||||
at MiroVinji at gmail.com that's m-i-r-o-v-e-n-g-i you can also find me in the
|
||||
infinomicon channel on the free node irc server and in future episodes we'll be looking at more
|
||||
virtualization technology that's come out especially some of the hardware technologies like the
|
||||
vt enabled stuff I hope to discuss more theory about that about what goes into virtualization
|
||||
and how some of these things like VMware like Zen work and and to potentially maybe look at
|
||||
some of the more recent virtualization news which is like the VMVM escaping that many people
|
||||
are working on you know looking at malware things like blue pill and just also how to really
|
||||
use these technologies to your advantage and to you know what you're doing which you know gets
|
||||
back to my class project that I hope to unveil at some point I hope that you've enjoyed today's
|
||||
episode I'm again the MiroVinji and this has been hacker public radio thank you for listening
|
||||
to hacker public radio hpr is sponsored by caro.net so head on over to caro.net for all your hosting
|
||||
126
hpr_transcripts/hpr0013.txt
Normal file
126
hpr_transcripts/hpr0013.txt
Normal file
@@ -0,0 +1,126 @@
|
||||
Episode: 13
|
||||
Title: HPR0013: LPI Certifications Part 1
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0013/hpr0013.mp3
|
||||
Transcribed: 2025-10-07 10:17:47
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
Hello and welcome to hacker book of radio. This is episode 13 for Thursday, January the 17th.
|
||||
I'm the host of today's show, my name is Ken Fallon.
|
||||
This is the first and many series entitled Linux Professional Institute Certifications, LPI-C.
|
||||
And in this mini series, I'm going to help provide you with some information that will help you in passing
|
||||
some of the certifications provided by the LPI Institute.
|
||||
According to Wikipedia, the Linux Professional Institute NC LPI is an unprofit organization
|
||||
that provides vendor and dependent professional certification for Linux system administrators and programmers.
|
||||
Now, the certifications themselves are available in many countries and in many languages.
|
||||
And the community participates in the exam creation.
|
||||
From my point of view, I think the LPI-C is well respected and recognised, at least as much as the red-add certifications
|
||||
are provided by the LPI.
|
||||
They have three levels of certification, the junior advanced and senior level.
|
||||
And for the junior level, you need the junior level to continue on doing the rest, I believe.
|
||||
I'm going to say I believe because I haven't actually done any of the certifications myself.
|
||||
And the reason I'm doing this podcast series is so that it will be a way for the information in the documents to sink in.
|
||||
And we will continue.
|
||||
The task overview is to work at the Linux command line, provide easy maintenance tasks, to help users out,
|
||||
to add users and large system backup or restore, shutdown or reboot.
|
||||
Also, to install and configure a workstation, include an X and connect it to a LAN or a standard on PC,
|
||||
via a modern and internet prerequisites for the junior level are passing exam 101 and 102.
|
||||
I've seen some advice that you are better off preparing for exam 101 and 102 together as some of the questions switched between exams.
|
||||
The documentation that we're going to be using are the IBM documentation provided on www.ibm.com,
|
||||
forward slash developer works, forward slash Linux, forward slash LPI.
|
||||
And while the LPI on the well LPI web pages themselves, they say while the can't recommend on the documents,
|
||||
these documents seem to be well respected in the community.
|
||||
Now you need to register with the with IBM in order to be able to access these PDF files.
|
||||
The copyright does remain with IBM, but I believe we should be allowed to use them under the fair use provision, although I'm not a lawyer.
|
||||
Software that we're going to be using is the VMware server, largely because of the VMware uses a BIOS while other VMware solutions don't.
|
||||
We're going to be using CentOS and Debian net install, the CentOS 5.1 net installs at ISO,
|
||||
and the Debian 40 or 1 i3.06 net installs at ISO can get them on their respective websites.
|
||||
Install the VMware server and then install the VM for Debian with 256 megabramic,
|
||||
like a disk, not pre-assign, not split. When you get to partitioning, select the entire disk,
|
||||
create separate home user of our intent partition, so that'll be an option.
|
||||
So that'll be interesting when we're doing analysis of what we're investigating the file disk structure.
|
||||
When you get the software, which choose software to install, deselect everything.
|
||||
So basically install a minimum system, more or less the same with CentOS, 256 megabram.
|
||||
For me this cosy disk didn't work, so I switched it to an AKID disk, again, not pre-assigned or not split.
|
||||
You'll need to, you'll be prompted for an FTP location, so go to the mirror, list site, and select a FTP site near you,
|
||||
and the directory in that mirror, FTP mirror that's located next to you will be 5.1 for such ISO, for such i3.06.
|
||||
And now, excuse me while I take some T, and then we'll be right back,
|
||||
what's going into LPI exam 101 prep, hardware architecture, junior level administration,
|
||||
topic 101, by Eardsheel senior programmer with IBM.
|
||||
LPI exam objectives, configuring fundamentals by a setting, I'm reading.
|
||||
You will learn to configure fundamental system hardware by making the correct settings in the system bias.
|
||||
You will learn about configuration issues, such as the use of IBA, and the ID,
|
||||
hard disks larger than one or two four centers, enabling or disabling integration peripherals,
|
||||
and configuring system with or without external peripherals, such as keyboards.
|
||||
We will also discuss correct settings for IRQ, DMA, iO addresses, for all BIOS administered ports,
|
||||
and for settings for handling errors.
|
||||
And that has a weight objective of all the exams.
|
||||
All the sections in the exams have a weight objective.
|
||||
This has a weight objective of 1.
|
||||
Now moving on to page 5 system and bias overview.
|
||||
Again, I'm quoting from the documentation.
|
||||
A modern personal computer or PC consists of a central processing unit CPU for performing calculations,
|
||||
along with some memory for storing data that the process is using.
|
||||
To make such a device useful, we attach preferred devices such as a keyboard, mice, displays, hard drives,
|
||||
CDs, DVD drives, printer, scanners, network cards, which will allow us to enter store print, display, and transmit data.
|
||||
In the computer just described, the memory used by the processor is called Random Access Memory RAM.
|
||||
In a typical PC, the memory is volatile, meaning that it requires power to keep its data.
|
||||
Turn off the PC, and the memory is wiped clean.
|
||||
Put another way, when we turn off a PC, we turn it into collection of hardware components that will do nothing until reprogrammed.
|
||||
This reprogramming occurs when we turn on the machine.
|
||||
This is called bootstrapping or booting the computer.
|
||||
The bias stands for basic input output system.
|
||||
And from Wikipedia, the principal duties of the main bias during the power on self-test are as follows.
|
||||
Verify the integrity of the bias code itself.
|
||||
To turn the reason the power on self-test is being executed, find size, verify, system, main memory,
|
||||
discover initialized catalog all system buses and devices, pass control to other specialized biases.
|
||||
If and when required, provide a user interface for system configuration.
|
||||
Identify, organize, and select which devices are available for booting, construct whatever system environments that is required by the target OS.
|
||||
I find that relatively difficult to understand, so I've gone out and found a document which explains the bootup process of a PC.
|
||||
Now, when you turn off your computer, as the IBM document states, it's forgotten everything.
|
||||
So when you turn on your computer, your processor has no instructions on what to do.
|
||||
It has no idea whether it's a server, a PC, a laptop, or whatever.
|
||||
So there's a break-com trail left for the processor so that it can learn more and more and more stuff.
|
||||
So the term bootstrapping occurs, and it's a sort of joke that was introduced in the 50s,
|
||||
again, according to Wikipedia, from a legend of Baron Wunchhausen, who was able to pull himself up by his bootstraps on Stuck in a Marsh.
|
||||
So after you go through this boot sequence, I think you'll understand what sort of chain is involved.
|
||||
Okay, so you turn on the power socket, and the power goes to the power supply.
|
||||
The power comes out of the power supply, and it's on the motherboard.
|
||||
The first thing that the motherboard does is sends a reset to the CPU.
|
||||
This may seem strange, but the CPU, the motherboard is waiting, or chipset, or whatever, is waiting for what's called a power-good signal to come in.
|
||||
And then, when it receives that power-good signal, it knows that the power supply is good and everything's working.
|
||||
It knows what good means is plus five volts, and it can be anything between plus three and plus six volts.
|
||||
So it gets that, it says, okay, the power supply is okay.
|
||||
I'm now going to clear the reset flag, and I'm going to allow the CPU power into the CPU.
|
||||
Now, once the CPU gets the power, in other words, the reset flag is cured, it knows only one thing,
|
||||
and that's to go and start reading in memory, reading in code from address FFFF000, right at the end of the system memory.
|
||||
There's only 16 bytes of code there, but all that usually contains a jump to where it's supposed to go to find the rest of the real bias program.
|
||||
The bias program will start a power-on self-test, and if there are any errors, you'll hear beeps, just a side note there.
|
||||
If you are troubleshooting a PC, it's not coming up, it's not boosting, you don't know what's wrong.
|
||||
Usually, most motherboards, if you have a series of audible alerts, audible beeps that occur.
|
||||
For example, on a MI system, five beeps might be a problem with your processor.
|
||||
If you're troubleshooting it, find out what the motherboard type is, download PDF about the documentation, go to the Oracle section,
|
||||
and you should be able to hear what's wrong with the motherboard and replace that component, and then move on your merry way.
|
||||
Anyway, the bias continues on, and the first thing it will do is try and look for a video card, and this is typically at location C000000 in memory, and then it will call and execute the bias on the video card.
|
||||
This is the first indication that you will see that something is going on, and it also explains why the video card is usually the first thing that you see coming up rather than all the other checks from the bias.
|
||||
Excuse me. Then the bias will go and do the exact same thing for other devices that you find.
|
||||
For instance, array controllers if you have them, other things, and then it will display a startup screen, it will do some more tests, and then it will start doing a system inventory of sorts.
|
||||
Now, there's actually two types of booting. One is a warm boot, and one is a cold boot, so a cold boot is when the computer is physically turned off, no power going anywhere, and when you turn it back on, it's called a cold boot.
|
||||
A warm boot is when you hit the reset switch, and when you hit the reset switch, it sends that reset signal that we were talking about before to the processor, and it also sets a little flag to say that yes, it's been a warm boot.
|
||||
When this breadcomb trail is the CPU and the bias comes along to that point, it can go, okay, this is actually a warm boot that's occurring, or it's a cold boot that's occurring.
|
||||
During the system inventory thing, it takes a look at the hard disks that are in there, while many cylinders, platters, that sort of thing will get into that later on.
|
||||
Comports on the LBT ports that are available. This is also, after this, it'll go and do the plug-on-place stuff, which we'll also be talking about later, and you'll see a summary screen.
|
||||
And then, depending on the settings on the bias, it'll start looking for a boot device to boot, so typically it might look for a floppy disk, and it might look for a CD-ROM, and it might look for a hard disk, and then if you can't find out, it might try to end that boot or something.
|
||||
Typically, for an Linux operating system, it'll look for the master boot record starting at the first bootable disk at cylinder zero, head zero, sector one, which is the first sector.
|
||||
It'll then start reading in code into the processor from there, and that'll be typically bootloader, well, for Linux it'll be typically a bootloader, like Lilo or Grub, which we will also be covering later on.
|
||||
So that's the end of this little side note on the boot process.
|
||||
And that's the end of this episode in the mini-series on LPI certification for Hacker Public Radio.
|
||||
For feedback, corrections, or contributions on the series, please email me at ken.valon.asgmail.com.
|
||||
For general feedback on Hacker Public Radio, you can email feedback at hackerpublicradio.org.
|
||||
Remember, Hacker Public Radio is for the community and by the community.
|
||||
So if you'd like to do a show, a series of show rules, or provide some other assistance, please email admin at hackerpublicradio.org.
|
||||
With that, I'd like to thank you for listening, and wish you a very good day.
|
||||
Thank you for listening to Hacker Public Radio.
|
||||
HPR is sponsored by carro.net, so head on over to C-A-R-O dot N-E-T for all your hosting needs.
|
||||
Thank you very much.
|
||||
389
hpr_transcripts/hpr0014.txt
Normal file
389
hpr_transcripts/hpr0014.txt
Normal file
@@ -0,0 +1,389 @@
|
||||
Episode: 14
|
||||
Title: HPR0014: Databases 101 Part 2
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0014/hpr0014.mp3
|
||||
Transcribed: 2025-10-07 10:19:26
|
||||
|
||||
---
|
||||
|
||||
In the next video...
|
||||
It's the time
|
||||
Another companionship
|
||||
Hello world and welcome to After Public Radio.
|
||||
I am Stank Doug and on today's episode we are going to continue our in-depth series, our
|
||||
many series on databases, talking about from the ground up how they work, the fundamentals
|
||||
and basics and working our way up to some more advanced topics.
|
||||
This is episode two in the series so if you are just joining us I highly suggest you
|
||||
go back and find episode one.
|
||||
You can find that at hackerpublicradio.org and you can check to see that and a lot of
|
||||
other great episodes on great topics but today we are going to continue with some relational
|
||||
database management system topics and the first episode we did talk about databases in
|
||||
general and touched on the idea of relational databases but we didn't get too much in
|
||||
the terminology.
|
||||
I wanted to take a break and let the first part of that kind of sink in and make sure we
|
||||
are all on the same page and today we are going to talk about specifically our DBMS systems
|
||||
or relational database management systems which is the most common and most prevalent type
|
||||
of database management system out there.
|
||||
The relational database management system is based on something called a relational model.
|
||||
Obviously that is where the name comes from but what is a relational model?
|
||||
One of the things we are going to do in this series is try to break down a lot of this
|
||||
terminology.
|
||||
I do think sometimes it is silly and overkill to make up all these puzzle words and terminology
|
||||
to try to explain something that really can be much simpler.
|
||||
What they mean by a relational database management system and a relational model is simply that
|
||||
your data inside of this management system has relationships between each other.
|
||||
Now if you have just a text file as we talked about in the first episode of this series,
|
||||
if you just have a text file you don't really need a database system.
|
||||
If you just have a list of names and phone numbers or something very basic but as soon
|
||||
you add any level of complexity in there that you think that you are going to need something
|
||||
to maintain large volumes and numbers of data or a large amount of data, that is when
|
||||
you are going to want some sort of database management system and again relational database
|
||||
management system being the most common.
|
||||
The easiest way probably to visualize how data is stored in a relational database management
|
||||
system which we are going to refer to as RDBMS from now on, envision a spreadsheet.
|
||||
Any data stored in a relational or an RDBMS is stored in a two-dimensional array, aka
|
||||
a spreadsheet.
|
||||
Now, not a spreadsheet like Microsoft Office Excel or OpenOffice.org or any of those
|
||||
type things.
|
||||
It is easy to visualize that way but it is not an application.
|
||||
It is a two-dimensional array.
|
||||
That is to say that there are a certain number of rows and a certain number of columns and
|
||||
they make up something called a table.
|
||||
A table is the primary way that data is stored in an RDBMS so you can have a table that
|
||||
is a list of people's name and phone number.
|
||||
For example, again, you probably wouldn't use it if you are using a simple example like
|
||||
that but if you are using something a little bit more complex like say you had an online
|
||||
website that was taking orders.
|
||||
Well, if you think about that, you need a lot of information to take orders.
|
||||
You need people's name and address.
|
||||
You need a lot of their billing information.
|
||||
You need a catalog with what you are selling and the prices of those items, maybe descriptions,
|
||||
pictures, all kinds of data.
|
||||
If we go back to what we talked about in episode one, you could theoretically put all that
|
||||
in one big line in a text file somewhere but as soon as you reach any quantity of records,
|
||||
it is going to get confusing.
|
||||
There is going to be a lot of repetition.
|
||||
If somebody comes in and places five orders, they are going to have five records with the
|
||||
same information all of it.
|
||||
It is a lot of wasted space, inefficient accessing of the data.
|
||||
That is when an RDBMS is going to come in.
|
||||
What you do in an RDBMS is break down your data.
|
||||
There is something called normal form, normalization and what you are going to do in the normalization
|
||||
process is you are going to sit down and analyze the data that you have and you are going
|
||||
to break it down into a series of tables or spreadsheets if you want to think about that
|
||||
anyway.
|
||||
You can even sit down and I do this all the time for a lot of the projects that we work
|
||||
on in Binrib, sit down even on a napkin or a piece of paper or there are plenty of tools,
|
||||
gooey tools that you can use to do this on a computer.
|
||||
Sit down and kind of design and think about all the different data that you are going
|
||||
to have and going to be tracking.
|
||||
You have to do a lot of planning and preparation, it is not something you kind of do off the
|
||||
cup.
|
||||
You actually have to sit down and do some analysis and decide what data you are going to
|
||||
need in your particular system and then how can you break that data up logically and
|
||||
that process is called normalization.
|
||||
Normalization in layman's terms is to break down your data so that there is no repetition
|
||||
that data all works together and cooperates and is reliable and makes it easy to maintain
|
||||
and read.
|
||||
Now there are different types of normalization, different levels I should say of normalization
|
||||
that goes up to fifth and sometimes people say six normal form.
|
||||
We are not going to emphasize that now we might come back to that later on in another episode
|
||||
but for now just think that you want to get your data spread out in such a way that let's
|
||||
go back to the orders example that I used earlier.
|
||||
You don't want one big text file with all of that data stored on there.
|
||||
What you want to do is break that up into smaller logical segments so that it is easier
|
||||
to maintain.
|
||||
In one table or one text file or however you is easier for you to envision it, you want
|
||||
to break that data into one entity.
|
||||
You do not want to put all that in one entity.
|
||||
You want to break that up so that it is in several different tables or entities logically
|
||||
broken down.
|
||||
For example, if you are running an online store, one bit of data that you are going to
|
||||
have to have is your product line and information about it.
|
||||
You are going to have a product name, maybe the size, the color, the price, things like
|
||||
that.
|
||||
Anything that has to do with that product, you probably want to separate that off into
|
||||
its own database or excuse me into its own table inside of your database.
|
||||
That way as you add new products to it, they only get added to this one table.
|
||||
It is easily updated.
|
||||
There is no confusion.
|
||||
It is all in one place and one logical format.
|
||||
If you ever wanted to do a report on a list of all the items that you have for sale, you
|
||||
could do that very easily by just putting the data out of this table.
|
||||
That data really is somewhat irrelevant of the other parts of your system.
|
||||
Another part of your system of course would be the names of people who place orders.
|
||||
Your customer list would probably be a separate entity because the customers are independent
|
||||
of the products.
|
||||
You probably would have a separate table when someone comes to your website and decides
|
||||
to order something, they are going to have to register and give you their name, address,
|
||||
phone number possibly, maybe credit card number could go in there.
|
||||
Again, I am just making this up as we go along.
|
||||
You would have to do an analysis on your own system to decide what best fits for you.
|
||||
Then you might have a third one, a third table for the actual order of some sales.
|
||||
This table one and table two is a list of products and a list of customers respectively,
|
||||
but how do those two go together?
|
||||
This customer may order items one, five, and seven, but this next customer may order
|
||||
items one, two, and four, and how do you make those things work together?
|
||||
Well you probably would have a third table when a customer places an order that ties those
|
||||
two things together.
|
||||
You see that these tables while independent in nature by the nature of their data, customer
|
||||
table, product table, you can see that those are independent by the logical breakdown of
|
||||
their data.
|
||||
You see that they actually do have relationships and there is where that word comes back
|
||||
into play.
|
||||
They do have relationships between those tables and that is where you are also going to sit
|
||||
down in your analysis and decide how you are going to store that data.
|
||||
I guess to put it in a question form to make you think about it, what would you do or
|
||||
how would you find out if customer number four, what items did he order?
|
||||
Well it is not quite so simple as pulling only the ones where that customer's name matches
|
||||
the order.
|
||||
He may have multiple orders.
|
||||
You got to be careful that someone else in there may not have ordered the same thing
|
||||
that you are pulling the right data.
|
||||
So all those relationships are important in the design and layout of your database.
|
||||
I know this is kind of tricky to visualize via audio only on a radio show, but I am
|
||||
trying to break this down into the most simplistic terms that I can.
|
||||
So what you should be envisioning now in front of you are three different spreadsheets in
|
||||
the example I gave you.
|
||||
A three different tables is the proper term, table of customers, table of products, and
|
||||
then a table, third table that ties those together called orders.
|
||||
So when a customer comes to the site, the site is going to pull from the products table
|
||||
and give them a list of products as they page through them.
|
||||
You can imagine Amazon and all the products that they have is pulling out of those products
|
||||
tables and displaying them on the screen.
|
||||
If you register, it's going to create a record for you in the customer's table.
|
||||
And if you ever place an order, it's going to insert a record then into your orders table
|
||||
or their orders table.
|
||||
Now, that's very simplistic because a whole lot going on besides that, but you can see
|
||||
that process.
|
||||
And when you write that order in there, it's going to have your name, or probably some
|
||||
sort of numeric reference to your name to make it a little bit quicker.
|
||||
For ease of thought here, it's going to have your name, and then it's going to have the
|
||||
product name that you bought.
|
||||
Now it doesn't have to have the price, or the color, or the size, or any of that necessarily,
|
||||
depending on how you lay it out of size as an option, you might have to put that in there.
|
||||
But actually, by putting in just the name of the customer and the name of the product,
|
||||
it's tying the data from those two together and it can read those tables to pull the rest
|
||||
of the data.
|
||||
So it knows what color you ordered.
|
||||
It knows what size you ordered because it pulls it from that table.
|
||||
And those are the relationships in a relational database management system.
|
||||
So I've used the word table.
|
||||
Let's break down and analyze what exactly is a table.
|
||||
I described as a spreadsheet earlier.
|
||||
So if you've used Excel or any kind of spreadsheet application, you know across the top, you
|
||||
have several columns.
|
||||
And each one of those columns, I think by default, most spreadsheet applications will
|
||||
say A, B, C, D, E, F, et cetera, et cetera.
|
||||
Well, you have all the columns at the top and on the left, you have rows.
|
||||
And that's just simply how many rows of data that you have.
|
||||
So you may have a list of five customers.
|
||||
If you want to visualize, imagine across the top, what are you going to put in column A?
|
||||
Customer name, for example.
|
||||
And column B might be street address.
|
||||
Column three might be state four, city five, zip code, et cetera, et cetera.
|
||||
So each one of those columns has a different type of data in it.
|
||||
And imagine it, or even if you want to while we're listening to this type then, so you
|
||||
can visualize it.
|
||||
But you see that each one of those columns has a different type of data in it.
|
||||
You don't want to mix in that.
|
||||
You don't want to on your next row.
|
||||
Oh, well, I'll put the address in column A this time.
|
||||
And the name over in column C, logically, who does that when they put in a spreadsheet?
|
||||
You have it all nice and neat, so it's readable and easy to understand the data that's
|
||||
in there.
|
||||
Well, the same holds true when you're putting data into a database.
|
||||
So as a matter of fact, that's one of the benefits of a database to keep everything
|
||||
nice and organized.
|
||||
So you'll have a customer table.
|
||||
And each one of those columns that we refer to in a spreadsheet, the proper name and
|
||||
database terminology for that, those are your field names.
|
||||
You're going to call a unique field, for example, customer name, or C name, or whatever
|
||||
you want to call it.
|
||||
Just plain old name, whatever you call it.
|
||||
As long as it's unique, you can call those fields, whatever you want.
|
||||
You can have as many fields as you deem necessary.
|
||||
Again, the relational database management systems have, there is some theoretical limit, but
|
||||
it's so ridiculous that nobody probably listening to this show is ever going to run into a situation
|
||||
where they don't have enough room or the database management system doesn't allow them to
|
||||
have enough fields.
|
||||
So you're going to create a bunch of fields and you're going to define those field data
|
||||
types.
|
||||
For example, if the field you decide to call it customer name, or customer or underscore
|
||||
name, or something like that, you're going to define it as a data type of what kind of
|
||||
data is alphanumeric, which is, and I'm not going to go into the terms, but there's different
|
||||
ways that you define that.
|
||||
You say, okay, well, this is going to be an alphanumeric field, and it's going to be a
|
||||
length of, I don't know, 50, or however long you think the longest name you might run into.
|
||||
Always error on the side of caution, and there are some database tricks and data types
|
||||
that you can use that are variable length.
|
||||
We'll come back to that in a later episode, but for now, just understand you're going
|
||||
to define the data type.
|
||||
One of the other fields we mentioned is price, for example, well, price is a numeric
|
||||
data type.
|
||||
You're never going to put in a BC for a price, it doesn't make sense.
|
||||
So you probably define that field as a numeric type.
|
||||
So you put all that in there, just like you would in the spreadsheet, but you're going
|
||||
to put these into a table table, you're going to define all those data types and the names
|
||||
of them, and then every time you put a record into that data, a record is equivalent to saying
|
||||
a row in your spreadsheet visualization.
|
||||
So you're thinking of a spreadsheet, and let's say you're manually taking orders over
|
||||
the phone and in a spreadsheet, and in Microsoft Excel, you type in all that information every
|
||||
time someone takes an order, what a nightmare that could be.
|
||||
You type in one row of information about somebody that is a record in database terms.
|
||||
That is one row across filling in all, or most of the fields that you define at the top
|
||||
of the name, the address, the phone number, et cetera.
|
||||
And certain information, of course, is required.
|
||||
You can't process someone's order if they don't give you a credit card number, for example,
|
||||
or if they don't give you a shipping address.
|
||||
So all these things factor in there as well.
|
||||
We're going to come back to some database design, probably in a later episode as well.
|
||||
But right now, you should have, visually, in your mind, several spreadsheets, aka tables,
|
||||
and we're going to, from now on, get in the habit of calling them tables, because that
|
||||
is the proper name.
|
||||
You can visually think a spreadsheet, but there are two dimensional arrays called tables.
|
||||
The tables have all of your fields defined in them, which again is across the top for
|
||||
a visualization aspect.
|
||||
And then every time you have a complete row of data in there, a rows are referred to as
|
||||
records.
|
||||
So this is all your data stored in there.
|
||||
So let's imagine you've been a business for a month, and you have a database filled
|
||||
with at least those three tables I mentioned, a customer's table, a product's table, and
|
||||
an order's table.
|
||||
So as you add new products to your store, all you have to do is add that product into
|
||||
your product's table.
|
||||
As new customers come in, it's going to add a new row to your customer table, and it's
|
||||
going to continually grow, and this is where relational database management system shine
|
||||
is the more data you put in there, they can still read and write that data very efficiently.
|
||||
So that's one of the good benefits of our GVMS.
|
||||
The other thing we probably want to talk about on this show is we mentioned these tables
|
||||
and having relationships together, well, I'm going to leave, this is kind of a very deep
|
||||
topic, but it's critical, it is the most important thing in understanding databases and relational
|
||||
databases is the concept of keys.
|
||||
We talked about these tables having relationships between each other, but how we kind of glossed
|
||||
over that and intentionally so, well, that database has to relate to each other somehow,
|
||||
and it has to be in design in such a way that you can look data up between the two of them.
|
||||
If the data does not have relations between them, if they do not have relationships between
|
||||
them, then again, you might not need a database management system or you might not need these
|
||||
all together in the same database itself.
|
||||
The whole point is to have relationships between that data.
|
||||
So again, we go back to the products table and a customer's table, well, how do you tie
|
||||
those two together?
|
||||
Well each time you insert a table into a database, you want to, you don't have to, but you
|
||||
want to, to take advantage and properly use databases, you want to define some unique
|
||||
identifier for every table.
|
||||
And that's what normalization that we refer to at the beginning, normalization, you don't
|
||||
want to repeat any data anywhere.
|
||||
You want to try to make every piece of data only once in the database because ASSafe space
|
||||
be, you don't want to have to update multiple locations anytime something changes.
|
||||
What if the color of one of your products changes?
|
||||
If you've got it just in your products table, there's only one place that you can change
|
||||
it.
|
||||
But if it's also over here in the order table or in some other descriptions tables, you've
|
||||
got this independent and not tied back to that, you can be updating data in a bunch of
|
||||
different places and you don't have data integrity anymore, you don't have your data maintained,
|
||||
you may forget to change it in a bunch of other places.
|
||||
So what you want to do in these tables is logically break them down in such a way where you
|
||||
define something called a primary key.
|
||||
And a primary key on a, on let's say our customer database, for example, it could be a name
|
||||
and we're going to go with name for right now, a name, some unique way to look up information
|
||||
in that table.
|
||||
In that table, if I've got a table with 500 people in there, I only want to find one particular
|
||||
customer.
|
||||
How do I do that?
|
||||
Well, in the last, in the first episode, we talked about if you had a text file and all
|
||||
that data in there and you have to go searching through it to find one unique name, one person,
|
||||
it's going to be difficult.
|
||||
You don't have to parse through that entire thing and all this extraneous data that you really
|
||||
don't need.
|
||||
Well, in an RDBMS, the data is stored in such a way that you can search much quicker and
|
||||
much more efficiently, you define a primary key, which is indexed so that when you go looking
|
||||
for something, it's going to go right to that data infinitely so, so much faster than
|
||||
writing directly to a text file or some other format.
|
||||
So if you only wanted to look up, I don't know, David Letterman, just see what he's ordered
|
||||
from your site.
|
||||
I don't know why that name popped into my head, but it did.
|
||||
So you go in there and you search for that name.
|
||||
It's a unique ID and the example that we're using here.
|
||||
And you can say, okay, there he is.
|
||||
Here's his address, phone number, so you went straight to him.
|
||||
Believe it or not, that's actually a very bad idea.
|
||||
But if your actual user that you were looking up was John Smith or some common name, you
|
||||
could have multiple John Smiths with different addresses, they're completely different people.
|
||||
So when you define your primary key, you have to be very careful, you have to come up with
|
||||
some unique identifier to be able to tell that.
|
||||
Back to your products table, for example, you might not be able to use a product name
|
||||
as your primary key.
|
||||
But if the name product name was antivirus, well, there's several different antivirus
|
||||
software packages.
|
||||
How are you going to tell one from another?
|
||||
You're going to have to come up with either a longer, more unique name every time, or
|
||||
more than likely what's going to happen and what most places do is they'll use a numeric
|
||||
system, whether it's auto numbers, starting at one, to uniquely identify every product
|
||||
in there.
|
||||
Maybe assign some sort of code number, maybe something that's stored in a third-party
|
||||
database, so AV1 for the first antivirus product, AV2 for the second antivirus product.
|
||||
Over in the customer's table, think of some unique identifier that you could use to uniquely
|
||||
identify a person.
|
||||
The most common one that we all know is probably social security number, and there's a lot
|
||||
of controversy over using that number.
|
||||
It is used very frequently as unique identifier because theoretically, it's unique to every
|
||||
person in the United States.
|
||||
They all have a social security number, but that may not be safe to use, first of all.
|
||||
If you're dealing with international, you might not have a social security number, so that
|
||||
becomes a pitfall.
|
||||
Really, what I'm getting at here is part of the analysis that you're going to do when
|
||||
you lay your tables out is to come up with something unique that you can identify and
|
||||
individual row.
|
||||
You have to be able to do that in our DVMS.
|
||||
You have to somehow come up with a way where you can find one row, one record of data in
|
||||
there.
|
||||
I think that's probably a good place to leave you thinking until we come back to another
|
||||
episode and we'll follow up on this, but how would you break something down?
|
||||
How would you uniquely identify a person?
|
||||
That's probably the question I'm going to leave you with with this episode.
|
||||
How would you uniquely identify with a person in any scenario or in any database?
|
||||
How do you think and use it in reference to the application?
|
||||
How does the United States government uniquely identify a person's social security number?
|
||||
One of the first things that jumps to mind.
|
||||
How does your state uniquely identify you in their database?
|
||||
They could use the social security number, but technically, they should not.
|
||||
What do you think they might use?
|
||||
What about your school or your college or university or even high school?
|
||||
How do you think they uniquely identify you?
|
||||
They again could use the social security number, which is universally unique in the United
|
||||
States, again, theoretically, but they shouldn't be using that either.
|
||||
So what might they use?
|
||||
What's different that could be unique for them to identify one individual person?
|
||||
So that's a good question to leave you with this time.
|
||||
I'll do a quick recap on some of the important terms and things that we brought up this episode.
|
||||
We talked about RGBMS, relational database management system, and how they have relationships.
|
||||
The key word in that is relationships.
|
||||
Your data has to have relationships with the other data in your database.
|
||||
Otherwise, there's no point in having it or no point in using it.
|
||||
If you've just got one list of data, then there's no need in using an RGBMS.
|
||||
But if you do decide that you're going that direction and you are going to need that,
|
||||
then you're going to break your data down into logical clusters, remove repetition, don't
|
||||
use reuse data.
|
||||
Make sure the data exists only in one place as best you can, and this process is called
|
||||
normalization.
|
||||
And there are different levels of normalization that we did not go into that we'll hold
|
||||
for another episode.
|
||||
And the design of your database logically, think ahead of how you're going to uniquely
|
||||
identify all of that data.
|
||||
Sometimes you break down all of your data, but you're still going to have to add a little
|
||||
bit more data to uniquely identify it.
|
||||
In the example we talked about tonight, we said products.
|
||||
Anti-virus may not be a good enough example.
|
||||
Even, honestly, even Norton antivirus might not be good enough because there's different
|
||||
versions of it.
|
||||
So how would you uniquely identify it?
|
||||
Would it be NAV1 for Norton antivirus version 1, NAV2 for version 2, et cetera, et cetera?
|
||||
That's the kind of stuff you need to think about when you're designing your databases.
|
||||
So I'm going to plant that in your head for this week and let you all think about it.
|
||||
The question you should be having your head and think about when we start the next episode
|
||||
in this many series will be how to uniquely identify a person, just as an exercise to
|
||||
get you thinking for the next episode.
|
||||
So thank you for your time this week, and we will see you again on an upcoming episode
|
||||
of Hacker Public Radio.
|
||||
Thank you for listening to Hacker Public Radio, HPR, sponsored by carrow.net, so head on
|
||||
over to C-A-R-O-DOT-E-T for all your hopes for new Hacker Public Radio.
|
||||
17
hpr_transcripts/hpr0015.txt
Normal file
17
hpr_transcripts/hpr0015.txt
Normal file
@@ -0,0 +1,17 @@
|
||||
Episode: 15
|
||||
Title: HPR0015: Spring Cleaning
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0015/hpr0015.mp3
|
||||
Transcribed: 2025-10-07 10:17:52
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
127
hpr_transcripts/hpr0016.txt
Normal file
127
hpr_transcripts/hpr0016.txt
Normal file
@@ -0,0 +1,127 @@
|
||||
Episode: 16
|
||||
Title: HPR0016: Benefits of Virtualization
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0016/hpr0016.mp3
|
||||
Transcribed: 2025-10-07 10:18:58
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
Hello and welcome to today's episode of Hacker Public Radio.
|
||||
I'll be your host, DeepGeek.
|
||||
Today is episode one in a series I'm doing on virtual machine technology.
|
||||
And today's episode is called Benefits of Virtual Machines.
|
||||
There's a campaign article on dockdroppers.org called Benefits of Virtual Machines.
|
||||
And I'll be going over this article I wrote.
|
||||
This is my way of planning it out.
|
||||
And I will embellish upon what I have in the article as I see fit as I go.
|
||||
But I want to begin documenting these things both online in a searchable web format,
|
||||
as well as having the radio programs.
|
||||
And the reason why I'm just going over the benefits of virtual machines was because I originally want to make this introduction to virtual machines with QMU,
|
||||
which is a particular software package.
|
||||
But I found that breaking it down, it was too poor a topic, you know, just coming out and introducing it.
|
||||
Because I had to digress constantly into why you would want to run a virtual machine.
|
||||
Because as with everything, there is a break in period where an learning curve experience
|
||||
and virtual machine technology can get very deep and heavy, which is why you have to have a many series about it.
|
||||
So I thought I would just try to answer the question, you know, why would I want to learn how to use this technology?
|
||||
You know, virtual machines, let's get started.
|
||||
Also known as just virtualization is currently a popular topic in computerization.
|
||||
But in this episode is all for the benefit people who are unfamiliar with using this computer technology.
|
||||
This article will explain the benefits of using virtualization.
|
||||
To be incredibly brief, a virtual machine is a simulation of a computer running on a computer.
|
||||
Don't confuse this with some security applications known as jailing.
|
||||
It's not the same thing.
|
||||
And also don't confuse this with certain programming languages that have a limited virtual machine
|
||||
to enhance the languages portability between computing platforms as a Java virtual machine.
|
||||
No, this technology is about simulating on a computer, having a simulation of like an Intel compatible, you know, a 8386 compatible.
|
||||
With a certain kind of bus and half a gigabyte of memory.
|
||||
And it has a sound card and network cards.
|
||||
And it's got this size of 10 gigabytes, you know, a specific machine that doesn't exist in the real world, that we're running a simulation of.
|
||||
What can be achieved by doing this?
|
||||
Well, the first one that comes to mind for me, which is because it was the impetus for me to come to this technology,
|
||||
running one operating system inside of another operating system.
|
||||
You can, for example, run a Linux system within a Windows system or vice versa, you know, a Windows system within a Linux system.
|
||||
This is a favorite of people who switched from one operating system to another for the day they need.
|
||||
You can find that there is still a need to occasionally run an old program.
|
||||
So, you know, you can set up the virtual machine, let's say you have saved certain software packages from your old, your old operating system.
|
||||
And you're doing almost everything on your new operating system.
|
||||
Run the virtual machine, run the operating system of the older that you used to use, and run the favorite application.
|
||||
And it'll come up as an application window on your desktop, on your new operating system.
|
||||
Okay. Another thing we can do with this technology is we can sandbox untrusted applications.
|
||||
You know, if a program is not fully trusted, you can effectively isolate it onto a virtual machine.
|
||||
So, it doesn't affect one's main system.
|
||||
Now, many of these virtualization packages use a file on the disk, and that file simulates the disk drive on the simulated machine.
|
||||
So, I could say set up a 10 gigabyte file and install Linux onto it if I was using Windows.
|
||||
And that to the Linux system on the virtual machine, that file would look like the whole disk.
|
||||
And then I began doing whatever I had to do within that disk.
|
||||
Now, there's a range of possibilities that arises if you do this.
|
||||
You know, at the lowest end of the spectrum, at least the daring one, is you can just try out a piece of software.
|
||||
You know, you might not know if installing it onto the main system could conflict with something you already have existing.
|
||||
You don't even know if you might like it.
|
||||
So, let's say you want to try a new mail application.
|
||||
You know, some mail applications might have certain dependencies and call certain payments into play.
|
||||
And you might not be aware of it. You could install that mail application just as an example.
|
||||
And see if you like it. See what kind of side effects it has. See if it installs anything else.
|
||||
That's the simplest case.
|
||||
Now, on the more daring end of the spectrum of sandboxing, you could actually surf the web on an OS and browse a combination known to be susceptible to malware.
|
||||
You know, you remember, you know, if you have a problem, you can delete the virtual system as easily as deleting a file.
|
||||
But you can keep that file around, keep running the system and observe the behavior.
|
||||
I used to pride myself in my Windows days. I'm a Linux person now.
|
||||
And I'm not catching viruses, but when I learned how to use this technology, one of the things I went out and did was run Windows as a simulated system.
|
||||
And I went out and purposely caught malware and watched what it was like, watched what other people was succumbing to, which I had assiduously avoided.
|
||||
Now, another application of using virtual machines is to test hardware changes.
|
||||
Now, in this scenario, you can set up a system and you can just try changing the hardware on it.
|
||||
The most common experience in doing this is seeing how much memory an application works best under.
|
||||
Now, you know, you can try paring back the amount of memory the virtual machine has and see how much you can get away with.
|
||||
And you can also simulate having more memory than you actually have.
|
||||
Now, if you think about that for a second, you're going, well, wait, if you're simulating more memory, you're still going to swap that extra memory someplace.
|
||||
But by shifting it to the virtual machine, you can see how much of that swapping is taking place in the virtual machine's virtual memory and the real memory.
|
||||
In other words, to the virtual machine, you won't have a swap at a certain point, even to know on your real machine, it will overallocate the memory and use the swap file.
|
||||
And that's, you know, very briefly what some people use this technology for is to justify expanding a machine.
|
||||
I've also had problems with this one time. I accidentally changed the bus structure of a virtual machine and just the software just couldn't deal with this crap down.
|
||||
You know, the bus was removed, you know, it can do all kinds of crazy stuff with this.
|
||||
Now, something that students and universities do with this is they build simulations of clusters.
|
||||
Now, you know, you got to think about this. If you're in a programming class and you're learning cluster programming, you know, the university has a cluster and you got to try your program on it.
|
||||
Now, doesn't it make sense to have a simulation of the cluster on your computer and to go through the generations of writing a program and then only actually running the program on a cluster once you get the basic debugging done?
|
||||
Doesn't that save you time and waiting for the big computer as well as saving runtime on the big cluster?
|
||||
And now, it's related to this is if you're a networking student or, you know, even if you're, you know, playing a game of what if say in a commercial application, you can virtualize and set up an imaginary dummy network configuration.
|
||||
Instead of building a physical computer network and see if it will work out on the virtual machine before going to the bother of building it.
|
||||
Now, one of the more obscure things that gets done with this technology is standardized development machines.
|
||||
Some virtual machine packages allow developers to develop new software on a standard machine.
|
||||
You know, developers of software can be and geographically for fun places using widely different problem hardware platforms.
|
||||
And it helps them to have be developing the software on the same prototype hardware so all the bugs can be redone, you know, replayed out.
|
||||
So an example of this is the up and coming React OS, which is being developed. React OS is an attempt to building a Windows clone from the bomb up.
|
||||
You know, we aren't allowed to reverse engineer windows, but to just build something that responds, you know, do that response to all the windows calls, the API calls, you can attempt.
|
||||
And they are currently distributing their test systems in VMware and QMU files and they send around the test machine with the software on it.
|
||||
Now, the last example I want to give you is that of retro computing.
|
||||
Now, older computer types may have extensive software collections that were used on now obsolete systems.
|
||||
You know, they could have artwork applications that were written in a bygone era of computing and they can rerun that now by simulating an older computer with an older operating system.
|
||||
And this generates an nostalgia experience for some people, you know.
|
||||
But not only in the nostalgia, you know, there's a relay technology, you know, emulators are not new per se, but they aren't as general as virtual machines.
|
||||
There used to be a emulator that emulated old deck machines to digital equipment corporations under UNIX.
|
||||
The problem was is that the deck machines were often used for physical running physical plants.
|
||||
And what happened was, there's a bunch of nuclear power plants were built that used deck machines that deck went out of business.
|
||||
And the actual replacement part industry lasted for a prolonged period of time because they couldn't close these nuclear power plants.
|
||||
And then after fixing the old deck hardware, they began to simulate the old deck hardware so that newer, more modern computers could still interface to running the plant.
|
||||
So that is an actual heavy-duty industrial use of a related technology.
|
||||
So I try to answer the question, especially because why a person would want to run virtual machine technology?
|
||||
I try to explain it with some, with it, by giving you first a simplified definition.
|
||||
I mentioned a few things not to confuse it with and then I gave you a series of examples to show you the kind of usage different people get of this technology.
|
||||
And this concludes, this is the beginning of the end for episode one from Deep Geek of virtual machines.
|
||||
And I want to close out with another geek tidbit.
|
||||
Let's have a look at a famous historical computer geek.
|
||||
I think you guys really ought to know about what to research. Donald Irvin Cunuth, born in 1938, is still kicking around as best we know.
|
||||
Cunuth is a famous, famous computer science. He is the father of mathematically proving the efficiency of computer algorithms.
|
||||
And his platform for this was a series of books of classical computer science known as the Art of Computer Programming.
|
||||
And I actually got the searches and sorting volume of this. It was a little too heady for me.
|
||||
I couldn't understand everything this guy was trying to get a course, but he would give you an algorithm for sorting and show you three or four algorithms.
|
||||
And then he would prove with calculus mathematically which one would be the fastest every time.
|
||||
This is a brilliant guy, you know, to get to a fact where you can prove something like that in math.
|
||||
Instead of just like what most people in my skill set would just benchmark at a billion times instead. He could prove it mathematically.
|
||||
Donald Irvin Cunuth also gave us the late tech typesetting software. And this is a software that you can use on your Unish-like computer operating systems and approach the typesetting quality of book publishers.
|
||||
And the reason he built that was because he showed a lot of calculus and he couldn't get the signals to print right.
|
||||
So he got into typesetting just to pass this down. He's also done many many other things.
|
||||
Wikipedia has a wonderful article that is a great jumping off point to looking up this fellow.
|
||||
So I hope you research him out a little bit and enjoy what you learn.
|
||||
This concludes today's episode of Hacker Public Radio. Thank you for listening.
|
||||
Thank you for listening to Hacker Public Radio. HPR is sponsored by Kero.net. We'll head on over to C-A-R-O.N-T for all your hosting needs.
|
||||
Thank you very much.
|
||||
44
hpr_transcripts/hpr0017.txt
Normal file
44
hpr_transcripts/hpr0017.txt
Normal file
@@ -0,0 +1,44 @@
|
||||
Episode: 17
|
||||
Title: HPR0017: Torrentflux
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0017/hpr0017.mp3
|
||||
Transcribed: 2025-10-07 10:19:20
|
||||
|
||||
---
|
||||
|
||||
Music
|
||||
Welcome to another episode of HPR, I'm your host Enigma, and today I will be talking
|
||||
about Torrent Flux. Torrent Flux is a multi-user GUI for BitTornado. It has a PHP front end
|
||||
and a MySQL back end. It can manage all downloads in a central location to make life easy
|
||||
to your and not have a your favorite Torrent application of choice on your desktop. It's centralized.
|
||||
You can stick it on a server somewhere and not really worry about having it suck your resources
|
||||
on your local machine. Multiple users can upload files at the same time. It can search
|
||||
sites from the GUI with some plugins for your favorite Torrent search engine of choice.
|
||||
And you could have some possible automation to the process, which I'll talk about later.
|
||||
Your requirements, a Linux box installed and working. It's been tested on Debian Red Hat
|
||||
Fedora. Personally, I use mine on SNOS, which is Red Hat Enterprise, an Apache web server.
|
||||
PHP Apache module version 4.1 or higher with a MySQL database server, and it also supports
|
||||
other ODBC databases. Python 2.2 or higher. SC Linux should be turned off or configured
|
||||
to allow Torrent Flux to work with files in a specific application path. And Safe Mode
|
||||
must be turned off in the PHP.Anyfile Torrent Flux reads writes files that Safe Mode would
|
||||
restrict. And basically, it's an easy install. You go to the website and untar the archive.
|
||||
You want to download. You create the database in MySQL. And that has, or read me, that basically
|
||||
will walk you through the process of creating the database. You build the Torrent Flux tables
|
||||
by running a SQL script that's provided in the tar archive. And then you want to edit
|
||||
your config.php for the database settings on that particular box. You want to browse
|
||||
to the site that you have. You have to have Apache running. Browse to your local post.
|
||||
And set up the password and other directory info. And you must either turn off or put
|
||||
in Allow Mode SC Linux. Basically, you can upload or search from Torrents on the main
|
||||
screen of the Torrent Flux website. It will auto-seed the Torrent after completion, but
|
||||
that can be turned off. You can select files out of Torrents if you only want to download
|
||||
a specific file from that Torrent. It also has a history feature where you can basically
|
||||
keep track of all the Torrents you've downloaded. It has a nice GUI interface that tells you
|
||||
how much disk space you have left on the specific drive. It's got multi-user management
|
||||
with disk quotas, so you can have a user set up where you can only use 10% of your disk
|
||||
space or whatever you wanted to do with that. It's very easy to use interface and customisable.
|
||||
You can auto-ft. You can have customization scripts within the tool that you can auto-ftp
|
||||
the Torrent once it's finished to another location via of a script. It's got an RSS feed
|
||||
built in with new Torrents, and that's about it for today. Thanks to all the hosts that
|
||||
have helped out with HPR so far, we haven't missed a day yet, and I'd like to keep that
|
||||
going. If you'd like to contribute to HPR, please email me at admin at hackerpublicradio.org
|
||||
or if you have feedback on any of the shows, please email feedback at hackerpublicradio.org
|
||||
and have a nice day.
|
||||
656
hpr_transcripts/hpr0018.txt
Normal file
656
hpr_transcripts/hpr0018.txt
Normal file
@@ -0,0 +1,656 @@
|
||||
Episode: 18
|
||||
Title: HPR0018: An Interview with Ed Piskor
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0018/hpr0018.mp3
|
||||
Transcribed: 2025-10-07 10:23:46
|
||||
|
||||
---
|
||||
|
||||
So
|
||||
Hello everybody and welcome to Hacker Public Radio, the suspect dog with you on this
|
||||
episode.
|
||||
And today we actually have a very special guest on the show, somebody who, if you read
|
||||
the banner at forums, you might have seen him enter recently and talk about a project
|
||||
that he's working on, Ed Piscore is joining the show with today.
|
||||
And we're going to talk about his latest book, his latest graphic novel called Lizzy Wig,
|
||||
the One Freak, which is a graphic novel about, well actually I guess we'll go into what
|
||||
it's about in a few seconds, but first of all, Ed, thank you for being on the show.
|
||||
Thanks for having me, thanks, real good to talk to you, Ed.
|
||||
Alright, so, first impressions of the book, alright, you ready for this?
|
||||
I'm here.
|
||||
Alright, so, first of all, thank you for sending me the copy, I appreciate it.
|
||||
It was weird, first of all, there's a weird backstory here that you and I know that I guess
|
||||
we could share is I was traveling a lot during this, when you sent me this book and I
|
||||
wasn't able to get my hands on it, I was looking forward to reading it through the holidays,
|
||||
I came back and I couldn't get into my PO box because I really wanted to read this
|
||||
on the flight I had coming up, I flew out to San Diego, shots just to Sevant and the
|
||||
guys out in San Diego, generic, and I was looking forward to reading it on the plane, however,
|
||||
the post office was closed because it was the 31st and the first for the only two days
|
||||
that I was home, so when I tried to go was a Sunday and a holiday, so I couldn't get
|
||||
the stupid thing, so I didn't get the reading on the plane, but I did get it when I got
|
||||
back, and very excited, the first thing I did was flip the book over, first of all, let's
|
||||
talk the size of the book, now what are the dimensions here?
|
||||
It's like a seven and a half inch square, so seven and a half inches all around.
|
||||
Perfect square, so first thing I did, I picked up the book, nice glossy cover, I was
|
||||
impressed that I wasn't sure what to expect if this was going to be stapled together quite
|
||||
honestly, I wasn't expecting this, it came in great shape, I'm very impressed, it's bound
|
||||
very well, I'm a little bit anal about my books too, I'm one of those guys that
|
||||
I can't stand people who bend the front cover back around the book while they're reading
|
||||
it, oh man that bug's that army for some reason, that's a book, I know what you're talking
|
||||
about man, I know what you're talking about, I hate where people fit in front of me and
|
||||
they take a look at my club, they can then just manipulate it all weird and roll it up
|
||||
and put it in their pocket and it just makes you want to cry man, it worked hard on this
|
||||
stuff, you know?
|
||||
That's a book man, you can't do that, that's like, I don't know, sacrilege or something,
|
||||
I just can't do that to books and anyway, so mine is still even though I've read the whole
|
||||
thing, the spine is still perfect, no cracks, no creases, so I will keep it in that condition
|
||||
I hope, so the first thing I did I felt, pick it up my hands, I was impressed, it was
|
||||
good binding, I was surprised at that, so if anybody's wondering about ordering something
|
||||
online like that and wondering how it comes, it does come just you could buy this off
|
||||
the shelf in any bookstore, and actually is this available in bookstores at all or is
|
||||
it only online?
|
||||
No, just distributing it myself, right, like with you, if you get in touch with a distributor
|
||||
to pick up your stuff I mean, they just, like you end up losing money just by shipping
|
||||
it to them and stuff like that, so I'm just handling it on my own.
|
||||
Exactly, we found the same exact thing with our magazine, you have to front all the
|
||||
shipping to get it to them and then there's such a delay in getting the sales numbers
|
||||
back and getting paid for it, and then whatever they don't sell they don't pay you for, and
|
||||
it's such, it's so hard to get into that market or into that distribution line, so I totally
|
||||
understand what you're saying.
|
||||
Yeah, in comics there's a monopoly, when it comes to distribution, this company called
|
||||
Diamond, and since they're a monopoly, they can command that you give them, I think
|
||||
it's 60% off to carry the book, and I mean, with each copy you're losing a lot of money,
|
||||
that's crazy, so I think my audience is extravagant enough to find the book in the internet
|
||||
the perfect way of distribution, but people talk about it, if they want it they'll find
|
||||
it.
|
||||
And that's the same thing with us, but also to throw in there, this is something that
|
||||
the printed medium is, I love the printed medium, there's other ways of distributing online
|
||||
and stuff, but I like the printed medium, it's somethings are just designed to work well
|
||||
for it, and I think this is one of them.
|
||||
There's a whole movement of web comics out there, and I don't know, there's just something
|
||||
about looking at a screen, I like something tangible that you can kick back on the couch
|
||||
and just, you know, step away from the computer for a second and, like, decompress.
|
||||
Yeah, and they're out in a recliner or something.
|
||||
Some things work better online, some things work better printed, it's just the nature
|
||||
of it, and I think this is definitely something, I don't think I would like reading this online
|
||||
as much as I do, having it printed.
|
||||
So yeah, I saw the same way in there.
|
||||
Yeah, so I think it also, first of all, I'm impressed with the printing and the way
|
||||
this thing is put together, that I wasn't expecting, so that ended up being pretty good.
|
||||
I didn't know if you were going to staple this out of your house and send it to me or what.
|
||||
So nice glossy cover, nice thick card stock cover, and even the interior paper, see,
|
||||
there's a lot in your artistic style, and we probably will come back to this later,
|
||||
but in your artistic style, there's a lot of shading and colors, and you're not afraid
|
||||
to make dark backgrounds and shadows and things like that to help offset it.
|
||||
So nice thick paper inside, so it doesn't lead through to the other side, which is very
|
||||
in something that I learned in doing the magazine that you have to be careful with.
|
||||
Yeah, absolutely.
|
||||
Now, here's the first thing that made me say, uh-oh, wait a minute, flip it over to the back,
|
||||
and on the back cover is a big, free, Kevin's thumper sticker, basically.
|
||||
And I immediately thought to myself, oh no, this is going to be the Kevin Mittening story
|
||||
again, we're going to hear the poor Kevin, Kevin got this, Kevin got that.
|
||||
Well, and I began flipping through the pages.
|
||||
First of all, the artwork was very interesting, and again, wasn't sure what to expect.
|
||||
So I flipped through it, of course, it immediately looked interesting.
|
||||
I'm going to go back to the page, you want to start reading.
|
||||
First of all, thanks for the introduction, nice first page, you sent me.
|
||||
I appreciate that.
|
||||
Started reading it immediately, and I was kind of half reading it to be honest,
|
||||
sitting in front of the TV, I just got home, I was trying to watch the news,
|
||||
and picked this up and half reading it, and I found it about four pages into it.
|
||||
I had to turn the TV off and concentrate on the book.
|
||||
So you did a good job of engaging me within the first few pages.
|
||||
And that's a big obstacle.
|
||||
Yeah, that's a big obstacle overcome, I think, in most readers.
|
||||
Americans sadly have a short attention span.
|
||||
I don't think I'm as bad as most, but I guess I probably have my moments.
|
||||
And first page, of course, the title, the first frame says,
|
||||
The Mythology of Boynthump, aka Kevin Fennical Jr.
|
||||
So there's the Kevin from the back.
|
||||
So it obviously does have some relation to the free Kevin movement,
|
||||
for obvious reasons, but this is not a book,
|
||||
true or false, this is not a book about Kevin Midnick.
|
||||
Yeah, it's definitely not a book about Kevin Midnick per se, though.
|
||||
Somebody who knows the story of Midnick might recognize some scenarios and situations
|
||||
that this character gets himself into every now and again.
|
||||
Right, now is there, okay?
|
||||
First of all, Kevin is good because,
|
||||
not only you got Kevin Midnick, Kevin Poulson, you've got just the name Kevin,
|
||||
for I don't know, weird reason seems like after name, because of them,
|
||||
I guess because of some of the big names historically.
|
||||
Is there any other significance to the Kevin J. Fennical Jr?
|
||||
They're kind of, it doesn't have much to do with actor lore, so much as it does,
|
||||
so much as it has to do with just my personal life.
|
||||
I have a friend named Kevin.
|
||||
He's in the computers, and he's very tech savvy.
|
||||
His name is Kevin.
|
||||
And the last name that you don't need to know.
|
||||
And I worked with the guy in this real shitty call center here in Pittsburgh.
|
||||
And the people were so in that that in the computer system where they sort of
|
||||
had his name stored, they misspelled it.
|
||||
They called him Kevin Fennical, so he was so pissed off about that.
|
||||
And whenever I would call him Kevin Fennical,
|
||||
he would screw up my name and we would just like make fun of each other
|
||||
with calling each other retarded names and stuff.
|
||||
Yeah, that's a great story.
|
||||
It's just my way to get people to say Kevin Fennical over public airway and anywhere else.
|
||||
One day we're going to cross in real life at a con or something like that.
|
||||
You've got a point to him and I'll walk up and say, hey, you're Kevin Fennical.
|
||||
Easy to do, man.
|
||||
The point's up monitor.
|
||||
Well, I was going to bring that up later in the show when I started breaking it down.
|
||||
But yeah, the point's thump, first of all Michael, that's kind of unique.
|
||||
I've never heard that.
|
||||
It's a very, it's very onomatopoeia.
|
||||
It's kind of like a point thump.
|
||||
And then as I started reading, it actually some page 23.
|
||||
I'm flipping to it right now.
|
||||
Where in the book, there's a backstory of how he picked up the handle.
|
||||
And I didn't get it.
|
||||
I'm like, wait a minute.
|
||||
That's, I don't get the punchline of this joke on page 23.
|
||||
I'm like, well, I'm not quite getting that one.
|
||||
You know, it's probably, it's probably a little bit inside.
|
||||
And in the book, I just kind of chalked it up just a stoner humor.
|
||||
I'm like, this guy's just stoned because I don't get that at all.
|
||||
I'm not sure what that's about.
|
||||
So, but anyway, okay.
|
||||
So again, I'm worried that this is going to be another free Kevin book.
|
||||
Or is he either going to be about Kevin?
|
||||
And he's the main character, Kevin Mittnik, that is, which is not true.
|
||||
Or it's going to be a book where the main character worships Kevin Mittnik.
|
||||
It's going to tell us about all the injustices and stuff against Kevin Mittnik.
|
||||
Now, not to dismiss them or put them down, it's just been done to death.
|
||||
So, I was happy to read a few pages in that that is absolutely clearly not the case here.
|
||||
Like I said, you did reference some things, some stories that may be tighter, some,
|
||||
what is urban legends or myths or whatever you want to call it that may or may not have
|
||||
been attributed to Kevin or other people in there.
|
||||
You did a good job of mixing some real stories or, I guess, is that a,
|
||||
is that not to be more on real stories?
|
||||
Real, no, I guess there are real stories and some mythology and some,
|
||||
I heard that he could do this and I heard he could, there was a reference in here about
|
||||
whistling into the phone, you know, which was the point.
|
||||
Yeah, that was one that's been told.
|
||||
There were references like that in there.
|
||||
Well, actually, let's back up and kind of go through the book.
|
||||
But back to the opening of the book, the introduction here is,
|
||||
you've got to main character that we've immediately realized is not Kevin Mittnik,
|
||||
because you say Kevin Fennicle's doing it on the first panel.
|
||||
And then like the first two or three pages are, I don't know what I call an interview pages,
|
||||
basically people saying, oh, yeah, I know that guy.
|
||||
This is what he's like.
|
||||
And you get all these different viewpoints from all these different types of people.
|
||||
And it, they're so varied that it is exactly like some of the myths and stories that
|
||||
get spread around.
|
||||
You know, people from the old, there's probably so many people that have said so many stories
|
||||
about all these old hackers and probably only certain percentage of them are true.
|
||||
Some of them are true that no one's ever thought were true.
|
||||
I mean, it's good that you're creating a mythology off the character to start with.
|
||||
Even though he's completely fictional, you're creating a mythology,
|
||||
so it's kind of accurate.
|
||||
And then, yeah, and then by page 12, this is where you really get to the narrative, I guess,
|
||||
of the story, your main plot device, I guess would be Winston Smith as the name of the character
|
||||
on a radio show called Off the Rocker.
|
||||
Now, I do think that majority of our listeners,
|
||||
the majority of our hacker listeners, will realize that that's a playoff of Off the Hook,
|
||||
the TV show out of New York, 2600 radio show Off the Hook, and or Off the Wall, both shows
|
||||
from Emanuel Goldstein.
|
||||
And there's also a double reference there because Winston Smith and Emanuel Goldstein
|
||||
both characters from 1984 by George Orwell.
|
||||
Right.
|
||||
So a lot of well-read hackers would have gotten that.
|
||||
Quite a few probably didn't, to be honest.
|
||||
I think so many of the forums didn't get the reference.
|
||||
And I explained who Winston Smith.
|
||||
Because I think they asked when you put up the sample pages on there.
|
||||
And I had to say, right, man, that's 1984, man, you got to respect George Orwell here.
|
||||
I guess I'm not that clever, man.
|
||||
The narrator here, and it's not throughout the entire thing,
|
||||
but he comes in when it's necessary to further the plot and to fill in some gaps
|
||||
of the story, is Winston Smith hosting a radio show going out of the airways talking about
|
||||
Kevin, aka Boinkthump here, in the present day, a radio show that you're listening to,
|
||||
while the rest of the book is kind of talking about a young Boinkthump growing up,
|
||||
and even getting the handle by, like I said, this early is page 23, was it, I said earlier?
|
||||
Yeah, yeah, and we're on.
|
||||
Yeah, so it's the story that you're watching the main character is when he was younger,
|
||||
but every once in a while you'll come in with a, I don't know, a flash forward or a present day
|
||||
narrative explaining what's going on to the main character as, I guess, I can't say real life,
|
||||
but in the now.
|
||||
Right, so in the present time context of the story, I guess.
|
||||
There you go, see, you tell it better, I can't think of the proper term, the words here,
|
||||
but the majority of it is following the adventures of this young guy.
|
||||
First of all, okay, so the name we talked about, the other thing I got to ask you,
|
||||
the other thing that jumps out of me within a couple of pages, and even on the cover,
|
||||
but what I once I started reading is I suddenly found myself going, damn, homeboy has got a
|
||||
throw, man, dude, it's got some hair. This guy has got a hair, I mean, that's, that is some hair,
|
||||
man. That's like, you know, it's almost like a trademark of the character, I mean,
|
||||
at first I'm like, man, what is this dude doing with the hair, and then kind of towards the end,
|
||||
it's like, it fits him, it's like, it worked.
|
||||
You know what I sort of lifted that from, was this kind of legendary picture of Kevin
|
||||
Poulson, where he's sitting on, he's sitting on this table, and there are like a million rotary
|
||||
phones all around him, and some like old payphones around him in the picture. He's got like this
|
||||
mad 80s hair, man. I had to exaggerate a little bit for my own use, but that was kind of the
|
||||
inspiration and just that ugly as 1970s 80s hairstyle. Exactly, exactly. And you know, that's
|
||||
another thing, I guess we can talk about now too, is that you did a good job in keeping everything
|
||||
in the proper timeframe. Like one thing I do is I'm a very critical reader for loop holes and
|
||||
mistakes and things like that. You know, I'm the guy that watches a movie and says, dude, there's no
|
||||
way he can do that with a cell phone because they hadn't invented that technology yet. I'm that guy.
|
||||
So when I read this and I was looking for stuff like that, not because I wanted to pick it apart,
|
||||
but just because it's what I do, and I got to say I didn't find a single one. I didn't find anything.
|
||||
I was even looking at silly stuff, but you're going to laugh at this, but this is again, I guess
|
||||
me being a weird hacker or just a weird nerd in general, but even like some of the background scenes,
|
||||
you would have a car and I'm thinking, okay, what year was that model car started because I don't
|
||||
know if it was invented yet. Like little weird stuff like that I look for. I couldn't catch anything
|
||||
in the head book, so you should feel very proud of that. Thanks a lot, man. Like I did a lot of
|
||||
research to try to make it as accurate as time as possible, but also to tell you the truth,
|
||||
you know, when you're dealing with the highest form of technology that we're really playing around
|
||||
with in this issue is a telephone, then you're not going to see too many discrepancies when it comes to
|
||||
when it comes to different models or something like that. Like when we start getting into computers,
|
||||
that's probably where I'm going to get an email from you telling me how I screwed up for something like that.
|
||||
Well, and actually I admit I'm not a big phone freak. I've learned a whole lot from the guys in
|
||||
the forums, all of them in dual parallel and blackgrass and all those guys, but I am not a phone
|
||||
freak, but I do know that a lot of our listeners will be able to identify and tell you,
|
||||
I can't tell you what model phone this is that you use. I don't know if you use,
|
||||
did you go to a phone booth and use it as a reference so that you drew it to make it
|
||||
match a certain type of pay phone because there are guys, there are phone freaks out there that
|
||||
can tell you, oh, the phone that you drew in this picture, what didn't come in to play until 1994
|
||||
or something. So you may still get caught, it's just I didn't get you on that one. I don't know what
|
||||
phone you use. Did you go to a pay phone for reference? No, I'm just using Google image search,
|
||||
man. It's like a cartoonist's best friend when it comes to that sort of thing, but I'm not going
|
||||
to point it out, so I should shoot myself in the flip, but there's a phone or two in there
|
||||
that I really screwed up on and you know, it was only upon refreshing that I'm like,
|
||||
what year is this story taking place? And I'm like, oh, damn it, I screwed up.
|
||||
Well, I didn't want to point it out. Some of the phone freaks might. On the front cover,
|
||||
the one that that that he's looking at the front cover has a rotary dial on it.
|
||||
Right. Whereas all the rest interior have the touchstones.
|
||||
Well, see, you pointed it out. Like, the, the, well, not all of them. Yeah, I'm stuck in there when
|
||||
it has, it has the touchstones and I'm pretty, well, put it this way. If they were around,
|
||||
that's not what I wanted. You know, I just screwed up, but if you look further,
|
||||
I do see it into the book like, can you see a paper? They all have the rotary.
|
||||
Yeah, exactly. I'm looking at the one with the two steves and they are using one of the
|
||||
paper and it has rotary. That you got me then. Ah, there we go. Well, that's minor though. You can,
|
||||
that's not necessarily bad. I mean, that's just like my anal retentiveness, but that doesn't,
|
||||
I don't think that's that's minor. If anything, that just varies the art to make it different.
|
||||
I mean, that's an artistic choice. That's no big deal either.
|
||||
I'm the same kind of way though. I'm very analytical and, you know, I've, I, we're sort of
|
||||
kindred spirits in this way, man, and, and, you know, I try to be a stickler for decals. So,
|
||||
I consider that little section just like a wad.
|
||||
All right, so let's see. So as we go throughout the story, now, I don't want to give away the
|
||||
complete story or anything, but the, the short version as we follow the life of
|
||||
Kevin, aka, Wayne Sump, throughout his younger years, mostly messing with the phone system,
|
||||
but there's a lot of other things. There's some dumpster diving in there. There is some
|
||||
block picking. There's a lot of other things and they're not forced. They're very natural.
|
||||
There's some other hacker references worth mentioning in here. Like, okay, we mentioned
|
||||
free cabin earlier, and there's a lot of Midnick references scattered throughout, like some of
|
||||
the things that he did or allegedly did, et cetera, that our main character here does something
|
||||
very similar or the exact same thing from some of those stories. He's not Kevin Midnick, but
|
||||
parts of him are in there. He's, again, an amalgam of lots of different characters.
|
||||
All right, there's, there's some red boxing on these pay phones. There's quite a few
|
||||
pay phones in here, so definitely a fitting title for a volume one being freak.
|
||||
Red boxing, there's a mention of whistling into the phone, and our main character here has
|
||||
perfect pitch. Now, I don't think Kevin's ever been accused of that, but certainly that comes from
|
||||
joybubbles, right? That's where that narrates. So it's for our main character, and you don't
|
||||
specifically say that, but again, hackers who know some of the history, and I don't know that a lot
|
||||
of them do, would recognize that, and there's one scene where he's reading a magazine, and I think
|
||||
you do put a little note to say that it's October 1971 Esquire magazine. Now, that is a very obscure
|
||||
reference. Let me give you big kudos for that. That's a very obscure reference that I don't think,
|
||||
I think 99% of hackers do not realize, because it's Esquire magazine. What hacker reads Esquire
|
||||
magazine, but that particular issue, October 1971, of Esquire magazine, had an article on
|
||||
phone freaking, and it was Captain Crunch and Joy Bubbles, aka Joe and Grecia, and there was an
|
||||
article about red boxing and phone freaking in general, and stuff, and about those two guys,
|
||||
mostly, and most people probably don't even realize that. That was 1971,
|
||||
2600 magazine came about 1984. This is 1971, October 1971, so just to put some perspective
|
||||
in some date. Look how long ago that was, so that is a very cool reference that you put in there,
|
||||
and if I can take a moment, I don't want to get corny or have a weird moment of silence or
|
||||
anything, but, you know, Joy Bubbles, Joe and Grecia just passed away last year, founder of the
|
||||
Church of eternal childhood. So, Joy Bubbles, you will be missed from the community for sure.
|
||||
And didn't you tell you had some connection to Joy Bubbles, you get knowledge from up there?
|
||||
Yeah, I, you know, just with the whole thing where he sort of reverted back to childhood,
|
||||
or whatever, he was a big fan of his Roger's neighborhood, and his Roger's neighborhood,
|
||||
was shot here in Pittsburgh. When Mr. Roger's died, Joy Bubbles took a silver mish,
|
||||
come here in Pittsburgh, because all of the shows are archived at the Pittsburgh Library,
|
||||
and so he spent days listening to everything he'll show, and then he just traveled back home
|
||||
to, uh, without the rest of his days. Yeah, he was an interesting character. He's an interesting guy
|
||||
who loved life so much. He, he would always tell people that he was five years old.
|
||||
He got to a point in his life, and he said, I'm five years old, and the next year, he's still five
|
||||
years old. He'd stopped aging. He was just, I'm five years old. I'm going to keep that mindset of
|
||||
enjoying life and having Joy for life, and he even legally changed his name to Joy Bubbles.
|
||||
So he wouldn't even his name was a hack, because, uh, I guess in the phone book, they,
|
||||
they require you to have two names for him to go along with your sub number.
|
||||
So his name is Joy Bubbles, and that was it. So he was able to, uh, manipulate them in that way,
|
||||
and, uh, he was also able to, like, if you, if you booked up bubbles, like, if you missed it,
|
||||
it mistook his name for being his first name, Joy last name, Bubbles.
|
||||
But you take a look at Bubbles, and it would say, he Joy Bubbles in parentheses,
|
||||
in his local phone book. Wow, I did not know that. That is awesome.
|
||||
I know what, there's this, this is great interview. Uh, it's, it's on off the
|
||||
look where his name was high-rise Joe at the time, and, and, uh, he's just going through a bunch
|
||||
of trick. You, you really, like, can feel his enthusiasm just coming through the speakers
|
||||
when he's talking about phones and stuff like that. He, he talks about things like that.
|
||||
That's good stuff. I, I did not know that. I picked up something new again.
|
||||
Um, there's also a reference in here to the two Steve's, Steve Jobs and Steve Wozniak,
|
||||
their side characters in your, and your book here as well. And I like the way that you kind of
|
||||
mix them into Kevin's story. I word it that way, because it is Kevin's story. Um, mixed them
|
||||
into it in passing. Like, I have this kind of anonymous run-in, if you will. And actually,
|
||||
Kevin kind of honed them in this thing. I won't give, I give that away completely, but that was kind
|
||||
of neat that they just crossed through. Again, I, it's kind of like, um, it, it's a tough tight
|
||||
rope to walk, to be honest, where you're not making all of these historical figures characters
|
||||
in your book, where he just like, you know, I think we said it earlier, the forest gump,
|
||||
where you just have him meet every famous person, and that's the story. That would not be as good,
|
||||
I don't think. I think it's much better that you incorporated different parts of historical
|
||||
figures and hacking to your fictional characters. Sometimes it's the main character. Sometimes
|
||||
it's his friend. Sometimes it's people that just happen to come through his life for a
|
||||
one small moment in time. This is like the knowledgeable reader would, would pick up that,
|
||||
that it's Steve Jobs and Wazniak with, you know, sewing blue boxes or whatever, but I never
|
||||
mentioned them really, uh, using their last names or anything like that. I just,
|
||||
there's two characters named Steve. And, uh, you know, so it's just, I like to put little things in
|
||||
there, um, that, that, uh, that people might pick up on and, and feel sort of, uh,
|
||||
just feel sort of like, you know, they're inside baseball or something like that. We're,
|
||||
where they're just like, I get this, but you probably don't or something like that.
|
||||
And it's good too, because if you don't get that reference, it doesn't hurt the story. I mean,
|
||||
it's two guys that interacts with it. Still further supply. But if you do get some of the,
|
||||
it's like, like we kind of talked about earlier about your, your friend's name. It's kind of
|
||||
in jokes, you know, it's inside jokes. So if you get those, you get that much more enjoyment out of
|
||||
it. But it's certainly, even if you don't get it, you can still read it and it's still further
|
||||
supply and it still works as a great story. So it's those little in jokes, which are great. And
|
||||
even in that scene too, it kind of, I kind of felt like there was a little Bernie S in that part,
|
||||
as far as the selling the red boxes or whatever out of the trunk of the car, selling tone dollars
|
||||
or red boxes, I think they're out of the trunk. So again, without ruining that little part of the
|
||||
story, I don't want to go and mess it up. But kind of felt like, again, incorporating another
|
||||
figure from the ghost of hacker past, I guess. In that exact story, there's the mad hat or looking
|
||||
character on the phone and he says something like, you know, we have, we have a guy in Philly who
|
||||
wants to buy three of these blue boxes. Exactly. And the guy that I had in mind was totally Bernie S.
|
||||
Absolutely. So yeah, you can, and you can, again, it can, it's just relevant enough to pick up the
|
||||
reference. And that's what makes it great. Don't go in their face. Don't make them recognize it.
|
||||
You know, those beat, you could have clearly said Steve Jobs and Steve was next suddenly walk past
|
||||
and you don't just leave it vague enough to make people figure it out. So that's, you didn't
|
||||
great job at that. I have to say. And I don't want to go, I said, I don't want to ruin every single
|
||||
hacking reference here. There's a lot of them. And these are just a few examples. There's a couple
|
||||
of other just kind of general old school references. I don't know if they're exactly hacking or whatever.
|
||||
Again, I did point out that, you know, the technical reference were accurate to that time frame.
|
||||
So that was really good. There was like, and this is maybe, you know, me being the old guy here,
|
||||
I do remember the days where we would do the old coin on a string. In the very first
|
||||
vending machines and early video games and stuff, you could do that. And it didn't even have to be
|
||||
a coin in the rare. You could find some of those really cheap, low-end machines, or you could just
|
||||
put a slug in there. That stuff was obviously fixed very quickly. That didn't last very long,
|
||||
but it's a great legend or it may even urban legend, if you say, because it was so extremely rare.
|
||||
But they they caught on to that really quickly, stopping not only the slugs that started checking
|
||||
for weight and like the ridges along the edge of the quarters and stuff like that. But for the
|
||||
string itself, they would put the razor blades in there. So you drop your coin in and have a
|
||||
razor blade that was kind of angled down. So if you try to pull it back up, it would slice the
|
||||
string and take your course. So they did put stuff to stop that in really quick, but that is
|
||||
absolutely a great little reference too. And and I got to give you kudos here because you did
|
||||
stump me. There was a reference in here that I did not get, okay? Until I did I read it in the back
|
||||
and there were two or three pages at the very end where you do explain some of the references in
|
||||
case people didn't get them. Not all of them, but quite a few that you explained. And this was one
|
||||
of them and I had not heard of this or did not get it until I read the notes. It's on page 47.
|
||||
And you referenced what's called the eight queens puzzle. Oh yeah, and I did not, I had never
|
||||
heard of that before. I know I know I know how to play chess. I went through in high school,
|
||||
I played chess and a little bit through college, but I had never heard of the eight queens puzzle.
|
||||
And it is a chess puzzle, a chessboard thing. And I'll let the listener do their reference
|
||||
because that's exactly what I did. When I read this book and when I saw that I went out and I
|
||||
actually looked and I think Wikipedia even had an article on it, but I went out and did some
|
||||
searching, found out a description. Here's what the eight queens puzzle is. I sat and thought
|
||||
about it. I didn't have a chessboard handy, but visually I'm counting out squares. I'm like, okay,
|
||||
well, that's the challenge. So here, here, here, and I actually figured it out in my head the
|
||||
solution. And then I went back to page 47 in the book and looked and sure enough that's exactly
|
||||
you have the pieces in the exact position. So that is probably one of my favorite frames. And I'm
|
||||
going to come back to frames towards the end of this too, but that was very cool because I didn't
|
||||
get it. And I think there's going to be something for everybody in here. Nobody I think is going to
|
||||
get all of the references. There's so many of them in here and some of them are so obscure and so
|
||||
passive in nature that I think there's something in here that everybody's going to look up or hear
|
||||
or learn for the first time. So kudos to you for that as well. There's lots of social engineering,
|
||||
also mixed in the book from the bus stop and stamping the transfer of passes, which is something
|
||||
that we yes, we used to do. I'd never had the the punch method. We'll say again, I don't want to
|
||||
ruin too much of the story, but that he used, but certainly silly. It's much more simple, but
|
||||
all you had to do back when I would ride the city bus was have a ticket that was dated in time stamp
|
||||
from within the last 24 hours. So we would just look for people at a bus stop or look in the trash,
|
||||
go trashing and pull one out that somebody else threw away who wasn't transferring and walk on
|
||||
away for our busing chop on there and they didn't know the difference. So that is absolutely a good
|
||||
example. The pizza example, things like that that's classic old school and can work still today
|
||||
probably. What else here? Well again, I want to give all the details out. I guess that there's
|
||||
something in there for everybody all in all to kind of wrap up here because we're over 30 minutes.
|
||||
All in all and we don't have a time so don't worry about that. We can go for however long we want
|
||||
to. But I guess as a summary, the things that I want to emphasize on point out is that you had a
|
||||
lot of accurate depictions and stuff in there. Even when they weren't direct references to people
|
||||
or events, you did a good job also and this is the most difficult part to me. You actually captured
|
||||
the essence of and the feeling of it all. And I think let me let me flip open to it. I have a
|
||||
marked here on my notes page 70. Page 70 is a great example of this. And if you don't mind,
|
||||
I'd like to actually just read this page on here if I can. Yeah, go ahead. I'm not worried about
|
||||
that sort of thing. It is our two, our main character and his best friend Winston who again,
|
||||
Winston ends up being the radio host in the future, you know, who's narrating the whole thing.
|
||||
But when he was younger was, I guess, best friends. Can we say that with Kevin and the story?
|
||||
So these two are talking and they're talking about party lines and talking on them and something.
|
||||
And you really, I wouldn't change a single word in the way you did this. So if I can just read this,
|
||||
this is from Kevin Fennical Boyntomp. This is him suddenly, I don't know if it's an epiphany or just
|
||||
suddenly, well, I'll just read it. Basically, he's talking to his friend about party lines and all
|
||||
of a sudden he comes through with this. He says, you know, Winston, I was thinking about the power
|
||||
of communications and the puzzle of the phone system. There's so much more to it than just these
|
||||
party lines. Imagine the technology behind the scenes that keeps the phone system going. I mean,
|
||||
it's incredible. We take it for granted. People just think you hit a few buttons and boom,
|
||||
you're magically connected. You know, the average phone call usually bounces through many different
|
||||
systems that make up the whole network. They keep updating things. I'm sure Blue Boxing will
|
||||
become obsolete. I can tell what we know about the network is very small. But to better understand
|
||||
any of things, we can probably come up with some awesome pranks and stuff. I want to figure it out
|
||||
to the point that I can hear the president fart using the phone system. I think we can make a better
|
||||
tool out of the phone than anyone can imagine. And I think that really, see it captures a couple
|
||||
things. First, the fascination and the appreciation. It's a word that hackers don't use a lot,
|
||||
but they don't realize that they have this appreciation. It's not a word they use, but they
|
||||
you do. You have an appreciation for technology. And in his speech, you get across not only that
|
||||
appreciation and fascination with the system, but also the fun aspect of it. So yes, I know it's
|
||||
not embarrassing at all because it shows that he's not only, he's not like a nerd focused on it
|
||||
only for the technology aspect. There is certainly that factor in there, but it's also for the fun
|
||||
aspect and for the challenge. And it's just so many words to describe, I guess, a hackers fascination
|
||||
with technology that you can't list a bunch of adjectives. I think it works better as an emotional
|
||||
exposition like that. And I think that little speech right in there was my favorite part of the
|
||||
whole book. It may be corny. It may be a little bit silly, but it captured the essence of the mind
|
||||
of a hacker. And I think you nailed it on the head. Thanks. Thanks so much, man. I don't know what to say.
|
||||
That's that's that's the hey, thank you. That was that made the whole that was my favorite part of
|
||||
the whole book. Let's see, what else? And yeah, hearing the magic and the wonder in his voice,
|
||||
talking about the, and this is just volume one for the phone system. I'm sure that's going to
|
||||
carry over. That's the, again, I'm not a phone freak, but I appreciate that's the way I feel about
|
||||
the computer system and the interwebs, you know, these tubes carrying all the data out there,
|
||||
you know, it's like, I don't know. I guess again, it's corny. I know how the interwebs work, you know,
|
||||
analytically and technically how it works. But sometimes, I mean, everybody listening right now,
|
||||
humor me with this for a second. Well, yeah, I want you to sit back as you listen to this. And I want
|
||||
you to just for a second visualize how many people are out there right now connected to everybody else.
|
||||
I mean, it's just amazing. I just, I know it's so corny, but that blows my fucking mind. I just can't
|
||||
believe that here we are in an age where anybody is a click away from anybody else.
|
||||
I mean, the world is instantaneously a smaller place because of the internet. It's very, very easy
|
||||
to communicate with anybody and I have the same sentiment. Oh, man, you, I mean, you've got
|
||||
to love technology just after. So yeah, anyway, the, the, the moral there is you captured that
|
||||
essence very well. You actually, it's very genuine. You capture the innocence and someone who's
|
||||
genuinely interested in the topic and in learning and thinking outside of the box, which happens.
|
||||
That's only one example. There were others like that as well. So yeah, I related to that because
|
||||
that's how I think about a lot of things and it just absolutely kind of spoke to me to be really
|
||||
corny, I guess. So I thought that was fantastic. My favorite part of the book. One other thing that
|
||||
kind of stood out to me and you probably laughed at this, but you know, Kevin's school and all,
|
||||
but homeboy got his ass beat a little bit too much. And he was a bit of a punk. I mean, come on,
|
||||
now we've all been around the block and a few fights here and there, but this dude got beat down
|
||||
a few times. I hope he stands up for himself soon. Well, you know, you know what it is. I just
|
||||
wanted the casual reader to be sort of sympathetic to the character. Yeah. So I wanted to put obstacles
|
||||
in his way. I see that. I can't see that. That works. I guess that's the main reason why I did it,
|
||||
but you know what to tell you? The truth is, like, now this might sound corny, but I actually like
|
||||
like this character as a person. If you could leave with Allison. Right. Yeah. But when I am a
|
||||
Mazikist, man, and I like to put, I like to screw with them. I just, like, it gives me pleasure to
|
||||
draw and get in and kick in the nuts. I mean, it has nothing. That has nothing to do with what I
|
||||
think of hackers or anything like that. It's just like, you know what, man, I think he had it too
|
||||
good. He passed you pages. Yeah. He's going to get kicked in the balls right now.
|
||||
Well, and you know what, his, and again, I'm not going to ruin the story, but he's he's got kind
|
||||
of a rough life anyway. Family life and financial and that kind of stuff. Anyways, not coming from the,
|
||||
you know, a certain type of background, I guess. So, you know, I think that's something that
|
||||
people can relate to and appreciate the underdog aspect or the challenging aspect of it.
|
||||
But again, he still comes up from that and he still has these gifts that make him so much more
|
||||
than probably most people view the character as, you know. Right. There are anybody that exists
|
||||
to that little world. Right. Now, now let's talk a little bit about the art style itself.
|
||||
You have a pretty consistent format throughout the book. Four panels per page.
|
||||
Is that something you consciously chose to do? Do you like that format for this particular story
|
||||
or do you like that format in general or do you just think it fit well for this particular
|
||||
graphic novel? I've done a few different graphic novels so far and what I hope to accomplish
|
||||
with each one of them. I was almost look different from the other. So this particular story
|
||||
that I wrote and drew, I wanted it to have the same sort of beat, so to speak, as an old-time
|
||||
adventure comic strip like Dick Tracy or something like that that would have been in a newspaper.
|
||||
Right. And those little segments are told and little four panel beats in the same way.
|
||||
So that's just what I was. That's a very old-school reference. I mean, Dick Tracy,
|
||||
the phantom stuff like that. That's going way back. Oh yeah. That's where I gained most of my
|
||||
inspiration artistic wise. The stories are very quaint and how key if you take a look at them now.
|
||||
But I just think that those people were continent like draft men and they could tell a story
|
||||
in pictures like nobody else. Well, and you know, when I read it too, what jumped into my mind
|
||||
is it immediately reminded me. And again, I'm an old guy, so I remember these old comics.
|
||||
Like the old Arkram, Robert Kram, and not him specifically, but these old 70s keep on trucking
|
||||
kind of style of artwork. I mean, it seemed very like it was influenced from that. I don't know
|
||||
if it was consciously or not or if that just is your style. I mean, I don't know if this is good,
|
||||
bad insult or whatever, but I mean, I think I could pluck you out of the space-time continuum,
|
||||
drop you into the early 70s and you could publish this book and it would fit in with that style and
|
||||
that era. So to me, that's a great thing. It's not superheroes with capes and big muscles and
|
||||
everything. They have their place too. I'm not putting them down, but this today is a very good
|
||||
feeling of being different than what's out today with some throwback and an homage almost
|
||||
to those old 70s comics. Thanks a lot, man. You know, I gained a lot of my artistic inspiration
|
||||
from a lot of those those cartoonists as well, Arkram in particular. I mean, you brought
|
||||
up this name and I'm not ashamed to say that he had a huge influence because I consider that
|
||||
guy the best. So, might as well still from the best, man. Yeah, well, and it's not exactly like
|
||||
his style, but it's certainly reminiscent of it. You can tell there's some influence from that
|
||||
era and that genre. So that's very cool. I guess here, let's kind of wrap. Well, actually,
|
||||
there's one other thing I wanted to mention about the art too that you put in, you know how to say
|
||||
what is it? The devil is in the details. There's a couple of other little things that I thought that
|
||||
really completely rounded it out that really made it from like an A product to an A plus
|
||||
product and these are the little polishes that you can put on. Things like when there is a scene
|
||||
with him at a pay phone, there might be graffiti on the side of it, but for example, I saw one of
|
||||
the things that was tagged on the side of the phone was the handle Cheshire Catalyst. So there's still
|
||||
little references. Now, the character didn't say it, the narrator didn't reference it, there was
|
||||
no reference whatsoever unless you just happen to notice it. And there are quite a few things like that,
|
||||
things in the background scene, things on signs, stuff like that that you should look for and you
|
||||
might pick up and recognize. So look for stuff like that as you're reading as well. It adds to the
|
||||
depth of the whole thing that little bit of shine when it's all said and done. So that was a nice
|
||||
little touch too. So if you ever wonder, if anybody notices those kind of little things, yes, we do.
|
||||
Yeah, you know what I appreciate that so much because I sort of created the project
|
||||
with people like you and my tour in the local and no references and things like that. And I
|
||||
appreciate not being as soon as these sorts of things, but you know, you feel like I don't know
|
||||
about you. I'm not going to speak for you, but whenever I see something and I get a reference
|
||||
that I understand something that I know other people don't, it feels kind of cool, man. I feel like
|
||||
it's part of the club or something. And I want it to come away with that sort of feeling,
|
||||
you know, that maybe it's an okay story or something like that, but you know, at least I understood
|
||||
this a little bit better than the average bear. Well, I think mission accomplished. I think
|
||||
you nailed it. I think this is absolutely a great purchase. It's worth every dime. People should
|
||||
definitely go pick this up. Your website, edpiscord.com, edpiscord.com. They can buy this book,
|
||||
right? $15 is the first, this is the first one out, right? Yeah, yeah. I'm deep in volume two right
|
||||
now. As you say, I'm not going to, I'm not going to commit you or anything, but you started it.
|
||||
You don't have a time frame or any kind of things like that to talk about yet, but you have started it.
|
||||
Oh, absolutely. Okay. And there's going to be, I know where everything's going and it's just a matter
|
||||
like they call it pencil mileage that I have to do right now. I just have a lot of pencil mileage
|
||||
ahead of me. Gotcha. Gotcha. This is one and you're working on two of four. I tell the complete
|
||||
story and the next three books, the next one is at the, it is pretty clear. Excuse me, I suddenly
|
||||
have the hiccups on the radio and that's got to be awful. The second book, the first book is called
|
||||
Freak. The second book is called Hacker. And at the end of this book, he's getting his first home
|
||||
computer so you can see the transition of the story, obviously. Volume three and we won't go into
|
||||
too much detail. We'll let it speak to themselves. It's going to be called fugitive and volume four is
|
||||
going to be called innate. So we're going to follow this character and his life and his trials and
|
||||
tribulations, if you will. And well, that might have been literally actually his trials. But we're
|
||||
going to follow this character and I got to say there is a bit of connection. I do want to see
|
||||
what happens to boring thumb. I'm not sure if I can say boring thumb with a straight face ever but
|
||||
I do want to see how the porn kid turns out because you know, there's a little bit of all of us
|
||||
in this character. You've captured a little bit of Hacker dumb and this one guy. So the other thing
|
||||
that I want to mention and you and I haven't like, I brought you on the show but I didn't tell you
|
||||
any of these questions. I wanted to keep it all in prompt to kind of drop it on you but I am going
|
||||
to pimp this out. I don't know if you care about this anyway. I'm going to go ahead and pimp it
|
||||
out because I would love to see people not only by the book, but I noticed. So I'll kind of put
|
||||
you on the spot here. I did notice that on the last page here, each panel created this individual
|
||||
five by five illustration on a six by seven piece of Bristol, you do have and will sell people
|
||||
the artwork from this. And for me, I'm definitely going to get a couple of these and hang in my office.
|
||||
I'm not going to tell the listeners which one I'm going to wait and make sure I get them first
|
||||
and get this and frame this and probably hang it here in my in my hat cave here in the
|
||||
office at home. People can order those now. Do they do that on the website? Should they email you
|
||||
directly for that? Working out. They should buy emails at the website and they should contact me and
|
||||
let me know what they're interested in and what they would like to purchase or whatever and all
|
||||
that, you know, the reason I'm selling this is just sort of like I said, there's a lot of
|
||||
pencil mileage ahead on the rest of the volumes of these. And I just needed as much time as
|
||||
possible to produce this stuff. And, you know, the print costs of this first volume sort of need
|
||||
to be taken care of. I don't expect to be out of the rent anytime soon. I know that feeling.
|
||||
So that will just help with the cost of production and things. That's good. That's good. It's
|
||||
well worth it and people can contact you directly. You want to give a ballpark number or something
|
||||
in case people think this is going to be cost too much for them or whatever. Sometimes.
|
||||
Well, it definitely depends on like level of detail and how cool I think something is.
|
||||
Right, sure. But there were certain ones that I sold for first lowest at $15. But obviously you're
|
||||
not going to get a panel that has like eight characters or doing cool things for something like
|
||||
that. And then the prices are based on like level of detail. Now, now that's just a curiosity
|
||||
question. A, two-quart question, if you will. A, how long did it take you to draw this entire
|
||||
thing start to finish and B, how long did it take you to draw one, let's say, medium complexity panel?
|
||||
The whole, the whole book took me about a year. But that's not to say that I worked on it constantly
|
||||
because that's just not true. I worked on, I drew a whole another book in between, in between
|
||||
this book. So I got a whole bunch of this book done. I drew a whole another book sort of just
|
||||
keep my head above water. And when I finished that project, I finished working on this book.
|
||||
It took about a year, took some like around one Christmas to the next. And then the second
|
||||
second question, how long did it take to do an average panel? I'd say about two and a half to
|
||||
three hours. Wow. Yeah, I'm just, I'm very slow and I just really have to take my time.
|
||||
Right. Well, I mean, you know, I think you and I were talking earlier too before we started
|
||||
the show that you do take pride in the detail and you try not to make mistakes or if you do,
|
||||
you'll redo it or fix it to make it right instead of pushing it out. I mean, you, you're
|
||||
satisfied with every one of the pages and panels in this. Yeah, I have a, there's a pride factor.
|
||||
So you can call it that complex? Yeah, there's a pride. I mean, you have a pride for this. You're,
|
||||
you know, you take pride in that and that's definitely to be commended. So I don't think is anything,
|
||||
I mean, please, well, means if you find a person in it, in it's each individual panel, let's point
|
||||
that out. So if you do, if you already have the book, thank you for the purchase. Obviously,
|
||||
I'll speak on your behalf there, but if you do want to purchase one of the individual frames
|
||||
itself, it's not the entire page. It's, if you find one you like, you will say, give me, you
|
||||
know, I'm interested in page number 28 panel number three, because each one of these individual
|
||||
panels is what's on that five by five or actually six by seven sheet, but it's a five by five
|
||||
graphic. So the page and the panel and then you'll get back to them with more details and
|
||||
whatever, but, you know, for the level of detail and for an original piece like this, I think,
|
||||
you know, people should be jumping out of the sheet if they can get, you know, a good panel for,
|
||||
you know, 25 to 50 bucks easily, you know, I think they should be glad to pay for that and a lot more,
|
||||
especially like you said, it's the level of detail is going to be a factor in there. There may be more
|
||||
than that, but I think that would be great and help fund, you know, the next issue of the book and
|
||||
get that printed and everything and, you know, I hate, I don't, I don't want to drop a negative
|
||||
thing on you here, but I hope you end up breaking even at least when it's all said and done to get
|
||||
the whole series out start to finish. I know, I do, I can't appreciate what a commitment it is to
|
||||
come out of pocket to fund this kind of stuff and I have literally been there and I know exactly
|
||||
what you have to shell out and, you know, be happy to break even when it gets to a certain point.
|
||||
I would love to see you do a whole lot more than break even, so please buy some of the art.
|
||||
Again, I'm pimping you out. You're not doing it. Don't worry, I'm pimping it for you because I
|
||||
really do want people to buy some of this stuff. Great little thing to have hanging in your office.
|
||||
So again, edpiscore.com, EDPISKOR.com, and any of your other work as well. And we were talking
|
||||
about this because it's obviously related to hacking technology, something our audience will appreciate.
|
||||
But check out some of the other stuff that you've got there as well.
|
||||
Ed, thank you for being on the show. I appreciate your time. Anything that we didn't cover that you
|
||||
wanted to mention, the website, of course, some of your other work people might be interested in.
|
||||
Anything else that I didn't cover?
|
||||
You know what, just off the bat thinking about it. I just want to let people know the
|
||||
grab the book so far that if they send me an email with the word handle in the subject one,
|
||||
and they let me know what their screen name or handle is. I'm going to do whatever I can to get
|
||||
that into a volume two. So they might turn up as a character or they'll certainly be referred to
|
||||
in some way. The name might be scrolled on a wall graffiti style. Yeah, graffiti on the
|
||||
pay phone. That'd be awesome. Cool. Yeah. Yeah. Go for me as well. Am I going to be in there?
|
||||
What's that? Is that go for me as well? Do I get in there?
|
||||
Oh, there'll be. There'll be a big stank dog somewhere in there.
|
||||
Well, a dog will wander by on one of the panels with a little with a little fume stinky fumes coming
|
||||
up. I don't know if there's something.
|
||||
All right, man. One of the things where
|
||||
Mike, I want to give a shout out to anybody who grabs the book and is supporting it and
|
||||
making it possible to do volume two. So anybody that grabbed it,
|
||||
talks me an email. If you want your name to be included, I could understand
|
||||
how people are proprietary over the privacy. And of course I won't do it without being asked.
|
||||
But you know, get in touch with me and do that. I'll be happy to include your names
|
||||
somehow because for anybody that grabs it. Yeah. See, that's awesome. I mean, that's
|
||||
you know, it's it's not it's part of the community. You know, this is actually, you know,
|
||||
showing that it's not something that was written by an outsider. It encompasses and includes
|
||||
the community. And it's the I think that's really a cool gesture on your part. I think that's
|
||||
pretty awesome. So I want you to pick. Why don't you pick the email address before we go?
|
||||
The email address is Winpy Rutherford at Gmail. W-I-M-P-Y or U-T-H-E-R-F-O-R-D at Gmail. And it's
|
||||
easy to get to if you just go to my website. And the website is at piscord.com.
|
||||
You can never say it too many times. We're going to pimp. I'm going to pimp that
|
||||
get this thing out there. I want people buying this man. I'm really excited about this. I think
|
||||
it's really cool project. So I appreciate spreading the word. And I have a big chunk of the story
|
||||
online at the site too. So if people are just like on the fence about it, think you can't get
|
||||
it out and decide if they want that they wouldn't support the print version or not. Yeah, that is
|
||||
I'm glad that is a great thing to mention. Yeah, I forgot all about saying that. Absolutely,
|
||||
some samples and stuff they can look out there. So that's awesome. All right. So they can
|
||||
they can see probably all the other references that you talked about because you didn't run the
|
||||
story because it's already out there, man. Some of it. Yeah. Yeah. All right. Well, that's going
|
||||
to do it. Thank you once again for being on the show ed. And hey, if we we do make it to a conference
|
||||
somewhere, actually, these I think these would sell like hotcakes at one of the conferences. Take
|
||||
these to Defcon in July. I think it is or August or whenever it is this year. Something like that.
|
||||
If I have a table or something, I'll gladly give you space. Or if we can work you in somewhere.
|
||||
We'll see what we can do to make this happen. And we'll talk offline about some other projects.
|
||||
But thank you for being on the show. That's going to do it for this episode of Hacker Public
|
||||
Radio. So everybody tune in tomorrow for another episode. Unless it's Friday, then I guess
|
||||
there probably won't be one till Monday. But tune in for another episode of Hacker Public Radio.
|
||||
Thank you for listening to Hacker Public Radio. HPR is sponsored by caro.net.
|
||||
So head on over to caro.at for all your hosting.
|
||||
63
hpr_transcripts/hpr0019.txt
Normal file
63
hpr_transcripts/hpr0019.txt
Normal file
@@ -0,0 +1,63 @@
|
||||
Episode: 19
|
||||
Title: HPR0019: SILC
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0019/hpr0019.mp3
|
||||
Transcribed: 2025-10-07 10:19:54
|
||||
|
||||
---
|
||||
|
||||
Now what's we gonna do?
|
||||
I'm going to talk about secure internet live conferencing and Wikipedia defines silk as
|
||||
silk is a network protocol which provides secure synchronous conferencing services over
|
||||
the internet.
|
||||
If it puts simply, it's basically equated to a very, very securely implemented version
|
||||
of IRC and it also includes a lot of the features of jabber and instant messenger.
|
||||
As all the regular stuff like group chat and instant messages and file transfers but it
|
||||
also has extras like audio and video streaming, silk server networking and complete encryption
|
||||
of all communications.
|
||||
And silk is entirely impossible to send plain text around encrypted messages.
|
||||
What this means is that server to server, client to server and client to client communications
|
||||
are all encrypted with the logarithm that is offered by the server that they are on and
|
||||
the encryption keys that are pre-generated by the clients and the server administrators.
|
||||
It is entirely impossible to turn off the security features of silk and it is entirely
|
||||
impossible to connect with that encryption key or even start your server without an encryption key.
|
||||
In silk, there is a network topology that is basically like this. If you install your own
|
||||
silk server, you need to first create what they call a silk router and under that you create your
|
||||
server. And what the router does is it allows other silk servers to route their traffic to your server.
|
||||
And all those external silk servers are connected to their own silk routers that are
|
||||
connected to other servers and then on and then on. And if you wanted to, you could probably connect
|
||||
every silk server on the internet to one giant network. And the benefit of this network
|
||||
topology is that you can increase the amount of communications being sent and you will not lose
|
||||
scalability or bog down any specific single server. And this decentralizes the entire network.
|
||||
And if one server goes down, you can still connect to another server provided that is actually
|
||||
being routed to by another server. So you're providing security over the silk protocol as well
|
||||
as a security of actually where each server actually is. So I've been running my own silk server
|
||||
in standalone mode for the past three weeks. And it uses less system resources in IRC or
|
||||
Java servers. But I don't like it that there aren't any chat services like the ones used in IRC.
|
||||
The other thing I notice is that silk does not have a lot of different clients available.
|
||||
But if you're using a GUI, you can use Pigeon and the silk plugin that is available. And the
|
||||
silk project offers a command line client that is officially supported. And it's basically just
|
||||
IRC plus the silk plugin. Both of them work flawlessly. Aside from the clients and the silk
|
||||
server itself, there is also a toolkit available that you can download and program anything
|
||||
you can think of that will interface with the silk protocol. You can program for your silk client
|
||||
or a plugin or you can program more functionality into the silk server. You can program network
|
||||
services and server services. You just have to know a little bit of seed programming and how to
|
||||
use a compiler. The silk toolkit is a software development toolkit and it provides full protocol
|
||||
implementation for application developers to make new silk clients. It allows people to integrate
|
||||
their own services into their own silk servers or provide a API to program
|
||||
more functionality into their own silk clients that are already made and released.
|
||||
So what they can do is create more plugins like the one for Pigeon but with more functionality.
|
||||
The silk toolkit can be used for the GUI and for the command line and it supports multi-threaded
|
||||
applications. It's pretty much very useful especially since there's not many services available
|
||||
for silk servers. I'm using it to make a bot which also has a lot of functionality that is
|
||||
provided as is in IRC for channel services and such and it's going to help to manage my own server.
|
||||
If you're interested in finding out more about silk you can go to the silknet.org website which
|
||||
is a silk project site and you can download their client or the Pigeon plugin. You can also download
|
||||
the server source and the toolkit source. You can check out what servers are available to connect
|
||||
to on the silk network. There's an entire community and the thing that I like the most was that they
|
||||
had quite a bit of documentation on software manuals, white papers, specifications, all the protocol
|
||||
and if you have any other questions you can check their frequently asked questions on the silk
|
||||
net.org site. If you'd like to play with silk but you don't really want to connect to one of
|
||||
the official servers you can check out the link to my website in the show notes and connect to my
|
||||
silk server. There's probably nobody on it but you can still check out silk and if you want to
|
||||
read out more about what silk is there's a Wikipedia entry put into the show notes as well
|
||||
and that's pretty much all I got. Thanks.
|
||||
138
hpr_transcripts/hpr0020.txt
Normal file
138
hpr_transcripts/hpr0020.txt
Normal file
@@ -0,0 +1,138 @@
|
||||
Episode: 20
|
||||
Title: HPR0020: lighttpd
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0020/hpr0020.mp3
|
||||
Transcribed: 2025-10-07 10:20:46
|
||||
|
||||
---
|
||||
|
||||
Music
|
||||
Okay, hey everybody, this is Chess Griffin from the Linux reality podcast.
|
||||
This is my first hacker public radio episode, so it's good to be here.
|
||||
I think it's awesome that this show is up and running and there's been some really great
|
||||
episodes so far, so hopefully my little contribution will fit right in.
|
||||
What I wanted to talk about in this episode was the Lighty web server.
|
||||
Lighty is a web server just like Apache, I think most of us have probably used Apache at least.
|
||||
Those of us that have used Linux or BSD or something, Apache being the A in Lamp for Linux
|
||||
Apache, my SQL and PHP.
|
||||
Apache is certainly probably one of the most well-known and probably the most popular web server.
|
||||
That's out there, I've used Apache at run several of my sites, it's great, I mean you can't
|
||||
go wrong with Apache, but Lighty is another web server and I've been using it lately on some
|
||||
smaller sites and I really like it and so I wanted to kind of talk about it and just let people
|
||||
know about it and maybe people will check it out and try it.
|
||||
It's been around for several years.
|
||||
Lighty is spelled L-I-G-H-T-T-P-D and so they pronounce it Lighty and it's a much smaller piece
|
||||
of software.
|
||||
I don't remember the exact size of the source tarball for Apache.
|
||||
I feel like it's somewhere five, six megabytes, something like that, but Lighty is less than
|
||||
a meg.
|
||||
I think I just downloaded it recently, I think it was about 800 kilobytes, so it's pretty
|
||||
small and it compiles very quickly and of course most Linux distributions and the VSDs all
|
||||
have a port or package for Lighty, so it's pretty easy to install and even if you need
|
||||
to compile it from source it's a simple install, it's just a typical .configure make-make install.
|
||||
But what I like about Lighty is that it's very small, it's very light, I guess that's
|
||||
where the name comes from.
|
||||
It's super fast and they tout it as being really ultra secure.
|
||||
Now I'm not a security expert, I don't audit code, so I can't really speak to whether
|
||||
or not Lighty is more or less secure than Apache.
|
||||
But from an end user's perspective or from assist admins perspective, what I like about
|
||||
Lighty is again just how simple it is to get going and to install.
|
||||
Lighty has a single configuration file and that's kind of the main thing I wanted to talk
|
||||
about, the old Apache, Apache 1.3 series, I seem to recall having a single configuration
|
||||
file, usually it was HTTP.conf or maybe Apache.conf.
|
||||
But nowadays there's still a single configuration file, but Apache 2, I think at least from the
|
||||
way I see it, has become more modular, I mean they've split out different configuration
|
||||
sections, like if you're going to have virtual hosting you're going to put them in different
|
||||
sub-directories for sites available and then you're going to create a SIM link and make
|
||||
it into sites enabled to enable a separate virtual host.
|
||||
There may be a different file for any of the modules that you need to activate.
|
||||
It just seems to be a lot more split up, the configuration files and what not for Apache
|
||||
2.
|
||||
Lighty though is kind of like the old Apache, Apache 1.3 and that it has a single configuration
|
||||
file and it's lighty.conf, so it's L-I-G-H-T-T-P-D.conf and usually on most systems I've
|
||||
seen it exists in slash Etsy slash Lighty, on the BSD's I run free BSD and in there of
|
||||
course everything's in USR local, so it's USR, it's slash USR slash local slash Etsy slash
|
||||
Lighty, that's where you'll find the configuration file.
|
||||
But there's a sample configuration file in the documentation section or folder of the
|
||||
tarball, just the base tarball that you can download from the Lighty website, so you can
|
||||
see what the configuration file looks like and it's pretty short, I mean I printed it
|
||||
out and it's only like four pages long, four or five pages long and it's really well
|
||||
commented.
|
||||
That's what's nice about this configuration file, as is Apache's configuration file of
|
||||
course, but basically the way this works is the configuration file, I mean it's broken
|
||||
up into sections and the first section, the first 30 lines or so are just different modules
|
||||
that you can enable, like ALIS or redirect or the user directory module, if you want
|
||||
to have a user directory in each user's home, there's a CGI, fast CGI, there's all different
|
||||
kinds of modules, the rewrite module if you need to rewrite URLs, you can enable that.
|
||||
And all that you need to do to enable these mods is just simply uncomment the line and
|
||||
of course restart Lighty.
|
||||
Continuing on, there's a single line where you can set the document root for the server,
|
||||
if it's just going to be a single host, if you're going to do virtual hosting, there's
|
||||
a different place for that.
|
||||
But if you have just a single host, it's a one line to set the document root.
|
||||
Some cool things I like about Lighty in the configuration as opposed to Apache.
|
||||
Some things are so much easier, like for example, in Apache, if you want to, if you want to set
|
||||
up, let's say you want to enable directory browsing in some directories and not in other
|
||||
directories.
|
||||
Well, in Apache, you may have to create a block in the configuration file for each of the
|
||||
directories.
|
||||
And then there's an option in there, I think it's options, I think it's option plus indexes,
|
||||
I think that might be what it is.
|
||||
But here in Lighty, so there's, you have to do it on a per directory basis, and of course
|
||||
you do that here in Lighty as well, but it's much fewer lines and it's much easier.
|
||||
And you know, when you were first reading an Apache configuration file, if you didn't
|
||||
know what options plus indexes was, you may not know that that's the option to configure
|
||||
directory listings.
|
||||
But here, the option is, let's see here, I just had it.
|
||||
I think it's, I think it's server.directorylisting.activate, something like that.
|
||||
I mean, it's a very, it's a very plain English configuration line.
|
||||
That's not it exactly.
|
||||
I can't, I can't actually find, I can't find it while I'm looking at this configuration
|
||||
file.
|
||||
But the point is, the options that are available that you can enable or disable, it's,
|
||||
it's very easy to understand in the Lighty configuration file.
|
||||
Another example is if you want to password protect certain directories, with, with a
|
||||
Apache, you know, you can use, use the, the .ht access file, hidden file, and you can
|
||||
set a .ht password file where you can put in a user and the MD5 some hash of the person's
|
||||
password.
|
||||
And you know, I'm sure that most people that have set up Apache, you know, know what I'm
|
||||
talking about on how to set that up.
|
||||
And in Lighty, it's similar, but it's great because you can do it all within the configuration
|
||||
file.
|
||||
You can, you can, you can turn on the off module for authentication.
|
||||
And you can set up what the back end is.
|
||||
You can set up the name of the user file or the group file.
|
||||
And you can, then you can list the directories that require different, you know, that require
|
||||
passwords.
|
||||
So you sort of have like the .ht access information within the Lighty configuration file.
|
||||
It's the same amount of information for the most part, but it's just nice that not
|
||||
have to have separate files, you know, for each directory.
|
||||
You can just put it all in one configuration file.
|
||||
You can, of course, break some of this out.
|
||||
You can have separate, you can do, you know, do, and includes in the Lighty configuration
|
||||
file and, and have separate files for different pieces if you want, if you want to make it
|
||||
modular in other words, but you don't need to.
|
||||
So you can set up, you know, URL, rewriting, again, instead of having a separate .ht access
|
||||
file like an Apache, you can do it all within the configuration file.
|
||||
And it's very simple to set up virtual hosting.
|
||||
There's a, there's a very well-commented examples, both in the Lighty documentation and
|
||||
in the configuration file on how to set up virtual hosts.
|
||||
So you can, you can do that very simply.
|
||||
So that's, you know, kind of Lighty in the nutshell, it's smaller.
|
||||
I think it's faster, simpler to configure than Apache.
|
||||
It may not be as powerful as Apache.
|
||||
It may be more powerful.
|
||||
I don't really, you know, I don't really know people benchmark stuff.
|
||||
I know there were some benchmarking done, done, I think within the last year.
|
||||
And I think it showed Lighty being, you know, much faster and scalable than Apache.
|
||||
But, you know, benchmarks are benchmarks.
|
||||
You never really know how that, how that will, how that really plays out in real life.
|
||||
Lighty's a nice alternative.
|
||||
I run it on some personal sites and, and different things and, you know, couldn't be happier.
|
||||
It's cool, it's fun and something different to play with.
|
||||
So definitely check it out.
|
||||
All right.
|
||||
That'll do it.
|
||||
Thanks.
|
||||
Thank you for listening to Half Republic Radio.
|
||||
HPR is sponsored by Carol.net.
|
||||
So head on over to CARO.NAT for all of our community.
|
||||
264
hpr_transcripts/hpr0021.txt
Normal file
264
hpr_transcripts/hpr0021.txt
Normal file
@@ -0,0 +1,264 @@
|
||||
Episode: 21
|
||||
Title: HPR0021: The Festival Speech Synthesis System
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0021/hpr0021.mp3
|
||||
Transcribed: 2025-10-07 10:22:48
|
||||
|
||||
---
|
||||
|
||||
|
||||
Hello, this is Hacker Public Radio and my name is Dave and I'll be your host for today.
|
||||
And I am going to talk about festival today.
|
||||
Festival is a multilingual, synthetic speech synthesizer package.
|
||||
It was developed at the Center for Speech Technology Research at the University of Edinburgh
|
||||
and Carnegie Mellon University, amongst other places, there are a couple of other sites
|
||||
that probably had something to do with it as well.
|
||||
And it's licensed under ABSD-style license.
|
||||
There are other pieces of the puzzle, not just festival gets lumped in in conversations
|
||||
like this or topics like this.
|
||||
First box is another suite of tools that make the building of synthetic voices for festival
|
||||
more systematic and better documented.
|
||||
And there are, I guess, voice packages that come with festival or that are designed for
|
||||
festival and those that are additional voices developed by different entities that work
|
||||
with festival.
|
||||
To come to mind, the Inbrella Project and the HTS Project, and these can be used as back
|
||||
ends for festival, although they both of these will require the use of a separate engine
|
||||
to work.
|
||||
And then, I guess, walking in with the MIPS, we have some front ends for festival.
|
||||
Flight, F-L-I-T-E, I think it's how that's spelled, is a small footprint speech synthesis
|
||||
based on festival, developed at Carnegie Mellon University, and it's built with Festbox.
|
||||
And then there's some GUI front ends, TK Festival, of course, built with Tickle and Carnival,
|
||||
which is one I have not used, but the screenshots are really nice.
|
||||
It is a really nice looking graphical front end for festival.
|
||||
So that's sort of the family of applications I'm going to be talking about.
|
||||
Now, most people, when they think of computerized speech synthesis, or think of one of two things,
|
||||
or one of a couple of our three things, they will think of accessibility in sight, less
|
||||
computer users, people that need to have screen readers and need to have text read to them
|
||||
because they can't see it, or they will think of the 1968 Masterpiece 2001 and Hal 9000,
|
||||
or they will think of, probably some of the things that they thought of that, 1961, IBM
|
||||
717 series, I don't know what it was, 740 series, computer-saving or daisy bail bicycle
|
||||
built for two, which was what Hal 9000 sang.
|
||||
I am not a sightless computer user, but I am one that enjoys having his computer talk
|
||||
to him. The very first computer I ever bought was a Windows computer, and I bought and
|
||||
paid for, and my dad bought me a T.S. or 80 when I was an early adolescent, but the early
|
||||
90s, I bought a PC and it came with Windows 3.0 or 3.1 or something, and that was an application
|
||||
that would read text, and I just remember thinking that was really funny to him, a computer
|
||||
-wise voice, say the word banana, that's the end of there, but I find it hard to believe
|
||||
that I am so unlike most people that I would be alone in enjoying hearing my computer speak
|
||||
to me. If you are anything like me, you probably have a personal relationship with your computers
|
||||
anyway. I have been known to have pictures of my computers hanging up on my office at
|
||||
work, snapshot, so to speak. Anyway, it's something that geeks do, I think, is talk to their
|
||||
computers, or especially have their computers talk back to them. It's just a, another neat
|
||||
thing we can do with our computers and a very useful thing too. The reason I started
|
||||
using festival on a routine basis was because of the podcast I do from my car. I am recording
|
||||
this from my car. I am recording audio for stuff like this from my car is most convenient
|
||||
for me, was not convenient about that, is I don't have a computer in front of me, and
|
||||
so invariably I will forget something. I will have a minimal amount of notes in front
|
||||
of me and I will leave something out or I will get something wrong. Instead of re-recording
|
||||
it all or having to record something extra when I get home, I can top something up and
|
||||
then have a festival translate the text to a way file that I can import an audacity
|
||||
and include in the podcast. In addition to corrections and stuff, I can pre-prepare for
|
||||
the podcast. I can pre-prepare the show notes, I can pre-prepare the opening and closing,
|
||||
that kind of thing, or I can correct something like I said, or making a dendom to the podcast
|
||||
after I have recorded it. It has been a real time saver for me using a festival. Before
|
||||
I started doing any kind of podcast, which wasn't that long ago anyway, when I first started
|
||||
using Linux, I remember there was a program called Say Date, and there is one, say time is
|
||||
the one I use, say RTI, you made it, you would pop in say time and it would tell you what
|
||||
time it was, you know, audibly. I remember thinking that was pretty neat. But before
|
||||
getting into what you can do with festival, other than some of the things I already alluded
|
||||
to, I guess a question a lot of people would have is how do you install it. What is, it's
|
||||
really easy to install. It comes with your distribution anyway more than likely. Ubuntu
|
||||
comes with version 1.4.3. I think there is a beta version, not a beta when you repose
|
||||
it. I know all for Debian or Ubuntu, but it's version 1.95 or, say, a release counter beta
|
||||
version of what the festival people are calling version 2, and that's what is available
|
||||
from source, but as a tall ball. But as far as Debian and Ubuntu go, version 1.4.3 is
|
||||
what's currently in the repose. And I know for a fact this end, you know, the fedora
|
||||
repose, and the susur repose, and the mandraic mandraiva, gen2, picture distribution is
|
||||
there. If it's not, like I said, you can install from source. It's not that big a deal.
|
||||
But the packages I have installed on Ubuntu laptop are festival. FestLex-CMU. This is
|
||||
the dictionary file that developed the Carnegie Mellon University. FestLex-PosLex, and that
|
||||
is a festival lexicon file showing, for part of speech, POS-LEX, part of speech lexicon.
|
||||
FestBox-KDLP16K is one of two American mail voice packages that you can install. There
|
||||
are, well, it's one of two different types, and there's different rates, or do you want
|
||||
it eight kilohertz and one to 16 kilohertz, and for both versions of this. But there's
|
||||
I think there's a KDLP16K, as well as the KALPC16K, I think. Anyway, those are just the
|
||||
standard voices, and of course there's voices for lots of languages. There's a multi-lingual
|
||||
program, so more likely you can find your language. I'd be enough out of the most of the
|
||||
repos, you're only going to get American mail voices, American, or any English or UK mail
|
||||
voices. I know there's an Italian female voice, but there's not a lot of female voices in
|
||||
the Debian and Ubuntu repos at least. Anyway, so what can you do with festival? Well,
|
||||
in a Ubuntu system, and probably a Debian system, both not much unless you add a line
|
||||
or two to your dot festival RC file and your home directory. This will be in the show notes
|
||||
unhesitant to read it, but it's two parent-edical statements that start with parameter dots
|
||||
set followed by space. The first one is in parentheses parameter dot set space, single
|
||||
quote audio underscore command space, then followed by end of quotes, the command that you
|
||||
won't audacity, and excuse me, festival to use, to play the audio. So if you want to
|
||||
use also, which I recommend doing, if you want to be able to have a music player open
|
||||
a new special at the same time, you'd put in something like a play, I guess it's also
|
||||
play, followed by and the appropriate parameters. You can go to the Gentoo Wiki and do a search
|
||||
for speech D, how to, and you will find the parameters to put in. I will put them in
|
||||
the show notes so you will know how to get this to work. It's not good radio to read it.
|
||||
In the second parent-edical statement, it would just be parameter dot set space, single
|
||||
quote audio method. That's the parameter you've set in the previous parentheses space, single
|
||||
quote audio underscore command in parentheses, I guess I said. Not the best radio, but as
|
||||
a very lesser if you want to be able to use festival with also. Now that you got it
|
||||
working, what can you do with it? You can, for instance, make festival read instant messages
|
||||
to you from within game. I am not sure if there is a pigeon plugin for this, I'm sure there
|
||||
is, but it's not in the Ubuntu repos, I know that. There is a game plugin for festival,
|
||||
it's probably called something like game dash festival, and it is literally a five minute
|
||||
setup once you install it. You just go into game and you enable the plugin. More or less
|
||||
it under KDE, there is the K text to speech manager, which includes a little parrot that
|
||||
sits down in your status bar, system bar, and anything you copy to the clipboard, it
|
||||
will worry back to you. There is also an app called K say it, and one called K mouth
|
||||
that I have never played with. Then of course there is the command line, festival. You
|
||||
type festival, you get presented with a festival prompt where you can set the default voice
|
||||
or set the speech at the volume and then have it echo back commands or say things. That's
|
||||
one way to use it, I don't often use it, I'll have it used it that way in years, so I'm
|
||||
not going to talk about that. But just from the command line, you can pop the output of
|
||||
a command to festival. The command on switch we'll use for festival is festival space dash
|
||||
dash TTS, where TTS stands for text to speech. You could echo and then double quote some
|
||||
clever text, pop festival dash, festival space dash, dash TTS, whatever you put, whatever
|
||||
clever text you put in the prompt saying that double quotes will get spoken to you or
|
||||
you heard spoken by festival over your speakers. You can tap a file that way, I think you
|
||||
need the capital A switch, cat, space dash capital A, file.txt, pop, again festival space dash
|
||||
dash TTS will read to you the text in the file.txt file. A really useful thing to do,
|
||||
no most of you have read a man page or two, but if you would like the man page to be read to you,
|
||||
while you do something else, while you multitask, while you actually listen to the man page,
|
||||
tell you what to do. You have your fingers at the weight and the indeterminal ready to top what
|
||||
you hear. For instance, you could top man, space, crime, for instance, pop festival,
|
||||
space dash dash TTS again. So you can more as pop the, you know, spain command to this,
|
||||
it's going to input stuff to standard out. You could pop the date command with the appropriate
|
||||
parameters to have it tell you to date, tell you the date. Not much need to do that when you have
|
||||
programs like say date or say time. I think the say date program will even tell you your uptime
|
||||
in addition to the date. So that's pretty handy. What, my hand is pretty neat. What else can you
|
||||
do? You could create a shortcut if you use a desktop manager that allows you to create desktop
|
||||
shortcuts. I don't, but if you do, you could create an icon on your desktop and that points to
|
||||
the festival dash, space dash TTS command and you could drag a text file to it,
|
||||
conceivably drag an email to it with some tweaking, maybe some an HTML page. I don't know,
|
||||
some of the stuff I've not tried, but that's the kind of stuff you can do with it. One thing I
|
||||
have done with festival, other than, there's a time saving device for my podcast, is I took a book,
|
||||
a book that was in the public domain, a book that was considered to be one of its public domain.
|
||||
That's literally freeware. The book is called Underground, written by Juliet Drafis. And we
|
||||
researched by Juliet Sand. I think he works at Harvard. I think, anyway, it's a book about some
|
||||
hackers in Australia in the, I guess, late 80s, early 90s. And it's a very good book. It's a
|
||||
true story. It's a documentary style book. And I enjoyed reading it where they made the text of
|
||||
the book available online in text files and I divided it up into chapters. And I used text to
|
||||
waive, which is another portion of festival, to create an audio book. I offer every chapter. I
|
||||
did it in MP3 and I, it was very time consuming. I actually did it on vacation from Dominican
|
||||
Republic year before last, I think. I would take the text of a chapter and I would use text to waive
|
||||
and the command off the top of my head for text to waive. I'm thinking it's something like
|
||||
text to waive. I've forgotten. You can, you can do this with, you know, you could, I can text
|
||||
to waive dash dash help will tell you, but it is something along the lines of text to waive
|
||||
in the name of the text file and a dash over output in the name of the waive file that you're
|
||||
going to create. And then you follow this with a dash e-vail and then inside quotes, double quotes,
|
||||
inside parentheses, you put the name of the voice you want to use from my, from my podcast and
|
||||
further reading of the book I use one of the HTS voices, CMU underscore US underscore SLT underscore
|
||||
Arctic underscore HTS is the voice I used it. Hi, this is voice CMU US SLT Arctic HTS just in case
|
||||
Dave was an error trying to quote the command that created this audio. Here is the command once again
|
||||
text to waive my file dot t x t dash o my file dot waive dash e-vail open quote open parentheses
|
||||
voice underscore CMU underscore US underscore SLT underscore Arctic underscore HTS close parentheses
|
||||
close double quotes. This is my podcast, but I know it's one, I've named that voice one,
|
||||
but that's just me, that's not the official name of the voice, but that command I used to
|
||||
create an audio book from a bunch of text files. This is something that you want to be sort of
|
||||
careful with that you decide to create an audio book using festival. It's best if you have a book
|
||||
broken up in the chapters because that's what's going to load the entire text file in the memory
|
||||
and it's going to create a waive file using that and it's it's not it's going to use that
|
||||
volume memory if b file is going to be too big. I was lucky to underground is a book that was
|
||||
right in the chapters. It had been the whole book and I tried to load you know six or 700 pages
|
||||
worth of text. It would have probably taken up all two gig of RAM on my system. I'm just guessing,
|
||||
but between just a simple text to speech command on switch and the text away program that comes
|
||||
with festivals, the sky's the limit is to what you can what you can see doing with this,
|
||||
especially the text to speech part. I mean you could, there was demo pages on the way up where
|
||||
you know people have what is that the festival site and some of these other sites where you
|
||||
can demo some of the voices. There's a dialogue box you type text into you pick up a voice
|
||||
in the drop down list and you can hear that text spoken in a different voice. That's that's this
|
||||
PHP. There's I just stumbled upon a site the other day the regular way not using a stumble upon
|
||||
that that would read books to you. But you could it was I think it would take a book and you could
|
||||
turn into an audio file that you can think is subscribed to the RSS feed. It's pretty neat
|
||||
side. I forgot the name of it. But then you could like listen to Project Gutenberg books
|
||||
translated from text to speech and you could subscribe to that audio file is it with RSS feed
|
||||
readers so like a podcast that was pretty. But I'm sure they use something like festival,
|
||||
it's not festival it was a commercial text to speech package. So there's a lot that you can do
|
||||
with it. One of the questions I get asked a lot is how do you change voices festival comes with
|
||||
a handful of voices and like I said most of the American voices are male and most people
|
||||
are probably like me you know they find it somewhat intriguing to have their computer talk
|
||||
in the first place but if you're married like me there's something
|
||||
what's the word there's there's there's something really nice about having your computer talk
|
||||
doing a female voice knowing that you can tell her exactly what to do and she'll do it. She's
|
||||
a computer but she's telling a female voice it's something that made me no need to do very often
|
||||
anyway uh for you on how you change voices with it there uh another thing you can do it is I've
|
||||
never tried this but I imagine it would be pretty easy is uh like the the command line
|
||||
text-based browser links L-Y-N-X have a dump feature D-U-M-P so you could you could open up a web
|
||||
page with links using the the dump argument or links space-dump the name of the HTML file and then
|
||||
redirect that with another the greater than sign to a file so it put us supposed to do is take that
|
||||
HTML file and translate it to ASCII text which I'm pretty sure festival can handle pretty good
|
||||
except for maybe some of our non-standard characters so that's the way maybe to convert nine you know
|
||||
a web page that is in HTML if there's something festival could read to you. I like text-based
|
||||
weather forecast because they open up better in links and console window and that's something
|
||||
it could easily be parked and I could have festival read me the weather forecast. There's there's
|
||||
lots of things you can do with this and pretty sure asterisk has a has an option to use festival
|
||||
instead of a recorded voice. Speaking of asterisk there is a commercial text-to-speech package for
|
||||
for this available for Linux that I think asterisk uses and I've forgotten the name of it against
|
||||
with a C I think and Alison Smith the woman that does the voices for asterisk she she isn't in her
|
||||
voice too. I think it's called a diaphone I mean she said she they've set the size for voice so
|
||||
as her voice synthesizes it is a computer like voice it sounds like her that you can use with this
|
||||
commercial package and then I've forgotten the name of it. Sorry for the interruption what
|
||||
Dave is struggling to remember is the commercial text-to-speech system called Kepp Stryl CEP S-T-R-A-L.
|
||||
But there's two or three commercial alternatives too festival and not I'm a really expensive there's
|
||||
I guess there's T.T.Santh which used to be IBM text-to-speech she used to be via voice
|
||||
by around $40 there's there's a couple more than I don't think that I want to remember but
|
||||
they're in between the $29 dollar price range as well but that was tangent through me off oh yeah
|
||||
the before I get that change of voices there's other things you can envision doing with sad and
|
||||
alt friends and she you know you could remove non-standard characters using sad or you could
|
||||
take the output of a log file this is this you can't use an alt in this print you know like
|
||||
one column of it you know if you want to know who was online you could you could use alt to figure
|
||||
that out have it really to you so that's pretty neat but like I said one of the main questions I
|
||||
get frequently is how do you get the voice of what this is my podcast called in which is this the
|
||||
CMU US SLT Arctic HTS file for voice and let's CMU underscore US underscore SLT underscore Arctic
|
||||
underscore HTS and this Arctic clock is in Tundra this voice file is can be found at HTS.SP.NITEC.AC.JP
|
||||
one sure at that web page you want to look for the release archive because what's on their main
|
||||
page are voice files for the latest version of our assets I keep saying on that if the latest
|
||||
version is vessel which is version 2.0 beta or 1.95 what comes with most distributions I think is
|
||||
1.43 so you've got to release archive at that web page and you'll find the CMU US SLT Arctic HTS
|
||||
file and the SLT file is the US female voice there's there's another one but that's that's the one
|
||||
I think sounds the best and it's about a two-meg download and it will include the the HTS
|
||||
engine that you'll need to run this voice as well as the voice files themselves and
|
||||
and installing this it isn't that easy it's not it's not hard it's not hard right which
|
||||
of you download the tarball and if you're unzip it or untaught and look at it you'll see
|
||||
that there's a I forget the directory structure up top of my head but with down a couple of levels
|
||||
and you got like a it may be ball slash we have slash CMU underscore US underscore SLT
|
||||
underscore Arctic underscore HTS so it won't be the top level directory but the first two levels
|
||||
will be empty but like three levels down or so at least two levels now you'll see that directory
|
||||
then the CMU blah blah blah that one is the one that you will want to copy if you have
|
||||
festival installed into I think it's user user share festival voices English so that's user
|
||||
slash user slash share slash special slash voices slash English that's where you'll want to put
|
||||
that directory once you do that you'll be able to using text to wave select that voice with the
|
||||
the command line switch that's evalving in parentheses the name of that voice in parentheses
|
||||
and that may have to be in quotes I mean of course forgive me but that that's how you do that
|
||||
I think what maybe makes that voice sound better is the way that it's built it's built with
|
||||
it's built with a different engine in it's built with what is called HMM which stands for
|
||||
hidden Markov model in its a statistical method that's I've read is like the simplest
|
||||
form of a dynamic Bayesian system but it's a statistical system where I won't try to explain
|
||||
it because I'm not completely up on it but it's it's often used in creating voice files but it's
|
||||
particularly good at the calls that the hidden part of it you know there's there's inputs or
|
||||
outputs for you but they're called that can change to get you not aware of which one I can't
|
||||
explain it like I said I'm in the car you need to spend a while since I face statistics and my
|
||||
wife is gone hey uh I have to give the name of this road it's road to chase live on in the
|
||||
premises yeah no okay okay okay okay
|
||||
invably happens when you record audio in a car on your way home from work is your wife calls you
|
||||
and I sort of forgotten where I was but yeah that the hidden Markov model it's I don't know
|
||||
if it's superior or not but I know this SLT voice this uh this sounds really good and again you can
|
||||
find that it HTS.S.P. and I take that AC.JP I think and I take is like the Nagio
|
||||
Nagio Institute of Technology is a college in Japan evidently anyway uh I guess something I
|
||||
got left to say is using that voice using that uh CMU US SLT Arctic HTS voice using text the
|
||||
wave I get and you know I get the result I won and I get an audio file that's been translated
|
||||
front text but I also get a sub file in a cordon every time I don't know why I'm not investigated
|
||||
uh it's that the cordon is clean up accuracy after down I had that I'm not accumulating a bunch of
|
||||
no don'ts and wasting this space or anything and it's not doing any any damage at all it's
|
||||
still creating my file for me and everything works so I guess your mileage may vary anyway I am
|
||||
I've rambled on long enough and that's going to wrap it up for this episode of HPR much I have a good day
|
||||
hello this is voice CMU US BBL Arctic HTS hello this is voice US one I'm roll they forgot
|
||||
dimension but I'm roll engine binary and voice files can be found at the follow in url tcts.fbms.c.v
|
||||
dot v slash synthesis slash mvrl dot html
|
||||
hello I am the default festival voice thanks for downloading hacker public radio have a nice day
|
||||
thank you for listening to hacker public radio
|
||||
hpr is mastered by caro.net so head on over to clr.o.nc for all of those of you
|
||||
47
hpr_transcripts/hpr0022.txt
Normal file
47
hpr_transcripts/hpr0022.txt
Normal file
@@ -0,0 +1,47 @@
|
||||
Episode: 22
|
||||
Title: HPR0022: Chunk Parsing
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0022/hpr0022.mp3
|
||||
Transcribed: 2025-10-07 10:23:11
|
||||
|
||||
---
|
||||
|
||||
...
|
||||
Hello everyone, welcome to another episode of Higher Public Radio. I am your host
|
||||
of Flexi and I'll be talking about parsing, specifically about chunk parsing. I will
|
||||
describe the classical chunk parsing, then I will tell you about modification suggested
|
||||
to make it more efficient. Chunk parsing is also called partial parsing. It's a robust
|
||||
parsing strategy proposed for natural language processing. An example of a chunk sentence
|
||||
is, I like foreign languages, where I like is taken as a chunk and foreign languages
|
||||
as the second chunk. The chunking corresponds to the phonology of the sentence. A chunk
|
||||
edge is created when there is a pause and there is one major stress-burst chunk. The stress
|
||||
pattern and pause pattern of spoken language is called prosody.
|
||||
Fantastically, a chunk contains one head or content word, like a verb or noun, and function
|
||||
words surrounding it. The form of chunks follows given fixed templates. Their relationship
|
||||
between chunks is not templated, but are more governed by lexical interactions. Chunks
|
||||
can move around each other as a whole, but items within a chunk cannot move within the
|
||||
chunk. The chunking process is made of two main tasks. The first is segmentation, and
|
||||
segmentation tokens are identified, and chunks are created based on the criteria described
|
||||
earlier for the chunks. Then there's the second main task, which is labeling. Labeling
|
||||
identifies the types of the words. Then the types of the chunks, such as noun phrase,
|
||||
etc. A chunk parser groups related tokens into chunks. Then combines the chunks with
|
||||
the dominant tokens, forming a two-level tree that covers the whole sentence. This tree
|
||||
is called chunk structure. Chunking rules are applied in turn until all, until all the
|
||||
rules are done with. The resulting structure is returned. When a chunking rule is applied
|
||||
to a hypothesis, it only creates new chunks that don't overlap with any previous ones.
|
||||
So if we apply two non-identical rules in reverse order, we get two different results. There
|
||||
are then rules for chunking, rules for unchunking, rules for merging, for splitting, etc. So as
|
||||
I said earlier, chunk parsing is also called partial parsing. What's the difference between
|
||||
chunk parsing and full parsing? Well, each one has its benefits and its downsides. Full
|
||||
parsing is a polynomial of degree three, whereas chunk parsing is a linear algorithm. Chunk
|
||||
parsing has a hierarchy of limited depth, whereas full parsing doesn't. But chunk parsing
|
||||
is not as awesome as it sounds, because it can have less than perfect results. Two researchers
|
||||
from Tokyo suggested an alteration to chunk parsing to make it more efficient. They suggested
|
||||
using a classical sliding window technique instead of tagging to consider all subsequences
|
||||
rather than avoid overlapping completely. They also suggested using a machine learning
|
||||
algorithm to filter sequences that are in a context free grammar. They suggested using
|
||||
a maximum entropy classifier for filtering. For more detail, look at that paper. It's
|
||||
one of the links in the show notes. That's all for tonight. Thank you for listening. This
|
||||
was Plexi with Hackebubli Gradio.
|
||||
Thank you for listening to Hackebubli Gradio. HPR is sponsored by tarot.net. So head on
|
||||
over to C-A-R-O dot-E-C for all of the team.
|
||||
Thank you very much.
|
||||
122
hpr_transcripts/hpr0023.txt
Normal file
122
hpr_transcripts/hpr0023.txt
Normal file
@@ -0,0 +1,122 @@
|
||||
Episode: 23
|
||||
Title: HPR0023: Software Review: K e e P a s s
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0023/hpr0023.mp3
|
||||
Transcribed: 2025-10-07 10:23:57
|
||||
|
||||
---
|
||||
|
||||
What's your name, ringing?
|
||||
Hello and welcome to Hacker Public Radio. I am Stank Dog with you on this short edition
|
||||
of HPR today. We're going to be doing a little software review of a handy little application
|
||||
that I've been using recently called KeyPass. That's K-E-E-P-A-S-S. You can find out a little bit
|
||||
more about it on your own and download it at keypass.info. That's K-E-E-P-A-S-S.info. What this application
|
||||
is, as you may have guessed from the name, a piece of software that you can use to store all of your
|
||||
accounts, user names, passwords, and notes or other information, server names, things like that.
|
||||
All in one convenient location. Now, you may be thinking to yourself, I already do that. I store
|
||||
that information in Excel or noted a TXT file or something like that. But the problem with those
|
||||
is sure they get the job done as far as storing passwords, but they're not really the most
|
||||
reliable and safe way to store data because it's keeping things in plain text. So even if you
|
||||
are to attach a password file or attach a password and lock up your Excel S file, for example, it's
|
||||
still not the greatest algorithm in the world and can be cracked. That's where one of the first
|
||||
features of KeyPass stands out for me. All of the information is stored into one database.
|
||||
One database contains all that information and that database is encrypted. That's the nature of
|
||||
what the software does. So it's going to completely encrypt using a ES 256-bit cryptography
|
||||
protecting the database itself, which means not just your passwords, but even the user names
|
||||
and even the site names, every single bit of data is stored in a highly encrypted database.
|
||||
That's the first thing. Secondly, inside of that database, the passwords are actually hashed.
|
||||
So they're hashed with a, excuse me, I guess maybe I should clarify here, the password is
|
||||
hashed with a 256-bit key, and then the actual database itself is encrypted as well. So
|
||||
you have two things in there happening to protect data once you've opened the application,
|
||||
and then you have something in case, something that encrypts the entire database in case you were
|
||||
to, for example, lose that file or somebody were to somehow get access to your computer or
|
||||
remotely hack into your computer and get the file, the database file itself is encrypted.
|
||||
So they wouldn't be able to do too much with it with such a high encryption algorithm,
|
||||
such an advanced encryption algorithm on it. It's going to be difficult for them to crack it,
|
||||
even if they were to get their hands on it. So that's something very important and actually
|
||||
very good for even business use. Now I'm using this personally at home, but I also use this
|
||||
for my job where I have a lot of application or a lot of servers, I guess I should say,
|
||||
with lots of different use names and passwords. So I've begun storing a lot of that information into
|
||||
this, a lot of those accounts in this application I should say. So very cool, very interesting
|
||||
application. The couple other things that it does that are worth mentioning is
|
||||
all of this is stored into the database file and sure the database is encrypted and all that,
|
||||
but how do you, as a user, get into it? Well, the entire database is encrypted and you can gain
|
||||
access to your database one of two ways. Well, one of three ways really. The first and most
|
||||
obvious way is to put a password on the application itself. Obviously you want to use a strong
|
||||
password and standard password rules apply here. If you put a crummy password on it and somebody
|
||||
does get the file and works to just do an old fashioned brute force or guessing of what your
|
||||
password might be. You know, if you use the word password or any of the traditional things like
|
||||
that, then not only did they crack into the database and open the file, decrypt the file, but they
|
||||
also have access to all of your other user names and passwords. So it is a single point of
|
||||
failure. So you have to notice that and you have to respect that. So you should put a very strong
|
||||
password in place to protect this. Well, that's where the second thing comes in. The other way you can
|
||||
also protect this is to actually write a key file and it will generate a random key and you can
|
||||
store that key file so that you need the key file to access it. So for example, if you were to
|
||||
install this on a computer machine that you use and store the database on there, it's encrypted,
|
||||
but only if someone has the key file physically in their possession could they get in and access it.
|
||||
So if, for example, and just to be hypothetical law enforcement were to get your computer and want
|
||||
to try to access this database with all your user names and passwords, they would need the key
|
||||
files to do it. Obviously you don't want to put the key file right on the same computer machine
|
||||
because then they've got the access to it and therefore anything contained in the database.
|
||||
So that's where the third thing comes in and the probably the best scenario is to have dual
|
||||
factor authentication where you have to answer in a known password and be also have that key
|
||||
file physically available. So this is handy for a couple of ways. Again, the two, I put in
|
||||
out the weaknesses in the way the other two applications of security fail, but when you combine these
|
||||
together, you give yourself something interesting. And actually it's very functional in a way,
|
||||
and let me explain, you can have this installed in multiple locations. You can make the database portable
|
||||
and carry it around with you on a USB key or and copy it from one system to another and have all
|
||||
of those in multiple locations in the case you can't get access to another one. Or you can install
|
||||
the key file, or excuse me, and you can install the key file on a USB key and carry it with you.
|
||||
That way every computer that you're at, you simply put in the USB key or memory card or whatever
|
||||
else and have the key with you to open that database. So you can actually install the database
|
||||
in multiple locations. Just carry that key around with you on your USB key, which is pretty much
|
||||
the definition of where the word comes from and have access to it. Another thing that you can do
|
||||
and key pass even offers this on their site, you can download a portable version,
|
||||
and which does exactly what I described as a Windows installer, but what I use is just the
|
||||
portable installer and you can install the entire thing onto a key drive and leave the .key file
|
||||
on the computers and carry the database around with you encrypted and have the .key file
|
||||
copy that to all the locations where you think you might access it and just put the drive in.
|
||||
So now you've got the database available, look for the key file on that local drive. So you can do
|
||||
one of those two ways. So you've got some flexibility there and still type in your password. So
|
||||
what that does is in any scenario, if you were to lose your USB key or memory card or whatever
|
||||
storage medium you've used, no one can really do anything with it when they found it because they
|
||||
don't have the key file and or they don't have the database if they have the key file. So without
|
||||
them being all together in one place, now that idea of course would be to put all of that on your
|
||||
USB key, the key file right there with the database so that they have the access. You still got
|
||||
the password protection, which again like I said if you use a strong password you still have that,
|
||||
but it's still a bad idea to put all of that together. The best case scenario is to break the key
|
||||
file up from the encrypted database. Something else that they offer that's kind of cool is that there
|
||||
this has been ported. I should also point out this is open source software so you can find the
|
||||
source code, browse it and make sure it is doing what you think is doing, the great thing about
|
||||
open source of course, or do what other people have done and that is ported. There are actually
|
||||
versions of key pass for your cell phones, pocket PCs, Windows mobile, six, five, etc, etc.
|
||||
It's been ported to Linux and Mac OS X. I actually think that's a universal platform independent
|
||||
version has been ported out of that as well. There's a blackberry version, a palm OS version, etc, etc.
|
||||
So there's lots of different versions of this, which is great. The main version I guess the most
|
||||
everybody uses is the Windows installer for obvious reasons, but you could use this in just about
|
||||
any environment. The other cool thing is you can have multiple user keys which could come in
|
||||
and you could have multiple people using one application or different key files or different
|
||||
accounts, etc, etc. It will export. I don't really have the need of that quite frankly. I just
|
||||
needed one secure place to store all my passwords instead of having them scribbled here or memorized
|
||||
there, etc. etc. or in different files or emails. Some of these advanced features are not
|
||||
something that I'll ever see myself using. However, they could come in handy depending on what
|
||||
your needs are. One of those is that has a lot of great export features. You can export all the
|
||||
information they use in any password out to different formats from plain old TXT files to XML files,
|
||||
comma separated value files, etc., etc. and then import them into other applications. So that would
|
||||
be cool if for some reason you did want to switch software and try something else or convert that
|
||||
data out into another application or store it in some place else. You're not stuck with your
|
||||
data stored in a proprietary system and have to type it all over again in a new application.
|
||||
You can export that data and import it somewhere else and do whatever it is you want to do with it.
|
||||
So that's pretty cool. Again, I mentioned how portable it is. You can put notes in there to
|
||||
describe exactly what it goes to help you remember maybe how to use it or what application it is.
|
||||
There's a field in there to store URL for websites. Navigation is pretty simple. You can put
|
||||
together a little tree, a traditional tree environment and group things by category. It comes
|
||||
defaulted with several common ones like internet, email, etc., so you can store email accounts in
|
||||
one tree and store your internet access accounts to different websites or whatever in another.
|
||||
But it's customizable. It comes with a bunch of little icons come with it so you can create subgroups
|
||||
with their own custom icons if that floats your boat and I've actually used that for a few other
|
||||
things. So all in all, I'd say this is a very good application. Again, if you want to check this out,
|
||||
you can go to keypass.info. That's k-e-e-p-a-s-s dot-i-n-f-o. Go check it out. Go check out some
|
||||
the plugins. It does allow your right plug-in support, so that's kind of cool. And again,
|
||||
it is open source, so that is something we always support here at Hacker Public Radio. Thank you
|
||||
for listening and we will see you tomorrow. Thank you for listening to Hacker Public Radio.
|
||||
HPR is sponsored by caro.net, so head on over to caro.nq for all of us here.
|
||||
259
hpr_transcripts/hpr0024.txt
Normal file
259
hpr_transcripts/hpr0024.txt
Normal file
@@ -0,0 +1,259 @@
|
||||
Episode: 24
|
||||
Title: HPR0024: An interview with Jonathan Bartlett
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0024/hpr0024.mp3
|
||||
Transcribed: 2025-10-07 10:25:20
|
||||
|
||||
---
|
||||
|
||||
¶¶
|
||||
Hello and welcome to Hacker Public Radio, I'll be your host for today Deep Geek.
|
||||
Today is a very special show for me today because I'm joined today on the phone by Jonathan
|
||||
Bartlett.
|
||||
Jonathan is a web developer at New Media in Tulsa, Oklahoma, as well as being an adjunct
|
||||
instructor at Tulsa Community College.
|
||||
He is the author of programming from the ground up.
|
||||
A Guide to Learning Linux Assembly Language, a book in use at Princeton University as a textbook,
|
||||
which aims at making good programmers better programmers by giving them a deep appreciation
|
||||
for how the CPU works.
|
||||
He is also the author of numerous articles at IBM.com's Developer Works.
|
||||
Hi John, how you doing?
|
||||
Doing great thanks for having me or I'm so glad you could join us today.
|
||||
John in addition to being a web developer and being an instructor, John is also a PS3 hacker.
|
||||
And I'm always interested in talking to people about exotic hardware.
|
||||
And so that's why the PS3 is pretty exotic.
|
||||
It's got an architecture of making the other, I think.
|
||||
Well, John, perhaps not all of our listeners are real CPU enthusiasts.
|
||||
Can you tell us a little bit about the differences in architecture between the cell and the
|
||||
more popular windtell CPUs?
|
||||
Yeah, as you said, the PS3 has a processor on it called the cell, which was developed
|
||||
jointly by IBM and Sony.
|
||||
And historically, each chip processor chip has one core on it.
|
||||
So each CPU can only execute one stream of code at a time.
|
||||
It can alternate quickly between streams, so it feels like it's doing multiple tasks at
|
||||
one.
|
||||
But really each CPU was only doing one thing at a time.
|
||||
With multi-threading, there was some sharing where you could have some streams going simultaneously.
|
||||
But finally, they started building what's called multi-core processors, where you actually have
|
||||
multiple independent processing units on each chip.
|
||||
Now Intel does that by simply taking the same chip and replicating it multiple times.
|
||||
So it's basically the same architecture as if you had multiple independent chips, but
|
||||
just all put together on the same piece of those.
|
||||
In the cell, it's different.
|
||||
It's a multi-core design, but the big difference is that the cell has one kind of supervisor
|
||||
core, which is basically just a stripped-down power PC chip.
|
||||
And then eight specialized cores, called synergistic processing units, through this CPU.
|
||||
And they're actually full cores, but they're different from a typical CPU core, because they're specialized for
|
||||
computational programming.
|
||||
And so if you think about, you know, you have the vector processing units like alpha-back,
|
||||
and MMX, and those sorts of things that you have on traditional processors.
|
||||
Well, these FPUs are kind of like those, except they can be extended to have a full range of instructions on them.
|
||||
So they're not piggybacking off of a traditional CPU that actually have the full instruction set.
|
||||
So anyway, these chips don't have all the capabilities of a full chip, but they're not limited as just a straight vector processor.
|
||||
And what's that give you is really huge multimedia support, because that's basically what we buy vector processors for.
|
||||
MMX and alpha-back, it's for doing multimedia processing.
|
||||
And so these are specialized for that.
|
||||
So the cell processor has a one primary core, and then it has eight FPUs attached.
|
||||
And all of them, I believe they all run at 3.4 gigahertz.
|
||||
So they're screaming fast.
|
||||
So is it both the power PC part, the stripped down power PC part, and the FPUs are running at that high speed?
|
||||
Yes.
|
||||
Okay.
|
||||
So I mean, so it sounds like what you're telling me.
|
||||
Like if I board a dual core Intel, you know, the links tunnel would recognize if the access slows immediately, both those cores, right?
|
||||
But in this case, it won't.
|
||||
Right.
|
||||
That's correct, because, you know, for like one X, you have to have each core have to be able to support virtual memory and support preemptive multitasking, and that sort of thing.
|
||||
So it can switch processes correctly.
|
||||
These chips are specialized for multimedia.
|
||||
They don't have all that extra stuff on them.
|
||||
So basically, they're owned by one processor at the time, and you actually have to write specialized code for each of these cores to run on.
|
||||
You can't just take a standard out of the box program and compile it for these processes.
|
||||
You actually have to write special codes to take care of that.
|
||||
So, let me know just on the side now, if I compare, say, a 3.4 gigahertz cell and a 3.4 gigahertz Pentium or programs, let's say I'm not a specialized seed programmer.
|
||||
Or is my Linux background going to operate the same speed between those two processor types?
|
||||
You're probably going to get less speed out of the cell, in that case.
|
||||
Why would that be?
|
||||
The prior PC, which ships on it, is actually a little bit stripped down, so it doesn't have all the optimizations that are in a standard prior PC chip.
|
||||
But as I said, in order to get the 8th synergistic cores working, they have to have specialized codes to run on those.
|
||||
So, what you wind up with is if you don't have any programs that know how to use your SPUs, then you wind up with just a prior PC that does work as well as most of them.
|
||||
That's interesting, you know, because a lot of hackers have an extensive knowledge of seed.
|
||||
So, I mean, it sounds like they could still get some good mileage out of this.
|
||||
Yeah, especially if you want to do any sort of scientific programming, that's actually where my articles that I wrote for IBM kind of focus on during scientific processes on those specialized processes.
|
||||
You know what I think of is, as I remember, there was this hacker webpage, and what the guy did was he made a look up of all the hash values that passwords could possibly link to.
|
||||
Now, if somebody wanted to write a generator table like that really quickly, would he load into the SPUs, a bunch of seed numbers, and then channel them all together,
|
||||
and actually do eight calculations at a time that way, is that how it would work?
|
||||
Yeah.
|
||||
Yeah, basically, yeah, it's kind of interesting because you actually have to explicitly code all memory moves from and to main memory on the cell.
|
||||
It's unusual to usually just access it directly.
|
||||
But yeah, I mean, basically, you'd load it in, load it in the code into each of the eight processors, go through it, and calculate all of your hash's simultaneous.
|
||||
Uh-huh.
|
||||
That's really amazing.
|
||||
So it would be a fast computer for a typical desktop user, but it would be even better for a more knowledgeable programmer.
|
||||
Yeah, if you were at that.
|
||||
That's amazing.
|
||||
And also, it's possible that in the future, because it's such a different technology, there's not a whole lot of people developing for at the beginning.
|
||||
And so it's possible, as time goes on, we'll have more apps to come out that have specialized cell extensions.
|
||||
You know, you're already seeing that with a bunch of the at-home type apps, like Folding At Home.
|
||||
I believe Einstein at home is trying to work on a place vision, a cell version, and a bunch of those kind of do-it-at-home scientific apps are working on those.
|
||||
You know, I wonder if a more mainstream application, such as a spreadsheet, could take advantage of all those SPUs.
|
||||
You know, because that's a calculation-intensive application, right?
|
||||
You probably could, I mean, because most spreadsheets aren't really that calculation-intensive.
|
||||
You know, you've got about, you know, 30, 100, maybe a thousand calculations to do.
|
||||
The cell really shines, you know, a couple million.
|
||||
A couple million.
|
||||
Which is why it's kind of specialized for graphics.
|
||||
In fact, what I kind of heard from the room though, the room though, is that the first design of the PlayStation 3 is actually going to have two cell processors.
|
||||
And they were going to be simply, rather than have a graphics processor, they're just going to use the cell in its place.
|
||||
And the reason that they chunked that design was simply because there's a whole stack of dissolves of work that goes along with making a video card or a video board,
|
||||
and making all the libraries that go with it.
|
||||
So they just want to have you with the standard one, rather than trying to build it themselves.
|
||||
But multi-media processing is really what the cell is built for.
|
||||
That's amazing.
|
||||
Yeah, one of the reasons for the architecture is because, you know, Intel has eight core processors now, or is working on them a lot, but I don't think they're out yet.
|
||||
But the difference is that those runs really hot because each core is a full processor.
|
||||
But the cell, since each core are these specialized multi-medias, the cell actually runs really cool.
|
||||
So you don't have to have, like, a grunk-antuan pan sitting on your TV or whatever sort of multi-media device.
|
||||
So this would really, like, advance, like, you know, a media company or an animation company.
|
||||
Well, perhaps a company that needed to run bare wolf clusters, like for the forecasting or something.
|
||||
Yeah.
|
||||
Yeah.
|
||||
Also animation rendering.
|
||||
I think it would be fantastic.
|
||||
Do you know, because I've seen pictures in Linux Journal of the render form used by the Shrek movies,
|
||||
do you never have any actual installations where people have replaced render forms with all cell processors?
|
||||
I'm not.
|
||||
And I think the reason is because no one's actually done the development work to move a lot of these rendering platforms to use the cell to protect them.
|
||||
You know, I heard that Toshiba released a prototype motherboard.
|
||||
But that no one ever came out with, you know, a regular standardized, consumable-level motherboard centered around the cell.
|
||||
Is there a reason for that?
|
||||
And have there been industrial state blade server-style motherboards made with the cell?
|
||||
Yeah, there's been a lot of blade servers made with the cell.
|
||||
Yeah.
|
||||
I think that before the PlayStation 3 came out, most of the people using the cell were on some sort of IBM blades,
|
||||
or there's not a company making blades that I forget the name right now.
|
||||
So actually, both, you know, besides the PS3, most cells right now are running in place.
|
||||
So this could really replace a person looking to change home computers.
|
||||
They could actually get this.
|
||||
Get a PS3 and use it as a home computer.
|
||||
Yeah, you can use it as a regular Linux box.
|
||||
I actually did that for a while, although I have a really, really crappy TV, so it didn't work out as well as it looked for other people.
|
||||
Well, you know, I know it comes with a blue right, a PS3.
|
||||
So I would assume you would need to get, you know, like a HDTV monitor.
|
||||
Do you want to?
|
||||
Yeah.
|
||||
But now, in your case, you don't.
|
||||
You know, I'm a cheap bastard, you know.
|
||||
So much, I don't know.
|
||||
So how do you connect to it then?
|
||||
Do you connect to it just with the TV set or do you tunnel into it somehow?
|
||||
No, well, I connect direct to my TV set.
|
||||
You know, I think Sony engineers would probably be crying in their beer.
|
||||
They saw the kind of setup I had for it.
|
||||
Yeah, and if I actually need to, I actually want to see a full desktop.
|
||||
I usually run an external into it that way.
|
||||
Yeah, so you'd log in via KVM or something?
|
||||
Exactly.
|
||||
So, you know, it's interesting because I heard these game councils are sold
|
||||
at a slight loss by the big companies who make them, you know,
|
||||
because they want to get them out in the expect to recoup money on licensing fees
|
||||
like for the gate individual games.
|
||||
So I'm wondering if like the actual hardware of the PS3 is actually worth more
|
||||
than what you have to buy it for.
|
||||
This probably is.
|
||||
In some of these several things to try to shave off some diamond off of it,
|
||||
as opposed to the cells that come on the PS3 instead of having 8th SPU cores
|
||||
that actually have 7th.
|
||||
And the reason they did that is that, you know, when you go into manufacturing,
|
||||
some of your chips will be slightly defective and some of them will be, you know, even more defective.
|
||||
And so what they did is they basically said we're going to manufacture these
|
||||
but we're going to only throw out chips if they have 2 defective SPUs.
|
||||
Well, they keep them, they keep them if they have 1 and if they manage to get all 8,
|
||||
we'll just disable one of them.
|
||||
You know, that's an amazing thing.
|
||||
I just don't know how to respond to that.
|
||||
You know, because I know that the CPUs are actually made in mass
|
||||
and that there's a quality assurance and sometimes they know that some can operate a certain speed
|
||||
and those can't, like I've read that, until they rate the speed of a batch somehow.
|
||||
But in this case, they're actually rating how many of the SPUs are fully functional.
|
||||
Exactly.
|
||||
Amazing.
|
||||
Yeah, it's interesting what they do in engineering but that's why I'm a software guy, not a hardware guy.
|
||||
So what kind of Linux do you prefer, John?
|
||||
I'm generally just, I usually stick with Red Hat just because that's kind of what I grew up on.
|
||||
Now, I'm a devian guy and I did read that some people got devian Linux up and working.
|
||||
What are the different Linuxes that are known to work with the PS3?
|
||||
Well, the main one that they got, the first one they got running on PS3 was yellow dog.
|
||||
And they've been kind of the stable power CPU vendor for a long time.
|
||||
But because Sony actually paid them to all the porting work to get yellow dog up and running on the PS3,
|
||||
which I thought was kind of interesting kind of showing Sony's commitment to Linux on the PS3.
|
||||
Yeah, you know, that is a lot of commitment from them.
|
||||
Has any nine Linux operating systems been made to work on this platform?
|
||||
Perhaps the...
|
||||
Yeah, I've heard netbfp.
|
||||
Netbfp?
|
||||
Yeah, but I've never tried it myself.
|
||||
Yeah.
|
||||
So, you know, I know that Macintosh Apple released used to have a power PC computer before they switched to Intel's.
|
||||
But they've made no attempt.
|
||||
In fact, that was one thing that I was a bit disappointed at because I thought that would have been a great move for Apple
|
||||
because their PCs are so heavily multimedia-oriented.
|
||||
Yeah.
|
||||
That the cell would have been a natural fit going from power PC to the cell,
|
||||
because it doesn't require any rewrite of any application code.
|
||||
But they could have used the SPUs for doing a lot of their quick time graphics processes.
|
||||
That would have been great.
|
||||
They probably missed the bottom of this one.
|
||||
Well, now, a lot of my listeners, a lot of our listeners at Hacker Public Radio are heavily pre-soft for people.
|
||||
And some of them have said that they've had problems with Sony because they do a lot of patenting and a lot of, you know,
|
||||
I don't know if close sources are the right word, but it's certainly closed architecture.
|
||||
Well, how does this wash with you?
|
||||
As far as hardware goes, I don't have much of a opinion on it one way or another.
|
||||
I'm a big free software fan myself.
|
||||
My book I released under the GNU free documentation license.
|
||||
And I try, at the place I work, we try to, as large parts of the software, we develop as we can try to open source.
|
||||
But, you know, the main thing that, my main disagreeing with Sony is when they started putting those root kits on,
|
||||
I think they were putting root kits on CDs or something like that.
|
||||
Yeah, that was a real tobacco.
|
||||
Yeah, that went way too far.
|
||||
But as far as, you know, one of the things that people complain about is that they've walked the graphics processor on the cell.
|
||||
So that you can't use any of the graphics processors 3D capability.
|
||||
Yeah, but I did want to ask you about the graphics processor, because I understand it's like a really, I'm correcting if I'm wrong.
|
||||
That is like a really advanced, I believe in video, but I'm not sure.
|
||||
And that some people have used the actual video card for photography calculations.
|
||||
Do you know anything about that?
|
||||
I'm not familiar with any of that, although I wouldn't be surprised.
|
||||
There's actually a company called RocketMind, and they have the software development kits that I believe haven't looked at it as closely as I'd like.
|
||||
It allows you to use a lot of these alternate execution environments such as graphics cards,
|
||||
SPUs, and that sort of thing fairly easily from within a C++ environment.
|
||||
I wouldn't be surprised if someone had used that in conjunction with something like RocketMind that makes it pretty easy to write stuff to work on specialized graphics.
|
||||
But as far as on the PlayStation 3 itself, Sony's walked that card down pretty hard, so you actually can't access it from Linux except through a frame buffer.
|
||||
So that must have been if anything that people know about that has done, used that technique, that must be very advanced.
|
||||
Well, I mean, before we wrap things up, John, is there anything I should have asked you?
|
||||
I think we covered most of the basics, especially for non-programmers.
|
||||
There's a lot of interesting stuff as well when you get into the actual individual programming on it.
|
||||
But anyone who's interested in that can also check out my articles on IBM's developer work.
|
||||
It's kind of interesting the way I got into it is because I actually thought, you know, we were talking about Macs, I actually bought a Mac.
|
||||
And I was interested in running the programming.
|
||||
But I was just pointing because I got a laptop in there, 32 bits, and I wanted to do the 64 bit stuff.
|
||||
And someone told me that this file was a 64 bit RPC processor.
|
||||
And is it?
|
||||
And it turns out they actually have a simulator available for the cell.
|
||||
So before it even came out, I was able to do some practice programming on it via simulator that I did have.
|
||||
They still produce it.
|
||||
And it's actually quite an interesting little thing because it literally mimics the hardware exactly.
|
||||
So it mimics the actual cycle through so you can actually know how many cycles your programming is taking just by running it on a simulator.
|
||||
That sounds very intense and it also makes me wonder if maybe if somebody actually set this up as a home computer.
|
||||
If they could maybe run a virtualization environment and be able to run their old favorite Windows apps in that way.
|
||||
That's very popular.
|
||||
Yes.
|
||||
And that's not the kind of sure on all the details I'm talking about.
|
||||
Well, look, John, I really want to thank you for coming back to public radio because you know I do web searches on this topic.
|
||||
And it just doesn't seem to be enough interesting information out there.
|
||||
So I hope this really enlightens the listenership.
|
||||
Thank you again.
|
||||
Well thanks for having me. I appreciate it.
|
||||
Thank you for listening to Hack with Public Radio.
|
||||
HPR is sponsored by Carol.net.
|
||||
So head on over to C-A-R-O dot-A-T for all of us here.
|
||||
Thanks for watching.
|
||||
You
|
||||
593
hpr_transcripts/hpr0025.txt
Normal file
593
hpr_transcripts/hpr0025.txt
Normal file
@@ -0,0 +1,593 @@
|
||||
Episode: 25
|
||||
Title: HPR0025: Social Network Aggregation
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0025/hpr0025.mp3
|
||||
Transcribed: 2025-10-07 10:26:41
|
||||
|
||||
---
|
||||
|
||||
music
|
||||
Good afternoon, evening, morning, day, whatever it is.
|
||||
This is Peter from the Fresh Ubuntu podcast, and for a bit of a change of pace, I am joined
|
||||
by my co-host, Harlem.
|
||||
How are you doing, Harlem?
|
||||
Great.
|
||||
How are you doing, Peter?
|
||||
Things are doing just fine over here on the side, so.
|
||||
And you?
|
||||
I cannot complain.
|
||||
I can't complain.
|
||||
I could complain, but no one ever listens when I do, so I've stopped.
|
||||
Right.
|
||||
So today, we are going to be talking about something not directly Ubuntu related, as
|
||||
our regular listeners may be expecting.
|
||||
We are going to talk a little bit today about OpenID and the practical use of OpenID in
|
||||
social networking.
|
||||
One of the things that comes up a lot in our podcast is social networks and our Twitter
|
||||
accounts and things like that, so we're going to tie in a little bit of OpenID with
|
||||
that.
|
||||
So the first thing that we want to talk about is OpenID, and exactly what is OpenID.
|
||||
I'm going to give you just a very, very brief intro to OpenID.
|
||||
If you want to find out more, there's more info than you can shake a stick at available
|
||||
at OpenID.net.
|
||||
So first off, we should cover briefly what OpenID is.
|
||||
And basically, OpenID, I describe it as a distributed authentication mechanism.
|
||||
What it lets you do is you have yourself a username and a password, if you will, a login,
|
||||
with a specific OpenID provider.
|
||||
Then when you want to log on to another service somewhere else, for instance, email or some
|
||||
sort of account, you could imagine online banking or anything.
|
||||
I don't know.
|
||||
That may not be a great example just yet until people start to trust OpenID a little more.
|
||||
But the idea is that to log in, you no longer have to remember different user names and
|
||||
passwords for every site that you've visited, assuming that the site that you're visiting
|
||||
and trying to log in to supports OpenID.
|
||||
And that can be your single, you can have an OpenID as your single point of login.
|
||||
So you only need to log into one place, but you can log into many sites with that single
|
||||
login.
|
||||
It's pretty cool.
|
||||
Now the way it gets kind of confusing in some of the details, so I'm not going to go
|
||||
into those if you're really, you know, tech savvy and you want to know how OpenID works,
|
||||
check out OpenID.net and they've got all sorts of information there.
|
||||
But basically the gist of it is, again, you're going to log in to an OpenID provider's website.
|
||||
And once you're logged in there and authenticated, you can use that as a proxy login for somebody
|
||||
else.
|
||||
Alright, so first thing we want to do is we're going to get ourselves a couple of OpenID
|
||||
accounts.
|
||||
Now I have a couple of OpenIDs and I got one through an OpenID provider called idproxy.net.
|
||||
And I chose them because they had an interesting feature, whereas they use your Yahoo login to
|
||||
validate your OpenID login.
|
||||
So I chose them first because when I first went to login, I was following a tutorial and
|
||||
the example they gave used idproxy.net.
|
||||
And since I already had a Yahoo account, I said, well, this is pretty cool.
|
||||
I'll just use that.
|
||||
Turns out it's a little more complicated than I was expecting.
|
||||
It adds an extra step and I decided, you know, I'm just not going to do that right now.
|
||||
So what I'm going to do is I'm going to get myself a new OpenID.
|
||||
And this time I'm going to use my id.net.
|
||||
That's nyid.net.
|
||||
And Harlem, you got yourself an OpenID.
|
||||
Where did you get yours?
|
||||
So, well, I got mine at Vox and there are several reasons why I have that one.
|
||||
And we do this later on with Twitter feed.
|
||||
It allows you to work with several types of OpenID and OpenID.net will allow you to use
|
||||
your WordPress.com name or your Vox name, Technoroddy, for instance, and even AOL.
|
||||
So you may already have an OpenID, you know, considering if you're using any of these
|
||||
services already and that is AOL, live-door, live-journal, smug-mug, orange, Technoroddy,
|
||||
box, or WordPress.com.
|
||||
So check that first.
|
||||
Very good point.
|
||||
Very good point.
|
||||
I meant to cover on that.
|
||||
I'm glad you brought that up.
|
||||
Yeah, if I, for instance, I have an OpenID because I have a WordPress.com account, although
|
||||
I don't use it for anything right now.
|
||||
And I also have an AOL instant messenger account.
|
||||
So both of those can be used as OpenIDs.
|
||||
But for this purpose, I'm going to assume that you don't already have an OpenID and go
|
||||
ahead and create an account.
|
||||
But if you do have an AOL instant messenger account, then you can go ahead and use that,
|
||||
for instance, as your OpenID.
|
||||
If you want to find out how to do that, I'll put a link in the show notes to a couple
|
||||
of examples.
|
||||
But we're going to sign up and we're going to say, you know, you're starting from scratch,
|
||||
you don't have an OpenID, where do you go to get one?
|
||||
And the first place where I started was at OpenID.net and I did a little bit of reading
|
||||
and I clicked on the link of, how do I get one?
|
||||
And they listed a bunch of OpenID providers.
|
||||
And like Harlem said, AOL, Live Journal, Technoroddy, Vox, WordPress, those are all OpenID
|
||||
providers.
|
||||
But if you don't have accounts with any of those already, you can use something like
|
||||
claimid.com or MyID.net or MyOpenID.com.
|
||||
And we're going to choose MyID.net.
|
||||
Why?
|
||||
Because it has the shortest URL in the list.
|
||||
So that's why I'm choosing that.
|
||||
That's the only reason.
|
||||
Less typing.
|
||||
You know?
|
||||
Less typing.
|
||||
There you go.
|
||||
Of course, I had to mess everything up by choosing a user name of Nikolitis, which is
|
||||
like longer than MyID.net anyway.
|
||||
So I just doubled the length.
|
||||
I could have chosen something shorter.
|
||||
But anyway.
|
||||
So I went, yes, we do, we do digress often and early.
|
||||
But anyway, we're going to OpenID, sorry, MyID.net.
|
||||
And I'm going to click on the Create My ID link.
|
||||
So when I'm there, I'm prompted for a user ID, a password.
|
||||
I confirm my password and my email address.
|
||||
I punch in, fill in all those fields, agree that I have read the terms of service, which
|
||||
I strongly encourage I ruin to do, read through those terms of service before you agree
|
||||
to them, because you never really know what you're agreeing to.
|
||||
We can read it right now for you.
|
||||
We could, but that would be boring.
|
||||
That would just suck.
|
||||
That would, but anyway.
|
||||
So once you've got your OpenID, now the question is, what do you do with it?
|
||||
And we're going to use this as an example.
|
||||
What we're going to do with our OpenID, in this case, is we are going to use it to aggregate
|
||||
our social networking information.
|
||||
Harlan, give me the idea of what that means.
|
||||
Well, I believe what you're talking about is that if you belong to several social networks,
|
||||
such as Twitter or Pounds, Haiku or Jaiku, whatever they call it, even dig, you might want
|
||||
to aggregate all those things into one feed so that they show up into all your feeds.
|
||||
Is that what you're talking about?
|
||||
You read my mind.
|
||||
Wow.
|
||||
I'm good.
|
||||
Yeah.
|
||||
That or you read the email I sent you earlier.
|
||||
Yeah, that's what it was.
|
||||
It might have been.
|
||||
Good email, by the way.
|
||||
All right.
|
||||
Hey, thanks.
|
||||
All right.
|
||||
So the problem what we have is, Harlan and I, we both have accounts on Facebook, Twitter,
|
||||
Jaiku, Pounce, right?
|
||||
We've got all of these and the thing that we find every time we join a new social network
|
||||
is we've got to recreate all of our friends lists and then we've got to, you know, update
|
||||
multiple sources and it just becomes a hassle.
|
||||
Well, one way to fix that is to use the features that are provided by your social networking
|
||||
tools to keep your stuff in sync.
|
||||
Now, Twitter will publish its own, all of its information as an RSS feed and that's pretty
|
||||
handy.
|
||||
Now, out of the box, by default, Twitter does not provide a method to put stuff in to
|
||||
your Twitter account.
|
||||
But there is a third party service called Twitter feed, which will do just that.
|
||||
So one way we can take our social networking info and aggregate it all into Twitter is
|
||||
by using Twitter feed.
|
||||
Now, here's the catch.
|
||||
To get a Twitter feed account, you need to log in via an open ID.
|
||||
So that's where we're starting with the open ID.
|
||||
It's all coming together now.
|
||||
It's all comes together.
|
||||
It's like a plan and I love it when a plan comes together.
|
||||
So what we're going to do in this example is we're going to do our best to aggregate
|
||||
JICOO information, Pounce, Facebook status updates, Twitter, and what else was there?
|
||||
That'll probably be enough because we can do it with a few of these.
|
||||
You can figure out the rest and this example should get you in the right direction.
|
||||
So first starters, if we're going to use this tool, Twitter thing, you need to have
|
||||
a Twitter account, right?
|
||||
And that's really easy to get.
|
||||
If you want to have a Twitter account, just head on over to Twitter.com.
|
||||
If you don't know what Twitter is, then you've probably been living in a cave for the last
|
||||
couple of years.
|
||||
I recommend you just go to Twitter.com and check it out.
|
||||
You're probably going to have the first reaction you might have is either going to be, wow,
|
||||
that's really, really cool or why the heck would I want to be telling people like, you
|
||||
know, what I'm having for lunch or something to that effect?
|
||||
That was my first reaction, but then I switched over to the second, you know, oh, and that's
|
||||
really cool.
|
||||
Yeah.
|
||||
Yeah.
|
||||
It brings out the first grader in you.
|
||||
Exactly.
|
||||
Exactly.
|
||||
It brings out the first grader in you.
|
||||
But the thing is, if you don't feel that way, then you probably want to stop listening right
|
||||
around now, or maybe, you know, about five, ten minutes ago when we started.
|
||||
Or take your iPod and put it underneath the car and run over it several times.
|
||||
I don't know if I'd go that far, but anyway.
|
||||
So we're going to assume that you have a Twitter account and that you know what its username
|
||||
and password is.
|
||||
So then we're going to head on over to our, let's see, how about Pounce?
|
||||
I have a Pounce account, which I want to aggregate into my Twitter feed.
|
||||
And if I go to Pounce.com slash Nikolitis, in my case, slash public, at the top of that
|
||||
page, you'll see the little RSS icon.
|
||||
And it actually links to Pounce.com slash feeds slash public slash Nikolitis, or your username
|
||||
in this case.
|
||||
So if I wanted to look at Harlem's feeds, for instance, I can do that by going to Pounce.com
|
||||
slash feeds slash public slash.
|
||||
Harlem, what's your username on Pounce?
|
||||
Fresh Ubuntu.
|
||||
Fresh Ubuntu.
|
||||
All right.
|
||||
So I'm going to punch that in.
|
||||
And sure enough, I see your public notes.
|
||||
Now note that this only has your public stuff.
|
||||
So messages that you just send to your friends and things will not show up here.
|
||||
But that's the kind of stuff that you want to have if you're going to be pushing it all
|
||||
over the place.
|
||||
You don't necessarily want to have your private information going all over the place.
|
||||
So we need to know where that feed is coming from.
|
||||
So that's part one, or maybe that's part five at this point.
|
||||
I've kind of lost track.
|
||||
But the next part I know is we're going to head on over to twitterfeed.com, and we're
|
||||
going to sign up for Twitter feed account, all right.
|
||||
So when you hit twitterfeed.com, you click on the log in or register button.
|
||||
Now Harlem, do you have a Twitter feed account yet?
|
||||
I have.
|
||||
Yes, I do.
|
||||
You do.
|
||||
Oh, you beat me to it.
|
||||
I didn't think you did already.
|
||||
Well, that's okay.
|
||||
It's easy to get one if you don't.
|
||||
That's as simple as putting your open ID into the box there and pressing log in.
|
||||
You do.
|
||||
That's exactly it.
|
||||
So the log in screen, you'll notice for Twitter feed.
|
||||
The log in screen is not asking you for a username and password.
|
||||
It's asking for your open ID.
|
||||
So I'm going to use my existing open ID, which is nickelitis.idproxy.net.
|
||||
And I'm going to sign in using that.
|
||||
So here I go, I'm signing in, I punch in the address, hey, look at this.
|
||||
You're logged in, hooray, and then it redirects me back to Twitter feed.
|
||||
I get to the log in page from my open ID provider, and I punch in that log in information.
|
||||
Agree to the terms of service because I've never logged in before.
|
||||
And then once that's done, I get prompted.
|
||||
And my open ID provider said, hey, this Twitter feed thing wants to authenticate you.
|
||||
Do you want to do that?
|
||||
And I say, yes.
|
||||
I get redirected back to twitterfeed.com.
|
||||
And with this, you have logged in as nickelitis.myid.net.
|
||||
Welcome.
|
||||
Glad you could make it.
|
||||
Well, thank you, Twitter feed.
|
||||
I'm glad to be here.
|
||||
Are you following along, Harlan?
|
||||
Is this working for you too?
|
||||
I am following along.
|
||||
Yep.
|
||||
Beautiful.
|
||||
Welcome to Twitter feed.
|
||||
I'm going to click on the go to my Twitter feeds or create one link.
|
||||
Now since I've already gotten an account with these guys, I have a bunch of feeds here.
|
||||
But we're going to just add one or take one out or whatever and just fiddle around with
|
||||
this.
|
||||
And the end goal is here is we're using Twitter to basically be the catch all.
|
||||
So in my case, Twitter is going to catch all my other updates and stuff, all my other
|
||||
social networking content.
|
||||
So the first thing we need to do is we need to create a new Twitter feed.
|
||||
So if I click on the little plus sign to create a, or next to the plus sign, I click on create
|
||||
new Twitter feed, I get a new screen.
|
||||
And it tells me to enter in my Twitter name or password for authentication.
|
||||
Now this is very important.
|
||||
You have to understand that we are giving our Twitter login to this company, Twitter
|
||||
feed, which has nothing to do with Twitter.
|
||||
There's no real affiliation between these two services, okay?
|
||||
So you have to understand that by using this service, you are giving some other fairly
|
||||
close to complete stranger your Twitter login.
|
||||
So understand that.
|
||||
I've taken this calculated step.
|
||||
I understand that I'm giving somebody else my Twitter login.
|
||||
And I'm trusting that they're not going to abuse it and that they're not going to let
|
||||
my identity and my Twitter feed fall into someone else's hands.
|
||||
But that's a very important thing.
|
||||
You don't want to just, you know, willy-nilly go out giving your user names and passwords.
|
||||
But in this case, it's a requirement because Twitter doesn't have any other way to import
|
||||
RSS feeds into your Twitter feed.
|
||||
So I'm going to punch in my username, my Twitter username, and my Twitter password.
|
||||
And I'm not going to tell you what those are right now.
|
||||
The next thing I'm asked for is my RSS feed URL.
|
||||
Now remember that we were looking at Harlem's Pounce profile.
|
||||
And what I'm going to do as a test is Harlem, I'm going to take your public Pounce notes
|
||||
and I'm going to stuff them into my Twitter feed.
|
||||
So basically what I'm doing is I'm cheating.
|
||||
I am adding free content to my Twitter feeds without having to do anything.
|
||||
It's kind of like me getting credit for the work you're doing.
|
||||
What do you think of that?
|
||||
Nah, hey, no problem.
|
||||
Not a problem to me.
|
||||
Hey, it's open source, right?
|
||||
Open source, we're over source.
|
||||
Exactly.
|
||||
So the RSS feed URL is the next thing it asks for.
|
||||
So I'm going to add Harlem's feed into mine.
|
||||
And the address is http colon slash slash pounce.com slash feeds slash public slash fresh Ubuntu.
|
||||
And I'm going to click the link at the right that says test RSS feed.
|
||||
And it says feed was parsed successfully.
|
||||
That's good.
|
||||
That means that, hey, we've got it and we can read that RSS feed.
|
||||
Now, Twitter feed gives you an option how often you want to update this.
|
||||
The default is every hour.
|
||||
I usually like to crank that down a little bit every 30 minutes.
|
||||
And it will let you post one, two, three, four, or five updates at a time.
|
||||
So if Harlem goes in and just starts posting public pounce updates like crazy, I may not
|
||||
catch them all.
|
||||
I may only catch up to 10 every hour.
|
||||
But that's generally sufficient because Harlem doesn't usually post a lot.
|
||||
So to his pounce public notes, certainly not more than 10 an hour, right?
|
||||
No, no way.
|
||||
Maybe.
|
||||
Yeah, not at all.
|
||||
10 a month.
|
||||
Exactly.
|
||||
So we're good, we're good.
|
||||
So it asks you then, the next thing is, do you want to include the title and the description
|
||||
or just the title or just the description?
|
||||
Now this generally applies to blogs because if you want to include a blog post, it may
|
||||
have in the RSS fields, it may have a title and a description.
|
||||
Many times those are the same thing so you don't want to include them both.
|
||||
Now for a pounce feed, I am going to just put the description only.
|
||||
And there's also an option to prefix each tweet with a maximum of 20 characters.
|
||||
So what that is is for instance, when I subscribe to my blog, I prefix everything with the word
|
||||
blog.
|
||||
And that tells people who are looking at my Twitter feed that, hey, this is a new blog
|
||||
post from Peter.
|
||||
And that way the link that they get will, you know, it can take you right to a blog post
|
||||
and you kind of know what you're getting in advance.
|
||||
So that's why I put that there.
|
||||
There's another option, a little checkbox to include an item link.
|
||||
And what that does is basically, if you leave that out, it's not going to have a link to
|
||||
the blog.
|
||||
So what that would do in this case is I would, if I unchecked it, I would tell people,
|
||||
hey, I just posted to my blog, but I wouldn't give them a link to it, which is not very
|
||||
user friendly.
|
||||
So I'm going to leave that checked.
|
||||
But in this case, since I'm having Harlem's, you know, Pounce Updates, I'm going to prefix
|
||||
it with Harlem's Pounce.
|
||||
And that way everything that we suck in from Harlem's Pounce feed will show up as Harlem's
|
||||
Pounce.
|
||||
So people will know that, you know, maybe they'll know they'll get the idea anyway that
|
||||
Harlem's, this is Harlem's content, not mine.
|
||||
Once I'm done, I'm going to click the Create button and bam, I have a new feed in my Twitter
|
||||
feed.
|
||||
So now all I need to do is I need to have Harlem go ahead and post a public note in Pounce.
|
||||
You think you can do that for everybody?
|
||||
Okay.
|
||||
I'll go to Pounce right now, hold on one second.
|
||||
Do, do, do, do, we need some music for this section too, you know?
|
||||
That would be awesome.
|
||||
You got anything you can recommend?
|
||||
Maybe something over the Iota promo net or something?
|
||||
Oh, fine, something.
|
||||
Okay.
|
||||
Something right now, I'm going to say hello, Twitter feed.
|
||||
Now here's the thing.
|
||||
There could be some delays in this.
|
||||
Now we don't know for instance how long it takes for a Pounce feed, you know, to, or
|
||||
a Pounce post to show up in your RSS feed.
|
||||
We also don't know exactly when Twitter feed is going to be checking the post.
|
||||
And we also don't know when Twitter might just be down, you know, and not receive the
|
||||
post.
|
||||
So there's a lot of variables here.
|
||||
Obviously, you don't want to be using this for any sort of, you know, mission critical
|
||||
kind of thing, you know, it's, it's all beta in the spirit of web 2.0.
|
||||
But it's cool nonetheless.
|
||||
So now that Harlem has posted it, some time is going to elapse and that message is
|
||||
going to show up.
|
||||
Now I got the email notification that you posted, hello, Twitter feed.
|
||||
But I'm not seeing it in your public notes just yet.
|
||||
Oh, there it is.
|
||||
On Twitter.
|
||||
So I'm going to take long at all.
|
||||
Not on Twitter, but I see it in your RSS.
|
||||
Oh, sweet.
|
||||
So.
|
||||
So sometime mail apps, we don't really know how long again, it could be up to 30 minutes
|
||||
before Twitter feed checks your Twitter post or your Pounce feed and sticks it into my
|
||||
Twitter feed.
|
||||
So while we're waiting for that, let's move on.
|
||||
And when are we going to add our blogs into my Twitter feed while we're at it?
|
||||
Now I happen to know my blogs RSS feed and the way I find that is I just went to my own
|
||||
blog.
|
||||
I visited that and I just looked at the RSS links and you can do this with any RSS feed.
|
||||
Like if you see that little RSS icon, the little thing that looks like little radio waves,
|
||||
broadcasting, little orange icon, if you just mouse over that, you can see what the URL
|
||||
is.
|
||||
And if you right click on it in most platforms or control click on a Mac, you can generally
|
||||
copy that link to the clipboard and then paste it in.
|
||||
Now I know that my blogs URL is blog.nicolitis.com slash question mark feed equals RSS2.
|
||||
So I'm going to go to my blog, I right click on that and I copy it to the clipboard.
|
||||
Back at my Twitter feed, I'm going to go in and I'm going to click again to create a
|
||||
new Twitter feed and I'm going to once again enter my Twitter name and password.
|
||||
And I'm going to paste in the RSS feed URL which again was blog.nicolitis.com, etc, etc.
|
||||
I'm going to update every hour because I generally don't blog more than once an hour and
|
||||
I'm going to leave everything else pretty much the same except I'm going to prefix each
|
||||
tweet with the word blog B-L-O-G.
|
||||
And that way again, it will tell everybody that hey, I just blogged something and I'm
|
||||
going to leave the link in there so that people get the idea.
|
||||
So now I'm capturing Twitter's, sorry, Harlem's Pounces and my blogs into my Twitter feed.
|
||||
That's all well and good but you know what, I'm probably not going to leave Harlem's stuff
|
||||
in there.
|
||||
I'm going to end up and put my own pound stuff.
|
||||
Now if I wanted to do the same thing with JaiKu, I can.
|
||||
So I'm going to head on over to my JaiKu account which is nicolitis.jaiKu.com.
|
||||
Punch that in and I'm just going to look around on that page for some RSS links.
|
||||
I'm looking, I'm looking and at the bottom of the page I see an RSS link.
|
||||
It says the latest from Nicolitis parentheses RSS.
|
||||
So I'm going to right click on that, I'm going to copy that link and I'm going to head
|
||||
back over to Twitter feed and I'm going to click to create a new Twitter feed.
|
||||
So I click on that and then now here's the thing, here's the problem though, I just realize
|
||||
I'm kind of going backwards because if I have my pounces going in to JaiKu and my JaiKu
|
||||
or my JaiKu is going into Twitter, that means I have to post in two locations.
|
||||
So I don't really want to do that, do I?
|
||||
Nope.
|
||||
No, no, I don't.
|
||||
Okay, take that back, I'm not going to do that, darn, I'm going to have to edit the heck
|
||||
out of this thing or not.
|
||||
Hey, you just post it, I would just post it, see what happens, right?
|
||||
So more than likely what I think I would rather do in JaiKu is since JaiKu does provide
|
||||
the ability to subscribe to something, to another feed, I'm going to do that instead.
|
||||
So if I go to my JaiKu account and I sign in, what I am doing now, a boom, and if I don't
|
||||
have a JaiKu account, it's easy, you go to JaiKu.com and just click the link to create
|
||||
yourself an account, it's just like every else, you just need to use your name, your password
|
||||
that you're going to pick and any of this.
|
||||
When I go into, I log into my JaiKu account and I click settings, there is an option there
|
||||
which says web feeds and you can click on manage your web feeds.
|
||||
Now what you can do is says add more, you can add a blog, add photos, add bookmarks, add
|
||||
another atom or RSS feed.
|
||||
The simplest thing is if you know your RSS feed, you just click on that link.
|
||||
You can add a blog, like if it knows about WordPress or blogger or something, you can use
|
||||
that link, but those all have RSS feeds anyway, so I'm just going to use that.
|
||||
So I go ahead and I click on add another RSS feeds and it's saying, you know, add your
|
||||
present stream, blah, blah, blah, basically it's adding for an RSS street.
|
||||
I'm going to go back and grab my pounce updates again, copy that URL and paste it into
|
||||
the page address and then I click find feeds, it looks at it, thanks for a bit and JaiKu
|
||||
placed a little note on the screen and says it may take a little while to find or fetch
|
||||
this feed.
|
||||
Please be patient.
|
||||
So it thinks and it thinks and it thinks some more and it says, whoa, who turned up
|
||||
the heat?
|
||||
Servers are running a bit hot right now, please try again in a couple of minutes.
|
||||
Yeah, how web 2.0 is that, huh?
|
||||
So it's not just Twitter that's having problems all the time too.
|
||||
But as the more I think about it actually, it probably makes more sense for JaiKu to
|
||||
subscribe to my Twitter, because if I'm going to be using Twitter feed to stuff everything
|
||||
into that, then I don't want to have to re-subscribe to all those things again with JaiKu
|
||||
when all I need to do is really subscribe to Twitter.
|
||||
So if you visualize this, Twitter itself via Twitter feed is like this big funnel and
|
||||
everything that I can subscribe to, I'm going to subscribe to in Twitter and then JaiKu
|
||||
is going to be underneath that funnel picking up whatever comes out of Twitter.
|
||||
Does that make sense?
|
||||
That does make sense.
|
||||
Barely.
|
||||
Just barely though.
|
||||
Barely.
|
||||
Just barely makes sense.
|
||||
So the question is, what is my RSS feed for Twitter?
|
||||
Well, that's pretty easy.
|
||||
If I log into my Twitter account, I just go there, and just like in JaiKu, it scroll down
|
||||
to the bottom of the page, and there's a link right there that says RSS, and I'm just
|
||||
going to right click on that, copy that link location, and then go back to JaiKu and paste
|
||||
in the RSS feed.
|
||||
I'm clicking on find feeds, and then I'm going to wait, and assuming that the JaiKu servers
|
||||
aren't having a meltdown right now, then you know, I'm going to get some good stuff.
|
||||
And if they are, well, so much for that idea.
|
||||
So what we've managed to do is we've created an open, an open ID.
|
||||
We took our Pounce notifications and a blog, and we were able to use Twitter feed to put
|
||||
them into our Twitter feed for lack of a better term.
|
||||
And we then in turn took our Twitter feed and stuff that into our JaiKu feeds.
|
||||
So in the end, if anybody wants to follow you, basically, regardless of whether they're
|
||||
following you on Pounce or Twitter or on JaiKu, then they're all going to get the same
|
||||
stuff.
|
||||
And we can take this one step further as Harlem, you and I, we both have Facebook accounts,
|
||||
right?
|
||||
Right.
|
||||
Although I don't use mine for much anymore.
|
||||
Me either.
|
||||
Yeah.
|
||||
I was just reading an article in the register this week, which is basically saying that people
|
||||
are getting bored with social networking.
|
||||
Yeah.
|
||||
I read that too.
|
||||
Thirty something drop in subscribership or traffic and it's happening for everybody.
|
||||
Yep.
|
||||
And it happens.
|
||||
Well, if you want to sync your Twitter stuff, then there's a good little application I've
|
||||
found on Facebook.
|
||||
It's called Twitter sync.
|
||||
If you just look for that under edit or add applications, like Twitter feed, it will ask
|
||||
for your Twitter name and password.
|
||||
And the reason, well, basically what they need that for is because they're pulling and
|
||||
pushing info into and out of your Facebook account.
|
||||
So I used a couple of other Twitter apps.
|
||||
This is the best one that I've found.
|
||||
And the reason I like this one is it goes in both directions.
|
||||
So I can either update my status in Facebook or I can make a post in Twitter and it goes
|
||||
both directions.
|
||||
So that's pretty cool.
|
||||
It synchronizes your status, basically.
|
||||
So if I do a Twitter, it shows up in Facebook and if I update my Facebook status, it shows
|
||||
up as what I'm doing in Twitter.
|
||||
Sweet.
|
||||
With that, I think we've pretty much come full circle, don't you think, Alan?
|
||||
I think so too.
|
||||
Although you're going to have to play around with this for a little bit because it's, you
|
||||
can get really caught up in the details.
|
||||
How is my height to feed, going to get my Twitter feed and what about my pounce?
|
||||
And so sit down with a pen and a piece of paper and diagram this all out so you don't
|
||||
get confused.
|
||||
Absolutely.
|
||||
And I will post a link in the show notes also.
|
||||
You can see where I entitled a blog post a while ago.
|
||||
It was titled, oh, what a tangled web we weave when first we practice social networking.
|
||||
And I actually made a little mind map which includes my Twitter feed, my blog, my Google
|
||||
Reader shared items, my Facebook status updates, my delicious bookmarks, my jikos and my
|
||||
pounces and I put all those things together.
|
||||
And you can add anything else, like if you have an RSS feed for your Flickr album when
|
||||
you post new Flickr updates, you can post that there.
|
||||
You can do all sorts of things and it's really kind of cool.
|
||||
If you choose to do so, you can experiment with a lot of other really neat RSS and Web
|
||||
2 tools out there.
|
||||
Yahoo Pipes, for instance, is a really great, easy and intuitive, powerful way to manage
|
||||
multiple RSS feeds.
|
||||
So you can use that to aggregate things and you can improve, include program logic right
|
||||
in just with a drag and drop interface.
|
||||
There's so many cool neat things out there that you can fiddle with.
|
||||
We can't even begin to cover them all.
|
||||
But at least today we've exposed you to Open ID, Twitter, Jiku, Pounce, Twitter feeds,
|
||||
RSS.
|
||||
I don't know about you, man, but I think my brain is full.
|
||||
How are you feeling?
|
||||
Oh, man.
|
||||
I, again, I have to figure this all out, but at least I got it up and running and I can
|
||||
play around with it.
|
||||
I can add stuff to my Twitter feed.
|
||||
Now this is also, I just wanted to ask you a question.
|
||||
This is only if you want to get everything on Twitter.
|
||||
Is that correct?
|
||||
This doesn't work the other way around.
|
||||
Twitter?
|
||||
Well, if you want to put like your Twitter somewhere else?
|
||||
Yeah, like if you want to Twitter into Pounce, for instance.
|
||||
No, I don't think Pounce has any way to put anything into it.
|
||||
Unless things have changed recently.
|
||||
Let me double-check here.
|
||||
Well, you probably have to hack their API for that.
|
||||
Yeah, when I did this, go ahead.
|
||||
Sorry, when I did this first, this was several months ago.
|
||||
Pounce did not have any way to import.
|
||||
It did not have a way to import RSS feeds.
|
||||
And that's why the tutorial that I originally followed started with Pounce.
|
||||
So basically, all of your Pounce's Twitters, et cetera, would originate from Pounce.
|
||||
And that was okay, but after a while, I just, I got kind of tired of the Pounce interface
|
||||
and I just found Twitters to be easier, more friendly, I don't know why, but I stuck
|
||||
with Twitter.
|
||||
Now on Pounce, you do have the option of putting your profiles on your home page on the
|
||||
right sidebar.
|
||||
And so you put your Facebook profile, your Twitter profile, even your Skype name and
|
||||
your blog on the right sidebar.
|
||||
So, you know, yeah, there's a lot, they, they, yeah, Pounce is aware of like, I don't
|
||||
know, 20 or so, maybe more different social networks, and they just have all kinds.
|
||||
But what all that does is that provides you a link.
|
||||
It doesn't actually, it doesn't, you know, add content from those websites.
|
||||
Right, exactly.
|
||||
But it does, you know, it, it takes away, it gives away for you to, you know, give
|
||||
people another way to contact you.
|
||||
So, it shows him, but it doesn't actually aggregate all the information that we did.
|
||||
So, yep, good example now.
|
||||
So with that, I think we're going to wrap this up.
|
||||
Just a reminder that every week, Harlem and I, we do the Fresh Ubuntu podcast, Ubuntu
|
||||
Linux, and Ubuntu Linux centric podcast, where we cover all things Ubuntu and anything,
|
||||
you know, that's between five or six degrees of separation away from Ubuntu or John
|
||||
O'Bacon, as the case may be.
|
||||
That's right.
|
||||
If you want to follow me on Twitter, I can be found at Twitter.com slash Nikolitis.
|
||||
And my blog is at blog.nicolitis.com.
|
||||
And if you have a hard time spelling either of those, I don't blame you for a minute.
|
||||
You can just go to pn72.com and you will find me there.
|
||||
Harlem, what about you?
|
||||
And you can find me on my Twitter account at Twitter.com slash Harlem, H-A-R-L-E-M.
|
||||
Also, I have a, again, Fresh Ubuntu.org, which is our main website for the podcast and
|
||||
feel free to listen in every now and again, if you wish.
|
||||
And if you are in Ubuntu, Efficient Auto, or whatever, you can subscribe to the podcast
|
||||
at feeds.feedburner.com slash Fresh Ubuntu, and that's it.
|
||||
Until next time, have a great day and remember to hack your world.
|
||||
That's right.
|
||||
Bye-bye.
|
||||
Thank you for listening to Hack Republic Radio.
|
||||
H-B-R is sponsored by Carol.net, so head on over to C-A-R-O dot N-E-T for all of us in need.
|
||||
Bye-bye.
|
||||
184
hpr_transcripts/hpr0026.txt
Normal file
184
hpr_transcripts/hpr0026.txt
Normal file
@@ -0,0 +1,184 @@
|
||||
Episode: 26
|
||||
Title: HPR0026: Intro to codecs
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0026/hpr0026.mp3
|
||||
Transcribed: 2025-10-07 10:26:34
|
||||
|
||||
---
|
||||
|
||||
MUSIC
|
||||
Welcome to Hacker Public Radio. My name is Klaatu. I'm here to talk about
|
||||
Codex, Video Codex, and Audio Codex alike. This is going to probably end up
|
||||
being sort of an in-depth series since this is such a huge subject. I want to
|
||||
instill a little bit of an understanding in you about how Codex work and kind
|
||||
of what they do and why they exist at all. But I also want to maybe talk
|
||||
about each or some of the major Codex out there and maybe some of some of the
|
||||
features of each and why they exist, where they come from, things like that,
|
||||
whether they're free, non-free, stuff like that. And of course the other side of
|
||||
I mean the different sides of Codex are the compression and the decompression of
|
||||
the content. So I'd like to talk a little bit about that. So initially I think
|
||||
what is a Codex? That's something that a lot of people don't quite understand.
|
||||
A lot of people know empirically that they need a Codex because when they click
|
||||
on a file or they go to a site, the video doesn't play and it tells them to
|
||||
install a Codex or a plug-in for their browser. So a lot of people realize that
|
||||
there's a need for them to install a Codex. But not many people really know
|
||||
what a Codex is. The word Codex is actually it's like modem or something like
|
||||
that. It's not really, you know, we say it as a word, it's actually two words
|
||||
put together. It's code and decode, CO for code, DEC for decode. And the idea
|
||||
behind a Codex simply is at least in its most pure form and I'll explain what
|
||||
I mean by that in a little while. In its most pure form, a Codex simply
|
||||
exists because video does not originate on your computer. Obviously what we
|
||||
see in the real world is not digital. Something needs to make them digital. And
|
||||
this is where Codex come in. So a Codex is simply a mathematical method of
|
||||
taking a signal and turning it into a digital stream of information. So Codex
|
||||
are actually at work, hard at work on your camera well before you ever get to
|
||||
your computer. I mean obviously your digital video cameras are, you know,
|
||||
obviously they have embedded computers in them. So when you're taking video,
|
||||
whether it's mini DV or HDV or AVCHD or whatever, the video is being
|
||||
processed by a codec and it's being stored in a certain format and then
|
||||
you're transferring that to your computer to either edit it or to store it or
|
||||
to convert it to DVD or whatever you're going to do without video. So obviously
|
||||
Codex have to exist. If we want to have video on our computers, the question
|
||||
is do they have to exist in the way that they exist? And the answer to that is
|
||||
probably not. Codex are also a big business. There are companies out there that
|
||||
are in the business of having created a Codex and having come up with a
|
||||
scheme to make people come to them to be able to use that Codex. It's not always
|
||||
the end user that needs to go to that company. Sometimes we do in order to
|
||||
download the Codex especially in Linux where there are very few Codex included
|
||||
with our operating system. But even, you know, I mean if you've paid for your
|
||||
operating system, if you've paid for either Windows or Mac OS 10, someone from
|
||||
one of those two operating systems has gone to these companies, signed a license
|
||||
agreement, paid whatever amount of money needs to be paid in order to get that
|
||||
Codex to be bundled with that operating system, and of course you're paying
|
||||
that eventually when you're paying for the operating system. So there's a
|
||||
business to Codex and it's a really profitable business. And interestingly enough,
|
||||
a lot of people believe incorrectly that there are so many Codex out there
|
||||
because each Codex is designed for a certain use. You know, one Codex must
|
||||
be better than another for such and such a job, whilst another Codex must be
|
||||
better than the other one for this job. That's usually not the case. While
|
||||
certain Codex sometimes do have a kind of specialty or a, you know, maybe they've
|
||||
been created with the intent to sell it to a certain market. It really is
|
||||
just, it's usually just that. It's just someone started a company, got some
|
||||
Codex together, had them make a Codex and geared it toward a certain market
|
||||
because they see that there's a need for video delivery. So Codex can be really,
|
||||
really uncompressed. And that's simply, like I say, that's the most pure form of it.
|
||||
Uncompressed video would just be a really, really, really big file that you'd
|
||||
need a really nice computer system to be able to even play back to watch. More
|
||||
typically, what we find in video cameras, especially, for instance, something like
|
||||
mini-dv or motion JPEG, which you'll find in some of the digital still cameras
|
||||
that, you know, also have the video camera function. Not the iPhone, of course,
|
||||
because the iPhone, as advanced as it is, doesn't have that function. But other
|
||||
cameras, other phones even have little video cameras in them. Motion JPEG. So
|
||||
that's a very, very compressed picture because obviously if you're taking it on
|
||||
your phone, it's not as if though you have that much, not that much space on it
|
||||
to hold, you know, video. So it's very, very compressed. Mini-dv, which is, I guess,
|
||||
kind of right now it's the lowest consumer video format, is actually quite
|
||||
compressed as well. And you start to see that when you bring it into different
|
||||
color correction programs, starting, you know, you try to kind of isolate
|
||||
certain things. It gets kind of difficult to do that with such compression
|
||||
because you're losing a lot of color depth and things like that. And then
|
||||
there's obviously, you know, there's like HDV, which is kind of in between
|
||||
mini-dv and HD. And that's not quite as compressed, but it's compressed. So you've
|
||||
got, you know, the codec by nature is to have the video on the computer. And then
|
||||
there's different kinds of, there's different kinds of compression that those
|
||||
codecs are applying to that video. And usually that serves a very useful
|
||||
function. Like I say, if you want to take video on your camera and you don't want
|
||||
to lug around a big, you know, ridiculously large digital still camera with, you
|
||||
know, like an eight gig hard drive attached to it or something like a, you
|
||||
know, I mean, then then you're going to have to compress that video. If you've
|
||||
got a system that you want to edit video on and your system doesn't have, you
|
||||
know, 10 processors and eight gigs of RAM and a gig of video RAM, then you're
|
||||
going to need to compress that video so that your system doesn't totally choke
|
||||
on the video that you're feeding it and demanding that it plays back to you in
|
||||
real time so that you can get a feel for it so you can edit it. So the, the
|
||||
codecs that compress things force a certain amount of, it's a balancing act.
|
||||
Obviously, the artist part of the person taking the video ideally would not
|
||||
have to compress the video at all. It would be a, a pure stream of, of basically
|
||||
exactly what the camera could capture. There would be no compression. It would
|
||||
just be a perfect image, a digital translation of what we see with our own eyes
|
||||
basically. Realistically, on a technical side, that's just not going to happen
|
||||
either because the system that you're running it on isn't going to be able to
|
||||
handle it or the system that you're delivering it to isn't going to be able to
|
||||
handle it. So think about internet video delivery. There's no way that you're
|
||||
going to be able to send someone uncompressed video, you know, when they go
|
||||
and download your video netcast or your, your movie, your open source movie or
|
||||
something like that. It's just not going to be possible. You have to compress it
|
||||
so that they can download it within a reasonable amount of time. But you have to
|
||||
compress it only so much and you want to obviously leave it looking as good as
|
||||
possible. And so it gets really, really tricky and there's a certain art and
|
||||
there's a certain science to compression and it is fairly complicated to
|
||||
compression. It's something that you really kind of have to get to know, but it
|
||||
really helps to know what exactly is going on when you're doing the
|
||||
compression. And that'll help you wrap your mind around how to go about
|
||||
compressing video. So assuming we've gone out and gotten some video and we come
|
||||
back and we've edited it or whatever we're going to do with it, we now, we
|
||||
now need to compress it so that we can send it out to other people so that they
|
||||
can actually watch it. And whether you're going out to DVD or whether you're
|
||||
going to offer it as a download over the internet or you're going to compress
|
||||
it onto a video CD or you're going to put it on your own media player, your
|
||||
in 800 or something like that, you have to keep in mind your what you're
|
||||
delivering to because of course it couldn't be that simple. Every different
|
||||
device needs a different kind of compression method or could benefit from
|
||||
having its own compression method. The process of encoding video or compressing
|
||||
video is to take the video in its native codec whatever it was captured in into
|
||||
the camera and now you're taking it and you're going to transcode it into a
|
||||
format that is more ideal for whatever delivery method you've chosen. You can
|
||||
do this on Linux on the command line. I think there are some GUI tools as well.
|
||||
I usually just do it on the command line. However you do it you you really need
|
||||
to know what the different what the important variables are because honestly
|
||||
there are only a couple of a really important variables and if you understand
|
||||
what they do you'll have you'll have part of what you need to understand how
|
||||
you're going to go about compressing the video. The interesting thing about
|
||||
compression is that only half of it is understanding what needs to be done. The
|
||||
other half is actually looking at the video that you are compressing on a
|
||||
case-by-case basis and kind of analyzing it with your own eyes and and kind of
|
||||
processing in your own mind how that video is going to treat or how your
|
||||
compression method is going to treat that video. So the idea here is that if you
|
||||
have a video of people blowing up buildings and shooting lasers and
|
||||
swinging around lightsabers that's going to need a pretty that's a lot of
|
||||
information happening in that video frame and if you really start thinking about
|
||||
video frames traditionally I think we all think of it kind of as we know film
|
||||
is you know as a series of images being shown to us you know a series of
|
||||
still images being shown to us at 29 or 30 or 24 frames per second and it's
|
||||
simply the the illusion of motion that we have from seeing all these still
|
||||
images and while technically it's it's sort of the same thing in video it's
|
||||
actually a lot more helpful to think of it more like how the computer sees it.
|
||||
The computer doesn't really see it as a set of still images the computer sees
|
||||
it as a block of pixels and each of those pixels has a value each pixel has a
|
||||
Luma value and a Chroma value the Luma value is the brightness or darkness of
|
||||
that pixel and the Chroma value is the hue the color of that pixel those two
|
||||
things in each little pixel is what the computer is looking at and then
|
||||
think about how many pixels there are in even a standard definition frame
|
||||
typically it's 720 pixels by 480 which is basically more math than I can do in
|
||||
my head right now but that's a lot of pixels you know it's a lot of pixels for
|
||||
the computer to think about and that is 720 by 480 approximately 30 times a
|
||||
second so now you've got even more for the computer to consider so if you think
|
||||
about your frames of video as just a box of pixels of ever changing pixels you
|
||||
kind of just analyze the picture on that basis so if you've got people swinging
|
||||
your own lightsabers you've got pixels that are changing value both Luma and
|
||||
Chroma value just a lot in one second you know that lightsaber is gonna go
|
||||
from one end of the string to the next that's a streak of light that that
|
||||
goes across the frame but then the pixels that it has passed through are going to
|
||||
go back to their old value after it passes through that area you know so and
|
||||
then you've got people around in that frame and you've got sparks flying around
|
||||
and you've got all that kind of stuff going on that's a lot of information and
|
||||
that that kind of compression you're not going to be able to compress it that
|
||||
much and be able to retain clarity and you know the high quality of image on the
|
||||
other hand if you if I was filming myself right now or video taking myself
|
||||
right now all we would have in the frame was me talking into a microphone and
|
||||
really nothing else you know there wouldn't be a whole lot of movement I'm
|
||||
not I'm not really moving around it's just my lips removing and if I even could
|
||||
seal my lips behind the microphone the video camera wouldn't even see
|
||||
that much and so it would it would practically be like a still image and so
|
||||
that's that's a lot of that's a lot of pixels that basically aren't changing
|
||||
value and that kind of stuff is very easy for the computer to compress and it's
|
||||
very easy to have a you know to give that kind of frame a very small amount of
|
||||
what's called bitrate so I've probably given you enough to think about for this
|
||||
episode I'm going to wrap it up now and I'm gonna do a second episode in which we
|
||||
will go through what exactly is happening during during compression and what
|
||||
those important variables to think about are so that you can kind of get a
|
||||
sense of what you should be thinking about when you set about compressing
|
||||
video and then probably in the third and probably final episode I will tackle a
|
||||
couple of different codecs and talk about what they all are and why they
|
||||
exist and who owns them and what we should do to deal with them
|
||||
thank you for listening to H.P.R.R. sponsored by caro.net so head on over to
|
||||
H.P.R.O.N.C. all of us in here
|
||||
54
hpr_transcripts/hpr0027.txt
Normal file
54
hpr_transcripts/hpr0027.txt
Normal file
@@ -0,0 +1,54 @@
|
||||
Episode: 27
|
||||
Title: HPR0027: How to Record a HPR episode
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0027/hpr0027.mp3
|
||||
Transcribed: 2025-10-07 10:26:50
|
||||
|
||||
---
|
||||
|
||||
music
|
||||
Welcome to another episode of Hacker Public Radio.
|
||||
I'm your host Enigma and I will be talking today about basically how to record an episode
|
||||
of Hacker Public Radio.
|
||||
Yes, yes, I know this has been done before on pretty much every podcast known to man,
|
||||
however, I'm going to go over it just because Hacker Public Radio is a little bit different
|
||||
than any other podcast.
|
||||
As everyone knows, we have a list of hosts, we produce a show every day, however everybody
|
||||
does it a little bit differently how they record.
|
||||
I'm going to tell you how I record, not to say this is the correct way, this is just
|
||||
how I do it to make life easy.
|
||||
I use a free software called Audacity and basically I have it on both my Windows boxes
|
||||
and my Linux box.
|
||||
It can run on Linux Windows and Mac OS X and I use it because it's fairly intuitive and
|
||||
it's free.
|
||||
I know other hosts use various software packages but Audacity is easy for me so that's
|
||||
what I'm going to explain.
|
||||
When you get into Audacity, I just use everything all the defaults for my shows.
|
||||
I use Mono 44,100 Hertz as my default bitrate.
|
||||
I know Stank uses a lower bitrate because it's better quality, however, I just use all
|
||||
the defaults and my shows come out fairly well.
|
||||
I can't hear much of a difference but I'm no audio guy so don't take my word for it.
|
||||
Once I get done recording a show, there are an intro and outro that I'll have in the
|
||||
show notes that you can download and tag on to your Audacity file by basically going
|
||||
into my version of Audacity.
|
||||
I go to Project and then Import Audio.
|
||||
The newer versions of Audacity have it under the file layout.
|
||||
I know my new Ubuntu distribution has the newest version of Audacity that they've changed
|
||||
a few things so I'm going to talk about the older version of Audacity and I'm sure you
|
||||
can figure it out.
|
||||
After you import both the outro and the intro, I just basically move my show in between
|
||||
the two and then basically just go to File and then Export as MP3 and I'm pretty much
|
||||
done.
|
||||
The only caveat with Audacity is you have to download the lame library and there's
|
||||
different, it's different for each distribution.
|
||||
I just on my Ubuntu box, just go AppGet install lib lame.dev and lib lame I believe.
|
||||
I have to install those two packages on the OS X and Windows versions.
|
||||
You can go right to the Audacity page and download the links from there and that's pretty
|
||||
much it.
|
||||
Also, you have to add your ID3 tags and the format we use for HackerPublicRadio is we
|
||||
do HPR and then the number in the title and then dash whatever the show name is and then
|
||||
artist would obviously be your name and then the album is HPR Season 1.
|
||||
And then once we go a year we'll Season 2 and so on and so forth.
|
||||
But other than that, that's pretty much it.
|
||||
Have a good day and we will see you tomorrow on another episode of HackerPublicRadio.
|
||||
Thank you for listening to HackerPublicRadio.
|
||||
HPR is sponsored by Carol.net so head on over to C-A-R-O dot E-T for all of us in the
|
||||
96
hpr_transcripts/hpr0028.txt
Normal file
96
hpr_transcripts/hpr0028.txt
Normal file
@@ -0,0 +1,96 @@
|
||||
Episode: 28
|
||||
Title: HPR0028: Project Chanology
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0028/hpr0028.mp3
|
||||
Transcribed: 2025-10-07 10:27:09
|
||||
|
||||
---
|
||||
|
||||
Hello, this is Luke Zero, your host for today, 2008, February 7th, and today we will be
|
||||
discussing Project Chanology.
|
||||
By now you've most likely heard of Project Chanology, which is also referred to as Anonymous
|
||||
Versus Scientology in a DDoS War.
|
||||
Now I'll be trying to fill you in on many of the points to the story that are left out
|
||||
in most reports of the situation.
|
||||
So far it's been reported mostly that this crazy hacker group is DDoSing the Scientology,
|
||||
which is a religion or cult depending on which country you live in.
|
||||
I'm going to explain a little more about each group, because it's not explained well
|
||||
in many of the news reports I've read, and unless you're looking into this yourself,
|
||||
you're pretty much unaware.
|
||||
Now Anonymous, while this group, which is actually more of a collective, is commonly
|
||||
regarded as an unknown organization of super hacker internet bullies, there's more
|
||||
to it, actually that statement is quite inaccurate really.
|
||||
Each Anonymous acts on his or her own and is not responding to anything other than perhaps
|
||||
a mere suggestion.
|
||||
On initial form thread postings, there were many Anonymous that deemed the suggestion
|
||||
of the DDoS pretty stupid, and even those with sympathy towards Scientology.
|
||||
The idea behind Anonymous grew out of a popular image board, and multiple image boards
|
||||
at this point on the net, where users are encouraged to post anonymously, when you post
|
||||
it would pop up as Anonymous, and the only way that you could specify a certain person
|
||||
is regarding the post number.
|
||||
Now this caused many to post without care, making it appear as a group of the most politically
|
||||
incorrect assholes, so to speak.
|
||||
Of course to some it becomes easy to fall into the bullshit, this goes for any kind of
|
||||
social clicks, however, if in one of these clicks everyone looks, talks, and appears to
|
||||
act the same, the opinion of one may easily seem to be the opinion of all.
|
||||
Now if all of this is added up, it's easy to understand why so many regard Anonymous
|
||||
as an evil hacker organization, even though what it is is really just a bunch of people
|
||||
doing their own thing.
|
||||
Information on Anonymous is scattered.
|
||||
There should be a few good links if you Google Project Genology, and maybe add stuff like,
|
||||
I don't know, Epic Win, or I heard you like Mudkips spell like wrong in that part, maybe.
|
||||
Now Scientology started in the 1950s, Scientology is based on the teachings of the book Dianetics
|
||||
written by Eloran Hubbard.
|
||||
Though being heavily biased against psychiatric drugs, psychiatrists, and even medications
|
||||
altogether, Dianetics contains helpful advice for life in general and can easily be used
|
||||
as therapy to many.
|
||||
The church offers communication courses as well as many other classes in order to allow
|
||||
one to increase their level towards the bridge to total freedom.
|
||||
It separates the mind as reactive and analytical.
|
||||
The reactive mind, said to be caused by traumatizing past experiences, is what causes one to
|
||||
do certain things without good reason.
|
||||
The analytical mind operates similar to a computer, making decisions and acting based
|
||||
off of giving information.
|
||||
Once one frees themselves of all things feeding the reactive mind, they are known as clear.
|
||||
The church has many critics, due to its unappealing history involving defraud, blackmailing,
|
||||
murder, and even bugging IRS conference rooms during meetings regarding their tax exempt
|
||||
status.
|
||||
They are also frowned upon by many for operating in a bait and switch manner, charging for
|
||||
their beliefs, and are giving a hard time for the later level beliefs.
|
||||
Look up the word Xenu for that one, Xenu.
|
||||
Now of course more information is easily available for Scientology and can be found at Scientology.org,
|
||||
as well as Xenu.net or XenuTV.com, both of which are critical of the church.
|
||||
Now the whole project technology thing began about the 16th of January, when there was a
|
||||
post online by an anonymous stating that we should really deduce the Scientologists
|
||||
right now.
|
||||
Other websites, because of course this will stop them, of course it didn't stop them.
|
||||
However, he went into a little more detail, citing Scientologists' fair game clause, which
|
||||
is pretty much we can do anything and everything to stop any suppressive person as they call
|
||||
it or SP.
|
||||
Now of course a lot of people went along with it, maybe kids, who knows who, they were
|
||||
all different people acting on their own who decided to listen to this guy and start
|
||||
dosing them at a specific time.
|
||||
So that's what happened.
|
||||
But it did gain a lot of awareness towards what Scientology is, has done, and is currently
|
||||
doing to stop people in their tracks at trying to decredit the church by any way.
|
||||
Now what they didn't expect is a bunch of members of that church, possibly, who knows
|
||||
if they were, who knows if they weren't, to deduce them right back, which started
|
||||
the whole anonymous versus Scientology War, as some like to call it.
|
||||
What's happening currently is protests are going to be held the 10th of February to bring
|
||||
awareness to what the church is doing.
|
||||
Now this is, whatever anonymous came up with this idea, is a little more level headed
|
||||
than trying to deduce a website.
|
||||
But the fact that they saw what was going on and decided to act in a way that made many
|
||||
others feel the same way, much as the original deduce attack did.
|
||||
But of course, as hackers, generally we know that it only takes one person to bring down
|
||||
something with enough resources.
|
||||
And also we generally don't do this as individual hackers because it just isn't the way to go
|
||||
about solving anything.
|
||||
For now we'll just have to wait and see what goes down on the 10th.
|
||||
Again, this is just another story about the evil hacker and how now they're attacking
|
||||
religion.
|
||||
But of course, if you look a little further into the details, that's not the case.
|
||||
Again, this has been Slick Zero for Hacker Public Radio.
|
||||
I hope you've learned at least something from my show today.
|
||||
Have a great day.
|
||||
Thank you for listening to Hacker Public Radio.
|
||||
HPR is sponsored by Carol.net, so head on over to C-A-R-O-DOT-A-C for all of her team.
|
||||
254
hpr_transcripts/hpr0029.txt
Normal file
254
hpr_transcripts/hpr0029.txt
Normal file
@@ -0,0 +1,254 @@
|
||||
Episode: 29
|
||||
Title: HPR0029: Codecs Part 2
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0029/hpr0029.mp3
|
||||
Transcribed: 2025-10-07 10:28:11
|
||||
|
||||
---
|
||||
|
||||
music
|
||||
This is Hacker Public Radio, my name is Clat 2.
|
||||
This is the second episode in an in-depth series on video codecs.
|
||||
In the last episode we spoke about why codecs exist, which is essentially to translate
|
||||
analog video or rather analog visuals into a digital stream of information.
|
||||
We also spoke about why compression exists, which is so that our computers can handle
|
||||
all of that digital information.
|
||||
And we also spoke about compression for delivery of video, meaning sending our video that
|
||||
we've taken and edited out to different devices like an Okea in 800 or a DVD or posting
|
||||
it online for download.
|
||||
And the reason that compression exists for that is so that people can actually get the
|
||||
video on a reasonable download time, or so we could fit it onto a physical DVD disc,
|
||||
or so we could fit it onto our Nokia in 800 or whatever.
|
||||
Now we're going to talk about the technique of compression.
|
||||
As I said in the last episode, in Linux, the way I compress is simply in the command line,
|
||||
but there are probably GUI tools to do the compressing.
|
||||
For instance, when you're using Thogin DVD Ripper or DVD RIP or any of those kinds of programs,
|
||||
you are compressing, well you're transcoding, so you're taking a video source that has
|
||||
actually already been compressed into, for instance, InPEG2 and you are translating
|
||||
it into another compression format with another codec.
|
||||
So if you've done that, you've already, you're doing what we're talking about right now.
|
||||
What happens during compression?
|
||||
Well, there's something called spatial compression and temporal compression.
|
||||
Spatial compression basically takes the frame that you see in front of you, for instance,
|
||||
if you're watching a video and you have it on pause, it would take that frame, the current
|
||||
frame and compress it, just as if though it was compressing it into a JPEG or a PNG,
|
||||
so it really is compressing it like a still frame.
|
||||
I know I said last time that you shouldn't look at video as a series of still images,
|
||||
but as a collection of pixels, that's still true, but it's still, it's sometimes useful
|
||||
to think of it as, in this case, when it's compressing that current frame, it takes
|
||||
that whole set of pixels and commits it into an image with some kind, with some amount
|
||||
of compression.
|
||||
So obviously the less compression, the more chroma and luma levels that it will see
|
||||
and it will recognize.
|
||||
The more compression you put onto it, the pixels are still the same, but it's kind of
|
||||
looking at kind of a group of pixels, uncompressed, it would see every pixel for pixel.
|
||||
If you compress it, it's kind of looking at big groups of pixels and kind of making a
|
||||
judgment, just sort of like, well, that group of eight pixels is predominantly this shade
|
||||
of blue, so I'm going to cut out all that variation and just make it this shade.
|
||||
And you do that across the entire frame and you get a pretty good representation of what
|
||||
you started out with, but obviously you're losing a lot of shades of color and sharpness
|
||||
and things like that.
|
||||
That's spatial compression.
|
||||
There's also temporal compression, which is a really, really fancy way of compressing
|
||||
video and it's responsible for really cutting down on file sizes.
|
||||
The way it does it is it looks really at the pixels and it sees all those pixels and
|
||||
then it looks at the next frame and it sees those pixels and it compares the two.
|
||||
And it says, well, this pixel here was blue on the current frame and it's still blue
|
||||
on the next frame.
|
||||
So I'm just going to encode that once and it looks at the next pixel.
|
||||
Well, this one really got a lot darker on the next frame.
|
||||
So I'm going to have to encode that twice and it goes through every pixel and figures
|
||||
out what it needs to do.
|
||||
The higher compressed, the lower the less amount of compression you apply, the more precise,
|
||||
the more strict it will be.
|
||||
So if there's, if it went to blue to blue, if it changed shade, it's still going to encode
|
||||
it twice.
|
||||
If you compress it more, it's going to look at blue to blue and if it's just approximately
|
||||
the same shade, more or less, it'll just encode it once.
|
||||
That's what's going on during compression in terms of the actual image that you're seeing,
|
||||
like the pixel for pixel encoding.
|
||||
There are different kinds of compression called iframes and there are also p-frames and there
|
||||
are b-frames.
|
||||
So the iframe would be what we were talking about in the spatial compression, where it
|
||||
looks at the current frame and it compresses it more or less as a JPEG or a PNG.
|
||||
And that's just one set of pixels and that's how it is.
|
||||
So it's kind of a, it's a freeze, you know, it's that image, that's the iframe, that's
|
||||
the intra frame.
|
||||
They're spatially encoded, it's the highest quality image that is going to appear in your
|
||||
compressed video.
|
||||
Now, if it's the highest quality, obviously it's also going to contain the most bits.
|
||||
If we look at it on a frame by frame basis, it would have the most bits out of any of
|
||||
the other frames.
|
||||
Now there isn't just one iframe in your compressed video, there's going to be a certain number
|
||||
of iframes every second.
|
||||
And so each of those iframes are going to be really, really high quality pictures and
|
||||
images that will kind of stimulate our eye.
|
||||
And if we get enough of those iframes, our eyes will probably fool us into thinking that
|
||||
it's a pretty sharp looking video.
|
||||
Can't have too many of these because if you have so many iframes, you're not really
|
||||
compressing it that much.
|
||||
So deciding on how many iframes you want per second is important.
|
||||
It's also something that we'll get into in a little while.
|
||||
First, there's the iframes.
|
||||
So these are called predictive frames.
|
||||
And these are not spatially compressed.
|
||||
They're not iframes.
|
||||
A p frame is basically a mathematical calculation of what that frame is going to look like using
|
||||
the current frame plus the frame immediately preceding it.
|
||||
So it's kind of like p frame equals iframe minus p frame, you know, because it's going
|
||||
to take the information from the current frame, it's going to compare it to the frame
|
||||
before it.
|
||||
And it's going to calculate what needs to happen.
|
||||
And that's where it gets involved with the temporal compression.
|
||||
So that if a if a pixel from the the preceding frame looked really blue and it's still pretty
|
||||
much blue now in the current frame, it's not going to re encode that pixel.
|
||||
It's just going to borrow that pixel from the previous frame and use it again cuts down
|
||||
on your bit rate or how many, you know, how much information you've got in your in your
|
||||
end result.
|
||||
If you've got, for instance, a black frame right now and the frame before it was black,
|
||||
you can see how really, even though I've just talked about two frames, we're really only
|
||||
talking about one because the p frame is just going to multiple, it's just going to use
|
||||
the information from the previous frame.
|
||||
So, okay, so it can cut down a lot on your, your end, your end file size.
|
||||
Okay, so the other, the last way to encode is a b frame.
|
||||
B frames are yet another mathematical calculation, but this time they use the current frame, the
|
||||
previous frame and the next frame.
|
||||
So it's looking both ways.
|
||||
B frame, I believe, stands for like bi-directional or something like that.
|
||||
It's looking both ways to calculate what the current frame is going to look like.
|
||||
B frames are really the worst quality.
|
||||
They take the least amount of bits in your overall scheme of things, but they tend to
|
||||
be used fairly often because there's just so much movement going on and the human eye
|
||||
is fairly forgiving about that, that putting in a lot of b frames, a lot of times cuts down
|
||||
so heavily on the file size that people do like to use it.
|
||||
You will see these structures mapped out when you're compressing, if you're like people
|
||||
who do this all the time, will actually map out the structure of the i and the p and
|
||||
the b frames.
|
||||
So you might have something where you want to use an i frame and then a p frame and then
|
||||
two b frames and then another p frame and then another i frame, and that'll just kind
|
||||
of loop over and over and over again and that would be your structure for the, for the
|
||||
your compression.
|
||||
All this has to do with basically key frames.
|
||||
If you hear a compressor talking about key frames or a compression program asking about
|
||||
key frames, it's not really anything more than just how many i frames do you want per
|
||||
second.
|
||||
So the lower your key frame number would mean the higher number of key frames per second
|
||||
because if you have, for instance, a key frame every 15 frames, then you're basically
|
||||
going to have an i frame every 15 frames and that will be an okay looking picture probably
|
||||
like I say it always depends because it really just depends on what you are encoding.
|
||||
If you bump that number up a key frame every 60 frames, it's going to look a lot different
|
||||
because you're not going to have any really good looking image until 60 frames, you know,
|
||||
every 60 frames which is like two seconds really.
|
||||
So that's i, p and b frames, concept of key frames, spatial compression, those are the
|
||||
good ones, temporal compression, that's the mathematical stuff.
|
||||
Another variable here is frame rate.
|
||||
This is not the frame rate at which the video is captured.
|
||||
Most cameras, consumer cameras, capture at a frame rate of 29.97 frames per second.
|
||||
Again, the weirdest thing about video is that every time anyone's talking about frames,
|
||||
there's no such thing anyway.
|
||||
It's all esoteric, it's the computer can assign any number of frames to video that it
|
||||
pleases.
|
||||
The only reason we talk about frames in video is because we were all, we all cut our teeth
|
||||
on film and so you think of it in frames per second.
|
||||
But in video, there's no, there isn't ever really a still image.
|
||||
It's bits that some kind of program is decoding so that we can see it as quote a frame.
|
||||
A frame rate in the case of compression has to do with really our perception of frames
|
||||
per second.
|
||||
And so a higher frame rate would be smoother motion to our eye, whereas cutting down the
|
||||
frame rate is going to look not quite as smooth.
|
||||
So if you see video online and it just doesn't, it looks like online video, right?
|
||||
You see it and it just looks like video that you find online.
|
||||
Hard to express what that is, but I think you probably know what I'm talking about.
|
||||
It's just kind of, it's not as smooth and nice looking as something we would see, you
|
||||
know, on if we rented a DVD or something.
|
||||
Frame rates for compression is perceptual only, a higher number is going to be smoother
|
||||
and obviously anytime it's smoother and nicer, it's going to be a bigger file size.
|
||||
Lower number, a little bit chopier, will require less, less of a bit rate in the end.
|
||||
It's going to be a smaller file size.
|
||||
It just depends on the video, of course, as usual, as to what you're going to have to
|
||||
do for your frame rate.
|
||||
Usually you can get away with 15 frames per second and be pretty happy with it.
|
||||
But if it's one of those situations where you're not that worried about your file size,
|
||||
go with the native frame rate, you know, if you captured it 2997, go with 2997, capture
|
||||
it 24, go with 24, whatever.
|
||||
Not really a need to ever go higher than what the native frame rate is.
|
||||
The last variable, really, of any importance is bit rate.
|
||||
So bit rate is a direct result of the file size.
|
||||
So if you've got a file size, I don't know, 50 megabytes and you're going to send it from
|
||||
a computer to another computer, from the internet to your computer, there's just, it's
|
||||
a simple calculation, you know, I mean, if the file is 50 megabytes and you've got a
|
||||
delivery, a bandwidth of, you know, one megabyte per second, you're not going to have
|
||||
a hard time getting all that information to the end user pretty quickly.
|
||||
And if you've got a much larger file size and you've got a smaller bandwidth size, then
|
||||
suddenly it's going to be a problem and there's going to, people are going to have to be
|
||||
waiting around for it to, to download and kind of cash into their computer.
|
||||
So bit rate is basically the, the amount of time it takes the video information to get
|
||||
from whatever source it's coming from onto whatever delivery it is going to.
|
||||
This applies not just to internet.
|
||||
You kind of think of it as an internet issue because you go to archive.org or something
|
||||
and you watch a video or YouTube, you watch a video, the bit rate determines how quickly
|
||||
it gets from the server to your computer and whether you have to sit down and wait for
|
||||
it to load first or whether you just turn press play and bang, it starts playing smoothly
|
||||
without any kind of interruption.
|
||||
This also applies from like a DVD that you pop into your DVD player and watch on your
|
||||
TV.
|
||||
The information has to get off of that disc and out to your TV.
|
||||
It has to be decoded so that it can be seen as, you know, representation of something
|
||||
visual and that takes time and the DVD player and your TV can only handle so much information
|
||||
at one time, which is why that it's actually literally possible to give something too much
|
||||
of a bit rate when you're compressing it.
|
||||
It's quite common people who don't maybe know what they're doing when they're encoding
|
||||
their video to DVD.
|
||||
They think, well, the higher the bit rate, the better, right, the better the quality.
|
||||
Put it into the DVD player and it won't even play because it's just 25 megabits per second
|
||||
when typical consumer DVD player, standard definition DVD players can handle maximum 8 megabits
|
||||
per second.
|
||||
Bit rate is important.
|
||||
You have to know your video and you have to know what you can squeeze out of your delivery
|
||||
method.
|
||||
So as long as you've been reasonable with your amount of key frames and you think you're
|
||||
going to have a nice clear image and you've been reasonable with your frame rate and you
|
||||
think you're going to have a nice smooth image, your bit rate can theoretically be really
|
||||
anything.
|
||||
You have to kind of know what it is that you're, you know, what file size are you shooting
|
||||
for, what, what delivery method are you going out to and you must also remember that audio
|
||||
and video are both being figured in here so you're going to have to, that they both contribute
|
||||
to your bit rate.
|
||||
Obviously frame rate and key frames does nothing to do with your audio.
|
||||
Your audio signals apart from that, but you're, you're in result of bit rate.
|
||||
If you've got really, really great sound, you're stealing bit rate from your video.
|
||||
If you've got really, really great video and ignoring your audio, you're stealing bit
|
||||
rate from your audio.
|
||||
Something's going to have to get compressed.
|
||||
How long is the video?
|
||||
If it's an hour going to DVD, you can really, you can give it a lot of bit rate, six, seven,
|
||||
seven point two megabits per second, three hours of home video that you're going to just
|
||||
try to get onto a DVD, you're going to be cutting it way down like to two megabits
|
||||
per second just so it fits on the physical disc.
|
||||
Knowing what you know, if you're going out to the internet, think about what you're
|
||||
banned with is what your download speeds typically are and shoot for something that you think
|
||||
is reasonable.
|
||||
There's not really a recipe or a cheat sheet, you just have to look at the video and kind
|
||||
of get a feel for what that video is going to require.
|
||||
The key to good compression is practice.
|
||||
If you look at the video and then you go and encode it and then you look at the end result
|
||||
and you've taken careful notes, you're going to see what happens with certain, under certain
|
||||
conditions to certain video.
|
||||
If your computer isn't doing anything at night while you sleep, there's really not,
|
||||
if you're trying to get into video compression, there's no reason that you shouldn't have
|
||||
that computer compressing video so that you can wake up and see what you've done.
|
||||
Anything else is essentially in traditional terms, it would be wasted CPU cycles, right?
|
||||
The computer's there, you might as well use it.
|
||||
So practicing and kind of comparing your source versus your end result, looking at the
|
||||
file size, seeing what variables did what to your video, that's the key to good compression.
|
||||
Now you know what the variables are, good luck.
|
||||
It's not as hard as you think.
|
||||
The frame rate, like I say, perceptual frame rate, what you, the smoothness or not smooth,
|
||||
key frames, clarity of image, bit rate, that's the kicker, that's the one that's tough.
|
||||
The I and the B and the P frames, I wouldn't worry so much about that.
|
||||
A lot of the codecs that you're going to be using kind of has that all preset for you anyway.
|
||||
And if nothing else, maybe they'll ask you about the key frame rate so you know right
|
||||
there that that's talking about how many I frames, how clear it's going to be.
|
||||
There you go.
|
||||
Thanks for listening.
|
||||
One more episode probably, maybe two, will delve into the specific codecs that you and
|
||||
I encounter on an everyday basis.
|
||||
128
hpr_transcripts/hpr0030.txt
Normal file
128
hpr_transcripts/hpr0030.txt
Normal file
@@ -0,0 +1,128 @@
|
||||
Episode: 30
|
||||
Title: HPR0030: Network Backups
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0030/hpr0030.mp3
|
||||
Transcribed: 2025-10-07 10:28:09
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
Hello and welcome to another edition of Hacker Public Radio.
|
||||
Today I'm your host, D.J. Dawesman, and today we're going to be talking about backups.
|
||||
I'm going to kind of dive into a couple of different types of backups.
|
||||
I'm going to cover a couple of different pieces of software for one type of backup.
|
||||
I'm going to cover and talk about the hardware setup and then kind of go over some other
|
||||
concepts and such.
|
||||
First, the backups that I used to make early on of my systems were basically you power
|
||||
the system down, you boot it off in floppy disk with Norton Ghost or Clonezilla or something,
|
||||
and then you either burn it to a local CD or DVD or you can shoot it over the network
|
||||
to your ghost cast server or whatever you're going to do with it.
|
||||
That's nice.
|
||||
That gets a full complete backup of your system.
|
||||
However, the downside to that is it's pretty manual and your system has to be down for
|
||||
this to happen.
|
||||
Because of that, I don't think a lot of people do those often enough.
|
||||
I know I don't.
|
||||
What I really like and what I've come to really appreciate about what we use at work is
|
||||
an online backup system that backs up stuff over the network and automatically tracks
|
||||
incrementals and runs while the system's up, so your production system so I have to
|
||||
be down.
|
||||
I started looking around for an open source way to do this on my own systems at home.
|
||||
What I came across were two different packages, one is called Amanda and that's been the
|
||||
good old standby for, I don't know, 15, 20 years now, and basically it's called Amanda
|
||||
for originally created by the University of Maryland, I believe, and basically it's
|
||||
a loosening collection of different scripts and programs, all packaged together with
|
||||
a server and basically it runs as a Damon and so when it runs, just every night, it
|
||||
just gains your system for files that have changed and that's your incremental backup
|
||||
because it shoots off files that have changed on each of your servers over to a central
|
||||
storage backup system.
|
||||
Of course, the server component on the backup system then saves automatically manages writing
|
||||
all the backups to tape for you, typically with a larger installation you're going to have
|
||||
a array of multiple tape drives and a tape library, a robot moving tapes in and out.
|
||||
You can also do that, they can store, I don't know if Amanda does this yet, stores to local
|
||||
storage pools on online hard drives basically, so you don't have to have the tape drives for
|
||||
the backups, but Amanda has been the standby for people doing stuff like that and it mostly
|
||||
is intended for working with Unix or Linux systems, Windows systems, I think there's kind
|
||||
of a hack way to do that using SMB shares and so on, to get backups of your Windows systems
|
||||
using Amanda, I really wanted something a little less clumsy and I finally stumbled
|
||||
across another package called Backula and their slogan is, it comes by night and sucks the
|
||||
vital essence from your computers and it's only, it came about in 2000, 2001 or so I think
|
||||
and it's, all of a sudden it has some very strong development behind it and a surpassed
|
||||
Amanda quite a bit by its features, capabilities and robustness I think, which is kind of
|
||||
unfortunate for the Amanda folks, it's a good, Amanda's a good thing, but anyway this
|
||||
is Backula product, it's basically all completely distributed so you can have like a single
|
||||
tape drive on each, you know, of several different computers and you can have those act as
|
||||
agents that receive, you know, you have a central backup server that kind of, you know,
|
||||
pulls the strings and manages all the backups to these other systems that have the storage,
|
||||
all your client systems back up to the main Backula server and you could also just have
|
||||
a standalone Backula system if you have multiple tape drives hanging off this one system
|
||||
or a tape library, so that's what it does.
|
||||
Commercial products in the same area of course if you're familiar with TSM or Legato
|
||||
network or ArcServe backup exec, these are all very, very expensive commercial products
|
||||
that basically do what I just described network backups with your systems online, so anyway
|
||||
I decided I wanted to do something like this on my own for my own systems because after
|
||||
a while you get so many different laptops, computers running and stuff, you don't keep
|
||||
good backups of them and so I also just happen to have an XABXB210 dual drive 10 cartridge
|
||||
didn't tape auto-changer that I acquired and I still got to get some tape drives to put
|
||||
into it but basically any 8 millimeter tape drive will work with this thing that will
|
||||
be compatible with the robot, the gripper, it's pretty slick, I finally, I've had it for
|
||||
a couple of years but when I decided I never actually hooked it up and actually I like
|
||||
used it and so I sat down and basically to get an auto-changer to work with Linux, there's
|
||||
a couple things you're going to have to do, obviously you've got to get your scuzzy card set up,
|
||||
I was using a future domain PCI card which worked fine under Fedora Linux, Fedora 5 and it's
|
||||
pretty old but I've got a system that I'd use that's Fedora 5 and for experimentation and stuff
|
||||
and at work fine I could control the accessor but under sent OS 5 which is basically Red Hat
|
||||
Enterprise Linux, I have not been able to get the thing to work and the driver keeps crashing
|
||||
anytime I try to use it, I don't know if it's an application problem or driver problem on
|
||||
kind of suspecting it's a driver problem at this point because sent OS didn't come with this
|
||||
driver by default whereas Fedora did, I was able to get it to compile but anyway some problems I've
|
||||
had, so basically how do you use an auto-changer with Linux? Of course you mod probe your scuzzy card,
|
||||
most tape libraries use the scuzzy generic Linux device driver set and so that rides on top of
|
||||
your above your scuzzy card stack and then also you're going to have to have a scuzzy tape or ST
|
||||
driver for your tape drive and your scuzzy changer is going to be a scuzzy idea on your scuzzy bus,
|
||||
your tape drives will be separate IDs also on the same bus so basically you can
|
||||
cat slash proc slash scuzzy slash scuzzy and if your scuzzy drivers initialize properly you'll see
|
||||
both the auto-changer and the scuzzy tape drive and from that point you're good to go to try
|
||||
with the MTX command and you can check out the man page on that for flags and how to use it
|
||||
obviously and you'll reference the scuzzy generic device. Once the SG module is initialized into
|
||||
the kernel you'll have a couple of devices out in your dev file system and usually like you'll
|
||||
have at least SG zero and SG one those will represent the auto-changer and the scuzzy tape even
|
||||
though you won't access the tape with the scuzzy generic interface to it. You'll use your regular RRMT
|
||||
or whatever little device you have that your OS provides for that. The thing about scuzzy generic
|
||||
is basically just very low level scuzzy interface so it just lets commands throw data at the scuzzy
|
||||
bus, throw commands and stuff and so that's how that's why auto-changers are typically accessed
|
||||
with the scuzzy generic. So once you get those things working then the next layer the actually user
|
||||
commands is going to be MTX and there's a couple different user space commands for accessing
|
||||
your tape-changer but MTX is pretty much the good old standby that I think everyone uses Amanda
|
||||
uses MTX in order to manipulate the auto-changer or backulate uses MTX and I think they can use some
|
||||
other utilities too but MTX that's that's the good way to go and it'll do some verification you
|
||||
can do some basic status information from your library. I've got a little script when I had it
|
||||
working under Fedora I could have it just you know run the move the robot back and forth and move
|
||||
tapes automatically just kind of an exercise so that was a lot of fun to see working. So like I
|
||||
said you were talking describe some of the applications software that writes on top of it so so
|
||||
anyway once you get these layers of things set up and you get your your applications software
|
||||
up either Amanda or backulate or possibly something else then basically you should be able to have
|
||||
nightly incremental backups of all your files. I for most part I you know I've got a lot of like
|
||||
text notes that I have personal documentation that I write for myself. I've had a growing library
|
||||
of like video and photo photos and stuff that need to be archived a little bit better than I
|
||||
currently do. So that's that's some of the things that I intend to use with it. I currently
|
||||
I'm having some problem. I haven't actually gotten backulate up and running yet but that's mostly
|
||||
because I once I I switched mid-mid process to a new system I got a dedicated piece of hardware
|
||||
just to run backulate on and unfortunately like I said I've been having some problems with sent
|
||||
who has but once I can get those issues resolved and I'll go ahead and start working again with
|
||||
backula and the thing with with Amanda and backula and the I mean these the trade-off of having
|
||||
a very convenient nice backup server is it takes quite a bit of configuration and massaging
|
||||
to get these things to work right. You've got you know exclude lists like there might be certain
|
||||
directories on your system that you don't want backed up. I don't know things like obviously
|
||||
you don't want it to mess with proc there's no reason for it to be touching anything under there
|
||||
and other other file systems and such. So it's going to take some tuning there's going to be quite
|
||||
a few concepts you're going to have to I get your your head wrapped around and backula try is
|
||||
pretty hard to explain these concepts early on to help you make the right decisions to configure
|
||||
the system what you need. Some of the Amanda documentation really seems to be kind of they're
|
||||
switching from their older style of documentation to a wiki and it seems like there's a lot of stuff
|
||||
it is just really in the middle of a transition right now. My apologies to the Amanda folks if
|
||||
they've worked out all those issues since I've looked at it but it seems like they're unfortunately
|
||||
they were kind of overtaken it seems like with the functionality and backula there but it so that's
|
||||
basically a good robust backup system how you would use it how to set it up. I'll have some
|
||||
notes on the hacker public radio for some of these different things I've talked about.
|
||||
So anyway have a good day enjoy and I'll see you later.
|
||||
Thank you for listening to hacker public radio. HPR is sponsored by caro.net so head on over to
|
||||
69
hpr_transcripts/hpr0031.txt
Normal file
69
hpr_transcripts/hpr0031.txt
Normal file
@@ -0,0 +1,69 @@
|
||||
Episode: 31
|
||||
Title: HPR0031: Intel Virtualization Technology
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0031/hpr0031.mp3
|
||||
Transcribed: 2025-10-07 10:28:27
|
||||
|
||||
---
|
||||
|
||||
Then you can go.
|
||||
Oh, Ok.
|
||||
Hello and welcome to Hacker Public Radio.
|
||||
This is the MerroVinci.
|
||||
Coming to you today to discuss a little more virtualization technologies.
|
||||
Today I'd like to look at an article, if included in the link in the show notes, called
|
||||
Intel Virtualization Technology and it has a pretty large list of authors.
|
||||
The top three are Rich, Ulig, Gil Niger, and Dion Rogers.
|
||||
There's a handful of other authors involved, but they are all members of the Intel Corporation
|
||||
design team I believe and this article was a cover feature of the March 2005 IEEE,
|
||||
or of an 2005 IEEE journal featuring the new VT technology that Intel was releasing
|
||||
within their architecture within the third two-bit and 64-bit architecture.
|
||||
Basically, in a nutshell, the VT technology allows you to take virtualization and bring
|
||||
it down to the hardware level.
|
||||
When we last talked about the main two different types of virtualization, like full virtualization
|
||||
and pair of virtualization, with this VT technology, this VT technology paired with pair
|
||||
of virtualization brings the virtualization from that software controlling the hardware
|
||||
functionality and brings it down entirely to the hardware level and allows you to provide
|
||||
our two, create CPU access or allow CPU level access to the guest operating system or
|
||||
the guest virtual machine without having to emulate this technology.
|
||||
With the VT, they originally had two forms and it was the VTX and VTI.
|
||||
The VTX technology allows for two new forms of CPU operation.
|
||||
Those are broken down into VMX, root operation and VMX non-root operation and basically a
|
||||
virtual machine runs in the VMX root operation and it runs its guests in the VMX non-root
|
||||
operation.
|
||||
Both forms of this operation supports the four privileged levels or the four CPU privilege
|
||||
rings.
|
||||
Since the VMX root and the guest run in the VMX non-root, that means the guest runs
|
||||
in a technically lower or they run in a less privileged ring but to the guest operating
|
||||
system, it has its own ring structure.
|
||||
To the guest operating system, it has access to ring zero which is the most privileged
|
||||
access when in reality it's still contained within ring three or ring four and yet doesn't
|
||||
have access to ring zero except through the virtual machine monitor, the hypervisor as
|
||||
it were.
|
||||
Now this technology is absolutely incredible because now we've taken what we needed
|
||||
to do in software and what we had to worry about code escalation or code privilege to these
|
||||
access rings, I mean now there's no emulation whatsoever in the software level, it's all
|
||||
taken care of in the hardware level.
|
||||
Now the other form of Intel's virtualization technology is the VTI architecture and basically
|
||||
this is a principal hardware extension and as a addition of a new bit in the processor
|
||||
status register, so that's the PSR, I'm not very big on CPU construction architecture
|
||||
so this article might make more sense to other people but basically what the VTI architecture
|
||||
allows is that as it runs the PSR.VM bit, it's either zero or a one, zero being, as if there
|
||||
were no VMs that it has to worry about, no virtualized guests that it has to worry about
|
||||
so basically if there was no VTI technology in the chip or if that bit is signaled as a one
|
||||
which allows, which would allow privilege instructions and some non-privileged instructions
|
||||
to cause a new virtualization fault in the processor as it's working.
|
||||
Now like I said, I'm not a processor individual so I would definitely encourage you to go
|
||||
through and read through this article to maybe find more information and hopefully some of you
|
||||
all can go through this article in full, amounts of information that I did not discuss here
|
||||
because maybe quite frankly I don't understand. I would like to also include though that this
|
||||
article focuses on Intel's VTI technology. Now that's not to say other chips at manufacturers
|
||||
have not been working on their own virtualization technology. I know that AMD has their own
|
||||
VTS technology although they have their own internal name for it which I do not remember but
|
||||
ultimately this technology has allowed for massive virtualization machines to be brought down
|
||||
to the consumer prosumer level so that you can run multiple virtual machines on your own personal
|
||||
computer and yet not be any overhead in terms of processing costs for hardware costs or software
|
||||
costs because it all occurs in hardware and basically that is closer to as if you had an individual
|
||||
machine for each virtual machine monitor. This has been the MerroVinci. If you have any questions
|
||||
feel free to email me MerroVinci at Gino.com. You can usually find me lurking in the Infanamacon
|
||||
channel on the free node IRC server but this is another episode. Thank you for listening to
|
||||
the Haftler Public Radio. HPR is sponsored by Carol.net so head on over to C-A-R-O dot N-E-T for all
|
||||
2137
hpr_transcripts/hpr0032.txt
Normal file
2137
hpr_transcripts/hpr0032.txt
Normal file
File diff suppressed because it is too large
Load Diff
111
hpr_transcripts/hpr0033.txt
Normal file
111
hpr_transcripts/hpr0033.txt
Normal file
@@ -0,0 +1,111 @@
|
||||
Episode: 33
|
||||
Title: HPR0033: Linux Boot Process Part 2a - LILO
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0033/hpr0033.mp3
|
||||
Transcribed: 2025-10-07 10:30:54
|
||||
|
||||
---
|
||||
|
||||
Good day. Welcome to Hacker Public Radio episode number 33 Valentine's Day 2008. Will you please be my Valentine? Pretty please.
|
||||
My Valentine. Anyway, just kidding. My name is Dan Washco. I am bringing you Hacker Public Radio episode 33. This is part two of the Linux startup process and I'm going to be talking about bootloader today.
|
||||
Lilo originally and you'll have to forgive me because at times I can be a procrastinator and this time prove to be true that I procrastinated a little too much and real life got in the way and while I wanted to record and set all this up this weekend I kind of ran out of time with other things going on and lo and behold here it is.
|
||||
I have a bunch of notes but for only one bootloader which is Lilo so if you will forgive me this time for not being prepared enough as much as I wanted to I'm going to split this up into two parts and I promise you before my next scheduled Hacker Public Radio episode I will submit the second part of this to fill in for somebody who may have missed or not been able to get their show out.
|
||||
And hopefully it will be put into play before my third part to the Linux boot process. So what I'm going to actually do is kind of cheat and call this part to a Lilo.
|
||||
Now last time that we spoke together I provided a overview of the Linux boot process or the startup process and discussed a bit of the differences between system 5 and BSD style systems with regards to how they are configured and the boot process and their configuration files being one of the big differences between distributions.
|
||||
The other one of course is a package manager but in a nutshell the boot process is a system goes through post post hands off to the bootloader the bootloader kicks the kernel of the image that you want to run your operating system that you want to run that recognizes all the hardware and begins the process called init which initializes the system startup services be it the BSD style or system 5.
|
||||
The process is what run level you're on starts the application that you want and then passes it off the login that's very simple by top down overview and like I said I'm not necessarily going to go in any particular order but it tickled me to talk about Linux bootloaders next particularly Lilo.
|
||||
I don't want to say I'm a big fan of Lilo other than the fact that Lilo was the distribution or the bootloader of the distribution that I first started with that bootloader being sorry the distribution that I first tried was red hat and then Susa and then of course suddenly on Slackware for a very long time.
|
||||
Lilo was the bootloader of choice on most distributions back then and has in a sense fallen out of favor for grub which stands for the grand unified bootloader GNU grub of course and so distributions I still ship with Lilo includes Slackware Arch Linux and Slackware Arch Linux I'm not sure if any other distribution ship with Lilo by default.
|
||||
Gen 2 has the option of installing Lilo but by and large the other distributions all have defaulted to grub.
|
||||
Now Lilo stands for Linux loader and it's a fairly straightforward configuration and installation of Lilo.
|
||||
Most of you will probably never mess around with Linux bootloader initialization or installation that gets taken care of during your installation of your distribution
|
||||
of choice and you will come to the end of the installation and you might see it remarked you know.
|
||||
Do you want to install a bootloader where do you want to install it and do you want to edit any images so and so add some stuff to ask you to look over the configuration and probably 95% of the time.
|
||||
If you're new to Linux you probably don't know exactly what they're talking about and the standard installation of the bootloader should work just fine.
|
||||
Typically you get asked where you want to install the bootloader it be it in the master boot record or in the root or boot partition of your distribution and by and large.
|
||||
I have pretty much stuck with installing in the master boot record.
|
||||
I have never had a problem installing my bootloader into the master boot record even though there are warnings all over the installation process of the bootloader that say
|
||||
we'll be careful installing it in the master boot record you might enable your disable your system from being able to boot properly never ever my time using Linux and lilo have I ever had any kind of problem.
|
||||
So as far as I'm concerned it's safe now of course there's probably two or three you out there that are going to hem and haul and say whoa whoa whoa whoa whoa wait a minute.
|
||||
I remember when installing a lilo into the master boot record host my system and I was I had to throw away the hard disk.
|
||||
I'd be very surprised if that happened and you know come to think about it is so easy to put a bootloader into master boot record inside or outside of your typical operating system using rescue disks or boot floppies or whatever.
|
||||
Now being able to understand how to do that will come in handy which I'll explain later if you are a person who likes to boot multiple operating systems and you decide to install the latest version of windows who says that regardless of what your settings are I'm going to overwrite your master boot record
|
||||
with my bootloader itself. Now lilo Linux loader even though it's a Linux based bootloader it has a capability of launching or booting various distributions of Linux of BSD, BOS, windows and pretty much any other operating system that you can throw on to a computer out there.
|
||||
Now primarily I'm going to be talking about XADX 6 systems running off of a hard disk or you know BID or SCSI the concepts are pretty similar to flash and CD ROM or other types of boot media or other operating architectures I'll cover those at a later date but for now we're going to basically stick with the general generic old XADX hardware and hard disks and ID and SCSI devices.
|
||||
So lilo can hold up to 16 images or could boot up to 16 images and like I said it can be placed in the master boot record or in the root partition. Now by and large if lilo is installed on your system you will be able to configure it using the Etsy lilo dot com file.
|
||||
Okay so lilo dot com file any Etsy directory again upon installation of your distribution of choice you might have the opportunity to edit or manipulate this file so far I've had pretty good success rate not having to do anything but we'll cover some of the stuff that you'll find in the lilo conf section there are two two general general sections of the lilo dot com.
|
||||
The first one is the global and the second one we'll call the image section now the global provides of course global settings that apply generally to lilo itself some of the boot information and then it passes off to the image section where you can specify your operating system variables in each individual image that you plan the boot.
|
||||
So to start off with the lilo conf one of the main things you'll find in there off the bat is a boot equals parameter now the boot equals is what specifies your boot device.
|
||||
For instance if you had a hard disk or an ID hard disk in there your boot device might be dev hard drive a or hda scusy device might be dev sda now you notice that I am not necessarily saying that it is a specific partition or anything to that matter I'm not providing any partitions I'm just talking about what the boot device is.
|
||||
So the boot device or the boot parameter points to the boot device that has the master boot record on it if you omit this it defaults to being the boot device that holds the root partition of the system that you currently booted so you're looking at something like hard drive a or scusy drive a as your boot device now you might see some other options in there of course another one that is probably key is something called delay delay.
|
||||
And it is a number in tenths of a second so for instance if it's delay equals 50 that means 50 tenths of a second or five seconds so when the boot process starts when lilo comes up it'll give you five second delay before the boots the default image that provides you the opportunity to stop the boot process choose a different image or pass parameters to the image that you want to boot.
|
||||
Another one is read only now that tells the of I low to pass on to the operating system particularly Linux in this case that to mount the Linux file systems is read only at boot time and after the initialization of the kernel and the services it remounts before logging it remounts the file systems as read write or whatever specified in the Etsy F tab configuration file.
|
||||
Another option in the lilo.conf is default equals and the default image the name of the default image which leads us right into the image section.
|
||||
Now the image section is where you would list your different operating systems that you want to boot in the style that is typically the image equals which is the location of the kernel in case of Linux or BSD.
|
||||
For example on my slackware or arch Linux systems I keep all my kernels in my slash boot directory so the image says equals slash boot slash VM li and use the VM Linus.
|
||||
Now that is a compressed image now VM Linus is actually a simlink to the kernel full kernel name which is something like arch dash kernel 26-13-24 whatever diversion of the kernel is or however I named it.
|
||||
The advantage of boot pointing it towards VM Linus and creating a simlink is if you ever update the system or update the kernel and all you have to do is just rerun lilo again not have to worry too much about editing that lilo.conf file because you've left the kernel name the same you just changed a simlink that points VM Linus that points to your kernel name.
|
||||
In addition, particularly for Linux, you're going to provide a label for that image which is label equals and the name of your image and for instance I might call mine arch Linux label equals arch Linux so when the lilo menu or options come up at the boot time I can specify the image that I want to boot the operating system that I want to boot be of label or choose it in a list, a menu list of label up there.
|
||||
So it makes it pretty simple you can name the label anything you want keep it standard numbers and character alphabetical characters no spaces in there dashes and I think underscores are permitted so you know label label is something meaningful particularly if you're booting multiple distributions and operating system something you're actually going to know what it is.
|
||||
It does not have to match the kernel name your label does not have to match the kernel name it could be called anything you want it to be.
|
||||
Now of course then the root equals is for the Linux partition or Linux operating system are going to be booting root equals and that's the path to your root partition in some cases it might be slash dv slash hda one for first partition on hard drive a or could be SDA.
|
||||
Or SDB one for the first partition on your second scuzzy device or whatever it is.
|
||||
And finally there could be an in it RD which is a path to the in it RD or in it RAM disk part to image that gets pulled in when booting the kernel recall last time that I talked a little bit about an in it RD file or image in conjunction with booting the kernel a lot of kernels these days are modular set of monolithic.
|
||||
On thus they don't have all the required device drivers or modules built into them instead they're loaded dynamically as they are needed that case when you boot the kernel a lot of kernels because our modular probably don't have the devices compiled into kernel to initialize the hardware on your system thus the need for initialization RAM disk.
|
||||
And that contains a handful of modules to cover the most basic hardware and file systems for instance ID drivers scuzzy drivers file systems like a EXT file system riser file system XFS file system so that you'll be able to recognize your mount your partition device your disk drives your disk interface your disk device.
|
||||
And then be able to read the file system that contains the root partition so that as the process continues the kernel can then mount the root file system get access to the necessary modules and then unload the initializing RAM disk and use the modules that are part of your operating system on hand.
|
||||
At a later date I'll probably talk about how to create the initializing RAM disk it's very simple and pretty handy thing to have as the opposite the other way you could do this you could for go the initializing RAM disk but in that case you either one have to have a very monolithic kernel that has everything compiled into it or two you have to compile your own kernel and knowing what hardware you have you need to make sure that you have compiled enough of the device modules into the kernel to get your system to the point.
|
||||
Where it can access the root partition and access the modules on that root partition and be able to load in the rest of the modules that it needs if you don't have a single monolithic kernel with everything compiled into it.
|
||||
So just be aware of that it's pretty easy to render a system unbutable if you compile your own kernel and don't have enough of the devices in there if you're doing a modular kernel install without an initializing RAM disk.
|
||||
Anyway that being said let's continue on. Now the image section can be used to boot other operating systems. For instance if you want to boot windows you would specify other equals and the partition that windows is installed on.
|
||||
Now of course windows wants to be installed on the first partition of the first hard drive so it'll be DEV, HDA1 if that's where it's installed and you can provide it label equals windows.
|
||||
Now for further information on other tweaks and stuff for different operating systems just go see the lilo how to or man pages discuss that in further detail.
|
||||
I'm not too concerned about booting windows because I never use it so I personally don't really care. Take that for whatever it's worth.
|
||||
Okay anyway let's take a moment here before I start discussing some other things in the lilo.conf file other options that might hold your interest and one of the limitations discuss one of limitations about lilo.
|
||||
lilo is not dynamic unlike grub which is a dynamic bootloader lilo requires that you initialize it before it can be utilized.
|
||||
Thus for people who like to compile their own kernels or if you're running a distribution like slackware or arch Linux that's require a little more hands on of the operating system that when you install a new kernel in those operating systems you need to re-initialize lilo, the bootloader lilo if that's your bootloader of choice to be able to boot that new kernel.
|
||||
Back when I first started using arch Linux one of the problems that one of the issues with arch because it's on bleeding edge there's constant updates to the kernel and a new kernel was pretty much installed every single time that I would do an update once a week maybe.
|
||||
And in conjunction with that is they were switching from the initializing ram disk to initializing to using ramFS and all sorts of different ways.
|
||||
They were changing the way devices were labeled what they were using for what was it the dev file system to debust and each time an update occurred with that you had to pay very close attention to what your how your lilo.conf file was configured to make sure that it was pointing to the right path.
|
||||
They were pointing to the right device so that when it would install properly and that the kernel name was proper and the in it our DMH was proper if it was using the in it ramFS that that was proper.
|
||||
So you had to be careful to to make those changes every time and if you didn't make those changes to lilo.conf and then run lilo you ended up with a system that would not boot because it couldn't find the old kernel that was no longer there.
|
||||
Same thing with people who like to try out compiling their own kernels you need to be very careful when you compile your own kernel that you keep a backup or you make that new kernel a test kernel and retain your original kernel to ensure that you can get back into your your distribution should that new kernel fail or you forget to run lilo on that new kernel.
|
||||
To that end make sure you keep an old kernel laying around in case something happens with a newer kernel so that you can boot into that older kernel and at least have if not a 100% fully functional system enough to get you up to repairing what may have been damaged with the new kernel.
|
||||
It's just common practice is almost like having a backup is always good to have a backup kernel and since lilo can hold up to 16 images and 17 different kernels are operating systems.
|
||||
It's really not it's a no brainer because I don't know anybody who's ever too many people who who boot 16 are more operating systems and they're kind of the exception than the case so to speak so you know make sure you retain a backup is very simple.
|
||||
That's where the default option in the lilo.conf can come in handy you can keep a pending or you can append a new kernel that you want to try to the top of your kernel list and
|
||||
relieve the default at your old kernel and if you don't do anything or if something calls your attention way and it reboots is going to default to the old kernel where you can manually choose what kernel you want during the boot process.
|
||||
If you don't specify that default option it chooses the first image so just be aware of that if you don't have a default equals and then label the default is going to choose the first image it finds so just be aware of that.
|
||||
In conjunction with that say you do screw something up you install a new kernel you don't run lilo to initialize something or something happens during the process it doesn't get run and you find yourself with an unbutable system well the beauty of linux is very very easy to fix with a system restore disk I rescue disk a live CD or whatever anything that gets you to a linux system that will boot a kernel.
|
||||
And then when you get to the point of your bootloader grub or lilo on the rescue CD or whatever you pass the parameter to it root equals and the path to your root partition be a dv slash hda123 whatever and it will boot the kernel off the rescue CD the rescue the live CD the rescue disk and it will mount your existing root partition on this the image.
|
||||
That has been rendered useless because lilo isn't working and allow you to go in and fix the problem with very easily so that you could just run lilo again and initialize it and you'll be good to go or change your lilo dot com that you didn't edit in the first place and be back to running a system that fast and that's a good tip for if you are installing multiple operating systems you reinstall windows and windows wipes out your master boot record and you have no way to boot your your linux operating systems anymore.
|
||||
Just boot with a rescue CD a live CD or a rescue disk or whatever and run that amount your root partition pass the root partition parameter through the bootloader and rerun lilo and you'll be good to go or initialize grub again and reinstall grub into the master record you'll be good to go anyway I don't want to get too much into grub because we're going to cover that in the next topic is grub is fantastic you're going to love it as much as I do.
|
||||
But anyway let's finish up with lilo some of the other stuff in the lilo dot com file that you can pass is a VGA mode and again this is primarily for linux. VGA equals and a mode now there's ask which will ask you at boot which you want to do or go to a standard mode of 640 by 480 I think it is 80 columns by 80 columns wide by 25 columns high.
|
||||
That's also considered normal and extended is 80 columns wide by 50 columns high I believe it is smaller text number is a text mode and that is provides you with a color depth and a resolution be a 640 by 480 100 by 600 1024 by 768 or 1280 by 1024.
|
||||
There's a little chart which you can go to the notes in my on my thing odds it's in a gen 2 documentation have a link to it the VGA modes it's by passing a number something like number 790 if you pass that is a color depth of 32000 or 15 bit color depth at 1024 by 768 which will give you a virtual terminal like that.
|
||||
Okay another option that you can pass is install equals and that defines the type of interface that you're going to see when lilo comes up when you after post there's a text only interface which pretty much doesn't show you anything except the prompt now if you just hit enter it's going to boot your default image if you hit tab twice or tab at the text interface it'll pop up a little list of what images are available the boot and then you can type in the image that you want.
|
||||
There's a menu interface which is a lot of distributions had defaulted to for a while when you boot it up you get this like red and whites menu type screen it looks kind of nice and at least the the images that you have on the labels of your images it has a little asterisks next to the default one and usually highlighted on the default one you can just use a mouse key not a mouse key the up and down arrows to move between with label you want to boot or it'll put your default after the time out.
|
||||
There's a BMP which uses an image I've never really used that and or you can specify a file to use for the interface by a path to the file which is what the old version of install used to equal anyway by large text and menus seem to be the easiest things to configure and that's probably all you'll ever need now on a side note there.
|
||||
You can pass a bunch of different parameters to the boot image through lilo or grub or whatever you're using at the point there when you're at the option to boot the image in any of the install types text menu or or graphical image you usually get an option before you load it to you select the image you want and then you can pass
|
||||
parameters on there like no dash ACPI or ACPI equals no different parameters that you'll pass to the kernel at boot time used to be that you would have to pass the IO and IRQ addresses to Ethernet cards or the Ethernet card module during the boot process if you had we're setting up a router and have more than one Ethernet card
|
||||
of the same type in there that's an example you can go to the linux boot prompt how to and it'll has in depth discussion of what options that you can pass to the kernel upon the boot loader boot time okay fine let's go to prompt prompt is another one if you specify prompt in there it will not auto boots unless there is a delay which a delay will will wait for a specific time out and it will kick into the
|
||||
default image but if there's no delay or no time out specified a prompt will not auto boot the kernel after a specific time or automatically auto boot the kernel it will just wait until you specify which image that you want to boot
|
||||
that pretty much covers a lot of lilo right there again I want to stress that one of the disadvantages of lilo is that it's not dynamic so if you make an update to the kernel
|
||||
and you do not run lilo you're going to end up with an unbeatable system if you've wiped out the old kernel may changes that way given that there's not much else to say there are different boot parameters or initialization parameters that you can pass the lilo when you run it lilo is going to be found in the S-bin directory so S-bin lilo so it's to initialize lilo it's just as simple as typing lilo is root you can pass the option to switch dash B
|
||||
which specifies the boot device that's handy if you are booted in from a live CD and you make some changes you can mount your devices or specify lilo.com file and specify a different device other than the one that you currently mounted as root or might be specified in your lilo.com directory
|
||||
you can specify a path to a separate lilo.com that's not in the Etsy directory with the capital dash C or dash capital C
|
||||
for more information again see the man lilo for what you can pass on the boot on the initialization line last thing I want to cover with lilo is when you are booting off a lilo
|
||||
the lilo will provide a little bit of a status as to how far it's proceeding generally it'll kick off the initialization of lilo and you'll see it say lilo on there and continue loading your kernel image.
|
||||
now should there be a problem with lilo it'll stop at whatever letter that it had a problem that which signifies a stage if you don't have any lilo letters there's no L on the page
|
||||
okay it means that it's not installed or the petition which the boot sector is located is an active or you cannot probably not devote booted from the current device or there's a faulty problem there's a problem with the device that you're booting from
|
||||
if you get an L and nothing else that means the first stage the boot loader is loaded but it can't load the second stage it might specify an error code for you
|
||||
this usually indicates the problem with the media bad disc parameters in the bios if it does li that's the first stage was loaded second stage was able to be loaded but it failed to execute it could be bad disc parameters in the bios
|
||||
then you might have lil which is the second stage has been started but it can't load the descriptor table from the map file this is again this is caused by a media failure or bad disc parameters in the bios
|
||||
there could be an lil with a question mark which means that the second stage loader has loaded at an incorrect address which is caused typically by bad disc parameters in the bios and lil dash which is the descriptor table is corrupt again caused by bad disc parameters in the bios
|
||||
and lil you see that means everything's loaded properly so it's a handy little way to get a better idea of where things are screwed up if it doesn't able to boot your kernel
|
||||
if it can't boot the kernel it will tell you that no kernel image was found
|
||||
lilo is a handy tool to know and use but like it said it's been phased out by a lot of distributions in favor of grub which we will talk about next time
|
||||
i thank you for listening to agropublic radio please provide feedback to not just my episodes but anybody else's episode check out the website keep up the date on what's going on
|
||||
and thank you very much again for listening and have a happy valentine's day and be listening on the lookout for part to be grub coming soon to agropublic radio episode have happy
|
||||
thank you for listening to agropublic radio, hpr is sponsored by caro.net so head on over to caro.nct for all of us need
|
||||
you
|
||||
you
|
||||
187
hpr_transcripts/hpr0034.txt
Normal file
187
hpr_transcripts/hpr0034.txt
Normal file
@@ -0,0 +1,187 @@
|
||||
Episode: 34
|
||||
Title: HPR0034: Cowon D2 Review
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0034/hpr0034.mp3
|
||||
Transcribed: 2025-10-07 10:32:09
|
||||
|
||||
---
|
||||
|
||||
…
|
||||
Hello and welcome to another episode of Hacker Public Radio.
|
||||
This is Chess Griffin.
|
||||
In this episode I'm going to do a little review of the Kwan D2 portable media player.
|
||||
This is a device.
|
||||
It's been out about a year and I've actually had a couple Kwan products.
|
||||
I had an iAudio 5, which was just an audio player that also had a radio and the ability
|
||||
to record.
|
||||
But the Kwan D2 is a new player, like I said, it's been out about a year or so, but it's
|
||||
a great little device and I just wanted to take a few minutes to talk about it and just
|
||||
tell people about it.
|
||||
It's especially friendly to people who use operating systems other than Windows or OS
|
||||
10.
|
||||
The Kwan D2 is a video and audio player.
|
||||
It's a pretty small device.
|
||||
I'm looking at mine now.
|
||||
It's slightly bigger than square.
|
||||
It's rectangular, but it's maybe 3 inches by 2 inches by a half an inch, something like
|
||||
that.
|
||||
I think it weighs a little over 3 ounces.
|
||||
It's really small and it's got a nice color screen of, I think it's a 2.5 inch video
|
||||
screen display, 16 million color display.
|
||||
The resolution is 320x280 and it's a touch screen as well.
|
||||
For the audio, obviously this will play MP3s.
|
||||
It plays OGS, it plays Windows media files, it plays FLAQ, Waves and maybe one or two
|
||||
other codecs.
|
||||
I think it plays AACs as well, not the DRM version from the iTunes music store, but if you've
|
||||
got other audio files in AAC format, you know, Und DRM, I think it will play those as
|
||||
well.
|
||||
The video portion, well, the sound on the audio is great.
|
||||
I mean, it's just fantastic.
|
||||
There's a couple of good reviews of the Kwan out there and I'm not much of an audio file,
|
||||
but I mean, it sounds really good to me and I've had one iPod a long time ago, many years
|
||||
ago, that has since died and I think this audio quality of the Kwan's is at least equal
|
||||
to the iPods if not better.
|
||||
But the real cool thing about this device is the fact that it can play videos, I think.
|
||||
There's a lot of video players out there, but the size of this device and some of the
|
||||
features really make it stand out.
|
||||
For the movies, it'll play in AVI format and I think Windows media video format as well
|
||||
as far as the containers go.
|
||||
For the codecs, I think it will play MPG4, again, Windows media and I believe it plays X
|
||||
Vid and Divix, although I haven't tried those yet, but I'm pretty sure it does.
|
||||
I have played MPG4 files in the AVI container and it plays really well.
|
||||
Again, the resolution is 320 by 240, 30 frames a second.
|
||||
If you encode those files with MP3 audio, then of course the audio portion will play
|
||||
just fine.
|
||||
I'll come back to the video stuff in a few minutes about encoding.
|
||||
It'll also record, line in recording, external mic support, voice recording, it's got a built-in
|
||||
little teeny tiny microphone.
|
||||
I've tested the built-in microphone and it sounds okay, nothing really great, but I think
|
||||
the line in recording and the external mic support is supposed to be very good.
|
||||
The only downside to the audio recording is that it records in Windows media format.
|
||||
My old iAudio 5, I'm pretty sure, would record in MP3 format.
|
||||
I also have an iRiver 790 that records an MP3 format.
|
||||
In fact, that's what I'm recording this episode on right now, is the iRiver, but it does
|
||||
do the recording.
|
||||
And being able to record off the radio is pretty nice.
|
||||
It'll also show photos, as you would imagine, being a video player, so you can drop some
|
||||
photos, JPEGs, I think, and I don't think there's any limitation on the size or the quality
|
||||
or anything.
|
||||
It also has a pretty basic text viewer, and I think it supports up to text files up to
|
||||
two megs, and it works okay, you can read the text, although it's obviously pretty small.
|
||||
As I said, it does have a built-in FM radio, as well, which is pretty nice.
|
||||
As far as the built-in memory, this comes in in three different sizes currently, in terms
|
||||
of the internal built-in memory, two gigs, four gigs, and eight gigs, obviously flash
|
||||
bass.
|
||||
It's not a hard drive bass player.
|
||||
It also has what's great as an SD card slot, and I think it will also take MMC cards.
|
||||
I don't have any of those, but I do have a four gig SD card.
|
||||
And with a firmware upgrade, it'll take SD HC cards as well, so you can conceivably
|
||||
get this thing up pretty big with a lot of extra space.
|
||||
It is USB 2.0, high speed, in terms of connection, so that works pretty well.
|
||||
File transfer speed is like 35, 40, something like that, so it's not super fast, but it
|
||||
works.
|
||||
The battery life is pretty good.
|
||||
They rated it 52 hours charge.
|
||||
It's got a built-in rechargeable battery, so it doesn't take AA or AAA or anything.
|
||||
It's a rechargeable battery.
|
||||
They say 52 hours, I've probably gotten at least 40 hours, and I've probably gotten pretty
|
||||
close to 50.
|
||||
That's for audio playback.
|
||||
If you watch the videos, obviously the battery life will go down.
|
||||
I think they rated it 10 hours for video.
|
||||
The package, when you buy it, it includes an AC adapter.
|
||||
There's a little teeny-tunny plug on the side that you can use, and you can plug it in
|
||||
with charge using the AC, just wall outlet.
|
||||
You can also charge over USB.
|
||||
It charges much faster with the adapter than USB.
|
||||
I think a full charge on the adapter only takes like three hours, and with USB it might
|
||||
take seven to ten hours, something like that.
|
||||
But it works fine.
|
||||
As I said, it does include the AC adapter, USB cable.
|
||||
It also has TV out, which is kind of cool.
|
||||
I haven't tried that yet.
|
||||
It doesn't come with a TV out cable, though, but you can buy that.
|
||||
It will play, and some of the stuff I've read is that it plays pretty well if you attach
|
||||
it to a TV or something.
|
||||
That works really well.
|
||||
As far as encoding videos, as I said, the resolution is 320x240, and you've got to get it
|
||||
in an AVI container, MPEG4.
|
||||
What I've done with pre-existing video that I've had, a couple of different ways you can
|
||||
do it, you can obviously just manually use any kind of tool, you know, transcode or something
|
||||
like that to encode.
|
||||
There's also a little script out there, and I don't have a link for it, but I'll try to
|
||||
dig one out for the show notes.
|
||||
But if you just Google around for Kuan D2 video encoding script or something like that,
|
||||
you should come up with it.
|
||||
I actually found it linked to in the Ubuntu forms, and there's even a way you can make
|
||||
it a Nautilus script, so if you use Ubuntu and you use the Nautilus file manager, Nautilus
|
||||
has the ability to have sort of drop-in scripts that appear in the right-click context menu.
|
||||
So when I did that, I would right-click on a video, and it would say encode to Kuan D2
|
||||
or something like that, and it just worked great.
|
||||
I've got several videos on my SD card, and they play really, really well.
|
||||
No pixelation, it looks really nice, and it plays very smoothly, no chopping this or
|
||||
anything like that in the playback.
|
||||
You know, a couple other points, one nice thing about it is that obviously it just
|
||||
mounts as a USB-mash storage device, so that's great if you use Linux or BSD or something.
|
||||
It does come with some software, sort of their Kuan's version of an iTunes type of music
|
||||
jukebox software, but I've never used it, so you certainly don't need to use it, and
|
||||
it won't run on Linux, it's just I think it's Windows and Mac software.
|
||||
But since it's just USB-mash storage, it's very easy to drag and drop files, create
|
||||
folders, create a folder structure however you want.
|
||||
Within the UI, you can create playlists and all of that, I tend to just navigate through
|
||||
the folders, and that plays just fine.
|
||||
Speaking of the UI and the touch screen, the UI in all the Kuan products I've found to
|
||||
be, not as easy to use as maybe the iPod, you know, you have to press a lot of buttons
|
||||
to get to the song you want to play or something, but once you get used to it, I mean it works
|
||||
pretty well, you know, it just just takes getting used to, I guess.
|
||||
It does have the ability to resume where you left off, that's a setting I noticed was
|
||||
not enabled by default, so by default it'll not save your place, but you can do that.
|
||||
You can also save bookmarks, and you can have multiple bookmarks in video or audio files
|
||||
that you can come back to later.
|
||||
The other nice thing as far as users of Linux and BSD and stuff like that is, and I think
|
||||
this is awesome, I wish all players did this, but firmware updates are simply drag and
|
||||
drop, it's great, it works really well, basically what you do is you download a zip file with
|
||||
the firmware from the Kuan website, you know, unzip it, and it will may have, you know,
|
||||
a few different bin files for the firmware, and there's easy instructions, you basically
|
||||
just, you have to do it a few steps, so basically you would drag the first bin firmware into
|
||||
the root folder on the Kuan, and I think you then disconnect it and reboot it, and then
|
||||
you do it with the second bin file, so there might be three or four bin files in any one
|
||||
firmware upgrade, so you've got a drag and drop and reboot three or four times, but it's
|
||||
really painless, and it works perfectly from Linux, that's what I love about that, rather
|
||||
than having to, I think for my old Kuan, the I audio 5, I think I had to do the firmware
|
||||
flashes through Windows, so that was a real pain, but this doesn't require that, so it
|
||||
works great, it's a great little device as far as cost, like I said, I got the 4-meg
|
||||
version, and I think it was maybe 160 or 170, something like that, it comes in, I believe
|
||||
two or three different colors, I got the black one, I think there's white and maybe silver,
|
||||
I'm not positive with that, the screen is, like I said, it's a great screen, very, you
|
||||
know, it's a great resolution, it looks really good, it's obviously very susceptible to
|
||||
fingerprints, it came with a screen protector, it's not even really a screen protector, it's
|
||||
like, you know, when you buy stuff, it comes with a little sticky thing that it's got a
|
||||
little tab that you can peel it off, the first time you use it, I've actually left that
|
||||
on until I have time to actually buy an actual screen protector, just to kind of protect
|
||||
it, I also bought like a little rubber kind of, you know, skin for it, you know, to protect
|
||||
it a little bit, I've dropped it a couple of times, and the skin has protected it just
|
||||
fine, so that hasn't been a problem, I think it comes with a carry strap and the, you
|
||||
know, stuff like that, but I mean, that's, I don't ever use that kind of stuff.
|
||||
The other thing I'll mention is the little cover that covers up the USB port and the VGA,
|
||||
the TV out and the AC adapter plug, the whole, you know, you plug the AC adapter in, it's
|
||||
got a little plastic cover, and you got to kind of pick it off with your fingernails,
|
||||
and then it kind of extends out on a very thin little plastic, you know, string almost,
|
||||
and it's very, it's, that's the only part of this device, it seems very flimsy.
|
||||
The rest of the device seems really well constructed, and the buttons are responsive,
|
||||
and the user interface is very responsive, but overall, I mean, I think the device is
|
||||
made well, except for that little cover, but I don't ever really open it up too much
|
||||
other than to charge it, I guess, and I do all my stuff, I usually just use the SD card
|
||||
that I pop out and pop in an SD reader on my computer and just drag files onto that.
|
||||
So anyway, overall, it's a great device, I highly recommend it for the cost and for
|
||||
the features, I think you get a lot, I think I like the fact that it's very operating system
|
||||
agnostic, doesn't require any proprietary software or anything like that.
|
||||
If you listen to fair play music, which I believe is DRM music, Windows, DRM music, I don't
|
||||
know, I don't use that, but I think it will play that, so for people who do have that
|
||||
kind of stuff, it'll work, I'm pretty sure, but I don't have any DRM music to try that
|
||||
out with.
|
||||
Anyway, it's definitely a great little device, big thumbs up, check it out and play around
|
||||
with it.
|
||||
I don't think they're in any stores, I got mine on new egg, but there may be a few stores
|
||||
where you can find it, but a very cool little device, and if you get it, I hope you have
|
||||
fun.
|
||||
Alright, thanks for listening.
|
||||
191
hpr_transcripts/hpr0035.txt
Normal file
191
hpr_transcripts/hpr0035.txt
Normal file
@@ -0,0 +1,191 @@
|
||||
Episode: 35
|
||||
Title: HPR0035: An interview with John Whaley
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0035/hpr0035.mp3
|
||||
Transcribed: 2025-10-07 10:33:41
|
||||
|
||||
---
|
||||
|
||||
5
|
||||
Hello everyone, this is Hacker Public Radio and today we have a special guest from Mocha
|
||||
5.
|
||||
Please introduce yourself.
|
||||
Hi, I'm John Whaley, I'm one of the founders of Mocha 5.
|
||||
And could you tell me a little bit about yourself?
|
||||
Sure, so I graduated from Stanford with my PhD in computer science and Mocha 5 was actually
|
||||
a research project at Stanford that was called the Collective.
|
||||
Before that I worked at IBM, Japan for a little while and before that I graduated from
|
||||
my undergrad at MIT.
|
||||
Pretty darn sporty.
|
||||
Let's see, what exactly is Mocha 5?
|
||||
So we'll go ahead, what we do is we have a complete desktop lifecycle management solution
|
||||
that we deliver as a managed service.
|
||||
Our technology enables IT administrators to easily manage virtual computing environments while
|
||||
at the same time giving end users the freedom to work any way and anywhere that they want
|
||||
using any operating system on ABC.
|
||||
Are you reading these questions?
|
||||
Are these answers or do you pull them out at the top of your head?
|
||||
You said it started from this paper called the Collective, could you explain that a little
|
||||
bit?
|
||||
Sure.
|
||||
I would remember that we have all ranges of technical knowledge of people that are listening
|
||||
to the show.
|
||||
Sure.
|
||||
Okay.
|
||||
So the Collective was this research project at the Stanford Computer Science Department
|
||||
and the goal of this Collective project was really to make computing a lot easier.
|
||||
We saw like a lot of people having a lot of pain, administering their machines, keeping
|
||||
them up to date, keeping them from free of spyware and malware and so there's just a lot
|
||||
of pain around system administration and keeping computers working.
|
||||
And so what we did is we kind of took a look at this problem and thought there's probably
|
||||
a better way to do this.
|
||||
And so we came up with this idea of using virtual machines to help with system administration.
|
||||
And so the idea is you run everything on top of your virtual machine and we have a special
|
||||
virtual machine format called the Live PC.
|
||||
And this Live PC has these three key features.
|
||||
First of all, it has an automatic update to the latest version so the users are always
|
||||
be running the latest version.
|
||||
The second thing is it has an intelligent streaming and caching system so that users
|
||||
can get started quickly and also work offline once they have the whole image they can disconnect
|
||||
from the network and keep working.
|
||||
And the third key feature is the smart rejuvenation.
|
||||
So every time you start up you get a fresh copy of the OS and the applications but your
|
||||
user data, which is your documents and settings, that will persist.
|
||||
And so this Live PC provides an easy way for the IP administrator to administer a large
|
||||
number of users.
|
||||
While at the same time it gives the end user the freedom to work however they want, where
|
||||
they want.
|
||||
You can run any actually fixed operating system on top and it works exactly the same.
|
||||
Okay.
|
||||
Now your client runs on Windows and it runs on a left-hand, do you have a Linux client?
|
||||
So we have a version called Bare Metal and what it is is it's a Linux client that's
|
||||
bundled with a stripped-down Linux OS and kernel and so you can install that directly
|
||||
onto the machine and it will boot up and then you'll have a list of Live PCs there and
|
||||
you can just use it to launch these Live PCs.
|
||||
And you get the Live PCs, it's all up your website and I actually installed the Bare Metal
|
||||
installer and you can browse through and look at all kinds of different stuff.
|
||||
I actually found it through HIKU which is a derivative from the BOS and it's really
|
||||
neat to be able whenever they have an update that it's automatically there and I'm running
|
||||
it and I don't have to download the ISO and run it to a CD and then run it.
|
||||
So it's really cool stuff.
|
||||
That's great.
|
||||
Yeah, we have the, so on our website we have this Live PC library and this is all like
|
||||
community contributed with these Live PCs that people have built and there's like hundreds
|
||||
of these community contributed Live PCs and it's mostly free and open-source software and
|
||||
we get a lot of people using it just to play around with different OSs and kind of just
|
||||
see what people have done and have built and it's really nice because you know, you
|
||||
know, we have people who are interested in things like Linux but they didn't really know
|
||||
how to get into it or how to try it out and so our system using the Live PC, you just
|
||||
click once, you click on the website, you can just click the download it and it'll start
|
||||
streaming that virtual machine to you and you can start it up before the entire thing
|
||||
has downloaded it and you don't have to install anything or anything like that and it all
|
||||
runs within this secure virtual environment.
|
||||
Because we have a lot of users who use it just to just to try out Linux or try out some
|
||||
other alternative OSs.
|
||||
Now, a lot of your users of Mocha 5 are just people that are just trying to play out with
|
||||
it, try out with things, play around with them and obviously you're trying to, this
|
||||
is a business you're trying to make some money and you all want to do this at a business
|
||||
to help the administrators, you know, administer things for lack of a better word.
|
||||
Do you have any clients that are actually doing that or are you still testing?
|
||||
So we're planning to launch our company and our 1.0 products in the second quarter of
|
||||
this year, so pretty soon.
|
||||
We have some companies and trials doing some pilots and things like that and so there's
|
||||
a number of interesting uses of the technology right now that people are using it for.
|
||||
The first is the disaster recovery solution where, you know, let's say you're executive
|
||||
that has a lot of caring around the laptop and something happens to that laptop.
|
||||
They can carry around a USB stick that has a Mocha 5 on it.
|
||||
They can then plug that into any PC that, you know, they go to the best buyer or whatever
|
||||
to go buy a PC, they can just plug in the USB and it has all of the secure environment including
|
||||
like the secure VPN and those kind of things so they can kind of be up and running quickly again.
|
||||
So we have a few people using it for a customer using it for disaster recovery.
|
||||
Another big one is lab management where you have a computer lab.
|
||||
You know, maybe it's a training lab.
|
||||
Maybe it's, you know, in a school, things like that where you have a number of machines
|
||||
and an administrator needs to administer those, the software on those machines.
|
||||
And so what the administrator can do now is they just maintain one image.
|
||||
They maintain the one IPC image and that's automatically distributed to all of the different machines.
|
||||
So it makes their job easier.
|
||||
I'm sorry, go ahead.
|
||||
Yeah, so the rejuvenation aspect means that, you know, so like if somebody messes up the machine somehow
|
||||
and saw software and things like that, all they have to do is reboot and then always goes back to a pristine state.
|
||||
And whenever the administrator wants to post an update, you know, there's a new hot fixes or a new versions of software
|
||||
and install new software and things like that.
|
||||
They just, on their machine, they just start the IPC.
|
||||
They install the software and test it out and make sure it works.
|
||||
And then they post it to the server.
|
||||
And then, and then all of the clients, all the subscribers of the IPC automatically get the latest version
|
||||
and start running the latest version.
|
||||
So this makes it a lot easier to administer a large number of machines and keep them up today and keep them working.
|
||||
At the university, I attended, they did this with Ghost and they'd have to go around and physically ghost all the machines
|
||||
and whenever there was an update, they had to make a new ghost image and all that mess.
|
||||
And this would really save them a lot of time, you know, a reboot a lot easier than actually sitting there.
|
||||
Yeah, so I mean, Ghost is really, is focused on the deployment aspect that you wanted to deploy some image.
|
||||
But we're really focused much more on the entire lifecycle.
|
||||
So it's like, it's not, like, beyond just deploying the image, you have to keep it up to date, keep it, you know, keep it maintained and all these things.
|
||||
So that's, we're much more focused on this, on the whole lifecycle of a desktop rather than just the initial deployments.
|
||||
So what are some of the disadvantages of this model?
|
||||
Do you know what I'm saying?
|
||||
Well, I mean, I think, I mean, this is definitely a radical, you know, a different, a radically different way of doing computing.
|
||||
You know, now you say, I'm going to run everything on top of a virtual machine and I'm going to, you know,
|
||||
and the virtual machine is automatically going to rejuvenate on every reboot and things like that.
|
||||
And so this works particularly well in the cases where you have a, you have kind of more of a controlled desktop or locked down desktop where you have people, you know, basically, you want to have a large number of computers who are kind of running pretty much the same software.
|
||||
You don't need to have a lot of customization on each, on each machine.
|
||||
In that case, you know, you really get this, you can use our system to get much better scale to, you know, scale up to more, more computers are a lot easier.
|
||||
But like, if, you know, in the case where you have, you know, like, a lot of like, if the way I think about it, this is like, this is really the computer, the type of system that works really well for people like my, my parents, or, you know, my,
|
||||
not so tech savvy friends who I always have to go and help doubts and, you know, go fix their printer because it doesn't print or go clean up their system of spyware and things like that.
|
||||
This, this system works, works really well for, for those kind of cases.
|
||||
Good deal. One of the disadvantages that I thought of, as I was reading the paper on the collective, was that, you know, I'll talk a lot about the security and how it would, you know, protect people's data, this that and the other.
|
||||
But I thought about the underlying operating system that's running the virtual machine. You have to walk around and actually physically secure all of those still on top of the image that you all are hosting on the, on the server.
|
||||
Yeah, so that's why in the bare metal case, we, we, we use this Linux kernel that we stripped out like most of the services and stripped out as much as possible just to try to make that, that lowest level, the most, the most secure possible.
|
||||
I mean, for example, if you are running the Windows clients, well, then you're still, you know, kind of subject to what the underlying Windows is to some extent, even though your, even though your live PC contains all the bits for the operating system.
|
||||
And you're actually running, you know, right, right off of those, you're still, you know, for example, could potentially be subject to key loggers or things like that on the underlying OS or exploits in the underlying OS.
|
||||
And that's why I feel like for, for high security applications, we recommend the bare metal version because that, that has, has better security because of the underlying Linux, stripped down Linux.
|
||||
Good deal. What kind of open source software does Mocha 5 use like in their office or in their product?
|
||||
So like, in our product, we make a, make use of a lot of open source libraries like, live curl or live XML and WX widgets.
|
||||
And those libraries really help us out a lot because they made it a lot easier to build reliable cross-platform software.
|
||||
And in our data data development, we use a lot of open source development tools like subversion or cruise control track, GCC, things like that.
|
||||
And this, this open source software works really well for us because first of all, it's cross-platform and we have a cross-platform client.
|
||||
And we also use a lot of open source software within live PCs.
|
||||
So if you see a lot of the, a lot of the open source software in the live PC library, you know, we use that quite a bit.
|
||||
There's some interesting, interesting software out there that we never would have, would have realized until somebody posted it in a live PC and, and let me download it, try it out and find it to be really useful.
|
||||
I was reading in the paper that you all are doing authentication over SSH and using tunnels to securely send the data from the client to the server.
|
||||
Not that was really neat.
|
||||
Yeah. So, I mean, that's, so we, the paper was published, I think, back in 2005 or we sensed, you know, that was, we sensed kind of moved beyond that and, and improved the system in various ways.
|
||||
So, that was the first information that we had done at Stanford and now we don't actually use the tunnel over SSH in most cases, just, you know, just because of things like proxies, things like that.
|
||||
So, for better compatibility, we, you know, use other techniques like HTTPS, things like that.
|
||||
Good deal. Could you all start at Mocha 5 without open source software?
|
||||
Well, we, we probably could have been able to start the company, but we wouldn't have been nearly as far along as we are today without open source software.
|
||||
It's definitely accelerated our development and made, made things like that, that community driven a live PC library possible.
|
||||
So, we, it, we have definitely benefited from, from open source software.
|
||||
Let's see, going down the list.
|
||||
Are you planning on open sourcing any of y'all software that y'all write?
|
||||
So, our current, like currently, we're really focused on watching the company and just getting one point out, out of the door.
|
||||
That being said, it's definitely not out of the question.
|
||||
I personally am a big open source proponent and I've started and contributed a number of open source projects on sourceboards and some other sites.
|
||||
And Mocha 5 itself is also a big proponent of open source, you know, with the community driven live PC library and really kind of helping to promote Linux on the desktop.
|
||||
And we get a lot of users who are interested in playing around with Linux but, you know, don't know where to start and with Mocha 5 you can play around with.
|
||||
And we make it really easy to play around the alternative operating systems in a safe way without having to, to install anything.
|
||||
So, it's definitely not out of the question and, you know, and I think that, you know, in the future that at least some parts of our software may become open source.
|
||||
Okay, y'all are currently using VMware for your virtualization.
|
||||
Are y'all planning on building your own, using, continuing to use VMware, using some open source stuff?
|
||||
So right now we, we, we partner with VMware and, and use their virtual machine monitor layer.
|
||||
And so right now we focus on VMware just because that one's really stable and has good performance and it's, it's cross platform.
|
||||
However, the technology is really independent of the VMM layer.
|
||||
We could take out VMware and plug in another virtual machine monitor with very few changes to our, to our system and to our codes.
|
||||
And we just happen to be right now just focusing on VMware just because that one is one of the better virtual machine monitors.
|
||||
But if you look at, if you look at what's happening in the virtualization space, there's definitely a lot of, a lot of new VMMs that are appearing, you know, there's, there's things like Zen, there's things like virtual box, for example, QMU even, you know, a lot of these are free and some room are open source.
|
||||
And so I think that that in the future, this virtual machine monitor layer is really going to become like commodity, like you can, you can use, there's, there'll be a lot of them available and you can use, you can use any of them.
|
||||
And we're much more focused on the kind of management of the virtual machines and keep them up to date and, and keeping them working.
|
||||
And, you know, it's kind of like, once you have all of these virtual machines, what are you, what are you going to do with them?
|
||||
And so the, we, the MoG-5 is, is really focused on that, you know, making it easy to manage virtual computing environments.
|
||||
Good deal. So what are you, we are going to take the Linux client out of the bare bones or bare metal installer and just let me download it and use it.
|
||||
Well, I mean, it just, it comes down to, you know, we, first of all, we wanted to really focus on the Windows client first because honestly that's where most of the pain is.
|
||||
And we, we do have the bare metal client, which has the Linux client bundle then with the substrate down Linux OS.
|
||||
And it's just a matter of, you know, kind of question of priority and question of resources, but we're definitely interested in, in doing that.
|
||||
And I'm sure, you know, some of your listeners, for example, would probably be able to figure out how to take the bare metal and refackage it as a standalone client because it's, it's just kind of in there and, and it's, and it's, it's going to be that difficult.
|
||||
Good deal. Good deal. Well, do you have any, any questions or anything else you want to say? I know you need to get back to work.
|
||||
Yeah. No, I think, I think that, that, that pretty much covers it. So I just want to encourage your listeners to go and check us out at local5.com. That's moka5.com.
|
||||
And we have, we have a lot of IPCs there in our IPC library. You can, you can try out and play around me and thanks a lot for taking the time and thanks a lot for your interest.
|
||||
Hey, well, thanks for being on the, uh, big radio show.
|
||||
Thank you for listening to Hack the Public Radio. HPR is sponsored by caro.net. So head on over to caro.int for all of us.
|
||||
Yeah.
|
||||
Yeah.
|
||||
372
hpr_transcripts/hpr0036.txt
Normal file
372
hpr_transcripts/hpr0036.txt
Normal file
@@ -0,0 +1,372 @@
|
||||
Episode: 36
|
||||
Title: HPR0036: LPI Certifications Part 2
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0036/hpr0036.mp3
|
||||
Transcribed: 2025-10-07 10:35:57
|
||||
|
||||
---
|
||||
|
||||
|
||||
Hello, welcome to Acupuncturistic Radio, my name is Kent Fowell, and this is the second
|
||||
business series of LPIC.
|
||||
Today we're going to be talking about IRQ, DMA, ports, and first of all, Balsist.
|
||||
Balsists are a way to connect different components to your computer.
|
||||
The advantage of a Balsist is that it makes parts more interchangeable.
|
||||
So for example, you want to replace your graphical card, you simply take it out,
|
||||
open up your computer, take out the graphics card from its slot,
|
||||
and you put it in a new one.
|
||||
Or if your computer doesn't come with a Firewire port, you might buy a PCI card,
|
||||
supporting Firewire controller, and you put it into your free PCI slot.
|
||||
Now, a typical computer has several different Balsists.
|
||||
So connected to your CPU, you have a backside Bals, and then a frontside Bals.
|
||||
A backside Balsist is connected to level 2 cache, and then that intern is connected
|
||||
to the memory controller, which is connected to the RAM.
|
||||
So when the CPU wants to talk to RAM, it will first go along the backside Bals.
|
||||
If it's in level 2 cache, it comes back very fast to the CPU.
|
||||
If it doesn't, it'll go to the memory controller, and then out to RAM,
|
||||
and come back relatively fast.
|
||||
Now, the advantage of this system is that the CPU and the backside Balsist typically run
|
||||
at the same speed, so you have very fast access times.
|
||||
And it means your memory can be very, access to your memory can be very fast.
|
||||
Now, the other Balsist that's connected to the CPU typically,
|
||||
and this typically depends on the architecture of the computer you're talking about,
|
||||
is a frontside or a system Bals.
|
||||
And that operates at a slower speed than the backside Balsist,
|
||||
but quite fast nonetheless.
|
||||
Off the frontside Balsist, it has a connection, okay, it has a connection to the CPU,
|
||||
it also has a connection to the memory controller, it also has a connection to an ADP chipset,
|
||||
and it also has a connection to what's called a Bruce Bridge,
|
||||
which I believe is the North Bridge.
|
||||
Now, this frontside Balsist will allow the very fast communication to between the CPU and the graphics card.
|
||||
It won't be as fast as going over to the level 2 cache on the backside Balsist,
|
||||
but it's still quite fast, and it'll allow fast access to the RAM.
|
||||
Now, the point of the Balsist Bridge is so that slower components Balsist can be connected to the frontside Balsist,
|
||||
and that an example of a Balsist that would be connected to the North Bridge would be the PCI Balsist,
|
||||
for instance, and here you can put in your PCI devices.
|
||||
So they then would communicate at a slower speed to the Balsist Bridge,
|
||||
which would communicate at a faster speed to the frontside system Balsist,
|
||||
which would communicate with the CPU.
|
||||
They connected on to the PCI Balsist is the South Balsist Bridge,
|
||||
which would then connect to ISA devices like hard disks and whatever, or CD-ROM devices,
|
||||
which are typically a lot slower in relative terms.
|
||||
So you want to access something from CD,
|
||||
you'll come into the ISA device in via the South Bridge,
|
||||
along the PCI Balsist and the North Bridge, into the frontside system Balsist, into the CPU,
|
||||
and then go maybe out the backside Balsist through level 2 cache,
|
||||
into the memory controller and not to run.
|
||||
It makes a lot more sense if you see it in a diagram,
|
||||
and hopefully they'll put a link to the in the show notes to this diagram,
|
||||
which I'm actually taking from.
|
||||
They're really excellent how stuff works guide on introduction
|
||||
onto how to PCI works.
|
||||
Thanks for watching.
|
||||
Thanks for watching.
|
||||
In the IBM documentation,
|
||||
they refer to the PCI Bals and the ISA Balsist, as well as AGP to a lesser extent.
|
||||
So let's have a look at comparison between the ISA Bals and PCI Balsist.
|
||||
So the ISA Balsist is 16 bits wide, operates at a speed of 8 megahertz,
|
||||
and that translates to 16 mega bits per second data transfer.
|
||||
If you think of Balsist, there were 16 bits.
|
||||
If you think of that as 16 lanes along the motorway,
|
||||
and if you think of Balsist, there's the speed limit that data can transfer down that line.
|
||||
If you compare that to that 16 bits to the PCI Bals,
|
||||
so instead of 16 lanes of traffic, we now have 32 bits,
|
||||
32 lanes of traffic going along, and the original specification
|
||||
was a Balsist speed increase in megahertz from 8 up to 33 megahertz,
|
||||
as is a grand total of, instead of 16 mega bits per second, up to 132 mega bits per second.
|
||||
Now there's since being revisions of that where it's gone from a 32-bit Balsist
|
||||
with double that up to 64 bits, and they've gone from 33 up to 133 megahertz.
|
||||
So now the PCI X standard 64 bits, 133 megahertz,
|
||||
and it provides data transfer rates of 1 gigabit per second.
|
||||
Now at the time of the ISA standard was coming out,
|
||||
and the PCI standard was out 132 mega bits per second,
|
||||
wasn't fast enough for very demanding 3D graphic work,
|
||||
like video games or commuterated design 3D rendering, and that sort of thing.
|
||||
So a separate bus was developed called ADP,
|
||||
which is acceleration graphics port, and this was developed by Intel,
|
||||
and that following on from our diary, the mirror on,
|
||||
that connected directly into the front side system bus.
|
||||
Now I don't know about harder, but I believe that the new PCI express bus
|
||||
that's coming out just fast enough, so that it'll take over from AGP.
|
||||
All these things are in a state of change, so if you just get the concept of what a bus is,
|
||||
I think you're sucking diesel.
|
||||
Now finally, Linux provides a command that will allow you to
|
||||
identify the PCI devices that are in your computer.
|
||||
That command is called LSPCI.
|
||||
You know, if you go to a console on your PC,
|
||||
you should type in following command,
|
||||
man space LSPCI.
|
||||
Now the first part of that command is man, which means,
|
||||
which is manual command, which is, give me help on this,
|
||||
or show me the manual for the following command,
|
||||
and the command itself is LSPCI.
|
||||
So when you do that, you'll get, and this is typical from a man command,
|
||||
you'll get the name section, you'll get LSPCI,
|
||||
list all PCI devices, synopsis, LSPCI options to worry about that,
|
||||
and then this is the juicy part, the description.
|
||||
LSPCI is the utility for displaying information about all PCI buses
|
||||
in the system, and all devices connected to them.
|
||||
By default, it shows a brief list of devices,
|
||||
use the options to describe blah, blah, blah, blah.
|
||||
Okay, and it describes additional options,
|
||||
but this is your first use of the man command,
|
||||
just pick out that much, and you do very well.
|
||||
To exit the man command, you typically type the Q key on your keyboard.
|
||||
Now, the next command that you're going to type at the console is LSPCI,
|
||||
and then press the enter key, and here we'll see things,
|
||||
and this is going to vary from PC to PC,
|
||||
but I see stuff like host bridge, PCI bridge, USB controller,
|
||||
ISA bridge, IDE interface, multimedia audio controller,
|
||||
modem, VGA, ethernet controller,
|
||||
that's my network card, firewire.
|
||||
Yeah, yeah, yeah.
|
||||
Typically, when you're troubleshooting a problem,
|
||||
this is a very good tool, because it says,
|
||||
okay, PC, what's connected?
|
||||
Okay, moving back to our textbook again,
|
||||
page 8, IO ports.
|
||||
When the CPU needs to communicate with peripheral device,
|
||||
it does so through an IO port, or sometimes just simply a port.
|
||||
When the CPU wants to send data or control information to the peripheral,
|
||||
it writes to a port.
|
||||
When the device has data or status ready for the CPU,
|
||||
the CPU reads the data or status from the port.
|
||||
Most devices have more than one port associated with them,
|
||||
typically a small power of two, such as 8, 16, or 32.
|
||||
Data transfer is usually done a byte or two at a time.
|
||||
Devices cannot share ports, so if you have an ISA card,
|
||||
you must ensure that each device has its own port or ports assigned.
|
||||
Originally, this was done using switches or jumpers on the card.
|
||||
Sometimes later, ISA cards use something called plug and play,
|
||||
and this is discussed in the later section.
|
||||
If you want to see what IO ports are news on our Linux system,
|
||||
we can do so by looking at the contents of a file
|
||||
in a special directory on your computer called the PROC directory.
|
||||
That's at the very root of your directory.
|
||||
You'll have slash p or oc slash.
|
||||
Now, if you do an LS,
|
||||
and first of all, we'll do a man of LS,
|
||||
and we'll see that LS lists directory contents.
|
||||
And the description is list information above files,
|
||||
which is enough to know what LS does.
|
||||
We'll quit now.
|
||||
We'll do an LS, space, forward slash p or oc, forward slash,
|
||||
and then press enter.
|
||||
And then there we see a load of numbers,
|
||||
and then we see things like CPU info, crypto, IOMM,
|
||||
interrupts, and IO ports, along with various other things.
|
||||
And the PROC system is called a pseudo.
|
||||
The PROC directory is called a pseudo file system.
|
||||
So it's not actually a file system,
|
||||
but it's just a way you get useful information from the processor.
|
||||
Unix has this philosophy that everything is a file.
|
||||
So this is a nice place to read these files.
|
||||
You will get information.
|
||||
So what we're going to do is we're going to use the cache command,
|
||||
and we'll again do the man, space, CAT.
|
||||
And we'll see the cache, kind of catenates files,
|
||||
and prints on the standard input.
|
||||
We'll press Q to get out of the man program.
|
||||
And what that means is it's just a way to display text files
|
||||
is the simplest one.
|
||||
It also does other things, which may or may not be just
|
||||
a little later on in the series.
|
||||
So we'll type CAT, space, forward slash PROC,
|
||||
forward slash IO ports, and then press Enter.
|
||||
Now a lot of stuff goes past.
|
||||
A lot of numbers, a lot of, so we have memory addresses,
|
||||
then what I call on, and then two columns, memory addresses,
|
||||
columnless column separator, and then on the right-hand side
|
||||
we have what those are.
|
||||
So for example, if we look at memory address 0060-006F
|
||||
is the keyboard, and that is actually good,
|
||||
because it's what it should be.
|
||||
So that's where you get information about the IO ports and use.
|
||||
So another thing we're going to need to know about is interrupts,
|
||||
and we're going to page 10 of from our textbook interrupts.
|
||||
So how does a CPU know when the last output has finished
|
||||
or when data is waiting to be read?
|
||||
Usually this information is available as a status register,
|
||||
which may be accessible by reading one or more of the IO ports
|
||||
associated with the devices.
|
||||
Two obvious problems arise with this scenario.
|
||||
Firstly, the CPU has to spend time checking the status,
|
||||
and secondly, if the device has data coming from somewhere
|
||||
such as an attached modem, the data must be read by the CPU
|
||||
in a timely fashion, otherwise it might be overwritten
|
||||
by the next available data byte.
|
||||
The dual problem of not wasting unnecessary CPU cycles
|
||||
and ensuring data is read or written in a timely fashion
|
||||
or are addressed by the concept of interrupts.
|
||||
Interrupts are also called interrupt requests or IRQs.
|
||||
When something happens in a device that the CPU needs to know about,
|
||||
the device raises an interrupt and the CPU temporary stops
|
||||
whatever it's doing to deal with the situation.
|
||||
If you want to think of an analogy for this,
|
||||
I believe in the rural parts of the states
|
||||
where the postbox is at the end of the road,
|
||||
that if you want to send some outgoing post or mail,
|
||||
you put your letters into the postbox
|
||||
and you raise the flag at the postbox.
|
||||
I'm not American, so I don't know if it's true,
|
||||
but I've seen it in movies, so correct me from wrong.
|
||||
Anyway, if it doesn't work like that pretend it does.
|
||||
So then your post office dude drives along his or her van
|
||||
and writes the Joneses they don't have the flag up,
|
||||
so I don't need to worry about them.
|
||||
The Smiths don't have their flag up, I don't need to worry about them.
|
||||
But yeah, job blogs do, so they have the flag up,
|
||||
so I need to go and deal with whatever it is over there.
|
||||
And this essentially saved the CPU having to go
|
||||
to the various different devices, so thinking in terms of the computer,
|
||||
it's going in the original designs and we'll go keyboard.
|
||||
Do you have anything for me? No.
|
||||
Mouse, do you have anything for me? No printer?
|
||||
Do you have anything for me? No.
|
||||
District, do you have anything for me? No.
|
||||
Going from that to a system where they don't,
|
||||
or there's a flag up there on the hard disk,
|
||||
so I'll go and deal with that.
|
||||
So essentially that's what an interrupt is.
|
||||
The funny thing about interrupts though,
|
||||
is that you're only allowed to have 16 of them.
|
||||
And that's going from 0 to 15.
|
||||
And the funny thing about it is that interrupt 5 is shared
|
||||
between either the sound card or the second parallel port.
|
||||
Now the reason you're only allowed to have 16 is because,
|
||||
yeah, who would need more than 16.
|
||||
But if you're thinking about it well,
|
||||
okay, my PC has a lot more than 16 devices on a mice keyboard,
|
||||
printers, modems, external disks, blood, a bit of that.
|
||||
Okay, so we now have 16 interrupts.
|
||||
So you're thinking, well, I can attach 16 devices to my computer.
|
||||
Well, yes and no, some of them are reserved.
|
||||
So if we go through the list, 0 is the system timer.
|
||||
1 is the keyboard. 2 and 9 shared are the video card.
|
||||
3 is come 2 and I want to come 4.
|
||||
Interrupt 4 is come 1 and come 3.
|
||||
Interrupt 5 is LPD2 or the sound card.
|
||||
RQ6 is the floppy disk controller.
|
||||
RQ7 is the parallel port 1.
|
||||
RQ8 is the real time clock.
|
||||
RQ9 is redirected to RQ2, so you actually don't have 15.
|
||||
RQ10 is available.
|
||||
RQ11 is available.
|
||||
RQ12 is a PS2 mouse.
|
||||
RQ13 is the mathematical processor.
|
||||
RQ14 is the hard disk controller and RQ15 is available.
|
||||
So we're looking at a total of 1, 2, 3, 4.
|
||||
RQ ports that were available.
|
||||
Okay, it's all very well.
|
||||
We now have the concept of an interrupt.
|
||||
We've also got the concept of iable port.
|
||||
Now, just to explain what these are, why they're used.
|
||||
So say I have a brand new expansion card.
|
||||
It doesn't matter whether it's a PCI or an ISA or whatever card.
|
||||
I don't want to put it into my computer.
|
||||
So I've got my acne corporation ISA card.
|
||||
I need the CPU to be able to talk to that.
|
||||
So first of all, I'm going to need a free interrupt in order to get the CPU's attention.
|
||||
And then I'm going to need at a minimum to define a range of ports so that I can send data to and from the CPU.
|
||||
Now what a port is commonly used in France as a term for a door.
|
||||
So if you think of it as a block of apartments, so everybody, all the apartments I've got won't address.
|
||||
So it's number one main street.
|
||||
And then under that, under you go to number one main street.
|
||||
There you are.
|
||||
Big block of apartments.
|
||||
And you go to port, FFFF.
|
||||
High, zero to zero across.
|
||||
And there's a door and you go in and you pass your package in and you get a delivery receipt out.
|
||||
And then you go in your merry way.
|
||||
So that's a port.
|
||||
And if you think of an interrupt as the example of flagging the land, I may have a woman as a case maybe.
|
||||
Okay, those are two things.
|
||||
Now we already explained about the speed difference between an ISA bus type and a PCI bus type.
|
||||
Now the maximum speed on an ISA bus type is 16 megabits per second and for technical reasons.
|
||||
It would be nine megabits per second.
|
||||
But yeah, you know, if you send another print job, that's fast enough.
|
||||
So why is ISA?
|
||||
Why has that more or less been replaced by PCI devices?
|
||||
And the reason for that is because these settings needed to be configured manually.
|
||||
And by manually, I don't mean yes.
|
||||
Later on, there were programs that will come with the network card that would allow you to run a special program
|
||||
that would allow you to set these interrupts, for instance.
|
||||
The ports were too bad because you had a selection from where you could generally select a free port easily,
|
||||
easy enough without having conflicts.
|
||||
Very important point to remember is ports cannot be shared between two devices.
|
||||
Each device must have its own port.
|
||||
This applies to DMA channels later, which we talked about later.
|
||||
And ISA devices cannot share interrupts either.
|
||||
So if you have an ISA device, you would actually go along with a little jumper,
|
||||
which is on the board itself, there was two pins sticking out and you would take a little jumper
|
||||
and you would put it over that and short the two pins creating a circuit,
|
||||
telling it that's interrupt, whatever the interrupt was.
|
||||
The problem is we had 16 interrupts as you saw earlier on.
|
||||
But only a few of them were available, a few of them were shared with the sound card.
|
||||
So for example, interrupt 5, if you had a second LP line print report,
|
||||
which was common in the days, or if you had a sound card, you could use interrupt 5.
|
||||
You might be able to get away with interrupt 15, you might be able to get away with 10 or 11.
|
||||
But it was basically hell setting up those things.
|
||||
I remember going, spending a weekend with a mid-mind and work,
|
||||
going around resetting all the natural cards to IRQ 15 from 5,
|
||||
because it was the only common denominator in all the natural cards that we had.
|
||||
Because of course some of the devices would come and they would only allow you to set IRQ 5 or IRQ 15.
|
||||
So you didn't even have the choice of the additional other ones.
|
||||
Now that was a pain in the wherever.
|
||||
So when PCI devices came along, they had a major advantage for me personally in that they had a thing called an interrupt handler.
|
||||
And that was a lot of the PCI buses shared one IRQ.
|
||||
So the CPU knew that the PCI devices, one of the PCI devices had a wanted its attention.
|
||||
So it would go over there.
|
||||
The interrupt handler would see, it's not the first one, it's not the second one, it's not the third one,
|
||||
but it is the fourth one.
|
||||
And then the fourth device would communicate over IRQ 5.
|
||||
Then on the next occasion, when IRQ 5 goes up, it might actually be the first device that communicates.
|
||||
So that was a major relief.
|
||||
There was a trouble period where some of the motherboards were coming with PCI devices and ISA devices.
|
||||
So you still needed to make sure that the ISA devices had their own IRQ set and ports obviously.
|
||||
And that the PCI device didn't devices altogether didn't conflict with that chosen interrupt.
|
||||
It's a general tip.
|
||||
If you have a computer now that has an ISA device, please don't use it.
|
||||
Keep it if you want a piece of history or whatever, but you're far better off getting a router like a WRT54G.
|
||||
It'll be faster and run silently.
|
||||
It's more energy efficient and all of that good stuff and more power and it'll be more standard and more modern.
|
||||
And you can pick them up relatively cheap.
|
||||
So now we've covered interrupts, we've covered ports.
|
||||
But there's another thing that we should discuss on page 11, and that is DMA.
|
||||
We mentioned earlier that communication with peripheral devices through IO ports occurs by your two at a time.
|
||||
For fast devices, service interrupts could use a lot of CPU capacity.
|
||||
A faster method is to use direct memory access or DMA, in which a few IO instructions tell the device where in RAM to read or write data.
|
||||
And then the DMA controller provides hardware management of the actual transfer of data between RAM and the peripheral device.
|
||||
So what this means is you've got a slow modem coming in with some data.
|
||||
And it's operating hyperfast, like a rocket speed, and you've essentially got data coming in on a modem at the speed of some dude taking a leisurely stroll down the park.
|
||||
So you don't want the CPU to be stopping from the slighting fast speed to take in these messages from the strolling dude.
|
||||
Here's part of the message, wait for the go home, get the next one, I'll come back in and give you the next one.
|
||||
So what it does is what the DMA allows you to do is tell that dude, go write directly here into this part of memory.
|
||||
So get your message, put it all into memory, over there, stack it up in a row, and then we'll flag it and drop it, and then we'll tell the CPU,
|
||||
OK, CPU, there's a whole goal of that over here, CPU goes over, read all of that at once, that at least is how I think it works.
|
||||
OK, moving on to plug and play.
|
||||
Plug and play means that you can connect the device or insert a card into your computer, and it is automatically recognized and configured to work with your system.
|
||||
To be fully implemented, plug and play requires three things, a bias that supports it.
|
||||
The core utility that enables PMP and detects the PMP devices device also reads the ESCD for configuration information on existing plug and play devices,
|
||||
and the ESCD stands for extended system configuration data, and this is a file that contains information about the installed plug and play devices.
|
||||
You also need an operating system to complete the configuration process started by the bias.
|
||||
The plug and play automate several key tasks that were typically done either manually or with an installation utility, and those tasks are setting an interrupt,
|
||||
and signing direct memory access, signing memory addresses if the card needs additional memory.
|
||||
So for example, sometimes you can, especially on laptops, have the video card uses some system memory instead of having its own onboard memory,
|
||||
and then that will be assigned and reserved for that.
|
||||
Then we also have the input output configuration, and these settings define the ports used by the device for receiving and sending information.
|
||||
Now Linux provides some tools that will allow us to see what's going on here.
|
||||
And in the textbook on page 13, he makes reference to ISA PMP tools, which on my Ubuntu Gusti, Ubuntu installation is unavailable.
|
||||
Now there is ISA PMP, neither is PMP dump, but LS PMP is available in the package PMP utils and one aptitude installed PMP utils later.
|
||||
If you run the command, you'll guess three columns, 00, columns, 00, up to 00, columns, 0d, and then an identifier PMP, 001, and then a brief description of what they are.
|
||||
So I've got system board, PCI both, system board, system board, PS2 port, IBM enhanced keyboard, essentially.
|
||||
Everything is a plug and play device on the laptop, even though it's soldered on.
|
||||
So that is possibly a useful tool for you.
|
||||
And that's the end of this episode in the mini series on LPI certification for hacker public radio.
|
||||
For feedback, corrections, or contributions on the series, please email me at ken.valon asgmail.com.
|
||||
For general feedback on hacker public radio, you can email feedback at hackerpublicradio.org.
|
||||
Remember, hacker public radio is for the community and by the community.
|
||||
So if you'd like to do a show, a series of show rules, or provide some other assistance, please email admin at hackerpublicradio.org.
|
||||
With that, I'd like to thank you for listening. I wish you a very good day.
|
||||
Thank you for listening to hacker public radio.
|
||||
Thanks for watching.
|
||||
Thank you.
|
||||
347
hpr_transcripts/hpr0037.txt
Normal file
347
hpr_transcripts/hpr0037.txt
Normal file
@@ -0,0 +1,347 @@
|
||||
Episode: 37
|
||||
Title: HPR0037: This Old Hack Part 5
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0037/hpr0037.mp3
|
||||
Transcribed: 2025-10-07 10:38:51
|
||||
|
||||
---
|
||||
|
||||
You
|
||||
I'm working on a very special project today, I'm getting ready to go to Shmookon here.
|
||||
I'd like to thank Larry Pesci from Paul.com for giving me a ticket to go to the conference,
|
||||
otherwise I wouldn't be going to the conference, I'd just be going up to a party for a night
|
||||
and sleep in my van and drive home the next day.
|
||||
So what I'm doing is I'm trying to create a Shmooball Cannon, now a Shmooball is a stress-releaf
|
||||
ball, one of those foam ones, and they use them at the conference when a speaker is talking.
|
||||
You can throw the Shmooball at the speaker to interrupt the speaker in order to ask a question
|
||||
or if you don't agree with what they're saying.
|
||||
Now I know last year somebody made a Shmoob Cannon that was a modified leaf blower.
|
||||
I've done some research on the internet and I see that people have made a ball launcher
|
||||
out of PVC using one piece as a pressure rise chamber and then a sprinkler switch, a sprinkler valve
|
||||
for, I suppose it's for landscaping purposes, a sprinkler valve to release the pressure
|
||||
and so pretty much you pressurize your PVC with a pressure tank or some CO2 and then you
|
||||
get one shot at about 40 to 80 psi which will launch a weighted tennis ball, something
|
||||
like a 100 to 200 feet and a good height and they do this, it's called a pneumatic antenna
|
||||
launcher.
|
||||
You can research that they use the ball, they put a fishing reel type set up on the end
|
||||
of the launcher and attach fishing line to the ball, shoot the ball over the top of
|
||||
trees and then they get the ball and lower it so they can get a hold of it and then you
|
||||
string an antenna up into the tree tops using air pressure and a valve to release the
|
||||
pressure suddenly.
|
||||
Now if anybody knows about making a potato gun, potato gun is PVC without a chamber on
|
||||
the end but instead of building up the pressure and releasing it with a valve you have a larger
|
||||
end with a screw-in cap, you spray some like a clampable gas in there like hair spray
|
||||
or something and you have an ignition switch from a camp stove, you flip the switch, it
|
||||
lights the gas and it sends the potato launching from the explosion from the compressed gas.
|
||||
I've decided I had a moment of inspiration, came up with something almost completely different
|
||||
and I'm not going to go, I don't want to go into all the details of the actual propellant
|
||||
quite yet.
|
||||
I'd like to leave that as a surprise for after the conference, but I have already been
|
||||
to the store, picked up a few little things that I'm going to need to build the launcher
|
||||
and it's very simple, designs, much like a regular potato gun, ever had a schmoo ball
|
||||
before.
|
||||
So I had to ask Larry what the size of a schmoo ball was and he says it's about two
|
||||
and three quarters of a niche, so he was using three-inch PVC pipe, so I went ahead and
|
||||
got myself a piece of three-inch PVC pipe, a coupler and a clean-out cap which if you
|
||||
were doing plumbing then you could have this outside of your plumbing system, so if you
|
||||
had a drain clog, you could take a cap off and run out of snake, which a snake is a
|
||||
plumbing cleaning device that you unwind into your plumbing system and it kind of breaks
|
||||
up the clog.
|
||||
So I got a cap screw in, clean out cap, I got a coupler and I got two cans of stuff
|
||||
here and one of them is the purple primer.
|
||||
Now if you're doing PVC you have to get primer, which usually is purple, they do make
|
||||
clear primer, but it's a little more expensive and there's regular PVC cement, now you're
|
||||
not actually gluing it as well, you're not gluing it like you think it might be.
|
||||
PVC, when you use the cement it actually bonds the two pieces together physically, not
|
||||
just by just making them sticky, making them stick together, it actually takes the two
|
||||
pieces and bonds them together.
|
||||
I'm getting ready to do, so I've got my work area here and I've laid a bunch of newspaper
|
||||
down so I don't get purple primer because it will stain permanently and I'm going to
|
||||
clean the PVC, then it's already cleaned, it's already dry and I'm going to just use the
|
||||
dremel here to kind of take the edge off of the pipe, which I'm going to be inserting
|
||||
into the coupler.
|
||||
I think I'd better put a safety goggles on to keep plastic shrapnel out of my eyes and
|
||||
I will also put on a dust mask here to keep from inhaling, particularly matter, because
|
||||
who wants to breathe in, you have PVC stuck in their eye, okay so all I've done is created
|
||||
a rounded leading edge on the PVC pipe here, that way when I insert it into the coupler
|
||||
it will not scrape the cement off of the edges of the wall so much and hopefully create
|
||||
a better fit because I did a little dry fire testing yesterday without it even glued
|
||||
together using my method of propulsion and I was, let's see, I was using a closed 12-ounce
|
||||
beer bottle with about an ounce or two ounces of liquid still in the bottom of it as my
|
||||
projectile and I had the cannon propped up against the well house kind of like a mortar
|
||||
at a very steep angle, I mean like it wasn't quite vertical, you know, it was maybe ten
|
||||
degrees off of vertical, something like that and I test fired two or three shots with
|
||||
the longest shot being about a little over a hundred feet with a height of about, I'd
|
||||
say you know another 50-75 feet shooting it horizontally, I'm fairly certain I could
|
||||
launch a glass beer bottle about 200-250 feet or so, so I've got the leading edge trimmed
|
||||
up and so now I think I'm just about ready to prime and prepare to glue my coupler and
|
||||
my end cap here, do some sections, actually I'm going to go ahead and I'm going to round
|
||||
off the end cap as well which fits into the coupler so that way I can just go ahead
|
||||
and glue everything all at once, I think I mentioned I was using a Dremel to do my sanding
|
||||
for me, it's a Dremel Lithium Ion cordless, it's 10.8 volts, 5,000 to 35,000 RPM model 800
|
||||
and I've got to tell you it's my wife got it for me for Christmas, she's the last year
|
||||
of the year before, the battery holds a charge for a really long time, it's got a little
|
||||
metal hook, a metal ring on the bottom so if you wanted to hang it up you could hang it
|
||||
up and use the shaft attachment if you're doing some detail work which I really recommend
|
||||
if you're doing some kind of artistic carving because it takes the weight of the Dremel
|
||||
out of your hand and lets you just use the tip kind of like a stylus or a pen so you
|
||||
can more accurately do your creative endeavors, so first thing I'm going to do is I'm going
|
||||
to do the primer here and the top is, oh they're pretty good, I found that sometimes
|
||||
you have to get a little creative getting the tops off of these things because they tend
|
||||
to go in there pretty good, go figure considering it's a volatile substance and you don't want
|
||||
to accidentally spill it, so now I've got to find some wrench, some sort, I guess I can
|
||||
get your I can hit it, try to wrench, vice grips, chisel that might work, just something
|
||||
to loosen the cap up, just a little bit, I'm sure plumbers that are using it usually
|
||||
have some sort of plumbing wrench available, so if they won't open up they can figure
|
||||
something, okay, wrench is just a little wrench isn't going to work, needle nose pliers
|
||||
are going to work, so I'm going to pick a cap up here, chisel, see if I can get it loosened
|
||||
up here, that doesn't work, I'll find, I'll add some vice grips but I used them on my
|
||||
last project, I don't exactly remember what I did with them when I was done, which is
|
||||
always a cherished thing to do, I think I kept the chisel just right because it's got
|
||||
curves around it and I could get it turned, all the reason I'm using a chisel by the way
|
||||
is because it was the first thing I found and it's probably not the best thing to use but
|
||||
you know I was going to use a flathead screwdriver but I said it was the first thing I found,
|
||||
chisel are actually generally pretty freaking sharp, but I used this one when we were fitting
|
||||
in the house, doing the floor, and so I'm pretty sure it's not, the sharp is too
|
||||
in the shed, okay, well windy tonight, but I have found my trusty and only slightly rusty
|
||||
vice grips, which I will definitely be able to remove the top of this cannon primer, okay,
|
||||
now I'll take one second, get the right tool for the job, okay now you want to prime the
|
||||
whole thing, the whole area where you'll be fitting the piece together, I'm going to do
|
||||
this in sections, so first I'm going to prime one side for the clean out, for the end cap
|
||||
screw on, now it slides into the coupler and purple stuff is kind of messy so that's
|
||||
why I've got all clothes on here, I'm holding the fitting upside down and the primer doesn't
|
||||
have to be wet, it can dry, so if you happen to make a mess you can take a second to grab
|
||||
a paper towel and clean up a little bit of the excess if you want it to kind of look
|
||||
like a nice, well if you want it to look nice you can either get the clear primer or you
|
||||
can mask off areas of the PVC that you don't want stained, so I've got my PVC cement here,
|
||||
got the area to prime, the most important part of the seam is the bottom two-thirds because
|
||||
the sticking action is going to happen, so be sure to use plenty of cement and I'm just
|
||||
going to take my end cap and slide it in with a twist, make sure I get a good tight seal on it
|
||||
and that's that part there, I guess I'm going to take a screw out just in case I make a mistake,
|
||||
I wouldn't want my end cap to stick in place, I'm going to do the same thing to the other side of my
|
||||
coupling, again I'm holding it angled down, applying a liberal amount of primer to the inside of the
|
||||
coupler, make sure it's evenly good and purple, I guess it's a good thing about it being colored is that
|
||||
you can see the evenness of the application, okay, I'm done with the primer, so I'm going to go ahead
|
||||
put the top back on that and get ready to attach the coupler to the end of the PVC tube here,
|
||||
go ahead and kind of brush it off, make sure there's no loose PVC flakes on there to interfere with the
|
||||
weld and then just apply PVC cement over the primer, be sure I get the whole area coated, all right,
|
||||
nice and good there, nice and even, wipe off these little drips, my paper towel, just slide it on with the twist,
|
||||
yeah, so I dried fire it, I didn't dry fire it, I fired it live yesterday, after I bought the parts,
|
||||
just to see how well I thought it was going to work, and truly impressed with the results,
|
||||
one particular test, with a large amount, not a large amount, but I use a different method of charge, I use a
|
||||
different type of charge to launch the projectile, and the amount of pressure it created actually blew the
|
||||
unglued end cap off of the PVC pipe, and so it gave me a little idea as to the actual, you know,
|
||||
amount of pressure being created, another thing I noticed was, another thing I tried to launch,
|
||||
was an empty beer can, and when I went to retrieve the beer can, why I didn't find as far as the
|
||||
bottle, which had more mass, so I guess it traveled farther, but I didn't notice that the can,
|
||||
it had been partially crushed by the force of the charge, and I thought that was pretty interesting,
|
||||
so that glue's got to sit, but read the instructions here, that it's set for 24-48 hours,
|
||||
before applying pressure, well that sounds about right, it'll probably be another day or so before
|
||||
I actually get to test it anymore, now that it's glued up, and I've got a three-foot length here,
|
||||
which is pretty big, and I've read that I can go down to about 19 inches, and I'll still have optimal
|
||||
range, apparently the projectile actually gets the pressure built up in front of it,
|
||||
and it slows the rate of the launch, so what I'd like to do is reduce the barrel length,
|
||||
and use the smallest charge possible, because it's really loud as hell, and one of the tests I did
|
||||
yesterday, it pretty much sounded like I was shooting off some kind of fire alarm, now I know
|
||||
what a shotgun sounds like in a 22, and it's somewhere in between a shotgun in a 22, and I'm
|
||||
planning on taking this to Washington DC, so what I essentially have here is half of a pipe bomb,
|
||||
that I'm planning on taking to the nation's capital, which that's a dumb idea, especially since I
|
||||
spent a week before I built it, googling around on how to build my bombs, so since I know that they
|
||||
have the ability to unnecessarily monitor my surfing habits, which of course, you know,
|
||||
Google monitors, everything you do, but all I would take would be to put two and two together and
|
||||
come to the wrong conclusion that I was trying to, you know, do something that I'm not, and okay,
|
||||
so I went to the store to get the pipe, and they had like a sheet, it must have been like a 10,
|
||||
15 foot piece of three inch PVC, I mean this thing was huge, and I was like yeah,
|
||||
I'll just take the whole thing, and then I got it up to the counter, I was like you know,
|
||||
I really don't need all this pipe, and so the guy offered to just cut me off a section, and so
|
||||
I guess he didn't feel like saw it all the way to it or something, because when he came back,
|
||||
he had, he'd just like broken three feet off of the end of the pipe, I mean it was all jagged,
|
||||
there was a point on it, it looked like he'd kill somebody with it, I mean, so first thing I did
|
||||
before I used it to launch was I cut off the jagged piece, and it's still, I still didn't get
|
||||
a really straight cut on it, because I left, I kind of left the hacksaw sitting out from the
|
||||
last project, and he got rained on, kind of rusty, and think about a rusty saw, is it's kind of hard
|
||||
to cut with it first, but after you get going, it just, the rust works off the blade, and it cuts
|
||||
fine again, and so it took me a minute or so to get it going, but once I got the blade cleaned off,
|
||||
and it started cutting, and it cut pretty straight, there's just a little lip here, so all I'm
|
||||
going to do now is, I'm going to just kind of round off the, the leading edge for aesthetic purposes,
|
||||
in case I decide to just leave it a three-foot mortar, and I don't do anything else to it.
|
||||
All right, that's a lot better, and I'm still using my safety goggles and my dust mask to prevent
|
||||
inhalation of PVC, and get it in the eyes, wash my hands, I've got powdered plastic on my hands now,
|
||||
and since this is not a Chinese cooking show, I won't be serving plastic. I will talk a little bit
|
||||
about the type of charge that I'm using, I'm not going to go into detail, like I said, I don't really
|
||||
want to spoil the mystery, as it were, pretty much what I'm doing, is I've experimented with
|
||||
using both plastic and glass bottles. Well, it turns out that the chemical reaction that I create
|
||||
get really freaking hot. I mean, one of the ingredients is water, and everything's got
|
||||
fucking water in it, right? So, the reaction is between water and one of the other elements,
|
||||
and it's catalyzed by a third element, so it's really a trinary compound creating a large
|
||||
amount of pressure in a small space, which if you know anything about explosives, an explosion
|
||||
is expansion plus compression, like say you take gunpowder and put it in a dish, it's just going
|
||||
to make a flash. If you take gunpowder and put it in a metal casing and prevent it from
|
||||
expanding rapidly, it will make an explosion. So, what I'm doing is I'm creating a quite
|
||||
somewhat volatile chemical reaction in a enclosed space. In this case, I'm using 12-ounce
|
||||
Mickey's beer bottles, which they're called Mickey's Grenade. They have a white mouth and they
|
||||
have a screw on cap, which is perfect, because I put the ingredients into the bottle and I can
|
||||
screw the cap back on, and the expansive forces created will cause the top to pop off. The bottle
|
||||
doesn't explode because the cap is the weak link in the chain there. So, what I do is I put the
|
||||
ingredients into the bottle and drop them down the tube, and I've got like maybe 30 seconds to a
|
||||
minute, depending on how much water I add before the pressure inside the bottle is large enough
|
||||
to blow the top off. So, after I put the charge, the charge would be the bottle with the
|
||||
ingredients. I drop the charge down in the tube, and then I drop my projectile on top of it,
|
||||
so that's the process there. So, now the only thing left to do is wait, I've got to wait 24 hours,
|
||||
which I won't wait 24 hours. If the weather's okay tomorrow, I will go out and do a test
|
||||
fire tomorrow that should be pretty nice. I will be able to get an idea of the size of the charge
|
||||
I need. Then, for the conference, I will pre-mix the ingredients. Well, since once you mix them together,
|
||||
they become volatile. What I'll do is I can mix two of the ingredients together and they don't
|
||||
interact. They, you know, it's stable. And the third ingredient, I'll keep separate, and so when
|
||||
it's time to do a launch, then I will add the ingredients together and create explosion.
|
||||
All right, welcome back day two of the Schmoo Launcher project. I'm just getting set up here.
|
||||
A couple of beers. And the first thing I'm going to do is set up my camera, have a launching
|
||||
line, and then I'll pace off from this line so I can get a consistent reading of the actual
|
||||
range of the gun, the cannon, 73 paces, which that's something like, well, I'll get to take measure
|
||||
out now. Actually measure off how far one pace is from my heel to my toe, and so I can get an
|
||||
accurate idea of the actual range. So now I'm going to take a lighter to my firing area,
|
||||
so I can figure out how to best set up the shot here. I'm more interested in the range
|
||||
than the actual firing of the device, but pay the camera set up and go do a trial shot just to make
|
||||
sure everything looks okay, and then I will set up my mixing station and prepare to do it for real.
|
||||
Hopefully I won't blow up and get the PVC shrapnel in me because PVC doesn't show up on
|
||||
show up on X-ray, so I think I can fake it. I really don't love how I'm going to put it on my shoulder
|
||||
or hold it down at my hip. I don't know if I'd rather get probably a shrapnel in the hip
|
||||
than in the neck. Okay, I took a little test video there. I'm just going to review it.
|
||||
Now, okay, well, video looks good. I'm going to drink beer.
|
||||
If you're ready to mix me up a batch to charge my machine here, let's see, I've got
|
||||
done. I know I've got enough for two, maybe three total launches. I'll go check around and see
|
||||
what other kind of stuff I have because I don't want to boil. I'm going to get a little creative
|
||||
here today. I might have some RPG action going on, but it just depends on how well things work.
|
||||
Okay, what I'm going to do now is I'm almost ready for the final phase of the testing project here.
|
||||
All I've got left to do is prepare my concoction and add some water and other stuff to it,
|
||||
and it will be good to go. I'm showing it down. I've got enough bottles here
|
||||
to where I can do at least one appropriate launch. I can play around and I like you do two more,
|
||||
just depends on the quality of my caps because I know I don't know how recycling them is going to do.
|
||||
Once they've been fired, cold beer, actually they're not cold, they're room temperature suitable.
|
||||
Tonight I'm, once again, drinking warm walkies best ice. I think what I've decided to do is
|
||||
I'm just going to do a little shot from the hip model horizontally and I don't know what to expect
|
||||
from it, exactly. I will court him and make my 15 minutes fame here, just a hand at the solution
|
||||
to the bottle. Shake it up real good. I'll drop it in the tube. Drop it in the tube.
|
||||
Well, that was different. I'm not sure exactly what happened. It seems that
|
||||
the bottle got hung up in the tube. Not quite sure what happened, but I've got to do one more
|
||||
test here. That was a miserable failure. I don't know. I must have used too much water. I'm not
|
||||
really not really sure. I'm trying to do it. Well, at this don't do it. I'm pretty likely to
|
||||
blow my freaking hand off this time. Don't really know what happened. We went off.
|
||||
Seems like it had a decent amount of pressure. The projectile just didn't just didn't fly.
|
||||
Maybe my set of this camera shot. I gotta do it. So I'm going to do it again. It's time to bless
|
||||
this water. Let me see. I can't really imagine what went wrong. The car in the world.
|
||||
Shoot the car. It looks like a star. So I'm just going to try this experiment again.
|
||||
Well, I almost killed myself at that time. The small amount of water just happened to make
|
||||
thing go off a little too soon. So now it's going on to the even more risky, dangerous
|
||||
trial attempt. The time now out of my bottles, which I planned on using, and worked so well
|
||||
in the initial testing. I'm not really sure. Well, that last cap had been used once before. So
|
||||
I'm fairly certain that that has something to do with it. Now I know we have to use one of these
|
||||
bottles again. So I'm going to take it back over here. This should be a dosage. And for the first
|
||||
try, I'm not even going to hold it in my hand. I'm just going to record it because it's a good
|
||||
chance that something could really explode. I don't want to be that guy that gets blown up.
|
||||
I mentioned that I've been choosing 12 ounce makies. I won't liquor beer bottles because they don't
|
||||
melt. The top just blows off once it builds up pressure. But with the case of soda bottles,
|
||||
they get hot. So I am going to use more water to prevent the explosion from happening prematurely.
|
||||
In other words, before I can get the fuck out of the way. This should work. Now I only got a
|
||||
limited amount of stuff left. So this is going to have to be the official grand finale. I've got to
|
||||
make this work. I'm going to go all RPG areas. This one. I'm going to keep talking this and see
|
||||
just how crazy it is. And a little less water and it's not going to work at all.
|
||||
We would work about this in the glass bottles. So with the plastic bottle, it starts to expand
|
||||
right before it explodes. So if the first bottle doesn't blow up before the second bottle starts
|
||||
expanding, then I'm just going to have a double explosion in my chamber, which is probably just
|
||||
going to get hard to clean them with a fucker out. So on that note, I will not be
|
||||
making the RPG using two plastic bottles today. If I do plan on making a grenade,
|
||||
then I will be using a glass bottle for the grenade as well. So I am almost ready here. Of course,
|
||||
this is a part of my great one. Getting ready to achieve greatness. This should be good.
|
||||
I wind up the shot. My spear box target. Best I can.
|
||||
Wait for the traffic to go by. Getting everything ready here. Might have used too much water at
|
||||
time. You can usually hear the plastic one before they're about to go off. It kind of makes
|
||||
groaning sound. I must use way too much water. Nope, here we go. Here we go. So I'm just going to
|
||||
have to know. Fizzled out again. That's the problem with the plastic bottles is that, like I said,
|
||||
it's hot. They don't melt rather than explode. Okay, well, what to do now? Because I could try a glass
|
||||
bottle with a used top one more time. Plenty of water in it and hope for the best.
|
||||
A little more air. Plenty of freaking water. So I want to have plenty of time to get the hell out of
|
||||
the way. I know that's way too much water. Okay, well, this is going to be it. I'm sure I'm
|
||||
even going to hold it. Be a man. Hold it. As I shoot. Just like I planned on. Now edit this whole
|
||||
thing out and act like I'm not retarded. This would bring you a future note to not take your face
|
||||
directly in front of the barrel of a mortar. No matter how safe you think, oh, this is not going
|
||||
to work at all. That cap is fucked. This is going to work very well. Very disappointing. Here we go.
|
||||
In my explosion. Again, toxic fuel. This has been a pretty big waste of time so far, but I did
|
||||
say that my shot wasn't going to work. The cap wouldn't go on just right. So now I'm going to have
|
||||
to get more water. I'm trying to shoot a whole more time. Bunch of water. I think it's a problem I've
|
||||
seen when I first tried this. I did it at a near vertical, near vertical. So I'm going to try to
|
||||
put shit down the water. I mean, I'm going to fill it just about all the way up. I don't know.
|
||||
When I had it vertical, it just compressed out the top and made explosion happen. But since it's
|
||||
at such a horizontal angle, I'm not certain that it's even going to work with the plastic bottles.
|
||||
I know I have a more making bottle. So what I'm going to do after this is this doesn't work.
|
||||
I go to town, I go to town tomorrow, and if this doesn't work, then I will get some more bottles
|
||||
that work because I only had one. I think I must have had some kind of issue with the projectile.
|
||||
So I'll be starting with fresh materials. This is a part of the learning process. It's really,
|
||||
you know, it's like you don't want to go into something not really knowing what to expect.
|
||||
A little more propeller. Shake it up. Re-e-e-e-e-e-e.
|
||||
Oh, cool. This stuff seems to be happening.
|
||||
Learning up the target. Raise the elevation slightly.
|
||||
Okay, check. So there's about to happen. Probably nothing. Here we go. This is it. It's a car coming
|
||||
to. It's not working. This is about again. I'm going to manage to make a big mess.
|
||||
Well, that almost worked. See, by looking at the bottle, that it banded properly, but it still
|
||||
got so hot that it melted to the plastic before it had a chance to, before it had a chance to fire.
|
||||
So, I guess I'm going to clean it with a mess and edit this down. Let's try it again.
|
||||
Disappointing, but not discouraged.
|
||||
How the hell are you? How the hell are you? This is Fox Fire, and I'm coming back to you once again
|
||||
to recreate the original testing of my Canon mortar device after a series of failures in the last
|
||||
attempt. I have decided to come back once again, revitalized with the audio quality sounds a
|
||||
little better. That's because it is. I've got a new cheapo headset. This time it's not a ear clip.
|
||||
It's a behind the head, and that's got some kind of big fancy name that I can't pronounce,
|
||||
but that's not important. So I'm ready to do my proof of concept. Once again, this time I'm going
|
||||
to set it up in mortar mode. I've got just about everything ready to go here, and I'm going to
|
||||
get it set up. So all I have to do is add water, turn on the camera, and set my charge, and run
|
||||
away. So that's what I'm going to do now. So I'm going to go set the camera, and there will be
|
||||
some video of this available somewhere. If you know me, I've probably shared it with you.
|
||||
If I haven't shared it with you, then you might see when the camera is recording, adding water.
|
||||
That should be plenty.
|
||||
Charge is set. Safety goggles on. I'm going to step back and wait for the boom.
|
||||
Then kind of a fun day. Yesterday we had a 65 mile an hour winds. There wasn't any storm,
|
||||
just some hellacious wind. So I had to spend a good part of the afternoon cleaning up the yard,
|
||||
and currently violating the burn band. I actually surprised the fire department didn't show up,
|
||||
because I burnt a foam mattress cover. You know when I was thinking, okay, it'll
|
||||
just got a small burn smoke, and that thing might turn into a fucking mushroom cloud like the
|
||||
second I threw it on the fire. It was insane. Okay, I'm expecting something to happen here.
|
||||
I might not have used enough solution, but that's the part of a trial and error.
|
||||
If it looks like I need to add about twice the amount of solution, then I added this time.
|
||||
It's kind of hard. I mean, I should have started out with accurate measurements and done it all.
|
||||
Scientific methods, fabulous. Then I would know exactly how much of X, how much of Y,
|
||||
and how much of C would have needed. But it's more fun to experiment, I think, to do it this way.
|
||||
I had our monomy of when I was in high school, my chemistry teacher actually let me make
|
||||
gunpowder. Lacking the ancient Chinese formulas, I had to guess the appropriate mixture of
|
||||
salt, Peter, charcoal, and sulfur. Okay, this is going to go hot quick.
|
||||
Okay.
|
||||
Check. Oh, shit. It's aimed straight up. There we go. That should work pretty good.
|
||||
See if I'm going to scare the neighbors.
|
||||
God damn. That was a fucking hang time. That thing was in the air for a good couple of seconds.
|
||||
Well, I think we are well on the way to success here. So since I put a unscrupulous bottom,
|
||||
I should be able to extract the charge without dumping it. That bottle is long gone, long freaking
|
||||
gone. Okay, so I do know I just, since I have measured out for the most part what I'm using,
|
||||
I now know pretty much exactly how much stuff I need to mix together. Now it's pretty nice.
|
||||
Now it could be that with the change in angle, see it worked really well at a vertical angle. I mean,
|
||||
I didn't even see where the fucking thing went. I mean, the bottle must have been like,
|
||||
must have gone up like 40 feet or something. Shit, I don't even know. I mean,
|
||||
I thought it had misfired because I didn't hear the thing. I didn't see the thing anywhere.
|
||||
So it must have gone up over the trees and landed like 150 feet into the woods because I didn't
|
||||
even see it here. All I did was hear a thunk out there somewhere and I have no idea where. I've
|
||||
been the habit now of pre-preparing that way it doesn't take so long to record the show here.
|
||||
So I've got most of my stuff ready to go. Ready to just add water. Oh, systems check.
|
||||
One charge, one projectile, one tube. Okay, everything is just about ready to go. Just
|
||||
get a camera and head water. It should be that easy. But I found nothing is ever
|
||||
ever easy. Yeah, we got a hell of a windstorm.
|
||||
Half the counties in the state have some kind of fire in them. The governor declared a state
|
||||
of emergency and called out the National Guard to help out. Okay, here we go. Check
|
||||
there for water. Check. I kept it and go on. That's not going to work. That one's going to be a dud.
|
||||
The cap got cross threaded. Like I said, what can go wrong? Well now we know. Now we know what can
|
||||
go wrong. So try again. New charge. It's going to pop. It's going to pop. It's going to pop.
|
||||
No, not. It's probably just going to steam a whole lot. One of these people looking. Oh, great.
|
||||
The lady next door is. Oh, now I've got an audience. Trim into not glass, not glass, not glass.
|
||||
Well, it's time I'm going to be more careful when I put the top on. Okay. Top of something good.
|
||||
Charges in. Second charge is in lightly. First, I'm going to do from the hip. Any second now.
|
||||
Here comes the car. Great. Nice. Success. We have explosive. Listen to that.
|
||||
Poisonous toxic chemical reaction. Hi. Okay. Well, they did not go quite as far as I had expected. Let's
|
||||
see. Let me stop the camera. And that will be the end of demo. Number one. Successfully completed.
|
||||
Thank you for listening to Haftler Public Radio. HPR is sponsored by caro.net. So head on over to
|
||||
96
hpr_transcripts/hpr0038.txt
Normal file
96
hpr_transcripts/hpr0038.txt
Normal file
@@ -0,0 +1,96 @@
|
||||
Episode: 38
|
||||
Title: HPR0038: R4DS Review
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0038/hpr0038.mp3
|
||||
Transcribed: 2025-10-07 10:38:16
|
||||
|
||||
---
|
||||
|
||||
1
|
||||
Hello everybody, I am Stankdog and this is Hacker Public Radio.
|
||||
On today's episode we're going to do a little bit of a hardware review of a device that
|
||||
I purchased recently. It's something called the R4DS. It is a pass-through device or an adapter for the Nintendo Game Boy DS.
|
||||
And I thought I'd do a little mini review, talk about some of the pros and cons of it on the show tonight.
|
||||
So, first of all, let's talk about what the whole point of this thing is. If anybody doesn't know listening to the show what a Nintendo DS is,
|
||||
it is a handheld gaming device made by, obviously, Nintendo. It's got two screens on it, a touch screen at the bottom and a second screen at the top.
|
||||
It was made to be backwards compatible with Game Boy Advance games, which is kind of handy.
|
||||
And, of course, new Nintendo DS games, which you probably see in just about every story you walk into.
|
||||
Well, I happen to travel a lot for my job, so I purchased one of these a couple years ago and it's been pretty cool.
|
||||
But I always kind of thought it might be neat to have other applications on there, kind of wonder what kind of power was behind it.
|
||||
I know that immediately when it was released, some people began trying to port Linux over to it.
|
||||
And, there became, there popped up, I should say, a community of Nintendo DS homebrew programmers, homebrew meaning people who are actually writing applications for the Nintendo DS environment.
|
||||
So, I thought that was kind of cool. People are making not only their own games, but other applications like personal information managers, media players, software of view, images on your Nintendo DS, etc. etc.
|
||||
These are all things that, you know, they're neat. It's kind of a nice little trick and everything, but to be quite frank, the early versions, the early ways to get this to work on your Nintendo DS, like a lot of other console hacking, involved taking your machines apart, maybe not necessarily for the DS, but for the Xbox and others.
|
||||
You always end up having to take it apart, go soldering a bunch of things. So, the early generations were rough and required a lot of steps to actually get into the meat and potatoes of the machine.
|
||||
Well, that's not the case anymore, and that's why I finally broke down and got into the homebrew community, if you will.
|
||||
There's been a few devices lately, and the one I mentioned earlier that I purchased the R4DS is one of those devices. It's what they call a slot one flash kit.
|
||||
And slot one would be the slot in the back of the Nintendo DS, where Nintendo DS cards are just slide in. They're very small. Anybody that has one knows that they're just a little bit bigger than an SD card. They're not a standard SD or compact flash or anything like that. They're proprietary form, proprietary shape.
|
||||
And an SD card in and of itself will not fit in there cleanly. Nintendo DS games, those are games designed specifically for this console, go in the back and slot one, Game Boy Advance games, as I mentioned the backwards compatibility earlier, go in the front, which is called slot two.
|
||||
And I'm talking about the latest hardware, maybe earlier versions had those reversed, but they're still called and referred to slot one and slot two.
|
||||
So this new generation of devices, the R4DS specifically, is a very, very straightforward and easy way to run homebrew applications on your Nintendo DS as a slot one pass through the device.
|
||||
Basically what you get when you order this kit, and I ordered mine from a place called Deal Extreme, which is really just the middle man it ends up getting shipped from Hong Kong.
|
||||
So got it a couple of weeks after I ordered it from Hong Kong. It's been pretty high demand right now actually for I believe it was somewhere around, somewhere around $40.
|
||||
You can probably find for less than 50 bucks, maybe a lot less if you shop around, but I think I've paid about 40 bucks for it.
|
||||
And what you get when you order it is a box that contains a couple things.
|
||||
First of all, it contains the slot one device itself.
|
||||
Basically this looks like any Nintendo DS game you would buy off the shelf.
|
||||
And it is, again that thing I described earlier looks kind of like an SD card.
|
||||
It is a card. Now there's nothing on the card. There's no games on the card. It is basically exactly what it sounds like a pass through device.
|
||||
This device slides into there, but the part that makes it really useful is the fact that as a pass through device what it does is it allows you to put this card inside your Nintendo DS, but it's got a small opening in the back.
|
||||
And in the back of the device itself, you can slide in a micro SD card.
|
||||
So the micro SD card is readable by most computer systems or a lot of other systems.
|
||||
We all know that that is definitely a standard. And that leads to the second thing that comes with the kit when you buy.
|
||||
Of course this is not a very depending on where you purchase it, but the second thing is that it does come with a micro SD card.
|
||||
DS SD can get confusing micro SD card. I went ahead in order to 2GB and I got to say it filled up a lot faster than I thought it would to be honest with you.
|
||||
Obviously you can buy as large as you think you might need and you will need a way to get data onto that through your computer.
|
||||
If your computer already has a slot for the micro SD card or if you have an adapter for a micro SD to a full size SD card, which most of them come with that, you can in a card reader on your computer, you can interface it that way.
|
||||
Or with the kit that I purchased, I actually got a USB adapter so I could plug the USB into the computer and the micro SD card in the other side of that so I could write directly to it as a mini flash drive.
|
||||
So already that seems like a pretty good deal to me, 2GB drive, 2GB micro SD card, excuse me, with the adapter. That alone to me is worth probably $30 to $40. That's pretty handy to have.
|
||||
But it also comes with a CD and a little bit of a manual. You might as well throw the manual to the side because it's very bad English.
|
||||
It's kind of hard to read and understand so I found that was pretty much useless. The CD that it comes with is also equally confusing.
|
||||
But what I did and what anybody probably listening, this probably does when they buy any new hardware is go to the website first of all and see if there's an updated version of that anyway.
|
||||
By the time they package and burn those CDs and ship those out, they probably made updates to this software anyway.
|
||||
So I went to the website, downloaded the latest version, threw that onto the card.
|
||||
And basically what it is is there's a certain directory structure that have a certain naming convention where it puts on what we're going to refer to as a bootloader.
|
||||
And since they figured out how to make this happen through slot one, all you have to do is load the bootloader with the proper naming conventions, everything on to your micro SD card.
|
||||
Slide it into the adapter and that whole combination into your Nintendo DS and boot.
|
||||
And what it'll do is it will kind of bypass the Nintendo DS is built in a boot system and load directly from the card and present you with a menu.
|
||||
And the menu is also very equally simple. It does support the touch screen and everything's working and acknowledges the hardware and everything.
|
||||
And it has three options, one called gains, one for home brew applications and one that actually brings up kind of a miniature shell.
|
||||
Basically they're pretty self explanatory, the first one gains since you have this device in the slot, you obviously can't have another game in there at the same time.
|
||||
And I'm going to just put a disclaimer out here, I do not know the legalities of this, so we're going to speak hypothetically at this point.
|
||||
You can find, when this is just a fact, you can find ROMs of lots of Nintendo DS, Game Boy and pretty much any other console game outside of this conversation.
|
||||
But you can find ROMs for just about any Nintendo DS game out there on the interwebs, somewhere out there in the tubes.
|
||||
So you can find the games that you own, for example, I own seven or eight games for the Nintendo DS.
|
||||
And I don't like carrying them around with me everywhere that I go. So it's kind of handy to have the ability to put all those ROMs onto one SD card, of course that I legally own hypothetically.
|
||||
And pop those in and have all the games in my disposal without having to swap cards in and out all the time.
|
||||
So that's another cool thing that's happened in the later versions here. Some of the very early versions of these would allow you to do similar functionality, but you had no way really to save the games.
|
||||
So that's one, first of all, one thing to point out about this device, as we begin more of a review here, is that it will allow you to save games that create your save games in the directory where the game is and it puts you as a .sad file, a save file.
|
||||
So the cool thing about that is you can have all the games that you want on the device and the game ROMs usually end in a .nDS, obviously from Nintendo DS extension, but it will put the save game files on there.
|
||||
And it gives you the neat option if you wanted to back those up to your hard drive or to a CD or whatever else if you're with one of those people that does like to save your save games.
|
||||
And if it's a game that takes a long time to play, you don't want to risk ever losing it or, you know, the other, if you did actually have the original ROM and you lost it, your save game is stored on that little ROM cards.
|
||||
So if you were to lose your game, you've lost your save game, you'd have to start back over after you bought the new game. Well, by allowing this, you can have those save games and back them up and reload them as you see fit. So that's one neat thing.
|
||||
Again, it's through a menu system. It'll allow you to choose whichever game it is you want to play and simply hit the button and it will load that game up as though you had booted directly from the ROM.
|
||||
So you don't have to do a lot of weird things. You don't have to jump through who if you don't have to solder anything.
|
||||
So this is the latest generation of devices. So if you ever have, ever have hesitated about purchasing such a thing, they are now as easy as I think they're ever really going to get.
|
||||
What else is it does have some other features on there that don't really do anything for me, but some listeners might like to know that it has some sort of, I think it's action replay or something I believe the name of it was.
|
||||
Honestly, I bypassed that because it wasn't interesting, but apparently that's some sort of system that allows you to cheat, put in cheat codes, pre-program in cheat codes.
|
||||
So that every time you start the game, it'll automatically give you full help or something like that, different things.
|
||||
So it does have support for that built into it, which is kind of neat if you're into that more than I have apparently.
|
||||
And let's see, other homebrew games. There are lots of perfectly legal. Well, again, I'm not a lawyer, so I believe it's perfectly legal to put your own games on there.
|
||||
It is open source. The community does release all the stuff open source. They don't like it charge people charging court. There's actually been some manufacturers from China that have been releasing devices and bundling a bunch of homebrew software on it and charging money.
|
||||
And the homebrew community was not very happy with that. And they actually don't take very kindly to people who do that.
|
||||
So that's not exactly the case with this one. This one just gives you the basic fundamentals you need.
|
||||
There's a lot, it's a pretty surprisingly active community online about this. So you can go out and do a little bit of searching for Nintendo DS homebrew and Nintendo DS hackings, et cetera, et cetera, and find a lot of other things that you can do and a lot of homebrew applications and games that you can download.
|
||||
The other thing, it does, it's worth pointing out that they've come so far now that there's no concern. There's nothing that I have found that this doesn't recognize as far as the hardware that includes the rumble pack.
|
||||
I don't have one myself. I know the kids like a lot of the rumble pack that when you're fighting, you get shot. It actually shakes and vibrates in your hand. It does support that and acknowledge that memory pack. Any any of the plugins and stuff that has support for all of that.
|
||||
It's pretty much complete product these days and you can actually change and I'm tinkering around with this pretty much as we speak. You can change the background and basically it's skinnable.
|
||||
You can skin this thing if you do a little bit of reading online. It's just creating your graphics in the right format and file names because it's very particular about that.
|
||||
And the right resolution and all that, you can actually make your own custom graphics and put on there. So you can fool your friends into thinking that you hacked it yourself and you didn't just download or didn't just buy something for $40 and change the colors on it.
|
||||
You actually can probably fool most of your friends and make them think that you hacked your Nintendo DS and your own you own your puverly and all that kind of good stuff.
|
||||
I think that's about it. I mentioned there's a shell which gives you some access. There is a Linux DS Linux. I think I should say, which is pretty handy. If you buy the kit, again, mine came from deal extreme.com. You could probably find them at a lot of other places. I'm not endorsing them necessarily but came fine. I got it in a reasonable amount of time. It was in good shape.
|
||||
Came with three things like I said, the adapter itself, a micro SD card, two gigs in my case, and a USB adapter for the micro SD card, which you may or may not need if you have the card reader and an adapter already.
|
||||
So that's pretty much it. If anybody has ever been hesitant about modding their Nintendo DS, you shouldn't have to worry about that anymore. It's gotten to the point where it's pretty much plug and play and even though the manual and the instructions and the website are all very bad English and not the most complete sentences or anything like that in the world.
|
||||
It's pretty simple and self-explanatory and within about 10 or 15 minutes I had the whole thing together, loaded, running, and everything worked pretty fine. So you can pretty much figure it out. You guys are all smart people out there listening to the show. So thank you for listening to this episode of Hacker Public Radio and we will see you again tomorrow.
|
||||
Thank you for listening to Hacker Public Radio. HPR is sponsored by Carro.net so head on over to C-A-R-O dot-N-T for all of us here.
|
||||
Thanks for watching.
|
||||
Thanks for watching.
|
||||
92
hpr_transcripts/hpr0039.txt
Normal file
92
hpr_transcripts/hpr0039.txt
Normal file
@@ -0,0 +1,92 @@
|
||||
Episode: 39
|
||||
Title: HPR0039: Debian Live CD
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0039/hpr0039.mp3
|
||||
Transcribed: 2025-10-07 10:39:01
|
||||
|
||||
---
|
||||
|
||||
music
|
||||
music
|
||||
Hey, this is Oct 3 with another episode of Hacker Public Radio.
|
||||
Today I'm going to talk about Debian Life and the Debian Life Project.
|
||||
Debian Life is a framework that is used to build life systems for the Debian distribution.
|
||||
It can include the classic installer.
|
||||
It can build CD-ROM, USB, and at boot images, all life systems.
|
||||
It's a live project, but it's also used for making pre-built images.
|
||||
And it also includes desktop environments such as GNOME, KDE, XFICE.
|
||||
And you can also install pretty much anything in the Debian repositories, including source code and drivers and kernels.
|
||||
The features that I liked about this project was that you can include the Debian installer from the official release onto your live system.
|
||||
And you can create a live CD with the installer for your specific setup.
|
||||
Let's say you have a computer laptop that has bad Wi-Fi cards for Linux.
|
||||
You can install that onto your live system.
|
||||
You have the installer copied over when it creates your hard drive.
|
||||
You can also include raid drivers.
|
||||
Anything that you'd like and anything you can compile and run in Linux, you can put on your live system.
|
||||
Also, the other thing you can include are encrypted hard drives disks into your live system installer.
|
||||
Or you can encrypt the live system itself when it boots.
|
||||
Whereas a password, and you can keep private files on it.
|
||||
It supports DM-CRIPT, loop AES, and encrypted volumes.
|
||||
And the encrypted volumes are for hard drive installation, obviously.
|
||||
And the next thing that I liked about this project was that it boots by Net Boot or Web Boot.
|
||||
Net Boot is booting your system from a remote location, whereas Web Boot is grabbing your boot system from a remote location and booting it locally.
|
||||
The advantage of Net Boot is you don't have to have hard drive Web Boot is.
|
||||
You don't need an internet connection after the initial boot.
|
||||
The next thing that I liked was you can create a Zen system using Zen kernels from the Debian repositories.
|
||||
Basically, anything that you would need supported by Debian that you can get to copy over to the disk and that will obviously be able to run from a live CD will work.
|
||||
Now that I've described basically the advantage of every live CD project out there, I'm going to explain the advantage of using the Debian live project.
|
||||
Dev is built around a framework for a standard set of options to build a default live system.
|
||||
You can also use various customizations for your live system with an automated tool that hooks into the Debian live framework.
|
||||
This tool is called Live Helper, and it comes with a GUI.
|
||||
It doesn't come with a GUI, but you can get the GUI quite easily. It's called Live Magic.
|
||||
The advantage of using this tool is that you can run through a set of options that you can find in the Man page.
|
||||
Basically, what you would do is you would run the config script and the build command.
|
||||
The config script basically sets a bunch of options in various config files and standardizes the build and then you run the build command.
|
||||
If you wanted to get into really customizing your build process, what you would do is you would run the configuration script.
|
||||
After that, you would bootstrap Che root through the accompanying Che root scripts and then Che root you were directory.
|
||||
After that, you can do pretty much anything you would if you were building manually.
|
||||
I think you would run your remove on all your Che root scripts and run your LH underscore binary script.
|
||||
If you have a good CD, change the name, move it to another directory, and then clean it with the clean command and your set.
|
||||
The thing about Debian Live is that it is highly configurable. You can specify as much as what mirrors you use during the bootstrap as well as the binary process.
|
||||
You can specify the security mirrors or bootstrap and binary, meaning bootstrap as when it builds the system and binary as when it is using packages.
|
||||
For the actual system, you are going to be booting up for the ISO is generated.
|
||||
You can specify your own repository in this manner. You can also specify your own packages and packages list.
|
||||
You can include any piece of software that you have been able to create into a binary or RPM if you have RPM installed onto your Debian system.
|
||||
I just entirely suggested that you use all Debian packages as this is a Debian system.
|
||||
The advantage is easy and you can also specify different build options as in the USB.
|
||||
I have used it many times, the USB stick. You do it in the same way as building a live CD, except for you just have to specify the dash B, USB dash HDD command.
|
||||
It is a little confusing, but once you see the help on the main page, it is very simple to specify.
|
||||
It is a little bit harder to build a live USB stick because the process is complicated because of the fact that it is on a USB stick.
|
||||
Aside from building with the live helper utility, you can include the GUI, which is very similar to what the Debian installer looks like.
|
||||
It does all the same options. It is just a little bit buggy because it is behind the development process of live helper for reasons unknown to me.
|
||||
It still works and you just have to make sure that you get the latest version from their Git Repositories and it works just fine.
|
||||
What I have used the live helper utility for and the Debian has been very supportive is for building live rescue disk for work.
|
||||
It works quite well to be able to rebuild a disk with a new tool on the fly or update the system and you can also build live USB sticks.
|
||||
As I mentioned, you can put it from DVD CD so if you are using a rescue disk, you can bring it with you, your live USB, your CD ROM, your DVD ROM.
|
||||
You can install to an SD card if you have to. It is a little bit more complicated but you can.
|
||||
I had created a SD card installation for my ASUS triple EPC of a live CD that I had generated with all they create.
|
||||
The necessary drivers and such patch kernel for the ASUS that comes with these Android OS.
|
||||
At this point I am going to talk about what I have been doing with the Debian live utilities.
|
||||
I am going to be trying to build a Debian from scratch live CD and so far I have a base system that boots from an ASUS on a CD ROM.
|
||||
I am trying to add in a way to the system from scratch out of the live helper utility.
|
||||
Simply add in another module of some sort that will hook into live helper and be able to be called from an option at command line.
|
||||
Right now I have created a development environment that I can use to create same builds, destroy back up.
|
||||
I have done this using the OpenVZ virtual private server software.
|
||||
Also known as a VirtualOzo.
|
||||
What I ended up doing was I created a VPS for a Debian mirror to download the official repositories.
|
||||
Then I created a second one where I could pull the sources of certain packages that I would be bootstrapping my system with.
|
||||
I compiled them all, destroyed my year from the official packages, pulled up a smear and created one out of the packages I had compiled.
|
||||
After that I started building my live systems with Debian packages that I had compiled with all the items I needed.
|
||||
Now I am in the process of putting a GUI with XORG and I am deciding on what window manager to use.
|
||||
At that point I have a working system with a GUI and a few tools.
|
||||
Then I will probably start working on the automated tool of helper and throw in my ID code and quite possibly submit it to their project.
|
||||
If they don't like it either way I have pretty much done what I wanted to do.
|
||||
The plan is to include the Enlightenment 17 window manager.
|
||||
The problem is that it is the best way to build it as I was told by the e-developers was that I need to get the Nightly CVS build and compile it and then keep those packages that I create from that source.
|
||||
Keep it handy for a month as I was told the CVS builds can be very unstable for e-17.
|
||||
So I might in the meantime probably keep something like fluxbox or window manager 2 or something of that sort that is very lightweight window manager that I can repetitively recompile very simply.
|
||||
And that is pretty much it for my podcast.
|
||||
I am probably going to go to sleep now. I hope you enjoyed my recording and have a great day.
|
||||
Thanks.
|
||||
Thank you for listening to Half Republic Radio.
|
||||
HPR is sponsored by Carol.net so head on over to C-A-R-O.N-E-T for all of us in need.
|
||||
Thank you.
|
||||
115
hpr_transcripts/hpr0040.txt
Normal file
115
hpr_transcripts/hpr0040.txt
Normal file
@@ -0,0 +1,115 @@
|
||||
Episode: 40
|
||||
Title: HPR0040: Sys internals Part 1
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0040/hpr0040.mp3
|
||||
Transcribed: 2025-10-07 10:39:24
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
I'm Zoke on IRC and I'm going to talk to you about the system tunnel suite.
|
||||
Used to be done by an independent company and now it got bought out by Microsoft so you
|
||||
may want to read the eulers very carefully.
|
||||
First programs in the system tunnel suite, I'm just going to go through some of them.
|
||||
You can go and google for them.
|
||||
Some of the main programs that I used to use at work and I think you'll find quite useful.
|
||||
So runs, this basically gives you a list of every program that automatically runs.
|
||||
It's quite good in the fact that it does search the startup folders, the registry keys,
|
||||
both the local machine and local user and a bunch of other places I'd never heard of.
|
||||
It gives you an option to remove all of them, you can go through and rip any of the crap
|
||||
that's on a machine out.
|
||||
This also includes a lot of the spyware you can look like to hide itself in odd places
|
||||
you can remove all that and clear up machines pretty well.
|
||||
Next up we have BG info, this puts text on the desktop.
|
||||
Yeah, exciting, isn't it?
|
||||
You can put the IP address, version info, specific build, numbers and stuff.
|
||||
We use it on the test machine so you can see what they were running.
|
||||
Blue screen, screens over the emulates, blue screen or death, you're going to have that
|
||||
just for putting on a friend's computer and watching them freak out as it blue screens
|
||||
on them.
|
||||
Filemon, short for filemonitor, this will monitor your files and show you what's accessing
|
||||
them.
|
||||
It's pretty much real time, it's going to take a fraction of a second touch, show on screen.
|
||||
Basically you can run filemon and then you have to do is remove or filter all the hard drive
|
||||
access that Windows does, which is a lot.
|
||||
Your antivirus is going to be in there, if you've got a file wall that's going to be in
|
||||
there.
|
||||
Windows itself opens a ton of files all the time.
|
||||
So you can just right lock on them and filter and remove them.
|
||||
But then you run the program that you're going to install, watch it install and it will
|
||||
show you exactly what it's installing where, which is very cool and useful.
|
||||
Handle shows the open files, any file handles that you have open on your system.
|
||||
So all the open files basically, that can be called to see what's got, what open, where,
|
||||
there's DLLs, there's DLLs, funnily enough, this can be cool if you've got DLL issues.
|
||||
A rather annoying problem we had at work was we had most of visual studio and then we
|
||||
had the crystal reports, sports separately.
|
||||
The version that came with visual basic was a very cut down crappy version of the full
|
||||
blame version of crystal reports, but it had a higher number on the DLL.
|
||||
So when we installed it, the program we used for rolling out all the software looked
|
||||
at it and thought higher number, installed that one and ended up breaking half the stuff.
|
||||
Things that Lissie allows will show you what open DLLs are on your system and you can
|
||||
check the version numbers from there.
|
||||
Log on sessions shows any logged on users on your machine.
|
||||
It's very useful to see if someone's logged into your machine remotely.
|
||||
For example, trying to do something like opening your CD-ROM drive, don't ask, there is
|
||||
a story behind that though.
|
||||
The HD-Frag will defrag a page file, that's what it says on the can basically, set it
|
||||
to a D-Frag on next reboot and reboot pretty much simple.
|
||||
Process Explorer, it's a very cool utility, it shows you what DLLs and any other things
|
||||
are being called by a program, so you select the program and then you can see exactly
|
||||
what it's calling.
|
||||
So if you're looking for missing DLLs, you can see what the program is looking for and
|
||||
specifically which calls in there.
|
||||
Now we come to the PS Tools Suite which is one of the most useful bits in my mind anyway.
|
||||
If for nothing else for then just for annoying or co-workers, you can download the entire
|
||||
suite but there are various bits inside there and I'll go through some of the main programs.
|
||||
PSExec, this executes files remotely on another machine assuming you have permission.
|
||||
At work we had local admin access on every single machine because we were the IT guys.
|
||||
You can use it to remotely install and register the DLLs for example on another machine
|
||||
which we were looking at to fix problems if they had DLL issues.
|
||||
Alternatively you could just take over a co-workers machine and make Internet Explorer,
|
||||
load up two girls, one cup or another website that Dan's told you about.
|
||||
File will show you any open files on a local or remote machine, this could be quite useful
|
||||
if you're trying to upgrade one of the files and you can't because someone's using it,
|
||||
you can see why.
|
||||
PSInfo shows you information about the local or remote machine.
|
||||
PSKill will kill a running process on a local or remote machine.
|
||||
Found this quite useful, a friend had a VMware session up and it crashed.
|
||||
He was running it full screen, couldn't do anything else on the machine.
|
||||
He phoned me up around PSKill, killed the process off from he got his machine back, managed
|
||||
to save the word document he had open and another window hadn't saved.
|
||||
PSList lists the running processes on a local or remote machine, this can be very useful
|
||||
in debugging.
|
||||
PS logged on shows who's logged on, finally enough.
|
||||
PSService, you can list start or stop services, very useful for debugging or even hacking
|
||||
a machine if you so desired and PS shutdown will make the machine shut down, finally enough.
|
||||
So you can go and copy some stuff over, set up services up to be started, whatever from
|
||||
to reboot and pretty much run anything you want from the machine remotely.
|
||||
Reg1, very similar to File1, instead of monitoring files, they're Reg1, monitors the registry.
|
||||
If you were so inclined you could find some shareware 30 day only program, run Reg1, run
|
||||
the 30 day program in Stooler, watch what registry files it changed where, delete the registry
|
||||
files, oh look you've got your 30 days back again.
|
||||
Of course there's no real point nowadays, you just have a virtual machine to do it and
|
||||
then you don't get any extra crap floating around on your machine.
|
||||
Hey it's there anyway, Rukit Reveals 1, I'll probably be talking about in a later episode.
|
||||
It's Reveals Rukits, the Sony DRM stuff came up and was found by this by Mark Rusnovich
|
||||
or however you pronounce the surname, run it, see what differences it thinks between the
|
||||
operating system and what's actually on the disk again, I'll talk more about that later.
|
||||
Just realised I pretty much guarantee that I'm going to be doing at least one more episode.
|
||||
That'll be it for this episode.
|
||||
In my next episodes I'll actually have to be good into windows and we'll go through
|
||||
some of the tools and some of the actual options you can do.
|
||||
Thank you very much for listening and if anyone wants to catch up on me, I'm normally
|
||||
on the IRC in the 3.0.net in the Ash Linux reality and Ash a lot of Linux links rooms.
|
||||
Thanks for listening.
|
||||
Thanks for public radio, HPR is sponsored by Carol.net so head on over to CARO.NC for all
|
||||
146
hpr_transcripts/hpr0041.txt
Normal file
146
hpr_transcripts/hpr0041.txt
Normal file
@@ -0,0 +1,146 @@
|
||||
Episode: 41
|
||||
Title: HPR0041: Codecs Part 3
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0041/hpr0041.mp3
|
||||
Transcribed: 2025-10-07 10:39:59
|
||||
|
||||
---
|
||||
|
||||
Music
|
||||
This is Hacker Public Radio. My name is Klaatu. I'm the host for today. This is
|
||||
episode three of an in-depth series on Codex. In the previous episode we spoke
|
||||
about compression which is as we found out in the first episode different from
|
||||
Codex but very very closely related. The different variables in compression as
|
||||
we learned in last episode are keyframes which is the number of eye frames or
|
||||
intra frames per second. We learned about frame rates which we discovered are
|
||||
perceptual not actual and they have everything to do with the perceived smoothness
|
||||
of the motion on the screen and there is of course a bitrate. That's
|
||||
important. Bitrate is the amount of information being sent from the source of
|
||||
the video out to whatever it is being shown on whether it's a media player
|
||||
on your computer or a TV via your DVD player or whatever. In this episode I want to talk
|
||||
about Codex versus transport formats or container formats and how to distinguish one from the other
|
||||
and then I want to get into a couple of the different Codex that are out there that
|
||||
you and I get to deal with. Codex are delivered to us or rather video that has been encoded.
|
||||
It is delivered to us in some kind of a file format of one sort or another.
|
||||
The most common one I guess is probably either .avi or .mp4. Sometimes you'll see .mpg.
|
||||
Of course you've got .mov.wmv. All these kinds of file formats that seem like that would be
|
||||
the Codex right. A lot of people will ask what kind of video is it and someone will say oh it's
|
||||
.avi which is basically like saying oh what kind of car is it. Oh it's an automobile. It's the
|
||||
kind of video file but it has nothing to do with the Codex that is contained inside of that video
|
||||
file. So how do we find out what Codex a file has actually been encoded in or with and what Codex
|
||||
conversely it needs to be decoded by. The easiest way I guess is just to crack open either VLC
|
||||
player or totem. Those are the two that I use most frequently VLC players really what I use
|
||||
typically. You open the video up in that and you look at the information tab and it will tell you
|
||||
what kind of stream the video it has been encoded in and it gives you a stream zero for the
|
||||
typically as the video feed or the video stream and then there's if there's sound there'll be
|
||||
another stream stream one that'll have the audio Codex as well and even a VLC can't play it for
|
||||
some reason if it's just some obscure video then VLC in my experience still is able to see
|
||||
what kind of Codex that video was encoded with you know it's just it's basically reading metadata
|
||||
from that file even if it can't play it. Don't confuse the container with the Codex so now you know
|
||||
there's no such thing as a .avi file there's also no such thing or there there is such a thing as a
|
||||
.mp4 that is not that that is a .mp4 so mp4 sounds like mpeg4 right well that's what it is
|
||||
but mpeg4 is peculiar because it's also a standard so you can actually have a .mp4 file that uses
|
||||
the mpeg4 Codex and yet at the same time you could have another .mp4 file that was encoded with
|
||||
say xvid or h.264 or something like that so you have to be kind of careful with with certain
|
||||
container formats bottom line I guess is to open it up in VLC or totem or something like that
|
||||
and just take a look in the in VLC it's in the information section and it just tells you the
|
||||
different streams contained within that file which is very helpful so more more than trying to
|
||||
decide like what Codex to use because one does one one thing better than another it's more about
|
||||
which Codex you want to use legally and which and what settings you have set for your compression
|
||||
so a lot of the burden is still on you as the compress or rather than the Codex which is simply
|
||||
the method of compressing it that's a general statement but it's really is it holds to be true
|
||||
a lot of times so there's there's two different things that we that we consider when we're thinking
|
||||
about compressing video there's the video downloads or the DVDs or whatever those are typically
|
||||
kind of nice because it's really kind of it's there's a limit just on the hardware in the software
|
||||
for bitrate so you can kind of predict what you want to do for that streaming video that's hard
|
||||
because there you don't know who is streaming who is receiving that data over what kind of connection
|
||||
they're they're getting it the data needs to be compressed it needs to be sent needs to be received
|
||||
and then reassembled and played live streaming is really hard because you've got video that's
|
||||
being compressed on the fly and being sent somewhere and received and reassembled and think about
|
||||
streaming for instance if I'm streaming video to someone and if if I have an iFrame or essentially
|
||||
what would be an iFrame and I send that well what if that iFrame doesn't arrive for a second
|
||||
but all the p in the bFrames do arrive well they're no good until that iFrame gets there and
|
||||
that's what causes like those that weird kind of digital distortion or or or even the the digital
|
||||
skipping of of the image when you're streaming video conferencing and things like that different
|
||||
codex we'll talk about a couple of different ones there is a standard of codex for for video
|
||||
there are a couple of standards I should say one of the most well-known is the standard that has
|
||||
put forth by the motion picture experts group they gave themselves that name they're not necessarily
|
||||
experts that's just what they call themselves motion picture experts group it's just a group
|
||||
like any other group that defines a standard you know they don't have any authority innately they're
|
||||
just making a lot of sales and they're making their products into standards so they came up with
|
||||
the impact for to kind of as I understand it to unify all web video and stuff like that it didn't
|
||||
work of course but it did it was accepted as a standard and so a lot of the come a lot of the codex
|
||||
that have come since then try to adhere to the impact for a standard now the impact itself the
|
||||
motion picture experts group itself also has I mean they're hardly an unbiased a society they have
|
||||
they have a number of impact codex that they license out which is of course why none of us Linux
|
||||
users can watch DVDs legally in most countries or maybe just the US I don't know you know it's all
|
||||
because of that whole thing they they own the impact technology they license it out to certain
|
||||
people and if you're buying your OS you are buying the license for the impact to format and if
|
||||
you're not buying your OS then you're not paying for that impact license and so you don't get to
|
||||
watch that stuff so luckily the the good the good kind of impact is impact for because at least it
|
||||
is a standard and it is kind of nice for that the evil stuff impact one impact two those things
|
||||
MP3 how could I forget that one impact three of course is an impact format so all that stuff
|
||||
is owned and licensed out by the impact uh society itself okay so let's talk about a nice free
|
||||
codec just get things started because that's always cheerful x-vid is an impact for compliant codec
|
||||
so it does it adheres to the standard quite quite well and it's a good thing that it does because
|
||||
it's actually it's really being adopted pretty well from what I can tell so it can be inside
|
||||
again like a dot avi or a dot mp4 container um x-vid is free as in free and free it is basically
|
||||
just it's a really good codec that aims toward compatibility it also has b-frame support so if
|
||||
you're doing the whole i b p b p p p i thing you can do that with x-vid not all codecs are
|
||||
going to support the b frames it also has a whole host of different pixel aspect ratio options
|
||||
so they can do hd so this is a very very broad codec that can do a lot of stuff it's a really
|
||||
nice one what does it lack not a whole lot not not a whole lot actually um it does not have
|
||||
interactivity built into its into its specifications so if you were going to do a menu where you
|
||||
wouldn't wouldn't want people to you know click on the screen to to choose i don't know the
|
||||
the next chapter or whatever x-vid alone wouldn't be able to do that but there are plugins
|
||||
that adds these kinds of features so there's really not not a whole lot that um that x-vid
|
||||
doesn't do really now the the hot new codec on the block that is not free um is h.264 this did not
|
||||
come from the in-peg society but it came from another society i don't remember it starts with a
|
||||
v i don't remember the name of it but it's it's everyone's really excited about it right now it was
|
||||
adopted by hd dvd and blu-ray as their format so instead of going with impact to uh it's actually
|
||||
going more with h.264 the good news about that is that h.264 is in-peg for compliant so it would
|
||||
be a lot easier for Linux people to be able to watch that because it's it's it's it's an open
|
||||
standard or it's a it's a standard um that does not require licensing um so there's all there's
|
||||
a codec out there right now called x.264 which is very similar in terms of trying to get around any
|
||||
kind of licensing issues and legalities h.264 is kind of a good thing for for Linux users although
|
||||
it's not a free or an open of codec by any means it is a pretty robust codec though
|
||||
uh very similar to x.264 in the sense that it can do a very wide color space it can uh extend
|
||||
itself according to what what it's going out to so if if you need there to be you know a very high
|
||||
bitrate version for for for a big screen tv but then a lesser bitrate for standard definition or
|
||||
something like that you can you can you have that kind of flexibility with h.264.
|
||||
Divix a lot of people have heard of divix that is basically it's it's a it's another dvd spec
|
||||
actually it's kind of a competitor in in a way to impact to although it's kind of a competitor
|
||||
at the same time to impact for it it is impact for compliant as far as i know um it it does have
|
||||
support for interactive menus and chapter points so it's a lot like the dvd spec in that sense
|
||||
it's got x sub for sub titles has the ability to do multi audio multiple audio tracks so you can
|
||||
switch between soundtracks uh and it has x tag for tags that are basically like id3 id3 tags for
|
||||
np3 so it's it's kind of a it's a consumer video oriented codec that gives you you know if you
|
||||
were a business and you wanted to license that you could do that and you would have those features
|
||||
if you didn't want to license it from impact for like the impact to standard those are kind of the
|
||||
big i guess consumer oriented codecs i mean obviously there are so many more windows media windows
|
||||
media audio uh real real audio there's just so many there's there's three three ivx which actually
|
||||
interestingly has codex for linux bos and amiga believe it or not uh there's huffy uv um there are
|
||||
codex that avid has released there are codex that apple has released codex um well even dv like i
|
||||
was saying in a previous episode dv is in addition to being a tape format that we tape video onto
|
||||
it's also a form of compression because the video wouldn't fit on that tape if it weren't at
|
||||
initially compressed so they would fit on the tape the business model of all of this
|
||||
is quite clever i guess the typical way that these companies that just invent arbitrarily
|
||||
invent these codex is that they they provide the consumer a free download so the consumer gets
|
||||
to download for free the decoder the thing that will enable the consumer to consume the content
|
||||
and so it seems like it's free it's it's very nice and friendly they're going to the big companies
|
||||
and selling the companies this codex solution so that the company can use for instance real
|
||||
to encode video in such a way that no one else can get to it you know so that's protecting their
|
||||
content and the only way for someone to get to it is to get this free decoder and the decoder will
|
||||
have whatever it needs to have whether it's advertisements that you have to sit through before
|
||||
you can watch the content or whether it just simply cost the company that's encoding the content
|
||||
more money to license that technology one of the big keys usually is trying to lock that content
|
||||
in which is why impag 2 is completely unfriendly format you know it you can only you can see it but
|
||||
you can't touch it you can never you can't really pull an impag 2 very easily and edit it you
|
||||
usually have to transcode it first or if you can then some company somewhere has paid a lot of money
|
||||
to license the ability to to edit that content so it's it's all based on who's paying what
|
||||
amount of money for what ability you know to do what process to the video it's it's a huge business
|
||||
we're going to get into even more codec dealers in the next episode and I'm saving it I thought
|
||||
this might be the last one but I think I've run out of time so I will I will do one more episode
|
||||
in which case we'll finish up some of the codex some of the more specialized codex and then of course
|
||||
the great aug collection of codex and maybe I'll go into a little bit of a line command on how to
|
||||
get something into aug thanks for listening this has been the hacker public radio thank you
|
||||
for listening to hacker public radio hpr is sponsored by caro.net so head on over to caro.nc for all of the
|
||||
78
hpr_transcripts/hpr0042.txt
Normal file
78
hpr_transcripts/hpr0042.txt
Normal file
@@ -0,0 +1,78 @@
|
||||
Episode: 42
|
||||
Title: HPR0042: Zune Review
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0042/hpr0042.mp3
|
||||
Transcribed: 2025-10-07 10:39:55
|
||||
|
||||
---
|
||||
|
||||
Welcome to another episode of HBR. I'm your host Enigma and today I will be
|
||||
talking about a new little toy I got. It's a Zoom 30-Yig MP3 player, video MP3
|
||||
player. I wanted to talk about the pros and cons of this versus the iPod and
|
||||
before everybody yells at me for being a sellout and getting a Microsoft
|
||||
product. The only reason that I purchased this was I got a good deal because I
|
||||
recently bought a new laptop and I got a deal at Circus City with the
|
||||
Zoom and the laptop. I think I got those soon for 80 bucks and it was like
|
||||
price point was like 140. So I'll get started with the pros. The thing that
|
||||
attracted me the most for this MP3 player was the large screen. It's got a
|
||||
three-inch screen that's got a beautiful display and that's what first caught
|
||||
my eye and the reason that I even asked about it. It also has a very easy
|
||||
interface. The sync software is in my opinion a lot less annoying than the
|
||||
iPods sync. I've had issues with the iPods sync on a Windows box all the
|
||||
time in the past and the Zoom software I haven't had issues since it's a
|
||||
Microsoft product I would hope I wouldn't. The price point for the 30-Yig
|
||||
video iPod I believe is a little bit steeper than I think. I want to say it's
|
||||
around 150 bucks. I got mine for 80 again. The normal price point is 140 so
|
||||
they're about the same. The battery life I was actually impressed with I got
|
||||
I've never actually clocked it on the video side but I get about 10 to 15
|
||||
hours on the audio side and I've never really clocked it from you know
|
||||
straight continuous play. It's been interrupted so I'm sure that it's not a
|
||||
very good guide for that. Another nice feature is it has a wireless sync which
|
||||
I was kind of impressed with. I still need to play around with it a little bit
|
||||
but you can if you're within your home network you can specify your SSID and
|
||||
your web or WPA key in the sync software and it'll automatically sync to your
|
||||
computer that you have the whatever you specify is in its library so if you have
|
||||
like a file server you can wirelessly sync to that file server. It's also got
|
||||
a build-in FM radio and I found this kind of neat. I don't even know if the
|
||||
iPod has this but you know if you want to listen to the radio you can. Another
|
||||
feature that I haven't tested yet but I want to play around with is it's
|
||||
compatible with the Windows Vista home premium and ultimate support for the
|
||||
DVR codec which is their codec for their media center and you can record
|
||||
movies or TV shows from your Windows media center with a TV tuner and
|
||||
actually play it back on your zoom which I don't know how that actually
|
||||
works so I want to play around with it and see see what I can get out of it. The
|
||||
cons the software only works in Windows it doesn't have any wine support at
|
||||
the moment in Linux and there's plenty of hacks out there for the iPod I
|
||||
haven't found a lot for the zoom probably because it's you know Microsoft
|
||||
product and it's proprietary and but if anybody knows of any cool hacks with
|
||||
the zoom please let me know you can email me at the site or the feedback
|
||||
link whatever because I'd really like to play around with this and the other
|
||||
con is not enough codec support I'll go through the codex right now it
|
||||
obviously supports WMA for video it supports mp3 for audio mp3 playlist
|
||||
I'm sorry WMA with Windows Media Audio and WMV for the Windows Media video as I
|
||||
said it supports the Windows Media Center DVR which is the dot DVR MS it
|
||||
supports zoom playlist obviously it supports mp4 video it supports mp4 it
|
||||
supports AC audio created with the ACLC audio codec m4a and m4b I've never
|
||||
seen that codex so I don't know much about it but the zoom supports it and
|
||||
that's about it so a lot of the codex like your DIVIX codex and that aren't
|
||||
supported natively which means you would have to convert them to one of these
|
||||
codex and then let the software or the zoom software sink it up it won't see
|
||||
anything in your library in the zoom software that isn't in that isn't in
|
||||
these codex so you would have to convert it and then stick it in the folder that's
|
||||
your zoom library to get it to recognize to even sink to your zoom which I
|
||||
think's a little bit of a downfall I think it should have a little bit more
|
||||
support but again it's a Microsoft product so what can you expect all in all
|
||||
I've been very happy with my zoom I don't do a lot of things with basically the
|
||||
only thing I got for this mp3 player for was for audio listen to work and to
|
||||
store you know hack TV and hack five and a couple of the podcasts pure
|
||||
pronage a couple of podcasts that I or the video casts that I watch a lot so I
|
||||
can watch them in the airport or watch them on the plane whatever I wanted to
|
||||
it's got a very pretty screen so you can watch it for hours which I did like
|
||||
most of the video iPods that I've seen or video mp3 players whatever you want to
|
||||
call them have such a small screen that I but I really don't like but this one
|
||||
has a nice big screen and I do enjoy it so that's all for today if anybody's
|
||||
interested in contributing to pack a public radio please let me know we're
|
||||
always in need of backup episodes and if you want to be a monthly host I'm sure
|
||||
we can work something out in the rotation so email me at admin at
|
||||
hackerpublicradio.org or if you have any comments about this show or any show
|
||||
you know you loved it you hated it whatever you want to comment about please
|
||||
email feedback at hackerpublicradio.org and have a nice day
|
||||
68
hpr_transcripts/hpr0043.txt
Normal file
68
hpr_transcripts/hpr0043.txt
Normal file
@@ -0,0 +1,68 @@
|
||||
Episode: 43
|
||||
Title: HPR0043: Docdroppers
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0043/hpr0043.mp3
|
||||
Transcribed: 2025-10-07 10:40:19
|
||||
|
||||
---
|
||||
|
||||
Who?
|
||||
Hello, and welcome to another episode of Hacker Public Radio.
|
||||
I'm Walt Herbert, and I'd like to talk just briefly the day about dockedroppers.
|
||||
That's www.docdropeprs.org.
|
||||
The site was set up as a wiki of the digital dog pound to not only function as a repository,
|
||||
but also to showcase hacking-related information.
|
||||
Of course, the site is primarily for the community, but as a public web page, it's also serving
|
||||
as an ambassadorial page to those who may be researching hacking in its culture.
|
||||
The articles range anywhere from programming tutorials to caffeine.
|
||||
The content is inclusive of anything and everything related to hacking really.
|
||||
Amongst articles on freaking Linux how-tos and custom antennas, you'll also find some
|
||||
more obscure articles.
|
||||
For example, bios of some not so famous, but just as noteworthy hackers, social engineering
|
||||
techniques, and even military jamming procedures.
|
||||
It's all there, and more is always welcome.
|
||||
If you're just stopping by to check out the page, I would recommend using the random page
|
||||
link on the navigation menu.
|
||||
Hopefully you'll stumble upon something that you may not have even realized is of interest
|
||||
to you.
|
||||
Microsoft is contributed to and maintained by members of the community.
|
||||
Over the years, there have been so many contributors that would be impossible to thank everyone
|
||||
in the time allotted.
|
||||
This however, by no means diminishes the gratitude or appreciation of everyone's efforts.
|
||||
Anyone who wishes to contribute an article, regardless of which particular community you
|
||||
may belong to, if any, may do so by simply registering at www.doctroppers.org and following
|
||||
the directions on how to submit in the health section.
|
||||
Word to the Y-zo, please do register as MediaWiki, while otherwise display your IP address.
|
||||
Doctroppers is a not-for-profit page, so you may choose your work to be licensed under
|
||||
the appropriate canal or a Creative Commons license.
|
||||
This is done simply by tagging the end of the article.
|
||||
You need not worry if the essay that you wrote for class or the manual you wrote for your
|
||||
co-workers is appropriate for the site or not.
|
||||
It's an edited site, so in the event that something is not quite appropriate, it will
|
||||
simply be removed.
|
||||
So there is no risk in submitting.
|
||||
As mentioned before, the site employs MediaWiki, and because articles may be revised by multiple
|
||||
persons and in some cases outright corrected, there is a degree of assurance as to the
|
||||
integrity of content.
|
||||
If you're just beginning to explore the hacking world, much like myself, I'm sure you can
|
||||
appreciate the importance of accurate information.
|
||||
The MediaWiki set up also allows articles to be easily searchable as well as categorized,
|
||||
and this is especially useful if you're looking for information on specific subject matter
|
||||
in a hurry.
|
||||
As of late, doctroppers.org has also been functioning as a sanctuary of sorts.
|
||||
There are some people on Wikipedia who have been somewhat, and let's just say they've
|
||||
been somewhat over-revisionist in their views of what is notable enough to be considered
|
||||
a Wikipedia article and what is not.
|
||||
Apparently, a large amount of hacking history is not notable.
|
||||
And at time when the common media is tarnishing the meaning and history of hacking, to have
|
||||
the positive aspects emitted from a repository like Wikipedia is especially disheartening,
|
||||
the rejected articles must be preserved.
|
||||
So rather than battling for consensus, we've simply been moving articles over to doctroppers
|
||||
one by one.
|
||||
If you would like to help in this process, there are also detailed instructions in the
|
||||
doctroppers help section.
|
||||
Regardless of your contribution, your assistance would be greatly appreciated.
|
||||
And speaking of contributions to the community, if you would like to record your own episode
|
||||
of HPR, you may do so by visiting www.packerpublicradio.org and clicking on the link that says contribute.
|
||||
Thank you for listening and have a good day.
|
||||
Thank you for listening to Hack Republic Radio, HPR is sponsored by Carol.net, so head on
|
||||
over to C-A-R-O dot-E-C for all of us in need.
|
||||
201
hpr_transcripts/hpr0044.txt
Normal file
201
hpr_transcripts/hpr0044.txt
Normal file
@@ -0,0 +1,201 @@
|
||||
Episode: 44
|
||||
Title: HPR0044: My desktop, and the apps I use everyday
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0044/hpr0044.mp3
|
||||
Transcribed: 2025-10-07 10:41:30
|
||||
|
||||
---
|
||||
|
||||
Music
|
||||
This is Hacker Public Radio and my name is Dave and in today's episode I am going to
|
||||
be talking about something near and dear to my heart and that is my desktop, my computer
|
||||
desktop specifically, my everyday computer, my laptop, the one that gets 95 to 99 percent
|
||||
of my away from work, computer usage, and I want to talk about the applications, the
|
||||
desktop applications that I use every day, the ones I cannot live without, the ones that
|
||||
are there when I need them, or there when I am not even thinking about them, the ones
|
||||
I use all the time I guess I should say, and these will be in no certain order and they
|
||||
will also be very short on the how to part of it and how to make these things work,
|
||||
there will be more what they do, some of these you have probably heard of maybe hopefully
|
||||
a lot of something you have or some of them you have it, they are all relatively common.
|
||||
I will talk about the most common one first and most briefly and that is Mozilla Firefox.
|
||||
Almost everybody uses this browser now, everybody that knows anything about browsers will
|
||||
use Firefox, and I guess specifically I am a heavy Firefox browser user, I have had
|
||||
up to well over 150 tabs up at one time, there are better ways to surf the web than that
|
||||
I am sure, but so I make heavy use of the tab mix plus extension and also heavy use
|
||||
of the Google Notebook extension, those are the two I seem to use the most, that is all
|
||||
I will say about web browsers, well except this as far as email goes, I am relying more
|
||||
and more on Gmail for domains, it is like having your, letting Google host your email server
|
||||
not for the paranoid I am sure, but either way I find myself using Mozilla Thunderbird less
|
||||
and less every day, I guess my desktop is what I am talking about next, I use FluxBox,
|
||||
I use FluxBox because FluxBox is everything I need in a window manager, it is not a desktop
|
||||
environment, FluxBox does not come with any applications that do anything, but desktop
|
||||
manager kind of stuff, window manager kind of stuff I should say excuse me, comes with
|
||||
iconbar, it comes with a root menu and it comes with a desktop slit which is an invisible
|
||||
invisible portion of the desktop where you can put dock apps or you can dock GKRILM which
|
||||
is a system monitor tool that I will talk about briefly, so that is my desktop I use FluxBox
|
||||
and I can't, I have used just about every window manager or desktop environment there
|
||||
is over the last 13 or 14 years for Linux, I will not get into that history but FluxBox
|
||||
is where I have landed and have stayed probably the longest, like I said it does exactly
|
||||
what I need, it manages my windows, it has an iconbar or it has got a clock, that is about
|
||||
all I need, the best part to me about FluxBox, as good as it being lightweight, right there
|
||||
with that is the root menu, it is a simple text file and it is zero earning curve, if you
|
||||
can read you can edit this thing and make your root menu be exactly what you want it to
|
||||
be, it is heavily themeable, there are lots and lots of themes for FluxBox and keyboard
|
||||
shortcuts are also very easily done, again with this a text configuration file, Blossom
|
||||
BLOSXOM is the blogging software I use, I have not talked about Blossom in a long time
|
||||
on any kind of recorded, or even really think about it much because I use it every day
|
||||
and I set it up a long time ago and I just don't think about it anymore, Blossom is a
|
||||
pro script that is also blogging software and Blossom will allow you to do almost everything
|
||||
you can do with a traditional blog application and a little bit more, it does not limit
|
||||
you really, but it is a simple blog and you blog using your favorite text editor, you
|
||||
can blog over SSH Connection, I use VIM and SSH to blog remotely and it is really customizable
|
||||
and really lean and it is just a text editor's lovers blog application I guess you would
|
||||
say, if you don't want to use the web application to blog, if you are going to be able to blog
|
||||
anywhere you are, this is for VIM and blog away, I really, really like Blossom, it is easy
|
||||
to set up, there are lots of modules you can add, it is a simple application that does one
|
||||
thing and does it really well, so if you are looking for some blog software that is pretty
|
||||
lightweight and very lightweight and beautiful in this application, check out Blossom.
|
||||
I mentioned SSH, SSH is the secure shell and most of you know what it is, but this is one of those
|
||||
applications that I cannot live without if I go on vacation or if I am at work or if I am away
|
||||
from my laptop or other computers at home, I begin to miss them, I have been known to carry photos
|
||||
of my computers with me, I have been known to hang them in my cubicle, I am not really that attached
|
||||
to them as much as it is, I like to look at them some, but I don't know what I would do without
|
||||
SSH, being able to log into my computers remotely is, brings me great joy, so SSH is really
|
||||
cool too, I host my web server off a home DSL connection, a computer in my five year old
|
||||
daughter's bedroom, used to be my computer room, Mr. Bedroom now, that is why I left the server,
|
||||
the rest of the computer to move those stairs, but when it goes down which DSL is like to do sometimes,
|
||||
I want to do, I often times, well it is a DSL down I can't, but if there is something I need to do,
|
||||
if there is something I need to get, there is something I need to tweak, SSH allows me to do this,
|
||||
and SSH is good for port forwarding and getting around firewalls too, occasionally,
|
||||
along with SSH, I should mention SSHFS, Secure Shell file system and the Fuse module, Fuse package,
|
||||
I guess it is a Fuse kernel module, file system and user space, and the fish protocol,
|
||||
I use all three of these things together, SSHFS specifically to mount my music directory,
|
||||
my music server upstairs, I can mount this remotely via SSHFS anywhere in the world if I wanted to,
|
||||
I can mount it on from any of the computers, so I have access to that music wherever I'm at,
|
||||
there is another way to do that which I will talk about shortly as well, Fuse is used along with SSHFS,
|
||||
it allows you to mount locally those file system over SSH, which is pretty cool, so if I am using my
|
||||
favorite file manager, email FM2, I can use SSHFS to mount a file system on another computer
|
||||
in my own network via SSHFS, and fish is a protocol that is built into the conqueror web browser
|
||||
that allows you to do the same thing, I am not going to get into how to use Fuse and Fuse and SSHFS,
|
||||
it is not that hard, but fish and conqueror allows you drag and drop access across file systems
|
||||
over SSHFS, which is really cool, lots of times you can just do this stuff and I do this stuff
|
||||
over the command lines, sometimes I use email FM2, but if I am managing files, actually moving stuff
|
||||
around like when I do a podcast and I want to archive or move the current project folder that I
|
||||
just, the episode folder I just worked on to another machine, it's easy to drag and drop and
|
||||
and move media files around specifically using fish, let's see, other problems that I use on a
|
||||
database is storm siring, now you may not have heard of this one, this is a Python script I think,
|
||||
and there's no one of those problems that I want you to set up, you will forget about,
|
||||
but you will be glad it's there, if you live in an area of the country similar to the one I live in,
|
||||
I live in an area of the country that is prone to thunderstorms and occasional tornadoes,
|
||||
and storm siring is a program, it's just a little script that runs, you can figure it by telling it,
|
||||
what county you live in, what state you live in, what counties you want to keep up with as far
|
||||
as weather alerts go, and storm siring will send you an email or a SMS message via your cell phone
|
||||
whenever there is a national weather service, weather warning, I'm a bit of a weather geek and I like
|
||||
having a phone call whenever there is a storm warning, I just like knowing that stuff, so storm
|
||||
siring is really cool, let me go back to fluxbox real quick, one thing I forgot to mention is I've
|
||||
been using the same fluxbox theme probably for at least two years maybe three years, now I found
|
||||
when I really like a lot and it's called, it's hard to pronounce, new wave attack, and the E
|
||||
in tech is a, is it the number three dash glacier, so it's a new wave attack, dash glacier,
|
||||
and you can find this, if you just Google Clowner wallpapers, you will find, I think it's
|
||||
it dugnet.org or something like that, but you'll find Clowner's website and he has some fluxbox
|
||||
themes there, and that is when I really like a lot, and if you'll sit the alpha transparency around
|
||||
145, for everything you can, menus, icon bar stuff like that, it looks really nice, it's a black and
|
||||
blue thing, like I said if you sit the transparency, about 145, and you have like a blue desktop
|
||||
background, this thing is this sharp looking, I've not grown tired of it after two and a half years,
|
||||
I like it a lot, it's beautiful, I think I was talking about screen, screen is sort of a console
|
||||
based, window manager, most of you probably already use screen, but screen with SSHFS
|
||||
allows me to, from worker, from wherever I am, simultaneously log into all eight of my computers,
|
||||
remotely, and that is just cool, I don't care who you are, that's cool, if you can log into
|
||||
eight computers simultaneously, that's cool, and theoretically you can compile and start a
|
||||
kernel compile on all eight of them, and then detach the screen and come back later,
|
||||
that's just like power, I like that, GK-R-E-L-L-E-M2, I don't know, I can't remember there's a
|
||||
two behind it, this probably has been around a while too, and it is a desktop system monitor,
|
||||
and I do not use it in a traditional sense, I put it, this is not so novel or non-traditional,
|
||||
but I put it in the bucket in the fluxbox slit, most people do that if they run fluxbox,
|
||||
but I don't run any of the system monitor tools that come with GK-R-E-L-L-M, none of
|
||||
all, the only thing I use it for is I use a plug-in called Garellacam GK-R-E-L-M-K-A-N,
|
||||
K-A-E-M, Garellacam, I may be spending it wrong, that's house pronounce, and it is a webcam plug-in,
|
||||
and it will monitor and update up to five and make an air quotes, webcams, and these,
|
||||
I use it not to monitor webcams, but I use it to monitor images that change on a periodic
|
||||
basis, and you can set the pole period, the pole time, how often you want it to update these images,
|
||||
so I have it set, for instance, to grab the Doppler radar image from my local television station,
|
||||
some radar images or satellite images from National Weather Service,
|
||||
front maps, stuff like all weather-related images, and I have this plug-in update the image,
|
||||
I think like every five minutes or something, and you can like middle-click on it to do an automatic
|
||||
update, so if you like having something like that at your mouse-click fingertips, that's nice,
|
||||
and I used to use, I forget the name of the other plug-in I used, so I won't talk about it,
|
||||
I forget about it, but I don't use it anymore, I mentioned E-M-E-L-F-M-2 and conquerer both briefly,
|
||||
E-M-L-F-M-2 is my favorite file manager, it is a two-paint GTK-2-based file manager that is based,
|
||||
I'll roughly based off of E-M-L-F-M, the first iteration of this, the GTK-1 version of the
|
||||
file manager has been around a long time, E-M-L-F-M-2 is GTK-2-based, and it's a two-paint file manager,
|
||||
I think Mid-Night Commanders have GTK-2-based, and much, much more configurable, it's really nice,
|
||||
it does just about everything you need, there's some things that doesn't do very well, but it's nice,
|
||||
I've been using it a long time, and for a quick and dirty moving of files around, it's nice,
|
||||
I like Mid-Night Commanders 2, I use it occasionally, but E-M-L-F-M-2 is one of those applications that's
|
||||
almost always open on my desktop, it is always open, and the other is Cochra, Cochra, I use only
|
||||
as a web browser, excuse me, I do not use it as a web browser, I use only as a file manager,
|
||||
and specifically only for the fish protocol to move files and directories across different
|
||||
computers on my network, and Cochra is, this works wonderfully for that, for that,
|
||||
VIM, I've mentioned also briefly, VIM, if you use Linux at all, I mean for any length of time,
|
||||
you're going to have to get familiar with the text editor, the first one I ever used with E-Max,
|
||||
I used it for a couple of years, and I used XE-Max, and but a long time ago, I don't know when it was,
|
||||
probably 9 or 10 years ago, I switched to VR or VIM, and haven't gone back since, it's good to know
|
||||
all of them, or be basically familiar with all of them, because you don't know where you're going to
|
||||
get, VIM is probably on all of them, E-Max seems to be sort of less common these days, but
|
||||
you know it's Pico and Nano, but VIM is just the best, it's a wonderful program, and I'm
|
||||
preaching to the choir because most of you have already heard of it as well. Another program I use,
|
||||
almost every day, well not almost, I use at least once or twice a week seems like is List
|
||||
Garden, and I use this to edit and create RSS feeds, or XML files for RSS feeds for the podcast,
|
||||
for my podcast, for the E-Club podcast, for HPR, and it is a Java-based RSS feed generator,
|
||||
and it does it very well, I forget the guy who developed it, I forget the name of the website,
|
||||
and I forget some of the other applications he's done, but you can Google List Garden,
|
||||
and when I first started doing my podcast in December 2005, I've never seen XML files, but I've
|
||||
never created one, and it's not something that I really wanted to do by hand, as you do add
|
||||
episode, you can become tedious, and List Garden was the first program I used, and it's the only
|
||||
one I've ever used since then, it's really nice and allows you to create RSS feeds from a number of
|
||||
things, I mean you can create RSS feeds, there's a lot of options, like I said it's web-based,
|
||||
it's Java-based, it's cross-platform, it's portable, you can put this on a thumb drive,
|
||||
it's just really nice, and you have to use it and see it to appreciate it, but there are
|
||||
lots of options in here to tailor make the RSS feed to your needs or liking, and it's not just
|
||||
far podcast, you can turn static HTML pages into RSS feeds if you want to, check out List Garden
|
||||
if you need something like that, Easy Tag is one I use some, because I'm not taking the time to
|
||||
find out, another way to do tagging of MP3 and org files, but there are lots of different ways
|
||||
to do this, including command line ways, audacity is the other one that I probably couldn't live without
|
||||
being a podcaster, and one last one I want to talk about is MPD, the music player name,
|
||||
the music player name is a program that allows you to access music files remotely using a client,
|
||||
and it's also a really good desktop or local music player, what it does, I'm not going to get into
|
||||
the how-tos and why-tos and all that, but it runs as a Damon, you put it on your music server,
|
||||
on a computer where all your music files are, then you create a database, and then it's going to
|
||||
load the database, you're going to issue a command, MPD, space, dash, create, DB, and it's going to
|
||||
load the database into memory, and it takes up very little memory, this thing's very lightweight,
|
||||
you won't even know it's running, I mean it may take up one or two megabytes of your memory,
|
||||
and then you need a client to connect to it, and there's lots of clients, there's command line
|
||||
clients, there's window-based clients, OSX-based clients, there's GTK and KDE-based clients,
|
||||
I use mainly MPC, it's a music player-damer client for the command line, and I use Sonata,
|
||||
which is a desktop GTK-based application, and configuring MPD isn't hard, it's not,
|
||||
dropped it simple, I mean it seems like you always find foreign posts about people that have
|
||||
gotten stuck, but it's not hard at all, there's a small less one configuration file,
|
||||
and it's in your home directory is .mpd.conf, I think, or if you want to say it globally,
|
||||
it's in atcmpd.conf, and it's pretty easy to say, it goes up a port, it normally runs on port,
|
||||
6600, you need to set up your music directory, and you need to tell it where to put,
|
||||
any music director's wherever it is, but you need to tell it also where to put the playlist
|
||||
directory, the database file, the log file and error file, those are normally capped in your
|
||||
home directory in a hidden .mpd directory, and once you've got that set up,
|
||||
and you fire up your client, whether it's console-based or not, and you just connect to the server,
|
||||
you'll have to configure the client to tell it your server settings, but this is a really
|
||||
neat program, I like it, I mainly, I use Sonata when I want to search for music, Sonata is a
|
||||
GNOME-based graphical front-end client for .mpd, and it's really elegant, and it also plays streams.
|
||||
Oh, .mpd will also allow you to stream your music to an oscast server, by the way, that's just
|
||||
something you can figure in the config file, but mainly I use .mpc, and I have, in my Fluxbox
|
||||
root menu, I have some custom launchers built in there, just a little bash grips, telling .mpc
|
||||
what to do, I can load the playlist, I can skip to the next one, I can stop it, I can go forwards,
|
||||
backwards, that pauls, that kind of thing, all from the Fluxbox root menu, I've assigned hot keys
|
||||
in the Fluxbox keys file, and I use Conkey, mainly for just some kind of visual clue as to what
|
||||
song is being played, so you know, it keeps Conkey running, but really the only thing I pay attention
|
||||
to is what song is being played, if even that, so there in a nutshell is my Linux desktop,
|
||||
I know a desktop screenshot would have probably been, just a little bit easier, but I like to talk
|
||||
about Linux, and I like to talk about stuff on my desktop, and you know, desktops are labors
|
||||
and I love my desktop, so, I hope you love it too, until tomorrow's HPR says they've signed it off,
|
||||
at endim, right after Dave recorded this HPR episode, he realized that he forgot to mention a
|
||||
couple of apps that he uses almost every day, not wanting to leave them out, I'll mention them here,
|
||||
gftp, the ftp client, and xchat, the irc client, he was also wrong about the next HPR episode,
|
||||
being tomorrow, it's not until monday, that is all, have a happy leap day!
|
||||
122
hpr_transcripts/hpr0045.txt
Normal file
122
hpr_transcripts/hpr0045.txt
Normal file
@@ -0,0 +1,122 @@
|
||||
Episode: 45
|
||||
Title: HPR0045: Shell Scripting
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0045/hpr0045.mp3
|
||||
Transcribed: 2025-10-07 10:41:18
|
||||
|
||||
---
|
||||
|
||||
Song by
|
||||
Hello and welcome to episode 45 of Hacker Public Radio.
|
||||
Today I'm your host, Doss Man, and today we're going to talk about shell scripting.
|
||||
So what exactly is shell scripting versus other programming languages?
|
||||
Basically, shell scripting is just a quick and easy way of stringing together several
|
||||
different commands that already do the work you need to do, but you just need to automate
|
||||
that.
|
||||
And there's a lot of different ways to use shell scripts and whatnot.
|
||||
There's a lot of different shells.
|
||||
Now what other kind of examples might there be or what would make us different from
|
||||
other programming?
|
||||
Something like say, Perl would be probably a little bit better solution for a lot of things,
|
||||
but for whatever reason, if you already know shell scripting, there's nothing wrong with
|
||||
using that as opposed to Perl.
|
||||
Perl is a little bit more programming, shell scripting or shells, corn shell, born-again
|
||||
shell, bash shell, sea shell, all those.
|
||||
There were their own unique syntax, basic looping capability, variables, and whatnot.
|
||||
So they provide some basic programming functionality for the typical Unix Administrator or anyone
|
||||
else, per se.
|
||||
So I guess we'll jump into what really is the written butter of shell scripting.
|
||||
But a lot of that is basically mostly using other commands.
|
||||
You're just manipulating other commands to do your bidding in an automated fashion.
|
||||
Other commands, mostly like the Unix Utilities, like Cat, Soar, Grip, Head and Tail.
|
||||
You're basically saying you need to analyze some log files automatically and send yourself
|
||||
a notification.
|
||||
Well, you know, you just use Grip to extract out, you know, look for certain strings,
|
||||
like saying you're a sys log.
|
||||
And then if there is a match found, you can use, you know, like mail X or mail or some
|
||||
dogmaically send yourself an email to your cellphone or whatever when there's a problem found.
|
||||
So of course, really what you're learning is the syntax of all these external commands
|
||||
that you're using for the shell script and then just, you know, learning how to string
|
||||
them together through the use of the shell.
|
||||
There's also a bit more complicated shell or not shell, but Unix Command, like said
|
||||
in Ock.
|
||||
I wouldn't exactly call this complicated, but there's a lot of functionality in those
|
||||
two commands right there that you can do.
|
||||
And it's kind of funny to see over and over new programming languages, we implement with
|
||||
these two commands had, you know, years ago.
|
||||
So you know, there's a lot that you can do.
|
||||
You can pretty much do anything that you would normally do in Perl and a shell script.
|
||||
But the, it may not be quite as efficient because the way you have to interact with the
|
||||
commands, you know, but said in Ock, give you a lot of ability there, like, uh, Ock typically
|
||||
I'll use that for extracting columns, like say you have some output and you need to separate
|
||||
based on, you know, a common delimiter, you can use an Ock with a dash f flag and then
|
||||
a comma and it'll separate.
|
||||
And then, uh, then I, you know, do a print and a dollar sign, uh, three to get the third
|
||||
column separated by semicolon or colon, comma, I said.
|
||||
And, uh, so, you know, you can cut up your data in certain ways.
|
||||
Ock, you could actually do in your entire script probably and said just said or just Ock.
|
||||
They're a very full featured, uh, programs, but I only use a very tiny subset of their
|
||||
features typically said is really good for, uh, of course, said is the stream editor basically
|
||||
it's just a line at a time editor and you perform functions based on a line, uh, a, you
|
||||
know, based on a single, you know, field per se.
|
||||
And so you could, uh, a lot of times I'll do like a, uh, substitution and that's real
|
||||
handy way of basically match the string and then change it to this other string or also
|
||||
another way you could use that, uh, I use that a lot to just blank out a certain portion
|
||||
of the string that I don't want.
|
||||
Um, so if this, if this, you know, find the string and just remove it from my, my input
|
||||
line, uh, Ock, again, looks at the whole document and sort of works on columns, although
|
||||
that it's not the only thing it does.
|
||||
But, uh, now there, there's a lot there, um, now also a lot of what people probably use
|
||||
and what I use are third party tools, uh, that are not, I wouldn't say classic Unix tools
|
||||
but these days pretty much are like, say, W get, um, I'll use that a lot to retrieve things
|
||||
for myself and, uh, do that in an automated fashion like all, uh, one script that I use
|
||||
that's, uh, fairly, got to be fairly large for a radio station and I, it automatically
|
||||
checks the latest gas prices from gasbuddy.com and, uh, what it does, it loads the front page
|
||||
with W get, I pull it down and then I use said and Ock and other various utilities to carve
|
||||
out the, uh, names, the URLs for the image files that I have currently contained in the
|
||||
current gas prices and then I'll, uh, parse through and use W get again to download those
|
||||
image files, um, individually from the site and then I'll pipe them through, uh, image
|
||||
magic and then, uh, go CR, uh, uh, good new, uh, OCR program and extract the, uh, text
|
||||
data per se that that image contains, um, and then, uh, at last lay, I feed that into
|
||||
festival, um, and without, before going into festival, I actually will feed it through
|
||||
ECA Sam, which is a command line, sound board, uh, sound program that you can, uh, change
|
||||
the bit rate, change, uh, you know, quality or whatnot or me. And the reason I do that
|
||||
is I make it match, uh, the same characteristics as a piece of background music and then merge
|
||||
them together and of course you have to cut the background music off at a certain length
|
||||
so you don't have, you know, like your, your 45 second gas report and then another minute
|
||||
of music running in the background. So, so you can do quite a bit, uh, with shell scripts,
|
||||
whatnot and, you know, someone, it might be better to, to do this in parole, it might be
|
||||
more efficient possibly but, uh, it, at the moment I've gotten to be, uh, probably too good.
|
||||
I don't want to say that I'm too good at shell scripting but I've gotten good enough,
|
||||
I can do everything I want to do with it. I'm really not a programmer but I do enjoy being
|
||||
able to automate things and whatnot. So, uh, there's, uh, you know, I've gotten good enough that
|
||||
I can do anything that I want to do with, with, with, uh, shell scripting, uh, compared to any other
|
||||
type of, uh, typical scripting language like parole or, uh, Python or something, you know. So,
|
||||
until I find he had an even bigger project that I want to do, uh, uh, you know, I, not to say
|
||||
I don't know anything about parole but, uh, I, I, I have to, I enjoy just being able to sit down
|
||||
and get results right away and basically I'm impatient and since I, uh, I know enough parole to,
|
||||
uh, fix other people's scripts and stuff, uh, make them do my bidding, uh, but I, uh, if I'm writing
|
||||
something from scratch, I usually start with shell script. Um, so anyway, um, yeah, I mean,
|
||||
and the other thing is, you know, I really don't like re-inventing the wheel. Uh, if there's a,
|
||||
a binary program that does what I want to do and I just need to automate it, fine. Um, I, I just
|
||||
use a shell script to, uh, you know, someone else has already done the hard work of writing the
|
||||
program that does something like, you know, like the Aircrack suite and then all I want to do is just
|
||||
automate it, you know, so, um, all right, uh, I guess an actual kind of move into some places
|
||||
shell scripts are commonly used, um, and that you might encounter them, uh, you know, like,
|
||||
configure scripts. If you, uh, build a compile open source software, uh, that's all, uh, you know,
|
||||
shell scripting and, uh, you know, custom tools. If, if, you know, if you're a unique sad man,
|
||||
you're always doing something. It may not be, a lot of people probably are a bit more advanced
|
||||
in using parole or something, but, you know, shell script, uh, quick and dirty is a,
|
||||
easy way to solve a lot of problems, you know, um, there's also, uh, probably places that a
|
||||
shell script shouldn't shouldn't even be used. Uh, one place, be like Apache CGI's, um, you know,
|
||||
that's, uh, pretty dangerous to use a shell script in a CGI, uh, because if something breaks in
|
||||
your script, you're actually left with a real shell there, and that's one reason probably why
|
||||
parole is traditionally used in that environment, although PHP is taken over that role now, but,
|
||||
um, you know, a parole script, uh, if it breaks and it dumps out, it's just a parole interpreter.
|
||||
There's no shell there. So you can do CGI's in shell, and I'll, I'll
|
||||
will admit that I've done that from time to time, uh, the quick and dirty way to get something done,
|
||||
but I would not leave that in a production environment or something. That's not a good,
|
||||
good place for, for a shell script for that reason. So, um, yeah, uh, I guess that's, uh,
|
||||
about all I had to talk about today. Um, hope, uh, this was informative for, for someone that's
|
||||
not familiar, per se, with shell scripting, uh, hope you have a good day. Enjoy it. And talk to you later.
|
||||
Thank you for listening to Hack with Public Radio.
|
||||
HPR is sponsored by Carol.net, so head on over to C-A-R-O dot-N-E-T for all of us in the
|
||||
553
hpr_transcripts/hpr0046.txt
Normal file
553
hpr_transcripts/hpr0046.txt
Normal file
@@ -0,0 +1,553 @@
|
||||
Episode: 46
|
||||
Title: HPR0046: Yahoo Pipes
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0046/hpr0046.mp3
|
||||
Transcribed: 2025-10-07 10:44:07
|
||||
|
||||
---
|
||||
|
||||
Music
|
||||
Welcome to Hacker Public Radio.
|
||||
Hey everybody, this is Peter from the Fresh Ubuntu podcast and I just wanted to record
|
||||
this little intro.
|
||||
For this episode, I reunited with my old podcasting co-host partner in crime, Scott Willsey.
|
||||
We had a lot of fun, although the episode was pretty much off the cuff.
|
||||
We spent a lot of time fiddling around with Yahoo Pipes and we learned a couple of things
|
||||
as we did it.
|
||||
So apologies in advance for the casual nature of the show.
|
||||
I think the audio quality is just fine and there are some really good tidbits, especially
|
||||
towards the end of the podcast where I compete with Flash Gordon and save the universe.
|
||||
So if you want to see how that happened or listen to how that happened, just keep listening.
|
||||
Also note that we're putting some links in the show notes and Scott did a companion
|
||||
screencast for this.
|
||||
So you can actually follow along.
|
||||
We've got the links up to YouTube where we put the files and we hope you enjoy.
|
||||
Thanks.
|
||||
Bye-bye.
|
||||
And welcome to Hacker Public Radio for Tuesday, March 4th, 2008.
|
||||
This is Peter from the Fresh Ubuntu podcast and I am joined with my former co-host from
|
||||
the Mac new podcast, Scott Willsey.
|
||||
How you doing, Scott?
|
||||
Hi.
|
||||
You're a hard man to get a hold of peace.
|
||||
Yeah, yeah, you say that every time, but I don't believe you.
|
||||
Peter, it's the hardest man to get a hold of in the world, only after you, only after
|
||||
you.
|
||||
There's people that...
|
||||
But anyway, friends that live in other countries that I know that I can get a hold of
|
||||
easier.
|
||||
Well, the other countries have better internet connectivity than Vermont.
|
||||
That's why people, before we digress way too far, you know, we want to talk today about,
|
||||
what are we talking about, Scott?
|
||||
You told me to look at Yahoo Pipes, so I'm hoping that sounds great.
|
||||
So overview, what is Yahoo Pipes exactly?
|
||||
How would you describe it?
|
||||
I mean, the website describes it as a powerful composition tool to aggregate, manipulate,
|
||||
and mash up content from around the web, but that sounds like marketing speak to me.
|
||||
What do you think it is?
|
||||
I call it RSS routing.
|
||||
I like that.
|
||||
I like that.
|
||||
I was thinking RSS feed manipulation, but routing sounds good.
|
||||
It actually needs a lot more than routing.
|
||||
Well, I call it that because basically you can take all kinds of different RSS feeds
|
||||
and route them into different inputs and merge them together and filter them.
|
||||
So it really is more manipulation.
|
||||
You're actually more correct when you say that, but RSS routing just kind of rolls off
|
||||
the tongue.
|
||||
But yeah, there's a whole lot of capability in here that is manipulation and processing
|
||||
and filtering, and so yeah, I'd say that your definition is probably better.
|
||||
Anyway, let's start talking about Pipes a little bit and give an example of how one might
|
||||
use it, shall we?
|
||||
Okay.
|
||||
Okay, first thing you need to do is you need to have a Pipes account.
|
||||
And if you have a Yahoo account already, they're pretty much the same thing.
|
||||
So once you've got that set up, what I would do is head on over to pipes.yahoo.com.
|
||||
And once you're on there, you get greeted by the homepage.
|
||||
And one of the options is to create a pipe.
|
||||
So I'm going to go ahead over there and click on create a pipe.
|
||||
And it's going to ask me for my login again, which only takes a second, boom.
|
||||
And I'm logged in.
|
||||
So now I'm at the Pipes editing screen.
|
||||
And this is kind of cool.
|
||||
It's all Ajax graphical drag and drop kind of stuff, which is pretty impressive.
|
||||
If you look on the left side, the first thing that you see are your sources.
|
||||
And you can fetch all sorts of things, CSV files, RSS feeds, web pages, flicker images,
|
||||
Google based data, Yahoo searches, all kinds of stuff.
|
||||
For purposes of my demo, I'm just going to grab an RSS feed.
|
||||
So I'm going to take up the little button that says fetch feed.
|
||||
I'm going to drag it and drop it into the workspace on the right side.
|
||||
Okay.
|
||||
Now Peter, just one interjection.
|
||||
I'm doing a screencast of this as you're talking.
|
||||
So I'm going to be doing your example that you're giving right now.
|
||||
Oh, excellent.
|
||||
So I'll stop typing then and I'll just dictate and watch you follow my direction.
|
||||
Okay.
|
||||
Or you can do it.
|
||||
Go ahead and do it so you can see what's going on.
|
||||
So I know what the hell I'm talking about.
|
||||
Exactly.
|
||||
Excellent.
|
||||
Okay.
|
||||
So when I drag and drop the fetch feed example onto the workspace on the right, it asked
|
||||
me for a URL.
|
||||
And I can just go ahead and paste in a URL.
|
||||
So now in another window, I'm going to just grab an RSS feed that I already know, but
|
||||
I'll just dictate it.
|
||||
I'm going to grab a short one.
|
||||
How about Molly Woods blog?
|
||||
So what I'm going to do is I'm going to go grab her RSS feed.
|
||||
And again, I could copy and paste this or I can just type it in.
|
||||
Her RSS feed for her blog is HTTP colon slash slash the Molly THMOLY.com slash blog slash
|
||||
question mark feed equals RSS to.
|
||||
So I'm just going to type that into a little fetch feed URL.
|
||||
Now at the bottom of the fetch feed little object that we dragged in, there's a little
|
||||
ball.
|
||||
And what you can do is you can drag that at ball, click on it and drag it to the pipe output
|
||||
object at the bottom of the window.
|
||||
And you see there's a little ball at the top of the pipe output object.
|
||||
So if you drag those two and connect them, what you do is you make a little pipe, get
|
||||
it?
|
||||
And you basically are telling it to pipe the data from that fetch feed, that feed URL
|
||||
into the output.
|
||||
So this is a rather boring example because all I have done right now is taken Molly Woods
|
||||
RSS feed and made quite another RSS feed.
|
||||
I'm just duplicating it, reading from one to another.
|
||||
Peter, you've created a perfectly, perfectly working RSS feed.
|
||||
Congratulations.
|
||||
The only thing is whereas her feed was like 20 or 25 characters to start, the Yahoo pipes
|
||||
output is going to be like 500 characters long and stuff.
|
||||
So all I've done is added more overhead, so that's kind of dumb.
|
||||
All right, so here's another thing we could do though.
|
||||
Let's say we're big fans of Molly Wood and we want to take all instances of Molly Wood
|
||||
that we can have and just have a single feed.
|
||||
Well, if you look back up in that fetch feed window, there's a little plus sign.
|
||||
And it says plus URL.
|
||||
So I happen to know that, let's see, well buzz out loud, there's a, you know, an RSS feed
|
||||
for buzz out loud.
|
||||
Now that's a really long one, so I'm not going to read it to you.
|
||||
But I'm going to go into my RSS reader or go to the buzz out loud website or whatnot.
|
||||
And I'm going to get a hold of that URL.
|
||||
And I'm going to just paste that into the, I'm going to go paste that into the fetch
|
||||
feed window.
|
||||
Okay.
|
||||
Okay.
|
||||
It's going to paste that in there.
|
||||
And that's for a podcast.
|
||||
And that's for a podcast.
|
||||
That's for a podcast.
|
||||
That's right.
|
||||
There you go.
|
||||
So I think I got it here.
|
||||
Paces that over to you so you can paste that in there.
|
||||
Okay, so this is interesting.
|
||||
You've got this really huge long link.
|
||||
And when I look at the buzz out loud page to subscribe to this podcast, it's a really short
|
||||
link.
|
||||
It's cnet.com slash i slash pod slash cnet underscore buzz dot XML.
|
||||
Oh, well, you've got a better one then.
|
||||
Let's use yours.
|
||||
Okay.
|
||||
So we're going to punch that in.
|
||||
Now what we've done is we have made basically this is like a, the, the Molly wood feed is what
|
||||
we're making here.
|
||||
Now, if we wanted to subscribe to some other stuff, we can just keep on adding URLs.
|
||||
All that's going to do is basically tells Yahoo Pipes to mash all of these different feeds
|
||||
into one big feed.
|
||||
So the advantage is then in our RSS reader or program or whatever it is that we use to
|
||||
access these, we can just grab all of these things and have them piped into one single feed.
|
||||
So that's the, like one of the simplest things that you could use Yahoo Pipes for.
|
||||
So again, when we're done, all we need to do is drag the ball from the bottom of the fetch
|
||||
feed object to the top, sorry, to the ball on the top of the pipe output object.
|
||||
And when we're finished, we click on the save button in the upper right corner of the screen.
|
||||
And it asks for a pipe name.
|
||||
So I'm going to call this Molly wood feeds.
|
||||
All right, which is not the same as Molly woods feed.
|
||||
That's different.
|
||||
I'm going to save that.
|
||||
It says saving.
|
||||
And when it's finished, we can go back to my pipes boom, boom, boom.
|
||||
And oh, I'm sorry, we should go to run pipe.
|
||||
When we're finished, we can go to run pipe.
|
||||
And what happens is it runs the pipe.
|
||||
And it gives you the pipes web address.
|
||||
So in this case, it's, you know, it's a long convoluted thing.
|
||||
It's, you know, pipes dot Yahoo dot com slash pipe slash pipe dot info slash blah, blah, blah, blah, blah, blah,
|
||||
mangled stuff.
|
||||
So what you could do is you copy and paste this URL into your own RSS reader.
|
||||
And now you've got Molly woods blog plus buzz out loud in one single feed.
|
||||
And you could do this with all of Molly woods stuff if you wanted to.
|
||||
So that's a simple example of how to aggregate two RSS feeds into one.
|
||||
Okay, now here's something that I found.
|
||||
That's actually pretty good.
|
||||
Now I tried to what I was doing this.
|
||||
I was trying to take your blog and the fresh Ubuntu podcasts blog.
|
||||
And I was trying to do something very similar.
|
||||
But in the output, it was only showing me one at a time when I was testing it here in the editor.
|
||||
Okay.
|
||||
And so as I was doing some searching, I think, yeah, I don't remember which one of these fetch feed ones I was using.
|
||||
Site feed.
|
||||
But anyway, it told me that I wanted to use a, is it an operator?
|
||||
It told me that I wanted to use a loop to grab stuff from multiple.
|
||||
And then I got really confused.
|
||||
So some of the examples on this site were a little confusing to me the way they were doing things.
|
||||
And specifically grabbing multiple RSS feeds was one of them.
|
||||
This works perfectly.
|
||||
I'm not sure why they led me through the thing that I went through.
|
||||
Yeah, I don't know about a loop.
|
||||
Another way to do it, if you have problems with it, one thing you can do is use the union operator.
|
||||
If on the left side, again, under operators.
|
||||
If you expand that out towards the bottom, there's one called union.
|
||||
And that's actually another way that may work better.
|
||||
I'm not exactly sure what the difference would be to just putting one on the other.
|
||||
But that may do a better job of merging them.
|
||||
Okay, so yeah, go ahead.
|
||||
I was just going to say one thing about all these little modules is when you drag them over here.
|
||||
And here's how I kind of got led down the wrong trail initially.
|
||||
There's a question mark there.
|
||||
And if you click on the question mark down in the lower left hand side of your browser window underneath,
|
||||
the sources pane, you're going to see another little pane that explains the module that you clicked to the help for.
|
||||
So here it's telling me union merges up to five sources together.
|
||||
And then they have examples using and learn more about this module.
|
||||
Now I think it was the fetch feed that I got confused on because I just clicked on the fetch feed help.
|
||||
And if you click on learn more about this module, it takes you to a page where it says feed auto discovery.
|
||||
Let's use one or more website URLs in the module.
|
||||
It examines those pages for information.
|
||||
Oh, that's what it was.
|
||||
It was the feed auto discovery module I was having problems with.
|
||||
And then it says if more than one feed is found, the multiple items are returned because more than one feed can be returned.
|
||||
The output from this module is often fed into a loop module with a fetch feed sub module.
|
||||
That's where I started getting confused.
|
||||
And I did the wrong thing because in your case, all I needed to do is use the fetch feed, put in both URLs.
|
||||
And I would have gotten what I wanted without having to the loop.
|
||||
But I was trying to do the auto discovery thing.
|
||||
Okay.
|
||||
So it can't be a little bit complex.
|
||||
It can. It can definitely get a little complex.
|
||||
But what's also interesting is that you can use these.
|
||||
Now I haven't done this for a while.
|
||||
I've got to dig into my pipes.
|
||||
Excuse me.
|
||||
But I had a pipe that I created some time last summer.
|
||||
And what I did is I made an aggregator for, I think it was digs technology feed and also tech meme.
|
||||
And I think something like a tech crunch or something.
|
||||
And basically what I did is I filtered them out so that if the source for, or like feed one,
|
||||
actually came from feed two that it would not publish it.
|
||||
So the idea was that if, for instance, a tech meme article got dug.
|
||||
Or for instance, let's say a, a scobilizer article showed up on tech meme.
|
||||
And I already subscribed to scobilizer that I would not see the tech meme article.
|
||||
And so basically, you know, the idea is it keep out duplicates because there's nothing more annoying than, you know, scrolling through, you know,
|
||||
a couple hundred RS tests entries and having to like, you know, skip pass the same article again and again and again.
|
||||
Or reading the same article again and again and again.
|
||||
Yeah, and here's one thing that I noticed looking at ours example, which works really well.
|
||||
But if you go run the thing, I'm sure you want to navigate away from this pages because I made some changes that I didn't save.
|
||||
But if you run this, for me, it comes up with all the buzz out loud stuff on top.
|
||||
And you have to scroll 30 feet to finally get to some mollywood blog stuff.
|
||||
I think that that's, that would start out that way.
|
||||
But over time, you know, as, because we added one first.
|
||||
But I think over time, it's going to take them in the order that they appear.
|
||||
Right. So she does a blog post that'll show up.
|
||||
Then if she does a podcast that'll show up.
|
||||
And then if she does three blog posts, those will show up. Yeah.
|
||||
So yeah, it just went out and grabbed each feed right now saying, I don't know, I have nothing.
|
||||
So it went out and grabbed everything you could find off those feeds for the moment.
|
||||
So yeah, that's what I did a whole whole feed at a time.
|
||||
Right.
|
||||
So let me give a quick example then on how I did that that merger so that I wouldn't be, you know,
|
||||
seeing too many duplicates.
|
||||
The first thing I did is I went out and I grabbed the RSS feed for dig technology,
|
||||
their technology subset.
|
||||
And if you go to dig.com, you can probably find that pretty easily.
|
||||
So go to dig, I click on technology.
|
||||
And then in the, in my Firefox browser bar, I see the RSS link right there.
|
||||
dig.com slash RSS slash container technology.xml.
|
||||
Perfect.
|
||||
And I'll go back here and I'm creating this as we go.
|
||||
So I'm going to paste that into a fetch feed control or module.
|
||||
Okay.
|
||||
Exactly. There we go.
|
||||
Yep.
|
||||
So then where do we want to go next?
|
||||
How about, well, let's go to, you know, tech meme.
|
||||
So T-E-C-H-M-E-M-E.com.
|
||||
And again, right at the top, there's an RSS link right there.
|
||||
Is there?
|
||||
Yep.
|
||||
Oh, sorry, it's in the, in the browser bar for me for my Firefox.
|
||||
Oh, yeah, I see it.
|
||||
Okay.
|
||||
Yep.
|
||||
So now what I'm going to do is I'm going to go back up to the operators.
|
||||
And I'm going to grab a filter.
|
||||
And I'm going to drag that under my dig feed.
|
||||
And then what I'm going to do is add a new rule.
|
||||
So under the filter action, I'm going to choose block.
|
||||
And I'm going to block any, sorry, items that match any of the following.
|
||||
And I'm going to click the plus sign under rules to add a new rule.
|
||||
And the rule I'm going to add is that if item.link,
|
||||
which would be the items URL, contains.
|
||||
And I'm going to punch in HTTP colon slash slash www.techmeam.com.
|
||||
Because techmeam.com is my other feed.
|
||||
So right now, I've got my fetch feed object.
|
||||
And then under that, I have a filter under dig, which says basically,
|
||||
don't allow any techmeam articles.
|
||||
Okay.
|
||||
I think I'm wearing this wrong.
|
||||
I need to wire that from the one URL just from the dig URL to this filter.
|
||||
Right.
|
||||
Ah, okay.
|
||||
Got you.
|
||||
Otherwise, that would be doing something really wrong.
|
||||
How do you do that?
|
||||
Basically, I have the, the starting on the left side, I have two columns.
|
||||
I have a fetch feed on the upper left, and then a fetch feed on the upper right.
|
||||
And I have a filter under each one.
|
||||
Okay, okay.
|
||||
I'm sorry.
|
||||
I have one fetch feed grabbing both those URLs.
|
||||
Let me.
|
||||
Ah, no, no.
|
||||
We need two feeds.
|
||||
Okay.
|
||||
Because we're going to run them into two separate filters.
|
||||
I got you.
|
||||
Okay.
|
||||
So let me do Command-A, Command-X.
|
||||
We really sound like we spend a lot of time propping for this, don't we?
|
||||
Yeah.
|
||||
Well, that's okay.
|
||||
Okay, okay.
|
||||
So now you're going to have two separate filter.
|
||||
One filter for each of those.
|
||||
I got you.
|
||||
Exactly.
|
||||
The new filter under TechMeme, what we're going to do is make another block rule.
|
||||
And we're basically going to block anything that comes from dig.com.
|
||||
So under the item link there, we're just going to block dig.com.
|
||||
And I can probably just type dig.com.
|
||||
I don't need all the other stuff.
|
||||
Exactly.
|
||||
Okay.
|
||||
Yeah.
|
||||
Okay, cool.
|
||||
So I've got the fetch feed for TechMeme wired to the filter that blocks anything from dig.com in item.link.
|
||||
And I've got the fetch feed for dig.com container technology to a filter that says block.
|
||||
Any items that match any of the following item.link contains TechMeme.com.
|
||||
Okay.
|
||||
Perfect.
|
||||
Okay, good.
|
||||
All right.
|
||||
So, you know, you could do a bunch of things with this.
|
||||
Like, you know, you could say if you read Scobilizer, and you know, Robert Scobil's posts have a tendency to show up on TechMeme,
|
||||
you could also just add a new rule and say if the item.link contains Scobilizer, then block that as well.
|
||||
Okay. Now, I think in order to get these to the output, I need that union control.
|
||||
That is correct.
|
||||
So underneath both of those two filters, you're going to need a union operator.
|
||||
And what you're going to do is drag the pipe, you know, from the filter on the left and the drag pipe from the filter on the right down into the union.
|
||||
Right.
|
||||
And then you're going to drag the output of the union to your pipe output.
|
||||
Okay, cool.
|
||||
Now, another thing you can do is a sort operator.
|
||||
And this actually probably would have cleaned up the mollywood problem when it did all of the buzz out louds and then all of the mollywood stuff.
|
||||
We can drag a sort operator.
|
||||
So if you go back over to operators on the left column, sorry, and drag a sort in between the union and the pipe output.
|
||||
If you choose to sort by item.pubdate, the publication date.
|
||||
And then you can choose to sort them in ascending or descending order, if whether you choose to see newest first or oldest first.
|
||||
And then drag that to the pipe output.
|
||||
Now, one thing I want to mention, when Peter's talking about, you know, item.pubdate, item.link, all these things that are showing up in these modules, you wire.
|
||||
You know, whatever you wire the two modules together first and it'll update with.
|
||||
So when I took the union and I wired it to the sort, then I could see the different fields that I could use as my criteria.
|
||||
It updated it with whatever's coming in.
|
||||
Here's all the things that are coming in, which one do you want to use as your operator?
|
||||
Exactly.
|
||||
So it's showing you all of the XML elements of those RSS feeds.
|
||||
Right.
|
||||
Because as we know, RSS is just, you know, it's just an XML with a specific format to it.
|
||||
Yes.
|
||||
So that's how you could make yourself a Yahoo pipes field or a feed, sorry, a pipe, and you know, reduce some of the clutter.
|
||||
So once you know that this is working to your satisfaction, what you could then do is, you know, you could go ahead and you can basically unsubscribe from dig.com
|
||||
technology feed and unsubscribe from tech memes feed.
|
||||
And instead subscribe to this podcast, sorry, this podcast, instead subscribe to this pipe.
|
||||
And that will you get them both without the duplicates.
|
||||
You have another example you want to run over or want to try to figure something out?
|
||||
No, I don't think so.
|
||||
Basically all I did was I came in here, I started messing with it, and I took your feed and the Fresh Ubuntu podcast.
|
||||
And the RSS auto discovery thing, it was the loops where I really started getting messed up on.
|
||||
There were a couple of examples where they did some looping through RSS auto discovery or they were looping through something.
|
||||
That was one thing I couldn't find specific examples for the case that I was trying to do, but I was trying to do the auto discovery.
|
||||
And then the auto discovery is nice because if you ever use Google Reader, it works that way.
|
||||
You just put in a URL and it figures out what RSS feeds are available and then it comes up with one, which is really nice.
|
||||
So I would imagine if I could figure out the auto discovery thing and maybe put it through the loop and figure out how to get the feed that I want.
|
||||
If there's multiple feeds, that would be a really cool feature that way you don't have to go out.
|
||||
You can just plug in a website, you don't have to necessarily go out.
|
||||
Now, the nice thing where that would come in handy is you have user inputs and I'm guessing that you could use the user inputs to prompt people.
|
||||
So somebody could come here and I could prompt them to, yeah, you could say you are ill input.
|
||||
And they could put in a URL, maybe they don't know the exact feed on dig.com that they want or whatever, but they could plug in dig.com and it would go out and it would find those using the feed auto discovery.
|
||||
And then maybe there would be some way to let them choose something or something.
|
||||
I don't know.
|
||||
Or something.
|
||||
Well, one of the reasons that we don't have everything totally memorized here and stuff is because there are just so many options.
|
||||
I mean, you can go, like I said, through all sorts of different sources, there are different user inputs like you said.
|
||||
So you can ask a person to put something in and then you could use those in your operators.
|
||||
You've got counts, filters, loops, you've got regular expression support, you can sort things, you can split feeds.
|
||||
A lot of your standard text manipulation program operators that you would normally find in a scripting language like Pearl or Python or something like that, you can do here.
|
||||
And that's pretty slick.
|
||||
I think it's got a lot of power based on a very, you know, it's actually fairly intuitive once you start playing with it.
|
||||
The best thing to do is start just fiddling around with, make some pipes and throw them into your RSS reader, whether it's Google Reader or whatnot, and just see what the output is.
|
||||
And then if you don't get what you expect, go back and tweak it a little bit and see what happens.
|
||||
And yeah, and I was going to say that's actually one of the more powerful things about this is you're sitting here looking at this interface, you're making these things.
|
||||
But what you may not realize for the casual observers, that's exactly what this is.
|
||||
You're creating a new RSS feed that you can then use in whatever reader you happen to use. For me, it's Google Reader.
|
||||
But, you know, whatever. And it is very powerful. I like pretty much everything about this.
|
||||
I even like the name pipes, which is kind of a Unix thing where you're piping one thing to another, taking the output of one thing and using it as the input something else.
|
||||
And that's exactly what they're doing here. So I don't know, I'm impressed.
|
||||
You know, Yahoo really hasn't come up with anything cool in a while.
|
||||
And of course, there's the whole Microsoft maybe buying Yahoo thing and all this nonsense that's been going on with Yahoo.
|
||||
But when I saw this, I thought, now this is slicker than anything I've seen from Google in a while personally.
|
||||
Yeah, it's very well run and it feels polished. You know, it feels finished.
|
||||
This doesn't feel like even though it says Yahoo pipes beta, you know, it doesn't feel like a beta application in any way.
|
||||
It feels pretty good. And I've been running it like I said since I think July or so.
|
||||
And as far as I know, I've never really had a problem.
|
||||
Yeah, I haven't been messing with this as long as you have, but certainly when I was playing around with it, I didn't come across any bugs.
|
||||
Anything I tried to do worked in the manner that it was intended to as far as I could tell.
|
||||
If there were any problems, it was me trying to understand how does this work and what I do with this knot.
|
||||
Operator error. Yeah, it was operator or wealth.
|
||||
Maybe not just error, but maybe just not yet rocking exactly how some of these things work.
|
||||
Like I said, the loop thing, I would need to work with a little bit to figure out exactly how that could be used in such a way that actually.
|
||||
Another thing you could do, for example, is you could use this as a social networking status aggregator.
|
||||
For example, I've blogged in the past and gone over on the podcast how I have all of my, you know, Facebook, JaiKu, Twitter, you know, all this kind of stuff merging into one place.
|
||||
Well, if you wanted to simplify things, you could, for instance, have all of your Facebook friends, status updates, all of your Twitter updates, your JaiKu updates, etc.
|
||||
You could subscribe to all of those right here and then make a single pipe.
|
||||
And then that way, whenever you go to like move to a new RSS reader or something, you can just have one URL that you use.
|
||||
And, you know, you could further shorten it by making a tiny URL or use some other URL redirecter to point to your pipe.
|
||||
So that way you could make yourself a memorable, short, easy to use URL for, you know, like something that collects all of your stuff.
|
||||
Now, obviously you could just subscribe to multiple feeds within your RSS reader, you know, which would accomplish pretty much the same thing.
|
||||
But this gives you the ability to filter them and things like that.
|
||||
So you could say, you know, don't publish the same thing twice if, you know, or whatnot, you can filter them out like we did in the last example.
|
||||
Peter, forget Flash Gordon, you just saved the universe.
|
||||
I mean, you know, one of the banes of Web 2.0 existence, first of all, I could rant for weeks about Web 2.0 and the whole social networking event.
|
||||
But that's a separate podcast.
|
||||
Okay, we'll do that separately sometime.
|
||||
But, yeah, one of the banes of that existence is, you know, a lot of people like myself have tried Twitter, we've tried some of the others I can't even think of right now.
|
||||
But, you know, I've got accounts on several of these things and the only one I use right now is Twitter.
|
||||
There was just too much.
|
||||
And, you know, this is one of the things where, you know, Apple does well that sometimes other people don't.
|
||||
They understand that simple sometimes really is better.
|
||||
And that's why I use Twitter.
|
||||
Simple is better.
|
||||
Yeah, Twitter has its problems.
|
||||
And, you know, I've made jokes about Twitter being an example of how Rails can't scale and, you know, et cetera, et cetera.
|
||||
But, some Rails people right now are pulling their hair out and exposing their buttocks to me.
|
||||
But, you know, hey, so, but the fact of the matter is it's very simple.
|
||||
You don't have to learn a lot of features. You just use it and you're done.
|
||||
And, I don't use any of those others because of that.
|
||||
But, yeah, this would be one way where you could make use of some of those others.
|
||||
And then easily only have one thing to search.
|
||||
Now, of course, when it comes time to update things, you'd have to go to individual places or use an application that can connect to them.
|
||||
But, as far as just following stuff, this would be perfect for that kind of thing.
|
||||
Yeah, it's an app, you know, you could consider this an alternative to the flock browser.
|
||||
If you're a little bit of a do-it-yourselfer.
|
||||
See, I like to consider myself.
|
||||
I'm somewhat of a do-it-yourselfer.
|
||||
But, you know, I don't know.
|
||||
Given the amount of time I have available, it's probably too much work for me to sit down and write a purl script to parse all of these RSS feeds.
|
||||
I know I can do it.
|
||||
I've done it in the past.
|
||||
But, it's a hell of a lot easier for me to just, you know, fire up Yahoo Pipes, drag and drop a few objects around.
|
||||
Boom. Done.
|
||||
Works.
|
||||
Unless I face it, it's a lot more fun.
|
||||
It is.
|
||||
It is.
|
||||
I mean, you know, if you really, if you're a decent programmer, you could do a, you know, some kind of widget interface and write your own.
|
||||
But, why?
|
||||
They've done it for you.
|
||||
Well, see, here's the thing.
|
||||
When you're at a party and you're the geek, and there's some semi-geeks roaming around, or people who really don't rock it, but they think they like geeks.
|
||||
And you whip out your laptop and you're doing this.
|
||||
Anybody can sit there and type a bunch of lines of code.
|
||||
And their eyes are going to glaze over and they're going to go stuff their head in the Heineken barrel.
|
||||
But, if you start doing this,
|
||||
Hey, this thing might actually get.
|
||||
That's right.
|
||||
They're going to say, ooh, shiny objects, they are kind of shiny.
|
||||
Have you noticed that?
|
||||
A little bit of a glossy finish.
|
||||
I think they're pretty cool.
|
||||
Well, that's about all I have on Yahoo Pipes.
|
||||
Unless you think you have anything else.
|
||||
I think we can wrap this up and call it a show.
|
||||
I think we can wrap it up and call it a show.
|
||||
And Peter, I don't know what method of making links available are for this podcast.
|
||||
We can do a post them in.
|
||||
It's going to show up like a standard blog post.
|
||||
We can put all sorts of links right into the show and you're going to do a screencast on this
|
||||
and we can put this up on YouTube too, right?
|
||||
Yeah, we can put it up on YouTube and I'll probably also post it in my blog.
|
||||
Awesome.
|
||||
And then you can post it in your own blog as well.
|
||||
We can post it all over the place and then we can make a pipe to aggregate it.
|
||||
We can basically make a pipe to have all the feeds for this episode if we wanted to.
|
||||
It's going to be recursive.
|
||||
It's going to be the greatest example of recursiveness that Peter and I can come up with,
|
||||
which is not very great, but hey.
|
||||
Well, you know, we're good minds.
|
||||
I don't know if we're great minds.
|
||||
It's the virtual equivalent of for a good time call.
|
||||
Awesome.
|
||||
Great.
|
||||
Well, until the next episode of Hacker Public Radio.
|
||||
I'm Peter DeColitis from the Fresh Ubuntu podcast.
|
||||
You can track me at freshubuntu.com or on my own blog at pn72.com.
|
||||
Scott, where can people follow you?
|
||||
I'm Scott from nowhere.
|
||||
Nothing, but I do have a blog.
|
||||
I blog Scott.wordpress.com.
|
||||
You can go check out and it's mainly Mac related, but check it out.
|
||||
Yeah, but every now and then you, you know, you rage against the machine and, you know, whatever.
|
||||
And so they're pretty funny.
|
||||
And then it refreshes me and then I have to stop raging for a while.
|
||||
Well, you stop raging and then monolith 2000 rears it's ugly had again, but, you know,
|
||||
that's just the way of things.
|
||||
It's the way of life.
|
||||
Alright, thanks for listening, everybody.
|
||||
And if you've made it this far, you might want to count your eyes out.
|
||||
Thank you for listening to Hacker Public Radio.
|
||||
HBR is sponsored by Carol.net.
|
||||
She'll head on over to C-A-R-O-D-E-T for all of her dreams.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
Oh.
|
||||
382
hpr_transcripts/hpr0047.txt
Normal file
382
hpr_transcripts/hpr0047.txt
Normal file
@@ -0,0 +1,382 @@
|
||||
Episode: 47
|
||||
Title: HPR0047: Sys Internals Part 2
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0047/hpr0047.mp3
|
||||
Transcribed: 2025-10-07 10:44:28
|
||||
|
||||
---
|
||||
|
||||
music
|
||||
Welcome to this episode of Hacker Public Radio, this is Zoke again, doing part 2 in the
|
||||
System Tunnel Suite.
|
||||
So hopefully you've downloaded the programs.
|
||||
I've got my wife's computer up and running and I'm going to be running through some of
|
||||
the programs on there and explaining what some of the options are and what the output
|
||||
is.
|
||||
The files downloaded are zip files.
|
||||
You can extract them out wherever you want, they're just plain executable to be installed
|
||||
or anything fancy.
|
||||
When you extract them, for example, here I've got the Auto Runs program, we have four
|
||||
files, Auto Runs.chm, which is the Help File, Auto Runs XC, which is the GUI version,
|
||||
the Windows version, Auto Runs SC.exe, which is the DOS-based version and the Euler.txt,
|
||||
which is that wonderful end-to-user license agreement, basically saying if you die it's not
|
||||
Microsoft fault.
|
||||
So if we go and fire up Auto Runs, it takes a little while to load here.
|
||||
And we have a window with lots of options here, everything log on Explorer, Internet Explorer,
|
||||
Schedule Tasks, Services, Drivers, Boot Execute, etc, etc.
|
||||
Everything, obviously, has everything and if you want only part of it, it's like the
|
||||
Internet Explorer.
|
||||
Once you just click on the Internet Explorer tab and it comes up with various things
|
||||
like the Browser Help Objects.
|
||||
The Browser Help Objects are basically the toolbars and I can see here that we have
|
||||
Adobe PDF read-link helper twice actually, but we have that listed down and it tells you
|
||||
that wherever file is, it's C-Pregumphiles Adobe Acrobat 7.0, ActiveX, A-C-R-O-I-E,
|
||||
Helper, D-L-L. There's a checkbox you can simply uncheck that and that will stop the
|
||||
program from running.
|
||||
It doesn't actually delete it from the registry or keep it there.
|
||||
What you can actually do is click on the link you want to remove and click Delete or click
|
||||
the little X at the top or Control-D, it says Frish or Cut.
|
||||
I'm going to go and delete one of these PDF ones, probably better leave the other one
|
||||
the WIFE way upset, but personally, I can't stand Adobe and the way it takes far too
|
||||
much of your memory and process of power.
|
||||
So we can look through here and see what we've got, we've got the ZoneLarm spy block
|
||||
at BHO, leave that one in ZoneLarm, wouldn't be my choice of firewall, but works pretty
|
||||
well for the less technical.
|
||||
We can go through everything and list some of the options here.
|
||||
We have far too much stuff, we've got quick time while that can go, hate quick time, that
|
||||
takes up far too many things.
|
||||
Which of other weird stuff, MochaSoft did installs all the manner of bizarre things.
|
||||
If you're worried about some of these, you can then do a quick search on them through
|
||||
Google or something and I actually find out whether there's spyware malware or just
|
||||
not very good generally.
|
||||
One example, if I can find it, was the iTunes stuff, it has an odd name, I can't find it,
|
||||
I don't know, the name is French and it's just confusing.
|
||||
Most of the other stuff actually does say Apple, I should say Apple software update job,
|
||||
that makes sense.
|
||||
It has Apple in the name, whereas the one that actually runs, okay, finally found that.
|
||||
Yes, it's the Bonjour service, Bonjour, the French for literal translation, good day.
|
||||
It's kind of a silly name and if you saw that just running, you'd think what the hell's
|
||||
Bonjour, you know, it sounds a bit odd.
|
||||
Some of these spyware things, they're trying to call themselves things that might sound
|
||||
reasonable but just seem a little odd and that's one of the ones there.
|
||||
Now I know the wife's computer's fairly well kept up to date because I run stuff on
|
||||
it, saves me having to faff around fixing it when she does something she shouldn't
|
||||
do, like that time she got the Sony DRM crap from a CD and we still can't get the CD
|
||||
ROM driver to work properly, at least burning CDs.
|
||||
Anyway, so you can go through all the different options here, network providers and you can
|
||||
see you've got the LAN Man workstation and it's fairly self-explanatory for most of those.
|
||||
And again you can just go through, you can even uncheck them which keeps them in the registry
|
||||
or the files around but means they won't run or you can delete them which means it removes
|
||||
them entirely.
|
||||
So there's a few of them I've got here that what I generally do is if I don't like the
|
||||
look of it I will just uncheck them and reboot the computer and see what's going on and
|
||||
then I can just check them back if I deleted something I shouldn't have done, like that
|
||||
one time I broke the computer and stopped Windows from accessing the internet but that's
|
||||
another story.
|
||||
That's about it for auto runs.
|
||||
Next up we've got BG info, now again this is a fairly simple program it just great text
|
||||
on the background.
|
||||
When you run the program it gives you a list of options that you can, what text you put
|
||||
on there, boot time, CPU, default gateway, DHCP server, DNS server, free space, hostname,
|
||||
internet explorer, version IP address, logon, domain logon server, MAC address, machine
|
||||
domain memory, network card, network speed, network type, OS version, service pack, snapshot
|
||||
time, subnet mask, system type, username and volumes.
|
||||
You can get these displayed around on the screen you can choose whether you want to copy
|
||||
the user's wallpaper settings and then add it in or just stick in the corner, make the
|
||||
wallpaper visible behind the text, put it on top left top right, well any of the nine
|
||||
corners sides or middle of the screen you can choose whether it goes on on the desktop
|
||||
sort or for console use or terminal server users and you can actually run a preview.
|
||||
As I said fairly useful if you actually run test environments and things there is a
|
||||
nice little preview screen option here which tells me all these exciting things default
|
||||
gateway, 192.168.10.1, the same DHCP server, same DNS server, free space, 31.38 gig,
|
||||
NTFS on C, the hostname which I won't mention, internet explorer version, all these stuff
|
||||
that can be interesting and useful to you if you're testing.
|
||||
Well I think that's enough about that, I'm going to remove all this before the wife
|
||||
complains what's this weird stuff on my computer.
|
||||
Next was blue screen, I'm not actually going to talk about that because if you don't know
|
||||
how to run a screen save up then what on earth are you doing listening to something like
|
||||
this, contig makes things contiguous, contig exy, system terminal software, license terms,
|
||||
blah blah blah yes, I guess we have to agree to that.
|
||||
It's really exciting, standard Windows stuff.
|
||||
If you run contig, it's dust-based program, relies on entities built in DFrame support
|
||||
to make specified file contiguous on the disk, use the top noise execution of a few
|
||||
currently used files, basically you just run it, you've got a couple of options, V for
|
||||
the Bose, A for analysed fragmentation, Q for quiet, so if you do contig dash, A it comes
|
||||
down and tells you which file you want to check, so contig dash, A, C come on back, slash
|
||||
start at star, I'm not going to do the entire directory and it comes down and tells you
|
||||
what's going on, this file is defagmented, it will look this file is being used by something
|
||||
else, I've got a lot of windows for that, 51 files, one fragment, one frag per file, so
|
||||
all defagmented, mainly because I ran it last week, defragged everything, but you can run
|
||||
that against specific files if you're having issues with some being rather big and bloated.
|
||||
Next one is file one, if you run the file one exy, again have to agree to software license
|
||||
terms on the new versions, didn't have to on the old versions, straight away we have
|
||||
a huge amount of stuff, VS Mon is doing something accessing, C windows, internet logs it looks
|
||||
like, right click on that, exclude process, don't want to hear about that, SV host is doing
|
||||
well everything, it seems to be accessing documents and settings, windows, the root directory
|
||||
everything, select exclude that process, CSRSS has got a bunch of many S's for my liking,
|
||||
it's accessing lots of things, windows, manifests or something, right click exclude process, AVG,
|
||||
CC, XC, well antivirus is running everything, right click exclude process, AVG server, exclude
|
||||
process, ZL client, that's a firewall, exclude process, explore exes doing stuff, exclude
|
||||
process, win logons doing stuff, exclude process, okay I think that's about everything, now
|
||||
if we go and run something, let's find something interesting shall we, internet explorer that
|
||||
will be a laugh, run internet explorer and we can see exactly what it does, internet explorer
|
||||
is loaded up, let's go to Microsoft, Microsoft wait for it to load up, Microsoft.com, no connection
|
||||
to the internet is currently available, well I'm on the internet, try again, now it works
|
||||
and it's loading, something, it's still loading and we're done, I'm actually on DSL if
|
||||
you can believe that, I blame the wife's computer, or just windows generally, so here we
|
||||
go, let's close that down for now, let's see what it did, so we've got the logs here, huge
|
||||
amounts of things, the scroll bar is, the scroll bar is incredibly small, it's about
|
||||
three pixels wide, but I'll just read some of this stuff out, so in iExplore XC, it
|
||||
able to read request, tells you the specific path, it was opening itself, it was a success,
|
||||
offsets and length and stuff like that, file information, tells you what was going on,
|
||||
anything interesting here, oh it's trying to open up, cconon backslash, dollar extend
|
||||
backslash, and it was accessed in id, that's interesting, I wonder what's in the dollar extend
|
||||
directory, and why exactly, we have a dollar extend directory, I don't like things with
|
||||
dollars in front, dollars are, dollars normally the hidden files, hidden shares for example,
|
||||
they just make me a little nervous, so I'll be looking through that and trying to work
|
||||
out what's going on with that, what else has it been doing, it goes down to documents
|
||||
and settings, all users application data, Google to find stuff, it goes to my DSC, whatever
|
||||
that is, it goes down to my cookies, it goes to my temporary internet files, my history
|
||||
goes for some reason, it goes to a different account for my boss mother, it actually opens
|
||||
the my documents up, it goes in there, and here's another old one, making note of that,
|
||||
have a look at that in a moment, try and work out what's going on there, all right, it's
|
||||
loading up Adobe Acrobat, ask people, office stuff, yeah, it's opening up the C-Progress
|
||||
Squiggle 1, that is like Mozilla, I know it's a tilde, I just call it a squiggle, it looks
|
||||
like a squiggle, it's a squiggle, because if you turn around to people and say it's the
|
||||
tilde, they say what the hell is the tilde, so it's a squiggle, you say the squiggle, top
|
||||
left of the keyboard, and they say oh yeah, the squiggle, so if I call it a squiggle, that's
|
||||
why, C-Progress, squiggle 1, Mozilla, squiggle 1, okay, for some reason it appears to be
|
||||
opening Firefox app or something there, not quite sure why, but possibly Thunderbird,
|
||||
actually, if that might make sense, it opens, I mean it's a ton of stuff, this is barely
|
||||
50th of the way through, and it's opening up a ton of files and success, success, success,
|
||||
sharing violation, I'll never see that in Windows 2, but it goes through all these, and you
|
||||
can actually see exactly what files it's opening, so if you do get a program that errors,
|
||||
if for example, you ran a program that errors and said file not found, very useful, didn't
|
||||
tell you what file, you can run this, file monitor as I said, you'll have to filter out
|
||||
all these things, you can say it was a standard filter set, and then you can run it and
|
||||
you see exactly what file, exactly why, buffer overflow, well that's an explorer for
|
||||
you, shocking, you know, a Microsoft product might actually have a buffer overflow, but
|
||||
apparently MDM XC query information for I explore, and it has a buffer overflow, well I
|
||||
never, you live and learn, car, Microsoft buffer overflows, yes, that sarcasm for anyone
|
||||
that didn't quite get it, well here we go, couple of file not founds, don't really care,
|
||||
it's, I really don't give a shit about it, but it's going to open various things here
|
||||
and fading on some of these, cprogram files into the explorer, I explore xc.local, but
|
||||
you can run these and see exactly what's going on, and why it's erroring, which is pretty
|
||||
cool, and that's file one, okay, next up we have handle, run handle xc, it's a dust
|
||||
one, all right, go into dust, go into the handle directory, and run handle xc, and watch
|
||||
the screen flood by quickly, we have a ton of stuff here, but it will show exactly every
|
||||
single file that we have open here, you'll actually want to grab or search through to find
|
||||
the specific files that you find interesting here, but you know, it's opened up c.c.c.c.c.c.
|
||||
things, my name, my actual name not zoke, but I'm not going to say it, local settings
|
||||
history, history.a5 index, that, I'm different, read, write, so I mean you can see what's
|
||||
it's got open, kind of similar to file one, but works just once, just for the moment,
|
||||
I think that's about it for handle, list DLLs, which is another dust based one, tells
|
||||
you exactly what versions of each DLL, so here we've got MSV CP60, so much of visual
|
||||
CP for plus presumably, version 6.0 DLL, version 6.0 2.310 4.0 0 0 0 0 0, list of DLLs and
|
||||
the version numbers, that can be pretty cool, if you're looking for a specific version
|
||||
number, we wrote our own programs at work, and as I said, if you're looking for a crystal
|
||||
report, screw up the wrong version number in the DLL, which I realized when listening
|
||||
through, I actually called something else entirely, but the version number on the DLL, and
|
||||
you can see what's right and what's wrong, so you can just look through that, that's pretty
|
||||
cool, you can just get that run on a computer, and then you can analyze the file pretty easy
|
||||
to write a simple program, just to load up a text file, output from here, and run it
|
||||
through and see what versions of what DLLs are there, and what is missing to quickly
|
||||
find what is the wrong one, alright, log on sessions, which is probably going to be a
|
||||
DOS one again, I don't know what guess it is, and we have 5, 6 actually, because it starts
|
||||
to 0, 6 log on sessions here, do we have, my wife is apparently logged on, a non-existent
|
||||
blank user name is logged on, the NTO Authority Network Services Logon, NTO Authority Local
|
||||
Service NTO Authority, anonymous login, and I'm logged on, exciting, totally when everyone
|
||||
logged in, so the wife apparently got up at 6.52 and 16 seconds in the morning, and logged
|
||||
on, which is when pretty much everything else started, or a few sex later, and I logged
|
||||
on, 6 hours later, again this can be used for each one of the work out, exactly what's
|
||||
running, if this machine was actually facing the internet, I'll be a little worried about
|
||||
having these network services running, and I want to tie them down, well as much as
|
||||
you can tie down a window session, anyway, alright, page de-frag, page de-frag comes
|
||||
in lists, files, and the fragments, so, c, hyper fill, sys has 61,133 clusters and one
|
||||
fragment, well exciting, pretty simple, you have an option for de-fraggin xboots or de-fraggin
|
||||
every boot or don't de-frag, and that's basically the choices you have, you also have a choice
|
||||
of saying how quickly before you abort, so you can have a 10 second time out, and you
|
||||
can quickly click the button and it will cancel, running on your own computing, well as
|
||||
we'll say de-frag every boot, if you're one of these people that you need, you turn the
|
||||
computer and you go off and get a coffee, you can do that, that's nice and simple, and
|
||||
if you don't you've got the 10 seconds or whatever to hit the button and cancel, if you
|
||||
run the set it and you just decided to actually, you don't want to do it, you can just run
|
||||
it again and un-set it, you just click the don't de-frag option at the bottom, that's pretty
|
||||
simple, process explorer, so we have sysmodel process, interrupts, dpc, systems got about 18
|
||||
versions of svc host, why I really don't know, it just always does, but the cool thing about
|
||||
this, we can look under here, sysmodel process, system, sss, xe, windlogging, xe, service, xe,
|
||||
so each one's calling the other one, then we have svc host, xe, and we hover over one of those,
|
||||
we see the first one is the de-com service, process, launch, de-com launch, terminal services,
|
||||
next one is remote procedure called rpc, next one is for, next one's for about 8 services
|
||||
here actually, but we make updates and stuff, you can see exactly what everything is running,
|
||||
and you can actually right click and say kill process, kill process, tree restart, suspend,
|
||||
debug, separarities and so on, and it actually tells you what they are real times 24,
|
||||
highs 13 and above normal 10, normal is 8, below normal is 6, 9, just 4, okay, we'll have to explain
|
||||
this briefly, it is very, very complicated, but basically in a very simple way, the higher number
|
||||
is how it gets run, so the processor is running away at stuff, the mouse and the keyboard,
|
||||
the processor is a real time basically 24 or 30 or something, I think the process number as I forget,
|
||||
whenever the CPU is idle, it sees if anything is pulling it, it goes through the interrupts,
|
||||
and so the mouse hits an interrupt, the keyboard hits an interrupt, the hard drive, everything
|
||||
will hit an interrupt when it needs anything, the computer does go through and check the interrupts
|
||||
for the highest number, the highest number is actually the king, basically every second it will
|
||||
check whatever the highest number is, and whatever is requesting part of the processor's time,
|
||||
and how's a higher number it will win, it is a lot more complicated than that because otherwise,
|
||||
whatever is the highest process is always taking precedence, there are entire books, doctoral
|
||||
thesis have been written on this subject, basically the higher number wins, so if you set a process
|
||||
up to real time, and it wants to do a lot of stuff, you will not do anything on your computer
|
||||
until it is finished, if Firefox for example is being a river resource hog, which unfortunately
|
||||
it is sometimes, going to here, right click set process and set it to be below normal,
|
||||
or idle, or something lower, then what it will do is actually give you your computer back,
|
||||
because you might find the mouse is not moving because Firefox is taking all the memory,
|
||||
well now because it's below normal or idle, you move the mouse, it's got a higher number, it
|
||||
gets priority, explore itself, everything starts as normal, if you find a process is taking up too much,
|
||||
if you CPU time, just set it down to below normal, and most of the time it's going to give you
|
||||
a computer back, whatever it is doing is going to take three times longer than normal or something,
|
||||
because everything else is now getting in a way, but you can still use your computer,
|
||||
so if you actually wanted to use your computer whilst doing something else, do that,
|
||||
if on the other hand you just want to leave the computer and let something run, put it up as high,
|
||||
I really don't recommend doing real time, set something as real time, you pretty much guarantee
|
||||
your computer will crash, because it can't do anything else, which is not good,
|
||||
I mean see all the programs here, you can see X4 or XC for example, it's got HK command XC,
|
||||
which is the keyboard, it's got a couple of extra keys and that's the thing that does that,
|
||||
AVGCCXC, the Google Toolbar Node Fire command XC, Proce XC, because of course that's what I ran,
|
||||
as I said it's all this up there and you can see what's running and terminate them, and it's
|
||||
basically pretty damn good, there's also a search online option, which I don't remember being
|
||||
there last time, and in fact if we do that, we notice Proce XC now has launched Firefox,
|
||||
Firefox is running away, it's got a process idea of 2644, it's using flashes on and off,
|
||||
stuff it yes, just Google searches, basically, nice and simple, but you can see exactly what's
|
||||
running, what called what as well, so as I said you can see here that X4 or XC called Proce XC,
|
||||
because of course I'm running a Windows Explorer session and I ran it from there, so X4 or XC
|
||||
called that, it's basically a pretty damn cool debug tool and it works better as a replacement
|
||||
for task manager as well, you can do pretty much everything task manager does,
|
||||
possibly shut down, there might not be an option, oh no, there we go, there's an option to shut
|
||||
down, it does everything task manager does and does it better, screw task manager use process explorer
|
||||
instead, Rookit Revealer, open up that, except the license, hit scan, bottom right hand corner,
|
||||
just hit enter, it's the default button, run stuff, it dumps the registry down, it tells you what
|
||||
it's doing and then it compares what the registry says the files are on the hard drive and what
|
||||
files actually are on the hard drive, trying to think of an analogy, Star Trek 6, though
|
||||
can work out if they fired a torpedo or not, their computer said they fired a torpedo, they were
|
||||
fairly convinced they hadn't, they went down and counted every single torpedo, found out the
|
||||
computer had lied to them and it was wrong, that's basically what Rookit Revealer does, it turns
|
||||
around to windows and says what files are we got, what have we got here, what have we got there,
|
||||
windows says well we've got you know 43 torpedoes, it then goes and counts manually and finds 44
|
||||
and says hang on, this isn't right, it will come up with anything that is hidden from windows
|
||||
itself, the operating system, not necessarily a bad thing, certain things if you're using
|
||||
Norton, well first of all why are you using Norton, but if you're using Norton, safe delete or
|
||||
whatever their version of the recycle bin is called, if you're using that what it does it hides
|
||||
files from the operating system in a bit of a weird way but it makes it so that people can't
|
||||
find the files but they are available in Norton if you want to delete them, that will turn up
|
||||
in Rookit Revealer because there's a file on the hard drive, the operating system doesn't know about,
|
||||
so don't just assume everything you see is bad, most of it isn't to be honest, what have we got
|
||||
here for example, HKLM which is spreadsheet key, the local machine, software, lick control, lick that
|
||||
that's LIC, Dan calm down, lick control slash, lick control slash, lick control slash, lick control
|
||||
bunch of weird character star, LKZ, lots of weird stuff, so basically that's saying here's
|
||||
something that's hidden and the reason that's hidden is actually that's the license control, I believe
|
||||
that is ZEDMUD, actually look that is but it's it's something my wife bought and she's got the
|
||||
license on the computer and that's what it didn't because you don't want just anyone to be able to
|
||||
see the license, so there's a few weird things like that, basically run it, look on the internet,
|
||||
see what stuff you've got on there because most of it's not bad, well I'm going to bore that now
|
||||
because I can, you're going to let it run, it takes, I don't know, half an hour, so it depends
|
||||
on how big the hard drive is, how fast the computer is, really cool program run it,
|
||||
TCP view seems to be taking a while, load license agreement, yay, what does it say in a way,
|
||||
schedule for license, license is, the software is license, not sold, the
|
||||
screaming only gives you some rights to use the software, the internal materials, all other rights,
|
||||
and that's applicable law gives you more rights than the despite this limitation,
|
||||
basically we're not going to give you any chance to do anything unless you really, really
|
||||
must have to, and even then we're going to argue about it, you may not do anything to this program,
|
||||
apart from run it, you may not lend the software, so I can't actually give the software or lend
|
||||
the software to you on a disc, even though it's free download, how stupid is that, you can't export
|
||||
it, subject to the United States export laws and regulations, the software is as is,
|
||||
well it says most open source really, so I can't argue about that,
|
||||
outside the United States if you acquired this software in, sorry let's do the series first,
|
||||
outside the United States if you acquired this software in any other country, the laws of that
|
||||
country apply, no shit Sherlock, normally whatever country you end the loss of that country apply,
|
||||
whatever, so anyway, agree, and it runs stuff, and it tells you what's going on,
|
||||
what is connected to where, Apple Mobile Device Service XE 1520, all that 1520s,
|
||||
possibly a process number I'm not quite sure, sure if I actually bothered to read the help it would
|
||||
tell me, protocol, TCP, local address, this machine name, 27015, that'll be the
|
||||
port number, local, host 4409 is the remote address, it was looping back on itself for some weird
|
||||
reason, Google, two-mile net fire is going to Google, fun, they're not, iTunes helper,
|
||||
all right, okay, the Apple Mobile Device Service XE is connected to it, the iTunes helper,
|
||||
which is connected back to the Apple Mobile Device Service XE programs, because that's going from
|
||||
4409 to 27015, so that's what that's doing, LSASS is listening on a couple of ports, but
|
||||
no actual connections, SV host is doing stuff, systems doing stuff, seems to have net fire
|
||||
running, not good, but anyway, it's got stuff running, basically if you've got spyware running
|
||||
on your machine, chances are it's going to try and connect out to the internet, your
|
||||
TCP view, you will see it, for example, if I try and pretend that something, hey, let's use
|
||||
internet explorer, that'll be love, always is, internet explorer, we've run that, all right,
|
||||
so forget Microsoft.com and go back to TCP view, we now see pretty light red greens, greens are
|
||||
a connection just made, red is one, just ending, we can see internet explorer is going to lots of places,
|
||||
it is going to a camay.com, it is going to a specific IP address, it is doing lots of things,
|
||||
it's interesting because I've got an option to resolve, and it's not resolving them,
|
||||
but it's got lots of connections, it's gone to 777.677.126.50, which I bet will be the Microsoft
|
||||
website, Microsoft.com, but you can see exactly what's going on, where and what programming is running,
|
||||
which is pretty cool for checking spyware and stuff, because you can actually see what an
|
||||
earth it is going, and it shows you things as they're opening, closing, so that is basically the main
|
||||
tools, except for PS tools, PS exec, so if I run PS exec, it gives me a lot of options,
|
||||
so I can run, I can separate the processor, so for example to run the application on CPU,
|
||||
2 and CPU, 4N2-A2.4, I'm just going to run some stuff, PS exec, now to pad XC,
|
||||
we run that, and let pad kicks in, wow, exciting, it's cool, as I said before, you can run stuff for
|
||||
other people's computers, and you can actually look at stuff, and you can copy files over,
|
||||
and you can actually run stuff, and optional user ID, and password, and timeout, and limited users,
|
||||
and a billion other options, trust me, it really is a cool application, just go down, look at it,
|
||||
and see what is going on, PS exec, backstarts, backstarts, compute name, or computer, computer,
|
||||
computer3, and all that, follow name, dashu, for user, dashp, password, dashm, for timeout,
|
||||
dashs, for running the remote process and system accounts, but it's really cool, you can set the
|
||||
priorities up, and run everything, and you can put the computer in there, so you can run stuff
|
||||
on the computers, that's pretty cool, so if, for example, you sent someone an email with an
|
||||
attached executable, you can put PS exec in to run the program, and you can get it to run under,
|
||||
this is an account, don't ask me why that might be useful, but someone might find that useful,
|
||||
and if you do, you're an asshole, and deserve to die, obviously, of course, if you're emailing
|
||||
them, so please, would you mind running this, that's fine, if you're not asking them to run out,
|
||||
and making them run it automatically, then you're an asshole, deserve to die, in a slow and
|
||||
painful death, what else we got here, PS file, run PS file, it says no files open remotely,
|
||||
that's good, no one's hacking into the vice computer, at least not at the moment,
|
||||
again, you can see what files are open, remotely, funnily enough, again, if you find there are
|
||||
files that remotely, it's a possibility that that is an hack attempt, or something similar, so
|
||||
if something you want to investigate a little further, PS info is trying to access the internet
|
||||
querying information, and here we go, PS info, it goes off and says it has been running for six
|
||||
hours and 15 minutes and 20 seconds, it's a Microsoft Windows XP Uniprocessor free kernel version,
|
||||
product type, product version service, page two, for example, status, error reading status,
|
||||
figures, internet explorer version seven system routes, windows, processes one,
|
||||
process speed 2.7, gigahertz, it's a cellar on CPU, 230, it make memory, and a GeForce 4MX 440 SE
|
||||
video driver, now you may find that useful to find information out about the computer that you're
|
||||
connecting to, the uptime is probably the most useful, PS kill, it's possibly my most favorite one,
|
||||
along with PS exec for just screwing around with people, again, allows you to kill stuff on
|
||||
other people's computers, you're on PS kill, dash T to kill the process and any descendants,
|
||||
backslash, backslash and then the computer name, with a dash U for use name, dash P for password,
|
||||
should it be required, and the process ID or the name, process ID can find by running PS list
|
||||
on the computer itself, which is the next one, PS list gives you a list of all the stuff running,
|
||||
system is process ID of 4, priority of 8, all that good stuff, remember I was talking about
|
||||
priorities earlier, you can see the priorities here, most of them are 8, windlogging is 13,
|
||||
CSRSS 13's, SMSS is 11, still has too many S's in it, you can see exactly what's going on,
|
||||
PS list will show that and then you can use PS kill to kill any of them, or you can just give it
|
||||
specifically by name, which you can again pick from the PS list, PS logged on, again pretty similar
|
||||
to before, tells me that lots of people are actually logged in, but no one is logged in via resource
|
||||
shares, which is always good, because that chance time means remotely, that would be the
|
||||
camera, the names of them, the weird computer dollar files and things that are other shares that
|
||||
works off demands you put in, but doesn't tell you about, and hides them, PS service,
|
||||
spam the screen entirely, because you list of all these things like WZ, CSVC for the wireless
|
||||
zero configuration service, would be presumably the SVC, but tells you who started to look what the
|
||||
state is, stopped funnily enough, it's hardwired in, not wireless, can't be asked with all the
|
||||
security settings on there, but you can see exactly what's running, what's stopped, and you can actually
|
||||
start and stop things yourself, if you want, again, on a backslash, backslash, computer name,
|
||||
dashu for username, dashp for password, then you run the command, if you've got query, config, set
|
||||
config, start, stop, restart, pause, cont, depend, find security, that can be pretty cool, if you're
|
||||
trying to run stuff on a remote computer that you really can't be bothered to walk down eight flights
|
||||
steps and go through the locked door, swipe your card eight times to set up, you can just do it all
|
||||
remotely, and I think that's about it, that's all the PS tools, that's all the rest of it,
|
||||
I'm now going to go and work out what an earth the dollar extent and dollar directory
|
||||
files are, and why they're floating around on my waste computer, I'm sure a quick google wouldn't
|
||||
like to me on that, I'd like to thank everyone for their feedback, well actually I'm recording
|
||||
this on the day that the last episode came out, so only two people have actually told me about
|
||||
how the last one went over, Dave Yates, because I sent him an early version said,
|
||||
it Dave, let's do this and see what it's like, he came back said, it's great, you're in
|
||||
natural, and then Dan listened to it, and did love the reference to himself, so hey Dan,
|
||||
and he enjoyed it, but did complain it was far too midday centuries, so now I've just spent the
|
||||
last however long it is, because I don't know, I'm running multiple channels and audacity,
|
||||
so I keep changing and recording bits, because you really don't want me to rumruke it,
|
||||
I'm going to do this and it doesn't work, so thank you very much, shout out to Dan and Dave,
|
||||
thank you very much for your comments, this has been Zoke, on Sisson Tunnel's part 2,
|
||||
and you've been listening to Hacker Public Radio, thank you for listening to Hacker Public Radio,
|
||||
HPR is sponsored by Carol.net, so head on over to C-A-R-O dot N-E-C for all of us in the
|
||||
area, thank you very much, thank you very much, thank you very much, thank you, thank you very, very much, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you
|
||||
98
hpr_transcripts/hpr0048.txt
Normal file
98
hpr_transcripts/hpr0048.txt
Normal file
@@ -0,0 +1,98 @@
|
||||
Episode: 48
|
||||
Title: HPR0048: Virtualization Part 2: Qemu quickstart
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0048/hpr0048.mp3
|
||||
Transcribed: 2025-10-07 10:45:00
|
||||
|
||||
---
|
||||
|
||||
...
|
||||
Hello and welcome today's episode of Haco Public Radio.
|
||||
I'll be your host for today, DeepGeek.
|
||||
Today will be part two in my ongoing series on virtualization technology entitled QMU,
|
||||
A Quick Stock Guide.
|
||||
So, you know, I want to talk a little bit about how things are going to proceed with the series in general.
|
||||
I will be using the Emulator QMU and all the links for all this stuff will be in the show notes for this episode on Haco Public Radio.org.
|
||||
I will be writing a Doc Dropper's article because I'm breaking down these parts into very, very small pieces.
|
||||
And I think this episode is going to move so quickly that you really won't need the web-based documentation on Doc Droppers.org.
|
||||
So, what I want to do is I want to get up and get you up and started with two methods.
|
||||
One is going to involve a downloading the ISO image for a popular live CD.
|
||||
And the other method is going to be actually taking the image pre-engineered for QMU and kicking it off.
|
||||
So, all the more complicated stuff will be for the introduction part, which will be part three.
|
||||
Things like creating your own virtual machines, disk image file, and the different applications for that will be put north.
|
||||
Today, we're just going to get up and running, kick off a few windows, and fool around with it.
|
||||
It's going to be a lot of fun.
|
||||
So, if you want to far along with me, I want to first make an important assumption that you're using a Linux that relies upon an at-based package-managing system.
|
||||
Such as, I use Debian Linux.
|
||||
A lot of people using Ubuntu.
|
||||
Both these popular distributions, we should be just going through to a root-enable command line, and type in apt-get-space-install-space-q-em-u-avid-enter, and watch your package manager do its thing.
|
||||
With two downloads, I'm going to need it to make, and the buildings are up to where to get these from.
|
||||
The first, everyone's favorite, NAPIX STD.
|
||||
The STD, by the way, stands for Security Tools Distribution, and this is every 10 testers favorite distribution.
|
||||
It's a live CD, but once you download it, don't bother to burn it to CD.
|
||||
We don't have to do that for this.
|
||||
The second thing is, there's a website out there called OSZU.org.
|
||||
The links up in the show notes are hackpublicare.org, where OS images are, and download the free BSD image.
|
||||
Go to the link at hackpublicare.org, download free BSD 6.1-REL.qao.img20060526.tore.
|
||||
Don't try to write it down from what I just said. Read the show notes, find that file, download that, and the NAPIX image, and we can get started.
|
||||
Do you have to get installed QMU and it will install the system?
|
||||
The first thing we're going to do is we're going to pick off the NAPIX STD copy.
|
||||
So how do we do that? Well, first, we change directory into wherever we downloaded the ISO image from a command line.
|
||||
So pick off your favorite X term, do a CD space, and whatever the directory name is where you saved the ISO file with the NAPIX STD in it, and type in the command QMU space.
|
||||
Dash sound HW space ES1370 space, dash CD ROM space, and in the file name of NAPIX, NAPIX dash STD dash 0.1.ISO.
|
||||
And that will just start up a new window, and you'll get the boot for NAPIX STD hit enter, and it'll come right up.
|
||||
And follow around with it. Have a good time. Check out STD without having to bother with running it off of a CD.
|
||||
OK, I got to tell you, I was really very tempted to end it right here at five minutes into the show.
|
||||
But it's literally that simple to just use this software. It's sure you have to use command line, and there are graphical ways of picking up virtual technologies.
|
||||
But it's just a command and it runs. All right, so the only thing you need to know is that, you know, to get into it, you know, you move your mouse into the box, click it, and begin using it like a regular system.
|
||||
When you want to break your mouse out of the box, you hold down the control and old buttons on your keyboard, and your mouse goes back to normal, rocking in the whole screen of your desktop.
|
||||
All right, so now that's one thing, and that will work with any live distribution.
|
||||
But let's have a look at what it is to download a virtual machine that's already engineered.
|
||||
So you go to the oszoo.org, and you download the free BSD file at a reference to the show notes, and you can go for your X term or what have you, and you change directory to wherever that is.
|
||||
So then you're going to have this tall file, free BSD6.1, blah, blah, blah, blah, tall.
|
||||
All right, so you're going to have to untarge, so you type in tall space, dash xvf space, and then the name of the file, and it will create until unpackage that compressed archive.
|
||||
And then you change directory into that, the new directory you create when you compress it.
|
||||
In other words, when you untarge something, it's going to create a subdirectory.
|
||||
So for me, it was CD space, free BSD6.1.ol.qpow.img, and I was in another subdirectory.
|
||||
Now I want to just have a look and see what they did.
|
||||
So I typed in qemuse-img, space info, space, free BSD6.1.ol.qpow.img, and like I said, all these things are in the show notes.
|
||||
All right, so don't try to copy it for my voice.
|
||||
Now, qemuse-img, that is the utility that comes with qemuse, so that you can look at virtual disks that are expressed as files on your, on your system.
|
||||
So you'll see, you'll give you the actual disk size, which is something like 600 megabytes, and it'll give you a virtual disk size of like 10 megabytes.
|
||||
So you see this, what that's telling you is that this file actually takes up the 600 megabytes, but if you begin saving things and working within this image, you can go up to 10 megabytes, 10 megabytes, with this image.
|
||||
All right, if you want to backup this image before using it, use a static copy command.
|
||||
I wouldn't use a drag and drop when file manager to make a backup copy, because it might expand the file out to the full 10 megabytes of size.
|
||||
So use bash, bash, is the ultimate file manager, you know, use the CP command.
|
||||
Then I typed in a quick cat space, and all cats read me, where the little blurb that the guy who put together made, and so that the only user was root, and that the password was freeBSD for this image.
|
||||
Now I knew that, I just kicked it off. All right, here's the command, QEMU, space, freeBSD6.1, REL.qcal.imj.
|
||||
That's it.
|
||||
You'll see the boot come up, and after a couple of seconds, you'll have a full Linux boot, I mean, excuse me, a full Linux boot, this is a freeBSD, and you'll have that system in front of you.
|
||||
So play with your systems, enjoy them. It's that easy.
|
||||
And on our next episode in this series on virtualization, I will begin introducing the topics of building your own disk images as files, and going to some more detail of what that's involved, and that will be the introduction proper to QEMU.
|
||||
If you're sitting there listening to this and saying, well, what about other systems? What about VMware? What about Zen?
|
||||
I don't work with those in day to day. I'm a free software advocate, and so I stick to free software's.
|
||||
So, you know, I'm going to be working QEMU, but all these concepts will carry over.
|
||||
So I hope you enjoy that.
|
||||
Today's gig tidbit. I'm going to continue with my series of greats of computer science.
|
||||
I want to just mention to you, and Wikipedia is a wonderful place to start.
|
||||
I want to mention to you a German computer scientist, now passed away recently, Dr. Edgar F. Cod, the 2Ds.
|
||||
Dr. Cod was the fellow in the 70s, the computer scientist, who introduced the concept of relational database management.
|
||||
Dr. Cod wrote papers and even published a book, the relational model for database management, explaining what it meant.
|
||||
He based his vision on database management on a obscure branch of set theory mathematics, where information was expressed in a mathematical way that related to each other,
|
||||
and then began working towards the definitions of languages that referred, that helped us navigate within very large sets,
|
||||
and changed forever the face of database industry.
|
||||
So, he passed away in Florida in 2003, I believe. I don't have the word paid for it in front of me.
|
||||
But it was an amazing, amazing scientist. Toward the end of his life, he was inducted into the fellows of the ACM,
|
||||
and after he passed on to the great computer room in the sky, or I love being a ham, excuse me.
|
||||
The Association for Computing Machinery, named one of their highest awards after him.
|
||||
So, if you get a chance to read his book, a PDF article, or maybe even go further and actually pursue some of his books,
|
||||
you also wrote some things on cellular automata, you know, if you've ever heard of the Game of Life, you might be interested in that too.
|
||||
So, as always, I invite feedback. You want to send me email, hpr at deepgeek.us,
|
||||
or you may leave a message for me, a private message on the bin rev forms.
|
||||
My username there, as it is here, is DeepGeek.
|
||||
I hope you enjoyed the second in our series of virtualization with QMU,
|
||||
and the next episode will be an introduction proper, where we'll go over, still introducing material,
|
||||
but we're going to get a little deeper into that one, I'm sure you'll enjoy it.
|
||||
So, this wraps up today's episode of Hacker Public Radio. Please tune in tomorrow for another episode. Thank you.
|
||||
Thank you for listening to Hacker Public Radio.
|
||||
HPR is sponsored by Carol.net, so head on over to C-A-R-O dot-N-T for all of us here.
|
||||
Thank you.
|
||||
149
hpr_transcripts/hpr0049.txt
Normal file
149
hpr_transcripts/hpr0049.txt
Normal file
@@ -0,0 +1,149 @@
|
||||
Episode: 49
|
||||
Title: HPR0049: XPlane
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0049/hpr0049.mp3
|
||||
Transcribed: 2025-10-07 10:45:11
|
||||
|
||||
---
|
||||
|
||||
music
|
||||
music
|
||||
music
|
||||
music
|
||||
music
|
||||
So we're going to take 1,4,000 and reduce back to 2,5, zero knots.
|
||||
So we're doing that now 1,4,000 at 250 knots, you've got to speed up to 2227.
|
||||
Thank you.
|
||||
Delta 71, reduce to 2,5, zero knots.
|
||||
Let's see what it's on to 250.
|
||||
It went up to 4,8, so it was off.
|
||||
It just got to 2,6,0, but 2,4,0, back direct off.
|
||||
We're 8 out of 10, up to 10, right?
|
||||
It's going to maintain level 210.
|
||||
Hello and welcome to this second episode of Hacker Public Radio.
|
||||
I'm going to briefly go over explain version 7 and how to do an approach, basic approach.
|
||||
So back when this was out or when I received it was a good while ago.
|
||||
This was version 7 once I was playing with it.
|
||||
I used to know the proper way to do everything and what all the acronyms were.
|
||||
But this time around, it's kind of a revisit.
|
||||
And it's similar to Microsoft Flight Simulator, but it's more flexible.
|
||||
Also, it's a little bit more of a learning curve.
|
||||
If you've never used the Flight Sim before, you probably want to do Microsoft Flight Sim.
|
||||
And then mess around with this guy, because there's not a whole lot of tutorials or anything like that in here for you.
|
||||
Okay, what you'll need is don't need a joystick.
|
||||
You can, for the Texas speech engine, you can use 18T National Voices, which is kind of interesting.
|
||||
For the image or game, you can use the retail copy.
|
||||
Or if you are inclined, you can find a smaller copy that fits on a mini CD, the 8mm.
|
||||
It's about three, four or five hundred megs.
|
||||
And it has like San Francisco.
|
||||
And the rest is just airports.
|
||||
So you're missing all the textures and all that stuff.
|
||||
But it's great for portability reasons.
|
||||
Alright, so you can fly around in circles and take off.
|
||||
You have the basics down.
|
||||
You want to land.
|
||||
Now this is the easiest way.
|
||||
It might not be the right way.
|
||||
But this is the easiest way that I found out how to land.
|
||||
Get the airport code.
|
||||
In my example, got KLAX.
|
||||
And the runway is going to be 0.7R.
|
||||
Now, it'll be a little bit confusing when you look at the runways.
|
||||
But if you know the degrees, you'll figure it out.
|
||||
For example, 0.9 is going to be 90 degrees, which is going to be east.
|
||||
So you know that you're going to be flying that direction on the approach.
|
||||
Now, I'm sure, like I said, this is the easiest way I know how to do it.
|
||||
It's probably not the right way.
|
||||
You're probably supposed to do all kinds of crazy shit before you do any of this.
|
||||
But get the airport you're going to.
|
||||
And then the actual field you want to land in.
|
||||
And then the last thing you'll get is the frequency for it.
|
||||
So in KLAX, runway 0.7R, I'm going to use 109.9.
|
||||
Now, all this information is going to be on the plates.
|
||||
And the only way I've been able to find out how to get the plates you want is move the plane to that location
|
||||
and open up the plates that are around that area and kind of look around and find an airport you want
|
||||
and get those values from the actual plate.
|
||||
And then proceed to go move the plane back to wherever you started from.
|
||||
There might be in this version a time lapse speed up or slow down.
|
||||
But I wasn't able to find it.
|
||||
But once you have your information, you're at three pieces of information, the frequency, the runway,
|
||||
and the code for the actual airport, you're ready to go.
|
||||
So the way I do it, I pull down to the GPS, press the down arrow key.
|
||||
And on the little panel there, we do down arrow clear, clear.
|
||||
And then init, you put in the code, and then the AIRP key.
|
||||
Now, any of these acronyms, I don't know, don't care.
|
||||
I knew them at one point in time, but coming back to this, I just kind of eyeballed my way through it.
|
||||
Once you get it in there, it'll draw a red line to the direction of the airport.
|
||||
And that's where you just point your heading.
|
||||
And you're basically making a B-line.
|
||||
You're not taking any VORs or anything, you're making a straight B-line straight for the actual airport.
|
||||
Now, once you get within the block, where you can see it in the plate list,
|
||||
that's where you can get the frequency and stuff like that.
|
||||
You can pretty much fly anywhere you want, pull up the plate list,
|
||||
and land on any airport you want using this method.
|
||||
Now, once you can see it in the plate view, you see your airport, you'll see the localizer,
|
||||
and it looks like a little carrot.
|
||||
Now, once you're within the localizer, the actual navigation deal on the left side
|
||||
will start to pick up the signal, and then you can use the nav and autopilot
|
||||
to have it land playing, or at least go in the general direction where it's supposed to go.
|
||||
Once you get the plate up, and you know which frequency you put in,
|
||||
you're going to use the nav one or two, it doesn't matter which one,
|
||||
just as long as the active one is the one you have it set to on the knob.
|
||||
You're going to set it to the right frequency, and then you're going to move the CRS knob to the right direction.
|
||||
So, in our example, it's 07R, so we'll set it to 70 degrees.
|
||||
So, here within the localizer, you get the set to the right frequency, and you're good to go.
|
||||
It will start once you hit it, and once you pick up the frequency, the nav on the left will move,
|
||||
and that way you know it's kind of locked in, and that's when you can hit the autopilot.
|
||||
There's the vertical and horizontal sync.
|
||||
I've been had some problems with the vertical sometimes, so I don't just automatically click the vertical.
|
||||
There's something you have to set as far as elevation, or reset the offender, or something that I'm missing,
|
||||
which I don't feel like reading 7,000 books to figure out what it is.
|
||||
Alright, so you've got your heading locked on the localizer, and it's going back and forth,
|
||||
and you're getting lined up and everything.
|
||||
You want to get your speed down, put the flaps up all the way, put the gears up down,
|
||||
make sure you have everything prepped and ready to go.
|
||||
And pretty much all you have to worry about is your altitude from here out,
|
||||
and then the pitch once you hit the actual landing field.
|
||||
I use put the flaps on one notch from all the way down, that way I don't have to add the speed too high.
|
||||
And then right before I hit the actual runway, or right before I'm about to land,
|
||||
I kill the power, and put on the brakes to max, and that's automatic brakes,
|
||||
so once you hit the ground, it starts putting on the brakes for you.
|
||||
Now like I said, in the mini version that I have, if you go anywhere except like San Francisco,
|
||||
you're going to end up with just an airport in the middle of the air,
|
||||
and that might be possibly why I'm having problems with the vertical autopilot,
|
||||
and it's not landing properly, so that might be the reason I'm not sure,
|
||||
but that's going to be something you're going to miss when you use this smaller ISO.
|
||||
Alright, some tips. If you're on the approach, you'll see a little icon towards the middle that looks like a plane,
|
||||
and when you're about to stall, you'll see that guy start dropping.
|
||||
So what you want to do is keep an eye on that guy, make sure that your nose is where you want it to be,
|
||||
and make sure that your speed is high enough, and your flaps are up,
|
||||
that that guy doesn't start dropping.
|
||||
If he starts dropping, just give it some gas, and you'll be able to come back up,
|
||||
and either slow the speed down, or put the nose down, or whatever you got to do,
|
||||
to get it to keep them stalling.
|
||||
For altitude, I use the hold option and vertical speed.
|
||||
Vertical speed is good for if you're going to be changing your altitude a lot.
|
||||
There's the elevator trim, which can kind of go haywire sometimes,
|
||||
so there's a reset option somewhere, which I haven't been able to find,
|
||||
to reset the elevator trim if you need to.
|
||||
But for just up and down motions, I'll use the vertical speed.
|
||||
In the map view, there's center-gone aircraft,
|
||||
which is good for if you bring up a plate, and you don't feel like clicking around,
|
||||
to the center-gone aircraft, you'll know where you're at,
|
||||
and you can see your approach and all that stuff.
|
||||
Altitude, so you can just pick a plate, aim the heading in the right direction,
|
||||
have the frequency in there, and be good to go, and you can just land, you know, wherever you want.
|
||||
You can also use the flight plan option, which is on the inner key,
|
||||
and pick a flight plan, pick an altitude, and it'll tell you when to decrease your speed,
|
||||
increase your altitude, decrease your altitude, et cetera,
|
||||
and it'll help you out on the approach and stuff too if you're new to it.
|
||||
That pretty much wraps up this episode.
|
||||
If you haven't checked that explain, I would.
|
||||
Check out the new version, and also if you're new to it,
|
||||
you probably want to try Microsoft Flight Sim.
|
||||
There's a little bit more of the learning curve or less learning curve there.
|
||||
And if anybody has any questions, just let me know.
|
||||
And if anybody's in the Atlanta area, look forward to seeing you at Outer Zone.
|
||||
Thanks.
|
||||
Thank you for listening to Hack or Public Radio.
|
||||
HPR is sponsored by Carol.net, so head on over to CARO.18 for all of her team.
|
||||
Thank you.
|
||||
501
hpr_transcripts/hpr0050.txt
Normal file
501
hpr_transcripts/hpr0050.txt
Normal file
@@ -0,0 +1,501 @@
|
||||
Episode: 50
|
||||
Title: HPR0050: Linux Boot Process Part 2B - Grub
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0050/hpr0050.mp3
|
||||
Transcribed: 2025-10-07 10:47:46
|
||||
|
||||
---
|
||||
|
||||
Hello, welcome to another exciting episode of Hacker Public Radio, my name is Dan
|
||||
Washco and I'm continuing my series of Delinix startup or boot process today with
|
||||
episode 2b or actually 3 whatever you want to call my episode on grub and no
|
||||
I'm not talking about those tasty little beetle larvae that a lot of countries
|
||||
find very nutritious and supplement their protein intake with but I am
|
||||
talking or slying for food for that matter but no I am talking about the boot
|
||||
loader of the gods grub the grand unified boot loader this I'm excited to
|
||||
talk about grub because grub is it's just awesome and I hope that you find grub
|
||||
as awesome as I do because it's just it is it is fun it is exciting and it is
|
||||
just all around goodness wrapped up in a little boot loader now a lot of my
|
||||
information was called from the very informative very useful grub manual which
|
||||
can be found on the grub website which is very easy to access at www.gnu.org
|
||||
slash software slash grub that's off the GNU website and grub is a
|
||||
application under the GNU public license it is currently on version 0.97 which
|
||||
is the version that most distributions install with and you know one of the
|
||||
things that's really cool and you probably take for granted is that when you
|
||||
run your OS you're actually running two kind of systems there I mean well
|
||||
three if you you could say you got the BIOS which loads in which kicks off the
|
||||
boot process boot loader which isn't part of the operating system so to speak
|
||||
it's its own little consider operating system and no other boot loader I've
|
||||
seen other than grub really exemplifies this and we'll get to that in a few
|
||||
moments and then your boot loader in this case grub will kick off the loading of
|
||||
your operating system of choice now what's really cool about grub is not only
|
||||
do you get to set it up but you can also configure it on the fly unlike
|
||||
lilo the Linux loader which I talked about last time you install the Linux
|
||||
loader and you hope it you know you got everything right for the next time you
|
||||
try and boot grub on the other hand it is not that limited if if something's
|
||||
wrong grub has essentially three modes there's a menu mode which is
|
||||
what most people will see when they boot grub if they see grub at all which
|
||||
provides you a list of definitions OS definitions as you can boot there is the
|
||||
edit mode where when you're in the menu mode you can press the e button and
|
||||
begin edit any one of those definitions or there is the command line mode which
|
||||
allows you to just access the grub command line mode and you could do a whole
|
||||
lot more on the command line mode which we'll get into shortly now grub has
|
||||
supplanted lilo as the main Linux bootloader of choice for most
|
||||
distributions now I do believe slackware is one of the few that are left that
|
||||
uses lilo to this day as default bootloader arch Linux gives you a choice
|
||||
and so does Gentoo give you a choice when you're installing the operating
|
||||
system as to which bootloader you want to use now if if you are at all has a
|
||||
10 you know you might be familiar with lilo very very familiar with lilo
|
||||
hopefully after this you will elect to choose to install grub as your default
|
||||
bootloader for any operating system that you want to run it is that awesome
|
||||
now most people are not going to have to worry about installing grub pulling
|
||||
down the sources or building grub yourself or unless you're again running
|
||||
arch or Gentoo you probably won't even be asked what loader you want to run
|
||||
you'll be asked do you want to install it in the master boot record or in the boot
|
||||
partition of your root partition given that I'm not really going to go into the
|
||||
details of installing grub from source you can get that from the documentation
|
||||
most people will not have to do that but given that when you install when you
|
||||
install your your distribution of choice and you go through and it prepares to
|
||||
install the bootloader unlike lilo or some other bootloaders you don't really
|
||||
have to have much configured for grub when you run the grub install now there are
|
||||
a few configuration files and if you read the documentation it's of course a
|
||||
documentation tries to be operating system agnostic but we're going to be
|
||||
focusing on documentation for Linux or GNU Linux and where the majority of
|
||||
distributions install grub and this configuration files will be found in the
|
||||
slash boot slash grub directory you will also find command grub commands in the
|
||||
slash S bin or slash UUSR S bin because they're more system specific and as
|
||||
opposed to general user commands or more for administration now in the boot
|
||||
grub directory typical files that you will find in there are a menu dot list or
|
||||
mm menu dot lst which is a general configuration file and it holds the
|
||||
definitions for the operating systems that you're going to boot additionally
|
||||
what you will find in there are the stage files for grub now grub boots itself
|
||||
with at least two stage files the first stage one file is simply put in the
|
||||
master boot record or boot sector of the partition that you have installed grub
|
||||
on the purpose of stage one is to load either stage 1.5 or stage two essentially
|
||||
what stage one does is it sets itself up to encode the location of stage 1.5 or
|
||||
stage two into the master boot record so it can kick it off now stage 1.5
|
||||
files generally optional but you're going to find them on a Linux
|
||||
distribution is what grub needs to read a file system you will see an X2
|
||||
riser file system XFS file system you will see multiple different types of
|
||||
stages for being able to read a file systems type and stage 1.5 is usually
|
||||
installed right or pulled in right after the master boot record so stage one
|
||||
kicks off stage 1.5 if no stage 1.5 is available it tries to just go right for
|
||||
stage 2 which is the core grub image which will pull off the file system where
|
||||
grub was installed will pull out what it needs to set up the bootloader and
|
||||
begin to boot your operating system of choice now a few other files it might
|
||||
be in there is a default file which specifies the default image or
|
||||
definition of boot which we'll get to later also you will find in there other
|
||||
stages like a stage 2 L Torrito and that's used for creating bootable CD
|
||||
roms a no grub or I'm sorry an NB grub which is a network boot grub image and a
|
||||
PXC grub which is a network boot image for using pre-boot execution
|
||||
now we are not going to cover network booting with grub or creating a
|
||||
bootable CD in this episode today we're kind of you know don't want to make it
|
||||
too long additionally we're just more interested in regular Linux systems as
|
||||
a more advanced topic your version of grub that includes
|
||||
included with your distribution may not be have grub compiled with the network
|
||||
booting options so we're going to stick with the the basics for today the
|
||||
plain vanilla grub now as I said you're probably not going to need to
|
||||
install grub yourself but just keep it in the back of your mind you are two
|
||||
basic ways to install grub once you have the software install on your system
|
||||
of course there is the native which is using a grub boot disk
|
||||
and using a program called grub install right inside of Linux the native
|
||||
involves creating a grub boot disk and using the grub interface
|
||||
to set up an install grub now while they consider this the safer way
|
||||
to install grub the safest way it is also the most difficult way to install grub
|
||||
and we're not going to go into many details in here suffice to say that if you
|
||||
really want to find figure out how to do that read the documentation we're
|
||||
going to talk about the grub install because it's it's easier of course
|
||||
translates better to describing that and
|
||||
I've never had a problem running it so it's not that
|
||||
risky I don't think any more than any other piece of software you're
|
||||
installing on your system anyway and the grub install essentially you run grub
|
||||
install and you pass the device name either a Linux device or a grub device
|
||||
as an option so for instance you was putting grub dash install then space slash
|
||||
dev slash hda which would install grub into the masterboot record of the
|
||||
first IDE disk on your system now we're talking about Linux device naming
|
||||
here not bsd not grub device naming which I'll cover in a minute
|
||||
but Linux device naming so if you had a scusy drive in there and you want to
|
||||
install it on the masterboot record or the scusy drive it'd be grub dash install
|
||||
space slash dev slash sda for your first scusy device or whatever device you want
|
||||
now additionally if you wanted to put it in the root or boot partition you would
|
||||
specify to put partition your your root or boot partition is on so it'd be grub
|
||||
dash install slash dev slash hda one for example which would be the first
|
||||
partition on hard drive a one all right now you can
|
||||
optionally specify the grub device now an example of this would be grub dash
|
||||
install space open parenthesis hd zero closed parenthesis which would be the
|
||||
first or the masterboot record on the first hard disk
|
||||
all right now in addition to and I'm going to cover the grub device naming in
|
||||
just a second but bear with me in addition to running you know specifying the
|
||||
link the device that you want to install and you may need to specify
|
||||
where the images are stored for instance grub install
|
||||
a space dash dash root dash directory equals slash boot slash grub would say
|
||||
and then a space dash slash dev slash hda would say all right install grub into masterboot record
|
||||
the root directory for grub is going to be under the slash boot slash
|
||||
grub directory is that's where you're going to find the images that you need to kick
|
||||
off to uh to perform the rest of the install
|
||||
all right now let's get into grub device naming because it's a little different
|
||||
than what probably most people are probably used to and might throw you at
|
||||
first as you're reading through the grub documentation
|
||||
for specifying a device and grub you put the device
|
||||
inside parentheses okay and you're basically going to be using two types of devices
|
||||
hard drive hard drives or floppy drives there's also cd drives there too but we're
|
||||
we're looking at block drives and floppy drives in a sense so the standard naming
|
||||
convention for any like hard drives scuzzy cd-round drive hard drive flash drive
|
||||
any drive block device is hd okay so hd plus the number
|
||||
a comma and then another number okay the first number is the device the second
|
||||
number is the partition on a device for instance
|
||||
you have a hard drive in your computer id hard drive or scuzzy hard drive
|
||||
you want to install grub or you're going to be looking at the first drive
|
||||
okay it's going to be hd zero inside of parentheses
|
||||
if you want to look at the first partition it's hd zero comma zero inside of
|
||||
parentheses now i don't know if you caught this i said the first partition the first
|
||||
device i gave them both label is zero that's because grub's naming or
|
||||
numbering starts with zero so zero is the first
|
||||
device or partition one is the second device or partition and so on
|
||||
so think of it different than linux naming which does like
|
||||
hda a alphabetical letter a for first and then
|
||||
a number for the partition number one hda would be equivalent to hd zero
|
||||
hda one would be equivalent to hd zero comma zero all right
|
||||
in addition to that floppy drives follow the same kind of naming convention
|
||||
generally you're not going to specify a partition on a floppy drive so you're
|
||||
just looking at like fd zero for floppy drive one fd one
|
||||
so on now interestingly um there's another way that you can specify a
|
||||
device and that is using hexadecimal or
|
||||
decimal number of the bios drive or how it's
|
||||
specified in the drive for instance on my triple e pc
|
||||
they have grub setup to look at the device zero x eight zero
|
||||
and what that means is zero x eight zero is a hard disk just like hd
|
||||
it's a hard disk one zero x eight one would be hard drive two or hard disk two
|
||||
and again it does not matter whether we're talking about a flash drive
|
||||
flash device any block device zero x eight one or zero
|
||||
um flat floppy drives are just specified with a zero so floppy one is zero
|
||||
floppy two is one floppy three is two you get the idea
|
||||
so that is excuse me there that is how use grub does its device naming and it's
|
||||
important to know that because you need that in the configuration file and you
|
||||
need that for running the command line um now what's cool about grub again when
|
||||
we get talking about the command line is it has tab completion so you can
|
||||
you can use the grub command line to figure out what devices that you have in
|
||||
a system so if you were to sit down right now okay and you were to open up
|
||||
the terminal and you were going to fire up grub okay which is now more
|
||||
more than likely you uh not going to have it in your path because it is in
|
||||
it is in the uh i believe user s been
|
||||
directory user s been if you were to fire that up and type in root and hit tab
|
||||
or open up open up open parentheses hit root open parentheses and tab
|
||||
and uh it would start to auto fill in for you just like tab completion on the
|
||||
command line so root open parentheses tab will fill in the devices that are
|
||||
able to be set as a block device
|
||||
by the root command it'll show you now for instance when i do it on my
|
||||
triple e pc root open print space open parentheses tab
|
||||
it does hd 0 comma 0 same thing as 0 x 8 0
|
||||
okay that's the flash device that i'm able to boot from on here
|
||||
now if you're in grub right now uh you want to
|
||||
just you know hit enter or back space over what you just typed in
|
||||
and hit quit to get out of the command line uh grub command line okay
|
||||
now so you got grub installed and you're already to rock and roll with it
|
||||
and let's talk about the the one configuration file probably the main one
|
||||
that you might be most interested in and that's the menu.lst file
|
||||
the menu.lst file the general configuration for grub is where you
|
||||
specify your operating system definitions similar to lilo grub is set up
|
||||
with two main sections there's the general selection section at the top
|
||||
the first part of the file and then there's your
|
||||
os or your definition section which is the second part of the file
|
||||
now in the menu.lst again keeping the back of your mind when we're talking about
|
||||
it's particularly devices and just about anything grub uses 0 as the first
|
||||
device it definition or whatever one as the second that's important
|
||||
always start your numbering with 0 work from there
|
||||
now in the general settings the first section
|
||||
grub device grub device naming let's say section 0
|
||||
all right you have the default you have it with different commands you can put
|
||||
in it for instance you can put in default
|
||||
and then the default definition to use a boot remember again starts with 0
|
||||
so if you set default to 0 it looks the first definition default to 1
|
||||
looks for the second definition okay and so on
|
||||
you can put a command in there called timeout
|
||||
timeout is the number of seconds before the default
|
||||
definition is loaded now if you didn't specify a default or you look in your
|
||||
grub menu.lst file and don't see a default
|
||||
in there that just means the default is set to the first
|
||||
definition 0 definition number 0 so the timeout will show the menu the grub
|
||||
menu for the specified number of seconds
|
||||
and if nothing is done no intervention it'll just kick off the boot
|
||||
process and begin booting that first default
|
||||
device or i'm sorry definition right there
|
||||
simple enough just like lilo but it doesn't specify intent of the second
|
||||
like lilo does it specifies it in a second so keep that in mind too
|
||||
if you specify a timeout is 50 it's going to wait 50 seconds
|
||||
not 50 microseconds i believe it's what lilo uses so you
|
||||
you want to set it to five for five seconds
|
||||
some other things you can specify in there which we'll get to in a few minutes
|
||||
is called a fallback fallback definition is used
|
||||
as a safety gap in case your first definition doesn't work you can specify one
|
||||
or more fallback definitions which we'll cover in a few minutes
|
||||
you can change the color of the menu and the text and highlighting with the color
|
||||
command the color command takes two parameters
|
||||
the normal and highlight which essentially equates to
|
||||
foreground and background color now look at you know see the documentation
|
||||
for the list of colors available but be aware that only eight of the 16
|
||||
colors that are available can be used for the background
|
||||
foreground can have any of the 16 colors but the background can only consist of
|
||||
black blue green cyan red magenta brown or light gray
|
||||
you cannot have a yellow background i don't know why but you just can't
|
||||
now you can have a yellow foreground on a green
|
||||
but you can have a green background foreground on a yellow
|
||||
that's just the limitation of it but beware of your color choices here so you
|
||||
don't end up not being able to see anything or puking when you look at it
|
||||
of course you can always change those on the fly with with the grub command
|
||||
when you're booting which we'll cover in a few minutes
|
||||
after the general configuration and the menu.lst file you have the OS
|
||||
definitions this is where you specify the definitions that
|
||||
the operating systems that you want to boot
|
||||
simple enough first line in your OS definition
|
||||
title so title space equals space and the name of the OS
|
||||
be descriptive for instance slackware 2.6 0.22
|
||||
kernel you can have spaces in there
|
||||
punctuation in there stuff like that this is just an informative title for
|
||||
now i have seen in specifying in a configuration
|
||||
i have seen that it is when you specify in the menu.lst i've seen them both
|
||||
use uh equals like default equals something
|
||||
or not using an equals so it would be like root and
|
||||
specifying the root information um it seems kind of arbitrary as to whether
|
||||
or not you need to specify an equals there or not but just be aware of that
|
||||
seems you can get away without specifying the equals you might hear me say
|
||||
equals just for you know making it a little clearer that you're setting the
|
||||
value of this okay so title is the name
|
||||
for the definition after title on a new line root
|
||||
and specify the root partition to boot
|
||||
now this must conform to the device naming structure okay
|
||||
for instance root space parenthesis hd 0 comma 0
|
||||
closed parenthesis is disc 1 partition 1 um just remember that 0 is 1
|
||||
1 is 2 and so on next line would be kernel and you're going to specify the
|
||||
full path to the kernel on your root partition now for example online it would
|
||||
be kernel space slash boot slash in a kernel name now in addition to that
|
||||
you can pass any other kernel parameters that you want to at this point
|
||||
just like in lilo you can specify specific kernel parameters this is where you
|
||||
would add them to the line right after the kernel image
|
||||
following the kernel image you're probably going to want to have your in-it
|
||||
rd or your initializing ram disk image so it's in-it-rd space then the path to
|
||||
in-it-rd image example in-it-rd space slash boot slash
|
||||
in-it-rmfs-eepc.img for the in-it-rmd image
|
||||
that's simple that's all you need after that at which point
|
||||
you can boot just about any Linux system using those commands
|
||||
now there's another option that you might need in there for different operating
|
||||
systems which is the chain loader it loads a file has a
|
||||
chain loader and then she used primarily for non-multiboot operating
|
||||
systems like windows or dots or operating systems with faulty bootloaders
|
||||
like SCO's system set or SCO Unix 7 yeah crap I forget the name of it anyway
|
||||
we'll cover chain loading in a few minutes but title root kernel in-it-rd
|
||||
essentially that's all you need okay so you got your menu.list
|
||||
you got everything set up grew grubs installed and again
|
||||
I recommend installing it in a masterboot record like Lilo unless you have
|
||||
certain you know requirements or or species you know that meet your
|
||||
cases I've never had a problem installing a bootloader in a masterboot record
|
||||
contrary to how many people or how much documentation will hem and haun say
|
||||
oh it's risky risky you might not want to do this I've never had a problem
|
||||
I think it's the easiest way to go especially when you're using a bootloader
|
||||
of the God's Grub what else could you want
|
||||
I think what really makes Grub cool I discovered a lot of the other bootloaders
|
||||
I've used is when you're using it on boot when you booted up
|
||||
more than likely most systems you're going to come right into the grub menu
|
||||
is going to list your OS definitions and I'll give you some other text in there
|
||||
like you know highlighted definition using in the arrow keys
|
||||
and press e if you want to you know enter if you want a boot e if you want to
|
||||
edit or press c for the command line now as you do that
|
||||
so simple enough let's talk about
|
||||
editing an item in the list in the menu list okay so you boot up grub
|
||||
your your definitions right there your your OS
|
||||
you click the e button you are going to be presented with the syntax for that
|
||||
definition you can then proceed to edit any one of those lines by
|
||||
moving the arrow key and pressing the e button
|
||||
to edit that line you'll be given all that line
|
||||
and you can use basic batch movement on their control b
|
||||
to go to the front line control e to the end of the line and so forth you use the arrow keys to move back and forth
|
||||
you can add stuff delete stuff on that line and when you're finished you simply press enter
|
||||
and it writes back there now let's say you wanted to add an additional line
|
||||
you go through the line above the line you want to add
|
||||
where you want to add the new line and you press the okay and it's going to add another
|
||||
line after the current line that you're on so you want to delete a line
|
||||
okay you're on a line press the d and it will delete the line
|
||||
now when you're finished with all your changes you simply press the b button to boot that
|
||||
definition now say you don't want to keep your changes that's fine too hit the escape
|
||||
button and it's going to return you back to the menu and ignore all the changes that you made
|
||||
you're good to go now the next thing that you could do
|
||||
aside from editing a definition is going to the command line mode
|
||||
now command line mode is the same thing as the grub command line mode when you're in your operating
|
||||
system and typing grub you could do some really cool stuff on here you can uh
|
||||
this is where you will be taken to if you boot grub without a menu.lst file
|
||||
and you can specify all the exact commands that you find in
|
||||
ammenu.lst file on the command mode and a whole bunch more in the command mode which is entered
|
||||
by hitting c at the menu list or if you don't have a menu list defined you type c
|
||||
and it will bring you in command mode and you can type help and it'll list all the commands
|
||||
that you you want to do and what what command line mode allows you to do in there is like
|
||||
yeah allows you to in a sense you know write your own
|
||||
definition if you really wanted to undo some other stuff you can browse your file system so
|
||||
long as it can recognize the file systems that you want to browse it has a stage files for it
|
||||
for instance to browse my my root file system which is on on the first hard drive which is
|
||||
a scusy drive on my laptop because it's a say to drive sd1
|
||||
sda partition one i would type root space open parenthesis 0 comma 0 close parenthesis
|
||||
and it enter at which point then i can use the cat command can catenate or to cd to change
|
||||
directories and i can move into that file system which is really cool and then i can cat files in
|
||||
there and i can view the entire contents of the file system tech files and every text files
|
||||
and everything just by you know mounting attempting to mount these partitions and moving into them
|
||||
through grubs command line interface you might say oh my god what about security and you know
|
||||
that means anybody can look at the contents of the file and yeah but we'll talk about some of
|
||||
the things you could do to protect from that happening okay so the command line is really cool
|
||||
if you're any command line you can press escape key to return back to the menu just like you
|
||||
couldn't edit mode now what's cool about these capabilities is let's say you screw up
|
||||
and you messed up your boot process if you're using arch Linux and you're using lilo and you
|
||||
boot your system and you forgot to run lilo after you update the kernel you're kind of screwed
|
||||
all right you can end up with an unbeatable system let's say you're testing a kernel out and you
|
||||
you add another definition you want to boot that kernel and you messed up on the syntax you can
|
||||
easily correct it on the command line right there through the edit mode or through the command line
|
||||
mode and you're back up to running again in in no time it's not as limited as lilo whereas if you
|
||||
screw something up you better have a boot disk candy or a rescue CD because you're going back
|
||||
back to the end of the bus jack starting all over again anyway that's handiness
|
||||
of grub right there as a rescue situation when you screw up on that note I always recommend having
|
||||
a backup kernel whatever boot loader you use that you know will work and that is good and we're
|
||||
going to cover that in a few minutes to some other things that you could do but keep that in the
|
||||
back of your mind you know because if you upgrade somewhere messing around always have a kernel
|
||||
that you know you can boot and it works right anyway because of the power and capabilities of grub
|
||||
allowing you to access your file system you might want to save yourself how am I going to
|
||||
protect my file system or protects you know from people snooping around well grub does offer
|
||||
some password protection in there and you have two possibilities of protecting you have one is
|
||||
protection from editing or entering the command line mode on two is protection from booting you
|
||||
can prevent them from being able to boot a definition or all definitions for that matter unless it
|
||||
provides a password protecting from editing what you need to do is you need to use the password
|
||||
command in your in your menu list in the general section of the configuration you put in the password
|
||||
you put the word password and then either the password in plaintext or the MD5 hash of the
|
||||
password and in addition to that you can specify a configuration file to load as like an admin
|
||||
configuration file in addition to the standard configuration file so if they type in the correct
|
||||
password it would load a different configuration file with different options that they have in there
|
||||
anyway grub provides you an easy way to convert your password into an MD5 hash
|
||||
if you type in on your command line or in the terminal grub dash MD5 dash crypt it will ask you
|
||||
for a password you know just like using the password command you type in your password it'll ask
|
||||
you for it again it'll type it in an output an MD5 hashed version of that password
|
||||
additionally you can you can just type MD5 crypt from the grub command line to get the MD5 version
|
||||
of the password very simple um you add that to the general configuration file then when they
|
||||
when you boot the system up and if they want to edit the command line mode or
|
||||
edit mode they have to provide they have to first hit the p key and it's your prompted for the
|
||||
password enter the password and then it'll let them in if they don't enter the right password
|
||||
and no no no entry no lucky lucky they're locked out additionally you can prevent people from
|
||||
booting certain definitions are all definitions by adding the word lock to each after each title
|
||||
of the definition that's it you have to set it up like you're you're editing for the command line
|
||||
or you know you have to put the password in the general configuration but you put lock down after
|
||||
the title in each definition and if they try or an attempt to boot that definition they will be
|
||||
prompted to enter the password first okay now let's talk about some fallbacks here and stuff
|
||||
like that that you can secure yourself when you're doing some testing of kernels that you've
|
||||
compiled yourself or or or whatever you're doing um you can do a boot once only which will attempt
|
||||
to boot the system using a different definition that you specify and if it fails it will fall back
|
||||
to your default specification that's simple it's good for testing a kernel and uh what you do is
|
||||
you add this line to the general configuration section of the menu dot lst you add default space
|
||||
saved now that tells grub to read a file called default in the uh slash boot slash grub directory
|
||||
which specifies what definite definition uh to use to boot for the first time okay now you
|
||||
add your new definition after your good definition and after the good definition before the new one
|
||||
the last line that you add after uh you know everything to boot is save default all one word
|
||||
s-a-v-e-d-e-f-a-u-l-t then after the new test definition you add the line saved default s-a-v-e-e-d-e-e-f-a-u-l-t all
|
||||
one word space zero now what that does is when you boot the first definition it saves that definition
|
||||
list the zero what it is to the default file under boot slash boot slash grub default it saves zero
|
||||
because it's zero the first definition um if you boot the first definite or the uh first
|
||||
definition the test one okay what that does because this is a boot only is it attempts to boot that
|
||||
and it writes right directly after it attempts as it's tempting to boot it writes that file
|
||||
save default to default file zero so that the next time grub runs it attempts the boot
|
||||
it looks at the save default and boots the first or good definition on here okay so if
|
||||
something happens and it doesn't boot properly uh you can reboot the machine and it would just
|
||||
automatically put you back into your main one um by default again remember zero is one any other
|
||||
numbers is is one less so zero is one one is two so forth now after you're done editing your menu
|
||||
dials t file you save it then you need to run this command on the command line uh slash s bin slash
|
||||
grub dash set dash default space one now that puts a one in the uh boot grub boot slash grub slash
|
||||
default file tells that when grub goes to boot next time to try and boot the first definition
|
||||
automatically the second you know save sorry second definition not the first one definition
|
||||
number one second definition when that runs it sets the default back to zero afterwards and
|
||||
that way you can get right back in your system no problem because you have a good definition now
|
||||
you have the option of providing fallback definitions to grub fallback definitions will keep
|
||||
trying to boot the fallbacks in succession until one is successful once it finds a successful
|
||||
one it's going to save that to the default file what what definition that is so every time after
|
||||
there it will just boot the successful one until you go back and fix it so like the the um
|
||||
boot once only use you're gonna still need to put in the uh save save or i'm sorry default space
|
||||
saved in the general configuration then after that you specify the line fallback all one word
|
||||
f-a-l-l-b-a-c-k space and then each fallback definition that you want to use uh with the space
|
||||
after them so like fallback space one space two would go fallback definition two then the
|
||||
definition three if the first default definition fails uh it will try one if that succeeds it will
|
||||
it will boot uh the second definition it will then try the third definition of the second
|
||||
definition fails uh and then after each definition that you specify you provide the line you
|
||||
had the line save default space fallback so it's save default all one word space fallback all
|
||||
one word so what happens then is it will try each uh definition you have specified in the fallback
|
||||
once it finds one that will boot successfully it'll save that um that definition you know the
|
||||
fallback it'll save the next number or the next number if it wasn't successful it'll keep going
|
||||
to the next one okay uh it will system will try each fallback in succession until successful
|
||||
boot then save the successful um successful one to the default file simple enough now
|
||||
neither one of these sections is going to help solve a problem of where the concurrent
|
||||
actually does boot but fails after that like for instance you didn't
|
||||
provide it in an RD file so it can't find or read the uh partition file system partition where
|
||||
your root partition is you can't read that partition uh that's not going to help you out here okay
|
||||
you're still going to end up you know to grub is successfully booted the or kernel and that's
|
||||
all that it does um in such a case again you might need to remember you should have a fallback
|
||||
default kernel that you can boot to that works that's successful so in your list of fallbacks
|
||||
you know you might have to manually go down and specify that one backup kernel that you have
|
||||
that always works because your other kernels may fall back to a success but fail during a boot
|
||||
process understand what I'm saying Jack of course you do because you're smart if you want smart you
|
||||
wouldn't be listening I want to wrap this up by covering some additional commands that you can
|
||||
use in the menu list or command line or editing mode um when I talk about a command I'll explain
|
||||
briefly what it does I'll tell you where it can be used uh the hidden command that is specified
|
||||
in the menu you can specify in the command but you know I don't know why you really want to what
|
||||
what the hidden command does is it hides the grub menu unless the escape key is pressed during the
|
||||
timeout phase so when your system tries to start the boot day if you provide provide the command hidden
|
||||
in there it will hide the grub menu so you won't see anything even though it does exist you'd
|
||||
have to press the escape key to get to it the hide command is in the general section you would actually
|
||||
I'm sorry you would hide in the uh definition section uh you would hide a partition from booting
|
||||
from the booting OS now this is primarily only useful for DOS or Windows you would hide and then
|
||||
the device name of the partition you want to hide like for instance if you had a primary partition
|
||||
that had Linux installed and then your second primary partition had Windows installed
|
||||
you would hide the first primary partition from Windows so that it would think it's on the primary
|
||||
partition because Windows and DOS want to be on the primary partition first primary partition
|
||||
subsequently you can use the unhide command to unhide a partition that's used in the menu
|
||||
you can use them on a command line too if you're booting from command or in the edit mode
|
||||
boot is basically used for command line or editing a menu entry you would type in boot and it would
|
||||
attempt to boot everything that you have specified the cat command is primarily used in the command line
|
||||
mode which will list the contents of a file so as I said before you can browse to a file on the
|
||||
file system on a partition and type in cat for instance cat slash atc slash fstab which will
|
||||
your fstab file uh chain loader I briefly mentioned chain loader when booting other operating
|
||||
systems chain loader loads a file as a chain loader and it can use the block list notation now
|
||||
block list notation block list is a file that does not appear in the file system
|
||||
an example of this is like the windows bootloader would appear in the block the block one of the
|
||||
device not block zero which is the master boot record but might appear in block one so you
|
||||
would specify to the chain loader uh chain loader space plus one when you're trying to boot the
|
||||
operating system windows and it would try to load the file in the first block of the partition
|
||||
block number one actually not block zero but block number one and hopefully it will work it's
|
||||
used for um oh s's with a defective bootloader or for booting windows and dots which
|
||||
maybe they have a defective bootloader too I don't know fine command is uh pretty simple
|
||||
fine command will start shooting uh fine and then the name of the file you want found will search
|
||||
for the file in all the mountable partitions uh just like a regular file command and it will
|
||||
display the full path to the file that it finds halt command is using command line mode is used
|
||||
to halt the system uh again I have briefly mentioned help which will display a list of all the
|
||||
commands and if you type in help in the command name will display the list for that help file
|
||||
pause is uh used in the menu it you can provide some text after the pause and it would display that
|
||||
text and will wait for a prompt from the user to press any key to continue on you wouldn't really
|
||||
use that in command or edit mode it would make any sense uh quit is using command line mode quit will
|
||||
exit the command line or edit mode and go back to the main menu mode uh reboot is used in the command
|
||||
line mode again which will reboot the system um now the root command which I briefly mentioned
|
||||
before it will set the device to root and attempt the mount and get the information of the device
|
||||
so if you type in root space uh parenthesis hb hd 0 comma 0 it will attempt to set the root
|
||||
device to the first partition on the first drive and then you can cd into it or cat into it by
|
||||
specifying the device device and then slash in the path uh you could also use the uh no you can
|
||||
use the command root no verify all one word which will attempt the mount the root to uh it will
|
||||
set the root device but not attempt to mount it well I hope that this little introduction to grub
|
||||
has been informative so the next time you are uh booting your Linux machine because it's a laptop
|
||||
and you didn't want to waste the battery transporting it to work because you know Linux machines
|
||||
don't really need to be rebooted that much and if you're rebooting it on a regular basis
|
||||
god ask yourself why anyway so you're booting you know your system and you pop up to the grub
|
||||
menu take a minute to pause and stop and check it out and see what you can do and have fun with it
|
||||
uh unless you know you know you read these commands that we're talking about your chances are
|
||||
you're not going to break anything but you're going to have learned something new and have fun
|
||||
doing it as always remember hacker public radio is community sponsor community driven if you are
|
||||
interested in educating people on a subject that you're pretty familiar with or you want to learn
|
||||
to subject you're not familiar with and then educate people get in touch with uh the hacker public
|
||||
radio crew off the website and uh you know make an episode or two we're always looking for people
|
||||
and uh if you have any questions comments you can send your email to dan d a n n at the linuxlink.net
|
||||
or i'll check out the comment section for this episode i thank you very much i hope to have a
|
||||
next another episode out very soon uh i think the next one is going to talk about options that you
|
||||
can pass to the kernel when you're booting or who the hell knows what it will be but uh it'll be
|
||||
something to do with the linux boot up and start a process again thank you very much and you have a
|
||||
wonderful happy hacking day. Thank you for listening to hacker public radio
|
||||
hpr-sponsored by caro.net so head on over to caro.net for all your hosting needs
|
||||
you
|
||||
105
hpr_transcripts/hpr0051.txt
Normal file
105
hpr_transcripts/hpr0051.txt
Normal file
@@ -0,0 +1,105 @@
|
||||
Episode: 51
|
||||
Title: HPR0051: TalkBox
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0051/hpr0051.mp3
|
||||
Transcribed: 2025-10-07 10:45:58
|
||||
|
||||
---
|
||||
|
||||
music
|
||||
Hello, this is the MeroVinci coming to you today for Hacker Public Radio.
|
||||
Today I'm going to take a little side-track from my discussions of virtualization simply
|
||||
because DeepGeek is also covering virtualization and a topic that I've definitely found very
|
||||
very interesting, so it's a topic I do not want to discuss too and depthily to ultimately
|
||||
turn people away from virtualization.
|
||||
So instead, today I'm going to talk about another set project I've been working on that
|
||||
is commonly known as a talk box.
|
||||
Now a talk box was originally used back in the 60s, according to Wikipedia, was originally
|
||||
used by Pete Drake and from Pete Drake it was also used by Stevie Wonder's, you used
|
||||
in a George Harrison song, but the talk box pretty much became a mainstream instrument
|
||||
with Peter Frampton and his album, Frampton Comes Alive, and you know everybody's familiar
|
||||
with the single, do you feel like we do?
|
||||
And from there is when it really picked up steam and moved on, other performers like Bon Jovi,
|
||||
Frank Roger and Sam have used it all the way up to Slion, the Family Stones, and even
|
||||
today it's been used by rappers periodically, as well as the food fighters have covered
|
||||
it and many, many others throughout the years.
|
||||
Now there is something that you threw my research of the talk box and you know looking
|
||||
at the Wikipedia page, looking at other pages, it's found it very interesting that there's
|
||||
a bit of a controversy over the origin of the talk box and that Bob Heel claims that
|
||||
he invented the talk box, that he was the first person to produce the talk box and even
|
||||
today that if you buy a talk box from your favorite musicians catalog, you will buy the
|
||||
Heel talk box, the H-E-I-L, but apparently there is also a device from custom electronics
|
||||
that was referred to as the bag, which apparently has the same concept of a talk box and works
|
||||
in the same principle as a talk box.
|
||||
And so you might be asking, well how does the talk box work?
|
||||
And a talk box works by taking an output signal from an amplifier, so normally this is used
|
||||
with a guitar but is not limited to a guitar.
|
||||
So from the guitar amp, some way is playing the guitar, it's plugged into an amp.
|
||||
From the amp it goes out to the main speaker that everybody here is for the guitar, but
|
||||
then also it splits and goes out to a secondary speaker.
|
||||
Now this secondary speaker has some sort of cone or funnel or something like that attached
|
||||
to the top of it that has a tube leaving the top of the speaker, the top of this extra
|
||||
speaker, and the tube runs usually up a mic stand and is sitting right next to a microphone.
|
||||
So what this does is as a person plays the guitar, it not only comes out the main amplifier
|
||||
for everyone to hear, but it also comes out the secondary speaker up this tube in which
|
||||
case normally a vocalist would step up to the microphone where the tube was in their mouth.
|
||||
So now we have this guitar sound coming through the tube into the vocalist's mouth and then
|
||||
the vocalist will move their mouth as if they're singing and instead of letting their vocal cords
|
||||
produce the noise and their mouth shape the noise and produce words, instead they let
|
||||
that guitar sound be the noise in the mouth or the audio in the mouth and the mouth shapes
|
||||
that to produce similar to words or similar to words which then comes out of the mouth
|
||||
back into the microphone and then out the house PA for the house speakers for everyone
|
||||
to hear, which is why a lot of Peter Francis do you feel like I feel? He's playing the guitar
|
||||
as he's mouthing the words, do you feel like we feel and that's pretty much what you hear
|
||||
is, do you feel like we feel like we do, whatever that is I've already forgotten.
|
||||
Now this is different from how a vocoder works, a vocoder, I'm sure many people are familiar
|
||||
with the vocoders, but a vocoder takes a vocal signal, takes the vocal sound as it comes
|
||||
through the microphone and then processes it and analyzes it and processes it to give
|
||||
it a different sound or a different noise like a computer sounding voice or something like
|
||||
that, two different methods which I think ultimately could replicate the vocoder could
|
||||
ultimately replicate the same thing as a talk box, however they do work physically different.
|
||||
So as I've been researching talk boxes this weekend, I found that there's a bunch of
|
||||
people on the internet, like there's a bunch of people on YouTube who have made videos
|
||||
of themselves making what's referred to as a ghetto talk box. Now a ghetto talk box is as it
|
||||
sounds it's creating a talk box, ghetto estically I guess, or in a ghetto fashion and pretty much
|
||||
involves just taking a secondary speaker of some sort and putting your own tube over
|
||||
that speaker and allowing the sound to come through that speaker. Now what a lot of people
|
||||
are doing is they're just taking a simple pair of computer speakers that they have line
|
||||
around, they usually seem to be powered speakers so that way you know they have the speaker
|
||||
has its own amplifier to power the speaker and just taking these things apart using some
|
||||
sort of a parabolic bowl shape device or some sort of bowl to enclose the speaker and usually
|
||||
the amp as well in which case so they'll enclose the speaker, drill a hole into the bowl and
|
||||
then stick their vinyl tube down in there or stick their tube down in there. Now typically
|
||||
the tube is vinyl or some sort of plastic and it's also commonly about half an inch in
|
||||
diameter for the outer diameter. Now this tube you can pick up anywhere, your favorite hardware
|
||||
store, Lowe's Home Depot, I definitely bought mine at Home Depot for like about 10 foot
|
||||
for I think it was like three bucks total you know real cheap stuff and for the speakers
|
||||
I used is yes I had a pair of random speakers line around and I pretty much just you know
|
||||
use a screwdriver, pry them open. I cut off the second the left channel that was with
|
||||
my speakers because ultimately I didn't need it, excuse me, cut off the left channel
|
||||
and went through our cabinets here at the house, found a topware bowl, drilled a hole in
|
||||
the topware bowl with my drum, stuck the tube down in there and put the bowl over the
|
||||
speaker and you know tried to use it as a talk box. Now we'll admit I didn't really
|
||||
get the greatest results out of this so instead my good friend the Reverend Bill he came
|
||||
up with this the idea of maybe I should take a funnel and put a funnel over the speaker
|
||||
in which case I did we had an extra funnel line around and I stuck the funnel directly
|
||||
onto the speaker and kind of taped it down and then stuck my hose on the end of the funnel
|
||||
and it actually works fairly fairly well but as I've gone back and looked at some of these
|
||||
designs for how to build a talk box everybody's everybody pretty much says that you need to
|
||||
have like an airtight seal between the speaker and the edge of the and the end of the tube
|
||||
so that way you know that all of the sound from the speaker is going straight to the tube
|
||||
you know the sound's not bleeding off anywhere else and and going other places which is also
|
||||
what some of the videos you'll see on the internet you know people are like there was one
|
||||
guy who took his talk box and stuck it all inside of a large like rubber made container
|
||||
and he used that to help dampen the sound around it so that way the sound from that speaker
|
||||
didn't bleed out everywhere else. There was another guy who used who used like two plungers
|
||||
that he pressed together and that helped trap the sound you know within within the plungers
|
||||
and it seemed to work really well and using the funnel idea you know does seem to work
|
||||
pretty well although I do have an issue I mean I can still audibly hear my secondary
|
||||
speaker as well as you know the tube as it's in my mouth and I'm making I'm making the
|
||||
noise so I just wanted to share with you guys the talk box and just some of the some of
|
||||
the things that I've used it are some of the information that I found out about it there's
|
||||
definitely tons of YouTube videos as well as there's a handful of instructables on how
|
||||
to how to create a talk box I'll definitely include a link to some of these instructables
|
||||
as well as maybe a few of these YouTube videos that I found were most helpful in the creation
|
||||
of the talk box.
|
||||
Thank you for listening to H.P.R. sponsored by Carol.net so head on over to C.A.R.O.N.C. for all
|
||||
746
hpr_transcripts/hpr0052.txt
Normal file
746
hpr_transcripts/hpr0052.txt
Normal file
@@ -0,0 +1,746 @@
|
||||
Episode: 52
|
||||
Title: HPR0052: UCLUG: Newbie Shell Scripting
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0052/hpr0052.mp3
|
||||
Transcribed: 2025-10-07 10:49:36
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
Can you film for us evening?
|
||||
Alright, hey, Yom.
|
||||
Hey, James, they call you James.
|
||||
I'm James.
|
||||
They call me James.
|
||||
Welcome to the link, shoes, or scruples.
|
||||
I recognize people that I know I don't recognize people, but I do recognize something.
|
||||
There's people I haven't seen before, so good, that means maybe that they're newbies.
|
||||
Yes, no?
|
||||
We're supposed to stand up between our feet.
|
||||
Yes, stand up.
|
||||
I stand up.
|
||||
Or we're not allowed to sit down.
|
||||
No, but this is our newbie session in shale scripting.
|
||||
So all right, so let's, let me get, you know,
|
||||
my preparation is kind of, I just read up on,
|
||||
I caught up on stuff.
|
||||
I didn't really prepare slides or anything like that.
|
||||
So we're going to just kind of do something on the fly.
|
||||
But in this process, I'll be teaching you all how to
|
||||
shale script.
|
||||
All right, so let's start out and so that I can gauge what,
|
||||
what we need to do.
|
||||
Does everyone know what shale scripting is?
|
||||
Is there anyone, let me ask it this way?
|
||||
Does anyone not know what shale scripting is?
|
||||
Y'all.
|
||||
That's not a leading question.
|
||||
That's just a lot.
|
||||
Anyone not know what it is?
|
||||
OK, that's good.
|
||||
All right, so good.
|
||||
Does anyone, all right, so, all right.
|
||||
I need to know what I need to be teaching.
|
||||
What does the newbies that have not used shale scripting,
|
||||
have not done shale scripting, what would you like to know
|
||||
exactly?
|
||||
Do you know what it is?
|
||||
Can they not start?
|
||||
Yeah, you now have to start.
|
||||
All right, you now have to start a shale script.
|
||||
Here's one that I'm going to have for it.
|
||||
OK.
|
||||
Next to a couple of them, all right?
|
||||
I've got a bunch of PHP scripts.
|
||||
OK, actually.
|
||||
That enclosed my sequence.
|
||||
In general, I'm running at that time on web, right?
|
||||
But I wrote all the interface I can run with people with.
|
||||
It's a wiki.
|
||||
Wiki?
|
||||
No, OK, so what else?
|
||||
I'll tell you all about it later.
|
||||
But anyway, so I've got all these interfaces that
|
||||
are basically written in PHP with my sequence in title.
|
||||
And I want to schedule, I'm going to have a schedule
|
||||
on the front end, and I've got five or six
|
||||
together with this script that I can all, you know,
|
||||
whenever.
|
||||
Right.
|
||||
I mean, that's basically one.
|
||||
So the crime, crime, we'll call it when you want it.
|
||||
Well, I'll do it's magic.
|
||||
And put that into a whole thing, all of a sudden.
|
||||
Right.
|
||||
OK.
|
||||
I guess.
|
||||
All right, so what does anyone else need?
|
||||
Since I have a feeling that you probably know how,
|
||||
I don't know who you are.
|
||||
I'm first time here.
|
||||
OK.
|
||||
I mean, I've done a class of people type of shell scripting.
|
||||
OK.
|
||||
I know a lot about it.
|
||||
So then I'll need to talk to you then.
|
||||
No, I'm going to vote you like that.
|
||||
No, I'm sorry.
|
||||
Honestly, I just thought.
|
||||
That's fine, you guys on the internet.
|
||||
I just came into my eye and you don't even
|
||||
know what you're doing in shell script.
|
||||
OK, cool.
|
||||
That's cool.
|
||||
I have this here.
|
||||
Basic set and off without closing, you know, at 8.
|
||||
Set and off.
|
||||
OK.
|
||||
Is that a possibility?
|
||||
Set and off without closing, then it's a problem
|
||||
to do to have a tolerance set with life.
|
||||
Yeah, probably would be.
|
||||
It's better to consider it than our regular expression set.
|
||||
Yeah, they have it on books.
|
||||
But OK.
|
||||
Well, all right.
|
||||
So shell scripting is basically taking what you do
|
||||
on the command line and putting it into a script
|
||||
into a program that you can run.
|
||||
Everything I want is I'm sure you all know it.
|
||||
That's because everyone knows what shell scripting is.
|
||||
You know what shell scripting is?
|
||||
Is it, that's most commonly used to have aliases?
|
||||
What's that name?
|
||||
Isn't there like a shell script that handles aliases?
|
||||
That is a whole ton of aliases.
|
||||
Like when you log in?
|
||||
Yeah, I think there's a log in shell script
|
||||
that I'm actually running when you log in.
|
||||
Yeah, exactly.
|
||||
There's the profile, the dot-pro file, dot-rc.
|
||||
And that's everything.
|
||||
OK, well, let's see.
|
||||
All right, so will you give us an explanation on your battle?
|
||||
All right, so I'm going to VIs my editor choice,
|
||||
but you can use whatever you like.
|
||||
So just bear with me and pay no attention
|
||||
to the man behind the screen.
|
||||
Yes, I think we can all put it one time.
|
||||
Pops up and more.
|
||||
Make it a little bit bigger.
|
||||
OK, we'll do that.
|
||||
Hey, that's that.
|
||||
No, no, no, I've tried once, so try me.
|
||||
I can.
|
||||
I'll ask you.
|
||||
Yeah, I want to see this on YouTube later on.
|
||||
You know, I'm going to look at the cell.
|
||||
I'm going to publish it.
|
||||
All right, how's that?
|
||||
A little easy.
|
||||
You want to bigger than that?
|
||||
You can erase it.
|
||||
Yeah, I'll put this in.
|
||||
Look, look, I can't see three little screen.
|
||||
I can't really do that for all it's for.
|
||||
That's a good one.
|
||||
OK, we go up.
|
||||
I can go up one more.
|
||||
That means less to.
|
||||
No, yeah, if you would, that'd be great.
|
||||
All right, but there you go.
|
||||
OK, can you see that then?
|
||||
Do it here and take off the flag.
|
||||
Oh, no.
|
||||
I just like it to that.
|
||||
All right, so let's see.
|
||||
All right, so let's call it back up.
|
||||
Back up your web thing, right?
|
||||
I'll give it the dot it.
|
||||
Well, yeah, it's well, I'll give it a dot bash extension
|
||||
so that you know that it's a bash shell script.
|
||||
Yeah, oh, you type that.
|
||||
All right, let me think about it.
|
||||
All right, so the first thing that you need in a shell script
|
||||
is your Shebang.
|
||||
Now, normally, anyone that starts with it with a sharp,
|
||||
oh, this is called Shebang, because it's sharp.
|
||||
Bang, Shebang.
|
||||
Yummy, yummy, yummy, yummy, yummy,
|
||||
Shebang, Shebang, Shebang, Shebang.
|
||||
OK, so a sharp bang or pound exclamation point
|
||||
tells the operating system that you
|
||||
want this file to be executed by this program.
|
||||
In our case, we're going to want it to be slash bin bash.
|
||||
Now, the title of this is Sheal Script,
|
||||
because you don't have to use bash.
|
||||
There are others out there.
|
||||
There's corn chill.
|
||||
There's born shell.
|
||||
There's normal born shell.
|
||||
This is bash, it's born in shell.
|
||||
Then there's Z-shell.
|
||||
There's T-shell, C-shell, ash, ash, ash.
|
||||
I'm not sure what it's up to.
|
||||
I think that's my other C-shell.
|
||||
And she sells the C-shell.
|
||||
Now, R-S-A-S.
|
||||
Right, right.
|
||||
We're strictly shaken that that true C-type syntax.
|
||||
We'll see what it all looks like.
|
||||
But I'm most familiar with bash.
|
||||
I used to be most familiar with T-shell, but you know.
|
||||
All right, so anything that starts with a pound sign,
|
||||
except for the first line, is a comment.
|
||||
From the pound sign to the end of the line, is a comment.
|
||||
So we're going to say just something.
|
||||
Just to back up, my p2p.
|
||||
OK, so that's just a comment.
|
||||
That would be helpful if you put it in, because you're
|
||||
going to look at it later and say, what the heck is this?
|
||||
OK, so all right.
|
||||
So let me stop your intro.
|
||||
OK, you're going to do some kind of copy and follow.
|
||||
Whatever way.
|
||||
Right, under bash.
|
||||
But now, let's say that I wanted to actually execute PHP.
|
||||
From a shell script, I would put PHP up there,
|
||||
so that it wouldn't be bad.
|
||||
Sure.
|
||||
Yes, OK.
|
||||
Can't sorry, but it's something like that.
|
||||
It's going to be like the PHP command line.
|
||||
Yeah, we did.
|
||||
It wouldn't know, but I have to schedule these jobs
|
||||
to run automatically.
|
||||
Right.
|
||||
And so, I mean, I'm running PHP to the command line.
|
||||
Right.
|
||||
As opposed to going to the web browser.
|
||||
Right, because you're not going to do it a few.
|
||||
Right, when you're going to do the PHP command line,
|
||||
and what I'm saying, though, is that if I wanted to reference
|
||||
my speed, inside, you're not actually
|
||||
called a PhD file.
|
||||
Right, but actually put the PHP in this script.
|
||||
I would put PHP up.
|
||||
OK, now what I've got here is assume
|
||||
you've got a PHP program, right?
|
||||
Yeah, you want to reference here.
|
||||
Now, if you want to do what you want to do,
|
||||
you want to put that PHP embedded inside this shell script.
|
||||
Right, right?
|
||||
OK, so let's do that.
|
||||
So, we want to interpret it through.
|
||||
Is it user been PHP?
|
||||
I would just like to use it as a bit of E and V space
|
||||
to be able to think that I'll call P and V wherever it is.
|
||||
And that.
|
||||
I don't say I just got it with a few dashed log
|
||||
in the environment or with the default.
|
||||
As I say, yeah, I'm going to assume
|
||||
that that's where PHP exists.
|
||||
It may not.
|
||||
And then you want to, let's say I'm not
|
||||
as familiar with PHP, so you have to give me some help.
|
||||
So, in your scripts, whatever your program is
|
||||
from this point on, and I guess you
|
||||
want to do it here, document.
|
||||
So, in the file.
|
||||
So this is your PHP stuff that gets
|
||||
interpreted by PHP, and then you
|
||||
got the end of your marker, which I call it, in the file.
|
||||
But it doesn't have to be anything.
|
||||
So, this is an example of a here document
|
||||
that the shell can interpret.
|
||||
Everything from this, all right.
|
||||
So here is the indicator for a here document.
|
||||
As everyone has anyone heard that I'm here to talk.
|
||||
It's every.
|
||||
Come on.
|
||||
Anyone?
|
||||
Anyone?
|
||||
Anyone?
|
||||
All right.
|
||||
Who is not heard about here document?
|
||||
OK.
|
||||
A here document is some sort of indicator
|
||||
that from this point forward is going
|
||||
to be a document of sorts, of some sort, you know.
|
||||
So in our case, we're going to say,
|
||||
whatever you come to, that indicates the end of this file.
|
||||
So this from here down, since I don't know PHP,
|
||||
I'm not putting anything in there.
|
||||
But this would be PHP script, whatever that is.
|
||||
And then the shell sees this as, oh, that's the end of the
|
||||
here document.
|
||||
Here's my file to plug into PHP to execute.
|
||||
Does that make sense?
|
||||
Now, if I had a file, let's say,
|
||||
interface.php, and that case you would probably give it
|
||||
to dash f, interface.php.
|
||||
So you did, what was that?
|
||||
I'm assuming that dash f means execute this file.
|
||||
OK.
|
||||
Now, PHP may do it in another way out.
|
||||
I think you speak to it.
|
||||
I can't answer.
|
||||
But however it is, I mean, you just take the file name
|
||||
as it's parameter without it.
|
||||
And share.
|
||||
So we're going to somewhere that I don't know.
|
||||
OK.
|
||||
All of that's what I was.
|
||||
But that's just one example.
|
||||
It's the here document.
|
||||
All right.
|
||||
So let's say that from the command line, we've said, where
|
||||
are you taking the OF?
|
||||
You could call that anything.
|
||||
Yeah, you could call it, at least over.
|
||||
At this long end, at the bottom, you end up with the same thing.
|
||||
It's going to basically encapsulate that information to a point.
|
||||
Right.
|
||||
So anything between the OF and the OF or jump and jump now?
|
||||
Yeah, right.
|
||||
Exactly.
|
||||
Now, notice that I do not have a space here.
|
||||
That's important, because if you do have a space there,
|
||||
and you need to have a space, I think, down here,
|
||||
I don't remember.
|
||||
Just take it out.
|
||||
No more.
|
||||
Whatever it is.
|
||||
Yeah.
|
||||
Now, otherwise, you can do what you were saying.
|
||||
And what you call that HP bomb interface is different.
|
||||
All right.
|
||||
So now that calls your HP program or something like that.
|
||||
Okay.
|
||||
So you basically, first of all, you hold it in the back, the shells, and then call HP from
|
||||
the right.
|
||||
No HP calls.
|
||||
We have not.
|
||||
But I mean, inside the shell.
|
||||
In an inch.
|
||||
All right.
|
||||
So you're still, I've been back.
|
||||
Yes.
|
||||
Right.
|
||||
So it's something in.
|
||||
So whenever you have the command line or when you click your icon or whatever, it looks
|
||||
at this, it says, OK, the rest of this is going to be batching.
|
||||
So let's run it within a batch shell.
|
||||
The batch looks at it and it comes to here.
|
||||
And the batch calls HP.
|
||||
Right.
|
||||
HP 70 looks at it.
|
||||
Arguments.
|
||||
All right.
|
||||
I'm going to call this.
|
||||
And I'm going to interpret it.
|
||||
Right.
|
||||
It's up there.
|
||||
Is everybody following?
|
||||
Am I talking about the batch?
|
||||
Because I tend to do that sometimes.
|
||||
Front.
|
||||
Front.
|
||||
Which was in the store.
|
||||
Yeah.
|
||||
All right.
|
||||
So let's say you want to have some arguments to, to this script.
|
||||
Anyone have a certain format?
|
||||
I'm going to just give it to this because it's beyond my knowledge for PHP.
|
||||
So.
|
||||
I'm going to say question example for you.
|
||||
What was it?
|
||||
There's some reason.
|
||||
Okay.
|
||||
So.
|
||||
I'm going to make it happen.
|
||||
All right.
|
||||
All right.
|
||||
So.
|
||||
Now what I'm going to do.
|
||||
I'm going to give you the one you're passing around.
|
||||
If you pass white, then it's the last one.
|
||||
Yeah.
|
||||
It's the last one.
|
||||
All right.
|
||||
So.
|
||||
Yeah.
|
||||
So.
|
||||
I do listen there.
|
||||
Where do you?
|
||||
You need to go anywhere.
|
||||
That's what I understand.
|
||||
So, there's backup.web.wav.bash.
|
||||
So, all you got to do is back up, underscore, web.bash.
|
||||
No, can't do that, right?
|
||||
And the reason you can't do that is because, first of all,
|
||||
execute your own directory, which is where I am.
|
||||
Let me prove that.
|
||||
I'm currently in home, Schmidt.
|
||||
Hey, I like it.
|
||||
So, I'm currently in this directory.
|
||||
There's some files in there in this directory.
|
||||
And I bet you that the path does not have this in, well, let's find out.
|
||||
So, yeah, okay.
|
||||
So, this is the path.
|
||||
This is the, everyone know what a path is?
|
||||
They would not know what a path is.
|
||||
Let me ask you that.
|
||||
Anyone not know what path is.
|
||||
Everybody knows what a path is.
|
||||
How I've done it.
|
||||
So, you see that Schmidt is not here.
|
||||
So, it's not going to execute.
|
||||
That's one problem.
|
||||
That's the one reason.
|
||||
The second thing is that, if you do a long listing of the file,
|
||||
Mac and I went, you will see.
|
||||
Did I need to explain this?
|
||||
Do you know the permissions?
|
||||
It does not.
|
||||
You don't know?
|
||||
I do know.
|
||||
You do know.
|
||||
Okay.
|
||||
Do you explain it?
|
||||
Well, I know it to the extent R means readable, I think.
|
||||
Right.
|
||||
And W means writable.
|
||||
And that last one is supposed to be executable.
|
||||
And that's the reason that the script's not working.
|
||||
Bingo.
|
||||
So, we need to change it.
|
||||
I'm going to want it plus X of that.
|
||||
Okay.
|
||||
And you're listing and it's green.
|
||||
But that's just close to this shelf.
|
||||
So, now I can put this directory,
|
||||
run back up, dot, underscore web.bash.
|
||||
And there we go.
|
||||
Okay.
|
||||
Do you explain it?
|
||||
Too loud.
|
||||
Too loud.
|
||||
Too loud.
|
||||
Too loud.
|
||||
Too loud.
|
||||
Too loud.
|
||||
Too loud.
|
||||
Too loud.
|
||||
Too loud.
|
||||
Too loud.
|
||||
Too loud.
|
||||
Too loud.
|
||||
Okay.
|
||||
Final run out.
|
||||
All right.
|
||||
So, you want to,
|
||||
Chmod is to change the mode of the file.
|
||||
These are the mode bits.
|
||||
I added the executable width so that it becomes executable.
|
||||
Unix is different from the other operating system.
|
||||
In that,
|
||||
it's not determined by the file type,
|
||||
whether it's executed or not.
|
||||
It's just determined by this bit,
|
||||
whether it can be executed.
|
||||
So, any file can be executable.
|
||||
Not a good idea for all files.
|
||||
If, especially if it's just a text file,
|
||||
you can try to execute it.
|
||||
It just goes, you know, or something.
|
||||
All right.
|
||||
So, now we've got execution rights for execution rights.
|
||||
For the user, for the green, and all.
|
||||
All right.
|
||||
So, now, you see the X that I,
|
||||
in order to execute from my correct directory,
|
||||
which is what the thought is,
|
||||
and the slash, this file.
|
||||
It executed, and it gave me that.
|
||||
Now, why did it give me that?
|
||||
All right.
|
||||
Does it?
|
||||
Do I need to go into that?
|
||||
Sure.
|
||||
If I don't know what it need to go into,
|
||||
we can do something else.
|
||||
This is a newbie session.
|
||||
So, please, if you don't understand,
|
||||
you haven't said the echo group.
|
||||
All right.
|
||||
So, why didn't you do that?
|
||||
Oh, my God.
|
||||
Now, let's take you away.
|
||||
Let's take away your arguments to the script.
|
||||
Yes.
|
||||
So, you see I've got, I'll send $2 and $1 and $0.
|
||||
I'm just kidding.
|
||||
That's pound.
|
||||
I want $2.
|
||||
All right.
|
||||
All right.
|
||||
So, I gave it the A, B, and C.
|
||||
It is B, A, and then the program.
|
||||
So, 0 is always going to be the program that's executing.
|
||||
Then, any arguments after that go 1, 2, 3, 4.
|
||||
Yes.
|
||||
Until you get the 9,
|
||||
and after 9, you're going to have to use
|
||||
a dash as curly braces around.
|
||||
And I'll do that.
|
||||
So, so you can see what I'm talking about.
|
||||
Unless you don't want me to take you out of this.
|
||||
You'd like to see the argument.
|
||||
Let me rerun at 1, 2, 3, 4, 5, 6, 7, 3, 9, 10, 11, 12.
|
||||
Just for good entry.
|
||||
All right.
|
||||
Just.
|
||||
I'm not used to quarry, so y'all bear with me, I'm a devourer guy, 5, 4, 5, 3, what's that?
|
||||
I really am typing it.
|
||||
What did you say?
|
||||
This is sweet tea, sweet tea, I have to make my head fit fit fit fit fit.
|
||||
Eric always says to give me a hard time for some reason, it's not, it's not, it's not,
|
||||
it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not,
|
||||
it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not,
|
||||
it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not,
|
||||
it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not, it's not
|
||||
Now I think they must have changed this, but they used to be, it was confusion whether this is a dollar sign one with a zero after it or if this is a dollar sign 10 so what you need to do in bash is put braces around the name of your variable and then that's the, okay,
|
||||
that's why I should go with this. So this is the argument variables, I guess you just say.
|
||||
So other variables, you can just make your own, and then you just put something in it.
|
||||
Is there a shift? That is like threes in the box. A shift there is. Yes, there is. If I wanted
|
||||
to, I could just eat my own. Let's give something to you. Am I losing anyone yet?
|
||||
Long time ago. All right. So, I said that long time ago. So you're really lost.
|
||||
Oh, yeah. Okay. Well, they asked me the question that you wanted, that you don't understand.
|
||||
Well, I mean, I'm not familiar with the scripting. Do you understand, like, the badge, and then you can see that?
|
||||
Okay. That's expected. What? Have you done any examples of some scripts on there or some simple things?
|
||||
Probably, I've been done here or something. We can do that. That's kind of complicated.
|
||||
All right. So have you done any programming at all?
|
||||
I went for a degree and I got in and out of the script and popped into it.
|
||||
Okay, but you got a degree from it, right? I got a degree from it.
|
||||
But you said you've done it to a degree. All right. So, then let me know what's confusing.
|
||||
Well, I mean, for me, most everything, because I don't get to wrap around programming well at all.
|
||||
I think, you know, really long time to get mentally to the point of knowing, you know, what you're putting in and out of this.
|
||||
You know what I said?
|
||||
No, this is a new recession. So, I'm sure you're not the only one that has this question. So, I'm here for you, man.
|
||||
You're a little late, too. So, I mean, that's all right.
|
||||
All right. So, at the very beginning.
|
||||
I didn't this much good.
|
||||
At the very beginning, this is a file I'm editing.
|
||||
And this, I just put the output.
|
||||
So, whenever it starts out, it's going to be running the bash, which is the ship born again, shell.
|
||||
Which was named after Mr. Bourne.
|
||||
Jason Bourne here.
|
||||
No, no, no. Different words.
|
||||
In you.
|
||||
In you.
|
||||
All right. In most scripting languages, is it time?
|
||||
You just get bored.
|
||||
All right.
|
||||
In most scripting languages, the pound sign means a comment.
|
||||
So, that's why I got the second line here.
|
||||
So, it's from the pound sign to the end of the line. That's a comment.
|
||||
So, it's ignored.
|
||||
Except for when it's the first line.
|
||||
And it's a pound and an exclamation point.
|
||||
That means to the operating system, I'm going to run this file with this program.
|
||||
Okay. So, this program is going to be run by bash.
|
||||
Does that make sense?
|
||||
Yeah, exactly.
|
||||
Where?
|
||||
That exclamation point.
|
||||
That exclamation point.
|
||||
That exclamation point.
|
||||
That exclamation point.
|
||||
That indicates to the operating system that this will execute this.
|
||||
Okay. So, this is.
|
||||
Bash is going to be running this script.
|
||||
Okay.
|
||||
Now, this is a pound.
|
||||
So, that means this is a comment from there on.
|
||||
To the end of the line.
|
||||
Okay. Okay.
|
||||
Tell me.
|
||||
Yes.
|
||||
What type of program is that?
|
||||
What type of program is what?
|
||||
Echo.
|
||||
In Chrome.
|
||||
Yeah, it's a built-in.
|
||||
But built-in.
|
||||
Two different types.
|
||||
You'll have one set of built-in.
|
||||
One set of built-in.
|
||||
One set of built-in.
|
||||
One set of built-in.
|
||||
One set of built-in.
|
||||
You've got a following statement.
|
||||
You've got a user voting.
|
||||
Unless is in your pad.
|
||||
Unless is in your pad.
|
||||
Which echo could be?
|
||||
And if you're running this script,
|
||||
lock it like this.
|
||||
Your site would set up that absolute pad.
|
||||
It's going to level it around.
|
||||
Actually, can you tell its how they did it to the drill?
|
||||
With a very long schedule which people are.
|
||||
Well, now I'm going to really far.
|
||||
Well, I mean, if you're writing a script, the one thing you want to be aware of is that the shell is there to help you.
|
||||
Yes.
|
||||
If you're curious as to how you're going to have to go about it.
|
||||
That's paying for it.
|
||||
That's the way it will look.
|
||||
All right.
|
||||
That's like 80 plus pages of dot.
|
||||
And that's not, that's not paying for it.
|
||||
All right, those?
|
||||
Well, I don't know.
|
||||
No, I know.
|
||||
You can go on a screen at home as opposed to working and up there.
|
||||
You can see all of those variables that are all those built in commands.
|
||||
Built in commands are available.
|
||||
You can spend your scripting.
|
||||
You can talk to all of those items there.
|
||||
You don't have to put a path to just simply use it.
|
||||
And if you have a question about it, there's various documentation that can explain what the various things are.
|
||||
Some of them are pretty straightforward.
|
||||
Let me see.
|
||||
Fc, you can figure out, you know, like WC is like the word counts.
|
||||
You can figure out how many words are in a bottle.
|
||||
So I put the word, how many characters are in a bottle?
|
||||
Okay.
|
||||
So.
|
||||
Now, in, in bash, the variables, you know, the variables, right?
|
||||
Okay, variables start with a dollar sign.
|
||||
Okay.
|
||||
In bash.
|
||||
I'm just born shell, corn shell, t-shell, you know, just for nothing.
|
||||
I think all shells.
|
||||
Okay.
|
||||
No one's disagreeing.
|
||||
Now, in bash, the, yeah, you were here before you walked in.
|
||||
In bash, whenever you call program, it's automatically signs these numeric variables.
|
||||
Zero is the name of the program.
|
||||
That's right.
|
||||
So in our case, it's not the name of that.
|
||||
Yeah.
|
||||
But it's the name.
|
||||
So this will print what you've got there now.
|
||||
And right here, you see, I'm assigning to the variable that I called my own.
|
||||
And I assign something in it.
|
||||
Now, in, in, in bash and born shell, you need to not have spaces around it.
|
||||
This is not C.
|
||||
Otherwise, it's assuming you want the my own program.
|
||||
But everything that's in a shell script, you can do all the command line, line by line.
|
||||
In fact, I usually test my shell scripts by cutting and pasting this into my command line.
|
||||
And see where it is.
|
||||
Now, the, you got to finagle some of the variables because you're not going to have the same one through ten or whatever.
|
||||
And your script may be changing your variables, and that's what I think.
|
||||
Why don't you have that half of it?
|
||||
$5 in front of my own when you define it.
|
||||
When you define it, you do not need it.
|
||||
And you should not let it in fact.
|
||||
But whenever you use it after this, when you use it, you, you need it.
|
||||
Because it's referencing my own.
|
||||
This is where you're both defining and putting a value to it.
|
||||
That's what echo means.
|
||||
Echo means put to the screen.
|
||||
Why are you presenting echo within all those variables?
|
||||
Just to show stuff.
|
||||
When it runs in the program, it's actually going to put variables after it.
|
||||
And those are going to be referenced by this echo statement.
|
||||
So it's hers.
|
||||
See if there's numbers after the word.
|
||||
Okay.
|
||||
I think that's basically what he's saying.
|
||||
The program is echo those numbers.
|
||||
What's now the first one it is?
|
||||
Right over one is the first argument.
|
||||
So it's going to be a second and two and four.
|
||||
Right.
|
||||
Do he say is echo $8?
|
||||
And then you end up being 8.
|
||||
What's the response to this?
|
||||
Hey, let's all go.
|
||||
Hey.
|
||||
All right.
|
||||
It's great to hear.
|
||||
Wow.
|
||||
Wow.
|
||||
It signifies that it's a bash grip.
|
||||
That's just for me.
|
||||
You can go through it.
|
||||
It's not needed.
|
||||
That was just for my purposes.
|
||||
So that either it does a bash grip here.
|
||||
The operating system is going to look
|
||||
from Shabang at the beginning.
|
||||
The pound exclamation point called Shabang Shabang.
|
||||
All right.
|
||||
So what time is it?
|
||||
Seven.
|
||||
Seven of seven.
|
||||
I know why.
|
||||
Should we continue this later or should is everyone comfortable
|
||||
with shell scripting now?
|
||||
Yeah.
|
||||
We should continue later.
|
||||
Let me ask is anybody wants to start in shell scripting?
|
||||
Of various sorts.
|
||||
There are a lot of good resources out there.
|
||||
This is not bash, but the one that I did,
|
||||
I was king of the dummies in the envelope.
|
||||
Units programming for dummies.
|
||||
It's a sea shell.
|
||||
But it teaches you a lot of good methods.
|
||||
And a lot of good ones with the stuff
|
||||
is what he's talking about here.
|
||||
It's very good.
|
||||
But one resource is tons of resources.
|
||||
There are two gods that are one is a beginning bash shell scripting,
|
||||
which somebody received this past week.
|
||||
And the other one is the advanced bash shell scripting.
|
||||
I love it, which is very good.
|
||||
And both of them are open source maintain.
|
||||
So you can get to all the examples.
|
||||
Okay, would anyone want to continue this next week?
|
||||
Next month?
|
||||
Yes, sure.
|
||||
Yes, sure.
|
||||
Thank you for listening to Half Republic Radio.
|
||||
HPR is sponsored by Carol.net.
|
||||
She'll head on over to C-A-R-O.N-T for all of her team.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Thank you.
|
||||
129
hpr_transcripts/hpr0053.txt
Normal file
129
hpr_transcripts/hpr0053.txt
Normal file
@@ -0,0 +1,129 @@
|
||||
Episode: 53
|
||||
Title: HPR0053: Codecs Part 4
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0053/hpr0053.mp3
|
||||
Transcribed: 2025-10-07 10:49:07
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
Welcome to the Hacker Public Radio. This is Clack 2. This is the fourth and final episode of the In-depth series on Codex.
|
||||
There are certain codex that probably a great many of us won't really encounter that often, but some of them are interesting because they kind of, they show how specialized codex can be and how certain codex are working to overcome certain limitations of computers and video.
|
||||
So I'll go over that a little bit and then toward the end of the episode we'll talk a lot about AUG and I would also like to just touch on just a typical line command of how to encode your video into the AUG format.
|
||||
And AUG is obviously something that we'll all encounter quite frequently, so that'll split the episode between something you'll probably never see and something you'll see all the time.
|
||||
So again, these are all kind of obscure codex, but one of the most interesting ones perhaps are the encoding hardware and software packages that certain companies are selling to, for instance, the news programs.
|
||||
Most news reporters have to get their reports at the scene when they switch over to these people live.
|
||||
Obviously, since it's happening in reality and being recorded by a video camera, there's a codex involved.
|
||||
That's what we talked about in the first episode, how a codex is simply translating reality into a digital stream.
|
||||
So they're taking the video, they're compressing it or encoding it, and then they have to send it across sometimes the world to get that video to play live on television for our consumption.
|
||||
The way they do this is not by setting up a MacBook next to their, although Apple would love for you to think that.
|
||||
They're not setting up like just a computer next to the, you know, plugging the camera into it and streaming it.
|
||||
They're piping it into a rack unit that is dedicated to compressing video at really, really, really fast rates.
|
||||
And I don't necessarily feel the need to mention a company for this, but just in case someone actually needs, like, has a need for this kind of service or it's just interested in this kind of stuff,
|
||||
there is one that I know of called Streambox, and they have codex called ACT-L3 and RMS, no relation, I think, to RMS.
|
||||
I think another one that I think that I've used in a job was by Green Valley, although I could be wrong about that.
|
||||
Those are dedicated hardware devices that simply encode video, and it's very heavy duty, and it's very serious, and it's not something that a lot of people are going to use often,
|
||||
but just be aware that that exists, and that's how really, really smooth videos transferred across the globe.
|
||||
It's serious stuff.
|
||||
So, there are other companies, and there are just small ones that I really don't even want to mention their name, because I don't want to promote them in any way.
|
||||
And they just get into the business of codex, and they'll pinpoint a market, for instance, maybe someone wants to pinpoint the streaming market because they know that streaming video is big right now, and so they figure they'll offer a codec, and they'll market that codec as being a specialized codec for streaming, and it's really good with low bandwidth situations.
|
||||
And all these other claims to fame, and there might be some truth to it, but the bottom line is that the hardware is still the same hardware.
|
||||
The software, I mean how good can it really be, and it's a really great way for someone to make a quick buck off of a company that's looking for a solution of how to stream video, or whatever the market that they've been pointing is.
|
||||
There are yet other codex that you will find more similar to the stream box stuff, where they're dedicated hardware.
|
||||
There are capture cards out there, not so much for Linux, as far as I know.
|
||||
Dedicated to capturing, for instance, really, really high definition video.
|
||||
A lot of computers cannot handle that kind of bit rate, even with a good graphics card and a fiber optic link, because there's just not enough power.
|
||||
So what certain cards will do is take in the high definition, it will re-encode it into something more manageable by the computer.
|
||||
They can edit the video, and then they can send it back out.
|
||||
So these are really specialized codex, and they often have strange names, and they're owned by whatever company is making this specialized hardware.
|
||||
And again, you'll see the name of the codec in VLC player, if you open up a clip, if it's a mysterious clip, you have no idea why it's not playing anywhere else.
|
||||
Open it up in VLC, whether it plays or not, you'll see the name of the codec right there.
|
||||
Do a Google search for that codec, bang, you found out at least who owns that codec, and you're one step closer to getting it.
|
||||
There are also codex that are actually quite specialized containers for like 3D modeling and things like that that will have the support for really interesting aspects of, I guess, video that usually you wouldn't really need like a materials list and a textures map and things like that.
|
||||
So those are the specialized codex, and then of course there is the great AUG.
|
||||
AUG is the open source solution, aside from xvid, it's one of the open source solutions for all those evil codex out there.
|
||||
There is AUG Vorbis, sound only, it can contain metadata, so it's just like mp3 in the sense that it has tags and things like that.
|
||||
It may even soon be able to contain data like MIDI data and things like that, so it's a pretty cool little format.
|
||||
There's AUG, which is obviously the video codec. Now AUG, there's a lot of confusion about that.
|
||||
A lot of people aren't clear on the patent freedom of AUG, the deal is this.
|
||||
AUG was based on a codec owned by a company called ON2, the codec was called vp3, and vp3 is covered by patents.
|
||||
But the codec fiora owned by the ziff.org, guys who do the AUG stuff, fiora has an irrevocable license to do whatever they want to do.
|
||||
Whatever ziff wants to do with fiora, they're allowed to do it. It's irrevocable, it's permanent.
|
||||
So while vp3 is covered by patents, fiora is licensed by that company.
|
||||
If ON2 and ziff have a falling out and never talk to one another again, that agreement stands.
|
||||
So AUG fiora is a perfectly legal and safe codec to use. It is not a problem.
|
||||
There are many players for AUG fiora. VLC player, Totem, Miro, formerly known as Democracy Player.
|
||||
So if you're sending out AUG fiora files to friends, which you should, if you're going to send video,
|
||||
they can't play it in their Windows Media Player or their QuickTime Player.
|
||||
Tell them to go download either Miro or VLC Player. They can watch it, and that will be that.
|
||||
And now that KDE is out for both Windows and Mac, you could even send them to go download caffeine.
|
||||
So AUG fiora is a great little codec. It is in peg 4 compliant.
|
||||
It supports i and p frames, not b frames, but I haven't had any problems with that.
|
||||
It supports variable bit rate, so that in a situation where there's a big fancy explosion with lots of lasers,
|
||||
it will give that section of the video a very high band with a very high bit rate.
|
||||
And then we cut to me talking at the microphone again, and it'll drop my bit rate down,
|
||||
because I don't need that much information. So that's a really handy device called variable bit rate
|
||||
to keep your end file size down by making it a variable in terms of what bit rate each scene gets.
|
||||
It works within the YUV color space, which is the default for professional grade video.
|
||||
It does not interlace, but again, that hasn't been really a problem for anyone that I know of.
|
||||
I mean, interlaced videos kind of being phased out in many ways.
|
||||
So AUG or the ZIF people also have the FLAC codec, which is the uncompressed audio codec, like WAVE or AIFF.
|
||||
Speaks is for low bit rate audio. It supports VBR. It's just a very paired down kind of codec that they've designed, just voice stuff.
|
||||
So that if I wanted to send this out in the Speaks format, that would be great.
|
||||
It's extremely low bit rate stuff. It would be ideal, I would think, for something like Skype or something like that.
|
||||
There have been some, I think, video games. I think I heard on an interview with someone from ZIF,
|
||||
like some prominent video games have actually used the Speaks codec for, I guess, online talking to other players or something like that.
|
||||
So that's kind of cool. So AUG is a fantastic codec. Nothing to be afraid of. Very handy codec.
|
||||
And now let's talk a little bit about how we can transcode video that maybe we acquire from someone into a free format like AUG.
|
||||
Or maybe it's video that we've acquired from a video camera. We want to save it for ourselves, we want to archive it.
|
||||
Going to AUG is a great idea. Either AUG or XVID. Because you never know what the impact of society is going to do.
|
||||
You don't know what kind of support they're going to give you. Whereas AUG and XVID, obviously being open source,
|
||||
not going to be a problem in terms of it suddenly disappearing off the face of the earth.
|
||||
So to do this, you'll need ffimpeg2theora installed. That is ffimpeg, the number 2 in the word theora,
|
||||
t-h-e-o-r-a. Easiest way to get that apt-get install ffimpeg, the number 2 t-h-e-o-r-a,
|
||||
or yum install ffimpeg2theora. Either way, it'll get to your repository and grab that little command line program.
|
||||
And you can open up a terminal or a console, and you can do the following.
|
||||
The command obviously is ffimpeg2theora, and then you type in the name of the file. So it'll be example.avi.
|
||||
Then you need to give it the frame size that you want. So if you're staying native, it's just going to...
|
||||
So if it was standard definition, it would be dash x, space 720, and then dash y, space 480, or whatever.
|
||||
You look at the video that you're trying to transcode and see what the native frame size is.
|
||||
Or if you want to scale it down, then you just do the math, 320 by 240, or whatever size you prefer.
|
||||
And you'll want to define your bitrate as well. So the option for that is dash capital V.
|
||||
And that is going to be measured in kilobits per second. Can't really predict what it would be. It just depends on the video.
|
||||
So it could be anywhere from conceivably 200 kilobits per second all the way up to a lot more.
|
||||
So just whatever bitrate you think is going to treat the video best and be better for your audience.
|
||||
You'll need to... or you may want to also define the aspect ratio, because Ogthura does have a lot of different aspect ratios that it can encode to.
|
||||
So if it was something that you'd recorded in anamorphic mode on your camera, it would be dash dash aspect space 16 colon 9.
|
||||
Or if it was just standard definition, non-anamorphic, it'd be 4 colon 3, audio bitrate as well.
|
||||
And remember, the higher the audio bitrate, essentially the lower the video bitrate is going to be if file size is a concern to you.
|
||||
So typical audio bitrate you figure the audio that you download off of the internet usually is about 128 kilobits per second a lot of times on music.
|
||||
It's a lot less on most podcasts because most podcasts are people talking and so it's frequently 64 kilobits per second.
|
||||
So whatever you think the audio in this clip would require is what you would put here.
|
||||
So dash capital A192 would be pretty good sound, 128 kind of standard sound, anything lower than 128 you're getting into areas where audio people are going to start to cringe.
|
||||
You can also set how many output channels of audio you have, so that would be just dash C and then you can do one or two.
|
||||
You can set the keyframe interval, which would be your iFrames.
|
||||
And that's the default for for for ff impact to the aura is 64.
|
||||
So that's one really nice frame every two seconds roughly.
|
||||
So you could make that more frequent if you wanted to. There's the sample rate that you'll want to set for your audio again dash capital H for CD quality.
|
||||
It's 44 100 DVD quality would be more like 4800 48000.
|
||||
I usually just leave it at 44 100 not really a reason to go higher than that.
|
||||
Usually not a good idea to go lower than that.
|
||||
Dash O is your output. So put dash O and then name a file dot OGG.
|
||||
The dot OGG is the again the container file. So all the aug when we say aug we're typically talking about aug Vorbis, but we might be talking about aug the aura obviously.
|
||||
The aug is simply our version of the dot AVI or the dot MP4 or the dot WMV or what have you hit return and it will start encoding your video.
|
||||
Encoding video relies heavily on the power of your CPU.
|
||||
Video is being processed by your CPU to being being received and then written back out as a file.
|
||||
If you have a couple of CPUs dedicated to doing this, it'll be a pretty quick process.
|
||||
If you have just a single Intel Core Duo 2 chip, it's going to take, you know, I mean if it's a long file, it could take quite a while.
|
||||
Be aware that encoding video is usually an intense and long process.
|
||||
Your computer will get pretty hot. You will get pretty bored waiting for it.
|
||||
So it's a great thing to have running overnight or started up in the morning and go to work, come back, see what happens.
|
||||
But that's all there is to it really. It's just keeping in mind the variables that we've discussed in episode two, I think, or three, whatever we were talking about.
|
||||
And then just typing in those variables into the command line one after another with the input file at the very beginning, the output file at the very end.
|
||||
The manual page for ffnpeg2theora is actually one of the best manual pages that I've ever read.
|
||||
I find it very clear. It just, it gives you a list of every single flag that you can possibly assign to ffnpeg2theora.
|
||||
I guess it doesn't really tell you a whole lot about it, but now you know all, you need to know about those variables.
|
||||
So when you see that there's the keyframe interval or the video bitrate and the audio bitrate and the sample rate, things like that, you now know what all of that is talking about.
|
||||
Thanks for listening. This has been Hacker Public Radio.
|
||||
Thank you for listening to Hacker Public Radio.
|
||||
HPR is sponsored by Carol.net, so head on over to C-A-R-O dot N-C for all of those meetings.
|
||||
Thank you very much.
|
||||
60
hpr_transcripts/hpr0054.txt
Normal file
60
hpr_transcripts/hpr0054.txt
Normal file
@@ -0,0 +1,60 @@
|
||||
Episode: 54
|
||||
Title: HPR0054: This Old Hack Part 6
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0054/hpr0054.mp3
|
||||
Transcribed: 2025-10-07 10:49:32
|
||||
|
||||
---
|
||||
|
||||
Bye!
|
||||
Extreme Will Pump Hacking!
|
||||
Just don't break anything.
|
||||
Get ready for another exciting edition of this old hack.
|
||||
Well, I'm back at it again.
|
||||
Fucking around with that old well house of mine.
|
||||
And I'm really super geeking at tonight.
|
||||
I'm like last year when I went to work on the well.
|
||||
It was hot as hell tonight, it's rather chilly.
|
||||
And it's probably a good 50 degrees cooler than it was when I worked on it in the middle of summer.
|
||||
But needless to say, this is a good time to go back over and touch on some of the points that I might not have exactly been quite clear about originally.
|
||||
Talk about a couple other things.
|
||||
Just getting my stuff set up here.
|
||||
Tools.
|
||||
Beer.
|
||||
Everything I'm going to need.
|
||||
Got my headlamp on.
|
||||
Cause I'll talk about the headlamps first.
|
||||
Now this is the cheapest and probably my opinion the worst type of headlamp you could have because it's first of all it's not an LED headlamp.
|
||||
It's a single incandescent bulb.
|
||||
So it's bulkier.
|
||||
It sits kind of far out.
|
||||
So it wobbles a whole lot.
|
||||
Now with the newer a little bit more expensive LED lights.
|
||||
They're brighter and they don't take as big of batteries and of course they last a whole lot longer than the incandescent bulbs.
|
||||
And the ones they sell at Walmart are okay but I had this one really nice headlamp one time.
|
||||
I found it in the woods camping.
|
||||
And it was made by black diamond.
|
||||
The thing that was nice about it and I've never seen any of the regular retail stores carry this particular model.
|
||||
The thing about it that made it nice was the battery pack was in the back of the headband.
|
||||
Cause the headlamp you know it's an elastic band and it was a light on the front.
|
||||
Well the black diamond unit the batteries were in the back.
|
||||
So the weight was evenly distributed and the light panel was really slender and you could fold it down and you could probably conceal it under like a toboggan hat.
|
||||
You're like a thick winter hat.
|
||||
It was slim enough to wear. You could probably hide it.
|
||||
It was very comfortable and you didn't ever have to worry about breaking your head and losing the position of the light.
|
||||
Somebody found it from me in Northern California.
|
||||
So right now I'm doing as I'm trying to find some thread tape.
|
||||
And I didn't ask my wife to pick any up which she would store.
|
||||
It's kind of funny what happened the other day the power in the kid's room just went out just a kid's room.
|
||||
Obviously I checked the breakers and that wasn't the problem.
|
||||
There's just no power.
|
||||
Well yesterday after the power being off for a couple of days and just mysteriously came back on.
|
||||
Or like okay everything is good.
|
||||
Well today while I was at work the power went out again and this time the power through the well went out.
|
||||
Well my life came out here to just to mess with the well pump switch which I touched on in a previous episode.
|
||||
Episode five.
|
||||
And if you tap it with a stick and after it's been turned off it'll cause it to come back on.
|
||||
And I've had some couple of requests to be more clear about the nature of the well pump pressure switch.
|
||||
So I'm going to go into that too.
|
||||
Thank you for listening to HACRA Public Radio.
|
||||
HPR is sponsored by Carol.net so head on over to C-A-R-O dot N-E-T for all of us here.
|
||||
Thank you.
|
||||
187
hpr_transcripts/hpr0055.txt
Normal file
187
hpr_transcripts/hpr0055.txt
Normal file
@@ -0,0 +1,187 @@
|
||||
Episode: 55
|
||||
Title: HPR0055: Slax
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0055/hpr0055.mp3
|
||||
Transcribed: 2025-10-07 10:50:13
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
it without any catches. Now if you've done EXT2 or XFS, then you're going to want to do
|
||||
sudo space dot slash boot slash lilo INST dot SH. And that's really important because
|
||||
it will not work if you do the wrong one. And they don't make, I didn't notice that
|
||||
it was a huge, I mean they don't have like a big warning sign in the installer files
|
||||
or anything. So you need to just kind of be on top of that, know what you're doing.
|
||||
Now another catch is that whilst installing, it's going to need to run a lilo binary file.
|
||||
And this lilo binary file will only run on the architecture, the CPU architecture, you
|
||||
know, that it is a binary four. So I know for sure that it will fail on for instance
|
||||
the PowerPC chip, it will work fine on an I 386 architecture or 686 architecture, you
|
||||
know, the typical Intel architecture. I don't have an AMD chip to try this on and I don't
|
||||
know enough about the differences between AMD and Intel except that typically if you're
|
||||
downloading an ISO, you have to make sure that you're getting that ISO for either AMD
|
||||
or Intel. So I'm assuming there could be a problem there. So if you're on an AMD system
|
||||
and you're trying to install this and it isn't working, if it hangs at lilo, it's because
|
||||
your chip architecture is wrong. So you'll need to find an Intel machine possibly to install
|
||||
this on. If you're installing from Windows, which I did not and I do not have access to
|
||||
a Windows machine to test it on, you can simply, you can be in Windows, there is an installer
|
||||
dot BAT file. So presumably you will know how to run that on Windows and you run that
|
||||
and I guess it'll work. Again, I do not have access to that so I haven't tried it but
|
||||
I have asked about two people on IRC how they installed it after they had done successful
|
||||
installs and what they had done was just do it via Windows and I guess that probably
|
||||
circumvents any kind of weird file system issue since I'm sure Windows probably doesn't
|
||||
recognize the X2 or XFS. So you're probably just dealing with a VFAT. So once you have
|
||||
it installed and it's ready to go, obviously you need to make sure that your BIOS settings
|
||||
are correct to be able to boot off of it. Getting into BIOS is usually as simple as hitting
|
||||
F2, Dring Boot or sometimes it's escape, Dring Boot or Delete Dring Boot and just set it
|
||||
so that the USB is a bootable, you know, the booting from USB is enabled and preferably
|
||||
higher in the sequence than your hard drive or else it will just boot off the hard drive
|
||||
because it won't ever get past the hard drive. But once you have it installed and you booted
|
||||
up off of it, you can easily make a persistent file, a persistent environment. And in
|
||||
all actuality, I have anyone have to do this. It's actually just being persistent for me.
|
||||
I don't know if this is an update that they've made for 6.0. Right now it's being persistent
|
||||
for me and the way to make it persistent if it is not persistent for you is simply make
|
||||
a directory on your flash drive. You can call it, for instance, Slack's RC. And then when
|
||||
you get to the boot up screen, you can use a boot parameter. Changes equals slash Slack's RC.
|
||||
And then Slack's knows where to put all of your changes and where to find them again
|
||||
later on. So I'm assuming there's probably a way to modify the LILO config file to make
|
||||
that boot parameter a constant thing. I haven't really played around with that lately.
|
||||
But if you go listen to Dan Washco's episode, HPR episode, about specifically obviously
|
||||
a LILO episode, you will find all the kind of information that you need to make that happen.
|
||||
The modules that Slack's has is a really cool feature. These are basically Slack packages.
|
||||
So they're basically just.tgz that you can actually, there's a utility on Slack's to convert
|
||||
a Slack package to a Slack's module. And there are sites with Slack's modules available.
|
||||
And you can add these modules to a folder in on your USB drive. You can identify that
|
||||
as your module folder. And then when you boot up, you will have those programs available
|
||||
to you. So you can keep adding two slacks and, you know, really easily with these little packages
|
||||
basically. In some events, you're not going to be able to get to a computer's BIOS in order
|
||||
to make it bootable from a USB drive. In that case, don't forget that you do have the live CD
|
||||
option. You could use that. That's what I ended up having to do at work since I worked around
|
||||
Macs and wanted to boot up off of the thumb drive. And the newest incarnation of Macs
|
||||
do not use open firmware so you can't access any kind of firmware setting for the boot sequence.
|
||||
And it simply will not boot off of the USB drive, tried everything. And just doesn't work.
|
||||
So you could probably hack the EFI firmware by downloading a developer kit from Intel.
|
||||
And installing it on the Mac. But you'd probably end up breaking the Mac. And I can't really
|
||||
afford to do that. I'm a job right now. So I haven't done it. But the live CD is an option.
|
||||
It works really well. I've been using that quite a bit at work. So either way, slacks is highly
|
||||
enjoyable. It's a great little system. Runs really, really fast probably because it's paired down,
|
||||
but also probably because it's on followed state. So you're not physically waiting for really
|
||||
anything. So it's a great little solution for for a quick Linux fix if you're on the go.
|
||||
And it's a really cool system. So give it a shot. If you've not tried Slackware,
|
||||
this could be a great introduction to it. It's pretty much, you know, you boot it up and it's
|
||||
kind of ready to go. It doesn't have any of the classic, you know, scary Slackware kind of things
|
||||
that you have to configure. So try it out and you might you might like it.
|
||||
Thank you for listening to Hack the Public Radio.
|
||||
HPR is sponsored by caro.net. So head on over to C-A-R-O.N-P for all of us here.
|
||||
87
hpr_transcripts/hpr0056.txt
Normal file
87
hpr_transcripts/hpr0056.txt
Normal file
@@ -0,0 +1,87 @@
|
||||
Episode: 56
|
||||
Title: HPR0056: Open Street Map
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0056/hpr0056.mp3
|
||||
Transcribed: 2025-10-07 10:50:16
|
||||
|
||||
---
|
||||
|
||||
Up.
|
||||
Hi and welcome to Acro Public Radio. My name is Ken Fallon and today I'm doing an
|
||||
episode on a project that I think is really rather cool. I first come across this project
|
||||
last year at the Linux World Expo in the Netherlands and I commented on deviates to show
|
||||
about the project and it's called OpenStreepmap.org. Now the idea behind the project is to
|
||||
do for mapping what Wikipedia has done for the unsightly media and that's to generate
|
||||
an open database of free maps around the world. Now you might ask yourself why are the
|
||||
bothering when you've got APIs available for Google Maps and Yahoo and all the other people
|
||||
who are offering mapping? Well the simple answer is that data is copyrighted and if you
|
||||
look on Google Earth and the bottom right hand corner you can see who the particular
|
||||
map data is owned by. Okay so let's talk a little bit about the maps. The process involved
|
||||
in doing the maps is five step process. The first being collect the data, two is upload
|
||||
the data, then you create and edit the data, you add labels and add details to it and then
|
||||
step five is you render the maps. Now if you've got a device with a GPS unit in it you
|
||||
can help the project by collecting some data and uploading it to the website. It's very
|
||||
simple, you just go and create yourself an account and as you travel your GPS units will
|
||||
give you your position along the road which is essentially nothing more than a whole
|
||||
of points with a latitude, longitude, elevation and probably time. Now at the end of your journey
|
||||
you should be able to export out your data and upload it to the OpenStreepmap project and
|
||||
if that's all you want to do with project you're adding information for the mappers to
|
||||
create their mapping data. Okay let's move on to the next one. That's creating an editing
|
||||
OpenStreepmap data and the OpenStreepmap has three elements, an old, ways and closed ways
|
||||
and an old is a point in space at latitude and longitude. So think about it as donating
|
||||
postbox or a signpost or something like that. A way is a series of nodes ordered in one direction,
|
||||
a one way street for instance, or a bicycle path or something of that nature and a closed way
|
||||
is a loop of a way, something like a park, a lake or an island. So if you think of it as a bit
|
||||
like a vector drawing, an old is a point, a way is a line and a closed way is an area. I'm not
|
||||
actually going to go into too much detail here on how to edit them up because it's a little bit
|
||||
outside the scope of what I can do here in an audio podcast but there are two tools that are
|
||||
available to you. One is a Java application called port latch. She can use to join the dots
|
||||
essentially and the other is a Java application called Java OpenStreepmap editor and they're both
|
||||
available on the OpenStreepmap.org site and I advise you to read a little bit more
|
||||
about both of those before you go creating some maps and then the final process of this is to
|
||||
render the map. So if you want to get involved with the project, the easiest way to go about that
|
||||
is probably uploading DSM data. If you're interested into in vector drawing or use of packages
|
||||
like Inkscape or AutoCAD or something like that then the mapping and tagging features might
|
||||
be of interest to you. The project itself has met some inroads in getting map data and here in
|
||||
the Netherlands the map data has been donated. A lot of the map data has been donated at least.
|
||||
However, even though the map data has been fairly comprehensive in all the streets and towns
|
||||
there is a project going on to add the cycle paths for the Netherlands in and the cycling is
|
||||
very popular here so that would be actually quite useful. But if I just look around the neighborhood
|
||||
here myself I can see that in the time since the survey was done for the roads and streets around
|
||||
there has been several auditions and changes in the area that would necessitate
|
||||
somebody going in and modifying these maps and that's the main benefit of the open street map
|
||||
project that when the data is there should be very easy for people in the locality with local
|
||||
knowledge to go in and change things. For instance they've blocked off the streets to make it
|
||||
inaccessible by cars and it's now only accessible by bikes. They've put an audition round about
|
||||
that moved, they've rebuilt the swim pool and they've moved the recreation area and they've
|
||||
blocked off certain things and this is all just in within 500 meters of where I'm living at the
|
||||
moment. So there's definitely a lot of work to do even in areas where there is complete
|
||||
and airports there are complete mapping data. Just a few weeks ago I was went back home to Ireland
|
||||
and a lot of the areas in Ireland haven't been mapped at all so it really is an opportunity to go out
|
||||
and get your hometown and put it on the map so to say, forgive the pun. So actually that's quite
|
||||
interesting just to see people coming who probably work in towns and cities, drive down the motorways
|
||||
down the local roads and end up going up some boring somewhere for the weekend to visit the family
|
||||
to bring the GPS with them and then they upload their data. Now when that data gets uploaded it's
|
||||
essentially like a transparency that the mapping person would use and you can turn it on and turn
|
||||
it off in your mapping data and then the actual drawing of the roads is done on a different layer
|
||||
so that's kind of how that whole thing operates. A few little tips here if you're going to be getting
|
||||
involved in some mapping is the coordination, if you've got a camera that has a GPS in it,
|
||||
as you go along you can take photographs of streets, points of interest like street names,
|
||||
their type of road, if it's a bicycle path, if the road is a bicycle path, if it's one
|
||||
bicycle path on either side, if it's the bicycle path on the pavement, if it's paved road or whatever.
|
||||
And it's important to do this ourselves and not pick up information from copyrighted maps because
|
||||
that kind of defeats the whole purpose. And it's important for us to take that information in and
|
||||
not be tempted to use actual maps that we've purchased our data from other locations because very
|
||||
often that information is copyrighted and very often they will have easter eggs stored in the maps
|
||||
so that they can prove in the court that the map data was taken from their data set.
|
||||
And some very interesting things on the wiki there describing how fake roads and churches have
|
||||
been added to make their data set unique. If you are going to be going taking photographs as you
|
||||
go along and your camera does not have a GPS unit in it, a very simple tip is to take a photograph
|
||||
of your GPS unit showing clearly the data and time on it. And then later on the JOSM
|
||||
application, you can drag in the photo and correspond the time on your GPS unit and the time
|
||||
on your camera so that the offsets are correct so that all subsequent photos which have a time
|
||||
in the XBIF data are corresponded to a physical time on your GPS plot which corresponds to a
|
||||
latitude and a longitude. Anyway, I'm going to think you're going to wrap it up there. Thank you
|
||||
very much for listening to this for the episode and come across something that's interesting
|
||||
or that tickles your fancy so to speak, grab your microphone, record a little podcast about it and
|
||||
submit it. Thank you very much for your time and have a nice day.
|
||||
Thank you for listening to HACCA Public Radio. HBR is sponsored by Carol.net so head on over to
|
||||
143
hpr_transcripts/hpr0057.txt
Normal file
143
hpr_transcripts/hpr0057.txt
Normal file
@@ -0,0 +1,143 @@
|
||||
Episode: 57
|
||||
Title: HPR0057: LPI Certifications Part 3
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0057/hpr0057.mp3
|
||||
Transcribed: 2025-10-07 10:51:16
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
Hello and welcome to Acro Public Radio. My name is Ken Fallant, so they will be continuing
|
||||
this series on the LPI certification. Today we are going to be talking about hard drives.
|
||||
The most common hard drive found in the PC today is the Integrated Drive Electronics
|
||||
or IDE hard drive. They are also known as ATA drives. Other drives in use commonly on
|
||||
servers are scousy drives and recently most drives being shipped to PCs are now serial
|
||||
ATA. So the original IDE or ATA drives are now retrofitted with the name of parallel
|
||||
ATA drives. When you can tell the difference, the parallel has a big ribbon cable, whereas
|
||||
the serial ATA has a smaller data cable. As far as the LPI certification goes, what you
|
||||
probably need to know is the limits that are imposed due to the original bias limitations
|
||||
when dealing with hard disks. You are also going to need to know some stuff on the tools
|
||||
to look at and tune a hard disk and you probably also going to need to know about the Linux
|
||||
disk naming conventions. So that is more or less what we are going to cover today. First
|
||||
of all some background on what a hard disk is and how it works. Hard disk is actually composed
|
||||
of platters made of other aluminium or glass coated in a magnetic material and the platters
|
||||
or disks are arranged one on top of each other on a spindle. The whole thing is enclosed
|
||||
in a enclosure and there is a hard disk controller attached to the underside of the disk. The
|
||||
read right head is mounted in an arm which moves from the outside edge of the disk to the
|
||||
center that allows it to access any area on the disk. The disks themselves can spin at
|
||||
very high speeds often reaching 170 miles per hour or around 270 kilometers per hour. That
|
||||
is stored on the surface of a platter in sectors and tracks. The tracks are concentric circles
|
||||
and the sectors are pie-shaped wedges on the track. The term cylinder is used to describe
|
||||
the same track on all the platters as they are stacked one on top of the other. So if
|
||||
you have track one on the first platter, you are also talking about track one and second
|
||||
track one on the third track one on the fourth as you go up. It creates a sort of cylinder.
|
||||
When the original hard disks came out, the way you would locate a piece of information
|
||||
on the hard disk was by giving it a reference based on cylinders, heads and sectors of tracks.
|
||||
So if something was asked position one, cylinder one and head five on track twelve, you would
|
||||
be able to locate information. Another method for locating data on the disk is called
|
||||
the logical block address or the LBA address. And rather than using geometry like CHS does,
|
||||
it simply used number structure to name the sectors regardless of their physical construction.
|
||||
Okay now what does all of this got to do with the exam? The important part is that every hard disk
|
||||
is presented to the bias through its geometry, which tells the bias of many cylinder's heads
|
||||
tracks that the disk uses. This is using the CHS method. For Windows, the boot loader is always
|
||||
located at the master boot record. However for Linux, the boot loader, LiDOR group can either be
|
||||
at the master boot record or at the root partition. And if it's at the root partition,
|
||||
then you have to be aware of certain limits that are imposed by this CHS methodology
|
||||
employed by the bias. And the most important limit that you need to know about is the
|
||||
one, oh two four cylinder limited. Now where this comes about is the IDE, ADA specification
|
||||
had specification for the number of cylinders, heads and sectors. And then you had biases
|
||||
the bias in 13H standard had also specifications for the number of cylinders, heads and sectors.
|
||||
Problem is that they didn't talk to each other and we ended up with having to take the smallest
|
||||
combination of each. So although the IDE specification supports 16 cylinders maximum,
|
||||
the bias only supports 10. And while the bias supports 8 heads, the IDE specification only
|
||||
supports 4. And the IDE specification supports 8 sectors max but the bias only supports 6. So what
|
||||
you end up is having maximum of 10 cylinders which corresponds to one or two four cylinders,
|
||||
sorry 10 bits for a cylinder number. And that corresponds to one or two four maximum cylinders.
|
||||
And then the maximum 16 heads with 63 sectors. Like gives a total maximum of 504 megabytes. So if you're
|
||||
making a boot partition, you should always make it less than 500 megabytes. A lot of people will
|
||||
say that anything more than 50 megabytes is a waste of time. Okay, there have been various
|
||||
different ways to get around this problem by doing translations and all the rest will put the
|
||||
generally most modern hardest supports LBA. Now the LBA just starts at zero for the first sector
|
||||
and marks its way up. However, there is a limit of 137 gigabytes imposed by the old ADA standard
|
||||
that only use 28 bits for addressing. That's more or less gone away now and to the use of 32
|
||||
bits sector numbers. And that increases the limits to two terabytes. Using workarounds and mapping
|
||||
they were being able to make the CHS method work up to a limit of 8.4 gigabytes. But after that,
|
||||
you're just supposed to use LBA. So when querying any hard drive over 8.4 gigabytes,
|
||||
they will always report through geometry as 16, 3, 8, 3, cylinders, 16 heads, and 63 tracks,
|
||||
regardless of what their actual geometry is. And you should look in the LBA field for their
|
||||
actual number of sectors. And that's exactly what we're going to do right now.
|
||||
But first before we hit that, I want to talk a little bit about the hard drive naming convention
|
||||
under Linux. First of all, you'll be able to see the devices under special directory called
|
||||
the DEV file system. Those who are all devices are kept. And like the PROC file system,
|
||||
which we talked about before, it's a pseudo file system, meaning that it doesn't actually exist
|
||||
in the conventional sense. Following again, the Linux, everything is a file philosophy.
|
||||
Now in there, the naming convention has typically been for IDE hard disks that they begin with
|
||||
slash dev slash HD something. And that for scousy disks, they will go in slash dev slash SD something.
|
||||
Now scousy disks are also considered to be serial 80 disks. So if you want to see what devices
|
||||
are attached to your computer, you want to check for both HD and SD drives.
|
||||
Okay, so jump out to a console and type the following command, LS, space,
|
||||
forward slash DEV, forward slash HD and anastrix. And for me, that returned no such file or directory
|
||||
and what that does is it asks for a listing of all the files beginning with HD
|
||||
in the dev directory. I'm going to do the same thing for SD files and I am returned with a list
|
||||
SDA, SDA1, SDA2 and SDA5. And that means that I have one serial 80a disk attached to my computer.
|
||||
And the reason I know it's one is that the third letter of that LS, forward slash dev, forward slash
|
||||
SD asterix returned SDA and there was no SDB. So that means I just have one disk attached to my
|
||||
computer and that's correct I do. For scousy disks, they're assigned letters. The first disk is
|
||||
A, the second disk is B, the third disk is C and continues on to the SDA, SDB, SDC.
|
||||
For ID artists, it works in a particular order. So the master on the first ID interface would be
|
||||
HDA, the slave on the first ID channel will be HDB, the master on the second ID channel will be
|
||||
HDC and the slave on the second ID channel will be HDD. Okay, that's the naming system for the
|
||||
disks themselves. However, each disk can have partitions and on an ID drive you can have up to four
|
||||
partitions and on a limited number of logical partitions. Those partitions are donated by a number
|
||||
after the first three letters designating the disk. So on my example from my computer,
|
||||
we had a SDA1 and SDA2 and then an SDA5. Another physically amounts is one big root partition which
|
||||
is SDA1 and then there's a swap partition which is actually an extended partition and that's SDA5
|
||||
and because extended partitions need to be housed somewhere, it's housed under SDA2. That's
|
||||
probably a little bit complex for now but it'll come in time. Now looking at my file server downstairs,
|
||||
when I do Alice, I suppose four slash dev, four slash HD star, I get a HDA, HDC,
|
||||
HDC1, HDC2, HDC3, HDE and HDE1 and HDG and I happen to know that the HDA and the HDG
|
||||
are CD-ROMs, the HDC and the HDE are, well the HDE1 is part of an LVM volume which we'll talk about
|
||||
later and the HDC contains the root partition. I also have scusy disks on that and SDA1 is part
|
||||
of an LVM SDF and SDF1 are part of an LVM as it's SDG1 and just as a side note, an LVM is
|
||||
logical volume manager and it's a way to take multiple disks, physical disks and put them together as
|
||||
a logical volume making the addition and expansion of your partitions as they're shown to Linux a
|
||||
lot easier but that's not something for the exam just right at the moment. Okay a good command
|
||||
to find out information about your hard disk is called the HDPram command and that's actually
|
||||
spelled HDPARM. Get slash set hard disk parameters and for now we're only going to be getting hard disk,
|
||||
I don't want anyone messing about with the hard disk parameters unless you know what you do it
|
||||
and I give you the description from the man page which I got by typing man space HDPARM
|
||||
HDPARM provides a command line interface to various hard disk IO controls supported by Linux
|
||||
serial ATA parallel ATA and SAS subsystems and older IDE driver subsystems some options may not
|
||||
work correctly with the latest kernel and the most important command out of that is going to be
|
||||
minus capital I which requests identification info directly from the drive which is displayed in
|
||||
the new expanded format which with considerably more detail than the older minus low case i flag.
|
||||
Now if I'm osy over here to my server and I do uh
|
||||
uh
|
||||
sudo hdparam minus capital I for slash dev for slash hda I get loads of information back on my cd
|
||||
ram drive the model number is a ncdvd read writer it's got the firmware it's standards used
|
||||
at api dash 1 it's de recue it's bloody bloody but that's all very interesting now if I do um
|
||||
an ls of the slash dev for sd drives and I look at um
|
||||
and I look at one of the serial ATA drives I'll do s
|
||||
s hdparam space minus capital I space for slash dev for slash sda I get a lot more information
|
||||
about the drive it's a max store something rather it's got a serial number firmware
|
||||
what standards it supports um and here we are the uh max and current cylinders heads and sectors
|
||||
are down as 16 303 heads as 16 in the sectors as 63 which we uh found out earlier in this podcast
|
||||
that it was in fact uh dummy information the real information that we're looking for is the
|
||||
LBA usable addressable sectors which is 2 4 0 1 2 1 7 2 8 which is 122 gigabytes so you can
|
||||
happily play with that command and see what information is available on your system one good
|
||||
way to find out what in what our disks are attached to your computer is using they out from
|
||||
the system log as it boots up and that command well I think we've talked about it before is called
|
||||
and from the description in the man page d messages used to examine or control current
|
||||
buffer the program helps user to print out their boot up messages instead of copying messages by
|
||||
hand the user needs only uh do de message do messages uh however so if we go to the command line
|
||||
on my server again and I type de message space uh the pipe command which is usually above the
|
||||
keyboard uh the entry key and a type grep space sd I get a whole list of sd devices that were on
|
||||
my computer and in there I'll see that I have uh discuss the uh cd rom drive that I had
|
||||
coming up and the other additional disks and if I did the same thing de message and I pipe that
|
||||
to grep and I do hd then I see all the different id devices that have come up so I see a max store
|
||||
80a disk what else your cd rom drive comes up here as a hd device so that's pretty much it for this
|
||||
episode of acro public radio I want to thank you all for listening if you yourself come across
|
||||
something cooler interesting consider sitting down for five minutes doing a podcast about it
|
||||
we'll send it in uh know that we could do with some extra filler episodes thank you very much
|
||||
have a good day thank you for listening to acro public radio hpr sponsored by caro.net
|
||||
so head on over to caro.nc for all of the team
|
||||
you
|
||||
199
hpr_transcripts/hpr0058.txt
Normal file
199
hpr_transcripts/hpr0058.txt
Normal file
@@ -0,0 +1,199 @@
|
||||
Episode: 58
|
||||
Title: HPR0058: Microcontrollers
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0058/hpr0058.mp3
|
||||
Transcribed: 2025-10-07 10:52:22
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
Hi everybody, this is BitViper and I'm here to talk to you today about something a little different than just pure Linux, even though that's a good stuff.
|
||||
I'm here to talk about something interesting on the hardware side that could really help you out.
|
||||
For example, if you've ever wanted to hack around with hardware and maybe make an alarm, sorry, clock, alarm clock or talk to an LCD screen or make your own MP3 player or robot or something like that, you really have been limited kind of to with just using a computer to get that done.
|
||||
That's kind of lame because the computer is expensive, big, power-hungry and all that, so I wanted to be nice.
|
||||
If there was a cheap version of the computer that you can program, that can do everything you need it to do to make the clock or the BitViper player or whatever project you want to make.
|
||||
So, it turns out to be such a device and that's called a microcontroller.
|
||||
So, microcontroller is the best way to explain it is what it is and that's a micro-processor by itself.
|
||||
Everyone knows a penny or something doesn't do much by itself. You have to give it RAM, you have to give it a hard drive or a floppy disk or something to put off of.
|
||||
You have to give it a USB chip or something or a network chip or whatever.
|
||||
You have to keep surrounding it with different components until you get what you need, which is good because that gives you the freedom to actually choose what you want.
|
||||
And indeed, electrical engineers, when they make little embedded devices like WRT 54G or anything else that uses some sort of computer inside, they generally will use a micro-processor that does exactly what they want, the speed and has the features they need.
|
||||
And then they'll buy exactly the memory they need, speed and size as well and so forth.
|
||||
So, you can really dial in exactly what you want your system to do and only pay for what you use.
|
||||
That's well and good for, you know, if you got the abilities to do that. However, me, I'm actually a mechanical engineer, so I know a little bit of electrical but not a lot.
|
||||
So, I sure could use all the help I could get. So, that's why microcontrollers are so nice because what a microcontroller is.
|
||||
It's a chip that has a micro-processor inside, but it also has a lot of the other things that you need to make it a full running system.
|
||||
Like, you know, flash memory for the program to be stored on. Maybe some e-proms, like a little mini hard drive kind of thing.
|
||||
Even things like input output pins, which you can use to either sense or control things with, you know, and tons of other things.
|
||||
So, what's nice is that you can find the microcontrollers all kinds and you can find one that has the speed and the resources and features you need.
|
||||
And instead of costing as much as a computer or all the other separate components like the electrical engineer would use, it's cost like a couple bucks.
|
||||
Maybe as much as $10 if you get like a super mega powerful one with tons of pins and RAM and flash and all that.
|
||||
But generally, you could probably get by with a $2 or $3 model. I use the AT Mega 64 myself. I'll talk about that in a little bit.
|
||||
So, let's run microcontrollers. It's got everything built in. So, you have to buy the different parts and figure out how to wire it before you get started in the program. It's already ready to go.
|
||||
So, there's two, there's all kinds of companies that make microcontrollers, you know, Hitachi, Megzome, Siemens Megzome. It's unique, have a cool.
|
||||
However, those are generally more specialized. They have a specific purpose to exist. Maybe they're using cars or maybe they're used in other, you know, environments where they have some features that you generally want to need.
|
||||
So, there are two companies though that make more of a generic catch all process or microcontroller.
|
||||
First is microchip, the company. They make the pick processor, which has been around a long time. It's got a lot of support and a lot of community following around it.
|
||||
And the other one is sort of newer. And that's the AVR chipset. And it's made by a company called Atmel, which you might have heard of. They make a lot of flash memory in other products.
|
||||
So, kind of made sense for them to start one up. Actually, they bought that design for somebody else. But anyway, that's they make the AVR series of microchips.
|
||||
Now, there's a big debate. If you go Google and look up like AVR versus pick or something like that, you'll see all kinds of lively debates by people, you know, saying, you know, that's better, no mind's better, mind's cheaper, mind's got more feet, whatever.
|
||||
And I don't really have the data to tell you which one is better. I do have some small things I know about that kind of suggest AVR might be a little better, but you know, who knows.
|
||||
I can't really tell you for sure what's better. The only reason I use the AVR series is because a friend of mine happened to have an AVR development kit, which allowed me to program a chip and actually test it right on the developing board.
|
||||
And so that's why I got started with it turns out that AVR series has some other features on later that I'm so glad I started with it, but you know, I'm sure pick does just fine.
|
||||
You might have a friend that knows how to pick processors and probably would make sense to learn those as well.
|
||||
So anyway, I'm not going to say either one's better, but I am going to talk more about the annual version of AVR series, because that's all I know.
|
||||
So if you want to get started with any of this, it's actually with the so no more pick talk. I'm just going to talk about AVRs.
|
||||
If you want to get started with this, you don't have to buy anything actually. You can go to at mel.com. I'm going to step through it right now.
|
||||
And I'll probably put a link up. I remember if you want to add mel.com at the top, you can click on products.
|
||||
And then in the upper left, you see microcontrollers, a bit risk. Click on that.
|
||||
And then you're in the 8-bit microcontroller section, and you can look at devices. You can look at the instruction set, the different commands it understands.
|
||||
You can click on devices, and you can see all the different kinds of chips in this family.
|
||||
And I'll back up a minute because what's an 8-bit chip? What's a 32-bit chip? That was an option as well. You know, what's all the difference here.
|
||||
The difference is an 8-bit chip works with variables that are 8-bit large or a byte.
|
||||
So it can only add two 8-bit numbers together because it's registers inside. This are used to do addition, subtraction, and all the other commands.
|
||||
So that means you can only go 8-bits, and you can go from 0 to 255 decibel with 8-bits.
|
||||
So that kind of is lame because if you write a program, you need to go past 255 with a variable, what do you do?
|
||||
Well, what you end up doing actually is you use more than one register to store the variable.
|
||||
If you want to make a 16-bit number, which you can go up to, was a... I forgot. I think it's like 65,000 or something.
|
||||
Let's say two to the 16... Yeah, 65,000. So that's a decently big number. If you want to make a 32-bit number and it goes up to 4-billion, you can.
|
||||
The way you do it is you break it up. Let's talk about a 16-bit number for a second.
|
||||
What you do is you take the first 8-bits from the left. That's the most significant bits because it's a larger number on the left side. It's more significant.
|
||||
You put that in one register and then you take the right most 8-bits and put that in another register.
|
||||
And so say you want to increment that variable when you increment the lower, the least significant register.
|
||||
But then you have to test to see if there was an overflow. If it was all at 1-1-1-1-1, once, then you increment it and it goes overflows to 0-0-0-0-0.
|
||||
So you need to look for that. You need to actually see after you increment the first part if there wasn't overflow.
|
||||
If so, then you need to increment the other number, the other register, the most significant one.
|
||||
So that's, and then you can take that all the way up to 32-bit, 64-bit.
|
||||
But what's interesting about that is that it takes more instructions to work with a 32-bit number, as an example, or a 16-bit number.
|
||||
Because instead of just incrementing the number, you'd have to increment the lower byte, then check that for overflow and then do an if statement.
|
||||
And if there wasn't overflow, then do another command, which is to increment the upper register. So it takes a few different instructions.
|
||||
That contrast with a 32-bit register, where you can have all the entire 32-bit number in one register and you can increment it, you can, you know, subtracting all that.
|
||||
You don't have to worry about overflow, except if you get to 4 billion or whatever 32-bit gives you.
|
||||
So that's the difference between a 32-bit and 8-bit generally. I imagine it's more, but it's the basic difference.
|
||||
So why do people use 8-bit processors, though, if you have this problem going to 255 in all these workarounds?
|
||||
Well, it turns out that there's a nice shortcut that we'll get to that in a second.
|
||||
But if you're going to do it all in assembly, then you have to do it manually.
|
||||
You have to, you know, increment one, do a check, and all that stuff.
|
||||
And so you got to make sure that you're using it correctly.
|
||||
Make sure you don't have overflows without knowing about it.
|
||||
Okay, so that's what a 32-bit first 8-bit processor is. I'm not sure what other things they do, but that's the thing I know.
|
||||
Okay, so, anyway, if you wanted to play around with, you know, playing with these things, you can actually go to appnell.com, like I said, and go to products, 8-bit, or risk chips.
|
||||
And then you can go to tools and software, which is about halfway down the gray menu.
|
||||
And then you've got a whole bunch of things you can download.
|
||||
And at the top, you can see development kit.
|
||||
Development kit has a link. You can click on that, and it takes you down to the, where did it go?
|
||||
You might have to go a little bit. AVR Studio.
|
||||
So AVR Studio is the program you use in Windows.
|
||||
There are options for Linux, but AVR Studio works.
|
||||
I think it works in wine as well. The older version did for sure.
|
||||
3.5 something.
|
||||
Anyway, so AVR Studio, what that does is it gives you an IDE development environment, where you have, you know, where you can write your program in assembly.
|
||||
And then you can actually step through it line by line and watch it run.
|
||||
And you can see the very, the registers of the macro controller, you can see what's happening to the line by line.
|
||||
So it's really neat to download an assembly program and just step through it with this tool.
|
||||
It's familiar quite a bit. And then you can start tweaking it and playing and making your own thing.
|
||||
And you can also look at the pins. If you have input output pins, which most of the chips do, you can control.
|
||||
You can say whether or not the pin is an input or an output.
|
||||
And it's an input, you can actually read it. It's a certain kind of register, and you can look to see if it's 1 or 0.
|
||||
And that means that there's 5 volts or not, or 0 volts.
|
||||
And then you could do something based on that.
|
||||
Because it's an output, you can actually push a value to it 1 or 0.
|
||||
If it's 1 and it's high, that means it's 5 volts, it's 0 and it's low, of course.
|
||||
So you can control the pins and you can look at their status in this environment, maybe our studio environment as well.
|
||||
So really useful, ton of fun. And it's completely free.
|
||||
So I know just aside for the pick processor, I believe they have an assembler as well.
|
||||
It does pretty much the same thing.
|
||||
Anyway, assembler is good to start with with these microcontrollers, because you're right at the hardware level.
|
||||
You generally, in the beginning of a program, you write to some specific registers to say how you want the processor to behave.
|
||||
For example, you can say whether or not you want to use interops, or if you're going to use a counter.
|
||||
If you're going to use a counter, how you want the counter to behave, all these kind of initialization kind of things.
|
||||
And you can see examples of that.
|
||||
Just for fun, I'll tell you about what a counter is in case you don't know.
|
||||
Generally, if you have a program and it's doing its thing, it's going through some infinite loop, because you don't want it to stop.
|
||||
If you want it to keep going forever, you might want to interrupt it at certain times.
|
||||
Perhaps like if you make a clock, like I did, you might want to interrupt every second and have it force it to go to the increment second function.
|
||||
So you can increment seconds to keep things accurate for the time accurate.
|
||||
So you can make a counter that counts up.
|
||||
And then when as soon as it gets to a certain number, or if it overflows or something, it can actually make an interrupt, which forces a procedure and interrupt procedure to be started.
|
||||
And so it's neat, because you can actually have the counter count clock cycles.
|
||||
And if you know how fast the clock is, say it's an eight megahertz clock, eight million ticks per second, then you can have a counter that does accounts to eight million.
|
||||
And then we'll tell you when it gets there, and then it'll generate the interrupt.
|
||||
So that's an example of what a counter is.
|
||||
You can also have interrupts like on the input output pins.
|
||||
So if a pin goes high, it generates interrupts, or you can just simply pull it, meaning you're looking at the pin intentionally.
|
||||
Say, hey, is this pin higher low yet? I don't want it to interrupt me. I just want to check it right now.
|
||||
So there's tons of different little features. So it's neat, because the counter is like a separate thing running at the same time as your program.
|
||||
So it's like a little parallel circuit is kind of neat.
|
||||
And you know, there's other things. There's one other thing I want to talk about is the stack in its memory.
|
||||
All these chips have flat or regular memory like SRAM, very fast.
|
||||
You know, it goes away when you turn it off, but it's very useful, very fast when it's running.
|
||||
And the end, so it has only so much memory, and you know, you work from the top down, you put variables into memory.
|
||||
If you're not, you know, you don't always have to put variables in the register as you can push them onto the memory.
|
||||
But you can also, if you want to be able to do functions, so in other words, you want to call a function and then be able to have the function return you back to where you called it from, like a, like any language does, they need to activate what's called a stack.
|
||||
And what that means is it uses the bottom of the SRAM memory to keep pointers of where the instruction, instruction pointer is pointing at before it goes off to the function that you ask it to go to.
|
||||
So when the function's done, it tells it to go to the stack to find the pointer that it's stored before it went to the function so it can put that into the instruction pointer.
|
||||
It gets it back to where you were.
|
||||
So it saves its locations, what the stacks for. So that's neat for functions from returning from functions and that's how that works.
|
||||
So it's all an assembly.
|
||||
You can do any of these things and I really recommend it because you learn about all the initialization things and you understand how what abilities it has and very useful.
|
||||
But eventually you're going to get tired of assembly because anyone who's ever programmed it knows that it's very action, it's actually very easy like an instruction could be a simple as put this number in register one, put this number in register two.
|
||||
And then then do an add instruction where it adds R1 and R2 and it puts the result in say R1 whatever.
|
||||
You know, this is really easy stuff.
|
||||
So it's generally not that hard to learn. The real challenge is to understand how to take these very basic elementary steps and combine them to do some actual useful stuff.
|
||||
So, you know, with an assembly, it's kind of hard if you do really complicated if statements, lots of orders and it just gets kind of paid but to change things.
|
||||
It's fast because you're controlling the hardware directly and you can you can make sure it doesn't do anything extra.
|
||||
You don't want it to do. But again, it's, I mean, it runs fast, but it's slow to program.
|
||||
Of course, we have these high-level languages like C and it turns out that you can actually get a C compiler for the AVR for both families actually.
|
||||
You can buy a basic compiler, I believe, called BASCO. I'd ever used it for the AVR and you can buy a C compiler, I forget from where for some of my money.
|
||||
But I'm not sure why you do that because it's actually a free C compiler for the AVR chips.
|
||||
And this is why I'm really glad I stayed or I started with AVR. I'm still using it because when I learned about it, I just couldn't believe it.
|
||||
Because some of these compilers could cost like a thousand bucks or like $500 per year or things like that.
|
||||
So they get really expensive because it saves you a lot of time. It takes a lot of work to make a compiler.
|
||||
But anyway, the free compiler for the AVR you can find at, sorry, win AVR as kind of like window AVR, winavr.sourceforge.net.
|
||||
And you can download it there. And what that is is they've actually taken the GCC, the compiler for, you know, using Linux.
|
||||
And they've made a library, a libc library for the AVR series that understands the instructions that are available and can move around it.
|
||||
And you can actually compile C right there for free. And it works great. It's not hard to use it all.
|
||||
There's a couple demo programs to get started when you download it. And it does, how do you run GCC on Windows?
|
||||
Well, it's kind of uses SIGWIN, which allows you to do Linux stuff. So they've packaged SIGWIN and it together in a way that allows you to, you actually don't see it propped.
|
||||
It just does it in the background after you take your program and say compile. It just calls it and tells you if there's an error or not.
|
||||
If there's not, you get a assembly program that can be burned or actually it's not the term a compiled object or just a file that you can copy onto the chip and run.
|
||||
So very cool. It saved me a lot of time. One example was I was making a machine that required or I was making a coiling machine and had to have an LCD screen so you can read what stage it was at on the coiler.
|
||||
And so I wanted to actually communicate with the LCD screen. It's just four lines of text. You know, it's a very basic thing like you see on a alarm system or something like that.
|
||||
However, it's pain. Yes, because you have to know how it works with the instructions are to control the LCD screen and so forth.
|
||||
It turns out that, you know, they're all kind of standard. So someone just decided to write a library for it. You include that.
|
||||
And then you can just simply say put S, parentheses and quotes and hello. And that's it. That's like the entire thing right there. And you hook up the LCD to the right pins.
|
||||
And you define the pins and header file of which which venture using and it works. It was amazing. I actually set aside a couple of weeks to learn how to do it until I found out about that library. And of course, just all these other libraries, like serial port libraries to make everything easy to do.
|
||||
And that's with beauty, beautiful, beautiful thing about C on a VR is they have all these libraries and it's just gorgeous. So props to these guys. They did a great job. Of course, you can run this stuff in Linux as well.
|
||||
You just don't use a single part. You can now use a tool chain that's made for Linux to pile for cross compile for the record drawer, the VR series.
|
||||
So I just really couldn't believe how easy it was to use how amazing and free. So again, still haven't paid for any except a couple of devices, which cost me about three bucks or each or so.
|
||||
Oh, and a development board. And you can get the development board from now. If you go back to where was it tools, I guess. And development kit.
|
||||
And you'll see one of the options around there is STK 500. And that's you click on that link. You'll and I'll try to put all these links in the show notes. If I remember, I'm kind of sick. So I might not do it tonight.
|
||||
But this is the night before the show. I left it to the last minute. But you can actually get this little development board that has all these different socket sizes for all the different size AVR chips. You can program all these different kinds of chips.
|
||||
And I even have some lights and some headers to help you connect directly from the chip to some stuff you're playing with big testing. So you can do it. You can just keep the chip in the development board and run the program right on the development board.
|
||||
And play with it that way until you're ready to make your own circuit board.
|
||||
Okay, so anyway, I thought I'd give away one of my programs. I actually way back when it was like 12, 13 years old. I went to San Francisco, I was born raised in Oakland.
|
||||
Went to San Francisco and went to the nature company. There is a little store and they had this sweet clock. It's called the alien clock. And it basically tells time patterns of light. And so I loved it. I was like, this is so cool. But it was $100.
|
||||
And by the way, you can actually now I didn't notice the time when you go to alien clock.com. Well, I don't know what the site went live. But you can see what I'm talking about is patterns of light. It's not like a binary clock. I've seen those around. I don't like those because it takes too long to read.
|
||||
But they think the alien clock has patterns of light. So it's actually easier to read. I can read it in a second or so.
|
||||
So I didn't have access to that at the time. Oh, so I saved up my money, $100. That'll load a few long. Went back there and they were discontinued. So I didn't have any place to buy it from. It was really fun.
|
||||
So I've always had that in the back of my head. I really want to clap. It looks like that. Well, finally, when I heard about these these microcontrollers, I was saying, well, that was my chance.
|
||||
I can make a circuit board with that LEDs on it. And then make a little bracket to mount it in so it stands up on your desk. And because I didn't have this clock in front of me, I made my own pattern of light, my own configuration. And it turns out actually it's a little more efficient than what the professional one you can actually reach fewer lights to get the time.
|
||||
Anyway, so I'll release the circuit board spec as well as the source code, the schematics for it. So you can see what lines up what it's very, very basic. By the way, I'm a mechanical engineer. I'm not an electrical guy. I know very little bit, very little about electronics.
|
||||
So I know how to turn a light on with a light with an input output pin using a transistor. There's very basic circuits to do that or control motor with a relay things like that.
|
||||
Really not much to learn after that. So there's a couple schematics. You can find how to control stuff with my controllers. And there's very well known methods to do so.
|
||||
Let's just go dig them up and use them and you don't have to be a professional engineer.
|
||||
Okay, so finally, let's talk about some links. Again, we talked about at mel.com. That's where you can download the assembler that allows you to step through it.
|
||||
And then you can go to other areas to download. If you go to data sheets on the ABR 8-bit part, you can download all the instructions and learn all the different instructions you can run on these chips. Some of them have more instructions than other, but in general, they're pretty much the same across the entire families. You don't have to relearn it for different chips, which is nice.
|
||||
Finally, win avr.sourceforge.net. One other thing, not only can you compile and see with that win avr, but you can also run gdb, the debugger, which is useful if you want to, if your program's not doing what you want, and you want to step through it, look at variables change one by one and add breakpoints and all these other things, you can run your program in the debugger.
|
||||
And so that's very powerful to use your nice tools to check things, figure out what's wrong.
|
||||
Website I go to a lot is avrfreaks.com. Unfortunately, it's pretty graphic, heavy, it takes a while to load even on a cable motor, but you know, there's a form where you can ask questions.
|
||||
There's a subform for regular avr discussion 8-bit, as well as gcc avr. So you have to see compiler questions, you can look them up there and do a search first.
|
||||
And let's see. I think that's pretty much all I got to say on it, again, very cheap hobby to get into.
|
||||
I don't have to be professional, electrical stuff, very useful, made a lot of things, I've made a lot of sheets, robots to produce things for a company at work for.
|
||||
You don't have to be a genius to do it. It's all inside the microchore.
|
||||
And using C, compiler C is just very helpful. All right, so I hope that was interesting and maybe a few people take a look at that. And again, I'm pretty sick tonight.
|
||||
I don't know if I'll get around to actually do the links and the source could have all that tonight, but I probably will put it up tomorrow, the 20th of March, midday or something like that. So please check back and you should see everything I promised you here.
|
||||
Anyway, so that's another hacker public radio show.
|
||||
Thank you for listening to hacker public radio.
|
||||
HPR is sponsored by Carol.net, so head on over to CARO.ENC for all of us here.
|
||||
You
|
||||
You
|
||||
87
hpr_transcripts/hpr0059.txt
Normal file
87
hpr_transcripts/hpr0059.txt
Normal file
@@ -0,0 +1,87 @@
|
||||
Episode: 59
|
||||
Title: HPR0059: Interview with scorche
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0059/hpr0059.mp3
|
||||
Transcribed: 2025-10-07 10:52:01
|
||||
|
||||
---
|
||||
|
||||
Music
|
||||
Packer Public Radio. This is Clat 2. I'm sitting around looking through some files on my
|
||||
big super computer here that runs Linux. And I'm just sort of scanning through some
|
||||
old stuff that I've got. And there's a file here that I used to, that I meant to use
|
||||
for a podcast that I do. And I just never find a place for it. And I think it's a really
|
||||
great little interview. And it should be heard. And so it's going to be heard on Hacker
|
||||
Public Radio right now. It is with a guy named Scorch or Scorchie or Scorshe. He's with
|
||||
the Rockbox project. And he's one of those programmers that you read about. I mean this guy
|
||||
knows this stuff. And he's hacking away actively on the Rockbox project. So give this interview
|
||||
a listen. I was speaking with him myself on IRC and he told me to mention something. And I,
|
||||
for the life of me, do not remember what it was. It was something about companies that have
|
||||
contacted Rockbox. Something like that. I don't remember. So if you have any questions about
|
||||
the interview, you can either ask me on IRC or you can go over to Rockbox and talk to Scorch
|
||||
or Scorchie or Scorshe, the man himself. He hangs out there a lot. He's very helpful. I was
|
||||
talking to Austin, aka Scorchie, of the Rockbox project. And Rockbox, of course, is, well, what is
|
||||
Rockbox? It's an open source firmware for audio players like iRiver's, iAudios, iPods, gigabit,
|
||||
that sort of thing. So people quite like it a lot. I mean, especially with iPods where you don't
|
||||
have to deal with iTunes, we enable a whole bunch more features such as, I mean, a five-band
|
||||
paramedic equalizer, a whole bunch of games, massive codex support, especially compared anything
|
||||
else without there for a digital audio player. So is anyone actually shipping with Rockbox?
|
||||
No, however, there have been a few companies that have been sort of talking. There was one
|
||||
portable electronics. I mean, they really were quite small. I don't even, I had actually never heard
|
||||
of them before that. But they kind of disappeared from the face of the earth.
|
||||
Let's think. Sansa actually approached us as saying, you know, we would like you to write this
|
||||
firmware for us. And that, I mean, they gave us a few devices. They gave us a prototype with a
|
||||
JTAG port on it. But beyond that, I mean, that was pretty much it. Actually, regarding companies,
|
||||
there was one that, or there is one, I should say, that has been really kind to us, Austrian
|
||||
microsystems. They make the DAC for the Sansa devices. Basically, we needed their help
|
||||
for, see, quite a few months, we actually were running on the Sansa devices without sound,
|
||||
because we needed, you know, some data sheets in regards to that. We actually approached them.
|
||||
They offered to give us, you know, a tour of their facilities. And we actually did sign an
|
||||
NDA to get data sheets that device. Recently, Sansa has upgraded their line to V2s. And they're
|
||||
actually using an Austrian microsystem system on a chip as well. So a port actually hasn't
|
||||
been done to that, because no one has actually made the effort quite yet. But I'm sure a port
|
||||
would probably be incoming, although who knows when. I mean, like I said, it's up to individual
|
||||
people to take it up. So, but Rockbox strikes me as just being like phenomenally, I don't know,
|
||||
intuitive and logical in terms of the interface that you use with your portable media player.
|
||||
And I haven't actually used that many different portable media players. The ones that I have used
|
||||
essentially have all really, really been terrible in how you interface with it. Is Rockbox not
|
||||
being adopted because maybe it's too open or something? Well, part of the difficulties is, of course,
|
||||
DRM. You can't have DRM in an open source world, of course, because then the DRM's algorithms and
|
||||
everything would be out in the open. Again, back to the intuitiveness. That's really our main
|
||||
gripe. I mean, the project started on our coast devices sometime around December 2001-ish,
|
||||
and just the firmware's horrible. And as opposed to a computer, these are embedded systems that you
|
||||
really don't have a choice about what's running on here. You can't change anything and with Rockbox,
|
||||
so I mean, that really drives a lot of people to say, hey, you know what? This is our really
|
||||
our only option for media players, and there really isn't anything worth getting anything
|
||||
besides something that will run Rockbox. And what is Rockbox on a technical level? Is it using
|
||||
a Linux kernel or something, or is it just completely different? Actually, no, we did write the
|
||||
kernel from scratch, which is nice considering we don't have all the cruft of a full Linux kernel,
|
||||
or even UC Linux or anything like that. So it's optimized. It's mainly in C with some assembly,
|
||||
of course, for optimization purposes. Wow. And you guys have done a lot of different devices.
|
||||
How many of you are there? There's probably around 60-ish developers. I don't really like to give
|
||||
numbers to Core, but I would say probably around 20 to 30, although, you know, I may be way off on
|
||||
that. Right. Okay. But it is quite an active developer base. So, I mean, you'll see, we probably do,
|
||||
I mean, we're ranging where we're between two to 20 commits a day, so. Right. Okay. And you have
|
||||
nightly builds of, well, you have nightly builds, I guess is the thing. We do have nightly builds,
|
||||
however, typically when we talk to people, we say, you know, you're better off just using the
|
||||
Bleem builds, who's really, I mean, they are no more stable than the daily's. So. Okay. It is
|
||||
relatively stable. Right. Yeah. I mean, I installed the open source. Right. No warranties come
|
||||
expressly implied. Yeah. So I think I installed the nightly build, and I actually did a walk through
|
||||
on installing Rockbox on this podcast, and you were mentioning to me that maybe the Rockbox manual
|
||||
might be a better way for people to install this. Yeah. I mean, the main reason for that is, you know,
|
||||
sometimes install methods can change, as well as people, I'm not saying you did, but, you know,
|
||||
a lot of people have gotten things wrong, and then, of course, people listen to these podcasts,
|
||||
or read these things, and do something wrongly, and then come to us and say, why is this working?
|
||||
So if anyone listens to my podcast and does the Rockbox install from that, yell at me, not at
|
||||
the IRC channels that you guys are in. I mean, I wouldn't say yell at him. I mean, he's great for
|
||||
talking about Rockbox. I'm just saying a lot of times, you know, just consult the manual. Yeah,
|
||||
and I have to say that manual, the official manual is like really well written, and that's just how I,
|
||||
that's exactly, it got me through the installation pretty easily. So yeah, I was. I hope so. Yeah, yeah.
|
||||
It's a great product. Thanks for talking, and I encourage everyone to check it out. Where can they
|
||||
find it? They can find it at www.rockbox.org. If you have more, if you will have more questions about
|
||||
it, or wonder more precisely exactly what it does, there is a link on the front page to, I think it
|
||||
says something like what is Rockbox, which is a link to the Y Rockbox Wiki page. That'll detail
|
||||
some more of our features, that sort of thing. Also on the front page is a list of all the targets
|
||||
that we support, and keep in mind you're always free to come on Pass Rockbox on our free notes.
|
||||
Cool. All right. Thanks a lot, Austin. All right.
|
||||
Thank you for listening to Half Republic Radio. HPR is sponsored by tarot.net.
|
||||
So head on over to C-A-R-O dot-E-C for all of those of you.
|
||||
129
hpr_transcripts/hpr0060.txt
Normal file
129
hpr_transcripts/hpr0060.txt
Normal file
@@ -0,0 +1,129 @@
|
||||
Episode: 60
|
||||
Title: HPR0060: Claws Email client
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0060/hpr0060.mp3
|
||||
Transcribed: 2025-10-07 10:52:33
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
.
|
||||
Hello everybody and welcome to another episode of Hacker Public Radio.
|
||||
I am Deep Geek and I will be your host for this episode.
|
||||
This episode is a first for Hacker Public Radio
|
||||
as it is a sort of a new in-depth series on lightweight applications.
|
||||
But what makes this one a first is that it is going to be the first in-depth series
|
||||
which is open to all contributors to Hacker Public Radio.
|
||||
If you want your episode to be part of this series,
|
||||
just tell our administration when you submit your show.
|
||||
Why did I make the effort to find out we could do this with our software?
|
||||
Well, one of the things that fascinates me is the question,
|
||||
how can we make our box and go even faster?
|
||||
One solution is lightweight applications.
|
||||
Just like the risk architecture of computers goes faster
|
||||
because the processors do less so to can we choose our applications
|
||||
so that we use smaller, less functional apps that load faster
|
||||
and do their thing faster.
|
||||
What will make this series so interesting and what I hope happens
|
||||
is when others who like their box and to just be more zippy
|
||||
use this series to create a dialogue.
|
||||
It should become an interesting spin-in out already great practice
|
||||
of giving software reviews.
|
||||
So, lightweight applications.
|
||||
First off, it is a relative term.
|
||||
When I was on Windows and went from Internet Explorer to Opera,
|
||||
I was going to a lightweight alternative.
|
||||
Now that I am a Linux guy and I have a billion web browsers to choose from,
|
||||
I keep picking smaller and faster ones.
|
||||
Also, my favorite Linux, Debian, handles dependency packages
|
||||
in a very narrow way.
|
||||
So, if I leave Conqueror, which is KDE's web browser,
|
||||
because it depends on some Damon process that takes time to start
|
||||
and go to Firefox, it is a move to a more lightweight application.
|
||||
If I go from Firefox to Dillow, I can do this again.
|
||||
It's creating quite an odd effect for me.
|
||||
I find all the people around me talking about how much time the suspend feature
|
||||
and their computer saves them in boot time.
|
||||
And I just get confused because I just re-did my system again
|
||||
and I now boot in about 30 seconds.
|
||||
Of course, my tastes run a little spartan.
|
||||
And I don't expect all around me to adopt my extreme practice.
|
||||
But I would just love to hear of people doing similar things on their boxes.
|
||||
But I don't come here tonight to review web browsers.
|
||||
Tonight, it is email.
|
||||
Namely, the Silfeet clause email client.
|
||||
So, my first Linux email was K-mail.
|
||||
Because I never liked GNOME.
|
||||
I went there first.
|
||||
And it was great, rich, full-featured client.
|
||||
But it took forever to kick off.
|
||||
I felt like clicking on the K-mail icon took as long as turning on my system.
|
||||
The reason for this was that it has heavy dependencies within the KDE environment.
|
||||
So, I began researching email.
|
||||
I'm not sure if it was on Wikipedia that I read it.
|
||||
But I heard of this old odd email client called Silfeet
|
||||
that was stored in Japan by a group of computer people
|
||||
who did not appreciate HTMLized or as it is sometimes called enhanced email.
|
||||
So, I decided to try this.
|
||||
Turns out it was a great little client.
|
||||
It was a lot like using the old forte agent newsreader
|
||||
and email software in its layout and way of handling things.
|
||||
So, I immediately fell for it.
|
||||
But it was not agent.
|
||||
It was all about email.
|
||||
And as I got into it more, I found that it had some other great features that appeal to me.
|
||||
For one thing, it stores email in the Unish mail-der format.
|
||||
Well, K-mail uses mail-dears, which mail-dears.
|
||||
It's a shortening of the word mail and directories, mail-der.
|
||||
It was more of a KDE interpretation of mail-dears
|
||||
with their own special weird indexing of messages.
|
||||
Silfeet clause does put a few ad files in its mail-dears
|
||||
but you can also have the Unish program Prokmail
|
||||
directly add messages into its directories
|
||||
and it will handle it fine.
|
||||
I immediately wrote a white listing script for Prokmail.
|
||||
Now, when mail comes in, if Prokmail recognizes the from address,
|
||||
it puts the mail in my regular queue,
|
||||
which my window manages taskbar recognizes
|
||||
and I get a beep in an icon by the clock in my system tray.
|
||||
If it is unrecognized, it goes into a cell fuller called Suspect
|
||||
that I check much, much later.
|
||||
You may be able to dream of some cooler applications yourself.
|
||||
Also, in the basics of this program are, of course,
|
||||
an address book and a bunch of effective export and import functions,
|
||||
along with other things nobody would want to be without,
|
||||
like SSL support for email.
|
||||
But please don't think that this program is just this little basic email program
|
||||
with very few dependencies, because it isn't.
|
||||
It has plugins, so you can extend it to do just the functions you want.
|
||||
My first plugin was the themes plugin.
|
||||
There is nothing better for me than a little zippy application that looks great.
|
||||
Then I used the newsreader plugin.
|
||||
I didn't stay the course with that one, as it was not as well suited for binaries
|
||||
as it was for text-based news groups.
|
||||
The RSS feed aggregator is a favorite.
|
||||
I particularly like to get the doc-dropper articles as they are published
|
||||
right there with my emails.
|
||||
There are tons of other plugins too.
|
||||
To see them all, check out the clause-mail.org webpage.
|
||||
Here's a quick list of some of the highlights.
|
||||
HTML viewers for both Dillo and GTK HTML2, PDF viewers.
|
||||
Attachment detachers, Bayesian filtering, a pearl extension,
|
||||
so you can write your own filters in pearl.
|
||||
Synchronization would window CE devices,
|
||||
and an Outlook Evolution V Calendar plugin.
|
||||
So check it out.
|
||||
Perhaps you too will like it.
|
||||
Feedback is always welcome.
|
||||
You can email me at HPR at deepgeek.us.
|
||||
Today's GeekTidbit.
|
||||
Let's have a Geek Hiku from Jim Griffith.
|
||||
No keyboard present.
|
||||
Hit F1 to continue.
|
||||
Then engineering?
|
||||
Thank you.
|
||||
Have a great day.
|
||||
Thank you for listening to Hackers of the Gradio.
|
||||
HPR is sponsored by Carol.net.
|
||||
She'll head on over to C-A-R-O dot E-C for all of her students.
|
||||
Thanks for watching.
|
||||
Thanks for watching.
|
||||
266
hpr_transcripts/hpr0061.txt
Normal file
266
hpr_transcripts/hpr0061.txt
Normal file
@@ -0,0 +1,266 @@
|
||||
Episode: 61
|
||||
Title: HPR0061: Punk Computing
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0061/hpr0061.mp3
|
||||
Transcribed: 2025-10-07 10:53:32
|
||||
|
||||
---
|
||||
|
||||
All right, let's chill it up
|
||||
Welcome to Hacker Public Radio. This is Clat 2. I'm going to be your host for this episode.
|
||||
I wanted to talk a little bit about punks, anarchists, and computers.
|
||||
This is probably not going to be so much for the experienced Linux user as it is more for the punk and anarchist
|
||||
or someone who might lean toward that direction who is not familiar with Linux.
|
||||
This is not going to be an introduction to Linux, however.
|
||||
If you are a punk or an anarchist or you lean in that direction,
|
||||
you might have traditionally, if it were maybe 10 years ago,
|
||||
simply have escued computers entirely as part of the protest against, you know,
|
||||
whatever current society you're protesting.
|
||||
But now computers are pretty much everywhere, and they can actually help the punk cause
|
||||
the anarchist cause in the community quite a bit, just the way that they help every other community,
|
||||
you know, good communication, sort of coordinating the community together,
|
||||
being able to access one another, whether you're in a really small town in Idaho
|
||||
or whether you're in this huge, you know, Mexico city or Madrid.
|
||||
So computers are obviously important.
|
||||
Everyone's really going to be able to get a lot of benefit from them,
|
||||
and a lot of people are using computers running the typical windows,
|
||||
possibly the slightly less common OS 10,
|
||||
and a punk or anarchist kind of just using computers simply to talk to people
|
||||
across the world might be surprised to find out that the operating system,
|
||||
the environment of the actual computer that they're using,
|
||||
is part of a huge syndicate, a big racket basically in itself.
|
||||
And I know to a lot of people it seems like windows just kind of comes with the computer.
|
||||
You buy the computer or you get the computer from, you know, you inherit it from someone,
|
||||
but actually the system that you're using is a product,
|
||||
and it's a source of quite a lot of money, and it's got a huge,
|
||||
it's basically at the epicenter of a huge global economy.
|
||||
You can interpret that anyway you want, but if you're not supporting it,
|
||||
then you probably shouldn't be using it.
|
||||
And for a lot of time, you know, you kind of use it because you don't really realize
|
||||
that there's anything else out there, but actually there is something else out there
|
||||
that doesn't belong to anyone, and offers complete freedom,
|
||||
complete freedom from corporations,
|
||||
complete freedom from relying on anyone else really to support you,
|
||||
to get back to your data, should you need to recall your data in two years,
|
||||
have the formats changed, things like that.
|
||||
So this other solution obviously is Linux,
|
||||
and Linux is something that's easy to get into,
|
||||
and there's a lot of great podcasts on that very subject,
|
||||
and there's a lot of great stuff online about it,
|
||||
so I'm not going to go too deep into it right now.
|
||||
It's more of an, I guess, an economic argument that I have in terms of why you need to use Linux,
|
||||
rather than, for instance, stealing Windows or OS10.
|
||||
In the software world, it's practically legal, although it's not,
|
||||
but I mean, it's very well known that if you need a software package,
|
||||
there are places that you can find them, you know,
|
||||
you go to the wares of sites and you download,
|
||||
or you download LymeWire and start downloading whatever you need,
|
||||
and any punk or anarchist going to think that there's nothing wrong with that,
|
||||
and in fact that it's helping, that it hurts, for instance, Windows or Mac,
|
||||
or whoever you're getting the wares from,
|
||||
so that you don't have to buy that product from that company,
|
||||
you kind of in your mind, you think, well, at least I'm not paying for it,
|
||||
I'm stealing it, and in that way, I'm hurting the corporation,
|
||||
but in fact, of course you're not, and in order to understand why you're not,
|
||||
I mean, traditionally, if you go steal something from a big corporation,
|
||||
yes, they have to account for that loss,
|
||||
the money that they've lost from that sale,
|
||||
they have to kind of drum up somehow,
|
||||
with intellectual property and intangible goods,
|
||||
obviously, it doesn't quite work the same way.
|
||||
If everyone's stealing a product, you might think, well, surely,
|
||||
if no one's buying this, it's going to hurt the company eventually,
|
||||
but in fact, people using it is supporting the company.
|
||||
Let's imagine that I wanted to get you into a prison.
|
||||
Now, if I don't have the means, if I don't have the power,
|
||||
or the authority to come to your house,
|
||||
put you in handcuffs and drag you away forcibly and throw you in prison,
|
||||
what would be a good way for me to get you into a prison?
|
||||
You know what I would do is I would make this prison, I would build it,
|
||||
and I would put this really nice looking front on it.
|
||||
I would make it look really, really pretty.
|
||||
I would also possibly charge people to get in.
|
||||
I would like to make it basically a club, you know,
|
||||
and you can't get into the prison,
|
||||
but it's really, really cool to be in that prison.
|
||||
And in order to get to the prison, you have to know somebody,
|
||||
or you have to pay somebody.
|
||||
I would even put a guard out in front of that prison,
|
||||
so that people couldn't get in, even if they want to.
|
||||
Okay, so any good punk or anarchist,
|
||||
you're just going to follow the logic,
|
||||
or it's a knee jerk reaction, you're going to think,
|
||||
well, if they're not going to let me in,
|
||||
I'm going to get in anyway, and so you're going to sneak in.
|
||||
So maybe you'll find a back door, window,
|
||||
or you'll crawl over the wall, or whatever,
|
||||
and you get in, and you think in your mind
|
||||
that you've just gotten around like this evil corporation,
|
||||
and you've screwed them over, and you've gotten into the prison for free.
|
||||
But what you didn't realize is that that building was a prison,
|
||||
and now you're inside, and they're not going to let you out.
|
||||
And that's the way that the computer industry,
|
||||
the proprietary computer industry, functions.
|
||||
You might have stolen the operating system.
|
||||
You might have Windows XP that, you know,
|
||||
and you're circumventing whatever kind of verification,
|
||||
you know, kind of a check-in, and what do they call it,
|
||||
genuine advantage, or whatever.
|
||||
You know, you might have circumvented all of that stuff,
|
||||
but you're still using their product.
|
||||
And eventually, at some point, that product is going to,
|
||||
the fact that you're using that product,
|
||||
is it's tying you to that company.
|
||||
And this doesn't matter whether it's Windows, or OS10.
|
||||
Either of those two, you're using, or even Adobe,
|
||||
like if you're using Photoshop, things like that.
|
||||
You are now tied down to basically whatever that company decides.
|
||||
You're kind of at their mercy.
|
||||
And even hearing that, you might not really realize
|
||||
exactly what you're at their mercy for.
|
||||
Like, okay, so a big deal, you're making flyers in Photoshop,
|
||||
or you're recording your music in GarageBand,
|
||||
or Logic Pro, and you're releasing your albums,
|
||||
or you're coordinating things with Excel,
|
||||
and Outlook, and things like that, organizing protests,
|
||||
or whatever you're doing.
|
||||
Well, to understand how you're being tied to this company,
|
||||
again, you have to kind of stay with me
|
||||
with a little bit of an analogy.
|
||||
So you have to understand what these computer companies
|
||||
actually deal in in terms of currency.
|
||||
And one of the major, major currencies
|
||||
of the modern computer industry is information.
|
||||
And do you think about it?
|
||||
How do they get information from people?
|
||||
Like this whole business model of everything, pretty much,
|
||||
right now, is really geared toward getting people's information.
|
||||
And at first, it starts out with really innocuous,
|
||||
kind of boring information, your name,
|
||||
your address, your phone number, things like that,
|
||||
your age, your occupation, what company you work for,
|
||||
how many people are in the company?
|
||||
What your paycheck is?
|
||||
Are you a student?
|
||||
Do you rent or own the house?
|
||||
All that good stuff.
|
||||
So the really, the easiest stuff, your name,
|
||||
your address, your phone number, your birthday,
|
||||
is the stuff like that.
|
||||
Pretty much all the company has to do is offer like free email,
|
||||
and you'll go sign up, and you'll give them all your information
|
||||
without really thinking about it.
|
||||
And you might give them fake information,
|
||||
so the next step after that is sales.
|
||||
So you go on to a record store online,
|
||||
or you find a good album on eBay that you want to buy,
|
||||
or something like that.
|
||||
And in order to make that purchase, of course,
|
||||
you have to register for the site.
|
||||
And if you give them fake information,
|
||||
they won't let you purchase, because they're checking all these facts
|
||||
against whatever credit card or bank card or whatever you're using.
|
||||
And so it continues.
|
||||
And with proprietary OS operating systems,
|
||||
they even make you give their information to them
|
||||
just if you want to use the computer.
|
||||
So you buy this computer, or you inherit a computer from someone,
|
||||
and you go to install the software, or you turn it on,
|
||||
and if it's a fresh install of the operating system,
|
||||
it's asking you all kinds of information
|
||||
that there's just no reason a computer
|
||||
that you just want to do some typing on,
|
||||
or surfing the web on, should need to know all of this information
|
||||
about you, but you don't have a choice you have to put it in,
|
||||
so you enter it all in.
|
||||
And now who knows where that information has gone.
|
||||
Okay, so this is personal information about you.
|
||||
What about the information that you generate on your computer,
|
||||
and you're going to want to access later on.
|
||||
So if I've made a lot of, if I've written a lot of articles
|
||||
that I've written or something like that,
|
||||
if I've done that in a proprietary format like Microsoft Office,
|
||||
what guarantees that in two years,
|
||||
when there's a new version of Office,
|
||||
what guarantees that I'm going to be able to open that information back up
|
||||
and get to my, to the stuff that I've written?
|
||||
Well, honestly, nothing guarantees that.
|
||||
It's on the end user, it's on you as the computer user,
|
||||
to make sure that your data is being updated constantly
|
||||
into the latest formats that the company comes out with.
|
||||
And what does this force you into?
|
||||
Well, it forces you into making purchases,
|
||||
because now you have to purchase from them the latest and greatest version
|
||||
of whatever software you initially created your data in.
|
||||
So suddenly, everything that's important to you,
|
||||
whether it's photos, music that you've purchased from their online store,
|
||||
text documents that you've written, emails that you've received,
|
||||
all of this information that quite possibly could be really,
|
||||
really important to you, because so much of our lives now is on a computer.
|
||||
All of this stuff is basically subject now to whether you are going to come up with a cache
|
||||
to make sure that you are completely up to date.
|
||||
And, you know, it's a real pity if you've got so much data
|
||||
that you're not able to open up all those files in the latest version
|
||||
of whatever software package it is and make sure it is up to date.
|
||||
So if you skip a couple of versions,
|
||||
you could be screwed no matter what.
|
||||
And this is a real, real danger because it actually happens a lot more often
|
||||
than you might realize, especially in the non-techie world.
|
||||
If you're, if you're listening to this podcast, you're probably at least interested
|
||||
in technical things, things that go on in the computer.
|
||||
There's a lot of people who are not so technically inclined.
|
||||
And a lot of people don't get a new computer every two years,
|
||||
like a lot of techie people do.
|
||||
Whether they just inherit like something that someone thought was broken
|
||||
and they take it home and they tinker with it and they repair it
|
||||
or whether they actually go out and purchase the computer.
|
||||
But a lot of people don't update that often.
|
||||
And so when people bring data into someone such as myself who is technical
|
||||
and they say, well, this is from my old computer
|
||||
and I can't seem to open it in my new computer.
|
||||
I mean, a lot of times they've skipped so many versions of the software
|
||||
that they were using it, using to create that data
|
||||
and that there's really little or no chance
|
||||
that they're going to be able to get that data out of that format
|
||||
and into something that can actually read it.
|
||||
So it happens all the time.
|
||||
You have to really be careful with it if you're dealing with proprietary operating systems.
|
||||
Now on Linux, you don't have that problem because there's not the same culture
|
||||
in the delivery method of the new product.
|
||||
There's no motivation for Linux, which is a free environment.
|
||||
There's no motivation for them to come out with new versions of something
|
||||
that break everything else behind it
|
||||
or make it more complex for you to access your data
|
||||
so that you have to purchase the latest and greatest stuff all the time
|
||||
in order to stay up to date, kind of keeping up with the business.
|
||||
There's not really that kind of business side of things in Linux.
|
||||
It's just about your data, you having control over your data
|
||||
and not being subject to anyone or any company
|
||||
that is going to be providing you with these tools
|
||||
and that also has the alternate motive of making money off of all of that.
|
||||
To be free from all of these corporate schemes,
|
||||
you're just going to need a computer system that runs a user environment
|
||||
that belongs to you and belongs to no one and has no ulterior motive.
|
||||
And the name of that operating system, that environment, is Linux
|
||||
and you can find a lot of information about it online.
|
||||
There's Ubuntu.com, there's Fedora, Project.org.
|
||||
It offers you not only solidarity, but it also offers you the chance
|
||||
to be able to run software on older hardware.
|
||||
So if you are trying to be a computer user without supporting the market
|
||||
that just forces new product on people every, at least every six months,
|
||||
more often it's every two months.
|
||||
If you're trying to stay away from that, there are Linux distributions
|
||||
for things that are very, very old and that it runs fine on older hardware.
|
||||
So if you've got access to an older computer, Linux might very well be the way
|
||||
that you're able to use that computer at all, so give that a shot.
|
||||
And of course, Linux is the ultimate DIY project.
|
||||
Linux is for a community and it's by that same community.
|
||||
It is, it's very punk without even knowing, I think, that it's punk.
|
||||
So, and it's very anarchist without knowing it's anarchist.
|
||||
So if you go that way, Linux, you'll find that you'll fit right into the Linux community.
|
||||
This has been Hacker Public Radio.
|
||||
My name is Klatt too.
|
||||
Be sure to check back at hackerpublicradio.org for new episodes.
|
||||
Thank you for listening to Hacker Public Radio.
|
||||
HPR is sponsored by Carol.net.
|
||||
She'll head on over to C-A-R-O dot N-C for all of her team.
|
||||
Thank you.
|
||||
141
hpr_transcripts/hpr0062.txt
Normal file
141
hpr_transcripts/hpr0062.txt
Normal file
@@ -0,0 +1,141 @@
|
||||
Episode: 62
|
||||
Title: HPR0062: More than a wii bit of fun with the Wiimote
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0062/hpr0062.mp3
|
||||
Transcribed: 2025-10-07 10:53:56
|
||||
|
||||
---
|
||||
|
||||
Genoa, scandals are dead, sure they're possible hellbuss.
|
||||
I adult is much myself, with me.
|
||||
Die!
|
||||
Take them out!
|
||||
That looks like it's it.
|
||||
Oh, and Commander?
|
||||
Do bring in the comms unit.
|
||||
It's time for a broadcast.
|
||||
Today, on Hacker Public Radio, we'll learn how to have more than just a wee bit of fun with the Nintendo Wii most.
|
||||
Hey!
|
||||
I am Morgan, the low-tech mystic, and you?
|
||||
Well, you, my friends, would be listening to another fine episode of Hacker Public Radio.
|
||||
And today, we're going to be discussing the basics of connecting a Nintendo Wii most to a computer running Windows XP via Bluetooth.
|
||||
There's a lot of neat things that you can do with this.
|
||||
I've been really impressed with the level of things that you can do and the basic relatively ease.
|
||||
The only URL I'm going to give out in this episode of Hacker Public Radio is going to be Wheelie.org, which is where I've basically pulled a lot of my information.
|
||||
They've got a wonderful wiki running there that has a whole lot of information on how to get the stuff running.
|
||||
They also are doing something rather interesting.
|
||||
They are collecting donations for a, basically, I guess, a correct term would be a prof for the first person to be able to get Linux running on a Wii without voiding the warranty.
|
||||
Basically, that means not cracking it open and soldering on fancy mod chips and doing that.
|
||||
They're talking about getting a USB, hard drive, or external media bay, something like that, and booting off of that, or something creative like that.
|
||||
But that basically you're not cracking it open and obviously voiding the warranty.
|
||||
Right now, they've got $147, but I'd be interesting to see how far that goes and who gets it and nothing else.
|
||||
It's kind of neat. You can get some money for a Git Linux to run on a Wii, so definitely check that out.
|
||||
Right now, we're going to talk about Windows XP.
|
||||
Please reserve the throwing of Rothen vegetables until the end of the episode.
|
||||
Thank you.
|
||||
But if you want to go to hackerpublicradio.org, you can find a list of all the links and all the source code that we're going to be discussing in this episode.
|
||||
So you're not going to listen to me ramble on about URLs.
|
||||
You're just going to listen to me ramble.
|
||||
Excellent.
|
||||
So basically, if you have a computer, you have Windows XP, you have Bluetooth capability, whether natively or with a dongle, and you have a Nintendo Weemote, you are ready to world.
|
||||
The first thing you are going to need to do is you're going to need to go to hackerpublicradio.org, and you're going to need to go to this episode's show notes.
|
||||
And you are going to click on the links, and you are going to first go to the Wheelie Wiki, which is going to discuss getting the Weemote to work as a mouse in Windows XP.
|
||||
And basically, it's going to tell you to install a few programs.
|
||||
Basically, it recommends that you install Blue Soleil, which is a Bluetooth program that works very nicely on Windows from what I've used so far of it.
|
||||
I'm very glad that they recommended it.
|
||||
It's very nice and easy to get all your devices to work, and it's just rather impressive as far as how it scans and does other neat things.
|
||||
It kind of reminds me of Linux on the command line.
|
||||
So it's all that, but it was still kind of impressive to see on Windows XP nonetheless.
|
||||
And it makes everything easy to sync up your Weemote with the computer.
|
||||
Once you have used Blue Soleil's free program or wallet shareware, and then you can buy it or whatnot.
|
||||
But anyway, once you've used Blue Soleil's program to sync the Nintendo Weemote with your Windows XP computer, please reserve the throwing of vegetables until the end of the episode.
|
||||
Once you've got that all going, you're going to need to install a program, a program called Glove Pi.
|
||||
Pi stands for, I think it was program interface emulator.
|
||||
Basically, it's a program that was developed for mapping out keystrokes and things like that with virtual reality gloves.
|
||||
If you ever listened to any of my episodes of Ninja Night School Radio, there were a few episodes where I talked about ordering and getting a P5 data glove, which was this kind of little cheap, rinky dink virtual reality glove that I used this weird looking IR sensor stand to track the data and stuff like that.
|
||||
This little glove was really cheap, so I had fun playing with it.
|
||||
But this is a program that lets you write scripts and macros and a lot of neat things that you can do with the glove and stuff like that.
|
||||
Also, they have tweaked it and developed it to work with the Nintendo Weemote.
|
||||
And the very nice thing is that you follow the link in the show notes and you download the zip of Glove Pi 3.0.
|
||||
And once you unzip that folder, it's going to have your Glove Pi EXE and it's also going to have a text file that is documentation.
|
||||
And that is a wonderful file. It's got all the basic stuff you need to know for working with Glove Pi and what commands do what and basically how to get started.
|
||||
I'm not a coding expert, but the documentation was enough for an experienced coder as my an in experienced coder as myself.
|
||||
Sorry, excuse me. Please reserve of the vegetables until the end of the episode.
|
||||
Thank you. But I basically allowed a very inexperienced coder as myself to read through the documentation and it's fairly simple.
|
||||
Well, at least to me, it was how it was working and I guess because I'm working with robots right now.
|
||||
And that this that we moat basically is using a Cartesian coordinate mapping system, which basically means it has an x, y, and z coordinate grid system, much like a CNC machine and other such devices.
|
||||
Anyway, rambling, rambling, rambling. Please reserve the throwing of what vegetables and eggs until the end of this episode.
|
||||
So the next step once you have your remote sink to via Bluetooth, blue sole, however, and Glove Pi running is that you're going to copy the script that is beneath all the instructions there, which is the bare minimum basic instructions for getting the remote to work as a mouse.
|
||||
On your computer, which is really neat and the basic way this works is you're going to copy the text, the real code that is on the page there.
|
||||
And then you're going to paste that into Glove Pi and you're going to click and you're going to tilt, you're going to tilt the we moat up and down to move the mouse up and down and you're going to twist it side to side.
|
||||
So you're going to like turn it, you're going to roll the remote, the we moat, remote, whatever.
|
||||
You're going to roll that back.
|
||||
Roll that back, roll.
|
||||
You're going to roll that back home because it's so we moat back.
|
||||
Yeah, sometimes I just say bastard.
|
||||
Okay, so, but yeah, you move the we moat up and down to move the mouse up and down and you twist it or roll the we moat side to side.
|
||||
And instead of actually moving it side to get the mouse to move side to side.
|
||||
And it's for the most part, it probably needs a little bit of tweaking each we moat is a little bit different as far as how it's calibrated and how it's going to work with your computer.
|
||||
So you'll definitely need to go in and tweak with the code a little bit.
|
||||
And this is a fun time for somebody who's maybe never missed within the code to go in and maybe have a chance to learn some code.
|
||||
This is a very easy kind of system to go in and especially if you're kind of quote unquote reverse engineering.
|
||||
But if you're listening to Haggar Public Radio's and you know, this is a little bit of reverse engineering.
|
||||
You're going to have the code from the make the we moat work as a mouse and you can go in and what it does when you actually run it.
|
||||
It shows in the debug window, which will be at the top right hand corner of glove pie.
|
||||
Lovely. Please reserve the throwing of rotten fruit and vegetables plus eggs until the end of this episode.
|
||||
Thank you.
|
||||
But basically at the top right hand corner in the debug window of glove pie, it's going to show you the values for the XYZ of the we moat.
|
||||
So you can actually watch those values change as you swing the we mode around and kind of get an idea for you know what these values should be.
|
||||
And as you look to the code, if you spent just a little bit of time looking through the documentation, you can easily match up what's going on in the documentation.
|
||||
So you don't really need to be a code ninja or code master.
|
||||
You just be able to kind of be a matching ninja.
|
||||
Find what's going on in the mouse code there and basically match it up with the documentation in the glove pie folder.
|
||||
And basically, boom, you can, if you can match, then you can figure out what's going on there. And it's fairly simple.
|
||||
So if you want to calibrate your we mode, if it's a little bit off, for example, when I first ran my we mode as a mouse program, my we mode wanted to go to the top and to the left just a little bit, but it always just slammed up to the top of the window.
|
||||
So basically I had to calibrate and what I did to calibrate is I laid it flat on its belly with the the A button facing up straight in the air.
|
||||
I guess that's obvious if you have a we mode.
|
||||
But anyway, what you're, but what you're going to do is you're going to see once you run the program with the we mode laying on this belly, you're going to see the debug values for the XYZ coordinates.
|
||||
And you can use that going into the code to set that as your basically a reference point in robotics, we would call it your home point.
|
||||
So, but basically this is your starting point from where the we mode is going to be.
|
||||
So if you were say naturally going to be holding the we mode at a say 90 degree angle, then you would want to say how you're holding the we mode naturally as your home point or as your starting point for where you're using as the calibration.
|
||||
But if you want to lay it flat on its belly or however you're going to be holding that's how you want to calibrate this little monkey and then what you've got that going it's it's kind of neat.
|
||||
You can play around with the values the the twist or will the role and the different values and see how that changes the speed and right there.
|
||||
Hey, you just got a little coding experience and if you're coding mentioned, then it will be really easy to jump in this and tweak around and have a little bit fun with.
|
||||
And speaking of having a little bit of fun, the neatest thing that I found so I actually got this working actually got this working today at school.
|
||||
I have a two hour break in between classes at college and so I spent that time today working on the we mode and there is a script.
|
||||
There'll be a link to the show notes. It is the the we saver.
|
||||
And basically what this does is it maps out the keys on the we mode to play a sound effects through the computer speakers of a lightsaber and it reacts to you swing it around and it's really neat.
|
||||
And if you listen to the beginning of this episode and basically what you heard there was me tweaking out having fun with my we mode basically what I did is I brought the laptop out into the car and I hooked the headphone jack up to the stereo and I turned down the internal mic on the laptop down really low.
|
||||
And it turned stereo up really loud and I swung the we mode around the we saberscript running and screened and had a good time and made a neat little intro and basically that's how that worked.
|
||||
But basically if you follow the link in the show notes, all you need to do is copy and paste to that code and boom.
|
||||
You are actually I tell you what I'm going to do. I'm going to go ahead and just say the top PI or whatever the the glove program is or the glove pie program.
|
||||
And you can just download that file and check that out and you'll really like it. It also comes with a sound package that is actually you know how you're generating sound effects from the lightsaber and all that.
|
||||
So you'll need to install that into the basically it'll be a zip file and you'll need to unzip that and put it in the we mode scripts directory and make sure that in your code it matches up with where you have the folder directed.
|
||||
And as long as you have the we sabers script saved in the we mode folder and then you have the lightsaber sound effects saved in the we mode scripts holder, you should be OK.
|
||||
And basically once you have that unzipped and you run the program, you press for the trigger button and that's going to turn on your lightsaber and you can swing it around and you'll have cool swooshing motions.
|
||||
And you can hold down the trigger and it makes the sound effect of lightsabers clashing upon lightsabers or another effect. And then if you hold down the down button on the D pad while you swing it around, it makes the sound effect of at least in my mind reflecting lasers from the lightsaber like they would do.
|
||||
So it's basically a lot of fun. The A button is what quits the program or it doesn't quit the program, but it closes or quote unquote closes the lightsaber.
|
||||
However, you want to say that, but the sound effects and everything is just really fun. And like I said, I was missing with this today call it in my break in between classes and I was sitting in the break room and I got it working while I was sitting in the break room and I started swinging it around before I looked up from being hunched over my laptop.
|
||||
And after I had swung it around and made lots of noise as a lightsaber and the weamote I looked up and the break room was apparently full because it was break in between the classes and so everybody was staring at me because I'm making lightsaber noises and waving around the weamote.
|
||||
For the most part, everybody was pretty cool. Nobody like through rotten fruit vegetables or rotten eggs in my general direction. So a general victory is considered in such situations.
|
||||
But yeah, it was pretty cool. I had a couple guys from the electronics and the graphics program that came over and like, you know, we're like, hey, dude, what the hell are you going on?
|
||||
And so, you know, I showed them my setup and let them play around with the weamote and swing it around and, you know, the weasever and all that good fun. So it was really cool.
|
||||
And I'll have to say this is just a really fun, anything to get set up and it's not really super awesome as far as and it's going to change your life.
|
||||
But it's something that's really easy to do and it's really fun that just makes you smile and it's something that doesn't take very long to set up.
|
||||
That you can, you know, take your laptop over to your buddies with your weamote and be like, hey, dude, check this out.
|
||||
You know, and it's guaranteed smiles and it's just really neat and it's also a perfect example of in my mind what hacking really is.
|
||||
Hacking isn't about stealing credit cards or hurting individuals or taking advantage of people.
|
||||
It's about doing creative things. It's almost like an artist but with technology. So it's got a different twist. And in a way, it's much like what we're doing with the weamote in this episode.
|
||||
And we're taking a device that's made to be a video game controller and we're making it into a computer mouse and into a lightsaber and basically doing things that it's not designed to do.
|
||||
And that's really neat. And in my mind, that's a whole lot that just emphasizes and has the hacker spirit.
|
||||
So that's why I decided to share this with you today. So I hope you guys have enjoyed this episode of hacker public radio.
|
||||
I hope if you guys have a weamote, you check this out. And if you don't think about it, you know, a Bluetooth thongle, you know, maybe 40 bucks.
|
||||
Weamote, I got my news. I think I paid 30 bucks for it and it came with a nice little rubber grip. So when I smack people with it, it doesn't damage my weamote.
|
||||
So that way I can still bust people around with it. And it doesn't hurt my weamote because I don't want to smack somebody outside the head and then have to go by a new weamote, you know, you need usability.
|
||||
I need to be able to smack multiple people. And in case the zombie invasion ever happens, it'd be really cool to run around my laptop for however long the battery lives and smack zombies on the head lightsaber style.
|
||||
But anyway, I think it's about time. So those of you in the listening lines that may have collected rotten fruit vegetables and or eggs, you may feel free to already your ammunition.
|
||||
Once again, thanks for listening. You guys out there, think about it. It's maybe say max 70 80 dollar investment. If you don't have if you don't have a Bluetooth or a weamote, assuming you have a computer when those XP, it's really easy to set up and going.
|
||||
And it's just really fun to show off and it's it's really fun to see the reaction from people when you know you set down with your computer and whip out the weamote and then all of a sudden it's making lightsaber sound effects and you're zip it around.
|
||||
And it's really neat and it's really fun. So nevertheless, I'm going to end this up. Thanks for listening and you guys have a great day and tune in tomorrow for another excellent episode.
|
||||
Of Hacker Public Radio.
|
||||
You
|
||||
You
|
||||
58
hpr_transcripts/hpr0063.txt
Normal file
58
hpr_transcripts/hpr0063.txt
Normal file
@@ -0,0 +1,58 @@
|
||||
Episode: 63
|
||||
Title: HPR0063: WebCalendar
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0063/hpr0063.mp3
|
||||
Transcribed: 2025-10-07 10:54:00
|
||||
|
||||
---
|
||||
|
||||
minutes.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
Welcome to another episode of HPR. I am your host Enigma, and today I'll be talking about
|
||||
Web Calendar. Web Calendar is a PHP-based calendar application that can be configured as a single
|
||||
user calendar, a multi-user calendar, or an event calendar that is viewable by visitors.
|
||||
Web Calendar has a ODBC backend that stores all of the events users in a database. You
|
||||
can set it up to use MySQL, PostgresSQL, Oracle DB2, Interbase, MSSQL Server, or pretty much
|
||||
any other ODBC compliant database. Web Calendar has multi-lingual support. It supports up to
|
||||
30 languages which are on its site. I'll have a link to its site in the show notes. The calendar
|
||||
server can be viewed with any I calendar compliant calendar application, such as Mozilla Sunbird,
|
||||
Apple ICal, or Nome Evolution, or any RSS-enabled application like Firefox, Thunderbird, RSSL,
|
||||
FeedDemon, or Blog Express. It has built-in RSS feeds, which I am currently playing with on our
|
||||
hacker events.org that's powered by Web Calendar. That's the site that I have the most
|
||||
experience with this application, and if you go check that out, you'll see the practical
|
||||
application for this package. The one thing that I don't like about this app is that the
|
||||
style sheets aren't the most pretty. Let's put it that way. I'm still playing with it. I don't
|
||||
like the style sheets that are available, and I can't find any skins for it. If anyone's good
|
||||
in CSS, please email me. I've got a few projects that I just don't have the artistic talent for,
|
||||
and could use some guidance. Some features that I do like, it has you can view the calendars
|
||||
basically their day, week, month, or year, just like any other calendar application. Really nothing
|
||||
special there. You can view others calendars. You can view someone else's calendar on top of
|
||||
your calendar, so you can compare events. You can add edit and delete users, add edit and delete
|
||||
events. Repeat events like, for example, we have our bin rev meetings scheduled every third
|
||||
Friday of every month. We have, and you can put in a description, the website and just a little
|
||||
description of what the event is. You have a configurable custom event fields, user configurable
|
||||
preferences for colors. You also have a default color scheme that I've been playing with. You can check for
|
||||
scheduling conflicts like Outlook does with its calendar. You have email notifications for new updated
|
||||
deleted events. You have RSS for update and new updated and deleted events and also unapproved events. If
|
||||
you have a calendar that supports anonymous adding of events, you can import events from I calendar,
|
||||
V calendar, or Palm. You have an optional general access, which is no login required to allow
|
||||
calendar to be viewed with people without a login, like hacker events has, so anybody can view the
|
||||
calendar. Also, you can publish free busy schedules to all users, kind of like Outlook does. The RSS
|
||||
supports that puts a user's calendar into RSS. Again, I haven't played with the RSS feeds enough
|
||||
yet to know how well they work. I have a test site that I'm playing with at the moment before I
|
||||
actually drag it over to hacker events. You can subscribe to remote calendars, hosted elsewhere,
|
||||
and then either on I calendar or each calendar formats, and then the user authentication is web-based
|
||||
HTTP, LDAP, or NIS. A nice part of the package is it has an add-on that has a capture in it. Back in
|
||||
late last year, we were having a lot of trouble with a spam on the site who gets, I had like 15,000
|
||||
spam messages within a month or two. It was just absolutely insane. You can also implement a
|
||||
capture on the site that will limit your spam. Also, one thing I don't like about the site is there
|
||||
is no select all for the unapproved events. Basically, you have to delete them one by one or go
|
||||
and go behind the scenes and go into the database and delete them out of the database table, which is what we
|
||||
ended up doing. If anyone has any questions, comments about this package, please email me. Again,
|
||||
if anyone has any experience with CSS and wants to help out on a couple projects, please email me. Also,
|
||||
if anyone wants to do a show or be a part of this hacker-public radio thing, we've got going on,
|
||||
email me at admin at hacker-publicradio.org. We will set you up with whatever you need to make that
|
||||
happen, as well as give you some show ideas, things like that. That's it for today. I'm
|
||||
Enigma again and have a nice day.
|
||||
20
hpr_transcripts/hpr0064.txt
Normal file
20
hpr_transcripts/hpr0064.txt
Normal file
@@ -0,0 +1,20 @@
|
||||
Episode: 64
|
||||
Title: HPR0064: Tech Music: Payphone under Streetlight
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0064/hpr0064.mp3
|
||||
Transcribed: 2025-10-07 10:54:03
|
||||
|
||||
---
|
||||
|
||||
Uhm...
|
||||
Thank you for using a Verizon Payphone.
|
||||
Please contact our switchboard.
|
||||
Please contact our switchboard.
|
||||
Please contact our switchboard.
|
||||
Please contact our switchboard.
|
||||
Please contact our switchboard.
|
||||
Please contact our switchboard.
|
||||
Please contact our switchboard.
|
||||
Please contact our switchboard.
|
||||
Please contact our switchboard.
|
||||
Please contact our switchboard.
|
||||
Please contact our switchboard.
|
||||
143
hpr_transcripts/hpr0065.txt
Normal file
143
hpr_transcripts/hpr0065.txt
Normal file
@@ -0,0 +1,143 @@
|
||||
Episode: 65
|
||||
Title: HPR0065: Cowon iAudio U3 review
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0065/hpr0065.mp3
|
||||
Transcribed: 2025-10-07 10:55:08
|
||||
|
||||
---
|
||||
|
||||
Music
|
||||
Hello and welcome to Hacker Public Radio at episode 65.
|
||||
My name is Dave and I normally do my podcast recording on my way home from work in my
|
||||
car.
|
||||
But tonight, or I should say this morning, as it is 107 am, I am in my house and I am in
|
||||
a room that has one, two, three, seven, eight, and ten computers in it.
|
||||
And each one of these computers is running some variant of Linux or Unix.
|
||||
But the device that I want to talk about tonight, the one I hold in my hand, does not run Linux.
|
||||
I want to talk about the Cowan U3.
|
||||
This, I think, still is the smallest personal video player you can buy.
|
||||
It's a Cowan audio U3 and I love this device.
|
||||
I love it so much.
|
||||
I bought a second one so I now have two just in case the first one breaks.
|
||||
I've had the first one for at least a couple of years now.
|
||||
And it is a quote unquote to use the improper term, an MP3 player.
|
||||
It's much more than that as it plays more than just MP3s.
|
||||
It plays videos.
|
||||
It's a picture viewer.
|
||||
It does the standard things that these small MP3 devices do.
|
||||
It has an amazing sound quality.
|
||||
I'm not an audio file, so if I were to read to you the specs, the audio specs, there
|
||||
would be meaningless to me, but you can go to cowanamerica.com products, cowanamerica.com
|
||||
slash product, slash audio slash U3 to find out more about this device.
|
||||
They're relatively inexpensive.
|
||||
You can get one for, depends on where you look, maybe $120 to $180.
|
||||
Maybe they come in, I think one gig and four gig, there may be a two gig model.
|
||||
But it's about the size if you look at your smallest finger and your ring finger.
|
||||
It's a little bit less wide than those two fingers are side by side, and it's about
|
||||
as tall as my ring finger.
|
||||
So you've seen this form factor before in some other devices, and it's got a joystick
|
||||
or a toggle on the front and a small screen, not sure the size of the screen, I'll talk
|
||||
in my head.
|
||||
But this thing gets about 20 hours of battery life.
|
||||
It gets the video screen, you can cover it with your thumb, it's small, but I have
|
||||
watched 96 episodes of Justice League Unlimited, Sean of the Dead and Napoleon Dynamite, I think
|
||||
of the movies I've watched on this thing.
|
||||
The 96 episodes of Justice League Unlimited were quite enjoyable.
|
||||
Even though the screen is small, if you're holding it in your hand, it's quite viewable.
|
||||
I don't think it's a full 30 frames per second or anything like that, it's probably half
|
||||
of that, but it is quite viewable.
|
||||
I don't use this device for video except if I'm on a plane or something, but the main thing
|
||||
I use this device for is to record.
|
||||
I record my podcast on our audio U3, and before that I use the iRiver T30, I think, but
|
||||
what I really like about the audio other than the fact that it plays MP3s, WMAs, ASAF,
|
||||
waves, hogs, and flags, and other than the fact that it works as a USB-Mass storage device
|
||||
and Linux.
|
||||
The thing I like most about it is that I can record on it with a non-powered microphone
|
||||
and I can hear myself, so I can monitor the volumes or the volume of my voice.
|
||||
I can hear myself with the iRiver T30 that's something I couldn't do.
|
||||
I would just have to listen to myself talk, not through the headphones, and I really had
|
||||
no way of determining if I was clipping or anything like that.
|
||||
With the audio though, and I don't know about the other devices, I know some people that
|
||||
have about other models of our audio's, and they've tested them out and tried to record
|
||||
with a non-powered microphone without much success, but like I said, I have two of them,
|
||||
and I can stick in just a regular old computer headset and it is thing, and I can record
|
||||
my voice with a non-powered microphone, so I guess that means it's got a preamp in
|
||||
it, even though according to their website, you should not be able to do this, I can,
|
||||
and I've upgraded the firmware probably four or five times, and I'm not lost this functionality.
|
||||
I guess that's one of the drawbacks is unlike some of the more recent models of our audio
|
||||
players, this does require Windows to upgrade the firmware, so I have to use my work laptop,
|
||||
it's an XP laptop to do that with, I thought at one time these things had been discontinued,
|
||||
but I don't think that's the case, because I mean, there's still a whole page dedicated
|
||||
to this player at Calon America, and I'm sure Calon Global too.
|
||||
But it works well with Linux, it works well with Mac OSX, I would imagine, and it works
|
||||
well with Windows, I'm sure, but this is the device for me, I've owned, like I said,
|
||||
two of them, I couldn't do my podcast and my call without it, I can use a powered
|
||||
microphone, I've recorded the Upstate Carolina Linux users group podcast using a powered
|
||||
conference room microphone, I have run a microphone through a mixer board to this, I have run
|
||||
just a non-powered microphone to this, and through it all I've been able to monitor what
|
||||
is being recorded with headphones, so it's really great, I'm even able to using a device
|
||||
about it, Radio Shack, that strange enough has no identifying part number on it, so
|
||||
whatever, if you go to RadioShack.com and just search for a cell phone recorder or mobile
|
||||
phone recorder, you'll see it, but it is a device that you plug your cell phone into,
|
||||
and the other end you plug into your recorder, and on that side I've recorded cell phone
|
||||
conversations I've recorded, audio with a non-powered microphone, I've recorded audio,
|
||||
a powered microphone, and I've recorded audio with the line in, I guess the other drawback
|
||||
to this is that it records 128 kilobits per second, which is, I guess, CD quality, which
|
||||
is fine for a podcast, but it records in WMA, which is not a problem for me because you
|
||||
can easily convert that in Linux from the command line or several other graphical tools,
|
||||
but that's a little bit of a pain, I keep hoping with every firmware release or upgrade
|
||||
that they'll add, you know, functionality recording, I'll get a play, I'll get a play
|
||||
flack, I'll get a play wave, I'll do all these codecs or file formats, so to play them
|
||||
just fine, but you can only record in WMA, which is just a little bit of a hassle, but
|
||||
I only, I guess it's a fourth generation iPod I've had for a long time, and I put rockbox
|
||||
on it a couple of years ago, and have not looked back, I really only use it for long
|
||||
trips, listening to music, but this is one device that I've, I see no need whatsoever
|
||||
to replace the firmware, I really enjoy the firmware, I guess the user interface, especially
|
||||
like I was hesitant when I first got it about this toggle switch, you've seen these
|
||||
joystick-like buttons that stick up off these players sometimes, but it's got an audible
|
||||
click when you navigate with it, you know, you can go up, down, right, left, and you can
|
||||
press down on the button, and it's got a lot of button of course, but what that toggle
|
||||
switch really allows you to do is operate this thing in your pocket, I mean it's just
|
||||
really small, and you don't have to see the interface, you just got, I guess, tactile
|
||||
feel, you can feel it, and you can hear it, so in the dark you can navigate through
|
||||
the folders that contain your music, it's just, it's got everything I need, and it's got
|
||||
themes, it's customizable, I guess, graphically, but there's really nothing about this I don't
|
||||
like, it's got an FM player, if you can record, I've already mentioned a line-in or voice,
|
||||
there's a, there's a, in the settings under recording, you can select that you want to record
|
||||
using an external mic, which is what I do for my podcast, there's a voice activate feature,
|
||||
so it will only record when it hears a voice, there's a feature called AutoSync that I'm
|
||||
not real sure of, what that's about, but you can record the line-in volume and microphone
|
||||
volume, you can record the bit rate of which you record FM radio, because it's got FM
|
||||
radio built into it, you can control the bit rate that you record, voice-at, and line-in
|
||||
at, it's just, it's just really nice, I mean I've got the Debbie and Swirl on it, it's
|
||||
my, my default wallpaper, it comes with a graphical equalizer, and like I said, I'm
|
||||
not an audiophile, a bunch, a bunch of other stuff, whatever, BVE is, mock three bass,
|
||||
MP and hands, 3D surround sound, pan, for whatever reason you'd want to have the audio
|
||||
move from your left to your, left speaker to right speaker, repeatedly that's there, with
|
||||
some recordings, I imagine this has to do with either being a variable bit rate or constant
|
||||
bit rate, I'm not sure, but you can adjust the play speed, so you can speed up the speed
|
||||
that the audio plays back, so if you're in a hurry or if you have a lot of podcasts
|
||||
to listen to or whatever, this, this thing's really nice, it's really inexpensive, when
|
||||
I bought the second one, I was in the market to replace, I'm not replaced, but to buy
|
||||
back up and case my first audio died on me, because that's what I recorded a podcast with,
|
||||
and that, that model's only a one gig, and I was thinking, and I'm having to do, I listed
|
||||
a lot of podcasting, one gig just wasn't cutting it, so I was in a market to buy another
|
||||
device, and I looked around at a lot of them, but I, I knew I'd been able to get another
|
||||
audio, and I looked at, I guess the, it's at the D2 and the, the A7, and I forget some
|
||||
of the models that I looked at, you know, bigger, better, newer, supposedly, but I came back
|
||||
to the U3, mainly because I know it does the line-in recording, it does the, the external
|
||||
microphone recording, it's the form factor I like, it's the, the, the toggle is nice and
|
||||
sturdy, and allows for blind operation, and I said, the only drawbacks that I can think
|
||||
of, and I've owned these for about two years now, is it requires Windows to do the firmware
|
||||
upgrades, and it records in WMA, but other than that, I am very happy with the U3, this
|
||||
is the best portable audio device I've ever owned, if one of these breaks I'll buy a third
|
||||
thing, I guess, if there's a third thing that I would list as bad as I, as I've dropped
|
||||
the first one that I own, I've dropped it several times, but the last time I dropped
|
||||
it, the whole switch that, that locks the, the buttons, so you won't inadvertently press
|
||||
one of them, it broke, I mean, it's still, it's still on the machine, it didn't break
|
||||
off, but I guess the plastic tab inside the case no longer functions with that last drop.
|
||||
Anyway, I, I, I feel I'm beginning to ramble, and it's, it's very late, so that's my review
|
||||
of the audio U3, if you're in the market for a, an audio device to listen to podcast
|
||||
two, to record a podcast own, or even to watch video, you owe it to yourself to check
|
||||
out the audio U3, all right, until tomorrow, this has been Hacker Public Radio.
|
||||
Thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you, thank you
|
||||
. . . . . . . . . .
|
||||
235
hpr_transcripts/hpr0066.txt
Normal file
235
hpr_transcripts/hpr0066.txt
Normal file
@@ -0,0 +1,235 @@
|
||||
Episode: 66
|
||||
Title: HPR0066: April Fools Day Traditions
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0066/hpr0066.mp3
|
||||
Transcribed: 2025-10-07 10:57:21
|
||||
|
||||
---
|
||||
|
||||
Thanks for watching.
|
||||
Yeah, you're right on the edge of the ceiling until it's not like that, but it's very
|
||||
memorable.
|
||||
Yeah, getting a boy there to overcome a few rules, most of us, because most of us even
|
||||
don't know what we did there, it's just how many we felt.
|
||||
Yeah, and that's why I used to say the kids, who, for me, they don't get fuzz, it's how
|
||||
to be nice and small, but see them side to get messing it out, so I hope you even
|
||||
know what it was.
|
||||
Well, he's good, he was high, and in less serious, nearer, he's a little bit less
|
||||
serious, nearer, he's a little bit less serious, nearer, he's a little bit less serious,
|
||||
nearer, he's a little bit less serious, nearer, he's a little bit less serious, nearer,
|
||||
he's a little bit less serious, nearer, he's a little bit less serious, nearer, he's
|
||||
a little bit less serious, nearer, he's a little bit less serious, nearer, he's a little
|
||||
bit less serious, nearer, he's a little bit less serious, nearer, he's a little bit less
|
||||
serious, nearer, he's a little bit less serious, nearer, he's a little bit less serious,
|
||||
nearer, he's a little bit less serious, nearer, he's a little bit less serious, nearer,
|
||||
he's a little bit less serious, nearer, he's a little bit less serious, nearer, he's a little bit less serious, nearer, he's a little bit less serious, nearer, he's a little bit less serious, nearer, he's a little bit less serious, nearer, he's a little bit less serious, nearer, he's a little bit less serious, nearer, he's a little bit less serious, nearer, he's a little bit less serious, nearer, he's a little bit less serious, nearer, he's a little bit less serious, nearer, he's a little bit less serious, nearer, he's a little bit less serious, nearer, he's a little bit less serious, nearer, he's a little bit less serious, nearer, he's a little bit less serious, nearer, he's a little bit less serious, nearer, he's a little bit less serious, nearer, he's a little bit less serious, nearer, he
|
||||
s a little bit less serious, nearer, he's an idiot, he's an idiot, he's an idiot, he's an idiot, he's an idiot, he's an idiot, he's an idiot, he's an idiot, he's an idiot, he's an idiot, he's an idiot, he's an idiot, he's an idiot, he's an idiot, he's an idiot, he's an idiot, he's an idiot, he's an idiot, he's an idiot, he's an idiot, he's an idiot
|
||||
But now what you do now, and I send you a message from
|
||||
but I'll stop asking you all the time.
|
||||
You'll get on time, bro.
|
||||
You'll see your progress, but some of the salary,
|
||||
but I can't see any dealer who's selling it.
|
||||
So now it's not so obvious.
|
||||
I mean, it's just not up.
|
||||
He'll in fact be doing that, you know,
|
||||
because you're either there is not somebody up here
|
||||
for us, but you know, it's kind of dirty.
|
||||
It's not a lot of fun.
|
||||
It's just like, it's just not,
|
||||
that all of us are hot at the outside.
|
||||
So there's come on.
|
||||
You're not getting it, you're getting it, you're getting it.
|
||||
Plus hot.
|
||||
Yeah, it's just never enough.
|
||||
It's just okay.
|
||||
It's too much.
|
||||
Yeah.
|
||||
For the day, as well.
|
||||
For the day that she was going to be us.
|
||||
I know you're from that time.
|
||||
I better get her first.
|
||||
Okay.
|
||||
Let's do it.
|
||||
It's a little right now.
|
||||
It's just the end of the day.
|
||||
But I can't begin to find a little bit.
|
||||
It looks hard.
|
||||
Right.
|
||||
You know, for the email now,
|
||||
almost you are.
|
||||
And we're doing it all.
|
||||
It's almost open.
|
||||
And she's like, it's very good.
|
||||
Not great.
|
||||
You're a little scared.
|
||||
We'll rest now.
|
||||
Rest now from the set.
|
||||
Sooner or two.
|
||||
In five years,
|
||||
now it's really still an
|
||||
ambitious and a map of what ever we have moisture.
|
||||
And
|
||||
what will go through it?
|
||||
Oh, yeah.
|
||||
I struct,
|
||||
Yeah.
|
||||
I make a little
|
||||
shower here.
|
||||
Said you know we still went out.
|
||||
Right here.
|
||||
You know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you
|
||||
know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know, you know,
|
||||
Now I'll say that is our next service and to you an url red trophy.
|
||||
And I am a semi-cam right now.
|
||||
If you won't come to see us anymore,
|
||||
there's a nation of war on the ground.
|
||||
There's half an earth man per verse.
|
||||
And to you, yeah.
|
||||
There you, there you, there you go.
|
||||
And to you, yeah, you bugger.
|
||||
And all of them sucks in the blood.
|
||||
And the sucks in the blood.
|
||||
And the sucks in the blood.
|
||||
And the sucks in the blood.
|
||||
And the sucks in the blood.
|
||||
And the sucks in the blood.
|
||||
And the sucks in the blood.
|
||||
And the sucks in the blood.
|
||||
And the sucks in the blood.
|
||||
And the sucks in the blood.
|
||||
And the sucks in the blood.
|
||||
And the sucks in the blood.
|
||||
And the sucks in the blood.
|
||||
And the sucks in the blood.
|
||||
And the sucks in the blood.
|
||||
And the sucks in the blood.
|
||||
And the sucks in the blood.
|
||||
And the sucks.
|
||||
And the sucks in the blood.
|
||||
And the sucks me a lot.
|
||||
And the suck in the blood.
|
||||
And then.
|
||||
And the suck in the blood.
|
||||
And then.
|
||||
And the suck in the blood.
|
||||
And stolen from me.
|
||||
And the suck in the blood.
|
||||
And stolen from me.
|
||||
And stolen with me.
|
||||
And stolen.
|
||||
And stolen with me.
|
||||
or understand that they get a, yeah, and then why do you
|
||||
serve for this?
|
||||
It's not really a recent question,
|
||||
and besides, I've been up to, uh,
|
||||
serve us in this, I got 10, I got to us.
|
||||
Well, I was at zero, it's a gift.
|
||||
My, maybe it'll be, oh, I look like I've got
|
||||
wasn't either a, or a snack, or that gift,
|
||||
and it'll, say, if, now, real or not,
|
||||
well, it was an easy game, but still, uh,
|
||||
first, I mean, it's gonna, uh,
|
||||
an easy game, Brazil, my,
|
||||
an easy game, now, so, I'll serve for no one,
|
||||
well, it was an easy game, or a bunch of them,
|
||||
an easy game, or希望, and the weeks.
|
||||
They don't, uh, they, uh, stuff, maybe if,
|
||||
you look at them, hi, not much.
|
||||
Yeah, yeah, I mean, it's the whole, n$%
|
||||
and, syrup, or it has to be a certificate,
|
||||
no threat, but we, uh, we started
|
||||
by outside the eye peeled, making the third
|
||||
old citizen realize howuting,
|
||||
how devastating, huh?
|
||||
You'll, you'll see, its, uh,
|
||||
Smash?
|
||||
Weird, you'll see, as,
|
||||
I'm outside a girl.
|
||||
I mean, truckboat?
|
||||
So I thought,
|
||||
her portfolio,yeah, her, yeah.
|
||||
And this, and there was sort of,
|
||||
unique border, where we was.
|
||||
I, written, they, with stretchers.
|
||||
And they gave pauses.
|
||||
here or soon that was till all I did, well for better year right now,
|
||||
unless you have zero yet further enough.
|
||||
Oh, isn't it?
|
||||
nightlight,
|
||||
night?
|
||||
Good night how are you?
|
||||
I was going to steal a ride to see if he's a girl.
|
||||
I guess we were going to take a negative note of,
|
||||
a girl from Nippon at the end of the world and whatnot.
|
||||
So yeah, what's near is getting in there.
|
||||
Girl, what happened?
|
||||
It is, did a girl for a flight every CV.
|
||||
But this night, I walked you scantily,
|
||||
and they'll say the hours, and they'll say to me,
|
||||
a little bit before I said anything going on.
|
||||
So yeah, what's the news?
|
||||
Yeah, I was afraid they'd pray,
|
||||
and they'd much do hope you survive a little bit.
|
||||
And that's me, an ill好 I'm so your blood.
|
||||
And there was me.
|
||||
And I had a washingole town.
|
||||
So I guess relatives had no other time.
|
||||
And I had a washingole town and I just guess her,
|
||||
if I heard you see all this stuff in the room,
|
||||
you tell me what's جdriening you in your blood.
|
||||
And they want to see this sinew.
|
||||
Now her ability is now high,
|
||||
everything goes healthy and that thatתل conceived a witch.
|
||||
That you know what?
|
||||
It feels impossible to feel the same way.
|
||||
But, yeah, didn't man want a while?
|
||||
Was it a beep get dinner?
|
||||
So yes, and I just got it.
|
||||
I'm crossing our streets yet so we'll check that out.
|
||||
So, send it all back.
|
||||
It's the light.
|
||||
You just don't tell me.
|
||||
Oh, you're so good.
|
||||
I know.
|
||||
Look at this.
|
||||
It's not too late.
|
||||
We're crossing it.
|
||||
I know, I'm sure.
|
||||
Well, I don't see your mother.
|
||||
So, girl, you just can't hear me.
|
||||
You know, I was kind of close.
|
||||
We're being locked in.
|
||||
We're going to be better.
|
||||
We're going to live now funny.
|
||||
And that almost has a year.
|
||||
I said it.
|
||||
In the past, it's over.
|
||||
I'm going to stay.
|
||||
I lost my child by 10 when they left.
|
||||
And when I found my child.
|
||||
So my wife got attacked.
|
||||
They cried, andI fell asleep.
|
||||
I too was exposed to.
|
||||
And I had.
|
||||
And the other mother given permission.
|
||||
So my mom was arrested that we had.
|
||||
I can't even say six words and we were now ready to...
|
||||
We lost her life.
|
||||
Don't know.
|
||||
Wake her.
|
||||
Right.
|
||||
Oh.
|
||||
You bet.
|
||||
What am I?
|
||||
I don't know.
|
||||
Would you...
|
||||
So I'm going to floor with her while I on it to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able
|
||||
be able to be able to be able
|
||||
be able to be able to be able
|
||||
be able to be able
|
||||
be able to be able to be able to be able to be able
|
||||
to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be
|
||||
able to be able to be able
|
||||
to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able to be able
|
||||
You
|
||||
You
|
||||
You
|
||||
150
hpr_transcripts/hpr0067.txt
Normal file
150
hpr_transcripts/hpr0067.txt
Normal file
@@ -0,0 +1,150 @@
|
||||
Episode: 67
|
||||
Title: HPR0067: k-meleon
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0067/hpr0067.mp3
|
||||
Transcribed: 2025-10-07 10:56:17
|
||||
|
||||
---
|
||||
|
||||
music
|
||||
I don't think let's talk about K-Million.
|
||||
This is Mad Rush.
|
||||
First thing you want to know is what is K-Million?
|
||||
K-Million is a lightweight browser that's based on the Mozilla slash Firefox rendering
|
||||
engine.
|
||||
This means that it renders the webpages the same way that either Simunkey or Firefox would.
|
||||
Now, the main difference with K-Million and Firefox is Firefox uses its own API for the
|
||||
user interface, where K-Million uses Windows native user interface API.
|
||||
So I guess the second thing you want to know is, okay, why should I use K-Million instead
|
||||
of other browsers like Firefox, Rob, or, you know, well, for me, I've been having some
|
||||
trouble on my laptop lately.
|
||||
I've been using Windows, and for whatever reason on this particular installation of Windows
|
||||
or maybe some bad RAM or something on this computer, Firefox has been really acting
|
||||
funny and, you know, unstable and quirky, and the Opera has actually been crashing.
|
||||
I've never had a computer where Opera would crash before, but now I do.
|
||||
So it occurred to me that I'd take a look at this old browser that I tried out a couple
|
||||
of years back.
|
||||
In fact, I originally checked it out when Firefox was called Phoenix.
|
||||
This browser is small and it is fast and it is configurable.
|
||||
I don't know about you guys, but I always have a problem where, as an example, I use my
|
||||
Comcast email, I go to compose a message, and it wants to open up a new window.
|
||||
I don't like Windows.
|
||||
I like tabs.
|
||||
That's why I bother with different browsers and I don't inter-explore.
|
||||
Well, I know for Firefox that, at one point, I'd use an extension that lets you actually
|
||||
redirect JavaScript windows like new open windows and stuff to new tabs instead.
|
||||
This one out of the box, it lets you pick the default behavior between, like, either tabs,
|
||||
like, when you open new links to a tab, it's going to a background tab, which is one
|
||||
big thing.
|
||||
I don't like about Opera.
|
||||
I imagine it's way to change it, but I just never got around to it.
|
||||
You can, I haven't said that when I open pages and stuff, it'll go to a new background
|
||||
tab instead of the way Opera does it when you click a link, it goes directly to a new
|
||||
tab.
|
||||
It brings you over there.
|
||||
It's in case, like, if you're from Wikipedia or something and you're just, I'll put up
|
||||
a million tabs to read through, if you're like me, you'll end up losing your place and
|
||||
go back track where you were.
|
||||
I'm kind of frustrating.
|
||||
This one out of the box, you can set it that way, and you can even have it so that when
|
||||
you type in a URL to the, except for the, I mean, address bar, it'll open it in a background
|
||||
tab or a new tab or the current tab, whatever you whatever you like, it's flexible.
|
||||
This browser is flexible.
|
||||
It really, if you go to the advanced preferences, it lets you change everything.
|
||||
It's, that's, you know, really sells it to me.
|
||||
It has features.
|
||||
Even though, you know, it's relatively quick and easy to use and, you know, it's still
|
||||
got a lot of functionality.
|
||||
Here's back when I used it.
|
||||
I really noticed a big improvement even, even years ago, even though Firefox was quick
|
||||
then, it was quicker.
|
||||
Now, I can really see a big difference between Firefox, it was how it used to be Firefox.
|
||||
I'm sure plenty of you out there know how much my memory or it can be.
|
||||
Well, when it eddles on my computer, it's almost at a 50 gig, 50 gig, I don't think so.
|
||||
It uses about 50 megs, RAM.
|
||||
K million, let's see what K million, I gotta, I gotta like, I don't know, maybe 10 tabs
|
||||
open right now, let's say K million's using K million's, I got 26 megs under K million
|
||||
with like 10 tabs and Firefox, right now, Firefox is at 93 megs, let's see how my tabs
|
||||
I got open here, I got 4 tabs.
|
||||
So, you know, I don't know if there's just like some kind of enormous memory leak on
|
||||
the Windows version of Firefox or if my computer is just going crazy or Firefox is, Firefox
|
||||
is just that bad nowadays, but yeah, it's taken up 93 megs, that's ridiculous, not every
|
||||
computer has a gig RAM, you know, this computer is about 12, it's pretty good, but you know,
|
||||
when your Firefox is using 100 megs or 4 tabs, I don't know what to do, you know, like,
|
||||
so anyway, it's a K million, it's still, back in the day when I was just reusing it,
|
||||
it really lacked as far as features, getting things like Flash on there, kind of like
|
||||
non-existence, because even on Firefox, you know, back then, it was, you know, you had
|
||||
to have, no, no thing at all, before you could get it, well, I don't know if it's a consequence
|
||||
of already having Flash installed 4 Firefox, but right out of the box, I downloaded K million
|
||||
and it has, I go to YouTube, no problem, it all works, so, aside from that, there's a
|
||||
lot of other things that are nice, that are built in, that for Firefox, you'd need
|
||||
like an extension, one of them is the Opera users, mouse gestures, so, you know, it's
|
||||
got mouse gestures, you have your user agent switcher, you know, I think that's pretty
|
||||
much standard, standard stuff nowadays, this is a user agent switcher, which is nice,
|
||||
in case you get this website to say, oh, you're an explorer, you can't use it, it's got
|
||||
a neat little thing, it's basically a session manager, let's you add, they call groups,
|
||||
let's you add pages to a group, or layer, or layer, and in this browser, for whatever
|
||||
reason, something I don't know, dislike is they, they call tabs, layers, whatever, same
|
||||
thing, different name, anyway, the groups, if you have a couple of pages, well, the same
|
||||
kind of interest, let's say web development, it would work on a website, and you want
|
||||
to see how a few different pages look, when you change your style sheet, all at once,
|
||||
well, you know, all in one window, so let's say you got five of those, the M2 group, when
|
||||
you close the window, you can get back to them quickly, instead of making a new tab
|
||||
for each one, you all you got to do is go to groups, and you pick your web development
|
||||
one you just made, and it's also got a feature like how Firefox allows you to return
|
||||
your previous session before you close the browser last, it lets you, as a defaults group,
|
||||
if you will, it says last session, and you pick that same thing, so one of the things
|
||||
that I like about this, I've had trouble in the past where I can't get the toolbars
|
||||
exactly the way I want them, whether they don't let you put the address bar up with
|
||||
a file menu, or they actually don't let you move the file menu, I think I believe Firefox
|
||||
is like that, or was, I'm not sure, anyway, on this one I managed to get it down to two
|
||||
rows for my other window, which means I have the most real estate possible for the web
|
||||
page, which is great, because on this laptop, it only does 1024x768 natively, now right
|
||||
now I've got to hook up to an external monitor, so I can do more, but it's still, you know,
|
||||
it's something I want to do for when I am using the internal display on the laptop, it's
|
||||
nice, you know, you can hold the machines, you can really make things smaller, visually,
|
||||
you know, it uses that real estate, so now there's a couple of buttons on here, right
|
||||
on the default toolbars that don't come on other browsers, one of them, which is really
|
||||
nice, which is reminiscent of like, if you're using the Windows Explorer, or if you're
|
||||
using Conver, it's an up directory button, or up one level, it lets you backpad all
|
||||
up a level in the directory of the website, like let's say it's got, you know, your four
|
||||
levels deep into some, some odd thing, and you can go back one, or up one, you can run
|
||||
over there and, you know, to hit a back button to go there, instead of clicking the address
|
||||
bar to leading the, whatever directory you're in, hitting enter, you hit one button and
|
||||
it goes up, that's nice. Next up, it's got a go button, which is the same as every other
|
||||
browser ever made, it has a, you type in the URL, you hit go, it goes, same as any answer.
|
||||
Now this one, as far as the address bar is concerned, instead of having two separate
|
||||
text entry fields for the search, you know, I like the Google search, or whatever, you
|
||||
know, your favorite search engine is, the search and the URL area are together, it's
|
||||
one. So it kind of, it's kind of nice when you end up putting like a, you know, a 10-page
|
||||
long thing, it's a little search thing, and you only see a little bit of it. It's nice,
|
||||
it's got like other browsers you can add or, I guess, remove your search providers, and
|
||||
this one actually comes, unlike other ones, it comes with a quite a few, you know, you
|
||||
can, I could go to the list, but it's this kind of point I was able to see for yourself,
|
||||
it's got a lot. And I like the way it handles adding and removing them, for, for inner explorer,
|
||||
for Firefox, actually, maybe just just for Firefox, I know you got to get like a little file,
|
||||
I mean, it's a simple file, whatever, but you still got to go get it, you got to go look
|
||||
at a list of extensions, search in there, find your wand, you know, this is just got like,
|
||||
I guess you'd say that like a table view when you go to the preferences, and you can just
|
||||
put them in right there, it's nice. So one of the problems you're going to face, which is browser,
|
||||
is because it doesn't use the user interface that Firefox does, extensions for Firefox
|
||||
aren't going to work. That sucks, that's one of the biggest things I like about Firefox,
|
||||
so that's a kind of a problem. Now, at least for me, the most important extension I use on
|
||||
a daily basis is adblock plus, and it turns out the guys who make that already, you know,
|
||||
I guess they must have seen this browser, or maybe they use it even, they have a compatible
|
||||
version for it. I looked at their website, it says, okay, download the adblock plus for Camellian,
|
||||
unzip it to your Camellian root directory, and then follow these steps. Well, I started
|
||||
looking at the steps, and I got a little confused, because they had you editing what would be the
|
||||
equivalent of the Chrome user preferences for Firefox, the same sort of thing I hear, and there's
|
||||
some discrepancies between what they wanted you to do, and what Camellian told you was the right
|
||||
syntax, and this and that, and some looking around, looking around, and I said, you know what,
|
||||
let me just try it. So I closed Camellian, I opened it back up again, what do you know, adblock
|
||||
plus is installed, it says, hey, I found adblock, would you like to use it? I say, oh yes, I would.
|
||||
So I got adblock on here, no problem. I bet you there's some other other ones out there,
|
||||
but it's not going to just, you know, plug and play with other extensions, which is really
|
||||
the deal breaker, but for me, as long as I have adblock, I can survive. That's the big one.
|
||||
So cover groups, cover the extensions, or lack of extensions, I guess. Let's see what else we
|
||||
got here. Mass festures, I mentioned that, yeah. Well, I think that's pretty much it.
|
||||
If you get any questions about this, or comments, corrections, suggestions, whatever,
|
||||
just give me a message at medrushatcomcast.net, and hopefully the audio quality of this one
|
||||
wasn't too bad. I'm trying to find out a good, you know, go ahead, do things. Maybe next time
|
||||
you better. I don't know. All right, see you later.
|
||||
157
hpr_transcripts/hpr0068.txt
Normal file
157
hpr_transcripts/hpr0068.txt
Normal file
@@ -0,0 +1,157 @@
|
||||
Episode: 68
|
||||
Title: HPR0068: Shoulder Stretches!
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0068/hpr0068.mp3
|
||||
Transcribed: 2025-10-07 10:57:19
|
||||
|
||||
---
|
||||
|
||||
dilemma.
|
||||
Okay.
|
||||
And welcome back to Hacker Public Radio, this is Peter Nicolitis from The Fresh
|
||||
Ubuntu Podcast.
|
||||
Today, I'm going to be taking a bit of a different approach and covering something not overly
|
||||
technical, but something that all of us hackers we ought to be aware of.
|
||||
And that is basically a little bit of desktop ergonomics.
|
||||
The reason I'm talking about this today is that just yesterday I was diagnosed as having
|
||||
Bersitis, and that's a rather painful inflammation, in my case, in my shoulder.
|
||||
And it makes certain things like opening doors and sometimes moving the mouse quite painful.
|
||||
So that got me thinking about RSI's and other things that we get from sitting hunched
|
||||
over a PC all day, and if you're like me, you probably spend a good amount of time at
|
||||
your computer.
|
||||
And not enough time stretching to make up for this.
|
||||
Now it was, I think, over a year ago, I remember there was a woman that was interviewed.
|
||||
I don't remember her name, but she was on the Linux link tech show.
|
||||
And I remember her saying how like the worst possible thing for any human being was to
|
||||
sit at a computer for more than an hour a day, something to that effect.
|
||||
And I remember a link going off on her, and I thought it was one of the funniest episodes
|
||||
ever.
|
||||
I'm going to have to try to dig that one up.
|
||||
Anyway, I'm not quite as extreme as her, obviously not, otherwise I wouldn't be in
|
||||
the computer industry.
|
||||
But what I've done is just collected a few simple exercises that you can do to help ease
|
||||
the strain that you're putting on your body by sitting at your desk all day.
|
||||
Now there are tons of ergonomic resources out on the internet.
|
||||
I'm not going to go through a lot of them, but I'll link a couple here in the show notes.
|
||||
And the best thing you can do for starters is make sure that your desk and your chair
|
||||
are set up properly for you.
|
||||
And basically that usually involves you sitting at mostly right angles, making sure that all
|
||||
of your joints, whether your hips, your knees, your arms, etc., are at right angles when
|
||||
you are sitting at your desk.
|
||||
So if your chair is too high, and for instance maybe just barely your toes are touching the
|
||||
floor, then your chair needs to be lower.
|
||||
And if you feel like your desk is too high as a result, then you probably need a lower desk.
|
||||
So something, these are things that you need to pay attention to and need to adjust so
|
||||
that you have the right height.
|
||||
Otherwise you may develop an injury or pain like I did where your desk was too high.
|
||||
And as a result, you're constantly lifting your shoulder too much and that may have been
|
||||
a contributing factor to my injury.
|
||||
So that's one thing to do is make sure that your desk and your chair are set up properly.
|
||||
You also want to make sure that your monitor or flat panel display is set up at the right
|
||||
height.
|
||||
It should not be too low so that your neck is always hanging down or too high so that
|
||||
you're always straining up to look at it.
|
||||
There are some different schools of thought.
|
||||
I personally prefer to have the monitor just slightly below straight ahead so that I'm
|
||||
looking down slightly when I look at the monitor.
|
||||
But do a little digging to see what your own personal preference is on that.
|
||||
But if you feel any sort of strain when you're sitting at your desk, you want to look into
|
||||
that and adjust accordingly.
|
||||
Now one thing that I think I feel a lot when I'm sitting at the desk is I feel the strain
|
||||
in my shoulders.
|
||||
And my friend said the expression he used to describe it was the shoulders love the ears.
|
||||
Basically I was his way of describing how the shoulders would creep up over time.
|
||||
If you ever walk outside and a chill wind, like a gust of wind goes through and you all
|
||||
hunch up, that's exactly the same kind of thing that happens over time as you're sitting
|
||||
at the computer.
|
||||
Your shoulders will kind of like creep up.
|
||||
What you don't realize is that that's putting a lot of tension on your muscles and tendons
|
||||
and then the joints in the whole neck and shoulders area.
|
||||
One great way to work that out is to take, if you don't have an exercise band like an
|
||||
elastic band, that's great, but you don't need that.
|
||||
If you have like an old t-shirt or in this case I have a smart wool sock here, which is
|
||||
about a foot or so in length, what you can do is grab the sock or the t-shirt by the
|
||||
ends so that your arms are about, well in my case about a foot and a half apart and hold
|
||||
it out in front of you.
|
||||
So I'm going to try to demonstrate this.
|
||||
Of course you can't see it because it's not a video cast, but hey, hold it out standing
|
||||
up straight and then what you want to do is grab both ends of the sock and try to get
|
||||
your shoulder blades to come together.
|
||||
So you're basically opening up the chest portion of your body, opening up your chest and
|
||||
clenching your back.
|
||||
This is almost exact opposite of what happens when you normally sit at a computer.
|
||||
If you can envision yourself hunched over, that's the position that people normally end
|
||||
up getting into when they sit at their computer.
|
||||
You want to do the opposite.
|
||||
You want to unfold, open up your chest, open and then clench up the scapula or your shoulder
|
||||
blades.
|
||||
So do that and then hold the sock out in front of you and just hold that position pulling
|
||||
out on the sock and hold that position for about 15 seconds and you should feel the stretch
|
||||
pretty quickly in the shoulder and the scapula area.
|
||||
Now if the sound, the volume levels are changing a little bit because I'm moving back and
|
||||
away from the mic as I actually do these stretches.
|
||||
So once you've held that for about 15 seconds or more if you're comfortable with it, you
|
||||
can repeat the stretch this time straight up.
|
||||
So again, bring your shoulder blades together as much as you can while gripping the ends
|
||||
of the sock and this time hold your arms straight above your head.
|
||||
So you're doing the same stretch.
|
||||
You're like Superman flying straight up and again pulling that and you should feel that
|
||||
anywhere from your shoulders all the way down to the middle of your back and afterwards
|
||||
it feels really great.
|
||||
It may hurt while you're doing it.
|
||||
You don't want to do it so much that it really, really hurts but you should at least feel
|
||||
the stretch which is a good thing.
|
||||
Once you've held that for 15 seconds or so, hold your arms down behind your back straight
|
||||
behind.
|
||||
So just grab the sock and on both ends with the sock behind you and do the same stretch
|
||||
again, clenching your shoulder blades but this time with the sock down, so down at around
|
||||
hip level.
|
||||
So you're doing the same thing.
|
||||
Now you're like the human cannon ball or what not.
|
||||
You're flying forward but your arms are down behind you because the tendency when you're
|
||||
doing this stretch is to lean forward.
|
||||
That's not really going to help in the shoulder area.
|
||||
The point is to bring these finally what you can do is do the same stretch once again.
|
||||
Stand your shoulder blades together, but try to bring your arms up with both hands.
|
||||
This is probably the hardest part of those shoulder blades together.
|
||||
You want to bring your arms up behind your back, standing straight.
|
||||
So instead of raising the mouth, you get good at raising your arms up behind you, it's
|
||||
kind of tricky.
|
||||
Squat, for instance, with your back to your desk or to a table and actually get yourself
|
||||
more of a stretch but that's kind of advanced.
|
||||
I would not recommend that if you're new to this or if you're likely to fall over because
|
||||
then you could really wrench your arms out of their, you know, out of whack.
|
||||
So you may not want to start with that.
|
||||
But again, grab the sock, hold it behind you, clenching those shoulder blades tight, arms
|
||||
about a foot and a half apart, and just raise them up as high as you can hold them until
|
||||
you feel the stretch.
|
||||
You don't want to feel extreme pain, obviously.
|
||||
And then just hold it there for about 15 to 30 seconds.
|
||||
And again, when you're done, you let those go.
|
||||
If you've done all four of those stretches, you should feel an improvement in your shoulders
|
||||
all around.
|
||||
You should feel your muscles be a little more relaxed like they've gotten some exercise.
|
||||
And this will help you long-term.
|
||||
It will help you cope with hours a day of sitting at the keyboard.
|
||||
So do those, do these stretches, literally they take a minute, right?
|
||||
I gave you four positions and you know, each one takes about 15 seconds.
|
||||
So you can spend one minute a day and help undo a lot of the hunched up posture that we
|
||||
get from sitting at PC's all the time.
|
||||
There are a number of other stretches you can do.
|
||||
If you're interested in stuff like this, you know, things that you can do, sitting on
|
||||
the floor, sitting in your chair, all sorts of things.
|
||||
Right things for your lower back and your hips.
|
||||
I'm not going to cover those right now because again, I said, shoulders are the most, most
|
||||
common place where we need the work.
|
||||
So that's it.
|
||||
That's not really a super technical thing, but again, I think something that applies very
|
||||
much to the hacking community.
|
||||
So stand up straight, guys, you know, there's no excuse for poor posture.
|
||||
All right.
|
||||
Until next time, this is Peter from the Fresh Ubuntu podcast.
|
||||
You can follow us over there at freshobuntu.org.
|
||||
And my blog is over at pn72.com.
|
||||
And if you've got any questions about stretching or shoulders or the wonders of bursitis, just
|
||||
drop me a note.
|
||||
Take care, everybody.
|
||||
Bye.
|
||||
Thank you for listening to H.P.R. sponsored by caro.net, so head on over to C.A.R.O.N.C.
|
||||
1145
hpr_transcripts/hpr0069.txt
Normal file
1145
hpr_transcripts/hpr0069.txt
Normal file
File diff suppressed because it is too large
Load Diff
361
hpr_transcripts/hpr0070.txt
Normal file
361
hpr_transcripts/hpr0070.txt
Normal file
@@ -0,0 +1,361 @@
|
||||
Episode: 70
|
||||
Title: HPR0070: Dr. Who
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0070/hpr0070.mp3
|
||||
Transcribed: 2025-10-07 10:58:56
|
||||
|
||||
---
|
||||
|
||||
If you like the video please don't forget to subscribe dearly beloved all the channel's
|
||||
This is Soak, and we will listen to her public radio, and this is very important.
|
||||
Don't turn around.
|
||||
Some of you will know immediately what I am going to talk about, but for those that
|
||||
haven't, that was a clip from a television show, one of my all-time favourite shows ever,
|
||||
ever, ever, ever, ever, ever.
|
||||
The show started a while ago and has been running for a long time.
|
||||
It's a science fiction show.
|
||||
Following the adventures of a mysterious character who is from another planet,
|
||||
and his travels around in his spaceship, yes I am trying to be particularly obtuse here.
|
||||
Tell you what, we will do the first, second or so of theme music, if that helps anyone out.
|
||||
Well if you know the series, that would be enough.
|
||||
If you don't, you're not going to get anywhere with it.
|
||||
I am, of course, talking about Doctor Who.
|
||||
It started in the 1960s, 1963.
|
||||
It was like the day after Kennedy got shot or something.
|
||||
So it got really bad ratings for the first day, because everyone was worried about that.
|
||||
So it's been going on for over 40 years so far.
|
||||
They had a brief hiatus in the 90s where they stopped doing it.
|
||||
They tried to do a film, it didn't kind of work out, but they're doing a new series now.
|
||||
And I'm going to go over some of the brief, things about Doctor Who.
|
||||
Some of the main enemies and things like that.
|
||||
Doctor Who's just in the name of the show, he's not actually called Doctor Who.
|
||||
He's just known as the Doctor.
|
||||
And he's mentioned it several times.
|
||||
You know, who are you, I'm the Doctor.
|
||||
Doctor Who.
|
||||
No, just the Doctor.
|
||||
Kind of a running joke.
|
||||
But he's just known as the Doctor.
|
||||
He was born in Gana Frey, which is another planet.
|
||||
His race is called time lords.
|
||||
They are lords of time, basically.
|
||||
They have time machines called Tardis's T-A-R-D-I-S time and relative dimension in space.
|
||||
They can travel through time and space in their tardis.
|
||||
The Doctor was born with life on Gana Frey, and he decided to go traveling.
|
||||
At least it's the backstory.
|
||||
So the time lords were all stuffed shit, kind of boring people.
|
||||
They like the status quo they don't like interfering at all.
|
||||
The Doctor decides he's going to go and interfere and actually help the universe out.
|
||||
So he steals an old Type 40 Tardis.
|
||||
The reason it's old is they can then say, oh, oops, something happened and it went wrong.
|
||||
That's why, because it was in the shop for repair.
|
||||
That's how he got access to it.
|
||||
It has a chameleon device, for example, which is meant to make it blending with anything around.
|
||||
But it doesn't.
|
||||
It's stuck in the shape of a police box.
|
||||
So that's the basic plot, like he travels around time and space.
|
||||
He picks up Ferris companions along the way.
|
||||
Normally humans sometimes robot dogs, sometimes aliens, sometimes humans from other planets.
|
||||
And they go traveling around basically fixing stuff.
|
||||
So it's really open-ended that they can go anywhere, do anything.
|
||||
Now for those of you that haven't watched it, you're probably wondering how on earth you can get going for 40 years.
|
||||
The main actor, the player's doctor, first of all, is William Hartnell.
|
||||
And he played it for several years.
|
||||
Then he got a bit old. He started forgetting his lines.
|
||||
And they decided to replace him.
|
||||
So they started looking around for someone else that looked similar to William Hartnell.
|
||||
Sounded the same to try to replace him.
|
||||
They then decided to screw it.
|
||||
This guy's an alien.
|
||||
Let's make him do something and change to be someone entirely different.
|
||||
So they called it regeneration.
|
||||
So the doctor regenerators when he died.
|
||||
And cheated death.
|
||||
And he regenerated into Patrick Chalton.
|
||||
An entirely different person didn't look anything like, you know, he was like 20 years younger than the previous actor.
|
||||
So an entirely different person, different personality, different everything.
|
||||
And they've kept this up and they've now had 10 different people play the doctor.
|
||||
Well, he left but will ignore the Peter Cushing film.
|
||||
So we started off with William Hartnell, the first one.
|
||||
The second one was Patrick Chalton.
|
||||
The third one was John Pertree.
|
||||
The fourth one was Tom Baker.
|
||||
The fifth one was Peter Davidson.
|
||||
The sixth one was Silveste McCoy.
|
||||
The seventh one was...
|
||||
Wait.
|
||||
No, back up.
|
||||
The fourth one was Tom Baker.
|
||||
The fifth one was Peter Davidson.
|
||||
The sixth one was Colin Baker.
|
||||
The seventh one was Silveste McCoy.
|
||||
The eighth one was Paul McGann.
|
||||
The ninth one was Christopher Eccleston.
|
||||
The tenth one was David Tennant.
|
||||
Yeah, I'm a complete fan by here.
|
||||
I can read to say you recite them off by heart, almost.
|
||||
So they've all had different personalities.
|
||||
The first one was a sort of grandfather,
|
||||
a little crotty-ty kind of person.
|
||||
The second one was known as the Galactic Hobo.
|
||||
He enjoyed playing a piccolo.
|
||||
The third one ended up chopped on earth.
|
||||
It was a master of Venusian Akido,
|
||||
apparently one of the very few two armed beings to actually master it.
|
||||
The fourth one, floppy hat, big scarf, Tom Baker.
|
||||
He was the doctor for many, many years,
|
||||
and he is possibly the most famous one,
|
||||
because he's the one that a lot of people remember growing up.
|
||||
He was the one with the robot dog, by the way.
|
||||
He told him off a bit, except for the longest time.
|
||||
He then passed after Peter Davidson,
|
||||
who was a quickter, very breathy, sort of character.
|
||||
Oh, hello, I'm the doctor.
|
||||
We're going to run over here.
|
||||
Oh, cool stuff.
|
||||
Yeah, you know one's a wooden earth, am I?
|
||||
He would run around and run in,
|
||||
and he was very breathy when he did his acting.
|
||||
That was his doctor.
|
||||
The next one was Colin Baker.
|
||||
He was very smug for him,
|
||||
and it seemed to know a fair bit about what was going on.
|
||||
We have Silvestre McCoy,
|
||||
Wanderbrand with Numbrella.
|
||||
They all had their own outfits, you see.
|
||||
The eighth one was Paul McGahn.
|
||||
As I said, he played it in a film.
|
||||
Didn't think a huge amount of the film.
|
||||
It was a little too American,
|
||||
if I can use that without annoying all the American people.
|
||||
The dogs were very British,
|
||||
and it was about British people and all that,
|
||||
and then all the British actors.
|
||||
And then to turn around and decide that you're going to
|
||||
set it in American, have a bunch of Americans there,
|
||||
and it didn't seem quite right.
|
||||
They just did one bit.
|
||||
They made a comment about the dogs became half-human.
|
||||
He was half-human, half Gallifrein.
|
||||
I was supposed to pure Gallifrein, then it was before.
|
||||
After that, they then had a rather long hiatus.
|
||||
This is in the 90s, they did the film, and that was it.
|
||||
Then early 2003, I think it was,
|
||||
they decided they were going to do a new series.
|
||||
That came out with Christopher Eccleston,
|
||||
and he was Northern accent.
|
||||
He had leather jacket, and again,
|
||||
a more not quite as outrageous outfit as the rest.
|
||||
But as I said, he was from the North.
|
||||
If you are an alien, how comes you sound like you're from the North?
|
||||
Lots of planets have a North.
|
||||
After him, they then had David Tennant,
|
||||
who's the tenth and current doctor.
|
||||
So that's basically the doctor's regenerations
|
||||
or incarnations we've gone through those.
|
||||
So let's talk about some of the bank guys.
|
||||
There are three main ones,
|
||||
the master, Dalek's,
|
||||
Subman.
|
||||
They're probably the three main ones.
|
||||
So let's start with the Dalek's.
|
||||
Exterminate!
|
||||
That was basically their catchphrase.
|
||||
They was threatened to exterminate people.
|
||||
They were created as a soldier race
|
||||
by a guy called Davros.
|
||||
He was a maiden scientist for the Khaled race,
|
||||
the Khaled Anagram of Dalek.
|
||||
They're from Scarrow originally.
|
||||
They were fighting the Thales.
|
||||
They've been fighting them for thousands of years.
|
||||
And long story short,
|
||||
the Davros wanted to make the Daleks
|
||||
at any cost so he betrayed his own people.
|
||||
So the Falska attacks to say,
|
||||
oh, look at that.
|
||||
Let's get them back.
|
||||
I've got the Daleks.
|
||||
So he sends the Daleks off,
|
||||
and then there's a sort of love-hate relationship
|
||||
between the Daleks and their creator, Davros,
|
||||
depending on which episode
|
||||
and what's going on,
|
||||
what series they either love or hate
|
||||
and what there's two factions and various things.
|
||||
They ended up going around in space,
|
||||
trying to conquer everything,
|
||||
and ended up fighting for power over time itself
|
||||
with the time Lords.
|
||||
And that was known as the Time War,
|
||||
which was explained partly
|
||||
in some of the more recent series
|
||||
they haven't gone into the whole detail about that.
|
||||
But there's not many time Lords
|
||||
or Daleks around left.
|
||||
But there's still a bit of wiggle room
|
||||
that they can bring some back,
|
||||
should they want to.
|
||||
As I said, the Daleks were very big on exterminating.
|
||||
And if you get several of the minimum together,
|
||||
they can get a little antsy.
|
||||
That's basically it on the Daleks,
|
||||
at least for this brief overview,
|
||||
after what I can't really get.
|
||||
All the 40 years were for Doctor Who History
|
||||
with all the books,
|
||||
all the spin-offs and everything.
|
||||
So I'm just going to do a brief overview here.
|
||||
The next one is we have the Sidemen.
|
||||
The Sidemen were originally from the twin planet
|
||||
of Earth called Wondas,
|
||||
which is the tenth planet,
|
||||
although there's since been redone
|
||||
in the new series to be an alternate Earth,
|
||||
but basically the idea is that
|
||||
they're possibly what we might become
|
||||
maybe in the future.
|
||||
The Sidemen are very ball-like.
|
||||
They talk about becoming like us and very similar
|
||||
to the ball, in fact.
|
||||
And if you look at it,
|
||||
there are lots of similarities.
|
||||
Every citizen will receive a free upgrade.
|
||||
You will become like us.
|
||||
So as I said, very ball-like in certain ways.
|
||||
And they do like killing people,
|
||||
except of course being robots
|
||||
and all digital is not killing people.
|
||||
It is.
|
||||
You will be deadly trapped.
|
||||
Finally, we come up to the master,
|
||||
as I said, the master is a time-lord,
|
||||
except he is an evil time-lord.
|
||||
He's permanently trying to take care of the galaxy,
|
||||
whereas the doctor is trying to save the galaxy.
|
||||
Another one of these ones that you can't have,
|
||||
one without the other.
|
||||
Now, haven't got any sound quates for this guy,
|
||||
but if you really want to go and see some of the
|
||||
who I would consider the true master,
|
||||
you've got to go back to the John Pertwy area
|
||||
and have a look at the Roger Delgado master.
|
||||
He is my favourite version of the master,
|
||||
has to be said.
|
||||
And in the show notes, I'll come up with some good episodes
|
||||
for you to watch if you want to enjoy that.
|
||||
I'm going to quickly go over some of the other bad guys
|
||||
that they have.
|
||||
We have one episode where an alien spacecraft
|
||||
re-created some weird Frankenstein-style monster,
|
||||
so I've did maybe even more freaky
|
||||
because it was a child,
|
||||
and this episode in fact entirely freaked my wife out.
|
||||
So if you're listening, honey, cover your ears now.
|
||||
Please let me a man once down at the farm.
|
||||
They've also had various other things.
|
||||
We've had the ood,
|
||||
and they turned into some weird
|
||||
foot soldier for the beast.
|
||||
And in fact, that was the bit that said
|
||||
don't turn around to the very beginning.
|
||||
The beast and his armies
|
||||
shall rise from the pit to make war against God.
|
||||
We are the Legion of the Beast,
|
||||
and you will worship him.
|
||||
We've also had clockwork bad guys.
|
||||
And we've also had some really, really bad impressions.
|
||||
This one was actually meant to be bad.
|
||||
This Billy Piper and David Tennant,
|
||||
David Tennant goes back into speaking
|
||||
with his normal Scottish accent,
|
||||
and then Billy Piper tries to pretend to be speaking
|
||||
with a Scottish accent.
|
||||
So that's about it.
|
||||
That's been the brief overview of Doctor Who.
|
||||
I've just got a few things left to say before I go.
|
||||
First of all, the official site is www.bbc.co.uk slash Doctor Who.
|
||||
You have a lot of stuff they can download commentaries
|
||||
and listen to the commentaries whilst watching the program and things.
|
||||
They also have a ton of sounds,
|
||||
where I've got basically all these sounds from.
|
||||
I should actually say the BBC have really got their head screwed on
|
||||
when it comes to this whole web thing.
|
||||
For example, they had one episode they went to this house.
|
||||
They met Queen Victoria and a web wolf.
|
||||
They actually made websites for the episodes.
|
||||
So they have one episode they talk about,
|
||||
who is Doctor Who rose in the episode.
|
||||
Called Rose goes to see this guy.
|
||||
He explains that he's been trying to track down the Doctor.
|
||||
And they actually made the website and you can go and see the website.
|
||||
And if you go to the Wikipedia page,
|
||||
I'll put this in the show notes,
|
||||
but you can go to the Wikipedia page on spin-off websites, I think it is.
|
||||
And they have a list of every single one.
|
||||
Basically every single episode they've got a website about it,
|
||||
most of them.
|
||||
The ones in the future they haven't, because it's in the future.
|
||||
They have an episode about geocomptex.
|
||||
And you can go and see the website about geocomptex.
|
||||
You go and see lots and so it's really pretty cool.
|
||||
They've got their head screwed on this.
|
||||
And you can actually go and look at the websites and various things.
|
||||
Okay, I've got to add this bit in.
|
||||
I need to apologise.
|
||||
I've got a bit of a call to if I sound weird, that's why.
|
||||
But I just found out some stuff.
|
||||
My episode will be coming out on Monday and on the Saturday two days before
|
||||
the new series of Doctor Who was actually out.
|
||||
So please go and watch it if you're in the UK.
|
||||
You can grab it off the BBC iPlayer thing.
|
||||
Not quite sure what else I could say about Doctor.
|
||||
It's really fantastic.
|
||||
Pretty much everyone in the UK loves it.
|
||||
Everyone I know that likes science fiction even a little loves Doctor Who.
|
||||
It's just, he doesn't have any guns.
|
||||
He always walks around and he uses Sonic screwdriver,
|
||||
which is a screwdriver that's Sonic oddly enough.
|
||||
But he uses that.
|
||||
He doesn't actually use any guns.
|
||||
Most of the time there's a couple of his regenerations have.
|
||||
But most of them don't use guns.
|
||||
He doesn't go in all guns placing.
|
||||
He thinks his way out of problems.
|
||||
It's got funny bits in for the kids.
|
||||
It's got jokes for the adults.
|
||||
It's just the whole thing.
|
||||
It's very funny.
|
||||
It's very good.
|
||||
I highly recommend you go and watch it.
|
||||
Again, thank you very much for listening.
|
||||
I hope you enjoyed this episode.
|
||||
I would just like to thank everyone for all the kind words.
|
||||
I've had nothing but praise for my episodes.
|
||||
And so I hope I'm going to do several more.
|
||||
And I really am going to try and do the Linux one soon.
|
||||
I promise.
|
||||
Honest.
|
||||
I'd like to thank everyone who does podcasts that I'd listen to.
|
||||
People like Dave Yates.
|
||||
Who've been nothing but supportive of me doing this.
|
||||
Dan, I know I'll make fun of you a few times.
|
||||
But thank you very much.
|
||||
Chess Griffin.
|
||||
Just like to say, you shall be sorely missed.
|
||||
If you haven't heard Chess does a Linux reality podcast.
|
||||
And he's stepping down so I'd like to give a quick shout out to him.
|
||||
I'd like to thank everyone else at the Hacker Public Radio,
|
||||
especially the other people that are submitting podcasts.
|
||||
Thanks for listening to me.
|
||||
This has been Zoke.
|
||||
You can go to my website at zoke.org.
|
||||
It's xray osca kiloeco.org.
|
||||
Or you can email me at zokesorrygmail.com.
|
||||
That's xray osca kiloeco Sierra osca Romeo uniform at gmail.com.
|
||||
Thank you very much for listening.
|
||||
Until next time, have a good day.
|
||||
Thank you for listening to Hacker Public Radio.
|
||||
HPR is sponsored by tarot.net.
|
||||
So head on over to CARO.18 for all of us in need.
|
||||
Thanks for listening to me.
|
||||
Thanks for listening to me.
|
||||
131
hpr_transcripts/hpr0071.txt
Normal file
131
hpr_transcripts/hpr0071.txt
Normal file
@@ -0,0 +1,131 @@
|
||||
Episode: 71
|
||||
Title: HPR0071: Beowulf Cluster Introduction
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0071/hpr0071.mp3
|
||||
Transcribed: 2025-10-07 10:59:41
|
||||
|
||||
---
|
||||
|
||||
You
|
||||
Hey, it's Steve Teak and welcome to Hacker Public Radio, episode 71 for Tuesday, April
|
||||
8, 2008.
|
||||
Today's topic is the Bay of Wolf Cluster.
|
||||
You know, you can make a career out of certain kinds of computing, but I don't want to make
|
||||
a mini-series out of this topic even though I could, so I plan to talk in terms of concepts,
|
||||
so you can figure out what to do if you want to build one of these on your own.
|
||||
Or by that I mean that I don't intend to do have a real handholding experience, I just
|
||||
want to try to keep this as sure as I possibly can.
|
||||
So let me draw for you a little roadmap in your mind's eye of where this kind of compute
|
||||
cluster is and the scheme of cluster computing.
|
||||
Basically, there are two broad categories of cluster computing, high availability and high
|
||||
performance.
|
||||
High availability is, for example, where there is an application that cannot go down and
|
||||
so a cluster of computers is formed in such a way that if any computer fails, the other
|
||||
computers in the cluster can carry out the work so the application stays up, although the
|
||||
performance of the application can be affected.
|
||||
The other category, high performance, is where the Bay of Wolf Cluster design fits into
|
||||
place.
|
||||
The Bay of Wolf is built for speed and more specifically for parallel processing.
|
||||
I'm sure you know what a cluster is, there's a bunch of computers linked together to get
|
||||
something done faster.
|
||||
If the computers are linked together in any old, old way on a land, it is called a cow
|
||||
design, which stands for cluster of network, oh, I'm sorry, cluster of workstations.
|
||||
Some call it a now design, which stands for a network of workstations.
|
||||
They're essentially the same thing.
|
||||
But a Bay of Wolf is different and the biggest difference is in the topography of the land
|
||||
it is on.
|
||||
A Bay of Wolf has a head node and on a private network, which is to say a network dedicated
|
||||
only to the Bay of Wolf cluster.
|
||||
A bunch of other nodes, some call this the master and the bunch of slave nodes.
|
||||
The head node sometimes has an additional network connection to the regular land, so people
|
||||
can secure a shell into the cluster.
|
||||
But all the slaves and the head have a non-commingled network.
|
||||
This is the major difference between a plain old cluster and a Bay of Wolf.
|
||||
There are two more criteria that set apart the Bay of Wolf type cluster, and the first
|
||||
of those is that a Bay of Wolf cluster consists of Cots, C-O-T-S, which stands for commodity
|
||||
off the shelf hardware.
|
||||
Imagine calling up a retailer like Dell or Gateway and saying, hello, send me five of
|
||||
your cheapest ATHLEAN64s.
|
||||
That's the kind of concept we're talking about.
|
||||
Now online and linked off the Bay of Wolf.org website is a book called Engineering a Bay
|
||||
Wolf Style Compute Cluster by Robert Brown of Duke University.
|
||||
He says it best, quote, the point of Bay of Wolfery has never been to glorify Lennox
|
||||
per se, but rather explore building super computers out of the mass market electronic equivalent
|
||||
of code hangers and chewing gum.
|
||||
I love that quote.
|
||||
The other major difference is that all the nodes run FOSS, F-O-S-S, or free open-source
|
||||
software.
|
||||
Some of these clusters can get to be in the hundreds of nodes, and the idea of either
|
||||
paying license fees or not being able to fix something because closed-source systems
|
||||
just don't let you get under the hood of the computer is an anathema to this form
|
||||
of computing.
|
||||
So what are these used for?
|
||||
Well, many of them are in scientific and academic computing.
|
||||
Things where physicists and astronomers have to run really big chains of calculations.
|
||||
I'm talking about multi-day runs of calculations on many computers.
|
||||
The closest thing we have to that kind of need is hackers is pre-computing the hashes of
|
||||
all the passwords and a certain space of passwords or distributed cracking of a password protected
|
||||
files.
|
||||
I'm not talking black hats stuff here.
|
||||
It is totally possible that a hacker may want to see the strength of a security scheme
|
||||
by breaking it as a test to the system, or that a hacker may be employed by a law firm
|
||||
to decrypt files under court order.
|
||||
Personally, I had what can be called a status desire.
|
||||
Now, I admit it, I like to have a muscle computer.
|
||||
And what says muscle computer better than a Baywolf cluster?
|
||||
You know, can you imagine, oh, I got a Dell, I got a Gateway, what do you got?
|
||||
I got a two-note Baywolf cluster.
|
||||
What?
|
||||
You know, that kind of thing.
|
||||
The thing is that I already own a muscle computer and I did not feel the need to actually
|
||||
do this until recently.
|
||||
I want to give Shouch to Klatu for his excellent HPR series on video encoding.
|
||||
And now that I want to save my collection of Japanese anime in the original format, as
|
||||
I got it in as well as the free Fiora format, I have the need for more computing power.
|
||||
So that is my example.
|
||||
And it does not even require you to be a nuclear physicist who want to do this.
|
||||
Just be a film or anime buff and you can put this to good use.
|
||||
Here is how I did it.
|
||||
Once again, I would like to do this as a conceptual overview as I feel this episode is already
|
||||
long enough.
|
||||
So I'm going to move quickly.
|
||||
Perhaps the feedback indicates a desire for detail on a certain point.
|
||||
Maybe I will have the inspiration for another HPR episode.
|
||||
Okay, I have an AMD 64 monster on the desk and a Pentium 4 laptop and I want to link
|
||||
this as a bail of cluster.
|
||||
I can always go for more notes later if need be.
|
||||
Step one is hardware.
|
||||
A separate LAN card and a crossover cable will do fine.
|
||||
It's that simple.
|
||||
After installing the LAN card, it was a matter of defining a second network.
|
||||
So I had 192.168.1 whatever as my regular LAN, which is how I get out to the internet or
|
||||
AVMO computer and I have 192.168.2 whatever as my second network.
|
||||
So why a second network?
|
||||
It should be an obvious question because I can just as well go into this to a regular network.
|
||||
Well by closing off the slave computer to the head computer only, we can stop worrying
|
||||
about security headaches.
|
||||
Once my slave note came up, I installed plain old telnet server on it.
|
||||
Normally SSH would be used, but encryption robs us of compute cycles, which I want to
|
||||
use for the video encoding.
|
||||
The second piece of software for this project was NFS, the Unish network file system.
|
||||
Again, no worries about outside intrusion.
|
||||
You define in the configuration files that you are only exporting file shares to the
|
||||
second network.
|
||||
That is all it took.
|
||||
I then brought up the laptop, were on a script that wrote that brought up telnet and the
|
||||
second network and telnet it into my laptop.
|
||||
I used a tab X term and had one tab be my movies directory on my big desktop computer and
|
||||
the other tab was the telnet session to the laptop, where I changed directory to the
|
||||
exported file share that was my movies directory on my desktop.
|
||||
In this way, I was able to run ffmpeg2theore on the same directory from two computers to my desktop.
|
||||
Basically, the desktop is twice as fast as the laptop.
|
||||
So now, in the time it takes to convert two enemies to ffmpeg2, I can convert three very
|
||||
nice.
|
||||
I might take another computer out of mothballs and go even faster, but that is a project
|
||||
for another day.
|
||||
So I am going to wrap it up now in the interest of keeping it short.
|
||||
So thank you for listening to Hacker Public Radio.
|
||||
Feedback is always appreciated at hpr at deepgeek.us.
|
||||
Thank you for listening to Hacker Public Radio.
|
||||
hpr is sponsored by caro.net.
|
||||
So head on over to caro.nc for all diversity.
|
||||
Thank you for listening to Hacker Public Radio.
|
||||
159
hpr_transcripts/hpr0072.txt
Normal file
159
hpr_transcripts/hpr0072.txt
Normal file
@@ -0,0 +1,159 @@
|
||||
Episode: 72
|
||||
Title: HPR0072: Imagemagick
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0072/hpr0072.mp3
|
||||
Transcribed: 2025-10-07 11:01:13
|
||||
|
||||
---
|
||||
|
||||
I'm-
|
||||
Hi neighbor, today Trolley Trolley is going to take us to the mystical world of image magic.
|
||||
That's right, today we're going to talk about all the different incantations you can cast
|
||||
on your friend's images, incantations.
|
||||
It's a big word, do you see incantations?
|
||||
She can't and now we'll go to the grand wizard himself, clap two.
|
||||
Hi clap two.
|
||||
This is hacker public radio.
|
||||
This is clap two and I've been playing around with a lot of images lately.
|
||||
For one reason or another it seems like I'm putting together images to send to someone
|
||||
or I'm designing a logo for something and I have been using a little program that you may
|
||||
or may not have called image magic.
|
||||
It's i-m-a-g-e-m-a-g-i-c-k.
|
||||
It's easy enough for you to get, you can have to get install image magic,
|
||||
get it from your repo, download it from the website, it may even be cross-platform.
|
||||
But either way it's a great little application that is essentially a command line centered image manipulation program.
|
||||
Now that might seem a little bit strange.
|
||||
One doesn't equate image manipulation necessarily with the command line.
|
||||
But imagine this.
|
||||
If you have a number of images and you need to scale them down so that you can upload them to a website or email them to someone.
|
||||
Traditionally you might take it into the gimp and you might go into image size and scale it down and then you can save it out again as maybe a copy.
|
||||
And then you can do that a couple of times.
|
||||
And maybe you might even be like really creative and maybe you could come up with some kind of shell script to be able to do much of that work for you.
|
||||
But with image magic you basically can just cut out the gimp entirely.
|
||||
So if you have a folder of 300 images that you're trying to upload and you need thumbnail versions of each, this is the program for you.
|
||||
The other cool thing about image magic is that you can integrate it with scripting languages like Pearl or Ruby, Python, C of course, C++.
|
||||
You know all those good programming languages, you can use image magic, you can call that from those languages so that even on the server side for instance you could have image magic kind of doing something, you know someone uploads an image to your site and you need it to be automatically resized for them.
|
||||
You need to change it in some way, maybe you're going to turn it black and white for them or something or maybe you want to give it rounded corners so that it kind of fits the style of your site.
|
||||
You can do all of that kind of stuff with image magic with a simple, you know, a PHP script or something like that.
|
||||
So it's a really powerful little program. It's also a little bit odd because image magic is actually the name of the package rather than the program that you're going to invoke from the command line.
|
||||
There are about, I don't know about, about eight different programs in image magic. I think I've used pretty much all of them for one thing or another.
|
||||
There's convert, identify, magraphy, composite, montage, compare, display, animate, import, and conjure. That's actually like 10 I think.
|
||||
So convert is a lot of these do the same thing, but there's some kind of variation. So convert, for instance, will take your image and do whatever you want it to, but it does it to a copy. It outputs the file to a copy so you're not changing your original image.
|
||||
That's handy for certain things, especially if you're going to do thumbnail versions of stuff. You obviously don't want to lose the full size quality. Identify will give you all kinds of information about an image.
|
||||
Magraphy is just like convert, except it does it to the original image. So if you want to just take a whole bunch of pictures and scale them down and turn them black and white, you can do that with magraphy. You won't have any extra files lying around afterwards. It just changes the actual image.
|
||||
Composite will, well, composite images, so it's like overlaying an image and messing with transparency and things like that. Montage will tile images. That one I have not used, actually. Compare, displays, an image or an image sequence, animate will animate an image sequence.
|
||||
So if you want 30 pictures to play in quick succession, that would be animate. Import is basically a screen capture. And that's a cool one because you can actually use import. For instance, if you have no GUI up at all and you want to take a picture, a screenshot of the text console that you're running at that moment, import would be the way to do that.
|
||||
And the last one that also I've not used is conjure. That is the interface for the scripting language that image magic uses, which I believe is called mith-m-i-f-f. And you would use conjure to do the kind of scripting that image magic allows you to do.
|
||||
Obviously, you can always do your own. Like I say, it's completely compatible with all kinds of programming languages. So if you've got a Python script that you're writing and you want to do something with image magic, there's no need to learn image magic built in scripting language.
|
||||
Okay, let's do some interesting image magic tricks. First thing we'll do is take a photo of a text console because how often have you been in a text console, and either you're having a problem because you can't get X to start or something like that, and you want to record what the problem is.
|
||||
Or maybe you've done something really cool in programming class, and you don't have X up. You're just using a normal console. So what you can do is use the import command.
|
||||
So again, import is part of image magic, and the way it would work is you'd put import, space, dash, display, space, colon, zero, dot, zero, space, dash, window, space, root, space, screenshot, dot, png.
|
||||
And that will take a snapshot, a screenshot of the current display, the window that you're looking at, the root window, and name it screenshot dot png.
|
||||
Now, if you wanted to do that without the command being on screen, the import command actually being on screen, then what you would have to do is switch over to another virtual terminal.
|
||||
So if you're in virtual terminal one, you'd switch over to virtual terminal two, you'd log in, and then you'd do like a little bit of quick switching. You'd do like a CHVT space one, which would get you back to virtual terminal one.
|
||||
So, semicolon, space, sleep, three, that'll give you a couple of, it'll give the terminal a couple of seconds to, you know, to pop back up.
|
||||
So, semicolon, space, import, space, dash, display, colon, zero, dot, zero, dash, window, root, screenshot, dot, png.
|
||||
And that would basically switch you over to the first term of virtual terminal, it would wait for it to draw itself on the screen, and then it would do the import command.
|
||||
That's the way to take a screenshot without having this screenshot command in your screenshot.
|
||||
Okay, so that's the import command. Let's think of sometimes maybe when we are going to actually be doing something within the GUI.
|
||||
There are two times, or a couple of times I use image magic when I'm actually in a graphic environment.
|
||||
One of those times is when, like I said, if I've got a lot of images that I need to juggle.
|
||||
If it's 100 images or something like that that you need to do essentially the same thing to, image magic is the way to go.
|
||||
Honestly, I tend to do Magrify, which is the one that changes the actual image, which I wouldn't think I would ever do because the risk is kind of strong that if you screw something up your original file is going to be gone.
|
||||
But I guess I've never really done this to anything that important, so I just go ahead and use Magrify.
|
||||
But you can certainly use Convert just as easily. A lot of these little programs and image magic use the same attributes or the same parameters.
|
||||
It's just depending on how you want to apply the changes.
|
||||
So if we're doing, like, if we need to rotate images and maybe we need to make them black and white and maybe we need to resize them.
|
||||
You would just enter Magrify, space, dash, rotate, space, 90. That would be 90 degrees to the right, clockwise.
|
||||
If you wanted to go 90 degrees to the left, you'd do minus 90.
|
||||
Space, dash, color, space, all in word, space, gray, all in capital. That would change the color space to a gray scale color space.
|
||||
And if you knew that you were sending images out to a proper printer, you could also change the color space to CMYK.
|
||||
If you're going out to video, if these are still, you're going to put out the video, you could go to YUV. It just depends on what the purpose of your changes are.
|
||||
And then you would do space, resize, 50%, space, images, asterisk.png.
|
||||
And that would do all those things to everything called images with a number behind it.png.
|
||||
And obviously you'd want to do that within the directory in which those images all dwell.
|
||||
Now the really cool thing is that if it is like 100 images, obviously if you're going out to the web, you're going to have to figure that out yourself.
|
||||
You know, upload it to your FTP, via FTP or server, and do whatever you want to do with it.
|
||||
But what I've done in the past is had the need to go out to a PDF.
|
||||
So I've scanned in like 100 images or 100 scans of camera logs or something like that.
|
||||
And I need to get it consolidated so that the people who are going to be using these things don't need to open up 83 or 100 different images just to sort through what essentially is one document.
|
||||
So image magic can do that as well.
|
||||
And the command for that is convert, space, images, asterisk.png, space, all in one.pdf.
|
||||
That's all one word, just all in one.pdf.
|
||||
If you use that, it will invoke the convert command.
|
||||
So it's not saving over anything.
|
||||
It's not changing any original file.
|
||||
And it's going to take anything called images with anything afterwards.png and make it into an all in one PDF file.
|
||||
In the exact order that it appears in that directory.
|
||||
So if you haven't named your images with some kind of logic to it, for instance, image 01, image 02, image 03, image 04, or better yet, image 001, 002, 003, then you're going to have a real interesting surprise.
|
||||
But it's a lot easier to just name them properly in the first place and then just take them all and convert them to a PDF.
|
||||
And I have Zoke in the IRC to thank for that.
|
||||
He Googled it for me and found that command, which saved my life one night.
|
||||
So that was really cool.
|
||||
Let's see.
|
||||
Other useful commands.
|
||||
Well, there's animate.
|
||||
A lot of people that I know with kids, they like to see slide shows of all their kids.
|
||||
And the easiest way to do that, at least one easy way to do it.
|
||||
I'm sure probably F spot and did you cam in all those applications, the CASA, whatever.
|
||||
I'm sure that all does has some function for this.
|
||||
But I don't use any of those programs.
|
||||
So if someone wants to see images of a slide show of a collection of photos, maybe you just went on vacation.
|
||||
You want to see all your vacation photos just kind of play on your screen.
|
||||
The animate function is what you're looking for.
|
||||
Animating is easy.
|
||||
It's just basically either if you have an animated gift that you have separated into 29 different images or an animated sequence that you want to see in motion.
|
||||
You can tell it to do that.
|
||||
But if you just want to see like a slide show of pictures, all you do is you type in animate and space dash delay, space, say 500.
|
||||
That would be five seconds on each image or 707 seconds, whatever.
|
||||
SpaceAstrisk.png, and so now it's going to take every png in that folder, in that directory, and animate it in a little window.
|
||||
Play it one after another in a little window for seven seconds each.
|
||||
So that's pretty easy.
|
||||
ImageVagantMagic is pretty easy, really.
|
||||
There are a whole bunch of different options that you, if you want to do it to an image, then you probably can.
|
||||
You just need to find out what property that is.
|
||||
That can be a little bit overwhelming.
|
||||
They don't have a proper man page as such.
|
||||
If you just type in man, convert, or man, animate, or magnifier, whatever.
|
||||
You see a very brief description of what the, of what the software, the application does.
|
||||
But it doesn't give you all the options.
|
||||
You get a little bit more detail if you just type in, for instance, magnify, space, dash, help, and that's one dash, not two.
|
||||
It's just dash help.
|
||||
That will give you a list on screen, and actually you'd probably want to pipe it into less.
|
||||
It will give you a list on screen of all the different options.
|
||||
But even then, it doesn't give you a whole lot of detail.
|
||||
A better way is to simply go to a browser, whether it's Firefox, or Links, or Conquer, or whatever.
|
||||
Just go to File, colon, slash, slash, slash, slash, that's three slashes.
|
||||
USR, slash, share, slash, docs, slash, image magic, slash, www, slash, command, dash, line, dash, options.html.
|
||||
That will give you all the different options that you could possibly want.
|
||||
That's really the way that you kind of have to browse through it, because otherwise you don't get really as much detail as you need.
|
||||
But it's a very powerful program, and there's just so much you can do without ever bothering to open up a graphic application.
|
||||
You can watermark an image.
|
||||
You can generate text.
|
||||
You can add drop shadows. You can flip them, flop them, flatten them, extract information from them, magnify, invert, emboss.
|
||||
You can give them labels, like metadata, rotate, just whatever you need to do.
|
||||
It's a very, very powerful application.
|
||||
If you're doing a lot of graphics, this could really save you a lot of time.
|
||||
If you are doing art design for a fight or something, working with images, you might find it necessary to send PNG spec files to people.
|
||||
A lot of people don't necessarily want or know what to do with a full-fledged SVG file.
|
||||
Maybe you don't really have a good-looking SVG version of it yet.
|
||||
Maybe you've reached the way I work with it.
|
||||
Inkscape is all have like 20 different ideas on one file.
|
||||
So it's not very convenient to send that entire scratch pad to the person who needs the art.
|
||||
It's better to just make your selection and export just that selected area as a PNG.
|
||||
And then you can convert that PNG to the proper size that you want.
|
||||
You can add a background to it, whatever you want to do to it, with an image magic.
|
||||
So image magic is a really great little tool.
|
||||
You can use it if you want. Be aware of it anyway.
|
||||
You know because you just never know when you're going to need some quick image manipulation.
|
||||
There's just no reason to fire up an entire graphic app, just to resize an image by 50%.
|
||||
So thanks for listening.
|
||||
This has been Hacker Public Radio.
|
||||
If you have questions, you can email me.
|
||||
gort.clap2 at gmail.com.
|
||||
If you want to be a part of Hacker Public Radio, then you can go to hackerpublicradio.org.
|
||||
Email the administration of that site and they will contact you with show ideas or information on how to do a show.
|
||||
If you have an idea for a show, it's very open.
|
||||
And they're really nice there, so talk to them if you want to do an episode.
|
||||
Image magic, HPR, great combination.
|
||||
Thank you for listening to Hacker Public Radio.
|
||||
HPR is sponsored by Carol.net, so head on over to CARO.ENC for all of her team.
|
||||
54
hpr_transcripts/hpr0073.txt
Normal file
54
hpr_transcripts/hpr0073.txt
Normal file
@@ -0,0 +1,54 @@
|
||||
Episode: 73
|
||||
Title: HPR0073: Google 411 Update
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0073/hpr0073.mp3
|
||||
Transcribed: 2025-10-07 11:01:31
|
||||
|
||||
---
|
||||
|
||||
music
|
||||
Everybody, this is Lunar. I'm back with an update. We're going to 7-11 now, and we're
|
||||
going to have to the pay phone. We're not going to say where I went out to the pay phone.
|
||||
I decided to check with Google 4-1, you know, that's around. I called, I was actually
|
||||
outside using the pay phone, and I called to work to screw with my coworker one night.
|
||||
Then I decided to check in on Bell's mind, and this is what I got for the call to go through.
|
||||
Brandon Florida.
|
||||
Brandon, come in Florida. Go back.
|
||||
Go back.
|
||||
You can also type in the five digits of code. What city in state?
|
||||
Brandon, Florida.
|
||||
Brandon, Florida. What business name? What category?
|
||||
Bell's mind.
|
||||
Bell's mind. If that's not right, take, go back.
|
||||
Searching.
|
||||
There was no direct match, but here are some related listings.
|
||||
Number one, Bell's mind pbx and blurm on Bluff View Lane.
|
||||
To select number one.
|
||||
One.
|
||||
Or snubber one, Bell's mind pbx and blurm.
|
||||
On Bluff View Lane, I'll connect you, or say details, or go back.
|
||||
Hold on.
|
||||
My pbx.
|
||||
To listen to Evan Doorbell, group bell recording.
|
||||
Press month.
|
||||
To listen to the radio freak episode archive.
|
||||
You are sure it may be the only person in this conference.
|
||||
As you can see, I can call 1-800-Google-411, Goog-411, and I can connect to the pbx.
|
||||
I'm sorry, I'm just too happy right now.
|
||||
So now you can connect to the conference from anywhere.
|
||||
You can freak on phones.
|
||||
You can talk to people wherever.
|
||||
Startup conferences on the pbx again.
|
||||
Guys, we really need to start up conferences.
|
||||
You know, this brings in a whole new light, a whole new situation.
|
||||
You can call people for free long distance.
|
||||
Just have them call this 100 number.
|
||||
You call the 100 number.
|
||||
You meet in a conference.
|
||||
Free fucking long distance.
|
||||
Just keep this going, guys.
|
||||
This is Lunar and I'm out.
|
||||
Thank you for listening to Hack with Public Radio.
|
||||
HPR is sponsored by Carol.net.
|
||||
She'll head on over to C-A-R-O.N-C for all of her C-E.
|
||||
Thanks for watching.
|
||||
Thanks for watching.
|
||||
8590
hpr_transcripts/hpr0074.txt
Normal file
8590
hpr_transcripts/hpr0074.txt
Normal file
File diff suppressed because it is too large
Load Diff
46
hpr_transcripts/hpr0075.txt
Normal file
46
hpr_transcripts/hpr0075.txt
Normal file
@@ -0,0 +1,46 @@
|
||||
Episode: 75
|
||||
Title: HPR0075: Collapsar
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0075/hpr0075.mp3
|
||||
Transcribed: 2025-10-07 11:01:56
|
||||
|
||||
---
|
||||
|
||||
Let's go and see what I got for today.
|
||||
Hello and welcome to Hacker Public Radio.
|
||||
This is the MeroVinji coming to you today to discuss a little more virtualization.
|
||||
In episode previous, I've discussed a few virtualization topics.
|
||||
The most recent being it entails VT chipset.
|
||||
Now the VT chipset being their virtualization technology chipset, which ultimately allows
|
||||
for better utilization of the CPU to the VM, the virtual machine monitor.
|
||||
Today we'll be taking a different look at virtualization with some research that came from Purdue University.
|
||||
The title of the paper, particularly that I'm looking at, is Collapsar, a VM-based architecture for network attack detection center.
|
||||
Now this is an article that I will be including a link for in the show notes.
|
||||
So feel free to go and pick up a copy of this from site seer.
|
||||
What they are looking at with this research in particular is creating a center, a system of computers,
|
||||
in this case their VM-based computers, that sit off-site from your production network and will take bad packets and ultimately receive bad packets
|
||||
that were to have been sent to your production network and instead trap them within their center for analysis and for understanding of the bad packets or of the nature of the bad packets.
|
||||
Now this is done by three main functional components, which are the redirector, the front end, and the virtual honeypots.
|
||||
Now the redirector's job is to, the redirector is a machine that sits on your production network and its job is to recognize bad packets as they enter your network.
|
||||
Once the redirector becomes aware of the bad packet, it will then trap the packet and encapsulate it into a new packet which the redirector will send on to the front end of the Collapsar center.
|
||||
Now once the front end receives this packet from the redirector, it will then look at the packet to understand what production network came from because it is possible that the Collapsar center is receiving traffic from multiple production networks.
|
||||
So it will look at the packet to see what production network it came from, decapsulate the packet, and then will dispatch the packet to the intended virtual honeypots within the Collapsar center.
|
||||
Now of course obviously I said the intended virtual honeypot. Now that bad packet was not intended for a honeypot, instead it was intended for a machine on your production network.
|
||||
So what the Collapsar center will do with the, again the third functional component, the virtual honeypot is that the Collapsar center will generate a virtual honeypot that appears to be the original target machine.
|
||||
Now there is of course a little bit of issue that can develop because it is possible that the virtual honeypot is a completely different operating system lying on it than the original or the intended target.
|
||||
But the scalable nature of the Collapsar center would allow or could potentially allow for the virtualized honeypots to be any type of system, whether that be any, you know, some version of Linux, some versions of Windows and other operating systems.
|
||||
So the potential is there that the Collapsar center could generate a honeypot that does mimic exactly the original target of the attack.
|
||||
Now with the Collapsar center within itself, you know, there are other types of assurance modules, as they call them, which are basically like a logging module to keep logs of everything of all packets, you know, incoming all packets that attempt to go out outgoing because you could have the ability to block outgoing packets as well as maybe a targeting module,
|
||||
an opening module, an correlation module, as well as, you know, other statistical modules and things like that.
|
||||
In addition to the conceptual model for the Collapsar center presented in the paper, they actually have a case study involving three incidents, three separate incidents of compromises that occurred within the virtualized honeypot, virtualized honeypots within the Collapsar center.
|
||||
The first virtualized honeypot was a Linux VMware honeypot that had a version of Apache server running on top of Red Hat 2.8, and ultimately the Apache service was compromised and researchers were able to examine that and understand how exactly that they did so.
|
||||
The second attack was a Linux UML honeypot that involved a Samba server running on top of Red Hat 7.2 that became compromised.
|
||||
The third virtualized honeypot in this case study was a Windows XP VMware honeypot, and this incident involved the RPC decom of vulnerability which ultimately led to this machine getting compromised with the MS blast worm and the Nazi worm.
|
||||
Now these were three separate events that researchers were able to isolate and to look at and understand how each of these events occurred, but part of Collapsar includes the correlation module that allows each event to be correlated with the Collapsar logs and the network traffic
|
||||
that was entering Collapsar from the different redirectors. So they were able to not only look at the computer itself and the inbound outbound connections for that computer, as well as all the files and everything that were compromised, but were able to even step away from the computer almost to the next hop, this case being the front end for the Collapsar center, and to look at all of the packets as they were coming in.
|
||||
They were coming in to analyze them at that point and were able to ultimately were able to pull a lot of information from these three separate attacks.
|
||||
Now all this research that is very interesting came out of Purdue, this article that I'm particularly looking at came out in 2004, so I'm sure that with any continued research that the Collapsar center at this point has only gotten better and stronger, and so I would definitely encourage people to, again, download this article, look at it.
|
||||
If you're interested, maybe pursue any other research that Purdue University has released with regards to this.
|
||||
Again, I would like to thank you for listening to Hacker Public Radio. If you have any questions for me particularly, you can usually find me in the Infanomicon IRC chat room, which can be found on the free note server, or you can email me directly at MiroVinji at gmail.com. Thanks again and have a wonderful day.
|
||||
Thank you for listening to Hacker Public Radio. HPR is sponsored by caro.net, so head on over to caro.nc for all of us in need.
|
||||
Thanks for listening to Hacker Public Radio.
|
||||
Thank you very much.
|
||||
36
hpr_transcripts/hpr0076.txt
Normal file
36
hpr_transcripts/hpr0076.txt
Normal file
@@ -0,0 +1,36 @@
|
||||
Episode: 76
|
||||
Title: HPR0076: Tech Music: W1f1 Hax0r
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0076/hpr0076.mp3
|
||||
Transcribed: 2025-10-07 11:02:04
|
||||
|
||||
---
|
||||
|
||||
Mom and father.
|
||||
Mom!
|
||||
Why?
|
||||
Where than was Franklin Rice?
|
||||
He died in English.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
.
|
||||
96
hpr_transcripts/hpr0077.txt
Normal file
96
hpr_transcripts/hpr0077.txt
Normal file
@@ -0,0 +1,96 @@
|
||||
Episode: 77
|
||||
Title: HPR0077: This old Hack Part 7
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0077/hpr0077.mp3
|
||||
Transcribed: 2025-10-07 11:03:01
|
||||
|
||||
---
|
||||
|
||||
That's a missing part.
|
||||
Okay, welcome to an unintended episode of this old hack with Adam.
|
||||
Thank you very much for your time, and I'll see you in the next video, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye
|
||||
bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye-bye, bye
|
||||
excuse the background noise I've had a little technical difficulty here with my motor vehicle it seems that in the process of driving to work I blew the
|
||||
upper radiator hose on the car in in the process I also backed it kind of down an embankment so I'm out here on the side of the road I'm trying to find right now I'm trying to find a spot to hook my tow straps
|
||||
so first thing I'm going to do is I'm going to pull the car out of the ditch with the van and then I'm going to move the car
|
||||
back and drive it a few feet over to the other side of the road where I've got a little more level to work
|
||||
this shouldn't be a big deal the car is not that far off of the road it's really good
|
||||
we've got a block in the road here but it shouldn't be a big deal
|
||||
okay well I got the car out of the ditch which wasn't very difficult at all and I know it doesn't have any water right but I'm going to check the oil
|
||||
to make sure it's got oil in it obviously I knew it had oil in it but I wanted to make sure that it didn't get hot enough to blow the head gasket
|
||||
now the easiest way to tell if you throw that head gasket is if you check the oil instead of being black or brown
|
||||
it is a milky color foamy kind of grayish bubbles in it maybe
|
||||
that'll be a sign of the head gasket tomorrow so now I'm going to see the car start
|
||||
okay we have starting and I'm just going to go turning around
|
||||
it should run without water in for a minute or two before it gets so incredibly hot
|
||||
so it seems to be the only problem that I had was it got hot and melted the thermostat
|
||||
it got hot melted the radiator hose oh there's some underlying issue so I'm just going to pull off to a more level spot
|
||||
here and since I didn't have to drive it too far I don't have to worry about the engine being too hot to work on
|
||||
obviously I've brought my tools with me to remove the radiator hose which found my experience with doing color work here
|
||||
is that it's usually best to take part with you before you go to the auto parts store
|
||||
just in case they give you the wrong one
|
||||
it used to be the radiator hose was easier to get to without requiring any special tools
|
||||
but in this case there's some minor plastic trim that is in the way
|
||||
I've done a few most of the repairs I think I've done like this abandoned on the road
|
||||
in a parking lot somewhere at a Walmart gas station truck stop something like that
|
||||
my wife and I spent a long time traveling around the country a couple years moving in a van
|
||||
we had a 77 Dodge one tonne tradesman full-sized van and we only paid $400 for it
|
||||
and we drove it back and forth across the country a few times
|
||||
I think the most interesting repair I had to do we were in Wyoming
|
||||
and I'm trying to think of the name of the town not Cheyenne I don't think
|
||||
but it was some town in Wyoming and the only time I explained a little bit something about the van
|
||||
the cars you can just open the hood and get at the equipment with mans you have to have a thing called a dog house
|
||||
so a dog house is actually inside the van it sits between the front seats
|
||||
and with older vans they're pretty easy to get up so it wasn't a big deal
|
||||
what happened was just traveling I checked the oil every morning to make sure that it...
|
||||
to make sure that the oil level was okay but the filler rod that goes into the motor
|
||||
because you can't just open the hood and check the oil there has to be a long shoot since the motor's between the seats
|
||||
there has to be a long tube for the dipstick to travel down to get to the motor to check the oil
|
||||
so it's a longer dipstick because the motor's farther away from the front of the van
|
||||
and the tube that holds it came loose from the motor which meant that I had to take the dog house off
|
||||
in order to fix that well when I took the dog house off I noticed that the fuel line going into the carburetor
|
||||
was broke almost in half and gasoline for some time had been leaking onto the carburetor
|
||||
which is of course on top of the engine which could cause a large fire and or explosion
|
||||
well lucky for me that we've noticed that problem before we had an explosion
|
||||
lucky for us I happen to have a plunging kit normally it's not something you normally fix on the side of the road
|
||||
pretty much what you do is you make a flare I guess it's called a flare tool
|
||||
a flare on the metal hose and it fits into a fitting which makes it compressed down on to whatever you're attaching to
|
||||
brake lines are kind of the same way I had to use it on brake lines and on the fuel line
|
||||
well since I was at a gas station I didn't really have access to go find a new fuel line
|
||||
and since we were kind of pan handling or way around anyway it would have been difficult to purchase
|
||||
anything at the time so luckily for me there was enough extra fuel line there
|
||||
enough play in the fuel line to where I could use my hacksaw I cut off the offensive section of the fuel line
|
||||
and I used my flare kit to make a new flare and reattached it there in the parking lot
|
||||
now this is one of the easiest repairs you can make on a vehicle even on a newer vehicle like this
|
||||
you could easily just have a leather mount tool and you could have probably used that to remove the belt and install the new one
|
||||
those clamps are either compression type where you have to pinch a clamp to remove it or they have a screw where they unscrew to loosen
|
||||
this in this case I've got compression fittings
|
||||
I've taken the old hose off I went to the park store purchased a new hose
|
||||
which I am installing
|
||||
that end in place don't know if I mentioned start with but it's always better to take the old part with you to the park store
|
||||
you can match it up with the new part before you bring it back to the site especially if you're working on it
|
||||
this is called a flare tool you make a flare on the metal hose and it fits into a fitting which makes it compress down on to whatever you're attaching to
|
||||
I had to use it on brake lines and on the fuel line
|
||||
well since I was at a gas station I didn't really have access to go find a new fuel line and since we were kind of pan handling or way around anyway it would have been difficult to purchase anything at the time
|
||||
luckily for me there was enough extra fuel line there enough play in the fuel line to where I could use my hacksaw
|
||||
I used my flare kit to make a new flare and reattached it there in the parking lot
|
||||
hopefully this will fix the problem I don't know why it was overheating unless it was already low on water
|
||||
the hose was in pretty bad shape the car got close to 200,000 miles on it's bottom radio hose isn't looking too spry I don't see any other serious issues
|
||||
I checked the oil so I know it's going to oil it now put these two little things back on here
|
||||
now we'll be putting water in the radiator well not just water
|
||||
but you don't know anything about any trees then you might not live somewhere where it freezes but what happens is in the winter time
|
||||
it gets particularly cold if you've just got straight water in your radiator and able to freeze and at the water freezes we can damage the engine
|
||||
now also they add special lubricants to lubricate the cooling system in the canning freeze
|
||||
so it's always best to use the recommended type of any freeze for your vehicle
|
||||
there's a road coming here so in most places you can use a 50% and freeze 50% water mixture for colder climates I think they'll recommend using a heavier and freeze
|
||||
there's also environmentally friendly air freeze which doesn't contain ethylene glycoil
|
||||
ethylene glycoil is highly toxic and it's sweet to most pets so they won't drink it and die very person dead
|
||||
everything seems pretty good so far temperature seems to be holding steady and we're going to take a little test drive up the road
|
||||
it seems to be running okay temperature level seems normal
|
||||
it's kind of affecting the handling
|
||||
small pressure, chip, battery charging, chip
|
||||
I'm just going to drive the road here, turn around and go back to where the van is at and see I'm ready
|
||||
it seems to be running okay temperature level seems normal
|
||||
it seems to be running okay temperature level seems normal
|
||||
go back to where the van is at and see I'm ready
|
||||
I'm ready
|
||||
I'm ready
|
||||
363
hpr_transcripts/hpr0078.txt
Normal file
363
hpr_transcripts/hpr0078.txt
Normal file
@@ -0,0 +1,363 @@
|
||||
Episode: 78
|
||||
Title: HPR0078: Interview Tips
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0078/hpr0078.mp3
|
||||
Transcribed: 2025-10-07 11:05:54
|
||||
|
||||
---
|
||||
|
||||
......
|
||||
......
|
||||
Hi, this is Ken Fallon and this is a very very different episode of Hacker Public Radio.
|
||||
Tonight instead of talking about modems for the Lynx Professional Institute certification
|
||||
exam, I'm going to instead talk about another topic largely because I don't want to talk
|
||||
about modems because I hate the things I hate them under HPUX, I hate them under
|
||||
the veil, I hate them under those two warp, I hate them under windows, I hate them under
|
||||
Lynx, so I'm not a big fan of modems per se, so if there is anyone out there who is a
|
||||
big fan of modems, I want to do the LPI certification exam section on modems, please please
|
||||
please feel free to do one you have my blessing and I need if you want to do any other topics
|
||||
feel free feel free to do so, and recording this on crappy mp3 player largely because I've
|
||||
got a whole golf stuff in my head and I want to get it down in my modems as an episode
|
||||
and if it does, I truly apologise for the crappy audio but I hope you forgive me, okay
|
||||
the topic I want to talk to you about tonight as I walk home from Zoom pool is about job seeking
|
||||
not so much job seeking as the interview process, what you can expect when you're going
|
||||
to an interview, what you should and shouldn't do, so first of all let's assume that you've
|
||||
gotten a job, I've gotten an interview for a position, now what normally happens is companies
|
||||
will get a free space for a position and they'll have a budget in their head, the reason
|
||||
I know this is I've been on both sides of the interview desk and have hired several
|
||||
people, been on one to technical interview board where with several people who have been
|
||||
hired so I have a fair idea what's going on both sides of the desk, this applies to
|
||||
my experience and may your mileage may vary as they say, maybe different in other countries
|
||||
and in my experience, this is Western European experience, what tends to happen is I at
|
||||
least will go to somewhere like Monster Board, look for type in something like Linux for
|
||||
instance, type in my location and select how far away I want to be and what's kind of
|
||||
handy with Monster Board is they do an RSS feed so you can put that into your feed reader
|
||||
and every day you get a list of new available positions, now this is something that probably
|
||||
everybody should do anyway because I can open past people here and get very strange looks
|
||||
but then here, this is something that you should do anyway to keep yourself up to speed
|
||||
with what's going on in the market, what the going away for your position is, what potential
|
||||
employers are looking for so it'll keep you eye open for what sort of training you should
|
||||
be doing, what direction you want to take your career and so if you see a lot of companies
|
||||
looking for Microsoft Exchange for instance, you might think that's something you'd like
|
||||
to do, you might be able to get your employer to send you off on Microsoft Exchange course
|
||||
or get the MSGN CDs and have a play with it, okay so what will typically happen up
|
||||
with the Monster Board or one of these employment job seekers or whatever is they, the company
|
||||
will have farmed out the job application to employment agency and the employment agency's
|
||||
job is to sit there and basically weed through the crap and they will be getting somewhere
|
||||
between 10 and 20% of your first year's salary, so whatever your salary is in the first
|
||||
year, they will be getting 10 or 20% of that, now you don't have to pay that generally
|
||||
your employer will, so this is from the point of view an employer hiring a person is
|
||||
extremely extensive, the general trend in every company I've worked for recently has
|
||||
been to try and lower the number of FTEs, full-time employees as much as they can, so you
|
||||
got to bear in mind that when they do get a budget to hire somebody they really want
|
||||
to make sure that they're hiring the best person, not just technically but they don't want
|
||||
to hire a complete asshole who's going to come in and disrupt their team, they're looking
|
||||
for somebody who will fit into their organization, now they've got one chance at this stick, especially
|
||||
over here in Europe where employment you can't just fire somebody, you have to have reasons
|
||||
three formal reasons in rising and then the union gets involved and bloody, but it's very
|
||||
very difficult to get rid of people over here, so it's equally difficult to, it's equally
|
||||
difficult to convince your employer, your potential employer that you're the right person
|
||||
for the job, and you've got to understand from their point of view they don't, you know,
|
||||
what they've got at stake, also whatever you guess in salary, whatever you earn they
|
||||
will be paying double that, the general rule of thumb is whatever you earn in health benefits
|
||||
in parallel social insurance, not all the rest of it in pensions, a lot of the good stuff
|
||||
is about double what you're getting, so it can get extremely expensive hiring full-time
|
||||
employees which is why the whole trend of outsourcing looks very good on paper at least.
|
||||
Adieu, so you're going through Monster Board, you're going through your feed reader and
|
||||
you see a nice position that you'd want to apply for, so the first thing you should do
|
||||
is have a good CV, your CV, the last general rule, the structure of your CV, a CV for Americans
|
||||
is a resume, your structure of your curriculum, vitaire, a resume, varies from country to country
|
||||
and you should do your, I'll call it a CV, okay, you should do your CV to the style of
|
||||
the country that you're in, the last school of thumb that it should only be two pages
|
||||
long, but I think it should be as long as it needs to be. I've seen some very, very short
|
||||
CVs which tends to be the thing in the States, keep it short and I've seen applications that
|
||||
have gone to 18 pages or so. And you're going to realize that what's the normal rule of
|
||||
when you're doing your curriculum vitaire is to have a story, and when you do an interview
|
||||
as well, the thing to have is a story, you have education, you have training, you progress
|
||||
into a job that was probably fairly crappy, you've got more training, you've got more experience,
|
||||
you've moved on, you've moved on to the next thing and the reason you, and the should also
|
||||
in your head for the interview reasons why you moved on to the next thing. Okay, so you've
|
||||
got your education in there, in there and you've got your work experience in there, you've
|
||||
got some courses in there. Now what's very good for the search engines and stuff is that
|
||||
if you put in very hot topics, if you're looking down the list of jobs, the monster board
|
||||
or whatever, and you see, they're looking for somebody with TCP, IP experience and somebody
|
||||
with DNS and somebody with whatever. So you look for the buzzwords and you make sure that
|
||||
they are in your CV, and that will help the search engines. When their employment agencies
|
||||
have your CV on file, they'll go down there and search for those and your CV will come
|
||||
up. Okay, so the next thing that will happen is you apply for the job and your cover letter
|
||||
you'll say, I saw your interesting job, the subject should be the title of the job, ideally
|
||||
with the job number so that they have a reference to it. And then it's a dear whoever it was.
|
||||
And yeah, I'm walking in the middle of Heathers. You should reference the job by name. You should
|
||||
then clean up. You should reference the job by name. You should say, dear sir, I read the application
|
||||
for, I saw the advertisement for this position wherever you saw it so that they know who to pay
|
||||
because they have to pay these boards or whatever. Very interesting position. I think I'm ideally
|
||||
suited and very shorting why you're ideally suited to the position. If you'd like to contact me
|
||||
about this, please find my CV attached and contact me on the following number. Make sure you have
|
||||
the number in the body of the email so that if your CV gets lost, that they'll be able to contact
|
||||
you again. Okay, so then if your resume looks okay or CV looks okay, what chances are they're
|
||||
probably going to call you and they're going to give you a little bit of a, they're going to walk
|
||||
through your CV and they're going to ask you where you want to work, where you wouldn't want to work,
|
||||
the reason you're leaving your current job and all these sorts of things that you will typically
|
||||
be asked in an interview so I'll get to that in a minute. Okay, so then they will say, oh, I have
|
||||
this wonderful client who wants to bloody, bloody, bloody and you now think, okay, apply for that job.
|
||||
So they go and they will ring up the company and they'll say, we've got this fantastic person
|
||||
and then with Ali look you'll guess called for a first interview. Now they will get into the
|
||||
meat of this show. The first interview, it's sort of important to know a little bit about the
|
||||
company and what sort of dress you should do if you should have on. You can never be too far
|
||||
wrong with visual business casual. Usually slacks, a pair of no runners or trainers, whatever you
|
||||
call them, proper shoes, a pair of slacks, a shirt and a tie. Probably don't need a jacket,
|
||||
but a coat or something. You need to be presentable and not too presentable, whatever you've got
|
||||
a ponytail well combed hair take a bat. Make sure after shave or perfume not too strong. If you've got any
|
||||
jewelry or piercings or whatever, I would say leave them in. Try and tone it down as much as you can
|
||||
to studs, but you don't want to lose your personality either in this if you're going to a position.
|
||||
And for a lot of IT positions, it doesn't actually matter what you look like. They seem to be very
|
||||
flexible. However, you want to look at you put a bit of effort into coming out for the day.
|
||||
Also try not to have any distinguishing marks or jewelry or big watches or
|
||||
funny hats or things. Because the only thing you matter how good your CV is after that interview,
|
||||
all that they will remember is, oh there's a guy with a funny hat or there's a guy with a big watch.
|
||||
Okay, so try and be presentable. Make sure you know where the interview is.
|
||||
Make sure I'll repeat that again. You know where it is. You know how to get there.
|
||||
If you know how to get there and how long it's going to take, allow at least a minimum of 45
|
||||
minutes beforehand to get into the area, into the neighborhood. Also bring the address,
|
||||
the name of the contact person and the phone number of the person that you're going to be
|
||||
having to interview with. And if you went through an agency, you also will need the phone number
|
||||
and the name and the agency name of the person who arranged the interview for you.
|
||||
The reason you need all this is if you are delayed, you know you're going to be delayed.
|
||||
You ring up the company and you talk to the person if that's possible and you tell them,
|
||||
I'm sorry, there's a, there's a whatever reason for the delay. I'm delayed.
|
||||
I understand that if you want to postpone the interview, but that will be, you know, 15 minutes later,
|
||||
whatever. Okay, so, see you arrive there. You should not enter the building.
|
||||
You know try and go have a coffee. Go walk past the building and make sure you know where it is.
|
||||
Go have a coffee or two or something. If you need a smoke, try and smoke before, so you're not
|
||||
thinking of smoke going into the interview. Leave enough time between your last smoke before
|
||||
you go into the interview. You should go in to the interview 15 minutes before you do to go in.
|
||||
So if the interview was at 2 30, you should be there at 2 15. You go up to reception and say,
|
||||
I'm here to see whoever you're here to see. They'll take a coat. I'm going to make you sit for a while.
|
||||
You will have to wait there 15 minutes. Now, what I like to do in those 15 minutes is look around
|
||||
and case the company out. Have a look at the chairs. You get a good feel for what the company is.
|
||||
And at the end of the day, this is going to be a company that you're going to be working for,
|
||||
for at least two to five years. You don't want to leave a company. It looks suspicious if you leave
|
||||
a company before two years, unless you've got a very good reason, unless you're working contract.
|
||||
I'm talking about permanent positions here now. If you're working in a position along with five
|
||||
years, you're heading into the OE. He was very stale. You know, too long in the position is never
|
||||
good too. It's okay if you move from one department to another department to another department,
|
||||
but if you get into sort of 10, 15 years, you need to have a good story backing up why you stayed
|
||||
and how you kept yourself refreshed in those positions. Okay, they will offer you a cup of tea
|
||||
coffee. That's fine. You can accept those. There's no problem. You might also want to avail
|
||||
of the toilet before you go into the interview and wash your hands. The person, so you've out
|
||||
there reception or wherever and then the person who's going to interview will come, you'll stand up
|
||||
and you give them a firm handshake, not too hard, not too soft, practice on a friend. Study handshake,
|
||||
not with wet hands, sort of rub your hand on your clothes as you go off your hands or sweaty or
|
||||
have a, if you're having a cup of tea, you have a tissue in your hand and just make sure your hand
|
||||
doesn't clammy. And then they will bring you to an interview room and now you think they're all
|
||||
allowed to get me or whatever. But what you have to think of is these people have been, are in the
|
||||
middle of doing their work and their agenda has come up. Pop, I have this interview. Okay, we have
|
||||
to drop everything we have to go out and check out this person. So you stand there, if your coat
|
||||
is already at reception, you stand there and you wait for them to do whatever they need to do.
|
||||
You do not sit down until you're offered a chair and then you sit down. Try it up to fidget,
|
||||
get comfortable in the chair, be relaxed. We're probably also a few coffee, that's fine as well
|
||||
because you're now going to be talking for an hour or so, so you need something to drink.
|
||||
Okay, the interview will start and they will typically introduce themselves. I'm Joe Blog and I'm
|
||||
John Doe and this company is whatever and the position is this. Usually they won't go too far into
|
||||
what the position is so much because they're, they sort of want to social out and they don't want to
|
||||
give you any clues as to what the position is going to be about. So they'll start off usually with,
|
||||
tell us a little bit about yourself. Now, more than likely, the second person that's there,
|
||||
the first person who's leading the interview will have read the CVs because he or she will have
|
||||
gone down through the CVs during the selection period and a friend of mine who was very long
|
||||
in the industry once told me that when times were tough they had a job opening and there was over
|
||||
800 applications for the position. What he did was he took the pile of 800 applications and he
|
||||
took the top half and threw it in the bin and when my friend says, what are you doing? He said,
|
||||
well, you don't want somebody working for the company that's unlucky, do you?
|
||||
So the selection might be for any reason, you just don't know. But you're in the door,
|
||||
you've got your foot in the door now, what you got to do is sell yourself. What that means is you
|
||||
don't tell other eyes, absolutely not, tell no lies. However, omitting the truth, omitting
|
||||
turning a different life on certain things might be in your benefit. So say, we'll come to that
|
||||
in a minute. So, be honest, if they ask you, well, let's start off with the first thing that they
|
||||
will ask you is, can you go through your CV? Now, you will go through your CV and what I tend to do
|
||||
is to do my education first. I started as a mechanical engineer and then I was, I got a bit
|
||||
but computable, yeah, yeah, yeah, give them a story and then I went off to work for my first job
|
||||
in wherever. Now, you have to look at them and see whether they're kind of okay with you continuing
|
||||
on or whether they want to ask you some questions about your education. So, if they're okay with
|
||||
you going on, you will go then and I was there and now here's the thing, when you're looking at
|
||||
your CV, you got to have a story. Your whole life was leading up to this job, to job that they have
|
||||
God in her many forms has destined for you to have. So, even if your first job, your flippinburg
|
||||
is in McDonald's, you noticed that the cash register was whatever and you worked yourself up and
|
||||
it was good experience because I was working with people and I learned a lot about management and how
|
||||
time keeping and that's what forward and you know, first-rated employees came in and that helped
|
||||
me later when I was working on the help desk in my second job. So, now you have and then you stop
|
||||
talking there and you give them the bridge to get off your own comfortable first job onto your
|
||||
second job and then your second job, you give a little two-minute little spiel about your second
|
||||
job and then you have again and that's why I went to you know, I realized there that I was very good
|
||||
at this and I wanted the opportunity to whatever. Now, you might you stop there because they may want
|
||||
to ask you questions about particular jobs and if they do, you answer them and as best you can.
|
||||
Try not to be negative about the company, it reflects very badly on you because
|
||||
someday you will be leaving their company and you don't want them back, you don't want somebody
|
||||
back stabbing you or your boss. So, you say, you know, I realized that you know, there were
|
||||
a better suited heaven somebody who was a less experienced than me or we were quite happy to
|
||||
you know see me go on and offer to my next position. But be nice about the company and say,
|
||||
yeah, I finished all working with them and I'm still in contact in all the rest of it.
|
||||
So, where are we now? So, you will continue on through your CV and the question will come up,
|
||||
why do you want to leave your current job and it's okay to have a reason. You probably
|
||||
better have a reason. Some of the reasons I've used in the past is I've met, yeah, I got married
|
||||
and I've just moved over to this country. I love your country. So, that's one and other one is the
|
||||
company has decided to change the focus of their business and you know, I would be fine on the
|
||||
company but I want to leave on my own terms and I have discussed this with my boss and whoever
|
||||
and they're happy with my decision. Okay, but here's the thing. You might not always be
|
||||
happy to to your boss might not be happy with you leaving. So, it is also okay to say,
|
||||
yeah, I feel, you know, I so I wasn't actually thinking of leaving until I saw your application
|
||||
and it seems so suited to me. I thought it was too good an opportunity to pass up, you know,
|
||||
how can anybody refuse your job if your brown nose and that much. Okay, so now comes to
|
||||
the park. They're sitting on the other side and thinking this guy could be good or he may
|
||||
just have listened to a podcast to figure out how to be good. And what they'll now do is try and see
|
||||
if what you said on your CV actually matches. And this is where dude number two comes in typically.
|
||||
Oh, by the way, you may have a HR person there as well. I actually won't, especially for,
|
||||
I didn't interview one time with the semi-state body where there was actually 13 people, count them,
|
||||
13 people in the room interviewed. It was not the head, somebody from the union there,
|
||||
somebody from the management, somebody from headquarters, somebody from the canteen.
|
||||
Honestly, anyway, so we prepared for that sort of thing, go and let us throw you. Also,
|
||||
try and find out the gender of the people who are coming in the culture background if you can.
|
||||
Ask your recruiter that, you know, so you are prepared for
|
||||
I know when I was interviewing with my boss when we were interviewing together kind of,
|
||||
some of the interviews coming in or just shocked that she was a woman and completely through
|
||||
their interview. And yeah, you just can't hire somebody like that. Okay, moving on.
|
||||
Now we get down to the, do you know your stuff? Questions. The whole point of this section
|
||||
is to find out what your limits are. And they will start off something easy questions get
|
||||
sequentially harder and harder and harder until you get to a point where you don't know the answer.
|
||||
And the correct answer to that question is, sorry, I don't actually know that, but I'm guessing
|
||||
it might be and give a good guess as to what the answer might be and also give you reasoning as
|
||||
to why it might be. So if they're asking, I don't know about,
|
||||
to a good example, I can't think of a good example. And if they're asking about how to flip burgers
|
||||
and McDonald's, well, I've never actually flipped burgers, but I've seen people do it. And I think
|
||||
this is how long it should be done. Because for the other guy across, it's important for them to know
|
||||
that if they give, if you're given a task outside the CV and outside the interview arena,
|
||||
so you come to work for them and you may have written on your CV that you can do this. And they
|
||||
assume a level of knowledge that is in there, you will do more harm than good. So it's far
|
||||
better for them to say to know what your levels are. And it's also important for them to know
|
||||
that if you don't know something, you may come and ask them before you make a freaking hands of it.
|
||||
So yeah, be sure and do that confidently. Okay. Which is also why when you put stuff in your CV,
|
||||
make sure you know about it. And there's also no excuse for not knowing about it. Just get a book.
|
||||
If you don't, if you can't afford a book, get download software via my images or whatever,
|
||||
and play with whatever the technology is. And it's also cool to say, well, we didn't use this
|
||||
technology in work, but I downloaded this and my test network and played with it for a while. They
|
||||
absolutely really love that because that is you take an initiative and outside of paid hours,
|
||||
you're working to better improve yourself. Okay, so that is that. I'm looking very much like a
|
||||
weirdo here walking around the heat in the middle of the night talking into an MP3 player. But anyway,
|
||||
we will continue. Where we now, it can go several places now. And the thing during the whole
|
||||
interview is ideally what you might want to do if you've never done interviews before is have
|
||||
set up a video camera and go in and have as somebody who has interviewed before to interview
|
||||
in front of your video camera. And you will see that you're visiting and you're you're every time
|
||||
you don't know like you've got nervous ticks. So you got to try and keep them under control.
|
||||
Sitting down with your hands folded is fine. It's okay to use your hands slightly to give a
|
||||
little bit of expression, but don't overdo it with your hands going all over the shop. Okay,
|
||||
where are we now? Yeah, the technical questions might get a bit hairy, but again,
|
||||
they might also ask you stuff where there's no right answer. They might ask you
|
||||
now they will ask you other trick questions and you can search the internet for all
|
||||
go of trick questions. If you're really hit your person, they will guarantee to ask it is.
|
||||
First of all, what's your worst? What's your best quality? Well, my best quality is
|
||||
a bad bad bad. Make sure you know what it is. Pick a best quality. That is your best quality and
|
||||
and say it. What's your worst quality? Well, now what's your worst quality as well? I like to
|
||||
freaking pick flow out of my navel in the middle of lunchtime. No wrong answer. You pick something
|
||||
that is actually a good quality and you turn it so it's a bad quality. For instance, I like I get
|
||||
sometimes so involved in my projects that I stay too long and work too long in it or sometimes
|
||||
I get frustrated with people who are slacking off and then you must always qualify it, but I'm
|
||||
trying to improve myself. So I found, so with the first example project management, I found that
|
||||
I've done some project management course and I've found that I'm now slowly improving and
|
||||
that I'm better able to. Well, project management is a bad one because everybody has to project
|
||||
management, but okay, the other example about a team is say I never have a problem with somebody
|
||||
who's willing to learn, but somebody who's just coming in day in day out with no motivation
|
||||
brings down the motivation of the team and you have to try your best to keep the motivation of
|
||||
the team up. And you're always a team player and a matter of what and you're always willing to
|
||||
to work on your own if necessary. Okay, where do you see yourself in five years time?
|
||||
You stupid question, I'm stupid, I'm disgusting in the whole world because any tech person knows
|
||||
that in five years time, some radical new technology might have come out and completely
|
||||
obliterated off the world, but resist the temptation to smack the person about their face
|
||||
and sit down, come up with some good bullshit answer for that. I'm not going to give you one
|
||||
because mine is patent pending. And usually I say I want to be a technical expert in my field is
|
||||
pretty, pretty standard answer to that. So it's the third term going past. Yes,
|
||||
where goes all the new gear list from Germany?
|
||||
Anyway, where are we? Yes, stupid other questions you can be asked. Why would you want to work
|
||||
for us? And that's a simple one, you go down to, you give the real answer to your real question,
|
||||
that was about the CV, about the job application that they do want to apply for the job in the
|
||||
first place. I am desperate is not a good answer. Things like you're well-known in the community
|
||||
for being a good employer, see the position here seems exactly, it seems to match my skill level,
|
||||
I'm looking forward to working, whatever's written there, you just give them the answer back.
|
||||
There will be more HRA type questions. You really don't know what that can be, there's a trend now
|
||||
to ask completely off the wall. If you were to meet the who in the world would you like to meet
|
||||
most and why? Okay fine, try not to slap them about the face as I said before and just try to
|
||||
come up with a reasonable answer. They will deliberately, they're just trying to know if you're going
|
||||
to get panicked under under pressure, basically the red some HRA book and they're trying to impress
|
||||
everybody else, but hey we all, when you get in the company you're never going to see HRA again
|
||||
or hopefully you're not unless you do something stupid anyway, well that's a subject for another
|
||||
podcast. Okay, where are we now? Now after that uncomfortable bit, you know, you should also
|
||||
get a few for what they're, what they're, the people employing you are like, you should also try
|
||||
for yourself. You know, to have a look around the office and then they will say, do you like,
|
||||
do you have, right, that's fine and they'll probably go on to explain more about the job
|
||||
and more about the company. They will if you have impressed them up until a point. This is where
|
||||
the interview you can tell if the interview has gone well or gone badly. If it's gone well,
|
||||
they will start telling you about the job and they'll probably give you a short spiel anyway,
|
||||
even if you know in your heart hearts that you know everyone will employ you and then they're
|
||||
just going to try and get you out of the building as quickly as possible. On the other hand,
|
||||
if they really start explaining the job to you in detail and if you have questions about it,
|
||||
now is the time to ask them like how many people are in the team, what's the, you know, if there's
|
||||
something like, you do want to work support. You know, you don't mind working 24 hours support
|
||||
and they haven't asked that. You say, is there 24 hours support? And they go, oh yeah,
|
||||
do you mind working 24 hours support? No, enough to tell them my previous job. And that's a good
|
||||
point for you. Or they'll say, no, you say, and they will probably go why and you make sure,
|
||||
if you bring that up, you make sure to explain why that you don't mind.
|
||||
And if they, if they like you, they will probably, if you're thinking about hiring it,
|
||||
they'll probably bring you in to see the factory floor or whatever they're most proud of.
|
||||
The computer room or I don't know, the server under the desk or meet the other people,
|
||||
you know, quickly walk around the office. If they're likely, if they don't, they will give you a
|
||||
call on them on the golf. And they will probably ask you about, do you have any questions?
|
||||
The number one question you should never, ever, ever, ever ask is how much money is there on
|
||||
this job? Do not ask that. There will be plenty of time in the second interview for all that.
|
||||
You only answer that if they ask and you start off the answer to you, that question is, well,
|
||||
I, this move for me is more about the position than that it's such an idealistic position.
|
||||
However, I am currently earning this and I would expect to earn that. And you should know these
|
||||
numbers beforehand going in. Don't bring them up in the first interview again to reiterate,
|
||||
do not bring them up unless you've been asked to ask the question.
|
||||
Now, the next thing is the finish up. You should have a few questions lined up. If you can't
|
||||
think on your feet or if there was anything in the interview, if you're not sure whether it's a
|
||||
good question or not, you should have a few two questions lined up about the job. Is there
|
||||
much of that? Make sure that the questions are something that is going to be positive if they ask
|
||||
you more questions about it. And you should then end off with, well, do you have anything else?
|
||||
Well, just one other thing is, what is the next, what is the procedure if I'm lucky enough
|
||||
to get invited for a second interview? What is the procedure? And then they will explain
|
||||
that your blog will contact you blah, blah, blah. You will stand up. You will thank them for their
|
||||
time. Shake the hand, the left scorch to the door and you go out. And you do not jump into the air.
|
||||
You do know whatever. You're a steer in the interview until you get a kilometer away from
|
||||
wherever it is. You should act exactly as you would be nice, calm and collected.
|
||||
And then the first thing you should do is with, oh, by the way, your mobile phone off,
|
||||
join in if you turn it off. Then what you should do is when you have the, when you're that far away,
|
||||
you should pick up the phone and you should contact the employment agency and speak to them
|
||||
and give them feedback on the interview how it went. Where there's some tricky questions,
|
||||
who was in the interview and all that sort of thing. Anything else? That more or less will be the,
|
||||
you should hear back pretty soon, all not, however long it takes. And then that should be
|
||||
more or less it for the first interview. If you get called to a second interview, the same rules
|
||||
apply, be there on time, make sure you have your mobile phone off, be dressed correctly. Second
|
||||
interview can go anyway. It can be a very technical interview. It can be with a HR person.
|
||||
It might even be, it might be just a walk around. Second interview is as much about,
|
||||
this is much about them selling their company to you as it is about you wanting to work for them.
|
||||
Because now they have shown their hand, they've shown that they're interested in you and
|
||||
that you're not interested in. The case may be that for the second interview, there may be a
|
||||
short list of people in which case you do need to continue selling yourself. The technical questions
|
||||
might get harder. They might have thought of a lot of questions that they hadn't asked before.
|
||||
So all of these things might come up in the other hand, you might walk in and it might be
|
||||
walk around, meet the managing director, meet the lady in the canteen and don't underestimate those.
|
||||
Because a lot of you, a lot of a lot of thought are considered to be
|
||||
andcillary workers by most people are made in there since the company was founded and
|
||||
no more about the company than then anyone else and maybe also asked about
|
||||
to give the opinion of a candidate and I've known people who if the cleaner didn't
|
||||
like the look of the person and they weren't hired. So anything else? I don't know,
|
||||
if you are looking for a job and going for other positions, remain calm, don't panic.
|
||||
One thing I've always noticed when you're looking around is if you have a look at the
|
||||
the types of chairs in the mission room, if they're all matching and comfy and
|
||||
honest chairs, then yeah, it's a company who's got a shit together. If there's one chair from one
|
||||
type and another chair from another type, it might be a more dynamic company or they don't have
|
||||
money or cash to spend on stuff. So yeah, probably questions that
|
||||
questions that you may be allowed to ask would be you should discuss them with your interview
|
||||
with the consultant job consultant before or after one second. Two seconds. Like for instance,
|
||||
if they say, oh there's a great position because there's loads of greenhouse training and they're
|
||||
very proud of that, well then you go, is there much training for this job? Okay, well that's my
|
||||
episode of Hacker Public Radio. Again, if somebody has something about modems, not when modems
|
||||
just analog, ordinary analog modems, can you please do an episode and send it in. Thank you very
|
||||
much and have a nice day.
|
||||
17
hpr_transcripts/hpr0079.txt
Normal file
17
hpr_transcripts/hpr0079.txt
Normal file
@@ -0,0 +1,17 @@
|
||||
Episode: 79
|
||||
Title: HPR0079: Tech Music: PLA Radio
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0079/hpr0079.mp3
|
||||
Transcribed: 2025-10-07 11:06:05
|
||||
|
||||
---
|
||||
|
||||
For more information on the project, please subscribe to get as soon as possible.
|
||||
He's gonna call you and say cactus, off your business for what customer service he'd rather be.
|
||||
Boy, you're both routine eye when you sleep at night.
|
||||
He'd better use his red box tones, then put his cores in the local play phone.
|
||||
He's the phone user that everybody knows.
|
||||
RBCP on PLA radio.
|
||||
When you've caller ID says cactus, you'll know.
|
||||
Then it's RBCP on PLA radio.
|
||||
RBCP on PLA radio.
|
||||
PLA radio.
|
||||
191
hpr_transcripts/hpr0080.txt
Normal file
191
hpr_transcripts/hpr0080.txt
Normal file
@@ -0,0 +1,191 @@
|
||||
Episode: 80
|
||||
Title: HPR0080: Coffee
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0080/hpr0080.mp3
|
||||
Transcribed: 2025-10-07 11:08:07
|
||||
|
||||
---
|
||||
|
||||
This is Class 2 and I'm going to be talking about coffee.
|
||||
Coffee is one of my favorite beverages and it's also a very classic beverage that accompanies computer hacking and coding and late-night artwork and things like that.
|
||||
It's always better if you've got a good cup of coffee close at hand.
|
||||
There are different stages of coffee making and you can jump in at any stage.
|
||||
Obviously the most typical one that we're used to is you go out to the store, you buy the coffee off the shelf and bring it home and you make it in whatever fashion you wish to make it.
|
||||
So right then you've already missed out on the roasting so you can certainly roast your own beans.
|
||||
There are a little bit hard to find. I've not found them in stores at all in any city that I've lived.
|
||||
But what you can do is find them online and the advantage of buying them unroasted in their raw form is that you're not losing any of the essence of the coffee bean.
|
||||
Because once it's been roasted the oils of the bean start to leak out of the bean and so you're kind of losing the purity of the coffee out of that way.
|
||||
Most of us aren't ever going to notice that because we're so acclimated to the taste of coffee that has been sitting around even in vacuum packed containers.
|
||||
I guess a purist would say that you'd need to roast it yourself to get the most flavor out of it.
|
||||
So if you do that you're going to get some really good coffee as long as you know what you're doing roasting them.
|
||||
And it's just a matter of practice. So what you'll do is you'll buy the beans.
|
||||
Lots of different varieties of coffee. You're going to see different ones advertised. There's Kona Coffee from Hawaii.
|
||||
Blue Mountain from Jamaica. I like Sawtooth Mountain which is I buy it in Southern California. I don't know where it's from but it's very good.
|
||||
Lots of different kinds. You want to make sure if you're buying the raw coffee beans you're probably getting a pure...
|
||||
You're getting just that kind of coffee that you are looking for.
|
||||
Not so much if you're getting it in a container even if it's on ground. Although usually if it's on ground you're actually usually getting it.
|
||||
But sometimes you'll see in containers you'll see it being advertised in big print as Kona or something.
|
||||
And then once you get it home and you look at the fine print and you realize it was a blend of some cheaper coffees along with the nicer coffee.
|
||||
So if you're getting the raw stuff you're usually... you can usually rest assured that you're actually getting what you think you're buying which is nice.
|
||||
So you take the beans home or you get them delivered whenever and you'll want to roast them some way.
|
||||
Now there are professional roasters out there but from what I've seen of these roasters they're very large, unwieldy. I think they're meant primarily for large batches of beans.
|
||||
Not really something that you'd have in your apartment. Maybe if you have a large house and you're really dedicated you would have one of these.
|
||||
Typically the ones I've seen at least are very... they're pretty hefty pieces of machinery.
|
||||
Second to this would be perhaps a skillet and a gas stove. You probably need gas because you're going to need to get this really, really hot.
|
||||
You take your skillet and you put it on the gas stove, heat it up to about 500 degrees and if you want to be precise you can get an oven thermometer and throw that in the skillet and see what happens.
|
||||
Eventually you'll reach a very, very high heat. Like I say especially on a gas stove you can reach that kind of heat. I don't know if you can do that on an electric stove at all.
|
||||
So you've got your skillet. You throw some beans in there. Not too much. You just kind of want to cover the surface of the skillet and you want to keep the beans moving. You don't want to scald or scorch rather the one side of the beans.
|
||||
What you want to do is you get them evenly heated up. They're going to start smoking first of all. If you've got a very sensitive fire alarm anywhere near your kitchen you want to have your exhaust fan on.
|
||||
But you'll want to keep them moving and they're going to start smoking and you'll start to hear them kind of pop and crack a little bit.
|
||||
What's happening is that the moisture from the bean is evaporating and at the same time of course the bean is getting very, very hot and it's cooking.
|
||||
So you'll keep them moving and eventually they'll, at first the smoke, the fragrance is going to be fairly, it'll be kind of fresh like what you'd expect out of a green berry or a green bean.
|
||||
But what you'll eventually get to is a more cooked smell.
|
||||
At that point the beans will start to get darker and they'll start to take on the appearance, the more traditional appearance of what you're used to of a coffee bean.
|
||||
Now, once you start seeing them look traditionally like a bean you'll want to take them off of the fire eventually.
|
||||
When you want to do that is up to you whether you want the traditional dark roast or a lighter roast or whatever you want.
|
||||
And you kind of have to play it by sight, you just kind of have to get a feel for it. You also have to know what you like.
|
||||
You also have to keep in mind that coffee beans or anything that you're cooking.
|
||||
You might take them off the fire but there's still a lot of residual heat so they're going to essentially continue to cook.
|
||||
Some people will try to blanch the coffee beans by pouring water over them to try to stop them from cooking after they're off the fire.
|
||||
But you don't really want to do that because if you do that you're basically making coffee before you are making coffee.
|
||||
You want to save the water for when you want to drink it. You don't want to use water to cease it from cooking.
|
||||
So the idea would be to take it off of the fire a little bit before you really want to take it off the fire and let it residual cook perhaps in a colander or some kind of bowl preferably a colander so that there's a good air flow.
|
||||
And kind of shake it a couple of times not too rigorously but you just want to make sure that they're kind of evenly distributing heat.
|
||||
And once you feel that they've gotten off most of the heat you can place it into whatever container you're going to put it into.
|
||||
Probably you're not going to grind them all and make them right now because you would want to do that every time you make a cup of coffee.
|
||||
So you're probably hopefully cooking more than you'll need immediately.
|
||||
There's a big debate over whether you should store your beans, your roasted beans in a refrigerator or a freezer or not.
|
||||
I've heard that you should not because once you take it out of the freezer then it starts to I guess there's condensation and that causes the oils to leak and then you're losing purity of the coffee.
|
||||
I still put mine in the freezer but a lot of people will put it just in a cool dark place and that's fine whatever you think is best for your coffee workflow.
|
||||
So you store the beans and then they are ready to be ground.
|
||||
Now grinding coffee is very much related to how you intend to make the coffee.
|
||||
So you'll see that supermarket if you've bought the whole beans you'll see a coffee grinder somewhere usually so that you can grind it before you go home which kind of defeats the purpose of buying the whole beans.
|
||||
So it's better if you're going to do the whole you're not going to roast it yourself you're going to buy it from the supermarket but as a whole bean first of all make sure it's vacuum packed.
|
||||
Most whole beans will be vacuum packed and second of all do not grind them at the store if at all possible.
|
||||
It would be better just to buy your own coffee grinder and these are very inexpensive they don't need to be fancy.
|
||||
You can find them they'll also be sometimes referred to as spice grinders but usually they're just coffee grinders and it's just a simple little grinding device that you'll place in beans into usually enough for a cup or two of coffee and you grind the beans.
|
||||
There are very very fine grinds which will be good for a more delicate flavor and there are rougher or harsher grinds which are going to be a little bit more rustic robust flavor.
|
||||
Now depending on how you're going to cook them this is how you're going to want to grind them so the different ways to make a cup of coffee would be with a traditional drip maker coffee maker like a Mr. Coffee or whatever you buy it any department store.
|
||||
These are crude machines that give you no control over the heat of the water or really you know anything and usually the intention is to make like eight cups of coffee at a time which encourages you to keep the pot on the hot plate of the coffee maker which evaporates water and ends up making the final cup of coffee that you pour out of that taste terrible.
|
||||
It's just a really crude way to make a cup of coffee but you know that's what we a lot of us have and so it's fairly common.
|
||||
If you have to use one of these I would advise not making too many cups of coffee at once unless you know that people are going to drink it right away.
|
||||
Just because you can make eight cups of coffee at a time does not mean you should make two or four whatever you think you're going to be able to drink right away and then for your next couple of cups you know start a new batch.
|
||||
So drip coffee makers you have a lot of flexibility their paper filters usually so you can use a fine grind or a rough grind it doesn't really or anywhere in between it doesn't matter because the grinds aren't going to get through that piece of paper probably.
|
||||
You're not going to end up with grinds in your coffee so you want to throw in your coffee grinds and water and usually I think the the the rule of thumb is like a tablespoon every six ounces of water.
|
||||
I think anyone who's made any amount of cup of coffee just kind of knows how much coffee to put in so that's not doesn't seem that big of a deal obviously you have to kind of you have to know your coffee.
|
||||
I mean if it's a strong strong coffee maybe you're going to want to go last week coffee maybe a little bit more so you know that's just something that you'll get to hang up.
|
||||
Pop it in there put the water in and it takes the water up to whatever however close to boiling it thinks it should go and then it drips through the filter and you've got a cup of coffee.
|
||||
Similar to this is a manual drip which are it's basically a funnel and you place a paper filter in this funnel.
|
||||
Place the funnel on top of your mug put the grinds in the the filter and pour you heat your water up separately.
|
||||
So now you've got control over the heat of your water so if you know you need a boiling cup you can have boiling boiling water.
|
||||
If you know you don't need it quite boiling and the heat of the water is going to affect the way that the cream reacts if you're going to put cream in the coffee so that is something to be aware of.
|
||||
So you have a little bit more control over the water temperature with a manual drip which is nice and the advantage to a manual drip again is that you can go anywhere from fine fine grind to very coarse grind.
|
||||
If coarse grind doesn't really matter it's a paper filter chances of grinds getting through that are very slim.
|
||||
So that's that's what I've been using lately and they're kind of nice as well.
|
||||
I've seen them by the name by the brand name Malita M-E-L-L-I-T-A maybe and they're really small as like I say it's like a plastic funnel basically and some paper filters and that's all you need.
|
||||
So you don't have to put up with the big coffee maker you know and it also kind of forces you to make just enough for you to drink at that moment so that you're not leaving your coffee on a hot plate that is then making your coffee stale and gross.
|
||||
So that's manual drip that's nice.
|
||||
Something similar to that are the so-called French presses. I've also seen them called Australian presses basically any exotic location name press.
|
||||
So if you see these these are a pitcher usually a glass pitcher with a wire mesh and a handle.
|
||||
So the idea is to put the coffee grinds in the the coffee grounds in the pitcher pour the water in again you have control over the heat of the water yourself.
|
||||
Pour the water in and then let it brew for a little while and then you press the wire mesh down there by forcing the grinds to the bottom of the pitcher.
|
||||
This is quite nice. It's a nice method I use it for a while but they tend to always break on me. I think the heat and the pressure just gets to be too much for glass pitchers so that's been kind of a disadvantage.
|
||||
Another disadvantage is that the wire mesh has openings obviously for the water to get through but it has to be a certain size you know so you're really kind of restricted in the kind of grind that you can pour in there.
|
||||
If you put something too thin it's just going to get right through the wire mesh and you're going to end up with a lot of coffee grounds in your cup.
|
||||
So you're kind of you're restricted to a course or grind and take that for what it's worth.
|
||||
The other option of course is an espresso maker and if you've never had an espresso maker you should definitely get one. These are great.
|
||||
They're not that large and they're not that expensive. Consumer kitchen brands sell them you know black and decker that kind of company they sell these things so you can get them for good prices.
|
||||
The idea behind espresso is pressure. You place the water in the tank, you screw the cap on really solid it'll be a heavy duty cap because it's going to generate a lot of pressure
|
||||
and it's going to make sure that the cap isn't blowing off and steam burning your face and you'll have an espresso filter that latches on again very securely because there's a lot of pressure and as an extension off of that there'll be a nozzle for steam for your milk, for steaming milk, foaming it.
|
||||
So what you do here is you have a metal filter for the espresso and the espresso again it's not a paper filter it's a metal filter so it has holes in it.
|
||||
So two fine of a grind will be a problem because it'll get through those little holes but usually the holes are small enough such that you can get a fairly fine grind all the way up to.
|
||||
I don't think you want to go up to too much of a coarse grind but somewhere in between you could definitely go and it'll be fine.
|
||||
Again the amount of coffee just depends on how strong of an espresso you want and how strong of a coffee roast you have placed in.
|
||||
So the water will boil and begin to steam and it will start to push out through the espresso beans.
|
||||
It's a beautiful way to make a cup of coffee and it's very very very flexible because once you have the espresso you can do anything with it.
|
||||
You don't have to drink it as an espresso obviously you can make it into a cappuccino, you can add water to it, somehow water to it, make it into a cafe Americano, you can make it into a latte, you can do whatever you want to.
|
||||
So you'll see the espresso is starting to pour into the pot.
|
||||
At that point you can turn your attention to steaming the milk if you want the steamed milk.
|
||||
You'll want to use whole milk or half and half. I usually go for half and half simply because you need the amount of cream to really foam.
|
||||
If it's something like 2% milk or skim milk there's not really enough milk there to make a proper foam.
|
||||
So if you're going for foam use either whole or half and half. I go for half and half.
|
||||
So you'll have half and half in a little picture and you'll want to make sure that the steam nozzle is submerged into the milk first.
|
||||
You do not want to start the steam nozzle going and then try to put it into the milk.
|
||||
The steam will blow the milk everywhere so you want to make sure that it is submerged first that's very important.
|
||||
Then you turn the steam on and do it slowly. You don't want to just blast it right away.
|
||||
The steam is really pressurized and it will completely, it will blow milk everywhere if you're not careful.
|
||||
So you just want to turn it on slowly, get a feel for how it's steaming.
|
||||
You want to start at the bottom of the picture typically and move it up and down toward the top of the milk.
|
||||
You want to make sure that you're kind of moving it around because you don't want it to just steam one area of the milk.
|
||||
Because literally you can end up with milk that's really, really hot in places and then cold in other places if you do it sloppy.
|
||||
So you want to just kind of get it all around the milk and then for the foam you're going to concentrate on the very top of the milk.
|
||||
And that's the trick. You don't want to obviously get the steam nozzle out of the milk or it will go everywhere but you want to get it right up at the top so that it's really steaming the milk and that that steamed milk has a place to kind of settle which is at the top.
|
||||
But it's something that you can get used to and it takes some practice but it will work out and you will kind of get the feel for it.
|
||||
So at this point at the end of it all you will have one picture of foamed milk, one pot of espresso.
|
||||
And you can go anywhere with that like I say. If you want espresso, down the shot and make your next cup.
|
||||
You want some cappuccino, pour the espresso into a cup, pour the milk in and you've got a cappuccino.
|
||||
You want latte, pour the coffee in, pour some hot water in and then pour the milk in. You've got a latte.
|
||||
You want a cappuccino. Those are simple, you have espresso, you pour that into a mug and then you take some boiling water and pour that in.
|
||||
So now you've got what essentially will sort of taste like what came out of a coffee drip, a traditional drip.
|
||||
But it will have that kind of richness and strength of an espresso. It's really, really good.
|
||||
So you've got a lot of choices there. You've got a lot of control over the grind. You've got a lot of flexibility within espresso.
|
||||
It's a little bit like compiling a custom kernel. You can really kind of decide what goes into it, how it's going to be for you.
|
||||
You definitely have to do it. If you haven't done it, you should really try a couple of times to make your own, your own espresso or cappuccino.
|
||||
Other forms of making coffee include those little instant, they're like tea bags, but they're coffee bags.
|
||||
So they're in a filter and they're closed. So you can kind of dip them into hot water and kind of create a cup of coffee.
|
||||
In my experience, it hasn't really tasted that great, but it's good and a pinch and it's certainly better than the final sort of coffee that we should at least acknowledge.
|
||||
Instant coffee stay away from it. It's not coffee.
|
||||
Now, after you've made your coffee, whatever kind of coffee you've made, you may want to add cream to it.
|
||||
So obviously, if you've done this steamed milk thing, you're kind of good to go.
|
||||
But when you're adding cream to coffee, you want to make sure that you're adding cream to coffee, not coffee to cream.
|
||||
You add coffee to cream, you're risking scalding the cream in a natural way.
|
||||
And depending on the heat of the coffee, you may even be risking damaging the cream if you're adding the cream to the coffee.
|
||||
So what you'll want to do, if you know that you've boiled the water to a true boiling point, and you've just put it into the mug, either wait for it to cool a little bit before adding the cream, or keep stirring it while you're adding the cream.
|
||||
Because otherwise, the cream will form a skin on top and it will be kind of not pleasant.
|
||||
So you want to make sure that you are aware of the heat factor before you just go dumping the cream in.
|
||||
And remember that presentation is everything.
|
||||
If you're entertaining a lady for the evening, and you guys decide to have a cup of coffee, and you're like, oh, let's not go to a coffee store, I will make you a cup of coffee myself.
|
||||
You want to impress her, right?
|
||||
So you're not going to just go in and make a cup of coffee and bring it out in the same mug that you use when you're coding.
|
||||
You want to make it look good. You want to impress this person. So you should think about garnish.
|
||||
The coffee, if you've made it correctly, is going to taste good anyway, but that's not really enough to sell the cup of coffee.
|
||||
You need to put some kind of additional touch on it.
|
||||
And whether it's after you've made a cappuccino, you want to drizzle just a little bit of espresso on the top just to kind of give that nice little, like a Debian Linux logo in the foam to milk.
|
||||
You could do that. That could be a good conversation starter.
|
||||
Or you could also sprinkle some chocolate on the top.
|
||||
The best way to do this is just to get a really, really fine cheese grater. So this isn't the kind of cheese grater that you find people using for pizza and things like that.
|
||||
This is the cheese grater that you're going to be using for a hard cheese, like Parmesan or something like that.
|
||||
You want really, really fine, finely graded slots in the grater.
|
||||
And you can just take like a special dark, like a piece of special dark chocolate.
|
||||
You can just grate that right over the top of the foam, sprinkle some chocolate onto it. That'll impress her to no end.
|
||||
Or if you don't have any special dark, you can even use like Bakers Chocolate or a chocolate chip. It doesn't matter.
|
||||
It's just a nice little touch and it adds a little tiny bit of flavor. Not too much flavor. It's really for looks. It's for presentation.
|
||||
If you're in a pinch, you can also do a little bit of cinnamon. Make sure that she likes cinnamon first. But that's always good.
|
||||
It's just something on the top to add to the presentation. Or you can take a strawberry, cut it, cut a split down the center of the strawberry and kind of hang that off the side.
|
||||
Whatever it takes to make it look like a real work of art rather than just a functional cup of coffee.
|
||||
So those are the different ways to make coffee. Those are the different factors that you should think about.
|
||||
Few people know that the Western world knows coffee, you know, as what we kind of think of when we think of coffee.
|
||||
There's a whole other world of coffee in the Far East called Turkish Coffee or Greek Coffee. This is great stuff if you can find it.
|
||||
If you go up to a story of Queen's, if you're in the New York area, I'm sure there are other places that this is where I know to get it.
|
||||
You can go to any Greek market and buy some coffee. This is very powdery coffee. I mean beyond a fine grind. This is literally like powder.
|
||||
And to prepare this properly, you take a saucepan rather than a skillet. You'll take a saucepan.
|
||||
You'll put, I don't remember, like maybe two or three tablespoons of this powdered coffee and just put a lot of sugar in it.
|
||||
That's the way I was taught to make it. I don't know if everyone does it that way or not, but you put a lot of sugar into it.
|
||||
And pour some water in there and boil it. And eventually it'll kind of, it'll start to boil and do really strange things.
|
||||
And right when it starts to boil, you'll want to take it and you'll want to pour it into a cup.
|
||||
You'll need to let it settle because the coffee grinds, if you've been picturing this, we've just poured water in with the coffee.
|
||||
You know, so you need to let all that powdered coffee settle to the bottom. And then you down it, you just, you drink it.
|
||||
You can sip it, you can, whatever you want to do. It's really, really good coffee. The bottom will be mud, just a lot of powder.
|
||||
But it's a great way to have some really, really good coffee. If you haven't had that, you should definitely try it.
|
||||
Astoria Queens or probably any, like I say, Turkish or Greek and possibly Arabic. That's kind of the name for that kind of coffee.
|
||||
And yeah, if you haven't had that, you should definitely try it.
|
||||
Not necessarily something you're going to want to hit on the ladies because you're trying to impress them.
|
||||
You're trying to, you know, keep them comfortable unless they're really adventurous. You don't want to probably bring that out on the first date.
|
||||
That would be more of like a, you know, third or fourth date kind of coffee.
|
||||
So, but it's definitely good, definitely good for the late nights hacking sessions. So go for that.
|
||||
So coffee making, yeah, it's fun. It's cool. You have to just kind of get into it. Don't be afraid of it.
|
||||
It's exciting, a little bit dangerous, but you can get into it and become a real master of coffee preparation.
|
||||
It's an ancient art from the monasteries of the Capuchin monks. This is a time-honored tradition. So get into it and enjoy some serious coffee.
|
||||
Thank you for listening to Half the Public Radio.
|
||||
HPR is sponsored by caro.net. So head on over to C-A-R-O dot E-C for all of our community.
|
||||
Thank you very much.
|
||||
Thank you.
|
||||
178
hpr_transcripts/hpr0081.txt
Normal file
178
hpr_transcripts/hpr0081.txt
Normal file
@@ -0,0 +1,178 @@
|
||||
Episode: 81
|
||||
Title: HPR0081: Linux Boot Process Part 3 - Boot Prompt Parameters
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0081/hpr0081.mp3
|
||||
Transcribed: 2025-10-07 11:09:30
|
||||
|
||||
---
|
||||
|
||||
This is the important factor for crafting art.
|
||||
Well, they're fighting for air, when it's all ready then, we stretch our necks to
|
||||
stand, but they're too quick to combat, hold the body for ransom, cause the mind is a billionaire.
|
||||
Hey, this is Dan, that one in a hacker public radio, a little late, no excuses, I'm lame,
|
||||
but anyway, today we're going to talk about boot prompt parameters, stuff you can pass
|
||||
in a kernel through a boot prompt, and before we do that, let's take a quick review of what
|
||||
we talked about already regarding boot loaders, which would be primarily the way that you would
|
||||
pass information to the kernel upon boot. So we talked about in the past two major main
|
||||
boot loaders, one was Grub, and the other was Lylello, and of course Grub is the boot
|
||||
loader of the gods, we all remember that from my previous episode. Now, Lylello and Grub both
|
||||
get installed typically into the master boot record or into the boot or root of your
|
||||
boot portion of your file system, your partition, whatever you want to make bootable again, it
|
||||
could be a separate boot partition or it could be just your root partition and it installs
|
||||
itself into the first 512 bytes right there of that partition. Now, if you're going to
|
||||
install Lylello or Grub into a partition as opposed to the master boot record, you are
|
||||
going to need another boot loader and a master boot record that could initiate the boot
|
||||
loading process from that said partition to kick in Lylello or Grub at that point in Grub
|
||||
terms is called chain loading, which you could chain load and allow you to kick into the
|
||||
boot partition and you'll be golden and good to go. Anyway, Grub, Lylello, again the deficiencies
|
||||
between from Lylello compared to Grub is that you have to be careful to initialize Lylello
|
||||
anytime you make a change and that's going to also be important that if you want any of
|
||||
your boot parameters that you save in your Lylello.com file to take effect, you're going
|
||||
to have to rerun Lylello after you edit your Lylello.com. The Grub menu. LST file, you
|
||||
will not have to edit or re-initialize Grub after you edit it automatically pulls it up.
|
||||
It's not a problem. So that's another win for Grub right there. Now, let's talk about
|
||||
boot parameters and what you would actually use boot parameters for. Boot parameters,
|
||||
there are basically two types. One either gets passed to the kernel or it gets passed
|
||||
to a driver or a module. Now, let's not call it a module at this point. Let's call it
|
||||
a driver because when I think of modules, I think of modules that are not compiled into
|
||||
the kernel but are separate and get called during the boot up process or you call them
|
||||
manually later on down the line. Anyway, you can't pass parameters where you don't pass
|
||||
parameters to modules so to speak that are not compiled into kernel. You only pass those
|
||||
to drivers or modules that are compiled into the kernel. So you pass boot parameters
|
||||
to the kernel, to the driver that's compiled into the kernel. You can also pass information
|
||||
to the in-it process or to change the in-it process. Again, the boot prompt allows you
|
||||
to pass this information. If you're passing it to a driver, you're going to specify just
|
||||
like any other boot parameter. We've already looked at some boot parameters to begin with
|
||||
when we talked about the different image settings, particularly for Linux and Lilo and
|
||||
Grub. One of those was the RO for Read Only. One of them was root equals for specifying
|
||||
the root device and there's other parameters like no ACPI and a few other things. You
|
||||
could pass in-it equals to change the in-it program that runs instead of running the in-it application.
|
||||
You could change it to bin.sh and we'll cover that in just a minute. Now, when you are going
|
||||
to specify a boot prompt parameter, a couple of guidelines you need to follow. One, there
|
||||
are no spaces in the argument. It's going to be RO for Read Only or in-it equals slash
|
||||
s bin slash in-it. There would be no spaces. It would be just all one line. You do not
|
||||
put any spaces inside each argument that you pass. Every argument must be separated by
|
||||
a comma. You don't need to pass spaces in-between those. It would be in-it equals slash s bin slash
|
||||
in-it comma root equals slash dev slash HDA. There would be no spaces at all in-between
|
||||
there. You don't want to put any spaces in there. Now, you can, well, we'll cover this
|
||||
in a minute. Anyway, each argument can accept up to 10 integers, integer arguments, or
|
||||
you know, 10 different values plus one string. So just be aware of that. I really don't
|
||||
see anybody ever getting to the point of reading more than 10 integers for each argument.
|
||||
So, sequently, if you need more than 10, you could just, you know, recall that same argument
|
||||
with the rest of the integers or primers that you want to add. So, you know, you probably
|
||||
never ever need to use more than 10. Okay, so how are parameters sorted? Now, there,
|
||||
of course, we talked about their stuff that goes to the kernel, their stuff that can go to
|
||||
a driver, their stuff that you could pass to the boot time that changed something like
|
||||
in-it, what gets run at boot time. So basically, the way it does is it processes the parameters
|
||||
and it looks for a special command. Some of those special commands include specifying
|
||||
rather than rather to mount the root file system, start the first mount to be root rewrite
|
||||
or read only, or whether we are passing a root file, you know, saying the root partition
|
||||
is this, that's a special command. That gets processed first. If it's not a special
|
||||
command, it looks to see if it's a setup for a device or the kernel specifically. If it
|
||||
finds it's something like no ACPI, so it doesn't initialize, I'm sorry, if you were passing
|
||||
like back in the day when I was creating a router off of 486, I had two network cards in
|
||||
there. And to specify which network card I wanted to be, the ETH0 device or ETH1, as
|
||||
I believe these were ISA cards, I had the pass to them, the IO address and the IRQ address
|
||||
right off the bat, so it would be like IO equals 0x 110. And I think it was interrupt equals
|
||||
whatever the values were for that card, so that it would assign via the module that was compiled
|
||||
into the kernel, it would assign the device that matches that to ETH0, so that was kind of passing
|
||||
a parameter off to a module. If it's not something for the kernel or the module, it checks
|
||||
to see if it's an environmental value variable in the form of something equals something.
|
||||
And if that's not the case, it passes whatever's left to the init application.
|
||||
For instance, if you were to type in the name of your kernel and single or specify it in
|
||||
it run level of 1, 2, or 3, that 1, 2, or 3, we get passed directly to the kernel.
|
||||
Now remember, something like init equals slash bin slash SH would be an environmental
|
||||
variable being passed, so it wouldn't run. That would be like on a third step.
|
||||
It wouldn't necessarily pass that information in it because it wouldn't run in it.
|
||||
So there's just to be aware of that.
|
||||
Now, once you get the system up and booted, you could actually check what boot parameters
|
||||
were passed to the kernel and everything to your system by looking in the directory,
|
||||
looking in the PROC directory at a file called CMDLINE command line.
|
||||
That will show you the boot parameters passed to the kernel at boot up time.
|
||||
Now, along my triple EPC right now, and if I go and look at my, if I cat my command line file,
|
||||
I see that what was passed to the kernel at boot time as boot parameters were the quiet, read right,
|
||||
VGA equals 785, which specifies a VGA mode, IRQ pole, and then root equals slash dev slash SDA,
|
||||
specifying dev slash SDA. And you might say, well, Dan, what do some of those mean?
|
||||
Where do I find out what kind of boot parameters I pass? Well, that's a great question.
|
||||
There's a couple of different places you can look.
|
||||
Okay, so let's re, let's go back, take a quick look at the boot parameters that were passed to the triple EPC.
|
||||
Again, the first one that we came upon was quiet.
|
||||
Now, what quiet means is, do not pass or disable log messages, do not enable logging for the kernel.
|
||||
So it disables logging messages, nothing gets logged, that's quiet.
|
||||
All right, now, read right, again, if you recall, when the system boots up,
|
||||
it will first mount the root partition, read right, or read only, or whatever.
|
||||
This specifies the kernel, it will specify the right, read, root, the amount at read right.
|
||||
VGA equals 785, that's an environmental parameter.
|
||||
That says to set the mode for VGA to 785.
|
||||
What that actually means, there's a nice little, usually in a write-up in the grub menu list,
|
||||
or I believe on a Wikipedia, and how the boot parameter, how to specifies what those modes are.
|
||||
And what I can tell you about 785 is, so if you're looking in that file I specified,
|
||||
we're saying that we're looking at 785.
|
||||
And what 785 says to do is to set the frame buffer resolution, VGA mode to 64K,
|
||||
and at 640 by 480 screen resolution.
|
||||
So it's a little higher than 16, it's 64,000 kilobytes, 64K.
|
||||
Now, if we wanted to go 800 by 664K, we would specify 788,
|
||||
a setting of 795 would be 1280 by 1024 at 16 megabit color, 16 megabit color, 60 million color.
|
||||
So, you know, that's pretty simple right there.
|
||||
Again, you could probably find that in your grub menu list, or on the boot parameter, how to,
|
||||
now the next one we have is IRQ poll.
|
||||
IRQ poll will force the kernel of the search for all handlers for an interrupt,
|
||||
that it finds that it's not handled.
|
||||
So it'll pull the IRQ for that.
|
||||
And finally, the last parameter is root equals devSDA1.
|
||||
So it sets the root to the device, ScuzzyDiscA partition1.
|
||||
So it's the first ScuzzyDisc on the root partition.
|
||||
Now, where can you find a lot of this information, what boot parameters that you can pass?
|
||||
Well, you're going to have to call some of this from different resources.
|
||||
One, you can rack your brains out trying to pick through these sources for the modular or kernel section of the kernel that you want to reconfigure or pass parameter to.
|
||||
You might find it in the top of the source code, you might find it in the middle, you might find it in the end.
|
||||
It's really difficult to find a lot of these things in the source code, unfortunately.
|
||||
Which is why the kernel-parameters.txt file in the kernel documentation is a godsend for a lot of this stuff.
|
||||
It is a wonderful utility.
|
||||
If you have your kernel sources, you go into the documentation and look at the file kernel-parameters.txt.
|
||||
And that'll list probably the majority of the prompt-parameters that you can pass.
|
||||
And what they mean and some of the different values that you could pass to them.
|
||||
Read the how-to, the kernel-boop-round how-to is a great place to look at.
|
||||
Some of the more common parameters that one might pass.
|
||||
And it's a fairly old document that gets updated with some frequency.
|
||||
So a lot of the information in there, while some of it may not be applicable to modern systems, is still very valuable.
|
||||
So I'll give you an idea as to what you need to do.
|
||||
And of course, if you're having a problem with your system, look at the forums, mailing lists for the distribution that you're using.
|
||||
And chances are there may be something if you're having a problem booting that you, or how we're being detected properly, that you could pass to the boop-round to assist this.
|
||||
Now, I said to you before that if the module is not compiled into the kernel, that you wouldn't pass parameters to it.
|
||||
And that is true.
|
||||
There's a different way of passing parameters to modules that haven't been compiled into the kernel.
|
||||
So I'm trying to cover that at another time.
|
||||
But just a little nugget of information for you that you could take away is there's a couple of different files.
|
||||
Depending on the system, how your system is handling this, it used to be a file called modules.conf or conf.modules that was handled.
|
||||
The blackware used to use that, I think it still does actually.
|
||||
The RC.modules file would call that modules.conf or slackware RC.modules file had a list of all the different modules that it would probe for.
|
||||
And you can uncomment a section in there like if you had a certain sound card, you can uncomment that.
|
||||
And it would automatically probe for that card using the values there.
|
||||
You can call them manually using the mod probe or the insmod command.
|
||||
Mod probe is better to use.
|
||||
So you wouldn't pass those parameters off to the modules.
|
||||
Now, of course, there's other systems like you dev that handle some of this in the hotplugging where you would specify the different parameters in their configuration files.
|
||||
But those are for another day.
|
||||
So today we just talked briefly about the Linux boot prompt and what stuff you could pass there.
|
||||
A few other things I want to reiterate to you is that if you hose your system, you can't get into it.
|
||||
You forget the root password or something.
|
||||
Sometimes you can get back into it and fix your system by booting into the single user mode, which would be the name of your kernel.
|
||||
And then you could pass either the number one or sometimes allows you to go in there by type again, single, s-i-n-g-l-e.
|
||||
And it'll boot into user, a single user mode.
|
||||
And you can do stuff like run FSCK on your disk, fix your, you know, do a partition check, get into stuff.
|
||||
Now, a lot of distributions these days, a lot of distributions require you to log in as root.
|
||||
It provides root password to get into the system single user mode.
|
||||
So if you forgot your root password, you're going to have to go in there another way.
|
||||
And wipe out your root password or change it by editing the password file from another distribution.
|
||||
Anyway, that being said, you could also pass, you'll get into single user mode by passing in it equals slash bin slash s-h.
|
||||
And that will pull up a shell instead of running in it and allow you to run a bad shell just like that.
|
||||
So that is basically the boot prompt out to.
|
||||
And if you have any questions, email me at danathelynicslink.net.
|
||||
And if you have any comments, either post in the comments section on AcroPublic Radio or send me the comments, danathelynicslink.net.
|
||||
I wish you a wonderful day.
|
||||
And thank you for your patience on this.
|
||||
And I hope it wasn't too choppy and disjointed.
|
||||
Have a great one and enjoy your happy hacking.
|
||||
Thank you for listening to AcroPublic Radio.
|
||||
HPR is sponsored by carro.net.
|
||||
So head on over to C-A-R-O dot N-E-T for all of us in need.
|
||||
226
hpr_transcripts/hpr0082.txt
Normal file
226
hpr_transcripts/hpr0082.txt
Normal file
@@ -0,0 +1,226 @@
|
||||
Episode: 82
|
||||
Title: HPR0082: Root kits
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0082/hpr0082.mp3
|
||||
Transcribed: 2025-10-07 11:11:11
|
||||
|
||||
---
|
||||
|
||||
u
|
||||
u
|
||||
u
|
||||
And hi Linux Basement listeners and welcome to Finix's Student Huckers Guide to Linux
|
||||
and today's topic, Root Kits. My name is Anne but you guys can call me Finix.
|
||||
One in today's segment I'm going to talk about Root Kits in some detail.
|
||||
Now there isn't going to be a practical aspect like last week but more of a discussion.
|
||||
The idea of this guide is to make you aware of Root Kits, what they can do, their history,
|
||||
the varying different types of Root Kits. I'm also going to discuss a couple of possible
|
||||
countermeasures and steps that you can take to defend yourself against Root Kits.
|
||||
So I'll start off by describing what a Root Kits is and a little bit about their history.
|
||||
Well a Root Kits can be best described as a piece of software that functions at the
|
||||
lowest level in operating system, infiltrating the kernel. Root Kits is a technique that is often
|
||||
used by hackers and virus creators to hide files and their processes that they're intrusion
|
||||
traits. This technology has also been used by manufacturers to hide digital rights management
|
||||
software and one of the best known cases of this was Sony. I can't really talk about Root Kits
|
||||
without talking about this first. It's one of the best known cases in manufacturers using
|
||||
Root Kits to hide DRM technology. However due to many issues within their Root Kits and the DRM
|
||||
software was soon discovered and Sony was left with a lot of egg on their face and some would
|
||||
say lucky to avoid prosecution. In 2005, Sony BMG, in attempt to prevent people from copying CDs,
|
||||
started to bundle with its albums two pieces of software that were installed without notice
|
||||
and without warning in the unit. These packages were called Extended Copyright Protection
|
||||
or XCP and MediaMars CD-3. Furthermore to this, their lack of any uninstallation software
|
||||
some argued make them liable for both civil and criminal actions. This incident was the
|
||||
shock of the world but did it shock the world because the music label had taken extreme steps
|
||||
or did it bring the general public closer to the truth that your machine can be hacked with
|
||||
something as simple as a purchase of a new album. In real terms, the purpose of a Root Kits
|
||||
to maintain access, attack and compromise other systems and to gather or destroy information
|
||||
was covering deleting any tracks of them ever being there. However the truth of it is,
|
||||
Root Kits have been around from at least the mid-90s and tools that went into making the first
|
||||
Root Kits like file cleaning software which was found back in 1989 on a hack system have been
|
||||
around for a while. As far back as 1994 when the first Root Kits were becoming apparent on the
|
||||
Sony OS, then in 1996 when they were discovered on the Linux system. Root Kits all as they are also
|
||||
known by the term Kits, which I think is an in respect to very good description for them.
|
||||
You mostly see them being a collection of different tools making a combination of processors
|
||||
to gain the desired stealthy freedom. It is in unix where the term Root Kits comes from,
|
||||
a kit to have full privileges of a system and as we all know Root being the account with full
|
||||
super user privileges. If a corporate company can employ software which are the very heart of it
|
||||
and its design is to gain full unsolicited access to a system to stop you from copying CDs,
|
||||
what do you think a hacker could do with this technology? I've personally met victims of Root Kits
|
||||
whose personal data has been stolen across multiple accounts and had the credit cards and
|
||||
email addresses being used without their permission. These are not just average weekend computer
|
||||
users but seasoned experienced computer professionals. Anyone can fall foul to Root Kits. However,
|
||||
steps can be taken to protect yourself from this. Some can be employed by using plain and simple
|
||||
common sense, some by the community and some by thinking about security when installing and
|
||||
preparing your base install. Imagine yourself as a system admin. You have two weeks holiday
|
||||
planned before you go you unlock all the filing cabinets, write the password to every computer
|
||||
on a post at note and stick it to the computer. Open every port on your firewall, pick your suitcase,
|
||||
up and forget the office for two weeks. What do you think the damage would be when you get back?
|
||||
The reality of a Root Kits is all of the above can be done without the knowledge of the system
|
||||
However, a key point to remember here is Root Kits are not exploits in themselves. They are only
|
||||
deployed in an already compromised system. Those threats are as real and windows as they are in Linux.
|
||||
Root Kits can be broken down into a number of different categories, virtualized Root Kits. These
|
||||
are the one and the most nasty Root Kits that I can imagine and will be modified and they work
|
||||
by modifying the boot sequence so that the Root Kits is loaded rather than the OS and from there
|
||||
they are able to load the original OS as a virtual machine. This enables the Root Kits to intercept
|
||||
all of the hardware costs that the OS makes. The worrying aspect is twind with the grown number
|
||||
CPUs that are supporting virtualization technology within their actual chipset and my personal
|
||||
belief this Root Kits technology will grow and grow. Kernel level. A kernel level Root Kits
|
||||
works by actually replacing the kernel code or adding extra code to the OS, either in the kernel
|
||||
or by device drivers. Marge OS is to knock to distinguish the difference between kernel
|
||||
and device drivers and then so kernel Root Kits tend to come in the form of the loadable kernel
|
||||
modules in Linux and device drivers in windows. The massive issue here is when on a
|
||||
fetid access to the code these Root Kits have a tendency to make the OS unstable. They also
|
||||
know for being very hard to detect as they work at the same layer as the OS. Library level.
|
||||
Library Root Kits patch or hook system core functions with code that hides the attacker.
|
||||
In theory they should be easy to find by examining the code libraries for changes
|
||||
DLLs in windows for changes against the originals however due to updates and service pack upgrades
|
||||
this isn't so easy in practice. Application level. Application level Root Kits work by replacing
|
||||
actual binaries of Trojanized ones or they can patch or hook existing binaries.
|
||||
Firmware Root Kits. Firmware Root Kits infect systems by creating a persistent malware
|
||||
image within the driver or platform firmware. It is easy for Root Kits to hide here as the code
|
||||
is really inspected for integrity. Detecting Root Kits can be a bit of a mixback. Root Kits
|
||||
binaries can mostly be detected by elistic messes or signature base detection in the similar ways
|
||||
of virus scan or detects viruses as long as they haven't been run by the user and they haven't
|
||||
concealed themselves. Root Kits have many different tools than one kit that can replace many
|
||||
important and critical programs and tools within an OS. The problem lies here that you can't
|
||||
trust the results of what the OS is telling you from a simple case of listing run and processes.
|
||||
The reality is the OS now doesn't operate in the way it was its design is intended to.
|
||||
Due to the replacement of critical tools and libraries it is also very unwise if you detected a
|
||||
Root Kits just to attempt to completely remove it. In most cases this could lead to your system
|
||||
being completely unstable and permanently damaged. One of the most reliable methods of detecting
|
||||
a Root Kits is to use a live CD as the OS isn't affected and I'll be able to boot your system
|
||||
and read on me mana. Non-warning Root Kits cannot hide itself. Root Kits tend to hide themselves
|
||||
during scan by suspending their services until any scans are completed as you can imagine
|
||||
it's extremely difficult for a Root Kits to hide itself if it's not allowed to run.
|
||||
There are many products in both Linux and Windows for detecting Root Kits but the reality holds
|
||||
clear that prevention is far better than cure. It's a fact that most system admins and experienced
|
||||
administrators would rather than attempt to remove a Root Kits would save data files, format and
|
||||
reinstall. Within the imaging software it makes the installation of Kino as a simple procedure
|
||||
compared to the time effort and cost of a suitably experienced admin to locate, remove and check
|
||||
system integrity. Now that I have scared you about the damage and implications of Root Kits
|
||||
I think I should tell you about the many countermeasures you can employ to protect yourself against
|
||||
these threats. The good news for Linux uses is there are a number of tools available
|
||||
and for most parts they employ quite simple intelligence in their design. One of the key methods
|
||||
is fingerprinting the OS so that any critical files have been altered or changed by the Root Kits
|
||||
can be marked up against the hash and easily notice. The first thing I would like to talk about
|
||||
is the patch that you could put in between the chair and the keyboard, namely you. I've said this
|
||||
before but I really wanted to reiterate this point Root Kits are not exploits. They are only used
|
||||
when a system has been compromised by ensuring that your system is up to date and checking your
|
||||
system security, trying to prevent it from attacking penetration, make sure that you are using
|
||||
trusted sources for your software. One of the key defensive strategies to defending yourself
|
||||
from zero days is mapping the behavior of applications. Two applications spring to mind and a choice
|
||||
for using them is completely up to you. SC Linux or security enhance Linux and Apple are both
|
||||
utilised Linux security module or known as LSAN. The criticism of SC Linux is that for an
|
||||
average desktop user installing a number of packages on a weekly basis, which in my opinion
|
||||
in a high number of people using Linux are likely to experiment with the open source packages.
|
||||
The constant configuration of security policies may be a hindrance. I've often been told that
|
||||
this defensive strategy is best suited for large IT networks that will have installed all the
|
||||
packages that they need and then use SC Linux more as they lock down to them. In short, and this is
|
||||
by no means an in-depth explanation of SC Linux uses NSA's MAC which in this context stands for
|
||||
mandatory access control which cannot be bypassed by a user. I think what I should do here is maybe
|
||||
explain a couple of terms that I'm going to use here. I'm going to mention what discretionary
|
||||
access control it's known as DAX. Discussion access control is when a system restricts access
|
||||
to an object dependent on password or to a group that that object belongs to. User with certain
|
||||
privileges can either bypass or grant access to that object. You heard me refer to MAC earlier on
|
||||
which stands for mandatory access control. Munchary access control is when a system restricts
|
||||
access to an object based on its sensitivity and needing necessary clearance to view it.
|
||||
Normally by the virtue of flaps this cannot be bypassed and this is what makes it a mandatory
|
||||
access. When I'm referring to objects try to think of these as a passive entities that control
|
||||
or receive information. Access to these objects gives you access to those informations that they hold.
|
||||
Some examples of this would be records, blocks, pages, segments, files, directories,
|
||||
directories and programs as well as bits, bytes, words, fields, processors, video displays,
|
||||
keyboards, clocks, printers, network nodes. In the case of SC Linux not only is their objects
|
||||
but services are also known as domains. Within the construct of domains are not allowed to
|
||||
access other parts of the system that they one wouldn't generally be in the nature of that
|
||||
domain to do. So example Firefox wouldn't be able to gain access to any SSH keys.
|
||||
In this approach it limits the chance of greatly of third party applications being able to have
|
||||
what we would terms buffer overflows. This is not for the faint hearted and as I've said
|
||||
there is debate if this is truly a user-friendly enough approach for desktop user market.
|
||||
Mifelings and by no way base your opinion on this but if you're opening your system up to the
|
||||
internet and offering services such as a web server or Java server then you should consider some
|
||||
form of intrusion prevention system. You have a door for everyone to access on the internet
|
||||
with a service that can be exploited. Another package that I'd like to talk about is a package
|
||||
called Appama. Now Appama was heavily developed by Naval and what's known as a named based access
|
||||
control and it also utilizes the Linux security module. One of Appama's main goals is to be easy
|
||||
to understand and implement. One of the key features of Appama is what's known as learning
|
||||
mode and at the heart of this mode is to help users maintain and manage policies. Learning mode
|
||||
is sometimes referred to as complain mode and during this mode it will allow process to run
|
||||
that it would have normally denied and logged that down. This allows the user to go back and check
|
||||
what process is being run when a program was being run. The key feature here is easy deployment
|
||||
in production how environment however the big keys we profile programs rather than the systems.
|
||||
We could profile the whole system but this could take a while. The idea we profile a program that
|
||||
likely be to be targets for exploits such as web prowls, browsers, PDF readers, SSH demons and so on.
|
||||
The concept is based on a network threat model. Seems as one reality we really are protecting
|
||||
ourselves against is attacks from outside or within the network. The reality of it is we're making
|
||||
a firewall of sorts around any application. I'm going to get a little technical here for a second
|
||||
but I think it will help to clarify some points. There are two security concept models to think about.
|
||||
One is misuse prevention which works with black lists or the way to think of black lists
|
||||
are things that we are not allowed to do or anonymally prevention which works by whitelists or things
|
||||
that we are allowed to do. Black lists are the kind of things that virus killers employ. So it basically
|
||||
says you can't do this, you can't do that, you can't do this and you can't do that. It's basically
|
||||
a signature based protection. Well 70 or 1000 signatures later and they are still updating
|
||||
shows that there's flaws in the misuse prevention because the attackers can always think of new ways
|
||||
to do things. In a polar opposite, anonymally protection lists what can be done and everything else
|
||||
is blocked by default. This is by a far more secure model because it doesn't matter what the
|
||||
attacker thinks of a new way to do something or not. It's still going to be blocked. A good
|
||||
example of how our partner can defend an application and how we put a firewall around a program
|
||||
such is NTPD or now at time protocol demon. Now this is a demon that has root privileges and is
|
||||
going to change something on your system namely the time and it needs a network port open so it
|
||||
can communicate with the time server to clarify the time. If someone finds an exploit in NTPD
|
||||
then they could spawn a root shell. Well with app armor we can lock down what access NTPD
|
||||
has to what files. So much so that we can make sure that NTPD doesn't have access to a shell
|
||||
doesn't have access to any other files like password files. So if it is exploited then all that
|
||||
can really be done is that the time view system can be changed. It's very quick to make policies
|
||||
and I think the learning curve is quite small. We've built in policies for much typical user
|
||||
stuff and syntax that's pretty easy to understand and implement without too much hard work.
|
||||
You will need to do your own research on this subject as in the context of this segment
|
||||
I'm not really going to have time to talk you through configuring it. However both of these tools
|
||||
are an essence a way of stopping you from being hacked and would give you almost a superior
|
||||
level of control if someone inserts malicious code into your OS by defining not only how applications
|
||||
function but at a level well beyond layer security right at the heart of the kernel. I have
|
||||
supplied many links with many links within this documentation to support this segment and my
|
||||
advice is to go and take some time and investigate for your own specific requirements. Documentation
|
||||
will be available on both the Linux Basement website and www.TheLinuxsociety.org.uk.
|
||||
A more traditional method is to look for a ruckus on the system but in my opinion this is
|
||||
far too late and it's something I wouldn't do but there are two scanning tools available for
|
||||
Linux called check root kit and archae hunter. Both are signature based and both have extreme
|
||||
limitations. Choosing them being signature based they are only going to find root kits that are
|
||||
well known and not been modified. When you think that root kits are predominantly written and c
|
||||
it's easy for them to be modified and become undetectable. Now you could run them against the
|
||||
life your life system it's not recommended or you could run them against an alternate of
|
||||
media such as a live CD. You could load a live CD, mount your drives and then scan those drives.
|
||||
That would be the latter would be my suggestion however this is only going to pick up the
|
||||
much lame root kits and as I've already said if you do find a root kit then it's very very unrise
|
||||
for you to rip that root kit straight out. Another package that I'd like to talk to you today about
|
||||
is the package called tripwire. Tripwire is designed to detect any changes that are made to
|
||||
files and directress and then notify via via via email. There is a lot of work to set this up.
|
||||
Tripwire stores the information about critical files and the particulars and the database such as
|
||||
date and time file size and checks on. Then tripwire can match this information about what it knows
|
||||
about those files against what it finds out about those files. Tripwire needs to update its
|
||||
records very regular so running it as a cron job is much advised. Then tripwire can send that
|
||||
in the email when any file that has been changed. Tripwire encrypts its own database as well
|
||||
to save it from being tampered. The true power of tripwire is its easy detection of
|
||||
Trojanized biners. This works by checking the checksum of the files. Once a hacker tries to replace
|
||||
the biners with their own or tamper with other files the checksum will be changed. The concept
|
||||
is pretty simple in design however the power that it holds is massive. My advice is that if you
|
||||
set up tripwire you should do it on a clean OS. The added problem if you set it up and you're
|
||||
already sitting on your system or that you've been running for a while you don't actually know
|
||||
if you've been root-cuttered or not so you may be giving yourself a full sense of security
|
||||
and I suppose with the good news that Ubuntu, Harin or becoming out soon I imagine a lot of people
|
||||
would be doing upgrades. It may be worth while you're doing that to spend some time investigating tripwire
|
||||
backing up all your data files having a clean OS and installing tripwire. I don't really have
|
||||
the time to go into a detailed explanation on how to guide but what I can tell you is there's a lot
|
||||
of links in my support documentation to go along with this segment and there is a lot of
|
||||
documentation out on the internet. So any of the things that I've talked to you about today's
|
||||
such as SE Linux app on a tripwire with a day's worth of research you're going to be able to
|
||||
give yourself a very secure system indeed. Well I suppose that brings us to the end of Finix
|
||||
the student hackers guide to Linux and this segment to do with root kits. I hope I've not
|
||||
scared you too much about the dangers of root kits. This is to make you aware that they are there
|
||||
and they are a real threat. However there are steps that you can't take to defend yourself.
|
||||
I've said this a couple of times during this segment but it is a point that I'd like to make
|
||||
very very very clear. Root kits not exploits in their own right. They are only deployed on an
|
||||
already hacked system. If you take steps to defend yourself against this you take great steps
|
||||
on defending yourself against being root kid. Once again I'd like to apologise if I've ummed
|
||||
and erred and sounded a little bit rushed. This is only my second time now of doing anything like this.
|
||||
Well this has been Finix. I'd like to thank you all for listening. Do go over to either the Linux
|
||||
basement website or www.thelinuxsociety.org.uk for any support documentation with this segment.
|
||||
And thank you for listening.
|
||||
167
hpr_transcripts/hpr0083.txt
Normal file
167
hpr_transcripts/hpr0083.txt
Normal file
@@ -0,0 +1,167 @@
|
||||
Episode: 83
|
||||
Title: HPR0083: Flock
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0083/hpr0083.mp3
|
||||
Transcribed: 2025-10-07 11:12:32
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
.
|
||||
.
|
||||
Welcome again to one of my Ramblinger Insightful shows, with me Zoak as your host. I use
|
||||
as you can come for me children, then we'll begin.
|
||||
A long time ago in a galaxy country far far away, or maybe not so far away depending
|
||||
on where you're listening to this, there were a group of people. These people made
|
||||
something and it was let out into the world for all to enjoy. They started to worry though
|
||||
that if they let people enjoy what they'd made over and over again, then the world wouldn't
|
||||
need anything new. So they put a rule out. People could enjoy their stuff, but only for
|
||||
a little while. Then you had to put it away and store it in a really big building and
|
||||
not touch it ever again. At first everything they had ever made was stored in this building,
|
||||
but in time the building became 2 and 3. Until in the entire city you had to be used
|
||||
to store these things that no one would ever be allowed to see again. This made no sense,
|
||||
so someone decided to talk to the buildings so they didn't have to store any other things
|
||||
ever again. Well okay, that isn't quite what happened, but that's roughly what happened
|
||||
to Doctor Who. The people were the actors in the actors guild. The actors were worried
|
||||
that once the BBC had a certain amount of shows done, they would just show nothing
|
||||
but repeats or mostly repeats and most of them would be out of work. So the actors union
|
||||
only allowed a certain number of repeats of each programme. The BBC then had a huge
|
||||
amount of film of old shows they couldn't do anything with. As the film increased, someone
|
||||
finally decided to wipe it all because there was no reason the BBC wouldn't want to keep
|
||||
any of it. They couldn't do any of it. They ended up reusing some of the film if they
|
||||
could, but they didn't need any of it. It was trashed, it was all gone. It just means
|
||||
a huge amount of shows from the 60s were wiped. I mean not just the BBC but everyone did
|
||||
it. Lots of the BBC episodes were lost and are known as the Lost Episodes. This reminds
|
||||
me of all the rubbish going on with DRM nowadays, with the RIA and the MPAA telling you what
|
||||
you can and can't do with the recordings. The good thing for Doctor Who though was because
|
||||
it was such a big hit. It was sent out by lots of other countries and some of them still
|
||||
had copies. After the actors union dropped their stupid rule, the BBC could then get the
|
||||
episodes back and air them again. And of course once they aired them, the actors then
|
||||
got some money. I'm sure it wasn't as much, but they still got some money for airing
|
||||
it again. So they went back to all the different countries and tried to get all the episodes
|
||||
and they got a lot from Australia for example, some from America. There was even one story
|
||||
about there was a guy he'd been a guard or something at the BBC and he'd actually borrowed
|
||||
some of these roles of film because no one was using them. They were going to destroy
|
||||
them and he'd taken them home and stuff to Melizzatic and he'd left there and he'd died many
|
||||
years later because this is in the 60s and he died sort of in the 90s and his kids were
|
||||
going through and they found this and didn't quite know what it was, had the BBC logo
|
||||
on it so took it to the BBC and said, hey what's this? Turned out to be a Doctor Who episode.
|
||||
There was another one, an old episode. For some reason they had the black and white
|
||||
copy but they didn't have the colour copy but it was a high quality black and white copy.
|
||||
Now they'd shown it in colour and someone had taped it illegally of course but they taped
|
||||
it in America. Now that caused issues because it was the whole different PAL, NTSC and everything
|
||||
and it was a fairly naft quality but it had the colour in it so what they did is they
|
||||
warped and twisted the colour image to make it match the black and white and took the
|
||||
colour and put it over the black and white to get the quality from the black and white
|
||||
and the colour from the cassette tape. That was fixed and that was released a few years
|
||||
back. Yet more episodes have been kept as audio recording's only and they've actually
|
||||
been animated back in to have the episodes. So this is a terrible loss and so down to
|
||||
the actor's seat guild being worried about, she's being repeated too much. When of course
|
||||
they do get their repeat showing fees. I'm sure it's not as much as if you're in work
|
||||
full-time but let's face it, you don't have to do any work for it, you just get sent
|
||||
to check every month. The same thing's happening with CDs, everyone's expected to buy the
|
||||
new CDs and we're now expected to upgrade from DVD to Blu-Ray and all that. We never
|
||||
own this stuff, it's just a license and it just bugs the hell out of me and if you look
|
||||
at what happened with Doctor Who it just, there is a possibility we could lose a lot of
|
||||
this music because you don't have any rights to it anymore. There was a story recently
|
||||
about how our IAA had sent out a ton of demo discs. The demo discs weren't wanted and
|
||||
they were thrown in the trash, someone took them out of the trash and sold them and he
|
||||
was being sued for pirating this or covering it in front of whatever the hell they want
|
||||
to call it because they hadn't allowed him to sell it even though they thrown it away
|
||||
in the trash. I mean so it's a bunch of stuff that really bugs me and I'm surprised that
|
||||
we haven't lost more music and more things like some of these older episodes Doctor Who.
|
||||
But it is good news that some of the artists do seem to be getting the hang of it now and
|
||||
you've got more and more of them are rejecting their record labels and releasing stuff on
|
||||
their own or even simply letting everyone download it for themselves. I mean this is a good
|
||||
plan for any new bands because piracy isn't the problem, it's obscurity, it's the big
|
||||
problem. Anyway, enough writing about that, I'm going to go on to what the main topic
|
||||
of today is going to be, which is flock. Now flock is a web browser, it's based on
|
||||
the Firefox code, you can get it from flock.com, it's available for Linux, Windows, Mac, it's
|
||||
on version 1.1 currently and as I said it's based on Firefox, they took the source code
|
||||
and they've changed a few things, it's also open source which is good. But the main difference
|
||||
between flock is they actually taglines flock for social web browser.
|
||||
They hook you into everything. I'm going to assume you've got flock, you're looking at it
|
||||
on the page, it looks a little different, they've tweaked a few bits here and there but they have
|
||||
various different things, you get this extra light coloured icon bar below the back folder,
|
||||
reload and home and all that. The first one is about my world and it's all your stuff basically
|
||||
so it's got a list of Twitter feeds, any media you have, any RSS feeds, anything like that,
|
||||
you can actually organise this quite a lot. Next one is the people cyber which actually
|
||||
happens on the site bit like all in one cyber for Firefox. You have a list of all these people
|
||||
here, in this case I've got my YouTube, I've got Twitter and I can go and see what comments
|
||||
I've got my latest comment there, let's say on recording an hkl episode, exclamation mark,
|
||||
bump and that's gone and sent the message out to everyone and I've got all the other people
|
||||
here, will we since replying to someone saying the cake is a lie and stuff like that. We've got all
|
||||
the lists down here. We also have my Flickr, not that I actually have anything down there, I've got
|
||||
the Linux action shown, no master yoder on there but I can click on no master yoder there and it
|
||||
will take me to his Flickr site and we can see what images he has there and he has some funny
|
||||
ones, he's got one of Bill Gates recommending Ubuntu and things, there's picture of tux here, big
|
||||
sand tux which is cool but I can go down there and if I go from there and click on what is the
|
||||
final icon there, the photo uploader, I can click on that and it loads up, it's a photo uploader
|
||||
and what I can actually do is simply drag my photos over into there or in this case drag over
|
||||
this image of tux although it doesn't, although Flickr does something odd, you can't just drag its
|
||||
rate over you, I actually have to click on it to get the image itself and not the weird random
|
||||
JavaScript stuff and click on that and drag it over into the photo uploader and it puts it in there
|
||||
and then you can upload it to wherever you want and this is some going to rename the file, put a
|
||||
description in and I can put tags and then I can upload it to wherever I want, this case I'm going
|
||||
upload it to Picasso and if we go to my Picasso site then we can find it alternatively, if we go to
|
||||
the third icon and the open the media bar what it actually does is the top part now drops down
|
||||
and we have media streams that defaults are going to Flickr and looking at something called
|
||||
interestingness, whatever that is but I can go down there to my accounts and go to my Picasso
|
||||
such as Picasso and loads up my pictures and there we go, we have all the images I have but one
|
||||
of them in particular the one I just uploaded which is the picture of tux and the comments, it's
|
||||
all of them, no mastery odour, I know it's no mastery odour, I just felt like breaking it out
|
||||
differently and there we go, awesome this media stream we can go to YouTube and say what have
|
||||
got top raiders, if we want it does a quick search and brings all that up but that's pretty cool
|
||||
you can get these things going on, top 10 Jackie Chan Stunts, I'll be in the chief one of her
|
||||
and that bloke whose name escapes me but he was doing the Wii remote stuff, Jason Lee or something,
|
||||
something is like the MIT got the did all the stuff for that but we can have a look at all that,
|
||||
that's pretty cool, the next icon is the A for Feeds so bar which we get all the feeds now,
|
||||
I don't use that, I actually have, I use Google for my feed reader, my RSS reader, so I use Google
|
||||
reader for that, we then have my inbox for Google Mail and Yahoo and stuff, apparently I've got
|
||||
one I'm really emailing there but I don't check that myself, I followed chest griffins,
|
||||
description on how to run an iMap server and I'm actually running an iMap server to grab and
|
||||
collate all my emails, we can also open favorite side bars the next icon, we have at the top
|
||||
the local favourites and at the bottom the online favourites that hooks and delicious
|
||||
and you can copy from one stuff to another, the next one is picture of a key, it's all your accounts
|
||||
and you can see my youtube delicious my personal blog, scout stuff twitter, flicker, Picasso,
|
||||
jimmo and zoke.org remember droople, more on that in a moment, we'll click on the next one,
|
||||
it's a clipboard, we can drag anything down, text, links, images, anything really,
|
||||
drag them down to the side and we can put them into folders and organize them, save them a bit
|
||||
for later if we want to look at stuff later, which is pretty cool, next one is open blog editor,
|
||||
now this is a really cool one, what we can do here is we can go and actually type something in,
|
||||
you have a little, almost looks like an email and you can type stuff in there and if I type
|
||||
something in, what should we do, blogging for dummies and actually I've got a better idea,
|
||||
what we can do, don't say that, what we can do if we go back to the flicker page
|
||||
and back to the image that we had there, what we can do on this, if we can actually right click
|
||||
on the comments sound, just sound blah blah blah, right click and say blog this and it automatically
|
||||
brings it up with a link to it and everything, so we change the title for blogging for dummies
|
||||
and we can put any tags we wanted to publish and oh look, I've just got a new email
|
||||
or anywhere that's from, we can post it to whichever blog we want, in this case we can put
|
||||
Zoke under story, we can pick the categories, now that doesn't seem to work in Drupal but it does
|
||||
work in WordPress, publishes a new post or a place existing post, that seems to have some issues,
|
||||
it knows what it's posted but if you haven't posted a three, it doesn't seem to pick it up always,
|
||||
ad blogged with, ad blogged with flock to the end of your post, I never bother with that and
|
||||
visit blog after publishing, that one doesn't always work because it has issues with Zoke.org for
|
||||
example, but we can do that, if I post that and send that and if we go to Zoke.org,
|
||||
we press that and then we get blogging for dummies, there we go, it's just appeared, of course if
|
||||
anyone is actually checking the timestamps on this, yes I am choosing, I did do that blog post
|
||||
earlier, I did rerecord this because I screwed up and lost some of it in the sound of crap and
|
||||
I wanted to read it, anyway so that's most of it on the side, the social stuff anyway,
|
||||
most of the rest of it's just very similar standard sort of Firefox stuff basically,
|
||||
pretty much every Firefox extension works under flock, but it's just if you're doing any blogging
|
||||
or in stuff like that, it's a lot easier because in this case I can go simply go to hack a
|
||||
public radio for example, when this episode gets posted, right click on that and blog about it
|
||||
and then instantly get a blog up and ready and don't have to worry about any of the links and
|
||||
stuff they're there automatically, apart from that, as I said everything's pretty much the same,
|
||||
I just love the way you can upload stuff and drag images and still pictures of, I mean,
|
||||
share images, quite easily using Flickr and Picasso or any of the other things, I mean if I
|
||||
get back to accounts and have a look at the list, it supports Facebook Flickr Twitter YouTube,
|
||||
Photobucket Picasso, Pixo, Blogger, Blogs and live journal typepad WordPress.com, Zanga or
|
||||
Self-hosted blog, that one you can just add and say this is my blog and it tries to figure out what
|
||||
it is, delicious Magnolia and Gmail and Yahoo Mel and they're adding more all the time,
|
||||
so that's a basic overview, I think it's really cool, if you do anything social at all on the
|
||||
internet, which is pretty much everyone now, because everyone's got their own blog, everyone puts
|
||||
pictures on Picasso or whatever, so you can do that and it's just really cool that it's just
|
||||
got all on the side and all there ready for you and whatever you want, it's there, I think it's
|
||||
really cool, it's also all open source, you can go and download it, play around with it and
|
||||
whatever you want, so there's no problem with anything there, I think that's about it really,
|
||||
thank you very much for listening and we'll catch you all later.
|
||||
2288
hpr_transcripts/hpr0084.txt
Normal file
2288
hpr_transcripts/hpr0084.txt
Normal file
File diff suppressed because it is too large
Load Diff
65
hpr_transcripts/hpr0085.txt
Normal file
65
hpr_transcripts/hpr0085.txt
Normal file
@@ -0,0 +1,65 @@
|
||||
Episode: 85
|
||||
Title: HPR0085: Faubackup
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0085/hpr0085.mp3
|
||||
Transcribed: 2025-10-07 11:16:42
|
||||
|
||||
---
|
||||
|
||||
music
|
||||
Hello and welcome to another episode of Packup Public Radio.
|
||||
I'm DeepGeek and this episode was originally recorded in April of 2008.
|
||||
This episode is a software review of Fallbackup and is part of our series on lightweight applications.
|
||||
The lightweight application series is open to all HPR contributors and is OS agnostic.
|
||||
Fallbackup is a command line backup tool developed at Friedrich Alexander University in Erlengen Nuremberg.
|
||||
Fallbackup is interesting for two reasons.
|
||||
The first is that command line nature is particularly given to automating backups.
|
||||
And the second reason is that its way of backing up files creates a really easy to use system of versioning.
|
||||
First, command line. Upon installing Fallbackup, I was immediately impressed
|
||||
in that automatically inserts a script into the Etsy Kron.Daily folder, which gets run daily.
|
||||
The script has the default directory is commented out.
|
||||
So all I had to do was delete the hash symbol and voila, instant daily backup.
|
||||
It was that easy.
|
||||
By default, all the defaults can be overwritten by adding the Fallbackup.conf file in the Etsy directory.
|
||||
It writes backups to a directory called slash backup.
|
||||
You can create this in the root directory or create a partition for it.
|
||||
Simply by doing so and pointing the Etsy FS tab file to the appropriate place.
|
||||
What I did personally is I bought a spare hard drive and installed it on a separate controller
|
||||
than my main disk.
|
||||
I then set the disk to go into standby in about half an hour of no use.
|
||||
For me, this is a good thing because I want to protect myself against my main disk failing.
|
||||
Also, since the second disk is used only rarely, it simply is not used as much as the main disk.
|
||||
You can also do a few advanced things with the target of your backups.
|
||||
For instance, it will accept the backup directory being on an NFS share just fine.
|
||||
But you do have to tell the NFS server to accept this machine's root user as a root user on its system.
|
||||
You can also backup over SSH or RSH. The flexibility is there.
|
||||
But it really made me fall in love with full backup though, is the way it stores the files it backs up.
|
||||
Full backup in its default configuration creates a file structure where for each machine and each major directory,
|
||||
it creates a sub directory with a date stamp and copies all the files into that directory.
|
||||
Now, you may be thinking, wait a minute, that's a lot of files for a daily backup.
|
||||
But does not store all those files.
|
||||
Most Linux file systems support what is called hard links.
|
||||
Basically, if a file is unchanged, full backup creates a hard link to the file.
|
||||
Full backup maintains by default, but you can override this if need be.
|
||||
Two annual backups, 12 monthly backups, and four weekly backups.
|
||||
Now, if a file is never changed, full backup will store one instance of the file and create 18 links to the same file.
|
||||
So the file will be stored once and will appear in many different directories.
|
||||
Also, full backup takes advantage of sparse files, which means that if the file has blocks of null space, that space will be saved.
|
||||
So, let me tell you what it's like to retrieve a file from backup with full backup.
|
||||
It creates a regular file system, which means any method you want to use to get a file back will work.
|
||||
You can use regular batch file management tools like LS and CP.
|
||||
You can use a favorite graphical file manager like Rocks, Nautilus, Conqueror, Dolphin or Midnight Commander 2.
|
||||
If you have FTP or SFTP surface, you can also pull files through that also.
|
||||
This is all because it uses regular plain Linux files, so anything works on it.
|
||||
If you want, they have a source for its site at filebackup.sf.net.
|
||||
Let me set it phonetically.
|
||||
Foxtrot Alpha Uniform Bravo Alpha Charlie Kilo Uniform Papa Dot Sierra Foxtrot Dot.
|
||||
November Echo Pango.
|
||||
You can preview the manual pages there, as well as make inquiries by emailing their mailing list.
|
||||
If you decide to try it, I hope you will enjoy it.
|
||||
Today's geek tidbit, let's have a little geek haiku.
|
||||
Wily Quick Page eludes you handsomely.
|
||||
Smack that mouse harder.
|
||||
Thank you for listening to Hacker Public League.
|
||||
HPR is sponsored by tarot.net, so head on over to CARO.nc for all of us in need.
|
||||
Thanks for watching.
|
||||
Thanks for watching.
|
||||
261
hpr_transcripts/hpr0086.txt
Normal file
261
hpr_transcripts/hpr0086.txt
Normal file
@@ -0,0 +1,261 @@
|
||||
Episode: 86
|
||||
Title: HPR0086: Kismet
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0086/hpr0086.mp3
|
||||
Transcribed: 2025-10-07 11:18:51
|
||||
|
||||
---
|
||||
|
||||
为此为此为此为此为此为此为此为此为此为此为此为此为此
|
||||
Well, hi and welcome to Finnex's Student Hackers Guide to Linux. My name's Aaron Finne,
|
||||
but you guys can call me Finnex. So the aim of this segment is to take you through
|
||||
a Linux-based package that can be used to test your network or system security. There's
|
||||
an ethical hacking student app at the University in Scotland, and an avid Linux find that
|
||||
will pleasure a welcome and a number of packages that are functional on Linux car operating
|
||||
and the package I would like to talk to you today about is a wireless network scanner
|
||||
and a snifical kismet, and how kismet can be used to scan for wireless networks and devices.
|
||||
The aim of today's Student Hackers Guide to Linux is to use kismet coupled with a GPS device
|
||||
and Google Earth for war driving. There is a how-to guide to support this segment.
|
||||
It's going to be made available on both the Linux basement website and www.bilimicssociety.org.uk.
|
||||
I do suggest getting a hold of this first,
|
||||
definitely before you start any installation or configuration. I may refer to it from time to time,
|
||||
but both this segment and how-to guide are for educational uses.
|
||||
You've got to remember guys, education is our biggest weapon in the war against insecurity,
|
||||
so use this guide with responsibility. I suppose I should start off by telling you a little
|
||||
bit about world driving. World driving is the act of searching for wireless networks by a person
|
||||
moving vehicle using a Wi-Fi enabled computer such as a laptop or PDA. It's sort of similar to
|
||||
using a radio scanner or the amateur radio practice in DXing. There is a point that I would like
|
||||
to make clear. Certainly within the UK it's not illegal to do in war driving, however,
|
||||
I can't say the same for your part of the world. In this war driving guide we never actually
|
||||
connect to any of the networks that you discover, and I think clear morally I tend to agree with
|
||||
that. It's certainly not legal to connect to someone else's network without their permission in
|
||||
UK, and I would imagine most parts of the world it's pretty much the same there too. If it's not
|
||||
your network, you haven't been invited, then you don't have any place on it. I don't condone it.
|
||||
If you do it and get yourself into trouble, I'm not going to have any sympathy for you.
|
||||
Sorry for the kind of government health warning, but I wanted to make it clear that I don't want
|
||||
you to use this guide for breaking the law. Well guys, the idea behind this guide is that we run
|
||||
Kismet and the GPS device, and then with that setup we can go and detect secured and unsecured
|
||||
wireless networks and plot their position anywhere on the planet. Then you can either hop into your
|
||||
corner, jump on a bike or have a walk with this setup around an area, and then those results are
|
||||
stored into a database, which will later use to plot your findings. We can get those findings,
|
||||
and we're going to insert them onto Google Earth. It goes without saying that a laptop is
|
||||
required for war driving, however you could use a pda, but for the sake of this tutorial we're
|
||||
going to use a laptop. It also goes without saying, guys, while you're driving, keep your eyes
|
||||
on the road, not on the laptop screen. We're not going to be responsible for anyone having any
|
||||
accidents. Even if you don't have a laptop and you're not going to go and do a war drive,
|
||||
I seriously suggest installing Kismet. It's a fantastic tool for checking your wireless network,
|
||||
making sure that devices that are connected to your wireless network are known to you.
|
||||
Also, if you have a lot of Wi-Fi problems, it's also worth running Kismet to see if you have
|
||||
a conflict with other wireless networks in your area. We're moving on to the main topic of this
|
||||
guide. So what is Kismet? Well, apart from it being an Indian word meaning feat or look,
|
||||
it also happens to be a wireless scanning tool. Kismet describes itself as an 802.11 layer
|
||||
to wireless network detector, SNF and intrusion detection system. Kismet will work with any wireless
|
||||
card which supports raw monitoring mode and can sniff out 802.11b, 802.11a, and 802.11g traffic.
|
||||
Well, simply put what this means is that Kismet's a tool for manipulating the function of your wireless
|
||||
card and puts into what's known as promiscuous mode. This is also sometimes described as raw
|
||||
monitoring during the mode, or RFMUN, RFMOM. I suppose the next thing I should really talk about
|
||||
is active and passive scanning. One of the really cool things about Kismet and it's really known
|
||||
for this is that it's a passive scanner. Now, I really can't talk about passive scanning without
|
||||
really touching active scanning and one of the most well-known active scanners that I can think of
|
||||
as NetStumble. NetStumble works by broadcasting requests for any access point to respond to it.
|
||||
This is known as any request. Now, the any part of that request is spelled in capital.
|
||||
Basically what happens is the AP responds to this any request telling the inquire the name of
|
||||
the network that's responded and thus by doing this it maps that APs there. Now, I can't imagine
|
||||
this would be to tell your AP not to respond to any request, only respond to requests with its
|
||||
networks name. This is known as cloaked or hidden wireless networks. However, Kismet doesn't work
|
||||
like this and this is where the power of Kismet really lines. Kismet makes your card in on what
|
||||
could be best described as a listening post. A great big ear that's listening out for everything
|
||||
then it takes that information, dissect it and from there it finds the results. By doing this
|
||||
is able to decode hidden APs and also detect other wireless devices such as other wireless cards.
|
||||
Wireless devices send out a constant beacon when they're active. Kismet will see this and then
|
||||
report that it's found a device program for a network or an AP. It takes that packet that's been
|
||||
sent out looks inside that packet and from there it can find out a lot of information about that
|
||||
device such as the MAC address of the device or if it's connected to a network. The MAC address
|
||||
is needed in a probe or a connection so that any device that receives that probe can respond back.
|
||||
Try to think that this is an any eye number of mobile phone handset, an absolute address.
|
||||
You can change your SIM card, you can change the carrier but you're not going to change the
|
||||
army area, the handset. If a mobile phone operator wanted to send an update rather than picking out
|
||||
a single mobile phone telephone number to send it to, they would send it to their handset,
|
||||
they would send it to his any eye fingerprint. It's absolute physical address. As with a MAC address
|
||||
this number should never be changed, it's a physical identifier for that device. However,
|
||||
there is a few packages that can be used to spoof MAC addresses.
|
||||
Well, with Kismet you can run a test and see what wireless networks are open or closed in your
|
||||
office infrastructure. Like all defensive tools this can be used by a hacker for elicit purposes.
|
||||
With Kismet you can sit outside a wireless network, never connect to it and then intercept and
|
||||
sniff all the MAC addresses that connect that that wireless network. If the only security
|
||||
that you employ on your wireless network is MAC address filtering then you bypass that
|
||||
ring of security. MAC address filtering is when an AP allows connection to network depending
|
||||
on the MAC address that the device that's requesting that connection. Most common home wireless
|
||||
routers have this facility and a number of organisations use MAC address filtering as well.
|
||||
There are some requirements for your wireless card to use Kismet but the reason it's more of
|
||||
the Linux tool than Windows tool is more to do with the way that Windows OS interacts with
|
||||
this hardware via its wireless drivers. If you use NDIS rapid to get your wireless card to work
|
||||
then unfortunately Kismet's not going to run for you. For most wireless cards in laptops
|
||||
seem to be supported. I can tell you from personal experience that IPW or the Intel Pro wireless
|
||||
cards are supported. What to do? Go to www.KismetWireless.net and look for documentation sections to
|
||||
see if your card is supported. Another package that I want to touch on here is a program called
|
||||
GPS drive. GPS drive is a navigation system that uses data from GPS devices and plots at
|
||||
on a MAC. I'm not going to go into much detail about GPS. GPS stands for a global position
|
||||
in the system and it's a technology it's purpose is to pinpoint your position on the world.
|
||||
It uses a number of satellites to plot an X and a Y placement. GPS drive works pretty much
|
||||
hand-in-hand with Kismet and is incredibly easy for Kismet to use. Now for the purpose of this
|
||||
guide I'm going to use a Ubuntu 7.10 and a pretty standard laptop. The good news install Kismet
|
||||
with Ubuntu is pretty easy and can be done simply by opening up a command line terminal
|
||||
using the following command, pseudo aptitude install Kismet or by searching a synaptic package manager.
|
||||
Kismet is a very popular package indeed and I imagine most package managers and most
|
||||
distributions will have a copy of it in its repositories. However the source code is available
|
||||
and it can be downloaded from www.kismetwilis.net and compile from source. But for ease of use I've
|
||||
used a pre-compiled binary is available in the Ubuntu repositories. Kismet is also available
|
||||
in the standard Debian repositories as well for anyone that's using a Debian system. The guide
|
||||
should be pretty much similar. There's a little bit of configuration that needs to be done with
|
||||
Kismet however it's pretty simple it's only going to take a couple of minutes. Once Kismet's
|
||||
installed you need to edit the Kismet.conf file which in Ubuntu and in Debian can be found in the
|
||||
forward slash Etsy forward slash Kismet folder. Now we need to find the wireless capture source which
|
||||
is going to support your wireless card and Kismet. If you haven't already done so go and visit
|
||||
www.kismetwilis.net forward slash documentation.shtml and scroll down to section 12.
|
||||
There is a package that I think is installed by default on Ubuntu but it isn't actually on
|
||||
Debian called LSHW and it's just to list hardware. The good news that is available in the Debian
|
||||
repositories and it's also available in the Fedora ones as well if it's not just a quick look around
|
||||
for it. The reason I say this is you might know what the driver for your wireless card is.
|
||||
If that's the case you know this package isn't such an important part and you can skip this
|
||||
step but there is a lot of people where they lack where the hardware is supported by it out of
|
||||
the box out of Linux and maybe you don't know how your wireless card or what the driver is.
|
||||
You can download this package. We run this program and what that does is that lists the hardware
|
||||
for your wireless devices and it did this by issuing the following command. Sudows LSHW space dash
|
||||
capital C space network. I want this to list all the network devices and the drivers that
|
||||
are using them. So in my case I issued Sudows LSHW space dash capital C space network from here
|
||||
that I found my wireless card was using the IPW 3945 driver and then visited the documentation
|
||||
part of the kismet website, scroll down to section 12 and found that IPW 3945 was supported.
|
||||
Now in my case there was a couple of choices but I just wanted for a choice that wasn't similar
|
||||
to my driving name. The next step would be to go and configure the kismet.conf file.
|
||||
I've used G-Edit to work on the kismet.conf file but like I say you can use any text that you
|
||||
feel comfortable with. So in a terminal I put in the following command. Sudows G-Edit
|
||||
space 4 slash Etsy 4 slash kismet 4 slash kismet.conf. That would have been Sudows G-Edit
|
||||
4 slash Etsy 4 slash kismet 4 slash kismet.conf. And then I located the part of the file that
|
||||
said S U I D user equals your user here. And I'm placed it with my username. Do not put the
|
||||
root username in here. Kismet starts with super user privileges and then drops back into normal
|
||||
user privileges. So in my case I changed it so it read S U I D user equals Aaron. Then we need
|
||||
to set the capture source. I look for the line that reads source equals non-comma, non-comma,
|
||||
admi. Now the layout of this line is source equals interface comma capture source comma and you
|
||||
can ignore the admi part. So now I added the file with the interface. I put an ETH one but this
|
||||
may be different in your case. For whatever reason if you wish you an iF config this will tell you
|
||||
what your wireless device is. The source for me was ipw3945 and I left the app in a bit. So my
|
||||
line read source equals ETH one comma ipw3945 comma admi. Then I looked for the part of the
|
||||
devices. Part of the config file that says do we have gps? And then look for the line that says
|
||||
gps equals false. We need to change this to read gps equals true and save an exit file.
|
||||
To test the configuration of kismet issue the following command into the term pseudo kismet.
|
||||
Now I warn you that if you are connected to your network via wireless you're going to
|
||||
first need to disconnect. You can do this by with the no network manager is pretty easy. You can
|
||||
click right click on it and deselect wireless. Either that or you could issue pseudo iF config
|
||||
whatever your device is down. Now step two would be to install gps to drive. It's pretty
|
||||
popular package and there's available in both a standard Ubuntu and Debian repositories.
|
||||
However if you're using a different distribution this and check your package manager or download
|
||||
a source code and compile it from source. The web address the gps drive is www.gpsdrive.de.
|
||||
To install gps drive issue the following command into the terminal pseudo aptitude installed gps drive.
|
||||
Once that's done we need to configure gps drive to work with the gps device. I've used a Bluetooth
|
||||
gps device I wouldn't suggest using something like that. Not unless it's the only thing that you had
|
||||
to hand which was the case here. It adds another layer of technology between you and your system
|
||||
and the desired results that you want. I'll quickly run through how I'm it got the Bluetooth
|
||||
Dumbledore to communicate with the gps drive. But like I say it's not what I would recommend.
|
||||
If you have a device that plugs directly into your system and this is what I'd go out far
|
||||
go by. If this device works you then drawing if not best thing for you to do is have quick google
|
||||
about and find out how to make your gps device work. I installed a couple of Bluetooth packages
|
||||
which are in the standard Ubuntu repository. I don't know about other distributions you'll have
|
||||
to have a search about. Sudo aptitude installed blue z dash p i n blues dash ut i l s. Once they were
|
||||
installed I then needed to edit the Bluetooth hcid.com file which I did by issuing the following
|
||||
command into a terminal. Sudo g edd 4 slash ut c 4 slash Bluetooth 4 slash hcid.com. When that
|
||||
file opened I replaced it with a config file. I'm going to make that config file available within
|
||||
the how-to guide. I then went and restart the Bluetooth theme and by issuing the following
|
||||
command into a terminal. Sudo 4 slash ut c 4 slash i n i t dot d 4 slash Bluetooth space restart.
|
||||
When this is done I use the Bluetooth download scan for a Bluetooth device in its area by issuing
|
||||
the phone command into the terminal. Hcid 2 space scan. This listed Bluetooth enabled devices that
|
||||
were running range. So I got a result back like 001167805801bt dash gps which was the
|
||||
MAC address of the Bluetooth enabled gps device. I then took this MAC address of the gps device
|
||||
and then I'm going to make a serial connection between the Bluetooth dungle and the gps device.
|
||||
I took the MAC address of the device and I used the package called sdp2. I issued a
|
||||
following command into the terminal sdp2.01167805801 and in the results I got back. I found
|
||||
the channel that I was looking for. In my case it was channel 1 and I needed to make a file
|
||||
called rfcom.com. That's rfcom.com in the 4 slash ut c 4 slash Bluetooth folder. By issuing the
|
||||
following command I have made a sample copy of that config file which will also be available in
|
||||
the h2 guide. Anyway the command was pseudo g-edit 4 slash ut c 4 slash Bluetooth 4 slash rfcom.com
|
||||
and I added the contents of the file that I've made available in the h2 guide. So the next thing
|
||||
to do is start the gps device and issue the following command into the terminal rfcom connect 4.
|
||||
If for some reason you get an error message like concreate rfcom.tty address already used
|
||||
then issue the following command into a terminal pseudo rfcom release 4 and repeat the rfcom
|
||||
connect 4 command again. Once this has been done you need to run the gpsd which is a demon for gps
|
||||
devices. It should have been stored by d4 one way and stored gps drive but if isn't it's
|
||||
installed by the following command pseudo aptitude installed gpsd. Once this is done you need to tell
|
||||
the gpsd where it can find the gps device. This is done by issuing the following command into
|
||||
a terminal pseudo gpsd 4 slash death 4 slash rfcom fall. Once this is done you can check the gps
|
||||
device to see that it's working properly by issuing the following command into a terminal x gps.
|
||||
Next thing we want to do is set up a mysql database to store the the results from gps drive.
|
||||
After you've done that then we're nearly ready. Once your war drive is done then we can extract
|
||||
the data apart against google earth. So firstly we need to install mysql. I've done this by
|
||||
installing it through the Ubuntu repository. I want to check your distribution for documentation
|
||||
on how to install mysql. I'm installing mysql client version 5 and server version 5 although I
|
||||
don't think it makes much of a difference. For the purpose of this how to guide I've gone for
|
||||
those packages. There's also a python interface to mysql data to mysql that you also need. You're
|
||||
about to install it in this command as well. Sudo aptitude installed space mysql-cline-5.0
|
||||
space mysql-server-5.0 space python-mysqldb that was python-mysqldb. Once this has been done
|
||||
you'll need to connect to the mysql server and configure a database for the wireless results
|
||||
to go into. The germany installation of mysql server you should have been asked for a root password.
|
||||
If you did set one up you'll need to pass the dashp option on in the following command if you
|
||||
haven't then just ignore that part. The command is mysql-u space root space dashp space the less
|
||||
than sign space forward slash usr forward slash share forward slash gps drive forward slash curate.sql
|
||||
c-r-e-a-t-e.sql then you need to load gps drive up and take the box on the left hand side that
|
||||
says use sql. Now make sure that gps drive is using gps device that you've set up. You can do that
|
||||
by going in and clicking the preference box select some sentence to and just confirming that
|
||||
gps drive is looking at the correct gps device location. In my case that was forward slash
|
||||
slash rf-4 but it might be forward slash tt-y usb you can close gps drive down. Now if you
|
||||
look isn't it up again what you'll notice at the bottom of the page is the latitude and the
|
||||
longitude of your position that's just right above the status bar at the bottom of the screen.
|
||||
That's kind of all the hard work done. Now if you would load gps drive up again what you
|
||||
would notice is that on the map any epp points that you detected in Clismet will show up on the gps drive
|
||||
map. So that's your rig setup and now what you need to do is basically go and get some data.
|
||||
So like I said before hop into the car have a drive about and go and find some epp points.
|
||||
Once I get back and you're ready to do the next part what we have to do is extract the data
|
||||
from the SQL database and then convert that data so that Google Earth can read it. So one of
|
||||
the things that will probably be a good idea to do now would be to install Google Earth.
|
||||
Now this is to be honestly quite simple just go to the website www.earth.google.com forward slash
|
||||
download-earth.html or you could check to see if your package manager has it. Mine does but
|
||||
that's because I had the Google Ubuntu slash devian repository setup already in there. But once you
|
||||
have installed Google Earth then you can look at extracting the data from my SQL database into a
|
||||
.kml format which is the format that Google Earth supports. There is a script that I use to do
|
||||
this and to be honest with you that would be my suggestion. You could later on if you wanted to get
|
||||
more data you could look at that script and see how much data you're pulling out. But you would
|
||||
also probably have to look at constructing a little bit more of a complicated database for GPS
|
||||
driving and kismet yourself to download data into. But anyway I mean that's for you to have a look
|
||||
later on kind of went further if this interests you and then you can kind of go deeper into it.
|
||||
So the script that I'm going to use is a script that's called gpsdrive to google.ers.py.
|
||||
You can go and download a copy of it from www.delinuxsociety.org.uk forward slash content forward slash
|
||||
copy of gpsdrive.google.ers.google.ers.py I'll read that address again that the linuxsociety.org.uk forward slash
|
||||
content forward slash copy dash of dash gpsdrive to google.ers.py. And what to do is just cut and paste
|
||||
that page's content and then copy that into a new file. The new file will load up by issuing the
|
||||
following command sudo g-edit gpsdrive to google.ers.py. Copy the contents of that web page into that file
|
||||
save it and then what we need to do is make it executable. So sudo change mod space plus x space gps
|
||||
drive to google.ers.py then the next thing to do is move it to where the database is stored.
|
||||
Now if you're unsure of where the database is stored, it's normally stored in forward slash bar,
|
||||
it's forward slash lib, forward slash myc, or certainly isn't a Ubuntu and devian. However,
|
||||
what you could do is you could run the update db command which would be sudo update db and then
|
||||
locate g-o-imp for which is the name of the database. So what I did then I moved the gpsdrive google.ers.py
|
||||
file to where the database was stored by doing the sudo mv space gpsdrive to google.ers.py
|
||||
space forward slash bar forward slash lib forward slash myc, or once that file has been transferred
|
||||
then what it has run the script I did that by issuing sudo python gps to google.ers.py. Once that's
|
||||
been done you should see a file left called ap.kml that's the file that we need for google
|
||||
earth to plot our results I'm to. So sudo mv ap.kml space forward slash home forward slash user
|
||||
forward slash desktop. Replace the user obviously with your name so in my case it was a home slash
|
||||
alan slash desktop. Once there we need to load up google earth and then from there we can open ap.xml file
|
||||
and see where you went on your wall drive and the results are plotted. Well guys that brings us
|
||||
to the end of Finnex student hackers guide to Linux for this week. I'm going to close by saying
|
||||
a couple of things. Now I have said that this guide is for educational purposes only and it's not
|
||||
meant for you to go around and map where you can get free internet access for. I'm very serious when
|
||||
I say education is the biggest weapon I have in the war against insecurity but showing people
|
||||
easy it is for us to go and find this information out but and we're not even interacting with a wireless
|
||||
network we're just listening to it. We can show people that you need to think about wireless security
|
||||
it is an important thing. You could have people stealing bandwidth from you. You could have a
|
||||
hackers sit outside a wireless network and hack someone else from your IP address. So like I say
|
||||
just use the guide with responsibility. They're very interesting results but remember not to break
|
||||
not to break the law with it. I'd like to thank you guys for bearing with me. This is my first time
|
||||
that I've done anything like this. If I'm earning an iron a lot and I stumble a bit please forgive me.
|
||||
I would just like to say remember you wouldn't leave the front door to your house wedo so please
|
||||
don't leave the front door to your network wedo. This has been Aaron Finne. Phoenix is student
|
||||
H.P.R. sponsored by caro.net so head on over to C.A.R.O.N.C. for all of us in the
|
||||
205
hpr_transcripts/hpr0087.txt
Normal file
205
hpr_transcripts/hpr0087.txt
Normal file
@@ -0,0 +1,205 @@
|
||||
Episode: 87
|
||||
Title: HPR0087: Compling a Kernel
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0087/hpr0087.mp3
|
||||
Transcribed: 2025-10-07 11:20:31
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
Hacker Public Radio. My name is Klaatu and I'm going to be compiling a kernel.
|
||||
Kernel compiling has obviously been covered. A lot of places already, magazines, websites,
|
||||
podcasts. I am not an expert, but I thought that perhaps sort of a generic kernel compilation
|
||||
episode could be good. Dave Yates recently on his podcast, Lotta Linux Links, covered
|
||||
compiling a kernel. It was somewhat specific to a Debian system, so I'm going to be doing
|
||||
what I would call more of a generic version of that. It's compiling a kernel simply because
|
||||
my experience has been on either Slackware or Fedora, so the end result is not going to
|
||||
be ending up with a .deb file, for instance, it's just going to be kind of a more manual
|
||||
way of doing it, perhaps. This is also going to be based quite a bit on some conversations
|
||||
in the Lotta Linux Links IRC channel with Monster B and Peter 64. If you want to talk
|
||||
about kernel compiling with a couple of guys who compile kernels every other night, those
|
||||
are the two guys to talk to. Although that's not an invitation to go in and ask them all
|
||||
kinds of questions all over the place. I don't want to volunteer them for anything, but
|
||||
certainly if you want to chat about kernel compiling, they do know a lot about it.
|
||||
First, you'll need the, well, first, you should ask yourself why you're compiling a
|
||||
new kernel. Obviously, if your system is not broken, you may not want to fix it, especially
|
||||
if this is an important machine that you rely on, so keep that in mind. But a lot of times
|
||||
you'll want to compile a new kernel because you'll need hardware support, and that's a
|
||||
great reason to go get the latest kernel from kernel.org, where they have the latest
|
||||
stable version, they have the latest snapshot of the stable tree, they've got the older versions
|
||||
of the kernels, should you need for some reason, an older kernel. You know, all the source
|
||||
code that you're going to need is at kernel.org. Now, if you know the link of the source code,
|
||||
you can also use just a wget, and that's how I usually do it. So I usually cd into my
|
||||
slash usr slash src directory, and then I simply type in wget space, and then I paste
|
||||
the link of the source code that I'm looking for. So usually that's like http, colon slash
|
||||
www.cernel.org slash pub slash linux slash kernel slash v2.6 slash linux dash 2.6.25, it
|
||||
happens to be 2.6.25 right now, dot tar dot bz2, and that will simply download the source
|
||||
code as a be zipped file to your slash usr slash src directory. You'll then want to untar
|
||||
that. So it's t-a-r space dash xjf space linux dash 2.6.25 dot tar dot bz2. That unzips
|
||||
whatever the source code as a standalone directory. And it's customary, and I'm not really
|
||||
100% sure why this is, but everyone always tells people to do this, and so I've always
|
||||
done it, but you make a symbolic link from the from this directory that you've just untard
|
||||
to a directory called linux. So it's just ln space dash s, space slash usr slash src slash
|
||||
linux dash 2.6.25, space linux. Okay, so now we've got a symbolic link of a directory
|
||||
called linux to the source code of our kernel, of our new kernel. So actually I do know
|
||||
the reason for that. It's, I believe if you're, if you've got any kind of scripts or something
|
||||
like that that needs to act upon the kernel source code, then no matter what, we always
|
||||
have a symbolically linked folder called linux, which always is referring to the latest
|
||||
kernel source code. And that's why that is. So then you can change directory into the
|
||||
linux directory. So just cds, space, space linux. So here you are, you look around, you
|
||||
can LS, and you see all the, uh, the different files that the kernel maintainers have packaged
|
||||
into the latest kernel package. At this point, you are actually able to patch your kernel.
|
||||
So if there is something that you know specifically, you, you'll need as a kernel patch for whatever
|
||||
it is, whether it's a security patch or some kind of driver patch, uh, you can do that
|
||||
right here. So if there is, uh, for instance, a kernel patch that you have downloaded, let's
|
||||
call it, um, patch one dot bz2. And you would move that to the slash usr slash src. And
|
||||
then you would simply type in be zip to, that is spelled out. So it'd be the ip and the
|
||||
number two, space dash dc, space slash usr slash src slash patch one dot bz2, space type,
|
||||
space patch, space dash p1. And that will patch the kernel so that whatever, like security
|
||||
patch or hardware patch or driver patch, whatever that you needed to apply is now applied.
|
||||
Okay, so you'll want to kind of to make sure that you're starting from a fresh, a clean
|
||||
slate. You're going to type in make space mr proper. That is make space mr proper, easy
|
||||
enough. That basically just clears out any kind of little binary bits that might have been
|
||||
leftover from either a previous, uh, compilation effort or anything like that. Once you're
|
||||
ready, I mean, you're kind of ready right now to technically you could start compiling
|
||||
the kernel. If you did that at this point, you would be starting really, really from a very
|
||||
clean slate, maybe too clean because you would have to basically start from the very beginning.
|
||||
And the very, and if you're, if you're configuring, you're, you're basically going to start
|
||||
generating a configuration file so that when you type in make or make busy image as the
|
||||
case may be, the, the comp, the compiler will look at the configuration file for what
|
||||
you have, for what you've set for your system. And we'll use all those settings to compile
|
||||
a kernel appropriate for your system. What does this mean? Well, this means that you need
|
||||
to know everything on your system. You need to know the CPU type. You need to know, uh,
|
||||
what kind of drive controller you've got, a hard drive controller, uh, controller. Do
|
||||
you have scuzzies, uh, IDES, uh, SATA, basically everything about your system. What kind of, uh,
|
||||
Wi-Fi card you have, what kind of graphics card stuff like that. So this is significant
|
||||
because if you don't know these things, then you're really going to be compiling a kernel
|
||||
without any kind of clue as to what you're doing. So before you really do this, you need
|
||||
to really read up on your computer, figure out what exactly your components are that you're
|
||||
going to need to use. Luckily for you, uh, if you've got a working system as it is and you
|
||||
probably do since you're able to at least go and download the source code for the kernel
|
||||
in the first place, uh, you already have a configuration file on your system. And this
|
||||
is somewhere in your slash boot folder. So it's kind of going to, it's going to be a little bit
|
||||
different depending on where your system came from and who built it and, and how they built it.
|
||||
Sometimes the configuration file that you're looking for is, uh, like dot config. So you
|
||||
won't really see it right away. Uh, sometimes it is, uh, config dash huge dash s m p dash two dot
|
||||
six dot two one dot five dash s m p. It just really depends on your system. So have a look just
|
||||
LS space slash boot and you'll see in there that this is your current boot directory. So you'll,
|
||||
you'll see in there all your all the system maps and all the configuration files and all the
|
||||
VM linus files, uh, that your system basically is right now having available to it. So have a
|
||||
poke around in there, find the config, the current config file for the current kernel that you are
|
||||
using. Uh, if you don't know what kernel you're using currently, simply type in you name that is
|
||||
the letter u in a m e space dash a v. And this will tell you what kernel you are actually running.
|
||||
So I do that and I get two point six point to one point five dash s m p, uh, and a lot more
|
||||
information. But so now I know that that's the kernel version that I am currently running. So if I
|
||||
use the config file for two point six point two one point two, uh, point five dash s m p, I'll know
|
||||
that I'll be using the, uh, proper configuration file. So how do I use this old configuration file?
|
||||
Uh, well, since I'm in my slash usr slash src slash linux directory, I can simply type in
|
||||
cp to copy cp space slash boot slash config dash huge dash s m p dash two point six point two
|
||||
one point five dash s m p. So that's just the old configuration file that I've identified, right?
|
||||
And then I'll type a space dot slash dot config. So what I've done is I've copied the old
|
||||
configuration file into the current directory. That's the dot slash. And then I've named it dot
|
||||
config. So I've just basically copied it and I've renamed it to be dot config. That's just an
|
||||
easy way to grab everything that the kernel already knows about your system and put it into the
|
||||
current, uh, kernel source code directory so that we can start from where we've left off, you know,
|
||||
so it's where we're instead of building the kernel configuration file from total scratch. Now we've
|
||||
at least got, um, basically at least a system as good as what we've got already and we can just
|
||||
uh, configure the new options. And to do that, you can simply type in make space old config.
|
||||
Okay, so this will attempt to make a usable, uh, configuration file based on your old kernel,
|
||||
but there will, there might be differences because obviously the new kernel will have perhaps new
|
||||
new options. Maybe it will have removed certain options. You'll still have to configure, uh,
|
||||
something probably, but like I say, it's a lot less work than starting over from scratch. And that's
|
||||
a great way to do it, especially if you've never compiled a kernel before. That's a great starting
|
||||
place. All right. So after you've gone through and basically it's just going to ask you a couple
|
||||
of questions and you can usually type in question mark, uh, return that will give you sort of a clue
|
||||
as to why it's asking you and what the significance of what it's asking you is. But, um, it's just
|
||||
going to ask you questions about, you know, whether you need certain, um, certain things enabled,
|
||||
like groups CPU scheduler, do you want that enabled? And it will have a, a yes or a no or a question
|
||||
mark. And you can, the, the default option will be capitalized and where it might ask you to,
|
||||
you know, whether you want to create deprecated, cis, fs files, um, just all these different questions
|
||||
about like the new options that the newest kernel has available that your old configuration file
|
||||
didn't have. If you don't know what it's asking you, the safest thing and, you know, read the help,
|
||||
help the help screen, but also I guess the safest thing would typically be go with the default.
|
||||
Once you're ready, once, once you've answered all the questions that it throws at you with the,
|
||||
the make old config, you will want to then make menu config that will bring you into the main
|
||||
configuration menu. You can navigate through this. It's an incursive screen. So it's, it's graphical,
|
||||
a little bit low five, but it is a graphical interface. There's a lot of help files available
|
||||
within that. And, uh, you can simply kind of go down to the, uh, load an alternate configuration
|
||||
file option and hit return. And it will, it will load up that dot config, which, uh, obviously is,
|
||||
is what we just renamed the configuration file too. And so this will use exactly what you've
|
||||
configured to make the new, um, the new kernel configuration. It will give you some options
|
||||
in, in terms of the, the many, many choices that it gives you. You can either build the choices,
|
||||
the, the different aspects of the kernel into the kernel. Uh, you can make it a module so that you
|
||||
can lay it, you, you can load it, you know, after the kernel is, is running, uh, or you can just not
|
||||
include it. You don't build a certain, a certain option into the kernel. And it really depends on
|
||||
what you need, what you think you need, uh, as to what, what you're going to do in each case.
|
||||
If it's something that, um, you know, there's, there's options for like amateur radio, support,
|
||||
things like that. Those kinds of things, you probably just don't need to build, but certain,
|
||||
other things you're going to have to really kind of think about, think about your system,
|
||||
and, you know, choose accordingly. At this point, you are ready to actually start the compile.
|
||||
So you will type in make, be the image that is make beta z image with a capital i. And that
|
||||
starts compiling the code. That could take a while depending on speed of your computer. Uh, and after
|
||||
that's finished, you will type in make space modules, which obviously makes the, uh, the options that
|
||||
you would chose to not build into the kernel, but build as modules. That'll do that. Now,
|
||||
once that's finished, that won't take as long. Once that's finished, it's time to start moving
|
||||
some files around. Now, the idea here, if you, it's pretty simple, if you think about it,
|
||||
and you just have to kind of think about it because moving all these files, listening to me, say,
|
||||
the paths of all these different files gets kind of confusing after a while. But if you think about
|
||||
what's happening, you're basically taking those old kernel files like the VN Linus that represents
|
||||
the old kernel and the system map that goes along with that old kernel. You're just going to rename
|
||||
those so that for yourself, you know that that's the old kernel. And then you're going to move in
|
||||
the new stuff that you've just done, like the bz image and the new system map, you're going to
|
||||
move that into the boot directory because the boot directory is obviously what the boot loader
|
||||
is going to need to boot up into a certain kernel. So the details of that would be MV, like move,
|
||||
MV, space slash boot slash VM Linus, space slash boot slash VM Linus dot old or whatever,
|
||||
whatever you want to name the old kernel so that you can recognize it as the old version.
|
||||
Okay, so you've just moved the old kernel into a backup version of itself.
|
||||
So take the new kernel and put that into the VM Linus. To do that, you'll type in cat,
|
||||
space arch slash i386 slash boot slash bz image greater than sign space slash boot slash VM Linus.
|
||||
So you're just taking everything out of bz image and sending it over into VM Linus.
|
||||
The reason I'm giving the path arch slash i386 slash boot slash bz image is because that's
|
||||
what it is on my computer. On yours, it might be arch slash x86 underscore 64 or something like that.
|
||||
Just kind of depends. Just looking right where you are, the slash usr slash src slash Linux.
|
||||
There's an arch directory there. And in that arch directory, you'll see architecture that you
|
||||
have available to you. So now that you've moved the new kernel over to VM Linus, you'll need to
|
||||
take the old system map and rename it so that you know that's your backup system map.
|
||||
So again, it's in the space slash boot slash system dot map, space slash boot slash system dot map dot
|
||||
old or whatever you want to call it. So you're just renaming the old system map to something
|
||||
to denote that is the backup system map. Now you'll want to copy the system map that you've
|
||||
just created while compiling your new kernel into the boot directory. And that is done quite
|
||||
easily. CP space system dot map, space slash boot slash system dot map, easy enough. Now you'll
|
||||
want to make modules underscore install that is make space modules underscore install. And that
|
||||
takes care of all those modules, make sure that they're where they need to be. And you're pretty
|
||||
much finished in terms of dealing with the kernel files and everything like that. The last thing
|
||||
you need to do is configure your bootloader so that when you reboot your computer, you'll be able
|
||||
to go into either the old or the new kernel. So if you're running Lilo as your bootloader,
|
||||
you will open up in the text editor slash Etsy slash Lilo dot comp. And you'll take the existing
|
||||
entry, which was probably auto generated by what you know when you were first installing your
|
||||
distra. You'll take that old entry and you'll make a copy of it. And on the old one, you will
|
||||
append, for instance, where it's pointing to VM Linus, you'll make that VM Linus dot old. And on
|
||||
the new one, you'll leave that as it is because it's still pointing to VM Linus, which you've
|
||||
just updated with your new kernel information. You will probably want to change the label as well,
|
||||
otherwise it'll both say Linux. So make one say like Linux old and one Linux new or Linux dash
|
||||
2.6.21 versus Linux 2.26, 2.6.25. Just something for you to recognize, which is the old kernel,
|
||||
which is the new one. And since it is Lilo, you need to update it after you've finished editing it.
|
||||
So to update Lilo, you just run slash S bin slash Lilo and that updates Lilo. If you're running
|
||||
grub, you just open up in a text editor slash boot slash grub slash menu dot LST. And again,
|
||||
copy the existing entry that was probably auto generated by your installer. Make the old one VM Linus
|
||||
dot old and make the new one VM Linus and change the label so that you can tell them apart.
|
||||
You don't need to update grub, it will update itself and you just reboot. And once you reboot,
|
||||
it'll get to your bootloader and you can tell it to boot into the new kernel and take it for a test
|
||||
drive, see if it works. Now if it doesn't work, never fear you've got that old kernel available to
|
||||
you via your bootloader. So you can just reboot, go back into your old kernel and you're good to go,
|
||||
you can try to recompile the new kernel and see if you can get it working properly. In my experience,
|
||||
when you use your old config file, usually the new kernel just kind of works. But if not,
|
||||
you know, just boot into the old one and try to recompile the new kernel. Remember before
|
||||
recompiling the kernel, you'll want to type in make space MART proper so that it kind of starts
|
||||
back from from ground zero that also deletes that little config file. So you'll need to recopy
|
||||
the old config file from your your boot directory back over into the source code directory so
|
||||
that you can try to reuse it. That's it for kernel compiling. Thanks for listening. Next time,
|
||||
I'm going to cover compiling a kernel over a cluster network, a little bail wolf cluster. And in
|
||||
the meantime, if you have ideas for hacker public radio, like episode ideas or cool tips or
|
||||
tales of Linux adventures or hacking adventures that you want to relate, contact the admins
|
||||
over at hackerpublicradio.org. This is obviously a show by the community for the community. So the
|
||||
more contributors we have, the more variety we'll all have. And making an episode easy, it's fun,
|
||||
so give it a shot. Thank you for listening to hacker public radio. HPR is sponsored by
|
||||
caro.net, so head on over to C-A-R-O dot E-C for all of your community.
|
||||
85
hpr_transcripts/hpr0088.txt
Normal file
85
hpr_transcripts/hpr0088.txt
Normal file
@@ -0,0 +1,85 @@
|
||||
Episode: 88
|
||||
Title: HPR0088: Hiding and stripping program symbols
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0088/hpr0088.mp3
|
||||
Transcribed: 2025-10-07 11:21:11
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
Hello and welcome to another episode of Hacker Public Radio. I will be your host today,
|
||||
a few texts and today we'll be talking about hiding and stripping symbols from programs.
|
||||
The outline for today is talking about why you'd be interested in such a thing
|
||||
as hiding and stripping symbols from programs. Then we'll talk about background knowledge
|
||||
of what you need to know for it to all make sense. Then we'll talk about how you actually do it.
|
||||
And then a couple tips and tricks when working with symbols and programs.
|
||||
So why are you interested in symbols and programs in your computer and why do you care?
|
||||
About hiding them and stripping them. First they can reduce the size of your program.
|
||||
They can make it load faster, run faster, and in some cases it can prevent breakage.
|
||||
So if you use computer it's important to you. Particularly it's important if you're a programmer
|
||||
or if you're a package maintainer or just if you're interested in how your computer works
|
||||
or even in some reverse engineering context is important to know about symbols in the programs.
|
||||
So it's important to note that we're talking about programs here. We're talking about compiled programs,
|
||||
programs compiled from source code as opposed to interpreted programs.
|
||||
So interpreted programs you have human readable source code, high level source code commands that's read in.
|
||||
And the program that is run is not run directly by the processor. There's actually another program
|
||||
that interprets the commands, the interpreter. There's another interface between the high level source code
|
||||
and how it gets fed to the processor. But compiled programs you start off with source code, human readable instructions and logic.
|
||||
And that has to be compiled into instructions understandable by the processor.
|
||||
So interpretive examples are Python or bash scripts and compiled languages such as C or C++ or Fortran or something like this.
|
||||
And when you use a high level programming language like C or C++, one of the artifacts of the compilation process,
|
||||
the process of compiling and linking and building your programs is that you get these symbols inside the files that you create.
|
||||
And these symbols are human readable symbols for the functions and the classes that you have designed in your source code.
|
||||
So if you have made any programs in a compiled language such as C or C++, you are probably already familiar with the symbol terminology.
|
||||
You've come across it, I'm sure, in debugging. So often if you're doing debugging, you send a switch to the compiler that says include debugging symbols.
|
||||
And what these debugging symbols are tags to the functions and classes that you create. So it will say, I have this function kickbutt in my program.
|
||||
And when you include the debugging symbols that will have information of where the kickbutt program, what file it's created and what line number it is on, so that you can debug the code effectively.
|
||||
The symbols are also important for understanding how libraries work. You have a library that you create and then you have another program that is going to call some functions or classes from that library.
|
||||
And how you call them, you name them according to the human readable symbol name when you are calling them in your code.
|
||||
And so of course those names have to exist in the library in some state and those are the symbols in the libraries.
|
||||
One of the benefits of hiding symbols is that there are reduced conflicts in the symbol names of your libraries.
|
||||
So you hide symbols that do not need to be available to the user of the library. That way if two libraries have the same function or a function with the same name that might do different things, there's not a conflict there and you don't have problems of calling the wrong function, for example.
|
||||
The long and short of it is that there are symbols in compiled object files and these symbols are an artifact of the high level source code, the human readable function names and class names.
|
||||
So the idea is that if you're not doing debugging, you don't include debugging symbols. And if you have a library with functions that you do not intend to be called by the user's program or other libraries, then you do not have those symbols available.
|
||||
And when you do not have these symbols available, the file size is much, much smaller in some cases and that means it's faster to load the file.
|
||||
It takes a long time to read files from the hard disk and it takes up less space on the hard disk and in some cases with shared libraries, your library can run much faster.
|
||||
So how do you hide and strip symbols from your compiled object files?
|
||||
In libraries, you have to have some way of defining which functions and classes you want made available to the user of the library.
|
||||
You have to define your API, if you were.
|
||||
This cannot be done automatically by the compiler because the compiler has no way of knowing which functions and classes you intend on making available in the future and using in the future.
|
||||
So there are two basic ways of defining the API.
|
||||
The first way is in source where you modify your function definitions so that the compiler can understand which functions and classes you want made available.
|
||||
There are different ways of doing this depending on the compiler. For example, for the windows, visual compiler, there is a syntax containing underscore, underscore, dll, spec, dll, import or dll.
|
||||
For the GNUC compiler, there is something that looks like attribute visibility hidden or attribute visibility default.
|
||||
By having these in your function declarations, you can define which functions you want to be hidden and which functions you want to be visible.
|
||||
So the hidden ones, you can strip away and hide away.
|
||||
GCC also has a good way of doing things where you can hide functions by default using the dash f visibility equals hidden switch to the compiler.
|
||||
And then just to find which functions you want to be available for calling.
|
||||
You can do that either with the declaration at each function or you can do it with a pound pragmat gcc visibility command.
|
||||
The second way of defining which functions and classes you want to be kept inside the library is with a linker.
|
||||
You can create a linker script and you can pass that to the linker that contains the definitions of the functions you want to be local and functions you want to be external.
|
||||
For more information on hiding with the compiler, see the gcc man page and the f visibility switch section or there will be some other links in the show notes.
|
||||
For more information on using the linker to change the symbols available, see the info page on the LD command.
|
||||
I prefer to use the in source method because it's one less thing to think about.
|
||||
And for your binary applications, you can also remove the symbols.
|
||||
You can remove the symbols with a command called strip in Linux or you can do it by sending commands to the linker such as the dash s switch to the LD linker in Linux.
|
||||
Remember, you can send commands to the linker through the pile or such as gcc with the dash capital W lorscore L.
|
||||
So it would be dash capital W lorscore L comma dash lorscore s.
|
||||
So some tips and tricks for working with symbols.
|
||||
When you're going through your source code and figuring out which functions to make available and which to hide, be careful about your headers.
|
||||
So you include headers of programs and they may not have had that logic built into them about which programs may be available.
|
||||
And they, you may hide things that you may not want to have hidden.
|
||||
Also watch out for exception classes.
|
||||
Even if you're not fooling around with hiding symbols or stripping symbols, this can be a gotcha in C or C++.
|
||||
This is how I came across all this jazz about hiding and stripping symbols.
|
||||
There are some inherited exception classes in the standard library who are not visible.
|
||||
And even if you throw them during your program, everything will compile fine but it will not run correctly.
|
||||
And this has to do with visibility problems.
|
||||
Remember that reverse engineering is made easier by having these human readable symbols in your program.
|
||||
A lot more easier if you have debugging symbols in the program but non debugging symbols are useful too if you want to do reverse engineering.
|
||||
So hide and strip your symbols if you're worried about people reverse engineering your applications or try to get a version of an application that has been compiled with debug symbols if you want to try reverse engineering on it.
|
||||
Finally the NM application in Linux will show you all the symbols within an objects file.
|
||||
So that's very useful in understanding what's going on.
|
||||
Thank you for listening. Please tune in next time for another exciting episode of Hacker Public Radio.
|
||||
Thank you for listening to Hacker Public Radio.
|
||||
HPR is sponsored by Carol.net so head on over to CARO.ENC for all of us here.
|
||||
Thank you.
|
||||
230
hpr_transcripts/hpr0089.txt
Normal file
230
hpr_transcripts/hpr0089.txt
Normal file
@@ -0,0 +1,230 @@
|
||||
Episode: 89
|
||||
Title: HPR0089: Notacon Wrapup
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0089/hpr0089.mp3
|
||||
Transcribed: 2025-10-07 11:22:01
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
This is HackerPublicRadio, today your hosts are DOSMAN and Shane and we're going to talk
|
||||
a little bit about what happened at Nauticon this year, what we did for the event and some
|
||||
other stuff, lockpicking, other stuff that we did also.
|
||||
Some real famous artwork that totally didn't get voted up, but it should have been.
|
||||
Yes, George had some tremendous artwork, gosh, I don't even think I could describe it.
|
||||
I won't even try, maybe we can post it in the show, no, there we go, that would be perfect.
|
||||
Yeah, so I guess Nauticon happened the first week in April this year.
|
||||
We will Shane did a bunch of work leading up for the froggy and tiger, asked us if we
|
||||
were going to be doing the lockpicking pogo to this year and we kind of got together and
|
||||
said, yeah, okay, and what all did you do for the pogo to this year?
|
||||
Well, the design idea started last year, actually, while I was at DevCon's lockpicking
|
||||
village, and I thought, wow, this is going to be a royal pain if somebody comes along
|
||||
like what happened at Nauticon this year and comes along and just attacks a lock with
|
||||
such fury that they break it immediately.
|
||||
And you know, how are they going to really change that out?
|
||||
So when I ended up moving out here and started actually being a part of a group and all,
|
||||
I looked at designing something that would be modular, that would vaguely travel well
|
||||
and that could have stuff easily changed out on it.
|
||||
So being that I spent a lot of time in Japan, I started out by making some Tori gates,
|
||||
which are the gates that you see in front of most temples.
|
||||
And I took those, I made, I made wall pieces that go in the centerpiece, there's two slats
|
||||
per gate, and those are held in with, with eye bolts, and you just yank the eye bolts
|
||||
out and you can swap those planks out pretty much however you want to do that.
|
||||
And on the eye bolts, we had padlocks and then the walls themselves, there were three
|
||||
locks each.
|
||||
And the wall is kind of progressed from really easy to sort of easy to nobody opened any
|
||||
lock on this wall.
|
||||
And you know, we were cool, we managed to open up one of the locks on the wall, but not
|
||||
while I was actually in the wall.
|
||||
And then there was another lock that everybody was convinced was broken, but I opened it,
|
||||
so it's not broken.
|
||||
It's still there, too.
|
||||
Boom, it's open.
|
||||
Yeah, the thing you've been working on for the last two hours, sorry about you.
|
||||
It works.
|
||||
Yeah, we're really sorry if you're listening, but that was funny.
|
||||
I did manage to pull out about four tons of dust that came off of all the pins, so they
|
||||
probably don't really look like pins inside of there anymore, was everybody attacking
|
||||
them.
|
||||
Yes, yes.
|
||||
A lot of good damage on the locks.
|
||||
Gosh, they've got pictures up.
|
||||
Yes, yes, on the Bloomington Fools website, we of course are a locks board group, this
|
||||
fraternal order of locks board.
|
||||
And of course, based out of the city of Bloomington, Indiana, we have BloomingtonFools.org and
|
||||
we've got a couple photos up there.
|
||||
You can also just go to Flickr and look up for a Nodicon 5 2008 photos.
|
||||
Make sure you skip that one guy that took a bunch of scenery pictures and tagged it with
|
||||
Nodicon.
|
||||
Yeah.
|
||||
Thank you.
|
||||
Thanks.
|
||||
Dush.
|
||||
So yeah, yeah, so you spent a lot of time on this leading up to Nodicon.
|
||||
I spent a lot of time on it on my weekends and everything.
|
||||
It's stained and it's rubbed with Dutch oil and I made some shingles and stuff like that.
|
||||
But I don't know, it was a fun project for me.
|
||||
It was much more fun than standing down on my kitchen cabinets and restaining those.
|
||||
But the part that really we were showing out for is because Dotsman gave a great and
|
||||
well-received talk.
|
||||
Thank you.
|
||||
Thank you.
|
||||
Yeah.
|
||||
I actually gave a talk.
|
||||
This was my first con that I've actually given a talk at and I talked about.
|
||||
My talk was entitled something like mechanic or lockpicking into the new frontier for
|
||||
mechanical to electronic locks or something.
|
||||
I don't know.
|
||||
Yeah.
|
||||
Something like that.
|
||||
And I talked basically a basic primer on lockpicking and then went into some high security
|
||||
locks and then talked about some electronic lock systems that I've built devices for that
|
||||
unlock them and talked about some things I'd like to get my hands on like cyber lock.
|
||||
If anyone has a cyber lock, I'd love to get ahold of any Dotsman at packets nippers.org
|
||||
and I'll reimburse you handsomely or at least in some form or fashion.
|
||||
So anyway, that seemed to be well-received and that was really fun getting to do that
|
||||
and get to talk to some of the people that I first saw a presentation on lockpicking
|
||||
from that came up and you know gave me a congrats on all that like Jimmy Chan and Colonel
|
||||
Panic and Idal, other folks.
|
||||
So some of the other stuff leading up to NaughtyCon, George and Zach put in a lot of time working
|
||||
on some music for the block party.
|
||||
We made that reference about George's artworks, stunning the audience.
|
||||
He's had a wow photos submission and that was a very the the tamest picture of his and it really did
|
||||
stun everybody.
|
||||
I don't think that I mean everybody had a wisecrack for everything else but this because
|
||||
really nothing really top the wisecrack that was the artwork in the first place.
|
||||
Yes, yes and for those I guess I should back up a little bit.
|
||||
For those that might not be aware, for the last two years now Jason Scott and Radman
|
||||
have been hosting something called Block Party at NaughtyCon.
|
||||
It's a part of the same event and it's basically a hair sort of an homage to the old demo
|
||||
scene and they have all kinds of entries you could do write a program that does visual
|
||||
and audio stuff on your Commodore or on something using the latest you know programming
|
||||
framework for X86 architecture or whatever you want to program for and then there's also
|
||||
there were like photography, compos, music, different types of music, eight-bit, streaming
|
||||
music, modern, electronic but the programming was the big deal with that.
|
||||
There was really some awesome stuff out there I was really good to see a lot of people
|
||||
turn out and a lot of people just throw their stuff out there you know whether or not it
|
||||
was a centaur with a goatee face or if it was somebody's great picture that they had
|
||||
taken or if it was just some crazy music that was developed it's that type of thing is
|
||||
just way beyond me you know I can stick to something that's about it.
|
||||
And there were some great people from that scene there.
|
||||
Some of the people I never heard of but a couple of them I was familiar with like a
|
||||
trickster who did the full motion video on an XT thing that makes makes slash odd or some
|
||||
side every every couple of months.
|
||||
He had another entry this year there was Jerry Ellsworth who I think is really cool that
|
||||
it was fairly well known in the Commodore scene for well designing her own Commodore board
|
||||
using FPGA's and other equipment just doing lots of cool stuff with Commodore she designed
|
||||
the D TV Commodore game joystick for home shopping network which was basically a Commodore
|
||||
inside a joystick one of those type of game systems and oh yeah if you open it up there's
|
||||
like you know a place where you can solder and keyboard jack and all that kind of stuff
|
||||
on there so it's sort of like a sort of hiding and sneaking and modern Commodore out to
|
||||
the masses and for the tinkers that want to mess with them.
|
||||
So anyway lots of cool people lots of good things out there going on.
|
||||
So I guess to go back into the lock picking aspect deviant olem of tool was there also
|
||||
in the lock picking pagoda and was just doing a kickass job with the Gringo Warrior and Gringo
|
||||
were I don't you want to talk about that a little bit? I can. Gringo Warrior is essentially
|
||||
a scenario challenge that finds you getting down to Tijuana with fine Dan Kaminsky and waking
|
||||
up being harassed by people that may or may not be law enforcement but your handcuffed
|
||||
in a room and they want your money and they're going to give you a little while to think
|
||||
about it. So in the process they neglected to take your lock picks away from you. So the
|
||||
scenario starts out with you and handcuffs and there are see there's four other positions
|
||||
that you have to go through that we don't necessarily have to go through them all but you've
|
||||
got a door lock you need to pick then there is a cabinet lock and then a dead bolt and
|
||||
after that you have to go through a car lock and the cabinet and the car lock are optional
|
||||
as far as how far you get away but this is all scored on cool points and originality
|
||||
and difficulty as there's three sets of locks that you can choose from at each station.
|
||||
It's a very strong scoring system for various levels depending on how you start out with
|
||||
the handcuffs there's three or four different positions you can start out with and the more
|
||||
difficult position you start out and get you more points and it's also a five minute you have
|
||||
five minutes to do this entire course so time is also a factor as well as creativity and you know
|
||||
how difficult of each lock that you pick. Neither of us won. We tried but there was a guy
|
||||
he was a cool guy that was hanging out at the lock picking pagoda last year not a con 2007
|
||||
Dave Klingman and he flew through the course in like a minute and a half or a minute. He went
|
||||
through he had his handcuffs I think he had him behind his back do you do double lock behind
|
||||
his back or just behind his back. I don't know it was at least behind his back it was behind his
|
||||
back I can't remember if they were double locked or not but he got out of that and went through all
|
||||
the more difficult locks nobody actually went through the most difficult door lock or through
|
||||
the most difficult padlock because it was a new lock that isn't quite the same but I'm not going
|
||||
to talk about that one too much. Yeah yeah I don't know when I did it let's see my first run I made
|
||||
it in three minutes and one second I believe and I just did the medium locks all the way across
|
||||
I may have done one hard lock maybe the cabinet lock yeah you would be pretty good and I for early
|
||||
on I was doing pretty good I think I had 404 points 404 yeah you but obviously since I was giving
|
||||
a talk on lock picking it was definitely necessary to disqualify me from the prize which I think
|
||||
quite reasonable I was just happy that since I was giving a talk on picking I I didn't suck it
|
||||
up on the corners oh what were the prizes that Deviant had oh man I cannot remember the artist name
|
||||
but he had two really cool prints from a British artist I want to say if I'm wrong on any of this
|
||||
don't blame me but there were some really cool shots from a graffiti artist that that he just
|
||||
kind of transposed into other situations one of them was a one of the billions of cameras that's
|
||||
around London it was pointed at a wall and he had spray painted what are you looking at on the wall
|
||||
that was pretty good having been through he threw a couple of times and seen myself way too often
|
||||
um yeah it's just it's just creepy I'm only about through Glasgow it's the other
|
||||
airport I think I went through the other one and I was rushed all the way through so I didn't
|
||||
get chance to check out the security cameras or do anything that are you're not missing anything
|
||||
it's all on tape somewhere if you want to see it again I'm sure sure I'm sure I'll be
|
||||
imprisoned at some point for something and I'll get to see all this that is not a good admission
|
||||
of any kind of guilt or whatsoever so yeah so gosh not a con was a blast um Shane was a lock
|
||||
picking pagoda room pretty much the entire weekend yeah I have no idea actually what happened
|
||||
not a con aside from what three of them I did go see the block party judging but that's because
|
||||
it was at three in the morning and everybody else wanted to as well the first night we went back
|
||||
to go make sure that nobody thought that it would be funny to pick the lock to the pagoda room and
|
||||
steal all of our stuff and yeah we had the room open for about five minutes and then the room was
|
||||
full again so we we stayed there for another three or four hours yeah yeah miss some cool people in
|
||||
that time that was uh definitely as kind of nice and relaxed there but uh finally around two
|
||||
thirty or three we had just had to shut it down we it was it was a quite a long Friday uh but it
|
||||
was definitely cool um and oh yeah um speaking of the three a.m. demo awards Jason Scott if you're
|
||||
listening I'd really like to see the demos because I think I was way too intoxicated at that point
|
||||
I just cannot remember any of the demos I saw some photos that seemed to possibly jog some
|
||||
memories for me on flicker but no video of that so yeah I don't remember any of the demos that I
|
||||
saw I just remember um when the people won and thinking hmm I think I saw that but yeah after
|
||||
afterwards we had conversations about that and um none of us seemed to be able to remember
|
||||
what exactly happened yeah yeah so so demo scene dot us is the block party site so at some point
|
||||
they're they're supposed to be posting the uh uh all the demos all the entries for all the
|
||||
compos on there so hopefully soon it's not like Jason Scott's not busy or anything making
|
||||
two or documentary's and running block party and whatever else he does so what like we like we
|
||||
all are busy or something get on it so gosh let's see we saw the award ceremony Sunday uh
|
||||
saw heck I don't know will happen wow I don't uh some some guy ran into my car oh yeah that was
|
||||
nice that was great um it's not not very hacker-esque but I will tell you that some people are
|
||||
still dumb enough to put their socials on their on their driver's license so guy in the big white
|
||||
Lincoln don't know what to tell you yeah oh man oh yeah well I didn't have to drive this year
|
||||
I suppose but anyway I'll go in that um yeah so Zach and George did a we see for the the packet
|
||||
team packet sniffers entry uh the the song that Zach and George made and I had a small contribution
|
||||
towards um with a little voiceover that I did came in second place for the the music entry
|
||||
and uh so that was really fun and a lot very cool and who won first place on that I have no idea
|
||||
was that one that uh fat man wonder was that a different one probably fat man and Jerry
|
||||
yeah I know uh there was one that the fat man did win and well you know some people do have a certain
|
||||
amount of experience over others and considering he was showing off all the professional stuff he
|
||||
does for like big budget movies are relatively big budget movies that's movies with a budget
|
||||
movies with a budget absolutely that's not too unexpected but
|
||||
oh all right so I guess uh I don't know there's not a whole lot more I guess I have that we have
|
||||
to talk about it not a con there are lots of things that went on oh yeah
|
||||
anyone if you if you went to not a con and you saw the person dancing around
|
||||
um and the clean suit um I'll drop some docs on Zach that that was Zach by the way
|
||||
if you didn't know that I all the photos I saw of that they said huh some guy in a clean suit we
|
||||
have no idea who it was that yeah he needs credit for that I've never seen somebody bring so many
|
||||
costumes to one event before that was quite intrigued go figure no comment I'm sorry Zach
|
||||
you'll be able to defend yourself in another episode of hacker public radio here um I'm sure
|
||||
so future stuff uh next year's not a con I don't know what'll happen but we might have bigger
|
||||
and even better things going on we are we uh started working on our plans for our next
|
||||
device that we're gonna unveil more than likely a not a con next year uh for a mixed media
|
||||
challenge uh we're also thinking to have some speed picking competitions and a few other things
|
||||
added to the pickup because it was just overwhelming how many people showed up in the first place
|
||||
so uh please come back again yes we won't sell out of everything this time I think I think uh
|
||||
the future is very very promising for lock picking and not a con so um I don't know if there's
|
||||
anything else you can think of I think we go ahead and start wrapping up this episode yeah I
|
||||
know that we're gonna uh work on filming the uh yes the re-installation of the Ocho
|
||||
into my house so yes we have a new victim who's willing to uh put up the uh the Ocho at his place
|
||||
since we had to take it down for since Zach moved away um which uh one of the if you're not
|
||||
familiar with that one of the earlier episodes of hacker public radio we we discussed the Ocho
|
||||
in part 15 a.m. broadcasting um I you should just probably you could search for part 15 that'll
|
||||
find it um that's what I did you know so that's about it eventually there's gonna be another
|
||||
package in every episode whether does man likes it or not yeah yeah uh we'll we'll I don't know
|
||||
we've been saying it for years but I think it might become a reality this time we've got some
|
||||
some enthusiasm again to I get some stuff going and uh we're gonna what we'll have in episode six
|
||||
sometime in the relatively near future that means in the next year yeah um all right well I
|
||||
guess uh I've been Dawesman I'm Shane and uh this is a hacker public radio and always remember if
|
||||
you want to host an episode uh just go to the hacker public radio dot org site and you can get a
|
||||
hold of uh enigma or someone there that you so you can go ahead and you know record an episode get
|
||||
it submitted uh we'll get you hooked up um anyone can contribute content it's a fun way to build your
|
||||
your personal speaking skills and other just talking about cool stuff that other technologists
|
||||
and hackers might like so I so I guess that's it and I'm sorry that's about it
|
||||
and we'll talk to you next time thank you for listening to hacker public radio
|
||||
hpr sponsored by caro dot net so head on over to caro dot anything for all of us
|
||||
314
hpr_transcripts/hpr0090.txt
Normal file
314
hpr_transcripts/hpr0090.txt
Normal file
@@ -0,0 +1,314 @@
|
||||
Episode: 90
|
||||
Title: HPR0090: Ironman
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0090/hpr0090.mp3
|
||||
Transcribed: 2025-10-07 11:22:55
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
.
|
||||
Welcome back to another thrilling, exciting episode of Hacker Public Radio.
|
||||
I'm Peter Nicolitis, and joining me is my good friend and host of the Fresh Ubuntu
|
||||
podcast, Harlem.
|
||||
How are you doing?
|
||||
Good.
|
||||
Good, Peter.
|
||||
All right.
|
||||
Thanks for joining me today.
|
||||
Hey, no problem.
|
||||
I heard you were talking about Iron Man, and since Iron Man is coming out, I wanted
|
||||
to participate as well.
|
||||
That's awesome.
|
||||
Yes.
|
||||
As Harlem said, by the time you're listening to this, today is the debut of the brand new
|
||||
Iron Man live-action movie starring Robert Downey Jr.
|
||||
And I thought that it would be appropriate to just have a little chat about Iron Man.
|
||||
So for those of you who are listening to HPR, who are geeky enough to listen to it,
|
||||
but not know who Iron Man is, shame on you.
|
||||
Now that I've got that out of the way, though, we're going to take a little time and educate
|
||||
you as to who and or what Iron Man is, and why I like him so much.
|
||||
Iron Man has always been one of my favorite superheroes, and I just thought he was really
|
||||
cool.
|
||||
He's really powerful.
|
||||
He's definitely one of them.
|
||||
I don't know if he's one of the most powerful, but he's rather powerful in the Marvel universe.
|
||||
He was a Marvel comic book.
|
||||
And he was a founding member of the Avengers, who are, you know, what, Earth's mightiest
|
||||
heroes.
|
||||
I think that's their tagline.
|
||||
But Iron Man is, his secret identity is Anthony Edward Stark, he goes by Tony, Tony Stark,
|
||||
who is a multi-billionaire, and he owns and operates this mega-conglomerate corporation
|
||||
called Stark Enterprises.
|
||||
Right.
|
||||
So, I've rambled a little bit, oh, Stark Industries, Interesting Industries, thank you, thank
|
||||
you.
|
||||
So, I've rambled a little bit about him.
|
||||
Why don't you just take over, tell us a little bit about Iron Man, Harlem, anything
|
||||
you like?
|
||||
Well, what particularly drew me to Iron Man is that this guy is just an ordinary guy.
|
||||
He doesn't have any special powers, he's not ultra-fast or anything like that.
|
||||
He's just a smart guy, and on top of that, he's got some pretty good business sense.
|
||||
So, that's what draws, I think a lot of the folks is that they can, they as ordinary
|
||||
people, and at least this is what I was thinking, is that technology can make us better, you
|
||||
know what I mean?
|
||||
Yeah.
|
||||
That's what sort of drew me to this guy, so, I love the, I also love the way his suit of
|
||||
armor has evolved from the very beginnings back in the, you know, the very early days
|
||||
where it was just this big dark gray piece of metal, not very well form fitting, to what
|
||||
it is now, a nicely designed, it looks like a some really strange type of alloy, and
|
||||
that can move with your skin and that kind of stuff, so, I love the evolution of that
|
||||
kind of thing.
|
||||
Absolutely.
|
||||
Can I jump in for a second there?
|
||||
The Iron Man first appeared, he was created by like so many other Marvel Comics characters
|
||||
created by Stan Lee in 19, actually I shouldn't say not just Stan Lee, but also Stan Lee, Larry
|
||||
Lieber, and artists by Don Heck and also with Jack Kirby, so they all collaborated and
|
||||
made Iron Man in 1963, so, you know, Iron Man's been around for 45 years now, so, a long
|
||||
time.
|
||||
And interesting, you think about that, but it's about time that they made a movie of him,
|
||||
you know, I mean, it's absolutely, you know, you keep herring it about it, you know,
|
||||
I've heard that they were going to do an Iron Man movie 10 years ago, and I keep waiting
|
||||
and waiting and waiting, and I thought, finally, we have finally done it, so, anyway, just
|
||||
my two cents in.
|
||||
Yeah.
|
||||
Oh, absolutely.
|
||||
Continue where you were going.
|
||||
I just wanted to get that origin little tidbit in there.
|
||||
Yeah.
|
||||
So, for years and years, I've been waiting for, you know, a real good Iron Man movie, and
|
||||
you hear about it for years and years and years from Hollywood, and I'm hoping this
|
||||
movie doesn't disappoint, doesn't disappoint me.
|
||||
Yeah.
|
||||
I've been disappointed by a lot of these franchise superhero movies, most notably Batman.
|
||||
The first one was pretty good, the very first one with Michael Keaton.
|
||||
In 1989.
|
||||
Right.
|
||||
And then afterwards, you know, the rest of them just got worse and worse and worse, and
|
||||
then-
|
||||
Absolutely.
|
||||
And not to get off topic here, but it's since gotten much better with Christian
|
||||
Bale.
|
||||
Absolutely.
|
||||
I was going to say that Batman begins stuff, but that's relevant though, because actually,
|
||||
I was going to bring in Batman into this discussion, because I think Batman and Iron Man actually
|
||||
have a lot of things in common, and, you know, they both are, well, for starters, they're
|
||||
both, you know, multi-billionaire defense contractors, right?
|
||||
They both use technology to enhance themselves, although Batman, you know, I guess, he's
|
||||
dependent on technology, I think, to a lesser degree, you know, because he also epitomizes
|
||||
or represents like the epitome of human potential, and, you know, like what a human can do,
|
||||
whereas, you know, and they're both really, really smart.
|
||||
I'm not sure, I've seen a ranking somewhere, but I'm pretty sure they're both in like
|
||||
the top, you know, four or five, as far as intelligence goes, and in their respective
|
||||
fictional universes, you know, on their worlds anyway.
|
||||
You know, because Batman is, you know, he's definitely outsmarted Lex Luthor before, and
|
||||
he's generally the smartest in, you know, in DC universe.
|
||||
And, you know, Iron Man, I think, you know, he's on Tony Stark, is in league with Reed
|
||||
Richards and Dr. Doom and Marvel Comics side, so.
|
||||
But, you know, the thing is different is Iron Man, you know, he, I think he utilizes the
|
||||
technology a lot more.
|
||||
I mean, he wears the thing, but he's also dependent on it.
|
||||
I don't know if this is true in the current scheme, because I, I, I, I haven't been buying
|
||||
Iron Man comics for several years now, but he originally created the armor to keep
|
||||
him alive, right?
|
||||
Yes, absolutely.
|
||||
And that, that's, yeah, and that was the whole, I think that's how it all came about,
|
||||
is that he went over to, because of his, well, you know, his job, he went over to a place
|
||||
and he got kidnapped, apparently, and, well, it was Vietnam, I think originally, wasn't
|
||||
it?
|
||||
Yeah, I think it was.
|
||||
You know, it was Vietnam originally, because that was the setting at the time they, the,
|
||||
the original comic was in, you know, in the 60s, and they wanted to play off of what was
|
||||
going on, which is kind of a neat little microcosm about, about comic books, is that it's
|
||||
sort of a, you know, it's a pop culture look at what's going on at the time.
|
||||
And that's the kind of neat thing about comic books.
|
||||
Yeah.
|
||||
Anyway.
|
||||
It is.
|
||||
And I guess in the movie, then what it, it starts out in, is an Iraq or Afghanistan, I think
|
||||
it's Afghanistan.
|
||||
Afghanistan now.
|
||||
Yeah.
|
||||
So it updated again to be Afghanistan, which is what it says in the wiki here in wiki
|
||||
pdf.
|
||||
And a lot of the, the, the factoids and facts that we're pulling out today were, we're,
|
||||
we're pulling out of the wiki pdf article on Iron Man, which is pretty cool.
|
||||
So he's, he's a multi billionaire.
|
||||
We've established that.
|
||||
Right.
|
||||
And he, so this is the movie is starting over, okay, so we're, it's the movie starting
|
||||
in Afghanistan.
|
||||
Right.
|
||||
That's, that's something that they definitely, they do with comics a lot because, I mean,
|
||||
you know, right now, I guess it's just who wants to read about a superhero who was formed
|
||||
in fiat non, right?
|
||||
That's just so pass A.
|
||||
Right.
|
||||
So they even, cliche, exactly.
|
||||
Right.
|
||||
So if, so they, they, they, they do things like that to keep things fresh.
|
||||
And I know like, they did that with Magneto when they did the, the first X-Men movie several
|
||||
years ago now, he was a child in the concentration camps in World War II.
|
||||
But I guess I forget how old he was when they originally introduced him in the comic book.
|
||||
I think, I don't remember if he was in, you know, like in his 20s or if he was, you
|
||||
know, or 30s or whatnot, but he was a lot older.
|
||||
So, you know, if they want to keep Magneto around, they're going to have to get rid of that
|
||||
whole thing.
|
||||
And unfortunately, that's a, you know, a lot of ties into his, his past and stuff.
|
||||
I'd be curious, I guess, you know, it's not, not so critical with Tony Stark, they can
|
||||
just take him out of one war and drop him into another.
|
||||
So, you know, I guess that's a little to the story of writers advantages, but, right.
|
||||
But so what are some of the things that the Iron Man armor, let's Iron Man do?
|
||||
Well, fly for one thing, and that's great.
|
||||
The, the, the first and foremost thing that pops out of my head is that the guy can fly.
|
||||
The coolest thing to me and other than, well, it's a suit of armor and it's strong
|
||||
and stuff and, and impenetrable, the thing that stands out the most is that the, the guy
|
||||
can fly and that's kind of cool.
|
||||
Yep.
|
||||
I think that's of any superpower, I would, I would think that flying would be probably
|
||||
one of the top two things that I would want to have.
|
||||
Yeah.
|
||||
It's up there.
|
||||
It's definitely up there.
|
||||
Actually, I just remember I got a little bit off topic.
|
||||
I wanted to also say that that the Iron Man suit, you know, was designed to keep him alive
|
||||
because he was over in the war.
|
||||
It was originally in Vietnam, but I forget exactly what happens, but he, you know, gets
|
||||
he's near an explosion and some shrapnel goes into his chest and starts like working
|
||||
its way to his heart, right?
|
||||
Right.
|
||||
Exactly.
|
||||
That's what, that's exactly what happens.
|
||||
Some shrapnel is in there and then, um, uh, well, well, there's, there's conflicting
|
||||
things that I'm thinking of.
|
||||
It's been a long time since I've read the origin, but, um, apparently he's got so long to,
|
||||
to make this, this, uh, uh, uh, pacemaker, I suppose you can call it and, um, uh, or, or
|
||||
a weapon and he chooses to, to live and make a pacemaker and, um, and a weapon and a weapon
|
||||
makes himself into the weapon.
|
||||
That's right.
|
||||
But, yeah, um, so, yeah, he's got, like you said, the first off, he can fly, he's in
|
||||
a big suit of armor.
|
||||
And that's another thing too, is if you've never, have you ever worn any sort of armor?
|
||||
I mean, any sort of like padding or anything like that?
|
||||
Uh, like a, like football padding, yes.
|
||||
Yeah, okay.
|
||||
I mean, you, you think about it, it's kind of cool.
|
||||
If you've never put on any sort of armor, like, you know, for martial arts sparring or
|
||||
just, you know, mountain biking gear or football, it's kind of cool.
|
||||
Try it out sometime.
|
||||
It immediately, you know, you feel tougher, you know, you feel less vulnerable when, like,
|
||||
you can take more.
|
||||
I know I do it when I'm mountain bike.
|
||||
Um, you know, if I go out with my padding on, I am a lot more comfortable, you know,
|
||||
with like the risks that I take mountain biking than I am without it, you know, right.
|
||||
And let me add, the coolest thing to is the helmet, yeah, and it could be any old
|
||||
helmet, you know, football players wear the helmet, but like my kids, we'll see guys
|
||||
on motorcycles with these fancy helmets on and, and they will automatically think that
|
||||
those guys are superheroes, you know, and it's really, it's, it's pretty cool, though.
|
||||
Yeah, but you're right, you feel in, you know, almost invulnerable in one of those things.
|
||||
And, and just imagine what it would be like if you were wearing the Ironman suit, though.
|
||||
Exactly.
|
||||
So, I mean, it makes him pretty much invulnerable to, you know, unless he's dealing with some
|
||||
other super high tech villain or, you know, super powered, super, super powered villain, Ironman's
|
||||
pretty darn tough.
|
||||
Yep.
|
||||
And, uh, he's it, he is.
|
||||
He's super strong, right?
|
||||
The, the power armor gives him super strength.
|
||||
That's right.
|
||||
Um, and he's, his famous attack is the repulsar race, you know, that shoot out of the,
|
||||
out of his gauntlets.
|
||||
And, um, I get what I think the, the chest beam, though, had a different, it wasn't that,
|
||||
like, the uni beam, I think that was what it used to be called.
|
||||
But he has a, another, you know, like laser type thing out of his chest also.
|
||||
Yeah, I'm not entirely sure about that.
|
||||
I thought it was about the same as the, the pulse bolts.
|
||||
Oh, pulse bolts, those came later.
|
||||
Pulse bolts, pulse bolts came around in the, uh, the white and red armor, I believe.
|
||||
Oh, okay.
|
||||
And that was right around the time when he was, uh, after he had lost stark
|
||||
industries to Obadaya stain and, you know, stain industries that basically became.
|
||||
And, uh, so he built the new armor.
|
||||
And that's one of the things you've mentioned that, you know, it started out as this big clunky,
|
||||
he basically looked like a walking potbelly stove.
|
||||
Right.
|
||||
That's how I think of him.
|
||||
And, yeah, you know, and then, um, somebody, uh, I, I, I've read the early, uh, Iron Man comics.
|
||||
And, um, you know, someone, I guess he was talking to his girlfriend or wife or whatever.
|
||||
And they said, oh, you know, you know, he, he's a good guy, but he looks so scary.
|
||||
And, you know, if he, if only he was like a shining night.
|
||||
So he goes and he paints his armor gold.
|
||||
Right.
|
||||
And it was a still stain, you know, giant.
|
||||
So he looked like a big giant yellow potbelly stove.
|
||||
Walking around and then over time, you know, like you said, it slimmed down, you know,
|
||||
the, the armor got thinner and, uh, you know, nowadays, he doesn't look much bigger.
|
||||
Depending on like what, what timeline you're reading or what continuity it is, uh, you know,
|
||||
sometimes the armor doesn't look much larger than a man at all.
|
||||
It looks like it's paper thin, you know.
|
||||
Right.
|
||||
Exactly.
|
||||
But, um, he's gone through various incarnations.
|
||||
And, uh, when he, uh, he basically added red to the, uh, the suit after a while.
|
||||
So he went from like gold, uh, I'm sorry, like, you know, steel, gray steel,
|
||||
to gold, to gold and red.
|
||||
And that was the color scheme that he stuck with for the longest time.
|
||||
And then I forget when it was, but, um, it's sometimes, uh, during the, the storyline involved,
|
||||
involving Obadiastane, who was the bad guy in the movie, the iron monger.
|
||||
Uh, he changed it and turned it to, um, white and red.
|
||||
And added a bunch of new weapons at that time.
|
||||
And that's where the pulse bolts came in.
|
||||
So, you know, the repulsor rays are basically jacked up a notch or two.
|
||||
And, uh, you know, he became even more powerful.
|
||||
And that was one of the interesting things that I think Iron Man represents an interesting,
|
||||
um, escalation, you know, in, in power, in the power struggle between the villains and heroes.
|
||||
And again, with Batman, you know, you sort of saw this when, um, when Bruce Wayne had his
|
||||
back broken and, uh, asriel became Batman for a while in the Batman continuity.
|
||||
Right.
|
||||
Uh, he was so much more powerful, you know, just physical power because of the, the armor
|
||||
that that guy wore, that, um, you know, for the first few episodes or first few issues,
|
||||
he's just walking around Gotham City, cleaning house, you know, because nobody could lift a
|
||||
finger to him because he was just so much tougher. But then the bad guy started to get tougher too,
|
||||
you know, right, right.
|
||||
But, uh, but anyway, so Iron Man, you know, got stronger and more powerful.
|
||||
And, uh, he also evolved into a gray and white suit at one point called the war machine.
|
||||
And then, uh, I forget exactly what happened, but he ended up giving that armor to his sidekick,
|
||||
Jim Rhodes.
|
||||
Uh, do you remember Rody?
|
||||
Yes, I do.
|
||||
So Rody became a war machine and I guess they had a falling out at one point.
|
||||
And, um, you know, he kept the armor and they split off.
|
||||
And I forget who went where, but, uh, I think that he went and stayed with the West Coast
|
||||
Avengers for a while. I don't remember the West Coast Avengers period of Marvel comics was kind
|
||||
of a low point for me. So, but, uh, but Jim Rhodes, um, you know, he was what he starts pilot,
|
||||
chauffeur, bodyguard, confidante, yeah, all of those things. And, uh, he plays, he's in the role in
|
||||
the, um, in the movie as well, along with a couple of other, um, you know, characters from the,
|
||||
from the, uh, the comics. So, um, you know, that's, that's, that's pretty much it in a nutshell.
|
||||
Do you have anything else we should talk about to, you know, give folks an idea of who Iron Man is?
|
||||
I think the, the best thing is really to go see the movie and get, again, get reacquainted with,
|
||||
with, uh, Iron Man and the whole comic book universe. Um, other than that, all I remember is
|
||||
that Tony Stark was kind of a jerk. I was just, yes. And also an alcoholic. Yeah. Oh, yeah.
|
||||
That's right. You're right. He was an alcoholic and a jerk. Yep. He was kind of a jerk. And
|
||||
they, the, the comic was one of the, you know, they did dive into that. They dealt a lot with
|
||||
substance abuse and alcoholism. Uh-huh. And that was an interesting thing, especially like in the
|
||||
70s and 80s and stuff where, um, you know, a lot of comics did that. Well, not a lot, but, but
|
||||
some did. They, you know, dived into real, you know, social issues at the time, human, human issues,
|
||||
human exactly. And, and that's, again, like you said, you know, underneath all that, you know,
|
||||
that golden yellow armor there, it's just a guy. Right. And that's perhaps that, that's what they
|
||||
were trying to go for. There's, there's this outer armor that we all have, you know, a mask,
|
||||
so to speak, but inside where are these human people with, with, uh, weaknesses and, uh,
|
||||
character flaws and that kind of stuff. So, yep. Perhaps that's where they, they wanted us to,
|
||||
to look at the dichotomy of the, uh, the human nature, you know. Well, we could have to get
|
||||
on like, yeah. But I think we did a good little overview of Iron Man. Again, the ultimate, uh,
|
||||
techie, um, you know, tech, tech hacker hero, in my opinion. So, yeah, I agree. And if you
|
||||
haven't seen the trailers there, out now, by the time you hear this episode, obviously, um,
|
||||
you know, the, the movie will be out now too. Yep. Um, but, um, I thought from, from the trailers
|
||||
that I've seen, they looked really good. Um, you know, Robert Downey Jr. is playing Tony Stark,
|
||||
and who's better to play an alcoholic than, you know, someone who's got substance abuse issues,
|
||||
right? That's right. You know, I think, I think it's going to work out really well.
|
||||
I think so too. I can't wait for the movie. And, um, I know my kids can't. My, uh, I got kids who
|
||||
already are begging me to see it. So we'll be out there. Well, Randy, uh, Randy knows,
|
||||
we're the, the knows, uh, from Fresh Ubuntu, Colley and Fame. And I will be, uh, connecting
|
||||
sometime on Saturday to talk about the movie. So, uh, I'll look for you too if you want to
|
||||
join in and we can, uh, you know, do a little roundtable discussion on it.
|
||||
Sounds good. All right. Take care, everybody. Thank you for listening to my
|
||||
National Public Radio. HBR is sponsored by Carol.net. So head on over to C-A-R-O dot N-E-C for all the
|
||||
198
hpr_transcripts/hpr0091.txt
Normal file
198
hpr_transcripts/hpr0091.txt
Normal file
@@ -0,0 +1,198 @@
|
||||
Episode: 91
|
||||
Title: HPR0091: Hosts File
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0091/hpr0091.mp3
|
||||
Transcribed: 2025-10-07 11:23:09
|
||||
|
||||
---
|
||||
|
||||
Outro Music
|
||||
Welcome to this episode of Hacker Public Radio, this is Zokien and I'll be your host
|
||||
for today.
|
||||
I'm going to be talking about the host's file, but before I can do that, I've got to
|
||||
explain a little bit about DNS and the internet and how it works roughly.
|
||||
Every computer has been given a unique number or IP address.
|
||||
Think of this as a phone number.
|
||||
For the purposes of this analogy, imagine that you always have to enter the area code.
|
||||
Now to get to another computer you need a CypHS or phone number, otherwise you can't
|
||||
talk to it.
|
||||
I mean, if you've got the phone, you need to know the phone number because otherwise
|
||||
you don't dial it.
|
||||
Now what you can do is phone the yellow pages up and ask to be put through to someone.
|
||||
So there is this yellow pages containing everyone's name and number.
|
||||
If you want to phone Google, you just look them up in the yellow pages.
|
||||
However, instead of this being your local yellow pages because the numbers change too
|
||||
quickly for that to work, you can actually phone another number up first for the operator
|
||||
if you will.
|
||||
And they will give you the phone number for Google.
|
||||
Now in actuality, you don't need to use the yellow pages because the computer does this
|
||||
for you.
|
||||
You type in google.com and it looks up the phone number and dials it.
|
||||
You can put the phone number in direct vote for a quick demonstration.
|
||||
If you open up a command line or terminal in Windows, the Windows key and R should bring
|
||||
up a run program dialog if not start run.
|
||||
You can enter CMD if you're on Vista or XP in 2000.
|
||||
I think it is or command if you're on 95 and 98.
|
||||
Click OK and it will open up the terminal and in Linux, it depends on the Windows manager
|
||||
and distro and whatever you're on.
|
||||
I'm sure you probably know how to do that just open up a terminal or be under there somewhere.
|
||||
So in the Windows, it's just open up.
|
||||
You have to have a ping, it's P-I-N-G, Papa, India, November, Gulf, then it's space www.google.com
|
||||
and press Enter and it will run something and tell you something back, something like
|
||||
ping www.google.com, open brackets 208.67.219.231, close brackets and then a certain amount
|
||||
of data, bytes of data and percentage that it worked and didn't work.
|
||||
If you're on Linux, it will probably keep running forever so you need to control C out
|
||||
of this.
|
||||
Now the number there 208.67.219.231 is the phone number of Google.
|
||||
Well, one of the phone numbers.
|
||||
They have lots of people phoning, so they have several phone numbers.
|
||||
But you open up the web browser and Firefox or whatever you use and enter 208.67.219.231
|
||||
or whatever number you just found out in the address bar and hit Enter and hey, press
|
||||
don't, it loads Google app.
|
||||
You type the number into the computer, you don't have to look it up.
|
||||
You can do this with any page you want, in fact.
|
||||
But what's the point because phone numbers change, it's all dynamic.
|
||||
You can pay for static IP addresses but it's normally much more expensive.
|
||||
So people use like dns.com and software if they want to do stuff like that, but there's
|
||||
no real point.
|
||||
Your IP address is changed, so there's no point as you remember that, you just remember
|
||||
Google.
|
||||
That's the whole point of it.
|
||||
It's designed to be human readable, Google.com is a lot easier to remember than 208.67.
|
||||
Whatever the number was, see you've forgotten already, 208.67.219.231.
|
||||
I've got it written in front of me that's the only reason I know.
|
||||
Google.com, everyone can remember that.
|
||||
So the whole dns thing is basically a yellow page is looking up computer rest of the phone
|
||||
numbers for them.
|
||||
This is a huge simplification if you actually know a lot more about dns and want to talk
|
||||
about it, feel free to do your own hack public radio episode.
|
||||
But that's basically enough for my purposes to explain the hosts file here.
|
||||
The host file is a bit like a piece of paper you have next to the phone, where you write
|
||||
phone numbers down.
|
||||
Now you can write any phone number you want, you can write the wrong phone number.
|
||||
This becomes important in a moment.
|
||||
When you try and go to a website, instead of phoning yellow pages, you look up on the
|
||||
bit of paper first.
|
||||
You look up on the host file.
|
||||
Once we're talking about yellow pages actually, let's talk about other people's frameworks.
|
||||
There are several copies of the dns records around this, like one master copy, but it's spread
|
||||
out to, I think it's five other master servers around, I think it's five anyway.
|
||||
But there is a certain number of master records around on the internet.
|
||||
If you actually took these out, the internet would pretty much die, but that's another story.
|
||||
There are the master ones, but there are also local copies, which the ISPs normally hit
|
||||
their own copies, so whichever ISPs you use, they have their own copy.
|
||||
If you go into the network settings, you will be able to see that there will be a dns settings,
|
||||
a dns server, one dns server, two dns server, three and so on.
|
||||
That'll be your local ISPs.
|
||||
You can use other ones, one common one, for example, is open dns, which I will link to
|
||||
in the show notes.
|
||||
They have several choices of phone books you can use, in fact, they have a child phone
|
||||
click one.
|
||||
For example, you can set up on your kid's machine, it went in and go to any porn sites.
|
||||
I know.
|
||||
Depressing.
|
||||
Stopping porn off the internet.
|
||||
They also do other things.
|
||||
They block sites that they think are spammers, for example, that lots of people complain
|
||||
about.
|
||||
So you can stop the machine getting hacked, which is pretty cool, and I do actually use
|
||||
open dns myself.
|
||||
I didn't set it up on my machine, though, I got my machine to point to the router, or
|
||||
router, if you're American.
|
||||
So my computer, the wireless computer, connects to the router.
|
||||
The router that looks up on the open dns servers to find out where it's meant to be going.
|
||||
This is quite cool, because then all you need to do is change the router.
|
||||
You don't need to faff around doing other things, and it can cache copies of it, so you
|
||||
don't need to keep looking at the phone numbers and stuff.
|
||||
So that's pretty cool.
|
||||
Anyway, back to the hosts file.
|
||||
It will be located in first places.
|
||||
If you're on the Mac, it's private, etc. hosts apparently.
|
||||
At least that's what Google told me.
|
||||
On Windows, it's C kind of backslash, Windows backslash, system 32 backslash, drivers backslash,
|
||||
etc. backslash hosts.
|
||||
On Linux, it's simply slash, etc. slash hosts.
|
||||
Need to mention the Windows file here.
|
||||
They do have a file, hosts.sam, which stands for sample.
|
||||
If you put anything in there, it doesn't do anything, which I found out when I first
|
||||
started playing around with this.
|
||||
You need to rename it to hosts, just plain hosts.
|
||||
If you use notepad, gotta be careful, because it will try and put hosts.text.
|
||||
The Linux file does exist and does already contain stuff, and it's quite important, because
|
||||
if you overwrite the file, which I did on the friends computer, it killed Sude.
|
||||
And it couldn't run, and half the stuff didn't work, because it uses the local IP address
|
||||
it seems.
|
||||
So gotta be very careful about that, and I ended up having to grab a live CD to fix it.
|
||||
Once you've done changes, you can reboot to fix it.
|
||||
Or in Linux, you should be able to do a kill all the dash, hub, iNet, D to restart it.
|
||||
And those are probably the way, but it caches it.
|
||||
I found generally so reboot the easiest way, just to make sure everything's flushed.
|
||||
And there's an example hosts file at www.nvps.org-winhelp-2002-host.com.
|
||||
I will put that in the show notes.
|
||||
The basic format though, is you put the IP address and then the URL, for example, if you
|
||||
want to connect to your local machine, let's say you're running a scroll mail or something
|
||||
you want to connect to your own machine, you can put 127.0, 0.0.1, which is your local
|
||||
machine, space, mail.
|
||||
And then you type in mail in your address bar, and your browser, and it will take you
|
||||
to your local machine.
|
||||
Pretty cool.
|
||||
I've got a setup for the DSL and the router, for example, mainly just some lazy.
|
||||
And I had some issues originally, I kept changing the IP address and could never remember
|
||||
them.
|
||||
So I've got a setup, so I'm just type DSL or router, and it shows me where it is.
|
||||
So this is the cool thing.
|
||||
Using the wrong phone number, double-click.net, suck.
|
||||
They have ads on about the entire internet, it seems.
|
||||
There's also issues that my space, for example, served ads up from, may not have been double-click,
|
||||
but it was one of these, and the server got hacked, the ad server got hacked.
|
||||
Then all you need to do is load my space, suddenly your machine's hacked by this ad.
|
||||
My space itself was secure, but the ad server wasn't.
|
||||
And there are a bunch of 12-year-olds that got hacked on this.
|
||||
Which is really bad.
|
||||
So what you can do is if you don't want to see a double-click ad ever again, you add
|
||||
a new life for 1-27.0.0.0.1, space, double-click.net.
|
||||
So you're saying double-click.net is on my local machine.
|
||||
So what then happens is you go to a website, there's a double-click ad there.
|
||||
It says, oh, double-click.
|
||||
I need to go there.
|
||||
This in the host file, oh, it's on the local machine, looks on the local machine, can't
|
||||
find it, gives you a 404 error for it.
|
||||
However, the rest of the web page loads up because that's different address, and you
|
||||
may end up with a small iframe saying 404 error or a blank or whatever, but you will
|
||||
not get the ad.
|
||||
This is really cool.
|
||||
It says you're bandwidth as well, and I highly recommend it for most sites.
|
||||
If you like the sites, if you like the sites, you want them to have money from the ads.
|
||||
Basically, if it's a project that you like, don't do this, but if it's something big
|
||||
like my space and they're being idiots, feel free to do it.
|
||||
Oh, let you figure out the morality of what you feel is right for that or not.
|
||||
Personally, I'll be tempted to just say block all the ads and just give donations to the
|
||||
people you like, because then it saves them anyway.
|
||||
But this is a really cool web blocking ads.
|
||||
Now, I used to do this a lot, and I said this is MVPS website that they have a copy of
|
||||
one that blocks pretty much all the sites, and all the really bad dodgy ones and spammers
|
||||
and stuff.
|
||||
It blocks a ton of websites that you don't want to go to, and it's really cool.
|
||||
I've moved on to Privacy, though, from there, and I now is using Squid as a proxy server,
|
||||
and I'm using that for a lot more because I'm getting it to control my cookies and things
|
||||
as well as blocking the ads out.
|
||||
But that's really cool, and I highly recommend it.
|
||||
That's all I'm going to say for now.
|
||||
A nice short episode, again, I try not to make these too long.
|
||||
Sometimes if you end up with a four-hour show, it's just a bit, but ignoring the fact
|
||||
it's a huge download, it's just way too long to listen to, so I try and keep these sort
|
||||
of 10, 15 minutes long, just a little bit of information.
|
||||
Just because after about 20 minutes of brain starts seizing up and you forget things and
|
||||
you stop listening properly, so let's just try and keep these nice and brief.
|
||||
I'd like to give a shout out to everyone in the RC chat rooms that talked to me, everyone
|
||||
that's giving me feedback.
|
||||
Everyone says, thank you.
|
||||
This has been Soak.
|
||||
If you want to talk to me, my website is Soak.org.
|
||||
All the details on the Hack Public Radio website, you can go in the correspondence and find
|
||||
me there.
|
||||
Keep giving me the feedback.
|
||||
Hopefully, this one will be stereo.
|
||||
Apparently, the last one was in mono, so I apologize for that.
|
||||
Thank you very much for listening, and we'll catch you later.
|
||||
Thank you for listening to Hack with OverGradio.
|
||||
HPR is sponsored by Carol.net, so head on over to C-A-R-O-DOT-E-T for all of us in the
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user