Files
Lee Hanken 7c8efd2228 Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use
- Search episodes, transcripts, hosts, and series
- 4,511 episodes with metadata and transcripts
- Data loader with in-memory JSON storage

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-26 10:54:13 +00:00

450 lines
41 KiB
Plaintext

Episode: 387
Title: HPR0387: Linux Security
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0387/hpr0387.mp3
Transcribed: 2025-10-07 19:34:49
---
Thanks for watching.
Hello everybody and welcome to another episode and this episode we're going to talk about
Linux security. It's quite a broad topic but we're going to talk about Linux desktop security
in general and in Linux server security in general. I'm Mark Clark from South Africa living
Johannesburg and I work for open source solutions company in Johannesburg. I'm joined by
Makar's darling Parker. How do I lean how you today? I'm great Mark. How are you today?
Oh thanks. All right. So just to refresh people's memory my name is Darlene and I am in Calgary,
Alberta, Canada and I worked for I worked for a Linux based company that provides solutions
around the world and also today we're joined by another guest, Mohammed Ayade and he is located
in Libya and he's also a Linux expert and I'm sure he has lots to share with us today about
Linux security. Hello Mohammed, how are you? Hello Mark, how are you? I'm fine thank you.
First of all I'll introduce myself I'm Mohammed Ayade from Libyan spider network.
Libyan spider network is a processing company based on Libyan. I'm working as a Linux server
administrator and I think I am most of my time to Linux in general. So first of all let's let's
talk about Linux desktop security. I think as more and more people start using Linux on their
desktop probably going to get more and more reports of security breaches on the Linux desktop.
You know I think that's one of the inevitable things that's going to it's going to happen.
You know if you look at the standard Linux distributions when you install them by default they
don't have a whole lot of ports open listing and protected ports listing for incoming traffic on
the internet but yeah but there's still vectors of a tech that are there. Dolly what do you
think about Linux desktop security and are you required a bit with that? Well I think that
they only truly secure machine that you have is a standalone machine that's not connected to
the internet at all. So whether you're running Windows Linux VSD whatever I think you still have
to be aware that there are some some holes that you know we do promote that Linux is that much
more secure but again like you talked about some of the services that are running are they always
necessary because I did it in install of Fedora 10 and then I just made a you know a text document
of all the services that we're running and some of them are geared for when you're on a network
you know on a LAN and some of those aren't so those aren't necessary if you're a standalone
desktop user maybe in your home or whatever so I think people just need to be aware it's
similar to when you run MS config on a Windows machine there's lots of services that are running
that don't necessarily need to be there and so I think that's the first step is to be aware
you know just to spend a little time on your system and become aware of it what do you guys think?
Yeah especially for the user move it to Linux and from my to Linux they think about
Linux is secure so they don't pay any attention for security so they ignore it and they don't
care about the services and the firewall and stuff like this so there should be more attention
if they move to Linux so they heard about Linux security and Linux is more secure more secure
doesn't mean that the secure it's not completely secure it's still have the vulnerabilities we
have the services and these services that have vulnerability to be more secure with the Linux box
and we have to update it frequently with the latest update for the kernel for the service
and doing some hardening focus to be more secure what do you think?
Yeah I believe that's true that you should harden your system up because you know we talk about
is Linux you know secure by default or by design I think by design that it is it is secure more
secure than what we're used to with other operating systems but I would not necessarily agree that
it's secure by default what do you think Mark? Yeah look I think you know the design part of Linux
it's it's architecture is much more inherently secure than you know then you say Windows can
have a look at Windows can from a design for single user environment and to this day even though
they it's claims you've rewritten the code completely it has that you know that heritage
with Linux was written much earlier and it was built for a multi user environment so it has all that
stuff built in so I think it is more more secure by design but as you say a lot of the stuff is
what's installed and what's running in terms of applications what the operating system itself
and today there's a much is it a bit of a blurring of the lines what's the applications operating
system you know with Windows you get Internet Explorer bundled and all of that because if you look
at most of these hacking contests that they have you know and the people that win them the
the vector attack is always the browser and they break into the system by the browser so you know
like Firefox for example you know if they hack into Firefox then who's responsible for that
because that will be a vulnerability on Windows or on Linux so it's difficult I think in the desktop
arena you know you're always going to have security breaches as much harder to lock things down
because you're basically relying on people you know what they're installing you know what starts
they're going to have savvy that are in terms of you know like any kind of artist if some people
we're talking about quite a lot of other people will be able to detect that it's a kind of you know
not for force so it's it's quite difficult on the on the user desktop side I think as we see
more people using Linux on the desktop side we'll definitely get more reports of security breaches
you know it's like the I love you virus that was sent around and when was it in about 2000 or
something like that I mean that wasn't anything clever what was clever there was a social
genuine aspect of it you know somebody gets an email from some for one of their friends because
they're in the address book and it says I love you and I think what's going on yeah they click on
the attachment and it's just the basic bb script you know which anybody could write anybody could
do so you know is that aspect that nothing's really going to catch that you know if you're smart enough
with the social engineering aspect of it so yeah yeah and like you talked about before Mark
is that when people just click on random pop-ups on their desktop whether they're running Linux windows
Apple or Mac or whatever it still comes down to common sense right if you don't know what that
pop-up is about or you didn't go this is what I advice I give people especially regarding pop-ups
and stuff if you don't go looking for it and it comes to you randomly ignore it yeah yeah as we
started our recording by talking about the success of security for Linux security it's mean
you know Linux become more more popular operating so if we start searching about malware that
takes Linux as you say download Linux is became more popular so I think that the header they will
start targeting Linux machine before it's not that popular and most of the Linux user refers
to this geek and these geek things Linux popular inside their team right they are geek
thing they're meeting together in the popular okay it's popular in your area instead with your
friends all of your friends are geek but now it's more popular for all user but I think it's
will be more targeted with hackers what do you think Mark yeah look I think it'll definitely
be harder for hackers to to break into into Linux and the Windows machines you know it really it's
because what will happen is to see at least with Linux you know if somebody does break it and the
person is using logged in as a normal user I mean I think that's where Ubuntu is going to write
into the forcing people to use so you do to get root access rather than you know logging in as
root is that the person about to hack in and just destroy the you know the users home directory
will hack into that you know so us Linux cars will claim well that's great because the systems
are cheers unhack you know but from a user point of view if they lost all of their I mean they
don't really care about the boundaries and operating system and all of that you know they care
about their data you know so even though we say well it's secure then it's you know in a multi-user
system it says one user that can't get hacked they can only really destroy that user directory but
in today's world I mean you have you know computers dedicated to one person so for example on your
laptop you don't have multiple users normally running on it so it's all intent and purpose of the
home directory gets hacked you know the machine's hacked and it's of no use to the you know to the
to the user of that machine so I do think it's you know it's one of those things which is going to
make a more and more of an issue you know we're going to be careful of the success of our own what
you call it marketing as it were because everybody with a medic means ah you know I could just
you know it's almost like I'm invincible if I'm running Linux and then of course that that has
the same problems in terms of when things do go wrong and people think but I thought I was safe
yeah but I think I think the advantage to Linux though is if there are some issues the response
time of the Linux community is much faster than if you were a proprietary software developer software
provider like they sometimes you can take three fours you know six weeks to eat well that's
probably even a small one because I was actually just reading out while I was getting ready for today
Adobe reader has issues that it even compromises Linux desktops and I actually sent that to our
to our to our development team because we we've got the latest it's the the newest reader 9.1
8.1 and 7.1 that you actually have to turn off the JavaScript and it says in their in their
blog release here it's on their update that yes it can affect your Linux machines so who would know
you know yeah and that come coming that way right but that's proprietary software and their
response their first response was back in April they posted this that there was a a potential reader
issue and they're still trying to deal with it so like I say the community that I think the Linux
community is much faster to respond to these kind of threats than then a proprietary software company
but I mean you know one thing as well that's also a potential solution to all of these things I mean
also sort of touches a bit on the server side because you can use these solutions the server side as
well but things like security enhance Linux or easy Linux and the new thing from you know app
armor from novel and those are different solutions to to the problem because basically the
start of data because you never know whether this apps going to be secure or not or what they're
going to test going to come through it so you kind of rack the application as it were until at
this application you can only do x1's and it could only access this directory or access these ports
that kind of thing so even if it does get hacked it's limited what can happen and I think maybe
that's potential solution in future but I just have to make it a lot easier for your average user to
use because I know most people just switch off esse Linux you know when they install this system just
to complicate it to manage yeah so I just have a like a final thought that I like to share about
desktop security and that is you know maybe having a standard that's just like IP tables with
policies that are set so nothing gets in and some normal services can get out have any of you
have either of you configured that IP tables or anything like that on your side
I tend to use it more on the server side of my desktop you know and I think that's the point
and IP tables quite hardcore for your average user yeah the setup but there's a whole lot of
gritty tools these days but still you know if you ever just said do you want to block port 80 or
you know I don't even know what you're talking about you know if you say even if you want to block
web traffic don't really understand so yeah so it's a it's a difficult you know scenario and I
think also we're straddling here but we're straddling here we also we're talking to just ordinary
users but we're also talking to IT administrators who you know will be taking care of desktops right
because have they come more popular yeah I mean I tell you what I mean like I'm a mom machine
like I did the development work so you install all kinds of services you try different things
and that you know I don't necessarily uninstall them and you take your laptop over you know it's
another network somewhere you plug it in and you just so it's not necessarily also you know it's
also suppose what you call it people you aren't diligent yeah maybe like you know and you leave
these ports open or you got a share you quickly want to transfer a file to another machine in your
home network so you you know you just make the share public and that's okay when you're at home
you know then you take your machine and you dump it on some public network or especially these
wafer hot spots you know next-minute machines like wide open so there's is this something which
also you know you've got to take it to count the human factor I think as well using firewall
IB tables is actually you know darling these days is more easier than before as we see a lot of
graphic interface on board we can find a lot of graphic interface using IB table surfaces like I
think firewall started or something like this and important to firewall and yeah this this
graphic interface make it IB tables easy to use easy to configure not just like before it's not
easy even for that administrator especially if you're trying to to configure your server starting
from the rules denied all and you have to start open only required the surfaces train so yeah
yeah it's a popularity popularity for Linux it's come from more easy to more friendly that's
what it's became popular right especially the event of the GUI for it right just one comment
also I didn't make before we move on to the server side of things as well as you know one thing I
do think which is a bit of a limitation of the current design structure of Linux you know
as this whole group you know you can only really define access to a file or resource by owner
group and in other you know so you can't have these complex group structures which is quite you
know someone make it the field to manage now I know they do have ACLs and Linux these days but you
don't find it widely used I mean I think we need to also potentially as we start using Linux more
and more you know hard to say okay you know Joe is part of the accounts group they can have access
to these files he's also part of this group that that can have you know I don't know a read write
access to another set of files and you can give both groups you know different routes to different
different files rather than just a single group that you can assign to it there in a posture you
have to go add Joe to all these different groups and it's a bit it's a bit of a difficult task so
I think yeah you know this ACL thing and that's been in the next four while now but it's not sort
of in widespread use because you need to use extended attributes in this system in this case I
think you should using security and hands at Linux which is have but have a more advanced
permissions and more advanced access list for user but security hands at Linux we will return
to it's not easy to go and figure especially for normal user if we talk about the normal user
and we're talking about a multi multi multi user machine if you want to to to to put more security
another in that machine so I have to configure security and hands at Linux to avoid this and
giving more advanced permission and access list control take over control the use so what do you
think about this we have to install antiviruses for our Linux box or maybe Mac box yeah I don't
I don't I don't tell them to put antivirus on I just tell them to stop all the unnecessary services
that get started when they do a default install do on the service I think you do need to run
antivirus for the software but especially if you got like a sunburst here because in an everybody
storing their files there and then obviously even though Linux is available to the Windows
viruses other Windows users can access those files and then and get attacked but I have yet to
find a decent antivirus package that can run on a sunburst here and do like on access scanning
and all of that kind of stuff I don't know whether you've got any of the environment or dolly
yeah yeah I agree with you actually I agree with you about it's required in case as we know that
these days we have a hybrid network some machine is Windows and some machine is Linux running
the same network and they can share resources so I don't want to my to my workstation to be
as distribution points for viruses to Linux user to win this user actually so as you say that we
maybe we need this antivirus is to protect actually Linux Windows user from being attacked or
being infected from my workstation Linux workstation actually we are popular for Kaspersky so we have
this Kaspersky have the engine for sunburst server to antivirus for sunburst server I've tried once
one time and it's nice it's using the same database to use it with that workstation so it will be
effective with your language machine okay now we try that was it the the guys for the Windows
gas applied as they went in both the license they didn't consult us on it and they bought that AVG
license but it was a real schlepa you had to recompile the kernel and add in this module and then
you know it was like it was like a major effort just to get to run this antivirus thing which meant
that you know you all future upgrades now it was just a pain if you upgraded your kernel it means
you know antivirus will stop working and all of that so I don't know if it is the same
it's the same yeah that's the same it's not used to configure it yeah that's the same
I think there's some space there it may be the Linux community needs to sort of look at a bit
and make it easier to integrate these antivirus even if it's just clan AV you know into the whole
look on excess scanning capabilities of somber um I'm surprised it actually it hasn't it hasn't
happened in the past because we're lying on you know if you're alarm the Windows client machines
to be running the latest antivirus that never really works always somebody who is turned off
updates or something like that you know and then all you need is one of those guys and it happens
that clients you know quite often where just one person can affect the whole somber share you know
yeah actually most of the vendors considering oh we will make a product for Linux users so
most of Linux users are provisional so we don't have to make interface just only with commands
the blah blah so that's why it's not easy to install even as well it's not easy to they don't have
a actually interface with a graphical interface for user no user to run in gesprisk and the Linux
and I learned from architecture somber not somebody developed or even looked at the kernel rule but
you know they could provide some sort of API hooks into like wind files or read to be able to make
easier to run that antivirus because typically what you have to have is like these modules which
like are notify which sort of that you know you know that get cool when when the file changes
and then calls antivirus and all of that so you would think it would be easier to you know there
would be easy better hooks available especially on the somber side now since it's used I mean that's
what it's designed for integration to Windows networks that there'll be more ability to do sort of
server side scanning of files okay so I think we should maybe just talk a little bit about the
server side of things that I think it's a different different aspect completely then that the
desktop side because you obviously you rely on the fact that you've got a server administrator you
know it's a bit more about what's going on than your average user plus you're also not running
a whole bunch of like things like you know web browsers and email clients on the server so
you eliminate a whole bunch of possibilities the internet borrow attack vectors but of course
opens up a whole bunch of other vectors for attack you must configure servers and that kind of stuff
now Mohammed I know you've got a lot of a lot of experience in this area because you run quite a
large hosting and provider there in Libya we are we're posting company and we are facing a lot
of hacking attacking attention from our server so after we're doing some research and the following
that got in line for security we find we found Apache is not secure by default we don't talk we
I'm not talking about the service itself the vulnerabilities for the Apache but it's not secure
if you don't using the third party modules or you you have to make a hardening for Apache to work
more secure okay what kind of a touch are you are you seeing manifesting the in terms of the
Apache server in particular yeah user they can be running scrap from one account another jump
into from account another account and they can't using running some commands from Apache because
by default Apache using nobody user by default so nobody user he can't follow with nobody user
who doing that action if you're trying to tracking the some action happened so we have to do a lot
of work with Apache to do to make it more secure well I mean if I look if you also do some web
hosting outside and most of the attacks that we get come from fully implemented stats that we
host there's not there's not a direct attack on Apache as such you know there'll be like a
cross start scripting attack because the guy who are a secret injection attack because they haven't
escaped his sequel properly within their application code but it's not necessary from from the
text a week kind of see it's not necessarily a you know exploiting in Apache itself you know
so it tends to be around that I mean you can do hard in PHP and those good things but then you end
up you know also there's a bit of a trade off because in the system it comes more more difficult
to actually to actually use so yeah I'm just interested more in finding out that the kind of a
text that are being directed you guys will sing on your service because it's a very honest most
of us are just spammers you know trying to basically send automated bots to just edit spam comments
to science industry that kind of stuff yeah as I mentioned that I'm not always talking about it's okay
about she is as a service itself it have vulnerabilities so even the latest version for Apache they
still feed they have a vulnerability and they didn't fix it yet okay but the not that's
script kitty we are checking us all script kitty we're not talking about that the professional hacker
they will use it about itself to hack the server okay so some most of the script kitty using
the way that actually is running like running nobody user to running maybe PHP shell or something
like this in your server and they start trying to having a back door in the server and get that
giving a root kit they're trying to get access to the server and also they're trying to jump in
from the server from account to account the same server to trying to hack some pages and get
the database and stuff like this yeah but it's not this is an opportunity in a patch acts actually
it's like the way that the default configuration for Apache we're using if they're part modules
with like more security it's like a work file wall you have any wood server that doesn't have
most security is open for public so any user can do anything for the server for the
nobody users actually if they using this default user for Apache and also using a super user
page modules to protect the user from running a script under another user account so these tools
really is very helpful and can protect your server and can save a lot from attack okay so you
just recommend as people look at running mod security and and um suphp to kind of
yes exactly it's a kind of thing okay and in terms of your I mean for us in our log file we just
basically run like a log watcher and talk over the files looking for any critical messages and get
emailed to us they want a daily basis do you have any early warning detection systems that you use
how to review a log file yeah also using a third-party tools like
from complex server they they providing free tools for firewall can it can't be integrated with
the mod security and it can be integrated with another services to warn you with the abnormal
action or maybe some some attacks come to the server so using this complex server with a third-party
file wall the professional hacker they will use it about itself to hack the server okay so some
most of the security using the way that Apache is running like running nobody user
to running maybe PHP shell or something like this in your server and they start trying to
having a back door in the server and get that giving a root kit they're trying to get access to
the server and also they're trying to jump in from the from account to account the same server to
trying to hack some pages and get the database and stuff like this but it's not this is not
vulnerable in Apache actually it's like the way that the default configuration for Apache this
is only the default configuration okay actually to we're using a third-party modules with
like more security it's like a work file wall you have any web server that doesn't have
most security is open for public so any user can do anything for the server for the for the
nobody users actually if they using this default user for Apache and also using a super user
PHP modules to to protect the user from running a script under another user account so these tools
really it's very helpful and can protect your server and can save a lot from attack yeah okay so
you should be recommending as people look at running mod security and and
yes you PHP to kind of yes you page exactly it's a kind of thing okay and in terms of your
I mean for us in our log file we just basically run like a log watcher and talk over the files looking
for any critical messages and get emailed to us they want a daily basis do you have any early warning
detection systems that you use yeah also using a third-party tools like come it's come from
config server they they providing free tools for firewall can it can be integrated with the
mod security and can be integrated with another services to warn you with the abnormal action or maybe
some some attacks come to the server so using this config server that third-party file wall
plus the main the main concern is that it tends to be a lot of bandwidth I mean sometimes you can
have like you know 20-13 to your bandwidth can be some guys trying to post endless comments on
to a forum site somewhere yeah so what we do is we use like fail to ban for that kind of stuff
and for obviously attempts to hack your SSH port which you have open for administration purposes
now on our side we we tend to run a run of those things the fail to ban is quite good in terms of
at least saving your bandwidth and you know also preventing dictionary attacks and that kind of
don't you sort of have a different what's it called a different concern on our side
I'm at there but I must have a look at mod security hopefully it stabilizes and start introducing
it into the into the official repositories and that then I think they're different to use it
like you know the approach also that that mod security seems to be taken is very similar to
to app armor and easy Linux that we talked about earlier I don't know whether you have any
experience with with easy Linux darling or Mohammed actually I have a bad experience
with the Linux I don't even configure it one time my machine so I face a lot of problems
so I have to read the manual very carefully especially with the security hands Linux and take it
in my in the consideration every time when I install a new surface when I try to install a new
application because the security hands Linux have advanced the X control and
advanced and change a lot of care and behavior so once we install security hands Linux
it's next we have to take in our administration we will face a lot of problem in the future especially
when trying to add a new surface add a new tools add new applications to our machine I mean that's
also been marked with easy Linux I've been reading articles recently apparently they made a lot
easier to use now I don't know how true that is but you know I think app armor is giving them a
bit of you know I make them sort of be a bit more competitive but I haven't used app armor
myself and also read the marketing heart was that app armor is really easy to use but I you know
I think where I understand app armor is that you basically don't know pre-configured profiles
so if you're downloading a pre-configured profile and you can choose your applications you know
you want to sort of protect so it seems to me I could be completely wrong that's easy Linux kind of
everything you know once you got it installed everything must be configured to run the easy Linux
it looks like with app armor you know you say look I want you to protect this application otherwise
all other applications run as under normal security kind of all you call it up mode so you know
can you say you got a yeah that sounds great yeah that sounds great because then you can just sort
of wrap your patchy they're quite like profiles of my SQL and patches or I want to like a
wrap a patchy I want to wrap my SQL you know that's all ones you really are supposed to care about
you know more you don't really care about wrapping you know some other some other sort of services
and stuff which you don't really use that much or which aren't exposed to the internet you know
so yeah so I'm probably going to give app armor and security enhance Linux a bit more of a
you know I've given some more tension and tried them again but yeah but I think those are sort of
looks like the you know the next generation of attempts on security and the server side
sometimes also security issues or actually design flaws and the architecture of the service itself
so you know in a matter of heart sort of careful you are and setting up your machine you're
going to be exposed to them. I mean a classic example of that was a DNS poisoning attack
of vulnerability that was exposed last year I mean it was a vendor that had a rush to patch
the DNS service um now how much did you have any experience with that yeah I remember that
when I had a first time about this DNS poisoning we inform our ISP to upgrade their DNS server
because when we check there are DNS server we find that it's vulnerable to DNS poisoning
but I was just sort of a vulnerability that was inherent in the architecture why DNS works
um so you know even if your DNS was within really secure it was it was basically in this
foundations hard work so yeah so you've got to be careful about those those kinds of
this was also important to always patch your machines and make sure they running the latest um
you know security patches from your distribution. What I remember from the vulnerability the way
it works is that you know when you send out a DNS response request that you want to look up first
national bank dot Kaiser and the guys out to the DNS server that says I request to DNS server
but your machine will respond to whatever you ever you know with even machine response first
so it doesn't look to see a car sent us a request to server you know ABC um and the response
came from server x y z so what the vulnerability would do as far as I understood it was there that
would just sort of almost spam sending out response addresses for like let's say if it was a big
bank in South Africa so I'll just sort of continue to view out responses for fnb by mapping it to
the incorrect rp address and I'll just hopefully hit a machine that would would make this request
so if your DNS server is doing like a recursive look up um you could actually poison the cash
of the DNS server bar because we're just accept whatever response it got then we didn't check it um
and so thereby you know you might think well that seems like really you know like a sort of gun try
to approach to it but if you took like a popular soft like Facebook or something like that you know
and you just kept us being honest you know like you get it hit so yeah so that's when it comes
down to the sort of the the architect show how these things are built I know that my challenge in my
work has been to bring Linux out to the ordinary users or to you know explain the difference
between Windows and Linux to tell people you know and I believe it's a real hands-on experience
so I know Muhammad that back in March you had a first open day first Linux day in Libya
and it was uh you guys was the was fossil rates of free you know was the organization that you
worked with to do that can you tell us more about fossil yeah um the organization
behind this day is called fossil free open source software in Libya
uh this uh group established in 2008 the first events were actually for us it was Linux day
towards the first Linux day uh the official Linux day in Libya uh Linux day in Libya it's
become this idea become from this group and leaving a spy with the company I'm working with
there there was a sponsor for that day and without this company actually that day we
will not come to show and uh for Linux day we we expect that uh about 400 uh people will
participate in that day but we we surprised that it was a 1,300
after that day and uh yeah we we uh we distributed about uh 900 uh you bought to CD the
top you want to CD for for the user or for the uh participated people uh actually in general
it was a very successful day for us and uh after that day a lot of people become uh asking for Linux
and I'm still receiving uh uh a message from user they're trying to get CD for Linux and they
want to try Linux because they heard a lot Linux and they don't try it before and they still
they thought that Linux is using a terminal they don't have the uh Linux doesn't have
interface some users they have to still have thinking like this Linux have no interface
is Linux Linux only for Geek but when we're running actually one from the important point
we we constricted Linux day is running combos actually okay I have a combo proficient user
with us and they yeah in person people with uh 3d effects for desktop and how they do
it's crazy like crazy desktop for user they're seeing that effects visual effects so they like it
wow so most of the new user actually then now they are installing you going to and going directly
to install uh combos and doing this action and blah blah blah stuff like this yeah sounds like
it was a great success there and you know I know yeah yeah as a defector as well um you know the
the government also quite big into open source at least officially they support a lot in terms of
the open source that software feed and the our government are organizers activities around that
was there living in government involved in anyway in in the show uh actually uh last year
it was a successful year for Microsoft in Libya oh yeah yeah they have a contract with the
higher education they have a contract with uh general vacation Libya they have contract with
the institute they have contract with the uh general electrics electricles uh Libya they cover
all most important sector in Libya but uh we can't convince user to or the government using
open source without a planning it's will be a disaster I think yeah yeah first of all we have
to build the community we have to find a qualified people to to support open source in Libya then we
we have the more uh more power to convince the government or give them some proof that
its open sources the right choice and uh Linux it will be the future operating system
now to be honest we don't have this power okay but you also said uh last night uh
Muhammad that you were doing a lot of translation because there wasn't a lot of of uh
documentation in Arabic right for open source so there's another kind of a hurdle to overcome as well
yeah that's right actually lately I was talking about we don't have uh rich uh resources for in
general about Linux and open source in Arabic we don't have a rich resources and this is really
making me sad because why why all languages they have resources and in Arabic we have late we have
leakage okay we have resources but not that much resources and you can't make depends on these
resources and most of the uh IT people who don't following this article uh documentation for example
if I translate uh uh a thousand pages from documentation and professional way and give them to
IT people professional IT people actually they will not read it they will go to find another
documentation in English okay um yeah but where are you aiming that documentation to is it to
end users or to your system amendments like who are you trying to to bring over to that in general
actually in general yeah as I told you yesterday that I'm trying to translate the whole
uh document a facial documentation for and community documentation for your pointer uh I think it's
about thousand five hundred pages um this this this is not easy work to do by myself I'm trying to
find a volunteer to help me to contribute this project and actually the volunteer or
contributors will be from the hall anyone can speak um or understand both language Arabic and
English and also should be involved in the IT field because translating the IT documentation
requires some skills and some understanding yeah so let's put a poll on there then for anybody
that can it can help Muhammad there was a translation exercise I mean if I need to get hold of
you they can get hold of you at Spada net what Libya Libyan Spada.com there yeah Libyan Spada.com
okay just send it email from there okay great stuff tell me um Muhammad what's uh do you
guys have an active business software launched organization in Libya at all you know the anti
the copyrights you mean copyrights yeah copy or the guy looking for pirated copies and unlasted
versions of software and all of that I mean I know we've got one y'all so that you know is it now
we've got one y'all so that you know like a few weeks ago they released the latest report
and they said software power is up one percent you know from 34 to 35 percent I mean that means basically
a third of all installations that they go unlastenced um yeah of course that they blame this one
all kinds of things like increasing access to international markets like Pakistan and uh what else
did they blame and then they blamed oh yes obviously always a lot to blame broadband internet
access for increase in piracy um yeah I didn't even mention the fact that we in the world's worst
economic crisis is 1929 you know and maybe people don't have money to pay for the software um to
me one percent increase seems quite a mile given given the circumstances but um you know
what one of the things I guess I'm trying to comment on because often in in in like sort of
the third world countries like South Africa and then um it's hard software power series and people
and that's why I feel you know open source software is a hard time competing against it because
essentially the software is also free it's not open source but it's also free in South Africa um
and uh and that's why people don't really see the there's no economic need to potentially change
from from from this um but what I do find is strange though it's like you often find a lot of
these Microsoft guys you know they'll come in and argue as soon as you some like open source
software making inroads into an organization they become very defensive and aggressive about it
you know and they started arguing that your Microsoft is better because it's paid for and then
you say to them well have you paid for your software your your version of Visual Studio and XP
and they say no if it's so great why don't you pay for it you know so there's like this there's a
strange relationship yeah okay I think that's a that's a wrap for a quick episode on Linux
security we just really scraped the service then dealt with Linux security at a at a hard level
and touching on some tools and um ideas that we sort of discussions that we have about
but Linux security a lot you think um dolline for joining us today um as well as Mohammed dolline
yeah well I'm glad uh that uh it was able to share some ideas and some insights with our listeners
because uh has we repeatedly said throughout the podcast has Linux gains and popularity that
uh this will be something we will have to address and again I thank Mohammed for joining us as
well and providing some uh really good information and I hope our listeners uh enjoyed it and
look forward to hearing from us again yeah thank you next thanks dolline thanks everybody yes
catch you next time all right
you
thank you for listening to hacker public radio hpr sponsored by caro.net so head on over to
c-a-r-o dot anything
you