Files
hpr-knowledge-base/hpr_transcripts/hpr2454.txt
Lee Hanken 7c8efd2228 Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use
- Search episodes, transcripts, hosts, and series
- 4,511 episodes with metadata and transcripts
- Data loader with in-memory JSON storage

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-26 10:54:13 +00:00

1000 lines
78 KiB
Plaintext

Episode: 2454
Title: HPR2454: The Alien Brothers Podcast - S01E02 - Strictly Hacking
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr2454/hpr2454.mp3
Transcribed: 2025-10-19 03:25:20
---
This is HPR Episode 2454 entitled The Alien Brothers Podcast, S-Nero 1-E-Nero 2,
Trictly Hacking. It is hosted by The Alien Brothers Podcast, ABB, and in about 106 minutes long,
and carry the next visit flag. The summary is Casper, Andrew Tiger Discussor, Uber Hacks,
and they didn't tell me known and unknown vulnerabilities.
This episode of HPR is brought to you by archive.org.
Support universal access to all knowledge
by heading over to archive.org forward slash donate.
The Alien Brothers Podcast with Casper and Radiger.
Welcome listeners. Welcome to the second episode of the Alien Brothers Podcast.
Thank you for joining us once again.
By that you mean second squared episode? You mean the fourth episode of The Alien Brothers Podcast?
Don't you Casper? Radiger, I thought we talked about this, that this was the second episode.
That way. Okay. Okay. Well, I misinterpreted it. See, listener, what happened, what you don't know,
but I'm going to share with you. And for that reason, I envy you right now.
We, as we might have alluded to, no, I guess we wouldn't know because the only episode that's been
posted was the first one we did up at where Bethany or Rohobeth or wherever we were.
We recorded two, the two are so unknown. We recorded two more episodes during that initial
burst that you haven't heard. To you, this is the second episode. And every time we're, I'm already
overexplaining this. Yeah. As is my want. And I'm here to keep you on track as always.
That's Casper looking out for you. That's W-O-N-T. Okay. Okay. So moving on.
Hacking. Hey, thank, hey, happy Thanksgiving, man.
Happy Thanksgiving to you as well. And happy Thanksgiving to all of the listeners out there.
I hope they're having a hacking Thanksgiving. Oh, god, that was horrible. Hacking at that,
hacking at that, that delicious white meat, dark meat, all will be carved. Yes. All will be carved.
And for our first of this episode, episode, quote unquote, air quotes, too, for our first
contests or feedback note from the populace for the episode, I will, I will present it. I
wrote a girl of the Alien Brothers podcast. If you know and can give us the name of the movie,
where the, the line, white light meat, dark meat, all will be carved. Thanks,
giving comes from there will be a prize to be determined. Oh, wow. That's, that's pretty
courageous of you, theoretical. I didn't know you're going to drop that.
Well, I'm full surprises. Oh, I'm, I'm, I'm surprised.
Yeah, count where I have officially painted you surprised. Yes, I've called, I've colored you
surprised. Color me. So as we record this, it's the eve of Thanksgiving. And I have much to be
thankful for this year, I know. As, as do I? Very much indeed. But I could, I could just,
like, just keep going and going. But I am, you know, very sincerely thankful for you,
Casper. And I have been for, for many a year, but this year, I think our friendship has grown.
Definitely. Probably in large parts, spurred by bad behavior on my part.
But, you know, what, what, what, what doesn't kill us makes us stronger is a cliche that sometimes
has some truth to it. Yeah, yeah. I heard something recently, somebody had put something in a song.
And it was something by JFK. And they said a, an error only becomes a mistake if we do not learn
by it. And, and correct that. And I, I take that to be a good word to look by.
And by, so could you, what was that quote again? An error only becomes a mistake.
An error only becomes a, I'm sorry. I wasn't using a ball. So next. And I don't really have,
shout out. Shout out. Shout out. Yeah. Shout out. Yeah. Yeah. Yeah. Yeah. In Kennedy Voice Quads.
I'll take, or Mayor Quimby. I mean, I'll take, you know, you want to go to high brow. That's the
ideal. Yeah. You want to go meta. I'll, I'll go mid brow. I'll go low brow. I'll do it.
Okay. I don't, I don't care. That it doesn't matter to me. What was low brow was that, that, that
Apple Bing in the background, man, I've heard that on way too many a, a network podcast,
anything recently. It's everywhere. Can't get rid of it. Well, I mean, I could,
I could mute my, my system. I, if that would, if that would make you happier. It, it would. Yeah.
Huh. Okay. Oh, let me, let me, let me just do that. Sorry. Sorry. It's, it's okay. It's like,
I, it's all muted. It's a commercial. It's all, it's all better. It's like a commercial for me.
And okay. Well, I know how easily influenced you are by media.
Mr. Who has, who has, how many, how many, see, how many years of ad busters on his shelf at
home, you know, I know, I know what a lemon you are. How easily accessible you are to the
external influence. So, um, today's topic is called strictly hacking, strictly hacking,
strictly hacking. And the reason it's called strictly hacking is because we've listened to the
feedback from listeners and they thought that us going on a specific topic is what they want to
hear. And this is hacker public radio. So let's talk about hacking. There's been plenty of it in the
news lately. Uh, I deal with it at work, uh, on a constant basis. And, um, we've been talking about
it also, uh, in conversations, uh, non on air. So yeah. And before we get into that, yeah, since it's
my, it's my job to keep things off the rails. But this is very important. Yes.
You wouldn't, since you referenced feedback that we've received feedback from, I take it from,
uh, the first episode of the Alien Brothers podcast that was posted on hacker public media.
Is that correct? We received, uh, feedback. Yes. You want to talk about, you want to talk
about that? I, I, I was actually, I was, I was shocked. Um, yeah, we, we did receive one comment
on hacker public radio, uh, from someone that has posted a good number of podcasts themselves.
They, they also, uh, they do GNU, uh, new world order dot info. It's GNU world order.
Dodd. And who is this? It's just this, this, this, someone out of the, uh, the, uh, yes, the tag is,
uh, Klatu, K-L-A-A-T-U, or maybe that's pronounced differently. Klatu. Klatu was the, uh, was the
emissary from, uh, the day of the earth stood still, wasn't it? Uh, possibly. I, I do not, uh, definitely,
definitely before your time, although it was remade with, uh, oh, excuse me, canner Reeves and,
the not too distant past, but Klatu, thank you so much for taking the time. Um, I'm going to admit,
right now, and I'm ashamed to say this, but I'm going to rectify it. I haven't read the comment
yet, even though Casper did send, uh, me a link to it and a capture, I happened to be walking
or riding the bus at the moment and had my, had only my, I, only my iPhone and, uh, I, I wanted to sit
down and, and, uh, really give the comments, the attention it deserved, but so all I can say for
now is thank you. Thank you for listening. Yeah. And thank you, thank you for taking the time to
comment. And from the little bit I did read, it seemed, uh, complimentary, um, which, you know,
I think we should give ourselves some credit Casper. We're, you know, I mean, for myself,
not to, you know, overblow it, but, you know, this isn't, this podcast isn't my first rodeo.
Yes, yes. I was very impressed with your previous work.
The, the depravity, the, the occasional sound quality, but, uh, I think a little to the left,
a little to the right. And, uh, you know, you stand in between the lines.
Is, if, if there were no lines, but thank you, Clatoon. And, uh, we will be responding to that soon.
And we will also be responding, uh, on hacker, uh, public radio via a mechanism. I'm not clear on yet.
Giving access and, uh, with the social media accounts, we're setting up, um, incrementally,
because right now we've acquired them. And, uh, they're kind of empty right now.
Post-processing. Post-processing. Yeah, it's a, it's a, it's a depth you hit the nail on the head. We,
we, we snatched them and we got work to do to, to work with them. And by snatched them, I mean,
we picked some really lame frickin, like social media aliases and identities, just so we didn't have
use ideal ones with like some number embedded in it, at the end, which is not acceptable to me.
It offends me. Yeah. But anyway, so this is the, this episode's called the day the hacking
died, right? I was going to say strictly hacking, but yeah. Okay. Okay, strictly hacking. So,
we're going to talk about, um, how do you, how do you, I mean, you, among this crowd of two
Casper are truly the, the hacker. Okay. Well, I'm, you, you, you, you are the hacker. No,
you are the hacker. No, I'm, I'm not. I've, I've very limited hacking capabilities. I'm, I'm aware
of software and, and things to do such activities. I've, I've actually taken a course, uh, the OSCP,
the, uh, offensive security, uh, certification program. And, uh, it's unsuccessful in completing
the exam. I might, I actually didn't even take it. I was only able to get a, it's like 33 out of
75 of the computers are, and it's, it's, it's very, very, very, uh, very difficult, but it's,
it's very eye-opening to, uh, the ways and mechanisms and just everything you can do, uh, with very,
very little, uh, little knowledge of, you know, or at any previous knowledge.
Well, without, you know, feel free just to move right along from this, but why do you feel you failed
the exam? Oh, well, I, I didn't take the exam. Um, I took, I took the entire course, and I read
through the entire book, and then after you do that, you have a lab environment where they give,
they give you a certain number of computers to hack into and complete, um, and at the time, uh,
I, after I finished that and I started hacking the computers, I'd gotten, you know, one after another,
and you get on a roll, and I'd done a number of them, but then there were some that were just,
it, it was like banging your head against a wall. Um, I, I didn't know even where, where to begin, um,
because it, it's kind of left, it, it doesn't, there's no explanation as to how, they,
they give you some tools, but, you know, there's a lot left open. Do you think they, they throw those
in there as distractors to see if you'll wind up wasting a lot of time on them versus cutting bait
and moving on? If that's even an option, I don't know anything. No, no, no, you, well, the, the other
thing too, is that the, the ones that I had done, um, I used, uh, the Metasploit tool, um, and the
Metasploit tool makes all of this hacking very, very automatic, uh, if you use Metasploit, uh, Meturperter,
you can essentially just run scripts that are automated to take advantage of security vulnerabilities
and then gain run access, um, and pretty much do whatever you want. Um, so it, it was really fun,
really, uh, educating, um, but to actually complete the exam, you need to, uh, not use the Meturperter
or, uh, Metasploit framework, you can't use it, you have to program your own programs to do that,
which is an entirely different level and it, it would probably take me about a year solid of studying,
um, to complete that, um, and, and that's with it without working or anything, which, which I couldn't
do, I have to have something, I have to have a day job, so, well, I know you'll, I'll know you'll
get it someday without, without being a script kitty, you got it in you, I know you have it in you.
Yeah, yeah, it's, uh, I think the, the challenge really for me too is also, uh, after working all day,
coming home and, uh, doing more computer work is not exactly what, what you want to do, uh,
especially lately, I've, I've just been kind of tired after I get home, it's fall, it's cold,
winter, kind of starting to get the hibernation sent in.
Well, my suggestion to that would be, of course, to quit your job and then, you know,
either focus on, uh, this other task or not, but we've seen how that turns out for me. Of course,
I'm not wrecking that, recommending that to anyone I'm just kidding, uh, although that's what I do.
So the, okay, so you, as we've established now, even though I know the phrase script kitties,
I actually ran a outdated WordPress blog once where it was impressed upon me, the need to keep
um, internet software platforms patch because some, some script, some script kitty, maybe using this
so-called, uh, MetaSploit tool or something else that, uh, easily defaced and, uh, shamed my blog
and, uh, which was associated with another podcast, but that's not, that's not important. So,
you deserve the, I was totally, I was begging for it. You were,
yeah, aren't we all? Yeah, but, uh, we, we had the last laugh in the end though.
Not really, we didn't know that. It's, it's, it's the, it's the, it's the, it's the, it's the,
it's the, it's the, the, that's the whole another conversation. Let me, let me rephrase that. I had,
I had a backup of the blog and associated PHP, BB system. So, after we rebuilt it with fresh
software, we could load it back in. So that was, yeah, so that was the big one. Yeah, is it?
So it's a, no, no, it should never have been hacked and it never should have never happened
in the first place, which maybe is the segue into, you know, we talked a little bit before the show
about what we were going to attack here. And, uh, do you want to start this off with the hacks that
are going on right now, including what's going on right now for anyone listening to this and
this and future is Uber just announced that, uh, they had a big hack. Uh, I'm not sure how long
ago. I've heard exactly like 30 seconds of content regarding this, but they did the ultimate
or not the ultimate, but close to ultimate. No, it, it's worse than the ultimate boo boo in my
humble opinion. Well, all I know and you can incorrect and expound is they got hacked. They knew
about it. They didn't report it to the public per the standard protocols and they paid off
the hackers to be quiet about it. That's, that sounds, that sounds foolproof. What could go wrong?
What could go wrong? The story could get out. Maybe, maybe, maybe by said, uh, said hackers
going to the one, was it the, the post that? It's, it's pretty much everywhere. Now, um, I mean,
but they had to, I think the, I think they came up with WAPO. But so, yeah, that's, you know,
we're being had constantly. I, I just enabled a, uh, uh, as a benefit on my job, a, uh,
a monitoring service, uh, that they just throw in as a, as a freebie benefit for you that keeps an eye
on your accounts. In my case, telling me how, how, um, how really how,
uh, right at the poverty line I am at the moment, but also keeping track, keeping me up to date on
recent attacks and hacks. And yeah, I get pretty much multiple times a day notifications of various
organizations getting hacked and the type of information that's getting stolen from them. I'm
not going into any detail because our listeners, our target audience certainly knows these things.
How do you want to, what do you want to make of this strictly hacking episode? You had a
suggestion I thought was very interesting, which is what drew me into the idea of doing this
on Thanksgiving Eve. What, like, what, what have we hacked since like we were kids? Is that kind
of what you were getting at there? Yeah. There are many ways to attack this. And this is why I thought
it would be an interesting episode. It's topical. Um, Uber is in the headlines, um, 57 million
accounts of, uh, drive or not drive. I'm sorry. Uh, customers, 57, 7 million customers,
and a large number of drivers as well. They headed for a year. They didn't reveal a two US
regulators until now. Uh, they had some tricking language at the front that made it sound like
they were speaking to investigators at the time of the incident, but that was not related to the
incident. That was about something else entirely. So they made it sound like they would smooth it
through there. But, uh, yeah, it's that. So that, that's bad. I think, um, if anyone is working
in the tech industry, they might be more familiar with the, uh, the Intel management engine and
the security vulnerability that was released, uh, just recently with that. What's up with that?
Have you heard anything about that? No, why don't you talk about it? Well, um, as some people might
know, the, uh, Intel management engine, uh, built into any, uh, pretty much any recent Intel CPU,
I think it's been since 2011 or so. Um, they have this Intel management engine. There's been a
lot of conspiracies and stuff about capabilities, uh, et cetera, et cetera. And, uh, there's been some
conferences also about it. Um, a lot of people, it has access, um, it has root negative three
access. So, uh, when you log on to your computer, whether it's, uh, a, whether it's a PC, Linux,
when you log on as root, you have, uh, the rights are zero. Um, so you, and so if you're to give
access to a user, let's say they might have, uh, uh, why that to just to clarify, to clarify,
you mean, level zero, not zero, as in you have no rights, zero refers to what's, yes, like,
from a, from a, you, from a user's perspective, what is typically considered the highest level of
administrative control? Yes. Absolutely. Yes. Uh, thank you for clarifying that. So, uh, yes,
uh, you're welcome. Level level, level zero access is full, full control. And then if you go
down one, two, three, four, then you get two limited accounts, uh, maybe guest accounts, uh,
backup accounts, things of that nature. Um, anyway, this Intel management engine, um,
this is built into the CPUs. It runs its own web server. It has direct access to the CPU,
to the network controller. Um, and it runs on proprietary code. Uh, it runs Minix, which is a,
a Linux distribution, um, and Intel did a recent security audit and, uh, there are some patches for
Dell servers at this time. There are no patches for Dell clients. Um, but that recently came out
this week. So the concept here to break it down, since I'm the, the straight guy here,
who doesn't work in tech, is that there's like a, basically a supervisor,
component to Intel's CPU or system on chips or whatever you want to consider. Let's just say
they're processors that has a, a level of runtime authority that is lower negative three,
which really means superior. It's like, like, like God mode for gamers. Yeah, but it, like,
be beyond. I mean, it, yeah, basically, it, it, it, it, and to clarify for any, I mean, again,
I'm, I'm sure our audience would mostly know this. Maybe if I started listening to our fellow
podcasts, again, I'm ashamed. I, I haven't spent much time with that. I would, I would know more,
but the, the, the real, the point being these different levels exist to basically control what an
executable, um, what, uh, what an executable running as a user or an interactive user can access
in terms of system resources, be it files or areas of memory or that sort of thing. So,
it's a dramatically oversimplified, right? It's basically what, what you can access and that
this supervisor on the CPU, uh, seems, biver, Intel has disclosed that it disclosed something,
I guess, that had not been disclosed previously. I guess is that part of the story here?
Well, it was not general knowledge that this, because to me, from a, as a technologist perspective,
yeah, it makes a lot of technology sense that the thing monitoring, although, you know,
there's a difference in terms of how different supervisors and different context work, you know,
that the thing monitoring the system holistically certainly has to have the ability to
see everything, um, if not necessarily, um, modify everything, which, you know, we're get, we're
speaking, I'm speaking generally of something that needs to be spoken of very specifically,
but what, what kind of hubbub is this, is this causing in the everyday, uh, IT world, where,
where you work as a technologist, you know, you mentioned that there, they got a patch or a
patch coming for servers, um, which would be an obvious target for rogues. Yes. Look, looking,
looking to attack and gain access to that, to that powerful thing, that powerful supervisor,
I keep saying supervisors, probably there, is there a correct term I should be using here?
You, you can use supervisor, hypervisor, you can use whatever you want. I think everyone
gets the concept. Okay. Yeah. So they're patching servers, which would be the first target.
Right. It's, although, although not necessarily, if you want to, you know, make it easier than ever
to install botnets on, you know, if you, if you break it down to the code, you basically have to
get to the root zero level, uh, when you are hacking, uh, in order to get to the CPU stack,
as they say, uh, you got to get to the stack, and then you can run whatever code you want,
and that, and that's basically what the, uh, what the process is in, in any hack or, or the way
that that happens, whether it's through memory corruption or, um, binaries, there's, there's,
there's many different ways of, uh, remotely attacking a computer.
So alongside this Intel announcement regarding current and forthcoming fixes, are there
announcements of any actual exploits or nefarious events that have been where, where this,
this root level run level minus three has been exploited. Are they just saying, hey, it's here,
we're fixing some exploit, but don't worry, nothing's gone wrong. Uh, yeah, it, it, it depends on, uh,
on your, on your take on it, um, we know that, uh, some, uh, some nation states have started to
invest in creating their own, um, hardware, um, as you know, a lot of military hardware is, uh,
produced and only secure facilities that don't have access to, uh, to any foreign entities,
and, uh, they've done something similar, uh, they, they found out a while ago that there was a
way for, uh, governments to disable the Intel management engine, um, one hacker found that out
quite a while ago, um, and they found a way to disable it with that, uh, with that thing,
what they called the highest assurance program, it's an NSA program, describe it, describe the
series of rules for running secure computing platforms. Um, and so there, there was a bit in the code
that was called ReserveHap, and when they would change that bit that would, uh, allow them to sort
of bypass, uh, the Intel management engine. So, yeah. So, uh, that, that's the specific thing. So,
we know that nation states have built it backdoor into it, at least, or, or they have the ability
to disable it so they must know that it's there. Um, so once they discovered that everybody knew
that it was there. Now, what research has been done on it, and the exploits, I'm not up to date
with that, but I would assume that there are exploits, uh, whether they're known or, or unknown at
this time, if there are patches being delivered. Um, so, that, that's just kind of interesting, but I,
I think another, uh, topic we focused on, as well, to just kind of tie it into like day,
our daily lives, is that people didn't realize, uh, how much their conversations and their everyday
exchanges with people would then, uh, be picked up, recorded, and then transferred into an ad.
Um, as soon as they would log in to say Facebook or any other website, uh, you would just
load up your browser, and then you've got an ad for something that you just mentioned to somebody
in the other room, and it was just you and them, and you happen to have your phone on them on you.
Um, yeah, or Alexa, or, or sorry, meaning Amazon's.
Hi, sorry, I didn't mean to wake you up, go back to sleep. Um, wait, we're shifting gears here.
Are you sure you want to, you want to tackle that one? I thought we were doing research for that,
for another show. Oh, um, we, we don't have to go there, but, uh, I just state and think that, uh,
uh, that's kind of the same, same kind of concept, is that everything's being, you know, listen to,
and everything has a embedded hack into it, um, whether it's being used or not, and that, uh,
drives people to, uh, free and open software that they can audit themselves, and, uh, that's a
movement that I know a lot of people that listen to hack republic radio, uh, support the, uh,
you know, free and open software foundations. Indeed. And what percentage of the overall
population do you think that represents? Uh, the number of open source, uh, are you talking about
the population that uses it or the number of, um, um, talking about the number, the, the,
well, one kind of maps to the other in a way. They had percentage of the population that
frankly has the cape, but the, the, the percentage of the population that listens effectively to
things like hack or public radio, the techniques you're describing to secure, to a, use secure
platforms and be that, that aren't susceptible to the ones, like the one specific kind of
concepts where, okay, everything's listening to us. Okay. Uh, it's over-simplify it and let's just
go ahead and say most of all of that data is being sent, uh, processed, uh, sometimes in real time,
sometimes in post-process, sometimes archived, sometimes deleted, you know, it does depending on
who gets their hands on it or what its purpose was. But the, you know, I'll jump straight to
stop asking rhetorical questions. The, the, the percentage of certainly our nation's population
that can you, that has the, the capability, the time, the patience, and the technical knowledge to
effectively live their lives, running mobile devices, a computer, a cell phone, or a smart phone,
whatever you want to think of it as, in a secure way is, you know, I would say a, a fraction
of a percent. Yeah. Wouldn't you? I, I would say some people may say it's near zero because
there's just no way to get away from it. It's pretty much embedded into more and more of our daily
lives. So really, from a certain point of view, yeah, a lot of it's, a lot of it's about in my mind,
when we were discussing this the other night about where we might want to take this,
part of it's about education and for a vast majority of the population that education boils down
to something almost dramatically oversimplified, which is, you apply patches. I mean, that might sound
stupid, but I mean, I'm being dead serious here, you know, it's not okay to let your 80 something
your old mother who loves Windows XP, keep her Windows XP computer if she's using it to shop and
do banking transactions or do anything, right? It's just, it's not okay. It's sad, okay, but it's
actually it's not sad, it's the nature of a reality. So yeah, there's the education regarding
you know, malware, phishing, all that. I feel like a lot of education does happen, you know,
it could always be improved, but we are, I feel like when we, I watch, when I lower myself to
watch mass media, we're constantly being barrage with high level, you know, warnings regarding
remember, and I'm thinking of like watching NBC for, you know, here in Washington, DC,
suburban, you know, and this, this virus was announced today. So remember to do these things,
say, you know, you know what I'm saying? I mean, we've reached that point in our society where
that page goes up on the screen and they go down the bullets and say, never go to a website,
you don't trust, you know, in other words, you know, if you, if you, your gut instinct says,
don't do it, don't do it, right? You know, don't, you know, just, just don't, it's probably not
legitimate. And that's where, I mean, a wise man, DF Menisky wrote in his, in his seminal
work, the nature of systems in chapter eight, you know, if you want to keep a computer secure,
don't attach it to a network, you know, I have no problem with that. And now we've learned that
there are techniques to infiltrate even disconnected devices with, by manipulating radio wave
frequencies. Van, Van, Van, Van, Van Eek freaking and then the whole nine. Yeah, no, that's actually
why one of the parts of the thing I was just talking about, the secure program that they found,
the HAP, high assurance platform, they also disable the microphones on any computers running
in a secure fashion that the NSA uses. That's obvious to disable the microphones at that level,
but it's not only to disable the, the obvious picking up conversations, but also to disable hacking
through the microphone, because hackers have been able to inject code through the microphone
and actually take over computers that have never connected to a network.
Well, Mr. Menisky wherever he is, well, hopefully, hopefully he's staying on top of these things,
it sounds like a new addition to the book needs some, it needs an update, it needs an update.
It might, but I think if you read the last paragraph of chapter eight and you apply
Menisky's principles for how to secure a computer, I think, I think the NSA, I think the NSA,
A, they would look on approvingly, and B, I think they might learn a thing or two from it,
that's just what I'm saying. We'll have information regarding DF Menisky's, the nature of systems,
volume one in the show notes, of course. We've subjected our listeners to a lot of who we love,
and we're very glad you're listening. We've, especially to, to that, could that have come out
anymore, like, I, it sounded like I was being forced to say it, because we do love our listeners,
we do love our listeners. Absolutely. Why else would we do this? That is such a great question.
It's, it's for the listeners for to educate.
What did they learn from episode one?
They learn the style that they aspire to, at least for a club too. So,
I got to get into that column. Do you want me to just read it to you? It's actually,
it's quite unbelievable. And maybe I think you, I think you, I think what we need to do is take
a break and we'll take a, we'll take a quick break and then we'll be back and club two,
this is for you, man. And we're probably mispronouncing it because it's probably not a name designed
to be spoken by the human tongue without pulling it out of your head and pulling it out of your
mouth and tying it and not around your head. But this is the Alien Brothers podcast with
a, a, a, a, and we'll be right back after these important messages. All right.
The Alien Brothers podcast with Casper and Reddiger.
We're back and live. All right. And boy, listener, unfortunately, you missed a good old time during,
during our, our break. Oh, yeah. But, but maybe, you know, who can say what the future will hold,
except all, all you would get is the, is Reddiger side of it because Reddiger had the foresight
to keep recording because that's the thing about. No. Once you start, once you start, you really,
you really got to think if you ever want to hit stop. Well, I did. You did it. And now you've got
more editing to do because of that, I guess. Yeah, that's going to be a tough two clicks. Yep.
Well, and one hit of the delete key. But this is the Alien Brothers podcast. Welcome back.
I'm Reddiger. And I'm Casper. And where today's title is strictly hacking, although we certainly
have deviated from that. But that's okay. Because that's, you know, our style is wild. I would,
I would say the Alien Brothers podcast style. It's wild. It's loose. What are the,
it's in petuous. It's sporadic. It's sporadic. It's sporadic. It's, it's spastic.
It's a little freeform. I like to think it's, you know, sometimes it's a little funny. I think
I have fun. I have fun too. I hope the listeners have fun, most importantly. Yeah. I mean, because
I can't imagine how badly a person would have to hate themselves if they're listening to this
and not enjoying it. Wow. Yeah. Absolutely. I bet that can be said for anything.
Although the truth, you know, when you think about it, when you think about the rise of Howard Stern,
you know how that all played out. He became number one in the New York market because the people
who loved him and the people who hated him listened, because everyone listened to him. Both
is detractors and his fans and his detractors listened to him because they wanted to be angry
and they wanted to hear what outrageous thing he was going to say. So, so the, the title,
that's what that's, that's what he says in his, in the book, Private Parts. And I have no trouble
believing it actually. So, no publicity is bad publicity. Exactly. You hit it. So, in this,
so as promised, in this segment, we're going to strictly hacking. And Howard Stern. Do you ever see
that, do you ever see that movie Strictly Ballroom? No, I did not have the mean either. Oh, okay.
I'm, I'm, well, thanks for bringing it up. I have no plans to. But in this segment, we are,
we had a, we got a nice post, a comment from one of our listeners and Casper's going to be reading that
on the, but before that, on the topic of, oh, and later, after that, we're going to talk about
some early hacking we didn't life, which I don't know, certainly in my case, if it will actually
qualify, but you, you will be the judge. And I don't mean you, Casper. Okay. Good, because that, I,
I don't like to judge. Are you sure you're recording? Yeah, I'm recording. Why?
All right. You're checking. You doubt me. You always doubt me. I am live and direct.
It's live and direct. It's, it's a simple mistake anyone could make.
When we're, when we're having too much fun, the, uh, and then we'll do that. And who knows what will
happen after that? I suspect, I suspect we did a sound check and we confirmed everything was
working. And now we're, we're rehashing this, this old chestnut.
So on the topic of security and where our computers and other devices come from,
I'm sure any listener of this show may be less so the general American at large, but I think
anyone under a certain age certainly knows this, but, um, a lot of the electronics, uh, consumer,
consumer electronics and business electronics that we use in this country are more consumer,
more so consumer electronics than business electronics are, um, manufactured, assembled,
or otherwise turned into finished goods overseas. Samson, a Korean company,
is a huge player in the North American market and Apple known for designing their stuff in
Cooper, Tina, California. I have manufacturers, a shit ton of it in China. In Fox,
some factories, thank you, thank you teenagers for working over time. We appreciate it.
Thank you. We want, we want the iPhone X now. We want it. We thank you for keeping the price of
the eye for so many years, keeping the price of an iPhone under $1,000 until it became time for
it to become a thousand. You passed the savings on to Apple. Thank you Chinese workers. But,
but it could, but I'm going to say I'm going to clear up any potential confusion there is right
now. I am grateful. Okay. Because I think life is improved by the smartphone. Okay. I think,
even though I'm, you know, it's a dichotomy technology is when you get down to the fundamentals
in every scripture and every philosophy inherently, you're absolutely right. In every work of arts,
in every story ever told, what is technology fundamentally? It's, it's like the knowledge,
the Apple, the forbidden fruit, the Apple logo, we were just discussing the other day.
Yeah. And I don't just mean Apple's products. I mean, I mean technology in general,
no, absolutely. I mean, I was just drawing the metaphor with that. Yeah. And, you know,
what the ability to, you know, kill on a mass scale as opposed to having to line up tens or hundreds
of thousands of soldiers and have it be a matter of numbers and, you know, fighting in a traditional
style versus making an automated machine that can kill thousands or tens of thousands rapidly.
Right. So, and if you're a fan of Lord of the Rings, absolutely, very, for anyone else who is,
that's not a very very, always in the fan of the Lord of the Rings. Come on.
Well, I feel in some people. There's some people. Okay.
I'll stay. I'll stay. Well, I mean, one of the major themes, of course,
is that technology is an enabler of, it's, it's used primarily in those stories as an instrument
to do evil. Yes. There's really no examples of it where it's used affirmatively or for good.
It's nature. That's good. It's coming to be coming together of different people. That's good.
It's selflessness. That's good. And those things are good. There's no question. But it's like,
it's like when they put the ring on, they would gain super abilities, but at the same time,
the target was on them because the eye of mortar could see them.
Yeah. Or they could, they cut down all the trees to make war machines.
Yeah. Right. Right. Right. So yeah, like, oh, that's China in this case.
That's pretty much every. Well, it's, it's, it's, it's, it's everywhere, but that's another story.
So going, going back to, so how are we going to start the second segment?
I'm going to, I'm going to start it. I'm going to start it with a quick story that some of our
listeners know some might not, but it has to do with, so there's a company called many of you
might know it called Huawei. Uh, it doesn't, it's not spelled that way. It's spelled.
Is that the X, X u a w e i? Or something?
I think it's, I thought it was H, oh, H, I, H u a, I know, I, I have a w e i. That's what it is.
It's, it's, it's, it's, it's, it's, it's u a, it looks like you want to pronounce it
Hawaii. Hawaii. Okay. But, but it's pronounced Huawei. And they're kind of like the,
they're, they're kind of like China's Dell with some of, like HP thrown in some other things.
They manufacture a lot of stuff. And that includes computers and storage.
There's like Dell plus, like Motorola plus, plus like Hughes modem plus, uh, like IBM.
I, they, they own a lot. I mean, they're multinational networking and telecommunications
equipment and services company is, is what they are.
Are you reading their web page? I'm just looking at the brief description.
I wanted to see how to spell it for the listeners because I appreciate you doing that.
And I'm glad we're working as a team on this. While being like 50 plus miles apart. See,
that's technology doing good. But the reason I bring this up and I haven't thought about Huawei
in a while, although they pop up in the news more and more because there are Huawei products at
use in America, is that a few years ago, more than five years ago, but less than 10 years ago,
a notable, and this is not secret knowledge. This was reported on pretty broadly.
Um, uh, you're probably familiar with semantic, uh, notable, old time computer software security.
Do you mean, do you mean on the word?
That's an important guy. I don't, I don't, I don't, I don't know. That's an insight.
Judging the truth. The true hacker speaks to hear that would remember what's his name.
Peter Norton. Peter Norton, I bet I don't think he's real. I think he's like Carmen Sandiago.
And there's Carmen Sandiago. And there's another nerd, nerdism for you.
Obviously, you've never seen the show. It wasn't during your time.
Well, I used the program. I played the game, which is more important.
Well, I, I did both. I watched the program and the game. And that's why I know how to,
how to pronounce it. What, what, what, what's your, what's your position on Mavis beacon?
Teaches typing. Oh, you're quick with the Google. Aren't you?
That's straight off the couch, sir. Straight off the cuff. Did you hear, did you hear any keys typing?
Nope. I, I remember Mavis beacon while I, I used that program. So, uh, going back to away.
Huawei, um, semantic had a strategic partnership with them because semantic at that time owned a
company called Baratoss, which they bought in 2004, which made data center, uh, data integrity,
and data loss prevention products. What we would typically call backup products.
And they merged last semantic bought them and, uh, semantic makes a product called net backup,
which is kind of like the 800 pound gorilla, a big company, big boy backup products,
although it has competitors. And it has a lot of competitors that do certain features better
than net backup. But that's not important right now. What is important is that, uh, semantic wanted
to make an appliance that ran that backup, um, appliance, meaning a, a server that's got the
software already installed. And to some degree configured. So you didn't have to go buy a server
and stall at license. It set it up yourself. Make sure it met all the specs. You'd be given
something out of the crate. And you, that would be, uh, predictably performing and built to a
specification to do a certain, it was a, it was a backup appliance. So it would run at a certain
throughput. It would store a certain amount of data, um, duty duplication and stuff like that.
Interesting, an interesting choice, uh, semantic chose Huawei as their strategic partner to
provide, um, the server hardware, uh, for the, uh, for the appliance. So a, a, a Chinese, uh, computer
company with, let's just say, um, with, it goes down the name, resources, um, limited resources
provided, perhaps by China's government, um, uh, providing bricks, babies, providing bricks
that have that are running, um, backup software that store in corporate data. So eventually,
someone that went on for a while, I don't know how that, that the idea that maybe that wasn't a good
idea, having the computer manufacturer for a American company's backup products produced, uh,
storing. Yeah, yeah. So that, that, um, that changed that relationship ended and they went
another way. But it, uh, the reason I wanted to bring it up and dramatically, um, over-explain it
was because you were mentioning, uh, the influence of, uh, overseas manufacturer and the risks that
are involved when, um, you know, when we're taking something that, you know, we can deconstruct it
in reverse engineer as much as we want, but the people, we got smart people working in America,
brilliant people and, you know, guess what, so do all of our enemies and friendamies or whatever
it's called, you know, it's, you know, America does not have a monopoly on brilliance, I guess,
really. Yeah, absolutely. So in someone's semantic probably got fired, um, you wanted to read
clout to his comment, right? Uh, yeah, I, I do want to read his comment and I think that will explain
quite a bit here, uh, on the Alien Brothers podcast. So, uh, and for those of you just joining,
welcome. Go back and start, but clout to has been, I think, our, our only commenter in response to
episode one, is that correct? Uh, yes, and it is a very bright glowing comment and I was very
humbled by it. Um, we need to do something special. I thought, or, or, right, uh, I, I thought that
this was a joke actually by you, because it was so glowing. Um, so that's, I would never do
anything like that. So yeah, but I looked into it and it appears to be somebody else who, who
post some on, uh, Hacker Public Radio. Um, and here's this comment. I'll just read it to you
briefly. Uh, and it's called shows like these. It says, it's episodes like this one that
make me want to quit podcasting because I'll never reach this level of greatness. It's so
disjointed and natural that you think it couldn't possibly have been planned, but it's so coherent and
persistent that there's no way it could have been scripted. The characters in it have mysterious
backstories, quote, you say my life, Casper, quote, they cut to empty commercial breaks. They come
up with the name for the series in the episode itself. They talk about how they'll talk about movies,
but then barely talk about movies. They talk about video games, but can't decide how to categorize
them. Those barely even know one another's handles. And yet they pull through. It's gripping and
triumphant. This is some amazing avant-garde audio. Well done, alien brothers. Well done.
Well done, glad to thank you. You know what? That is that made my that made my day and it makes me
triply ashamed that I didn't go out and read the comment right away. And boy, he's really got
our number. He pretty much wrote the elevator pitch for what certainly with that episode was
probably how it's going. Hey, I'm trying to keep a topic based. I'm trying my best.
But we're here, but we've just heard that that's not necessarily the way to go. Who can say how?
Yeah, I mean, we're just doing this. We'll get more feedback. I know that keeping it on topic
was something that I'd heard offline from another listener. But yeah, I think offline from
another listener. How interesting. Yes, it's a highly secret top secret. Different dimension.
Well, you know, it is possible that in episodes X and Y, some of those things that
we would about see. We got to zip it up. Okay. So, Clot 2, thank you so much. We got to do
Clot 2. I don't know what we're going to do. We're going to do. We got it. So I mean, you said
something about a prize or something for naming, but that's that's separate. So
yeah, that again, for those just joining the line from a movie is white meat, dark meat,
white meat, dark meat, all will be carved thanksgiving name the movie that comes from.
And yeah, the prize is guaranteed to underwhelm, but it's it's it's the thought that counts.
It shows that we care. Yeah, it shows that we can get yourself very much in a it's the thought
that counts mine. So I think you nailed it. So early life hacks. Sure. Tell me.
Tell me, tell me Casper. Early life hacks. Not life hack. No, yeah, no, but hacking and
or life hack or life hack. Just keep it with hacking in general. I didn't have any exposure to
hacking on the Amiga platform. Just because it did not have a modem. So there was no
way to get other information other than what you would buy at the store. At that time and
platforms were inconsistent. Late you didn't have you didn't I never got a modem. Modems were
becoming new in or they seem to be just coming on in the late 80s for the Amiga platform.
But it was kind of dying out at that time as well. So but with with the PC we eventually got
AOL and that was a haven for for file sharing. It was like the original Napster essentially because
AOL you could upload whatever you wanted and it was all stored on AOL servers and all you would
have to do is advertise in a chat room the software you would want to get or the software you'd
that you had and someone could get an email and then download that software. So you were getting
full speed from AOL servers which which wasn't much. We're talking about 14, 4, 28, 8, 56K
cape later. So you're still talking about some hours to download something pretty small and size
now. I'll I'll preface it with I forgive you because I know you're about a decade younger than I am
and bless you for that. I'm so happy for you. But I'm pretty sure that IRC and just straight up
bulls and boards for probably the original file sharing. Absolutely. Yeah, no. I also did
that dabble a little bit. I did get one BBS number and kind of did a little bit on that but not
much. In my area I didn't find much on that scene but yes, you're absolutely right. The the
freaking scene and the whole BBS scene was was very lively. Way before AOL you had go for you.
All those other things. So yes, absolutely. Well, maybe I'm more of a if that if that's considered
hacking and again I need to do my homework. I ran a bulls and board for like eight years. I mean
and the comedy is for three or four of those years running that bulls and board was what I used
as my quote unquote service work for national honor society. So I would just side my own slip saying
yeah, I run a bulls and board which had like ten chat boards nobody used and
okay, we're talking up to 1991 which is when I graduated high school. So you know how old I am
and so I had a whopping let's see. Originally 20 but later 80 megabyte hard drive and it was pretty
much all pirated max software and apps and that was that was that was awesome. I didn't think of
that as very hacky though because you know I'd be I was using the white night bulls and board
software and you just downloaded it and paid your shareware fee and you were off to the races. It
was a piece of cake. Well, the hack hacky part of it was that there were certain programs developed
for ALL. So there was the most popular one which people may remember was ALL which had a bunch
of different scripts to do different things. For instance, if someone else had the ALL program,
you could do something that would trigger like a Snoop Dogg soundtrack. They also had like
automated scripts where you could message everyone. It was basically fishing software so you could
say hey I'm a TOS administrator. Please give us your credit card information. This is you know
well before that you know the public was informed of these sorts of things but I did know some people
that actually did that sort of thing and used credit card numbers that they would get online.
I never participated in that activity but that I think that kind of goes into hacking.
That's more of social engineering, fishing but it's definitely a way of hacking I'd say.
I also knew people who did those things and did not do those things.
Yeah. One of my best friends to this day ran one of the biggest pirated Amiga software boards.
Oh wow. Do I dare shout it out? I think the statute of limitations. I don't think anybody's
killing for Amiga. Yeah I think you're good. Oh the statute of limitations on
I don't think the Amiga corporate board is going to be coming after anyone.
It would be grand theft and be a felony. You can explain the hypothetical situation if you would.
So yeah. So he ran the bolts and board out of northern Virginia and his users were primarily
overseas and he would recall that he would refer to them as the euros. This was back before
the euro currency but his that you know the euro. Okay got it. And this was in the early days of
the U.S. Robotics. Yeah we're still talking pre 56K but 2028 was big. That was actually a big part
like in the movie hackers for anyone who remembers that. It's like oh you got a 288 I might have
referenced that before I apologize. He had a U.S. Robotics what was called dual standard because at
the time getting 9600 BOD up to 192 and beyond required one of two two different competing
compression algorithms. One called V32 and the other one called HST if anyone remembers that
and the dual standard was the one that they wrote or that they made that actually implemented both
of them versus buying a modem with one or the other so they could basically charge one and a half
times the price for manufacturing costs that had no zero difference whatsoever but it's not as
I'm often fond of pointing out to certain people we both know you're paying for intellectual
property and R&D you're not paying for hardware but anyway. Yeah I ran a bolts and boards so I was
that was kind of overclocking. That just came to mind as well. So you overclock things? If I can yeah
if you can what what determines on any on any given opportunity if you're going to you do this
personally or for professional I can't imagine it happening at work. Oh no no never never in a
production work environment at all that would violate any employee user agreements or anything
you'd sign I assume but just for gaming I have an unlocked motherboard it's actually quite old
before this Intel I mean stuff we're talking about a quad core you know old CPU but I have a dual
GTX 970s and those things keep the keep the game time and so so that is overclocked from 2.6 to
3.4 gigahertz so it it again it's a way to kind of overcome that hurdle when people impose
like Intel will essentially print the same chips but disable certain cores the manufacturing
processes the same as as many people know they just pick the higher grade ones for the higher class
or they you know the 7700s as opposed to i5s or the i3s yeah of course I mean who's gonna
that's the only thing that makes sense manufacturing wise so you so you overclocked by what is that
about 20% uh yes something like that I don't know so you have like so I mean I so what's going
on cooling wise in there you got like glycol hoses spurting things on you no I just put it
putting on nut in your eye I never went into liquid cooling I did look into it but
yeah it's just it's too much hassle and if there's fluids and just fluids and electronics I just
don't trust my myself with that so the system I have is air cooled the fans are quite loud
I think you you know the computer I'm talking about um so when it's on you you can certainly hear it
um so that yeah it's completely on air but it's mainly used for gaming
all right and about how often does it like blow a gasket just pan oh never never
it never it's solid as a rock it's uh it was a solid dude i actually have had a
I have a I have a lifetime warranty on it believe it or not um it's an EVGA they had some series
uh it's an Nvidia chipset and yeah it's it's great product
So when you or anyone over clocks their system, is it mandatory that you put those absurd
like ground effects lighting kits into them?
Oh, not at all.
Mine has none, actually, it's just a black box, that's all.
Okay.
I mean, to each the right, I will admit, over the years, my computer cases, as well
as many things have gone more conservative.
So maybe the computer cases isn't an extension of that, but I don't know.
It's just more simple.
I don't need the distraction.
Yeah.
I mean, and you know my preferences, I think the commercial consumer computing stuff
I buy is already a work of art, anyway.
Why would I want to modify it?
Well, that's, that's your opinion.
For anyone who hasn't picked up yet, Rutgers, a big, I will not say fanboy, but I like my
Apple products, I like the way they make, I like the way they make me feel, I like the
way they work.
I like the way they look.
What can I say?
I mean, I mean, very simple.
And to each of them, I like the wall, I like that walled garden.
That can be a whole, that can maybe you should be a whole other episode if it hasn't been
covered.
Right.
And that's better by somebody else.
I know.
I think that's the one shout out I'll give to Clat 2, who gave us that glowing comment.
Word.
Yeah.
I really found the, the name of the site just amazing.
I also love the, the layout and again, that's GNU world order.info.
If you go to it, I think it's run by the guy that gave us that comment there.
He's got his own, his own podcast going on there.
He does everything.
Open source.
He is.
Even his code.
Will you do me the, sorry, will you do me the favor of sending to, if you didn't, sending
me that like, you can just SMS, can it, because I'm never going to be listening to this
show.
Yes.
Oh, wow.
Okay.
I'm sorry.
I mean, thanks, thanks to the two and a half listeners we have out there.
And actually, actually, in all seriousness though, and I should have said this earlier across
my mind, but then I, I crossed my mind differently, a Clat 2, I know, I think I'm pretty sure you
were just saying it as a compliment and a comparison when you said, you know, it's
not.
And or maybe just completely sarcastically, which I would totally dig when you said it's,
you know, shows like this that make me want to get out of podcasting.
Do not a do not get out of podcasting, even though I've yet to hear your podcast.
Do not.
It's every, I don't know, you know, I'll just stay, he's a, I'll stay, I'll stay, I'll
stay one of my life philosophies, you know, 80% of everything is just sitting down and
doing it.
You know, the, the, the result is so highly unpredictable and impacted by so many things
beyond our control, no matter what we're doing.
I'm not just referring to podcasting that it's, but I, I do take that as a compliment,
but just, please don't actually do that.
It does remind me actually, Steve O said the same thing about one of his friends who's
a skateboarder.
He's like, this guy is so good, he made me want to quit skateboarding.
So I know, I know it's a common phrase.
Oh, yeah.
I, I, I, I say the same about Wonder Shows and I, I, I, when I saw Wonder Shows and, uh,
which was a show on MTV two for a limited time, you, you can probably find clips on YouTube.
I thought, wow, I never want to make a TV show because that is perfect.
But that's just my, my, uh, my style, I guess.
So that, it's, it's, it's, it's the ultimate compliment I, I made my day.
Definitely.
Yeah.
I need to get over that way of thinking a bit because I, it holds me back from watching
a lot of shows because in my case, I'm such an, an arrogant ass.
I'll watch, you know, uh, Rick and Morty and I'll be like, yeah, this is what I should
have been doing.
Oh, yeah, that, that, that, that, that, that's, that's another show that, that, that, for,
me, I'm like, oh, man, that, that's the perfect, that's another show that, that would be
up there with Wonder Shows and, yeah, Rick and Morty, yeah, Rick and Morty, man.
Absolutely.
Sh, props.
So, okay, those were some kind of like, mid, like, teen hacks, I'm, I'm, I'm going to take
us, we're going to go back, we're going to go deep, we're going to go deep, right?
So I guess this is pretty accurate compared to the, you know, the typical kid, um, but
also just kind of a feature of the times.
So I started, even though I don't do much of it now, frankly, although when engaged in
IT type stuff, I do program, for anyone who doesn't know, maybe the first time I mentioned,
I actually do have a computer science degree that I've, any math minor, well, okay, I don't,
okay, listen, I'm one, I'm one class short of the math minor from my perspective, I have
the math minor.
Now, it doesn't matter because I'm terrible at math.
It's a joke that I have a math minor and this is an accredited university, okay?
So, it's right, if it, if it makes you feel any better, uh, I
have a master's in, like, information systems and I was highly impressed with the code
work that I have seen you do.
So just take that for, for what you will.
I, I'm aware of the code work you've seen me do and I know you're being insincere.
Thank you.
You were just, just learning Pearl, I believe, and it looked, it looked good to me.
Yeah, because I, I wasn't using Pearl like these lunatics who think it's something funny
to write obscure and unintelligible Pearl, I was using it like a, like a, like a, like
a legible language, you know, which is why I'm going to, I am going to learn Python.
When I started dabbling with Docker, I'm like, okay, I'm going to, this is the time I
just need to figure out a project, but then I got a job working at a grocery store.
So I had to derail that for now, but, um, because this is much more rewarding, what
we're doing.
But the podcast is where it's at.
I mean, all the kids are talking on the street.
It's going down.
That was a, that was a, that was a segue just to get me away from where I, I was.
So back when, um, so my point being no one's ever asked me even during the, the hundreds
of hours of my life I've had where people were interviewing me, um, for various things.
You know, when did you start coding?
Because I'm not known for coding.
I'm known for, you know, for inventing architecture, it will, and also, I mean, don't
forget my contribution to inventing the whole field of data control.
Okay.
You know, so that I'm proud of that as you, as you should be, you know, but, you know,
I did, I did read the chapter you gave me of your, uh, your novel on, uh, it was, it
was about storage and computing, I think, fundamentals, uh, if I remember correctly, it
was pretty well.
Pretty well.
You, you've, you've just outed me as being, do you have fun in this scheme, but that's
okay.
Nature systems will get it in the show notes.
Um, I would say there's up, I'll say there's up to a 10% chance we'll get it in the show
notes.
Um, but the first, the first, my introduction to programming was I, we had, um, this is,
if anyone else ever had one of these, I'll be impressed and would love to see a comment
on it.
Um, it was called, uh, the Bally Basic Home Entertainment Center.
And this was a, a console that was probably, um, a cohort in time to the Atari 2600.
Um, don't have it in front of me.
Hopefully you're, you're pulling it up right now looking for Bally home console or something.
And, uh, it, you could get a, a basic, you know, the basic programming language, right?
You could get the cartridge for that.
Now the thing didn't have a keyboard.
It had to, excuse me, this, this second two liter bottle of, of, uh, Harris Teeter
Dieter.
Uh, no.
You're doing that again.
What is going on?
Uh, going down way too.
Way too soon.
Uh, dude, it had a key, it had a keypad.
So typing, I can, I can see that I'm looking at a picture now of it, actually.
Yeah, it was, okay, we, we'll suspend, we, we'll parking lot the discussion of how awesome
this thing was and how vastly superior it was to all other, it was okay.
Anyway, it has, as you can probably see in the picture, which will be in the show notes,
you're making, you're, you're making a list of all the show notes, right?
Oh, of course.
I'm jotting them then down.
Okay.
Okay.
Okay.
Okay.
Did you hear my pen?
Okay.
Okay.
Okay.
Okay.
Okay.
Lois Lane.
Thank you.
Thank you.
Thanks for capturing that one.
It's a good thing.
We're not captured.
We're not captured again on the other way.
Okay.
Okay.
Okay.
All right.
We, all right.
Okay.
Okay.
Got him.
So it's got a, it's got a keypad on it.
So if you want to, okay, so when you put the basic carton in, hello, there you are.
Is that static?
Is that static?
You're making?
Yeah.
Yeah.
Or you just had a disconnect.
Sonspot.
Yeah.
Sonspot.
Ssrr.
Ssr.
Ssr.
Ssr.
So the valley professional arcade in 78.
Yeah.
That's right.
That's the one I'm talking about.
You take the basic cartridge you put in there and it's got an overlay.
You know, like a cut out overlay that goes over the keypad.
So it had some macros for like standard basic command.
I'm guessing print was probably one of them.
go to was maybe another as far as I can personally remember printing go to
really only two commands in basic although I'm sure there were some kind of
conditional constructs too so I did program base I learned basic on that
nice nice I did I yeah yeah I was I was pretty awesome but I still I still
but 78 okay so I was I was five and so I wasn't really doing anything I was
basically like copying programs out of the out of the the code book they gave you
right but that that's the first step you know so so I be you know through yeah
exactly so I made it play green sleeves I thought that was pretty cool that's
my yeah I mean I mean one night I spent the whole night once I discovered
HTML I was just the whole night I was I was like oh man you can see the source
code for for all these web pages and you can basically take whatever you want
and you know like you know make your own web page that that was a great great
experience I remember I remember that of me that was that was pretty cool and when
I was at Virginia Tech by third year is when the web broke I mean when it
exploded it's when mosaic came out it's when we finally had serial TCP IP
coming till like all the dorm rooms I think it was slip at the time I don't even
think we were using PPP yet and yeah I was actually I was in the fourth year I
was in the first HTML class that tech taught now now just to sound like an old
codger I'll mention that everything I had learned by the time I left tech any
intricate interesting computers due to the web and availability of information
would know by age 12 just just because you know that's how it is and maybe I
would have been the same way who could probably not I don't know frankly I don't
know either so yeah the ballet basic was awesome I mean the games were vastly
superior to almost anything on the Atari 2600 oh absolutely it looked like it
had a pretty broad color spectrum range for that time yeah absolutely the last
thing I'll say about it is that the two things one the top of it had this
plastic kind of opaque smoke smokey I guess you would say lid you like like
like a set like kind of cover or record player kind of thing great exactly
exactly and that's and that's where you put the the cart the the game cartridge
the the things you right right so so it held them in there which was genius
okay and they in the cartridges were about the size of a of a cassette tape
yeah yeah you know even you know with that yeah so like the two space it was
like like like an eight track almost except way smaller yeah and way and way
and way less fidelity yeah actually it's it's it's about the quarter of an
eight track and then the controller was a it was a pistol grip and with a
pistol trigger and then on top was a eight directional joystick that also
rotated okay so you had rotation you had eight directional deep
battery you had in one in fit in one hand and you use the other hand with the
knob slash deep head on top it was amazing so like with the football game you
would be moving your quarterback around with the deep pad and then to rotate it
you would be rotating the angle was arm for how he was going to throw this I
mean so if you ever played a Atari 2600 football the original one not the real
sports football that came out later which was where they improved all
there because they had competition it was like gun like gunfight right just the
standard gunfight game was was dramatically superior because you could control
the angle of your shot you know I was I was not aware that they had that the
type of input peripheral at that time that that that that's pretty it was they
were way they were way ahead there was nothing like it really until
Calico basically emulated it with a very similar but enhanced four button
pistol grip controller with a joystick on top that also had I should say
four trigger controller it also had a keypad on it which I guess was
because the standard Calico vision controller had a keypad to it it's launch
game was the the rocky promotional tie-in box it rocky three boxing games so
like the top trigger would be the hard hit and then like the jab and all that
bullshit the games all right thanks for taking us on the control that's cool
the controller that you learn basic controller was and stuff yeah and then I
learned logo and more basic when I got my clicko vision atom which that's a
I'm not even gonna go there if anyone knows what the atom is they know what a
disaster that was from a technology marketing everything down the line
perspective and that combined with cabbage patch kids is what helps puts
Calico on the path to being acquired by Kenner I think or their destruction in
some way and also I finally learned Pascal and C after I got my max and
then I went to school and wrote almost everything and see cool and there you
have yeah it's my life and then I haven't written a line of C since school I
think I can promise you that yeah I ever ever I just haven't I my career has
not needed that it's all been bash said awk pearl and soon Python if you want
to consider html and it's in our in CSS and his derivations coding then well yeah
for that and there's yeah there that's that's not much hacking I didn't build
those boxes what do they call blue boxes where you hold them up to the phone
to get free phone calls that was freaking yeah yeah I there was some oh I knew
one I knew one trick where you could call a number and then hang up the phone
and it would make your phone ring but that's that's not really hacking I think
that was just a telephone trick my friends did a funny hack one night when they
came over to my house and we were playing this game called police quest I don't
know if you I'm sure it sounds familiar it's definitely well it came from
Sierra online so it it came it had the mechanics of kings quests kings quest
two etc except you were a cop and you had to follow cop procedures and they they
were in the office playing it while I was in the bedroom watching a movie or
something and what I didn't know is like they would get to the next scene and
get stuck and just keep calling the helpline provided by Sierra where where
you were you know automatically gets charged to your phone bill so like there
was like seven oh no they just they just they just went through the whole game
that night like we'd be like how's like we kept calling the helpline I'm like
you oh dear yeah yeah no one no one that yeah with friends with friends like
these how could anything how good things have turned out differently now it's
I'm kidding of course it's not their fault I'm a mess it's no it's okay we but
the important thing is that you learn from your mistakes so you now have a
block on your number for the Sierra online help desk is that correct the charge
service it's not it's not even a person you know it's like it's like a it's like a
menu okay I'm sorry I didn't never never never call this this if you if you
if you reach this point yeah it's just like a binary tree the brand like the
first question kind of figures out whether you're halfway through or not and
then that just continues continues continues so those blockers man I I don't
like people that use books and stuff to figure out I mean I understand it if
you run into something I've run into things in like outer scrolls where I've
had to look it up just because it's a bug and I've had to like manually do
stuff the game files to get it to work but that's that's a that's a different
story but I don't know it's just I think you should at least at first try to be
a game you know with what's get with what's given to you if you can I totally
I totally agree I do everything I can to not go to the the cheats various the
Bethesda supporting wickies unless I think I'm like glitched in something game game
genius remember game genie wasn't that a early form of consumer consumer
hacking selling was that like game genie was something you would hook up to
your Nintendo and it went it went between yeah yeah that that was like a
early form of a commercialized form of hack so what would you do you would
pay them extra money once you had the genie to get like unlock oh no no no
oh no no it wasn't on that level at all it was just you would you would buy the
game genie and it had a whole bunch of codes for a whole bunch of games that
were already out I mean Nintendo was a pretty solid like primary platform for
a long time so game genie had plenty you know they listed what games they they
would work with and everything so it wasn't a surprise but it was all built
into the hardware it wasn't like you had a call number or pay more money get a
code it was just like 50 bucks or whatever it was to get the thing I remember
having a original NES controller from I want to say a third party where in
addition to the standard a b buttons in the deep had and the original NES I don't
think had bumpers on it no it also had buttons that were basically like just
rapid fire the same thing is like hitting the a or b like repeatedly right like
three different speeds so like so track and field games instantly became like right it
no let less than no fun because you were just play as fucking the off-market peripherals always
genie they generally have that option where you just like hit something and it does something
over and over and over again do you have any fancy peripherals gaming gaming peripherals like
like a 3D mouse a 3D mouse like a track like a track ball I was I had a couple track ball I mean
I I use a track ball yes for gaming and and and for work really yeah I thought you knew about
this I use a Kensington track ball Kensington that's who it is are they still yeah they're they're
so around are they like the premiere they're they're solid I they're still making the same
product a hundred bucks man you can't beat it I've got two I've got I've got two of them I've had
for one for seven years one for nine years still kicking so how do you clean you just take the ball
out and clean it you just spray some windex or whatever I'm sure I'm sure that's not the proper
way to do it and it pleased if there is a proper way to clean it Kensington laser mouse track ball
laser mouse please let us know but I just spray windex in there and take paper town just kind of
like wipe it out gets all the kind of grime out and stuff yeah that's one of the special things
about you it's it's 2017 and you're still using quality Kensington products man I'm glad to hear
that they're still on the street or were seven years ago and or and nine years ago and I mean
there's there's still out as far as I know they're still kicking it doing the same old product solid
so a lot of people are getting into older like keyboards and stuff maybe that's just a hipster thing
I don't know if the deal is they like the clickety-clack or something but uh yeah well the last thing
I have about hacking now and it's not I don't know it's not I don't know how hacking ish it is
because I was I wasn't there for the original incarnations but in my noise making in the last
four and five years I've you know picked up quite a few programs that are emulating
basically old analogues you know like the moog synthesizers and yeah I like those you know
you know so you it's it's all now in the digital domain except you're dragging and dropping wires
between LFOs to you know make noise which is I think you would agree the best way to describe
this the music I make so that's kind of hat that's that's kind of like a hacking music thing you know
and there were people that were hacking like their Yamaha DX7s and stuff to make them do to
but like the whole like like NES emulation in music to make music out of that and people
had done a lot of crazy stuff yeah I'm trying to think of what the phrase is for
where you like take apart like a video game or some other piece of electronics and then you wire
you you pack it to make it make crazy sounds and stuff there there's a
ready great radio head
yeah no I'm joking like all all our listeners already know well that that's the kind of stuff
you see on like Hackaday like there's a website called Hackaday.com and that's the kind of stuff
that they do maybe it's called Chipcore or something like that shout out to the advantage the
advantage do you know the music of the advantage I do not I'm unaware okay well maybe I don't
know do you have are we gonna take this anywhere do we have anything or do we shut it down with
some outro music from the advantage what do you what do you think I think I just want to drop one
thing I was I was thinking about yeah we were talking about hacking and to kind of take it to a
philosophical level if anybody's familiar with computer simulation theory and if anyone has made
it this far into the show one could say that we are all just bits of code hacking our way through life
indeed that the universe is a is a running system of simulation it's it's entirely possible and
yeah Neil the Grass Tyson cannot argue against it even though he does not believe it's true
it's entirely possible I've only just begun exploring the whole are we living in a simulation
philosophy and I've obviously done so much research I'm just embarrassing I mean that's
sarcastically I'm just embarrassing myself I even bringing it up but so I can't remember the
philosophers name who has the best known argument for the moment I just know it has three points in
it and yeah it seems like the main point being I maybe this was a different argument but the
curve of the argument was very intuitive which is problematic of a lot of philosophical arguments
sometimes the more intuitive they are the easier they are to break apart but the idea is simply this
a we humans are building simulations and have been doing that for a long time b we get better and
better and better at them c and this is the part you can't disprove because there's the problem
of resolution meaning literally how how small can we see right so it's you know so it follows
philosophically from a certain point of view that if we're making simulations and we're getting
better and better then at some points we will and I mean certainly if you look at the world
around us now we're making more and more higher increasingly higher resolution simulations okay
so the point is at what point what would stop us short of the catastrophic end of a civilization
from making a simulation that had inhabitants that did not know they were in the simulation
so then that takes you to the right and the philosophy is behind the matrix and the text that they
used to kind of I think that's a good I think that's a good place to leave it because that brings us
on the fringes of the conversation that we were discussing the other night when it we probably
talk about two hours just trying to narrow the scope of what we would talk about if we if we were
going to talk about AI and you know define AI what kind of AI we're going to talk about where
is it going to go what is it and and that so I thought hacking would be a little bit more direct
I know we kind of diverged on this and that as as we often do but no but you know we we're trying
to to keep things on topics so we're doing our best here folks and we appreciate the comments
again those are there's a great we appreciate the comments we love the listeners we hope you keep
listening and that will inspire us to keep podcasting yeah so the conversation the conversations that
we have which I enjoy Casper I assume you do because you keep subjecting yourself to them they
otherwise they would just they would just happen and in the ether and then they'd be gone and
what led this podcast was one of the things was like man we had some great conversations wouldn't
it be great to to share them with the public to yeah we're already talking about any stuff anyway I
mean you know we're so fucking smart that we're doing the world of disservice by not getting
yourself there is basically well that's what you were I think that you're smart I would say
that I'm smart by any means but I mean we probably feel the same way about each other I don't know
but I know that I always find myself having interesting conversations with you and I thought it
something that should be recorded if people enjoy it and I know now that there's at least one
listener out there Clot 2 again thank you for your kind words
yes amazing and so yeah I'm just if we could you know make one person's day then that that's
worth it for me so and don't give up podcast no no not at all yeah and I've listened to your stuff
it's it's good man keep keep doing it I really like the format of your website it's really really
cool and thanks for the comment even if you're a bot and you probably are yeah I mean who knows
what's new and what's not but that's that's a whole another podcast so everybody stay tuned for
episode three all right cast for man I love all right retiger man love you man and so I'm gonna
just click and sign out here all right have a joyous holiday thanksgiving absolutely you too sir
I'm I'm sorry that we will not be able to interact in in IRL or afk but I'm glad we got to do this
indeed I am as well and thank your your parents for spawning you for for the not for the least of
rich selfish reason for saving my life this year and in other ways leading up to this year but
that that again for another for another time we'll let the mystery uh continue on that we'll
let it hurt we'll let it perfectly all right this is the alien this is the alien brothers signing off
we'll see you soon and we need to sign off thing like uh standard sign off but like right now we'll
we'll say we'll say later can I say good luck and good night or did I just go for it good luck and
good night again peace out the alien brothers podcast with casker and retiger
you've been listening to hecka public radio at hecka public radio dot org we are a community podcast
network that releases shows every weekday Monday through Friday today's show like all our shows
was contributed by an HPR listener like yourself if you ever thought of recording a podcast
then click on our contributing to find out how easy it really is hecka public radio was found
by the digital dog pound and the infonomicum computer club and it's part of the binary revolution
at binrev.com if you have comments on today's show please email the host directly leave a comment
on the website or record a follow up episode yourself unless otherwise status today's show is
released on the creative comments attribution share a light 3.0 license