bitmessage – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 22 Feb 2016 02:48:00 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png bitmessage – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 The Day the Routers Died | TechSNAP 175 https://original.jupiterbroadcasting.net/64547/the-day-the-routers-died-techsnap-175/ Thu, 14 Aug 2014 18:11:02 +0000 https://original.jupiterbroadcasting.net/?p=64547 The Internet suffers from some growing pains, we explain how some old assumptions have come back to haunt us, victims of a cyberheist go after the bank that failed them, and we go deep on the Synology crypto-malware. Then it’s a great big batch of your emails and much more!! Thanks to: Direct Download: HD […]

The post The Day the Routers Died | TechSNAP 175 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The Internet suffers from some growing pains, we explain how some old assumptions have come back to haunt us, victims of a cyberheist go after the bank that failed them, and we go deep on the Synology crypto-malware.

Then it’s a great big batch of your emails and much more!!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

Internet suffers growing pains as global routing table exceeds 500,000 entries

  • High end routers use a special system called TCAM Ternary Content-Addressable Memory to store the routing tables for faster lookups
  • CAM memory works different than regular memory, basically working like an associative array, or hash, where the information can be looked up based on a ‘key’ or ‘tag’. Rather than the data living at a specific address in memory, and the application having to keep track of that address, the application can simply ask for the data stored with a specific key
  • A TCAM works similar, except it is ternary, meaning it has three possible states. Similar to binary, except in addition to on and off bits, it has a ‘do not care’ bit. This makes it perfect for storing routing information, because network addresses are binary addresses split into two parts, the network part (that the router cares about), and the host part (that the router does not care about)
  • So using a TCAM, a router can lookup the destination address for any network by simply requesting the data stored with the key of the destination network address
  • Because of the way TCAMs work, they have to be of a fixed size. The default on some older internet core routers is too small to hold the current global routing table
  • On some routers, if the TCAM gets full, the router can callback to software routing mode, where it has to search the entire routing table in regular memory for the most specific matching network address. This is much slower, and uses a lot of CPU time, which most core routers have very little of
  • To resolve this issue, the size of the TCAM must be changed (if there is enough memory in the device to support a larger size), and the router must be reloaded, causing downtime
  • This issue is further complicated by a manufacturing defect with the memory in the routers and on the line cards, which can fail catastrophically during a reboot, leaving the device unbootable or unable to access the network via the line card. Cisco: Memory Component Issues page
  • This issue was brought up at NANOG – North American Network Operators Group on May 6th
  • Heads Up on the FreeBSD mailing list
  • Cisco announced the problem ahead of time
  • Cisco: How to adjust the TCAM allocation on Catalyst 6500 and 7600

Tennessee based company sues bank over cyberheist

  • Tennessee Electric was the target of a cyberheist, where Russian or Ukrainian based mal-actors took over their corporate bank account and proceeded to siphon $327,804 out of the companies accounts at TriSummit Bank
  • The company had an agreement with their bank, that the bank would phone and verify all transfers of funds
  • The company only became aware that they had been the victims of a heist when they were called by Brian Krebs
  • “According to the complaint, the attackers first struck on May 8, after Tennessee Electric’s controller tried, unsuccessfully, to log into the bank’s site and upload that week’s payroll batch (typically from $200,000 to $240,000 per week). When the controller called TriSummit to inquire about the site problems, the bank said the site was probably undergoing maintenance and that the controller was welcome to visit the local bank branch and upload the file there. The controller did just that, uploading four payroll batches worth $202,664.47”
  • “On May 9, Tennessee Electric alleges, TriSummit Bank called to confirm the $202,664.47 payroll batch — as per an agreement the bank and the utility had which called for the bank to verbally verify all payment orders by phone. But according to Tennessee Electric, the bank for some reason had already approved a payroll draft of $327,804 to be sent to 55 different accounts across the United States — even though the bank allegedly never called to get verification of that payment order.”
  • “Tennessee Electric alleges that the bank only called to seek approval for the fraudulent batch on May 10, more than a day after having approved it and after I contacted Tennessee Electric to let them know they’d been robbed by the Russian cyber mob.”
  • Tennessee Electric’s account appears to have been compromised using a Man-in-the-Browser attack
  • Malware on the computer changed what was displayed to the user when they visited the online banking site
  • “the controller for the company said she was asked for and supplied the output of a one-time token upon login.”
  • The man-in-the-browser virus will then return either a modified version of the regular account balance page (only, showing the amount the user expects there to be in the account, basically adding back the stolen monies)
  • In this case, the virus returned a “down for maintenance” page
  • Asking the user to try again in a few minutes may allow the attacker access to a series of one-time tokens, allowing them to complete more transactions
  • TriSummit Bank was able to get back $135,000 of the stolen funds, leaving the company out almost $200,000.
  • The company is now suing the bank for that money and the interest they would have earned on it
  • Unlike personal accounts, corporate bank accounts do not enjoy the same liability protection from unauthorized transactions that personal accounts do
  • Krebs also mentions his Online Banking Best Practises for Businesses

Synolocker for sale, plus in-depth look at how it works

  • F-Secure does an in-depth look at how Synolocker encrypts your files
  • F-Secure was looking to see if there were many similarities between CryptoLocker and SynoLocker, but found that there were not
  • It appears that SynoLocker may be using better encryption, and uses a unique key pair per victim, which will most likely prevent an online service like the one that is rescuing the files on CryptoLocker victims
  • SynoLocker appears to take additional steps to ensure that the original file is only destroyed
  • It appears the author of the Synolocker virus is looking to get out of the business
  • Posted online that the website will be closing soon, and if you want the keys to decrypt your data you better pay soon
  • If you updated DSM software to try to fix the vulnerability, then you’ll need to use a custom tool to decrypt your data
  • The author is also willing to sell the remain ~5500 decryption keys to someone else for 200 bitcoins
  • It seems he wants to get out before he gets caught, but is willing to let someone else attempt to continue selling the decryption keys (which sold for 0.6 bitcoin previously)

Feedback:


Round Up:


The post The Day the Routers Died | TechSNAP 175 first appeared on Jupiter Broadcasting.

]]>
Go Dock Yourself | LINUX Unplugged 3 https://original.jupiterbroadcasting.net/42192/go-dock-yourself-linux-unplugged-3/ Mon, 26 Aug 2013 17:03:54 +0000 https://original.jupiterbroadcasting.net/?p=42192 After rebuilding his KDE desktop better and stronger than before, Chris and Matt dig into what really seems to be troubling the Gnome project.

The post Go Dock Yourself | LINUX Unplugged 3 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

After rebuilding his KDE desktop better and stronger than before, Chris and Matt dig into what really seems to be troubling the Gnome project, what really makes a desktop easy to use, and if the Ubuntu Edge campaign was a sophisticated PR stunt.

Plus the live feedback from our Mumble room, your emails, and more!

Thanks to:

Use our code visit linux.ting.com.

 

Visit dirwiz.com/unitysync use code linux for an extended trial and a year of maintenance.

 

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed | WebM Torrent Feed

Shit KDE Says:

  • Saturday 18:22 I perform an packer -Syu like a boss.
  • Elect to not reboot, like a boss
  • Sunday Morning I shutdown before LAS to move out to the studio. Gotta clean the pipes.

[2013-08-22 18:22] [PACMAN] upgraded perl-xml-libxml (2.0101-1 -> 2.0103-1)
[2013-08-22 18:22] [PACMAN] upgraded pyqt4-common (4.10.2-2 -> 4.10.3-1)
[2013-08-22 18:22] [PACMAN] upgraded sip (4.14.7-1 -> 4.15-1)
[2013-08-22 18:22] [PACMAN] upgraded python-sip (4.14.7-1 -> 4.15-1)
[2013-08-22 18:22] [PACMAN] upgraded python-pyqt4 (4.10.2-2 -> 4.10.3-1)
[2013-08-22 18:22] [PACMAN] upgraded python2-sip (4.14.7-1 -> 4.15-1)
[2013-08-22 18:22] [PACMAN] upgraded python2-pyqt4 (4.10.2-2 -> 4.10.3-1)

  • I log in, trying to get ready for LAS but KDE kicks an error

Executable: plasma-desktop PID: 830 Signal: Segmentation fault (11)

  • My desktop flashes a few times and I am SOL.
  • Based on recommendations from the professional internet people in the IRC, I backup/move my .kde4 folder
  • I log in, and find my KDE as fresh as a up and coming crossdressing porn star\’s arse.
  • Debated the quick fix, which involved going in with laser like rm strike teams.

rm -rf ~/.kde4/share/config/plasma*

  • But in stead upted for the boss level route:

rm -rf ~/.kde4

  • This put me back at square zero with my KDE config.
  • This time around I decided to double down on tweaking defaults from the go.
  • My initial switch to KDE I tried to keep things default. That was a big mistake.
  • KDE is meant to be tweaked.
  • Started with \”System Settings\” and just went down each and every single option one by one until I was happy.
  • My KDE setup is even more amazing then before. Really love my current setup.

Links:

The post Go Dock Yourself | LINUX Unplugged 3 first appeared on Jupiter Broadcasting.

]]>
Ubuntu Beyond the Edge | LAS s28e05 https://original.jupiterbroadcasting.net/42097/ubuntu-beyond-the-edge-las-s28e05/ Sun, 25 Aug 2013 14:48:08 +0000 https://original.jupiterbroadcasting.net/?p=42097 Ubuntu Edge failed to reach its funding, there are many theories why, we'll break them all down and debate if the touch trend has come to an end.

The post Ubuntu Beyond the Edge | LAS s28e05 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Ubuntu Edge failed to reach its funding, there are many theories why, we’ll break them all down and debate if the touch trend has come to an end.

Plus: A walkthrough of Bitmessage and the recent “hack” attempt this week, a new self hosted email project…

AND SO MUCH MORE!

All this week on, The Linux Action Show!

Thanks to:

Use our code linux249 to score .COM for just $2.49!

For new orders save 32% with our code go32off2

 

Visit las.ting.com to save $25 off your device or service credits.

 

Download:

HD Video | Mobile Video | WebM Torrent | MP3 Audio | Ogg Audio | YouTube | HD Torrent

RSS Feeds:

HD Video Feed | Large Video Feed | Mobile Video Feed | MP3 Feed | Ogg Feed | iTunes Feeds | Torrent Feed

Support the Show:

— Show Notes: —

Was Ubuntu Edge a Sign?


System76

Brought to you by: System76

The number came out of doing some homework on what would be needed to bring the phone to market. And ultimately bringing a phone like this to market requires a lot industrial design work, electrical design, testing, etc. We could have gone for a lower total number, but with a much higher per-unit cost. So, we tried to find something that was a good compromise.

“We thought we could take a leap forward two or three years in terms of the capabilities of today’s phone through the Edge,”

– ::snip:: –

“It certainly raised eyebrows in the phone industry in a good way. Folks feel there’s a hunger for something new and it sent a signal as to what that something new might look like,” said Shuttleworth.

“I think the full Ubuntu convergence experience will not be in the first round of Ubuntu phones, which we’re targeting for the first quarter 2014,” Silber told CNET. “Just phones, not a full converged plug-into-your-monitor device,” she added, stressing, “I think convergence is the future. It may take many forms.”

  • Canonical CEO Jane Silber

– Picks –

Runs Linux:

Android Pick:

Desktop App Pick:

Search our past picks:

Git yours hands all over our STUFF:


— NEWS —

— /etc: Bitmessage —


Untangle

Brought to you by: Untangle

A modern, fast web-mail client with user-friendly encryption and privacy features. 100% Free and Open Source software

– Feedback: –

BM-GuJRSMgViBNXnafzuRQL3tpHHFSJQ5Wm

— Chris’ Stash —

Hang in our chat room:

irc.geekshed.net #jupiterbroadcasting

— What’s Matt Doin? —

— Find us on Google+ —
— Find us on Twitter —
— Follow the network on Facebook: —
— Catch the show LIVE Sunday 10am Pacific / 1pm Eastern / 6pm UTC: —

The post Ubuntu Beyond the Edge | LAS s28e05 first appeared on Jupiter Broadcasting.

]]> Little Phish Big Breach | TechSNAP 124 https://original.jupiterbroadcasting.net/42032/little-phish-big-breach-techsnap-124/ Thu, 22 Aug 2013 16:39:18 +0000 https://original.jupiterbroadcasting.net/?p=42032 It all started with a simple phishing attack, we’ll share the story about a small bank that had a major compromise, plus the Washington Post gets hacked…

The post Little Phish Big Breach | TechSNAP 124 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

It all started with a simple phishing attack, we’ll share the story about a small bank that had a major compromise, plus the Washington Post gets hacked…

A great batch of questions, our answers, and much much more!

Thanks to:

Use our code techsnap249 to get a .COM for $2.49.

 

Visit dirwiz.com/unitysync use code tech for an extended trial and a year of maintenance.

 

Visit techsnap.ting.com to save $25 off your device or service credits.

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

— Show Notes: —

Attackers use DDoS attack on banks as cover to conduct APT attack on wire transfer switches, stealing millions of dollars

  • Rather than attacks like we have previously discussed where the the fraudsters targeted individuals and companies with malware and then drained their bank accounts, this newer series of attacks has targeted the banks and credit unions directly
  • Many of these attacks have been against smaller banks and credit unions because of their more limited IT security infrastructure
  • It is unclear exactly how the attackers infiltrated the banks’ networks, but attacks similar to those against The Washington Post and The Onion are likely, fairly well executed spear phishing attacks
  • Once the computer of someone inside the bank has been compromised, it can be loaded up with keyloggers, remote administration trojans and other malware
  • The attacker can then use the ‘trusted’ computer to escalate their privileges, either directly, or by impersonating the person whos PC has been compromised, and sending more phishing emails internally
  • Once a computer with access to the ‘wire transfer switch’ (usually an application) is compromised, the attacker can initiate a wire transfer from any account
  • Individual bank accounts and bank employees often have limits on the amount they can transfer, however with escalated privileges, the attackers were able to increase or remote these limits in some cases
  • Some banks have instituted anti-fraud systems that require a second employee to authorize any large wire transfer, however attackers had managed to compromise multiple employee accounts inside the bank, and were able to provide the secondary approval of their fraudulent transfers
  • “In at least one instance, actors browsed through multiple accounts, apparently selecting the accounts with the largest balance”
  • Then, to cover their tracks, the attackers launch a Distributed Denial of Service attack against the banks website, and/or online banking portal. This disruption is designed to keep the IT staff at the bank busy and keep attention of other bank employees away from the wire transfer system
  • If successful, the DDoS attack distracts the bank long enough to prevent them clawing back the wire transfer. The bank has a much better chance of getting the money back if they can report the transfer as fraudulent within the first few minutes
  • \”The service portal is down, the bank is losing money and reliability, and the security team is juggling the priorities of what to fix first. That\’s when the switch attack – which is very rare because those systems are not easily compromised [and require] high-privilege level in a more advanced persistent threat style case – takes place.\”
  • Internet Crime Complaint Center (IC3) issues warning in Sept 2012
  • Gartner Report
  • Dell SecureWorks Report

Washington Post hacked by Syrian Electronic Army

  • The attackers managed to modify specific pages of the Washington Post website to redirect traffic to the site of the attackers for about 30 minutes
  • The Syrian Electronic Army (SEA) is a pro-Assad group known for hacking many twitter accounts, as well as other newspapers including The Financial Post, The Onion and the Associated Press
  • SEA originally hacked an employee’s twitter account and used it to spread their message
  • Some time after that, pages on the website started being redirected
  • It is unclear if the employee’s credentials were used to execute the redirect attack
  • The method of attack was exactly the same as that used against the Financial Post and The Onion, phishing emails appearing to come from other employees inside the same company, that redirected users to a fake email login page, that captured their credentials. It is unclear if WP uses gmail as the FP and the Onion did
  • In a tweet, SEA claimed they had compromised ‘Outbrain’, a business partner of the newspaper that provides ‘content discovery’ mechanisms
  • The tweet also claimed that this compromise gave them access to not only the WP, but also CNN and TIME Magazine
  • The newspaper promptly disabled the Outbrain module and enacted other defensive measures
  • Outbrain acknowledged the problem last Thursday. “We are aware that Outbrain was hacked earlier today. In an effort to protect our publishers and readers, we took down service as soon as it was apparent. The breach now seems to be secured and the hackers blocked out, but we are keeping the service down for a little longer until we can be sure it’s safe to turn it back on securely. We are working hard to prevent future attacks of this nature.”
  • This type of attack is especially dangerous. If the SEA had redirected users to a site containing malware, rather than just their own site feature a political message in arabic, the results could have been much worse, and it could have gone on much longer before it was noticed
  • This is the type of attack that is the most dangerous, it is like a watering hole attack, except it targets a mass audience, instead of a small one
  • Additional Coverage

Feedback:

Send us a Bitmessage: BM-GuGEaEtsqQjqgHRAfag5FW33Dy2KHUmZ

Round-Up:

The post Little Phish Big Breach | TechSNAP 124 first appeared on Jupiter Broadcasting.

]]>
Edge of Failure | LINUX Unplugged 2 https://original.jupiterbroadcasting.net/41852/edge-of-failure-linux-unplugged-2/ Mon, 19 Aug 2013 17:48:50 +0000 https://original.jupiterbroadcasting.net/?p=41852 We chat about the fate of the Ubuntu Edge camping and debate with our live callers about the bigger picture.

The post Edge of Failure | LINUX Unplugged 2 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

As the final hours countdown we chat about the fate of the Ubuntu Edge campaign and debate with our live callers about the bigger picture.

Plus our thoughts on the new KDE release, Steam, and a few more thoughts on elementary OS.

Thanks to:

Use our code visit linux.ting.com.

 

Visit dirwiz.com/unitysync use code linux for an extended trial and a year of maintenance.

 

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed | WebM Torrent Feed

  • Upgraded to KDE 4.11 this AM before Coder Radio. Audio problems better?

The rate of games coming to Linux. I check for new games weekly now, and almost install two or three new games a week. This is amazing.

We need to track Steam better as a community. Each month the numbers come out we don\’t have any good visualization of how we are doing. Asymco for Apple for example.

Luna OS review Forgot:

  • Good desktop for developers. Ubuntu LTS compatibility/support with simple UI to let them focus.

  • App indicators work

  • In a couple years high end OEMs like System76 might move to Elementary OS if Ubuntu totally jumps the mobile shark

  • They plan to go w/Wayland, not Mir. Big diff from Ubuntu.

The post Edge of Failure | LINUX Unplugged 2 first appeared on Jupiter Broadcasting.

]]>
Too Much Choice | LU1 https://original.jupiterbroadcasting.net/41497/too-much-choice-lu1/ Mon, 12 Aug 2013 16:49:25 +0000 https://original.jupiterbroadcasting.net/?p=41497 Is choice the frequent excuse of the Linux advocate? One that ignores real limitations of desktop Linux environments? We debate that and rolling an email server.

The post Too Much Choice | LU1 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Does the Linux community lean on the age old excuse of choice, to brush of the real limitations of desktop Linux environments? We debate that, and then discuss the growing reasons to roll your own email server.

Plus we read a ton of feedback, chat with our live hangout, some tablet troubleshooting, and more!

Thanks to:

Use our code JBLIVE to get 20% off for life.

 

Visit dirwiz.com/unitysync use code linux for an extended trial and a year of maintenance.

 

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed | WebM Torrent Feed

Open Ended:

Panel:

\”My Fellow Users,
I have been forced to make a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit…\”

  • Check out: https://www.youtube.com/user/professormesser/videos

The post Too Much Choice | LU1 first appeared on Jupiter Broadcasting.

]]>
Reader Replacements for Linux | LAS s27e07 https://original.jupiterbroadcasting.net/39707/reader-replacements-for-linux-las-s27e07/ Sun, 30 Jun 2013 15:13:52 +0000 https://original.jupiterbroadcasting.net/?p=39707 Build your own Google Reader replacement, or check out one of the hosted options. Will run down the list of the candidates for Linux.

The post Reader Replacements for Linux | LAS s27e07 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Build your own Google Reader replacement, or check out one of the hosted options. Will run down the list of the candidates we think have the best potential to replace Google Reader on Linux.

Then: The week’s Mir headlines have brought out the trolls, we’ll tackle one of the Linux community’s biggest problems: the community.

Plus a HUGE batch of your desktop submissions, new games for Linux…

AND SO MUCH MORE!

All this week on, The Linux Action Show!

Thanks to:

Use our code linux249 to score .COM for just $2.49!

32% off your ENTIRE first order just use our code 32off2 until the end of the month!

 

Visit las.ting.com to save $25 off your device or service credits.

 

Download:

HD Video | Mobile Video | WebM Torrent | MP3 Audio | Ogg Audio | YouTube | HD Torrent

RSS Feeds:

HD Video Feed | Large Video Feed | Mobile Video Feed | MP3 Feed | Ogg Feed | iTunes Feeds | Torrent Feed

Support the Show:

— Show Notes: —

Google Reader Replacments for Linux:


System76

Brought to you by: System76

Self Hosted RSS Readers:

Tiny Tiny RSS is an open source web-based news feed (RSS/Atom) reader and aggregator, designed to allow you to read news from any location, while feeling as close to a real desktop application as possible.

Tiny Tiny RSS version to a PPA, which should make it a lot easier to install in Ubuntu 13.04, 12.10 or 12.04

Tiny Tiny RSS is an open source web-based news feed (RSS/Atom) aggregator, designed to allow you to read news from any location, while feeling as close to a real desktop application as possible.

You have to setup one of this methods before you can start using tt-rss properly, otherwise your feeds won’t be updated.

Run update daemon if you are allowed to run background processes on your tt-rss machine. Otherwise, use one of the other methods. On Debian, official packages have cronjob-based updating setup out of the box.

The new multipurpose rss reader, live stream, mashup, aggregation web application

Remote Hosted:

Go Read is a web-based RSS reader. It is designed to be as useful as Google Reader.

NewsBlur is free on the web, iPad, iPhone, and Android. By subscribing to a
premium account, you support a growing service and unlock a few restrictions.


– Picks –

Runs Linux:

Android Pick:

Desktop App Pick:

Send a Bitmessage to LAS:

BM-GuJRSMgViBNXnafzuRQL3tpHHFSJQ5Wm

Search our past picks:

This tumblr contains the Linux app picks from the Linux Action Show. Both the Linux apps and the Android apps

Git yours hands all over our STUFF:


— NEWS —

You can click this link to install Portal if you have Steam installed

— /etc: Your Desktops!—


Untangle

Brought to you by: Untangle

– Feedback: –

— Chris’ Stash —

Hang in our chat room:

irc.geekshed.net #jupiterbroadcasting

— What’s Matt Doin? —

— Find us on Google+ —
— Find us on Twitter —
— Follow the network on Facebook: —
— Catch the show LIVE Sunday 10am Pacific / 1pm Eastern / 6pm UTC: —

The post Reader Replacements for Linux | LAS s27e07 first appeared on Jupiter Broadcasting.

]]> Privacy Under Linux | LAS s27e04 https://original.jupiterbroadcasting.net/38491/privacy-under-linux-las-s27e04/ Sun, 09 Jun 2013 14:02:25 +0000 https://original.jupiterbroadcasting.net/?p=38491 We demo tools for Linux to protect your privacy. And we’ll highlight Bitmessage, an open source project designed to kill email, and encrypt your communications.

The post Privacy Under Linux | LAS s27e04 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We demo tools for Linux to protect your privacy. And we’ll highlight Bitmessage, an up and coming open source project designed to kill email, and encrypt your communications from the start.

Plus: The big plans for Cinnamon, FireFox OS’ get a big boost, the conclusion to our Let’s Play giveaway…

AND SO MUCH MORE!

All this week on, The Linux Action Show!

Thanks to:

Use our code linux249 to score .COM for just $2.49!

35% off your ENTIRE first order just use our code 35off2 until the end of the month!

 

Visit las.ting.com to save $25 off your device or service credits.

 

Download:

HD Video | Mobile Video | WebM Torrent | MP3 Audio | Ogg Audio | YouTube | HD Torrent

RSS Feeds:

HD Video Feed | Large Video Feed | Mobile Video Feed | MP3 Feed | Ogg Feed | iTunes Feeds | Torrent Feed

Support the Show:

— Show Notes: —

Privacy Under Linux:


System76

Brought to you by: System76


– Picks –

Runs Linux:

Android Pick:

Desktop App Pick:

Search our past picks:

This tumblr contains the Linux app picks from the Linux Action Show. Both the Linux apps and the Android apps

Git yours hands all over our STUFF:


— NEWS —

— /etc: Let’s Play —


Untangle

Brought to you by: Untangle

I promise, I only cut out one part where I freaked out really bad, and only then because it was during the footage I cut out because I wasn’t sure where to go. I may or may not have been scared by my lantern running out of oil and suddenly turning off.

– Feedback: –

Gary’s Mod Comes to Linux… Sells 7 Copies.. What say you?

  • https://twitter.com/garrynewman/status/343127745317986304

  • https://twitter.com/garrynewman/status/343128562745892865

— Chris’ Stash —

Hang in our chat room:

irc.geekshed.net #jupiterbroadcasting

— What’s Matt Doin? —

— Find us on Google+ —
— Find us on Twitter —
— Follow the network on Facebook: —
— Catch the show LIVE Sunday 10am Pacific / 1pm Eastern / 6pm UTC: —

The post Privacy Under Linux | LAS s27e04 first appeared on Jupiter Broadcasting.

]]>