bittorrent – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Wed, 27 Jun 2018 15:32:53 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png bittorrent – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Fedora to the Core | LINUX Unplugged 255 https://original.jupiterbroadcasting.net/125726/fedora-to-the-core-lup-255/ Wed, 27 Jun 2018 07:32:53 +0000 https://original.jupiterbroadcasting.net/?p=125726 Show Notes/Links: linuxunplugged.com/255

The post Fedora to the Core | LINUX Unplugged 255 first appeared on Jupiter Broadcasting.

]]>

Show Notes/Links: linuxunplugged.com/255

The post Fedora to the Core | LINUX Unplugged 255 first appeared on Jupiter Broadcasting.

]]>
Winning with Lelo Hex | TTT 249 https://original.jupiterbroadcasting.net/100566/winning-with-lelo-hex-ttt-249/ Mon, 20 Jun 2016 15:20:59 +0000 https://original.jupiterbroadcasting.net/?p=100566 It’s a good day for net Neutrality, Microsoft is getting competitive with Chrome & the DMCA is ugly & busted. Plus a 3d Printed bus, Marvin gets named & our Kickstarter of the week! Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube RSS Feeds: MP3 Feed | […]

The post Winning with Lelo Hex | TTT 249 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

It’s a good day for net Neutrality, Microsoft is getting competitive with Chrome & the DMCA is ugly & busted.

Plus a 3d Printed bus, Marvin gets named & our Kickstarter of the week!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Patreon

Show Notes:

Links

Kickstarter of the Week

The post Winning with Lelo Hex | TTT 249 first appeared on Jupiter Broadcasting.

]]>
Garbled Transmission | TTT 235 https://original.jupiterbroadcasting.net/97246/garbled-transmission-ttt-235/ Tue, 08 Mar 2016 12:00:16 +0000 https://original.jupiterbroadcasting.net/?p=97246 Bittorrent client Transmission gets hit with Ransomware, Facebook pays out $15k to a hacker & Microsoft is bringing SQL to Linux. It’s a HUGE edition of Tech Talk Today! Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube RSS Feeds: MP3 Feed | OGG Feed | iTunes Feed […]

The post Garbled Transmission | TTT 235 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Bittorrent client Transmission gets hit with Ransomware, Facebook pays out $15k to a hacker & Microsoft is bringing SQL to Linux. It’s a HUGE edition of Tech Talk Today!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Patreon

Show Notes:

Episode Links

Kickstarter of the Week

The post Garbled Transmission | TTT 235 first appeared on Jupiter Broadcasting.

]]>
Dropbox, the Cheap Date | Tech Talk Today 50 https://original.jupiterbroadcasting.net/65507/dropbox-the-cheap-date-tech-talk-today-50/ Thu, 28 Aug 2014 09:25:52 +0000 https://original.jupiterbroadcasting.net/?p=65507 Dropbox receives a major storage and functionally update, is this enough to overlook the services glaring issues? Twitch.tv is now bigger than CNN & Red Hat sees a major executive abruptly leave. Plus the new improvements to BitTorrent Sync & more! Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent […]

The post Dropbox, the Cheap Date | Tech Talk Today 50 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Dropbox receives a major storage and functionally update, is this enough to overlook the services glaring issues? Twitch.tv is now bigger than CNN & Red Hat sees a major executive abruptly leave.

Plus the new improvements to BitTorrent Sync & more!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed

Become a supporter on Patreon:

Foo

Show Notes:

Dropbox Beefs Up Its Pro Feature Set, Now Offering 1TB Of Storage For $10/Month

Many Dropbox users start out as Basic users, but the company increasingly has been trying to get customers to upgrade and pay for storage. In 2011, the company launched Dropbox for Business, which has seen a fair amount of success in the years since. Dropbox says that it’s used within 4 million companies and 97 percent of Fortune 500 businesses, although not all of those companies are paying customers.

Until today, those so-called “prosumers” were paying $10 a month for 100 GB of storage, but they had a feature set that was pretty similar to the company’s Basic offering.


Dropbox is looking to offer Pro users a lot more storage and a lot more features than their Basic brethren, which it hopes will give a lot more people a reason to upgrade.

Dropbox Pro now offers 10x the storage that users previously got, boosting available capacity for each of its users to 1 TB for $10 a month. By doing so, Dropbox is matching pricing for Google Drive, which lowered its prices for a TB of storage earlier in the spring.


Another feature that is now available to Pro users is the ability to remotely wipe files from your Dropbox folder if your laptop happens to get lost or stolen. By doing so, any Dropbox files or folders that were connected to that device will no longer be accessible the next time that the computer, phone, or other device comes online. And if the device is recovered, users can easily reconnect it to their account.

Dropbox previously offered 200 GB for $20 a month and 500 GB for $50 a month, but with the increase in storage to 1 TB, it’s decided to drop those tiers. As a result, in the short term it could make slightly less money from users who paid a premium for their storage plans.

However, the company could easily make up the difference by increasing the number of Pro users who sign up.

BitTorrent Sync Gets New Interface, Links for Sharing

Version 1.4 is designed to fundamentally change the way users interact with the app by simplifying the sharing process. In that vein, Sync for Windows and OS X have a redesigned user interface to make it easier for sharing via a new workflow and customizable folder list for folders.

You can now right-click on a folder, select “Share with BitTorrent Sync” and then choose either Email (a preformatted message will show up and you’ll need to input the email addresses), Copy (the link will be put in your clipboard), or QR code (for mobile scanning).

The sender can set a given link to expire after a number of days or after a certain number of times it is used, and can also require confirmation to ensure that only the receiver can sync the data in question (this is on by default but can be turned off for less important transfers). If the receiver doesn’t have Sync version 1.4, the webpage will prompt them to install it.

Twitch is now bigger than CNN, MSNBC, and MTV during prime time | The Verge

The New York Times had a great data-driven article this morning about just how big Twitch has become. One year ago the video game live-streaming platform wasn’t even equal to HLN in size. Fast-forward to this summer and Twitch is bigger during prime-time hours than CNN, E!, or MSNBC, with occasional spikes that put it above MTV as well.

Right now Twitch has about 715,000 concurrent viewers during prime time, but will quickly eclipse that if its growth continues apace.

Samsung’s Gear S smartwatch doesn’t need a phone to get online or make calls

The Gear S (not Solo) has a twist: there’s a 3G modem inside.

That means that even when outside the range of a Bluetooth-connected phone or WiFi, it can still send and receive messages or make calls.

It has a 2-inch AMOLED screen plus a dual-core 1GHz CPU inside along with GPS, heart rate and motion sensors, all powered by a 300mAh battery Samsung says can last up to two days.

It runs Tizen instead of Android Wear.


In the run up to IFA next week Samsung is also introducing the Gear Circle headset.

The Gear Circle has a magnetic clasp so it fits around your neck while not in use, a touch sensor and battery with up to 11 hours of talk time.

Pairs with a phone over Bluetooth, letting users hear notifications, use voice commands or listen to music through the earbuds.

Both devices will go on sale in October, although there’s no word on a price for either.

Red Hat CTO unexpectedly quits, amid rumors of executive ‘friction’

No-one among the rank and file at Red Hat seem to have seen this coming. In a move the Linux giant’s staffers said was “shocking” and a “punch in the gut,” long-time Red Hat chief technology officer Brian Stevens has resigned.

In a short press release, the company announced: “Brian Stevens will step down as CTO.”

Stevens, whose Red Hat page was taken down minutes after the news was released, had been with Red Hat since 2001. Before that he had been the CTO at Mission Critical Linux, and a senior architect at Digital Equipment Company (DEC), where he worked on Digital’s Unix operating system, Digital Unix. Today it lives on as HP’s Tru64. In technical circles, he’s perhaps best known for his work on the X Window System


Some Red Hat employees speculated that Stevens may have left because friction between Stevens and Cormier.

Paul Cormier is Red Hat’s president of products and technologies.

They observed that CTO office had been moved out from underneath Cormier’s control some time back. However, no one said that was any kind of current feud that might have lead to this move.

Others suggested that perhaps Steven wanted to move up to a CEO slot and that would never happen within the company.

Movies ● GOG.com

imgurlArea 27-08-14  19_58_45.png

The post Dropbox, the Cheap Date | Tech Talk Today 50 first appeared on Jupiter Broadcasting.

]]>
The Premium Internet | Tech Talk Today 36 https://original.jupiterbroadcasting.net/63477/the-premium-internet-tech-talk-today-36/ Thu, 31 Jul 2014 09:27:01 +0000 https://original.jupiterbroadcasting.net/?p=63477 Wireless providers double down on slicing up the internet into marketing packages, and we’ll explain why we feel this is very bad for future innovation on the web. Plus has Google just taken another major step away from G+, why BitTorrent’s new Bleep chat might fall short, and the amazing story of Popcorn Time and […]

The post The Premium Internet | Tech Talk Today 36 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Wireless providers double down on slicing up the internet into marketing packages, and we’ll explain why we feel this is very bad for future innovation on the web.

Plus has Google just taken another major step away from G+, why BitTorrent’s new Bleep chat might fall short, and the amazing story of Popcorn Time and it’s new features.

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed

Become a supporter on Patreon:

Foo

Show Notes:

Sprint Will Sell a $12 Wireless Plan that Only Connects to Facebook or Twitter – Digits – WSJ

For about $12, will soon let subscribers buy a wireless plan that only connects to Facebook.

For that same price, they could choose instead to connect only with Twitter, Instagram or Pinterest—or for $10 more, enjoy unlimited use of all four. Another $5 gets them unlimited streaming of a music app of their choice.


The plan, offered under the company’s Virgin Mobile brand of prepaid service, comes as wireless carriers are experimenting with ways to make wireless Internet access more affordable for the poorest consumers by offering special deals on slices of the Web.


In the process, however, they are testing the long-held principle that all Internet traffic should be treated equally by creating strong incentives for subscribers to use already dominant services.

In June, T-Mobile US Inc. said it would allow customers unlimited use of mobile streaming music that doesn’t count against their data plans when they use services like Pandora and Spotify. Earlier this year, AT&T Inc. created a program allowing companies to foot the bill for data used by their customers on mobile apps.

Sprint said the plan—called Virgin Mobile Custom—was aimed at giving consumers more choices.

The new plan is only available at Wal-Mart and the base offering covers just 20 minutes of talk time and 20 texts. Subscribers can customize the plan by buying up to unlimited talk or text or both, and by choosing among data packages.

Ubuntu for Phones to Integrate Nokia HERE Maps

“HERE will provide a hybrid solution integrating an A-GPS and WiFi positioning system. Although Ubuntu already features GPS-based location, GPS on its own is not sufficient to support the location services that run on the OS with a rapid and efficient location positioning capability. This fully integrated solution will also be available to the many thousands of application developers currently using Ubuntu OS on their own hardware.”

Hangouts Now Works Without Google+ Account

Until now, you had to have a Google+ account to use Hangouts if you were a Google Apps user. Starting today, that requirement is gone. Anybody with a Google Apps account will now be able to start or join a meeting from their desktop or their dedicated Chromebox for Meetings device. For now, however, the requirement is still in place on mobile, but Google says that’s going away soon, too.

The only other restriction for those who want to use Hangouts without a Google+ account is that they won’t be able to use Hangout apps other than Screenshare or Chat and that they won’t be able to use Hangouts on Air to broadcast their chats to a larger audience.


BitTorrent’s new Bleep chat client doesn’t rely on any central servers to find and manage contacts. Instead, the company is using Distributed Hash Tables, also known as DHT, which are basically decentralized sets of data that can be queried by any connected client.


The company touts the absence of a central server or directory as a safeguard against government wiretapping and other kind of snooping, and it also promises better security for the actual messages. Bittorrent’s Senior Director of Product Development Farid Fadaie explained it this way on the company’s engineering blog:

“We are using secure encryption protocols such as curve25519, ed25519 , salsa20, poly1305, and others. Links between nodes are encrypted. All communication is end to end encrypted. This should be the new normal in the post-Snowden era.”

BitTorrent starts testing Bleep, its new P2P messaging platform

BitTorrent is slowly starting to take the wraps off its upcoming P2P chat initiative: The company started an invite-only pre-alpha test of a new Windows chat client dubbed “Bleep” on Wednesday, and it also revealed that it plans to make the underlying peer-to-peer technology available to other chat apps and messaging service providers as well.

Popcorn Time Adds Apple TV Support, iOS App Coming Soon | TorrentFreak

While the original app was shut down by the developers after a few weeks, the project was quickly picked up by others. This resulted in several popular forks that have gained millions of users in recent months.

Today one of the most popular Popcorn Time forks releases a highly anticipated feature. The developers inform TorrentFreak that the latest version now has Airplay support, making it possible to stream movies directly to Apple TVs and other supported devices.

Ironically, Airplay support is currently limited to the Windows release, but a Mac version is due early next week and the Linux release will follow shortly after.

The latest feature follows the addition of Chromecast support a few weeks ago.

The post The Premium Internet | Tech Talk Today 36 first appeared on Jupiter Broadcasting.

]]>
Fine Wine or Sour Ports | LINUX Unplugged 42 https://original.jupiterbroadcasting.net/58337/fine-wine-or-sour-ports-lup-42/ Tue, 27 May 2014 16:28:39 +0000 https://original.jupiterbroadcasting.net/?p=58337 Liam from Gaming on Linux joins us to discuss the Witcher 2 port fiasco, and why Linux’s reputation as a gaming platform could be on the line. Plus a heated Manjaro discussion, your feedback, and a BIG announcement! Thanks to: Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | […]

The post Fine Wine or Sour Ports | LINUX Unplugged 42 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Liam from Gaming on Linux joins us to discuss the Witcher 2 port fiasco, and why Linux’s reputation as a gaming platform could be on the line.

Plus a heated Manjaro discussion, your feedback, and a BIG announcement!

Thanks to:

\"Ting\"


\"DigitalOcean\"

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed | WebM Torrent Feed

Show Notes:

FU:

The Witcher 2 Drama:

Guest: Liam Dawe (upurtweet) on Twitter

Full time dad, owner of @gamingonlinux and writer for @linuxvoice !

eON is a middle ground idea between what WINE does, and a native port. It is tuned and customised to each game we port — we do not simply slap a Windows binary into it and ship the game. For example, we often customise the D3D9->GL code path in various ways to cater for the title. Shaders are often rewritten to native GLSL, etc.

_The problem is if we keep accepting ports at a sub-par quality then Linux will gain a reputation for having low quality games. Think about that big picture for a moment, seriously.

_

New Show: Tech Talk Today (Mon – Thur)

9am Pacific / 12pm Eastern / 7pm GMT

  • A daily, low key tech talk show. Covering the entire industry.

  • A rotating cast of friends will join me, sometimes I’ll be solo.

  • A unique perspective and insights, from outside the valley bubble. Outside the grasp of Google or Apple influence. A perspective from the open source community considering the important topics of the day.

  • The state of technology coverage has bothered me for a long time, and specifically as many LUP listeners know the coverage of the Linux and open source communities.

  • The show will try and be a daily taste maker of interesting topics and discussion.

  • The daily format will allow for a large range of topics, and active live participation via Mumble, etc for talk back.

  • Could be a little on the risky side, very blunt and honest opinions. Calling it like we see it.

  • Patreon funded, with some limited sponsor opportunities available.

  • Willing to consider discounted community spots.

  • The Patreon fund is basically a fund JB’s growth campaign, and you get a daily show as a thank you.

  • The revenue raised via Tech Talk Today’s Patreon funding will finance studio upgrades from facilities, to equipment, and even living conditions.

  • Long term plans include funding a road show, and other big things we could only pull off with a stable platform of funding for us to stand on.

  • This is a grand experiment. I’ve wanted to do a daily show again for a while, but its also some of the hardest workout there. It’s a lifestyle. Can I keep it up? Can we fund future JB growth? I’m not sure, but I am damn excited to find out!

The post Fine Wine or Sour Ports | LINUX Unplugged 42 first appeared on Jupiter Broadcasting.

]]>
Bittorrent Sync vs AeroFS | LAS s26e10 https://original.jupiterbroadcasting.net/37056/bittorrent-sync-vs-aerofs-las-s26e10/ Sun, 12 May 2013 14:29:34 +0000 https://original.jupiterbroadcasting.net/?p=37056 Bittorrent Sync is out, and it promises to enable p2p Dropbox style filesharing, for free, with no limits. But has AeroFS already beat them to the punch?

The post Bittorrent Sync vs AeroFS | LAS s26e10 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Bittorrent Sync is out, and it promises to enable p2p Dropbox style file sharing, for free, with no limits. But has AeroFS already beat them to the punch? We put these two Dropbox killers head to head.

Plus: The systemic issues facing Microsoft that have lead to open source code remaining the benchmark of quality, Gabe prepares to address the Linux faithful, Gnome upsets users, Ubuntu has a new package format, a double picks blowout…

AND SO MUCH MORE!

All this week on, The Linux Action Show!

Thanks to:

Use our code linux249 to score .COM for just $2.49!

32% off your ENTIRE order just use our code go32off2 until the end of the month!

 

Visit las.ting.com to save $25 off your device or service credits.

 

Download:

HD Video | Mobile Video | WebM Torrent | MP3 Audio | Ogg Audio | YouTube | HD Torrent

RSS Feeds:

HD Video Feed | Large Video Feed | Mobile Video Feed | MP3 Feed | Ogg Feed | iTunes Feeds | Torrent Feed

Support the Show:

— Show Notes: —

Bittorrent Sync for Linux:


System76

Brought to you by: System76


– Picks –

Runs Linux:

Android Pick:

Desktop App Pick:

Search our past picks:

Git yours hands all over our STUFF:


— NEWS —


Untangle

Brought to you by: Untangle

– Feedback: –

— Chris’ Stash —

Hang in our chat room:

irc.geekshed.net #jupiterbroadcasting

— What’s Matt Doin? —

— Find us on Google+ —
— Find us on Twitter —
— Follow the network on Facebook: —
— Catch the show LIVE Sunday 10am Pacific / 1pm Eastern / 6pm UTC: —

The post Bittorrent Sync vs AeroFS | LAS s26e10 first appeared on Jupiter Broadcasting.

]]> Not So Secret Answers | TechSNAP 70 https://original.jupiterbroadcasting.net/22921/not-so-secret-answers-techsnap-70/ Thu, 09 Aug 2012 16:02:55 +0000 https://original.jupiterbroadcasting.net/?p=22921 A Gawker Reporter’s entire online presence is hacked, and all his devices wiped. We’ll walk you through the details of this attack, the challenges it exposes and more.

The post Not So Secret Answers | TechSNAP 70 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A Gawker Reporter’s entire online presence is hacked, and all his devices wiped. We’ll walk you through the details of this attack, and why it suggests we might be facing some fundamental challenges.

Plus: Your questions, our answers, and so much more.

On this week’s TechSNAP!

Thanks to:

Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

SPECIAL OFFER! Save 20% off your order!
Code: go20off5

Pick your code and save:
techsnap7: $7.49 .com
techsnap10: 10% off
techsnap11: $1.99 hosting for the first 3 months
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans
techsnapx: 20% off .xxx domains

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Gawker Reporter gets entire online presense hacked

  • Gawker Reporter and formed Wired editor Mat Honan had his entire digital life destroyed in a matter of minutes last week
  • A hacker going by the pseudonym Phobia, originally targeted Mat’s twitter account because of its 3 character username
  • The @mat twitter account linked to Mat’s personal website, which listed his gmail address
  • The attacker then started the password recovery process to reset the password of the gmail account
  • Since the gmail account had not been configured for two-factor authentication, the reset option was to send a new password to the alternate account configured in gmail
  • The address of this account is obscured and displayed so you know which email to go check, but when the alternate address for mhonan@gmail.com is displayed as m*****n@me.com it is pretty easy to guess the email address
  • Now, in order to reset the password of the AppleID, the attackers would normally need the answers to the account’s “Secret Questions”, however, there is a fallback method, when these cannot be provided by the customer
  • Apple only requires that you provide the billing address and last for digits of the credit card on file for the account
  • The billing address is fairly easy to come by (phone book, domain whois, people search, blog posts, etc), but the last four digits of the credit card number are less so
  • Since the hacker knew the victims email address, the next target of the attack was Amazon.com
  • The attacker had an associate call Amazon and claim to be the victim, wanting to add a new credit card to the account. This process only requires knowing the account holders name, billing address, and the new credit card (Adding a new credit card to your account does not seem like a high security operation, and it would seem to make sense for companies to make this process as easy as possible)
  • The trick is, you then call Amazon back, and now you are able to provide the account holders name, billing address, and current credit card number. With this information to verify your identity, you are able to change the email address on the account, to one that you control
  • Now that you control the Amazon account, you simply login, and look at the other cards on file, you don’t get to see the entire credit card number, but the first and last 4 digits are displayed, so that customers can identify which card is which
  • With that information in hand, it now time to call AppleCare, and reset the password on the AppleID, gaining you access to the iCloud account and @me.com email address of your victim
  • Next you can reset the password of the gmail account, and then once you control that, reset the password of the twitter account
  • Now, if you want to prevent your victim from interfering with your actions, you need to disable their ability to fight back. This is where iCloud’s ‘Find My’ service comes into play
  • The attacker used the service to initiate a remote wipe of the victim’s iPhone, iPad and MacBook, as part of this process, the devices are also locked with a PIN code, which only the attacker has
  • The next step was to delete the gmail account, so it couldn’t be used to regain control of the twitter account. Normally you are able to undelete a gmail account, however it requires external verification, in this case via a text message to the cell phone tied to the gmail account, which the victim had not yet regained control of
  • All of this points out that the serious weak link in most all security systems, are the people, and the ways around the security systems we put in place, for when people forget their passwords
  • As we have seen in other cases like this, with some basic personal information that is pretty easy to acquire, and attacker could have transferred the phone service from the victim’s cell phone to another device in order to intercept verification text messages from services such as gmail or the victim’s online banking
  • Mat Honan admits that a number of the security problems that made this attack possible were his own fault, not having recent backups of his devices, not using two-factor authentication for gmail and other services and having only a 7 character password for his AppleID (although this didn’t factor into this attack as originally believed, it is still a security failure)
  • Wired did its own tests using the methodology that the attacker claimed to have used, and was able to completely compromise two other Wired employees
  • Apple and Amazon have both since stopped doing password resets over the phone

Secret Questions Don’t Work

  • The problem with Secret Questions is that in order for a question to be general enough that it will apply to most people and static enough that the answer won’t change by time you need to use the questions to recover your password, the answers end up being very generic and can usually be found with a bit of research
  • You also have to consider who may be attacking your secret questions, if the question is “What was the name of your first Teacher”, what if the attacker is someone you went to school with?
  • Another problem is how strictly the answers are verified, a common security question when calling your credit card company is your mother’s maiden name. In a great deal of cases, if you just mumble something this will be accepted and you will be able to make changes to the account
  • A good security question must maximize these four criteria:
  • Definitive: there should only be one correct answer which does not change over time.
  • Applicable: the question should be possible to answer for as large a portion of users as possible (ideally, universal).
  • Memorable: the user should have little difficulty remembering it
  • Safe: it should be difficult to guess or find through research
  • Feedback: Send in your ideas for good secret questions, and we’ll critique some of the suggestions next week
  • Bruce Schneier on Secret Questions

Feedback:

Round-Up:

The post Not So Secret Answers | TechSNAP 70 first appeared on Jupiter Broadcasting.

]]> Linux Mint 12 Review | LAS | s19e08 https://original.jupiterbroadcasting.net/14653/linux-mint-12-review/ Sun, 04 Dec 2011 13:10:00 +0000 https://original.jupiterbroadcasting.net/?p=14653 It’s our review of Mint 12, does this up and coming distribution have a bit of a desktop identity crisis? Or are they angry Ubuntu users salvation!

The post Linux Mint 12 Review | LAS | s19e08 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

It’s our review of Mint 12, does this up and coming distribution have a bit of a desktop identity crisis? Or are they angry Ubuntu users salvation!

Plus: Get the latest on the Carrier IQ story, and how you can find it, and what you can do. Plus a new call to arms, Linux users rocking the Humble Bundle, and Debian’s new use for bittorrent!

And so much more!

All this week on, The Linux Action Show!

Thanks to:

GoDaddy.com Use our codes LINUX to save 10% at checkout, or LINUX20 to save 20% on hosting!

$1.99 per month Economy Hosting for 3 months

GoDaddy Offer Code: LINUX11

Free Private Registration

GoDaddy Offer Code: linux17
Link: https://www.godaddy.com/domainaddon/private-registration.aspx?isc=linux17

Direct Episode Download Links:

HD Video | Large Video | Mobile Video | MP3 | OGG Audio | YouTube


   

-SHOW NOTES-

Runs Linux:

Android Pick:

Universal Pick:

Linux Action Show Subreddit

New Show, In Depth Look:

NEWS:

Linux Mint 12 Review:

Grab the LAS Mint Torrent:

Mint12 VirtualBox Torrent
– User: linuxactionshow
– Pass: jblive.tv
– Previous VirtualBox images Torrents

Support Jupiter Broadcasting

Find us on Google+

Find us on Twitter:

Follow the network on Facebook:

Jupiter Broadcasting Forum:

Catch the show LIVE Sunday 10am PDT:

The post Linux Mint 12 Review | LAS | s19e08 first appeared on Jupiter Broadcasting.

]]> Skype Exposes Pirates | TechSNAP 29 https://original.jupiterbroadcasting.net/13262/skype-exposes-pirates-techsnap-29/ Thu, 27 Oct 2011 18:43:12 +0000 https://original.jupiterbroadcasting.net/?p=13262 Researches have developed a way to tie your file sharing to your Skype account. We’ll share the details on how this works, and what you can do to prevent it!

The post Skype Exposes Pirates | TechSNAP 29 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Coming up on this week’s TechSNAP…

Researches have developed a way to tie your file sharing to your Skype account. We’ll share the details on how this works, and what you can do to prevent being tracked!

Plus we cover the Ultimate way to host your own email, and what happened when Chinese hackers took control of US Satellites!

All that and more, on this week’s episode of TechSNAP!

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:


[ad#shownotes]

Show Notes:

Audible.com:

Suspected Chinese Military Hackers take control of US Satellites

  • On four separate occasions during 2007 and 2008 US satellites were hijacked by way of their ground control stations.
  • The effected satellites were Landsat–7 (Terrain Mapping and Satellite Photography, example 1 example 2) and Terra AM–1 (Climate and Environmental Monitoring, 2010 Hurricane Karl)
  • While the US does not directly accuse the Chinese government in writing, these types of actions are consistent with known war plans that involve disabling communications, command and control, and GPS satellites as a precursor to war.
  • In one incident with NASA’s Terra AM–1, “the responsible party achieved all steps required to command the satellite,” however the attackers never actually took control of the satellite.
  • It was not until the 2008 investigation that the previous compromises in 2007 were detected
  • This raises an important question, are the US military and other NATO members, too reliant of satellite communications and GPS?
  • In a recent NATO exercise called ‘Joint Warrior’, it was planned to jam GPS satellite signals, however the jamming was suspended after pressure on the governments over civilian safety concerns. Story

Researchers develop a procedure to link Skype users to their Bittorrent downloads

  • The tools developed by the researchers at New York University allow any to determine a strong correlation between bittorrent downloads and a specific skype user.
  • Importantly, unlike RIAA/MPAA law suites, the researchers consider the possibility of false positives because of multiple users behind NAT.
  • The researchers resolve this issue by probing both the skype and bittorrent clients after a correlation is suspected. By generating a response from both clients at nearly the same time and comparing the IP ID (similar to a sequence number) of the packets, if the ID numbers are close together, than it is extremely likely that the response was generated by the same physical machine. If the IDs are very different, then it is likely that the Skype and BitTorrent users are on different machines, and there is no correlation between them.
  • This same technique could be made to work with other VoIP and P2P applications, and could be used to gather enough evidence to conclusively prove a bittorrent user’s identity.
  • This situation can be mitigated by using the feature of some OS’s that randomizes the IP ID to prevent such tracking. (net.inet.ip.random_id in FreeBSD, separate ‘scrub random-id’ feature in the BSD PF firewall)
  • The discovery could also be prevented by fixing the skype client such that it will not reply with its IP address if the privacy settings do not allow calls from that user. The current system employed by the researches does not actually place a call to the user, just tricks skype into thinking that a call will be placed, and skype then leaks the sensitive information by returning its IP address or initiating a connection to the attacker.
  • Read the full research paper

NASDAQ web application Directors Desk hacked

  • Directors Desk is a web application designed to allow executives to share documents and other sensitive information
  • When NASDAQ was hacked in February, they did not believe that any customer data was stolen
  • The attackers implanted spyware into the Directors Desk application and were able to spy on the sensitive documents of publicly traded companies as they were passed back and forth through the system
  • This is another example of the Advanced Persistent Threat (APT) as we saw with the RSA and South Korea Telecom hacks, where the attackers went after a service provider (in his case NASDAQ) to compromise the ultimate targets, the publicly traded companies and their sensitive documents.
  • It is not known what if any protection or encryption systems were part of Directors Desk, but it seems that the application was obviously lacking some important security measures, including an Intrusion Detection System that would have detected the modifications to the application.

SEC says companies may need to disclose cyber attacks in regulatory filings

  • The new guidance from the SEC spells out some of the things that companies may need to disclose to investors and others, depending upon their situation.
  • Some of the potential items companies may need to disclose include:
  • Discussion of aspects of the registrant’s business or operations that give rise to material cybersecurity risks and the potential costs and consequences
  • To the extent the registrant outsources functions that have material cyber security risks, description of those functions and how the registrant addresses those risks
  • Description of cyber incidents experienced by the registrant that are individually, or in the aggregate, material, including a description of the costs and other consequences
  • Risks related to cyber incidents that may remain undetected for an extended period
  • “For example, if material intellectual property is stolen in a cyber attack, and the effects of the theft are reasonably likely to be material, the registrant should describe the property that was stolen and the effect of the attack on its results of operations, liquidity, and financial condition and whether the attack would cause reported financial information not to be indicative of future operating results or financial condition,” the statement says.
  • From the SEC guidance: The federal securities laws, in part, are designed to elicit disclosure of timely, comprehensive, and accurate information about risks and events that a reasonable investor would consider important to an investment decision”
  • CF Disclosure Guidance: Topic No. 2 – Cybersecurity

Feedback:

It is definitely advantageous to own the domain that your email address is on. On top of looking more professional than a hotmail, or even gmail address, it also allows you to choose your host and have full control over everything. There are some caveats though, of course you must remember to renew your domain name, else your email stops working (just ask Chris about that one), you also have to be careful about picking where to host your domain, having your site or email hosted by a less reputable service can result in your domain being included on blacklists and stopping delivery of your mail to some users. The biggest problem with hosting your own email, from your home, is that you must keep the server up 24/7, and it must have a reasonable static IP address. If you are going to host from your home, I recommend you get a ‘backup mx’ service, a backup mail server that will collect mail sent to you while you are offline, and then forward it to your server when it is back up. Even if you are using a dedicated server or VPS, this is important, because email is usually the most critical service on your server. The other major issue with hosting your email from home, is that most ISPs block port 25 inbound and outbound, to prevent infected computers from sending spam. This means that you will not be able to send or receive email to other servers. Usually your ISP will require you to have a more expensive business class connection with a dedicated static IP address in order to allow traffic on port 25. Also, a great many spam filtering systems, such as spamassassin, use blacklists that contain the IP ranges of all consumer/home Internet providers, designed to stop spam from virus infected machines, because email should not be send from individual client machines, but through the ISP or Domain email server.

Round Up:

The post Skype Exposes Pirates | TechSNAP 29 first appeared on Jupiter Broadcasting.

]]>