Career – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Fri, 28 Feb 2020 06:51:04 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Career – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Brunch with Brent: Brandon Bruce | Jupiter Extras 59 https://original.jupiterbroadcasting.net/139852/brunch-with-brent-brandon-bruce-jupiter-extras-59/ Fri, 28 Feb 2020 04:00:00 +0000 https://original.jupiterbroadcasting.net/?p=139852 Show Notes: extras.show/59

The post Brunch with Brent: Brandon Bruce | Jupiter Extras 59 first appeared on Jupiter Broadcasting.

]]>

Show Notes: extras.show/59

The post Brunch with Brent: Brandon Bruce | Jupiter Extras 59 first appeared on Jupiter Broadcasting.

]]>
Brunch with Brent: Broadus Palmer | Jupiter Extras 55 https://original.jupiterbroadcasting.net/139452/brunch-with-brent-broadus-palmer-jupiter-extras-55/ Fri, 14 Feb 2020 04:00:00 +0000 https://original.jupiterbroadcasting.net/?p=139452 Show Notes: extras.show/55

The post Brunch with Brent: Broadus Palmer | Jupiter Extras 55 first appeared on Jupiter Broadcasting.

]]>

Show Notes: extras.show/55

The post Brunch with Brent: Broadus Palmer | Jupiter Extras 55 first appeared on Jupiter Broadcasting.

]]>
DDos Mafia | TechSNAP 303 https://original.jupiterbroadcasting.net/106411/ddos-mafia-techsnap-303/ Tue, 24 Jan 2017 22:39:33 +0000 https://original.jupiterbroadcasting.net/?p=106411 RSS Feeds: HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Ansible vulnerability “Ansible is an open-source automation engine that automates cloud provisioning, configuration management, and application deployment. Once installed on a control node, Ansible, which […]

The post DDos Mafia | TechSNAP 303 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Ansible vulnerability

  • “Ansible is an open-source automation engine that automates cloud provisioning, configuration management, and application deployment. Once installed on a control node, Ansible, which is an agentless architecture, connects to a managed node through the default OpenSSH connection type.”
  • Similar tools are Puppet, Chef, SaltStack, cfEngine
  • Summary: Command execution on Ansible controller from host
  • Why is this important? First, if one of your ansible-controlled hosts is compromised, they can execute a command on your ansible controller.
  • So what you might ask? Your ansible controller accesses all your systems….
  • Computest notes: Not a full audit, might be other issues
  • Affected versions: < 2.1.4, < 2.2.1
  • A big threat to a configuration management system like Ansible, Puppet, SaltStack and others, is compromise of the central node. In Ansible terms this is called the Controller. If the Controller is compromised, an attacker has unfettered access to all hosts that are controlled by the Controller. As such, in any deployment, the central node receives extra attention in terms of security measures and isolation, and threats to this node are taken even more Seriously.
  • Fortunately for team blue (team blue is the defense team), in the case of Ansible the attack surface of the Controller is pretty small. Since Ansible is agent-less and based on push, the
    Controller does not expose any services to hosts.
  • A very interesting bit of attack surface though is in the Facts. When Ansible runs on a host, a JSON object with Facts is returned to the Controller. The Controller uses these facts for various housekeeping purposes. Some facts have special meaning, like the fact “ansible_python_interpreter” and “ansible_connection”. The former defines the command to be run when Ansible is looking for the python interpreter, and the second determines the host Ansible is running against. If an attacker is able to control the first fact he can execute an arbitrary command, and if he is able to control the second fact he is able to execute on an arbitrary (Ansible-controlled) host. This can be set to “local” to execute on the Controller itself.
  • Because of this scenario, Ansible filters out certain facts when reading the facts that a host returns. However, we have found 6 ways to bypass this filter.
  • Bypass #1: Adding a host – Ansible allows modules to add hosts or update the inventory. This can be very useful, for instance when the inventory needs to be retrieved from a IaaS platform like as the AWS module does. If we’re lucky, we can guess the inventory_hostname, in which case the host_vars are overwritten and they will be in effect at the next task. If host_name doesn’t match inventory_hostname, it might get executed in the play for the next hostgroup, also depending on the limits set on the commandline.
  • Bypass #2: Conditionals – Ansible actions allow for conditionals. If we know the exact contents of a “when” clause, and we register it as a fact, a special case checks whether the
    “when” clause matches a variable. In that case it replaces it with its
    contents and evaluates them.
  • Bypass #3: Template injection in stat module – The template module/action merges its results with those of the stat module.This allows us to bypass the stripping of magic variables from ansible_facts, because they’re at an unexpected location in the result tree.
  • Bypass #4: Template injection by changing jinja syntax – Remote facts always get quoted. Set_fact unquotes them by evaluating them.
    UnsafeProxy was designed to defend against unquoting by transforming jinja
    syntax into jinja comments, effectively disabling injection.
  • Bypass #5: Template injection in dict keys – Strings and lists are properly cleaned up, but dictionary keys are not.
  • Bypass #6: Template injection using safe_eval – There’s a special case for evaluating strings that look like a list or dict. Strings that begin with “{” or “[” are evaluated by safe_eval [2]. This allows us to bypass the removal of jinja syntax: we use the whitelisted Python to re-create a bit of Jinja template that is interpreted.
  • Computest is not aware of mitigations short of installing fixed versions of the
    software.
  • Ansible has released new versions that fix the vulnerabilities described in this advisory: version 2.1.4 for the 2.1 branch and 2.2.1 for the 2.2 branch.
  • The handling of Facts in Ansible suffers from too many special cases that allow for the bypassing of filtering. We found these issues in just hours of code review, which can be interpreted as a sign of very poor security. However, we don’t believe this is the case.
  • The attack surface of the Controller is very small, as it consists mainly of the Facts. We believe that it is very well possible to solve the filtering and quoting of Facts in a sound way, and that when this has been done, the opportunity for attack in this threat model is very small.
  • Furthermore, the Ansible security team has been understanding and professional in their communication around this issue, which is a good sign for the handling of future issues.

Who is Anna-Senpai, the Mirai Worm Author?

  • Way too long to go into full detail, so I will only outline a few interesting bits
    +On September 22, 2016, this site was forced offline for nearly four days after it was hit with “Mirai,” a malware strain that enslaves poorly secured Internet of Things (IoT) devices like wireless routers and security cameras into a botnet for use in large cyberattacks. Roughly a week after that assault, the individual(s) who launched that attack — using the name “Anna-Senpai” — released the source code for Mirai, spawning dozens of copycat attack armies online.
  • After months of digging, KrebsOnSecurity is now confident to have uncovered Anna-Senpai’s real-life identity, and the identity of at least one co-conspirator who helped to write and modify the malware.
    +Before we go further, a few disclosures are probably in order. First, this is easily the longest story I’ve ever written on this blog. It’s lengthy because I wanted to walk readers through my process of discovery, which has taken months to unravel. The details help in understanding the financial motivations behind Mirai and the botnet wars that preceded it. Also, I realize there are a great many names to keep track of as you read this post, so I’ve included a glossary.
  • The story you’re reading now is the result of hundreds of hours of research. At times, I was desperately seeking the missing link between seemingly unrelated people and events; sometimes I was inundated with huge amounts of information — much of it intentionally false or misleading — and left to search for kernels of truth hidden among the dross. If you’ve ever wondered why it seems that so few Internet criminals are brought to justice, I can tell you that the sheer amount of persistence and investigative resources required to piece together who’s done what to whom (and why) in the online era is tremendous.
  • As noted in previous KrebsOnSecurity articles, botnets like Mirai are used to knock individuals, businesses, governmental agencies, and non-profits offline on a daily basis. These so-called “distributed denial-of-service (DDoS) attacks are digital sieges in which an attacker causes thousands of hacked systems to hit a target with so much junk traffic that it falls over and remains unreachable by legitimate visitors. While DDoS attacks typically target a single Web site or Internet host, they often result in widespread collateral Internet disruption.
  • A great deal of DDoS activity on the Internet originates from so-called ‘booter/stresser’ services, which are essentially DDoS-for-hire services which allow even unsophisticated users to launch high-impact attacks. And as we will see, the incessant competition for profits in the blatantly illegal DDoS-for-hire industry can lead those involved down some very strange paths, indeed.
  • Talks about the variants of the IoT botnet, mentions Minecraft webservers were a frequent target.
  • Goes into a lot of detail of DDoS protection services, how Minecraft customers would come under attack, and how a competing DDoS protection company made threats directly preceding attacks
  • Discusses how the attacks where are way to boost business by not attacking your own customers, but by attacker customers of other DDoS proection services.
  • Boils down to the classic: nice business you have here, it’d be a shame if anything happened to it.

TechSNAP Career Challenge

  • I was at the [Grace Hopper Celebration(https://ghc.anitaborg.org/) of Women in Computing is the world’s largest gathering of women technologists. It is huge. I met people from many different technology areas (medicine, robotics, software design, someone who built a chip for the iPhone).
  • I was there on behalf of The FreeBSD Foundation to give a talk about how to contribute to open source.
  • Many were students and often were not sure of what part of technology they wanted to pursue.
  • I’ve seen many people go for years in their careers then suddenly discover a passion they previously didn’t know about and their life completely changes.
  • This point was mentioned to me by a Google Employee who gave me this list of steps which I then incorporated into my talk, then I wrote a blog post about it.
  • Seeing the eyes light up made me think we need to send this wider.
  • Allan Jude suggested I include this into the show
  • Here is what you do
  • Here is what I challeng our listeners to do:
  • Take this challenge
  • Blog about it
  • Then send us your blog URL and tell us what you got out of the challenge

Feedback:


Round Up:


The post DDos Mafia | TechSNAP 303 first appeared on Jupiter Broadcasting.

]]>
Privileged Programmers | CR 158 https://original.jupiterbroadcasting.net/83707/privileged-programmers-cr-158/ Mon, 15 Jun 2015 14:24:57 +0000 https://original.jupiterbroadcasting.net/?p=83707 Mike and Chris share their totally different perspective on the recent Yelp developer’s public exodus & discuss the big new industry trend developers need to take advantage of. Then after 158 episodes, Mike’s mission in life is realized during our feedback segment. Thanks to: Get Paid to Write for DigitalOcean Direct Download: MP3 Audio | […]

The post Privileged Programmers | CR 158 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Mike and Chris share their totally different perspective on the recent Yelp developer’s public exodus & discuss the big new industry trend developers need to take advantage of.

Then after 158 episodes, Mike’s mission in life is realized during our feedback segment.

Thanks to:
Linux Academy


DigitalOcean

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

Become a supporter on Patreon:

Foo

Show Notes:

Hoopla

Feedback

The post Privileged Programmers | CR 158 first appeared on Jupiter Broadcasting.

]]>
Is That a Weave? | CR 99 https://original.jupiterbroadcasting.net/56162/is-that-a-weave-cr-99/ Mon, 28 Apr 2014 15:31:39 +0000 https://original.jupiterbroadcasting.net/?p=56162 We double down on your follow up. Working remotely, scratching your itch while at your current job, why we missed Heartbleed & the video that will make you never again complain about how hard something is. Plus why you should write code every day, the hard numbers about mobile games & more! Thanks to: Direct […]

The post Is That a Weave? | CR 99 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We double down on your follow up. Working remotely, scratching your itch while at your current job, why we missed Heartbleed & the video that will make you never again complain about how hard something is.

Plus why you should write code every day, the hard numbers about mobile games & more!

Thanks to:


Linux


Profiler


DigitalOcean

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

— Show Notes: —

Follow up / Feedback

Dev Hoopla

The post Is That a Weave? | CR 99 first appeared on Jupiter Broadcasting.

]]>
Conference Blues | CR 47 https://original.jupiterbroadcasting.net/36441/conference-blues-cr-47/ Mon, 29 Apr 2013 10:43:31 +0000 https://original.jupiterbroadcasting.net/?p=36441 Is it time to reboot the big development conferences? We contrast WWDC to a community focused events and attempt to answer the value question.

The post Conference Blues | CR 47 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Is it time to reboot the big development conferences? We contrast WWDC to a community focused event like LinuxFest Northwest and attempt to answer the value question behind the larger conferences, why pressing the flesh can be important, and if Google Hangouts can be part of the solution.

Plus working from home tricks, making the switch from a 9-5 job to contracting, the start of the great app exit, and does using Chrome make you against the free web?

Thanks to:

Use our code coder295 to get a .COM for $2.95.

 

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

Feedback

Conferences

After going on sale at 10:00 AM Pacific Time today, tickets for Apple\’s Worldwide Developers Conference (WWDC) in San Francisco have already sold out in two minutes.

WWDC 2011 sold out in under 12 hours, while the 2010 edition took eight days. This marks the sixth straight year that WWDC has sold out, a streak that began in 2008.

LinuxFest Northwest is entering its 14th year! 2012 was our most successful event yet, with around 1200 attendees over the weekend. And 2013 will be undoubtedly our biggest change yet.

The App Exit

I’m happy to announce that I’ve sold a majority stake in Instapaper to Betaworks. We’ve structured the deal with Instapaper’s health and longevity as the top priority, with incentives to keep it going well into the future. I will continue advising the project indefinitely, while Betaworks will take over its operations, expand its staff, and develop it further.

Pick of the week:

[asa]B005TPVTHO[/asa]

Follow the show

The post Conference Blues | CR 47 first appeared on Jupiter Broadcasting.

]]>
100% Uptime | TechSNAP 100 https://original.jupiterbroadcasting.net/33126/100-uptime-techsnap-100/ Thu, 07 Mar 2013 17:20:39 +0000 https://original.jupiterbroadcasting.net/?p=33126 We’ve warned against it for nearly 100 episodes, this week we’ll share the fallout from NBC.com getting hacked, and more.

The post 100% Uptime | TechSNAP 100 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We’ve warned against it for nearly 100 episodes, this week we’ll share the fallout from NBC.com getting hacked, Bit9’s whitelist technology is use against them and their customers.

Plus the bad news for Java users, a batch of your questions, and some big surprises.

Thanks to:

Use our code hostdeal4 to score economy hosting for $1 a month, for one year.

35% off your ENTIRE order just use our code go35off4 until the end of the month!

 

Visit techsnap.ting.com to save $25 off your device or service credits.

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Get TechSNAP on your Android:

Browser Affiliate Extension:

  • Jupiter Broadcasting Affiliate Extensions for Chrome and Firefox
  • NBC website compromised, malicious code injected

    • The official website of US broadcasting and media giant NBC was found to contain a malicious iframe pointing visitors to the RedKit Exploit Kit
    • The exploit kit used one of the vulnerabilities patched in Java 7u11 (released January 13th, although the issue was not fully fixed until Java 7 u13 on February 1st), as well as a .PDF exploit to drop the Citadel banking Trojan, a variant of the Zeus botnet only ever sold to the russian underground, to prevent infiltration by authorities and security companies
    • This attack could have been much worse if it has used one of the newer vulnerabilities that had not been patched until u15 (February 19th) or u17 (March 4th)
    • Many users are likely still using somewhat outdated versions of java due to the rapid release and the inefficacy of the java updater, and the addition of the .PDF exploit ensured a wider vulnerability
    • The attackers likely had ongoing access for a time, as the URL target of the iframe changed rapidly to avoid blocking of the delivery sites
    • One of the domains used in the iframe was an internationalized domain name, which translated from russian to my-new-sploit.com
    • The version of the Citadel trojan used in the exploit was only recognized by 3 of the 46 virus scanners on virustotal.com on the date of the attack
    • The infection was also detected on other NBC sites such as latenightwithjimmyfallon.com and jeylenosgarage.com, so it was likely an exploit against the CMS
    • These trusted sites are especially valuable as attack vectors for malware authors, because of their huge traffic volumes and the fact that users expect the large trusted sites to be free of malware or other risk
    • Facebook’s malware scanner detected something was wrong (since iframes of .jar and .pdf files are usually only seen in attacks), and blocked users from posting links to NBC.com (We have discussed Facebook malware scan that is part of their spider that fetches the preview images)
    • The malware was first detected by researchers at 16:43 CET on the 21st, it is unclear how long the injection was on the site before it was discovered
    • The malware was removed from the site by 21:28 CET
    • Researchers Post
    • Additional Coverage

    Bit9’s cloud security app compromised, 32 pieces of malware whitelisted

    • Bit9 is a security company whose main product is an application control software, which basically monitors all of the applications and processes running on a server or end-user device, and reports any unusual activity (applications not on the cloud maintained whitelist)
    • Customers of Bit9 include the US government, banks, oil and energy companies, defence contractors and 30 companies from the Fortune 100 list
    • Attackers managed to compromise one or more virtual machines at the company and gained access to a code signing certificate, subsequently using it to sign 32 pieces of malware, effectively whitelisting them
    • It turns out, due to an “operational oversight” a “handful” of computers at Bit9 did not run Bit9’s own software, so the intrusion was not detected or prevented
    • As such, Bit9 claims that the compromise was not due to a problem with their software
    • Bit9’s investigation suggests that only three of their customers were affected by the illegitimately signed malware
    • Bit9 revoked the certificate that was used to sign the malware (and probably all previously whitelisted binaries, Bit9 claims it was no longer actively using the stolen certificate, but that it was still valid), got a new certificate and resigned the whitelisted apps, and patched their software to blacklist anything signed with the revoked certificate
    • It is interesting to note that the most often touted features of the Bit9 system is that it stops new and unknown malware, because it only allows approved applications to run, the opposite of traditional anti-virus applications, which rely on a blacklist of known malware. In this case, it might have been that the compromised caused Bit9 to allow known malware that would have been stopped by traditional anti-virus to run on the target systems
    • Bit9 is not saying which of its customers were targeted, but based on other information and the list of industries Bit9 said were not targeted, it appears to have been a defence contractor
    • Official Update Announcement
    • Bit9 says the attackers originally compromised their systems in July of 2012 view an SQL injection flaw in software that was running on an internet accessible web server
    • From the web server, the attackers were able to compromise two legitimate user accounts, and eventually use those to access a virtual machine that contains the private keys for the code-signing certificate
    • The virtual machine that was compromised was shut down a few days later, the compromise undetected
    • In January that virtual machine was started again, and the compromise was eventually detected
    • Bit9 says evidence suggests that they were not the ultimate target of the attack, but rather just a stepping stone to eventually compromise one of their customers
    • Bit9’s audit showed that the source code for their software was not accessed or modified
    • The attackers later executed a watering hole attack (similar to the mobile developer forum attack that compromised twitter, facebook, apple and microsoft) against the 3 target Bit9 customers
    • The attack used a java vulnerability to execute the HiKit and Unixhome backdoors, two of the binaries that had been signed with the stolen Bit9 certificate. Rather than these being blocked by Bit9 as intended, because they had been signed by Bit9, they were whitelisted and allowed to run in the highly secured network of the defense contractors
    • Krebs on Security Coverage – Part 1 Part 2
    • Security Ledger coverage

    Oracle issues another emergency Java patch after McRAT exploits new 0-day in the wild

    • The fix covers CVE–2013–1493 and CVE–2013–0809
    • The latter vulnerability is in the colour management system of Java 2D and allows an attack to use a specially crafted image file to execute a memory corruption attack. The attack targets the JVM’s internal data structures and overwrites the areas of memory that control whether the security manager to enabled or not
    • The exploit has been seen in the wild, successful exploited to drop the McRAT trojan
    • The security company that discovered the exploit reported that the McRAT trojan was communicating with the same Command and Control server that was used in an earlier attack against security company Bit9
    • FireEye blog post
    • Additional Coverage
    • The issue was originally reported on February 1st, Oracle claimed that was too late to be included in the February 19th patch. Oracle planned to sit on the update until the next scheduled update in April, but once it was being exploited in the wild they were forced to release this update
    • Java Security bulletin
    • Security Explorations has reported 7 more java vulnerabilities since February 25th
    • Oracle has rejected issue #54 claiming it is not a vulnerability, but the polish firm and US-CERT disagree, Security Explorations has sent additional details and proof of concept to help Oracle understand the vulnerability
    • Oracle has issued tracking numbers for issues #56–60 but clarifies that the issues are not ‘confirmed’ yet
    • This seems to signal an increasing resistance from Oracle and acknowledge and fix the bugs that researchers report, until it is too late and they are being actively exploited

    Feedback

    Round Up:

    The post 100% Uptime | TechSNAP 100 first appeared on Jupiter Broadcasting.

    ]]> Starting A Job | FauxShow 116 https://original.jupiterbroadcasting.net/27436/starting-a-job-fauxshow-116/ Wed, 14 Nov 2012 22:45:26 +0000 https://original.jupiterbroadcasting.net/?p=27436 Angela and Chris talk about some of the things to think about when starting a new job. They discuss some of Angela’s recent experiences.

    The post Starting A Job | FauxShow 116 first appeared on Jupiter Broadcasting.

    ]]>

    post thumbnail

    Angela and Chris talk about some of the things to think about when starting a new job. They discuss some of Angela’s recent experiences after being a stay-at-home mom for 3 years.

    Direct Download:

    HD Download | Mobile Download | MP3 Download | YouTube

    RSS Feeds:

    HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Torrent Feed | iTunes Feeds

       

    Show Notes:

    To help you get through the holidays:

    Herbal Aire Aromatherapy Diffuser:
    [asa]B009WQNC7Q[/asa]

    Bacon Tie:
    [asa]B005QDKIF8[/asa]

    For the kids (and kids at heart):
    [asa]B0021WOGZA[/asa]

    Mail Sack:

    Jacob writes:

    I\’m about to publish my third book and plan on doing the audio version of it over the next few days. When complete would you like to incorporate it into your radio stream? I\’m releasing it under a creative commons license. Despite the fact that it\’s a fantasy book for my daughter\’s birthday I\’ve included a few allusions to Linux throughout the book. I\’ve got different ways of using names like Red Hat, Fedora, Knoppix, and Debian within the book.

    Let me know if you still need content for the radio stream. I\’ll send you a link to the book once it\’s up.

    Adam writes:

    I was just looking at my bank statement and realised my bank does the rather pleasant thing of charging me £1.25 every time amazon.com takes money from me because they\’re in the US! Do you know if there\’s anyway to set up the payment through amazon.co.uk? Otherwise I\’m thinking I might cancel the monthly subscription and just pay the year up front via paypal.

    Cheers,
    Adam (barblewarble)

    Blake writes:

    I just wanted to let you know that I was tuned in to the live stream election night. You were my primary source for election coverage. I had your live stream going in the back ground and I also watched a few websites. I thought your coverage was superb. I would like to see more of this type of live coverage from Jupiter Broadcasting. Techsnap could cover large tech announcements in this way.

    On another note I think it would get great if you would cover how technology and social media affected the election coverage.

    Thanks for great coverage of the election. I look forward to more events like this.

    Update on AvatarContinuum: Jupiter Broadcasting avatars: https://www.avatarcontinuum.com/avatars_jupb.html

    Find FauxShow!

    LIVE: https://jblive.tv – 8pm Pacifc – 11pm Eastern – 3am UTC
    Facebook: https://www.facebook.com/thefauxshow
    Twitter: https://www.twitter.com/angerz
    G+: https://www.gplus.to/fauxshow
    Dailybooth: https://www.dailybooth.com/thefauxshow
    Subscribe to Jupiter Signal: https://www.bit.ly/jupitersignal
    Jupiter Radio: https://jblive.info
    Affiliates Firefox Extension: https://addons.mozilla.org/en-US/firefox/addon/jupiterbroadcasting/
    Affiliates Chrome Extension: https://chrome.google.com/webstore/detail/bjekemhblnilimncanbehhjijdpjgimj
    Donations: https://original.jupiterbroadcasting.net/donate
    Shows & Shownotes: https://original.jupiterbroadcasting.net/show/fauxshow/

    The post Starting A Job | FauxShow 116 first appeared on Jupiter Broadcasting.

    ]]>
    Dream Job Awards | FauxShow 102 https://original.jupiterbroadcasting.net/22881/dream-job-awards-fauxshow-102/ Wed, 08 Aug 2012 21:26:19 +0000 https://original.jupiterbroadcasting.net/?p=22881 Angela and Chris share the dream jobs of FauxShow viewers! From space, to gaming, and some downright silly ones.

    The post Dream Job Awards | FauxShow 102 first appeared on Jupiter Broadcasting.

    ]]>

    post thumbnail

    Angela and Chris share the dream jobs of FauxShow viewers! From space, to gaming, and some downright silly ones.

    Direct Download:

    HD Download | Mobile Download | MP3 Download | YouTube

    RSS Feeds:

    HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Torrent Feed | iTunes Feeds

       

    Show Notes:

    Links from Awards:

    Jewkesman: https://www.youtube.com/jewkesman
    mininessie: https://mininessie.deviantart.com/gallery
    Remy: https://raymii.org
    stnet: https://www.stnet.nu
    Nean: https://www.youtube.com/neanrts
    rikai: https://www.youtube.com/rikailp

    Mail Sack:

    Will you do some more Beer is Tasty episodes? So many beers, so little time! Thanks guys.
    Past and current supporter,
    Tim

    Not to sure if you\’ll use it but i made a jupiter broadcasting youtube background, its modeled after the home page of jupiterbroadcasting and i hope you\’ll enjoy it, feel free to not use it if you want https://i.imgur.com/2o6qp.png
    ps: change the background html notation to #efefef if in use
    pss: this was created on linux, with gimp
    -ilikepie

    Perhaps there should be answering questions only episodes of Techsnap. i <3 Technsap
    -John

    I have three points I want to make:
    First, I just got caught up with the last couple Faux Shows this evening, since I wasn\’t able to catch them live. I will have you know that I\’ve already read eight books this year, thank you very much! 😀 To clarify, the ones shown for the award is the second half of the Dark Tower series bought for me by my then-girlfriend/now-fiancée cougha while agocough, so I\’ve made it a particular project to read them.
    Which brings me to my second point: Do you know how frustrating it is to watch a Faux Show not live? I keep thinking about what I would say in the chat, but it would be totally without context and people there would think I\’m totally crazy (crazier?). Faux Shows live, with the best lower third on the Internet, is a far superior viewing experience! (Now shamelessly plug the live stream 😀 ).
    Third, and totally unrelated, people have mentioned in casual conversation before that it would be awesome if you guys could do a LAS from the Ubuntu booth at CES. I know finances are a little tight, but if you\’re even thinking about it in any way, here\’s a tip: You can register for the show for free until August 31. That\’s right, totally free! Now, you\’d still have to come up with lodging, food, and any other accommodations, but this would be one thing not to worry about. Even if you don\’t decide to go, you can still register and get all your info into their system so that in future years it will alert you to the free registration period (as well as their emails and anything else you may or may not be interested in).
    -cbojar

    Find FauxShow!

    Facebook: https://www.facebook.com/thefauxshow
    Twitter: https://www.twitter.com/angerz
    G+: https://www.gplus.to/fauxshow
    Dailybooth: https://www.dailybooth.com/thefauxshow

    Subscribe to Jupiter Signal: https://www.bit.ly/jupitersignal
    Jupiter Radio: https://jblive.info

    Affiliates Firefox Extension: https://addons.mozilla.org/en-US/firefox/addon/jupiterbroadcasting/
    Affiliates Chrome Extension: https://chrome.google.com/webstore/detail/bjekemhblnilimncanbehhjijdpjgimj
    Donations: https://original.jupiterbroadcasting.net/donate

    Shows & Shownotes: https://original.jupiterbroadcasting.net/show/fauxshow/

    The post Dream Job Awards | FauxShow 102 first appeared on Jupiter Broadcasting.

    ]]>