cracking – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Fri, 01 Mar 2019 15:47:05 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png cracking – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Proper Password Procedures | TechSNAP 398 https://original.jupiterbroadcasting.net/129611/proper-password-procedures-techsnap-398/ Fri, 01 Mar 2019 07:47:05 +0000 https://original.jupiterbroadcasting.net/?p=129611 Show Notes: techsnap.systems/398

The post Proper Password Procedures | TechSNAP 398 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/398

The post Proper Password Procedures | TechSNAP 398 first appeared on Jupiter Broadcasting.

]]>
Hacking on Linux | Ask Noah 40 https://original.jupiterbroadcasting.net/120757/hacking-on-linux-ask-noah-40/ Tue, 19 Dec 2017 01:00:54 +0000 https://original.jupiterbroadcasting.net/?p=120757 RSS Feeds: MP3 Feed | HD Video Feed | iTunes Feed Become a supporter on Patreon: — Show Notes: — — The Cliff Notes — Zoneminder – Open Source Security Cameras Home Assistant – Open Source Home Automation NMap – Open Source Network Scanning Metasploit – Open Source Exploit Scanner Tripwire – Open Source Intrusion […]

The post Hacking on Linux | Ask Noah 40 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

MP3 Feed | HD Video Feed | iTunes Feed

Become a supporter on Patreon:

Patreon

— Show Notes: —

— The Cliff Notes —

Vote for your favorite Distro

Join us for the AMA Episode

  • Ask Noah anything you want about any topic personal or tech!
  • Call In 1-855-450-NOAH
  • Monday, December 25th
  • Listen Live
  • Watch Live

— Stay In Touch —

Find all the resources for this show on the Ask Noah Dashboard

Ask Noah Dashboard

Need more help than a radio show can offer? Altispeed provides commercial IT services and they’re excited to offer you a great deal for listening to the Ask Noah Show. Call today and ask about the discount for listeners of the Ask Noah Show!

Altispeed Technologies

Contact Noah

asknoah [at] jupiterbroadcasting.com

— Twitter —

The post Hacking on Linux | Ask Noah 40 first appeared on Jupiter Broadcasting.

]]>
Obama’s Iran Plan | Unfilter 151 https://original.jupiterbroadcasting.net/85287/obamas-iran-plan-unfilter-151/ Wed, 15 Jul 2015 22:27:28 +0000 https://original.jupiterbroadcasting.net/?p=85287 It’s another historic week documented by the Unfilter show. The Obama administration signs an “executive agreement” with Iran, but we ask what the limitations of an “executive agreement” are, and what the downsides to the deal might be. Plus the head of the FBI pushes to crack encryption, and track ISIS via twitter, the OPM […]

The post Obama's Iran Plan | Unfilter 151 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

It’s another historic week documented by the Unfilter show. The Obama administration signs an “executive agreement” with Iran, but we ask what the limitations of an “executive agreement” are, and what the downsides to the deal might be.

Plus the head of the FBI pushes to crack encryption, and track ISIS via twitter, the OPM hack is even worse than previously reported, and an updates on the NSA.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

— Episode Links —

The post Obama's Iran Plan | Unfilter 151 first appeared on Jupiter Broadcasting.

]]>
SouthEast LinuxFest Highlights | LAS 318 https://original.jupiterbroadcasting.net/60412/southeast-linuxfest-highlights-las-318/ Sun, 22 Jun 2014 14:54:02 +0000 https://original.jupiterbroadcasting.net/?p=60412 Interviews and awesome gear from the floor of SouthEast LinuxFest 2014. We round up the highlights of Linux from the south! Plus some Firefox news we’re stoked about, and we take another step closer to becoming a commandline ninja… And so much more! All this week on, The Linux Action Show! Thanks to: Download: HD […]

The post SouthEast LinuxFest Highlights | LAS 318 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Interviews and awesome gear from the floor of SouthEast LinuxFest 2014. We round up the highlights of Linux from the south!

Plus some Firefox news we’re stoked about, and we take another step closer to becoming a commandline ninja…

And so much more!

All this week on, The Linux Action Show!

Thanks to:


\"DigitalOcean\"


\"Ting\"

Download:

HD Video | Mobile Video | WebM Torrent | MP3 Audio | Ogg Audio | YouTube | HD Torrent

RSS Feeds:

HD Video Feed | Large Video Feed | Mobile Video Feed | MP3 Feed | Ogg Feed | iTunes Feeds | Torrent Feed

— Show Notes: —

SouthEast LinuxFest 2014):


\"System76\"

Brought to you by: System76

\"SouthEast

June 20-22, 2014
Sheraton Charlotte Airport
Charlotte, NC

\"Charlotte

Our Foundstone practice is one of the world’s foremost authorities on information security. Whether through strategic consulting, technology consulting, education, or a combination of all three, McAfee Foundstone delivers strategic solutions to security challenges, going well beyond a short-term fix. Our security experts make sure you have the right processes and procedures in place, the most effective tools to support those processes and procedures, and the education to make it all work together effectively and seamlessly.

\"imgurlArea

This Book in designed to get you started with Slackware Linux operating system. It`s not meant to cover every single aspect of the distribution, but rather to show what it is capable of and give you a basic working knowledge of the system.

A few of the better-known users of SQLite are shown below in alphabetical order. There is no complete list of projects and companies that use SQLite. SQLite is in the public domain and so many groups use SQLite in their projects without ever telling us.

\"imgurlArea

Dwayne Richard Hipp (born April 9, 1961) is the architect and primary author of SQLite as well as Fossil SCM.

Tweets from the floor:

Lots of neat looking toys at the archlinux ARM table #self2014 pic.twitter.com/WTb051XaYr

— imabug (@imabug) June 21, 2014

Docker(.io) #self2014 pic.twitter.com/ki04aXxVjV

— imabug (@imabug) June 21, 2014

ZFS 101 #self2014 pic.twitter.com/TT39FRv1q0

— imabug (@imabug) June 21, 2014

And there was much rejoicing #self2014 pic.twitter.com/yBrtRAekhj

— imabug (@imabug) June 21, 2014


— Picks —

Runs Linux

Goofy-looking security guard robot runs Linux

Desktop App Pick

autojump

autojump is a faster way to navigate your filesystem. It works by maintaining a database of the directories you use the most from the command line. The autojump -s command shows you the current contents of the database. You need to work a little bit before the database becomes usable

Weekly Spotlight

ArchAssault

The ArchAssault Project is an Arch Linux derivative for penetration testers, security professionals and all-around Linux enthusiasts. This means we import the vast majority of the official upstream Arch Linux packages, these packages are unmodified from their upstream source. While our Arch Linux base is primarily untouched, there are times were we have to fork a package to be able to better support our vast selection of tools. All of our packages strive to maintain the Arch Linux standards, methods and philosophies.


— NEWS —

This Firefox OS-powered streaming stick is Mozilla’s answer to Chromecast

Google\’s Chromecast streaming stick could soon get competition from an unexpected source: Mozilla has secretly been working with a partner on a Chromecast-like streaming stick that is powered by Firefox OS. The project was supposed to be under wraps for at least a few more weeks, but Thursday, news started to leak out when a Mozilla evangelist tweeted a photo of a prototype of the device.

A fully open TV casting prototype device running #FirefoxOS. Open boot loader and all. pic.twitter.com/bZ0Uz8P0Zs

— Christian Heilmann (@codepo8) June 19, 2014

Maynard is a Wayland based Lightweight Desktop Environment Designed for the Raspberry Pi and Lower-end Hardware

\"Maynard_desktop\"/

This Wayland implementation is based on Weston + GTK, and is using the hardware video scaler (HVS) found in Broadcom BCM2835 to make everything nice and smooth. Although this is still work in progress, you can to try it on your Raspberry Pi

AMD Planning Open Source GameWorks Competitor, Mantle for Linux

(51:45) _When asked about AMD input on SteamOS and its commitment to the gamers that see that as the future, Huddy mentioned that AMD was considering, but not promising, bringing the Mantle API to Linux. If the opportunity exists, says Huddy, to give the gamer a better experience on that platform with the help of Mantle, and developers ask for the support for AMD, then AMD will at the very least \”listen to that.\” It would incredibly interesting to see a competitor API in the landscape of Linux where OpenGL is essentially the only game in town.

_

XCOM: Enemy Unkown Released For Linux

Steam Summer Sale ends June 30th

Feedback:

— Chris\’ Stash —

Hang in our chat room:

irc.geekshed.net #jupiterbroadcasting

— What’s Matt Doin? —

— Find us on Google+ —

— Find us on Twitter —

— Follow the network on Facebook: —

— Catch the show LIVE Sunday 10am Pacific / 1pm Eastern / 6pm UTC: —

The post SouthEast LinuxFest Highlights | LAS 318 first appeared on Jupiter Broadcasting.

]]>
Encryption Prediction | TechSNAP 123 https://original.jupiterbroadcasting.net/41672/encryption-prediction-techsnap-123/ Thu, 15 Aug 2013 16:29:26 +0000 https://original.jupiterbroadcasting.net/?p=41672 Encryption might be less secure than originally thought, EasyDNS suffers an attack and comes up with a clever solution...

The post Encryption Prediction | TechSNAP 123 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Encryption might be less secure than originally thought, EasyDNS suffers an attack and comes up with a clever solution…

Plus the big story for Windows users, a batch of your questions, our answers, and much more!

On this week’s TechSNAP!

Thanks to:

Use our code tech249 to score .COM for $2.49!

Get 32% off a new order code: go32off3

 

Visit dirwiz.com/unitysync use code tech for an extended trial and a year of maintenance.

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Encryption is less secure than originally thought

  • The problem is that information-theoretic analyses of secure systems have generally used the wrong notion of entropy.
  • Shannon entropy is based on the average probability that a given string of bits will occur in a particular type of digital file, that the characteristics of the data traffic will quickly converge to the statistical averages
  • But in cryptography, the real concern isn’t with the average case but with the worst case
  • A codebreaker needs only one reliable correlation between the encrypted and unencrypted versions of a file in order to begin to deduce further correlations
  • “We thought we’d establish that the basic premise that everyone was using was fair and reasonable,” says Ken Duffy
  • When researchers started using other notions of entropy (developed since Shannon entropy in the 1950s), which give greater weight to improbable outcomes, they found that slight deviations from perfect uniformity in source files significantly weakened the protection provided by encryption
  • “as a consequence, the wireless card readers used in many keyless-entry systems may not be as secure as previously thought.”
  • A computer turned loose to simply guess correlations between the encrypted and unencrypted versions of a file would make headway much faster than previously expected.
  • “It’s still exponentially hard, but it’s exponentially easier than we thought,” Duffy says. One implication is that an attacker who simply relied on the frequencies with which letters occur in English words could probably guess a user-selected password much more quickly than was previously thought. “Attackers often use graphics processors to distribute the problem,” Duffy says. “You’d be surprised at how quickly you can guess stuff.”
  • The Shannon Limit Explained
  • Research Paper

Redhat introduces the ‘Red Hat Software Collections 1.0’

  • Red Hat Enterprise Linux provides ‘long term support’ for all of the included packages. This means that the version of PHP that is included in the original distribution is maintained for the entire life of that version of RHEL. Of course security fixes are backported, but new features are not. This is both a blessing and a curse, new features and new bugs do not break your production stack, but those new features are not available to you
  • The Red Hat Software Collection “Helps Users Build and Deploy Web Applications Through Dynamic Languages and Databases”
  • The Collection provides:
  • Ruby 1.9.3 with Rails 3.2.8
  • Python version 2.7 and 3.3
  • PHP version 5.4
  • Perl version 5.16.3
  • node.js version 0.10
  • MariaDB version 5.5
  • MySQL version 5.5
  • PostgreSQL version 9.2
  • “Red Hat Software Collections 1.0 Beta is available now for use with Red Hat Enterprise Linux 6 to customers and partners with select active Red Hat Enterprise Linux Server, Red Hat Enterprise Linux Workstation or developer-related subscriptions.”
  • Users without subscriptions or using CentOS, can use IUS a community powered repository of updated software
  • “The IUS Community Project is aimed at providing up to date and regularly maintained RPM packages for the latest upstream versions of PHP, Python, MySQL and other common software”

  • EasyDNS DDoS in progress
  • EasyDNS article explaining their history of dealing with DDoS attacks and their proposed solutions for customers
  • They highly recommend that if your site is mission critical, that you use more than 1 DNS provider, to eliminate any single point of failure (SPoF)
  • During a previous DDoS attack, they actively worked with their competitors, DNSMadeEasy and DNSimple to mitigate the issues and develop filters to prevent the specific type of attack
  • Allan has used DNSMadeEasy for 10 years to handle high DNS loads and the fastest possible response times (anycast means low latency), Managed DNS with automatic Failover for critical domains, and secondary DNS for 100s of hosted domains
  • EasyDNS has introduced a new feature called Proactive Nameservers – If you use EasyDNS has your domain registrar, for a monthly fee you can have them automatically adjust your list of active DNS servers based on availability
  • The service will automatically removing downed name servers and replacing them with backups that are not publicly displayed until they are used
  • This means that the attackers do not know where your backup name servers are, they only get added into the mix if the attack is large enough to disrupt your main name servers
  • This service is designed to allow you to automate the use of multiple DNS providers, eliminating any SPoF
  • EasyDNS has also introduced a feature to sync your DNS records to Amazon Route53 as a backup

Feedback:

Round Up:

The post Encryption Prediction | TechSNAP 123 first appeared on Jupiter Broadcasting.

]]>
Ethically Hacked | TechSNAP 120 https://original.jupiterbroadcasting.net/40802/ethically-hacked-techsnap-120/ Thu, 25 Jul 2013 19:17:35 +0000 https://original.jupiterbroadcasting.net/?p=40802 A huge amount of SIM cards are susceptible to an Over the Air attack, Apple’s hacker outs himself, and the trouble with the Ubuntu forums!

The post Ethically Hacked | TechSNAP 120 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A huge amount of SIM cards are susceptible to an Over the Air attack, Allan’s got the details, Apple’s hacker outs himself, and the trouble with the Ubuntu forums!

Plus a batch of your questions, and much much more!

Thanks to:

Use our code tech249 to score .COM for $2.49!

Get private registration FOR FREE with a .COM! code: free5

 

Visit techsnap.ting.com to save $25 off your device or service credits.

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed


Security Researcher Claims Apple Developer Website Hack

  • Apple\’s Developer Center first went offline last Thursday, and on Sunday, Apple revealed that it had been taken down as a precaution after a security breach. It is unclear who was responsible for the hacking, but a security researcher, Ibrahim Balic has suggested that he might be to blame for the outage.
  • The company added that critical developer data had not been compromised and that they were working day n’ night to fix the vulnerability and bring the site back online.
  • According to 9 to 5 Mac adds that, “In an email… Balic … is persistent in stating he did this for security research purposes and does not plan to use the information in any malicious manner.”
  • The comment comes from independent security researcher Ibrahim Balic, who claims that his effort was not intended to be malicious and that he reported his findings to Apple just hours before the developer site was taken down by the company.
  • Balic, who has reported 13 different bugs to Apple, originally discovered an iAd Workbench vulnerability on June 18 that allowed a request sent to the server to be manipulated. This security hole could be used to acquire the names and email addresses of iTunes users (even non-developers).
  • After finding the loophole, Balic wrote a Python script to harvest data from the vulnerability and then displayed it in a YouTube video, which may have put him on Apple\’s radar.
  • In addition to the iAd Workbench bug, Balic also discovered and submitted a report on a bug that caused the Dev Center site to be vulnerable to a stored XSS attack. While Balic says that it was possible to access user data by exploiting the Dev Center issue, he claims that he did not do so.
  • New Details Emerge on Security Researcher Potentially Responsible for Dev Center Outage s
  • Apple Outlines Plan for Bringing Developer Center Back Online
    Additional Coverage

Ubuntu Forums compromised

  • The forums were defaced and the database compromised
  • There were approximately 1.82 million registered accounts in the forum database
  • Attackers have access to each of these user\’s username, password and email address
  • The passwords were salted hashes, but by which algorithm was not made clear. Where these cryptographic hashes, or just md5(salt+md5(password)) or similar like some forum software?
  • If you were a registered user, and reused that password anywhere else, you are likely going to have a bad time
  • “Ubuntu One, Launchpad and other Ubuntu/Canonical services are NOT affected by the breach”
  • Timeline:
  • 2013-07-20 2011 UTC: Reports of defacement
  • 2013-07-20 2015 UTC: Site taken down, this splash page put in place while investigation continues.
  • 2013-07-21: we believe the root cause of the breach has been identified. We are currently reinstalling the forums software from scratch. No data (posts, private messages etc.) will be lost as part of this process.
  • 2013-07-22: work on reinstalling the forums continues.

Feedback:

TechSNAP Bitmessage: BM-GuGEaEtsqQjqgHRAfag5FW33Dy2KHUmZ

The enterprise-class Open Source LDAP server for Linux. It is hardened by real-world use, is full-featured, supports multi-master replication, and already handles many of the largest LDAP deployments in the world. The 389 Directory Server can be downloaded for free and set up in less than an hour using the graphical console.

Round Up:


The post Ethically Hacked | TechSNAP 120 first appeared on Jupiter Broadcasting.

]]>
MySQL or Yours? | TechSNAP 87 https://original.jupiterbroadcasting.net/28511/mysql-or-yours-techsnap-87/ Thu, 06 Dec 2012 16:49:10 +0000 https://original.jupiterbroadcasting.net/?p=28511 MySQL had a bad week, we’ll run down the list of vulnerabilities, the SSH server that allows an attacker root access, and a GPU password cracking monster.

The post MySQL or Yours? | TechSNAP 87 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

MySQL had a bad week, we’ll run down the list of the recently disclosed vulnerabilities, the SSH server that allows an attacker full root access, and a GPU password cracking monster.

Plus a big batch of your questions, and so much more!

Thanks to:

Use our code tech295 to get a .COM for $2.95.

Something else in mind? use go20off5 to save 20% on your entire order!

$4.99 SSL certificates, just use our code 499ssl2. Expires 12-31-12!

Pick your code and save:
techsnap7: $7.49 .com
techsnap10: 10% off
techsnap11: $1.99 hosting for the first 3 months
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans
techsnapx: 20% off .xxx domains

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Get TechSNAP on your Android:

Browser Affiliate Extension: