iptables – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Wed, 08 Sep 2021 02:35:50 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png iptables – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 The Fun Distro | LINUX Unplugged 422 https://original.jupiterbroadcasting.net/146077/the-fun-distro-linux-unplugged-422/ Tue, 07 Sep 2021 17:45:00 +0000 https://original.jupiterbroadcasting.net/?p=146077 Show Notes: linuxunplugged.com/422

The post The Fun Distro | LINUX Unplugged 422 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxunplugged.com/422

The post The Fun Distro | LINUX Unplugged 422 first appeared on Jupiter Broadcasting.

]]>
Back in the Freedom Dimension | LINUX Unplugged 398 https://original.jupiterbroadcasting.net/144562/back-in-the-freedom-dimension-linux-unplugged-398/ Tue, 23 Mar 2021 17:30:00 +0000 https://original.jupiterbroadcasting.net/?p=144562 Show Notes: linuxunplugged.com/398

The post Back in the Freedom Dimension | LINUX Unplugged 398 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxunplugged.com/398

The post Back in the Freedom Dimension | LINUX Unplugged 398 first appeared on Jupiter Broadcasting.

]]>
Double Data Rate Trouble | LINUX Unplugged 369 https://original.jupiterbroadcasting.net/142657/double-data-rate-trouble-linux-unplugged-369/ Tue, 01 Sep 2020 20:30:00 +0000 https://original.jupiterbroadcasting.net/?p=142657 Show Notes: linuxunplugged.com/369

The post Double Data Rate Trouble | LINUX Unplugged 369 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxunplugged.com/369

The post Double Data Rate Trouble | LINUX Unplugged 369 first appeared on Jupiter Broadcasting.

]]>
Lenovo Loves Linux | LINUX Unplugged 351 https://original.jupiterbroadcasting.net/141302/lenovo-loves-linux-linux-unplugged-351/ Tue, 28 Apr 2020 18:00:00 +0000 https://original.jupiterbroadcasting.net/?p=141302 Show Notes: linuxunplugged.com/351

The post Lenovo Loves Linux | LINUX Unplugged 351 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxunplugged.com/351

The post Lenovo Loves Linux | LINUX Unplugged 351 first appeared on Jupiter Broadcasting.

]]>
Firewall Fun | TechSNAP 421 https://original.jupiterbroadcasting.net/138857/firewall-fun-techsnap-421/ Fri, 24 Jan 2020 00:15:00 +0000 https://original.jupiterbroadcasting.net/?p=138857 Show Notes: techsnap.systems/421

The post Firewall Fun | TechSNAP 421 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/421

The post Firewall Fun | TechSNAP 421 first appeared on Jupiter Broadcasting.

]]>
The Coffee Shop Problem | TechSNAP 413 https://original.jupiterbroadcasting.net/135407/the-coffee-shop-problem-techsnap-413/ Thu, 03 Oct 2019 23:15:16 +0000 https://original.jupiterbroadcasting.net/?p=135407 Show Notes: techsnap.systems/413

The post The Coffee Shop Problem | TechSNAP 413 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/413

The post The Coffee Shop Problem | TechSNAP 413 first appeared on Jupiter Broadcasting.

]]>
The Meat Factor | LINUX Unplugged 289 https://original.jupiterbroadcasting.net/129491/the-meat-factor-linux-unplugged-289/ Wed, 20 Feb 2019 07:51:45 +0000 https://original.jupiterbroadcasting.net/?p=129491 Show Notes/Links: linuxunplugged.com/289

The post The Meat Factor | LINUX Unplugged 289 first appeared on Jupiter Broadcasting.

]]>

Show Notes/Links: linuxunplugged.com/289

The post The Meat Factor | LINUX Unplugged 289 first appeared on Jupiter Broadcasting.

]]>
Quality Tools | TechSNAP 397 https://original.jupiterbroadcasting.net/129401/quality-tools-techsnap-397/ Fri, 15 Feb 2019 09:35:10 +0000 https://original.jupiterbroadcasting.net/?p=129401 Show Notes: techsnap.systems/397

The post Quality Tools | TechSNAP 397 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/397

The post Quality Tools | TechSNAP 397 first appeared on Jupiter Broadcasting.

]]>
Level Up Your LAN | LAS 377 https://original.jupiterbroadcasting.net/86282/level-up-your-lan-las-377/ Sun, 09 Aug 2015 10:01:02 +0000 https://original.jupiterbroadcasting.net/?p=86282 We take a deep dive into the basics of getting a home network up and running. It you’ve lived with whatever the ISP has given you have no fear, not only are we going to show you how to do it, it’s going to be all done from Linux! Plus Firefox has a major flaw […]

The post Level Up Your LAN | LAS 377 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We take a deep dive into the basics of getting a home network up and running. It you’ve lived with whatever the ISP has given you have no fear, not only are we going to show you how to do it, it’s going to be all done from Linux!

Plus Firefox has a major flaw that impacts Linux users, an update on the Jolla tablet, we discuss our big format experiment & more!

Thanks to:


DigitalOcean


Ting

Direct Download:

HD Video | Mobile Video | WebM Torrent | MP3 Audio | OGG Audio | YouTube | HD Torrent

RSS Feeds:

HD Video Feed | Large Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —


System76

Brought to you by: System76

Overview

  • Default configurations are less secure and limited
  • Ability to setup VPN
  • Ability to setup DNS
  • Most consumer equipment is a modem/router/switch/access point all in one (Spork Syndrome)

Default Settings on Mikrotik

  • IP 192.168.88.1
  • username: admin
  • no password

Default Settings on (most) Linksys

  • IP 192.168.0.1
  • username: admin
  • password: admin

DHCP – Dynamic Host Configuration Protocol

  • Useful to push information to the clients about the network.
  • Can be setup on most routers
  • Comes setup by default
  • Linksys limits you to /24 meaning a maximum of 254 clients.

DNS – Domain Name Service

  • Phonebook of the internet
  • Useful to point non-registered hostnames to IP addresses
  • Can be used (somewhat) to block access to websites.

Firewall

  • Used to block traffic
  • Can be used on enterprise routers to separate switchports

Static IP (If your ISP allows it)

  • What is and Setting static IP
  • What is and Setting net mask
  • What is and Setting Default Gateway

Setting up an Access Point

  • Enable wireless on Mikrotik or Linksys
  • Purchase separate access point and use WebUI
  • Proper Channeling
  • Proper Power
  • POE

Easy Linux Networking

IPFire

From a technical point of view, IPFire is a minimalistic, hardened firewall system which comes with an integrated package manager called Pakfire. The primary task of Pakfire is to update the system with only a single click.

It is very easy to install security patches, bugfixes and feature enhancements, which make IPFire safer and faster – or simply, better.

Another task of Pakfire is to install additional software that adds new functionality to the IPFire system.
Some useful of them are:

  • File sharing services such as Samba and vsftpd
  • Communications server using Asterisk
  • Various command-line tools as tcpdump, nmap, traceroute & many more.
Smoothwall.org

The goals of the project can be summed up as:

  • Be simple enough to be installed by home users with no knowledge of Linux
  • Support a wide variety of network cards, modems and other hardware
  • Work with many different connection methods and ISPs from across the world
  • Manage and configure the software using a web browser
  • Run efficiently on older, cheaper hardware
  • Develop a supportive user community
  • Use sponsorship from Smoothwall Limited to further these goals

The Smoothwall Open Source Project is funded and supported by Smoothwall Limited.

— PICKS —

Runs Linux

Fantastic show, keep up the good work.
I wanted to share my own small runs Linux with you. I’m an IT Tech working in a secondary school in the UK. I got fed-up of our old outdated lesson change bell system from the 70’s so i made a pi powered one. It uses cron to run a python script that turns the relay on for a set amount of time. The cron file is edited via the UI that runs on php, MySQL on top of Apache. Photos of the UI and the project build attached.
its been in production since feb and still going strong.

Hope you like it

Thanks

Sent in by Robin T.

Desktop App Pick

Our VoIP softphone will look everywhere for your contacts and will display them in a combined list for easy access. Outlook, windows/mac, LDAP, XMPP, XCAP, android, iOs. You name it, we got it and we will lookup incoming calls as well so you know who calls before you answer.

Weekly Spotlight

Organize files into libraries. A library can be selectively synced into any device. Reliable and efficient file syncing improves your productivity.

A library can be encrypted by a password chosen by you. Files are encrypted before syncing to the server. Even the system admin can’t view the files.

Sharing into groups and collaboration around files. Permission control, versioning and activity notification make collaboration easy and reliable.

The core of Seafile server is written in C programming language. It is small and has a fantastic performance.

Upgrade can be done via running a simple script within a few seconds. Seafile records very few items in database. No huge database upgrade is needed.

AD/LDAP integration, group syncing, fine-grained permission control make the tool easily applied to your enterprise environment.

Celebrate BSD Now’s 2 year Anniversary!

BONUS SPOTLIGHT

Online tracking has become a pervasive invisible reality of the modern web. Most sites you load are likely to be full of ads, tracking pixels, social media share buttons, and other invisible trackers all harvesting data about your web browsing. These trackers use cookies and other methods to read unique IDs associated with your browser, the result being that they record all the sites you visit as you browse around the internet. This sort of tracking is invisible to most web users, meaning they never get the option to agree to or opt-out of it. Today the EFF has launched the 1.0 version of Privacy Badger, an extension designed to prevent these trackers from accessing unique info about you and your browsing.


— NEWS —

Firefox exploit found in the wild | Mozilla Security Blog

Yesterday morning, August 5, a Firefox user informed us that an advertisement on a news site in Russia was serving a Firefox exploit that searched for sensitive files and uploaded them to a server that appears to be in Ukraine. This morning Mozilla released security updates that fix the vulnerability. All Firefox users are urged to update to Firefox 39.0.3. The fix has also been shipped in Firefox ESR 38.1.1.

LibreOffice 5.0 Released!

It is also the first version to come in 64 bits for Windows. As such LibreOffice 5 serves as the foundation of our current developments and is a great platform to extend, innovate and collaborate with!

LibreOffice 5.0 ships an impressive number of new features for its spreadsheet module, Calc: complex formulae image cropping, new functions, more powerful conditional formatting, table addressing and much more. Calc’s blend of performance and features makes it an enterprise-ready, heavy duty spreadsheet application capable of handling all kinds of workload for an impressive range of use cases.

New icons, major improvements to menus and sidebar : no other LibreOffice version has looked that good and helped you be creative and get things done the right way. In addition, style management is now more intuitive thanks to the visualization of styles right in the interface.

LibreOffice 5 ships with numerous improvements to document import and export filters for MS Office, PDF, RTF, and more. You can now timestamp PDF documents generated with LibreOffice and enjoy enhanced document conversion fidelity all around.

LibreOffice 5 combines innovative features and long term efforts towards enhanced stability. As a result, expect both improvements in performance and in stability over the lifetime of the 5.0.x series.

LibreOffice under the hood: progress to 5.0

Gtk3 backend: Wayland

An very rough, initial gtk3 port was hacked together long ago by yours truly to prototype LibreOffice online via gdk-broadway.
However thanks to Caolán McNamara (RedHat) who has done the 80% of the hard work to finish this, giving us a polished and complete VCL backend for gtk3.
His blog entry focuses on the importance of this for running LibreOffice natively under wayland – the previous gtk2 backend was heavily tied to raw X11 rendering, while the new gtk3 backend uses CPU rendering via the VCL headless backend, of which more below.

OpenGL rendering improvements

The OpenGL rendering backend also significantly matured in this version, allowing us to talk directly to the hardware to accelerate
much of our rendering, with large numbers of bug fixes and improvements.
Many thanks to Louis-Francis Ratté-Boulianne (Collabora), Markus Mohrhard, Luboš Luňák (Collabora), Tomaž Vajngerl (Collabora), Jan Holesovsky (Collabora), Tor Lillqvist (Collabora), Chris Sherlock & others.
It is hoped that with the ongoing bug-fixing here, that this can be enabled by default as a late feature, after suitable review, for LibreOffice 5.0.1 or at the outside 5.0.2.

LibreOffice 5.0 Is a Milestone Release for Ubuntu Touch

LibreOffice will land on Ubuntu Touch

The developers from The Document Foundation haven’t gone into much detail about their plans, but they have said that the office suite is coming to Android. Coupled with the things we already know about Ubuntu Touch, we can safely say that LibreOffice 5.0 will bring some very interesting changes to the mobile platform from Canonical.

“A new version for new endeavours: LibreOffice 5.0 is the cornerstone of the mobile clients on Android and Ubuntu Touch, as well as the upcoming cloud version. As such, LibreOffice 5.0 serves as the foundation of current developments and is a great platform to extend, innovate and collaborate!” reads the announcement from The Document Foundation.

Jolla Tablet – First Batch out of Factory

Last week was very busy for Jolla, but few issues delaying the process by couple of days were catch up during the weekend by hard working Sailors. The first batch of Jolla Tablets is now complete and is told to look great! This batch is pre-production batch delivered to selected developers and internal test personnel

July 27th all the components were ready to be mounted on the circuit boards in China. All that was missing was the circuit boards themselves, as the flight delivering them was delayed by couple of hours. This delay was short, and assembling the boards was started as planned without major issues.

Earlier delays with material preparation and board delivery forced Jolla to agree on a new schedule with the assembly factory. July 30th, circuit boards were tested and the batch was sent to factory to be assembled on the next day. Surprise came with a glue machine, display assembly wasn’t possible

White House Petition to use FOSS whenever possible

We believe that the federal government, for the security of the information it manages and the efficient allocation of the public’s funds, should divest itself of costly proprietary software contracts wherever possible.

Healthcare.gov’s initial failings had much to do with the old, proprietary infrastructure that government contracting details required the application be built on. The US Navy recently spent considerable amounts of taxpayer money to extend support for Windows XP and Office 2003, both inherently obsolete and insecure.

Use of proprietary software costs our taxpayers needless money. It’s become clear that governments such as those of the UK and much of the European Union can adopt open source software and be better off for it. We should join them.

Feedback:

Chris’s Twitter account has changed, you’ll need to follow!

Chris Fisher (@ChrisLAS) | Twitter

— CHRIS’ STASH —

Hang in our chat room:

irc.geekshed.net #jupiterbroadcasting

— NOAH’S STASH —

Noah’s Day Job

Altispeed Technologies

Contact Noah

noah [at] jupiterbroadcasting.com

Find us on Google+

Find us on Twitter

Follow us on Facebook

Catch the show LIVE Sunday 10am Pacific / 1pm Eastern / 6pm UTC:

The post Level Up Your LAN | LAS 377 first appeared on Jupiter Broadcasting.

]]>
Security Onion Review | LAS 331 https://original.jupiterbroadcasting.net/67182/security-onion-review-las-331/ Sun, 21 Sep 2014 15:22:27 +0000 https://original.jupiterbroadcasting.net/?p=67182 Security Onion can turn you into a network super warrior, with its easy to setup IDS, Network Syslog, and more. We’ll show you how to take advantage of some of the best tools in open source, from beginner to expert! Plus a great new game for Linux, Uselessd looks needed but is stirring up drama, […]

The post Security Onion Review | LAS 331 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Security Onion can turn you into a network super warrior, with its easy to setup IDS, Network Syslog, and more. We’ll show you how to take advantage of some of the best tools in open source, from beginner to expert!

Plus a great new game for Linux, Uselessd looks needed but is stirring up drama, why Gnome 3.14 will be the best Gnome yet & more!

Thanks to:


DigitalOcean


Ting

Download:

HD Video | Mobile Video | WebM Torrent | MP3 Audio | Ogg Audio | YouTube | HD Torrent

RSS Feeds:

HD Video Feed | Large Video Feed | Mobile Video Feed | MP3 Feed | Ogg Feed | iTunes Feeds | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

Security Onion


System76

Brought to you by: System76

Security Onion is a Linux distro for intrusion detection, network security monitoring, and log management. It’s based on Ubuntu and contains Snort, Suricata, Bro, OSSEC, Sguil, Squert, Snorby, ELSA, Xplico, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!

Based on Ubuntu 12.04:
+ FAQ – security-onion – Frequently Asked Questions – Security Onion is a Linux distro for IDS, NSM, and log management. – Google Project Hosting

We have no immediate plans to move to Ubuntu 14.04. Ubuntu 12.04 should be fully supported until April 2017: https://wiki.ubuntu.com/Releases

Core Components

Security Onion seamlessly weaves together three core functions: full packet capture, network-based and host-based intrusion detection intrusion detection systems (NIDS and HIDS, respectively), and powerful analysis tools.


Full-packet capture is accomplished via netsniff-ng (https://netsniff-ng.org/), “the packet sniffing beast”. netsniff-ng captures all the traffic your Security Onion sensors see and stores as much of it as your storage solution will hold (Security Onion has a built-in mechanism to purge old data before your disks fill to capacity). Full packet capture is like a video camera for your network, but better because not only can it tell us who came and went, but also exactly where they went and what they brought or took with them (exploit payloads, phishing emails, file exfiltration). It’s a crime scene recorder that can tell us a lot about the victim and the white chalk outline of a compromised host on the ground. T

Deployment Scenarios

Security Onion is built on a distributed client-server model. A Security Onion “sensor” is the client and a Security Onion “server” is, well, the server. The server and sensor components can be run on a single physical machine or virtual machine, or multiple sensors can be distributed throughout an infrastructure and configured to report back to a designated server. An analyst connects to the server from a client workstation (typically a Security Onion virtual machine installation) to execute queries and retrieve data.

The following are the three Security Onion deployment scenarios:

  • Standalone: A standalone installation consists of a single physical or virtual machine running both the server and sensor components and related processes. A standalone installation can have multiple network interfaces monitoring different network segments. A standalone installation is the easiest and most convenient method to monitor a network or networks that are accessible from a single location.

  • Server-sensor: A server-sensor installation consists of a single machine running the server component with one or more separate machines running the sensor component and reporting back to the server. The sensors run all of the sniffing processes and store the associated packet captures, IDS alerts, and databases for Sguil; Snorby and ELSA. The analyst connects to the server from a separate client machine and all queries sent to the server are distributed to the appropriate sensor(s), with the requested information being directed back to the client. This model reduces network traffic by keeping the bulk of the collected data on the sensors until requested by the analyst’s client. All traffic between the server and sensors and client and server are protected with SSH encrypted tunnels.

  • Hybrid: A hybrid installation consists of a standalone installation that also has one or more separate sensors reporting back to the server component of the standalone machine.

The Security Onion setup script allows you to easily configure the best installation scenario to suit your needs.

Install is as simple as installing Ubuntu:

Once Setup an easy to use GUI configures the basics:

Security Onion’s Great Tools:

Sguil – Open Source Network Security Monitoring

Sguil (pronounced sgweel) is built by network security analysts for network security analysts. Sguil’s main component is an intuitive GUI that provides access to realtime events, session data, and raw packet captures. Sguil facilitates the practice of Network Security Monitoring and event driven analysis. The Sguil client is written in tcl/tk and can be run on any operating system that supports tcl/tk (including Linux, *BSD, Solaris, MacOS, and Win32).

Snorby – All About Simplicity

Snorby brings your existing and new network securits
monitoring data to life with a suite of beautiful, relevant, and, most importantly, actionable metrics. Share data like sensor activity comparisons or your most active signatures directly with your constituents with daily, weekly, monthly, and ad-hoc PDF reports.

the squertproject

Squert is a web application that is used to query and view event data stored in a Sguil database (typically IDS alert data). Squert is a visual tool that attempts to provide additional context to events through the use of metadata, time series representations and weighted and logically grouped result sets. The hope is that these views will prompt questions that otherwise may not have been asked.

enterprise-log-search-and-archive – Enterprise log search and archive (ELSA) is an industrial-strength solution for centralized log management.

ELSA is a centralized syslog framework built on Syslog-NG, MySQL, and Sphinx full-text search. It provides a fully asynchronous web-based query interface that normalizes logs and makes searching billions of them for arbitrary strings as easy as searching the web. It also includes tools for assigning permissions for viewing the logs as well as email based alerts, scheduled queries, and graphing.

Further Study:

Doug Burks – YouTube


— PICKS —

Runs Linux

The Connected Wheelchair Project, Runs Linux

Desktop App Pick

Angry IP Scanner

Angry IP Scanner (or simply ipscan) is an open-source and cross-platform network scanner designed to be fast and simple to use. It scans IP addresses and ports as well as has many other features.

It is widely used by network administrators and just curious users around the world, including large and small enterprises, banks, and government agencies.

It runs on Linux, Windows, and Mac OS X, possibly supporting other platforms as well.

Wasteland 2 on Steam

The Wasteland series impressive and innovative lineage has been preserved at its very core, but modernized for the fans of today with Wasteland 2. Immerse yourself in turn-based tactical combat that will test the very limits of your strategy skills as you fight to survive a desolate world where brute strength alone isn’t enough to save…

4K Stogram | Export, Download and Backup your Instagram photos

4K Stogram is an Instagram Downloader for PC, Mac and Linux. The program allows you to download and backup Instagram photos and videos, even from private accounts. Just enter Instagram user name or photo link and press ‘Follow user’ button. Open up wide new vistas of imagery all from your desktop.

Weekly Spotlight

Jupiter Broadcasting Jacket

Sport your favorite Linux Action Show logo on a comfy new jacket just in time for Fall (or Spring if you are from down under). This is a limited run jacket for just 8 days so buy it now, especially if you want it in time to wear to Ohio Linux Fest!


— NEWS —

Red Hat Buys FeedHenry For $82M To Add Mobile App Development To Its Platform

Some big news today for Red Hat, the open source company that provides a platform for application development and other platform as a service solutions: It is buying FeedHenry, an Ireland-based provider of a platform for mobile app developers, specifically for enterprises to build apps. In a statement on the acquisition, Red Hat says it will be paying €63.5 million ($82 million) in cash for FeedHenry. The deal is expected to close in Q3 (as a point of reference Red Hat is reporting Q2 fiscal 2015 figures today; Red Hat says it will be updating its guidance as a result of the acquisition).

Uselessd: A Stripped Down Version Of Systemd

Uselessd in its early stages of development is systemd reduced to being a basic init daemon process with “the superfluous stuff cut out”. Among the items removed are removing of journald, libudev, udevd, and superfluous unit types.

uselessd :: information system

Stopped Clock — Making of GNOME 3.14

The release of GNOME 3.14 is slowly approaching, so I stole some time from actual design work and created this little promo to show what goes into a release that probably isn’t immediately obvious (and a large portion of it doesn’t even make it in).

3.14 On Its Way

Often with new releases we focus on the big new features — obvious bits of new UI that do cool stuff. One of the interesting things about this release, though, is that many of the most significant changes are also the most subtle. There’s a lot of polish in 3.14, and it makes a big different to the overall user experience.

Ubuntu MATE will become an official flavor

Martin Wimpress updated the current development status of Ubuntu MATE in the distro’s blog today. In addition to the regular update, he has confirmed that the MATE variant is going to be recognized as an official Ubuntu flavor. Rejoice, MATE lovers!

The MATE desktop environment is a continuation of the GNOME 2 desktop environment for those who don’t like the bells and whistles of GNOME 3 but loved the simplicity and productivity GNOME 2.

The MATE team requested the Ubuntu Technical Board for an official flavor status recently and the board is supportive of the proposal.

You Can Now Run Android Apps on Chrome for Windows, Mac and Linux – OMG! Chrome!

It requires installing a custom version of the Android Runtime extension, called ARChon. This supports both desktop Chrome and Chrome OS, and also allows for an unlimited number of Android APKs packaged by the chromeos-apk tool.

Netflix Works with Ubuntu to Bring Native Playback to All (Updated) – OMG! Ubuntu!

Since this article was published Canonical has confirmed that a version bump to the current nss library is planned to be pushed out with the next ‘security update’. This could arrive on Ubuntu 14.04 LTS within the next two weeks.

This news has pleased Netflix’s Paul Adolph who, in response, says he will _’make a case to lift the user-agent filtering which will make Netflix HTML5 play in Chrome turnkey with no hacks required’ _as soon as the updated package lands.


— FEEDBACK —

Do you know of a great pfSense alternative?
  • A Linux alternative to pfSense
  • Something with a competitive UI to pfsense
  • With packages if possible, like squid, smokeping, etc.
  • Does not use iptables.
  • Big bonus if it does use nftables

— CHRIS’ STASH —

Hang in our chat room:

irc.geekshed.net #jupiterbroadcasting

— MATT’S STASH —

Find us on Google+

Find us on Twitter

Follow the network on Facebook

Catch the show LIVE Sunday 10am Pacific / 1pm Eastern / 6pm UTC:

The post Security Onion Review | LAS 331 first appeared on Jupiter Broadcasting.

]]>
Linux Fear-Mongering | Tech Talk Today 52 https://original.jupiterbroadcasting.net/65907/linux-fear-mongering-tech-talk-today-52/ Thu, 04 Sep 2014 09:35:57 +0000 https://original.jupiterbroadcasting.net/?p=65907 We cover the latest from the IFA consumer electronics shows where the next major mobile devices are being showcased, the big new virtual reality backer & the Sony bump. Plus we’ll discuss the inaccurate Linux security story floating around the net & more! Direct Download: MP3 Audio | OGG Audio | Video | HD Video […]

The post Linux Fear-Mongering | Tech Talk Today 52 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We cover the latest from the IFA consumer electronics shows where the next major mobile devices are being showcased, the big new virtual reality backer & the Sony bump.

Plus we’ll discuss the inaccurate Linux security story floating around the net & more!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed

Become a supporter on Patreon:

Foo

Show Notes:

IFA (Internationale Funkausstellung) is an annual consumer electronics show held in Berlin, Germany, which often serves as a launching platform for smartphone and tablet manufacturers. Think of it as a mini-Mobile World Congress. Last year’s IFA hosted the launch of the Samsung Galaxy Note 3 and Galaxy Gear, among others. This year’s event officially runs from Sept. 5-10, but we’re expecting many of larger announcements to be made in the couple of days before IFA officially begins.

The Galaxy Note Edge is a flagship phone with an entirely new kind of curved display | The Verge

Samsung has introduced the Note 4, a 5.7-inch phone with a 1440p SuperAMOLED display coming in October.


The Note Edge is, on paper at least, only the slightest variation on the new Note 4. It has the same metallic design. It has the same 16-megapixel camera, the same heart-rate monitor, the same processor, the same memory, the same software. It even has a Quad HD, 2560 x 1440 display like the Note 4, though this one is slightly smaller at 5.6 inches rather than 5.7.


It’s on the right side of the phone’s front face that a sharp difference appears between the two models. The screen starts to slope downward, falling off toward the edge and wrapping around the side. It’s as if two screens have been connected to each other at an acute angle, but there’s only one display here. The asymmetry of the phone feels a little odd, like I chipped part of the right side off by accident, but it doesn’t really hurt the aesthetic appeal of the phone. It’s still very comfortable, the metal body both solid and dense, and I like the way the screen curls under my right thumb. (If you’re a lefty, using the Note Edge in one hand is going to be terrible — but then again using a Note in one hand is already terrible.)

Sony announces its latest flagship smartphone, the Xperia Z3

You’ll find a 5.2-inch, 1080p display, a 20.7-megapixel camera and waterproofing. (Same as the Z2)

Sony has also added a new, wide-angle 25mm lens (to fit more into a shot) and extra-high ISO 12,800 light sensitivity.

A 2.5GHz Snapdragon 801 processor instead of the 2.3GHz chip you saw in the Z2.

Price and carries will be annouced in the fall.

Samsung and Oculus partner to create Gear VR, a virtual reality headset that uses the Note 4 (hands-on)

Samsung’s getting in on the virtual reality action, announcing Gear VR at IFA 2014 today in Berlin, Germany. Gear VR is a virtual reality headset with a removable front cover where Samsung’s newly announced Note 4 slips in, acting as the screen. Paired with adjustable lenses built into the headset

  • Built in Camera
  • No wires (that means no PC to drive it too)
  • Touch Pad
  • Good build

The only information on availability is “this year,” and there is no price just yet; it’ll be available for purchase online and through “select carriers.” Considering how low-tech Gear VR is, and the fact that Samsung’s pushing a product into a market that doesn’t really exist just yet, I expect the company will aim as low as possible in terms of pricing.

When you do get one, it comes with a 16GB microSD preloaded with a variety of “360-degree videos and 3D movie trailers from major studios” (that’ll go into the Note 4, naturally). Oh, and you’ll need a Note 4 (not a Note 4 Edge — just the Note 4), as Gear VR is built to work with only that device.

Linux systems infiltrated and controlled in a DDoS botnet

Akamai Technologies is alerting enterprises to a high-risk threat of IptabLes and IptabLex infections on Linux systems. Malicious actors may use infected Linux systems to launch DDoS attacks against the entertainment industry and other verticals.

The mass infestation of IptabLes and IptabLex seems to have been driven by a large number of Linux-based web servers being compromised, mainly by exploits of Apache Struts, Tomcat and Elasticsearch vulnerabilities.

Attackers have used the Linux vulnerabilities on unmaintained servers to gain access, escalate privileges to allow remote control of the machine, and then drop malicious code into the system and run it. As a result, a system could then be controlled remotely as part of a DDoS botnet.

A post-infection indication is a payload named .IptabLes or. IptabLex located in the /boot directory. These script files run the .IptabLes binary on reboot.

The malware also contains a self-updating feature that causes the infected system to contact a remote host to download a file. In the lab environment, an infected system attempted to contact two IP addresses located in Asia.

“We have traced one of the most significant DDoS attack campaigns of 2014 to infection by IptabLes and IptabLex malware on Linux systems,” said Stuart Scholly, senior VP and GM, Security Business Unit, Akamai.

The post Linux Fear-Mongering | Tech Talk Today 52 first appeared on Jupiter Broadcasting.

]]>
Puffy Firewall | BSD Now 35 https://original.jupiterbroadcasting.net/56402/puffy-firewall-bsd-now-35/ Wed, 30 Apr 2014 23:49:53 +0000 https://original.jupiterbroadcasting.net/?p=56402 We\’re back again! On this week\’s packed show, we\’ve got one of the biggest tutorials we\’ve done in a while. It\’s an in-depth look at PF, OpenBSD\’s firewall, with some practical examples and different use cases. We\’ll also be talking to Peter Hansteen about the new edition of \”The Book of PF.\” Of course, we\’ve […]

The post Puffy Firewall | BSD Now 35 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We\’re back again! On this week\’s packed show, we\’ve got one of the biggest tutorials we\’ve done in a while. It\’s an in-depth look at PF, OpenBSD\’s firewall, with some practical examples and different use cases.

We\’ll also be talking to Peter Hansteen about the new edition of \”The Book of PF.\” Of course, we\’ve got news and answers to your emails too, on BSD Now – the place to B.. SD.

Thanks to:


\"iXsystems\"

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Headlines

ALTQ removed from PF

  • The classic packet queueing system, ALTQ, was recently removed from OpenBSD -current
  • There will be a transitional phase between 5.5 and 5.6 where you can still use it by replacing the \”queue\” keyword with \”oldqueue\” in your pf.conf
  • As of 5.6, due about six months from now, you\’ll have to change your ruleset to the new syntax if you\’re using it for bandwidth shaping
  • After more than ten years, bandwidth queueing has matured quite a bit and we can finally put ALTQ to rest, in favor of the new queueing subsystem
  • This doesn\’t affect FreeBSD, PCBSD, NetBSD or DragonflyBSD since all of their PFs are older and maintained separately

FreeBSD Quarterly Status Report

  • The quarterly status report from FreeBSD is out, detailing some of the project\’s ongoing tasks
  • Some highlights include the first \”stable\” branch of ports, ARM improvements (including SMP), bhyve improvements, more work on the test suite, desktop improvements including the new vt console driver and UEFI booting support finally being added
  • We\’ve got some specific updates from the cluster admin team, core team, documentation team, portmgr team, email team and release engineering team
  • LOTS of details and LOTS of topics to cover, give it a read

OpenBSD\’s OpenSSL rewrite continues with m2k14


NetBSD 6.1.4 and 6.0.5 released

  • New updates for the 6.1 and 6.0 branches of NetBSD, focusing on bugfixes
  • The main update is – of course – the heartbleed vulnerability
  • Also includes fixes for other security issues and even a kernel panic… on Atari
  • Patch your Ataris right now, this is serious business

Interview – Peter Hansteen – peter@bsdly.net / @pitrh

The Book of PF: 3rd edition


Tutorial

BSD Firewalls: PF


News Roundup

New Xorg now the default in FreeBSD

  • For quite a while now, FreeBSD has had two versions of X11 in ports
  • The older, stable version was the default, but you could install a newer one by having \”WITH_NEW_XORG\” in /etc/make.conf
  • They\’ve finally made the switch for 10-STABLE and 9-STABLE
  • Check this wiki page for more info

GSoC-accepted BSD projects

  • The Google Summer of Code team has got the list of accepted project proposals uploaded so we can see what\’s planned
  • OpenBSD\’s list includes DHCP configuration parsing improvements, systemd replacements, porting capsicum, GPT and UEFI support, and modernizing the DHCP daemon
  • The FreeBSD list was also posted
  • Theirs includes porting FreeBSD to the Android emulator, CTF in the kernel debugger, improved unicode support, converting firewall rules to a C module, pkgng improvements, MicroBlaze support, PXE fixes, bhyve caching, bootsplash and lots more
  • Good luck to all the students participating, hopefully they become full time BSD users

Complexity of FreeBSD VFS using ZFS as an example

  • HybridCluster posted the second part of their VFS and ZFS series
  • This new post has lots of technical details once again, definitely worth reading if you\’re a ZFS guy
  • Of course, also watch episode 24 for our interview with HybridCluster – they do really interesting stuff

PCBSD weekly digest

  • Preload has been ported over, it\’s a daemon that prefetches applications
  • PCBSD is developing their own desktop environment, Lumina (there\’s also an FAQ)
  • It\’s still in active development, but you can try it out by installing from ports
  • We\’ll be showing a live demo of it in a few weeks (when development settles down a bit)

  • All the tutorials are posted in their entirety at bsdnow.tv
  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
  • If you\’ve got something cool to talk about and want to come on for an interview, shoot us an email
  • Also if you have any tutorial requests, we\’d be glad to show whatever the viewers want to see
  • It looks like OpenBSD 5.5 CD sets are already starting to show up in people\’s mail boxes – we\’ll have the full details of the release next week
  • Watch live Wednesdays at 2:00PM Eastern (18:00 UTC)

The post Puffy Firewall | BSD Now 35 first appeared on Jupiter Broadcasting.

]]>
Easy As Pi Tor Proxy | LAS s27e05 https://original.jupiterbroadcasting.net/38907/easy-as-pi-tor-proxy-las-s27e05/ Sun, 16 Jun 2013 13:11:22 +0000 https://original.jupiterbroadcasting.net/?p=38907 With a Raspberry Pi it’s never been easier to create a Tor Proxy for you entire network. This week we’ll show you how to get off the ground quick, with Torberry

The post Easy As Pi Tor Proxy | LAS s27e05 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

With a Raspberry Pi it’s never been easier to create a Tor Proxy for you entire network. This week we’ll show you how to get off the ground quick, with Torberry. A distribution for the Raspberry Pi that will have you up and running on the Tor network in minutes.

Plus what Unity3D has in store for Linux users, how Chris is rolling his own Jungle Disk, some gaming news, your emails…

AND SO MUCH MORE!

All this week on, The Linux Action Show!

Thanks to:

Use our code linux249 to score .COM for just $2.49!

35% off your ENTIRE first order just use our code 35off2 until the end of the month!

 

Visit las.ting.com to save $25 off your device or service credits.

 

Download:

HD Video | Mobile Video | WebM Torrent | MP3 Audio | Ogg Audio | YouTube | HD Torrent

RSS Feeds:

HD Video Feed | Large Video Feed | Mobile Video Feed | MP3 Feed | Ogg Feed | iTunes Feeds | Torrent Feed

Support the Show:

— Show Notes: —

TOR Proxy Using Torberry on the Raspberry Pi:


System76

Brought to you by: System76

Client configuratión must be done manually. Two things that you have to change are gateway and dns servers. Both must be configured with raspberry’s IP.

Would you like to use your Pi as a WiFi router? Or maybe have it as a special filtering access point?

This tutorial assumes you have your Pi mostly set up and have followed the “Raspberry Pi as Wifi Access Point” tutorial

Hardware:

[asa]B008XVAVAW[/asa]
[asa]B005OOIS1U[/asa]
[asa]B007RFRHIY[/asa]


– Picks –

Runs Linux:

Android Pick:

Desktop App Pick:

Search our past picks:

This tumblr contains the Linux app picks from the Linux Action Show. Both the Linux apps and the Android apps

Git yours hands all over our STUFF:

*

— NEWS —

In this session, Unity software developer Na’Tosha Bard covers the history of games on Linux, the opportunities this growing platform holds for games developers and the technical steps to exporting content from Unity to Linux.

— /etc: Backup to S3 with Duplicity —


Untangle

Brought to you by: Untangle

Duplicity backs directories by producing encrypted tar-format volumes and uploading them to a remote or local file server. Because duplicity uses librsync, the incremental archives are space efficient and only record the parts of files that have changed since the last backup. Because duplicity uses GnuPG to encrypt and/or sign these archives, they will be safe from spying and/or modification by the server.

Running your own mail server is a lot of work. If this is your first time doing it, I strongly advise that you do it for a domain that you don’t already actively use for communication; be ready to accept losing mail for the first week or so, because it will certainly happen

“this is 2000 and Fing 13 and this does not automount??”

— Chris’ Stash —

Hang in our chat room:

irc.geekshed.net #jupiterbroadcasting

— What’s Matt Doin? —

— Find us on Google+ —
— Find us on Twitter —
— Follow the network on Facebook: —
— Catch the show LIVE Sunday 10am Pacific / 1pm Eastern / 6pm UTC: —

The post Easy As Pi Tor Proxy | LAS s27e05 first appeared on Jupiter Broadcasting.

]]> Exaggerated Cybercrime | TechSNAP 54 https://original.jupiterbroadcasting.net/18867/exaggerated-cybercrime-techsnap-54/ Thu, 19 Apr 2012 16:47:21 +0000 https://original.jupiterbroadcasting.net/?p=18867 We bust some Cybercrime propaganda, give you the scoop on a fresh openSSL vulnerability, and answer a common audience question.

The post Exaggerated Cybercrime | TechSNAP 54 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We bust some Cybercrime propaganda, give you the scoop on a fresh openSSL vulnerability, and answer a common audience question.

All that and much more, on this week’s TechhSNAP!

Thanks to:

GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Limited time offer: $5.99 .coms, up to 5 domains! just use our code 599com7

Want to save money on your entire order? Use our code spring7 and save 15%!

 

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Support the Show:

Show Notes:

OpenSSL Vulnerability

  • Two developers from the Google Security Team found a flaw in OpenSSL and contributed the fix
  • The flaw affects all versions of OpenSSL before 1.0.1a, 1.0.0i or 0.9.8v
  • Official Announcement
  • Full Disclosure
  • The vulnerability is in the way OpenSSL handles DER encoded data, which can cause a heap overflow and memory corruption
  • CVE Entry

US Unhappy With Australians Storing Data On Australian Shores

  • The US trade representatives specifically took issue with statements by the Australian Department of Defence, which has been making negative comments about various cloud providers based outside of Australia, implying that “hosting data overseas, including in the United States, by definition entails greater risk and unduly exposes consumers to their data being scrutinized by foreign governments.”
  • The issues first arose when the AU government started considering storing data in the cloud
  • The privacy commissioner raised many concerns about the security of the data in foriegn hands, and also the governments inability to legislate against foreign service providers
  • More coverage
    *

    Cybercrime massively over reported, statistics totally unrealistic

  • Some reports claim that losses due to cybercrime could be as much as $1 Trillion US Dollars
  • Most cybercrime estimates are based on surveys of consumers and companies, and are very unreliable
  • Normal statistical polling for opinion questions, such as seen with political polling works well, however the same method does not work for questions related to a value, because there are no negative values to cancel out the statistical outliers when then get extrapolated resulting in a large upward bias
  • In a 2006 survey of identity theft by the Federal Trade Commission, two respondents gave answers that, when extrapolated to the entire population, would have added $37 billion to the estimate, dwarfing that of all other respondents combined
  • Numbers are also exaggerated by the same pool of gullible and unprotected users being repeatedly targeted, which leads to diminishing returns, however the unreliable statistical models do not take this into consideration

Feedback:

Q: Simon asks about running multiple servers behind a single IP address

A:

  • NAT may be the best answer, especially if you need NAT anyway for the 3 servers to connect out to the internet in the first place
  • You can forward the traffic using something like ‘balance’ or ‘HAProxy’, however the disadvantage to this over NAT is that the internal machines will see the source IP as the LAN IP of the internet facing machine, whereas with NAT they will see the original source IP address
  • For web traffic HTTP (80) and HTTPS (443), you can use nginx, and apache mod_rpaf to pass the original source IP to the internal apache server(s)
  • FreeBSD’s IPFW firewall has the ‘forward’ command, however this does not rewrite the headers of the packet, so the server that receives the forwarded packet needs to know what to do with it

War Story:

Mike sends in his own IBM war story:

After hearing so many war stories from the Other Other Alan, I decided to add one of my own IBM war stories.
I’ve been a contract employee from IBM since 1997. Early in 2000 I and 4 other guys were assigned to a new Network Operations Outsourcing Center. The basic idea was that we four would perform network operations for customers, small/medium businesses external to IBM. Our first customer was a textile company with facilities scattered across the continental US from Georgia to California. IBM sales sold the company a package of software, hardware and services which included IBM Tivoli and Netview monitoring that we were to use to do our monitoring and maintenance of their network.

So, as was always the case back then IBM had specialists who would go out in the field and perform installs and configuration for the customer (in this case us) and then we would be responsible for maintaining it. The initial install took nearly a week with a couple of days of training. Now imagine all the oohs and ahs as all this was running on three HUGE IBM Netfinity 5500 Quad PIII Beasts running Windows NT server and the technicians were explaining all the bells and whistles including event correlation and intelligent discovery. Two days after they left, the database crashed. Well we couldn’t be down with no method of monitoring the customer’s systems. So we took an old copy of “What’s up Gold” and installed it on the only spare hardware we had, a Thinkpad 765. So, as IBM repeatedly sent out technicians to fix one thing or another with the Tivoli environment, or the Oracle database from Hell, we chugged on for an entire year monitoring 40 odd NT servers and an equal amount of network hardware…from a little old pentium 166 laptop, while untold thousands of dollars worth of software and hardware sat almost unused until it was disassembled at the end of the contract.


Round-UP:

The post Exaggerated Cybercrime | TechSNAP 54 first appeared on Jupiter Broadcasting.

]]>