Partitioning – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 18 Jul 2022 03:32:46 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Partitioning – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 All Hands on Deck | LINUX Unplugged 467 https://original.jupiterbroadcasting.net/149267/all-hands-on-deck-linux-unplugged-467/ Sun, 17 Jul 2022 19:15:00 +0000 https://original.jupiterbroadcasting.net/?p=149267 Show Notes: linuxunplugged.com/467

The post All Hands on Deck | LINUX Unplugged 467 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxunplugged.com/467

The post All Hands on Deck | LINUX Unplugged 467 first appeared on Jupiter Broadcasting.

]]>
Solving the Flash Plague | TechSNAP 226 https://original.jupiterbroadcasting.net/86237/solving-the-flash-plague-techsnap-226/ Fri, 07 Aug 2015 07:33:08 +0000 https://original.jupiterbroadcasting.net/?p=86237 Adobe is making changes to Flash to mitigate 0day exploits, with help from Google. Chrysler recalls 1.4M vehicles due to a software flaw, we go inside the “Business Club” cyber crime gang. Plus a great batch of questions, the roundup & more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: HD Video | […]

The post Solving the Flash Plague | TechSNAP 226 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Adobe is making changes to Flash to mitigate 0day exploits, with help from Google. Chrysler recalls 1.4M vehicles due to a software flaw, we go inside the “Business Club” cyber crime gang.

Plus a great batch of questions, the roundup & more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

0day exploits against Flash will be harder thanks to new mitigations

  • Three new exploit mitigations are being added to Adobe’s Flash player in an effort to prevent future exploits
  • The mitigations were developed in a collaboration between Adobe and Google’s Project Zero
  • The mitigations are:
    • “buffer heap partitioning” – Specific types of objects have been moved to an entirely separate heap (the OS Heap instead of the Flash Heap), preventing an overflow in the Flash Heap from ever being able to corrupt those objects. “It’s worth noting that this defense is much more powerful in a 64-bit build of Flash, because of address space limitations of 32-bit processes. This mitigation is now available in the Chrome version of Flash, and is expected to come to all other browsers sometime in August. Now is a good time to upgrade to a 64-bit browser and Flash.”
    • “stronger randomization for the Flash heap” – The flash heap is no longer stores in a predictable location, so it is harder to exploit. In addition, especially on 64-bit platforms, large allocations are further randomized. And older exploit developed by Project Zero used up to a 1GB allocation in order to hit a predictable location. With the large 64bit address space to play with, these allocations can be so far apart that it will be very difficult for an attacker to overflow the flash heap to run into the binary sections.
    • “Vector.<*> length validation secret” – Many of the recent and previous exploits have worked by overwriting the length of the Vector objects, to make them overflow into other areas of memory. The previous two mitigations make it harder to do this, but Adobe have developed a validation technique to detect when the length has been altered unexpectedly. The Adobe mitigation works by storing a “validation secret”, a hash of the correct length and a secret value, the attack doesn’t know the secret value, so cannot write the correct hash, and Flash will exit with a runtime error. This mitigation is available in all Flash builds as of 18.0.0.209.
  • “Had they been widely available earlier, they likely would have blunted the effects of at least some of the three most recent zero-day vulnerabilities”
  • Hopefully these will propagate quickly and reduce the frequency of flash 0 days
  • Google Project Zero Blog Post

1.4M Vehicle Recall After Bug in Chrysler UConnect System

  • Fiat Chrysler Automobiles NV is recalling about 1.4 million cars and trucks equipped with radios that are vulnerable to hacking, the first formal safety campaign in response to a cybersecurity threat.
  • The recall covers about a million more cars and trucks than those initially identified as needing a software patch. The action includes 2015 versions of Ram pickups, Jeep Cherokee and Grand Cherokee SUVs, Dodge Challenger sports coupes and Viper supercars.
  • This isn’t the first time automobiles have been shown to be vulnerable to hacking. What elevates this instance is that researchers were able to find and disable vehicles from miles away over the cellular network that connects to the vehicles’ entertainment and navigation systems.
  • Fiat Chrysler’s UConnect infotainment system uses Sprint Corp.’s wireless network.
  • It’s not a Sprint issue but they have been “working with Chrysler to help them further secure their vehicles”.
  • Unauthorized remote access to certain vehicle systems was blocked with a network-level improvement on Thursday, the company said in a statement. In addition, affected customers will receive a USB device to upgrade vehicles’ software with internal safety features.
  • Senators Edward Markey of Massachusetts and Richard Blumenthal of Connecticut, both Democrats, introduced legislation on July 21 that would direct NHTSA and the Federal Trade Commission to establish rules to secure cars and protect consumer privacy.
  • The senators’ bill would also establish a rating system to inform owners about how secure their vehicles are beyond any minimum federal requirements.
  • Chrysler Recalls
  • After Jeep Hack, Chrysler Recalls 1.4M Vehicles for Bug Fix
  • Fiat Chrysler Automobiles (FCA) Uconnect Vulnerability
  • FCA Uconnect Vulnerability | ICS-CERT

Inside the “Business Club” crime gang

  • Krebs profiles the “Business Club” crime gang, which apparently managed to steal more than $100 million from European banks and businesses
  • The story centers on the “Gameover ZeuS” trojan and botnet. The commercial ZeuS malware had been popular for years for stealing banking credentials, but this was a closely held private version built for himself by the original author
  • “Last year’s takedown of the Gameover ZeuS botnet came just months after the FBI placed a $3 million bounty on the botnet malware’s alleged author — a Russian programmer named Evgeniy Mikhailovich Bogachev who used the hacker nickname “Slavik.””
  • “That changed today with the release of a detailed report from Fox-IT, a security firm based in the Netherlands that secretly gained access to a server used by one of the group’s members. That server, which was rented for use in launching cyberattacks, included chat logs between and among the crime gang’s core leaders, and helped to shed light on the inner workings of this elite group.”
  • “The chat logs show that the crime gang referred to itself as the “Business Club,” and counted among its members a core group of a half-dozen people supported by a network of more than 50 individuals. In true Oceans 11 fashion, each Business Club member brought a cybercrime specialty to the table, including 24/7 tech support technicians, third-party suppliers of ancillary malicious software, as well as those engaged in recruiting “money mules” — unwitting or willing accomplices who could be trained or counted on to help launder stolen funds.”
  • “Business Club members who had access to the GameOver ZeuS botnet’s panel for hijacking online banking transactions could use the panel to intercept security challenges thrown up by the victim’s bank — including one-time tokens and secret questions — as well as the victim’s response to those challenges. The gang dubbed its botnet interface “World Bank Center,” with a tagline beneath that read: “We are playing with your banks.””
  • “The Business Club regularly divvied up the profits from its cyberheists, although Fox-IT said it lamentably doesn’t have insight into how exactly that process worked. However, Slavik — the architect of ZeuS and Gameover ZeuS — didn’t share his entire crime machine with the other Club members. According to Fox-IT, the malware writer converted part of the botnet that was previously used for cyberheists into a distributed espionage system that targeted specific information from computers in several neighboring nations, including Georgia, Turkey and Ukraine.”
  • “Beginning in late fall 2013 — about the time that conflict between Ukraine and Russia was just beginning to heat up — Slavik retooled a cyberheist botnet to serve as purely a spying machine, and began scouring infected systems in Ukraine for specific keywords in emails and documents that would likely only be found in classified documents, Fox-IT found.”
  • The botnet was also used against Turkey
  • “The keywords are around arms shipments and Russian mercenaries in Syria,” Sandee said. “Obviously, this is something Turkey would be interested in, and in this case it’s obvious that the Russians wanted to know what the Turkish know about these things.”
  • “The espionage side of things was purely managed by Slavik himself,” Sandee said. “His co-workers might not have been happy about that. They would probably have been happy to work together on fraud, but if they would see the system they were working on was also being used for espionage against their own country, they might feel compelled to use that against him.”
  • The full Fox-IT report is available as a PDF here

Feedback:


Round Up:


The post Solving the Flash Plague | TechSNAP 226 first appeared on Jupiter Broadcasting.

]]>
Fedora 17 Review | LAS | s22e01 https://original.jupiterbroadcasting.net/19962/fedora-17-review-las-s22e01/ Sun, 27 May 2012 13:04:08 +0000 https://original.jupiterbroadcasting.net/?p=19962 Is Fedora the crazy dancing hippy of Linux distributions? Or just two guys with one Hat? Tune in to find out!

The post Fedora 17 Review | LAS | s22e01 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Is Fedora the crazy dancing hippy of Linux distributions? Or just two guys with one Hat? Tune in to find out!

PLUS: Our thoughts on Linux Mint 13 and how to stash your home folder on it’s own partition!

AND SO MUCH MORE!

All this week on, The Linux Action Show!

Thanks to:

GoDaddy.com

Limited time offer:

New customers 25% off your entire order, code: 25MAY8
Expires: May 31, 2012

Want to save money on your entire order? Use our code LINUX and save 10%!

Direct Download:

HD Video | Mobile Video | Ogg Video | MP3 Audio | Ogg Audio | YouTube | Torrent File

RSS Feeds:

HD Video Feed | Large Video Feed | Mobile Video Feed | MP3 Feed | Ogg Feed | iTunes Feeds | Torrent Feed

Support the Show:

Show Notes:

Runs Linux:

Runs Linux:

Android Pick:

Universal Pick:

Random Distro Of The Day

Linux Action Show Subreddit

Search our past picks:

News:

Fedora 17 Review:

  • The Fedora 17 release criteria: “The install completes, the installed system works”
  • LVM out of the box + Solid advanced installation options are nice to see compared to Ubuntu
  • No Chromium? Is this the 1930s?
  • GNOME 3.4
  • Linux Kernel 3.3
  • Top features for “desktop” users of Fedora 17
  • ABRT back-trace de-duplication service to reduce the number of duplicate bug reports submitted automatically upon experiencing a crash
  • A tool for customizing fonts on a per language-basis on desktops using fontconfig
  • Haskell Platform 2011.4
  • Support for EXT4 file-systems beyond 16 terabytes in size
  • A Non-Uniform Memory Alignment Daemon
  • Virtualization sandbox support
  • Supporting OpenStack’s Quantum virtual networking service
  • Fedora now uses the Unified structure of organizing the file system. It means, that several directories like “/bin”, “/lib” and “/sbin” have been moved to “/usr/bin” etc. respectively.

What’s Bryan Doin?

Chris’ Stash:

Find us on Google+
Find us on Twitter:

Matt’s How-to:

Dedicated Home Partitioning

As you discussed during the howto segment, there is a bit flexibility to setting up your partitions. When setting up partitions for Ubuntu, I recommend the following setup.

  1. Choose Try Ubuntu, then run Gparted.

  2. If you have two drives attached, you will have two drives available from the pull down menu. Select the one you wish to use for your / and swap.

  3. Right click select on the unallocated space, choose new.

  4. With the new dialog open, choose the Ext4 file system, Extended partition, and place swap in the label. For the partition size, choose double the amount of your RAM. If you have 2 Gbs of RAM (2048 Mbs), then make the swap 4 Gbs. This will make you suspending your PC much smoother and lessen the likelihood of system crashing on resume. Leave the other options alone, click Add.

  5. Still with the system drive selected, next you’ll right click on the unallocated space and choose new.

  6. For the partition size, choose the remainder of the space available for that drive. This will be the larger unallocated space available, of the two visible. Select Primary partition, and place / in the label. Leave the other options alone, click Add.

  7. Now go back to top right of Gparted and toggle the second drive you’ve decided to use as a /home partition.

  8. For the partition size, choose the remainder of the space available for that drive. This will be the larger unallocated space available, of the two visible. Select extended partition, and place /home in the label. Leave the other options alone, click Add.

  9. With all of this done, click the green check mark at the top of Gparted. This will apply all of your settings changes.

  10. Start the installer. Click on continue until you come to the Erase everything or Something Else options. Choose Something Else.

  11. You will now see different partitions laid out before you. Below the drive designations, you will see actual “free space” areas, broken up into three sections. The smallest, is your swap. The other two will be your / and /home options.

  12. The smallest free space, should be at the top of the list. Click it, then click on Add.
    The only option you change here is the pulldown menu to select Swap Area. Then click Ok.

  13. The next free space in the list, should be the one I designated as the system partition. Click it, then click on Change. The only options you change here is the Use As Ext4, toggle format and the pulldown menu to select to / . Click Ok.

  14. The last one in the list, is going to be for /home. Click it, then click on Add. Now select the mount point as /home. Click Ok. NOTE: The home partition should only be selected to format is it’s brand new. For future installs, you will want to click on it in this dialog, make sure format is NOT selected, in the future.

  15. Make sure at the bottom of the dialog box, you’ve chosen to place the bootloader in the system selected hard drive. While we can also rely on the /boot option in partitioning, it’s rarely used for home systems.

  16. Now choose Install Now. You’re all done!

Follow the network on Facebook:

Jupiter Broadcasting Forum:

Catch the show LIVE Sunday 10am Pacific / 5pm UTC:

The post Fedora 17 Review | LAS | s22e01 first appeared on Jupiter Broadcasting.

]]>