Patent – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Tue, 17 Dec 2019 07:18:10 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Patent – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Brunch with Brent: Jason Spisak Part 1 | Jupiter Extras 40 https://original.jupiterbroadcasting.net/137857/brunch-with-brent-jason-spisak-part-1-jupiter-extras-40/ Tue, 17 Dec 2019 04:00:00 +0000 https://original.jupiterbroadcasting.net/?p=137857 Show Notes: extras.show/40

The post Brunch with Brent: Jason Spisak Part 1 | Jupiter Extras 40 first appeared on Jupiter Broadcasting.

]]>

Show Notes: extras.show/40

The post Brunch with Brent: Jason Spisak Part 1 | Jupiter Extras 40 first appeared on Jupiter Broadcasting.

]]>
Nmap Level Up | BSD Now 277 https://original.jupiterbroadcasting.net/128526/nmap-level-up-bsd-now-277/ Thu, 20 Dec 2018 07:28:07 +0000 https://original.jupiterbroadcasting.net/?p=128526 ##Headlines ###Open Source Confronts its midlife crisis Midlife is tough: the idealism of youth has faded, as has inevitably some of its fitness and vigor. At the same time, the responsibilities of adulthood have grown. Making things more challenging, while you are navigating the turbulence of teenagers, your own parents are likely entering life’s twilight, […]

The post Nmap Level Up | BSD Now 277 first appeared on Jupiter Broadcasting.

]]>

##Headlines
###Open Source Confronts its midlife crisis

Midlife is tough: the idealism of youth has faded, as has inevitably some of its fitness and vigor. At the same time, the responsibilities of adulthood have grown. Making things more challenging, while you are navigating the turbulence of teenagers, your own parents are likely entering life’s twilight, needing help in new ways from their adult children. By midlife, in addition to the singular joys of life, you have also likely experienced its terrible sorrows: death, heartbreak, betrayal. Taken together, the fading of youth, the growth in responsibility and the endurance of misfortune can lead to cynicism or (worse) drastic and poorly thought-out choices. Add in a little fear of mortality and some existential dread, and you have the stuff of which midlife crises are made…
I raise this not because of my own adventures at midlife, but because it is clear to me that open source — now several decades old and fully adult — is going through its own midlife crisis. This has long been in the making: for years, I (and others) have been critical of service providers’ parasitic relationship with open source, as cloud service providers turn open source software into a service offering without giving back to the communities upon which they implicitly depend. At the same time, open source has been (rightfully) entirely unsympathetic to the proprietary software models that have been burned to the ground — but also seemingly oblivious as to the larger economic waves that have buoyed them.
So it seemed like only a matter of time before the companies built around open source software would have to confront their own crisis of confidence: open source business models are really tough, selling software-as-a-service is one of the most natural of them, the cloud service providers are really good at it — and their commercial appetites seem boundless. And, like a new cherry red two-seater sports car next to a minivan in a suburban driveway, some open source companies are dealing with this crisis exceptionally poorly: they are trying to restrict the way that their open source software can be used. These companies want it both ways: they want the advantages of open source — the community, the positivity, the energy, the adoption, the downloads — but they also want to enjoy the fruits of proprietary software companies in software lock-in and its monopolistic rents. If this were entirely transparent (that is, if some bits were merely being made explicitly proprietary), it would be fine: we could accept these companies as essentially proprietary software companies, albeit with an open source loss-leader. But instead, these companies are trying to license their way into this self-contradictory world: continuing to claim to be entirely open source, but perverting the license under which portions of that source are available. Most gallingly, they are doing this by hijacking open source nomenclature. Of these, the laughably named commons clause is the worst offender (it is plainly designed to be confused with the purely virtuous creative commons), but others (including CockroachDB’s Community License, MongoDB’s Server Side Public License, and Confluent’s Community License) are little better. And in particular, as it apparently needs to be said: no, “community” is not the opposite of “open source” — please stop sullying its good name by attaching it to licenses that are deliberately not open source! But even if they were more aptly named (e.g. “the restricted clause” or “the controlled use license” or — perhaps most honest of all — “the please-don’t-put-me-out-of-business-during-the-next-reInvent-keynote clause”), these licenses suffer from a serious problem: they are almost certainly asserting rights that the copyright holder doesn’t in fact have.
If I sell you a book that I wrote, I can restrict your right to read it aloud for an audience, or sell a translation, or write a sequel; these restrictions are rights afforded the copyright holder. I cannot, however, tell you that you can’t put the book on the same bookshelf as that of my rival, or that you can’t read the book while flying a particular airline I dislike, or that you aren’t allowed to read the book and also work for a company that competes with mine. (Lest you think that last example absurd, that’s almost verbatim the language in the new Confluent Community (sic) License.) I personally think that none of these licenses would withstand a court challenge, but I also don’t think it will come to that: because the vendors behind these licenses will surely fear that they wouldn’t survive litigation, they will deliberately avoid inviting such challenges. In some ways, this netherworld is even worse, as the license becomes a vessel for unverifiable fear of arbitrary liability.
let me put this to you as directly as possible: cloud services providers are emphatically not going to license your proprietary software. I mean, you knew that, right? The whole premise with your proprietary license is that you are finding that there is no way to compete with the operational dominance of the cloud services providers; did you really believe that those same dominant cloud services providers can’t simply reimplement your LDAP integration or whatever? The cloud services providers are currently reproprietarizing all of computing — they are making their own CPUs for crying out loud! — reimplementing the bits of your software that they need in the name of the service that their customers want (and will pay for!) won’t even move the needle in terms of their effort.
Worse than all of this (and the reason why this madness needs to stop): licenses that are vague with respect to permitted use are corporate toxin. Any company that has been through an acquisition can speak of the peril of the due diligence license audit: the acquiring entity is almost always deep pocketed and (not unrelatedly) risk averse; the last thing that any company wants is for a deal to go sideways because of concern over unbounded liability to some third-party knuckle-head. So companies that engage in license tomfoolery are doing worse than merely not solving their own problem: they are potentially poisoning the wellspring of their own community.
in the end, open source will survive its midlife questioning just as people in midlife get through theirs: by returning to its core values and by finding rejuvenation in its communities. Indeed, we can all find solace in the fact that while life is finite, our values and our communities survive us — and that our engagement with them is our most important legacy.

  • See the article for the rest

###Donald Knuth – The Yoda of Silicon Valley

For half a century, the Stanford computer scientist Donald Knuth, who bears a slight resemblance to Yoda — albeit standing 6-foot-4 and wearing glasses — has reigned as the spirit-guide of the algorithmic realm.
He is the author of “The Art of Computer Programming,” a continuing four-volume opus that is his life’s work. The first volume debuted in 1968, and the collected volumes (sold as a boxed set for about $250) were included by American Scientist in 2013 on its list of books that shaped the last century of science — alongside a special edition of “The Autobiography of Charles Darwin,” Tom Wolfe’s “The Right Stuff,” Rachel Carson’s “Silent Spring” and monographs by Albert Einstein, John von Neumann and Richard Feynman.
With more than one million copies in print, “The Art of Computer Programming” is the Bible of its field. “Like an actual bible, it is long and comprehensive; no other book is as comprehensive,” said Peter Norvig, a director of research at Google. After 652 pages, volume one closes with a blurb on the back cover from Bill Gates: “You should definitely send me a résumé if you can read the whole thing.”
The volume opens with an excerpt from “McCall’s Cookbook”:

Here is your book, the one your thousands of letters have asked us to publish. It has taken us years to do, checking and rechecking countless recipes to bring you only the best, only the interesting, only the perfect.

Inside are algorithms, the recipes that feed the digital age — although, as Dr. Knuth likes to point out, algorithms can also be found on Babylonian tablets from 3,800 years ago. He is an esteemed algorithmist; his name is attached to some of the field’s most important specimens, such as the Knuth-Morris-Pratt string-searching algorithm. Devised in 1970, it finds all occurrences of a given word or pattern of letters in a text — for instance, when you hit Command+F to search for a keyword in a document.
Now 80, Dr. Knuth usually dresses like the youthful geek he was when he embarked on this odyssey: long-sleeved T-shirt under a short-sleeved T-shirt, with jeans, at least at this time of year. In those early days, he worked close to the machine, writing “in the raw,” tinkering with the zeros and ones.

  • See the article for the rest

##News Roundup
###Let’s Encrypt: Certbot For OpenBSD’s httpd

  • Intro

Let’s Encrypt is “a free, automated, and open Certificate Authority”.
Certbot is “an easy-to-use automatic client that fetches and deploys SSL/TLS certificates for your web server”, well known as “the official Let’s Encrypt client”.
I remember well how excited I felt when I read Let’s Encrypt’s “Our First Certificate Is Now Live” in 2015.
How wonderful the goal of them is; it’s to “give people the digital certificates they need in order to enable HTTPS (SSL/TLS) for websites, for free” “to create a more secure and privacy-respecting Web”!
Since this year, they have begun to support even ACME v2 and Wildcard Certificate!
Well, in OpenBSD as well as other operating systems, it’s easy and comfortable to have their big help 😊

  • Environment
  • OS: OpenBSD 6.4 amd64
  • Web Server: OpenBSD’s httpd
  • Certification: Let’s Encrypt with Certbot 0.27
  • Reference: OpenBSD’s httpd

###FreeBSD 12 released: Here is how to upgrade FreeBSD 11 to 12

The FreeBSD project announces the availability of FreeBSD 12.0-RELEASE. It is the first release of the stable/12 branch. The new version comes with updated software and features for a wild variety of architectures. The latest release provides performance improvements and better support for FreeBSD jails and more. One can benefit greatly using an upgraded version of FreeBSD.

FreeBSD 12.0 supports amd64, i386, powerpc, powerpc64, powerpcspe, sparc64, armv6, armv7, and aarch64 architectures. One can run it on a standalone server or desktop system. Another option is to run it on Raspberry PI computer. FreeBSD 12 also runs on popular cloud service providers such as AWS EC2/Lightsail or Google compute VM.

  • New features and highlights:

  • OpenSSL version 1.1.1a (LTS)

  • OpenSSH server 7.8p1

  • Unbound server 1.8.1

  • Clang and co 6.0.1

  • The FreeBSD installer supports EFI+GELI as an installation option

  • VIMAGE FreeBSD kernel configuration option has been enabled by default. VIMAGE was the main reason I custom compiled FreeBSD for the last few years. No more custom compile for me.

  • Graphics drivers for modern ATI/AMD and Intel graphics cards are now available in the FreeBSD ports collection

  • ZFS has been updated to include new sysctl(s), vfs.zfs.arc_min_prefetch_ms and vfs.zfs.arc_min_prescient_prefetch_ms, which improve performance of the zpool scrub subcommand

  • The pf packet filter is now usable within a jail using vnet

  • KDE updated to version 5.12.5

  • The NFS version 4.1 includes pNFS server support

  • Perl 5.26.2

  • The default PAGER now defaults to less for most commands

  • The dd utility has been updated to add the status=progress option to match GNU/Linux dd command to show progress bar while running dd

  • FreeBSD now supports ext4 for read/write operation

  • Python 2.7

  • much more


###Six Ways to Level Up Your nmap Game

nmap is a network exploration tool and security / port scanner.
If you’ve heard of it, and you’re like me, you’ve most likely used it like this:
ie, you’ve pointed it at an IP address and observed the output which tells you the open ports on a host.
I used nmap like this for years, but only recently grokked the manual to see what else it could do. Here’s a quick look and some of the more useful things I found out.

    1. Scan a Network
    1. Scan All Ports
    1. Get service versions
    1. Use -A for more data
    1. Find out what nmap is up to
    1. Script your own scans with NSE

###[NetBSD Desktop]


##Beastie Bits


##Feedback/Questions


  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv

The post Nmap Level Up | BSD Now 277 first appeared on Jupiter Broadcasting.

]]>
Android’s Leaky Sandbox | Tech Talk Today 35 https://original.jupiterbroadcasting.net/63377/androids-leaky-sandbox-tech-talk-today-35/ Wed, 30 Jul 2014 09:31:13 +0000 https://original.jupiterbroadcasting.net/?p=63377 An Android flaw from 2010 allows any app to break out of the Android sandbox. But is it really a threat in practice? We’ll dig in. The Podcast patent troll takes it on the nose, and some highlights from the Gnome development conference this week. Direct Download: MP3 Audio | OGG Audio | Video | […]

The post Android's Leaky Sandbox | Tech Talk Today 35 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

An Android flaw from 2010 allows any app to break out of the Android sandbox. But is it really a threat in practice? We’ll dig in.

The Podcast patent troll takes it on the nose, and some highlights from the Gnome development conference this week.

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed

Become a supporter on Patreon:

Foo

Show Notes:

Android crypto blunder exposes users to highly privileged malware | Ars Technica

This is the issue in a nutshell.

The Fake ID vulnerability stems from the failure of Android to verify the validity of cryptographic certificates that accompany each app installed on a device. The OS relies on the credentials when allocating special privileges that allow a handful of apps to bypass Android sandboxing. Under normal conditions, the sandbox prevents programs from accessing data belonging to other apps or to sensitive parts of the OS. Select apps, however, are permitted to break out of the sandbox. Adobe Flash in all but version 4.4, for instance, is permitted to act as a plugin for any other app installed on the phone, presumably to allow it to add animation and graphics support. Similarly, Google Wallet is permitted to access Near Field Communication hardware that processes payment information.

The App simply needs to claim its Adobe flash, and it gets to break out of the sandbox.


The flaw appears to have been introduced to Android through an open source component, Apache Harmony. Google turned to Harmony as an alternative means of supporting Java in the absence of a deal with Oracle to license Java directly.

Work on Harmony was discontinued in November, 2011. However, Google has continued using native Android libraries that are based on Harmony code. The vulnerability concerning certificate validation in the package installer module persisted even as the two codebases diverged.

Google’s Response to Ars

After receiving word of this vulnerability, we quickly issued a patch that was distributed to Android partners, as well as to AOSP. Google Play and Verify Apps have also been enhanced to protect users from this issue. At this time, we have scanned all applications submitted to Google Play as well as those Google has reviewed from outside of Google Play, and we have seen no evidence of attempted exploitation of this vulnerability.

The Reality of the Situation

First, a patch been sent to OEMs and AOSP, but with Android’s abysmal update situation, this is a moot point. The crux, however, lies with Google Play and Verify Apps. These have already been updated to detect this issue, and prevent applications that try to abuse this flaw from being installed. This means two things.

First, that there are no applications in Google Play that exploit this issue. If you stick to Google Play, you’re safe from this issue, period. No ifs and buts. Second, even if you install applications from outside of Google Play, you are still safe from this issue. Verify Apps is part of Play Services, and runs on every Android device from 2.3 and up. It scans every application at install and continuously during use for suspect behaviour. In this case, an application that tries to exploit this flaw will simply be blocked from installing or running.

A new Android design error discovered by Bluebox Security allows malicious apps to grab extensive control over a user’s device without asking for any special permissions at installation. The problem affects virtually all Android phones sold since 2010.

The vulnerability in the Android code that allows “Fake ID” in was first noticed in the now dormant Adobe Flash integration, which had been present since 2010 and was only patched with the arrival of Android 4.4 Kitkat earlier this year. The flaw is so deeply embedded in Android that it can affect all forks of the Android Open Source Project including Amazon’s Fire OS.

Dubbed “Fake ID,” the vulnerability allows malicious applications to impersonate specially recognized trusted applications without any user notification. This can result in a wide spectrum of consequences. For example, the vulnerability can be used by malware to escape the normal application sandbox and take one or more malicious actions: insert a Trojan horse into an application by impersonating Adobe Systems; gain access to NFC financial and payment data by impersonating Google Wallet; or take full management control of the entire device by impersonating 3LM.

Podcasting patent troll: We tried to drop lawsuit against Adam Carolla | Ars Technica

In a statement released today, Personal Audio says that Carolla, who has raised more than $450,000 from fans to fight the case, is wasting their money on an unnecessary lawsuit. The company, which is a “patent troll” with no business other than lawsuits, has said Carolla just doesn’t care since his fans are paying his lawyers’ bills.

Adam Carolla’s assertions that we would destroy podcasting were ludicrous on their face,” said Personal Audio CEO Brad Liddle. “But it generated sympathy from fans and ratings for his show.


According to Personal Audio, they’ve lost interest in suing podcasters because the podcasters—even one of Adam Carolla’s size—just don’t make enough money for it to care.

[Personal Audio] was under the impression that Carolla, the self-proclaimed largest podcaster in the world, as well as certain other podcasters, were making significant money from infringing Personal Audio’s patents,” stated the company. “After the parties completed discovery, however, it became clear this was not the case.”


Personal Audio also says it has a patent covering playlists.


Personal Audio has already dropped its lawsuits against two other podcasting defendants from the case (Togi Net and How Stuff Works) apparently without getting paid anything.

The patent company is charging ahead with its patent case against the big three television networks, CBS, NBC, and ABC. Personal Audio is trying to wring a royalty from those companies for releasing video “episodic content” over the Internet.

In response, Carolla sent Ars a statement saying he’ll continue to pursue counterclaims against Personal Audio, seeking to invalidate the patent “so that Personal Audio cannot sue other podcasters for infringement of US Patent 8,112,504.” Lotzi (Carolla’s company) has already “incurred hundreds of thousands of dollars in fees and expenses to defend itself” against the Personal Audio patents.

GUADEC 2014, Day Four: Hardware, New IDE for GNOME | Fedora Magazine

The fourth day of GUADEC was devoted to hardware and its interaction with desktop. The first talk was “Hardware Integration, The GNOME Way” by Bastien Nocera who has been a contributor to GNOME and Fedora for many years.

Performance Testing on Actual Hardware

Owen Taylor talked on continuous integration performance testing on actual hardware. According to Owen, continuous performance testing is very important. It helps find performance regressions more easily because the delta between the code tested last time and the code tested now is much smaller, thus there are much fewer commits to investigate.

He noted that desktop performance testing in VMs is not very useful which is why he has several physical machines that are connected to a controller which downloads new builds of GNOME Continuous and installs them on the connected machines. The testing can be controlled by GNOME Hardware Testing app Owen has created. And what is tested?


Here are currently used metrics:

  • time from boot to desktop
  • time redraw entire empty desktop
  • time to show overview
  • time to redraw overview with 5 windows
  • time to show application picker
  • time to draw frame from test application, time to start gedit.

Tests are scripted right in the shell (javascript) and events logged with timestamp. The results are uploaded to perf.gnome.org. In the future, he’d like to have results in the graph linked to particular commits (tests are triggered after very commit), have more metrics (covering also features in apps), assemble more machines and various kinds of them (laptops, ARM devices,…).


Builder: a new IDE for GNOME

The last talk of the day was “Builder, a new IDE for GNOME” by Christian Hergert. Christian started the talk by clearly stating what Builder is not intended to be: a generic IDE (use Eclipse, Anjuta, MonoDevelop,… instead). And it most likely won’t support plugins. Builder should be an IDE specializing on GNOME development.

Here are some characteristics of Builder:

  • components are broken into services and services are contained in sub-processes,
  • uses basic autotools management,
  • source editor uses GtkSourceView,
  • has code highlighting, auto-completation,
  • cross-reference, change tracking,
  • snippets,
  • auto-formatting,
  • distraction free mode.
  • Vim/Emacs integration may be possible.
  • The UI designer will use Glade and integrate GTK+ Inspector.
  • Builder will also contain resource manager, simulator (something similar to Boxes, using OSTree), debugger, profiler, source control.

After naming all Builder’s characteristics Christian demoed a prototype.

For Later Reading Pick:

Feedback:

Hey Guys at Jupiter Broadcasting. Just wanted to put a bit more info to you that I saw on Tech Talk Today about the Copyright Act that’s being brought into Australia. Someone mentioned that “Netflix could come in” and make some serious mone. Netflix would be awesome if our Internet Infrastructure wasnt at a maximum of 12Mbps speeds (If you are lucky).

On a good day (and ive got some of the best net here) i get around 8mbps down. Netflix wouldn’t be viable because it wouldnt be available to even 30% of the country. We have Foxtel (like SKY / Cable) which is Premium Paid TV and costs a FORTUNE. It’s still not viable.

In regards to the Copyrighting, the Government also has it all wrong. The number one reason that I am always told by people I know as to why they pirate TV shows, movies and Games, is that the pricing of this stuff over here is unbelievable. For instance, the box set of Star Trek : The Next Generation will cost you over US$250 if you convert the costs, depending if its on special / discount or not.

Either way, you guys were spot on. Keep up the great work, Love the show, and a big shoutout from Australia! CRICKEY! ( we dont actually say that, so don’t get fooled by the stereotype). And no I don’t have a pet Kangeroo (not anymore).

The post Android's Leaky Sandbox | Tech Talk Today 35 first appeared on Jupiter Broadcasting.

]]>
Google Local Delivery | Tech Talk Today 21 https://original.jupiterbroadcasting.net/61707/google-local-delivery-tech-talk-today-21/ Mon, 07 Jul 2014 09:37:16 +0000 https://original.jupiterbroadcasting.net/?p=61707 Google’s big express shopping plans start to see the light of day, Apple has a new iPhone patent that might sound a little familiar. Then we play some clips from a Fireside Chat with Google co-founders, Larry Page and Sergey Brin. Find out their thoughts on the future of self driving cars, Google getting into […]

The post Google Local Delivery | Tech Talk Today 21 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Google’s big express shopping plans start to see the light of day, Apple has a new iPhone patent that might sound a little familiar.

Then we play some clips from a Fireside Chat with Google co-founders, Larry Page and Sergey Brin. Find out their thoughts on the future of self driving cars, Google getting into Health and more!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed

Become a Tech Talk Today supporter on Patreon:

Foo

Show Notes:

— Headlines —

Inside Google Shopping Express’ Big Plan to Race Amazon to Your Door | Re/code

Shopping Express. The service lets shoppers buy things from local retail stores through Google, which then delivers them to consumers from the physical retail store on the same or next day.

A source familiar with the company’s plans says senior Google execs have set aside as much as $500 million to expand the service nationwide. Google declined to comment on the size of the investment but made no secret of its ambition.

Google’s Fallows said a major goal of the initiative is to add more utility to product search advertisements on Google.com. On Amazon, you search for a product and can buy it immediately. On Google, that hasn’t been the case.

Eventually, Google may include some type of notification on product search ads letting shoppers know that a given product is available for same-day delivery, Fallows said.

Shoppers in cities where the service is available — mainly areas around San Francisco, Los Angeles and New York City for now — visit a dedicated Google Shopping Express website where they can choose to buy goods like groceries, cameras and clothing from a selection of retail partners.

Apple developing system to automatically unlock iPhone at home

The system works by identifying where the iPhone is and allows users to set “safe” locations, where settings including security can be automatically changed removing the need for a passcode or Touch ID, for example.

“Based on the detected current location, the mobile device can modify settings and configurations. Security settings are one example of device behaviour that can be modified in accordance with embodiments of the present invention,” said Apple in the patent filing.

The patent could see iPhones unlocked within the vicinity of the home but locked while out on the street. The smartphone could determine its location using mobile phone signal, Wi-Fi networks, GPS, Bluetooth or the phone’s proximity to other phones.

At least two location indicators will be required to verify location and create the changes in security or other software features.

The patent also describes a system that could change a user’s home screen depending on where the phone is, with work related apps front and foremost when in the office or games and TV apps when in the home.

Fireside chat with Google co-founders, Larry Page and Sergey Brin | Khosla Ventures

At the annual KV CEO Summit, we were fortunate to have both Larry Page and Sergey Brin sit down to discuss a wide range of topics including the acquisition that never was (although not for lack of trying!), why computers today are still pretty bad, their partnership over the last 16 years, the future of Google, government 2.0 and how machine learning and technology will shape our future of abundance.

He acknowledged, however, that people need “things to do” and “need to feel like you’re needed,” desires that are fulfilled through labor. One solution he offered: reduce the work week and perhaps split one full-time job into multiple part-time jobs.

“You just reduce work time,” Page said. “Most people, if I ask them, ‘Would you like an extra week of vacation?’ They raise their hands, 100% of the people. ‘Two weeks vacation, or a four-day work week?’ Everyone will raise their hand. Most people like working, but they’d also like to have more time with their family or to pursue their own interests. So that would be one way to deal with the problem, is if you had a coordinated way to just reduce the workweek. And then, if you add slightly less employment, you can adjust and people will still have jobs.”

The post Google Local Delivery | Tech Talk Today 21 first appeared on Jupiter Broadcasting.

]]>
Toolchain Transitions | CR 70 https://original.jupiterbroadcasting.net/44217/toolchain-transitions-cr-70/ Mon, 07 Oct 2013 11:42:22 +0000 https://original.jupiterbroadcasting.net/?p=44217 Mike’s making some big changes to his workflow, and sharing the tools in his box. We’ll look at the transition to Ubuntu Linux for Mike and his dev team.

The post Toolchain Transitions | CR 70 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Mike’s making some big changes to his workflow, and sharing the tools in his box. We’ll look at the transition to Ubuntu Linux for Mike and his dev team, and the productivity advantages they see.

Plus planning for scale, a fresh look at Vala, your emails, and more!

Thanks to:


\"GoDaddy\"


\"Ting\"

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

Feedback

  • \”Analysis: IT experts question architecture of Obamacare website\” https://feedly.com/k/1bNQUvF

Not only did the exchanges not work as expected, are full of bugs, but… on top of all that … the government could not even hire a domestic contractor for all this. CGI Inc., is the Canadian contractor who built the health care website.. wow…
-SnakeDoc

Workflow / Why Open-Source?

The Unix philosophy, originated by Ken Thompson, is a set of cultural norms and philosophical approaches to developing small yet capable software based on the experience of leading developers of the Unix operating system. The Unix philosophy emphasizes building short, simple, clear, modular, and extendable code that can be easily maintained and repurposed by developers other than its creators.

Xubuntu is perfect for those who want the most out of their desktops, laptops and netbooks with a modern look and enough features for efficient, daily usage. It works well on older hardware too.

Book Pick

[asa]B00080W3IE[/asa]

The post Toolchain Transitions | CR 70 first appeared on Jupiter Broadcasting.

]]>
With Apologies to Texas | CR 69 https://original.jupiterbroadcasting.net/43867/with-apologies-to-texas-cr-69/ Mon, 30 Sep 2013 10:53:49 +0000 https://original.jupiterbroadcasting.net/?p=43867 Mike and Chris chew on the major problems patent trolls are creating for small and large development shops.

The post With Apologies to Texas | CR 69 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Mike and Chris chew on the major problems patent trolls are creating for small and large development shops.

Then it’s a race to the bottom for software prices, and the guys have a few theories on what, if anything, developers can do to carve out a living.

Thanks to:


\"GoDaddy\"


\"Ting\"

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

— Feedback —

— Dev Hoopla —

Unfortunately, Apple has just been booted out of court. As Ars Technica explains, the federal judge overseeing the Texas case ruled that Apple\’s motion only applies to seven specific app maker defendants — and Lodsys has just reached settlements with all seven.

As reported by GigaOm_, _Martha Stewart Living Omnimedia (MSLO) has filed a complaint in a Wisconsin federal court against Lodsys. The patent trolling company had apparently contacted Stewart\’s corporation, claiming that four of her iPad magazines infringed on a number of Lodsys patents and asking for $5,000 for each offending magazine to license the allegedly infringing technology. Unlike the small app developers that Lodsys typically preys on, however, Stewart\’s company isn\’t interested in playing ball. The civil action filed this week asks the court for a \”declaratory judgement\” against Lodsys — MSLO wants the court to affirm that none of its iPad magazines infringe upon any of Lodsys\’ patents.

The Personal Audio lawsuit that is furthest along is its case against CBS, NBC, HowStuffWorks, and TogiNet. It\’s scheduled for trial in 2014. TogiNet, the least-known defendant in that group, is based in Tyler, Texas. It seems likely that the company was added to Personal Audio\’s litigation to maintain venue in the Eastern District of Texas.

In May, the Electronic Frontier Foundation had a successful fund-raiser to fight Personal Audio\’s podcasting patent at the US Patent and Trademark Office. \”We\’re preparing a petition challenging the so-called \’podcast\’ patent and will be filing it soon,\” said EFF attorney Daniel Nazer.

After Realmac Software had released Clear for iOS 7 as a new paid app, the outcry from existing users quickly made them change their mind about the pricing model. Now they are offering the iOS 7 upgrade for free to existing Clear users on the iPhone, while only charging for the new universal app. This in turn caused other developers to complain about Realmac Software for giving in and participating in the downward price spiral.

— Tool of the Week —

Napkin is the ultimate tool for concise visual communication. Painlessly create visual notes and diagrams and share the results quickly.

Follow the show

The post With Apologies to Texas | CR 69 first appeared on Jupiter Broadcasting.

]]>
Cyber Cold War | Unfilter 38 https://original.jupiterbroadcasting.net/32147/cyber-cold-war-unfilter-38/ Wed, 20 Feb 2013 22:50:52 +0000 https://original.jupiterbroadcasting.net/?p=32147 A clandestine Chinese military unit has conducted sophisticated cyber espionage operations against hundeds of companies, we dig to the bottom of this story.

The post Cyber Cold War | Unfilter 38 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A clandestine Chinese military unit has conducted sophisticated cyber espionage operations against dozens of American and Canadian companies, we dig to the bottom of this story and share our insights.

A 75 year old Soybean farmer is fighting Monsanto all the way to the US Supreme court, but things are not looking good for the farmer.

Then it’s our first review of the blockbuster show politicians are gearing up for, the Horse Meat Scandal Trots Along, and how the media attacked video games again this week.

Plus your feedback, and much much more on this week’s Unfilter.

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

HD Feed | Mobile Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

\"\"

Thanks for Supporting Unfilter:

  • Caspar
  • Austin

  • Thanks to our 27 Unfilter supporters!

  • New supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience.

A spot buy meant to take advantage of the big deliveries for a breaking news story like the Fukushima Daiichi nuclear power plant disaster in Japan won\’t necessarily be as comfortable a fit as a :30 that airs during a space shuttle launch or ticker-tape parade, but CNN will still sell it at a premium.


— Soybean Farmers Monsanto Lawsuit Reaches US Supreme Court —

Supreme Court justices suggest they would agree with Monsanto that its patent protection covers not just the first planting but also seeds generated later.

\”Without the ability to limit reproduction of soybeans containing this patented trait,\” he said, \”Monsanto could not have commercialized its invention and never would have produced what is, by now, the most popular agricultural technology in America.\”


— Horse Meat Labelled as Beef Scandal Trots Along —

First centered on Britain and Ireland, the scandal over beef products adulterated with horse meat escalated across Continental Europe on Tuesday after Nestlé, one of the world’s best-known food companies, said it was removing pasta meals from store shelves in Italy and Spain.


— The so Called Sequester Battle —

With just a little over a week to avert them, it appears increasingly likely the $1.2 trillion in so-called sequester cuts will go into effect.

Unofficially, many members of Congress are betting that a few weeks into the automatic spending cuts, Democratic and Republican leaders will get serious about negotiating a replacement to the sequestration and the $85 billion in spending cuts will not have had time to really bite.


— US Businesses Under Sustained CYBER ATTACK!!oneone!! —

The report by computer security firm Mandiant Corp. in Alexandria, Va., breaks new ground by attributing attacks against 141 companies to a specific 12-story office building in the financial center of Shanghai.

Shanghai security officers chase a CNN crew attempting to record a building at the center of hacking allegations

Chinese officials have insisted in recent years that China is one of the biggest targets of cyberattacks.

\”Statistics show that Chinese military terminals connected to the Internet have been subjected to large numbers of attacks from abroad,\” the defense ministry said Wednesday, adding that Internet protocol addresses \”indicate that a considerable number of these attacks are from the United States, but we have never used this as a reason to accuse the United States.\”

\”Every country should handle the problem of cybersecurity in a professional and responsible manner,\” the ministry said.

A look at Mandiant, allegations on China hacking – SFGate

  • Headquartered in Alexandria, Va., Mandiant was started in 2004 by Kevin Mandia, a retired Air Force officer who carved out a lucrative niche investigating computer crimes.

  • Mandiant was most recently noted for its work in helping The New York Times trace an attack on its employees\’ computers to China, following a Times investigation into China\’s Premier Wen Jiabao. The newspaper publicly acknowledged Mandiant\’s role in the case.

  • Mandiant alleges that it has traced a massive hacking campaign on U.S. businesses to a drab, white 12-story office building outside Shanghai run by \”Unit 61398\” of the People\’s Liberation Army. The report contains some of the most extensive and detailed accusations on China\’s cybersnooping publicly available, including a timeline and details of malware used.

  • Mandiant has an obvious commercial interest in releasing the information, too. The company said its existing customers were already warned about and protected against the techniques it discovered, and it offered a free software tool to companies and organizations to detect suspicious activity. It puts Mandiant front-and-center at a critical time on a national debate about cybersecurity.

  • Its founder testified earlier this month to the House Intelligence Committee on hacking threats.

  • Read the full report PDF

  • U.S. Govt: Cyberattacks a \’Substantial\’ Concern – YouTube


— Adam Lanza Reportedly Used Violent Video Games to Hone Killing Skills —

A blacked-out gaming room helped Newtown, Conn., shooter Adam Lanza descend into his own world, CBS News senior correspondent John Miller, a former FBI assistant director, said on \”CBS This Morning.\”

\”During an ongoing criminal investigation, we do not release bits and pieces of a case, we simply don\’t do it so anyone that sees any information that indicates that it is associated with this case, and see \”sources,\” being the source of information, should be take a step back,\” said Lt. Vance.


— US General Allen retires —

The American general tipped to become the next head of NATO has decided instead to retire. The decision came after a scandal linking him to inappropriate emails to a woman. General John Allen was nominated for the job after running the war in Afghanistan for 19 months.


Feedback:

Call us: 1.425.312.1756

Follow the Us:

The post Cyber Cold War | Unfilter 38 first appeared on Jupiter Broadcasting.

]]>
Self Healing Internet | TechSNAP 76 https://original.jupiterbroadcasting.net/24846/self-healing-internet-techsnap-76/ Thu, 20 Sep 2012 16:42:00 +0000 https://original.jupiterbroadcasting.net/?p=24846 The story about an antivirus that detects itself, IE’s awful zero day exploits, and the Internets amazing ability to route around problems.

The post Self Healing Internet | TechSNAP 76 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The story about an antivirus that detects itself, IE’s awful zero day exploits, and the Internets amazing ability to route around problems.

Plus: A huge batch of your feedback, and so much more in this week’s episode of TechSNAP!

Thanks to:

Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

SPECIAL OFFER! Save 20% off your order!
Code: go20off5

Pick your code and save:
techsnap7: $7.49 .com
techsnap10: 10% off
techsnap11: $1.99 hosting for the first 3 months
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans
techsnapx: 20% off .xxx domains

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Sophos anti-virus detects it self

  • Earlier this week Sophos released a scheduled update to their anti-virus definition files
  • The new definitions detected the Sophos updating process, and a number of other auto-updating applications, as variants of the malware Shh/Updater-B
  • In addition to setting of a huge volume of false positives, the detection also resulted in the quarantine, blocking or deletion of parts of the Sophos updater
  • The updated definitions that solve the problem were released on Wed, 19 Sep 2012 21:32 BST
  • However, the updated definitions could not be downloaded by Sophos, because the updater had been broken
  • This is an especially large issue for enterprise deployments of Sophos
  • The Sophos support number was down, the call volume was so great that most people could not even get into the hold queue

0-day Flaw in Internet Explorer active in the wild

  • Internet Explorer versions 6 through 9 are vulnerable to a new series of attacks
  • Exploits for a previously unknown use-after-free memory corruption vulnerability, in addition to three more exploits that were found and tied to a hacker group in China known as Nitro (the same group responsible for exploits of two zero-day Java flaws disclosed three weeks ago)
  • Security researcher Eric Romang discovered the first of the exploits last weekend while monitoring an infected server
  • When a user lands on an infected page, the exploit installs the PoisonIvy remote access Trojan
  • Jaime Blasco of AlienVault Labs then discovered three additional exploits, one of which drops the PlugX trojan
  • The new exploits appear to be targeted at defense contractors in the U.S. and India
  • An unknown exploit was found in a Defense News Portal site in India, it had been served for at least four days
  • Microsoft is slated to release a patch on Friday , until then, a ‘fixit’ patch is available
  • A new metasploit module to test for and exploit the vulnerability has been released
  • Additional Coverage

The “top secret” room where 260 Internet Service Providers connect

  • Nearly every carrier neutral data center in the world contains a MeetMe room
  • MeetMe rooms more often used for private peering, rather than internet transit
  • Transit is when you buy ‘Internet’ service from another provider, they provide you with a ‘default route’ that you can send traffic to, and it will be delivered to anywhere on the internet
  • Peering is where providers swap traffic that is specifically destin to each others networks, so if Provider A peers with Provider B, Provider A must use their transit connection to reach provider C, only traffic between A and B (and their customers) are allowed across the ‘peering’ link
  • If 1 Wilshire (the building in question) were to go entirely offline, all connections in and out severed, the Internet would continue to operate, traffic would be routed around the missing nodes
  • Performance would be degraded, and it is possible that some of the ‘backup’ routes could not handle all of the traffic, but the network would not cease to work
  • The Internet is based on the principle of being able to get data from Point A to any Point B, reliably
  • To do this, the Internet’s backbone providers use BGP4 routing protocol (Border Gateway Protocol)
  • Most Internet Transit providers have maps that look like this:
  • nLayer
  • Hurricane Electric
  • Abovenet (Zayo)
  • Level3
  • NTT
  • Vocus (Australian)
  • As you can see on most all of these maps, there are almost always multiple paths that a packet can take to get from point A to point B

Feedback:

Special Community Events

  • Lynx Music:

He goes by Illusionist Lynx and he’s used MATH to make music (and a bunch of ther cool methods) check out his pay-what-you-want music on his bandcamp site: Illusionist Lynx

  • Nicholas is getting married, and he needs your HELP!

Nicholas is live streaming his marriage proposal, and hopes to have the JB audience tune in, and maybe help get his girl friend to the right location!

The site people can visit is https://rachelwillyoumarryme.com/

  • Visit his site an hour before the event (countdown on his website)
  • When the call to action comes, help him spam his girlfriend into arriving at the correct location.
  • To help organize, show up early and watch the show’s subreddit!

Have some fun:

What I wish the new hires “knew”

Round-Up:

The post Self Healing Internet | TechSNAP 76 first appeared on Jupiter Broadcasting.

]]> Simple File Sharing | LAS | s18e09 https://original.jupiterbroadcasting.net/12518/simple-file-sharing-las-s18e09/ Sun, 02 Oct 2011 13:53:37 +0000 https://original.jupiterbroadcasting.net/?p=12518 Find out how easy it is to share files under Linux, even if you want to do it like a pro! Plus our picks for quick and simple file sharing, and a lot more!

The post Simple File Sharing | LAS | s18e09 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

HTC is exposing private information about Android users, and we bust out our ACTION RAGE! Plus Gnome 3.2 is out, find out whats new, and Microsoft kicks things up to a full assault against Android, we share the details!

Then – Find out how easy it can be share files under Linux, even if you want to do it like a pro! Plus our picks for quick and simple file sharing, and a whole lot more!

All this week on, The Linux Action Show!

Thanks to:

GoDaddy.com Use our codes LINUX to save 10% at checkout, or LINUX20 to save 20% on hosting!

Direct Episode Download Links:

HD Video | Large Video | Mobile Video | MP3 | OGG Audio | OGG Video | WebM Video | YouTube


[ad#shownotes]

Episode Show Notes:

Runs Linux:

Autonomous Flying Robots Flock Like Birds, Runs Linux

Android Pick:

Universal Pick:

Poll:

  • Should LAS go Season less? https://poll.fm/3aze7


News:

Debian is winning the Upstream War

  • Debian has ~108 (~42 of Ubuntu) to Redhat’s ~46 forks
  • Redhat’s RPM package system, while a popular standard, suffers from a number of issues
  • Redhat uses the YellowDog update manager, which solves some of the
  • Debian’s APT handles dependencies much better
  • Both suffer from a plethora of different ‘repositories’ as compared to FreeBSD’s single repository for all versions and architectures.
Linux File Sharing

Find us on Google+

Find us on Twitter:

Follow the network on Facebook:

Catch the show LIVE at 2:30pm PDT / 5:30 EDT / 9:30pm UTC Thursday Oct 6th:

The post Simple File Sharing | LAS | s18e09 first appeared on Jupiter Broadcasting.

]]>
Ultimate File Server | TechSNAP 25 https://original.jupiterbroadcasting.net/12458/ultimate-file-server-techsnap-25/ Thu, 29 Sep 2011 18:35:26 +0000 https://original.jupiterbroadcasting.net/?p=12458 We share our insights are setting up the ultimate network file server, plus have you ever been curious how hackers pull off massive security breaches?

The post Ultimate File Server | TechSNAP 25 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Coming up on this week’s on TechSNAP…

Have you ever been curious how hackers pull off massive security breaches? This week we’ve got the details on a breach that exposed private data of 35 millions customers.

Plus MySQL.com spreads custom malware tailored just for your system, and the details are amazing!

On top of all that, we’ll share our insights are setting up the ultimate network file server!

Direct Download Links:

HD Video | Large Video | Mobile Video | WebM | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:

[ad#shownotes]

Show Notes:

South Korea’s SK Telecom hacked, detailed forensics released

  • Between July 18th and 25th, SK Telecom’s systems were compromised, and all of their customer records (35 million customers) were compromised. The records included a wealth of information, including username, password, national ID number, name, address, mobile phone number and email address.
  • The attack was classified as an Advanced Persistent Threat, the attackers compromised 60 computers at SK Telecom in total, biding their time until they could compromise the database. Data was exchanged between the compromised computers at SK Telecom, and a server at a Taiwanese publishing company that had been compromised by the attackers at an earlier date.
  • The attack was very sophisticated, specifically targeted, and also seems to indicate a degree of knowledge about the the target. The well organized attackers managed to compromise the software updates server of another company (ESTsoft) who’s software (ALTools) was used by SK Telecom, then piggyback a trojan in to the secure systems that way. Only computers from SK Telecom received the malicious update.
  • The attackers send the compromised data through a number of way points before receiving it, masking the trail and the identities of the attackers. A similar pattern was seen with the RSA APT attack, the attackers uploaded the stolen data to a compromised web server, and once they had removed the data from there, destroyed the server and broke the trail back to them selves.
  • Proper code signing, or GPG signing could have prevented this
  • Original BBC Article about the attack

Mac OS X Lion may expose your hashed password

  • The Directory Services command allows users to search for data about other users on the machine. This is the intended function.
  • The problem is that the search results for the current user also include sensitive information, such as the users’ password hash. You are authorized to view this information, because you are the current user.
  • However, any application running as that user, could also gain that information, and send it back to an attacker.
  • Using the hash, an attacker could perform an offline brute force attack against the password. These attacks have gotten more common and less time consuming with the advent of better parallel computing, cloud computing and high performance GPGPUs.
  • My bitcoin mining rig could easily be converting to a password hash cracking rig, especially now that the current value of bitcoin is sagging. If there were a big enough market for cracking hashed passwords, there are now a huge number of highly specialized machines devoted to bitcoin that could be easily switched over.
  • The tool can also allow the current user to overwrite their own password hash with a new one, without the need to provide the current plain text password. This means that rather than spend time cracking the password, the attacker could just change the current users password, and then take over the account that way.
  • These attacks would require some kind of exploit that allowed the attack to perform the required actions, however we have seen a number of flash, java and general browsers exploits that could allow this.
  • The current recommended work around is to chmod the dscl command such that it can only be used by root
  • Additional Article

MySQL.com compromised, visitors subject to drive by infection

  • The MySQL.com front page was compromised and had malicious code injected in to it.
  • The code (usually an iframe) caused a java exploit to be executed against the visitor. The exploit required no interaction or confirmation from the user. This type of attack is know as a ‘drive by infection’, because the user does not have to take any action to become infected.
  • Two different trojans were detected being sent to users, Troj/WndRed-C and Troj/Agent-TNV
  • Because of the nature of the iframe attack, and the redirect chain the attackers could have easily varied the payload, or selected different payloads based on the platform the user was visiting the site on.
  • There are reports of Russian hackers offering to sell admin access to mysql.com for $3000
  • Detailed Analysis with malicious source code, video of the infection process
  • Article about previous compromise
  • When the previous compromise was reported, it was also reported that MySQL.com was subject to a XSS (Cross Site Scripting) attack, where content from another site could be injected in to the MySQL site, subverting the browsers usual ‘Same Origin’ policy. This vulnerability, if not repaired, could have been the source of this latest attack.

Feedback:

Continuing our Home Server Segment – This week we are covering file servers.
Some possible solutions:

  • Roll Your Own (UNIX)
  • Linux or FreeBSD Based
  • Install Samba for SMB Server (allow windows and other OS machines to see your shared files)
  • Setup FTP (unencrypted unless you do FTPS (ftp over ssl), high speed, doesn’t play well with NAT, not recommended)
  • Configure SSH (provides SCP and SFTP) (encrypted, slightly higher cpu usage, recommended for Internet access)
  • Install rsync (originally designed to keep mirrors of source code and websites up to date, allows you to transfer only the differences between files, rather than the entire file) (although it is recommended you do rsync over SSH not via the native protocol)
  • Configure NFS (default UNIX file sharing system)
  • Build your own iSCSI targets (allows you to mount a remote disk as if it were local, popular in virtualization as it removes a layer of abstraction. required for virtual machines that can be transferred from one host to another.
  • Roll Your Own (Windows)
  • Windows provides built in support for SMB
  • Install Filezilla Server for FTP/FTPs (Alternative: CyberDuck)
  • There are some NFS alternatives for windows, but not are not free
  • There is an rsync client for windows, or you could use cygwin, same goes for SSH. Similar tools like robocopy and synctoy
  • FreeNAS
  • FreeBSD Based. Provides: SMB, NFS, FTP, SFTP/SCP, iSCSI (and more)
  • Supports ZFS
  • Chris’ Previous Coverage of FreeNAS:
  • FreeNAS, IN DEPTH
  • FreeNAS Vs. HP MediaSmart WHS
  • FreeNAS vs Drobo

Round Up:

Bitcoin Blaster:

The post Ultimate File Server | TechSNAP 25 first appeared on Jupiter Broadcasting.

]]> Easy LVM | LAS | s18e08 https://original.jupiterbroadcasting.net/12371/easy-lvm-las-s18e08/ Sat, 24 Sep 2011 17:25:20 +0000 https://original.jupiterbroadcasting.net/?p=12371 Want to stack your Linux box full of hard drives? Join them into one giant pool of storage? We’ll show you how to combine two drives, or even hundreds!

The post Easy LVM | LAS | s18e08 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Want to stack your Linux box full of hard drives? Join them into one giant pool of storage? It’s easy, we’ll show you how to combine two drives, or even hundreds!

Plus – Is Microsoft trying keep Linux off PC’s with Windows 8? We discuss!

And so much more!

All this week on, The Linux Action Show!

Thanks to:

GoDaddy.com Use our codes LINUX to save 10% at checkout, or LINUX20 to save 20% on hosting!

Direct Episode Download Links:

HD Video | Large Video | Mobile Video | WebM Video | MP3 | OGG Audio | OGG Video | YouTube


[ad#shownotes]

Episode Show Notes:

News:
LVM Easy:

Find us on Google+

Find us on Twitter:

Follow the network on Facebook:

Catch the show LIVE at 10am on Sunday:

The post Easy LVM | LAS | s18e08 first appeared on Jupiter Broadcasting.

]]>
Ubuntu 10.04 Review | Linux Action Show! s11e10 https://original.jupiterbroadcasting.net/1915/ubuntu-1004-review-the-linux-action-show-s11e10/ Sun, 02 May 2010 16:39:13 +0000 https://original.jupiterbroadcasting.net/?p=1915 It's our ACTION review of Ubuntu 10.04, is this the release the world has been waiting for? WE DISCUSS! We cover the approaching war against OGG Theora and what it means for Linux users!

The post Ubuntu 10.04 Review | Linux Action Show! s11e10 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

This week on The Linux Action Show,

It’s our ACTION review of Ubuntu 10.04, is this the release the world has been waiting for? WE DISCUSS! We cover the approaching war against OGG Theora and what it means for Linux users!

THEN – Is the Microsoft and HTC patent deal a sign of Microsoft’s new covert Linux attack strategy? WE BREAK IT DOWN!

All this week on, The Linux Action Show!

Thanks to GoDaddy.com for sponsoring this episode! Use our code LINUX20 at checkout and save 20% on your hosting plan. Save your self some money, and help support the show!

Direct Download Links

Medium 540p  | iPod VideoMP3 | OGG Audio | OGG Video | YouTube

[ad#shownotes]

Our new iPhone App:
Grab The Linux Action Show! App for your iPhone or iPod touch here!

iPhone App

This week’s links:

Red Stripe & On Location Beer Reviews! | Beer is Tasty

Android Pick: Astrid

Microsoft Licensing Mysterious Patented Tech To HTC’s Android Phones

VirtualBox 3.2.0 Beta 1 released

Steve Jobs: OGG patent pool is being assembled to go after Theora

Steam & Source Engine Linux Details

Download on iTunes
OGG Vorbis Feed

The post Ubuntu 10.04 Review | Linux Action Show! s11e10 first appeared on Jupiter Broadcasting.

]]>