rng – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Thu, 31 Mar 2022 09:49:00 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png rng – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Linux Action News 234 https://original.jupiterbroadcasting.net/148077/linux-action-news-234/ Thu, 31 Mar 2022 05:30:00 +0000 https://original.jupiterbroadcasting.net/?p=148077 Show Notes: linuxactionnews.com/233

The post Linux Action News 234 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxactionnews.com/233

The post Linux Action News 234 first appeared on Jupiter Broadcasting.

]]>
Privacy Priorities| LINUX Unplugged 265 https://original.jupiterbroadcasting.net/126966/privacy-priorities-linux-unplugged-265/ Tue, 04 Sep 2018 20:28:09 +0000 https://original.jupiterbroadcasting.net/?p=126966 Show Notes/Links: linuxunplugged.com/265

The post Privacy Priorities| LINUX Unplugged 265 first appeared on Jupiter Broadcasting.

]]>

Show Notes/Links: linuxunplugged.com/265

The post Privacy Priorities| LINUX Unplugged 265 first appeared on Jupiter Broadcasting.

]]>
PIS Poor DNS | TechSNAP 268 https://original.jupiterbroadcasting.net/100021/pis-poor-dns-techsnap-268/ Thu, 26 May 2016 17:32:03 +0000 https://original.jupiterbroadcasting.net/?p=100021 Is the “Dark Cloud” hype, or a real technology? Using DNS tunneling for remote command and control & the big problem with 1-Day exploits. Plus your great question, our answers, a breaking news roundup & more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: HD Video | Mobile Video | MP3 Audio | […]

The post PIS Poor DNS | TechSNAP 268 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Is the “Dark Cloud” hype, or a real technology? Using DNS tunneling for remote command and control & the big problem with 1-Day exploits.

Plus your great question, our answers, a breaking news roundup & more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

APT Groups still successfully exploiting Microsoft Office flaw patched 6 months ago

  • “A Microsoft Office vulnerability patched six months ago continues to be a valuable tool for APT gangs operating primarily in Southeast Asia and the Far East.”
  • “CVE-2015-2545 is a vulnerability discovered in 2015 and corrected with Microsoft’s update MS15-099. The vulnerability affects Microsoft Office versions 2007 SP3, 2010 SP2, 2013 SP1 and 2013 RT SP1.”
  • “The error enables an attacker to execute arbitrary code using a specially crafted EPS image file. The exploit uses PostScript and can evade Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) protection methods.”
  • One of the groups using the exploit targeted the Japanese military industrial complex
  • “In December 2015, Kaspersky Lab became aware of a targeted attack against the Japanese defense sector. In order to infect victims, the attacker sent an email with an attached DOCX file exploiting the CVE-2015-2545 vulnerability in Microsoft Office using an embedded EPS (Encapsulated Postscript) object. The EPS object contained a shellcode that dropped and loaded a 32-bit or 64-bit DLL file depending on the system architecture. This, in turn exploited another vulnerability to elevate privileges to Local System (CVE-2015-1701) and download additional malware components from the C&C server.”
  • “The C&C server used in the attack was located in Japan and appears to have been compromised. However, there is no indication that it has ever been used for any other malicious purpose. Monitoring of the server activity for a period of several months did not result in any new findings. We believe the attackers either lost access to the server or realized that it resulted in too much attention from security researchers, as the attack was widely discussed by the Japanese security community.”
  • The report details a number of different teams, with different targets
  • Some or all of the teams may be related
  • “The attackers used at least one known 1-day exploit: the exploit for CVE-2015-2545 – EPS parsing vulnerability in EPSIMP32.FLT module, reported by FireEye, and patched by Microsoft on 8 September 2015 with MS15-099. We are currently aware of about four different variants of the exploit. The original one was used in August 2015 against targets in India by the Platinum (TwoForOne) APT group.”
  • Kaspersky Lab Report

Krebs investigates the “Dark Cloud”

  • “Crooks who peddle stolen credit cards on the Internet face a constant challenge: Keeping their shops online and reachable in the face of meddling from law enforcement officials, security firms, researchers and vigilantes.”
  • “In this post, we’ll examine a large collection of hacked computers around the world that currently serves as a criminal cloud hosting environment for a variety of cybercrime operations, from sending spam to hosting malicious software and stolen credit card shops.”
  • How do you keep your site online while hosting it on hacked machines you do not control
  • How do you keep the data secure? Who is going to pay for stolen credit cards when they can just hack one of the compromised machines hosting your site?
  • “I first became aware of this botnet, which I’ve been referring to as the “Dark Cloud” for want of a better term, after hearing from Noah Dunker, director of security labs at Kansas City-based vendor RiskAnalytics. Dunker reached out after watching a Youtube video I posted that featured some existing and historic credit card fraud sites. He asked what I knew about one of the carding sites in the video: A fraud shop called “Uncle Sam,” whose home page pictures a pointing Uncle Sam saying “I want YOU to swipe.””
  • “I confessed that I knew little of this shop other than its existence, and asked why he was so interested in this particular crime store. Dunker showed me how the Uncle Sam card shop and at least four others were hosted by the same Dark Cloud, and how the system changed the Internet address of each Web site roughly every three minutes. The entire robot network, or “botnet,” consisted of thousands of hacked home computers spread across virtually every time zone in the world, he said.”
  • So, most of these hacked machines are likely just “repeaters”, accepting connections from end users and then relaying those connections back to the secret central server
  • This also works fairly well as a DDoS mitigation mechanism
  • “the Windows-based malware that powers the botnet assigns infected hosts different roles, depending on the victim machine’s strengths or weaknesses: More powerful systems might be used as DNS servers, while infected systems behind home routers may be infected with a “reverse proxy,” which lets the attackers control the system remotely”
  • “It’s unclear whether this botnet is being used by more than one individual or group. The variety of crimeware campaigns that RiskAnalytics has tracked operated through the network suggests that it may be rented out to multiple different cybercrooks. Still, other clues suggests the whole thing may have been orchestrated by the same gang.”
  • A more indepth report on the botnet is expected next week
  • “If you liked this story, check out this piece about another carding forum called Joker’s Stash, which also uses a unique communications system to keep itself online and reachable to all comers.”

Wekby APT gang using DNS tunneling for C&C

  • “Palo Alto Networks is reporting a shift in malware tactics used by the APT group Wekby that has added a rare but effective new tool to its bag of tricks. Wekby attackers are turning to the technique known as DNS tunneling in lieu of more conventional HTTP delivery of command and controls for remote access control of infected computer networks.”
  • “Wekby is a group that has been active for a number of years, targeting various industries such as healthcare, telecommunications, aerospace, defense, and high tech. The group is known to leverage recently released exploits very shortly after those exploits are available, such as in the case of HackingTeam’s Flash zero-day exploit.”
  • “The malware used by the Wekby group has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism. Additionally, it uses various obfuscation techniques to thwart researchers during analysis. Based on metadata seen in the discussed samples, Palo Alto Networks has named this malware family ‘pisloader’.”
  • “The initial dropper contains very simple code that is responsible for setting persistence via the Run registry key, and dropping and executing an embedded Windows executable. Limited obfuscation was encountered, where the authors split up strings into smaller sub-strings and used ‘strcpy’ and ‘strcat’ calls to re-build them prior to use. They also used this same technique to generate garbage strings that are never used. This is likely to deter detection and analysis of the sample.”
  • “The payload is heavily obfuscated using a return-oriented programming (ROP) technique, as well as a number of garbage assembly instructions. In the example below, code highlighted in red essentially serves no purpose other than to deter reverse-engineering of the sample. This code can be treated as garbage and ignored. The entirety of the function is highlighted in green, where two function offsets are pushed to the stack, followed by a return instruction. This return instruction will point code execution first at the null function, which in turn will point code execution to the ‘next_function’. This technique is used throughout the runtime of the payload, making static analysis difficult.”
  • “The malware is actually quite simplistic once the obfuscation and garbage code is ignored. It will begin by generating a random 10-byte alpha-numeric header. The remaining data is base32-encoded, with padding removed. This data will be used to populate a subdomain that will be used in a subsequent DNS request for a TXT record.”
  • “The use of DNS as a C2 protocol has historically not been widely adopted by malware authors.”
  • “The use of DNS as a C2 allows pisloader to bypass certain security products that may not be inspecting this traffic correctly.”
  • “The C2 server will respond with a TXT record that is encoded similar to the initial request. In the response, the first byte is ignored, and the remaining data is base32-encoded. An example of this can be found below.”
  • The Malware also looks for specific flags in the DNS response, to prevent it being spoofed by a DNS server not run by the authors. Palo Alto Networks has reverse engineered the malware and found the special flags
  • The following commands, and their descriptions are supported by the malware:
    • sifo – Collect victim system information
    • drive – List drives on victim machine
    • list – List file information for provided directory
    • upload – Upload a file to the victim machine
    • open – Spawn a command shell
  • “The Wekby group continues to target various high profile organizations using sophisticated malware. The pisloader malware family uses various novel techniques, such as using DNS as a C2 protocol, as well as making use of return-oriented programming and other anti-analysis tactics.”
  • Palo Alto Networks Report

Feedback:


Round up:


The post PIS Poor DNS | TechSNAP 268 first appeared on Jupiter Broadcasting.

]]>
Noah’s L2ARC | BSD Now 77 https://original.jupiterbroadcasting.net/77667/noahs-l2arc-bsd-now-77/ Thu, 19 Feb 2015 12:12:30 +0000 https://original.jupiterbroadcasting.net/?p=77667 This week on the show, we’ll be chatting with Alex Reece and Matt Ahrens about what’s new in the world of OpenZFS. After that, we’re starting a new tutorial series on submitting your first patch. All the latest BSD news and answers to your emails, coming up on BSD Now – the place to B.. […]

The post Noah's L2ARC | BSD Now 77 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

This week on the show, we’ll be chatting with Alex Reece and Matt Ahrens about what’s new in the world of OpenZFS. After that, we’re starting a new tutorial series on submitting your first patch. All the latest BSD news and answers to your emails, coming up on BSD Now – the place to B.. SD.

Thanks to:


DigitalOcean


iXsystems


Tarsnap

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Headlines

Revisiting FreeBSD after 20 years

  • With comments like “has Linux lost its way?” floating around, a Debian developer was prompted to revisit FreeBSD after nearly two decades
  • This blog post goes through his experiences trying out a modern BSD variant, and includes the good, the bad and the ugly – not just praise this time
  • He loves ZFS and the beadm tool, and finds the FreeBSD implementation to be much more stable than ZoL
  • On the topic of jails, he summarizes: “Linux has tried so hard to get this right, and fallen on its face so many times, a person just wants to take pity sometimes. We’ve had linux-vserver, openvz, lxc, and still none of them match what FreeBSD jails have done for a long time.”
  • The post also goes through the “just plain different” aspects of a complete OS vs. a distribution of various things pieced together
  • Finally, he includes some things he wasn’t so happy about: subpar laptop support, virtualization being a bit behind, a myriad of complaints about pkgng and a few other things
  • There was some decent discussion on Hacker News about this article too, with counterpoints from both sides

s2k15 hackathon report: network stack SMP

  • The first trip report from the recent OpenBSD hackathon in Australia has finally been submitted
  • One of the themes of this hackathon was SMP (symmetric multiprocessing) improvement, and Martin Pieuchot did some hacking on the network stack
  • If you’re not familiar with him, he gave a presentation at EuroBSDCon last year, titled Taming OpenBSD Network Stack Dragons
  • Teaming up with David Gwynne, they worked on getting some bits of the networking code out of the big lock
  • Hopefully more trip reports will be sent in during the coming weeks
  • Most of the big code changes should probably appear after the 5.7-release testing period

From BIND to NSD and Unbound

  • If you’ve been running a DNS server on any of the BSDs, you’ve probably noticed a semi-recent trend: BIND being replaced with Unbound
  • BIND was ripped out in FreeBSD 10.0 and will be gone in OpenBSD 5.7, but both systems include Unbound now as an alternative
  • OpenBSD goes a step further, also including NSD in the base system
  • Instead of one daemon doing everything like BIND tried to do, this new setup splits the authoritative nameserver and the caching resolver into two separate daemons
  • This post takes you through the transitional phase of going from a single BIND setup to a combination of NSD and Unbound
  • All in all, everyone wins here, as there will be a lot less security advisories in both BSDs because of it…

m0n0wall calls it quits

  • The original, classic BSD firewall distribution m0n0wall has finally decided to close up shop
  • For those unfamiliar, m0n0wall was a FreeBSD-based firewall project that put a lot of focus on embedded devices: running from a CF card, CD, USB drive or even a floppy disk
  • It started over twelve years ago, which is pretty amazing when you consider that’s around half of FreeBSD itself’s lifespan
  • The project was probably a lot of people’s first encounter with BSD in any form
  • If you were a m0n0wall user, fear not, you’ve got plenty of choices for a potential replacement: doing it yourself with something like FreeBSD or OpenBSD, or going the premade route with something like pfSense, OPNsense or the BSD Router Project
  • The founder’s announcement includes these closing words: “m0n0wall has served as the seed for several other well known open source projects, like pfSense, FreeNAS and AskoziaPBX. The newest offspring, OPNsense, aims to continue the open source spirit of m0n0wall while updating the technology to be ready for the future. In my view, it is the perfect way to bring the m0n0wall idea into 2015, and I encourage all current m0n0wall users to check out OPNsense and contribute if they can.”
  • While m0n0wall didn’t get a lot of on-air mention, surely a lot of our listeners will remember it fondly

Interview – Alex Reece & Matt Ahrens – alex@delphix.com & matt@delphix.com / @openzfs

What’s new in OpenZFS


Tutorial

Making your first patch (OpenBSD)


News Roundup

Overlaying remote LANs with OpenBSD’s VXLAN

  • Have you ever wanted to “merge” multiple remote LANs? OpenBSD’s vxlan(4) is exactly what you need
  • This article talks about using it to connect two virtualized infrastructures on different ESXi servers
  • It gives a bit of networking background first, in case you’re not quite up to speed on all this stuff
  • This tool opens up a lot of very cool possibilities, even possibly doing a “remote” LAN party
  • Be sure to check the AsiaBSDCon talk about VXLANs if you haven’t already

2020, year of the PCBSD desktop

  • Here we have a blog post about BSD on the desktop, straight from a KDE developer
  • He predicts that PCBSD is going to take off before the year 2020, possibly even overtaking Linux’s desktop market share (small as it may be)
  • With PCBSD making a preconfigured FreeBSD desktop a reality, and the new KMS work, the author is impressed with how far BSD has come as a viable desktop option
  • ZFS and easy-to-use boot environments top the list of things he says differentiate the BSD desktop experience from the Linux one
  • There was also some discussion on Slashdot that might be worth reading

OpenSSH host key rotation, redux

  • We mentioned the new OpenSSH host key rotation and other goodies in a previous episode, but things have changed a little bit since then
  • djm says “almost immediately after smugly declaring ‘mission accomplished’, the bug reports started rolling in.”
  • There were some initial complaints from developers about the new options, and a serious bug shortly thereafter
  • After going back to the drawing board, he refactored some of the new code (and API) and added some more regression tests
  • Most importantly, the bigger big fix was described as: “a malicious server (say, “host-a”) could advertise the public key of another server (say, “host-b”). Then, when the client subsequently connects back to host-a, instead of answering the connection as usual itself, host-a could proxy the connection to host-b. This would cause the user to connect to host-b when they think they are connecting to host-a, which is a violation of the authentication the host key is supposed to provide.”
  • None of this code has been in a formal OpenSSH release just yet, but hopefully it will soon

PCBSD tries out LibreSSL

  • PCBSD users may soon be seeing a lot less security problems because of two recent changes
  • After switching over to OpenNTPD last week, PCBSD decides to give the portable LibreSSL a try too
  • Note that this is only for the packages built from ports, not the base system unfortunately
  • They’re not the first ones to do this – OPNsense has been experimenting with replacing OpenSSL in their ports tree for a little while now, and of course all of OpenBSD’s ports are built against it
  • A good number of patches are still not committed in vanilla FreeBSD ports, so they had to borrow some from Bugzilla
  • Look forward to Kris wearing a “keep calm and abandon OpenSSL” shirt in the near future

Feedback/Questions


Mailing List Gold


  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
  • If you write an article or blog post about BSD, or even just come across one you like, be sure to send it our way
  • If you’re in or around the southern California area, there’s going to be at least two BSD-related talks at this year’s SCALE 13x conference, as well as an OpenBSD booth, FreeBSD booth and some BSD certification exams as well
  • That’s going on between February 19th-22nd at the Hilton Los Angeles Airport
  • A special thanks to our anonymous listener for writing most of this week’s tutorial – we’ll be doing ones for PCBSD (using git) and FreeBSD (using svn) sometime soon

The post Noah's L2ARC | BSD Now 77 first appeared on Jupiter Broadcasting.

]]>
Liberating SSL | BSD Now 48 https://original.jupiterbroadcasting.net/63517/liberating-ssl-bsd-now-48/ Thu, 31 Jul 2014 10:38:19 +0000 https://original.jupiterbroadcasting.net/?p=63517 Coming up in this week’s episode, we’ll be talking with one of OpenBSD’s newest developers – Brent Cook – about the portable version of LibreSSL and how it’s developed. We’ve also got some important information about the FreeBSD port of LibreSSL. The latest news and your emails, on BSD Now – the place to B.. […]

The post Liberating SSL | BSD Now 48 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Coming up in this week’s episode, we’ll be talking with one of OpenBSD’s newest developers – Brent Cook – about the portable version of LibreSSL and how it’s developed. We’ve also got some important information about the FreeBSD port of LibreSSL. The latest news and your emails, on BSD Now – the place to B.. SD.

Thanks to:


iXsystems


Tarsnap

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Headlines

FreeBSD quarterly status report

  • FreeBSD has gotten quite a lot done this quarter
  • Changes in the way release branches are supported – major releases will get at least five years over their lifespan
  • A new automounter is in the works, hoping to replace amd (which has some issues)
  • The CAM target layer and RPC stack have gotten some major optimization and speed boosts
  • Work on ZFSGuru continues, with a large status report specifically for that
  • The report also mentioned some new committers, both source and ports
  • It also covers GNATS being replaced with Bugzilla, the new core team, 9.3-RELEASE, GSoC updates, UEFI booting and lots of other things that we’ve already mentioned on the show
  • “Foundation-sponsored work resulted in 226 commits to FreeBSD over the April to June period”

A new OpenBSD HTTPD is born

  • Work has begun on a new HTTP daemon in the OpenBSD base system
  • A lot of people are asking “why?” since OpenBSD includes a chrooted nginx already – will it be removed? Will they co-exist?
  • Initial responses seem to indicate that nginx is getting bloated, and is a bit overkill for just serving content (this isn’t trying to be a full-featured replacement)
  • It’s partially based on the relayd codebase and also comes from the author of relayd, Reyk Floeter
  • This has the added benefit of the usual, easy-to-understand syntax and privilege separation
  • There’s a very brief man page online already
  • It supports vhosts and can serve static files, but is still in very active development – there will probably be even more new features by the time this airs
  • Will it be named OpenHTTPD? Or perhaps… LibreHTTPD? (I hope not)

pkgng 1.3 announced

  • The newest version of FreeBSD’s second generation package management system has been released, with lots of new features
  • It has a new “real” solver to automatically handle conflicts, and dynamically discover new ones (this means the annoying -o option is deprecated now, hooray!)
  • Lots of the code has been sandboxed for extra security
  • You’ll probably notice some new changes to the UI too, making things more user friendly
  • A few days later 1.3.1 was released to fix a few small bugs, then 1.3.2 shortly thereafter and 1.3.3 yesterday

FreeBSD after-install security tasks

  • A number of people have written in to ask us “how do I secure my BSD box after I install it?”
  • With this blog post, hopefully most of their questions will finally be answered in detail
  • It goes through locking down SSH with keys, patching the base system for security, installing packages and keeping them updated, monitoring and closing any listening services and a few other small things
  • Not only does it just list things to do, but the post also does a good job of explaining why you should do them
  • Maybe we’ll see some more posts in this series in the future

Interview – Brent Cook – bcook@openbsd.org / @busterbcook

LibreSSL’s portable version and development


News Roundup

FreeBSD Mastery – Storage Essentials

  • MWL‘s new book about the FreeBSD storage subsystems now has an early draft available
  • Early buyers can get access to an in-progress draft of the book before the official release, but keep in mind that it may go through a lot of changes
  • Topics of the book will include GEOM, UFS, ZFS, the disk utilities, partition schemes, disk encryption and maximizing I/O performance
  • You’ll get access to the completed (e)book when it’s done if you buy the early draft
  • The suggested price is $8

Why BSD and not Linux?

  • Yet another thread comes up asking why you should choose BSD over Linux or vice-versa
  • Lots of good responses from users of the various BSDs
  • Directly ripping a quote: “Features like Ports, Capsicum, CARP, ZFS and DTrace were stable on BSDs before their Linux versions, and some of those are far more usable on BSD. Features like pf are still BSD-only. FreeBSD has GELI and ipfw and is “GCC free”. DragonflyBSD has HAMMER and kernel performance tuning. OpenBSD have upstream pf and their gamut of security features, as well as a general emphasis on simplicity.”
  • And “Over the years, the BSDs have clearly shown their worth in the nix ecosystem by pioneering new features and driving adoption of others. The most recent on OpenBSD were 2038 support and LibreSSL. FreeBSD still arguably rules the FOSS storage space with ZFS.”
  • Some other users share their switching experiences – worth a read

More g2k14 hackathon reports

  • Following up from last week’s huge list of hackathon reports, we have a few more
  • Landry Breuil spent some time with Ansible testing his infrastructure, worked on the firefox port and tried to push some of their patches upstream
  • Andrew Fresh enjoyed his first hackathon, pushing OpenBSD’s perl patches upstream and got tricked into rewriting the adduser utility in perl
  • Ted Unangst did his usual “teduing” (removing of) old code – say goodbye to asa, fpr, mkstr, xstr, oldrdist, fsplit, uyap and bluetooth
  • Luckily we didn’t have to cover 20 new ones this time!

BSDTalk episode 243

  • The newest episode of BSDTalk is out, featuring an interview with Ingo Schwarze of the OpenBSD team
  • The main topic of discussion is mandoc, which some users might not be familiar with
  • mandoc is a utility for formatting manpages that OpenBSD and NetBSD use (DragonFlyBSD and FreeBSD include it in their source tree, but it’s not built by default)
  • You may also want to watch Ingo’s BSDCan talk about mandoc
  • We’ll catch up to you soon, Will…

Feedback/Questions


  • All the tutorials are posted in their entirety at bsdnow.tv
  • Just can’t get enough LibreSSL? Brent also did a text-only interview for Undeadly, which we also have a link to there
  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
  • Want to come on for an interview or have a tutorial you’d like to see? Let us know
  • If you’re a big PCBSD fan, or have been curious about what it has to offer over regular FreeBSD, you’ll like next week’s episode
  • Watch live Wednesdays at 2:00PM Eastern (18:00 UTC)

The post Liberating SSL | BSD Now 48 first appeared on Jupiter Broadcasting.

]]>