tracking – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Wed, 03 Jul 2019 04:28:17 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png tracking – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Partner Password Policy | User Error 69 https://original.jupiterbroadcasting.net/132516/partner-password-policy-user-error-69/ Fri, 05 Jul 2019 00:15:34 +0000 https://original.jupiterbroadcasting.net/?p=132516 Show Notes: error.show/69

The post Partner Password Policy | User Error 69 first appeared on Jupiter Broadcasting.

]]>

Show Notes: error.show/69

The post Partner Password Policy | User Error 69 first appeared on Jupiter Broadcasting.

]]>
Linux Action News 29 https://original.jupiterbroadcasting.net/120226/linux-action-news-29/ Sun, 26 Nov 2017 17:28:17 +0000 https://original.jupiterbroadcasting.net/?p=120226 RSS Feeds: HD Video Feed | MP3 Feed | iTunes Feed Become a supporter on Patreon: Episode Links Google collected location data from Android users who didn’t know — In a nutshell, the whereabouts of every active Android phone and tablet in the world were tracked even with location services disabled and no carrier SIM […]

The post Linux Action News 29 first appeared on Jupiter Broadcasting.

]]>

RSS Feeds:

HD Video Feed | MP3 Feed | iTunes Feed

Become a supporter on Patreon:

Patreon

Episode Links
  • Google collected location data from Android users who didn’t know — In a nutshell, the whereabouts of every active Android phone and tablet in the world were tracked even with location services disabled and no carrier SIM card inserted.
  • Ubuntu want community input on Mir — However we’re also at the place where we need to reach out to the community and ask what are the aspects of your desktop that you value most, to help us figure out a direction for Mir.
  • New magazine from the Raspberry Pi Foundation – Hackspace — The first issue of HackSpace magazine is here! Join us as we explore thinking machines, build a trebuchet, learn how Arduino changed the world, see how far we can overclock a Raspberry Pi using liquid nitrogen, and much more…
  • Linus gets heated about kernel security — Linux Lord fires up over proposal to secure Linux by shutting down wonky processes
  • Then calmly explains his position — His long post on the matter suggested to security practitioners that “‘Do no harm’ should be your mantra for any new hardening work.”
  • Others act like children — So on the day of Kees’ presentation, where he tried to drop a useless 0day on me and talk up how many upstream developers reviewed his code that did the same limitation *right*, I wrote an exploit of my own.
  • Vulnerability in Intel Management Engine — Remote attackers could launch commands on a host of Intel-based computers, including laptops and desktops shipped with Intel Core processors since 2015.

The post Linux Action News 29 first appeared on Jupiter Broadcasting.

]]>
Metadata Matters | TechSNAP 306 https://original.jupiterbroadcasting.net/106886/metadata-matters-techsnap-306/ Wed, 15 Feb 2017 00:09:34 +0000 https://original.jupiterbroadcasting.net/?p=106886 RSS Feeds: HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: House Passes Long-Sought Email Privacy Bill The U.S. House of Representatives on Monday approved a bill that would update the nation’s email surveillance laws so […]

The post Metadata Matters | TechSNAP 306 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

House Passes Long-Sought Email Privacy Bill

Here’s What Transport for London Learned From Tracking Your Phone On the Tube

  • Advertising? I can see how this is useful for more than just advertising. Traffic flow. Knowing about time from A to B. Mention EZPass and monitoring of badges to determine flow.

  • Signs announced trial, opt out by disabling wifi.

  • The documents also seem to suggest that if TfL switched on tracking full time it could offer real time crowding information to passengers – so we could see a CityMapper of the not-too-distant future telling us which stations to avoid.

  • That sounds simlar to how Waze and Google Maps collect real-time data on traffic congestion.

  • Collecting information is one thing. Controlling access to that information is vital. As we’ve seen so many times in the past, it is the use of that data for unintended purposes which is of most concern.

  • Rainbow tables

GitLab Postmortem of database outage of January 31

  • This came from Shawn. We covered this incident in eposide 305.

  • I want to make it clear from the start, we are not mocking GitLab. There is no joy to be taken here.

  • On January 31st 2017, we experienced a major service outage for one of our products, the online service GitLab.com. The outage was caused by an accidental removal of data from our primary database server.

  • What a horrible feeling that engineer then had. Imagine, for a moment. Production has just been wiped out… OMG.

  • Backups could not be found, nor could they be used. It was all gone.

  • I can imagine lots and lots of waiting for stuff to finish. Very stressful. Much hope, but very stressful.

  • Wow, could not access their own projects. Ouch. Almost want their own repo offline, but then accusations of not dog fooding, etc.

  • Prometheus monitorin

  • Some places take the approach of making staging the hot backup for production. Exactly the same. Move production onto staging hardware if required.

  • “I don’t remember where I saw it (probably hackernews), but someone proposed to constantly recreate staging from production’s backup. This way we would have an up-to-date staging version and frequently tested backup recovery process.”


Feedback:


Round Up:


The post Metadata Matters | TechSNAP 306 first appeared on Jupiter Broadcasting.

]]>
Mind on my Cloud & Cloud on my Mind | LINUX Unplugged 148 https://original.jupiterbroadcasting.net/100261/mind-on-my-cloud-cloud-on-my-mind-lup-148/ Tue, 07 Jun 2016 18:06:58 +0000 https://original.jupiterbroadcasting.net/?p=100261 After we get through a slew of great open source project achievements, we discuss the slippery slope that online services represent to Linux users. Plus we get all big picture, what can be learned from ownCloud’s recent troubles, what we conclude by reading between the lines & more! Get Paid to Write for DigitalOcean Direct […]

The post Mind on my Cloud & Cloud on my Mind | LINUX Unplugged 148 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

After we get through a slew of great open source project achievements, we discuss the slippery slope that online services represent to Linux users.

Plus we get all big picture, what can be learned from ownCloud’s recent troubles, what we conclude by reading between the lines & more!


Ting


DigitalOcean


Linux Academy

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed | WebM Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Pre-Show

Follow Up / Catch Up

The new Control Center Shell

A demonstration of the new Control Center UI being developed

Macintosh System 6 Control Panel UI

Arc Is a Gorgeous GTK Theme for Linux Desktops

It has been a veritable eon since we last highlighted a GTK theme here on this site.

Yes, the moment you’ve been waiting for is here, and you can now have all the essential Ubuntu 16.04 LTS (Xenial Xerus) Live CD editions into a single ISO image. Linux AIO Ubuntu 16.04 includes Ubuntu 16.04 LTS, Ubuntu MATE 16.04 LTS, Kubuntu 16.04 LTS, Xubuntu 16.04 LTS, Lubuntu 16.04 LTS, and Ubuntu GNOME 16.04 LTS.

TING

Trisquel is about ethics not technology or innovation

So, please, stop thinking about snappy packages and begin enjoying your LIBERTAD (FREEDOM).

Firefox 47.0

Embedded YouTube videos now play with HTML5 video if Flash is not installed.

Support for Google’s Widevine CDM — which is currently limited to Windows and OS X — was first introduced to the Nightly build of Firefox two months ago, and has made a seamless transition to the stable build.

DigitalOcean

What we can learn from ownCloud’s collapse

Another factor in ownCloud’s undoing could be venture capitalists. Jos Poortvliet, the ownCloud community manager who now works at Nextcloud told me that a lot of ownCloud features were held back because developers had to convince investors in 30 seconds. And every such conversation led to a comparison with Dropbox. Investors would refuse features on the basis that Dropbox doesn’t do that.

Linux Academy

Slipping Into Google

Upgrade the launcher on your Android device for a fast, clean home screen that puts Google Now just a swipe away.

  • Google now

  • Google VR – Daydream

  • Google Chrome continues to be my go to browser for work. Makes switching to Linux easier.

  • Google stuff tends to have a Linux solution

Support Jupiter Broadcasting on Patreon

The post Mind on my Cloud & Cloud on my Mind | LINUX Unplugged 148 first appeared on Jupiter Broadcasting.

]]>
Children of the Chromebook | TTT 225 https://original.jupiterbroadcasting.net/91151/children-of-the-chromebook-ttt-225/ Fri, 04 Dec 2015 12:52:53 +0000 https://original.jupiterbroadcasting.net/?p=91151 We start from a town that has no internet and reflect on how quickly the last 8 years of progress feel very distant, then discuss the recent extreme examples of companies challenging Net Neutrality. Ballmer says Windows Phones should run Android apps & maybe he’s right? Google’s Chromebooks make up half of US classroom devices. […]

The post Children of the Chromebook | TTT 225 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We start from a town that has no internet and reflect on how quickly the last 8 years of progress feel very distant, then discuss the recent extreme examples of companies challenging Net Neutrality. Ballmer says Windows Phones should run Android apps & maybe he’s right?

Google’s Chromebooks make up half of US classroom devices. As parents, are we comfortable with Google having a lifetime of history on our kids?

Plus some follow up on a previous Kickstarter of the week with a special guest, the likely conclusion to a five year old tech story & the inside scoop on the Jupiter Broadcasting SWAG for the Holidays giveaway!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Patreon

Show Notes:

— Episode Links —

The post Children of the Chromebook | TTT 225 first appeared on Jupiter Broadcasting.

]]>
Top Road Trip Apps | FauxShow 224 https://original.jupiterbroadcasting.net/88966/top-road-trip-apps-fauxshow-224/ Sun, 11 Oct 2015 13:38:19 +0000 https://original.jupiterbroadcasting.net/?p=88966 Hit the road with our favorite apps for offline nav, finding a free place to sleep, taking care of basic RV tasks & the best way to capture the trip. Direct Download: HD Video | Mobile Video | MP3 Audio | YouTube RSS Feeds: HD Video Feed | Mobile Video Feed | MP3 Audio Feed […]

The post Top Road Trip Apps | FauxShow 224 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Hit the road with our favorite apps for offline nav, finding a free place to sleep, taking care of basic RV tasks & the best way to capture the trip.

Direct Download:

HD Video | Mobile Video | MP3 Audio | YouTube

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Torrent Feed | iTunes Feed

Show Notes

Prep for the Road

RV Checklist on the App Store

RV Check List is a tool that provides various checklists for the RV owner. These task lists cover various phases of the RV adventure. I am a fellow RV owner who decided there should be a better way then multiple hand written checklists or trying to depend on your memory wrote this application.

Finding a Place to Stay:

CoPilot App – GPS Navigation & Traffic

• Offline navigation: street maps stored on-board your iPhone/iPad
• Clear voice-guided, turn-by-turn directions with text-to-speech technology
• Driver-friendly 3D guidance display shows you the way at every turn
• Lane indicator arrows, highway exit sign post information and realistic ClearTurn(tm) view to help you at complex junctions
• Real-time ActiveTraffic(tm) and predictive time-of-day routing helps you avoid delays, so you’ll arrive on-time and stress-free, every time
• Automatic routing and fast recalculation if you miss a turn
• Safety camera alerts with free database updates (not available in North America, France or Switzerland)
• Unique directions only view and motion lock for safer driving
• CommuteMe(tm) automatically learns your favourite route to and from work, and checks it for traffic every day
• Speed limit warnings and speedometer
• Accurate ETAs so you know when you’ll arrive
• And much, much more…

Allstays | Campgrounds | RV Parks

Over 29,000 Campgrounds: Independent, KOA, National/State Forest, State Parks, Public Lands, Army Corps, National Park, Military, County and City Parks, casinos.

Independent Truck Stops, Flying Js, Pilot Travel Centers, Loves Travel Stops, Petro Centers, TA Travel Centers, Petro Canada. Includes info on fuel lanes, dump stations, propane, restaurants, internet, laundry, showers, tire care, travel stores, ATMs, Western Union, UPS, FedEx and more. Are they RV friendly.

Mileage Keeper (gas mileage / fuel economy tracker) on the App Store

Mileage Keeper tracks your vehicle’s fuel economy, which helps you save money!

The Automatic adapter plugs into the standard diagnostics port hidden under the dash in most cars since 1996.

Checking for Signal

FieldTester on the App Store

Field Tester can be used to quickly evaluate the strength of your phone signal, and the quality of your data/WiFi network.

With OpenSignal you can map cellular coverage, find Wi-Fi hotspots, test and improve your reception & get faster data.

Dumping… Your Tanks

Sanidumps: RV Dumps, Sani Station, Dump Points comprehensive directory

A comprehensive directory helping RVers find RV dump station locations to empty their gray water and black holding tanks, When RVs have to go…

Capture the Road

Hyperlapse from Instagram on the App Store

Create amazing time lapse videos with Hyperlapse. Using Instagram’s in-house stabilization, Hyperlapse shoots polished time lapse videos that were previously impossible without bulky tripods and expensive equipment.

The post Top Road Trip Apps | FauxShow 224 first appeared on Jupiter Broadcasting.

]]>
Creeper Cookies | TTT 215 https://original.jupiterbroadcasting.net/88741/creeper-cookies-ttt-215/ Wed, 07 Oct 2015 10:20:20 +0000 https://original.jupiterbroadcasting.net/?p=88741 Verizon’s super cookie just got nastier, Facebook has plans for free Internet from space & Google launches AMP, Accelerated Mobile Pages Project for a faster, open mobile web. Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube RSS Feeds: MP3 Feed | OGG Feed | iTunes Feed | […]

The post Creeper Cookies | TTT 215 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Verizon’s super cookie just got nastier, Facebook has plans for free Internet from space & Google launches AMP, Accelerated Mobile Pages Project for a faster, open mobile web.

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

— Episode Links —

The post Creeper Cookies | TTT 215 first appeared on Jupiter Broadcasting.

]]>
Dislike the Like Button | TTT 213 https://original.jupiterbroadcasting.net/87891/dislike-the-like-button-ttt-213/ Fri, 18 Sep 2015 11:28:07 +0000 https://original.jupiterbroadcasting.net/?p=87891 A Google leak suggests a new Chromecast & two new Nexus devices are just around the corner. Facebook is turning up the tracking & the big statement Microsoft is making with their $75 million donation. Plus an illuminating Kickstarter of the week! Direct Download: MP3 Audio | OGG Audio | Video | HD Video | […]

The post Dislike the Like Button | TTT 213 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A Google leak suggests a new Chromecast & two new Nexus devices are just around the corner. Facebook is turning up the tracking & the big statement Microsoft is making with their $75 million donation.

Plus an illuminating Kickstarter of the week!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

— Episode Links —

Kickstarter of the week:

The post Dislike the Like Button | TTT 213 first appeared on Jupiter Broadcasting.

]]>
Unfaithful Privacy Policies | TTT 206 https://original.jupiterbroadcasting.net/86802/unfaithful-privacy-policies-ttt-206/ Fri, 21 Aug 2015 10:09:37 +0000 https://original.jupiterbroadcasting.net/?p=86802 Updates on the Ashley Madison story after another massive data dump, JKF Airport starts tracking your cell phone to measure wait times & we debate the various uses for this technology. Firefox has big changes coming to addons & Google’s plan to reduce Android bloat! Plus Pearbuds… Our Kickstarter of the week! Direct Download: MP3 […]

The post Unfaithful Privacy Policies | TTT 206 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Updates on the Ashley Madison story after another massive data dump, JKF Airport starts tracking your cell phone to measure wait times & we debate the various uses for this technology. Firefox has big changes coming to addons & Google’s plan to reduce Android bloat!

Plus Pearbuds… Our Kickstarter of the week!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

The post Unfaithful Privacy Policies | TTT 206 first appeared on Jupiter Broadcasting.

]]>
Get Tracked with Windows 10 | TTT 198 https://original.jupiterbroadcasting.net/85697/get-tracked-with-windows-10-ttt-198/ Wed, 29 Jul 2015 10:19:01 +0000 https://original.jupiterbroadcasting.net/?p=85697 Windows 10 is released to the public, but the devil is in the details. Microsoft’s new small print – how your personal data is (ab)used, we share the details. Plus how the mainstream is reacting to the new release, the sliding market share of the iPad & the teleportation breakthrough scientists are reporting. Direct Download: […]

The post Get Tracked with Windows 10 | TTT 198 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Windows 10 is released to the public, but the devil is in the details. Microsoft’s new small print – how your personal data is (ab)used, we share the details.

Plus how the mainstream is reacting to the new release, the sliding market share of the iPad & the teleportation breakthrough scientists are reporting.

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

The post Get Tracked with Windows 10 | TTT 198 first appeared on Jupiter Broadcasting.

]]>
Apple Watch vs Android Wear | FauxShow 213 https://original.jupiterbroadcasting.net/81827/apple-watch-vs-android-wear-fauxshow-213/ Sun, 10 May 2015 19:09:48 +0000 https://original.jupiterbroadcasting.net/?p=81827 Angela and Chris compare their smart watches and wear. They go through their motivation for wearing watches in the first place, which features are important, and the pros and cons of each. Direct Download: HD Video | Mobile Video | MP3 Audio | YouTube RSS Feeds: HD Video Feed | Mobile Video Feed | MP3 […]

The post Apple Watch vs Android Wear | FauxShow 213 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Angela and Chris compare their smart watches and wear. They go through their motivation for wearing watches in the first place, which features are important, and the pros and cons of each.

Direct Download:

HD Video | Mobile Video | MP3 Audio | YouTube

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Torrent Feed | iTunes Feed

Show Notes

q5sys’s watch:

  • https://i.imgur.com/3lI29A1.jpg
  • https://pocketcalculatorshow.com/nerdwatch/seiko-computer-watch-fun/

Radek Writes:

Just a quick though – consider adding a full list of referral links on donate/contact page (with maybe a list of shows/codes to support)… For those that don’t listen/watch a particular show but still would like to support JB.

David Writes:

I’m thinking it would be courteous if there were a check-box item on your contact form to copy submissions to JB back to the poster.

Seems, fair, no? You’ve got our e-mail addy.

Robyn Writes:

So, I stumbled on your show about 4 days ago and I haven’t been able to stop listening. It just so happens I’m in transition and looking to find a job that I can do out of my home. I have no idea if I could be good at this but I’m interested to find out. I was wondering if you could give me a few pointers on how to get started.

And by the way, your show ROCKS! Love hearing the guest speakers and all of you are very inspirational.

Thanks,

WTR

Follow Jupiter Broadcasting

  • See more pics: https://instagram.com/jupiterbroadcasting#
  • Sign up for Jupiter Signal: www.bit.ly/jupitersignal
  • Unfilter is on Patreon! https://www.patreon.com/unfilter
  • Tech Talk Today is on Patreon! https://www.patreon.com/jupitersignal

JB SWAG

Find the FauxShow!

  • Facebook: https://www.facebook.com/thefauxshow
  • Twitter: https://www.twitter.com/angerz
  • G+: https://www.gplus.to/fauxshow
  • Subscribe to Jupiter Signal: https://www.bit.ly/jupitersignal
  • Jupiter Radio: https://jblive.info
  • Affiliates Firefox Extension: https://addons.mozilla.org/en-US/firefox/addon/jupiterbroadcasting/
  • Affiliates Chrome Extension: https://chrome.google.com/webstore/detail/bjekemhblnilimncanbehhjijdpjgimj
  • Donations: https://original.jupiterbroadcasting.net/donate
  • Shows & Shownotes: https://original.jupiterbroadcasting.net/show/fauxshow/

The post Apple Watch vs Android Wear | FauxShow 213 first appeared on Jupiter Broadcasting.

]]>
Hostile Music Takeover | Tech Talk Today 166 https://original.jupiterbroadcasting.net/81492/hostile-music-takeover-tech-talk-today-166/ Tue, 05 May 2015 10:52:28 +0000 https://original.jupiterbroadcasting.net/?p=81492 Apple is reportedly attempting to kill free streaming music but the story stinks of a hit piece. GOG launches their steam competitor to the public & CoreOS ups the container game. Plus Chris reviews Hello’s Sense sleep tracking device. Can it unlock the secrets of a good sleep? Direct Download: MP3 Audio | OGG Audio […]

The post Hostile Music Takeover | Tech Talk Today 166 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Apple is reportedly attempting to kill free streaming music but the story stinks of a hit piece. GOG launches their steam competitor to the public & CoreOS ups the container game.

Plus Chris reviews Hello’s Sense sleep tracking device. Can it unlock the secrets of a good sleep?

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

Single Verizon IP Address Used For Hundreds of Windows 7 Activations

A presumed pirate with an unusually large appetite for activating Windows 7 has incurred the wrath of Microsoft. In a lawsuit filed in a Washington court, Microsoft said that it logged hundreds of suspicious product activations from a single Verizon IP address and is now seeking damages. Who he, she or they are behind address 74.111.202.30 is unknown at this point, but according to Microsoft they’re responsible for some serious Windows pirating. “As part of its cyberforensic methods, Microsoft analyzes product key activation data voluntarily provided by users when they activate Microsoft software, including the IP address from which a given product key is activated,” the lawsuit reads. The company says that its forensic tools allow the company to analyze billions of activations of software and identify patterns “that make it more likely than not” that an IP address associated with activations is one through which pirated software is being activated.

GOG’s Take On Steam Goes Live Today

GOG Galaxy, which you can download here, is now in open beta. Like Steam, Origin, and other PC gaming clients, it’s a stand-alone program with its own achievements, friend lists, and massively restrictive DRM. Just kidding. Anyone who follows the people behind GOG—a subsidiary of _Witcher 3 _developer CD Projekt Red—knows they’re as anti-DRM as it gets.

CoreOS Gives Up Control of Non-Docker Linux Container Standard | Data Center Knowledge

Taking a major step forward in its quest to drive a Linux container standard that’s not created and controlled by Docker or any other company, CoreOS spun off management of its App Container project into a stand-alone foundation. Google, VMware, Red Hat, and Apcera have announced support for the standard.

Becoming a more formalized open source project, the App Container (appc) community now has a governance policy and has added a trio of top software engineers that work on infrastructure at Google, Twitter, and Red Hat as “community maintainers.

Apple pushing music labels to kill free Spotify streaming ahead of Beats relaunch

The Verge has learned that Apple has been pushing major music labels to force streaming services like Spotify to abandon their free tiers, which will dramatically reduce the competition for Apple’s upcoming offering. DOJ officials have already interviewed high-ranking music industry executives about Apple’s business habits, but it appears the FTC has taken the lead in recent weeks.

Hello Sense Reveiw

Sense is a simple system that tracks your sleep, monitors the environment in your bedroom and reinvents the alarm, so you can sleep better.

Sense tracks the environmental data in your bedroom and disturbances such as noise and sound. Sense combines this data with your sleep cycle information to give you a complete picture of your night.

With all this information clearly presented to you, over time you will know how to set yourself up for the best night’s sleep, every night.

Smart alarm clock with sleep cycle tracking.

The stunning full-circle P-OLED display fills the entire round 1.3″ watch face and delivers clear visibility in bright sunlight and at acute angles.¹

The post Hostile Music Takeover | Tech Talk Today 166 first appeared on Jupiter Broadcasting.

]]>
The Sonic Philosophy | CR 147 https://original.jupiterbroadcasting.net/79642/the-sonic-philosophy-cr-147/ Mon, 30 Mar 2015 14:52:40 +0000 https://original.jupiterbroadcasting.net/?p=79642 Transitions in life comes in many forms, work, relationships, gadgets. How we deal with the process of transition is key & why we shouldn’t be anxious about a transition, even if it’s a difficult one. Plus a bit about GitHub’s ongoing DDoS, switching from PHP to Ruby & a new contender for the perfect Linux […]

The post The Sonic Philosophy | CR 147 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Transitions in life comes in many forms, work, relationships, gadgets. How we deal with the process of transition is key & why we shouldn’t be anxious about a transition, even if it’s a difficult one.

Plus a bit about GitHub’s ongoing DDoS, switching from PHP to Ruby & a new contender for the perfect Linux dev rig.

Thanks to:


Linux Academy


DigitalOcean

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

Become a supporter on Patreon:

Foo

Show Notes:

Feedback

Dev World Hoopla

GitHub suffers ‘largest DDoS’ attack in site’s history

GitHub is suffering a DDoS attack deemed the largest in the website’s history and believed to originate from China.

The coding website is a popular repository for projects from game engines to security applications and web app frameworks, and is used by programmers and tech firms to develop and share tools. Since Thursday, the website has been under fire in a DDoS attack of a scale which has forced GitHub staff to rally and attempt to mitigate access problems.

In a blog post last week, GitHub said the distributed denial of service (DDoS) attack is the largest in github.com’s history. Beginning on March 26, at the time of writing the onslaught is yet to end.

GitHub says the attack “involves a wide combination of attack vectors,” which “includes every vector we’ve seen in previous attacks as well as some sophisticated new techniques that use the web browsers of unsuspecting, uninvolved people to flood github.com with high levels of traffic.”

“Based on reports we’ve received, we believe the intent of this attack is to convince us to remove a specific class of content,” GitHub says.

The “specific class” of content may be related to China. As reported by the Wall Street Journal, GitHub’s traffic surge is based on visits intended for China’s largest search engine, Baidu. Security experts told the p

Transitions

  • The process or a period of changing from one state or condition to another.

  • Undergo or cause to undergo a process or period of transition.

  • Transition can be a lot of things… You view on a technology, the status of a relationship, or a job.

  • We should not resist the process of transition. Without it, we can’t eventually fix whatever needs fixing, move forward, and arrive at our destination.

The post The Sonic Philosophy | CR 147 first appeared on Jupiter Broadcasting.

]]>
Canadian On Tap | Tech Talk Today 124 https://original.jupiterbroadcasting.net/76477/canadian-on-tap-tech-talk-today-124/ Thu, 29 Jan 2015 11:01:52 +0000 https://original.jupiterbroadcasting.net/?p=76477 Microsoft goes all in on Android & we breakdown the big questions behind the apps. Intel announces wireless docking at the chipset level & Canada’s covert operation of tracking downloads and uploads all over the world is revealed. Plus a few tangents & the biggest “disruption” of the year! Direct Download: MP3 Audio | OGG […]

The post Canadian On Tap | Tech Talk Today 124 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Microsoft goes all in on Android & we breakdown the big questions behind the apps. Intel announces wireless docking at the chipset level & Canada’s covert operation of tracking downloads and uploads all over the world is revealed.

Plus a few tangents & the biggest “disruption” of the year!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

Microsoft Launches Outlook For iOS And Android Based On Its Acompli Acquisition

Microsoft today launched Outlook for Android and iOS phones and tablets, based on the application it acquired when it bought Acomplilast December. These new applications will go live in their respective app stores over the course of the next few hours.

Microsoft says its mobile Office apps should run on devices with Android 4.4 or later, 1GB of RAM or more, and ARM-based processors. Support for Intel chips is in the works and Microsoft says it plans to add support for Intel-based tablets within the next few months.

Peeing My Way Around New York City With Airpnp, The App For Bathroom Emergencies – BuzzFeed News

Airpnp is the worst-designed app I’ve ever used. It’s also the most profound.

AnandTech | Intel Announces Broadwell vPro Processors: Wireless Docking and More

ntel Wireless Docking could be the most exciting new feature. Using four channels of 802.11ad at 60 GHz radio frequency, Intel claims a total bandwidth of 7 Gbps. All data passed between the dock and device is protected with 128-bit AES hardware encryption, and two monitors plus USB 3.0 are supported. Intel has not yet provided information yet about supported resolutions, however they do provide an impressive video demonstrating a video file streaming from a USB stick to a laptop from the wireless dock, then back to the wireless dock for display.

This docking implementation is particularly interesting as it is implemented at the chipset level instead of the OS level. Intel’s low level control of peripherals allows them to enable no-brainer functionality such as closing the laptop lid and not entering sleep mode after establishing the dock connection.

Canada Casts Global Surveillance Dragnet Over File Downloads – The Intercept

The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files.

Drone Maker Enforces No-Fly Zone Over DC, Hijacking Malware Demonstrated – Slashdot

A recent incident at the White House showed that small aerial vehicles (drones) present a specific security problem. Rahul Sasi, a security engineer at Citrix R&D, created MalDrone, the first backdoor malware for the AR drone ARM Linux system to target Parrot AR Drones, but says it can be modified to target others as well. The malware can be silently installed on a drone, and be used to control the drone remotely and to conduct remote surveillance. Meanwhile, the Chinese company that created the drone that crashed on the White House grounds has announced a software update for its “Phantom” series that will prohibit flight within 25 kilometers of the capital.

The post Canadian On Tap | Tech Talk Today 124 first appeared on Jupiter Broadcasting.

]]>
Uber’s God Complex | Tech Talk Today 95 https://original.jupiterbroadcasting.net/71982/ubers-god-complex-tech-talk-today-95/ Thu, 20 Nov 2014 07:38:05 +0000 https://original.jupiterbroadcasting.net/?p=71982 We recap Uber’s really bad week & their recent changes in response. Thanks to the Apple Watch SDK we now have an idea of what using one will be like & it’s limitations become more clear. Plus Viber takes chats public & we ponder why, the Stingray mystery & more! Direct Download: MP3 Audio | […]

The post Uber's God Complex | Tech Talk Today 95 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We recap Uber’s really bad week & their recent changes in response. Thanks to the Apple Watch SDK we now have an idea of what using one will be like & it’s limitations become more clear.

Plus Viber takes chats public & we ponder why, the Stingray mystery & more!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed

Become a supporter on Patreon:

Foo

Show Notes:

“God View”: Uber Investigates Its Top New York Executive For Privacy Violations

Uber said Tuesday that it is investigating its top New York executive for tracking a BuzzFeed News reporter without her permission in violation of what the transit giant says has long been its privacy policy. The company also published its privacy policy for the first time on Tuesday, though it said the policy had always been in effect.

Uber took both actions in the wake of a BuzzFeed News story that revealed that the reporter’s ride had been tracked without her permission and that another Uber executive had suggested the company might smear journalists who wrote critically of Uber. The executive who suggested digging into the private lives of journalists, Emil Michael, said his comments were “wrong” and that he regrets them.

Tracking customers is easy using an internal company tool called “God View,” two former Uber employees told BuzzFeed News. They said God View, which shows the location of Uber vehicles and customers who have requested a car, was widely available to corporate employees. Drivers, who operate as contractors, do not have access to God View.

Early this November, one of the reporters of this story, Johana Bhuiyan, arrived to Uber’s New York headquarters in Long Island City for an interview with Josh Mohrer, the general manager of Uber New York. Stepping out of her vehicle — an Uber car — she found Mohrer waiting for her. “There you are,” he said, holding his iPhone and gesturing at it. “I was tracking you.”

Mohrer never asked for permission to track her.

11 things we just learned about how the Apple Watch works | The Verge

An iPhone is required — at (almost) all times. In Apple’s own words, Watch apps extend iOS apps. “You begin your Watch app development with your existing iOS app, which must support iPhone.”


Native apps are coming next year. Important footnote from the press release: “Starting later next year, developers will be able to create fully native apps for Apple Watch.”


There could be more Watch sizes later. “Unlike iOS, where you place views at a coordinate on the screen,” Apple says, “with WatchKit, objects automatically flow downward from the top left corner of the screen, filling the available space.”


There are two types of Apple Watch notifications. The “Short Look” is only seen briefly when you raise your wrist — it’s an app icon, an app name, and some brief information. If the wearer keeps their wrist raised long enough — “after a moment,” according to Apple — the screen changes to a “Long Look” notification, which provides more information and is more customizable. For Long Looks, the app icon and name move to the top of the screen, and wearers can scroll down through the interface to use custom actions (such as “comment” or “favorite”) or dismiss the notification.

Glances. We already knew some of this, but now it’s well documented. In addition to the app itself and the notification, developers can make “Glances” for quick view of information (e.g. time, weather, tasks left). All the information must fit on a single screen and is read-only, but you’ll be able to tap it to enter the corresponding app.

No custom gestures. The interface is more or less locked to what Apple wants: vertical swipes scrolls through the screen, horizontal swipes go between pages, taps indicate selection, “force touch” opens up a context menu, and that digital crown scrolls through pages way faster. Additionally an edge swipe left goes back or up a page (“back to the parent interface controller,” if we’re being technical), and an edge swipe up opens the “Glance” view.

Messaging App Viber Takes A Step Into Social Networking With New Public Chats Feature | TechCrunch

Today Viber, the messaging app with 209 million users, is taking a different approach: it is launching Public Chats, giving users a way of using its direct messaging and voice services app to broadcast to the world at large.

Public Chats will see the introduction of live conversation streams — from celebrities, or as CEO Talmon Marco told me, other interesting people “like taxi drivers!” — that will be open for any follower to see, but not necessarily participate in. Users will only be able to jump in and talk in Public Chats if the account in question is in their contacts.

Baltimore Police balk when pressed by judge on phone tracking capabilities – Baltimore Sun

Baltimore prosecutors withdrew key evidence in a robbery case Monday rather than reveal details of the cellphone tracking technology police used to gather it.

The surprise turn in Baltimore Circuit Court came after a defense attorney pressed a city police detective to reveal how officers had tracked his client.

City police Det. John L. Haley, a member of a specialized phone tracking unit, said officers did not use the controversial device known as a stingray. But when pressed on how phones are tracked, he cited what he called a “nondisclosure agreement” with the FBI.


Defense attorney Joshua Insley still believes that police used a stingray to find Taylor. He cited a letter in which prosecutors said they were prohibited by the Department of Justice from disclosing information about methods used in their investigation.

The portable device was developed for the military to help zero in on cellphones. It mimics a cellphone tower to force nearby phones to connect to it.

Records shows that the Baltimore Police Department purchased a stingray for $133,000 in 2009.

The post Uber's God Complex | Tech Talk Today 95 first appeared on Jupiter Broadcasting.

]]>
Corrupt Internet Police | TechSNAP 140 https://original.jupiterbroadcasting.net/47922/corrupt-internet-police-techsnap-140/ Thu, 12 Dec 2013 18:36:38 +0000 https://original.jupiterbroadcasting.net/?p=47922 Well tell you about the perfect crime, that’s Cloud enabled, the NSA gets caught with Google's cookies, and a new breed of corrupt Internet police.

The post Corrupt Internet Police | TechSNAP 140 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The perfect crime, that’s Cloud enabled. The NSA gets caught with Google\’s cookies, and a new breed of corrupt Internet police.

Plus a fantastic batch of your questions, our answers, and much much more!

Thanks to:


\"GoDaddy\"


\"Ting\"


\"iXsystems\"

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Flaw in Microsoft Office 365 allows ‘perfect crime’

  • The researchers who discovered the attack are calling it the ‘Ice Dagger’, because it left behind almost no evidence and it took months of effort by researchers and Microsoft’s Security Response Team to discover what had happened
  • in April 2013, a customer’s nodes analyzed an HTTP request that triggered a “high risk” heuristics alert
  • The request was for an MS Word document hosted on a TOR Hidden Service node (onion.to address)
  • In this case, the request to the TOR service was not made by the user, but by MS Word it self, this elevated the incident to extremely suspicious
  • “Upon reviewing the metadata of the request, we noticed that its response had a WWW-Authenticate header with RootDomain=”sharepoint.com”, even though the request obviously wasn’t for a sharepoint.com domain. At this point we started assessing the situation and treating it as a potential data theft”
  • The end user had received an email specifically addressed to them containing a link to an MS Word document hosted on the TOR Hidden service, a very specific spear phishing attack
  • When the user opened the link, it fired off the MS Office365 URL handler, ms-word:// and MS Word opened the document
  • Due to a bug in MS Word, when the malicious web server sent the same WWW-Authenticate header that Office365 would have sent, MS Word sent the user’s private SharePoint access token back to the malicious web server, even though it should only ever send that token to sharepoint.com
  • With this token, an attacker can access every document in the Office365 environment, including SharePoint and SkyDrive, completely undetected
  • The attacker can copy all of the documents and then delete them, or make subtle modifications that could prove disastrous
  • The attack comes down to a few simple steps:
  • You get a mail asking you to review a document or visit a webpage. Some ideas: Maybe a document with coupons? Someone’s CV? A price quote? A contract? Obviously at least one employee out of hundreds will read the document.
  • You click on the link. The web page asks you to open the document in Word, just like SharePoint Online asks you (shown in step 2 above). Because this dialog is so common when using SharePoint Online, it’s really hard to believe anyone will refuse the request.
  • Word is now requesting the document from the malicious webpage. The malicious webpage asks Word for its Office 365 token and Word willingly gives it. The malicious webpage gives Word a legitimate-looking document in return.
  • The attacker now has your Office 365 token. You have a document which you will shrug off as meaningless and go on with your day.
  • The researchers provided their completed research to Microsoft on May 29th, 2013
  • The patch has finally been released as part of the December Patch Tuesday MS13-104 fixes CVE-2013-5054
  • Conclusions: This was A Perfect Crime. “There was no malware payload to reverse-engineer. No file hash we can trace through time. No IP address to locate and investigate. No servers to confiscate. The attacker simply gets away with your Office 365 token. For good. This is important in the context of understanding the limitations of your existing endpoint and perimeter defenses in the context of SaaS applications and cloud services.”
  • Microsoft also patched a WinVerifyTrust signature validation vulnerability in Windows that can be used to disguise malicious applications as trustworthy, signed executables. \”Exploits targeting this vulnerability have been seen in the wild, so deploy this patch as soon as possible\”
  • Additional Coverage: BetaNews
  • Additional Coverage: Network World
  • Additional Coverage: Information Week
  • Additional Coverage: SC Magazine
  • Additional Coverage: Softpedia

NSA using Google cookies to pinpoint targets for attack

  • The agency\’s internal presentation slides, provided by former NSA contractor Edward Snowden, show that when companies follow consumers on the Internet to better serve them advertising, the technique opens the door for similar tracking by the government
  • The slides also suggest that the agency is using these tracking techniques to help identify targets for offensive hacking operations.
  • According to the documents, the NSA and its British counterpart, GCHQ, are using the small tracking files or \”cookies\” that advertising networks place on computers to identify people browsing the Internet.
  • The intelligence agencies have found particular use for a part of a Google-specific tracking mechanism known as the “PREF” cookie.
  • These cookies typically don\’t contain personal information, such as someone\’s name or e-mail address, but they do contain numeric codes that enable Web sites to uniquely identify a person\’s browser.
  • This cookie allows NSA to single out an individual\’s communications among the sea of Internet data in order to send out software that can hack that person\’s computer. The slides say the cookies are used to \”enable remote exploitation,\”
  • Separately, the NSA is also using commercially gathered information to help it locate mobile devices around the world, the documents show.
  • These specific slides do not indicate how the NSA obtains Google PREF cookies or whether the company cooperates in these programs, but other documents reviewed by the Post indicate that cookie information is among the data NSA can obtain with a Foreign Intelligence Surveillance Act order. If the NSA gets the data that way, the companies know and are legally compelled to assist.
  • Google assigns a unique PREF cookie anytime someone\’s browser makes a connection to any of the company\’s Web properties or services. This can occur when consumers directly use Google services such as Search or Maps, or when they visit Web sites that contain embedded \”widgets\” for the company\’s social media platform Google Plus. That cookie contains a code that allows Google to uniquely track users to \”personalize ads\” and measure how they use other Google products.
  • Another slide indicates that the NSA is collecting location data transmitted by mobile apps to support ad-targeting efforts in bulk. The NSA program, code-named HAPPYFOOT, helps the NSA to map Internet addresses to physical locations more precisely than is possible with traditional Internet geolocation services.

British “Police Intellectual Property Crime Unit” attempts to censor the global Internet

  • We have covered a bit of this story in the past, but it seems to be getting worse, and we have a lot more detail now
  • “Today, a special police unit can decide that a certain website needs to disappear from the Internet, and threaten its domain name registrar into revoking the address “until further notice”, without any legal basis whatsoever.”
  • The PIPCU is claiming success in it’s Operation Creative, a three month campaign where they improperly seized the 40 domains they accused of copyright infringement. Some of the sites were shut down, while some simply moved to a different domain
  • The owners of the 40 domains, nor their registrars or web hosts were ever served with a court order
  • How the PIPCU works:
  • Investigators who work at notorious copyright trolls such as BPI (British Phonographic Industry) and FACT (Federation Against Copyright Theft) scour the Internet, looking for websites that share copyrighted content
  • They then forward this ‘intelligence’ to the PIPCU, which then decides whether or not it will attempt to take down the site.
  • The PIPCU will ask a network of over 60 advertisers to stop placing banners and bankrolling a pirate resource
  • Finally, after a certain period of time, the PIPCU will send a letter to the site’s registrar, asking it to suspend the domain name. Instead of a court order, this peculiar document refers to an outdated section of ICANN’s Registrar Accreditation Agreement, which states that such accreditation can be terminated if the organisation is found to have ‘permitted illegal activity in the registration or use of domain names’.
  • This scare tactic causes many registrars to suspend the domains, rather than risking their entire business by losing their ability to register new domains
  • One registrar has decided to stick up for its users, and the rest of the internet
  • EasyDNS posted the notice on their blog
  • Specifically “We have an obligation to our customers and we are bound by our Registrar Accreditation Agreements not to make arbitrary changes to our customers settings without a valid FOA (Form of Authorization). To supersede that we need a legal basis. To get a legal basis something has to happen in court”
  • Registrars are not ALLOWED to seize a domain without a legal basis. Registrars that complied with the shakedown may actually be in violation of ICANN policies
  • One customer who had their domain seized at another registrar then attempted to move to EasyDNS, however the ‘losing’ registrar, in violation of ICANN policy’, refused to release the domain
  • So EasyDNS requested that Verisign, the operators of the .com and .net registries, make a ruling and release the domain. However Verisign rendered a decision of ‘no decision’
  • Verisign’s reason for no decision? The losing registrar did not provide the requested documentation
  • EasyDNS has appealed the decision with ICANN and we are watching for further developments

Feedback:

3 days 4 hours left to buy


Round Up:


The post Corrupt Internet Police | TechSNAP 140 first appeared on Jupiter Broadcasting.

]]>
Email Constipation | TechSNAP 46 https://original.jupiterbroadcasting.net/17312/email-constipation-techsnap-46/ Thu, 23 Feb 2012 19:17:56 +0000 https://original.jupiterbroadcasting.net/?p=17312 We answer the question: What to do when your email server gets blocked, and why it keeps happening. GSM phones are vulnerable to a simple attack.

The post Email Constipation | TechSNAP 46 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We answer the question: What to do when your email server gets blocked, and why it keeps happening.

PLUS: GSM phones are vulnerable to a simple tracking attack, all you need is some open source software and some spare hardware, we’ll share the details! And we introduce the TechSNAP “Hall of Shame”.

All that more, on this week’s TechSNAP!

Thanks to:

GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Super special savings for TechSNAP viewers only. Get a .co domain for only $7.99 (regular $29.99, previously $17.99). Use the GoDaddy Promo Code cofeb8 before February 29, 2012 to secure your own .co domain name for the same price as a .com.

Pick your code and save:
cofeb8: .co domain for $7.99
techsnap7: $7.99 .com
techsnap10: 10% off
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans
Deluxe Hosting for the Price of Economy (12+ mo plans)
Code:  hostfeb8
Dates: Feb 1-29

   

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

 

Subscribe via RSS and iTunes:

Show Notes:

GSM Networks allow attacks to determine your location without your knowledge

  • Researchers at the University of Minnesota have found a way that an attacker using open source software could locate your cell phone to within 1 square kilometer
  • The GSM Protocol attempts to mask the identity of individual devices by using temporary IDs, however it is possible to map the phone number to these temporary IDs
  • The attack works by placing repeated PSTN phone calls to the mobile number, but disconnecting before the first ring on the handset (~4 seconds)
  • This causes the cell towers in the area where the networks believe the user to be to broadcast ‘paging’ requests to the target handset’s temporarily or immutable ID
  • By listening in on the radio frequency for this broadcast, the attacker can determine if the target is in range of one of the cell towers near them. A few repeated calls allow the attacker to isolate which temporary ID corresponds to the mobile device they are placing the aborted calls to
  • In a large area services by many towers, an attacker can determine if the target is within approximately 100 square kilometers
  • This attack could be used by oppressive governments to determine if a person is present at a protest or other gathering without relying on support from the telco, to determine is a victim is away from home before attempting a robbery, or even to locate a high profile individual for stalking or assassination
  • Research Paper

Feedback:

Q: (Traci) My webhost has been added to an RBL and now emails sent from my domain and from my website cannot be received by some people, can you explain what an RBL is and why it is blocking my email. (Dreamhost servers blocked by Trend Micro RBL )[https://www.dreamhoststatus.com/2012/02/14/mailservers-on-trend-micro-rbl-working-on-removal-from-list/]

A: An RBL or Real Time Blacklist is a list of IP addresses or domain names that the maintainer of the list feels should be blocked from sending emails. There are many different RBLs which different criteria from inclusion and removal from their lists. Most RBLs operate based on DNS due to its light weight and extremely low latency.

So, when an ISP, say, comcast, receives new email directed to one of its customers, it will check details of that email against a number of RBLs they comcast subscribes to. It checks the sending IP, any links included in the email, etc. If one or more of these RBLs returns a positive result, the email may be flagged as spam, or rejected entirely.

Different RBLs cover different problems, Spamhaus.org has lists that cover spam, Trojaned PCs and Open Proxies, Dynamic IP ranges, Spam Domains (sites that spam links to), and compromised servers. Spamcop.net bases its RBL on emails they intercept at honeypot addresses, and sampling the emails that users pay $30/year to have their email filtered via spamcop.net.

One of the most common ways for a webhost to get added to an RBL is when one or most customers run insecure CGI or PHP scripts that send email. When that happens, and attacker can cause your site to send email, or install a script that sends email. Sending large amounts of spam from the web host’s servers will cause it to be listed in the RBLs until the webhost resolves the issue. Many RBLs are automated, where they will add an IP when it is detected as a source of spam, and remove it once it has stopped sending spam for 24 hours. The other common cause of listing in an RBL is hosting sites that are the target of the spam messages (rather than the source). When a web application such as wordpress is compromised, the attacker may be able to install their own site in a subdirectory, using your hosting to host the link that send out in their spam messages. The target of the spam could be a page directing the user to buy something, a phishing site designed to look like paypal or a bank, or even malware, hosting the executable or javascript that the unsuspecting user will run. This last example is similar to the exploit we saw with cryptome last week, if other websites on the internet were infected and made to load a javascript file from a domain hosted at your host, then anti-virus vendors such as Trend Micro may add your webhost to their block list.

In the past, there have been a number of legal battles against RBLs where senders have tried to prosecute the RBL for blocking their communications, however, in the end, it is up the individuals ISPs to decide which RBLs to use and how to interpret the results returned by the RBL.

Email Blacklist Check – See if your server is blacklisted


War Story:

Another in our continuing series of War Stories submitted by the other other Alan (Irish_Darkshadow)

*
This incident took place in mid-April 1999 about two months into my technical support career with the US Thinkpad desk. Despite my rocky start I had managed to establish a reputation for myself as an agent who liked to tackle the more difficult calls. In addition, I had also managed to avoid having a single customer “escalate” on me. That is where a user demands a superior or someone who knows more about their issue to take over the call. That all changed with a single call.

I arrived to work that day for my 16:30 to 01:30 shift and settled in to take my first call. It was a relatively easy one where the user had picked up their laptop from a servicer and was having boot problems. It turned out to be a simple case of the servicer having left a driver disk in the floppy drive. Top to bottom the call took about 13 minutes including typing up the documention for it in our ticketing system. I sat in Avail on my phone for the next few minutes before my next call arrived.

Once I managed to get the initial greeting script out I was slammed with a guy screaming down the line about wanting to speak to a manager. I was resigned at this point to losing my “no escalation” record but I still needed to follow procedure and determine what grievance had the user so irate before putting a team lead or manager on the line with him. It took me a few mins to calm him down enough and to vent sufficiently for me to start gathering some information. It turned out that he had returned his laptop to IBM on three separate occasions in the first nine weeks he had owned it for various compatibility issues with 3rd party devices he had purchased. I could see his point of view perfectly in wanting an escalation and I placed him on hold to go look for someone in authority to help the guy out.

My team leader (TL) at the time was easily located and once I had explained the situation he decided to delegate the matter to his assistant team leader (ATL). I took her to my desk where she started speaking with the user and I strolled back to my TL to get some ribbing for my first customer escalation. Normally when a TL or ATL takes over a call it results in the user being placated in some manner or else the customer gets transferred to Customer Relations to be dealt with appropriately. Either way, once an agent handed off a call like that they simply waited for a resolution before taking the next call. No such luck this time. The ATL walked up to where I was standing and started to explain the situation to the TL and how the user had returned the machine three times with no faults found but he still could not get his 3rd party devices to work. Nothing too new there but then she dropped the bombshell that she had promised the user that I would troubleshoot the hardware issues for him immediately! This was unheard of, the customer had four devices that I had no familiarity with and this ATL had just thrown me under the frickin’ bus. I looked at the TL for some sanity to be brought to the situation but he had to acknowledge that the ATL had committed a course of action to the customer and I was going to have to pay for her generosity. Back to my desk I went whilst cursing the ATL, her lineage and any future offspring…..but in a harmless way 😀

Once I was back on the call with the user I started to gather some details on exactly what I was dealing with. The user had a Thinkpad 560 which is termed a “single spindle” machine in that it only had a hard drive within the chassis and no floppy or optical devices. The external floppy drive was attachable via an IBM proprietary connector and the machine was a Pentium 120 with 32mb RAM, a 2.1 Gb HDD and an IrDA 1.0 header.

Now that I had some idea of the core hardware I ventured into the realm of 3rd party peripherals that the user was struggling with. He had a backpack cdrom (parallel port optical drive), a PCMCIA modem, a PCMCIA network card and a HP printer that he wanted to connect to via Infrared. I knew I was screwed at that point but figured I couldn’t really make the problem worse since none of the hardware operational anyway.

I began working with the backpack cdrom which was attached to the printer port. Windows 95 v2.1 was not detecting any new hardware once the drive was switched on. I tried the usual places like device manager for clues but all I could determine was that the parallel port appeared to be operational. I put the cdrom to the side and started working on the two PCMCIA cards. Despite the user having the proprietary CardMagic software installed that acted as a crutch to Windows 95 plug & play (*pray) neither card was detected and a pattern was beginning to emerge. The IR printer suffered from the same lack of detection and so I asked the user if he had any other device that we could attach to the laptop just to see if Windows was detecting anything at all. He connected up the external floppy drive and instantly it was detected and accessible in Windows Explorer. SHIT!!! My instincts were telling me that the OS was corrupted in some way and a reload was imminent and I hated having to do that to any user.

I sent an IM to the Team Leader to let him know that I was going to have to do a reload and he told me to stay on the call with the customer until the reload was complete and then resume working on the 3rd party hardware. As I was preparing the user for the reload I had a sudden realisation of how bad the situation really was. A single spindle machine comes with a specific reload solution where a user starts up Windows for the first time and they get prompted to insert floppy disks onto which the reload disk images will be “burned”. At first the customer didn’t recall any such prompt and I began to get a sinking feeling that I would need to have this laptop shipped to IBM for the 4th time just for a reload and then once it was returned to him, I would need to pick up with troubleshooting the 3rd party hardware. The user had a Eureka moment and told me that he believed that he had a shoe box with the floppy disks that had been in his office closet since the day he made them. He managed to locate the shoe box and the 37 floppy disks inside. 26 of those were the base OS and 11 were for the application layer.

I reckoned that the reload was going to take about two hours to complete which presented me with another challenge due to the team leader telling me to stay on the phone through to completion. One of the rules was that there should not be any dead silences during a tech support call so I was going to have to find a way to get this guy talking for the two hours in between me asking him about what was on the screen and how many disks he had left to go through. This was gonna be fun!

For the two hours of the reload, as the customer went through his 37 disks, I managed to lure him into topics like his job and prior computer experience and pretty much anything else I could come up with to keep things flowing. I was trying to hit on a topic that would allow for lots of conversation with minimal input from my side. It turned out that he was a Judge in NYC who handled criminal cases. The only common ground there is that I could explain to him that I loved My Cousin Vinny which I figured would not go down very well. Eventually he mentioned that his son was at soccer practice and he needed to arrange someone else to pick him up while we reloaded the laptop. That was my angle, I started talking to the guy about every possible soccer item that came to mind and the rest of the reload flew by without incident. I got him to go into the BIOS and I set up the the parallel port and PCMCIA slots before dealing with Windows.

Once the operating system was back on there and up and running I got him to attach the backpack cdrom and I heard the detection sound over the phone. That meant I had at least found one issue and corrected it. Device manager showed the cdrom with an exclamation mark and it looked to me like this thing needed to be installed from a DOS perspective before it would work in Windows. He had a driver disk for the cdrom which I was able to get running in DOS mode so that it added the driver to the config.sys file and called it from the autoexec.bat file. A quick reboot later and the cdrom was usable from within Windows 95. Problem #2 solved. Time for the PCMCIA fun and games.

I decided to go with setting up the modem first as it would be easiest to test. Upon insertion the card was instantly detected and I was able to talk him through configuring it in the CardMagic application. He hooked it up to his fax line and was able to connect to his ISP at a staggering, no, blistering 28.8kbps! Either way, problem #3 solved.

The network card was up next and once more upon insertion it was detected and was able to find a driver on the backpack cdrom drive. There was no network near the user that I could test with but I was able to talk him through some ping tests and winipcfg.exe tests that implied the TCP/IP stack was operational and the bindings to the card were good. So we agreed to call that problem #4 solved. I felt that I was in the home stretch now and when I looked at the clock I realised that the call was coming up on three and a half hours already. Now it was time to get the printer operational.

The printer was able to print a self test page from the buttons on it and so it appeared to be working from a hardware perspective. I got the user to test it using the parallel port by removing the backpack cdrom and that was also successful. The problem came when trying to get the IR link to the printer to work. No matter what configuration I tried I just could not get a connection between the IrDA header on the laptop and that on the HP printer. The customer refused to believe that it was the printer and was adamant that the IrDA header on the Thinkpad was at fault. I was completely stuck for a way to prove otherwise. At some point during that desperation to come up with a troubleshooting idea after nearly four hours of work I hit upon an idea that made sense…at least to me. I asked the user to confirm what COM port the IrDA was configured as and then I had him connect to that COM port via the Hyperterminal application. My next request was a weird one, I asked him to get a remote from a TV or a VCR for me. He rummaged around for a while and then found one for some small TV he had in his office that was barely used. I asked him to point it at the IrDA header on the laptop and keep pressing random buttons on it while watching the hyperterminal window. He said that gibberish symbols came up in the window whenever he pressed a button on the remote. EUREKA! I had solved problem #5 by proving that the issue was with the IR port on the printer and not the one on the laptop. He agreed with my conclusion and he asked me if I would set up the printer on the parallel port so that he could just hook up a cable if he needed to. As we were going through the steps of hooking up the backpack to install the driver he told me that he got a blue and then a black screen. The text said “registry not found”. Apparently he had decided to pull out the PCMCIA cards while the LPT printer driver was installing and it had thrashed Windows.

My first attempt at a solution was a reboot into safe mode but that failed with the same error and I was only able to get the system to reboot into DOS mode. From there I backed up the existing registry files and restored the user.da0 and system.dao clean registry files. When he booted back into Windows, we were back where things started….no hardware was detected once attached. EPIC USER FAIL!!!
With just over four hours on the timer, the whole procedure had to be done all over again. I asked the user if I could put him on hold and he agreed. Firstly I dealt with my bladder and then I went to the TL and told him what was happening and the sadistic bastard told me to go back with the user and see it through to completion. Fucker.

I got back onto the call and we started going through the whole process all over again from the ground up with one caveat – don’t do anything with the computer unless I authorised it. During the two hour reload portion of the call I got him to give me his AOL email address and I sent him a copy of a tool from the Microsoft site called E.R.U. (emergency recovery utility). This time around once we had managed to get all of the hardware and software to where it needed to be and we had done enough tests to convince us both that everything was operational. At that point I ran the ERU application and made him store that recovery set in his shoe box of floppy disks. We exchanged pleasanties and parted ways. I checked the timer and 8 hrs 38 minutes had passed.

On an average day I would deal with twenty to twenty five calls in a single shift. On this day I managed a grand total of two calls with 1 pee break and no food as I hadn’t taken any of my breaks. However, I was able to leave the office two hours earlier than expected. That didn’t really help with my complete burnout after that long of a call but at least I had a new record for the longest tech support call in the history of the call center and that record still stands today as far as I know.

Try to get a 8hr plus support call in a current day call center. Aside from the focus on 7 minutes per call I doubt you will find the will and dedication to send a customer away satisfied with the experience.

And I never even got a medal but if I ever get into nefarious matters in NYC, I will be calling in a favour from a certain Judge I know there.


Round Up:

The post Email Constipation | TechSNAP 46 first appeared on Jupiter Broadcasting.

]]>