Vatican – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Sun, 20 Jul 2014 22:55:37 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Vatican – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Debunking Manjaro Myths | LAS 322 https://original.jupiterbroadcasting.net/62637/debunking-manjaro-myths-las-322/ Sun, 20 Jul 2014 14:54:46 +0000 https://original.jupiterbroadcasting.net/?p=62637 Rob McCathie from the Manjaro project joins us to discuss some recent troubles in the community, bust common myths about Manjaro, their relationship with Arch Linux, and what the future holds for the project. Plus we look at some Fedora 21 features, Google’s Project Zero, Linus’ home office…. AND SO MUCH MORE! All this week […]

The post Debunking Manjaro Myths | LAS 322 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Rob McCathie from the Manjaro project joins us to discuss some recent troubles in the community, bust common myths about Manjaro, their relationship with Arch Linux, and what the future holds for the project.

Plus we look at some Fedora 21 features, Google’s Project Zero, Linus’ home office….

AND SO MUCH MORE!

All this week on, The Linux Action Show!

Thanks to:


DigitalOcean


Ting

Download:

HD Video | Mobile Video | WebM Torrent | MP3 Audio | Ogg Audio | YouTube | HD Torrent

RSS Feeds:

HD Video Feed | Large Video Feed | Mobile Video Feed | MP3 Feed | Ogg Feed | iTunes Feeds | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

Rob McCathie from Manjaro:


System76

Brought to you by: System76

Manjaro Background

About | Manjaro Linux

Manjaro is a user-friendly Linux distribution based on the independently developed Arch operating system. Within the Linux community, Arch itself is renowned for being an exceptionally fast, powerful, and lightweight distribution that provides access to the very latest cutting edge – and bleeding edge – software. However, Arch is also aimed at more experienced or technically-minded users. As such, it is generally considered to be beyond the reach of those who lack the technical expertise (or persistence) required to use it.

Developed in Austria, France, and Germany, Manjaro provides all the benefits of the Arch operating system combined with a focus on user-friendliness and accessibility. Available in both 32 and 64 bit versions, Manjaro is suitable for newcomers as well as experienced Linux users. For newcomers, a user-friendly installer is provided, and the system itself is designed to work fully ‘straight out of the box’ with features

Why Manjaro was started

When Manjaro was started, there were already many Linux distributions, a fact the team would have been aware of. So I’m betting there were some core ideas and problems Manjaro wanted to solve.

What were those core issues?

Why Arch?

Tell us about your choice to base off Arch? We see more distros doing that now, but when Manjaro started it was not that common. Debian or perhaps even Fedora might have been a more traditional choice for example.

How far away from Arch could you see Manjaro going?

In your opinion do you see a need move away from Arch further to meet the requirements of the project?

Recent Team Shake up?

The Manjaro community.

THe Manjaro community seems very vibrant, with a tight knit group on the forums and other places Manjaro users gather. It reminds me a lot of the proto-Ubuntu community. In your opinion, What are some of the unique aspect of the Manjaro project and it’s community that have attributed to this?

The Future?

What are you looking forward to for in the future of Linux, and Manjaro?


— PICKS —

Runs Linux

BAV – Vatican Library

Desktop App Pick

Haroopad – The Next Document processor based on Markdown

The Markdown enabled Next Document Processor

Weekly Spotlight

nbwmon · GitHub

ncurses bandwidth monitor

  • nbwmon-git in the AUR

— NEWS —

Linus Torvalds Guided Tour of His Home Office – YouTube

See inside the workspace of the world’s most famous developer, Linux creator Linus Torvalds, in this rare, personal tour.

Linux kernel developer and maintainer Greg Kroah-Hartman takes on a short tour of his workspace.

Docker to be a big part of Fedora going forward, also Fedora 21’s name

Fedora in Spaaaaace

In the Fedora Cloud WG, we’re planning on producing official Fedora Docker base images — these will be produced and uploaded by Fedora Release Engineering. Right now, because Docker is a key part of the upcoming Project Atomic-based Fedora Atomic, the Cloud SIG is doing the initial work and QA, but, eventually, the plan is to hand this off to the Environments and Stacks WG, because it looks like Docker and containerization will be important across much of Fedora in the future.

This is old news to many of us, but I’ve gotten the question a few times — what will Fedora 21 be named? Well, it’ll be named “Fedora 21″, without any codename. This was decided by the Fedora Project Board last October

  • The first Fedora 21 Alpha release is scheduled for August 5th.

Google recruits top PS3 hacker for Project Zero

Geohots

You should be able to use the web without fear that a criminal or state-sponsored actor is exploiting software bugs to infect your computer, steal secrets or monitor your communications. Yet in sophisticated attacks, we see the use of “zero-day” vulnerabilities to target, for example, human rights activists or to conduct industrial espionage. This needs to stop. We think more can be done to tackle this problem.

Project Zero is our contribution, to start the ball rolling. Our objective is to significantly reduce the number of people harmed by targeted attacks. We’re hiring the best practically-minded security researchers and contributing 100% of their time toward improving security across the Internet.

We’re not placing any particular bounds on this project and will work to improve the security of any software depended upon by large numbers of people, paying careful attention to the techniques, targets and motivations of attackers. We’ll use standard approaches such as locating and reporting large numbers of vulnerabilities. In addition, we’ll be conducting new research into mitigations, exploitation, program analysis—and anything else that our researchers decide is a worthwhile investment.

— FEEDBACK —

— CHRIS’ STASH —

Hang in our chat room:

irc.geekshed.net #jupiterbroadcasting

— MATT’S STASH —

Find us on Google+

Find us on Twitter

Follow the network on Facebook

Catch the show LIVE Sunday 10am Pacific / 1pm Eastern / 6pm UTC:

The post Debunking Manjaro Myths | LAS 322 first appeared on Jupiter Broadcasting.

]]>
NASA Hacked 5,400 Times? | TechSNAP 47 https://original.jupiterbroadcasting.net/17571/nasa-hacked-5400-times-techsnap-47/ Thu, 01 Mar 2012 20:20:13 +0000 https://original.jupiterbroadcasting.net/?p=17571 NASA loses the keys to the International Space Station, Microsoft can’t figure out what day it is, and laugh over the lack of security at Stratfor.

The post NASA Hacked 5,400 Times? | TechSNAP 47 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

NASA loses the keys to the International Space Station, Microsoft can’t figure out what day it is, and I laugh myself to tears over the lack of security at Stratfor

All that and more, on this week’s TechSNAP!

Thanks to:

GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Super special savings for TechSNAP viewers only. Get a .co domain for only $7.99 (regular $29.99, previously $17.99). Use the GoDaddy Promo Code cofeb8 before the end of March to secure your own .co domain name for the same price as a .com.

Private Registration use code: march8

Pick your code and save:
cofeb8: .co domain for $7.99
techsnap7: $7.99 .com
techsnap10: 10% off
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans

   

 

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:

Show Notes:

NASA laptop stolen, contained control algorithms for the International Space Station

  • In 2010 and 2011 NASA reported 5,408 computer security incidents ranging from the installation of malware on a computer, through the theft of devices and cyber attacks suspected to be from foreign intelligence agencies.
  • 47 incidents were identified as Advance Persistent Threat attacks, and of these, 13 were successful in compromising the agency’s computer systems
  • In an example of such an incident, attackers from Chinese-based IP addresses gained full access to a number of key JPL systems giving them the ability to:
  • Modify, copy or delete sensitive files
  • Add, modify or delete user accounts for mission critical systems
  • Upload hacking tools (keyloggers, rootkits) to steal user credentials and thereby compromise other NASA systems
  • Modify or corrupt the system logs to conceal their actions
  • Some of the breaches have resulted in the unauthorized release of Personally Identifiable Information, the disclosure of sensitive export-controlled data and 3rd party intellectual property
  • Inspector General Testimony before Congress re: IT Security
  • Discovery News Coverage

Windows Azure suffers worldwide outage

  • The Microsoft Azure Cloud service was down for most of the day on February 29th
  • The Service Management system was down for over 9 hours
  • Azure Data Sync was down form 2012–02–29 08:00 through 2012–03–01 03:00 UTC
  • Microsoft says that the outage appears to have been caused by a leap year bug
  • “28 February, 2012 at 5:45 PM PST Windows Azure operations became aware of an issue impacting the compute service in a number of regions,”
  • “While final root cause analysis is in progress, this issue appears to be due to a time calculation that was incorrect for the leap year.”
  • Microsoft Azure Service Dashboard
  • The outage also effected the UK Government’s ‘G-Cloud’ CloudStore
  • TechWeek Europe Coverage
  • Slashdot Coverage – Outage Root Cause
  • PCWorld – Previous Microsoft problems with Leap Years

Wikileaks releases the data stolen in the StratFor compromise


Feedback:

Q: Robert Bishop Writes: Can I Secure my network with multiple NAT routers to isolate a system?

War Story:

This is a war story with a difference, as it didn’t involve some crazy user doing some bat shit crazy thing with their computer. It was simply a call to one of the tech support agents where the user wanted to know the following:

“What is the exact chemical composition of the battery in the Thinkpad 760 XD?”
“What are the recommended disposal procedures for said battery?”
“Can you tell me what would happen to the battery if it ruptured in a vacuum environment?”
“If the battery were to overheat, how volatile would the liquid effluent be?”

I doubt the user could have even gotten the questions out and taken a breath before the agent put them on hold and ran for help. The agent walked over to the second level support area rather than call as per procedure. After a good five minutes of talking, nobody could really answer the questions and worse, we couldn’t figure out what part of the company might actually have those answers.

As with all good tech support strategies we decided a two pronged approach – the agent would get back on with the user and stall for time while the rest of us would frantically hunt down any possible source of information that could help. We told the agent to ask why the user needed such detailed information and if it was a weak answer to push for a callback to buy even more time.

Some twenty minutes later the agent came back over to us with some interesting details on what was going on. It was all a misunderstanding. The user was supposed to call some private support number at IBM and not the public number. Our enterprising young agent did pull a fast one and offer to transfer the user to the number directly. The user provided the number and the agent promptly connected the call, then hit mute and stayed on the line. An American accent answered, the user responded and provided an account code upon request.

The tech on the private number acknowledged that the user was calling from NASA – Blackhawk Technologies Subsidiary. Apparently the shuttle program had 4 of those laptops on each mission – 1 primary and 3 redundant backups just in case. Suddenly the tricky questions all made sense. And eavesdropping can kill curiosity can never be a bad thing, right?

Round Up:

The post NASA Hacked 5,400 Times? | TechSNAP 47 first appeared on Jupiter Broadcasting.

]]>