virtualbox – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Wed, 01 Apr 2020 01:40:11 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png virtualbox – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Arm is Here | LINUX Unplugged 347 https://original.jupiterbroadcasting.net/140712/arm-is-here-linux-unplugged-347/ Tue, 31 Mar 2020 17:30:00 +0000 https://original.jupiterbroadcasting.net/?p=140712 Show Notes: linuxunplugged.com/347

The post Arm is Here | LINUX Unplugged 347 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxunplugged.com/347

The post Arm is Here | LINUX Unplugged 347 first appeared on Jupiter Broadcasting.

]]>
Kickin’ Harder Than a Sensei | Ask Noah 20 https://original.jupiterbroadcasting.net/117231/kickin-harder-than-a-sensei-ask-noah-20/ Mon, 07 Aug 2017 21:16:18 +0000 https://original.jupiterbroadcasting.net/?p=117231 RSS Feeds: MP3 Feed | HD Video Feed | iTunes Feed Become a supporter on Patreon: — Show Notes: — — The Cliff Notes — LineageOS – LineageOS Android Distribution F-Droid – Free and Open Source Android App Repository yeriomin/YalpStore: Download apks from Google Play Store — Stay In Touch — Find all the resources […]

The post Kickin' Harder Than a Sensei | Ask Noah 20 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

MP3 Feed | HD Video Feed | iTunes Feed

Become a supporter on Patreon:

Patreon

— Show Notes: —

— The Cliff Notes —

— Stay In Touch —

Find all the resources for this show on the Ask Noah Dashboard

Ask Noah Dashboard

Need more help than a radio show can offer? Altispeed provides commercial IT services and they’re excited to offer you a great deal for listening to the Ask Noah Show. Call today and ask about the discount for listeners of the Ask Noah Show!

Altispeed Technologies

Contact Noah

asknoah [at] jupiterbroadcasting.com

— Twitter —

The post Kickin' Harder Than a Sensei | Ask Noah 20 first appeared on Jupiter Broadcasting.

]]>
Switching London to Linux | Ask Noah 18 https://original.jupiterbroadcasting.net/116871/switching-london-to-linux-ask-noah-18/ Mon, 24 Jul 2017 18:07:06 +0000 https://original.jupiterbroadcasting.net/?p=116871 RSS Feeds: MP3 Feed | HD Video Feed | iTunes Feed Become a supporter on Patreon: — Show Notes: — — The Cliff Notes — How to automate your system administration tasks with Ansible | Opensource.com Netflix Throttle Megathread : verizon Why do enterprise environments typically choose to deploy Red Hat or CentOS instead of […]

The post Switching London to Linux | Ask Noah 18 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

MP3 Feed | HD Video Feed | iTunes Feed

Become a supporter on Patreon:

Patreon

— Show Notes: —

— The Cliff Notes —

— Stay In Touch —

Find all the resources for this show on the Ask Noah Dashboard

Ask Noah Dashboard

Need more help than a radio show can offer? Altispeed provides commercial IT services and they’re excited to offer you a great deal for listening to the Ask Noah Show. Call today and ask about the discount for listeners of the Ask Noah Show!

Altispeed Technologies

Contact Noah

asknoah [at] jupiterbroadcasting.com

— Twitter —

The post Switching London to Linux | Ask Noah 18 first appeared on Jupiter Broadcasting.

]]>
Virtualization Revelation | LAS 418 https://original.jupiterbroadcasting.net/99891/virtualization-revelation-las-418/ Sun, 22 May 2016 17:39:19 +0000 https://original.jupiterbroadcasting.net/?p=99891 We share our early experiences with virtualization, then show you how Linux’s built-in enterprise grade virtualization curb stomps some commercial options. The discussion wraps up with examples of awesome hardware passthrough, and the major shift Linux has made possible. PLUS: Chromebooks outsell Macs, the sad story of an important project fading away, the big choice […]

The post Virtualization Revelation | LAS 418 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We share our early experiences with virtualization, then show you how Linux’s built-in enterprise grade virtualization curb stomps some commercial options. The discussion wraps up with examples of awesome hardware passthrough, and the major shift Linux has made possible.

PLUS: Chromebooks outsell Macs, the sad story of an important project fading away, the big choice facing Fedora & more!

Thanks to:


DigitalOcean


Ting


Linux Academy

Direct Download:

HD Video | Mobile Video | WebM Torrent | MP3 Audio | OGG Audio | YouTube | HD Torrent

RSS Feeds:

HD Video Feed | Large Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

— Show Notes: —


System76

Brought to you by: Linux Academy

Virtualization

libvirt

Libvirt is collection of software that provides a convenient way to manage virtual machines and other virtualization functionality, such as storage and network interface management. These software pieces include a long term stable C API, a daemon (libvirtd), and a command line utility (virsh). A primary goal of libvirt is to provide a single way to manage multiple different virtualization providers/hypervisors, such as the KVM/QEMU, Xen, LXC, OpenVZ or VirtualBox hypervisors

Virtual Machine Manager Home

Virtual Machine Manager Screenshot

The virt-manager application is a desktop user interface for managing virtual machines through libvirt. It primarily targets KVM VMs, but also manages Xen and LXC (linux containers). It presents a summary view of running domains, their live performance & resource utilization statistics. Wizards enable the creation of new domains, and configuration & adjustment of a domain’s resource allocation & virtual hardware. An embedded VNC and SPICE client viewer presents a full graphical console to the guest domain.

Boxes – GNOME Wiki!
UEFI in Virutal Machines, Meet OVMF

OVMF is an EDK II based project to enable UEFI support for Virtual Machines. OVMF contains a sample UEFI firmware for QEMU and KVM.

Using CPU host-passthrough with virt-manager

virt-manager

Since host-passthrough is the only reliably way to expose the full capabilities of the host CPU to the VM, users regularly want to enable it.

unraid – Virtualization Host

In our case, we created 7 discrete gaming systems capable of running concurrently and completely independently of each other – all running in a single tower.

Another $30,000 worth of computer hardware.. But can it power TEN gaming rigs this time??

Proxmox – Powerful Open Source Server Solutions

How To

Server
  • yum install kvm qemu-kvm python-virtinst libvirt libvirt-python virt-manager libguestfs-tools

  • chkconfig libvirtd on

  • service libvirtd start

  • yum install bridge-utils

  • Open Virt-Manager > click + > Bridge > br0 > Start Mode: onboot > Activate Now > Check eth0

Client
  • Install virt-manager

— PICKS —

Runs Linux

The NVIDIA DGX-1 Deep Learning System, Runs Linux

 DGX-1 Banner

Desktop App Pick

Netdata – Real-Time Performance Monitoring

Netdata Screenshot

netdata is a highly optimized Linux daemon providing real-time performance monitoring for Linux systems, Applications, SNMP devices, over the web !

nethogs screenshot

NetHogs is a small ‘net top’ tool. Instead of breaking the traffic down per protocol or per subnet, like most tools do, it groups bandwidth by process.

Spotlight

systemd GUI: systemd-manager

Imgur

This application exists to allow the user to manage their systemd services via a GTK3 GUI. Not only are you able to make changes to the enablement and running status of each of the units, but you will also be able to view and modify their unit files, check the journal logs. In addition, systemd analyze support is available to display the time it takes for systemd to boot the system.

Patrons watch the full live version of LAS


— NEWS —

Chromebooks outsold Macs for the first time in the US

Google’s low-cost Chromebooks outsold Apple’s range of Macs for the first time in the US recently. While IDC doesn’t typically break out Windows vs. Chromebook sales, IDC analyst Linn Huang confirmed the milestone to The Verge. “Chrome OS overtook Mac OS in the US in terms of shipments for the first time in 1Q16,” says Huang. “Chromebooks are still largely a US K-12 story.”


Fedora just missed rebasing on the goodness that is Linux 4.6

  • Fedora 24 ships June 14, 2016

And because of that, it looks like Linux kernel 4.6 will not be the default for the Fedora 24 operating system, which will ship in less than a month, on June 14, 2016, with the latest maintenance release of the Linux 4.5 kernel series. However, the chances are that Linux kernel 4.6 will be shortly released to the stable channels for users to upgrade their current kernel after Fedora 24’s official release.

Linux kernel 4.6 was announced by Linus Torvalds on May 15, 2016. It promises to offer users a new distributed file system, OrangeFS, support for the USB 3.1 SuperSpeed Plus (SSP) protocol, Out Of Memory task killer reliability improvements, support for Intel Memory protection keys, the Kernel Connection Multiplexor, as well as 802.1AE MAC-level encryption (MACsec) support.

Moreover, Linux kernel 4.6 ships with support for the BATMAN V protocol, an online inode checker for the OCFS2 file system, dma-buf, support for cgroup namespaces, and support for the pNFS SCSI layout. The first GNU/Linux distributions to adopt the Linux 4.6 kernel branch are Gentoo, Arch Linux, and SparkyLinux, and openSUSE Tumbleweed should join them in the coming weeks.

lm-sensors project dead?

It’s been a year since the last LM-Sensors release and the project isn’t as vibrant or active as it once was while the project site has been down for a while now and it doesn’t appear to be coming back.

Mattermost continues to bring the heat to Slack

Mattermost 3.0 offers a long awaited features: multi-team accounts, Japanese language translation, and full width display, plus upgrades to apps for iOS, Android, Windows, Linux and Mac, emojis, and we have new integrations for Outlook, Ruby & Rust.

Introducing Mycroft Core – Mycroft

We are pleased to announce that Mycroft Core 0.6 Alpha is available for download today. Mycroft Core is a lightweight, portable piece of software written in Python. You can run it on anything from a Raspberry Pi to a gaming rig.

Mail Bag

Call Box

Catch the show LIVE SUNDAY:

— CHRIS’ STASH —

Chris’s Twitter account has changed, you’ll need to follow!

Chris Fisher (@ChrisLAS) | Twitter

Hang in our chat room:

irc.geekshed.net #jupiterbroadcasting

— NOAH’S STASH —

Noah’s Day Job

Altispeed Technologies

Contact Noah

noah [at] jupiterbroadcasting.com

Find us on Google+

Find us on Twitter

Follow us on Facebook

The post Virtualization Revelation | LAS 418 first appeared on Jupiter Broadcasting.

]]>
PowerSSHell | Tech Talk Today 178 https://original.jupiterbroadcasting.net/83182/powersshell-tech-talk-today-178/ Wed, 03 Jun 2015 10:19:56 +0000 https://original.jupiterbroadcasting.net/?p=83182 Microsoft announces support for SSH built into powershell, crashing Skype with a simple text chat, Tim Cook defends user’s rights to privacy and encryption & running OS X in VirtualBox. Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube RSS Feeds: MP3 Feed | OGG Feed | iTunes […]

The post PowerSSHell | Tech Talk Today 178 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Microsoft announces support for SSH built into powershell, crashing Skype with a simple text chat, Tim Cook defends user’s rights to privacy and encryption & running OS X in VirtualBox.

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

The post PowerSSHell | Tech Talk Today 178 first appeared on Jupiter Broadcasting.

]]>
Venomous Floppy Legacy | TechSNAP 214 https://original.jupiterbroadcasting.net/82132/venomous-floppy-legacy-techsnap-214/ Thu, 14 May 2015 18:46:30 +0000 https://original.jupiterbroadcasting.net/?p=82132 We explain the Venom vulnerability, what the impact is & the steps major providers are taking to protect themselves. Plus strategies to mitigate Cyber Intrusions, a truly genius spammer, great questions, a huge round up & more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: HD Video | Mobile Video | MP3 Audio […]

The post Venomous Floppy Legacy | TechSNAP 214 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We explain the Venom vulnerability, what the impact is & the steps major providers are taking to protect themselves.

Plus strategies to mitigate Cyber Intrusions, a truly genius spammer, great questions, a huge round up & more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

VENOM: Virtualized Environment Neglected Operations Manipulation

  • A flaw in the way qemu emulates floppy disks could allow an attacker to break out of a virtual machine and take over the host
  • “This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host. Absent mitigation, this VM escape could open access to the host system and all other VMs running on that host, potentially giving adversaries significant elevated access to the host’s local network and adjacent systems.”
  • This vulnerability affects qemu, KVM, VirtualBox, and some types of Xen, because they all share the same qemu floppy emulation code
  • Unaffected hypervisors include: VMWare, Hyper-V, Bochs, and bhyve
  • The issue has been assigned the identifier CVE-2015-3456
  • “Since the VENOM vulnerability exists in the hypervisor’s codebase, the vulnerability is agnostic of the host operating system (Linux, Windows, Mac OS, FreeBSD, etc.).”
  • “It needs to be noted that even if a guest does not explicitly have a virtual floppy disk configured and attached, this issue is exploitable. The problem exists in the Floppy Disk Controller, which is initialized for every x86 and x86_64 guest regardless of the configuration and cannot be removed or disabled.”
  • “The guest operating system communicates with the FDC by sending commands such as seek, read, write, format, etc. to the FDC’s input/output port. QEMU’s virtual FDC uses a fixed-size buffer for storing these commands and their associated data parameters. The FDC keeps track of how much data to expect for each command and, after all expected data for a given command is received from the guest system, the FDC executes the command and clears the buffer for the next command. This buffer reset is performed immediately at the completion of processing for all FDC commands, except for two of the defined commands. An attacker can send these commands and specially crafted parameter data from the guest system to the FDC to overflow the data buffer and execute arbitrary code in the context of the host’s hypervisor process.”
  • “The VENOM vulnerability has existed since 2004, when the virtual Floppy Disk Controller was first added to the QEMU codebase.”
  • “After verifying the vulnerability, CrowdStrike responsibly disclosed VENOM to the QEMU Security Contact List, Xen Security mailing list, Oracle security mailing list, and the Operating System Distribution Security mailing list on April 30, 2015.
  • After a patch was developed CrowdStrike publicly disclosed VENOM on May 13, 2015. Since the availability of the patch, CrowdStrike has continued to work with major users of these vulnerable hypervisors to make sure that the vulnerability is patched as quickly as possible.”
  • CrowdStrike blog about the disclosure
  • “While it seems obvious that infrastructure providers could be impacted, there are many other less obvious technologies that depend on virtualization. For example, security appliances that perform virtual detonation of malware often run these untrusted files with administrative privileges, potentially allowing an adversary to use the VENOM vulnerability to bypass, crash or gain code execution on the very device designed to detect malware.”
  • “CrowdStrike would also like to publicly recognize Dan Kaminsky, Chief Scientist at White Ops, who is a renowned researcher with extensive experience discovering and disclosing major vulnerabilities. Dan provided invaluable advice to us throughout this process on how best to coordinate the release of open source patches across the numerous vendors and users of these technologies.”
  • Xen Advisory
  • Amazon Statement
  • Digital Ocean statement
  • Redhat Advisory
  • Working PoC exploit
  • This has refocused attention on some older work to exploit qemu/KVM, like this from DEFCON / BlackHat 2011
  • Or this paper from a Google researcher from 2007: An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments
  • There is also some backlash against the naming and glamorization of vulnerabilities, as seen with the recent announcement of AnalBleed

Strategies to Mitigate Targeted Cyber Intrusions – From the Australian Signals Directorate


Mumblehard — Muttering spam from your servers

  • “Several thousand computers running the Linux and FreeBSD operating systems have been infected over the past seven months with sophisticated malware that surreptitiously makes them part of a renegade network blasting the Internet with spam”
  • The virus consisted of perl code packed into an ELF binary
  • During a 7 month monitoring period, Eset researchers saw 8,867 IP addresses connect to one of the command and control servers
  • “The Mumblehard malware is the brainchild of experienced and highly skilled programmers. It includes a backdoor and a spam daemon, which is a behind-the-scenes process that sends large batches of junk mail.”
  • “These two main components are written in Perl and they’re obfuscated inside a custom “packer” that’s written in assembly, a low-level programming language that closely corresponds to the native machine code of the computer hardware it runs on. Some of the Perl script contains a separate executable with the same assembly-based packer that’s arranged in the fashion of a Russian nesting doll. The result is a very stealthy infection that causes production servers to send spam and may serve other nefarious purposes.”
  • “Malware targeting Linux and BSD servers is becoming more and more complex,” researchers from Eset wrote. “The fact that the authors used a custom packer to hide the Perl source code is somewhat sophisticated. However, it is definitely not as complex as the Windigo Operation we documented in 2014. Nonetheless, it is worrying that the Mumblehard operators have been active for many years without disruption.”
  • The way the malware was architected, it polled a list of Command and Control servers, accepting commands from any of them
  • The list included some legitimate sites, to throw researchers off
  • “A version of the Mumblehard spam component was uploaded to the VirusTotal online malware checking service in 2009, an indication that the spammer program has existed for more than five years. The researchers were able to monitor the botnet by registering one of the domain names that Mumblehard-infected machines query every 15 minutes.”
  • At some point, one of the domains on the command and control list became available, so the researchers registered it and directed all of the infected machines to talk to their own command and control server
  • The communications with the C&C servers was cleverly hidden in what look like PHP Session cookies, and in the fake browser user-agent strings
  • One of the giveaways is the fact that the base browser user-agent string is for Firefox 7.0.1 on Windows 7
  • Part of the version string would be replaced with the command id, http status, and number of bytes downloaded by the infected machine
  • “The Eset researchers still aren’t certain how Mumblehard is installed. Based on their analysis of the infected server, they suspect the malware may take hold by exploiting vulnerabilities in the Joomla and WordPress content management systems. Their other theory is that the infections are the result of installing pirated versions of the DirecMailer program.”
  • Eset research PDF

Feedback:


Round-Up:


The post Venomous Floppy Legacy | TechSNAP 214 first appeared on Jupiter Broadcasting.

]]>
Venomous Snakeoil | Tech Talk Today 170 https://original.jupiterbroadcasting.net/81982/venomous-snakeoil-tech-talk-today-170/ Wed, 13 May 2015 11:18:17 +0000 https://original.jupiterbroadcasting.net/?p=81982 Venom is claimed to be the new Heartbleed threatening datacenters around the world but is it legit? The new 4k Blu-Ray spec is revealed & the YotaPhone 2 with an E-ink display back is coming to a country near you! Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | […]

The post Venomous Snakeoil | Tech Talk Today 170 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Venom is claimed to be the new Heartbleed threatening datacenters around the world but is it legit?

The new 4k Blu-Ray spec is revealed & the YotaPhone 2 with an E-ink display back is coming to a country near you!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

‘Venom’ Security Vulnerability Threatens Most Datacenters

A new vulnerability found in open source virtualization software QEMU, which is run on hardware in datacenters around the world (CVE-2015-3456). “The cause is a widely-ignored, legacy virtual floppy disk controller that, if sent specially crafted code, can crash the entire hypervisor. That can allow a hacker to break out of their own virtual machine to access other machines — including those owned by other people or companies.” The vulnerable code is used in Xen, KVM, and VirtualBox, while VMware, Hyper-V, and Bochs are unaffected. “Dan Kaminsky, a veteran security expert and researcher, said in an email that the bug went unnoticed for more than a decade because almost nobody looked at the legacy disk drive system, which happens to be in almost every virtualization software.” The vulnerability has been dubbed “Venom,” for “Virtualized Environment Neglected Operations Manipulation.”

Ultra HD Blu-ray specification now complete, logo unveiled – CNET

The Blu-ray Disc Association (BDA) has announced the Ultra HD Blu-ray (4K) specification is now complete and has also revealed the next-gen format’s official logo.

The BDA says the format incorporates a 3,840×2,160-pixel resolution, expanded color range support, high dynamic range (HDR) and high frame rate content (read 60fps). As well as the promise of up-to-date video, UHD Blu-ray will also support “next-generation immersive, object-based sound formats.”

YotaPhone 2 adds white color option to AMOLED + E-ink display hardware, Lollipop update rolling out

YotaPhone 2

YotaPhone 2 sports a completely functional 4.7-inch E-ink display with always-on capabilities on its back.


As for the planned North American debut of the unique YotaPhone 2, the company says its Indiegogo campaign to help bring it to the US will kick off on May 19th with early bird pricing for the first backers ahead of its summer release.

ASUS confirms next-gen Android Wear ZenWatch coming early Q3, improved 4-day battery life

ASUS reportedly confirmed that the device will feature improved battery life, up from 2 days on the first-gen ZenWatch to 4 days on the upcoming version. That still falls short of the company’s goal to offer 7-days battery life, according to the report.

The company added that it expects to sell less than a million units of its smartwatch this year.

The post Venomous Snakeoil | Tech Talk Today 170 first appeared on Jupiter Broadcasting.

]]>
VirtualBox on the Ropes | Tech Talk Today 125 https://original.jupiterbroadcasting.net/76552/virtualbox-on-the-ropes-tech-talk-today-125/ Fri, 30 Jan 2015 11:14:45 +0000 https://original.jupiterbroadcasting.net/?p=76552 Special guest Noah is in studio & We look at Android’s huge 2014, and recent Bitcoin volatility. Then, as long time VirtualBox users, we discuss the future of the project. Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube RSS Feeds: MP3 Feed | OGG Feed | iTunes […]

The post VirtualBox on the Ropes | Tech Talk Today 125 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Special guest Noah is in studio & We look at Android’s huge 2014, and recent Bitcoin volatility. Then, as long time VirtualBox users, we discuss the future of the project.

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

Android Shipped 1 Billion Smartphones Worldwide in 2014

According to the latest research from our WSS (Smartphones) service, global smartphone shipments grew 30 percent annually to reach a record 1.3 billion units in 2014. Android accounted for 81 percent of all smartphones last year and shipped over 1 billion units worldwide for the first time ever.

Microsoft to Invest in Rogue Android Startup Cyanogen – Digits – WSJ

People familiar with the matter say Microsoft is putting money into Cyanogen, which is building a version of the Android mobile-operating system outside of Google’s auspices.


Microsoft would be a minority investor in a roughly $70 million round of equity financing that values Cyanogen in the high hundreds of millions, one of the people said. The person said the financing round could grow with other strategic investors that have expressed interest in Cyanogen because they’re also eager to diminish Google’s control over Android. The identity of the other potential investors couldn’t be learned.

Prosecutors Trace $13.4M in Bitcoins From the Silk Road to Ulbricht’s Laptop

In Ulbricht’s trial Thursday, former FBI special agent Ilhwan Yum described how he traced 3,760 bitcoin transactions over 12 months ending in late August 2013 from servers seized in the Silk Road investigation to Ross Ulbricht’s Samsung 700z laptop, which the FBI seized at the time of his arrest in October of that year. In all, he followed more than 700,000 bitcoins along the public ledger of bitcoin transactions, known as the blockchain, from the marketplace to what seemed to be Ulbricht’s personal wallets. Based on exchange rates at the time of each transaction, Yum calculated that the transferred coins were worth a total of $13.4 million.

Does VirtualBox VM Have Much A Future Left? – Phoronix

It’s been a long time since last hearing of any major innovations or improvements to VirtualBox, the VM software managed by Oracle since their acquisition of Sun Microsystems. Is there any hope left for a revitalized VirtualBox?

The post VirtualBox on the Ropes | Tech Talk Today 125 first appeared on Jupiter Broadcasting.

]]>
Not Neutrality | TechSNAP 161 https://original.jupiterbroadcasting.net/56982/not-neutrality-techsnap-161/ Thu, 08 May 2014 15:13:23 +0000 https://original.jupiterbroadcasting.net/?p=56982 Adobe’s latest flaw has being exploited by an advanced persistent threat, we’ve got the details, Heartbleed follow ups, and getting started with Virtualization. Plus our thoughts on the fate of net neutrality, your questions, our answers, and much much more! On this week’s episode of TechSNAP! Thanks to: Direct Download: HD Video | Mobile Video […]

The post Not Neutrality | TechSNAP 161 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Adobe’s latest flaw has being exploited by an advanced persistent threat, we’ve got the details, Heartbleed follow ups, and getting started with Virtualization.

Plus our thoughts on the fate of net neutrality, your questions, our answers, and much much more!

On this week’s episode of TechSNAP!

Thanks to:


\"DigitalOcean\"


\"Ting\"


\"iXsystems\"

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

— Show Notes: —

Adobe releases patch for critical Flash flaw affecting all OSs

  • A new exploit has been discovered that works against all versions of Adobe Flash Player
  • This is a zero-day exploit, meaning that even a fully patched computer can be exploited
  • Adobe has since released the fix, and users are encouraged to apply the patch as soon as possible
  • The attack used two different exploits, one general exploit against Flash and the other exploiting a flaw in Internet Explorer
  • One of the malware files was detected by Kaspersky using a heuristic signature, but the other was new
  • The exploits slightly alter the attack methodology if Windows 8 or newer is detected, to work around mitigations provided by the OS
  • The first bit of malware (movie.swf) was generic, downloading more malware from a URL and running it
  • The second bit of malware (include.swf) was very specific, targeting “Cisco MeetingPlace Express Add-In version 5”
  • “This add-in is used by web-conference participants to view documents and images from presenter\’s screen. It should be noted that the exploit will not work if the required versions of Adobe Flash Player ActiveX and Cisco MPE are not present on the system”
  • This suggests that the malware was written with a very specific target in mind, rather than designed to target the general Internet
  • The malware was hosted on an official Syrian government website, although it appears that the site may have been compromised to store the files there
  • Kaspersky was not able to examine the payload of the second exploit because the files had already been taken down from the website, and there is evidence to suggest there was a 3rd payload (stream.swf)
  • “We are sure that all these tricks were used in order to carry out malicious activity against a very specific group of users without attracting the attention of security solutions. We believe that the Cisco add-in mentioned above may be used to download/implement the payload as well as to spy directly on the infected computer.”
  • “It\’s likely that the attack was carefully planned and that professionals of a pretty high caliber were behind it. The use of professionally written 0-day exploits that were used to infect a single resource testifies to this.”
  • CVE-2015-0515
  • Adobe Security Bulletin
  • Additional Coverage – ARS Technica
  • Additional Coverage – Krebs on Security
  • Since IE uses a separate version of Flash from other browsers (Firefox, Chrome, Opera, etc), Windows users will need to apply the patch twice, one to their browser and once to IE, which is used as a component in many other applications including Skype and Steam

Exploit used in the wild against all versions of Internet Explorer 6 through 11

  • As part of the same attack from the previous story, an exploit for all versions of Internet Explorer was found
  • The exploit was used as part of a watering hole attack
  • CVE-2014-1776
  • This was to be the first of many 0day exploits that will not be fixed on Windows XP, however Microsoft issued a statement and released the update for Windows XP , inspite of the fact that it is no longer supported

[Heartbleed Followups]


Feedback:


Round-Up:

The post Not Neutrality | TechSNAP 161 first appeared on Jupiter Broadcasting.

]]>
System76 Leopard Extreme Review | LAS s30e01 https://original.jupiterbroadcasting.net/48087/system76-leopard-extreme-review-las-s30e01/ Sun, 15 Dec 2013 14:42:09 +0000 https://original.jupiterbroadcasting.net/?p=48087 SteamOS and the Leopard Extreme are in studio. We start with a tour under the hood of SteamOS, then we put Leopard Extreme to the ultimate performance test.

The post System76 Leopard Extreme Review | LAS s30e01 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

SteamOS and the Leopard Extreme are in studio, and we’ve got a lot to say. We start with a tour under the hood of SteamOS, and then we put Leopard Extreme from System76 to the ultimate performance test.

Plus: Lessons learned in switching new users to Linux, a look at OwnCloud 6…

AND SO MUCH MORE!

All this week on, The Linux Action Show!

Thanks to:


GoDaddy


Ting

Download:

HD Video | Mobile Video | WebM Torrent | MP3 Audio | Ogg Audio | YouTube | HD Torrent

RSS Feeds:

HD Video Feed | Large Video Feed | Mobile Video Feed | MP3 Feed | Ogg Feed | iTunes Feeds | Torrent Feed

Support the Show:

System 76 Leopard Extreme Review:

  • Leopard Extreme

  • CPU: i7–4930K ( 3.40GHz – 12MB cache – 6 Cores with Hyperthreading )

  • Memory: 64GB Quad Channel DDR3 @ 1866 MHz

  • Disk: 240GB SSD Paired with 4 1TB 7200RPM in RAID0 (Chris Config)

  • Video: 2 GB nVidia GeForce GTX 760 Superclocked with 1152 CUDA Cores

  • As configured: $3,312.00


– Picks –

Runs Linux:

Desktop App Pick

Weekly Spotlight:

Git yours hands all over our STUFF:


— NEWS —

fs0:\EFI\steamos\grubx64.efi

– Feedback: –


System76

Brought to you by: System76

Check out System76 on G+

— Chris’ Stash —

  • Crazy holiday schedule

  • Double Coder Radio, double LINUX Unplugged, double TechSNAP

Hang in our chat room:

irc.geekshed.net #jupiterbroadcasting

— What’s Matt Doin? —

— Find us on Google+ —
— Find us on Twitter —Hang
— Follow the network on Facebook: —
— Catch the show LIVE Sunday 10am Pacific / 1pm Eastern / 6pm UTC: —

The post System76 Leopard Extreme Review | LAS s30e01 first appeared on Jupiter Broadcasting.

]]> Phishin’ Hole | TechSNAP 113 https://original.jupiterbroadcasting.net/38381/phishin-hole-techsnap-113/ Thu, 06 Jun 2013 16:23:54 +0000 https://original.jupiterbroadcasting.net/?p=38381 We’ll go inside some clever bank malware, a dedicated server provider our very own Allan uses discovers a backdoor... Plus picking the right VM storage.

The post Phishin' Hole | TechSNAP 113 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We’ll go inside some clever bank malware, a dedicated server provider our very own Allan uses discovers a backdoor…

Plus: Picking the right virtual machine storage, a big batch of your questions, and much much more!

Thanks to:

Use our code tech249 to score .COM for $2.49!

32% off your ENTIRE first order just use our code go32off3 until the end of the month!

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Get TechSNAP on your Android:

Browser Affiliate Extension: