Yahoo – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 11 Dec 2017 08:38:37 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Yahoo – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Linux Action News 31 https://original.jupiterbroadcasting.net/120562/linux-action-news-31/ Sun, 10 Dec 2017 23:54:04 +0000 https://original.jupiterbroadcasting.net/?p=120562 RSS Feeds: HD Video Feed | MP3 Feed | iTunes Feed Become a supporter on Patreon: Episode Links Mozilla Files Cross-Complaint Against Yahoo Holdings and Oath — Yahoo Holdings and Oath filed a complaint against Mozilla on December 1, 2017, claiming that we improperly terminated the agreement between Mozilla and Yahoo. Today, in response, Mozilla […]

The post Linux Action News 31 first appeared on Jupiter Broadcasting.

]]>

RSS Feeds:

HD Video Feed | MP3 Feed | iTunes Feed

Become a supporter on Patreon:

Patreon

Episode Links
  • Mozilla Files Cross-Complaint Against Yahoo Holdings and Oath — Yahoo Holdings and Oath filed a complaint against Mozilla on December 1, 2017, claiming that we improperly terminated the agreement between Mozilla and Yahoo. Today, in response, Mozilla filed a cross-complaint against Yahoo Holdings and Oath for breach of contract.
  • Mozilla tackles fake news — The boundaries between truth and fiction are becoming harder to define, in part because of the proliferation of fake news and other forms of misinformation. Mozilla wants to shed light on this by sponsoring public demonstrations, using mixed reality and other art media that make the power of misinformation and its potential impacts visible and visceral.
  • Classic Shell abandoned as open source — The source code is available at SourceForge, and the Classic Shell forum will remain online until the end of 2018 for folks that want to continue discussing the project.
  • UK and EU plan Bitcoin crackdown — The Treasury plans to regulate bitcoin and other cryptocurrencies to bring them in line with anti-money laundering and counter-terrorism financial legislation. Traders will be forced to disclose their identities, ending the anonymity that has made the currency attractive for drug dealing and other illegal activities.
  • Android Go released to OEMs — Google’s stripped-down version of Android is ready for OEMs.
  • Mediatek announce Go optimized SoCs — MediaTek’s MT6739, MT6737, and MT6580 SoCs, among others, now have board support packages available to run Android Oreo (Go edition). This marks one of the first times that entry-level SoCs are ready to be used shortly after the latest version of Android.
  • Pwning Intel ME — The duo say they found a locally exploitable stack buffer overflow that allows the execution of unsigned code on any device with Intel ME 11, even if the device is turned off or protected by security software.

The post Linux Action News 31 first appeared on Jupiter Broadcasting.

]]>
Check Yo Checksum | TechSNAP 311 https://original.jupiterbroadcasting.net/107681/check-yo-checksum-techsnap-311/ Wed, 22 Mar 2017 00:54:22 +0000 https://original.jupiterbroadcasting.net/?p=107681 RSS Feeds: HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Bacula Deep Dive – as requested by Matt Yakel Bacula: Cross-Platform Client-Server Backups – from 2004, FYI only Sony SDT 10000 Tape Drive Bacula – […]

The post Check Yo Checksum | TechSNAP 311 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Bacula Deep Dive – as requested by Matt Yakel


Feedback


Round Up:


The post Check Yo Checksum | TechSNAP 311 first appeared on Jupiter Broadcasting.

]]>
Farming out Yahoo! | TTT 253 https://original.jupiterbroadcasting.net/101447/farming-out-yahoo-ttt-253/ Mon, 25 Jul 2016 16:02:54 +0000 https://original.jupiterbroadcasting.net/?p=101447 Yahoo might be turning into the next AOL, Cyanogen Inc switches to Apps, 3D printing finger prints to login, GPU power on demand & the farming Robot that can heal your garden shame. Plus Chris gets serious about sleep tech & our Kickstarter of the week! Direct Download: MP3 Audio | OGG Audio | Video […]

The post Farming out Yahoo! | TTT 253 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Yahoo might be turning into the next AOL, Cyanogen Inc switches to Apps, 3D printing finger prints to login, GPU power on demand & the farming Robot that can heal your garden shame.

Plus Chris gets serious about sleep tech & our Kickstarter of the week!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Patreon

Show Notes:

Links:

Kickstarter of the Week:

The post Farming out Yahoo! | TTT 253 first appeared on Jupiter Broadcasting.

]]>
Real Life on the Ratel | CR 215 https://original.jupiterbroadcasting.net/101417/real-life-on-the-ratel-cr-215/ Mon, 25 Jul 2016 14:29:24 +0000 https://original.jupiterbroadcasting.net/?p=101417 Mike shares his recent Linux switch experience & why he thinks it might stick this time. We chew on Verizon buying Yahoo & the grief Marissa Mayer is getting. Plus we congratulate the winner of last week’s challenge & announce the next one! Thanks to: Get Paid to Write for DigitalOcean Direct Download: MP3 Audio […]

The post Real Life on the Ratel | CR 215 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Mike shares his recent Linux switch experience & why he thinks it might stick this time. We chew on Verizon buying Yahoo & the grief Marissa Mayer is getting.

Plus we congratulate the winner of last week’s challenge & announce the next one!

Thanks to:


Linux Academy


DigitalOcean

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

Become a supporter on Patreon:

Patreon

— Show Notes: —

Hoopla:

Verizon to acquire Yahoo’s operating business

Dear Yahoos,

Moments ago, we announced an agreement with Verizon to acquire Yahoo’s operating business.

Whatever her future role, the Verizon sale is a blunt admission that Mayer’s grand resuscitation plan for Yahoo failed. She tried valiantly to inject some life into the company—with acquisitions, layoffs, splashy hires, and a way-too-late emphasis on mobile, among other strategies—but ultimately, it wasn’t enough.

Bad press from just the last few months:

Coding Challenge

Episode 215 Katy Perry Coding Challenge

  • Make Mike an app that creates a Youtube playlist of or otherwise allows him to play his favorite Katy Perry music videos: Dark Horse, Roar, This is How We Do, Teenage Dream, Last Friday Night, International + + Smile and Unconditionally.
  • The app must take advantage of the browser having his Youtube Red account cached for commercial viewing or he must be able to auth with his Youtube Red account to achieve the same.
  • All solutions must be tablet friendly

Rocking the Ratel

The post Real Life on the Ratel | CR 215 first appeared on Jupiter Broadcasting.

]]>
Oops, We Went International | WTR 55 https://original.jupiterbroadcasting.net/97936/oops-we-went-international-wtr-55/ Wed, 23 Mar 2016 01:05:18 +0000 https://original.jupiterbroadcasting.net/?p=97936 Jewel is cofounder of Workfrom, an online resource for remote workers, freelancers, digital nomads & travelers to find a place to work from! Direct Download: MP3 Audio | OGG Audio | Video | HD Video | YouTube RSS Feeds: MP3 Feed | OGG Feed | iTunes Feed | Video Feed Become a supporter on Patreon: […]

The post Oops, We Went International | WTR 55 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Jewel is cofounder of Workfrom, an online resource for remote workers, freelancers, digital nomads & travelers to find a place to work from!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Interview – Jewel Mlnarik – @juellez

 

Are you looking for the transcription? Please let us know you use it and we may bring it back!

The post Oops, We Went International | WTR 55 first appeared on Jupiter Broadcasting.

]]>
Lousy Lollipop Adoption | TTT 202 https://original.jupiterbroadcasting.net/86047/lousy-lollipop-adoption-ttt-202/ Wed, 05 Aug 2015 10:27:09 +0000 https://original.jupiterbroadcasting.net/?p=86047 A fresh version of LibreOffice hits the web, another Flash attack in the wild, this one uses “malvertising”. What the heck is malvertising? We discuss. Plus what the state of Android looks like in 2015, another OS X bug & more! Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent […]

The post Lousy Lollipop Adoption | TTT 202 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A fresh version of LibreOffice hits the web, another Flash attack in the wild, this one uses “malvertising”. What the heck is malvertising? We discuss.

Plus what the state of Android looks like in 2015, another OS X bug & more!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

The post Lousy Lollipop Adoption | TTT 202 first appeared on Jupiter Broadcasting.

]]>
Fedora Developer Roundtable | LAS 343 https://original.jupiterbroadcasting.net/73857/fedora-developer-roundtable-las-343/ Sun, 14 Dec 2014 17:35:21 +0000 https://original.jupiterbroadcasting.net/?p=73857 We talk with five developers from the Fedora project behind some of the recent amazing work that has seen a major milestone release in Fedora 21, treating Fedora more as a product & laying the groundwork for amazing future technologies. Plus Dustin Kirkland from Canonical joins us to explain what Ubuntu Snappy Core is & […]

The post Fedora Developer Roundtable | LAS 343 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We talk with five developers from the Fedora project behind some of the recent amazing work that has seen a major milestone release in Fedora 21, treating Fedora more as a product & laying the groundwork for amazing future technologies.

Plus Dustin Kirkland from Canonical joins us to explain what Ubuntu Snappy Core is & some of it’s killer new features, our picks, news…

AND SO MUCH MORE!

All this week on, The Linux Action Show!

Thanks to:


DigitalOcean


Ting

Download:

HD Video | Mobile Video | WebM Torrent | MP3 Audio | Ogg Audio | YouTube | HD Torrent

RSS Feeds:

HD Video Feed | Large Video Feed | Mobile Video Feed | MP3 Feed | Ogg Feed | iTunes Feeds | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

Fedora Developer Round Table

System76

Brought to you by: System76

Guests:

Round Table Links:

DevAssistant can help you set up your development environment, publish your
code, and do many of the chores that somehow keep you from the important
stuff – writing your software. It does not matter if you only recently
discovered the world of software development, or if you have been coding for
two decades, there’s always something DevAssistant can do to make your life
easier.

This is Free Software. Free as in speech. It is released under the
terms of the GPL version 2 or later. That means that you can
do great many things with it freely, but you have to follow some rules too.

libinput is a library to handle input devices in Wayland compositors and to provide a generic X.Org input driver. It provides device detection, device handling, input device event processing and abstraction so minimize the amount of custom input code compositors need to provide the common set of functionality that users expect.

PowerTOP is a Linux tool to diagnose issues with power consumption and power management.


— PICKS —

Runs Linux

Running Debian on a Graphing Calculator

Thx to: Mikerr89 and sorry to bluphenix316!

The newer TI-Nspire series of graphing calculators uses modern ARM devices. [Codinghobbit] managed to get Debian Linux running on a TI-Nspire calculator, and has written a guide explaining how it’s done.

The process uses Ndless, a jailbreak which allows code to run at a low level on the device. Ndless also includes a full SDK, emulator, and debugger for developing apps. In this case, Ndless is used to load the Linux kernel.

Desktop App Pick

dcfldd

dcfldd is an enhanced version of GNU dd with features useful for forensics and security.
Based on the dd program found in the GNU Coreutils
package, dcfldd has the following additional features:

  • Hashing on-the-fly – dcfldd can hash the input data as it is being transferred,
    helping to ensure data integrity.
  • Status output – dcfldd can update the user of its progress in terms of the
    amount of data transferred and how much longer operation will take.
  • Flexible disk wipes – dcfldd can be used to wipe disks quickly and with a known
    pattern if desired.
  • Image/wipe Verify – dcfldd can verify that a target drive is a bit-for-bit match of the specified input file or pattern.
  • Multiple outputs – dcfldd can output to multiple files or disks at the same time.
  • Split output – dcfldd can split output to multiple files with more configurability than the split command.
  • Piped output and logs – dcfldd can send all its log data and output to commands as well as files natively.

openSUSE/imagewriter · GitHub

Utility for writing raw disk images & hybrid isos to USB keys

Jupiter Dev Summit

Weekly Spotlight

Free OpenSource Dyslexia Font – OpenDyslexic

OpenDyslexic

OpenDyslexic is a new open source font created to increase readability for readers with dyslexia. The typeface includes regular, bold, italic, and bold-italic styles. It is being updated continually and improved based on input from dyslexic users. There are no restrictions on using OpenDyslexic outside of attribution.


— NEWS —

Announcing Snappy Ubuntu

Current SNAPPY Logo

Guest: Dustin Kirkland (@dustinkirkland)

A new, transactionally updated Ubuntu for the cloud.

Ubuntu Core is a new rendition of Ubuntu for the cloud with transactional updates. Ubuntu Core is a minimal server image with the same libraries as today’s Ubuntu, but applications are provided through a simpler mechanism. The snappy approach is faster, more reliable, and lets us provide stronger security guarantees for apps and users — that’s why we call them “snappy” applications.

Snappy apps and Ubuntu Core itself can be upgraded atomically and rolled back if needed — a bulletproof approach to systems management that is perfect for container deployments. It’s called “transactional” or “image-based” systems management, and we’re delighted to make it available on every Ubuntu certified cloud.

What if your cloud instances could be updated with the same certainty and precision as your mobile phone — with carrier grade assurance that an update applies perfectly or is not applied at all? What if your apps could be isolated from one another completely, so there’s no possibility that installing one app could break another, and stronger assurance that a compromise of one app won’t compromise the data from another? When we set out to build the Ubuntu Phone we took on the challenge of raising the bar for reliability and security in the mobile market. And today that same technology is coming to the cloud, in the form of a new “snappy” image called Ubuntu Core, which is in beta today on Azure and as a KVM image you can run on any Linux machine.

Yahoo Starts Prompting Chrome Users To “Upgrade” To Firefox

If you’re visiting any Yahoo property today, chances are you’ll see an “Upgrade to the new Firefox” link in the top-right corner of your browser window. The prompt also appears if you’re using Internet Explorer, Opera and even the new Yandex browser. However, the prompt is missing from Safari, which will surely prompt a new round of speculation about Apple’s rumored switch to Yahoo as its default search engine.


— FEEDBACK —

— CHRIS’ STASH —

Hang in our chat room:

irc.geekshed.net #jupiterbroadcasting

— MATT’S STASH —

Find us on Google+

Find us on Twitter

Follow the network on Facebook

Catch the show LIVE Sunday 10am Pacific / 1pm Eastern / 6pm UTC:

The post Fedora Developer Roundtable | LAS 343 first appeared on Jupiter Broadcasting.

]]>
AT&T’s Identity Giveaway! | Tech Talk Today 71 https://original.jupiterbroadcasting.net/68342/atts-identity-giveaway-tech-talk-today-71/ Tue, 07 Oct 2014 09:58:41 +0000 https://original.jupiterbroadcasting.net/?p=68342 An AT&T insider steals customer info, Samsung’s sales could be slipping by as much as 60% and Yahoo gets bit by Shellshock. Plus our Kickstarter of the week & much more! Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube RSS Feeds: MP3 Feed | OGG Feed | […]

The post AT&T's Identity Giveaway! | Tech Talk Today 71 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

An AT&T insider steals customer info, Samsung’s sales could be slipping by as much as 60% and Yahoo gets bit by Shellshock.

Plus our Kickstarter of the week & much more!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed

Become a supporter on Patreon:

Foo

Show Notes:

AT&T Hit By Insider Breach | Threatpost | The first stop for security news

AT&T is warning consumers about a data breach involving an insider who illegally accessed the personal information of an unspecified number of users. The compromised data includes Social Security numbers and driver’s license numbers.


In a letter sent to the Vermont attorney general, AT&T officials said that the breach occurred in August and that the employee in question also was able to access account information for AT&T customers.


“We recently determined that one of our employees violated our strict privacy and security guidelines by accessing your account without authorization in August 2014, and while doing so, would have been able to view and may have obtained your account information including your social security number and driver’s license number. Additionally, while accessing your account, the employee would have been able to view your Customer Proprietary Network Information (CPNI), without proper authorization,” said Michael A. Chiarmonte, director of finance billing operations at AT&T, in a letter to the Vermont AG.


The CPNI he referred to in the letter includes data that’s related to the services that consumers buy from the company. Chiarmonte said that the letter that the employee responsible for the breach no longer works for AT&T. It’s not clear from AT&T’s disclosure how many consumers have been affected by the breach or which other states may have citizens who are affected.


As a result of the breach, AT&T is offering affected customers a year of free credit monitoring, as has become customary in these incidents.

Samsung Warns Weak Q3 Earnings – Business Insider

Samsung warned Monday night that its third-quarter earnings will be weaker than expected.


The company said it would report an operating profit of $3.8 billion for the quarter ending in September — a decline of nearly 60 percent from the same time a year earlier. Sales fell to $44 billion, off 20 percent from a year ago. […]


The South Korean electronics giant said that while smartphone shipments increased, its operating margins fell because of higher marketing costs, fewer shipments of high-end phones and a lower average selling price for the devices.


The company said it is responding with a new smartphone lineup that will include new mid-range and low-end devices, which would make Samsung’s products more competitive in markets such as China.

Hackers Compromised Yahoo’s Servers Using Shellshock

The exploits were first discovered by security researcher, Jonathan Hall. Hall pointed to two Yahoo Games servers that had been exploited. After Yahoo was contacted by Security Week it issued the following statement:


A security flaw, called Shellshock, that could expose vulnerabilities in many web servers was identified on September 24. As soon as we became aware of the issue, we began patching our systems and have been closely monitoring our network. Last night, we isolated a handful of our impacted servers and at this time we have no evidence of a compromise to user data. We’re focused on providing the most secure experience possible for our users worldwide and are continuously working to protect our users’ data.

Plex Launches On Xbox One

The Plex app for Xbox One is a new approach to Plex overall, with a landscape interface that Plex co-founder and Chief Product Officer Scott Olechowski says is admittedly due partly to design requirements set out by the Xbox team, but that also will make its way back to the wider suite of Plex software on other platforms, too.


“[Xbox] certainly kind of encouraged this landscape type scrolling, but the more we used this the more we realized how well it works,” he said. “You’ll see this approach taken in other places. The more we used it, the more we realized it’s more natural. We kind of fell in love with aspects of it, [and] over time we want to have a more consistent experience.”

The Xbox One, the first official video game console to launch in China in 14 years, has started its console life in the middle kingdom with a bang! According to Chinese news sources, the Xbox One sold over 100,000 units within the first week of sales.

KICK STATER OF THE WEEK: Granola Strolla – Portable Solar USB charger by Granola Strolla Inc. — Kickstarter

GranolaStrolla is a portable, affordable and easy to use solar charged batterypack able to charge USB devices as fast as a wall charger

The post AT&T's Identity Giveaway! | Tech Talk Today 71 first appeared on Jupiter Broadcasting.

]]>
The Ukraine Invasion | Unfilter 88 https://original.jupiterbroadcasting.net/52832/the-ukraine-invasion-unfilter-88/ Wed, 05 Mar 2014 21:14:13 +0000 https://original.jupiterbroadcasting.net/?p=52832 All sides are engaged in media fueled war of propaganda to hide the real reasons for the conflict, we’ll follow the money, and break it down.

The post The Ukraine Invasion | Unfilter 88 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Russia and United States are meeting face to face for the first time, since the situation in the Ukraine that they’ve helped create, exploded. The confirmation bias is strong, and all sides are engaged in media fueled war of propaganda to hide the real reasons for the conflict, we’ll follow the money, and break it down.

Actions speak louder than words, and we’ll examine the fast paced maneuvering of the US, Russia, and the EU, and why all of this could be heading towards a new kind of status quo, we’ll explain.

Plus our followup, your feedback, and much much more.

On this week’s episode of, Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is Crazy

GCHQ files dating between 2008 and 2010 reveal that a surveillance program codenamed Optic Nerve collected images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not.

In one six-month period in 2008 alone, the agency collected webcam images, including substantial quantities of sexually explicit material, from more than 1.8 million Yahoo user accounts globally.

Optic Nerve was based on collecting information from GCHQ’s huge network of internet cable taps, which was then processed and fed into systems provided by the NSA. Webcam information was fed into NSA’s XKeyscore search tool, and NSA research was used to build the tool which identified Yahoo’s webcam traffic.

Bulk surveillance on Yahoo users was begun, the documents said, because “Yahoo webcam is known to be used by GCHQ targets”.

NSA ragout 3
NSA ragout 3

The documents also show that GCHQ trialled automatic searches based on facial recognition technology, for people resembling existing GCHQ targets

The document estimates that between 3% and 11% of the Yahoo webcam imagery harvested by GCHQ contains “undesirable nudity”. Discussing efforts to make the interface “safer to use”, it noted that current “naïve” pornography detectors assessed the amount of flesh in any given shot, and so attracted lots of false positives by incorrectly tagging shots of people’s faces as pornography. NSA ragout 1

McClatchy News is reporting that the CIA may have monitored computers that the agency provided to the Senate Intelligence Committee. The computers were used by Senate aides to prepare the Committee’s (still unreleased) report on the CIA’s secret detention and interrogation programs.

The agency’s inspector general began the inquiry partly as a response to complaints from members of Congress that C.I.A. employees were improperly monitoring the work of staff members of the Senate Intelligence Committee, according to government officials with knowledge of the investigation.

The committee has spent several years working on a voluminous report about the detention and interrogation program, and according to one official interviewed in recent days, C.I.A. officers went as far as gaining access to computer networks used by the committee to carry out its investigation.

A leading US senator has said that President Obama knew of an “unprecedented action” taken by the CIA against the Senate intelligence committee, which has apparently prompted an inspector general’s inquiry at Langley.

The subtle reference in a Tuesday letter from Senator Mark Udall to Obama, seeking to enlist the president’s help in declassifying a 6,300-page inquiry by the committee into torture carried out by CIA interrogators after 9/11, threatens to plunge the White House into a battle between the agency and its Senate overseers.


:– Amazon Review Police
:– Sean B
:– Jonathan C
:– Robert C
:– Edward
:– David T
:– John W

– Thanks for Supporting Unfilter –

  • Thanks to our 356 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


Ukraine mayhem

Confirmation bias (also called confirmatory bias or myside bias) is the tendency of people to favor information that confirms their beliefs or hypotheses.

People display this bias when they gather or remember information selectively, or when they interpret it in a biased way. The effect is stronger for emotionally charged issues and for deeply entrenched beliefs.

Russia’s Sergei Lavrov refused to meet his Ukrainian counterpart, whose government Moscow does not recognise.

The visit — and a promise of a $1 billion loan — was intended to build a relationship with Ukraine’s new leaders while demonstrating to an increasingly aggressive Russia that the United States is firmly behind Ukraine’s citizens, including the ragtag volunteer defense forces who continue to stand guard around the parliament building in Kiev.

The European Union offered a larger than expected package of aid to Ukraine on Wednesday, saying it was willing to provide $15 billion in loans and grants over the next several years to help get the shattered economy back on its feet.

Ukraine’s acting finance minister Oleksander Shlapak reported that the country needs to repay $10 billion by year end and that the country may ask for a debt restructuring. Naturally, absent outside help, no repayment is possible and the country will certainly default, which means someone has to step up and bail out the Ukraine. The only question is where this aid comes from: EU/IMF or Russia.

The United States is sending six more F–15 fighter jets and one KC–135 refueling aircraft to Poland, according to a defense official Wednesday.

“The only thing we had to do, and we did it, was to enhance the defense of our military facilities because they were constantly receiving threats and we were aware of the armed nationalists moving in,” Mr. Putin said, referring to Russia’s longstanding bases affiliated with the Black Sea Fleet, which has its headquarters in the port of Sevastopol in the Crimea region of Ukraine.

CIA director John Brennan told a senior lawmaker Monday that a 1997 treaty between Russia and Ukraine allows up to 25,000 Russia troops in the vital Crimea region, so Russia may not consider its recent troop movements to be an invasion, U.S. officials said.

Wars in Iraq, Afghanistan, Libya were distortions of intl law and UNSC resolution, says Vladimir Putin during is conversation with journalists

There’s a new strong man in Russia but his rise to power is based on a dark secret hidden decades in the past. The solution to that mystery lies with a most unexpected source, President Jack Ryan.

Really written by Mark Greaney, part of the Clancy franchise.

Feedback:

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post The Ukraine Invasion | Unfilter 88 first appeared on Jupiter Broadcasting.

]]>
The Gift of Giving | BSD Now 17 https://original.jupiterbroadcasting.net/48552/the-gift-of-giving-bsd-now-17/ Tue, 24 Dec 2013 22:46:33 +0000 https://original.jupiterbroadcasting.net/?p=48552 Merry Christmas everyone! We\’re taking the holiday off and just have an interview for you today. We sat down with Scott Long to discuss using FreeBSD at Netflix and lots of other things. Next week we will return with the normal round of news and tutorials. Thanks to: iXsystems: This is what 80 cores and […]

The post The Gift of Giving | BSD Now 17 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Merry Christmas everyone! We\’re taking the holiday off and just have an interview for you today. We sat down with Scott Long to discuss using FreeBSD at Netflix and lots of other things. Next week we will return with the normal round of news and tutorials.

Thanks to:


\"iXsystems\"

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Interview – Scott Long – scottl@freebsd.org

FreeBSD at Netflix, OpenConnect, network performance, various topics


  • All the tutorials are posted in their entirety at bsdnow.tv
  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
  • Watch live Wednesdays at 2:00PM Eastern (19:00 UTC)

The post The Gift of Giving | BSD Now 17 first appeared on Jupiter Broadcasting.

]]>
NSA Wargames | Unfilter 78 https://original.jupiterbroadcasting.net/47892/nsa-wargames-unfilter-78/ Thu, 12 Dec 2013 00:13:02 +0000 https://original.jupiterbroadcasting.net/?p=47892 The NSA Spying Scandal is Costing U.S. Tech Giants Billions, and until this week they’ve remained nearly silent, and politely complicent.

The post NSA Wargames | Unfilter 78 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The NSA Spying Scandal is Costing U.S. Tech Giants Billions, and until this week they’ve remained nearly silent, and politely complicent.

Now eight of the largest tech companies joined forces to push back against the Government spying policies.

Meanwhile new leaks continue to be published, the latest detail the infiltration of online gaming communities to conduct massive surveillance of gamers.

Don’t worry everything’s just fine, the mainstream media is reporting the economy is on the fast track to recovery now, and unemployment is down. We’ll discuss the reality of the situation, plus your feedback, and much more.

On this week’s episode of, Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


Edward Snowden’s Rough Week

Eric Michael O’Neill (born March 3, 1973) is a former American FBI counter-terrorism and counterintelligence operative. He worked and was entitled as an Investigative Specialist with the Special Surveillance Group (SSG) and played a major role in the arrest, conviction, and life imprisonment of FBI agent Robert Hanssen for spying on behalf of the Soviet Union and the Russian Federation.

The ABC News doyenne pushed hard to have NSA leaker*Edward Snowden *at the top of her list of 10 most fascinating people of the year — but in the end was overruled by network brass, a source told Confidenti@l.

In addition to Snowden, the others chosen for the much-anticipated special includeJennifer Lawrence, Miley Cyrus, Kim Kardashian and Kanye West (starring jointly as KimYe), baby Prince George, the cast of “Duck Dynasty,” swimmer Diana Nyad, “Good Morning America” hostRobin Roberts andPope Francis.

The European parliament is lining up Edward Snowden to give evidence by video link this month, in spite of resistance by British Conservatives, a Green MEP has announced.


– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Caleb J

  • Chris S

  • Robert R

  • Sigmund V

  • David P

  • Brady L

  • Paul B

  • Thomas D

  • Alex

  • John I

  • Shayne

  • Robert B

  • Alexander R

  • Eric B

  • Faran J

  • Daniel P

  • Michael P

  • Sean W

  • Thanks to our 290 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.

  • Unfilter lands on Dec 25th and Jan 1st. No main show those weeks, but supporters only shows will air. A limited time opportunity to have the entire lineup in the sync folder for easy listening.


World of Spycraft

Online games might seem innocuous, a top-secret 2008 NSA document warned, but they had the potential to be a “target-rich communication network” allowing intelligence suspects “a way to hide in plain sight.” Virtual games “are an opportunity!,” another 2008 NSA document declared.

But for all their enthusiasm — so many CIA, FBI and Pentagon spies were hunting around in Second Life, the document noted, that a “deconfliction” group was needed to avoid collisions — the intelligence agencies may have inflated the threat.

The documents do not cite any counterterrorism successes from the effort, and former American intelligence officials, current and former gaming company employees and outside experts said in interviews that they knew of little evidence that terrorist groups viewed the games as havens to communicate and plot operations.

During Smith’s 6 years on Eve, he used the game to communicate covert messages with the US State Department. Being the perfect cover, online games like Eve provide a pathway of communication between the US government and overseas operatives on nearly secured channels because of the cryptic messages being passed back and forth.

The friend recalls that Smith was on Eve the night of the attack and conveyed that sirens could be heard in the distance, and suddenly would go offline, then pop back up. In the last communication, Smith said “GUNFIRE”, logged off – and never returned. – See more at: https://www.occupycorporatism.com/state-department-covers-up-ambassador-stevens-death-at-rented-villa-in-benghazi/#sthash.DWzBGG2S.dpuf

Beck accuse Sean Smith and his colleagues of either working with the CIA or of being CIA agents, and that some of Smith’s final messages to the outside world – which were sent to members of the EVE Online community – were actually coded, and intended for the CIA.

NSA is CRAZY

The agency’s internal presentation slides, provided by former NSA contractor Edward Snowden, show that when companies follow consumers on the Internet to better serve them advertising, the technique opens the door for similar tracking by the government. The slides also suggest that the agency is using these tracking techniques to help identify targets for offensive hacking operations.

According to the documents, the NSA and its British counterpart, GCHQ, are using the small tracking files or “cookies” that advertising networks place on computers to identify people browsing the Internet. The intelligence agencies have found particular use for a part of a Google-specific tracking mechanism known as the “PREF” cookie. These cookies typically don’t contain personal information, such as someone’s name or e-mail address, but they do contain numeric codes that enable Web sites to uniquely identify a person’s browser.

“In our Q1 earnings call of November 13th, we stated that product orders in China declined 18% in Q1 FY14, whereas in Q4 FY13, we referenced that our business in China had declined 6%,” a Cisco spokesperson told Ars. “By comparison, China bookings were up 8% in Q3 FY13. So, yes, there is a short-term trend of declining business in China, which we have acknowledged.”

“We shouldn’t have gathered economic intelligence under the guise of security – not with an ally,” Clinton told O Globo, a newspaper in Rio de Janeiro.

On Monday the companies, led by Google and Microsoft, presented a plan to regulate online spying and urged the United States to lead a worldwide effort to restrict it. They accompanied it with an open letter, in the form of full-page ads in national newspapers, including The New York Times, and a website detailing their concerns.

Apple, Yahoo, Facebook, Twitter, AOL and LinkedIn joined Google and Microsoft in saying that they believed in governments’ right to protect their citizens. But, they said, the spying revelations that began last summer with leaks of National Security Agency materials by Edward J. Snowden showed that “the balance in many countries has tipped too far in favor of the state and away from the rights of the individual.”


War on Unemployment Benefits Heats Up

One reason the unemployment insurance extension wasn’t included in the budget deal: cost. The budget deal includes about $22 billion in deficit reduction over two years. (It cuts $85 billion but allows spending caps to rise by $63 billion.)

Extending unemployment will cost about $25 billion for one year. It would undo the bill’s savings. That doesn’t mean Congress won’t do it. But they couldn’t credibly pair it with their modest budget bill.

Sen. Rand Paul says “black unemployment in America is double white unemployment” and “hasn’t budged” under President Obama. Actually, the black unemployment rate is lower now than when Obama took office, and the gap between the races is below the historical average.

CEO vs. Worker inequality

  • The Average CEO makes 354 times what the average worker makes[3]
    [year: ratio between worker/CEO earnings]

1982: 42:1
1992: 201:1
2002: 281:1
2012: 354:1

Feedback:

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post NSA Wargames | Unfilter 78 first appeared on Jupiter Broadcasting.

]]>
Exploit Brokers | TechSNAP 119 https://original.jupiterbroadcasting.net/40537/exploit-brokers-techsnap-119/ Thu, 18 Jul 2013 17:24:48 +0000 https://original.jupiterbroadcasting.net/?p=40537 The business of selling 0day exploits is booming, we’ll explain how this shady market works.

The post Exploit Brokers | TechSNAP 119 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The business of selling 0day exploits is booming, we’ll explain how this shady market works, and how a couple guys turned a Verizon Network Extender into a spy listening post.

A huge batch of your questions…

And much much more, on This week’s TechSNAP!

Thanks to:

Use our code tech249 to score .COM for $2.49!

Get private registration FOR FREE with a .COM! code: free5

 

Visit techsnap.ting.com to save $25 off your device or service credits.

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Yahoo to start recycling disused email addresses, introduces new security feature to prevent abuse

  • Yahoo’s email server has been running for a very very long time
  • As such, many of the best usernames are taken, even though many of them have not been used in a decade
  • So, Yahoo plans to start recycling those addresses that are no longer used
  • The obvious problem with a move like this is that if there are any accounts still tied to this old email address, the new owner can request a password reset to the email address that they now control, and take over that account
  • Yahoo’s Developers have come up with a rather ingenious way to prevent this, although the implementation is dependant on the 3rd party services to implement it (Facebook already has)
  • Yahoo’s mail servers will now respect the non-standard header ‘Require­-Recipient­-Valid­-Since’
  • The idea is that when Facebook sends a password reset email, they include this header with the date that the facebook account was created, if the yahoo email address is NEWER than that date, it may not belong to the same person any more, and yahoo will send a bounce message back to Facebook, rather than delivering the email
  • This prevents someone from acquiring the disused email address and performing the password reset
  • Yahoo has created an IETF Draft specification for this header, if ratified, it will become an internet standard and be added to the IANA Permanent Message Header Field registry
  • It is not yet clear if other services such as Twitter will implement this
  • It seems unlikely that Online Banking and other services will implement this system, so make sure all of your online services have a valid current email address, preferably one you plan to keep for the long term
  • Yahoo Developers Blog

The business of selling 0day exploits is booming

  • There are a number of businesses selling zero day exploits including: Vupen in Montpellier, France; Netragard in Acton, Mass.; Exodus Intelligence in Austin, Tex.; and ReVuln in Malta
  • There is as a Virginia startup called Endgame, apparently involving a former director of the NSA which is doing a lot of undisclosed business with the US Government
  • The USA, Israel, Britain, Russia, India and Brazil spend staggering amounts of money buying these exploits
  • Many other countries including North Korea, a number of Middle Eastern intelligence agencies, Malaysia and Singapore are also in the market
  • These exploits have value both offensively and defensively, if you know the details of a zero day exploit, you can better protect yourself from others who may know about it as well
  • However if you report it to the vendor so it gets patched, you protect everyone, but lose the offensive value
  • The average zero-day exploits goes undetected for 312 days, before it gets used enough that AV vendors notice it and it gets reported and patched
  • Services like Vupen charge $100,000/year for access to their catalogue, with varying prices of the actual exploits
  • Netragard only sells to US clients, and reports that the average flaw now sells from $35,000 to $160,000
  • In years past, rather than selling these flaws to companies like Vupen and ReVuln, who then sell them to governments, security researchers would report them to vendors like Microsoft and Google, just for the recognition and sometimes a t-shirt
  • Many vendors now have bug bounty programs to reward researchers for reporting vulnerabilities, rather than keeping them, using them or selling them
  • To counter this, Microsoft recently raised its bug bounty reward program, now up to $150,000

Feedback:

TechSNAP Bitmessage: BM-GuGEaEtsqQjqgHRAfag5FW33Dy2KHUmZ


Round Up:


The post Exploit Brokers | TechSNAP 119 first appeared on Jupiter Broadcasting.

]]>
Captain’s Log | CR 39 https://original.jupiterbroadcasting.net/32961/captains-log-cr-39/ Mon, 04 Mar 2013 13:35:46 +0000 https://original.jupiterbroadcasting.net/?p=32961 At a minimum errors need to be logged with enough information to point to the line of code, but where do you go from there?

The post Captain’s Log | CR 39 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

You know you need to do it, and today Mike tries to convince you. At a minimum errors need to be logged with enough information to point to the line of code, but where do you go from there? Slogging through bug reports, pulling important metrics, and a few bumps and bruises.

Plus: The inventory problem developers face, some forgotten glory, defending Yahoo, a batch of your feedback and more!

Thanks to:

Use our code coder295 to get a .COM for $2.95.

 

Visit coderradio.ting.com to save $25 off your device or service credits.

 

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

— Show Notes —

Feedback

  • Louie points out my super high pitched voice on the word “business” in the last show

  • Mike asks:

    “With every platform having its own app store you would think that it would be a boom for Indy Devs. But I don\’t believe that is the case because app discovery seems to suck on all platform. Am I crazy or correct? Is there anyone trying to fix this? Like a place that promotes Indy apps?”

  • Dominic’s Question: The Stupid Client Problem

  • Mike share’s the forgotten glory of Balmer doing TV ads in the 80’s
  • A lot of divided opinion re Yahoo’s ban on working from home

Logging

  • The essence of ¿Que?
  • The feel of ¿Por Que?

Two key types of logging

  • Diagnostic logging

Do you care enough to throw an exception up through the app or manage it another way? This is an \”it depends\” but logging info level messages probably should be skipped.

  • Audit logging

Audit logging captures significant events in the system and are what management and the legal eagles are interested in. This is things like who signed off on something, who did what edits, etc. As a sysadmin or developer troubleshooting the system, you\’re probably only mildly interested in these. However, in many cases this kind of logging is absolutely part of the transaction and should fail the whole transaction if it can\’t be completed.

Follow the show

The post Captain’s Log | CR 39 first appeared on Jupiter Broadcasting.

]]>
Office Hours | CR 38 https://original.jupiterbroadcasting.net/32452/office-hours-cr-38/ Mon, 25 Feb 2013 11:43:08 +0000 https://original.jupiterbroadcasting.net/?p=32452 Yahoo disappoints with their high-profile announcement that all remote workers must return to their cubes. And why this encourages a culture of “B-Players”.

The post Office Hours | CR 38 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Yahoo disappoints Mike and Chris with their high-profile announcement that all remote workers must return to their cubes. We’ll get into why this encourages a culture of “B-Players”, and serves as a disservice to the entire industry.

Plus the awkward gadget habit our jobs can force us to have, the possibilities Sony’s PS4 could present indie game devs, an honest look at the Chrome Pixel, and much more!

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

— Show Notes —

Feedback

  • Oliver is moving away from Rails to Play
  • I confused Dave re the OracleJDK and OpenJDK
  • Re my iPhone 5

Dev World Hoopla

Tool of the Week

Pick of the week


\"TechSNAP

Follow the show

The post Office Hours | CR 38 first appeared on Jupiter Broadcasting.

]]>
Man In the Browser Attack | TechSNAP 59 https://original.jupiterbroadcasting.net/19902/man-in-the-browser-attack-techsnap-59/ Thu, 24 May 2012 16:48:35 +0000 https://original.jupiterbroadcasting.net/?p=19902 Yahoo has made a mistake so big, you have to hear it to believe it. And Blizzard's huge security blunder hitting Diablo III customers.

The post Man In the Browser Attack | TechSNAP 59 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Yahoo has made a mistake so big, you have to hear it to believe it. A common feature in firewalls could actually make you more susceptible attack, Blizzard huge security blunder.

PLUS: Separating traffic out between your network cards, and so much more on this week’s TechSNAP.

Thanks to:

GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Limited time offer:

New customers 25% off your entire order, code: 25MAY7
Expires: May 31, 2012

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | Torrent File

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Support the Show:

Show Notes:

Yahoo accidentily released the private certificate key for thier new browser extension

  • Yahoo released their new browser extension, a ‘search browser’ called Axis
  • Yahoo accidentally included the private half of their certificate key in the files for the extension
  • This allows anyone with a copy of this key, to sign a new extension and have it appear as if it was legitimately created by Yahoo
  • This could be exploited further, using DNS Spoofing or various other techniques, an attacker could issue an updated version of the Axis plugin, appearing to be signed by Yahoo, but actually containing malware including a key logger and a cookie stealer
  • Yahoo has since released a new version of Axis without the private key
  • It is unclear if Yahoo has taken additional steps beyond publishing the new extension archive without the private key
  • It is imperative that the Yahoo certificate be revoked from trust, meaning Yahoo will need to get a new certificate and resign all of their extensions so they again appear as legitimate
  • Yahoo should probably be using an HSM (Hardware Security Module) to store the private key, rather than having it laying around in a plaintext file
  • Original Discovery
  • Proof of Concept Exploit
  • ThreatPost Coverage
  • Additional Coverage

Researchers find that a common firewall feature makes you more vulnerable

  • Most firewalls include a feature that checks the validity of the TCP initial sequence number (ISN)
  • The ISN is purposely randomized, to prevent spoofed packets from being injected into a TCP stream and prevent TCP session hijacking
  • The main goal of the firewall feature is to conserve bandwidth and other network resources by immediately dropping spoofed or suspicious packets
  • However, if the attacker has malware installed on the target machine behind said firewall, they will be able to determine which packets are being blocked for invalid ISNs and which are not, thus allowing them to determine what are infact valid ISNs
  • Once the attackers has the valid ISN, they can inject data into the TCP stream, and may be able to hijack a connection and present a phishing style login page for services such as facebook
  • Researchers managed to successfully execute a number of different attacks, including the phished facebook login page, injecting javascript to cause users to send tweets and follow people on twitter, injecting malicious links into MSN Messenger conversations between trusted users, and executing DDoS attacks against offsite targets
  • The research focused on mobile devices such as smart phones
  • The researchers found that 31.5% of the 149 mobile network nodes of major US national carriers that they surveyed had firewalls with the ISN tracking feature
  • Research Paper
  • Was presented at the IEEE Symposium on Security and Privacy 2012

New MitB (Man in the Browser) attack targets mobile banking

  • A new trojan called tatanga, uses rootkit type techniques to compromise almost all popular browsers on the windows platform, including: Internet Explorer, Firefox, Chrome, Opera, Safari and Konqueror
  • The trojan also includes elements to remove competing trojans such as the Zeus botnet, and defeat antivirus applications
  • The trojan specifically targets banks in Spain, the United Kingdom, Germany and Portugal
  • The trojan modifies the page inside the browser, so bypasses the encryption of SSL/TLS and even multi-factor login requirements
  • This type of MitB attack is hard to prevent
  • One such way to mitigate these attacks is an out-of-band transaction verification, confirming money transfers with the user outside of their online banking session
  • The tatanga trojan keeps this in mind, and uses social engineering to defeat it
  • When the user logs in to their online banking, passing the multi-factor authentication, the trojan injects a new page in to the user’s browser prompting them to enter a TAN (Transaction Authorization Number) that they will receive via SMS, to verify their login
  • The TAN that the user receives, is actually for the transfer of a large sum of money from their account to that of a mule
  • The trojan instructs users to ignore the specifics on the TAN provided in the SMS, stating that it is experimental, or a test message
  • The effectiveness of the social engineering attack is degraded by the weak writing skills of the author, a future variation of this attack could be far more effective
  • Background on Tatanga
  • Additional Coverage

Feedback:

Q: James asks about routing traffic out different network cards

A:
+ Policy Based Routing on Linux (based on Source Address)
+ Linux Advanced Routing & Traffic Control HOWTO
+ Cross platform policy based routing
+ FreeBSD Example using multiple FIBs
*

Q: Danny asks about Version Control and Auditing

A:

  • Subversion Manual
  • TortoiseSVN Shell Extension for Windows
  • Tortoise and many other SVN clients support a number of different protocols, including https:// and https:// (via WebDAV), svn:// (running an SVN daemon), svn+ssh:// (running the SVN CLI over SSH) and file:/// (directly accessing the repository, possible over windows file sharing or NFS)

Round Up:

The post Man In the Browser Attack | TechSNAP 59 first appeared on Jupiter Broadcasting.

]]>