Hacker Public Radio show

Hacker Public Radio

Summary: Hacker Public Radio is an podcast that releases shows every weekday Monday through Friday. Our shows are produced by the community (you) and can be on any topic that are of interest to hackers and hobbyists.

Join Now to Subscribe to this Podcast
  • Visit Website
  • RSS
  • Artist: Hacker Public Radio
  • Copyright: Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) License

Podcasts:

 HPR3371: HPR Community News for June 2021 | File Type: audio/mpeg | Duration: Unknown

table td.shrink { white-space:nowrap } New hosts There were no new hosts this month. Last Month's Shows Id Day Date Title Host 3347 Tue 2021-06-01 Ethical Analysis of Renewable Energy and Conservation Paul Quirk 3348 Wed 2021-06-02 Feedback on the Article by hedorah about HPR Ken Fallon 3349 Thu 2021-06-03 Linux Inlaws S01E31: Interview with Paul Ramsey FOSS aficionado and entrepreneur monochromec 3350 Fri 2021-06-04 Blending Layers Ahuka 3351 Mon 2021-06-07 HPR Community News for May 2021 HPR Volunteers 3352 Tue 2021-06-08 HPR 2020 - 2021 New Years Eve Show Episode 4 Honkeymagoo 3353 Wed 2021-06-09 My terminal journey, part 01. Some Guy On The Internet 3354 Thu 2021-06-10 My Devices operat0r 3355 Fri 2021-06-11 Tiki Hell operat0r 3356 Mon 2021-06-14

 HPR3343: The Forth programming language | File Type: audio/mpeg | Duration: Unknown

forth the early years http://worrydream.com/refs/Moore%20-%20Forth%20-%20The%20Early%20Years.pdf https://en.wikipedia.org/wiki/Forth_(programming_language) https://www.forth.com/resources/forth-programming-language/ https://colorforth.github.io/ chuck moore on youtube 2019 https://youtu.be/81bkIqPpe0g 2018 https://youtu.be/SX3kXbLmwn4 2008 https://youtu.be/ydeMNRxJ3Y8 klaatu on lisp http://gnuworldorder.info/audiophile/gnuWorldOrder_405.ogg

 HPR3342: HPR 2020 - 2021 New Years Eve Show Episode 2 | File Type: audio/mpeg | Duration: Unknown

Welcome to the 9th Annual Hacker Public Radio New Years Eve Show heated roads and driveways talking about distilling spirits geek talk single board computers

 HPR3341: Linux on a serial Terminal - And Jorome's MainFrame Challenge | File Type: audio/mpeg | Duration: Unknown

Well its bit of challenge for Jerome to teach me how to do a Mainframe on a PI with serial terminal. I started the project using a old HPE 700/96 terminal amber. I used this site as my prime info. https://www.cyberciti.biz/hardware/5-linux-unix-commands-for-connecting-to-the-serial-console/ First is seeing if you have a serial port dmesg | egrep --color 'serial|ttyS' Then install getty if its not there Then add your config line to /etc/gettydefs Then make work if you reboot. The do report Then you have the log in prompt on the terminal

 HPR3340: Hacked? | File Type: audio/mpeg | Duration: Unknown

As someone who has reasons to be on Facebook, I have gotten used to seeing people warn that their account was hacked, and we should not accept friend requests from them. It is so common that you would wonder if Facebook had no security at all. But the truth is something different, and worth knowing about. Links: https://www.ricksdailytips.com/beware-duplicate-friend-requests/ https://www.zwilnik.com/hacked/

 HPR3339: Linux Inlaws S01E30: Politicians and artificial intelligence part 2 | File Type: audio/mpeg | Duration: Unknown

After successfully navigating through the shallow (or not-so-shallow) depths of the first episode on deep learning fundamentals, our two heroes tackle a more concrete topic in this episode: How to use the damn stuff! No expenses will be spared to bring to the listeners the finer details of tensors, TensorFlow and other frameworks which serve as the basis for modern artificial intelligence / machine learning applications running on back-propagation networks (see the first episode on the foundations). Lifting the curtain even more, all will be revealed about a little corner shop called "Google" (well, almost all :-). Links: Torch: http://torch.ch PyTorch: https://pytorch.org TensorFlow: https://www.tensorflow.org Lua: http://www.lua.org BigTable: https://en.wikipedia.org/wiki/Bigtable BigFS: https://en.wikipedia.org/wiki/Google_File_System Google's inner workings: https://www.panmacmillan.com/authors/david-a-vise/the-google-story/9781509889211 TPUs: https://en.wikipedia.org/wiki/Tensor_Processing_Unit More DL frameworks: https://en.wikipedia.org/wiki/Comparison_of_deep-learning_software TIOBE index: https://www.tiobe.com/tiobe-index Stackoverflow survey: https://insights.stackoverflow.com/survey/2020

 HPR3338: Using openssl s_client like telnet | File Type: audio/mpeg | Duration: Unknown

Connect to port 443 and send some HTTP signals: $ openssl s_client -connect example.com:443 [...snip...] Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- You're now connected. If you wait too long, your connection will likely time out. View the default landing page of the site you've connected with: GET / HTTP/1.1 HOST: example.com In return, you get a dump of the HTML source of the default page (usually index.html) in your terminal. You can also use OpenSSL s_client for email servers using SSL. Before you can send credentials, you must encode your email username and passphrase into Base64. The easiest method I know is this Perl one-liner: $ perl -MMIME::Base64 -e 'print encode_base64("myUserName");' $ perl -MMIME::Base64 -e 'print encode_base64("myPassPhrase");' Take note of the results. The s_client session, aside from authentication, is basically the same as a telnet session. You can find good telnet tutorials all over the Internet, and aside from sending your credentials, they apply to s_client. Here's a copy-paste of an example session: $ openssl s_client -starttls smtp -connect email.example.com:587 > ehlo example.com > auth login ##paste your user base64 string here#### ##paste your password base64 string here#### > mail from: noreply@example.com > rcpt to: admin@example.com > data > Subject: Test 001 This is a test email. . > quit

 HPR3337: I like that the boat is stuck | File Type: audio/mpeg | Duration: Unknown

The episode is released under a Attribution-NonCommercial-NoDerivs 3.0 Unported (CC BY-NC-ND 3.0). HPR has been given non-exclusive rights to create and distribute audio narration with kind permission of the Author. For clarity, permission has not been granted for derivative works, commercial or otherwise, to be created from this narration. This license only applies to the audio narration, not the print version of the essay. I found this piece really fascinating and I like that you can take a huge problem and still consider it simple. It puts a lot of other problems into perspective and I like how this piece is written. https://stone-soup.ghost.io/archive/i-like-that-the-boat-is-stuck/

 HPR3336: HPR 2020 - 2021 New Years Eve Show Episode 1 | File Type: audio/mpeg | Duration: Unknown

Welcome to the 9th Annual Hacker Public Radio show It is December the 31st 2020 and the time is 10 hundred hours UTC. We start the show by sending Greetings to Christmas Island/Kiribati and Samoa Kiritimati, Apia. Covid Covid Covid Brexit. Brexit explained https://en.wikipedia.org/wiki/Brexit Add ISO 8601 YYYY-MM-DD support for dates in preferences https://bugzilla.mozilla.org/show_bug.cgi?id=484860 Cannot format date in ISO8601 (YYY-MM-DD) format https://bugzilla.mozilla.org/show_bug.cgi?id=1492448 Setting date locale no longer works in Thunderbird 60 on linux LC_TIME=en_DK.utf8 behaves differently than it used to https://bugzilla.mozilla.org/show_bug.cgi?id=1426907 Podcast_________________Last_Active_Date Boston Bruins ......... ???? TheTechieGeek ......... 2013-12-27 Dudmanovi ............. 2016-04-09 Geeks With Guns ....... 2014-04-26 ledgerthecat .......... ???? Linux Basix ........... 2014-01-29 LinuXburg ............. 2019-08-16 mintCast .............. Active Noll Tech Show ........ ???? NollCraft ............. ???? Open Source Musician .. 2015-02-17 PodBrewers ............ 2016-03-02 Podnutz ............... Active RevUnity .............. ???? ScannerDrome .......... 2020-05-01 SMLR .................. Active ThePythonExperiment ... ???? UnseenStudio .......... Active Reverse Engineering the source code of the BioNTech/Pfizer SARS-CoV-2 Vaccine https://berthub.eu/articles/posts/reverse-engineering-source-code-of-the-biontech-pfizer-vaccine/ Open street map https://f-droid.org/en/packages/net.osmand.plus/ https://www.openstreetmap.org/ Farenheit celsius scales https://commons.wikimedia.org/wiki/File:Fahrenheit_Celsius_scales.svg Soft drink industry levy https://www.gov.uk/government/news/soft-drinks-industry-levy-comes-into-effect Heroes https://en.wikipedia.org/wiki/Heroes_(American_TV_series) Mr Robot https://en.wikipedia.org/wiki/Mr._Robot Star Trek Theme Faith of The Heart Remake: Sputnik & yuri gagarin https://www.youtube.com/watch?v=2y_FcxFseyc

 HPR3335: For your consideration, the Anarcho Book Club | File Type: audio/mpeg | Duration: Unknown

Interview with Herag, from the Anarcho Book Club podcast. About the Anarcho Book Club

 HPR3334: Infosec Podcasts Part 2 - General Information Security | File Type: audio/mpeg | Duration: Unknown

Inoffensive in every region of the world Hello, again. My name is Trey. This is part 2 of a 6 part series related to information security podcasts. To recap Why am I recording this series? "What podcasts you listen to" was on the list of recommended topics I am passionate about information security We desperately need people to fill infosec jobs in many different specialties Infosec is a rapidly changing field, and it is critical to stay current As a result I listen to TONS of infosec related podcasts Because there are so many podcasts to list, I have broken them down into 6 different episodes based on topics: Part 1 – News & Current Events Part 2 – General Information Security Part 3 - Career & Personal Development Part 4 – Social Engineering Part 5 - Hacks & Attacks Technical Information & Learning Infosec Community / Social / History Part 6 – Infosec Leadership Part 2 General Information Security Caveat – Dave Bittner & Ben Yelin (Weekly) Weekly discussion of cybersecurity law and policy, with a particular focus on surveillance and digital privacy https://thecyberwire.com/podcasts/caveat.html Defense in Depth - David Spark & Guests (Weekly) Weekly podcast digging deeper into a currently trending infosec topic https://cisoseries.com/subscribe-podcast/ Recorded Future - Dave Bittner & Recorded Future (Weekly) A weekly podcast about practical applications of security intelligence https://www.recordedfuture.com/resources/podcast/ Brakeing Down Security - Bryan Brake, Brian Boettcher, and Amanda Berlin (Weekly) A weekly discussion of current infosec topics and events Covers concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans. https://www.brakeingsecurity.com/ Down the Security Rabbit Hole - Rafal Los (Weekly) A weekly interview based podcast discussing various challenges of implementing infosec http://podcast.wh1t3rabbit.net/ Security Weekly Podcast Network - Network of shows with various hosts A collection of podcasts including: Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, Security & Compliance Weekly, Security Weekly News, Tradecraft Security Weekly, & Secure Digital Life. Interesting and diverse discussions. Warning: Discussions sometimes promote the consumption of alcohol and smoking cigars These podcasts are long https://securityweekly.com/ Security Stories - Cisco with Hazel Burton, Ben Nahorney, & Noureen Njoroge (Weekly) A unique weekly interview-based podcast by sponsored by Cisco focusing on infosec stories https://www.cisco.com/c/en/us/products/security/securitystories.html The Confident Defense Podcast - Conor Sherman (Weekly) Interviews with influential and inspirational people in all areas of security https://linktr.ee/ConfidentDefense Open Source Security Podcast - Kurt Seifried & Josh Bressers (Weekly)

 HPR3333: My TV Stand devices and Pine64.org | File Type: audio/mpeg | Duration: Unknown

About Pine64 None of us is as smart as all of us Ken H. Blanchard At the core of our philosophy is the notion that PINE64 is a community platform. A simplistic point of view, often offered up and referenced online, is that ‘PINE64 does hardware while the community does the software’. While this depiction is not inaccurate, it is also a gross oversimplification. The fact that PINE64 is community driven doesn’t simply entail a one-way reliance on the community or partner projects for software support; it means that the community gets to actively shape the devices, as well as the social platform, of PINE64 from the ground up. The goal is to deliver ARM64 devices that you really wish to engage with and a platform that you want to be a part of. As such, the community – PINE64 – and the company PINE Microsystems Inc. are interlocked and intertwined, but separate entities. What does it mean in practice then? It means that we usually announce what we’re working on well ahead of the shipping date – many months before a device is released – so that you have plenty of time to request product features, suggest changes, ask for/make changes to documentation, etc. before the first iteration of the device rolls of the factory line. It also means that the hardware developments – successes and failures alike – are all in the open. You can follow the process on our forum, the IRC, Discord, Matrix, Telegram the online conversations log and, in some instances, on our partner projects forums. But it also means that anyone who is a part of the community gets to shape anything related to the PINE64 project – including the Wiki or this website – and so, software development is only one area where you can contribute your time and skill. In return for time investment, the community gets fair priced devices that developers wish to spend their time on. Last, but not least, is our belief in supporting existing SoCs for long periods of time as well as actively developing new devices based on those SOCs. What does this mean for developers then? It means that a developer can start developing software on a PINE64 SBC and, in time, support multiple devices with relative ease. This device convergence is, at the time of writing, most pronounced on the Allwinner A64 SOC used in a number of our devices including the: PINE64-LTS, SOPine, Pinebook and Pinetab. That said, similar convergence is also planned for the Rockchip RK3399, currently used on the RockPro64 and in the Pinebook Pro. You can always find us in the chats or the forum, so if you have any further questions make sure to drop by and ask about how the PINE64 project actually works.

 HPR3332: My current Devices | File Type: audio/mpeg | Duration: Unknown

Sadly no Opensource hand held devices these days. But Android might count though.

 HPR3331: Audio for Podcasting: Episode 1 - The Microphone | File Type: audio/mpeg | Duration: Unknown

The first in a series of episodes concerning recording and audio quality. For this episode I focus on the beginning of the signal chain, the microphone. Tips on choosing a microphone, and how to use it to get the sound you want. Samson 2QU ATR 2100

 HPR3328: Pandas Part 2 | File Type: audio/mpeg | Duration: Unknown

Part two in the For the Love of Data series. Enigma covers part 2 of Pandas The following topics are discussed 1) Another way to apply a condition to a field 2) Creating a DataFrame from a dictionary 3) Appending a data frame with another DataFrame 4) Joining DataFrames with merge and join 5) Writing an output to csv Part 2 Sample code Follow me on twitter @Ed_N1gma Come chat on irc.freenode.net #hackerexchange

Comments

Login or signup comment.