Hacker Public Radio show

Hacker Public Radio

Summary: Hacker Public Radio is an podcast that releases shows every weekday Monday through Friday. Our shows are produced by the community (you) and can be on any topic that are of interest to hackers and hobbyists.

Join Now to Subscribe to this Podcast
  • Visit Website
  • RSS
  • Artist: Hacker Public Radio
  • Copyright: Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) License

Podcasts:

 HPR2520: Diffie-Hellman and Forward Secrecy | File Type: audio/mpeg | Duration: Unknown

Diffie-Hellman Key Exchange is used in a security technique called Forward Secrecy that aims to secure your encrypted communications from future decryption by unauthorized entities. While it does provide additional security it is not absolutely bullet-proof. So while we explain how it works and provides security, we will also discuss how it can go wrong. For more go to http://www.zwilnik.com/?page_id=957 Links: https://www.eff.org/https-everywhere https://en.wikipedia.org/wiki/POODLE http://www.zwilnik.com/?page_id=686 https://security.googleblog.com/2011/11/protecting-data-for-long-term-with.html https://blog.twitter.com/engineering/en_us/a/2013/forward-secrecy-at-twitter.html https://www.khanacademy.org/math/applied-math/cryptography/modern-crypt/v/discrete-logarithm-problem http://vincent.bernat.im/en/blog/2011-ssl-perfect-forward-secrecy.html#some-benchmarks https://www.thesslstore.com/blog/apple-will-require-use-ats-2017/ http://www.zwilnik.com/?page_id=957

 HPR2519: the_remora Builds a character in Edge of the Empire | File Type: audio/mpeg | Duration: Unknown

Link to the Character Sheet Link to Edge of the Empire by Fantasy Flight Games: https://www.fantasyflightgames.com/en/products/star-wars-edge-of-the-empire/ Link to the Tool I used to Build this character: http://www.legendsofthegalaxy.com/Oggdude/. I recommend using the web installer. Unofficial Organized play similar to D&D Adventurers League: http://www.legendsofthegalaxy.com/ Thanks and sorry the Audio was so bad, I was forced to use Bluetooth headphones because Audacity would not take audio from my USB headset.

 HPR2518: Converting My Laptop to Dual Boot | File Type: audio/mpeg | Duration: Unknown

Converting My Laptop to Dual Boot Summary In this episode I describe how I converted my Linux-only laptop to dual-boot with Windows 10. Specifically, using information from a previous HPR episode. Reference The procedure used in this project drew heavily from the information presented in HPR episode 2305 by Mongo. Target Laptop Lenovo Thinkpad T550 Intel i7-5600U Dual-Core 8GB RAM 256GB SSD Laptop was purchased in Jan 2016 as a factory refurb unit from an Ebay seller. The model was about 1 year old at the time. As soon as I got it, I summarily removed any trace of Windows, with prejudice, and installed Linux. The Problem I am needing to run some Windows software that doesn't work in either Wine or a virtual machine environment. Specifically Autodesk Fusion 360. Some Challenges No longer have Windows install media. I was able to download a Lenovo recovery USB image. https://support.lenovo.com/us/en/solutions/ht103653 I didn't think that a 256GB drive would be big enough for both Linux and Windows. I purchased a 512GB SSD drive. I was happy with my Xubuntu setup and configuration and didn't want to have to start all over on that. I hoped that restoring my home directory would take care of that. The Procedure Backed up my home directory, just in case. Replaced the hard drive. Tried to boot from Lenovo Windows thumb drive. Found that the BIOS was set to legacy mode, so reset BIOS to factory. Told the installer to use the entire drive. Went through the entire Windows install and update process. Used the instructions provided by Mongo to resize Windows filesystem size. Used the instructions provided by Mongo to turn of fast boot. Used the instructions provided by Mongo to turn of Secure Boot in BIOS. Booted from Xubuntu 16.04 thumb drive. Did Xubuntu install as normal, choosing the install type of installing along side Windows Boot Manager. Installed all of the updates. Mounted the old hard drive with a USB drive enclosure, which was a bit of a challenge because that drive was encrypted. The drive has 2 partitions. A small boot partition and then a large LUKS encrypted partition. This is a procedure that can be used to mount such a partition. First you must decrypt the partition and map it to a device. This can be done with the following command (assuming the partition mount point is /dev/sdb2): cryptsetup luksOpen /dev/sdb2 cryptdrive This command will map the partition to the following device: /dev/mapper/cryptdrive Normally you could then mount the filesystem as follows: mount /dev/mapper/cryptdrive /mnt However, in this case the encrypted filesystem is actually an LVM volume that contains two volume groups that made up the partitions of the previous Linux install, so you can't directly mount it. I had to first install the LVM tools, which had not been installed by default. apt-get install lvm Then I had to issue the following command to activate the LVM volume groups. vgchange -ay That resulted in two more devices being created. /dev/xubuntu-vg/swap /dev/xubuntu-

 HPR2517: DIY CCTV Security System | File Type: audio/mpeg | Duration: Unknown

CCTV Security System $80 Reolink IP PoE Security Camera 4MP Super HD 2560x1440 with SD Card & Audio Outdoor Indoor Bullet IR Night Vision Motion Detection RLC-410S 65$ RLC-410 ( No SD CARD ) $150 Linksys Business LGS116P 16-Port Desktop Gigabit Ethernet PoE+ Unmanaged Network Switch I Metal Enclosure $150 Ispy to start https://forums.zoneminder.com/viewtopic.php?f=36&t=26906 115 lines of bash When event ends on ZM yolo is run on a random 10 images for that event (Person Dog Cat Car) if an object is detected we look to see if two Android phones via MAC on network if they are on the network it means somebody is home so events are throttled to 1/1hr max if nobody is home then original image/object detected from event is sent to email zones zones preclusion Video https://rmccurdy.com/scripts/videos/rmccurdy_com/ZoneMinder_Yolo_Yolov2_Darknet_Script_Plugin.mp4 Issues: rain, spiderwebs, shadows, Car lights (preclusion zones) full motion capture is -6hrs 16gig smearing ( lower FPS on cam and make sure ZM has higher framerate then the cam make sure not to use Source Type:ffmpeg and use remote or try both) journalctl -f -t DARKNET.service (shows nothing...@#%ing systemd) night time More Notes: Start with one zone at a time and raise/test sensitive KISS...don't setup like 4 zones and expect to trouble shoot anything. I used my Android to do a lot of tweaking. I also want to sort out "night" mode config so after night mode kicks in a different config is automatically applied. Use low quality for motion detection and drop frame rate of cam to lower than max of ZM for little to no smearing and I also set "Alarm Frame Count to 2" and "overload ignore frame count to 4" but I think it's more about Alarm Frame Count..I can't be sure.. Explanation of overload ignore frame count Report this post Quote Post by bb99 » Thu May 10, 2012 5:22 pm For sudden changes to the environment, no better tool then Overload Frame Ignore Count. Your fps determines these settings but at 10 fps with Overload Frame Ignore Count set to 4, it only ignores .4 seconds. In other words if a drastic change to the lighting (such as a car with headlights on in darkness) passes within the monitors view it will ignore the number of frames you specify before processing for motion detection. Alarm Frame Count This option allows you to specify how many consecutive alarm frames must occur before an alarm event is generated. The usual, and default, value is 1 which implies that any alarm frame will cause or participate in an event. You can enter any value up to 16 here to eliminate bogus events caused perhaps by screen flickers or other transients. Values over 3 or 4 are unlikely to be useful however. Please note that if you have statistics recording enabled then currently statistics are not recorded for the first ‘Alarm Frame Count’-1 frames of an event. So if you set this value to 5 then the first 4 frames will be missing statistics whereas the more usual value of 1 will ensure that all alarm frames have statistics recorded. https://forums.zoneminder.com/viewtopic.php?f=36&t=26222 Windows software to get basic idea ( install face plugin ) https://www.ispyconnect.com/plugins.aspx

 HPR2516: Intro to git branch | File Type: audio/mpeg | Duration: Unknown

These are all the commands covered in this episode. This is not a sequence, it's just all the commands in the episode, listed one after another. Get changes from the remote repo: $ git fetch See all branches: $ git branch --all View a remote branch after you have fetched it: $ git checkout origin/dev Create a copy of a fetched remote branch in your local repo: $ git checkout dev Merge changes from remote origin/master into your local master branch: $ git merge master origin/master Fetch and merge automatically: $ git pull Create a new branch, and change to it: $ git checkout -b dev Merge dev into master: $ git checkout master $ git merge master dev Merge master into dev $ git checkout dev $ git merge dev master Delete the dev branch: $ git branch -d dev

 HPR2512: Intro to git remote | File Type: audio/mpeg | Duration: Unknown

Instantiate a git repo: $ mkdir alice $ cd !$ $ git init Add a remote: $ git remote add origin URI_OF_REMOTE Change a remote: $ git remote set-url origin NEW_URI A remote can be a server, it can be a local directory, an NFS share, pretty much whatever you want. It is a Git convention that the primary remote is called origin. You don't have to call it that, but it's pretty common.

 HPR2511: Response to episode 2496 | File Type: audio/mpeg | Duration: Unknown

Links Dave's show Dave's script Raspberry Pi forum page Raspberry Pi tools GitHub page Command This is written for fish shell for pi in pi1 pi2 pi3 pi4; cat what_pi | ssh "$pi" bash -; done

 HPR2510: 26 - Diffie-Hellman-Merkle Key Exchange | File Type: audio/mpeg | Duration: Unknown

Diffie-Hellman Key Exchange is based on work initially done by Ralph Merkle, and remains one of the key developments in secure communication over the Internet. In this episode I try to explain just how this works, with an example of a calculated key exchange. For more go to http://www.zwilnik.com/?page_id=955 Links https://ee.stanford.edu/~hellman/publications/24.pdf https://en.wikipedia.org/wiki/Modular_arithmetic https://en.wikipedia.org/wiki/Discrete_logarithm https://en.wikipedia.org/wiki/Man-in-the-middle_attack http://www.zwilnik.com/?page_id=955

 HPR2509: AudioBookClub 16 Matcher Rules | File Type: audio/mpeg | Duration: Unknown

SUMMARY In this episode, the HPR_AudioBookClub discusses Matcher Rules by Mary Holland https://scribl.com/books/PDB66/matcher-rules NON-SPOILER THOUGHTS pokey: An enjoyable story, but not really for me. FiftyOneFifty: It's not about orgies... x1101: Liked it. A little slow. Thaj: It surprised me, I didn't expect to like it as much as I did. BEVERAGE REVIEWS As usual, the HPR_AudioBookClub took some time to review the beverages that each of us were drinking during the episode Thaj: Voice fading fast. Need a boost. With a little lemon and some local honey http://www.traditionalmedicinals.com/products/throat-coat/ x1101: Harpoon IPA - http://www.harpoonbrewery.com/beer/1/harpoon-ipa pokey: "my beer is a knife" Smuttynose Robust Porter https://smuttynose.com/beer/robust-porter/. I sharpen it with a Spyderco Triangle Sharpmaker https://www.spyderco.com/catalog/details.php?product=77. It is awesome. FiftyOneFifty: Junior Johnson's Midnight Moonshine THINGS WE TALKED ABOUT We discuss the upsides and downsides of affinity groups. Pokey wonders why terminology for simple things are changed in sci-fi stories. How exactly do population and economics work together? OUR NEXT AUDIOBOOK Blood Witness by David Hitt - https://scribl.com/books/PA513/blood-witness NEXT RECORDING We are currently working through a backlog of pre-recorded episodes. Once this is completed we will restart the Audiobook Club again. If you want to be notified when this happens please let us know via the HPR Mailing List 'hpr at hackerpublicradio dot org'. FURTHER RECOMMENDATIONS Nothing this time, well except for the typical Star Wars reference...and Star Trek, and comics. FEEDBACK Thank you very much for listening to this episode of the HPR_AudioBookClub. We had a great time recording this show, and we hope you enjoyed it as well. We also hope you'll consider joining us next time. Please leave a few words in the episode's comment section. As always; remember to visit the HPR contribution page HPR could really use your help right now. http://hackerpublicradio.org/contribute.php Sincerely, The HPR_AudioBookClub P.S. Some people really like finding mistakes. For their enjoyment, we always include a few. OUR AUDIO This episode was processed using Audacity http://audacity.sourceforge.net. We've been making small adjustments to our audio mix each month in order to get the best possible sound. It has been especially challenging getting all of our voices relatively level, because everyone has their own unique setup. Mumble is great for bringing us all together, and for recording, but it's not good at making everyone's voice the same volume. We're pretty happy with the way this month's show turned out, so we'd like to share our editing process and settings with you and our future selves (who, of course, will have forgotten all this by then). Mumble uses a sample rate of 48kHz, but HPR requires a sample

 HPR2508: False Prophets | File Type: audio/mpeg | Duration: Unknown

Lostnbronx considers the effect that Elon Musk and SpaceX are having on the latest push for the exploitation and exploration of space, and the danger of pegging the future of the human race upon the showmanship of one man.

 HPR2507: Racket, Nix, Fractalide and the sounds of a Hong Kong New Town | File Type: audio/mpeg | Duration: Unknown

Listen to me walk through five shopping malls and one bicycle tunnel, as I rant about how flow-based programming microservices and functional package management will save the future of programming and software reuse, and usher in a new era of software quality and productivity! If it sounds like I'm a bit down about working alone on racket2nix, you're interpreting me wrong! I didn't expect any feedback at all from the small to non-existent racket/nix intersection, but it turns out the intersection is larger than I thought, and I'm grateful for any words of encouragement, and feedback in any form on what the community needs. Links: racket2nix racket nix fractalide Nix is the mother of Guix: hpr2198 :: How awesome is Guix and why will it take over the world

 HPR2506: Build Your Own Lisp (A Book Review) | File Type: audio/mpeg | Duration: Unknown

Build Your Own Lisp http://www.buildyourownlisp.com/ https://github.com/orangeduck/BuildYourOwnLisp Daniel Holden links: https://github.com/orangeduck http://www.theorangeduck.com/

 HPR2505: The power of GNU Readline - part 3 | File Type: audio/mpeg | Duration: Unknown

The power of GNU Readline - part 3 In part 2 we looked at deleting text in various ways and pasting it back, using GNU Readline key sequences. The full-length notes (available here) contain some new terms and features of GNU Readline, and introduce some further ways of manipulating text, with some examples. Links Wikipedia article on GNU Readline GNU Readline manual Previous episodes: The power of GNU Readline - part 1 The power of GNU Readline - part 2 Resources: Detailed notes

 HPR2504: Intro to Git with pen and paper | File Type: audio/mpeg | Duration: Unknown

git add git commit -m "some useful message" git push origin HEAD

 HPR2503: My journey into podcasting | File Type: audio/mpeg | Duration: Unknown

How I Got Into Podcasting The Background Audio production has always been an interest of mine: my late grandfather was an audiophile, my dad ran an AV studio in Woking (the one where the Spice Girls were formed - my dad got mentioned in a couple of their autobiographies) and now runs his own AV consultancy business, and my cousin also runs an AV consultancy... so there’s a definite family history in there. I dabbled briefly with hospital radio (as a technician, rather than a presenter) in the late 80’s, and I was a technician and presenter on College Radio in the early 90’s where I hosted a show called “The Barry Manilow Fan Club” on Friday lunchtimes. Yes, I am a huge fan of Barry Manilow - he’s given me a lot of inspiration as a musician - no, I didn’t play any Barry on the College Radio show. I’d also had a few people say that I had a good radio voice. Others say a good radio face, but I don’t like them anymore. The Catalyst In 2007, I discovered this podcasting lark through a couple of friends who had their own podcasts. One was The Random Three: a personal musical journey where Mark - the host - would play three seemingly-random pieces of music from his own collection (thus, not podsafe) and explain the reasons why he chose them. Most of the time, these seemingly-random tracks actually had a theme, but it didn’t necessarily become apparent until after the second track. It was a great show - now sadly defunct - and I really miss it. I even submitted my own music choices for Mark to present. The other was Dumbed Down Life: three chaps nattering about “stuff” and playing some music along with it. Another great show, which - although it still exists - currently releases episodes every year or so. What drew me to these shows - apart from being friends, was the fact that these were regular guys, not professionals. That led me to think “I can do that”, so I set about proving - to myself, mostly - that I could. The Start One Thursday in early March 2008, when the wife had gone to the gym for a couple of hours, I grabbed my Logitech headset, my Linux laptop, a handful of tracks from the Podsafe Music Network, and a piece of software called IDJC, and recorded the first ever episode of The Bugcast. It was just over 22 minutes long, and it was dire. Utterly dire. Every so often, I go back to it and listen and cringe and marvel at how much better the show is now! The music back then wasn’t strictly podsafe either: the first track I played was Moloko’s Sing It Back… but I didn’t worry about it then, as I got the track from a source that gave implicit permission for use in podcasts. I did do a show - episode 20 - which was a nostalgic trip back to my college years, where I played tracks by Chad Jackson, Japan, and Dream Warriors. This was a complete and intentional violation of copyright on my part, which led me to pull the show only a few weeks later. I did rerelease the show two years after that, but with the offending tracks removed. However, there is a story to the show, so I would recommend you go listen. Back then, it was just me and a small listener-base of friends, their family, their families’ servants; their families’ servants’ tennis partners, and some chap I bumped into in the mess the other day called Bernard. But as time went on and I got more experience, I was really enjoying what I was doing, and

Comments

Login or signup comment.