Hacker Public Radio show

Hacker Public Radio

Summary: Hacker Public Radio is an podcast that releases shows every weekday Monday through Friday. Our shows are produced by the community (you) and can be on any topic that are of interest to hackers and hobbyists.

Join Now to Subscribe to this Podcast
  • Visit Website
  • RSS
  • Artist: Hacker Public Radio
  • Copyright: Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) License

Podcasts:

 HPR1163: Installing PYWWS on a Raspberry Pi | File Type: audio/mpeg | Duration: Unknown

The USB weather station http://tinyurl.com/a8ezezy Weather Charts http://weather.kernelpanicoggcast.net/index.html How-to http://kernelpanicoggcast.net/phpBB3/viewtopic.php?f=3&t=251&p=393#p393

 HPR1162: LiTS 021 – killall | File Type: audio/mpeg | Duration: Unknown

Linux In The Shell aims to explore the use of many commands a user can run in the Bash Shell. Tutorials include a write up with examples, an audio component about the write up, and a video component to demonstrate the usage of the command. The website is http://www.linuxintheshell.org/ The previous two shows have discussed different ways to kill a process using kill and pkill. This episode will cover a third command, killall. The killall command is used to send a signal to every process that is running the identified command. For instance: killall xterm Will send the SIGTERM process to all incidents of xterm. Should there be any xterm processes running they would receive the default SIGTERM signal (recall, number 15) and be terminated. If there were no xterm processes running then killall would report the following: xterm: no process found For the rest of this episode please check out the shownotes and video at http://www.linuxintheshell.org/2013/01/01/episode-21-killall/

 HPR1161: PAM Two Factor Auth SSH | File Type: audio/mpeg | Duration: Unknown

Thank you to Broke For Free and for their Creative Commons album Broke For Free: Slam Funk, which was used during this latest show at HackerPublicRadio.org Good sources of information for PAM http://www.netbsd.org/docs/guide/en/chap-pam.html http://en.wikipedia.org/wiki/Two-factor_authentication Overview of PAM Security Definition: Presenting two or more from something you have, something you know, and something you are. Centos /etc/pam.d/ Debian /etc/pam.d/ (common-auth exists in Debian and its a system wide security implementation for all pam.d applications) Google Two Factor Authentication MNXSolutions.com,Old instructions but still useful Webbynode.com, Useful but still uses outdated mercurial steps Google two factor auth git repo source General Instructions Install git, gcc, and make on your system $ apt-get install git make gcc $ yum install git make gcc Execute git command as noted on google's site: $ git clone https://code.google.com/p/google-authenticator/ Compile and install the google two factor auth PAM module and application $ cd google-authenticator/libpam/ $ make install Add the following lines to the /etc/pam.d/sshd auth required pam_google_authenticator.so Location of SSH server configurations /etc/ssh/sshd_config Add/modify the following stanza to SSH server configuration: ChallengeResponseAuthentication yes Create Google two factor profile for SSH user and answer the setup questions based off your preferences $ google-authenticator Restart SSH server $ service ssh restart (on CENTOS try $ service sshd restart) Wrap Up In Debian based systems you can comment out the system wide common-auth by simply adding a # to the beginning of the @include common-auth. If you want to use google two auth with other applications simply add it to the appropriate /etc/pam.d/ file Other useful PAM modules include the Barada module: libpam-barada (OTP with Android Client), pam_winbind (Samba Active Directory authentication module), and many more. Make sure you have dual SSH connections and are sudo or su as a privileged user. Also make sure any files you configure today are backed up before you edit them. When setting up Two Factor Auth profiles, go into cleanup mode to ensure you don't use the QR code url where it can be later retrieved from your url history. Also make sure you cleanup your command line and clipboard history so that emergency scratch codes and secret keys can't be found by wondering eyes. Podcasts worth mentioning. Linux Outlaws Network Security Podcast Risky Business Podcast

 HPR1160: TGTM Newscast for 1/8/2013 DeepGeek | File Type: audio/mpeg | Duration: Unknown

Obama to Sign "Fiscal Cliff" Bill After Weeks of Tense Talks Swedish military reportedly shuts down pro-WikiLeaks transparency websites Politicians Decry Fake Torture, Cover Up Real Torture Washington’s minimum wage law sets standard for nation Telephone Fraud, Corruption and One-Party Democracy in Cuba U.S. and Russia Announce Online Piracy Crackdown Agreement Government Attorneys Agree With EFF: New 'Counterterrorism' Database Rules Threaten Privacy of Every American Apparently, Congress Isn't Actually Interested In Requiring A Warrant For Law Enforcement To Read Your Email Megaupload: U.S. Deliberately Misled the Court with Unlawful Search Warrants Vermont Supreme Court Allows Limits to Government Computer Search Power Other Headlines: How Obama Decides Your Fate If He Thinks You're a Terrorist Irving Women Claim Assault, Humiliation After Roadside Cavity Search Statement by Julian Assange after Six Months in Ecuadorian Embassy German privacy regulator orders Facebook to end its real name policy List of Groups Harmed by Websites with Anti-Pseudonym Policy Staffed and produced by the TGTM news team, Editorial Selection by DeepGeek, views of the story authors reflect their own opinions and not neccesarily those of TGTM news. News from "techdirt.com," "thestand.org,"  and "havanatimes.org" used under arranged permission. News from "torrentfreak.com" and "eff.org" used under permission of the Creative Commons by-attribution license. News from "wlcentral.org," and "democracynow.org" used under permission of the Creative Commons by-attribution non-commercial no-derivatives license. News Sources retain their respective copyrights. links http://www.democracynow.org/2013/1/2/headlines#120 http://wlcentral.org/node/2801 http://www.techdirt.com/articles/20121220/15133521458/politicians-decry-fake-torture-cover-up-real-torture.shtml

 HPR1159: Food - Health - Nutrially Densce food | File Type: audio/mpeg | Duration: Unknown

Part 1 of ...I Love Food, Good Food A Contribution for HPR from Dude-man@dudmanovi.cz where he talks about a not so well known, but very well thought out and backed up by scientific research started in the 1930's by Weston A Price, who went on after traveling around the world to find healthy people and study what made them healthy to write a large book describing in a language understadable to the lay person what he discovered along with its significance in our own lifes should we wish to maximize our health and that of our children and future generations. Of course the first question we should have is what does a healthy person look like, the shape and size, the condition of the teath etc. Dude-man does his best to share a little of what he's learnt over the last 10 years which he's been putting into practice with his wife, son (7), daughter (2) and their small homestead of Jersey dairy cows and other aniamsl which help provide the staff of live to the whole family. Books mentioned Nutrition and Physical Degeneration by Weston A. Price http://www.westonaprice.org/thumbs-up-reviews/nutrition-and-physical-degeneration Nourishing Traditions: The Cookbook that Challenges Politically Correct Nutrition and the Diet Dictocrats http://www.amazon.com/Nourishing-Traditions-Challenges-Politically-Dictocrats/dp/0967089735/ref=la_B000APH4JA_1_1?ie=UTF8&qid=1354738004&sr=1-1 Foundation for Weston A Price http://www.westonaprice.org Dude-mans Podcast on technology http://dudmanovi.cz

 HPR1158: Hacker Public Radio New Year Show Part 8 | File Type: audio/mpeg | Duration: Unknown

The eight and final part of the epic Hacker Public Radio Show. Feel free to listen and send me some show notes The song at the end is "Love" by "Epic Soul Factory" a The CCHits.net Daily Exposure Show for 2012-04-04. This track is licensed: cc-by-nc-sa

 HPR1157: Hacker Public Radio New Year Show Part 7 | File Type: audio/mpeg | Duration: Unknown

The seventh part of the epic Hacker Public Radio Show. Feel free to listen and send me some show notes

 HPR1156: Hacker Public Radio New Year Show Part 6 | File Type: audio/mpeg | Duration: Unknown

The sixth part of the epic Hacker Public Radio Show. Feel free to listen and send me some show notes

 HPR1155: Hacker Public Radio New Year Show Part 5 | File Type: audio/mpeg | Duration: Unknown

The fifth part of the epic Hacker Public Radio Show. Feel free to listen and send me some show notes

 HPR1154: Hacker Public Radio New Year Show Part 4 | File Type: audio/mpeg | Duration: Unknown

The fourth part of the epic Hacker Public Radio Show. Feel free to listen and send me some show notes

 HPR1153: Hacker Public Radio New Year Show Part 3 | File Type: audio/mpeg | Duration: Unknown

The Third part of the epic Hacker Public Radio Show. Feel free to listen and send me some show notes Joining ammi Azimuth b1ackcr0w blabla cchivers chalkahlom davemorriss deepgeek deltaray delwin FiftyOneFifty geospart honkeymagoo jakowski JonDoe JonTheNiceGuy kt4kb-Jon larsson Le_jax LordDrachenblut MaskilPDX MethodDan MrGadgets NYbill PIpeMan popey redsteakraw rulloj Russ_W stubert thelovebug The_Rhino-Tablet theru ThistleWeb toby Urugami usr_share Xoke Links http://www.amazon.com/Perplexus-Maze-Game-PlaSmart-Inc/dp/B002NPBT50 http://www.thelinuxlink.net/ http://twit.tv/show/security-now/384 http://www.buzzfeed.com/awesomer/julian-assanges-ok-cupid-profile http://www.imdb.com/title/tt0309614/ https://www.google.co.uk/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CDIQFjAA&url=http%3A%2F%2Fwww.amazon.co.uk%2FGhost-Wires-Adventures-Worlds-Wanted%2Fdp%2F0316212180&ei=2gziUITIOMiRhQedk4DoBA&usg=AFQjCNGoU98MhjwW-PvB6w_X73zRhGSDKg&bvm=bv.1355534169,d.ZG4 http://www.amazon.co.uk/Ghost-Wires-Adventures-Worlds-Wanted/dp/0316212180 http://www.oxid.it/images/c&a_diehard4_1.png http://uk.imdb.com/title/tt0104692/ http://dc260.4shared.com/doc/5u0g9auk/preview.html - nifty use of BASH in The Bourne Ultimatum http://www.criticalcommons.org/Members/ccManager/clips/paycheckholographicinterfacegestural.mp4/view https://www.youtube.com/watch?v=Vxq9yj2pVWk http://sandbox.cctracker.org http://juicereceiver.sourceforge.net/download/index.php http://sixgun.org/lol/

 HPR1152: Hacker Public Radio New Year Show Part 2 | File Type: audio/mpeg | Duration: Unknown

The Second part of the epic Hacker Public Radio Show. Feel free to listen and send me some show notes Joining Ahuka artv61 beto Bill_MI bobobex chalkahlom ciak cobra2 corenominal deltaray drw FiftyOneFifty geospart honkeymagoo jnadeau jneusteter jrullio jrullo krayonCamping kt4kb-Jon Kwisher2 MaskilPDX notklaatu orchard osama RandyNose1 ruji sebsebseb_Mageia Seetee TonyHughes Urugami Verbal Links http://www.computerworld.com.au/article/274883/openchange_kde_bring_exchange_compatibility_linux/ http://manilastandardtoday.com/2013/01/01/ubuntu-surprise/ http://www.unixporn.com/screenshots/displayimage.php?pid=1455&fullsize=1

 HPR1151: Hacker Public Radio New Year Show Part 1 | File Type: audio/mpeg | Duration: Unknown

The First part of the epic Hacker Public Radio Show. Feel free to listen and send me some show notes Featuring: artv61 b1ackcr0w bepc biglesp bobobex corenominal cynicus deepgeek delwin DoorZT dude-man FiftyOneFifty Ghodmode hammerron Hanna jnadeau jneusteter JonTheNiceGuy ken_fallon Knightwise krayonCamping kt4kb-Jon KW_Fire KWisher liv2tek notklaatu orchard phthano pokey popey redsteakraw sebsebseb_Mageia Seetee shfengoli SndChaser thelovebug Urugami Valtam Links http://techandcoffee.com/ http://xkcd.com/936/ https://www.youtube.com/watch?v=jskq3-lpQnE http://thedigitallifestyle.com/w/ http://simon-listens.blogspot.com/2012/12/simon-040.html http://decoratedair.com/ http://www.themagpi.com/ http://pi.corenominal.org/ http://simon-listens.blogspot.se/2012/12/simon-040.html https://en.wikipedia.org/wiki/IMSAI_8080 http://psdoom.sourceforge.net/ http://www.visimation.com/imgs/screens/visio_2007_connector_mbsa_d_sm.gif http://arstechnica.com/information-technology/2012/12/10-raspberry-pi-creations-that-show-how-amazing-the-tiny-pc-can-be/ http://thebugcast.org/show/123 http://graphics.stanford.edu/projects/camera-2.0/ https://www.youtube.com/watch?v=xU-a7k4Ocqc https://en.wikipedia.org/wiki/Uganda_Anti-Homosexuality_Bill http://twitpic.com/bqqxno https://plus.google.com/105383789706521884831/posts/gB24HwZTQSp

 HPR1150: Hacking Karma And Reincarnation With The Forgiveness Discipline | File Type: audio/mpeg | Duration: Unknown

I recently ran an educational event for a society concerned with Mysticism and as such, gave the first speech. I recorded it "on the fly," so there are problems with the recording, and I had to cut a few comments that were too soft to be picked up at all by my head-mounted microphone. What follows is the script I wrote for the first three-quarters of the presentation. ================================================================== The first thing to understand is that we are not really discussing the traditional idea of forgiveness. We are talking about a whole new ballgame. This really is not your parents idea of forgiveness. Let's have an example of old-school forgiveness. "Well, you really did it. This is a real, and a really bad, situation, and it happens to be your fault. But I'm going to forgive you for what you did. You don't deserve this, but I'm just so much more perfect than you, I'm going to do this anyway. Because I have Jesus. By the way, you don't. And you will always be screwing up. You could stop screwing up, but you wont. Because your not as great a person as I am. You could begin to agree with me about everything, but you won't. You could even believe every last thing I believe. But you won't. So, unlike me, there is no hope of you going to heaven. I will, but you wont. And I might not look sad about this, but I really do feel sorry for you." I had a little bit of fun writing this. What's wrong with this? Well, just about everything. But the worst part of all of this is that it treats both the world, and things people do in it, as real. Now, as a society of mystics, there are problems with what has been called the "objectiveness" of reality. That is to say, we actually have no guarantee that what we experience is actually real. I'm sure you've heard phrases like "the world is Maya" which roughly translates into illusion. It's appeared in popular culture, like in films like "the Matrix," where all of the world is a computer simulation. There are also several philosophical thought experiments, like what if we were a brain kept in a vat by a mad scientist that was doing some experiment where he was feeding it data. When you get right down to it, just about the only thing you can tell is that some mental data is coming in, and something we identify as our mind is experiencing that data. Such talk is of course, "heavy metaphysics." Let's simplify it in a couple of analogies. Now, me and a few friends deeply enjoy going into the movies. You know, you go into a big auditorium and the lights go down and there are very real looking images on a screen that move and a lot of involving dialogue. Now if we were viewing a movie for a second time, we might know that a certain characters decision would lead, in the course of the movie, to a certain bad outcome. If we were to stand on the stage and try to engage the character to warn him, though, that would be foolish. Certainly you can see that the movie would continue through to the inevitable conflict, which wouldn't change. Now, if we could get into the projectionist's cabinet and mess with the projector and the film, then we might be able to change the course the of movie! What I'm trying to lead you to, is that there is a spiritual discipline aimed at leading to actually changing the film. This is because if you just try to interact with what is happening in the film, you are never going to change anything. But we don't have to look at it like a film. Another analogy serves well, that of a dreaming child. If you were a mother, and you were watching you're sleeping child, you may be able to see that it would be dreaming. You know, you would see the child in the bed asleep, but it might be saying something to someone in the dream. It might physically twitch in a way that you would say "oh, the dream is about running." Something li

 HPR1149: 02 LibreOffice Writer Default Template | File Type: audio/mpeg | Duration: Unknown

Some useful sites http://www.libreoffice.org/get-help/documentation/ http://wiki.documentfoundation.org/Documentation/Publications http://gofree.com/Tutorials/ http://en.libreofficeforum.org/ My web site is at hhttp://www.ahuka.com/. Remember to support free software!

Comments

Login or signup comment.