Podcasts about ctrl c

  • 84PODCASTS
  • 226EPISODES
  • 45mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Mar 19, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about ctrl c

Latest podcast episodes about ctrl c

IT Privacy and Security Weekly update.
For the other 50%. The IT Privacy and Security Weekly Update for the Week Ending March 18th., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Mar 19, 2025 17:09


EP 234For the other 50%.  The IT Privacy and Security Weekly Update for the Week Ending March 18th., 20253/18/20250 CommentsEP 234- click the pic to hear the podcast -For our first story, Apparently there's a 50% chance your password is headlining a hacker convention.  Perhaps it's time to change up from ‘123456' (still the most commonly used password).Starting On March 28, Everything You Say To Your Echo Will Be Sent To Amazon.  Alexa's new motto: ‘Anything you say can and will be used—to personalize your shopping cart, and we mean potentially anything!'The end of Windows 10 Leaves PC Charities With Tough Choice:  Risk Windows 10, embrace Linux, or send Grandma's old PC straight to the tech graveyard?Then Microsoft flags a new threat draining crypto from top wallets.  Meet StilachiRAT, the malware so enthusiastic about your crypto it'll snatch it faster than you can configure your wallet software!Chinese Hackers Sat Undetected in a small Massachusetts power utility for months.  Who knew a cozy little power company could double as the perfect 300-day Airbnb for homeless cyber-spies?Anthropic CEO Says Spies Are After $100 Million AI Secrets in a 'Few Lines of Code'.  So when your fortune fits in a handful of lines, hitting Ctrl+C could be the new diamond heist.Finally,  Allstate Insurance gets sued for delivering PII in plaintext.  You're in good hands with Allstate, we just can't tell you whose.Let's update the other 50%!Find the full transcript to this podcast here.

The Alan Sanders Show
Cease fire, village idiot, Biden's budget, CTRL+C, ActBlue SARs, cooking books, Islamists and terror, old DOGE, de-regs and delusion

The Alan Sanders Show

Play Episode Listen Later Mar 13, 2025 106:00


We open with word that Russian president Vladimir Putin is open to a cease fire if it means getting to an end to all hostilities. Rep. Jasmine Crockett (D-TX) belclowns herself again regarding the possible government shutdown. And, Sen. Chuck “You” Schumer needs to be reminded that the current CR is a continuation of the Biden/Democrat budget. Yet, many Democrats cannot be trusted to write their own thoughts about the looming shutdown and have to resort to copy/paste from the approved messaging from their Hive Queen overlord. Rep. James Comer (R-KY) says they have finally been given access to dozens of suspicious activity reports surrounding ActBlue. He also mentions there are likely hundreds more. The acting ICE Director, Todd Lyons, just revealed another instance of the Biden regime cooking the books. Seems all of those “arrests” they touted at the border, were nothing more than initial apprehensions, before processing them and releasing them into the country. This leads DNI Tulsi Gabbard to tell us while the Biden era wanted to focus on white supremacy, the real threat is with the influx of Islamists into our country unchecked. There was an illegal protest inside of Trump Tower today, demanding the release of the Hamas terrorist affiliate Mahmoud Khalil. While they were being arrested, Secretary of State Marco Rubio explained to the brain dead Legacy/Mainstream media why Khalil's case isn't one of First Amendment rights. We play audio of Sen. Bernie Sander (D-VT) sounding like he's now onboard with the DOGE team. Then we realize, that was back in 2011. We wonder what's changed since then? EPA Secretary Lee Zeldin explains how rolling back so many onerous regulations will help all Americans, while CNN makes fools of themselves by choosing not to look things up before trying to “fact check” them. Rep. Tim “Sarah” McBride (D-DE) took to the lectern to address being called “Congressman” and went on a silly and ironic rant about culture wars and a wish for the GOP to work on bringing down costs and finding government efficiencies. So, on the heels of people living mentally unhinged, we turn to a man in Seattle who bought a Tesla, only to destroy it in an effort to hurt Elon Musk. Finally, we get work from a TikTok'er by the name of TheSouthernGal1 regarding “intelligence” after being mocked by someone for her accent. She nails it as any bright and intelligent woman could.  Please take a moment to rate and review the show and then share the episode on social media. You can find me on Facebook, X, Instagram, GETTR and TRUTH Social by searching for The Alan Sanders Show. And, consider becoming a sponsor of the show by visiting my Patreon page!!

AUTOSPORT web
ヒョンデWRC、2025年型i20 Nラリー1を公開。“コピー&ペースト”のカラーリングで3冠目指す

AUTOSPORT web

Play Episode Listen Later Jan 18, 2025 0:44


 1月18日、WRC世界ラリー選手権に参戦しているヒョンデ・シェル・モービスWRTが、最高峰クラスの“RC1”で走らせる2025年型ヒョンデi20 Nラリー1の新たなカラーリングを公開した。 『Ctrl C, Ctrl V』という言葉を添えて日の目を浴びた2025年型ヒョンデi20 Nラリー1は、2024年シーズンのカラーリングを全面的に踏襲したイメージデザインが施された。 投稿 ヒョンデWRC、2025年型i20 Nラリー1を公開。“コピー&ペースト”のカラーリングで3冠目指す は autosport web に最初に表示されました。

Sonkaszeletelő
Ctrl C, Ctrl V - Pogacar megint alkotott

Sonkaszeletelő

Play Episode Listen Later Oct 14, 2024 54:48


UNITEDcast
UNITEDcast #677 - COPIA MAS NÃO FAZ IGUAL (Animes que copiaram)

UNITEDcast

Play Episode Listen Later Jun 29, 2024 60:45


Olá pessoas do UNITEDcast, no episódio dessa semana nossos casters trouxeram uma lista de animes que fizeram CTRL C, CTRL V de outros. É plágio ou inspiração?   Participantes:  Ds, Ana, Kurt, Vitor, Wagner, Eric.   Edição: Ana Paula   Nos ajude a melhorar nosso cast respondendo ao questionário: https://forms.gle/egzXnbBee7zB8mYH8   Recrutamento da United: Aqui! – CANAL TELEGRAM: https://t.me/animeunitedbr – Mande seu Email: Email: podcast@animeunited.com.br – Apoie o UNITEDcast: Manda um PIX!!: podcast@animeunited.com.br Seja um FODEROSO do nosso Apoia-se: https://apoia.se/unitedcast Assista ao vivo no nosso Canal do Youtube! Compre na AMAZON pelo Nosso Link: https://amzn.to/2WjH5kM – Assine o UNITEDcast: Spotify: Segue a gente por lá! iTunes: Adiciona a gente lá! Google Podcasts: Assine Agora! – Links do Episódio: Twitch do DS: https://twitch.tv/dsunited Canal da Ana: https://www.youtube.com/c/CulturaAnime Grupo do Kurt https://www.facebook.com/groups/actionsecomics2 – Nos Siga: Twitter do DS: https://twitter.com/odaltonsilveira Instagram do DS: https://www.instagram.com/odaltonsilveira/ Fabebook da United: https://www.facebook.com/animeunitedoficial Twitter da United: https://twitter.com/animeunitedBR Instagram da United: https://www.instagram.com/animeunitedbr/

The Monkey Seat - Motorsport Podcast
EP 110 - CTRL-C CTRL-V

The Monkey Seat - Motorsport Podcast

Play Episode Listen Later Mar 6, 2024 42:50


This week on The Monkey Seat Karl tells us what he thinks happened in the race.   The guys discuss the usual talking points in the race as well as determining who were the Driver, and Dick of the day. You can follow the guys on twitter if you really are that bored @_skycloth and @tomhorroxf1   If you want to hear more from the guys in a slightly more professional manner, they both are regulars on the Grid Talk Podcast which is part of the F1 Chronicle.    Head to ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://f1chronicle.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠ for all the latest articles around Motorsport and head to ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://f1chronicle.com/formula-1-grid-talk-podcast/⁠⁠⁠⁠⁠⁠⁠⁠⁠ to head straight to the Eargasmn that is the Grid Talk Podcast, every race weekend directly after Qualifying and the Race to get up to the minute analysis on F1 Support us by going to ⁠⁠⁠⁠⁠⁠⁠⁠⁠www.monkeyseatpod.com⁠⁠⁠⁠⁠⁠⁠⁠⁠ and click on the "give us  a quid" link, or click here to see what support tiers are on offer:       ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://checkout.square.site/buy/7VCQ2JOA2Q4G3XPJWQNHXMTF⁠⁠⁠⁠⁠⁠⁠⁠⁠     Catch us on Spotify, Apple Music, Google Podcasts, Pocket Casts, YouTube, Anchor, Castbox, Radio Public, TuneIn, and Breaker by searching for Monkeyseat Podcast    or go to our website ⁠⁠⁠⁠⁠⁠⁠⁠⁠www.monkeyseatpod.com⁠⁠⁠⁠⁠⁠⁠⁠⁠ for direct links to the show. 

The Professional Magician
Chris Weed: The Competition Mindset

The Professional Magician

Play Episode Listen Later Feb 24, 2024 67:41


#111: If you want to succeed in this business long-term, You've got to listen to my guest, Christopher Weed. Chris amazes me. He runs multiple businesses successfully to the tune of severa millions of dollars in revenue. And he's always looking for and developing new ideas. I always feel like I'm sitting under a learning tree when Chris speaks. Enjoy this episode - I know I did!This week's episode of Trick Talk is dedicated to CTRL-C by Chris Rawlings.By the way…whenever you're ready, here are 5 ways I can help you grow your magic business to book more shows at higher fees: 1.    Grab my FREE business-building tools for professional working magicians. I'm offering SIX free resources to help you improve your online presence. From SEO strategies that almost NO magicians are using, to a social media strategy that can save you time and heartache, to valuable Google Ads strategies, these resources will help you book more shows at higher fees. Get your free copies HERE. 2.    Get my website video training for under $10. In this 2-hour video training, I'll reveal exactly what your website needs if you want to succeed as a professional entertainer in the 21st century. Get all the details HERE.  3.    Get a complete business-building plan handed to you on a silver platter. Not sure how to move your magic business forward? I'll analyze your complete magic business (website, market, competition, and more) and give you a complete game plan for getting your performing business to the next level. Find out how HERE. 4.    Work with me privately. Need help in multiple areas? I can help you with your website, direct mail, email, or other marketing strategies. I also offer consulting services for crafting magic routines or even entire shows. Want to find out more? Shoot me an email at cris@theprofessionalmagicianclubpro.com. 5.    Check out my extensive line of magic routines and marketing products I have several professional routines, including Serendipity, marketing courses, books, and other resources to boost your shows and make booking shows easier and more profitable. Check out my line of products HERE. 

MGoBlog: The MGoPodcast
Michigan HockeyCast 6.14: Just Like Football

MGoBlog: The MGoPodcast

Play Episode Listen Later Feb 6, 2024 63:40


1 hour and 3 minutes With David Nasternak and Alex Drain This Podcast Has a Sponsor: Michigan Law Grad Jonathan Paul is the guy with the C you want skating next to the ref and pleading your case. He's also a good guy to sit next to at the hockey games. Segment 1: Ctrl C, Ctrl V: Friday Opener Tyler's Statement See Saw Second Period Holding It Down Segment 2: Brand New Saturday Night Setting the Tone Bounce back and Extension Old Friends and Around the League Home and Not Joe MUSIC NHL on ESPN Theme "Soldier, Poet, King" -- The Oh Hellos Ice Hockey (NES) theme

Helserelatert
Nytt år, død katt og "det e itj plagiat, vi har brukt samme metode!"

Helserelatert

Play Episode Listen Later Feb 1, 2024 54:31


Vi starter det nye året med å snakke litt om nytt år og nye muligheter, en død katt og krig i verden, og ikke minst om ministere som er litt for glad i CTRL+C og CTRL+V Følg oss gjerne på sosiale medier: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Instagram⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Facebook⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Ny episode hver fredag!

MGoBlog: The MGoPodcast
Michigan HockeyCast 6.13: Badger Day

MGoBlog: The MGoPodcast

Play Episode Listen Later Jan 30, 2024 64:09


1 hour and 4 minutes With David Nasternak and Alex Drain This Podcast Has a Sponsor: Michigan Law Grad Jonathan Paul is the guy with the C you want skating next to the ref and pleading your case. He's also a good guy to sit next to at the hockey games. Segment 1: Ctrl C, Ctrl V: Friday Opener An Early Goal Building the Lead Finishing the Game Segment 2: Ctrl C, Ctrl V: Saturday Cocaine First Period Obtaining and Blowing Leads Old Friends and Around the League A Trip to Columbus MUSIC NHL on ESPN Theme "Welcome to Janesville" -- Smoking Popes Ice Hockey (NES) theme

AD7 Devocional
Ctrl-C y Ctrl-V | Devocional de Jóvenes | 18 de diciembre 2023

AD7 Devocional

Play Episode Listen Later Dec 18, 2023 3:35


Ctrl-C y Ctrl-V | Devocional de Jovenes | 18 de diciembre 2023 | AD7Devocional |Vosotros vinisteis a ser imitadores nuestros y del Señor, recibiendo la palabra en medio de gran tribulación, con el gozo que da el Espíritu Santo. 1 Tesalonicenses 1:6.----------------------------AUDIO usado con permiso de nuestros amigos:http://www.MatutinaAdventista.comBUSCA en Facebook el texto de la matutina:http://www.facebook.com/AD7Devocional/SIGUE en Instagram el post de la matutina y el versículo diario:http://www.instagram.com/AD7Devocional/VISITA nuestra pagina de internet:http://www.ad7devocional.comVISITA la pagina de internet de nuestros amigos:https://matutinaadventista.comhttps://www.facebook.com/matutinaadventista7SUSCRIBE a YouTube, comparte y ve nuestros videos:http://www.youtube.com/AD7DevocionalAutor: Victor M ArmenterosTitulo: Carácter - Ser Como Jesus y Disfrutar de la EternidadTitulo: Palpitando la eternidadGracias a Ti por escucharnos, un abrazo AD7… Hasta la próxima!

IVM Likes
Copy Paste in Bollywood | Pop Wrap!

IVM Likes

Play Episode Listen Later Jun 16, 2023 52:44


Bang bang, Phir Hera Pheri, Kaante, Koi Mil Gaya, Bheja Fry. No, these movie titles are not here just for the sake of SEO - All these movies and a lot more were 'inspired' by international films! in this episode of Pop Wrap, Snayhil, Antariksh & Abbas are talking about all the movies that our beloved bollywood CTRL + C and CTRL + V'd from foreign movies! Tune in!  Follow Snayhil on Instagram : https://instagram.com/snayhil Follow Abbas on Instagram: https://www.instagram.com/abbasmomin88/ Follow Antariksh on Instagram: https://instagram.com/antariksht Listen to Pop Wrap, Has It Aged Well? and Just A Filmy Game Show on the IVM Pop feed which is available across platforms.   The views, opinions, and statements expressed in the episodes of the shows hosted on the IVM Podcasts network are solely those of the individual participants, hosts, and guests, and do not necessarily reflect the official policy or position of IVM Podcasts or its management. IVM Podcasts does not endorse or assume responsibility for any content, claims, or representations made by the participants during the shows. This includes, but is not limited to, the accuracy, completeness, or reliability of any information provided. Any reliance you place on such information is strictly at your own risk. IVM Podcasts is not liable for any direct, indirect, consequential, or incidental damages arising out of or in connection with the use or dissemination of the content featured in the shows. Listener discretion is advised.   Spotify | Apple Podcasts | JioSaavn | Gaana | Amazon MusicSee omnystudio.com/listener for privacy information.

The FinTech Flo
FinTech Flo - Episode 4 (3/30/23)

The FinTech Flo

Play Episode Listen Later Mar 30, 2023 66:30


Accounting Guidance on Crypto, Banks Taking Heat, and TikTokWith FASB hard at work trying to get accounting standards up to date on crypto and NFTs, banks and VCs taking a lot of slack after the SVB collapse, and overall economic and geopolitical swings, Drew and Mike dissect what's gone on over the last couple weeks, while having some fun poking fun at work culture.  Hear about TikTok, guidance on accounting, and how we turned into a Ctrl+C; Ctrl+V world, on Episode 4 of the FinTech Flo, covering the second half of March 2023.Video Podcast available www.youtube.com/floqaststudios and CPE available on the Earmark CPE app.There's lots you can do in your career with an accounting background - we're hiring! Learn more at www.floqast.com/careers Want to watch? Head over to www.youtube.com/floqast Produced by @FloQastStudioshttps://www.instagram.com/floqaststudios https://www.twitter.com/floqaststudios

Hacker Public Radio
HPR3755: Synergy over ssh

Hacker Public Radio

Play Episode Listen Later Dec 23, 2022


In today's show we will talk about installing synergy so that you can control the keyboard and mouse of another computer securely over ssh. Install synergy on both computers as root # dnf install synergy # apt install synergy The main pc is pc_middle and it is the one with the keyboard and mouse we intend to use for all the computers. The only other pc in this configuration is, one on the right which we call pc_right On pc_middle create a configuration file. I put it in ~/etc/synergy-work.conf section: screens pc_middle: pc_right: end section: links pc_middle: right = pc_right pc_right: left = pc_middle end On pc_middle add entry to ~/.ssh/config to allow portforwarding back, for the synergy port 24800 Host pc_right Hostname 192.168.0.150 RemoteForward 127.0.0.1:24800 127.0.0.1:24800 # send back from the client to me On pc_middle run synergy server in the foreground with debug enabled [user@pc_middle ~]$ synergys --debug DEBUG --no-daemon --server --address 127.0.0.1 --config ~/etc/synergy-work.conf --name pc_middle --log /tmp/synergy-work.conf.log [2022-12-03T16:29:05] DEBUG: opening configuration "~/etc/synergy-work.conf" [2022-12-03T16:29:05] DEBUG: configuration read successfully [2022-12-03T16:29:05] DEBUG: XOpenDisplay(":0") [2022-12-03T16:29:05] DEBUG: xscreensaver window: 0x00c00001 [2022-12-03T16:29:05] DEBUG: screen shape: 0,0 5760x2160 (xinerama) [2022-12-03T16:29:05] DEBUG: window is 0x05e00004 [2022-12-03T16:29:05] DEBUG: adopting new buffer [2022-12-03T16:29:05] DEBUG: opened display [2022-12-03T16:29:05] WARNING: LANGUAGE_DEBUG Poll result 0 [2022-12-03T16:29:05] DEBUG: registered hotkey ScrollLock (id=ef14 mask=0000) as id=1 [2022-12-03T16:29:05] NOTE: started server, waiting for clients [2022-12-03T16:29:05] DEBUG: event queue is ready [2022-12-03T16:29:05] DEBUG: add pending events to buffer [2022-12-03T16:29:05] DEBUG: screen "pc_middle" shape changed On pc_middle you can check that it's running [user@pc_middle ~]$ netstat -anp | grep 24800 tcp 0 0 127.0.0.1:24800 0.0.0.0:* LISTEN 90859/synergys On pc_middle you can connect to pc_right [user@pc_middle ~]$ ssh pc_right user@pc_right:~$ On pc_right (either on its own keyboard, or via ssh session from pc_middle), check that port 24800 is listening user@pc_right:~$ netstat -anp | grep 24800 tcp 0 0 127.0.0.1:24800 0.0.0.0:* LISTEN On the other keyboard that is connected to the pc_right (see note below †) user@pc_right:~$ synergyc --debug INFO --no-daemon --name pc_right 127.0.0.1 [2022-12-03T16:38:59] NOTE: started client /build/synergy-3N7yN5/synergy-1.8.8-stable+dfsg.1/src/lib/synergy/ClientApp.cpp,404 [2022-12-03T16:38:59] NOTE: connecting to '127.0.0.1': 127.0.0.1:24800 /build/synergy-3N7yN5/synergy-1.8.8-stable+dfsg.1/src/lib/client/Client.cpp,146 [2022-12-03T16:38:59] NOTE: connected to server /build/synergy-3N7yN5/synergy-1.8.8-stable+dfsg.1/src/lib/synergy/ClientApp.cpp,294 Back on pc_middle, you should see the the log that you have connected [2022-12-03T16:40:15] DEBUG: Opening new socket: 18FC73A0 [2022-12-03T16:40:15] NOTE: accepted client connection [2022-12-03T16:40:16] DEBUG: received client "pc_right" info shape=0,0 5760x2160 at 2787,1371 [2022-12-03T16:40:16] NOTE: client "pc_right" has connected † Note: If you tried to run the client synergyc over the ssh connection on pc_middle it will connect, but the mouse will never move to the other screen. Now from the pc_middle, you should be able to move the mouse over to the pc_right screen. Now using the keyboard and mouse on the pc_middle, you should now be able to move the mouse and type on the pc_right screen. The logs on the pc_middle, should show you information about switching from one computer to the other. [2022-12-03T17:05:18] INFO: switch from "pc_middle" to "pc_right" at 0,225 [2022-12-03T17:05:18] INFO: leaving screen [2022-12-03T17:05:18] WARNING: LANGUAGE_DEBUG Poll result 0 [2022-12-03T17:05:18] DEBUG: open clipboard 0 [2022-12-03T17:05:18] DEBUG: ICCCM fill clipboard 0 [2022-12-03T17:05:18] DEBUG: available targets: text/plain (654), UTF8_STRING (445), STRING (31), TEXT (444) [2022-12-03T17:05:18] DEBUG: added format 0 for target UTF8_STRING (445) (8 bytes) [2022-12-03T17:05:18] DEBUG: close clipboard 0 [2022-12-03T17:05:18] INFO: screen "pc_middle" updated clipboard 0 [2022-12-03T17:05:18] DEBUG: open clipboard 1 [2022-12-03T17:05:18] DEBUG: ICCCM fill clipboard 1 [2022-12-03T17:05:18] DEBUG: available targets: text/plain (654), UTF8_STRING (445), STRING (31), TEXT (444), text/html (653) [2022-12-03T17:05:18] DEBUG: added format 1 for target text/html (653) (113 bytes) [2022-12-03T17:05:18] DEBUG: added format 0 for target UTF8_STRING (445) (5 bytes) [2022-12-03T17:05:18] DEBUG: close clipboard 1 [2022-12-03T17:05:18] INFO: screen "pc_middle" updated clipboard 1 [2022-12-03T17:05:18] DEBUG: sending clipboard 0 to "pc_right" [2022-12-03T17:05:18] DEBUG: sent clipboard size=20 [2022-12-03T17:05:18] DEBUG: sending clipboard 1 to "pc_right" [2022-12-03T17:05:18] DEBUG: sent clipboard size=138 [2022-12-03T17:05:19] INFO: switch from "pc_right" to "pc_middle" at 5757,583 [2022-12-03T17:05:19] INFO: entering screen [2022-12-03T17:05:19] DEBUG: send xscreensaver command: 582 0 0 Back on pc_right you can close the client by holding Control and pressing C, or Ctrl+C for short. The logs on the pc_middle, should show you that the client disconnected. [2022-12-03T16:40:18] NOTE: client "pc_right" has disconnected [2022-12-03T16:40:18] DEBUG: Closing socket: 18FC73A0 As we are running over ssh, there is no need to configure --enable-crypto but you can if you wish. Now that everything is working correctly you can make it easier to start. As we saw before (†) the client needs to be run from the physical X Session that you see on the second computer. On pc_right create a new bash script file eg: nano ~/bin/start-synergy-client.bash #!/bin/bash killall synergyc sleep 2 synergyc --name pc_right 127.0.0.1 exit 0 Still on pc_right allow the file to be executable chmod +x ~/bin/start-synergy-client.bash Still on pc_right and in the session you wish to control, run start-synergy-client.bash I find it easiest to just run this in a shell once I login on pc_right, but you could configure it to run automatically once you log in. Back on pc_middle, create a new bash script file eg: nano ~/bin/start-synergy-server.bash #!/bin/bash server_name=synergys # may also be synergy-core killall "${server_name}" ${server_name} --server --address 127.0.0.1 --config ~/etc/synergy-work.conf --name pc_middle --log /tmp/synergy-work.conf.log setxkbmap -option "compose:ralt" setxkbmap -option "ctrl:nocaps" ssh pc_right Still on pc_middle allow the file to be executable chmod +x ~/bin/start-synergy-server.bash Still on pc_middle you can run the command start-synergy-server.bash and it will open a ssh shell to pc_right. Over that connection pc_right can send back commands to the server. A side note about the special address 127.0.0.1. It's often referred to as loopback, home, or localhost and is usually defined in /etc/hosts The address is used by programs running on a given computer to communicate with other programs running on the same computer. https://en.wikipedia.org/wiki/Localhost IPv4 network standards reserve the entire address block 127.0.0.0/8 (more than 16 million addresses) for loopback purposes. If you are confused, then just think of it like you when your boss says "I'm going home now, you should also go home." It's clear that they mean "I'm going to my home now, and you should also go to your home." So the address 127.0.0.1 on pc_middle is only available on pc_middle, and equally the address 127.0.0.1 on pc_right is only available on pc_right. The server is listening on its loopback address 127.0.0.1 on pc_middle, while the client is listening on its loopback address 127.0.0.1 on pc_right It is the RemoteForward configuration that creates a ssh tunnel that is doing the heavy lifting. RemoteForward 127.0.0.1:24800 127.0.0.1:24800 It tells the Remote (in this case pc_right ) to listen to the port 24800 its loopback address. This is where the client on pc_right will be talking to. The ssh connection will then Forward any packets back to the other side (in this case pc_middle ) And to send to the port 24800 its loopback address. And on that address the server is listening.

BSD Now
469: Ctrl-C Reset

BSD Now

Play Episode Listen Later Aug 25, 2022 42:30


FreeBSD Q2 2022 Status Report, FreeBSD in Science, fastest yes(1) in the west, Why Programmers Can't "Reset" Programs With Ctrl-C, Run Slack in FreeBSD's Linuxulator, and more. NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines FreeBSD Q2 2022 Status Report (https://www.freebsd.org/status/report-2022-04-2022-06/) FreeBSD in Science (https://freebsdfoundation.org/blog/guest-post-freebsd-in-science/) News Roundup Fastest yes(1) in the west (https://codegolf.stackexchange.com/questions/199528/fastest-yes-in-the-west/199622#199622) Ctrl-C: Why Programmers Can't "Reset" Programs With Ctrl-C, but Used to Be Able To, and Why They Should Be Able to Again (https://kevinlawler.com/ctrl-c) Run Slack in FreeBSD's Linuxulator (https://meka.rs/blog/2022/07/01/freebsd-linuxulator/) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) ***

Grey Sector: A Babylon 5 Podcast

This week, we review a season one episode of Babylon 5 that's so good, they forgot to include it in the series. It's the movie Tron, with Bruce Boxleitner! Sarah wonders whether this movie might be better if you just watched it on mute, Joe asserts that nothing says Alpha Nerd better than a klaatu barada nikto poster, while Mike can't figure out why the master controller doesn't just hit Ctrl+C, Ctrl+V several billion times. Spoiler-free discussion: 0:00:00 - 0:48:20Spoiler Zone: 0:48:20 - 0:51:10Next Episode and other Shenanigans: 051:10Music from this episode:"Surf Punk Rock" By absentrealities is licensed under CC-BY 3.0"Please Define The Error" By Delta Centauri is licensed under CC-BY 3.0"The Haunted McMansion" By Megabit Melodies is licensed under CC-BY 3.0"Crotch Magic" By Bonecage is licensed under CC-BY 3.0

Penguin Magic Podcast
Nick Locapo & Erik Tait - The Penguins At The Magic Castle -S3E37

Penguin Magic Podcast

Play Episode Listen Later Jun 30, 2022 42:23


Nick Locapo and Erik Tait discuss their recent shows at The Magic Castle, and they discuss the State Of The Penguin. It's a discussion of the latest tricks such as Ctrl-C, Brain Child, Flip Balm, Boom Box, and more. The show is brought to you by the featured product of the week from Adrian Vega. Plus, you'll hear stories about The Magic Castle, Nick & Erik's Castle Lecture, and what it's like to perform at The Mystique Dining Lounge.____Brain Child by Kyle Purnell: https://www.penguinmagic.com/p/17166CTRL-C by Chris Rawlins: https://www.penguinmagic.com/p/17099Boom Box by Andrew Neiner: https://www.penguinmagic.com/p/17318Flip Balm by Seth Race: https://www.penguinmagic.com/p/17406Chop by Craig Petty: penguinmagic.com/p/17010Screwed Card by Adrian Vega: https://www.penguinmagic.com/p/8654

The Damage Report with John Iadarola

Ketanji Brown Jackson Receives Enough Pledged Support To Confirm Nomination. GOP Attacks on KBJ Backfire. Lindsey Graham Says Jackson Wouldn't Receive A Hearing In GOP Senate. Biden's Approval Rating Continues To Fall. Right Wing Ghouls Praise Elon Musk for Buying Huge Twitter Stake. New Amazon Worker Chat App Would Ban Words Like “Union” & “Restrooms”. Tulsi Gabbard Backs Florida's Don't Say Gay Bill. Lauren Boebert Compares Endangered Bird To Trans Athletes. Passenger Arrested For Masturbating Multiple Times On Southwest Flight. Trump's Truth Social Has Embarrassing Start. Meanwhile in Germany, Nigeria, Shanghai, and India.Co-Host: Dan Evans (@Danfromtheweb)Guest: John Haltiwanger (@jchaltiwanger)Become a TDR YouTube Member: http://www.youtube.com/thedamagereport/join Follow The Damage Report on Facebook: https://www.facebook.com/TheDamageReportTYT/Help build the Home of the Progressives http://tyt.com/JOINSubscribe to The Damage Report YouTube channel: https://www.youtube.com/thedamagereport?sub_confirmation=1Follow The Damage Report on TikTok: https://www.tiktok.com/@thedamagereport?lang=enFollow The Damage Report on Instagram: http://www.instagram.com/thedamagereport/ Follow The Damage Report on Twitter: https://twitter.com/TheDamageReport Lauren Boebert BEEFS With Birds?! - https://youtu.be/vmH0ANKivkEGOP Senate Gets Smacked After Ketanji Attacks - https://youtu.be/-42lNL8gY6EElon Musk Wants to Take Over Twitter. Here is Why That Should Terrify You: - https://youtu.be/0PUPtq92Y4gTulsi Gabbard Takes 'Don't Say Gay' To The Next Level - https://youtu.be/IsAaJAJddpICreepy ROBODOGS Enforce Lockdown in China - https://youtu.be/-Ms9keJw6kk See acast.com/privacy for privacy and opt-out information.

You Know What I Mean?
#78: CTRL-C/CTRL-V

You Know What I Mean?

Play Episode Listen Later Feb 4, 2022 54:55


You know what they say, imitation is the greatest form of flattery. And it is, in a way. Inspiration is found everywhere and social media has made it so easy to be inspired. Whether it's other artists or even just content you see on people's platforms, it's a great way to stay on top of trends and follow what you like. But it also gets complicated when the line between inspiration and imitation start to blur. And while it can be flattering, it can also be dangerous. On this week's episode, Nadine and Tarini discuss everything from making money from “inspired” content all the way to the danger of copying of queer/ racialized/ creators from historically marginalized communities' work. Once again, they blame it on #capitalism (their favourite perpetrator) - but in the (social media) world in which we operate, we all have a responsibility to do better and be better. Listen wherever you steam your podcasts, watch on YouTube at You Know What I Mean? Podcast, and follow on Instagram @ykwim.pod.

The L0WL1F3 Podcast
48_L0WL1F3_astropunk_and_the_primates-(ctrl-c)

The L0WL1F3 Podcast

Play Episode Listen Later Dec 10, 2021 155:17


This week, Shadowlink gets us up to date on some recent releases, and Scum can't even. CoinOps is there, too.Hit us up here: patreon.com/neondystopia https://twitter.com/neondystopia https://twitter.com/L0wl1f3The https://www.neondystopia.com/ https://mixlr.com/coinops-mcgillicutty https://discord.gg/M6fGZERb7Z

RedEye Design
Episode 043: "i" or "ctrl+c"?

RedEye Design

Play Episode Listen Later Nov 9, 2021 120:40


Alex has an epiphany, PK needs to stop reading the news, and we talk about new laptops (and are back after a month!) Show Notes Main Topics Apple's Macs AnandTech Macbook Pro Chip Performance 12TB Harddrive Cool $hit Bartender 4 Decoder with Nilay Patel About Us Alex Huffaker (Twitter, Instagram) Pradyuman Kodavatiganti (Twitter, Instagram) Luis Lancaster (Instagram)

APC Presents
14 | Never Stop Conquering, "Being Different is BETTER than Being Better"

APC Presents

Play Episode Listen Later Oct 20, 2021 27:55 Transcription Available


We're pulling a great interview from Tina Schulke's feed this week. She talked to David Brier, Google's #1 rebranding expert, about being different versus being better.Be sure to follow and review Never Stop Conquering so Tina actually takes it out of hiatus!Here's a CTRL+C of the show notes for the Never Stop Conquering episode...Why will being different power your growth FASTER and HIGHER than being better?Tina's Guest, David Brier explains.David is Google's #1 Rebranding Expert, Slayer of the Mundane, Liberator of Awesome, Advisor to CEOs, Author of Amazon's Branding Bestseller “BRAND INTERVENTION," Responsible for $1B in sales, and an AMAZING Keynote Speaker.This is a high-energy conversation. You'll hear about some things Tina did not get right at first. You will hear some "adult moments" (colorful language). Most importantly you will hear and learn what to do to make your "being different" rock!We have some awesome extras that accompany this episode. Find them in our Never Stop Conquering Facebook Group PageFind more of David's work at www.risingabovethenoise.com and follow him on LinkedIn for inspiration daily!--Join the Appleton Podcast Co-opStart a podcast, win free gear! Learn more Review APC Presents on Podchaser

Trust The Process
TRUST THE PROCESS Season 3, Ep.26: Ctrl+C / Ctrl+V

Trust The Process

Play Episode Listen Later Jul 17, 2021 137:59


An eventful week! Jim Benning is kicking tires and trying to move out money, Alex Edler is gonna test the Free Agent market and the Abbotsford AHL team has its branding! We talk all about that, as well as Damian Lillard's trade request, Ben Simmons being shopped, Suns/Bucks finals, early George Clooney roles, Canucks as members of the X-Men, more #TTPmisery index, your questions from Twitter and a very special Simpson's trivia challenge pitting The Bow against Cody Severtson from the Creasecast!

Ctrl+C
Coming 2 America (2021)

Ctrl+C

Play Episode Listen Later Jun 7, 2021 43:51


This week we're hitting you with that one-two punch. We started out reviewing the Coming to America sequel, but ended up reviewing both movies in the process. Join us as we dig in to the classic comedy and its sequel. https://bit.ly/2xL9g0b Ctrl+C is on all of your favorite podcast platforms.  Check us out by searching for Ctrl+C or you can head over to our website.  All episodes are available now. #podcast #geek #geekendcast #geekend #nerd #ctrlc #ctrlcpodcast #moviereviews #movies #podcasts #podcasting #promo #promotion #comedy #podernfamily #moviepodsquad #quarantine #coronavirus #comingtoamerica #coming2america #eddiemurphy #arseniohall #sequel #amazonprime #amazonprimemovie

Ctrl+C
Front of the Class 2008

Ctrl+C

Play Episode Listen Later May 24, 2021 33:48


Get ready for your hearts to be warmed and toasty this week. We watched Front of the Class, a movie inspired by the life of an educator who also happens to have Tourette's. Join us as we discuss this inspirational movie. https://bit.ly/2xL9g0b Ctrl+C is on all of your favorite podcast platforms.  Check us out by searching for Ctrl+C or you can head over to our website.  All episodes are available now. #podcast #geek #geekendcast #geekend #nerd #ctrlc #ctrlcpodcast #moviereviews #movies #podcasts #podcasting #promo #promotion #comedy #podernfamily #moviepodsquad #selfisolation #quarantine #coronavirus #tourettessyndrome #education #truelife #lifetimeoriginal #truestory 

Ctrl+C
Finding 'Ohana 2021

Ctrl+C

Play Episode Listen Later May 17, 2021 36:09


It's time for an adventure! It's a movie we're calling the Hawaiian Goonies, Finding Ohana follows a group of kids as they try to save the family home. Saving the day gets a gorgeous new setting in this family friendly film. https://bit.ly/2xL9g0b Ctrl+C is on all of your favorite podcast platforms.  Check us out by searching for Ctrl+C or you can head over to our website.  All episodes are available now.  #podcast #geek #geekendcast #geekend #nerd #ctrlc #ctrlcpodcast #moviereviews #movies #podcasts #podcasting #promo #promotion #comedy #podernfamily #moviepodsquad #selfisolation #quarantine #coronavirus #findingohana #netflix #familyfilm #hawaii #hawaiian #adventure #goonies #heyyouguys 

saving ohana ctrl c finding ohana
Ctrl+C
Mystic River 2003

Ctrl+C

Play Episode Listen Later Apr 27, 2021 43:12


This week we're diving deep into the drama of Mystic River. This intense 2003 Oscar nominated film explores the lives of three friends against the backdrop of tragedy.https://bit.ly/2xL9g0b Ctrl+C is on all of your favorite podcast platforms.  Check us out by searching for Ctrl+C or you can head over to our website.  All episodes are available now. #podcast #geek #geekendcast #geekend #nerd #ctrlc #ctrlcpodcast #moviereviews #movies #podcasts #podcasting #promo #promotion #comedy #podernfamily #moviepodsquad #selfisolation #quarantine #coronavirus #mysticriver #boston #oscars #oscarnominated #seanpenn #kevinbacon 

F* It!
92 Three Questions You Should Be Asking Yourself

F* It!

Play Episode Listen Later Apr 22, 2021 4:40


Three Questions You Should Be Asking Yourself:Who am I spending most of my time with?What am I consuming during the majority of my spare time?Do these things/people serve me in helping me to reach my goals and dreams? If you enjoyed this episode, make sure and give us a five star rating  and leave us a review on iTunes, Podcast Addict, Podchaser and Castbox. Sign up for the next DAC Bootcamp Follow me on Social Media:Amy on IGAmy on Facebook Resources:AmyLedin.comLean Bodies Consulting (LBC)LBC University 

Ctrl+C
Wonder Woman 1984 (2020)

Ctrl+C

Play Episode Listen Later Apr 12, 2021 51:59


We're reviewing the much discussed Wonder Woman 1984 this week. It's not without flaw but we managed to find the good in it. https://bit.ly/2xL9g0b Ctrl+C is on all of your favorite podcast platforms.  Check us out by searching for Ctrl+C or you can head over to our website.  All episodes are available now. #podcast #geek #geekendcast #geekend #nerd #ctrlc #ctrlcpodcast #moviereviews #movies #podcasts #podcasting #promo #promotion #comedy #podernfamily #moviepodsquad #selfisolation #quarantine #coronavirus #wonderwoman #ww1984 #dccomics #justiceleague #zacsnyder

Ctrl+C
Terminator: Dark Fate (2019)

Ctrl+C

Play Episode Listen Later Mar 29, 2021 40:15


This week we're taking a dive into the revitalized Terminator franchise with Dark Fate. After all this time, and all these timelines; will we find it to have been, well...worth our time? https://bit.ly/2xL9g0b Ctrl+C is on all of your favorite podcast platforms.  Check us out by searching for Ctrl+C or you can head over to our website.  All episodes are available now. #podcast #geek #geekendcast #geekend #nerd #ctrlc #ctrlcpodcast #moviereviews #movies #podcasts #podcasting #promo #promotion #comedy #podernfamily #moviepodsquad #selfisolation #quarantine #coronavirus #terminator #terminatordarkfate #sarahconner 

Ctrl+C
Captain Ron 1992

Ctrl+C

Play Episode Listen Later Mar 15, 2021 37:53


Fresh off our Weekend with Bernie, we're hopping on a boat with Captain Ron. This vacation gone wrong tale of sailing the Caribbean with Kurt Russell is a definite classic.  Come sail away with us! https://bit.ly/2xL9g0b Ctrl+C is on all of your favorite podcast platforms.  Check us out by searching for Ctrl+C or you can head over to our website.  All episodes are available now.  #podcast #geek #geekendcast #geekend #nerd #ctrlc #ctrlcpodcast #moviereviews #movies #podcasts #podcasting #promo #promotion #comedy #podernfamily #moviepodsquad #selfisolation #quarantine #coronavirus #captainron #cultclassic #nostalgia #80smovie #kurtrussell #martinshort #caribbean

Ctrl+C
Weekend at Bernie's 1989

Ctrl+C

Play Episode Listen Later Mar 1, 2021 35:39


The party's never over when you're with us! We spent this Weekend with Bernie and things did NOT go according to plan. Hitmen, romance, and the beach! Who wouldn't want to take a trip to the shore to watch this cult classic. https://bit.ly/2xL9g0b Ctrl+C is on all of your favorite podcast platforms.  Check us out by searching for Ctrl+C or you can head over to our website.  All episodes are available now. #podcast #geek #geekendcast #geekend #nerd #ctrlc #ctrlcpodcast #moviereviews #movies #podcasts #podcasting #promo #promotion #comedy #podernfamily #moviepodsquad #selfisolation #quarantine #coronavirus #weekendatbernies #cultclassic #nostalgia #80smovie 

Ctrl+C
Enola Holmes 2020

Ctrl+C

Play Episode Listen Later Feb 15, 2021 34:32


It's time for the mystery of the missing mother. This week we watched the Netflix movie Enola Holmes based on the book series of the same name. https://bit.ly/2xL9g0b Ctrl+C is on all of your favorite podcast platforms.  Check us out by searching for Ctrl+C or you can head over to our website.  All episodes are available now. #podcast #geek #geekendcast #geekend #nerd #ctrlc #ctrlcpodcast #moviereviews #movies #podcasts #podcasting #promo #promotion #comedy #podernfamily #moviepodsquad #selfisolation #quarantine #coronavirus #enolaholmes #milliebobbiebrown #henrycavill #sherlock #sherlockholmes #adventuretime #mystery #netflix

Ctrl+C
Get Duked 2019

Ctrl+C

Play Episode Listen Later Feb 1, 2021 33:07


This week we watching the absolutely ridiculous movie Get Duked. It's a hilarious, trippy, murderous romp that could only have come from across the pond.  https://bit.ly/2xL9g0b Ctrl+C is on all of your favorite podcast platforms.  Check us out by searching for Ctrl+C or you can head over to our website.  All episodes are available now. #podcast #geek #geekendcast #geekend #nerd #ctrlc #ctrlcpodcast #moviereviews #movies #podcasts #podcasting #promo #promotion #comedy #podernfamily #moviepodsquad #selfisolation #quarantine #coronavirus #getduked #bridgerton #scotland

Ctrl+C
The Devil All the Time (2020)

Ctrl+C

Play Episode Listen Later Jan 18, 2021 54:56


It's going to be a weird week here in the US, so we figured, let's watch a weird movie! This week it's The Devil All the Time. Something needs to distract you, may as well be us and this movie.https://bit.ly/2xL9g0bCtrl+C is on all of your favorite podcast platforms.  Check us out by searching for Ctrl+C or you can head over to our website.  All episodes are available now. #podcast #geek #geekendcast #geekend #nerd #ctrlc #ctrlcpodcast #moviereviews #movies #podcasts #podcasting #promo #promotion #comedy #podernfamily #moviepodsquad #selfisolation #quarantine #coronavirus #netflix #netflixoriginalfilm #thedevilallthetime #tomholland #robertpattinson

Ctrl+C
The Road Within

Ctrl+C

Play Episode Listen Later Jan 4, 2021 33:07


New year, New You! We're going on a journey of self discovery this week with the Road Within. This movie explores the psyche through the eyes of three young people as they struggle with their emotional needs. https://bit.ly/2xL9g0b Ctrl+C is on all of your favorite podcast platforms.  Check us out by searching for Ctrl+C or you can head over to our website.  All episodes are available now. #podcast #geek #geekendcast #geekend #nerd #ctrlc #ctrlcpodcast #moviereviews #movies #podcasts #podcasting #promo #promotion #comedy #podernfamily #moviepodsquad #selfisolation #quarantine #coronavirus #theroadwithin #devpatel #zoekravitz #umbrellaacademy #robertsheehan #newyearnewyou #happynewyear

MOUTH OFF
The Ghost of Room 216 (Part 2) - Feat. Nick Haddock

MOUTH OFF

Play Episode Listen Later Jan 1, 2021 103:16


It's a "Part 2" so whatever the last episode's description was, Ctrl C, Ctrl V. --- Support this podcast: https://podcasters.spotify.com/pod/show/mouth-off/support

Ctrl+C
Noelle 2019

Ctrl+C

Play Episode Listen Later Dec 21, 2020 33:29


You bring the candy and we'll bring the popcorn. Settle it for our annual double holiday feature. Two episode for your listening enjoyment is our present to you. We reviewed Holidate and Noelle this year. Happy Holidays from our family to yours!https://bit.ly/2xL9g0b Ctrl+C is on all of your favorite podcast platforms.  Check us out by searching for Ctrl+C or you can head over to our website.  All episodes are available now.  #podcast #geek #geekendcast #geekend #nerd #ctrlc #ctrlcpodcast #moviereviews #movies #podcasts #podcasting #promo #promotion #comedy #podernfamily #moviepodsquad #selfisolation #quarantine #coronavirus #disney #disneyplus #noelle #holidate #netflix #holidaymovie

Ctrl+C
Holidate 2020

Ctrl+C

Play Episode Listen Later Dec 21, 2020 55:19


You bring the candy and we'll bring the popcorn. Settle it for our annual double holiday feature. Two episode for your listening enjoyment is our present to you. We reviewed Holidate and Noelle this year. Happy Holidays from our family to yours! https://bit.ly/2xL9g0b Ctrl+C is on all of your favorite podcast platforms.  Check us out by searching for Ctrl+C or you can head over to our website.  All episodes are available now.#podcast #geek #geekendcast #geekend #nerd #ctrlc #ctrlcpodcast #moviereviews #movies #podcasts #podcasting #promo #promotion #comedy #podernfamily #moviepodsquad #selfisolation #quarantine #coronavirus #disney #disneyplus #noelle #holidate #netflix #holidaymovie

Ctrl+C
Hamilton 2020

Ctrl+C

Play Episode Listen Later Nov 30, 2020 39:00


We're back this week, stuffed full from the holiday with some musical love. We devoured Hamilton and are gorging ourselves in the soundtrack. If you have somehow avoided watching the musical, we'll be sending King George your way.  https://bit.ly/2xL9g0b Ctrl+C is on all of your favorite podcast platforms.  Check us out by searching for Ctrl+C or you can head over to our website.  All episodes are available now.  #podcast #geek #geekendcast #geekend #nerd #ctrlc #ctrlcpodcast #moviereviews #movies #podcasts #podcasting #promo #promotion #comedy #podernfamily #moviepodsquad #selfisolation #quarantine #coronavirus #hamilton #kinggeorge #linmanuelmiranda #disney #disneyplus #musical #theater

Ctrl+C
Radioactive 2019

Ctrl+C

Play Episode Listen Later Nov 16, 2020 33:07


Join us this week as we take  look at life of Madame Curie and her discovery of Radium through this Amazon Original. Will we give it a glowing review? or will it give us radiation poisoning? Will one of us totally nerd out and the rest not care? tune in to find out! https://bit.ly/2xL9g0b Ctrl+C is on all of your favorite podcast platforms.  Check us out by searching for Ctrl+C or you can head over to our website.  All episodes are available now. #podcast #geek #geekendcast #geekend #nerd #ctrlc #ctrlcpodcast #moviereviews #movies #podcasts #podcasting #promo #promotion #comedy #podernfamily #moviepodsquad #selfisolation #quarantine #coronavirus #crawl #radiation #radioactive #amazon #madamcurie

Ctrl+C
Crawl 2019

Ctrl+C

Play Episode Listen Later Nov 2, 2020 38:20


What better way to start off election week, than with a disaster movie? This week we're tearing apart the Gator vs. Swimmer vs. Hurricane movie Crawl. Join us as we try to avoid the rest of the internet for a few days. https://bit.ly/2xL9g0b Ctrl+C is on all of your favorite podcast platforms.  Check us out by searching for Ctrl+C or you can head over to our website.  All episodes are available now. #podcast #geek #geekendcast #geekend #nerd #ctrlc #ctrlcpodcast #moviereviews #movies #podcasts #podcasting #promo #promotion #comedy #podernfamily #moviepodsquad #selfisolation #quarantine #coronavirus #crawl #hurricane #gators #election #vote

Ctrl+C
The Guest (2014)

Ctrl+C

Play Episode Listen Later Oct 19, 2020 47:42


Be our guest this week for our fourth anniversary and 200th episode! This week's episode is all about us and the bonkers movie the Guest, starring Dan Stevens. A big THANK YOU to all of you who have stuck with us so far! We hope you've enjoyed listening as much as we've enjoyed making the show.https://bit.ly/2xL9g0b Ctrl+C is on all of your favorite podcast platforms.  Check us out by searching for Ctrl+C or you can head over to our website.  All episodes are available now.  #podcast #geek #geekendcast #geekend #nerd #ctrlc #ctrlcpodcast #moviereviews #movies #podcasts #podcasting #promo #promotion #comedy #podernfamily #moviepodsquad #selfisolation #quarantine #coronavirus #theguest #beourguest #danstevens #beautyandthebeast #indiefilm #anniversary

Ctrl+C
Good Boys (2019)

Ctrl+C

Play Episode Listen Later Oct 5, 2020 50:10


Good Boys is another in a long line of movies that pit our “heroes” against ridiculous circumstances. This movie is filled with over the top shenanigans as told from the perspective of three middle school kids. It has the makings of a new classic. https://bit.ly/2xL9g0b Ctrl+C is on all of your favorite podcast platforms.  Check us out by searching for Ctrl+C or you can head over to our website.  All episodes are available now. #podcast #geek #geekendcast #geekend #nerd #ctrlc #ctrlcpodcast #moviereviews #movies #podcasts #podcasting #promo #promotion #comedy #podernfamily #moviepodsquad #selfisolation #quarantine #coronavirus #goodboysmovie

Ctrl+C
Troop Zero 2019

Ctrl+C

Play Episode Listen Later Sep 21, 2020 33:07


If movies about a group of misfit kids overcoming stacked odds is what you're into, you might just like Troop Zero.  This movie is a perfect blend of humor and heart. While there are other movies like it, it is definitely unique.  https://bit.ly/2xL9g0b Ctrl+C is on all of your favorite podcast platforms.  Check us out by searching for Ctrl+C or you can head over to our website.  All episodes are available now.  #podcast #geek #geekendcast #geekend #nerd #ctrlc #ctrlcpodcast #moviereviews #movies #podcasts #podcasting #promo #promotion #comedy #podernfamily #moviepodsquad #selfisolation #quarantine #coronavirus #troopzero #zerotohero #amazonoriginal #spacethefinalfrontier

Ctrl+C
Yesterday 2019

Ctrl+C

Play Episode Listen Later Sep 7, 2020 35:01


This week we're dealing in “what ifs”.  What if you were the only person in the world who remembered that the Beatles existed? The film Yesterday explores what one struggling musician would do with that knowledge. Plus, you know we love the Beatles.https://bit.ly/2xL9g0b Ctrl+C is on all of your favorite podcast platforms.  Check us out by searching for Ctrl+C or you can head over to our website.  All episodes are available now. #podcast #geek #geekendcast #geekend #nerd #ctrlc #ctrlcpodcast #moviereviews #movies #podcasts #podcasting #promo #promotion #comedy #podernfamily #moviepodsquad #selfisolation #quarantine #coronavirus #beatles #yesterday #letitbe #johnlennon #paulmccartney #musical

Ctrl+C
Harley Quinn: Birds of Prey

Ctrl+C

Play Episode Listen Later Aug 24, 2020 33:07


Get ready for an action packed romp of mayhem and general female badassery. This week we watched Birds of Prey and found ourselves pleasantly surprised. https://bit.ly/2xL9g0b Ctrl+C is on all of your favorite podcast platforms. Check us out by searching for Ctrl+C or you can head over to our website. All episodes are available now. #podcast #geek #geekendcast #geekend #nerd #ctrlc #ctrlcpodcast #moviereviews #movies #podcasts #podcasting #promo #promotion #comedy #podernfamily #moviepodsquad #selfisolation #quarantine #coronavirus #suicidesquad #harleyquinn #birdsofprey #dcfandome #dccomics

The Gentlemen's Delegation
Episode 16 - The No Cap Episode

The Gentlemen's Delegation

Play Episode Listen Later May 10, 2019 51:12


We are 60 days into 2019. So pour a glass of your favorite brown, sit back and relax with the Gentlemen's Delegation as we discuss things that should have been left in 2018. #WeGottaDoBetter P.S. I had a joke, but SOMEBODY doesn't know how to CTRL+C so now I gotta try to remember my whole intro.... sigh.... This is why we can't have nice things!.... Enjoy... Follow Us on Social Media! The Gentlemen's Delegation IG: thegentlemensdelegation "Que" IG: mr_nomoreday1s "Tez" IG: theforgedgentleman --- Support this podcast: https://anchor.fm/the-gentlemens-delegation/support

BSD Now
213: The French CONnection

BSD Now

Play Episode Listen Later Sep 27, 2017 91:00


We recap EuroBSDcon in Paris, tell the story behind a pf PR, and show you how to do screencasting with OpenBSD. This episode was brought to you by Headlines Recap of EuroBSDcon 2017 in Paris, France (https://2017.eurobsdcon.org) EuroBSDcon was held in Paris, France this year, which drew record numbers this year. With over 300 attendees, it was the largest BSD event I have ever attended, and I was encouraged by the higher than expected number of first time attendees. The FreeBSD Foundation held a board meeting on Wednesday afternoon with the members who were in Paris. Topics included future conferences (including a conference kit we can mail to people who want to represent FreeBSD) and planning for next year. The FreeBSD Devsummit started on Thursday at the beautiful Mozilla Office in Paris. After registering and picking up our conference bag, everyone gathered for a morning coffee with lots of handshaking and greeting. We then gathered in the next room which had a podium with microphone, screens as well as tables and chairs. After developers sat down, Benedict opened the devsummit with a small quiz about France for developers to win a Mogics Power Bagel (https://www.mogics.com/?page_id=3824). 45 developers participated and DES won the item in the end. After introductions and collecting topics of interest from everyone, we started with the Work in Progress (WIP) session. The WIP session had different people present a topic they are working on in 7 minute timeslots. Topics ranged from FreeBSD Forwarding Performance, fast booting options, and a GELI patch under review to attach multiple providers. See their slides on the FreeBSD wiki (https://wiki.freebsd.org/DevSummit/201709). After lunch, the FreeBSD Foundation gave a general update on staff and funding, as well as a more focused presentation about our partnership with Intel. People were interested to hear what was done so far and asked a few questions to the Intel representative Glenn Weinberg. After lunch, developers worked quietly on their own projects. The mic remained open and occasionally, people would step forward and gave a short talk without slides or motivated a discussion of common interest. The day concluded with a dinner at a nice restaurant in Paris, which allowed to continue the discussions of the day. The second day of the devsummit began with a talk about the CAM-based SDIO stack by Ilya Bakulin. His work would allow access to wifi cards/modules on embedded boards like the Raspberry Pi Zero W and similar devices as many of these are using SDIO for data transfers. Next up was a discussion and Q&A session with the FreeBSD core team members who were there (missing only Benno Rice, Kris Moore, John Baldwin, and Baptiste Daroussin, the latter being busy with conference preparations). The new FCP (FreeBSD community proposals) were introduced for those who were not at BSDCan this year and the hows and whys about it. Allan and I were asked to describe our experiences as new members of core and we encouraged people to run for core when the next election happens. After a short break, Scott Long gave an overview of the work that's been started on NUMA (Non-Uniform Memory Architecture), what the goals of the project are and who is working on it. Before lunch, Christian Schwarz presented his work on zrepl, a new ZFS replication solution he developed using Go. This sparked interest in developers, a port was started (https://reviews.freebsd.org/D12462) and people suggested to Christian that he should submit his talk to AsiaBSDcon and BSDCan next year. Benedict had to leave before lunch was done to teach his Ansible tutorial (which was well attended) at the conference venue. There were organized dinners, for those two nights, quite a feat of organization to fit over 100 people into a restaurant and serve them quickly. On Saturday, there was a social event, a river cruise down the Seine. This took the form of a ‘standing' dinner, with a wide selection of appetizer type dishes, designed to get people to walk around and converse with many different people, rather than sit at a table with the same 6-8 people. I talked to a much larger group of people than I had managed to at the other dinners. I like having both dinner formats. We would also like to thank all of the BSDNow viewers who attended the conference and made the point of introducing themselves to us. It was nice to meet you all. The recordings of the live video stream from the conference are available immediately, so you can watch the raw versions of the talks now: Auditorium Keynote 1: Software Development in the Age of Heroes (https://youtu.be/4iR8g9-39LM?t=179) by Thomas Pornin (https://twitter.com/BearSSLnews) Tuning FreeBSD for routing and firewalling (https://youtu.be/4iR8g9-39LM?t=1660) by Olivier Cochard-Labbé (https://twitter.com/ocochardlabbe) My BSD sucks less than yours, Act I (https://youtu.be/4iR8g9-39LM?t=7040) by Antoine Jacoutot (https://twitter.com/ajacoutot) and Baptiste Daroussin (https://twitter.com/_bapt_) My BSD sucks less than yours, Act II (https://youtu.be/4iR8g9-39LM?t=14254) by Antoine Jacoutot (https://twitter.com/ajacoutot) and Baptiste Daroussin (https://twitter.com/_bapt_) Reproducible builds on NetBSD (https://youtu.be/4iR8g9-39LM?t=23351) by Christos Zoulas Your scheduler is not the problem (https://youtu.be/4iR8g9-39LM?t=26845) by Martin Pieuchot Keynote 2: A French story on cybercrime (https://youtu.be/4iR8g9-39LM?t=30540) by Éric Freyssinet (https://twitter.com/ericfreyss) Case studies of sandboxing base system with Capsicum (https://youtu.be/jqdHYEH_BQY?t=731) by Mariusz Zaborski (https://twitter.com/oshogbovx) OpenBSD's small steps towards DTrace (a tale about DDB and CTF) (https://youtu.be/jqdHYEH_BQY?t=6030) by Jasper Lievisse Adriaanse The Realities of DTrace on FreeBSD (https://youtu.be/jqdHYEH_BQY?t=13096) by George Neville-Neil (https://twitter.com/gvnn3) OpenSMTPD, current state of affairs (https://youtu.be/jqdHYEH_BQY?t=16818) by Gilles Chehade (https://twitter.com/PoolpOrg) Hoisting: lessons learned integrating pledge into 500 programs (https://youtu.be/jqdHYEH_BQY?t=21764) by Theo de Raadt Keynote 3: System Performance Analysis Methodologies (https://youtu.be/jqdHYEH_BQY?t=25463) by Brendan Gregg (https://twitter.com/brendangregg) Closing Session (https://youtu.be/jqdHYEH_BQY?t=29355) Karnak “Is it done yet ?” The never ending story of pkg tools (https://youtu.be/1hjzleqGRYk?t=71) by Marc Espie (https://twitter.com/espie_openbsd) A Tale of six motherboards, three BSDs and coreboot (https://youtu.be/1hjzleqGRYk?t=7498) by Piotr Kubaj and Katarzyna Kubaj State of the DragonFly's graphics stack (https://youtu.be/1hjzleqGRYk?t=11475) by François Tigeot From NanoBSD to ZFS and Jails – FreeBSD as a Hosting Platform, Revisited (https://youtu.be/1hjzleqGRYk?t=16227) by Patrick M. Hausen Bacula – nobody ever regretted making a backup (https://youtu.be/1hjzleqGRYk?t=20069) by Dan Langille (https://twitter.com/DLangille) Never Lose a Syslog Message (https://youtu.be/qX0BS4P65cQ?t=325) by Alexander Bluhm Running CloudABI applications on a FreeBSD-based Kubernetes cluster (https://youtu.be/qX0BS4P65cQ?t=5647) by Ed Schouten (https://twitter.com/EdSchouten) The OpenBSD web stack (https://youtu.be/qX0BS4P65cQ?t=13255) by Michael W. Lucas (https://twitter.com/mwlauthor) The LLDB Debugger on NetBSD (https://youtu.be/qX0BS4P65cQ?t=16835) by Kamil Rytarowski What's in store for NetBSD 8.0? (https://youtu.be/qX0BS4P65cQ?t=21583) by Alistair Crooks Louxor A Modern Replacement for BSD spell(1) (https://youtu.be/6Nen6a1Xl7I?t=156) by Abhinav Upadhyay (https://twitter.com/abhi9u) Portable Hotplugging: NetBSD's uvm_hotplug(9) API development (https://youtu.be/6Nen6a1Xl7I?t=5874) by Cherry G. Mathew Hardening pkgsrc (https://youtu.be/6Nen6a1Xl7I?t=9343) by Pierre Pronchery (https://twitter.com/khorben) Discovering OpenBSD on AWS (https://youtu.be/6Nen6a1Xl7I?t=14874) by Laurent Bernaille (https://twitter.com/lbernail) OpenBSD Testing Infrastructure Behind bluhm.genua.de (https://youtu.be/6Nen6a1Xl7I?t=18639) by Jan Klemkow The school of hard knocks – PT1 (https://youtu.be/8wuW8lfsVGc?t=276) by Sevan Janiyan (https://twitter.com/sevanjaniyan) 7 years of maintaining firefox, and still looking ahead (https://youtu.be/8wuW8lfsVGc?t=5321) by Landry Breuil Branch VPN solution based on OpenBSD, OSPF, RDomains and Ansible (https://youtu.be/8wuW8lfsVGc?t=12385) by Remi Locherer Running BSD on AWS (https://youtu.be/8wuW8lfsVGc?t=15983) by Julien Simon and Nicolas David Getting started with OpenBSD device driver development (https://youtu.be/8wuW8lfsVGc?t=21491) by Stefan Sperling A huge thanks to the organizers, program committee, and sponsors of EuroBSDCon. Next year, EuroBSDcon will be in Bucharest, Romania. *** The story of PR 219251 (https://www.sigsegv.be//blog/freebsd/PR219251) The actual story I wanted Kristof to tell, the pf bug he fixed at the Essen Hackathon earlier this summer. As I threatened to do in my previous post, I'm going to talk about PR 219251 for a bit. The bug report dates from only a few months ago, but the first report (that I can remeber) actually came from Shawn Webb on Twitter, of all places Despite there being a stacktrace it took quite a while (nearly 6 months in fact) before I figured this one out. It took Reshad Patuck managing to distill the problem down to a small-ish test script to make real progress on this. His testcase meant that I could get core dumps and experiment. It also provided valuable clues because it could be tweaked to see what elements were required to trigger the panic. This test script starts a (vnet) jail, adds an epair interface to it, sets up pf in the jail, and then reloads the pf rules on the host. Interestingly the panic does not seem to occur if that last step is not included. Obviously not the desired behaviour, but it seems strange. The instances of pf in the jails are supposed to be separate. We try to fetch a counter value here, but instead we dereference a bad pointer. There's two here, so already we need more information. Inspection of the core dump reveals that the state pointer is valid, and contains sane information. The rule pointer (rule.ptr) points to a sensible location, but the data is mostly 0xdeadc0de. This is the memory allocator being helpful (in debug mode) and writing garbage over freed memory, to make use-after-free bugs like this one easier to find. In other words: the rule has been free()d while there was still a state pointing to it. Somehow we have a state (describing a connection pf knows about) which points to a rule which no longer exists. The core dump also shows that the problem always occurs with states and rules in the default vnet (i.e. the host pf instance), not one of the pf instances in one of the vnet jails. That matches with the observation that the test script does not trigger the panic unless we also reload the rules on the host. Great, we know what's wrong, but now we need to work out how we can get into this state. At this point we're going to have to learn something about how rules and states get cleaned up in pf. Don't worry if you had no idea, because before this bug I didn't either. The states keep a pointer to the rule they match, so when rules are changed (or removed) we can't just delete them. States get cleaned up when connections are closed or they time out. This means we have to keep old rules around until the states that use them expire. When rules are removed pfunlinkrule() adds then to the Vpfunlinkedrules list (more on that funny V prefix later). From time to time the pf purge thread will run over all states and mark the rules that are used by a state. Once that's done for all states we know that all rules that are not marked as in-use can be removed (because none of the states use it). That can be a lot of work if we've got a lot of states, so pfpurgethread() breaks that up into smaller chuncks, iterating only part of the state table on every run. We iterate over all of our virtual pf instances (VNETFOREACH()), check if it's active (for FreeBSD-EN-17.08, where we've seen this code before) and then check the expired states with pfpurgeexpiredstates(). We start at state 'idx' and only process a certain number (determined by the PFTMINTERVAL setting) states. The pfpurgeexpiredstates() function returns a new idx value to tell us how far we got. So, remember when I mentioned the odd V_ prefix? Those are per-vnet variables. They work a bit like thread-local variables. Each vnet (virtual network stack) keeps its state separate from the others, and the V_ variables use a pointer that's changed whenever we change the currently active vnet (say with CURVNETSET() or CURVNETRESTORE()). That's tracked in the 'curvnet' variable. In other words: there are as many Vpfvnetactive variables as there are vnets: number of vnet jails plus one (for the host system). Why is that relevant here? Note that idx is not a per-vnet variable, but we handle multiple pf instances here. We run through all of them in fact. That means that we end up checking the first X states in the first vnet, then check the second X states in the second vnet, the third X states in the third and so on and so on. That of course means that we think we've run through all of the states in a vnet while we really only checked some of them. So when pfpurgeunlinkedrules() runs it can end up free()ing rules that actually are still in use because pfpurgethread() skipped over the state(s) that actually used the rule. The problem only happened if we reloaded rules in the host, because the active ruleset is never free()d, even if there are no states pointing to the rule. That explains the panic, and the fix is actually quite straightforward: idx needs to be a per-vnet variable, Vpfpurge_idx, and then the problem is gone. As is often the case, the solution to a fairly hard problem turns out to be really simple. As you might expect, finding the problem takes a lot more work that fixing it Thanks to Kristof for writing up this detailed post explaining how the problem was found, and what caused it. *** vBSDcon 2017: BSD at Work (https://www.ixsystems.com/blog/vbsdcon-2017-dexter/) The third biennial vBSDcon hosted by Verisign took place September 7th through 9th with the FreeBSD Developer Summit taking place the first day. vBSDcon and iXsystems' MeetBSD event have been alternating between the East and West coasts of the U.S.A. and these two events play vital roles in reaching Washington, DC-area and Bay Area/Silicon Valley audiences. Where MeetBSD serves many BSD Vendors, vBSDcon attracts a unique government and security industry demographic that isn't found anywhere else. Conference time and travel budgets are always limited and bringing these events to their attendees is a much-appreciated service provided by their hosts. The vBSDcon FreeBSD DevSummit had a strong focus on OpenZFS, the build system and networking with the FreeBSD 12 wish list of features in mind. How to best incorporate the steady flow of new OpenZFS features into FreeBSD such as dataset-level encryption was of particular interest. This feature from a GNU/Linux-based storage vendor is tribute to the growth of the OpenZFS community which is vital in light of the recent “Death of Solaris and ZFS” at Oracle. There has never been more demand for OpenZFS on FreeBSD and the Oracle news further confirms our collective responsibility to meet that demand. The official conference opened with my talk on “Isolated BSD Build Environments” in which I explained how the bhyve hypervisor can be used to effortlessly tour FreeBSD 5.0-onward and build specific source releases on demand to trace regressions to their offending commit. I was followed by a FreeNAS user who made the good point that FreeNAS is an exemplary “entry vector” into Unix and Enterprise Storage fundamentals, given that many of the vectors our generation had are gone. Where many of us discovered Unix and the Internet via console terminals at school or work, smart phones are only delivering the Internet without the Unix. With some irony, both iOS and Android are Unix-based yet offer few opportunities for their users to learn and leverage their Unix environments. The next two talks were The History and Future of Core Dumps in FreeBSD by Sam Gwydir and Using pkgsrc for multi-platform deployments in heterogeneous environments by G. Clifford Williams. I strongly recommend that anyone wanting to speak at AsiaBSDCon read Sam's accompanying paper on core dumps because I consider it the perfect AsiaBSDCon topic and his execution is excellent. Core dumps are one of those things you rarely think about until they are a DROP EVERYTHING! priority. G. Clifford's talk was about what I consider a near-perfect BSD project: pkgsrc, the portable BSD package manager. I put it up there with OpenSSH and mandoc as projects that have provided significant value to other Open Source operating systems. G. Clifford's real-world experiences are perfectly inline with vBSDcon's goal to be more production-oriented than other BSDCons. Of the other talks, any and all Dtrace talks are always appreciated and George Neville-Neil's did not disappoint. He based it on his experiences with the Teach BSD project which is bringing FreeBSD-based computer science education to schools around the world. The security-related talks by John-Mark Gurney, Dean Freeman and Michael Shirk also represented vBSDcon's consideration of the local community and made a convincing point that the BSDs should make concerted efforts to qualify for Common Criteria, FIPS, and other Government security requirements. While some security experts will scoff at these, they are critical to the adoption of BSD-based products by government agencies. BSD Now hosts Allan Jude and Benedict Reuschling hosted an OpenZFS BoF and Ansible talk respectively and I hosted a bhyve hypervisor BoF. The Hallway Track and food at vBSDcon were excellent and both culminated with an after-dinner dramatic reading of Michael W. Lucas' latest book that raised money for the FreeBSD Foundation. A great time was had by all and it was wonderful to see everyone! News Roundup FreeBSD 10.4-RC2 Available (https://lists.freebsd.org/pipermail/freebsd-stable/2017-September/087848.html) FreeBSD 10.4 will be released soon, this is the last chance to find bugs before the official release is cut. Noteworthy Changes Since 10.4-RC1: Given that the amd64 disc1 image was overflowing, more of the base components installed into the disc1 (live) file systems had to be disabled. Most notably, this removed the compiler toolchain from the disc1 images. All disabled tools are still available with the dvd1 images, though. The aesni(4) driver now no longer shares a single FPU context across multiple sessions in multiple threads, addressing problems seen when employing aesni(4) for ipsec(4). Support for netmap(4) by the ixgbe(4) driver has been brought into line with the netmap(4) API present in stable/10. Also, ixgbe(4) now correctly handles VFs in its netmap(4) support again instead of treating these as PFs. During the creation of amd64 and i386 VM images, etcupdate(8) and mergemaster(8) databases now are bootstrapped, akin to what happens along the extraction of base.txz as part of a new installation via bsdinstall(8). This change allows for both of these tools to work out-of-box on the VM images and avoids errors seen when upgrading these images via freebsd-update(8). If you are still on the stable/10 branch, you should test upgrading to 10.4, and make sure there are no problems with your workload Additional testing specifically of the features that have changed since 10.4-BETA1 would also be most helpful This will be the last release from the stable/10 branch *** OpenBSD changes of note 628 (https://www.tedunangst.com/flak/post/openbsd-changes-of-note-628) EuroBSDCon in two weeks. Be sure to attend early and often. Many and various documentation improvements for libcrypto. New man pages, rewrites, expanded bugs sections, and more. Only allow upward migration in vmd. There's a README for the syspatch build system if you want to run your own. Move the kernel relinking code from /etc/rc into a seperate script usable by syspatch. Kernel patches can now be reduced to just the necessary files. Make the callers of sogetopt() responsible for allocating memory. Now allocation and free occur in the same place. Use waitpid() instead of wait() in most programs to avoid accidentally collecting the wrong child. Have cu call isatty() before making assumptions. Switch mandoc rendering of mathematical symbols and greek letters from trying to imitate the characters' graphical shapes, which resulted in unintelligible renderings in many cases, to transliterations conveying the characters' meanings. Update libexpat to 2.2.4. Fix copying partial UTF-8 characters. Sigh, here we go again. Work around bug in F5's handling of the supported elliptic curves extension. RFC 4492 only defines elliptic_curves for ClientHello. However, F5 is sending it in ServerHello. We need to skip over it since our TLS extension parsing code is now more strict. After a first install, run syspatch -c to check for patches. If SMAP is present, clear PSL_AC on kernel entry and interrupt so that only the code in copy{in,out}* that need it run with it set. Panic if it's set on entry to trap() or syscall(). Prompted by Maxime Villard's NetBSD work. Errata. New drivers for arm: rktemp, mvpinctrl, mvmpic, mvneta, mvmdio, mvpxa, rkiic, rkpmic. No need to exec rm from within mandoc. We know there's exactly one file and directory to remove. Similarly with running cmp. Revert to Mesa 13.0.6 to hopefully address rendering issues a handful of people have reported with xpdf/fvwm on ivy bridge with modesetting driver. Rewrite ALPN extension using CBB/CBS and the new extension framework. Rewrite SRTP extension using CBB/CBS and the new extension framework. Revisit 2q queue sizes. Limit the hot queue to 1/20th the cache size up to a max of 4096 pages. Limit the warm and cold queues to half the cache. This allows us to more effectively notice re-interest in buffers instead of losing it in a large hot queue. Add glass console support for arm64. Probably not yet for your machine, though. Replace heaps of hand-written syscall stubs in ld.so with a simpler framework. 65535 is a valid port to listen on. When xinit starts an X server that listens only on UNIX socket, prefer DISPLAY=unix:0 rather than DISPLAY=:0. This will prevent applications from ever falling back to TCP if the UNIX socket connection fails (such as when the X server crashes). Reverted. Add -z and -Z options to apmd to auto suspend or hibernate when low on battery. Remove the original (pre-IETF) chacha20-poly1305 cipher suites. Add urng(4) which supports various USB RNG devices. Instead of adding one driver per device, start bundling them into a single driver. Remove old deactivated pledge path code. A replacement mechanism is being brewed. Fix a bug from the extension parsing rewrite. Always parse ALPN even if no callback has been installed to prevent leaving unprocessed data which leads to a decode error. Clarify what is meant by syslog priorities being ordered, since the numbers and priorities are backwards. Remove a stray setlocale() from ksh, eliminating a lot of extra statically linked code. Unremove some NPN symbols from libssl because ports software thinks they should be there for reasons. Fix saved stack location after resume. Somehow clang changed it. Resume works again on i386. Improve error messages in vmd and vmctl to be more informative. Stop building the miniroot installer for OMAP3 Beagleboards. It hasn't worked in over a year and nobody noticed. Have the callers of sosetopt() free the mbuf for symmetry. On octeon, let the kernel use the hardware FPU even if emulation is compiled in. It's faster. Fix support for 486DX CPUs by not calling cpuid. I used to own a 486. Now I don't. Merge some drm fixes from linux. Defer probing of floppy drives, eliminating delays during boot. Better handling of probes and beacons and timeouts and scans in wifi stack to avoid disconnects. Move mutex, condvar, and thread-specific data routes, pthreadonce, and pthreadexit from libpthread to libc, along with low-level bits to support them. Let's thread aware (but not actually threaded) code work with just libc. New POSIX xlocale implementation. Complete as long as you only use ASCII and UTF-8, as you should. Round and round it goes; when 6.2 stops, nobody knows. A peak at the future? *** Screencasting with OpenBSD (http://eradman.com/posts/screencasting.html) USB Audio Any USB microphone should appear as a new audio device. Here is the dmesg for my mic by ART: uaudio0 at uhub0 port 2 configuration 1 interface 0 "M-One USB" rev 1.10/0.01 addr 2 uaudio0: audio rev 1.00, 8 mixer controls audio1 at uaudio0 audioctl can read off all of the specific characterisitcs of this device $ audioctl -f /dev/audio1 | grep record mode=play,record record.rate=48000 record.channels=1 record.precision=16 record.bps=2 record.msb=1 record.encoding=slinear_le record.pause=0 record.active=0 record.block_size=1960 record.bytes=0 record.errors=0 Now test the recording from the second audio device using aucat(1) aucat -f rsnd/1 -o file.wav If the device also has a headset audio can be played through the same device. aucat -f rsnd/1 -i file.wav Screen Capture using Xvfb The rate at which a framebuffer for your video card is a feature of the hardware and software your using, and it's often very slow. x11vnc will print an estimate of the banwidth for the system your running. x11vnc ... 09/05/2012 22:23:45 fb read rate: 7 MB/sec This is about 4fps. We can do much better by using a virtual framebuffer. Here I'm setting up a new screen, setting the background color, starting cwm and an instance of xterm Xvfb :1 -screen 0 720x540x16 & DISPLAY=:1 xsetroot -solid steelblue & DISPLAY=:1 cwm & DISPLAY=:1 xterm +sb -fa Hermit -fs 14 & Much better! Now we're up around 20fps. x11vnc -display :1 & ... 11/05/2012 18:04:07 fb read rate: 168 MB/sec Make a connection to this virtual screen using raw encoding to eliminate time wasted on compression. vncviewer localhost -encodings raw A test recording with sound then looks like this ffmpeg -f sndio -i snd/1 -y -f x11grab -r 12 -s 800x600 -i :1.0 -vcodec ffv1 ~/out.avi Note: always stop the recording and playback using q, not Ctrl-C so that audio inputs are shut down properly. Screen Capture using Xephyr Xephyr is perhaps the easiest way to run X with a shadow framebuffer. This solution also avoids reading from the video card's RAM, so it's reasonably fast. Xephyr -ac -br -noreset -screen 800x600 :1 & DISPLAY=:1 xsetroot -solid steelblue & DISPLAY=:1 cwm & DISPLAY=:1 xrdb -load ~/.Xdefaults & DISPLAY=:1 xterm +sb -fa "Hermit" -fs 14 & Capture works in exactally the same way. This command tries to maintain 12fps. ffmpeg -f sndio -i snd/1 -y -f x11grab -r 12 -s 800x600 -i :1.0 -vcodec ffv1 -acodec copy ~/out.avi To capture keyboard and mouse input press Ctrl then Shift. This is very handy for using navigating a window manager in the nested X session. Arranging Windows I have sometimes found it helpful to launch applications and arrange them in a specific way. This will open up a web browser listing the current directory and position windows using xdotool DISPLAY=:1 midori "file:///pwd" & sleep 2 DISPLAY=:1 xdotool search --name "xterm" windowmove 0 0 DISPLAY=:1 xdotool search --class "midori" windowmove 400 0 DISPLAY=:1 xdotool search --class "midori" windowsize 400 576 This will position the window precisely so that it appears to be in a tmux window on the right. Audio/Video Sync If you find that the audio is way out of sync with the video, you can ajust the start using the -ss before the audio input to specify the number of seconds to delay. My final recording command line, that delays the audio by 0.5 seconds, writing 12fps ffmpeg -ss 0.5 -f sndio -i snd/1 -y -f x11grab -r 12 -s 800x600 -i :1.0 -vcodec ffv1 -acodec copy ~/out.avi Sharing a Terminal with tmux If you're trying to record a terminal session, tmux is able to share a session. In this way a recording of an X framebuffer can be taken without even using the screen. Start by creating the session. tmux -2 -S /tmp/tmux0 Then on the remote side connect on the same socket tmux -2 -S /tmp/tmux0 attach Taking Screenshots Grabbing a screenshots on Xvfb server is easily accomplished with ImageMagick's import command DISPLAY=:1 import -window root screenshot.png Audio Processing and Video Transcoding The first step is to ensure that the clip begins and ends where you'd like it to. The following will make a copy of the recording starting at time 00:00 and ending at 09:45 ffmpeg -i interactive-sql.avi -vcodec copy -acodec copy -ss 00:00:00 -t 00:09:45 interactive-sql-trimmed.avi mv interactive-sql-trimmed.avi interactive-sql.avi Setting the gain correctly is very important with an analog mixer, but if you're using a USB mic there may not be a gain option; simply record using it's built-in settings and then adjust the levels afterwards using a utility such as normalize. First extact the audio as a raw PCM file and then run normalize ffmpeg -i interactive-sql.avi -c:a copy -vn audio.wav normalize audio.wav Next merge the audio back in again ffmpeg -i interactive-sql.avi -i audio.wav -map 0:0 -map 1:0 -c copy interactive-sql-normalized.avi The final step is to compress the screencast for distribution. Encoding to VP8/Vorbis is easy: ffmpeg -i interactive-sql-normalized.avi -c:v libvpx -b:v 1M -c:a libvorbis -q:a 6 interactive-sql.webm H.264/AAC is tricky. For most video players the color space needs to be set to yuv420p. The -movflags puts the index data at the beginning of the file to enable streaming/partial content requests over HTTP: ffmpeg -y -i interactive-sql-normalized.avi -c:v libx264 -preset slow -crf 14 -pix_fmt yuv420p -movflags +faststart -c:a aac -q:a 6 interactive-sql.mp4 TrueOS @ Ohio Linuxfest '17! (https://www.trueos.org/blog/trueos-ohio-linuxfest-17/) Dru Lavigne and Ken Moore are both giving presentations on Saturday the 30th. Sit in and hear about new developments for the Lumina and FreeNAS projects. Ken is offering Lumina Rising: Challenging Desktop Orthodoxy at 10:15 am in Franklin A. Hear his thoughts about the ideas propelling desktop environment development and how Lumina, especially Lumina 2, is seeking to offer a new model of desktop architecture. Elements discussed include session security, application dependencies, message handling, and operating system integration. Dru is talking about What's New in FreeNAS 11 at 2:00 pm in Franklin D. She'll be providing an overview of some of the new features added in FreeNAS 11.0, including: Alert Services Starting specific services at boot time AD Monitoring to ensure the AD service restarts if disconnected A preview of the new user interface support for S3-compatible storage and the bhyve hypervisor She's also giving a sneak peek of FreeNAS 11.1, which has some neat features: A complete rewrite of the Jails/Plugins system as FreeNAS moves from warden to iocage Writing new plugins with just a few lines of code A brand new asynchronous middleware API Who's going? Attending this year are: Dru Lavigne (dlavigne): Dru leads the technical documentation team at iX, and contributes heavily to open source documentation projects like FreeBSD, FreeNAS, and TrueOS. Ken Moore (beanpole134): Ken is the lead developer of Lumina and a core contributor to TrueOS. He also works on a number of other Qt5 projects for iXsystems. J.T. Pennington (q5sys): Some of you may be familiar with his work on BSDNow, but J.T. also contributes to the TrueOS, Lumina, and SysAdm projects, helping out with development and general bug squashing. *** Beastie Bits Lumina Development Preview: Theme Engine (https://www.trueos.org/blog/lumina-development-preview-theme-engine/) It's happening! Official retro Thinkpad lappy spotted in the wild (https://www.theregister.co.uk/2017/09/04/retro_thinkpad_spotted_in_the_wild/) LLVM libFuzzer and SafeStack ported to NetBSD (https://blog.netbsd.org/tnf/entry/llvm_libfuzzer_and_safestack_ported) Remaining 2017 FreeBSD Events (https://www.freebsdfoundation.org/news-and-events/event-calendar/2017-openzfs-developer-summit/) *** Feedback/Questions Andrew - BSD Teaching Material (http://dpaste.com/0YTT0VP) Seth - Switching to Tarsnap after Crashplan becomes no more (http://dpaste.com/1SK92ZX#wrap) Thomas - Native encryption in ZFS (http://dpaste.com/02KD5FX#wrap) Coding Cowboy - Coding Cowboy - Passwords and clipboards (http://dpaste.com/31K0E40#wrap) ***

BSD Now
208: Faces of Open Source

BSD Now

Play Episode Listen Later Aug 23, 2017 84:30


DragonflyBSD 4.8.1 has been released, we explore how the X11 clipboard works, and look at OpenBSD gaming resources. This episode was brought to you by Headlines LLVM, Clang and compiler-rt support enhancements (https://blog.netbsd.org/tnf/entry/llvm_clang_and_compiler_rt) In the last month I started with upstream of the code for sanitizers: the common layer and ubsan. I worked also on the elimination of unexpected failures in LLVM and Clang. I've managed to achieve, with a pile of local patches, the number of 0 unexpected bugs within LLVM (check-llvm) and 3 unexpected bugs within Clang (check-clang) (however these ones were caused by hardcoded environment -lstdc++ vs -lc++). The number of failures in sanitizers (check-sanitizer) is also low, it's close to zero. LLVM In order to achieve the goals of testability concerning the LLVM projects, I had to prepare a new pkgsrc-wip package called llvm-all-in-one that contains 12 active LLVM projects within one tree. The set of these projects is composed of: llvm, clang, compiler-rt, libcxx, libcxxabi, libunwind, test-suite, openmp, llgo, lld, lldb, clang-tools-extra. These were required to build and execute test-suites in the LLVM's projects. Ideally the tests should work in standalone packages - built out-of-LLVM-sources - and with GCC/Clang, however the real life is less bright and this forced me to use Clang as the system compiler an all-in-one package in order to develop the work environment with the ability to build and execute unit tests. There were four threads within LLVM: Broken std::callonce with libstdc++. This is an old and well-known bug, which was usually worked around with a homegrown implementation llvm::callonce. I've discovered that the llvm::callonce workaround isn't sufficient for the whole LLVM functionality, as std::callonce can be called internally inside the libstdc++ libraries - like within the C++11 futures interface. This bug has been solved by Joerg Sonnenberger in the ELF dynamic linker. Unportable shell construct hardcoded in tests ">&". This has been fixed upstream. LLVM JIT. The LLVM Memory generic allocator (or page mapper) was designed to freely map pages with any combination of the protection bits: R,W,X. This approach breaks on NetBSD with PaX MPROTECT and requires redesign of the interfaces. This is the continuation of the past month AllocateRWX and ReleaseRWX compatibility with NetBSD improvements. I've prepared few variations of local patches addressing these issues and it's still open for discussion with upstream. My personal preference is to remove the current API entirely and introduce a newer one with narrowed down functionality to swap between readable (R--), writable (RW-) and executable (R-X) memory pages. This would effectively enforce W^X. Sanitizers support. Right now, I keep the patches locally in order to upstream the common sanitizer code in compiler-rt. The LLVM JIT API is the last cause of unexpected failures in check-llvm. This breaks MCJIT, ORCJIT and ExecutionEngine libraries and causes around 200 unexpected failures within tests. Clang I've upstreamed a patch that enables ubsan and asan on Clang's frontend for NetBSD/amd64. This support isn't complete, and requires sanitizers' support code upstreamed to compiler-rt. compiler-rt The current compiler-rt tasks can be divided into: upstream sanitizer common code shared with POSIX platforms upstream sanitizer common code shared with Linux and FreeBSD upstream sanitizer common code shared with FreeBSD upstream sanitizer common code specific to NetBSD build, execute and pass tests for sanitizer common code in check-santizer This means that ubsan, asan and the rest of the specific sanitizers wait in queue. All the mentioned tasks are being worked on simultaneously, with a soft goal to finish them one after another from the first to the last one. The last point with check-sanitizer unveiled so far two generic bugs on NetBSD: Return errno EFAULT instead of EACCES on memory fault with read(2)/write(2)-like syscalls. Honor PTHREADDESTRUCTORITERATIONS in libpthread. These bugs are not strictly real bugs, but they were introducing needless differences with other modern POSIX systems. The fixes were introduced by Christos Zoulas and backported to NetBSD-8. Plan for the next milestone I have decided not to open new issues in with the coming month and focus on upstreaming the remaining LLVM code. The roadmap for the next month is to continue working on the goals of the previous months. std::call_once is an example that every delayed bug keeps biting again and again in future. LLVM 5.0.0 is planned to be released this month (August) and there is a joint motivation with the upstream maintainer to push compatibility fixes for LLVM JIT. There is an option to submit a workaround now and introduce refactoring for the trunk and next version (6.0.0). This work was sponsored by The NetBSD Foundation. The NetBSD Foundation is a non-profit organization and welcomes any donations to help us continue funding projects and services to the open-source community. Please consider visiting the following URL, and chip in what you can: http://netbsd.org/donations/#how-to-donate *** DragonFly BSD 4.8.1 released (http://lists.dragonflybsd.org/pipermail/commits/2017-August/626150.html) +Updates by dev: + Antonio Huete Jimenez (1): + libc/gmon: Replace sbrk() with mmap() + Francois Tigeot (3): + drm: bring in Linux compability changes from master + drm/linux: make flushwork() more robust + drm/i915: Update to Linux 4.7.10 + Imre Vadász (4): + drm - Fix hrtimer, don't reset timer->function to NULL in timeout handler. + sound - Delete devfs clone handler for /dev/dsp and /dev/mixer on unload. + ifvtnet - Allocate struct vtnettxheader entries from a queue. + Make sure that cam(4)'s dashutdown handler runs before DEVICESHUTDOWN(). + Matthew Dillon (24): + kernel - MFC b48dd28447fc (sigtramp workaround) + kernel - Fix deadlock in sound system + kernel - Fix broken wakeup in crypto code + kernel - Add KERNPROCSIGTRAMP + gcc - Adjust the unwind code to use the new sigtramp probe sysctl + kernel - Implement NX + kernel - Implement NX (2) + kernel - Implement machdep.pmapnxenable TUNABLE + kernel - Implement NX (3) - cleanup + kernel - Temporarily set the default machdep.pmapnxenable to 0 + param - Change _DragonFlyversion to 400801 + kernel - Fix i915 deadlock + pthreads - Change PTHREADSTACKMIN + libc - Fix bug in rcmdsh() + ppp - Fix minor overflow in protocol search + libtelnet - Fix improper statement construction (not a bug in the binary) + libdevstat - Limit sscanf field, fix redundant condition + openssh - Fix a broken assignment + window - Fix Graphics capability enable test + kernel - Fix event preset + mfiutil - Fix static buffer overflow + mixer - Fix sscanf() overflow + gcore - fix overflow in sscanf + kernel - Fix improper parens + Sascha Wildner (17): + libkvm: Fix char pointer dereference. + Fix some cases where an index was used before its limits check. + Really ensure that our world/kernel are built under POSIX locale ("C"). + zoneinfo: Create a /usr/share/zoneinfo/UTC link. + kernel/cam: Add CAMSCSIITNEXUSLOST (in preparation for virtioscsi(4)). + kernel: Add FreeBSD's virtioscsi(4) driver. + ccdconfig(8): Add missing free(). + libpuffs: Fix two asserts. + kernel/acpi: Untangle the wakecode generation during buildkernel. + kernel/acpica: Better check AcpiOsPredefinedOverride()'s InitVal argument + kernel/acpica: ACPITHREADID is unsigned. + kernel/acpica: Return curthread as thread id from AcpiOsGetThreadId(). + kernel/acpica: Remove no longer needed #include. + kernel/acpi: Call AcpiInitializeSubsystem() before AcpiInitializeTables(). + kernel/urtwn: Add missing braces. + kernel/ieee80211: Add missing braces. + libthreadxu: Fix checking of pthreadbarrierinit()'s count argument. + Sepherosa Ziehau (7): + sound/hda: Sync device ID table with FreeBSD + inet6: Restore mbuf hash after defragmentation. + pf: Normalized, i.e. defragged, packets requiring rehash. + em: Enable MSI by default on devices has PCI advanced features capability. + sched: Change CPU_SETSIZE to signed int, same as FreeBSD/Linux. + usched: Allow process to change self cpu affinity + ix: Fixup TX/RX ring settings for X550, which supports 64/64 TX/RX rings. + zrj (1): + Revert "Always use unix line endings" Porting Unix to the 386: A Practical Approach (http://www.informatica.co.cr/unix-source-code/research/1991/0101.html) The University of California's Berkeley Software Distribution (BSD) has been the catalyst for much of the innovative work done with the UNIX operating system in both the research and commercial sectors. Encompassing over 150 Mbytes (and growing) of cutting-edge operating systems, networking, and applications software, BSD is a fully functional and nonproprietary complete operating systems software distribution (see Figure 1). In fact, every version of UNIX available from every vendor contains at least some Berkeley UNIX code, particularly in the areas of filesystems and networking technologies. However, unless one could pay the high cost of site licenses and equipment, access to this software was simply not within the means of most individual programmers and smaller research groups. The 386BSD project was established in the summer of 1989 for the specific purpose of porting BSD to the Intel 80386 microprocessor platform so that the tools this software offers can be made available to any programmer or research group with a 386 PC. In coordination with the Computer Systems Research Group (CSRG) at the University of California at Berkeley, we successively ported a basic research system to a common AT class machine (see, Figure 2), with the result that approximately 65 percent of all 32-bit systems could immediately make use of this new definition of UNIX. We have been refining and improving this base port ever since. By providing the base 386BSD port to CSRG, our hope is to foster new interest in Berkeley UNIX technology and to speed its acceptance and use worldwide. We hope to see those interested in this technology build on it in both commercial and noncommercial ventures. In this and following articles, we will examine the key aspects of software, strategy, and experience that encompassed a project of this magnitude. We intend to explore the process of the 386BSD port, while learning to effectively exploit features of the 386 architecture for use with an advanced operating system. We also intend to outline some of the tradeoffs in implementation goals which must be periodically reexamined. Finally, we will highlight extensions which remain for future work, perhaps to be done by some of you reading this article today. Note that we are assuming familiarity with UNIX, its concepts and structures, and the basic functions of the 386, so we will not present exhaustive coverage of these areas. In this installment, we discuss the beginning of our project and the initial framework that guided our efforts, in particular, the development of the 386BSD specification. Future articles will address specific topics of interest and actual nonproprietary code fragments used in 386BSD. Among the future areas to be covered are: 386BSD process context switching Executing the first 386BSD process on the PC 386BSD kernel interrupt and exception handling 386BSD INTERNET networking ISA device drivers and system support 386BSD bootstrap process *** X11: How does “the” clipboard work (https://www.uninformativ.de/blog/postings/2017-04-02/0/POSTING-en.html) > If you have used another operating system before you switched to something that runs X11, you will have noticed that there is more than one clipboard: > Sometimes, you can use the mouse to select some text, switch to another window, and then hit the middle mouse button to paste text. > Sometimes, you can select text, then hit some hotkey, e.g. Ctrl+C, switch to another window, hit another hotkey, e.g. Ctrl+V, and paste said text. > Sometimes, you can do both. > Selections as a form of IPC First things first, in X11 land, “clipboards” are called “selections”. Yes, there is more than one selection and they all work independently. In fact, you can use as many selections as you wish. In theory, that is. When using selections, you make different clients communicate with each other. This means that those clients have to agree on which selections to use. You can't just invent your own selection and then expect Firefox to be compatible with it. How are selections identified? There are three “standard” selection names: PRIMARY: The “middle mouse clipboard” SECONDARY: Virtually unused these days CLIPBOARD: The “Ctrl+C clipboard” Program 1: Query selection owners Content type and conversion Program 2: Get clipboard as UTF-8 Program 3: Owning a selection Program 4: Content type TARGETS Handling binary data using xclip Large amounts of data Clipboard managers Summary News Roundup TrueOS Documentation: A great way to give back! (https://www.trueos.org/blog/trueos-documentation-great-way-give-back/) The TrueOS project is always looking for community contribution. Documentation changes are a great way for users to not only make a solid contribution to the project, but learn more about it too! Over the last few months, many users have asked for both simple and detailed instructions on making documentation changes. These are now added to the TrueOS handbook in the Contributing to TrueOS section. If interested in making a small alteration to the TrueOS handbook, here are some instructions for submitting a patch through the GitHub website. These instructions are also applicable to the Lumina and SysAdm handbooks. Lumina documentation is in the the lumina-docs repository, and SysAdm guides are in sysadm-docs. Make a Doc change! A GitHub account is required to submit patches to the TrueOS docs. Open a web browser and sign in to GitHub or make a new account. When making a new account, be sure to use an often checked email address, as all communication regarding patches and pull requests are sent to this address. Navigate to the trueos-docs GitHub repository. Click on the trueos-handbook directory to view all the documentation files. Open the .rst file corresponding to the chapter needing an update. The chapter names are reflected in the title of the .rst files. For example, open install.rst to fix an error spotted in handbook chapter 3: “Install”. This first image shows the trueos-docs repository and the contents of the trueos-handbook directory Open the desired chapter file by clicking its entry in the list. The trueos.rst file is an index file and should be ignored. Begin editing the file by clicking the Pencil icon in the upper right corner above the file's text. The file moves to edit mode, where it is now possible to make changes, as the next image shows. Editing install.rst with GitHub When making a simple change, it is recommended to avoid adjusting the specific formatting elements and instead work within or around them. Once satisfied, scroll to the bottom of the page and write a detailed commit summary of the new changes. Click Propose file change (green button), then Create pull request to submit the changes to the project. GitHub then does an automated merge check. Click Create pull request again to submit the change to the repository. In the final step, a developer or project committer reviews the changes, merging them into the project or asking for more changes as necessary. Learn more about TrueOS documentation To learn more about the underlying structure of TrueOS documentation like the Sphinx Documentation Generator and reStructuredText markup, browse the Advanced Documentation Changes section of the TrueOS handbook. This section also contains instructions for forking the repository and configuring a local clone, build testing, updating the translation files, and other useful information. The Sphinx website is also a valuable resource. libHijack Revival (https://www.soldierx.com/news/Hijack-Revival) Over a decade ago, while standing naked and vulnerable in the comfort of my steaming hot shower, I gathered my thoughts as humans typically attempt to do in the wee hours of the morning. Thoughts of a post-exploitation exercise raced in my mind, the same thoughts that made sleeping the night before difficult. If only I could inject into Apache some code that would allow me to hook into its parsing engine without requiring persistance. Putting a file-backed entry into /proc/pid/maps would tip off the security team to a compromise. The end-goal was to be able to send Apache a special string and have Apache perform a unique action based on the special string. FelineMenace's Binary Protection Schemes whitepaper provided inspiration. Silvio Cesare paved the way into PLT/GOT redirection attacks. Various Phrack articles selflessly contributed to the direction I was to head. Alas, in the aforementioned shower, an epiphany struck me. I jumped as an awkward stereotypical geek does: like an elaborate Elaine Benes dance rehearsal in the air. If I used PTrace, ELF, and the PLT/GOT to my advantage, I could cause the victim application to allocate anonymous memory mappings arbitrarily. In the newly-created memory mapping, I could inject arbitrary code. Since a typical operating system treats debuggers as God-like applications, the memory mapping could be mapped without write access, but as read and execute only. Thus enabling the stealth that I sought. The project took a few years to develop in my spare time. I ended up creating several iterations, taking a rough draft/Proof-of-Concept style code and rewriting it to be more efficient and effective. I had toyed with FreeBSD off-and-on for over a decade by this point, but by-and-large I was still mostly using Linux. FreeBSD gained DTrace and ZFS support, winning me over from the Linux camp. I ported libhijack to FreeBSD, giving it support for both Linux and FreeBSD simultaneously. In 2013, I started work on helping Oliver Pinter with his ASLR implementation, which was originally destined to be upstreamed to FreeBSD. It took a lot of work, and my interest in libhijack faded. As a natural consequence, I handed libhijack over to SoldierX, asking the community to take it and enhance it. Over four years went by without a single commit. The project was essentially abandoned. My little baby was dead. This past week, I wondered if libhijack could even compile on FreeBSD anymore. Given that four years have passed by and major changes have happened in those four years, I thought libhijack would need a major overhaul just to compile, let alone function. Imagine my surprise when libhijack needed only a few fixups to account for changes in FreeBSD's RTLD. Today, I'm announcing the revival of libhijack. No longer is it dead, but very much alive. In order to develop the project faster, I've decided to remove support for Linux, focusing instead on FreeBSD. I've removed hundreds of lines of code over the past few days. Supporting both FreeBSD and Linux meant some code had to be ugly. Now the beautification process has begun. I'm announcing the availability of libhijack 0.7.0 today. The ABI and API should be considered unstable as they may change without notice. Note that HardenedBSD fully mitigates libhijack from working with two security features: setting security.bsd.unprivilegedprocdebug to 0 by default and the implementation of PaX NOEXEC. The security.bsd.unprivilegedprocdebug sysctl node prevents PTrace access for applications the debugger itself did not fork+execve for unprivileged (non-root) users. Privileged users (the root account) can use PTrace to its fullest extent. HardenedBSD's implementation of PaX NOEXEC prevents the creation of memory mappings that are both writable and executable. It also prevents using mprotect to toggle between writable and executable. In libhijack's case, FreeBSD grants libhijack the ability to write to memory mappings that are not marked writable. Debuggers do this to set breakpoints. HardenedBSD behaves differently due to PaX NOEXEC. Each memory mapping has a notion of a maximum protection level. When a memory mapping is created, if the write bit is set, then HardenedBSD drops the execute bit from the maximum protection level. When the execute bit is set at memory mapping creation time, then the write bit is dropped from the maximum protection level. If both the write and execute bits are set, then the execute bit is silently dropped from both the mapping creation request and the maximum protection level. The maximum protection level is always obeyed, even for debuggers. Thus we see that PaX NOEXEC is 100% effective in preventing libhijack from injecting code into a process. Here is a screenshot showing PaX NOEXEC preventing libhijack from injecting shellcode into a newly-created memory mapping. What's next for libhijack? Here's what we have planned, in no particular order: Python bindings Port to arm64 This requires logic for handling machine-dependent code. High priority. Finish anonymous shared object injection. This requires implementing a custom RTLD from within libhijack. More cleanups. Adhere to style(9). libhijack can be found on GitHub @ https://github.com/SoldierX/libhijack *** Contributing to FreeBSD (https://blather.michaelwlucas.com/archives/2988) I've talked to a whole bunch of folks who say things like “I'm a junior programmer. I'm looking for a way to help. I have no specific expertise, but I'm willing to learn.” Today, I present such junior programmers with an opportunity. An opportunity for you to learn skills that will be incredibly valuable to your career, and will simultaneously expand your career opportunities. For decades, FreeBSD has relied on its users for testing. They expect users to install pre-release versions of the OS and exercise them to identify regressions. That's necessary, but it's nowhere near enough. The FreeBSD Testing Project is building an automated test suite for the entire operating system. They have a whole mess of work to do. There's only four people on the team, so each additional person that contributes can have a serious impact. They have tutorials on how to write tests, and sample tests. There's a whole bunch of tests left to be written. You have an almost open field. They need tests for everything from ls(1) to bhyve. (Yes, ls(1) broke at one point in the last few years.) Everything needs testing. Learning to write, submit, and commit small tests is valuable experience for developing the big tests. What's more, learning to write tests for a system means learning the system. Developing tests will transform you into a FreeBSD expert. Once you've demonstrated your competence, worth, and ability to work within the project, other FreeBSD teams will solicit your help and advice. The Project will suck you in. Testing is perhaps the most valuable contribution anyone can make to an open source project. And this door into the FreeBSD Project is standing wide, wide open. OpenBSD Gaming Resource (https://mrsatterly.com/openbsd_games.html) > What isn't there to love about playing video games on your favorite operating system? OpenBSD and video games feels like a natural combination to me. My resource has software lists, links to free games not in ports, lists of nonfree games, and recommendations. The Table of Contents has these high-level items for you: > General Resources > OpenBSD Exclusive > Ports > Network Clients > Browser Games > Game Engines > Multiple Game Engines > Multiple System Emulation > Computer Emulation > Game Console Emulation > Live Media Emulation > Operating System Emulation > Games in Other Software Have fun with these games! *** Beastie Bits Dragonfly introduces kcollect(8) (https://www.dragonflydigest.com/2017/08/07/20061.html) The Faces of Open Source (http://facesofopensource.com/unix/) Edgemesh CEO, Jake Loveless and Joyent CTO, Bryan Cantrill join together for a fireside chat to discuss distributed caching at scale, Docker, Node.js, Mystery Science Theater 3000, and more! (https://www.joyent.com/blog/joyent-edgemesh-cache-me-if-you-can) UFS: Place the information needed to find alternate superblocks to the end of the area reserved for the boot block (https://svnweb.freebsd.org/base?view=revision&revision=322297) Let ‘localhost' be localhost (https://tools.ietf.org/html/draft-west-let-localhost-be-localhost-04) Hurry up and register for vBSDCon September 7-9 (http://www.verisign.com/en_US/internet-technology-news/verisign-events/vbsdcon/index.xhtml?dmn=vBSDcon.com) and EuroBSDCon September 21-24 (https://2017.eurobsdcon.org/) *** Feedback/Questions Morgan - btrfs deprecated (http://dpaste.com/0JEYE1K) Ben - UEFI, GELI, BEADM, and more (http://dpaste.com/2TP90HD) Brad - Hostname Clarification (http://dpaste.com/1MQH1BD) M Rod - BSD Laptop (http://dpaste.com/39C6PGN) Jeremy - Contributing to BSDs (http://dpaste.com/3SVP5SF) ***