Podcasts about hackspace

  • 22PODCASTS
  • 30EPISODES
  • 46mAVG DURATION
  • ?INFREQUENT EPISODES
  • Mar 26, 2025LATEST
hackspace

POPULARITY

20172018201920202021202220232024


Best podcasts about hackspace

Latest podcast episodes about hackspace

Pentaradio
pentaradio24: Veranstaltungstipp

Pentaradio

Play Episode Listen Later Mar 26, 2025


Kommt am Samstag, den 29. März zum Tag des offenen Hackspace im C3D2.

C-RadaR
C-RadaR März 2025 – Tag des offenen Hackspace 2025, EU AI Act, Chemnitzer Linux-Tage

C-RadaR

Play Episode Listen Later Mar 17, 2025 119:59


00:11:34 Den „International Open Hackerspace Day“ gibt es seit 2013. Der Chaos Computer Club öffnet seine Räume seit 2022 einmal im Jahr unter dem Motto „Tag des offenen Hackspace“. Dieses Jahr findet dieser am Samstag, 29. März statt. typ_o vom … Weiterlesen →

The Daily Decrypt - Cyber News and Discussions
Hack Space Con – Satellites and Cyber Security in Space

The Daily Decrypt - Cyber News and Discussions

Play Episode Listen Later Apr 19, 2024


Join us for a deep dive into the cutting-edge discussions on satellite security from HackspaceCon at Kennedy Space Center. Discover the unique challenges and cybersecurity implications as they explore the impact of technological constraints on satellite functionality and the emerging realm of space cybersecurity. Engage with the complex balance between cost, security, and functionality in the satellite industry—an ever-evolving battlefield in the skies above. 00:00 Introduction to the Episode: Insights from HackspaceCon 00:50 Key Takeaways from the Conference 02:03 Deep Dive into Satellite Security Challenges 14:40 The Potential and Perils of Satellite Ransomware 16:24 Exploring Cybersecurity in Space Technology 23:52 The Deterrents Against Satellite Hacking 28:10 Closing Thoughts and Conference Acknowledgments Hack a Virtualized Satellite: https://byos.ethoslabs.space/ Cybersecurity for Space, an awesome overview of the space written for cyber professionals with no prior space experience: https://a.co/d/fc5ZKiC Talks and Speakers are outlined here: https://www.hackspacecon.com/speakers24 Specific Speakers referenced in this episode: Tim Fowler Celi Johnson & Erin York Jacob Oakley Kaitlyn Handelman Tags: satellite security, cybersecurity, space technology, HackspaceCon, Kennedy Space Center, IoT in space, cyber attacks, satellite design, space junk, space rideshares, tech conference Search Phrases: Insights on satellite cybersecurity from HackspaceCon Discussion on space technology and security at Kennedy Space Center Challenges in satellite security and functionality IoT and cybersecurity implications in space technology Space junk and its impact on satellite operations What is space rideshare and its costs Satellite design constraints and cybersecurity risks Technological advancements in satellite operations Latest discussions from HackspaceCon on space cybersecurity How cyber attacks affect satellites and space operations Transcript: Space Con offsetkeyz: Welcome back to the Daily Decrypt. Last weekend, the two hosts of this podcast got to spend some time at HackspaceCon at Kennedy Space Center in Florida, and in this episode, we're just going to be discussing some of the takeaways we got during this conference. Dogespan and I recorded this from the kitchen of our Airbnb on the beach in Florida. And I mention that just so you're warned that the audio might not be the same as it is when we record in the studio. Sometimes the mic is a little too far from my mouth, sometimes it's too close to my mouth, and sometimes you'll hear the echo off the tile walls in the kitchen. And before we get in, I just wanted to read through the notes that I took for this episode with my key takeaways in a very cohesive way so that you can at least get that before we start rambling about it all. So just a high level. Satellites are just IOT in space. Just computers floating around in space that are really hard to talk to. Satellites operate in only a couple different elevations, like low earth orbit. And space junk is a real thing, so if a satellite gets damaged, space junk can damage other satellites. Space junk is also a huge deterrent for cyber attack and physical attack because countries don't want blowing up satellites to destroy their own satellites. Another point is that the supply chain for satellites is very small. There's only a few companies that make the components that go into satellites. Thus creating a pretty narrow attack vector. Satellites are built to accomplish their mission and contain no additional resources. if a satellite is compromised by an attacker, which you'll find out is pretty easy to do, attackers can make that satellite's failure look like anything from radiation to a bit flip to collision to a failure, they can make it look like anything they want. And finally, one of the biggest problems is there's no current incentive for reporting cyber incidents on satellites because there's nothing really that can be done about them. And they'll eventually de orbit. All right, let's get into the episode. dogespan: Satellites are computersin space. Never thought about it that way, to be completely honest. there's definitely more complication to hacking a satellite than hacking a TV, but It is, it's an IoT device. because of the limitations of space, they are stripping everything down on that operating system. And especially nowadays, and this was another thing that I didn't know, but there were specific operating systems that were essentially designed for satellites and space and all of the things that go into it. But now, with modern advancements in technology, these Satellites are able to run just little microcontrollers like your little hobby raspberry pi and arduino boards And you can put a regular operating system on there, but they're completely stripped down for Whatever purpose that they need so everything that would be secure just by default on A linux operating system is usually stripped out Power and weight, those are really like, offsetkeyz: Mm. dogespan: main things that they were driving in constantly throughout every talk was how power and weight is going to be affected by implementing a satellite. Everything has a purpose, so what are you gonna sacrifice? Are offsetkeyz: Mm-Hmm. dogespan: gonna sacrifice satellite antenna functionality offsetkeyz: Mm-Hmm. for dogespan: security? No, you're gonna sacrifice the security so that your satellite offsetkeyz: it needs to do, and weight is a big thing because it has to get out into space. And one of the other perspectives we just heard for the first time was space rideshares. That term is a legit term. Ridesharing to space, where companies need to put satellites into space, thus they contract out to SpaceX. And SpaceX has a little menu page with prices per kilogram, I might be misquoting, but just to give the listeners A relative gist of what they're costing. It's 300, 000 per kilogram. And so if your computer weighs one extra kilogram, because it has to carry up some hardening features for the operating system or to prevent intercepting of whatever, that's going to cost an extra 300K. dogespan: need to get a satellite up for communication for GPS or anything else and offsetkeyz: you dogespan: going to cost you more money to send something up that's a little bit more secure. Which I guess is the inherent theme on cyber security in general is that security does come with a cost. offsetkeyz: Mhm what dogespan: And luckily we're getting to a better place in business operations where We're understanding what that cost is and more willing to pay it, but when it comes to space, that's still, it's not a priority yet. offsetkeyz: And all the points that we heard during this conference make sense, right? Satellites, by quote, law, have to de orbit within a certain amount of time, because otherwise they turn into space junk, they get outdated, they create a whole bunch of other risks, so I believe any law abiding country keeps their satellites to under 10 years life cycle, so between 5 and 10 years seems to be the average life cycle of a satellite, so You're spending millions to put a satellite into orbit for about five years, if you're lucky. so why would you spend an extra million to secure this thing that could potentially just burn up? dogespan: I think it boils down to the use case and capabilities of the satellite. Like they all are sent up with a purpose. But as you know, with, as just any tech enthusiast, you typically look at a device that is a computer and you always think about what else it can do. So from an attacker's perspective, you may get access to a satellite that. Is, only supposed to take pictures of a certain area or something, but maybe there's other functionality that you can take advantage of to use for whatever you want. offsetkeyz: there was a quote that I really liked and I don't specifically remember who said it but I believe it was in a talk called Dude, I Broke the Satellite by Suely Johnson and Aaron York, where they said, effective software gets the job done. Secure software only gets the job done. It doesn't do any other functionality than what is needed. for the job. So if you think about effective software, it's going to get that thing done. It's going to take the pictures from the space of whatever it's supposed to take pictures of really, really well. But what else can it do? What else can that satellite out there do that is shooting XM radio to you while you cruise through the countrysides? Maybe it can intercept communications over China or Russia. Like maybe it can do a whole bunch of other stuff that would be very beneficial for an adversary. And also communicate XM so that's where one of the attack vectors is that is pretty prevalent on the surface of the planet as well but very prevalent up there dogespan: So one of the interesting points that was brought up in Extraterrestrial Security by, uh, Jacob Oakley how attackers can use the satellites as a relay. That I found really, really interesting, where an attacker would go and take control of, the satellite controller on the ground, so they don't even have to go up to space, build any sort of radio communications to get out of Earth. They go and attack that user, and then from there they're able to redirect communications up to the satellite, and then bounce to another satellite. And if that satellite that they bounce to is controlled somewhere else, well now they're able to Relay that back to the ground, to a new, a whole new destination So that brings up another point that I found pretty interesting, which is that yes, these satellites move in what's called constellations. There's a bunch of them. They're all owned by the same company and they communicate back and forth to each other to help maybe increase their processing power or accomplish their mission more effectively. dogespan: but satellites offsetkeyz: Cost a lot of money to get up there. And in order to recoup that money, they have to use every single minute of their time in space, because as I mentioned earlier, it is limited to make money. first of all, they don't have the resources on board to accommodate security, but they also don't have the time to push a patch because when a satellite is in a position to receive and send communications, That's only maximum 40 to 50 percent of the time it's in space. The owners of that satellite want to maximize the amount of bang they get for their buck. Right? So cybersecurity me comes in and says, Hey, we need to push a patch. A new vulnerability was, has been exploited amongst satellites similar to yours, and we need to push a patch. And it's going to take down your mission capabilities for three orbits. And they say, no, they just, they won't do it because then you're taking away from the mission. No, dogespan: it may take a while to get that patch up there, and I don't remember the exact figure, but I wanna say they were talking about somewhere around the range of like 30 . Kilobytes per second offsetkeyz: Sounds right to me. dogespan: Yeah. It was somewhere between 30 and 50, like we're talking old school, dial up speed, and you think about what a patch would be to a microcontroller. It's still gonna be small. But the amount of data that we work with on a regular basis is just so much larger, and these microcontrollers can still support a lot, like, you can have an entire terabyte in the size of a tiny microchip. And, yeah, what if this patch was a couple hundred megabytes and your satellite's only in view to receive communication for a short period of time? So, yeah. It is gonna be priority of the mission over patch. offsetkeyz: When a satellite fails, a company has gone and spent a lot of money on the satellite and everyone from the stakeholders of the satellite mission to NASA scientists want to know what happened, what caused that satellite to fail so that they can improve future satellites, right? And reduce failures in the future. So when a satellite fails, they bring in the company. Top professionals, top physicists, professors at Harvard professor to MIT, NASA scientists who work on Apollo 14, uh, whoever to tear apart the data that they got the last transmissions and figure out why it failed and figure out how to prevent it in the future. Right. But one of the points that was made is that they never bring in a cybersecurity professional, because what's interesting about how satellites operate is if you, if you get root on a satellite, if you get full permissions over satellite, you can control. Everything from the log outputs to the movements of the satellite to everything. So an attacker can make that failure look like it was caused by radiation or caused by a component failure or whatever they choose. And so honestly, having a cybersecurity professional checking the transmission logs leading up to it, maybe the month before or something like that could help identify an attack and could help. Yeah, dogespan: future satellite missions. Yeah, the, um Aerospace engineers, the geniuses that they are, they know and understand the way that these things are supposed to operate. All of the physics and everything that goes with, orbits and gravity, like all of that stuff. A crazy amount of stuff that they have to know and understand. And they're able to get to the root cause of this, but they are not trained to look at it forensically. They are not inherently going to think. of the possibility of an attack. And that's where I think it wouldn't be beneficial to have the cyber security professional, because they are, they're going to look at some of the things that aren't typical. And that is one of the things that was brought up, is that engineers across the board, and I'm even calling out cyber security engineers, but software developers, aerospace engineers, like we are all inherently lazy, and if we see that something works, we will continue to follow that trend. And Utilize things. offsetkeyz: if dogespan: previously, we'll keep going down that hole. But it always helps to have looking in and things. offsetkeyz: helps to have outsiders looking in and inspecting things. dogespan: Attackers, pen testers, blue teamers. Um, offsetkeyz: that this is an untapped field and moved into it. So one of the last talks we went to today dogespan: T, cybersecurity by Jacob Oakley. offsetkeyz: is a dogespan: T, offsetkeyz: cybersecurity, teaches at Embry Riddle University and was a former pen tester, was a former red teamer who got into space and he was telling us about how his first briefing with the engineers and the software engineers who were working on these satellites, dogespan: satellites, offsetkeyz: mentioned what happens if there's an attack and they, this was in 2019, 2020, very recently, they, with full confidence. Mentioned that, Hey, it doesn't matter. They have backups. It doesn't matter. They have scripts that run to reboot. The machine and, start the mission over. They have all of these things, all of these fail safes. So it doesn't matter if they get attacked, they have these fail safes. he might not have had the greatest retort in his first little briefing, but those are all absolutely destroyable by an attacker. If someone has root, they can make that script. Do something very malicious on a recurring basis, they can erase the backups, and these engineers had thought about the possibility of attack and place these measures to help recover from that attack. It's not a forethought. It's a, it's just, they weren't thinking with a cybersecurity mindset. dogespan: What would ransomware look like on a satellite nowadays? do we just wipe it? offsetkeyz: Dude. I mean, I had never thought about ransomware on a satellite, dogespan: but oh man, I hope no ransomware people listen to this cause it's such an easy target for ransomware. offsetkeyz: Um, now that I'm thinking about it. dogespan: touch an easy target for offsetkeyz: was James that is probably one And dogespan: It's not like one of these other satellites that we're talking about that You know only have a three to five year lifespan and that's kind of hoping for the best like James Webb I think is something that they're they're hoping to get a lot of use out of and locking that down like how do you recover from it and Yeah, what do you do? I know one of the things that was mentioned, I forget if it was like on a positive note or something, but it, you know, shooting down satellites. Mm hmm. Well, offsetkeyz: Oh, before we get into shooting down satellites, that's a whole another topic, I just am so stuck on how perfect of a target satellites are for ransomware. It's just hitting me now. I'm so sad that I didn't have a chance to talk to people about it because These companies, first of all, spend. Millions of dollars to get this thing to space. They only have a limited amount of time to use it. They care a lot about it and they have a lot of money to make sure it continues to work they don't secure it. So it's very easy to hijack and the people who own it have a lot of money. That's like just like the two components of ransomware success. And now I'm scared so we can move on now. dogespan: on now. Oh, I this is all kind of centered around the satellites and objects that are offsetkeyz: orbiting dogespan: Earth, but we are doing a lot more advanced stuff with space technology, you know, We've had satellites that kind of deployed to asteroids to collect samples. I think one of the other tests that we've had was a shooting of rocket at an asteroid to see if it could be redirected. So, What does the cyber security look like on something like that? Because it does, just requires long range communication. So you have two points of vulnerability, or two vectors of attack. You can either go directly towards the satellite, or rocket, or whatever it is, or you can go at the ground station and take control of it there. So, we have ransomware, but also, what if something is providing an important Service. And it's hijacked in transit and redirected somewhere else. You know, we have, we have the ISS up there and we're shooting rockets into space. offsetkeyz: ISS up there dogespan: Sorry, if I'm going down a doomsday offsetkeyz: space. Sorry if you see the rabbit hole there? dogespan: cyber offsetkeyz: is kind of doomsday y, and it's a ticking time bomb from what we gathered. It's an unexplored cybersecurity vector. Which makes it fun for cybersecurity professionals. If you think about 20 to 30 years ago, what cybersecurity looked like, it was pretty much what we have in the sky at this moment, we have Linux boxes, we have all these unpatched vulnerabilities and it's great to pen test them and it's great to defend them because you get a lot of easy wins. So in that realm, it's great for us, but technology on earth has far surpassed the technology in the sky. And all satellites are, as we mentioned at the beginning, is IOT in the sky. So dogespan had mentioned at the beginning that there's a little bit more to it than that, pretty much as far as I'm concerned, a little bit more to it than that is the fact that you can only communicate with them on a very low bandwidth. And. On a inconsistent, well, I guess it is a pretty consistent schedule, but not all the time. if these satellites were sitting in your living room, you would be in, you would have root in dogespan: a offsetkeyz: a minute, two minutes for most of them, dogespan: And so, offsetkeyz: right? whoever can solve the problem of communicating with them better, wins all the satellites. dogespan: with communication communication and then also the resource constraints I think can help but it is an interesting area of cyber security, and I think it's going to open up a lot of opportunities, especially with more private companies getting involved in it. We have a number of companies that are, well, like we mentioned, this Rideshare, but they're also putting their own service, their satellites and things into space, so. That's going to help, I think, ultimately, instead of it just being only the government that's getting involved in space. More people getting out there is, it's going to open the door for more opportunity for cyber security professionals to pivot, and more people just being aware of how it operates and how it works. offsetkeyz: And just like anything in tech, the more you do something, the lower it starts to cost, the more success you have, you're driving that cost down. And if you can drive that cost down, maybe you can get the bottom line to include some budget for cybersecurity, but it's sort of a teeter tottering effect because the more satellites we put into space, the more junk there is, the more vulnerabilities there are. But at the same time, the more we do, the more successes we have, the more likely it is, it's going to become a blooming field of cybersecurity. offsetkeyz: So we're coming up on the end of our time here, but just wanted to quickly touch on why does it matter if satellites are hacked? And that is something that is only recently being discussed. At least leaning towards defend them. Like it's probably been discussed amongst engineers and software developers who work on satellites, but they came up with, it doesn't matter. So why does it matter? I dogespan: one of the things that was mentioned, I wish I could quote the talk there's probably Jacob Oakley if I'm being honest, is that some of these satellites can be controlled by multiple ground stations. So if you were to control of a satellite and relay to another one, you you could have access to a whole nother ground control system. Um, and That might be another nation state or another company or something, and now you kind of have a foothold in their environment. offsetkeyz: You dogespan: have to be really, really careful because you only have offsetkeyz: have dogespan: short periods of time to deliver these payloads and balance communication, and you have to stay rather stealthy, but offsetkeyz: it's dogespan: it's kind of a big thing because, yeah, you can create this backdoor into a completely different environment that you, that CISA may be secured rather well and you could cause a lot more harm. offsetkeyz: can cause a lot more harm. dogespan: can see a lot offsetkeyz: satellites can see a lot of the planet. And I mean, they can see all of it at the end of their orbit, but dogespan: is offsetkeyz: This is why you bring a friend to a cybersecurity conference, because I completely missed that. And I'm sure there's things that Doge completely missed as well. dogespan: Oh yeah. offsetkeyz: But yeah, they work so hard to secure the ground stations that communicate with the satellites and work zero hard to secure the satellites. And it's two way communication. So, compromise a satellite, compromise the ground station. dogespan: Yeah, you can easily offsetkeyz: transmit a The dogespan: you can weaponize images, you can There are lots the opportunities are there. offsetkeyz: to hack satellites. Before I say anything else, don't do it. There's a lot of eyes watching those who hack satellites because it is a critical infrastructure. it was beat into us. Don't denial of service a satellite. You'll go to jail, like literally go to jail. They fun revelation. You can listen to anything That was a fun revelation. You can, you can listen to anything coming down from a satellite. dogespan: Don't send it back. offsetkeyz: Don't send stuff back. Don't try to send commands. There are some pretty cool labs that you can do if you want to mess with satellites using virtualization, which we all love. So we'll shout out Tim Fowler for those. He gave two talks, one on Friday, one on Saturday, about building a CubeSat lab. And if you would like to mess around with a virtualized satellite, you can go to byos. ethoslabs. dogespan: bring your space offsetkeyz: and BYOS stands for bring your own satellite. dogespan: around offsetkeyz: for that great talk. And I'm excited to go play around with it in my own home lab. But if you have that itch to DDoS a fricking satellite, do it in your home lab, don't do it in real life, you will go to jail, straight to jail. to jail. So we've covered the opportunities that there are to hack satellites. And there are plenty more that we haven't discussed. Satellites are extremely hackable and barely secured. What's keeping people from hacking these satellites? dogespan: Our entire knowledge base is based off of Five to six hours worth of lectures at this point. offsetkeyz: From what I gathered, there are no real deterrents other than hypothetical legal actions. For hacking a satellite. Nation states don't care about the United States regulations. So why aren't they hacking satellites left and right? Well, First of all, everyone relies on the infrastructure that satellites provide. GPS, time, Maps, weather, all of these things are relied upon. across the world. So that's, that's step one. Step two is, if someone starts doing it to us, we're gonna start doing it to them. dogespan: to offsetkeyz: which is what keeps us out of nuclear war, so why not keep us out of space cyber war? And if we started shooting satellites down, Which is a real thing and has happened and, uh, is bad because all satellites operate in one of three orbits, like low earth orbit, high earth orbit, deep space orbit, but they're all pretty much in the same place because that's how orbit works. You have to kind of stay the same elevation to use the earth's gravitational pull to whiplash you around. And if you blow up one, all it takes is a particle of sand to damage a satellite. And. If you blow up a satellite, I believe one of the case studies from India was like 68, 000 pieces of shrapnel traveling at 22, 000 miles per hour in the orbital field of all other satellites, including the satellites of the company that blew up the one satellite. So if Russia started going crazy and blowing up United States satellites, it would, the shrapnel from those satellites would likely take out Russia's satellites. So it's not a perfect system, but it is a pretty good deterrent. There's currently no solution, or at least viable solution for space junk, which is a technical term, but as soon as anyone figures it out, they win space they can start blowing up satellites and collecting the space junk and own, they own space, right? So Currently, the lack of ability to clean up space junk is what's keeping people from blowing up satellites. it's like a mutual respect everybody's kind of in agreement that dogespan: that we rely on the technology that's up there we understand the reprocussions of destroying. The rest of them, so it is, Yeah, if we can figure out how to clean it up, then I think you're right. It wouldn't really prevent much besides some of that critical infrastructure, but there's always ways around that. offsetkeyz: If we can own space, we can drop a billion dollars into creating our own critical infrastructure and rule the world. We can destroy the current one that's up there. If, if it meant owning space, I don't think there would be an expense spared. What's interesting is all the solutions that I can come up with, which are not many, involve earth's atmosphere. And we, we think of things like air and gravity and all these things as constants that don't exist out in space. Space. Like what, why don't we have weaponized satellites that just kind of push satellites out of orbit towards earth that burn up? There's no space junk from satellites that burn up in the atmosphere. Why don't we do that? Because there's no way to send like a pulse. There's no way to send a burst of air to push this satellite. It's very hard to even propel yourself through space because the most common ways of propulsion include oxygen, fans, combustion. dogespan: There's offsetkeyz: lot of things that stand in the way that I don't understand. Right. dogespan: pushed by some form of propulsion for redirecting all of the satellite debris into orbit. Much like the snow gets redirected to the end of your driveway and then you're stuck with a giant pile at the end of your driveway that you can't get out. offsetkeyz: We are stuck with a pile, and we can't get out, but we have no plow. but we Huge shoutout to the coordinators of HackspaceCon and dogespan: Everybody that came out, all the supporters, attendees the brave souls that got up in front and talked about what they know offsetkeyz: out the industry. Especially dogespan: it helps out the industry. Especially with space, they had mentioned that Hackspace happened last year and there was one or two talks. offsetkeyz: What? It dogespan: It was a very small number. offsetkeyz: number. dogespan: And this year it was all day long. . And so that's, that means that there's more people involved with it or heading that direction and willing to learn more about it. And I'm going to be honest, I'm one of those. I'm. Was very interested to learn more about what can be done and what opportunities are there. So really huge shoutout to everybody involved with the conference this weekend. offsetkeyz: thanks sharing your knowledge thanks for pivoting over to this field And trying to keep our critical infrastructure at least a little bit safe. If you did happen to pick up one of the stickers that I littered the conference with, thank you for picking that up and we'd love to hear from you. Reach out. We'd love to have you on the podcast. Y'all are very smart and any words you'd be willing to share with us would be greatly appreciated. you're if you're just a cybersecurity professional out there with no knowledge of space or the attack vectors that are involved in hacking satellites, highly encourage you to check out next year's conference. It's going to be good Check out our other episodes: https://thedailydecrypt.com/podcast/

The Daily Decrypt - Cyber News and Discussions
Change Healthcare Extorted Again, Malvertising Targets IT, GitHub Scams on Developers: Navigating Cybersecurity Minefields

The Daily Decrypt - Cyber News and Discussions

Play Episode Listen Later Apr 11, 2024


Today we unravel the second ransomware extortion of Change Healthcare by RansomHub, the cunning malvertising campaign targeting IT pros with malware-laden ads for PuTTY and FileZilla, and the deceptive tactics on GitHub fooling developers into downloading malware. Discover protective strategies and engage with expert insights on bolstering defenses against these evolving cyber threats. Original URLs: https://www.securityweek.com/second-ransomware-group-extorting-change-healthcare/ https://www.helpnetsecurity.com/2024/04/10/malvertising-putty-filezilla/ https://thehackernews.com/2024/04/beware-githubs-fake-popularity-scam.html https://www.bleepingcomputer.com/news/security/malicious-visual-studio-projects-on-github-push-keyzetsu-malware/ Follow us on Instagram: https://www.instagram.com/the_daily_decrypt/ Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/ Logo Design by https://www.zackgraber.com/ Tags: cybersecurity, ransomware, malvertising, GitHub scams, Change Healthcare, IT professionals, data protection, cybercrime, malware, software development Search Phrases: How to protect against ransomware attacks Strategies to combat malvertising campaigns Tips for IT professionals on avoiding malicious ads Safeguarding software development from GitHub scams Change Healthcare ransomware extortion case study Cybersecurity advice for IT administrators Dealing with malware in system utilities ads Best practices for data protection in healthcare Understanding cybercrime tactics on GitHub Preventing repeated ransomware extortions Transcript: Transition (Long) 2 Welcome back to the Daily Decrypt. Change Healthcare falls victim to a second ransomware extortion in just a month, now at the hands of the Emergent Ransom Hub Group, wielding over 4 terabytes of sensitive data stolen in the February 2024 cyberattack. Which comes as a result from the Black Cat Exit Scam. Next, we're turning over to a new malvertising campaign where searching for essential utilities for IT professionals like Putty and Filezilla leads to malware laden ads, and you all know what I'm going to say about this. Don't click Google Ads. And finally, GitHub becomes a battlefield as cybercriminals exploit its search functionality to trick developers into downloading repositories full of malware. How can developers ensure the repositories they download from GitHub are safe and not just traps set by cybercriminals? All right, so at the end of February of this year, you may remember that Change Healthcare, which is a subsidiary of UnitedHealthcare, was the victim of a ransomware attack by the notorious and since disbanded ransomware group named Black Cat. Well, Change Healthcare finds itself in the crosshairs of a ransomware extortion scheme for the second time in just over a month, coming from a new ransomware group called Ransom Hub. There hasn't been a second attack. But this is believed to be a result of the exit scam that Black Cat pulled, where they kept all of the ransom payment that Change Healthcare had made. Allegedly, Optum, which is a subsidiary of Change Healthcare, paid Black Cat 22 million in ransom after the attack. Black Cat then pulled an apparent exit scam and disappeared without paying the affiliate who carried out the attack. And according to Qualys Cyber Threat Director Ken Dunham, it's not uncommon for companies that give in and pay these ransoms to quickly become additional targets or soft targets where their information is extorted again and again and again. Paying and giving into these ransomware artists might seem like a quick fix to your problems, but once you've proven that you will and can pay, they're gonna come after you again. The data doesn't just disappear or get deleted. It's very valuable, and in this case it's worth 22 million dollars, so even if the attackers say they're gonna delete it, maybe they won't and maybe they'll come hit you again. So even though Black Cat has disbanded, whether or not they were taken down by the FBI or performed an exit scam, The data that they pillaged from Change Healthcare is now in the hands, or supposedly in the hands, of a group called Ransomhub, which is extorting Change Healthcare all over again. IT professionals have found themselves at the crosshairs of an ongoing malvertising campaign. These attackers are using malicious Google Ads to disguise malware as popular system utilities, like Putty, which is a free SSH IntelNet client. And FileZilla, which is a FTP application. This research comes from Malwarebytes researcher Jerome Segura, and he points out that even after alerting Google about these malicious ads, the campaign continues unabated. This sophisticated scheme begins when IT administrators search for these utilities on Google. The top search results, or sponsored ads, lead them through a series of cloaking pages. These pages are designed to filter out non target traffic such as bots or security researchers, directing only potential victims to imitation sites. Unwittingly, when these IT administrators download what they believe to be legitimate software, they instead receive nitrogen malware, which is a dangerous software for cybercriminals, enabling them to infiltrate private networks or steal data, deploy ransomware attacks, and was used by the notorious Black Cat from the previous story. The method of infiltration is known as DLL sideloading, which involves the malware masquerading as a legitimate and signed executable to launch a DLL, thereby avoiding detection. So what this essentially means is these IT professionals are probably getting the tool, FileZilla, Putty, that they're looking for, The functionality might remain exactly the same, which only serves to benefit the attackers because once the IT professionals download the software, there's no indicators that it's incorrect or fake, but this software such as Putty or FileZilla will then launch a separate DLL, which is just an executable that contains the malware. So one way you can prevent this as someone downloading software from the web, is to find what's called an MD5 hash, which is essentially a signature of sorts that verifies the integrity of the file you've downloaded. Now, hashing isn't necessarily something we need to get into, Right now on this podcast, but all you need to know is it's sort of like math where you multiply the data from within this piece of software or do algebra or something to create this long string of characters. that can't be replicated if the files have been altered. So as soon as the files are altered, the mathematical equation puts out a different set of characters, right? So the creators of the software release this hash, they display it on their website, and then when you download the software, you run the same algorithm against that software to see if those two hashes match. Now I personally am guilty of Not always checking the hash for softwares. And I know a lot of other IT professionals are guilty of that as well, but it's time to set up a new good habit and consistently check these hashes, maybe even develop a web scraper that will go grab the hash and also run the software through it, comparing it, reducing the amount of work you have to do on the other end, but in summary, as I always say, do not click Google ads unless you absolutely have to, unless the thing you're searching for down below. Unless the thing you're specifically searching for is not in the search results below, and is only present in the advertisement, which will probably only be for things like thedailydecrypt. com, where I haven't been around long enough to boost my search result ranking naturally, so eventually maybe I'll start buying ad space, trying to get to people who are looking for the content that we're providing. But if you're going to download some software, there's no need to click the ads, especially something as popular as FileZilla or PuTTY, VS Code, whatever you're trying to download, go find it in the search results. Do not click the ad. And in a similar vein, let's talk about a scam on GitHub that's fooling developers into downloading dangerous malware. Cybercriminals are exploiting GitHub's search features, luring users into downloading fake yet seemingly popular repositories. This scheme has been identified to distribute malware hidden within Microsoft Visual Studio Code project files, which are cunningly designed to fetch further malicious payloads from remote URLs, as reported by checkmarks. So the attackers are mimicking popular repositories and employing automated updates and fake stars to climb GitHub's search rankings. So unlike Google, I don't believe there are ads you can buy in GitHub search to boost your search rankings. So attackers are becoming a little more creative. Making the repository look like it's consistently updated, helps boost the search rankings, and then naming the repositories, things that developers are constantly searching for will also help boost its rankings in its SEO. So since many of these repositories are disguised legitimate projects, it can be pretty tricky to identify them, but among the discoveries, some repositories were found downloading an encrypted file named feedbackapi. exe. which is an executable and is notably large at 750 megabytes. This executable is designed to bypass antivirus detection and deploy malware, similar to the Kizetsu Clipper, a notorious tool known for hijacking cryptocurrency transactions. And unlike softwares downloaded from the internet by clicking on Google ads in the previous story, there may or may not be hashes for these repositories. Most likely not. Sometimes if they're an executable or a package, they'll provide a hash. But if you're on the GitHub repository, you think it's legit, they might list the hash, but that's just the hash to their malware, giving you a false sense of security, just be extra vigilant when you're downloading anything to your computer, especially open source things that are generally found on GitHub, it can't be that hard to create. A thousand GitHub accounts, or maybe even you can buy them online. And that immediately gives your repo a thousand stars, making it look legitimate. So if you're looking for a tool, it's best to find it on the web within, from within a reputable website. GitHub search feature is not the most reliable. And that's all I've got for you today. Thanks so much for tuning in. Today I'll be traveling to Florida to Participate in the Hackspace conference where I'm really excited to learn a little bit more about how cybersecurity and satellites and other spacecraft intertwine. I'll also be meeting up with dogespan where we'll hopefully do a joint episode, our first ever one in person. So be sure to tune in tomorrow for that episode.

hr4 Nord-Osthessen
Computerrettung im Hackspace in Fulda

hr4 Nord-Osthessen

Play Episode Listen Later Mar 25, 2024 2:17


C-RadaR
C-RadaR März 2024 – easterhegg, falscher Hase, Tag des offenen Hackspace

C-RadaR

Play Episode Listen Later Mar 17, 2024 119:59


00:32:24 Judith und Lea sind im Orga Team des diesjährigen Easterheggs, dem traditionellen Chaos Event über Ostern. 2024 findet dieser in Regensburg an der Ostbayerische Technische Hochschule statt und wird vom örtlichen Club, der Binary Kitchen, ausgerichtet. Nach der Bewerbung … Weiterlesen →

Click! Clack! Hack!

Hello Children of the Corne! Heute graben wir uns mal in KAILH ein. Ein Produzent von Switches an dem man nicht vorbeikommt, wenn einem Default MX Switches zu hoch und Staubanfällig sind. KAILH produziert aber auch andere Dinge wie Encoder und Hotswap Sockets. Also quasi die eierlegende Wollmilchsau. Außerdem sind es noch 2 wochen bis zur ersten CCH|CON und wenn ihr Lust habt einen Hackspace zu gründen gibt es auch was für euch. Viel Spaß damit!

Ruby for All
Live From Rubyconf 2023 — Conference Recap, Talk Highlights, Ruby 4, Hacking on OSS, Restaurant Reviews, and Much More

Ruby for All

Play Episode Listen Later Dec 7, 2023 22:56


Welcome to our first ever live episode of Ruby for All, where Andrew and Julie share their vibrant experiences from RubyConf in San Diego. Today, they share their excitement at attending a live conference and their interesting experiences, including their interaction with fellow attendees, sessions they attended, and community building activities they participated in. Also, there's conversations about open source coding, autonomous learning, the future of Ruby, leveraging podcasting within the Ruby community, and their expectations from the rest of the conference. Hit download now to hear more! [00:00:23] Andrew and Julie share their enjoyment of the conference and they discuss their discomfort with team building, with Andrew having a panic attack. [00:02:10] We hear about a new journal app on the iPhone that suggests memories based on places you've visited, and photos taken. [00:02:57] Julie details her experience on the first community day at the Hackspace, where she, Kevin and Drew, explored Ruby LSP (Language Server Protocol), a project from Shopify for better VS Code integration. [00:04:06] Andrew explains Heredocs, and Julie explains they encountered a bug related to a cursor positioning in the code editor while working on a feature for Heredocs.[00:05:46] Julie expresses her appreciation for the hack day format, allowing interaction with project maintainers and suggesting it be included in future conferences. [00:07:50] They give feedback for improving the hack day, such as better signage for project tables and ensuring equal attention venue positively.[00:10:12] The conversation turns to the conference's social aspects, like hanging out by the fire and the arrival of more attendees on Tuesday. They mention Matz's pre-recorded keynote and the opening ceremony. [00:11:24] Julie and Andrew share their thoughts on the opening ceremony.  Andrew clarifies they spoofed “The Wizard of Oz.” Julie notes the performance was unexpected and well-executed. [00:12:38] Andrew mentions that Matz had a pre-recorded keynote, and both Julie and Andrew were disappointed missing the memo that Matz wouldn't be there. Andrew summarizes the keynote mentioning Matz discussing Ruby's future, including Ruby 4.0 expected in 2030, and his plans for retirement. [00:14:00] Julie appreciates how Matz asked first-time conference attendees to raise their hands, demonstrating Ruby's vitality. Andrew and Julie spent time networking in the hallway rather than attending talks, emphasizing the value of personal connections.[00:15:07] They participated in a roundtable discussion about podcasting in the Ruby community that was sponsored by Ruby Central. [00:19:09] Andrew and Julie attended Saron Yitbareks' motivational keynote and Andrew mentions going to a talk on Rack, while Julie preferred hallway networking, planning to watch talk recording later. Panelists:Andrew MasonJulie J.Sponsors:HoneybadgerGoRailsLinks:Andrew Mason X/TwitterAndrew Mason WebsiteJulie J. X/TwitterJulie J. WebsiteHow To Use Heredoc in RubyRuby CentralSaron Yitbarek Rails on Rack (00:23) - Introduction and discomfort with team building (02:10) - New journal app on iPhone (02:57) - Experience on the first community day (04:06) - Heredocs and a bug encountered (05:46) - Appreciation for the hack day format (07:50) - Feedback for improving the hack day (10:12) - Conference's social aspects and opening ceremony (11:24) - Thoughts on the opening ceremony (12:38) - Matz's pre-recorded keynote and Ruby's future (14:00) - Value of personal connections (15:07) - Roundtable discussion about podcasting (19:09) - Attending Saron Yitbarek's keynote and other talks

hr4 Nord-Osthessen
Zu Besuch im Hackspace "Magrathea Laboratories" in Fulda

hr4 Nord-Osthessen

Play Episode Listen Later Aug 23, 2022 2:30


Die "Magrathea Laboratories" sind ein sogenannter "Hackspace" - heißt: dort treffen sich technikbegeisterte Menschen um gemeinsam in die Welt des Hackens abzutauchen. Aber was genau ist Hacken? Und sind das wirklich so "Nerds", wie oft angenommen? Kathinka Mumme besucht den einzigen Osthessischen Hackerclub und forscht nach.

The Lock Sportscast
77: LOTO Key Systems, First picks and YouTube shenanigans

The Lock Sportscast

Play Episode Play 26 sec Highlight Listen Later Nov 22, 2021 37:56


Your weekly source for locksport news and sometimes interviews. Full show notes, including links, can be found at http://www.thelocksportscast.com  In this week’s episode: First public of the Fichet bauche m2i First public pick to control of the ALC BiLock Exclusive  Starrylock's channel was removed again! Then reinstated, again! LOTO Key systems Largest Lock in the world The Traveling Impressioning box The Day Solitaire Dies Crazy lock story Criminals  Meetups Sales Giveaways And more Announcements: Newpodcastapps.com The Locky Awards – Locksport Community Awards  Corrections: News: Locksmiths Are Tightening Security Measures Following The Rise Of Key Fob Thefts In Hardest Hit Areas HackSpace magazine issue 49 largest lock in the world Community News: (ENG-234) Lockpicking - Picking and gutting the black belt Fichet Bauche M2i / M2b safe lock [10] [Public First] ALC BiLock Exclusive Picked to Control & Gutted Starrylock (44) The Traveling Impressioning box Looking for left handed pickers Brummies Corbin #Pickmycorbin  Videos: November 24th 2021 “The Day Solitaire Dies” ⚠️ Keynote - LockPickingLawyer Abus Integral - parts presentation and reassembly Meetups: Products: LPU Karate Belts: beltranking - lockpicking (reddit.com)  Mentorship Monday 3: The Belt System  2: Breaking Rules and Getting the Belt  All About The Lockpicking Belt Rankings System  Speedlocks: Speedlocks.org  Locksmith Story: Stories  Lock Story: Hackers Testing Iowa Courthouse Security Sue Sheriff for False Arrests  Criminals: UAE: Masked gang given a year in jail for stealing Dh20,000 Woman, 34, booked on drug charges after telling Weber County deputy she was 15  Sales: https://masterlocks.com/collections/surplus-sale  www.mattslockpit.com https://www.thinkpeterson.com/ Closeout on High Duro picks https://www.3dlocksport.com/ 10% off. CODE: LSCAST10 https://makolocks.com/ 15% off with code BUYMAKO Unknown exp https://uklockpickers.co.uk/ 10% off with code GIFT Giveaways and Contests: Jon Lock Jon Lock’s 300 Subscriber Give Away Celebration #JonLock300 (UPDATE: don’t put URLs in comments) Panda-Frog (ENG-236) Lockpicking - Giveaway entry for #PickinRick100 and an announcement for a little Contest  (ENG-232) Lockpicking - Giveaway #SpeedAbus and Speedpicking the Abus 65/20 FroggyPicker (52) One year give-away #OneYearFroggy  DoctorHogmaster [132] DoctorHogmaster's #sesquicentscriber pick a lock "wrong" giveaway of dimple picks and locks  CLK Supplies Introducing #Lockboss Free Giveaway! Do you work with Locks & Keys or do Locksmithing?  Executive Producer:  beechgrovejoe Founding Executive Producers: Panda-Frog Michael Gilchrist Starrylock WilliamsBrain  Dave 2BDCy4D Liibans Locksport Journey Pat from Uncensored Tactical  threeraccoonsinacoat  Chirael Associate Executive Producers: Patty--cakes DoctorHogmaster Clayton Howard (Kewltune) Co-Producers: m0g Jon Lock Ratyoke MrPickur CrankyLockPicker RealTaiter JHPpicking Chief Content Producer: Chirael Content Producers: Artichoke 2000  Clayton Howards (Kewltune)  CrankyLockPicker  FroggyPicker  Gilligainz  I fisk  Jon Lock  Joshua Gonzalez  Michael Gilchrist  MrBlack-Magic  Panda-Frog  Pocket Women  RealTater  Starrylock  Tony Virelli Special thanks to: Contact Information: Email: podcast@thelocksportscast.com Twitter https://twitter.com/charlescurrent  Reddit: currentc57 on r/locksport Discord: Lockpickers United as Current, Extraordinary League of Pickers as Current, The Lock Sportscast as Current Join the Discord at http://discord.thelocksportscast.com Donate: http://paypal.thelocksportscast.com https://patreon.com/thelocksportscast Lock Sportscast Clips The Lock Sportscast on Odysee

The Lock Sportscast
73: UWB for Locks and Making DIY Tools

The Lock Sportscast

Play Episode Play 18 sec Highlight Listen Later Oct 25, 2021 36:28


Your weekly source for locksport news and sometimes interviews. Full show notes, including links, can be found at http://www.thelocksportscast.com  In this week’s episode: What is UWB? Unlocking your car with Android and iPhone Picking and hacking smart locks Linear's 222343 key Some locksport tools you can make yourself Products Meetups Lock picking criminals Sales Giveaways And more Announcements: Newpodcastapps.com The Locky Awards – Locksport Community Awards  Corrections: News: Android will get an answer to Apple AirTags. Here's how UWB location tech works You might be unlocking your car with Android 12 sooner than you'd think Apple reportedly plans to use iPhone to control vehicle functions It’s Ridiculously Easy to Pick Some Smart Deadbolts, But We Aren’t Alarmed How I Can Unlock Your Smart Door: Security Pitfalls in Cross-Vendor IoT Access Control Black Hat Asia 2021 Trainings | Briefings Schedule  The prospect of a speedy real estate deal compounds some Surfside families’ grief  Community News: Better Call Dave https://twitter.com/R0brBun7/status/1451034189462007808 https://twitter.com/concreted0g/status/1451469671086149659 HackSpace magazine issue 48  Videos: SAINTCON [56] Cheap and easy Impressioning Handle and my first impressioning experience (176) Hybrid 2 in 1 Lever Lock Picks For Under £5 Pick wires and the process  Meetups: Physical Intrusion Workshop | Alexandre Triffault LockpickAR Space  MLA Expo 2021 - UK & Europe's Largest Locksmith Exhibition (FREE ENTRY). Lock Camp  Products: https://twitter.com/virelli/status/1451480302199660548 A Field Expedient Pak-A-Punch?  Dangerfield Nano SLIMLINE Lock Pick Rake set Covert EDC + Leather wallet  LPU Karate Belts: beltranking - lockpicking (reddit.com)  Mentorship Monday 3: The Belt System  2: Breaking Rules and Getting the Belt  All About The Lockpicking Belt Rankings System  Speedlocks: Speedlocks.org  Locksmith Story: Police: Burglar gets new keys before she's locked up  Strange Lock Story: Criminals: Police charge man in attempted theft from coin-operated machines  Sales: www.mattslockpit.com https://www.redteamtools.com/ 10% off in Oct. code RedTeamOctober  https://www.thinkpeterson.com/ 20% off $50 or more code L8770022R https://www.3dlocksport.com/ 10% off. CODE: LSCAST10 https://makolocks.com/ 15% off with code BUYMAKO Unknown exp https://uklockpickers.co.uk/ 10% off with code GIFT Giveaways and Contests: Joe Picks  [27] Purple Belt and 100 Subscriber (Almost) Giveaway #JoePicksDoubleGiveaway  DoctorHogmaster  [132] DoctorHogmaster's #sesquicentscriber pick a lock "wrong" giveaway of dimple picks and locks  CLK Supplies  Introducing #Lockboss Free Giveaway! Do you work with Locks & Keys or do Locksmithing?  Executive Producer:  Founding Executive Producers: m3ddl3r Panda-Frog Michael Gilchrist Starrylock WilliamsBrain  Dave 2BDCy4D Pat from Uncensored Tactical  PHpicker  threeraccoonsinacoat  Chirael Associate Executive Producers: Patty--cakes DoctorHogmaster Clayton Howard (Kewltune) Co-Producers: m0g Jon Lock Ratyoke MrPickur CrankyLockPicker RealTaiter JHPpicking Chief Content Producer: I fisk Content Producers: Chirael DoctorHogmaster Good Guy @BandEAtoZ I'm Gumby Jeff and things Joe Picks Joshua Gonzalez maxval Michael Gilchrist Panda-Frog Tony Virelli Special thanks to: Contact Information: Email: podcast@thelocksportscast.com Twitter https://twitter.com/charlescurrent  Reddit: currentc57 on r/locksport Discord: Lockpickers United as Current, Extraordinary League of Pickers as Current, The Lock Sportscast as Current Join the Discord at http://discord.thelocksportscast.com Donate: http://paypal.thelocksportscast.com https://patreon.com/thelocksportscast Lock Sportscast Clips The Lock Sportscast on Odysee My Monthly Giveaway Rules: I’m giving away one of my custom PacLock 100A padlocks or a gift card every month.  To be entered, you must: 1.Provide me with locksport or locksport community news that I can use on my weekly podcast. -Submit your news via one of the following: +Email: podcast@thelocksportscast.com +Reddit: currentc57 on r/locksport +Discord: You can find me on the following servers as “Current” ~Lockpickers United  ~Extraordinary League of Pickers  ~CBC -You will receive 1 entry for each news item I use in the podcast that month. 2.Share the podcast on social media -Make sure I know about it by tagging me and/or emailing me a screenshot or other proof. The winner will be drawn and announced the following month. The winner will have 1 week to contact me to claim the prize. I will pay for shipping within the U.S. If you live outside the U.S., you can still enter, but must pay to ship if you win. I reserve the right to change these rules as I need to during the course of the year. I reserve the right to disqualify anyone for any reason. My decisions are final. This giveaway is a thank you to the subscribers that watch my videos, listen to my podcast, and help me produce it. YouTube, Fireside.fm, PacLock and other entities are in no way partners to this contest, and all applicants agree to release them from any and all liability related to this contest. Personal data collected as a part of this contest will be used only for the purposes of this contest and will not be released to third parties. Any entries that violate YouTube's community guidelines will be disqualified: http://www.youtube.com/t/community_guidelines 

Der Lila Podcast. Feminismus aufs Ohr.
Revenge Porn - Machtmissbrauch durch Rachepornografie und was man dagegen tun kann

Der Lila Podcast. Feminismus aufs Ohr.

Play Episode Listen Later Oct 7, 2021 45:04


Shoko Bethke im Interview mit Maja ReuterSolange die Verliebtsein-Phase bestehen bleibt, ist in der Regel das Austauschen von Fotos kein Problem. Wenn es aber zur Trennung kommt, kann es für eine der beiden Parteien bittere Folgen haben: dass sie nämlich Opfer von Rachepornographie wird.Shoko Bethke spricht in dieser Folge mit der Rechtsanwältin Maja Reuter über das Phänomen Rachepornographie, auch bekannt unter dem englischen Begriff Revenge Porn. Dabei handelt es sich um intime Fotos und Videoaufnahmen (manchmal auch Screenshots von Texten), die nach einer Trennung als Druckmittel, Machtmissbrauch oder Rache gegen den eigenen Willen im Internet und Gruppenchats verbreitet wird.Maja beantwortet Fragen wie, wer am meisten davon betroffen ist, welche rechtlichen Schritte notwendig sind wenn man davon betroffen ist, und wie man möglichst vorbeugen kann, damit man nicht von Rachepornographie betroffen wird.Links und HintergründeInfoseite der Anwaltskanzlei FeuerhakeMonis Rache und Fusion FestivalAnna nackt (Hilfsplattform)Missy Magazine: Nur Pornografie ist PornografieNetzpolitik: Safe Space Grrrls – Heart of Code & Netzforma* –Feminismus im Hackspace & in der NetzpolitikUnterstützt den Lila Podcast:bei steady.fm/Lila-Podcastoder auf anderen Wegen (Patreon, PayPal, usw.)Lila Podcast bei Apple Podcasts abonnieren und bewertenDem Lila Podcast bei Twitter folgenLila Podcast bei Instagram folgenVielen Dank! See acast.com/privacy for privacy and opt-out information.

CLAMP
Episode 65 - Is Print Media Dead?

CLAMP

Play Episode Listen Later Aug 9, 2021 60:40


This week, Adam, Grant and Morley talk about the future of media.Support the show on Patreon: https://www.patreon.com/CLAMP What's in our clamps this week:Adam: Building a deckHalf a CNCGrant: 90 percent done the trailerAwning bag sewing projectFigured out youtube recommendation problemsMorley: Tiled plywood fountainToilet seat fix and Fusion 360 tutorialFeatured in Hackspace magazine  Mentions:Because We MakeAndy PughDune by Frank Herbert (affiliate link)Proper Tools PodcastSidemenOzzy ManDean DuplantisOur Clampmendations for this week:Adam  -   CasefileGrant - Dragon Knight Chess Piece - A Weird Guy Morley -  How to cultivate curiosity and interest for a more creative life by Mihaly CsikszentmihalyiThank you to our top patrons:Tripp SouthernJarrad JenkinsScott Oram from Dad It Yourself DIYBig thanks to TFTurning for the awesome theme music!Where you can find usAdam - @makermackey on Youtube and Instagram and at makermackey.comGrant - @thegrantalexander on Youtube and Instagram and at thegrantalexander.comMorley - @morleykert on Youtube and Instagram, and at morleykert.comCollectively - @clampcast on Instagram , @theclampcast on Twitter, on  YouTube and at clampcast.com!THANK YOU FOR LISTENING, AND KEEP CLAMPING!!Support the show (https://www.patreon.com/CLAMP)

Embedded
355: Favorite Ways to Make Noises

Embedded

Play Episode Listen Later Dec 11, 2020 68:38


Helen Leigh (@helenleigh) joined us to talk about music, electronics, books, and starting a new job at CrowdSupply (@crowd_supply). Helen was previously on Embedded #261: Blowing Their Fragile Little Minds where we talked about subversive geography, her book The Crafty Kid's Guide to DIY Electronics, and the mini.mu musical gloves. Helen has a book coming out in 2021 about DIY Music Tech including a soft version of the Michel Waisvisz' CrackleBox (Kraakdos). Check out some of the projects in HackSpace magazine issue 36 and 37 (the book will be serialised in HackSpace). Or look on YouTube for some examples of Helen’s purring tentacle and her circuit sculpture harp. Helen mentioned Bunnie Huang’s Precursor, an open mobile phone, on CrowdSupply (campaign ending shortly). The Giant German Congress mentioned is the CCC Congress Festival Helen’s preferred thread (the one you can actually get) is Madiera’s conductive threads. Hit the contact link for purchasing. (Helen notes you can use it for both sides in a sewing machine!)  

guide embedded noises precursor madiera hackspace crowd supply bunnie huang
Retro Game Club
Olympic Summer Games, Dungeon Explorer - Nintendo 3DS Discontinued

Retro Game Club

Play Episode Listen Later Sep 30, 2020 67:45


Season 2 Episode 31 Episode 63 News: Could The House of The Dead Remakes Be Coming To Stadia Trent Reznor Announces Quake Soundtrack Is Getting The Vinyl Treatment ArcadeTV’s MSU-MD Project CONTROLLING A BROKEN SUPER NINTENDO WITH MIDI MSXDev’20 final results Did You Know That GoldenEye Had A Dual-Analogue Control Option On N64? Romhack - Thy Flesh Consumed 32x Now you can program an Atari 8-bit via Twitter Arcade1Up’s Latest $399 Cabinet Features SEGA Games For the First Time Build an arcade cabinet | Hackspace 35 New Sonic 30th Anniversary gear from Funko Pop! + Encyclo-speed-ia book, more Konami Releases Old Metal Gear, Castlevania, and Contra Games on GOG Unintentional Mario Segment Yoshi's Bare Feet Revealed In 1998 Super Mario World Activity Book  Now Super Mario 64 Is Running On A Sega Dreamcast Naughty Game Starring Princess Peach Hit With Nintendo Copyright Complaint Here's Super Mario World running on a PC from the 1980s Super Mario Bros. 2 - Super Heroes Edition. Hacker Uses LEGO Mario to Play Super Mario Bros   Topic:  Nintendo 3DS Discontinued   Game Club Discussion: Summer Games or Olympic Summer Games Dungeon Explorer   New Game Club Games: Nightmare In The Dark (Neo Geo) Super Mario Bros 2   Music By: I Love Lightning Bugs   Game Club Master List

Art + Music + Technology
Podcast 339: Jean-Baptiste Thiebaut (Music Hackspace)

Art + Music + Technology

Play Episode Listen Later Sep 27, 2020 38:26


Jean-Baptiste Thiebaut is someone I have had the chance to work with at Cycling, and has been on an amazing journey. JB’s background is quite amazing, combining a background in computer science with advanced research in computer-aided composition. He then entered the MI industry – working at Novation/Focusrite in product development, then directing product development at ROLI. Through all of that, he founded and nurtured the London-based Music Hackspace, a place for music hackery to thrive. When the COVID pandemic hit, JB decided to expand the reach of Music Hackspace to include industry expert presentations and a wide variety of workshops and tutorials. The breadth of it is quite impressive, ranging from hardware hacking on ‘musical pom-poms’ to tweaky Node for Max workshops. Lots of different technologies, and a steady stream of interesting work. If you are interested in checking out the Hackspace’s lineup, you can find out more at the ‘What’s On’ list (https://musichackspace.org/whatson_list?). Are you interested in teaching a music or art technology workshop? Contact JB and crew at curators@musichackspace.org. Enjoy!

Feminismus und Computer Kram

Wir haben uns nen Hackspace gemakert

hackspace
Adafruit Industries
Maker Update 195: Drum Break!

Adafruit Industries

Play Episode Listen Later Sep 1, 2020 7:32


Drum Break! [Maker Update #195 *Adafruit Edition*] This month on Maker Update, a 3d printed drummer, Adafruit at the newsstand, going live, a voting calendar, an eyeball shootout and a panic button for all your Zoom calls. ++Show Notes [Maker Update #195 *Adafruit Edition*]++ -=Project of the Month=- Solenoid Drum Kit https://learn.adafruit.com/midi-solenoid-drum-kit -=News=- HackSpace 34 - the story behind feather https://blog.adafruit.com/2020/08/23/adafruit-weekly-editorial-round-up-august-16-22-feather-on-the-cover-of-hackspace-backtoschool-an-rgb-matrix-clock-and-more/ Make: vol 74: Python on Hardware https://www.adafruit.com/product/4717 CircuitPython Day: 9/9/2020 https://blog.adafruit.com/2020/08/27/circuitpython-day-9-9-2020-join-in-the-activities-circuitpythonday-circuitpython-python-adafruit/ -=Adafruit Projects=- Automatic On-Air Sign https://learn.adafruit.com/rgb-matrix-automatic-youtube-on-air-sign Lego Neon NeoPixel Sign https://learn.adafruit.com/lego-neon-sign DIY Robotic Sky Tracking Astrophotography Mount https://learn.adafruit.com/diy-robotic-sky-tracking-astrophotography-mount/parts-and-tools PyRuler Video Chat Panic Button https://learn.adafruit.com/PyRulerVideoPanic -=Contributed Projects=- PyPortal voting calendar https://learn.adafruit.com/pyportal-electioncal-us -=Tools/Tips=- EYE SHOOTOUT: Contrasting Open Source and Big Retail Electronics https://learn.adafruit.com/eye-shootout-contrasting-open-source-and-big-retail-electronics Raspberry Pi HQ Camera Lenses https://learn.adafruit.com/raspberry-pi-hq-camera-lenses Adafruit MicroSD SPI or SDIO Card Breakout Board https://learn.adafruit.com/adafruit-microsd-spi-sdio -=Product Spotlight=- Adafruit SHARP Memory Display Breakout https://www.adafruit.com/product/4694 ----- #makerupdate Maker Update is a weekly video series covering news, projects, tips, and events that interest the maker and DIY community. Find more online: Blog: http://makerprojectlab.com Facebook: http://fb.me/makerprojectlab Instagram: https://www.instagram.com/makerprojectlab/ Send snail mail to: Maker Project Lab PO Box 1016 Alameda, CA 94501 ----- TAGS: Drum, Solenoid, Actuator, Kit, Hackspace, Sign, Lego, Neon, Neopixel, Robotic, Sky Tracking, Astrophotography, PyRuler, Video Chat, Button, PyPortal, voting, calendar, Open Source, Raspberry Pi, Camera, Lens, SPI, SDIO, Sharp, Display, Memory, Breakout, DIY, Maker, Electronics, Project, Soldering, Robotics, Microcontroller, Code, CircuitPython, Making,Inventing, Python, Hardware, Adafruit, 3D Printing, computer, design, fabrication, circuits, Learning, STEM, STEAM, program, Engineering, Programming, Engineer, Interaction, Interface, Tools ----------------------------------------- Visit the Adafruit shop online - http://www.adafruit.com ----------------------------------------- LIVE CHAT IS HERE! http://adafru.it/discord Adafruit on Instagram: https://www.instagram.com/adafruit Subscribe to Adafruit on YouTube: http://adafru.it/subscribe New tutorials on the Adafruit Learning System: http://learn.adafruit.com/

Request for Comments
RFCE019: Glasfaser I

Request for Comments

Play Episode Listen Later May 18, 2020 146:27


Das Thema Glasfaser hat Clemens mitgebracht, da Material und Hardware preislich mittlerweile für den Heimgebrauch oder für den Hackspace echt erschwinglich sind. Wenn man dann noch auf Kabelfarbe, Steckertyp und Farbcodierung achtet, klappt das auch mit dem Ethernet über Lichtwellenleiter.

Show and Tell
SHOW and TELL 3/18/2020

Show and Tell

Play Episode Listen Later Mar 17, 2020 68:32


To show and share your project at 7pm today, view the chat or in discord https://adafru.it/discord and look for the JOIN link to join. For best results be on a wired connection and have a headset and mic! ________________________________________________________________________ Kevin from Digi-Key @2:15 - Iron Man helmet Ben from Hackspace @5:30 - April Hackspace JP @11:17 - 3D printed plant watering robot Noe & Pedro @15:30 - keytar Kattni @17:30 - neopixel christmas star Anne @19:52 - Crikit-bit demo Dan @21:50 - circuit python bluetooth BBQ temperature probe Brian @24:50 - DS1841 temperature compensated control resistor Bill @26:38 - 3D printed solar box and assistive makes Crow @35:47 - synthesizer Mike & Emily @40:32 - 3D printed car phone holder Jay @42:13 - Cyberdeck, CLUE GPS, modular Pi enclosure Drew & Helen @49:00 - open source hardware badge, twitch soldering Erin @51:35 - LED staff DesiPoo @52:58 - circuit python pew pew boards Timon @55:46 - USB soldering iron, reworking feather Lenore @58:01 - open hardware badges Leon @1:00:10 - augmented reality tool for boards Techniac @1:01:05 - first challenge robot Brian @1:02:00 - magnetic do not disturb feather huzzah neopixel Orlando @1:02:45 - remote electronic workshops Mohib @1:04:08- webRTC telepresence robot Phil B. @1:06:00 - Feather NRF52 LED matrix library Colin @1:06:47 - Clue idea generator

Adafruit Industries
Maker Update 163: While my BLE Gently Weeps

Adafruit Industries

Play Episode Listen Later Mar 1, 2020 7:50


While my BLE Gently Weeps [Maker Update #163] *Adafruit Edition* This week on Maker Update, a chonker synth, glowing glass, spinning cycles, assistive tech, cyberpunk, and how to build a testing jig. Show Notes [Maker Update #163] -=Project of the Month=- BLE Synth & Amp https://learn.adafruit.com/ble-synth-with-the-feather-nrf52840-and-circuit-playground-bluefruit -=News=- Square Inch Circuitpython https://blog.oshpark.com/2020/02/23/circuitbrains-deluxe-packs-circuitpython-into-1-square-inc/ What is Cyberpunk https://blog.adafruit.com/2020/02/24/what-is-cyberpunk-cyberpunk/ -=Adafruit Projects=- Four Seasons Fairy Bottle Lanterns https://learn.adafruit.com/four-seasons-fairy-bottle-lanterns https://learn.adafruit.com/tree-ent-sculpture-with-animated-eyes John Park's Pyloton https://learn.adafruit.com/bluetooth-bicycle-speed-cadence-sensor-display-with-clue LED Neopixel Heart Necklace https://learn.adafruit.com/neopixel-led-heart-necklace -=Contributed Projects=- Circuit Python Sip & Puff https://learn.adafruit.com/st-lps33-and-circuitpython-sip-and-puff -=Tools/Tips=- Hackspace U.S. Subscription half-off https://hsmag.cc/mpl Introducing Adafruit CLUE https://learn.adafruit.com/adafruit-clue Clue Case https://learn.adafruit.com/clue-case How to make a testng fixture https://learn.adafruit.com/how-to-build-a-testing-fixture/solder-pogo-pins Circuitpython Measures up https://github.com/vifino/CircuitPython-mitutoyo -=Product Spotlight=- Feather NRF52840 Sense https://www.adafruit.com/product/4516 ----- #makerupdate Maker Update is a weekly video series covering news, projects, tips, and events that interest the maker and DIY community. Find more online: Blog: http://makerprojectlab.com Facebook: http://fb.me/makerprojectlab Instagram: https://www.instagram.com/makerprojectlab/ Visit the Adafruit shop online - http://www.adafruit.com ----------------------------------------- LIVE CHAT IS HERE! http://adafru.it/discord Adafruit on Instagram: https://www.instagram.com/adafruit Subscribe to Adafruit on YouTube: http://adafru.it/subscribe New tutorials on the Adafruit Learning System: http://learn.adafruit.com/ ----------------------------------------- TAGS: BLE, Bluetooth, Synth, Synthesizer, Circuit Python, lantern, bicycle, cyberpunk, Neopixel, Sip & Puff, CLUE, Hackspace, NRF52840, DIY, Maker, Electronics, Project, Soldering, Robotics, Microcontroller, Code, Making, Inventing, Hardware, Adafruit, 3D Printing, computer, design, fabrication, Kinetic, circuits, Learning, STEM, STEAM, program, Laser Cut, Engineering, Programming, Engineer, Interaction, Interface, Tools

Adafruit Industries
LIVE CHAT! HackSpace Magazine chat on Wednesday, Feb 19th at 1pm ET!

Adafruit Industries

Play Episode Listen Later Feb 18, 2020 30:34


HackSpace - The monthly magazine for the modern maker, HackSpace magazine will inspire you to dream bigger, and build better. 132 pages - make, build, hack and create AND we're talking to them on Wednesday, Feb. 19th at 1pm ET! Join us LIVE! as we chat with Ben Everard, editor of HackSpace magazine, about the latest issue, and their new exclusive US subscription offer. The pricing is $60 for 12 issues of the magazine, including a Circuit PlayGround Express ($25 value). That is a 67% discount compared to buying from newsstand AND you get the incredible Circuit Playground Express! https://hsmag.cc/adafruit

live magazine live chat hackspace circuit playground express
Jörn Schaars feiner Podcast
JSFP249: Ausgeheizt

Jörn Schaars feiner Podcast

Play Episode Listen Later Nov 24, 2019 28:28


Ich war in dieser Woche gleich zwei Mal in Flensburg: Einmal, um einen Hackspace zu beschnuppern und einmal für einen Vortrag, von dem ich noch nicht genau weiß, was ich davon halte. Außerdem spreche ich über neue Heizungsprobleme und viel Betrieb im Podcastzimmer, sowie über Podimo und den Deutschen Podcastpreis. Und ich freue mich schon enorm auf das Podruhr und die re:publica 20, für die ich dank meiner deutlich besseren Hälfte tatsächlich noch ein Ticket bekommen habe.

icqpodcast's Amateur / Ham Radio Podcast
ICQ Podcast Episode 311 - Pocket Electronic Workshop

icqpodcast's Amateur / Ham Radio Podcast

Play Episode Listen Later Nov 10, 2019 73:44


In this episode, Martin M1MRB is joined by Leslie Butterfield G0CIB, Edmund Spicer M0MNG, Dan Romanchik KB6NU and Ruth Willet KM4LAO to discuss the latest Amateur / Ham Radio news. Colin M6BOY rounds up the news in brief and this episode’s feature is Pocket Electronic Workshop. ICQ AMATEUR/HAM RADIO PODCAST DONORS We would like to thank Joey Ferguson (W4JF) and our monthly and annual subscription donors for keeping the podcast advert free. To donate, please visit - http://www.icqpodcast.com/donate - AM Amateur Radio Europe announce the AM QSO Party 2020 - HackSpace magazine Antenna Article - West Point Cadets use Amateur Radio to Contact ISS - Build a Long-Distance Data Network using Ham Radio - FCC Asked to Clarify Amateur Rules Governing Encrypted or Encoded Messages - New Arkansas Beacon on Air - Saudi Arabia and Seychelles join IARU - Irish Digital Radio Stations to Close

Cool Tools
198: Gareth Branwyn

Cool Tools

Play Episode Listen Later Nov 1, 2019 32:49


Our guest this week is Gareth Branwyn. Gareth has been writing about DIY technology, media, and culture for over three decades. He's a former senior editor of Boing Boing, a founding contributing editor to Wired, and the former editorial director of Make: Magazine. He's the author of 10 books, including his most recent, Tips and Tales from the Workshop. He currently regularly writes for HackSpace, Boing Boing, and Better Humans. He's currently writing a book about his life-long obsession with William Blake. He also has a weekly newsletter called: Gareth’s Tips, Tools, and Shop Tales. You can find him on Instagram @garethbranwyn. For show notes visit: https://kk.org/cooltools/gareth-branwyn-writer-and-editor

Adafruit Industries
Maker Update: Flip-Out [Maker Update 134] @makerprojectlab @adafruit edition!

Adafruit Industries

Play Episode Listen Later Jul 31, 2019 6:27


Visit the Adafruit shop online - http://www.adafruit.com This week on Maker Update, a flip-out mic for your machine learning pocket project, a shark mask that moves when you talk, a light-up sound board, adding Neopixels to a backpack, and the Circuit Playground Proto Gizmo. Get Maker Update weekly emails (w/bonus links!) http://eepurl.com/cCJF21 Show Notes -=Project of the Month=- PyBadge Case with Flip Out Mic by Ruiz Brothers https://learn.adafruit.com/pybadge-case-with-flip-out-mic TensorFlow Lite for Microcontrollers Kit Quickstart by lady ada https://learn.adafruit.com/tensorflow-lite-for-microcontrollers-kit-quickstart TRIPLE WORD reconfigurable TensorFlow Lite models! https://blog.adafruit.com/2019/07/19/triple-word-reconfigurable-tensorflow-lite-models-adafruit-tensorflow-tensorflowlite-machinelearning-arduino-microchipmakes/ More examples on GitHub https://github.com/adafruit/Adafruit_TFLite_Micro_Speech/tree/master/examples/micro_speech_json -=News=- Pete Warden from Google, Tensorflow, on Ask an Engineer https://blog.adafruit.com/2019/07/24/ask-an-engineer-7-24-19-live-special-guest-pete-warden-petewarden-machinelearning-tensorflow-tinyml-tensorflow-askanengineer-adafruit-electronics/ Circuit Python gets 10 out of 10 in Hackspace magazine https://blog.adafruit.com/2019/07/19/a-speedier-circuitpython-gets-10-out-of-10-in-the-latest-issue-of-hackspace-magazine-hackspacemag-circuitpython-adafruit/ -=Adafruit Projects=- Sound Activated Shark Mask by Dano Wall https://learn.adafruit.com/sound-activated-shark-mask NeoTrellis Sound Board by Ruiz Brothers https://learn.adafruit.com/neotrellis-soundboard Playa Festival Bike by Erin St. Blaine https://learn.adafruit.com/playa-festival-bike/overview -=Contributed Projects=- LED dog collar with JavaScript by Stephanie Nemeth https://medium.com/@secretsquirrel/i-made-a-led-dog-collar-with-javascript-1c10ff973550 Monster Box by mendukt https://www.thingiverse.com/thing:3633968 -=Tools/Tips=- New Hallowing Coming Soon https://blog.adafruit.com/2019/07/23/100-days-to-halloween-time-to-make-a-hallowing-m4-adafruit-halloween/ Coming soon! Circuit Playground Bluefruit - Bluetooth Low Energy https://www.adafruit.com/product/4333 Low cost accelerometer demo by Lady Ada https://blog.adafruit.com/2019/07/21/trying-out-the-ultra-low-cost-20-cents-msa301-accelerometer-with-the-arduino-plotter-arduino-sparkfun/ Adding Neopixels to a Backpack by BlitzCityDIY https://www.youtube.com/watch?v=Sa4SL32ICHs -=Product Spotlight=- Circuit Playground Proto Gizmo Bolt-on Perma-Proto https://www.adafruit.com/product/4320 --------- Maker Update is a weekly video series covering news, projects, tips, and events that will interest the maker and DIY community. Find more online: Blog: http://makerprojectlab.com Facebook: http://fb.me/makerprojectlab Instagram: https://www.instagram.com/makerprojectlab/ ----------------------------------------- LIVE CHAT IS HERE! http://adafru.it/discord Adafruit on Instagram: https://www.instagram.com/adafruit Subscribe to Adafruit on YouTube: http://adafru.it/subscribe Join our weekly Show & Tell on G+ Hangouts On Air: http://adafru.it/showtell New tutorials on the Adafruit Learning System: http://learn.adafruit.com/ -----------------------------------------

google blog diy flip javascript backpack tensorflow adafruit hackspace g hangouts on air adafruit learning system neopixels maker update
Bricolagepod
Bricolage Podcast Episode: 11 Mark Mellors

Bricolagepod

Play Episode Listen Later Jun 22, 2018 55:07


In this episode I chat with Mark Mellors who is a prolific maker and a familiar name in the British maker and hacker scene.  We specifically talk about: Jelley & Marshmallows http://jellyandmarshmallows.co.uk collaborations with Simon Jelley Derby Mini Maker Faire 2012 https://makerfairederby.com/ Hitchin Hackspace http://hackhitchin.org.uk/ Alex Palforman-Brown https://twitter.com/APalfremanBrown Founder of Hack Hitchin Makevember Manifesto #Makevemeber hashtag Renovation at Hitchin Hackspace Cruft https://en.wikipedia.org/wiki/Cruft EMF Camp https://www.emfcamp.org/ Nottingham Hackspace http://nottinghack.org.uk/  Dominic has a rant about the frustration of volunteer labour Hitchin Hackspace is a former public toilet  Hack All The Spaces Podcast, defunct podcast project with Dominic & Kate @katemonkey now lost in the mists of time Pareto's Law https://en.wikipedia.org/wiki/Pareto_principle Male to Female ratio in Hackspaces Mark & Dominic attempt to check their privilage Red Rabbits https://twitter.com/matingslinkys Lapin Luminare Inflatable RGB IoT Rabbit   Projects for EMF 2018 Hacky-Races at EMF 2018 http://hackyracers.co.uk/ Power Racing Series USA http://www.powerracingseries.org/ Donald Bell of Maker Project Lab see Episode.3  Laminar Flow Fountain  Robot Wars UK https://www.bbc.co.uk/programmes/b0873k9n The challenges of getting a robot onto Robot Wars Battle Bots https://battlebots.com/ Robert Berwick https://twitter.com/robberwick & Robert Kapinsky  BigHak https://twitter.com/thisisbighak Richard Sewell "Unsuitable Materials" #Makevember https://twitter.com/jarkman/status/935268956813905921 MarkMellors.co.uk http://markmellors.co.uk/   For hyperlinked version visit bricolage.run

re:publica 18 - Alle Sessions
Oh no, Cupid: Wieso dein Tinderwunsch bisher nicht in Erfüllung gegangen ist

re:publica 18 - Alle Sessions

Play Episode Listen Later May 3, 2018 22:28


Tabea Glindemann Jeden Tag wird auf Tinder 1,6 Milliarden (!) Mal hin- und hergewischt. 26 Millionen Matches entstehen daraus täglich. Durchschnittliche Nutzer*innen verbringen 35 Minuten mit der Plattform – und wenn man bedenkt, dass erstaunlich viele Menschen nur auf der Toilette tindern, dann müssen andere da echt krass lang drauf rumhängen. Seit ich bei der Heart of Code (einem feministischen Hackspace in Berlin) aktiv bin, ist außerdem mein Bewusstsein dafür gestiegen, dass alle Plattformen, also auch Datingplattformen, alle Daten, die sie bekommen können, speichern. Also mache ich das auch und habe mittlerweile ein, je nach Perspektive, lustiges oder echt gruseliges Repertoire an Profiltexten oder Nachrichten (anonym) an mich gesammelt. Davon möchte ich die ein oder andere vorstellen und anhand dessen Ideen präsentieren, wie Onlinedating für mich weniger stressig und für alle anderen viel zielführender werden könnte – also quasi ein Pick-up-Artist-Talk, aber nicht von einem Pick-up-Artist sondern von einer Queerfeministin.

Embedded
238: My Brain Is My Toolbelt

Embedded

Play Episode Listen Later Mar 15, 2018 54:30


Chris and Elecia answered some listener questions about dynamic memory and shared code. Then Elecia gave a presentation about ShotSpotter, the gunshot location system she worked on. Elecia enjoyed The Woman Who Smashed Codes: A True Story of Love, Spies, and the Unlikely Heroine Who Outwitted America's Enemies by Jason Fagone. Ben is the editor of HackSpace, a new magazine about making (and hacking). It's produced by Raspberry Pi, but it's technologically agnostic. The first issue is free online. The ShotSpotter presentation was originally given with Sarah Newman at the 2008 Grace Hopper Celebration of women in computing.

Alan O'Donohoe's posts
#TeachComputing at @PrestonHack Space, 19Aug15

Alan O'Donohoe's posts

Play Episode Listen Later Aug 19, 2015 27:23


Interviews with members of Preston Hackspace (Twitter @PrestonHack ) at The Continental, Preston. Preston does not have premises for a Hackspace, but the community is growing. Listen to some members of the community explain the attraction of the Hackspace and their projects.