POPULARITY
Chris Adams is joined by Zachary Smith and My Truong both members of the Hardware Standards Working Group at the GSF. They dive into the challenges of improving hardware efficiency in data centers, the importance of standardization, and how emerging technologies like two-phase liquid cooling systems can reduce emissions, improve energy reuse, and even support power grid stability. They also discuss grid operation and the potential of software-hardware coordination to drastically cut infrastructure impact.
Have you ever thought of an object you'd like to have but for one reason or the other it didn't exist? It's easier now than ever to get into 3D printing! We give you our take on the SteamDeck and we talk funding for Matrix! -- During The Show -- 01:20 Note taking suggestion - Bhikhu Turtl App (https://turtlapp.com/) Joplin (https://joplinapp.org/) Sustainable technology is important 05:30 Wifi for Old Homes - Norm AP "zero hand off" is critical Steve - a few powerful APs Noah - Lots of low power AP Unifi U6 Unifi ACPro Place AP every 20db drop of signal approximately every 50ft RSSI 13:10 Wifi mesh? - Jeremy Mesh does not perform well 15:15 Thoughts On Flight Tracking - anon ADS-B transceivers are required on all planes Inexpensive hardware can receive ADS-B data Flight Radar 24 Making data available 20:00 Brandon Follows up RE: Firefox for multiple clients - Brandon Multi Account Containers (https://addons.mozilla.org/en-US/firefox/addon/multi-account-containers/) 21:20 Cory Follows up X270 Battery - Cory OEM Battery is required Old Hardware is great 24:14 News Wire GnuPG 2.4.0 GnuPG (https://lists.gnupg.org/pipermail/gnupg-announce/2022q4/000477.html) Kodi 19.5 Kodi (https://kodi.tv/article/kodi-matrix-19-5-release/) Darktable 4.2.0 Darktable (https://www.darktable.org/2022/12/darktable-4.2.0-released/) IceWM 3.3.0 GitHub (https://github.com/ice-wm/icewm/releases/tag/3.3.0) OpenBMC 2.12 Phoronix (https://www.phoronix.com/news/OpenBMC-2.12-Released) Tails 5.8 Tails (https://tails.boum.org/news/version_5.8/index.en.html) Manjaro 22 Sikaris Manjaro (https://forum.manjaro.org/t/manjaro-22-0-sikaris-released/129983) GNOME Adds Icon View OMG Linux (https://www.omglinux.com/gnome-thumbnails-file-picker/) Haiku Beta 4 Haiku OS (https://www.haiku-os.org/get-haiku/r1beta4/release-notes/) SMB CVSS Level 10 Vulnerability The Register (https://www.theregister.com/2022/12/24/back_to_work_linux_admins/) Security Affairs (https://securityaffairs.co/wordpress/140013/hacking/critical-linux-kernel-vulnerability.html) Zdnet (https://www.zdnet.com/article/patch-now-serious-linux-kernel-security-hole-uncovered/) AgStack Linux Foundation (https://www.linuxfoundation.org/press/agstack-first-dataset-field-boundaries) 25:30 Funding Open Source Matrix Post (https://matrix.org/blog/2022/12/25/the-matrix-holiday-update-2022) 100s of organizations use matrix User base has doubled in size Altispeed Clients love Matrix Matrix is in need of funding Core Matrix development is at risk Commercial deployments fail to give back Large companies have conditioned people services are free or ad supported Matrix Funding No MSP Sales No Consulting Sales EMS Accounting issues Followed matrix since it started Matrix Patreon (https://www.patreon.com/matrixdotorg) 38:30 Immutable Desktops Image/Layer based OS No access to the root OS Good potential Will manufactures use this to lock down devices Immutable systems may be the future SteamDeck 50:00 3D Printing Auto Bed Leveling Heated Bed Painters Tape (Q5SYS Trick) Design Software FreeCAD Slicer Creality Utlimaker Design Sharing Thing-i-Verse (https://www.thingiverse.com/) Cults3d (https://cults3d.com/) Creality Sonic Pad (https://www.creality.com/products/creality-sonic-pad) -- The Extra Credit Section -- For links to the articles and material referenced in this week's episode check out this week's page from our podcast dashboard! This Episode's Podcast Dashboard (http://podcast.asknoahshow.com/318) Phone Systems for Ask Noah provided by Voxtelesys (http://www.voxtelesys.com/asknoah) Join us in our dedicated chatroom #GeekLab:linuxdelta.com on Matrix (https://element.linuxdelta.com/#/room/#geeklab:linuxdelta.com) -- Stay In Touch -- Find all the resources for this show on the Ask Noah Dashboard Ask Noah Dashboard (http://www.asknoahshow.com) Need more help than a radio show can offer? Altispeed provides commercial IT services and they're excited to offer you a great deal for listening to the Ask Noah Show. Call today and ask about the discount for listeners of the Ask Noah Show! Altispeed Technologies (http://www.altispeed.com/) Contact Noah live [at] asknoahshow.com -- Twitter -- Noah - Kernellinux (https://twitter.com/kernellinux) Ask Noah Show (https://twitter.com/asknoahshow) Altispeed Technologies (https://twitter.com/altispeed)
Why Dirty Pipe is a dirty dog, the explosive adoption of Linux at AMD, and an important update on elementary OS.
Why Dirty Pipe is a dirty dog, the explosive adoption of Linux at AMD, and an important update on elementary OS.
Why Dirty Pipe is a dirty dog, the explosive adoption of Linux at AMD, and an important update on elementary OS.
We round up our favorite tweaks to the desktop, and apps that make it great. Plus some highlights from Arch Conf, and our reaction to Mint finally fixing their Chromium problem. Special Guest: Drew DeVore.
This week, a tool that finds vulnerable robots on the Internet, a new exploit that threatens over 9,000 Cisco routers, apple turns of group FaceTime after an eavesdropping bug, wordpress sites under attack via Zero-Day in abandoned plugin, and OpenBMC caught with 'pantsdown' over a new security flaw! Jason Wood from Paladin Security joins us for expert commentary on Abusing Exchange: One API call away from Domain Admin! Full Show Notes: https://wiki.securityweekly.com/HNNEpisode205 Visit https://www.securityweekly.com/hnn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, a tool that finds vulnerable robots on the internet, a new exploit that threatens over 9,000 Cisco Routers, apple turns of group FaceTime after an eavesdropping bug, wordpress sites under attack via Zero-Day in abandoned plugin, and OpenBMC caught with 'pantsdown' over a new security flaw! Jason Wood from Paladin Security joins us for expert commentary on Abusing Exchange: One API call away from Domain Admin! Full Show Notes: https://wiki.securityweekly.com/HNNEpisode205 Visit http://hacknaked.tv to get all the latest episodes!
This week, a tool that finds vulnerable robots on the Internet, a new exploit that threatens over 9,000 Cisco routers, apple turns of group FaceTime after an eavesdropping bug, wordpress sites under attack via Zero-Day in abandoned plugin, and OpenBMC caught with 'pantsdown' over a new security flaw! Jason Wood from Paladin Security joins us for expert commentary on Abusing Exchange: One API call away from Domain Admin! Full Show Notes: https://wiki.securityweekly.com/HNNEpisode205 Visit https://www.securityweekly.com/hnn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
W pierwszym (testowym) odcinku naszego podcastu porozmawiamy o ostatnich odkryciach ujawnionych w artykule Bloomberga na temat instalowania implantów (backdoorów) sprzętowych w płytach głównych produkowanych przez Supermicro.Według źródła, odkryte miały zostać małe układy scalone, których rzekomym celem działania było wykradanie informacji z serwerów pracujących w amerykańskich sieciach telekomunikacyjnych oraz popularnych usługach chmurowych i sieciach społecznościowych.Ponieważ na co dzień zajmujemy się produkcją oprogramowania układowego (Firmware/BIOS), a tym samym posiadamy praktyczną wiedzę z zakresu budowy zarówno sprzętu jak i standardów dla oprogramowania embedded, postanowiliśmy przyjrzeć się tym rewelacjom i skonfrontować je z faktami.Na początku odcinka przekazujemy informacje ogólne na temat tematyki implantów (backdoorów) sprzętowych. Słuchacze bardziej biegli w temacie mogą od razu przejść do 15 minuty gdzie rozpoczynamy techniczną analizę prawdopodobnego scenariusza ataku, który pokrywałby się z informacjami przedstawionymi przez Bloomberga.Podczas naszej analizy odwołujemy się do standardów takich jak: BMC, IPMI, ACPI, UEFI, ATF, NC-SI, TPM. Jeżeli szukasz twardych technicznych dokumentów na te tematy koniecznie sprawdź linki poniżej.Prowadzący: Radosław Biernacki, Michał Stanek, Jan Dąbroś, Wojciech MacekLinki (chcesz wiedzieć więcej?):Hardware trojan:https://en.wikipedia.org/wiki/Hardware_TrojanBloomberg:https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companieshttps://www.bloomberg.com/news/articles/2018-10-09/new-evidence-of-hacked-supermicro-hardware-found-in-u-s-telecomInne źródła na temat publikacji:https://www.servethehome.com/yossi-appleboum-disagrees-bloomberg-is-positioning-his-research-against-supermicro/https://www.servethehome.com/explaining-the-baseboard-management-controller-or-bmc-in-servers/https://securinghardware.com/articles/hardware-implants/IPMI - because ACPI and UEFI weren't terrifying enough:https://www.youtube.com/watch?v=GZeUntdObCABMC/IPMI:https://www.intel.com/content/dam/www/public/us/en/documents/product-briefs/ipmi-second-gen-interface-spec-v2-rev1-1.pdfhttps://blog.rapid7.com/2013/07/02/a-penetration-testers-guide-to-ipmi/https://www.reddit.com/r/homelab/comments/74o47w/psa_do_not_connect_your_ipmi_to_outside_world/OpenBMC:https://www.youtube.com/watch?v=HO9qDPoWWrghttps://github.com/openbmc/openbmcUEFI:https://en.wikipedia.org/wiki/Unified_Extensible_Firmware_Interfacehttps://github.com/tianocore/edk2ACPI:https://en.wikipedia.org/wiki/Advanced_Configuration_and_Power_Interfacehttp://www.uefi.org/sites/default/files/resources/ACPI_6_2.pdfhttps://www.blackhat.com/presentations/bh-europe-06/bh-eu-06-Heasman.pdfARM Trusted Firmware / UEFI Secure Boot:https://www.uefi.org/sites/default/files/resources/UEFI_Secure_Boot_in_Modern_Computer_Security_Solutions_2013.pdfhttps://www.trustedfirmware.org/about/https://github.com/ARM-software/arm-trusted-firmwareNC-SI:https://en.wikipedia.org/wiki/NC-SIhttps://www.dmtf.org/sites/default/files/standards/documents/DSP0222_1.0.0.pdfhttps://sthbrx.github.io/blog/2017/09/22/ncsi-nice-network-youve-got-there/TPM:https://en.wikipedia.org/wiki/Trusted_Platform_Modulehttps://online.tugraz.at/tug_online/voe_main2.getvolltext?pCurrPk=59565PUF:https://www.coursera.org/lecture/hardware-security/physical-unclonable-functions-puf-basics-Ab4sfhttp://cryptowiki.net/index.php?title=Physically_unclonable_functions_(PUF)HW Counterfeits:https://www.electronicsweekly.com/news/business/fbi-arrests-counterfeit-chip-traffickers-2015-12/https://www.netnames.com/insights/blog/2014/03/counterfeit-aircraft-parts-in-the-usa/https://zeptobars.com/en/read/Nordic-NRF24L01P-SI24R1-real-fake-copyps: już po naszej publikacji pojawił się poniższy art.https://www.servethehome.com/investigating-implausible-bloomberg-supermicro-stories/