POPULARITY
In this eye-opening second appearance on The Free Thought Project Podcast, Xander Arena returns to deliver one of the most in-depth breakdowns of 9/11 Pentagon inconsistencies we've heard yet. Joined by Jason and Matt, Xander walks through a detailed report that challenges the official narrative — not with speculation, but with documented evidence, physics, and logic. The conversation centers around the lack of physical evidence that a commercial jet struck the Pentagon, a claim supported not only by eyewitness contradictions and forensic inconsistencies, but by artificial intelligence itself. As Xander reveals, he used Elon Musk's Grok AI to analyze publicly available evidence — and even Grok concluded that there is insufficient proof a plane hit the Pentagon. Even more striking: before reaching that conclusion, Grok admitted it was programmed to avoid the topic entirely unless referencing mainstream-approved sources — an admission that underscores just how deeply controlled public discourse around 9/11 remains. This episode is also available in video format, as Xander shares important visuals and documentation that back his claims — making it a must-watch as well as a must-listen. While The Free Thought Project does not claim to endorse any one theory or outcome, we believe the relentless pursuit of truth is essential — especially when the government has proven time and again that it is anything but transparent. As we've done with previous guests like Richard Gage of Architects and Engineers for 9/11 Truth, we proudly offer this platform to truth seekers like Xander who are doing the work mainstream media refuses to do. With thousands of lives lost and decades of war justified by this event, the public deserves real answers — not automated propaganda. Tune in for an eye-opening exploration that encourages critical thinking and questions the narrative we've been told about 9/11. (Length: 1:19:54) Our Children's book: https://littlefreethinkers.com/ Xander's Pentagon Truth Website: https://pentagontruth.org/ Xander's Vegas Truth Website: https://vegastruth.org/ Our previous podcast with Xander: https://thefreethoughtproject.com/podcast/podcast-xander-arena-illegal-helicopters-decedent-proxies-the-vegas-shooting-story-youve-never-heard TFTP interview with Richard Gage: (founder of Architects & Engineers For 9/11 Truth) https://thefreethoughtproject.com/be-the-change/podcast-richard-gage-ae-911-truth
In this episode of the Free Thought Project podcast, Jason and Matt welcome back Hakeem Anwar, the visionary behind the "Take Back Our Tech" initiative. Hakeem is an experienced entrepreneur, founder and CEO of the Above Phone, and proponent of extremely private technology. During our conversation, we delve into the types of surveillance we have to worry about on Windows and macOS, and explore Microsoft's new Recall feature. We also tackle the implications of new proposed laws, such as the EARN IT Act and FISA 702 Reauthorization, and how these measures threaten our privacy. Hakeem shares his insights on how Google and Apple track the world's WiFi access points, revealing the extent of surveillance we're all subjected to. We discuss the alarming deployment of spyware like NSO's Pegasus and the backdoors in our phones, as well as the massive surveillance experiment conducted under the guise of COVID-19 contact tracing. Hakeem exposes the truth behind Apple's Face ID technology and the unsettling practices of WiFi-based positioning systems. As always, we end on a positive note, with Hakeem offering actionable solutions for reclaiming digital privacy and autonomy. Join us for an eye-opening discussion on the critical steps needed to protect ourselves from invasive surveillance and empower our digital futures. (Length: 1:08:04) Use coupon code TFTP for $75 OFF any Above Phone. This code will be valid until Monday June 10th at midnight Central Time. Above Phone (Info/Sales): https://abovephone.com/?above=thefreethoughtproject Take Back Our Tech Twitter: https://twitter.com/takebackourtechAbove Phone Twitter: https://twitter.com/abovephoneTake Back Our Tech Website: https://takebackourtech.org/Take Back Our Tech Telegram: https://t.me/takebackourtech
Setup diskless booting of Raspberry Pi, TrueNAS abandons FreeBSD, SPARCbook 3000ST: The coolest 90s laptop, Sparkbook Teardown, SSH over HTTPS, Keycloak Identity and Access Management on FreeBSD, Ford Aerospace and BSD Unix, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines HOWTO: Setup diskless booting of Raspberry Pi (running RPi OS) via TFTP & NFSv4 from a FreeBSD ZFS server (https://forums.freebsd.org/threads/howto-setup-diskless-booting-of-raspberry-pi-running-rpi-os-via-tftp-nfsv4-from-a-freebsd-zfs-server.92717/) TrueNAS abandons FreeBSD (https://www.theregister.com/2024/03/18/truenas_abandons_freebsd/) + No one needs to panic, we're aware of plans that have already been in the works. But more on that later. News Roundup SPARCbook 3000ST: The coolest 90s laptop (https://jasoneckert.github.io/myblog/sparcbook3000st-the-coolest-90s-laptop/) Sparkbook Teardown (https://jasoneckert.github.io/myblog/sparcbook-teardown/) Author Comment (https://news.ycombinator.com/item?id=39037510) SSH over HTTPS (https://trofi.github.io/posts/295-ssh-over-https.html) Keycloak Identity and Access Management on FreeBSD (https://vermaden.wordpress.com/2024/03/10/keycloak-on-freebsd/) Ford Aerospace and BSD Unix. (https://news.ycombinator.com/item?id=39636035) Beastie Bits OpenBGPD 8.4 released (http://undeadly.org/cgi?action=article;sid=20240308064655) Solene games (https://rsolene.itch.io/) Context: https://bsd.network/@solene/112115442072927484 How I backup (https://sive.rs/backup) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
HGF Delivers the weekly breaches in “Whose Been Popped?” Oracle's macOS 14.4 Java hiccup, the ever-adapting landscape of ransomware warfare, the emerging threat of Loop DoS attacks, and the Biden-Harris administration's call to action for water sector cybersecurity. Original URLs: https://www.bleepingcomputer.com/news/apple/oracle-warns-that-macos-144-update-breaks-java-on-apple-cpus/ https://www.guidepointsecurity.com/blog/t-o-x-i-n-b-i-o-ransomware-recruitment-efforts-following-law-enforcement-disruption/ https://www.helpnetsecurity.com/2024/03/20/raas-recruit-affiliates/ https://thehackernews.com/2024/03/new-loop-dos-attack-impacts-hundreds-of.html https://cispa.de/en/loop-dos https://www.epa.gov/newsreleases/biden-harris-administration-engages-states-safeguarding-water-sector-infrastructure https://www.cybersecuritydive.com/news/warnings-state-linked-cyber-threats-water/710834/ Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/ Logo Design by https://www.zackgraber.com/ macOS 14.4, Java Issues, Oracle Warning, Ransomware Wars, Law Enforcement, Cybersecurity, Loop DoS Attack, Water Sector Cyber Threats, Biden-Harris Administration, Cyberattack Prevention, Mobile Security, Password Managers, Apple Silicon CPUs Search Phrases: macOS 14.4 Java problems Oracle advice on macOS update Ransomware recruitment post-crackdown Effects of law enforcement on ransomware Understanding Loop DoS attacks Cyber threats to water infrastructure Biden-Harris cyber security efforts Protecting against cyberattacks in the water sector How ransomware groups adapt Cybersecurity measures for water systems Impact of macOS updates on Java Dealing with ransomware wars New cybersecurity threats 2024 Administration's response to cybersecurity in infrastructure Cybersecurity tips for protecting critical infrastructure Transcript: mar 21 [00:00:00] offsetkeyz: welcome back to the Daily Decrypt. Today, we're joined by HotGirlFarmer, as she delivers last week's breaches in your favorite segment, Who's Been Popped. Also, the company Oracle alerts customers that the new Mac OS 14. 4 update will disrupt Java functionality and urges. Customers to postpone this update. Ransomware as a Service groups are upping their recruitment efforts, defying law enforcement disruptions. With cunning resilience. What are ransomware as a service groups and how are they recruiting? Stick around to find out. And the White House is really doubling down on water utilities, urging states and governors to collaborate to help protect this critical infrastructure. And finally, researchers have discovered a new loop denial of service attack that targets [00:01:00] UDP based application level protocols, putting an estimated 300, internet hosts at risk for continuous looping and unneeded stress. How will this affect everyday users? Alrighty, so before we get into the breaches with Hot Girl Farmer, I just wanted to warn macOS users to maybe postpone the most recent update to avoid any system disruptions. There are no current workarounds and Java isn't liking the new update. This isn't like how it used to be in the earlier 2000s where Java ran everything on your computer. It shouldn't affect you unless you're developing in Java. But besides Java issues, Updated users are reporting issues with their printer drivers, lost iCloud files, and connectivity issues with USB hubs and monitors. So let's just hold off on the new macOS 14. 4 upgrade for a few more days. [00:01:53] HGF: [00:02:00] First off, hackers targeted MediaWorks, a company in New Zealand, demanding a ransom in cryptocurrency from victims who just wanted to win a free radio contest. MediaWorks is out here like, sorry, your name, address, and birthday were part of our grand prize giveaway to some hackers. Hopping on a financial rollercoaster, the International Monetary Fund got their emails hacked. And these weren't just any emails, they were the kind that you use fancy words in hoping to sound smart. The IMF is like the person who insists on using a $10 word when a $1 word will do, and now everyone knows they've been using "Synergy" wrong this whole time. [00:02:41] HGF: Meanwhile in France, they've turned data breaches into an art form, with up to 43 million people affected. It's a breach so chic, it's practically wearing a striped shirt and smoking a cigarette. And let's not forget Alabama, where the state government websites faced a denial of service [00:03:00] attack. Alabama's like, Our websites are slower than molasses in January, but don't you worry, your data's as safe as a church potluck. Except in this case, the potluck's been crashed by every hacker in a 10 mile radius. So, what have we learned aside from the fact that the world is a hacker's oyster? Keep your friends close, your passwords closer, and maybe, try not to store your entire life on a device that could be hacked by a 12 year old with a grudge. In the grand scheme of things, we're all just trying to make it through this digital world. [00:03:32] transition: Thanks for watching! [00:03:38] offsetkeyz: We've been hearing a lot coming out of the White House about critical infrastructure, such as power and water. They've been providing a lot of guidance recently and encouraging collaboration to avoid cyber attacks. So what do they know that we don't know? It's starting to get me a little scared. So just two days ago, the Biden Harris administration released some more guidance on how to stay safe, but is [00:04:00] also urgently calling governors and state governments to start collaborating. and really hardening the systems of their critical water infrastructure. When we think about crippling cyber threats, we tend to think about big corporations and ransomware and things like that, but those may be where the money is, but those who are out to get the United States of America, like maybe China and maybe Russia, I'm not sure. We'll be targeting our critical infrastructure first Now, if you are working in it in a critical infrastructure like power or water, our hats are off to you. I know what you're up against and even. The White House knows what you're up against, which is why they're starting to step in. So keep doing the Lord's work out there and try to get it as secure as possible. Because, hey, we all need water to live. And I don't want to be making that Walmart run when my water stops working. That's going to be crazy. So part of the major efforts by the Biden Harris administration includes creating a cybersecurity task force between the EPA and the [00:05:00] NSC, promoting existing resources to protect against cyberattacks on water systems. According to the letter from the White House, there have been an increased amount of attacks on water systems driven by both countries or nation state actors and run of the mill cyber criminals. So I'm glad to see our federal government stepping in and helping where they can. But we might be reaching the point where we need to take our own health and wellbeing into our own hands, stock up on water, buy a nice filter, maybe get a rain bucket for outside. Make sure that you and your family are taken care of in the event that the water does go down. [00:05:40] offsetkeyz: Recently we've been seeing a lot of ransomware as a service groups being shut down by the FBI and other three letter organizations, which is great. But the FBI can only do so much, and what they've been doing is trying to capture individuals who are responsible for running these ransomware as a service groups or developers, [00:06:00] but mostly they're just shutting down dark web websites. with big banners that say claimed by the FBI. So in most instances, the individuals behind these ransomware as a service groups are just moving and creating new ransomware as a service groups, or joining others, strengthening their staffing. But let's back up for a second. What is ransomware as a service? Well, this is the new hot thing in ransomware, where it's essentially Cloud as a service, or something that you would sign up to use not really knowing how to make it yourself, but you want to use the tools to conduct a ransomware. So a good example of something you might use as a service is something like Squarespace, where if you don't know how to do web development, but you want a website, you would then pay for Squarespace's services and they give you some features, right? Depending on how much you're willing to pay. So Squarespace specifically is considered software as a service. Now ransomware as a service does exactly [00:07:00] that. I would like to ransomware somebody. So I go sign up for an account at one of these places. Such as Medusa or Cloak, as referenced in the article by HelpNet Security that's linked in our show notes below. And depending on the amount you want to pay for this service, you can get perks. Thanks. The amounts are surprisingly low between 800 to 1, 000 a year to access this product and they're getting lower. They're being pushed harder onto end users and the perks are getting better too. One of the lowest tiers is once you reach a million dollars in ransom payments, you get access to dumped hashes, you get access to a bunch of tools that make it easier to do the initial compromise. There have also been a string of Exit scams across the dark web, which is essentially when a company like Medusa or any ransomware as a service will Receive the ransom that you [00:08:00] went out and earned and then just close down their site keeping all of the money most ransomware as a services Set up the platform to receive the money And then they pay you about 85 percent of the ransom, as agreed upon before using the service. But now these groups are starting to let you collect the ransom, and then allow you to pay that 15 percent usage fee. helping to encourage people to use their services and not be so afraid of exit scams or other scams on the dark web. But what's so crazy about this is that they're literally just posting ads on the dark web. They're in forums and they are offering these perks and security researchers are able to see them in real time and see who's interacting with them. And the beauty of the dark web is that. If you're doing it correctly, it can be completely anonymous. Now I don't encourage you to get on the dark web to see this type of activity, but it is available to you. And if you'd like more information about the dark web, I released a talk about a week ago, maybe two weeks ago at this point, outlining at a high level how the dark web [00:09:00] works. [00:09:12] offsetkeyz: And finally, researchers have developed or discovered a new denial of service or DOS attack. that relies on UDP based application level protocols. And if you're not familiar, there are two main protocols on the transport layer that you interact with on a daily basis. UDP and TCP. UDP is the faster of the two, and it doesn't require any sort of verification that the data has been received. And this is often used when gaming online with your friends or talking, or even streaming like YouTube videos. Those rely heavily on UDP because you need to get the data as quickly as possible when streaming videos. And it doesn't really matter if every single frame is accounted for, you can occasionally drop frames, which might result in a little skip, but [00:10:00] overall, most of them are going to get through kind of like a shotgun spray. Whereas TCP is more for like text based communications or things where data needs to be verified on both ends, and it's a little slower due to the verification. So, UDP inherently doesn't verify, which is important to understand this type of attack, because this loop denial of service exploits UDP's lack of source IP validation to create endless communication loops between servers, eventually overwhelming them. Additionally, protocols like DNS, NTP, and TFTP are among those vulnerable to these attacks, potentially affecting basic internet functionalities. So this does tie back into the attack on DNS, which is essentially like a lookup of what you're trying to navigate to. So, when you navigate to facebook.com it reaches out to a DNS server and says, Hey, what the heck is facebook. com? And it replies with an address. Without those [00:11:00] DNS servers, we actually can't move about the internet like we do on the day to day. So this attack is easily triggered by a single spoofed message and can stress entire networks with 300, 000 hosts already at risk. There's no evidence of this loop denial of service being used in the wild, but its exploitation is considered trivial, affecting major vendors like Cisco and Microsoft. Now, these are likely a little further down the pipeline than you're familiar with as a regular user or even as a cybersecurity analyst. but you might notice slower internet speeds, stuff like that, if this happens, with the potential for it to completely shut down your internet connection. And on that note, not much is to be done on the user level. Just letting you know what's possible and what the attackers are doing. Hitting you from all kinds of angles. All right, and that is all we've got for you today. A little bit longer of an episode because we missed yesterday due to technical [00:12:00] issues, but we're back and better than ever, and we will talk to you some more tomorrow.
In this enlightening episode of the Free Thought Project podcast, hosts Jason and Matt welcome the insightful Pho Lloyd, also known as "The Pholosopher." Pho is a fervent advocate for anarcho-capitalism, voluntaryism, anarchism, and libertarianism, passionately supporting the non-aggression principle (NAP). She believes in the inherent right of self-ownership and argues against the initiation of force in human interactions, positing that adherence to the NAP can lead humanity to genuine happiness, peace, and prosperity. The conversation kicks off with a thought-provoking discussion on the economics of so-called "Price Gouging," unraveling the misconceptions around government price fixing and highlighting the importance of allowing free market prices to adapt naturally to demand and supply dynamics. The podcast takes a turn with a discussion on Ben Shapiro's unexpected and somewhat hilarious foray into rap music with Tom Macdonald, leading to a broader conversation on the evolution of rap music and its shift towards themes of self-improvement in the independent hip-hop scene. The dialogue then shifts to the intriguing political landscape of Argentina, focusing on President Javier Milei, an avowed anarcho-capitalist, and the significance of his revolutionary ideas reaching a broader audience. Pho shares her insights on the perils of collectivism, which she describes as a societal cancer, emphasizing the value of individual liberty and self-ownership. The episode also delves into Pho's latest creative endeavor, a children's book titled "The Unschooled Adventures of Jack and Pho," co-authored with her husband Jack Lloyd, a friend of TFTP and previous guest on the podcast. Join us on this episode as we explore a range of topics from economics and politics to music and literature, all woven together by the common thread of liberty and personal freedom. (Length: 1:04:58) Pho's Website: https://thepholosopher.com/ Pho on Twitter: https://twitter.com/ThePholosopherX Pho on YouTube: https://www.youtube.com/@ThePholosopher Pho on Facebook: https://www.facebook.com/dapholosopher Jack & Pho's New Book: https://www.indiegogo.com/projects/the-unschooled-adventures-of-jack-and-pho#/
In this informative episode of the Free Thought Project podcast, hosts Jason and Don welcome back former TFTP editor Rachel Blevins to the show. Blevins is currently a journalist for RT, where she was a co-host of the show Boom Bust for a year. After spending time living in Moscow, this Texas native is now back in Austin, and we were lucky enough to hear her thoughts on geopolitics, foreign policy, and the US military. We started the conversation by examining the clear hypocrisy the US has engaged in with the justification for its posturing in the military build-up in the Mediterranean. We also dissected the parallels between the Israel/Palestine war and the Ukraine/Russia war. The conversation then shifted to the Al-Ahli Arab Hospital bombing propaganda. Don touched on the global protests that have been mostly ignored by the media. Then we asked Rachel to explain the current situation with Taiwan. Near the end of the show, Rachel shared what it's like to work for RT and the journalistic freedom she has experienced working for the Russians. This was a very informative episode and a must-listen for anyone trying to grasp the full picture of the Israel/Palestine conflict and to catch up on the latest Ukraine/Russia war news. (Length: 1:06:54) Follow Rachel on Twitter: https://twitter.com/RachBlevins Follow Rachel on Telegram: https://t.me/rachblevins Follow Rachel on Instagram: https://www.instagram.com/rachblevins/ Checkout Rachel's Substack: https://rachelblevins.com/
Bonjour et bienvenue dans la revue de presse hebdo et audio du secteur retail / e-commerce en France proposée par Les Digital Doers. Nous sommes le 8 septembre, et au sommaire de cette semaine, 5 articles : 1) Plus une marque est forte, plus elle a un devoir moral (Emarketing.fr) 2) L'ultra proximité, nouveau marqueur fort de l'enseigne Monop' (Fashionunited.fr) 3) NAF NAF est tombée "à cause de la machine de guerre Shein" (JDN) 4) La start-up de livraison Frichti pourrait être reprise par sa concurrente La Belle Vie (Republik-Retail.fr) 5) Encaisser ses produits avec son smartphone pour réduire le temps d'attente en magasin (Usine-digitale.fr) Je vous le rappelle, sur le site lesdigitaldoers.com, vous avez accès à une revue de presse accessible sur LinkedIn et qui rassemble les articles publiés dans la semaine sur les sites de news de notre écosystème. Vous pouvez vous y abonner pour recevoir chaque vendredi un digest de l'actualité dans votre boîte email. De cette revue de presse, je vous lis, sans interprétation, une sélection de quelques articles qui m'ont semblé pertinents à partager. Enfin, je profite de cette tribune pour vous annoncer officiellement le départ de mon Défi Vélo ! Comme vous le savez, Comexposium, organisateur des événements One to One Retail Ecommerce à Monaco et Expérience Client à Biarritz, soutient Les Digital Doers depuis 3 ans et demi. A l'occasion du One to One qui se tient donc à Biarritz du 3 au 5 octobre prochains, je vais réaliser un défi sportif ! Relier Paris à la ville basque à vélo ! Le thème de cette édition 2023 est : L'éthique, c'est chic. Quoi de plus cohérent que d'aller à cet événement à la force des mollets ! Départ le samedi 16 septembre de la fontaine de la porte d'Auteuil pour 2 grosses semaines sur les routes et chemins de France. 16 étapes et près de 900 kms plus loin, arrivée dans le Sud Ouest pour l'ouverture du One to One Expérience client. L'opération aura pour objectif de promouvoir Team For The Planet. Comment ? En vous proposant de devenir actionnaire de TFTP ! Team For The Planet est un tout nouveau modèle d'entreprise au service de l'urgence climatique. L'objectif est de rassembler 1 milliard d'euros pour créer 100 entreprises paramétrées de A à Z pour lutter contre le dérèglement climatique. Vous pouvez retrouver toutes les informations et les détails du défi vélo sur le site sur defivelo.lesdigitaldoers.com Tous les jours du trajet, je partagerai mes avancées et du contenu exclusif autour du marketing digital. Pour me suivre, les réseaux sociaux (LinkedIn, Insta, Facebook, X et Tiktok). Tous les liens sont sur le site. Pour ceux qui souhaitent encore plus de contenus exclusifs, une communauté WhatsAppvient d'être créée. Le lien se trouve aussi sur le site ! Bref c'est avec beaucoup d'excitation que j'attends le départ ! Pour ceux qui le souhaitent, vous pouvez venir le jour J, samedi 16 septembre à 10h30 pour souffler les bougies de mon anniversaire avant de donner les premiers coups de pédales ! Car oui, c'est le jour de mon anniversaire ! Si d'aventure, certains veulent m'accompagner à vélo sur la première étape (Direction Ablis à 60kms) ou sur une autre, vous êtes les bienvenus ! D'ici là, je vous souhaite une bonne écoute, évidemment toujours sans coupure !
On this week's episode of the Free Thought Project Podcast, Jason talks with writer, researcher, and long time truth teller Gavin Nascimento about his new eBook "A History of Elitism, World Government & Population Control" to dissect some of the most important elements within the book. Gavin has been an independent journalist and researcher for over a decade with an extensive background in studying the world's ruling elite. In this episode, Gavin explains the book's basic premise and what inspired him to write it. We then shift to talking about the numerous biowarfare experiments the US government has engaged in over the past century and how something similar could happen today. From there, we get into population control and eugenics, how world government is already here, and how social engineering programs, like the lockdowns, target civilians. We also discuss how the ruling class has chinks in their armor and isn't invincible, and in typical TFTP fashion, we end the show on a positive note by sharing solutions and paths to empowerment. (Length: 1:17:41) Get the book here: https://www.amazon.com/History-Elitism-Government-Population-Control-ebook/dp/B0BSS9W4M5/ Twitter: https://twitter.com/truthwarriorg?lang=enMinds: https://www.minds.com/GavinNascimento/MeWe: https://mewe.com/i-front/gavinnascimentoIG: https://www.instagram.com/truthwarriorgavin/?hl=enFlote: https://flote.app/TruthWarriorGavinBitchute: https://www.bitchute.com/channel/xTnVj0UEtdFn/LBRY: https://lbry.tv/@TruthWarriorGavin Sign up for his Newsletter here: https://gem.godaddy.com/.../0d4e123243644ab08ad48906.../join His Patreon: https://www.patreon.com/GavinNascimento His T-shirts: https://a-new-kind-of-human.myshopify.com/
Pour lutter contre le dérèglement climatique, la sobriété ne suffira pas. Il faudra aussi financer des innovations qui pourront décarboner l'économie. C'est l'objectif de Time For The Planet, un fonds citoyen qui a déjà levé plus de 15 millions d'euros en trois ans d'existence. Rencontre avec l'un des co-fondateurs Mehdi Coly. L'objectif de Time For The Planet est de lever un milliard d'euros d'ici 2030. Avec les plus de 15 millions déjà levés, TFTP a déjà financé cinq innovations. Parmi celles-ci, Cool Roof qui permet de protéger des bâtiments et des villes contre les fortes chaleurs liées au dérèglement climatique. Une innovation qui pourra permettre d'éviter la climatisation très polluante si elle est déployée largement. Des innovations, des idées, il en existe beaucoup, il en existe déjà. Le problème, c'est qu'elles ne parviennent pas à passer à l'échelle, d'où l'importance d'un fonds comme Time For The Planet. Le Fonds ne s'occupe pas juste d'investir de l'argent mais de créer des sociétés qui seront profitables, qui pourront se développer et surtout être dupliquées un peu partout dans le monde entier. Time For The Planet a aussi dépassé son objectif qui était d'atteindre les 100 000 actionnaires au 1er janvier 2023. Des actionnaires qui peuvent acheter des actions à partir d'un euro. La particularité avec TFTP, c'est qu'ils ne reçoivent pas de dividendes, mais un dividende climat, qui comptabilise le nombre de tonnes de gaz à effet de serre évitées ou stockées grâce à leurs investissements. Selon Mehdi Coly, l'enjeu de chaque innovation dans laquelle ils investissent, c'est de « faire en sorte qu'on ait plus besoin d'émettre du CO2, car même en étant hyper sobre cela ne va pas être suffisant pour éviter une catastrophe climatique ».
Avec Caroline Le Roy nous continuons notre exploration de Time for the Planet en allant cette fois à la rencontre d'acteurs du tourisme qui sont devenus associés. Dominique Le Therisien, directeur de l'office de tourisme Dinan Cap Fréhel, nous partage pourquoi l'office de tourisme à rejoint en tant qu'associé Time for the Planet. Déjà engagé dans une démarche RSE & tourisme durable, la sensibilisation avec des éco gestes, TFTP est une ressource supplémentaires pour developper une stratégie globale et sur les comportements que nous devons avoir. Marion Pansart, référente RSE & Tourisme durable à travers ses convictions personnelles est devenu elle aussi associé de TFPT. L'idée d'infuser une appartenance à ce réseau et de manifester ses engagements en rejoignant différents réseaux d'acteurs engagés devient progressivement une démarche collective. Vous avez envie d'en savoir plus, cliquer ici: https://www.dinan-capfrehel.com
On this week's podcast, Jason and Matt sit down with Dan Dicks. Dan is an investigative journalist and an award-winning documentary filmmaker. He is also the founder of the independent media outlet known as Press For Truth which produces videos and documentary films about issues that the mainstream media often fails to report. Dan's list of documentaries dates back to his 2008 debut film, "The Nation's Deathbed" which focused on a protest that Dan attended in Montebello, Quebec. Since then, Dan has continued his work, creating thought-provoking videos and documentary films that have garnered millions of views. During the podcast, we dive into the censorship regime's push to silence truth by conflating it with wild conspiracy theories. We discuss how COVID-19 tyranny is not going away and how it is being used to suppress current and future dissent. We also delve into the woke cult, their tendency to go after society's most vulnerable, and the reasoning behind it. In true TFTP fashion, we also get into the solutions to the problems of the technocratic police state, why it is essential to become self-sustainable, and the importance of taking a stand, wherever that may be. This is not a podcast you want to miss. (Length: 1:02:39) If you appreciate Dan's efforts please consider making a contribution or following him here: Facebook: https://www.facebook.com/PressForTruth Twitter: https://twitter.com/DanDicksPFT Instagram: https://www.instagram.com/dandickspft/ Odysee: https://odysee.com/@PressForTruth:4 DONATE ➜ https://pressfortruth.ca/donate/ SUBSCRIBESTAR ➜ https://www.subscribestar.com/pressfortruth DONATE via Paypal ➜ https://www.paypal.me/PressforTruth GoGetFunding ➜ https://goget.fund/2UBhENH Bitcoin ➜ 19pNb9m5NyeDNXqTEAgZ5pyAXJwNroPKwq Other Cryptocurrencies ➜ https://pressfortruth.ca/donate-crypto/ Or you can send an e-transfer to dan@pressfortruth.ca Dan Dicks P.O. Box 1521 Squamish BC V8B 0B1
Configuration Examples with KevTechify for the Cisco Certified Network Associate (CCNA)
In this episode we are going to look at Use a TFTP Server to Upgrade a Cisco IOS Image.A TFTP server can help manage the storage of IOS images and revisions to IOS images. For any network, it is good practice to keep a backup copy of the Cisco IOS Software image in case the system image in the router becomes corrupted or accidentally erased. A TFTP server can also be used to store new upgrades to the IOS and then deployed throughout the network where it is needed. In this activity, we will upgrade the IOS images on Cisco devices by using a TFTP server. We will also backup an IOS image with the use of a TFTP server. We will be Upgrading an IOS Image on a Cisco Device and Backing up an IOS Image on a TFTP Server.Thank you so much for listening to this episode of my series on Enterprise Networking, Security, and Automation for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Configuration Examples for Enterprise Networking, Security, and Automation v3 (ENSA)Network ManagementLab 10.7.6 - Use a TFTP Server to Upgrade a Cisco IOS ImagePodcast Number: 85Season: 1-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
#risetoliberty #jasonbassler #freethoughtproject On this episode of Rise To Liberty, I sit down with Jason Bassler. The co-founder of The Free Thought Project, founder of Police The Police & long time activist for free speech. We discuss big tech censorship for thought crime, the importance of free speech in society & more! Come watch the amazing interview & check out my guest's work by clicking the links below! ------------- GUEST LINKS: - Jason Bassler: https://linktr.ee/Jebassler?utm_source=linktree_profile_share<sid=2138dcf1-fcb3-4c43-921b-663896205904 - The Free Thought Project: https://linktr.ee/TFTP?utm_source=linktree_profile_share<sid=c3d5f1f5-5d4f-4fc4-9cd3-9f92c312f231 - Police The Police: https://linktr.ee/PoliceThePolice?utm_source=linktree_profile_share<sid=3c1aa1e6-8c2e-4c7b-aeba-59683efb2e33 ------------- RISE TO LIBERTY LINKS: - Master Link: https://risetoliberty.com/links - RTL on Podbean (exclusives, live ep's, premium content): https://risetoliberty.com/podbean-home --------------- - Rise To Liberty Merch Store: https://risetoliberty.store - RTL On Odysee: https://risetoliberty.com/odysee - RTL On Rumble: https://risetoliberty.com/rumble - RTL Telegram Chat: https://risetoliberty.com/freespeech - RTL On Substack - Liberty Letter!: https://risetoliberty.substack.com - AUDIO PLATFORMS: https://risetoliberty.com/audio - Listen On Podbean: https://risetoliberty.com/podbean-listen - Buy Fresh Coffee w/ Monero! (XMR): https://risetoliberty.com/gratuitas-xmr
TFTP ist angekommen in Gelsenkirchen… über wen reden wir dann? Genau… Wodos… okay… abgelutschter Witz. Die Community hat gefordert… wir liefern… Sodom - In The Sign Of Evil… Wir gehen zurück ins Jahr 1984
This episode sees Bevin diving into the past, Toys From the Past that is! She's got Mike and Jared (and Jesse), talking all sorts of toy goodness, such as finally getting Hot Wheels some love on the A Toy Store Near You series, the shifting balance of popularity between vintage and new Star Wars toys, the importance of having toy expert specialists on-staff (shout out to Pokemon Joe and LEGO Max!). Also included, some topical conversation about how material costs and shipping delays are starting to show their effects across the toy collecting world and a SPECIAL REVEAL of the TFTP crew's next big business adventure! You've gotta listen! Learn more about your ad choices. Visit megaphone.fm/adchoices
About MichaelMichael is the creator of IT automation platforms Cobbler and Ansible, the latter allegedly used by ~60% of the Fortune 500, and at one time one of the top 10 contributed to projects on GitHub.Links Referenced: Speaking Tech: https://michaeldehaan.substack.com/ michaeldehaan.net: https://michaeldehaan.net Twitter: https://twitter.com/laserllama TranscriptAnnouncer: Hello, and welcome to Screaming in the Cloud with your host, Chief Cloud Economist at The Duckbill Group, Corey Quinn. This weekly show features conversations with people doing interesting work in the world of cloud, thoughtful commentary on the state of the technical world, and ridiculous titles for which Corey refuses to apologize. This is Screaming in the Cloud.Corey: This episode is sponsored by our friends at Revelo. Revelo is the Spanish word of the day, and its spelled R-E-V-E-L-O. It means “I reveal.” Now, have you tried to hire an engineer lately? I assure you it is significantly harder than it sounds. One of the things that Revelo has recognized is something I've been talking about for a while, specifically that while talent is evenly distributed, opportunity is absolutely not. They're exposing a new talent pool to, basically, those of us without a presence in Latin America via their platform. It's the largest tech talent marketplace in Latin America with over a million engineers in their network, which includes—but isn't limited to—talent in Mexico, Costa Rica, Brazil, and Argentina. Now, not only do they wind up spreading all of their talent on English ability, as well as you know, their engineering skills, but they go significantly beyond that. Some of the folks on their platform are hands down the most talented engineers that I've ever spoken to. Let's also not forget that Latin America has high time zone overlap with what we have here in the United States, so you can hire full-time remote engineers who share most of the workday as your team. It's an end-to-end talent service, so you can find and hire engineers in Central and South America without having to worry about, frankly, the colossal pain of cross-border payroll and benefits and compliance because Revelo handles all of it. If you're hiring engineers, check out revelo.io/screaming to get 20% off your first three months. That's R-E-V-E-L-O dot I-O slash screaming.Corey: This episode is sponsored in part by LaunchDarkly. Take a look at what it takes to get your code into production. I'm going to just guess that it's awful because it's always awful. No one loves their deployment process. What if launching new features didn't require you to do a full-on code and possibly infrastructure deploy? What if you could test on a small subset of users and then roll it back immediately if results aren't what you expect? LaunchDarkly does exactly this. To learn more, visit launchdarkly.com and tell them Corey sent you, and watch for the wince.Corey: Once upon a time, Docker came out and change an entire industry forever. But believe it or not, for many of you, this predates your involvement in the space. There was a time where we had to manage computer systems ourselves with our hands—kind of—like in the prehistoric days, chiseling bits onto disk and whatnot. It was an area crying out for automation, as we started using more and more computers to run various websites. “Oh, that's a big website. It needs three servers now.” Et cetera.The times have changed rather significantly. One of the formative voices in that era was Michael DeHaan, who's joining me today, originally one of the—or if not the creator of Cobbler, and later—for which you became better known—Ansible. First, thanks for joining me.Michael: Thank you for having me. You're also making me feel very, very old there. So, uh, yes.Corey: I hear you. I keep telling people, I'm in my mid-30s, and my wife gets incensed because I'm turning 40 in July. But still. I go for the idea of yeah, the middle is expanding all the time, but it's always disturbing talking to people who are in our sector, who are younger than some of the code that we're using, which is just bizarre to me. We're all standing on the backs of giants. Like it or not, one of them's you.Michael: Oh, well, thank you. Thank you very much. Yeah, I was, like, talking to some undergrads, I was doing a little bit of stuff helping out my alma mater for a little bit, and teaching somebody the REST lecture. I was like, “In another year, REST is going to be older than everybody in the room.” And then I was just kind of… scared.Corey: Yeah. It's been a wild ride for basically everyone who's been around long enough if you don't fall off the teeter-totter and wind up breaking a limb somewhere. So, back in the bad old days, before cloud, when everything was no longer things back then were constrained by how much room you had on your credit card like they are today with cloud, but instead by things like how much space you had in the data center, what kind of purchase order you could ram through your various accounting departments. And one of the big problems you have is, great. So, finally—never on time—Dell has shipped out a whole bunch of servers—or HP or Supermicro or whoever—and the remote hands—which is always distinct from smart hands, which says something very insulting, but they seem to be good about it—would put them into racks for you.And great, so you'd walk in and see all of these brand new servers with nothing on them. How do we go ahead and configure these things? And by hand was how most of us started, and that means, oh, great, we're going to screw things up and not do them all quite the same, and it's just a treasure and a joy. Cobbler was something that you came up with that revolutionized how provisioning of bare-metal systems worked. Tell me about it.Michael: Yeah, um, so it's basically just glue. So, the story of how I came up with that is I was working for the Emerging Technologies Group at Red Hat, and I just joined. And they were like, “We have to have a solution to install Xen and KVM virtual machines.” So obviously, everybody's familiar with, like, EC2 and things now, but this was about people running non-VMware virtualization themselves. So, that was part of the problem, but in order to make that interesting, we really needed to have some automation around bare-metal installs.And that's PXE boot. So, it's TFTP and DHCP protocol and all that kind of boring stuff. And there was glue that existed, but it was usually humans would have to click on buttons to—like Red Hat had system-config-netboot, but what really happened was sysadmins all wrote their own automation at, like, every single company. And the idea that I had, and it was sort of cemented by the fact that, like, my boss, a really good guy left for another company and I didn't have a boss for, like, a couple years, was like, I'm just going to make IRC my boss, and let's get all these admins together and build a tool we can share, right?So, that was a really good experience, and it's just basically gluing all that stuff together to fully automate an install over a network so that when a system comes on, you can either pick it out from a menu; or maybe you've already got the MAC address and you can just say, “When you see this MAC address, go install this operating system.” And there's a kickstart file, or a preseed in the case of Debian, that says, “When you're booting up through the installer, basically, here's just the answers and go do these things.” And that install processes a lot slower than what we're used to, but for a bare-metal machine, that's a pretty good way to do it.Corey: Yeah, it got to a point where you could walk through and just turn on all the servers in a rack and go out to lunch, come back, they would all be configured and ready to go. And it sounds relatively basic the way we're talking about it now, but there were some gnarly cases. Like, “When I've rebooted the database server, why did it wipe itself and reprovision?” And it's, “Oh, dear.” And you have to make sure that things are—that there's a safety built into these things.And you also don't want to have to wind up plugging in a keyboard and monitor to all of these individual machines one-by-one to hit yes and acknowledge the thing. And it was a colossal pain in the ass. That's one of the things that cloud has freed us from.Michael: Yeah, definitely. And one of the nice things about the whole cloud environment is like, if you want to experiment with those ideas, like, I want to set up some DHCP or DNS, I don't have to have this massive lab and all the electricity and costs. But like, if I want to play with a load balancer, I can just get one. That kind of gives the experience of playing with all these data center technologies to everybody, which is pretty cool.Corey: On some level, you can almost view the history of all these things as speeding things up. With a well-tuned Cobbler install, it still took multiple minutes, in some cases, tens of minutes to go from machine you're powering on to getting it provisioned and ready to go. Virtual machines dropped that down to minutes. And cloud, of course, accelerated that a bit. But then you wind up with things like Docker and it gets down to less than a second. It's the meantime to dopamine.But in between the world of containers and bare-metal, there was another project—again, the one you're best known for—Ansible. Tell me about that because I have opinions on this whole space.Michael: [laugh]. Yeah. So, how Ansible got started—well, I guess configuration management is pretty old, so the people writing their own scripts, CFEngine came out, Puppet was a much better CFEngine. I was working at a company and I kind of wanted another open-source project because I enjoyed the Cobbler experience. So, I started Ansible on the side, kind of based on some frustrations around Puppet but also the desire to unify Capistrano kind of logic, which was like, “How do I push out my apps onto these servers that are already running,” with Puppet-style logic was like, “Is this computer's firewall configured directly? And is the time set correctly?”And you can obviously use that to install apps, but there's some places where that blurred together where a lot of people are using two different tools. And there's some prior art that I worked on called Funk, which I wrote with Seth Vidal and Adrian Likins at Red Hat, which was, like, 50% of the Ansible idea, and we just never built the config management layer on top. So, the idea was make something really, really simple that just uses SSH, which was controversial at the time because people thought it, like, wouldn't scale, because I was having trouble with setting up Puppet security because, like, it had DNS or timing issues or whatever.Corey: Yeah. Let's dive in a bit to what config management is first because it turns out that not everyone was living in the trenches in quite the same way that we were. I was a traveling trainer for Puppet for a summer once, and the best descriptor I found to explain it to people who are not in this space was, “All right, let's say that you go and you buy a new computer. What do you do? Well, you're going to install the applications you'd like to use, you're going to set up your own user account, you're going to set your password correctly, you're going to set up preferences, copy some files over so you have the stuff you care about. Great. Now, imagine you need to do that to a thousand computers and they all need to be the same. How do you do that?” Well, that is the world of configuration management.And there was sort of a bifurcation there, where there was the idea of, first, we're going to have configuration management that just describes what the system should look like, and that's going to run on a schedule or whatnot, and then you're going to have the other side of it, which is the idea of remote execution, of I want to run an arbitrary command on this server, or this set of servers, or all the servers, depending upon what it is. And depending on where you started on the side of that world, you wound up wanting things from the other side of that space. With Puppet, for example, is very oriented configuration management and the question became, well, can you use this for remote execution with arbitrary commands? And they wound up doing some work with Mcollective, which was a very complicated and expensive way to say, “No, not really.” There was a need for things that needed to hang out in that space.The two that really stuck out from that era were Ansible, which had its wild runaway success, and the one that I was smacking around for a bit, SaltStack, which never saw anywhere approaching that level of popularity.Michael: Yeah, sure. I mean, I think that you hit it pretty much exactly right. And it's hard to say what makes certain things take off, but I think, like, the just SSH approach was interesting because, well for one, everybody's running it. But there was this belief that this would not scale. And I tried to optimize the heck out of that because I liked performance, but it turns out that wasn't really a business problem because if you can imagine you just wrote this little bit of automation, and you're going to run it against your entire infrastructure and you've got 30,000 machines, do you want that to—if you were to, like, run an update command on 30,000 machines at once, you're going to DDoS something. Definitely, right?Corey: Yeah. Suddenly you have 30,000 machines all talk to the same things at the same times. And you want to do them in batches or smear it across.Michael: Right, so because that was there, like, you just add batch support in Ansible and things are fine, right? People want to target little small groups of things. So, like, that whole story wasn't true, and I think it was just a matter of testing this belief that everybody thought that we needed to have this whole network of things. And honestly, Salt's idea of using a message bus is great, but we took a little bit different approach with YAML because we have YAML variables in it, but they had something that compiled down to YAML. And I think those are some differences in the dialect and some things other people preferred, but—Corey: And they use Jinja, at one point to wind up making it effectively Turing complete; you could wind up having this ridicu—like, loop flow control and loops and the rest. And it was an interesting exposure to things, but yikes, at some l—at the same time.Michael: If you use all the language features in anything you can make something complicated, and too complicated. And I was like, I wanted automation to look like grocery lists. And when I started out, I said, “Hey, if anybody is doing this all day, for a day job, I will have failed.” And it clearly shows you that I have because there are people that are doing that all day. And the goal was, let me concentrate on dev and ops and my other things and keep this really, really simple.And some people just, like, get really, really into that automation technology, which is—in my opinion—why some of the earlier stuff was really popular because sysadmin were bored, so they see something new and it's kind of like a Java developer finding Perl for the first time. They're like, “I'm going to use all these things.” And they have all their little widgets, and it gets, like, really complicated.Corey: The thing that I always found interesting and terrifying at the same time about Ansible was the fact that you did ride on top of SSH, which is great because every company already had a way of controlling access by SSH to IT systems; everyone uses it, so it has an awful lot of eyes on the security protocol on the rest. The thing that I found terrifying in the early days was that more or less every ops person would wind up checking this out onto their laptop or whatnot, so whenever they wanted to run something, they would just run it from their laptop over a VPN or whatnot from wherever they happen to be, and you wind up with a dueling banjos type of circumstance where people were often not doing it from a centralized place. And in time, best practices emerged where, okay, that is going to be the command and control server where that runs at, and you log into it. And then you start guarding that with CI/CD flows and the rest. And like anything else, it wound up building some operational approaches to it.Michael: Yeah. Like, I kind of think that created a problem that allowed us to sell a product, right, which was good. If you knew what you were doing, you could use Jenkins completely and you'd be fine, right, if you had some level of discipline and access control, and you wanted to wire that up. And if you think about cloud, this whole, like, shadow IT idea of, “I just want to do this thing, therefore I'm going to get an Amazon account,” it's kind of the same thing. It's like, “I want to use this config management, but it's not approved. Who can stop me?” Right?And that kind of probably got us in the door in few accounts that way. But yeah, it did definitely create the problem where multiple people could be running things at the same time. So yeah, I mean, that's true.Corey: And the idea of, “Hey, maybe I should be controlling these things in Git,” or some other form of version control was sort of one of those evolutionary ideas that, oh, we could treat this like code. And the early days of DevOps, that was a controversial thing. These days, you say you're not doing it and people look at you very strangely. And things were going reasonably well in that direction for a while. Then this whole Docker thing showed up, where, well, what if instead of having these long-lived servers where you have to install updates and run patches and maintain a whole user list on them, instead you had this immutable infrastructure that every time there was a change, you would just go ahead and deploy a brand new set of servers?And you could do this in the olden days with virtual machines and whatnot; it just took a long time to push things out, so do I really want to roll the entire fleet for a two-line config change? Probably not, so we're going to batch it up, or maybe do this hybrid model. With Docker, it takes less than a second to wind up provisioning the—switching over to the new container series and you're done; you can keep going with that. That really solved a lot of these problems.But there were companies that, like, the entire configuration management space, who suddenly found themselves in a really weird position. Some of them tried to fight the tide forever and say, “Oh, this is terrible because it means we don't have a business model anymore.” But you can only fight the future for so long. And I think today, we'd be hard-pressed to say that Docker hasn't won, on some level.Michael: I mean, I think it has, like, the technology has won. But I guess the interesting thing is, config management now seems to be trying to pivot towards networking where I think the tool hasn't ever been designed for networking, so it's kind of a round peg, square hole. But it's all people have that unless they're buying something. Or, like, deploying the undercloud because, like, people are still running essentially clouds on top of clouds to get their Kubernetes deployments going and those are monstrous. Or maybe to deploy a data layer; like, I know Kafka has gotten off of ZooKeeper, but the Kafka-ZooKeeper thing—and I don't remember ZooKeeper [unintelligible 00:14:37] require [unintelligible 00:14:38] or not, but managing those sort of long, persistent implications, it still has a little bit of a place where it exists.But I mean, I think the whole immutable systems idea is theoretically completely great. I never was really happy with the whole Docker development workflow, and I think it does create a problem where people don't know what they're deploying and you kind of encourage that to where they could be deploying different versions of libraries, or—and that's kind of just a problem of the whole microservices thing in general where, “Did somebody change this?” And then I was working very briefly at one company where we essentially built a whole dashboard to detect service versions and what version of the base image everybody was on, and all these other things, and it can get out of hand, too. So, it's kind of like trading some problems for other problems, I think to me. But in general, containerization is good. I just wished the management glue around it was easy, right?Corey: I wound up giving a talk at a conference a while back, 2015 or so, called, “Heresy in the Church of Docker,” and it was a throwaway five-minute lightning talk, and someone approached me afterwards with, “Hey, can you give the full version of that at ContainerCon?” “There's a full version? Yes. Yes, I can.” And it talked about a number of problems with the management layer and the rest.Now, Kubernetes absolutely solves virtually every problem that I identified with it, but when you look at the other side of it, getting Kubernetes rolled out is effectively you get to cosplay being a cloud provider yourself. It is incredibly complicated, and of course, we're right back to managing it all with YAML.Michael: Right. And I think that's an interesting point, too, is I don't know who's exactly responsible for, like, the YAML explosion. And I like it as a data format; it's really good for humans. Cobbler originally used it more of an internal storage, which I think was a mistake because, like, even—I was trying to avoid setting up a database at the time, so—because I knew if I had to require setting up a database in 2007 or 2008, I'd get way less users, so it used flat files.A lot of the YAML dialects people are developing now are very, very nested and they requires, like, loading a webpage, for the Docks, like, all the time and reading what's valid here, what's valid there. I think people learn the wrong lesson from Ansible's YAML usage, right? It was supposed to be, like, YAML's good for things that are grocery lists. And there's a lot of places where I didn't do a good job. But when you see methods taking 15 parameters and you have to constantly have the reference up, maybe that's a sign that you should do something else.Corey: At least you saved us, on some level, from having to do this all in XML. But still, there are wrong ways and more wrong ways to do it. I don't think anyone could ever agree on the right way to approach these things.Michael: Yeah. I mean, and YAML, at the time was a good answer because I knew I didn't want to write and maintain a parser as, like, a guy that was running a project. We had a lot of awesome contributors, but if I had to also maintain a DSL, not only does that mean that I have to write the code for this thing—which I, you know, observed slowing down some other projects—but also that I'd have to explain it to people. Looking kind of like Bash was not a bad thing. Not having to know and learn something, so you can kind of feel really effective in about 15 minutes or something like that.Corey: One of the things that I find really interesting about you personally is that you were starting off in a bare-metal world; Ansible was sort of wherever you wanted to run it. Great, as long as there are systems that can receive these things, we're great. And now the world has changed, and for better or worse, configuration management slash remote execution is not the problem it once was and it is not a best practice way of solving a lot of those problems either. But you aren't spending your time basically remembering the glory years. You're actively moving forward doing some fairly interesting stuff. How would you describe what you're into these days?Michael: I tried to create a few projects to, like, kind of build other systems management things for the same audience for a while. I was building a build server and a new—trying to do some next-gen config stuff. And I saw people weren't interested. But I like having conversations with people, right, and I think one of the lessons from Ansible was how to explain highly technical things to technical audiences and cut out a lot of the marketing goo and all that; how to get people excited about an idea and make a community be really authentic. So, I've been writing about that for really, it's—rebooted blog is only a couple of weeks old. But also kind of trying to do some—helping out companies with some, like, basic marketing kind of stuff, right?There's just this pattern that everybody has where every website starts with this little basic slogan and two buttons and then there's a bunch of adjectives, but it doesn't say anything. So, how can you have really good documentation, and how can you explain an idea? Because, like, really, the reason you're in it is not just to sell stuff, but it's to help people and to see them get excited about your ideas. And there's just, like, we're not doing a good job in this, like, world where there's thousands upon thousands of applications, all competing at once to, like—how do you rise above that?Corey: And that's always the hard part is at some point, this does become your identity and you become known for a thing. And when you start branching out from that thing, you bring the expertise from that area that you were in, but you start applying it to new things. I feel like so many companies get focused—and people get focused—on assuming that their audience is just like them, where they're coming in with the exact same biases, the exact same experiences. And given that basically no one was as deep in the weeds as you were when it came to configuration management, that meant that you were spending time in that side of the world, not in other pursuits which aligned in some ways more directly with people developing other things. So, I suspect this might be one of the weird things we have in common when we show up and see something new.And a company is really excited. It's like, it's basically a few people talking [unintelligible 00:20:12] that both founders are technical. And they're super excited about something they can't quite articulate. And it's this, “Slow down. Tell me exactly what it is your product does.” And that's a hard thing to do because my default response was always the if I don't understand that is clearly the way in which I am deficient somehow. But marketing is really about clear communication and there's not that much of it in our space, at least not for early-stage companies.Michael: Yeah, I don't know why that is. I mean, I think there's this belief in that there's, like, this buyer audience where there's some vice president that's going to buy your stuff if you drop the right buzzwords. And 15 years ago, like, you had to say ‘synergy,' and now you say ‘time to value' or ‘total cost of ownership' or something. And I don't think that's true. I mean, I think people use products that they like and that they need to be shown them to try them out.So like, why can't your webpage have a diagram and a screenshot instead of this, like, picture of a couple of people drinking coffee around a computer, right? It's basic stuff. But I agree with you, I kind of feel dumb when I'm looking at all these tech products that I should be excited about, and, like, the way that we get there, as we ask questions. And the way that I've actually figured out what some of these things do is usually having to ask questions from someone who uses them that I randomly find on my diminishing circle of friends, right? And that's kind of busted.So, Ansible definitely had a lot of privilege in the way that it was launched in the sense that I launched it off Cobbler list and Cobbler list started off of [ET Management Tools 00:21:34] which was a company list. But people can do things like meetup groups really easily, they can give talks, they can get their blogs reblogged, and, you know, hope for some Hacker News or Reddit juice or whatever. But in order to get that to happen, you have to be able to talk to engineers that really want to know what you're doing, and they should be excited about it. So, learn to talk to them.Corey: You have to speak their language but without going so deep in the weeds that the only people that understand it are the folks who are never going to use your product because they want to build it themselves. It's a delicate balance to strike.Michael: And it's a difficult thing to do, too, when you know about it. So, when I was, like, developing all the Ansible docs, I've told people many times—and I hope it's true—that I, like, spent, like, 40% of my time just on the website and the docs, and whenever I heard somebody complain, I tried to fix it. But the idea was like, you can lose somebody really fast, but you kind of have to forget what you know about the product. So, the worst person to sometimes look at that as the person that built it. So, you have to forget what you know, and try to see, like, what questions they're asking, what do they need to find out? How do they want to learn something?And for me, I want to see a lot of pictures. A lot of people write a bunch of giant walls of text, or worse for me is when there's just these little pithy expressions and I don't know what they mean, right? And everybody's, like, kind of doing that these days.Corey: This episode is sponsored in part by our friends at ChaosSearch. You could run Elasticsearch or Elastic Cloud—or OpenSearch as they're calling it now—or a self-hosted ELK stack. But why? ChaosSearch gives you the same API you've come to know and tolerate, along with unlimited data retention and no data movement. Just throw your data into S3 and proceed from there as you would expect. This is great for IT operations folks, for app performance monitoring, cybersecurity. If you're using Elasticsearch, consider not running Elasticsearch. They're also available now in the AWS marketplace if you'd prefer not to go direct and have half of whatever you pay them count towards your EDB commitment. Discover what companies like Equifax, Armor Security, and Blackboard already have. To learn more, visit chaossearch.io and tell them I sent you just so you can see them facepalm, yet again.48]Corey: One thing that I've really found myself enjoying recently has been your substack-based newsletter, Speaking Techis what you call it. And I didn't quite know what to expect when I signed up for it, but it's been a few weeks now, and you are more or less hitting across the board on a bunch of different things, ranging from engineering design patterns, to a teardown of random company's entire website from a marketing and messaging perspective—which I just adore personally; like that is very aligned with how I see the world—Michael: There's more of that coming.Corey: Yeah, [unintelligible 00:23:17] a bunch of other stuff. Let's talk about, for example, the idea of those teardowns. I always found that I have to be somewhat careful in how I talk about it when I'm doing a tweet thread or something like that because you are talking about people's work, let's be clear here, and I tend to be a lot kinder to small, early-stage companies than I am to, you know, $1.6 trillion companies who really should have solved for this by now, on some level. But so much of it misses the mark of great, here's the way that I think about these things. Here's the way that I don't understand what the hell you're telling me.An easy example of this for me, at least I'm curious to get your thoughts on it, I tend to almost always just skim what they're saying, great. Let's look at the pricing page because I find that speaks to people in a way that very often companies forget that they're speaking to customers.Michael: Yeah, for sure. I always tried to find the product page lately, and then, like, the product page now is, like, a regurgitation of the homepage. But it's what you said earlier. I think I try to stay nice to everybody, but it's good to show people how to understand things by counterexample, to some extent, right? Like, oh, I've got some stuff coming out—I don't know when this is actually going to get published—but next week, where I was like just taking random snippets of home pages, and like, “What's everybody doing with the header these days?”And there's just, like, ridiculous amounts of copying going on. But it's not just for, like, people's companies because everybody listening here isn't going to have a company. If you have a project and you wanted to get it noticed, right, I think, like, in the early days, the projects that I paid attention to and got excited about were often the ones that spend time on their website and their messaging and their experience. So, everybody kind of understands you have to write a good readme now but some of, like, the early Ruby crowd, for instance, did awesome, awesome web pages. They know how to pick out fonts, and I still don't know how to pick out fonts. But—Corey: I ask someone good at those things. That's how I pick ‘em.Michael: Yeah, yeah. That's not my job; get somebody that's good at that. But all that matters, right? So, if you do invest a little bit in not promoting yourself, not promoting your company, but trying to help people and communicate to them, you can build that audience around your thing and it makes it a lot more interesting.Corey: There's so many great tools out there that I find on GitHub that other people have to either point me to or I find it when I'm looking at it from a code-first perspective, just trying to find a particular example of the library being used, where they do such a terrible job of describing the problem that they solve, and it doesn't take much; it takes a paragraph or two at most. Or the idea that, “Oh, yeah, here's a way to do this thing. Just go ahead and get your credential file somewhere else.” Great. Could you maybe link to an example of how to do that?It's the basic stuff; assume that someone who isn't you might possibly want to use this. And I'm not even slightly suggesting that you wind up talking your way through how to do all of that. Just link to somewhere that has a good write-up of it and call it good. Just don't get in the way of people's first-time user experiences.Michael: Yeah, for sure. And—Corey: For some reason, that's a radical thought.Michael: Yeah, I think one of the things the industry has—well, not the industry; it's not their problem to solve, but, like, we don't really have a way for people to find what's cool and interesting anymore. So, various people have their own little lists on GitHub or whatever, but there's just so many people posting on the one or two forums people read and it goes by in a day. So, it's really, really hard to get attention. Even your own circle of followers isn't really logging into Twitter or anything, or LinkedIn. Or there's all the congratulations for your five years of Acme Corp kind of posts, and it's really, really hard to get attention.And I feel for everybody, so like, if somebody like GitHub or Microsoft is listening, and you wanted to build, like, a dashboard of here's the cool 15 projects for the week, kind of thing where everybody would see it, and start spotlight some of these really cool new things, that would be awesome, right?Corey: Whenever you see those roundups, that was things like Kubernetes and Docker. And great, I don't think those projects need the help in the same way.Michael: No, no, they don't. It's like maybe somebody's cool data thing, or a cool visualization, or the other thing that's—it's completely random, but I used to write fun graphics programs for fun or games and libraries. And I don't see that anymore, right? Maybe if you find it, you can look for it, but the things that get people excited about programming. Maybe they have no commercial value at all, but the way that people discover stuff is getting so consolidated is about Docker and Kubernetes. And everyone's talking about these three things, and if you're not Google or you're not Facebook, it's really—or Amazon, obviously—it's hard to get attention.Corey: Open-source on some level has changed from a community perspective. And part of it is because once upon a time, you could start with the very low-level stuff and build something, get it up and working. And that's where things like [Cobbler 00:27:44] and Ansible came out of. Now it's, “Click the button and use the thing everyone else is using. And if you're not doing that, what are you doing over there?”So, the idea of getting started tinkering with computers are built on top of so many frameworks and other things. And that's always been the case, but now it's much more apparent in some ways. “Okay, I'm going to go ahead and build out my first HTML file and serve it out using something in Node.” “Great, what is those NPM stuff that's scrolling past?” It's like, “The devil. That is the devil's own language you are seeing scroll past. And you don't need to worry about that; just pretend it's not there.”But back when I was learning all this stuff, we're paying attention to things scrolling past, like, you know, compilation messages and the Linux boot story as it wound up scrolling past. Terrible story; the protagonist was unreliable, but all right. And you start learning how these things work when you start scratching at the things that you're just sort of hand-waving and glossing over. These days, it feels like every time I use a modern project, that's everything.Michael: I mean, it is. And like what, React has, like, 2000 dependencies, right? So, how do you ever feel like you understand it? Or when recruiters are asking for ten years at Amazon. And then—or we find a library that it can only explain itself by being like this other library and requiring these other five.And you read one of those, and it becomes, like, this… tree of knowledge that you have no way of possibly understanding. So, we've just built these stacks upon stacks upon stacks of things. And I tend to think I kind of believe in minimalism. And like, wouldn't it be cool if we just burned this all and start—you know, we burn the forest and let something new regrow. But we tend to not do that. We just—now running a cloud on top of a cloud, and our JavaScript is thousands of miles high.Corey: I really wish that there were better paths for getting started. Like, I used to think that the right way to wind up learning how all this stuff work is to do what I did: Start off as, you know, the grumpy sysadmin type, and then—or help desk—and then work your way up and the rest. Those jobs aren't there anymore, and it doesn't leave people in a productive environment. “Oh, you want to build a computer game. Great. For an iPhone? Terrific.” Where do you go to get started on that? It's a hard thing to do.And people don't care at that scale, nor should they necessarily, on how to run your own servers. Back in the day when you wanted to have a blog on the internet, you were either reduced to using LiveJournal or MySpace, or you were running your own web server and had to learn how to make sure that it didn't become an attack platform. There was a learning curve that was fairly steep. Now, there are so many different paths to go down, you don't really need to know how any of these things even work.Michael: Yeah, I think, like, one of the—I don't know whether DevOps means anything as a topic or not, but one of the original pieces around that movement was systems administrators learning to code things and really starting to enjoy it, whether that was Python or Ruby, and so on. And now it feels like we're gluing all the things together, but that's happening in App Dev as well, right? The number of people that can build a really, really good library from the ground up, like, something that has C bindings, that's a really, really small crowd. And most of it, what we're doing is gluing together other people's libraries and compensating for the flaws and bugs in them, and duct tape and error handling or whatever. And it feels like programming has changed a lot because of this—and it's good if you want to get an idea up quickly, no doubt. But it's a different experience.Corey: The problem I always ran into was the similar problems I had with doing Debian packaging. It was always the, oh, great, there's going to be four or five different guides on how to do it—same story with RPM—and they're all going to be assuming different things, and you can crossover between them without realizing it. And then you just do something monstrous that kind of works until an actual Debian developer shoves you aside like you were a hazard to everyone around you. Let me do it for you. And there we go.It's basically, get people to do work for you by being really bad at it. And I don't love that pattern, but I'm still reminded of that because there are so many different ways to achieve any outcome that, okay, I want to run a ridiculous Hotdog or Not Hotdog style website out there. Great. I can upload things. Well, Docker or serverless? What provider do I want to put it on? And oh, by the way, a lot of those decisions very early on are one-way doors that you don't realize you're crossing through, as well as not knowing what the nuances of all of those things are. And that's dangerous.Michael: I think people are also learning the vendor as well, right? Some people get really engrossed in whether it's Amazon, or Google, or HashiCorp, or somebody's API, and you spend so much of your brain cells just learning how these people's systems work versus, like, general programming practices or whatever.Corey: I make it a point to build something on other cloud providers that aren't Amazon every now and then, just because I don't want to wind up effectively embracing a monoculture.Michael: Yeah, for sure. I mean, I think that's kind of the trend I see with people looking just at the Kubernetes stuff, or whatever, it's that I don't think it necessarily existed in web dev; there seems to be a lot of—still a lot of creativity and different frameworks there, but people are kind of… what's popular? What gets me my next job, and that kind of thing. Whereas before it was… I wasn't necessarily a sysadmin; I kind of stumbled into building admin tools. I kind of made hammers not houses or whatever, but basically, everybody was kind of building their own tools and deciding what they wanted. Now, like, people that are wanting to make money or deciding what people want for them. And it's kind of not always the simplest, easiest thing.Corey: So, many open-source projects now are—for example, one that I was dealing with recently was the AWS CLI. Great, like, I'm thrilled to throw in issues and challenges here, but I'm not going to spend significant time writing code against it because, one, it's basically impossible to get these things accepted when all the maintainers work at Amazon, and two, is it really an open-source project in the way that you and I think about community and the rest, but it's basically sole purpose is to funnel money to Amazon faster. Like, that isn't really a community ethos I feel comfortable getting behind to be perfectly honest. They're a big company; they can afford to pay people to build these things out, full time.Michael: Yeah. And GitHub, I mean, we all mostly, I think, appreciate the fact that we can host the Git repo and it's performant and everything, and we don't have blazing unicorns quite as often or whatever they used to have, but it kind of changed the whole open-source culture because we used to talk about things on mailing lists, like, what should this be, and there was like an upfront conversation, or it might happen on IRC. And now people are used to just saying, “I've got a problem. Fix it for me.” Or they're throwing code over the wall and it might not be the code or feature that you wanted because they're not really part of your thing.So before, people would get really engrossed with, like, just a couple of projects, and if they were working on them as kind of like a collective of people working against different organizations, we'd talk about things, and they kind of know what was going on. And now it's very easy to get a patch that you don't want and you're, like, “Oh, can you change all of these things?” And then somebody's, like, now they're offended because now they have to do all this extra work, whereas that conversation didn't happen. And GitHub could absolutely remodel themselves to encourage those kinds of conversations and communities, but part of the death of open-source and the fact that now it's, “Give me free code,” is because of that kind of absence of the—because we're looking at that is, like, the front of a community versus, like, a conversation.Corey: I really want to appreciate your taking so much time out of your day to basically reminisce about some of these things. But on a forward-looking basis, if people want to learn more about how you see things, where's the best place to find you?Michael: Yeah. So, if you're interested in my blog, it's pretty random, but it's michaeldehaan.substack.com. I run a small emerging consultancy thing off of michaeldehaan.net. And that's basically it. My Twitter is laserllama if you want to follow that. Yeah, thank you very much for having me. Great conversation. Definitely making all this technology feel old and busted, but maybe there's still some merit in going back—Corey: Old and busted because it wasn't built this year? Great—Michael: Yes.Corey: —yes, its legacy, which is a condescending engineering term for ‘it makes money.' Yeah, there's an entire universe of stuff out there. There are companies that are still toying with virtualization: “Is this something we get on board with?” There's nothing inherently wrong with that. I find that judging what a bunch of startups are doing or ‘company started today' is a poor frame of reference to look at what you should do with your 200-year-old insurance company.Michael: Yeah, like, [unintelligible 00:35:53] software engineering is just ridiculously new. Like, if you compare it to, like, bridge-building, or even electrical engineering, right? The industry doesn't know what it's doing and it's kind of stumbling around trying to escape local maxima and things like that.Corey: I will, of course, put links to where to find you into the [show notes 00:36:09]. Thanks again for being so generous with your time. It's appreciated.Michael: Yeah, thank you very much.Corey: Michael DeHaan, founder of Cobbler, Ansible, and oh, so much more than that. I'm Cloud Economist Corey Quinn, and this is Screaming in the Cloud. If you've enjoyed this podcast, please leave a five-star review on your podcast platform of choice—and/or smash the like and subscribe buttons on the YouTubes—whereas if you've hated this podcast, please leave a five-star review on your podcast platform of choice, smash the buttons as mentioned, and leave a loud, angry comment explaining what you hated about it that I will then summarily reject because it wasn't properly formatted YAML.Corey: If your AWS bill keeps rising and your blood pressure is doing the same, then you need The Duckbill Group. We help companies fix their AWS bill by making it smaller and less horrifying. The Duckbill Group works for you, not AWS. We tailor recommendations to your business and we get to the point. Visit duckbillgroup.com to get started.Announcer: This has been a HumblePod production. Stay humble.
Vous avez probablement déjà aperçu une communication de Time for the Planet, ou TFTP, sur les réseaux sociaux, dans la rue ou à la TV. La plus emblématique : Pisser sous la douche ne suffira pas ! Le cheval de bataille de ce mouvement qui mêle les codes de l'entrepreneuriat, du monde de l'invest et de l'entreprise libérée, c'est la planète ! Son credo : sauver la Terre en créant des entreprises innovantes au modèle économique viable et scalable. Très ambitieux, et déjà très réel. Aujourd'hui, plus de 50 000 associés soutiennent déjà la cause de TFTP. Et le nombre grandit chaque semaine. Des associés au statut un peu particulier car ils ne bénéficient pas de retour sur investissement financier. On parle plutôt de dividendes "climat" ! Aujourd'hui, le mouvement TFTP est mené par 6 entrepreneurs chevronnés et une communauté investie. Leurs forces : la passion et l'enthousiasme ! Arthur Auboeuf, l'un de ses fondateurs, raconte les enjeux et les coulisses de ce modèle original, innovant et impactant au micro d'Innovation Leaders ! Il explique aussi :
This week we had an impromptu conversation in the midst of tensions stemming from the Russia/Ukraine conflict and were joined by alt-media darling, Carey Wedler and TFTP contributor, Don Via Jr. There was a lot to unpack in this episode with the highly contentious geo-political climate. We talked about media misconceptions, the history and nuance of the conversation, neo-Nazis in Ukraine, speculation of bio weapon labs, how the media targets manipulating emotions, what the left gets right and wrong and the right's romanticism with Putin, Russia hate and new Trojan horse policies to usher in more censorship, the reemergence of the anti-war movement and what it looks like for all this to end or escalate into WW3. Length: 1 hr 34 secs.
The title of the TFTP article is: Veteran Attacked, His Service Dog Tasered After Angry Woman Wrongly Accused Him Of Panhandling. I did not read the article or comments in full detail. I am focusing on the NL implications. In this episode I will discuss: review of last episode, review of immorality = enslavement equation, brief description of TFTP article and how this relates to NL, how NL Karma really works, the veteran - Karen - cops and even the bystanders(who did not support the assault of the veteran) are all immoral in one way or another, harsh comment not feeling sorry for the veteran congruent with NL, NL is harsh, NL is about freedom and the preservation of the biosphere, the television environmental scare tactics do not even begin to describe how dire and immediate the human caused destruction is to the planet, humans do not have the right to take the lives of animals for food, meat factory farms, I am NOT a vegetarian, I am reducing harm, people should try to cut down on meat meals gradually to reduce harm, activism, only a free society can solve the pollution problems, nuclear weapons and power plants are a death sentence, Fukishima, the petroleum industry, other carbon based fuels, other trace gas byproducts of industry.
Carey is best known for her countless viral videos challenging the establishment narrative. She has also written for FEE which is the Foundation For Economic Education. Prior to her work at FEE she was the Anti Media's editor in chief from 2014 to 2018 which was TFTP's alt media ally. On this podcast, we reflected on the third anniversary of 'The Purge' (which was a day when Facebook and Twitter removed hundreds of pages and accounts on the same day.) We also took on the following: If big tech specifically targeted our organizations because we threatened them. How 'The Purge' affected the trajectory of our lives. How alt media affected the way Mainstream media covered protests like Standing Rock. How Trump didn't realize he was helping push the "fake news" narrative. How the Washington Post helped sell establishment lies for blatant censorship and targeted independent journalists. How the newest Facebook whistle blower, Frances Haugen could likely be an establishment plant. How Facebook is anything but a private company. How and why a NATO think tank helped target alt media. The different treatment for corporate and government whistleblowers. How the Biden administration protects previous administration war criminals. Why we should stay optimistic about the future of the internet and how the establishment is radicalizing people by censoring dissident thought. Decentralization and the importance of supporting independent journalism and how we can effectively move past the tyranny of big tech. Follow Carey on IG: https://www.instagram.com/careywedler/ Follow Carey On FB: https://www.facebook.com/CareyWedler Follow Carey on YouTube: https://www.youtube.com/c/careyelizabeth824 Follow Carey on Odysee: https://odysee.com/@CareyWedler Follow Carey on Twitter: https://twitter.com/carey_wedler
In this episode I will discuss: the main focus of reading the TFTP article was the immorality side of the behavioral law equation, U.S. economic sanctions of Iran and other countries in the past, most people are ignorant of the suffering of others, all humans have free will, we are all free so it is not necessary as well as contradictory for Americans to create and fight in overseas wars, natural behavioral law proxies, natural laws are a science not religion, politicians are equated with the existence of morality, people think that without politicians that there aren't any rules, there are always laws of behavior in existence, police and military are the substitutes for the consequences of natural behavioral laws, humans use violence as a consequence, proxies within proxies, the political left(mommy), the political right(daddy), money as a proxy for true value, all NL proxies survive due to human fears, cannot enforce laws, self - defense is not law enforcement it is alignment with natural laws, paradoxes and contradictions from the existence of behavioral law proxies, I am not playing word games, laws cannot be created or destroyed by humans, people think that without police there will be no consequences for immorality, owning a firearm does not make you a man, Bishop as an allegory in the movie: Juice.
If you've been managing your real estate leads for a while now I'm sure you've experienced how hard it is to find a decent CRM. Well, in this episode of Tips From The Pros I interviewed the owner of the BEST real estate CRM in the market, REsimpli. ⚡⚡THIS IS A MUST LISTEN TO INTERVIEW!⚡⚡ We covered A LOT with Sharad Mehta. Everything from techniques on how to stay focused, work life balance, real estate lead generation, to using REsimpli to manage your WHOLE real estate investing business! ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
Today I interviewed a gentleman who used to bail hay in East Texas and now is the founder and CEO of 1% Listings. The decision to innovate resulted in his business 1% Lists and motto Full Service for Less, is recognized as the fastest-growing company in the nation according to the Inc.5000 A second-generation Realtor, once Teacher and Basketball coach pushed into the branding world is now Franchising throughout the East Coast. His entire business plan is based on how to provide the best value by value-based agents and do it at a much lower cost! And to bring an industry that needs this type of mindset and integrity from within itself. ⏰ TIME CODES ⏰ - BelowAnnouncement:
Are you needing a hard money loan for your next rehab? As Real Estate Investors, funding your deals is an obstacle we all face! ***Join Our Insider Community Text "TFTP" to 210-794-9898 for Insider Tips, information on live streams, events, and amazing free resources! On this episode of Tips From The Pros - Former Hard Money Lender Employee... Austin Linney Shares EVERYTHING! Not sure if you should get a Hard Money Loan? WATCH THIS! ⏰ TIME CODES ⏰0:00 ✅ Working With Hard Money Lenders When Flipping Houses 3:06 ✅ Why real estate investing 5:21 ✅How your core values keep you out of trouble 7:19 ✅ What do hard money lenders look at 13:00 ✅ Where the hard money lenders get all their money 16:52 ✅ How do you justify somebody's experience 19:21 ✅ What is a HUD 19:41 ✅ What an investor should ask a hard money lender 25:16 ✅ Is Social media making investors motivated buyers 31:22 ✅ Don't focus on the sizzle and take a major risk 32:45 ✅ The BEST deal you ever get is the deal YOU don't BUY 33:17 ✅ Interviewing the Rockefellars - Sell EARLY! 35:50 ✅ Having a lifeblood in your business 36:42 ✅ Repositioning debt & Risk Tolerance in Texas 39:10 ✅ Reading the Tea Leaves. Time IN the market 41:23 ✅ Is it ok not to see the fruits from your investment for 4 years 42:12 ✅ Chasing the WRONG rabbit is NOT the way to go 43:17 ✅ What action can I take today to move the needle 44:00 ✅ Don't go running off YOUR private money lenders 45:04 ✅ YOU have to get married to the process Divorced from the results 46:49 ✅ That's easy for YOU to say BUT I'M BROKE & I don't have enough time 50:36 ✅ It CAN be DONE. Focus on the purpose 59:14 ✅ Let go of YOUR EGO..Talk about YOUR results 1:09:41✅ Breaking down the hard money loan details 1:19:20✅ What is the IMPACT to the investor to take the $$ back 1:22:33✅ What is the best way to use a hard money loan 1:24:07✅ What is a good vetting process to build a relationship with 1:26:07✅ What has 5 years done for Austin Linney 1:31:58✅ A nameless Construction Company that has sold 2 houses Books Austin recommended:
With 6 Zip Codes Under 1 month of inventory... the San Antonio Real Estate Market is HOT
Learn Wireshark if you are serious. Get the full Wireshark course for $9: https://bit.ly/wireshark20 Need help? Join my Discord: https://discord.com/invite/usKSyzb Download pcapng file here: https://bit.ly/wiresharkospf Questions and Answers: https://bit.ly/2KVp64a Menu: Overview: 0:00 Questions: 0:24 Answers: 2:46 In this course I'm going to show you how to capture packets from a network, how to capture passwords, replay voice conversations, view routing protocol updates and many more options. Do you know network protocols? Want to learn wireshark and have some fun? This is the course for you: Learn Wireshark practically. Wireshark pcapng files provided so you can practice while you learn! There is so much to learn in this course: - Capture Telnet, FTP, TFTP, HTTP passwords. - Replay VoIP conversations. - Capture routing protocol (OSPF) authentication passwords. - Troubleshoot network issues. - Free software. - Free downloadable pcapng files. - Answer quiz questions. The course is very practical. You can practice while you learn! Learn how to analyze and interpret network protocols and leverage Wireshark for what it was originally intended: Deep Packet Inspection and network analysis. Protocols we capture and discuss in this course include: - Telnet - FTP - TFTP - HTTP - VoIP - OSPF - EIGRP - DNS - ICMP ====================== Special Offers: ====================== Cisco Press: Up to 50% discount Save every day on Cisco Press learning products! Use discount code BOMBAL during checkout to save 35% on print books (plus free shipping in the U.S.), 45% on eBooks, and 50% on video courses and simulator software. Offer expires December 31, 2020. Shop now. Link: bit.ly/ciscopress50 ITPro.TV: https://itpro.tv/davidbombal 30% discount off all plans Code: DAVIDBOMBAL Boson software: 15% discount Link: https://bit.ly/boson15 Code: DBAF15P GNS3 Academy: CCNA ($10): https://bit.ly/gns3ccna10 Wireshark ($10): https://bit.ly/gns3wireshark DavidBombal.com DavidBombal.com: CCNA ($10): http://bit.ly/yt999ccna Wireshark ($9): https://bit.ly/wireshark9 Who this course is for: Network Engineers Network Architects Networking Students ccna ccnp ccna 200-301 ccna wireshark ospf ospf wireshark Wireshark wireshark download wireshark tutorial 2020 wireshark tutorial for beginners wireshark 2020 packet sniffing Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Let's talk about PXE booting! Before we set anything up, it's important to get a grasp on the fundamentals. In this video I am going to cover DHCP, the DORA process, and how PXE and TFTP fit into the process. It'll be a hoot! ----------------------------------------------------------------------------------------------------- Patreon: https://www.patreon.com/nedinthecloud Website: https://nedinthecloud.com Pluralsight: https://app.pluralsight.com/profile/author/edward-bellavance GitHub: https://github.com/ned1313
On this episode of Tales from the Podcast we have our good friend Andy Imhof on to discus the film Hubie Halloween! https://instagram.com/tales_from_the_podcasthttps://twitter.com/TalesFromThePodhttps://facebook.com/groups/talesfromthepodcastAnd can contact me through my website:http://talesfromthepodcast.comAnd email us here at talesfromthepodcast13@gmail.com
Jason Bassler, co-founder, of The Free Thought Project and Police the Police, joins me for episode 108 of Beyond the Ballot!Share this episode for your chance to win a Keep Key hardware crypto wallet from Voluntary Apothecary! Just share on any social media and @ Beyond the Ballot or use the hashtag #GoBeyondTheBallot to enter!Find Jason and his projects everywhere:TFTP Website: https://thefreethoughtproject.com/Subscribe to TFTP:https://thefreethoughtproject.com/tftp-membership/TFTP On Minds:https://www.minds.com/TheFreeThoughtProject.comTFTP on MeWe: https://mewe.com/p/thefreethoughtprojectTFTP on Flote.app: https://flote.app/FreeThoughtProjectTFTP On YouTube:https://www.youtube.com/channel/UCmT7hTV8VJU6CiCGEs6hFbwTFTP On Instagram:https://www.instagram.com/thefreethoughtproject/?hl=enTFTP On Tumblr:http://thefreethoughtprojectcom.tumblr.com/Our new FB Pages:https://www.facebook.com/tftp4.0/https://www.facebook.com/PoliceThePolice3.0/TFTP Facebook Group:https://www.facebook.com/groups/TFTPGROUP/TFTP Email List:https://bit.ly/2ONkb6KTFTP Podcast:http://thefreethoughtproject.podbean.com/TFTP Podcast Itunes:https://apple.co/2yNlUxWTFTP Telegram: https://t.me/TheFreeThoughtProject_OfficialMy personal FB accounthttps://www.facebook.com/jason.bassler.1My Twitter:@jasonbassler1https://twitter.com/JasonBassler1My MeWe account: https://mewe.com/i/jasonbasslerBeyond the Ballot is sponsored by Project Sparta! Get fit and stay healthy in this crazy world by visiting www.projectspartacoaching.comShout out to Voluntary Apothecary! Check out their line of beard and moustache care products and more at https://voluntaryapothecary.com/ and take 10% off your order at checkout with coupon code "BEYOND".Everything Beyond the Ballothttps://www.gobeyondtheballot.com/Patreonhttps://www.patreon.com/m/beyondtheballotMerchhttps://beyondtheballot.threadless.com/Facebookhttps://www.facebook.com/BeyondBallotPod/Instagram and Twitter: @BeyondBallotPodhttps://twitter.com/BeyondBallotPodhttps://www.instagram.com/beyondballotpod/Youtubehttps://www.youtube.com/c/BeyondtheBallotApple Podcastshttps://podcasts.apple.com/us/podcast/beyond-the-ballot/id1441268179Google Podcastshttps://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5idXp6c3Byb3V0LmNvbS8yMDc5MDcucnNzSpotifyhttps://open.spotify.com/show/25Kmo1f90mvKTOFr0Rd3miiHeartRadiohttps://www.iheart.com/podcast/31088071Podcast Addicthttps://podcastaddict.com/podcast/2284270Podchaserhttps://www.podchaser.com/podcasts/beyond-the-ballot-751143Listen Noteshttps://www.listennotes.com/podcasts/beyond-the-ballot-beyond-the-ballot-qAjCaQwED8p/Stitcherhttps://www.stitcher.com/podcast/nick-irwin/enemy-of-the-states-dank-podstashTuneIn+Alexahttps://tunein.com/podcasts/Philosophy-Podcasts/Enemy-of-the-States-Dank-Pod-Stash-p1154183/Beyond the Ballot is Produced by Nick Irwin, Dave Akins, Dennis Wiscount, and Chuck Smitley.Music for Beyond the Ballot by https://www.instagram.com/jjboogie/
I show you how to capture and replay VoIP calls between virtual and physical IP phones. Get the full Wireshark course for $9: https://bit.ly/wireshark9 Need help? Join my Discord: https://discord.com/invite/usKSyzb Menu: Overview: 0:00 Network Setup: 0:50 Skinny: 2:20 Start Wireshark and capture: 3:40 Filter for SCCP: 4:16 Capture virtual phone VoIP calls: 6:08 Physical phone VoIP capture: 16:20 Download pcapng file here: https://bit.ly/wiresharkvoip In this course I'm going to show you how to capture packets from a network, how to capture passwords, replay voice conversations, view routing protocol updates and many more options. Do you know network protocols? Want to learn wireshark and have some fun? This is the course for you: Learn Wireshark practically. Wireshark pcapng files provided so you can practice while you learn! There is so much to learn in this course: - Capture Telnet, FTP, TFTP, HTTP passwords. - Replay VoIP conversations. - Capture routing protocol (OSPF) authentication passwords. - Troubleshoot network issues. - Free software. - Free downloadable pcapng files. - Answer quiz questions. The course is very practical. You can practice while you learn! Learn how to analyze and interpret network protocols and leverage Wireshark for what it was originally intended: Deep Packet Inspection and network analysis. Protocols we capture and discuss in this course include: - Telnet - FTP - TFTP - HTTP - VoIP - OSPF - EIGRP - DNS - ICMP ====================== Special Offers: ====================== Cisco Press: Up to 50% discount Save every day on Cisco Press learning products! Use discount code BOMBAL during checkout to save 35% on print books (plus free shipping in the U.S.), 45% on eBooks, and 50% on video courses and simulator software. Offer expires December 31, 2020. Shop now. Link: bit.ly/ciscopress50 ITPro.TV: https://itpro.tv/davidbombal 30% discount off all plans Code: DAVIDBOMBAL Boson software: 15% discount Link: https://bit.ly/boson15 Code: DBAF15P GNS3 Academy: CCNA ($10): https://bit.ly/gns3ccna10 Wireshark ($10): https://bit.ly/gns3wireshark DavidBombal.com DavidBombal.com: CCNA ($10): http://bit.ly/yt999ccna Wireshark ($9): https://bit.ly/wireshark9 Who this course is for: Network Engineers Network Architects Networking Students Wireshark wireshark download wireshark tutorial 2020 wireshark tutorial for beginners wireshark 2020 packet sniffing Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Both TFTP and FTP are insecure protocols. Everything is sent in clear text - including all usernames and passwords. Don't use them. Get the full Wireshark course for $9: https://bit.ly/wireshark9 Need help? Join my Discord: https://discord.com/invite/usKSyzb Free Wireshark and Ethical Hacking Course: Video #7. Watch the entire series here: https://bit.ly/wiresharkhacking Menu Overview: 0:00 Start Capture: 0:48 Ping test: 1:00 Copy files using TFTP: 1:40 Filter for TFTP: 2:27 Follow UDP stream: 2:45 FTP intro: 3:53 Upload a file using FTP: 4:16 Filter for FTP: 4:35 Follow TCP stream: 4:47 Download TFTP pcapng file here: https://bit.ly/311IjXc Download FTP pcapng file here: https://bit.ly/3iUlz1A Don't use TFTP or FTP! It sends everything in clear text. That means that someone can capture everything you send on the network - including usernames and passwords. In this course I'm going to show you how to capture packets from a network, how to capture passwords, replay voice conversations, view routing protocol updates and many more options. Do you know network protocols? Do you know how to hack? Want to learn wireshark and have some fun with Ethical hacking? This is the course for you: Learn Wireshark practically. Wireshark pcapng files provided so you can practice while you learn! There is so much to learn in this course: - Capture Telnet, FTP, TFTP, HTTP passwords. - Replay VoIP conversations. - Capture routing protocol (OSPF) authentication passwords. - Troubleshoot network issues. - Free software. - Free downloadable pcapng files. - Answer quiz questions. The course is very practical. You can practice while you learn! Learn how to analyze and interpret network protocols and leverage Wireshark for what it was originally intended: Deep Packet Inspection and network analysis. Protocols we capture and discuss in this course include: - Telnet - FTP - TFTP - HTTP - VoIP - OSPF - EIGRP - DNS - ICMP ====================== Special Offers: ====================== Cisco Press: Up to 50% discount Save every day on Cisco Press learning products! Use discount code BOMBAL during checkout to save 35% on print books (plus free shipping in the U.S.), 45% on eBooks, and 50% on video courses and simulator software. Offer expires December 31, 2020. Shop now. Link: bit.ly/ciscopress50 ITPro.TV: https://itpro.tv/davidbombal 30% discount off all plans Code: DAVIDBOMBAL Boson software: 15% discount Link: https://bit.ly/boson15 Code: DBAF15P GNS3 Academy: CCNA ($10): https://bit.ly/gns3ccna10 Wireshark ($10): https://bit.ly/gns3wireshark DavidBombal.com CCNA ($10): https://bit.ly/ccnafor10 Wireshark ($9): https://bit.ly/wireshark9 Who this course is for: Network Engineers Network Architects Ethical hackers Networking Students Wireshark wireshark download wireshark tutorial 2020 wireshark tutorial for beginners wireshark 2020 packet sniffing ethical hacking hacking Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Telnet is one of those really insecure protocols. Everything is sent in clear text - including all usernames and passwords. Don't use telnet. Get the full Wireshark course for $9: https://bit.ly/wireshark9 Need help? Join my Discord: https://discord.com/invite/usKSyzb Free Wireshark and Ethical Hacking Course: Video #6. Watch the entire series here: https://bit.ly/wiresharkhacking Download pcapng file here: https://bit.ly/2GSsNGg Don't use Telnet! It sends everything in clear text. That means that someone can capture everything you send on the network - including usernames and passwords. In this course I'm going to show you how to capture packets from a network, how to capture passwords, replay voice conversations, view routing protocol updates and many more options. Do you know network protocols? Do you know how to hack? Want to learn wireshark and have some fun with Ethical hacking? This is the course for you: Learn Wireshark practically. Wireshark pcapng files provided so you can practice while you learn! There is so much to learn in this course: - Capture Telnet, FTP, TFTP, HTTP passwords. - Replay VoIP conversations. - Capture routing protocol (OSPF) authentication passwords. - Troubleshoot network issues. - Free software. - Free downloadable pcapng files. - Answer quiz questions. The course is very practical. You can practice while you learn! Learn how to analyze and interpret network protocols and leverage Wireshark for what it was originally intended: Deep Packet Inspection and network analysis. Protocols we capture and discuss in this course include: - Telnet - FTP - TFTP - HTTP - VoIP - OSPF - EIGRP - DNS - ICMP Menu: Overview: 0:00 Network: 0:30 Start Capture :2:06 Filter for Telnet: 4:02 Follow TCP stream: 5:35 ====================== Special Offers: ====================== Cisco Press: Up to 50% discount Save every day on Cisco Press learning products! Use discount code BOMBAL during checkout to save 35% on print books (plus free shipping in the U.S.), 45% on eBooks, and 50% on video courses and simulator software. Offer expires December 31, 2020. Shop now. Link: bit.ly/ciscopress50 ITPro.TV: https://itpro.tv/davidbombal 30% discount off all plans Code: DAVIDBOMBAL Boson software: 15% discount Link: https://bit.ly/boson15 Code: DBAF15P GNS3 Academy: CCNA ($10): https://bit.ly/gns3ccna10 Wireshark ($10): https://bit.ly/gns3wireshark DavidBombal.com CCNA ($10): https://bit.ly/ccnafor10 Wireshark ($9): https://bit.ly/wireshark9 Who this course is for: Network Engineers Network Architects Ethical hackers Networking Students Wireshark wireshark download wireshark tutorial 2020 wireshark tutorial for beginners wireshark 2020 packet sniffing ethical hacking hacking Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Wireshark overload?! Use a filter! Get the full Wireshark course for $9: https://bit.ly/wireshark9 Join my Discord here: http://discord.davidbombal.com
When using Wireshark, you're going to want to use Display Filters to filter what you see. In this video I show you how to use them. Get the full Wireshark course for $9: https://bit.ly/wireshark9
You need to span or mirror Ethernet ports on switches to be able to capture packets. Otherwise unicast frames sent to know MAC addresses in your network will not be sent to your Wireshark monitoring station. Get the full Wireshark course for $9: https://bit.ly/wireshark9
This is a complete Wireshark and Ethical hacking course. Get the full Wireshark course for $9: https://bit.ly/wireshark9
This is a complete Wireshark and Ethical hacking course. Get the full Wireshark course for $9: https://bit.ly/wireshark9
This is a complete Wireshark and Ethical hacking course. DavidBombal.com: Wireshark ($9): https://bit.ly/wireshark9
Audio grabado simultáneamente del directo de Youtube. Prepárate para una explosión mental. El almacenamiento conectado en red, Network Attached Storage (NAS), es el nombre dado a una tecnología de almacenamiento dedicada a compartir la capacidad de almacenamiento de un computador/ordenador (servidor) con computadoras personales o servidores clientes a través de una red (normalmente TCP/IP), haciendo uso de un sistema operativo optimizado para dar acceso con los protocolos CIFS, NFS, FTP o TFTP. También se podría considerar un sistema NAS a un servidor (Microsoft Windows, Linux, etcétera) que comparte sus unidades por red, pero la definición suele aplicarse a sistemas específicos. Los protocolos de comunicaciones NAS están basados en archivos por lo que el cliente solicita el archivo completo al servidor y lo maneja localmente, por lo que están orientados a manipular una gran cantidad de pequeños archivos. Los protocolos usados son protocolos de compartición de archivos como Network File System (NFS) o Microsoft Common Internet File System (CIFS).
In this episode of the Collective Defense Podcast we are jumping into honeypots, honeynets, and how emerging threats can be proactively detected with Peter Rydzynski. On the new front we analyzed a number of stories including the most recent Marriott breach, zoombombs and WarDialz, and of course more insecure Wordpress plugins. Software Mentioned in this episode: SELKS https://www.stamus-networks.com/scirius-open-source (https://www.stamus-networks.com/scirius-open-source) Both live and installable Network Security Management ISO based on Debian Complete Suricata IDS/IPS ecosystem with its own graphic rule manager From start to analysis of IDS/IPS and NSM events in 30 sec Major components: Suricata Elasticsearch Logstash Kibana Moloch Scirius Community Edition EveBox Cowrie https://github.com/cowrie/cowrie (https://github.com/cowrie/cowrie) Cowrie is a medium to high interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker. In medium interaction mode (shell) it emulates a UNIX system in Python, in high interaction mode (proxy) it functions as an SSH and telnet proxy to observe attacker behavior to another system. Cowrie is maintained by Michel Oosterhof. Dionaea https://github.com/DinoTools/dionaea (https://github.com/DinoTools/dionaea) This low-interaction honeypot written in C and Python uses the Libemu library to emulate the execution of Intel x86 instructions and detect shellcodes. In addition, we can say it’s a multi-protocol honeypot that offers support for protocols such as FTP, HTTP, Memcache, MSSQL, MySQL, SMB, TFTP, etc. Protocols blackhole epmap ftp http memcache mirror mqtt mssql mysql pptp sip smb tftp upnp Logging fail2ban hpfeeds log_json log_sqlit Netcat http://netcat.sourceforge.net/ (http://netcat.sourceforge.net/) Netcat is a featured networking utility which reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities. It provides access to the following main features: Outbound and inbound connections, TCP or UDP, to or from any ports. Featured tunneling mode which allows also special tunneling such as UDP to TCP, with the possibility of specifying all network parameters (source port/interface, listening port/interface, and the remote host allowed to connect to the tunnel. Built-in port-scanning capabilities, with randomizer. Advanced usage options, such as buffered send-mode (one line every N seconds), and hexdump (to stderr or to a specified file) of trasmitted and received data. Optional RFC854 telnet codes parser and responder. Modern Honey Network https://github.com/pwnlandia/mhn (https://github.com/pwnlandia/mhn) MHN is a centralized server for management and data collection of honeypots. MHN allows you to deploy sensors quickly and to collect data immediately, viewable from a neat web interface. Honeypot deploy scripts include several common honeypot technologies, including Snort, Cowrie, Dionaea, and glastopf, among others. Features MHN is a Flask application that exposes an HTTP API that honeypots can use to: Download a deploy script Connect and register Download snort rules Send intrusion detection logs It also allows system administrators to: View a list of new attacks Manage snort rules: enable, disable, download
Over the years, TFTP has reported on outrageous police crimes ranging from hiring hit-men to kill girlfriends for refusing to have an abortion to urinating on children. Crimes committed by those sworn to uphold the law seemingly know no bounds. While rape is an unfortunately common crime among police officers, a cop in Maryland was indicted this week, not only for rape but also attempting to infect a woman with the human immunodeficiency virus, or HIV. We can now add ‘spreading HIV' to the long list of utterly horrifying police crimes. https://thefreethoughtproject.com/cop-indicted-raping-woman-infecting-hiv/ Subscribe to more videos:https://www.youtube.com/c/PoliceBrutalityWorldwide Check out my Fiverr link: https://www.fiverr.com/kingemjay?up_rollout=true My blog: https://policebrutalityworldwide.blogspot.com/ My Website: http://www.policebrutalityworldwide.com Check this Surf roam link: https://surfroam.com?tap_a=22019-573852&tap_s=492427-1313ee My paypal link: www.paypal.me/kingemjayconsulting Other links:http://raphead.com/profile/DJEMJAY Mining site: https://cryptouniverse.io/en/r/EQGGJZEO https://blackjunction.com/?ref=KINGEMJAY https://blackjunction.tv/@KINGEMJAY Get CryptoBrowser:https://get.cryptobrowser.site/7009526 My podcasts: https://anchor.fm/king-emjay https://www.breaker.audio/police-brutality-worldwide-and-other-issues https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9jZmJiNDVjL3BvZGNhc3Qvcn https://overcast.fm/itunes1474561111/police-brutality-worldwide-and-other-issues https://pca.st/3T3i https://radiopublic.com/police-brutality-worldwide-and-ot-WlVlPJ https://open.spotify.com/show/7e03mnageYIJKloX3iG40g PI Network: https://minepi.com/KingEmjay3355 https://www.karatbars.com/?s=kingemjay https://www.karatbars.com/shop/?s=kingemjay https://www.karatbars.com/landing/?s=kingemjay https://lp1.kb-universe.com/?referer=kingemjay https://www.dualmine.com/?ref=88302 https://baioafrikstan5.ning.com/?xgi=OPNVkQvdmcVWBW CashApp:£DaOfficerofdadamnlaw http://chng.it/kT9ygt7kPn https://client.iqmining.com/rf/190f2a5fe1f09 . . . . . . . #PBWWChannel #DaOfficerOfDaDamnLaw #MartiqueVanderpool Feel supa dupa free to contact me at my email: kingemjay3355@gmail.com Stay melanin
Wichita, KS — Last year, a cop was fired after he shot a little girl inside her own home while trying to kill her dog. Showing that they are willing to hold their own accountable, the officer was charged with felony aggravated battery the following March. However, this month, TFTP has learned that a Wichita judge ruled the cop is immune from criminal prosecution and can't be sued. https://thefreethoughtproject.com/cop-shoots-little-girl-while-shoot-her-dog/ Subscribe to more videos:https://www.youtube.com/c/PoliceBrutalityWorldwide Check out my Fiverr link: https://www.fiverr.com/kingemjay?up_rollout=true My blog: https://policebrutalityworldwide.blogspot.com/ My Website: http://www.policebrutalityworldwide.com Check this Surf roam link: https://surfroam.com?tap_a=22019-573852&tap_s=492427-1313ee My paypal link: www.paypal.me/kingemjayconsulting Other links:http://raphead.com/profile/DJEMJAY Mining site: https://cryptouniverse.io/en/r/EQGGJZEO https://blackjunction.com/?ref=KINGEMJAY https://blackjunction.tv/@KINGEMJAY Get CryptoBrowser:https://get.cryptobrowser.site/7009526 My podcast: https://anchor.fm/king-emjay PI Network: https://minepi.com/KingEmjay3355 https://www.karatbars.com/?s=kingemjay https://www.karatbars.com/shop/?s=kingemjay https://www.karatbars.com/landing/?s=kingemjay https://lp1.kb-universe.com/?referer=kingemjay https://www.dualmine.com/?ref=88302 https://baioafrikstan5.ning.com/?xgi=OPNVkQvdmcVWBW CashApp:£DaOfficerofdadamnlaw http://chng.it/kT9ygt7kPn https://client.iqmining.com/rf/190f2a5fe1f09 . . . . . . . #PBWWChannel #DaOfficerOfDaDamnLaw #dexterbetts Feel supa dupa free to contact me at my email: kingemjay3355@gmail.com Stay melanin
Austin, TX — In 2015, TFTP reported on the case of Austin Police Officer VonTrey Clark who was suspected of hiring a hitman to kill his pregnant ex-girlfriend because she refused to get an abortion, and he did not want to pay child support. For years, he refused to admit guilt. All that changed this month, however, and he finally pleaded guilty. https://thefreethoughtproject.com/cops-life-in-prison-hitman-abortion/ Subscribe to more videos:https://www.youtube.com/c/PoliceBrutalityWorldwide Check out my Fiverr link: https://www.fiverr.com/kingemjay?up_rollout=true My blog: https://policebrutalityworldwide.blogspot.com/ My Website: http://www.policebrutalityworldwide.com Check this Surf roam link: https://surfroam.com?tap_a=22019-573852&tap_s=492427-1313ee My paypal link: www.paypal.me/kingemjayconsulting Other links:http://raphead.com/profile/DJEMJAY Mining site: https://cryptouniverse.io/en/r/EQGGJZEO https://blackjunction.com/?ref=KINGEMJAY https://blackjunction.tv/@KINGEMJAY Get CryptoBrowser:https://get.cryptobrowser.site/7009526 My podcast: https://anchor.fm/king-emjay PI Network: https://minepi.com/KingEmjay3355 https://www.karatbars.com/?s=kingemjay https://www.karatbars.com/shop/?s=kingemjay https://www.karatbars.com/landing/?s=kingemjay https://lp1.kb-universe.com/?referer=kingemjay https://www.dualmine.com/?ref=88302 https://baioafrikstan5.ning.com/?xgi=OPNVkQvdmcVWBW CashApp:£DaOfficerofdadamnlaw http://chng.it/kT9ygt7kPn https://client.iqmining.com/rf/190f2a5fe1f09 . . . . . . . #PBWWChannel #DaOfficerOfDaDamnLaw #vontreyclark Feel supa dupa free to contact me at my email: kingemjay3355@gmail.com Stay melanin
Open source won the last decade, but what if it hadn’t? We look back at some major milestones and reflect on a world where they never existed. Special Guests: Alex Kretzschmar and Brent Gervais.
Network Automation isn't difficult. With just a few CLI commands you can automate the backup of your Cisco networks. Use Kron and archive to back up configs to TFTP, FTP or SCP servers. Don't try to do everything manually. Automate it! Just like cron in Linux, you can use kron on Cisco IOS to schedule things. Schedule backups, schedule TCL scripts and much more. Amaze others with your knowledge of the Cisco IOS. You don't need python for these scripts. Rock that job interview and show senior network engineers what you can do. Keep on learning and change your life. Get that good paying job by showing your skills. Menu: 1) Intro: 0:01 2) IOS requirements: 2:02 3) Lab Setup: 2:42 4) Kron config: 4:24 5) Archive config: 9:01 In later videos I'll show you how to use Python scripts and other cool options on Cisco IOS devices. ================================ Free TFTP Server: ================================= Free SolarWinds TFTP Server: http://bit.ly/2mbtD6j ================================= Documentation: ================================= Kron: http://bit.ly/2kkgIhU Archive: http://bit.ly/2kI8BMb http://bit.ly/2mgQa1L ================================= Books: ================================= Cisco Press Book: https://amzn.to/2LpaU1a Good O'Reilly Book: https://amzn.to/2Lpbw6Z ================================= Kron Script: ================================= kron policy-list backupconfig cli show running-config | redirect tftp://10.1.3.4/r1-shrun.cfg kron occurrence backupminute in 1 recurring policy-list backupconfig kron occurrence backupweekly at 23:00 Sun recurring policy-list backupconfig debug kron all show kron schedule ================================= Archive Script: ================================= archive log config logging enable hidekeys path tftp://10.1.3.4/$h- wr time-peiod 10080 ! sh archive ================================= 10x Engineer CCNA DevNet Cisco Devnet Associate CCNP Enterprise CCNP Security CCNP Data Center CCNP Service Provider CCNP Collaboration Cisco Certified Devnet Professional Cisco Certified Network Professional Python Network Automation Network Programmability LPIC 1 LPIC 2 Linux Professional Institute LX0-103 LX0-104 XK0-004 How did you find this video? Did you enjoy learning about kron and the archive of your configs? scripts? All the best! David Bombal David's details: YouTube: https://www.youtube.com/davidbombal Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co Website: http://www.davidbombal.com #ccna #devnet #python
Get the course for $10 on Udemy: http://bit.ly/2IXZnn8 or GNS3 Academy: http://bit.ly/2J4PzIb This is a tshark and Termshark tutorial: It is now possible to capture and view Wireshark captures directly in a console window. No need for a graphical user interface (GUI) - you can do all of this directly within a Linux terminal or console. tshark and Termshark installation: ============================== tshark: apt-get install tshark Termshark: wget https://github.com/gcla/termshark/releases/download/v1.0.0/termshark_1.0.0_linux_x64.tar.gz tar -xf termshark_1.0.0_linux_x64.tar.gz cd termshark_1.0.0_linux_x64 install termshark /usr/local/bin How to use: tshark -w tshark1.pcap termshark -r tshark1.pcap Help: termshark UserGuide: https://github.com/gcla/termshark/blob/master/docs/UserGuide.md Course overview: Do you know network protocols? Do you know how to hack? Want to learn wireshark and have some fun with Ethical hacking? This is the course for you: Learn Wireshark practically. Wireshark pcapng files provided so you can practice while you learn! There is so much to learn in this course: - Capture Telnet, FTP, TFTP, HTTP passwords. - Replay VoIP conversations. - Capture routing protocol (OSPF) authentication passwords. - Troubleshoot network issues. - Free software. - Free downloadable pcapng files. - Answer quiz questions. The course is very practical. You can practice while you learn! Learn how to analyze and interpret network protocols and leverage Wireshark for what it was originally intended: Deep Packet Inspection and network analysis. Protocols we capture and discuss in this course include: - Telnet - FTP - TFTP - HTTP - VoIP - OSPF - EIGRP - DNS - ICMP Who this course is for: Network Engineers Network Architects Ethical hackers Networking Students #wireshark #termshark #tshark
Get the course for $10 here: http://bit.ly/2IXZnn8 Do you know network protocols? Do you know how to hack? Want to learn wireshark and have some fun with Ethical hacking? This is the course for you: Learn Wireshark practically. Wireshark pcapng files provided so you can practice while you learn! There is so much to learn in this course: - Capture Telnet, FTP, TFTP, HTTP passwords. - Replay VoIP conversations. - Capture routing protocol (OSPF) authentication passwords. - Troubleshoot network issues. - Free software. - Free downloadable pcapng files. - Answer quiz questions. The course is very practical. You can practice while you learn! Learn how to analyze and interpret network protocols and leverage Wireshark for what it was originally intended: Deep Packet Inspection and network analysis. Protocols we capture and discuss in this course include: - Telnet - FTP - TFTP - HTTP - VoIP - OSPF - EIGRP - DNS - ICMP Who this course is for: Network Engineers Network Architects Ethical hackers Networking Students #CCNA #Wireshark #Hacking
I introduce this series with the questions of why did Paul use body armor to explain spiritual warfare in parts throughout this introduction.
This week, John, Jason and Matt share their thoughts on the recent shake up at YouTube over questionable children's content, which is causing major advertisers to leave. Youtube and other online platforms have also been under pressure to control the narrative on issues like vaccines.The TFTP team breaks down what this means for freedom on the internet.
[YouTube Video Version: https://youtu.be/orFOxKC4KdE] Instead of taking this censorship move lying down, TFTP co-founder, Jason Bassler and Conscious Resistance founder, Derick Broze organized the United for Common Ground summit in Houston to plan a strategy to fight back. “We walked away with some powerful ideas, a solid game plan and made connections that will last a lifetime and hopefully beyond. We have a lot of work ahead of us but many of us are now reinvigorated. This was a perfect opportunity to refocus our strategies and refine our potency for the future,” Bassler explained. The event was attended by the following organizations and individuals: The Free Thought Project, The Anti Media, The Mind Unleashed, Mint Press News, The Conscious Resistance Network, News2Share, Standup911, Danny F. Quest, Rachel Blevins, Andrew Aponick, Joey Lankowski, Aaron Treefi Nelson, People Over Politics, Lee Camp, Factions of Freedom, We Are Change Orlando, Sterlin Lujan, Bill Ottman, Eleanor Goldfield, Anita MonCrief, and others. Become An EXCLUSIVE Member: https://www.patreon.com/FreedomFaction Website: http://factionsoffreedom.jimdo.com/ Newsletter Sign-Up: http://eepurl.com/c-V3MD Email: FreedomsFaction@Gmail.com Instagram: @Freedom_Faction, @Freedoms_Faction FaceBook: https://www.facebook.com/factionsoffreedom/ Twitter: @FreedomsFaction, @NoizceEra Donate: https://www.paypal.me/noizceera Store: https://factionsoffreedom.jimdo.com/store/ Operation Dunamis: https://www.gofundme.com/operation-dunamis
[YouTube Video Version: https://youtu.be/nqN3glJGgEU] Instead of taking this censorship move lying down, TFTP co-founder, Jason Bassler and Conscious Resistance founder, Derick Broze organized the United for Common Ground summit in Houston to plan a strategy to fight back. “We walked away with some powerful ideas, a solid game plan and made connections that will last a lifetime and hopefully beyond. We have a lot of work ahead of us but many of us are now reinvigorated. This was a perfect opportunity to refocus our strategies and refine our potency for the future,” Bassler explained. The event was attended by the following organizations and individuals: The Free Thought Project, The Anti Media, The Mind Unleashed, Mint Press News, The Conscious Resistance Network, News2Share, Standup911, Danny F. Quest, Rachel Blevins, Andrew Aponick, Joey Lankowski, Aaron Treefi Nelson, People Over Politics, Lee Camp, Factions of Freedom, We Are Change Orlando, Sterlin Lujan, Bill Ottman, Eleanor Goldfield, Anita MonCrief, and others. Become An EXCLUSIVE Member: https://www.patreon.com/FreedomFaction Website: http://factionsoffreedom.jimdo.com/ Newsletter Sign-Up: http://eepurl.com/c-V3MD Email: FreedomsFaction@Gmail.com Instagram: @Freedom_Faction, @Freedoms_Faction FaceBook: https://www.facebook.com/factionsoffreedom/ Twitter: @FreedomsFaction, @NoizceEra Donate: https://www.paypal.me/noizceera Store: https://factionsoffreedom.jimdo.com/store/ Operation Dunamis: https://www.gofundme.com/operation-dunamis
#TheDreadWolfRises, Anthem hype, Dragon Age vs The Elder Scrolls 6, Dragon Age: Deception ending, etc. Join us for our final festive TFTP of the year! --- Support this podcast: https://anchor.fm/tinfoil-tea-party/support
The Free Thought Project is an alt media site that has reached billions with our articles & social media pages. We offer a perspective outside the left/right paradigm that values peace, freedom & truth. This week, all of our pages were taken down on both Facebook & Twitter, so we are taking to the airwaves with a new podcast to bypass the censorship we are currently facing. In this episode we discuss the purge & future of TFTP.
FreeBSD internship learnings, exciting developments coming to FreeBSD, running FreeNAS on DigitalOcean, Network Manager control for OpenBSD, OpenZFS User Conference Videos are here and batch editing files with ed. Headlines What I learned during my FreeBSD intership Hi, my name is Mitchell Horne. I am a computer engineering student at the University of Waterloo, currently in my third year of studies, and fortunate to have been one of the FreeBSD Foundation’s co-op students this past term (January to April). During this time I worked under Ed Maste, in the Foundation’s small Kitchener office, along with another co-op student Arshan Khanifar. My term has now come to an end, and so I’d like to share a little bit about my experience as a newcomer to FreeBSD and open-source development. I’ll begin with some quick background — and a small admission of guilt. I have been an open-source user for a large part of my life. When I was a teenager I started playing around with Linux, which opened my eyes to the wider world of free software. Other than some small contributions to GNOME, my experience has been mostly as an end user; however, the value of these projects and the open-source philosophy was not lost on me, and is most of what motivated my interest in this position. Before beginning this term I had no personal experience with any of the BSDs, although I knew of their existence and was extremely excited to receive the position. I knew it would be a great opportunity for growth, but I must confess that my naivety about FreeBSD caused me to make the silent assumption that this would be a form of compromise — a stepping stone that would eventually allow me to work on open-source projects that are somehow “greater” or more “legitimate”. After four months spent immersed in this project I have learned how it operates, witnessed its community, and learned about its history. I am happy to admit that I was completely mistaken. Saying it now seems obvious, but FreeBSD is a project with its own distinct uses, goals, and identity. For many there may exist no greater opportunity than to work on FreeBSD full time, and with what I know now I would have a hard time coming up with a project that is more “legitimate”. What I Liked In all cases, the work I submitted this term was reviewed by no less than two people before being committed. The feedback and criticism I received was always both constructive and to the point, and it commented on everything from high-level ideas to small style issues. I appreciate having these thorough reviews in place, since I believe it ultimately encourages people to accept only their best work. It is indicative of the high quality that already exists within every aspect of this project, and this commitment to quality is something that should continue to be honored as a core value. As I’ve discovered in some of my previous work terms, it is all too easy cut corners in the name of a deadline or changing priorities, but the fact that FreeBSD doesn’t need to make these types of compromises is a testament to the power of free software. It’s a small thing, but the quality and completeness of the FreeBSD documentation was hugely helpful throughout my term. Everything you might need to know about utilities, library functions, the kernel, and more can be found in a man page; and the handbook is a great resource as both an introduction to the operating system and a reference. I only wish I had taken some time earlier in the term to explore the different documents more thoroughly, as they cover a wide range of interesting and useful topics. The effort people put into writing and maintaining FreeBSD’s documentation is easy to overlook, but its value cannot be overstated. What I Learned Although there was a lot I enjoyed, there were certainly many struggles I faced throughout the term, and lessons to be learned from them. I expect that some of issues I faced may be specific to FreeBSD, while others may be common to open-source projects in general. I don’t have enough experience to speculate on which is which, so I will leave this to the reader. The first lesson can be summed up simply: you have to advocate for your own work. FreeBSD is made up in large part by volunteer efforts, and in many cases there is more work to go around than people available to do it. A consequence of this is that there will not be anybody there to check up on you. Even in my position where I actually had a direct supervisor, Ed often had his plate full with so many other things that the responsibility to find someone to look at my work fell to me. Admittedly, a couple of smaller changes I worked on got left behind or stuck in review simply because there wasn’t a clear person/place to reach out to. I think this is both a barrier of entry to FreeBSD and a mental hurdle that I needed to get over. If there’s a change you want to see included or reviewed, then you may have to be the one to push for it, and there’s nothing wrong with that. Perhaps this process should be easier for newcomers or infrequent contributors (the disconnect between Bugzilla and Phabricator definitely leaves a lot to be desired), but we also have to be aware that this simply isn’t the reality right now. Getting your work looked at may require a little bit more self-motivation, but I’d argue that there are much worse problems a project like FreeBSD could have than this. I understand this a lot better now, but it is still something I struggle with. I’m not naturally the type of person who easily connects with others or asks for help, so I see this as an area for future growth rather than simply a struggle I encountered and overcame over the course of this work term. Certainly it is an important skill to understand the value of your own work, and equally important is the ability to communicate that value to others. I also learned the importance of starting small. My first week or two on the job mainly involved getting set up and comfortable with the workflow. After this initial stage, I began exploring the project and found myself overwhelmed by its scale. With so many possible areas to investigate, and so much work happening at once, I felt quite lost on where to begin. Many of the potential projects I found were too far beyond my experience level, and most small bugs were picked up and fixed quickly by more experienced contributors before I could even get to them. It’s easy to make the mistake that FreeBSD is made up solely of a few rock-star committers that do everything. This is how it appears at face-value, as reading through commits, bug reports, and mailing lists yields a few of the same names over and over. The reality is that just as important are the hundreds of users and infrequent contributors who take the time to submit bug reports, patches, or feedback. Even though there are some people who would fall under the umbrella of a rock-star committer, they didn’t get there overnight. Rather, they have built their skills and knowledge through many years of involvement in FreeBSD and similar projects. As a student coming into this project and having high expectations of myself, it was easy to set the bar too high by comparing myself against those big committers, and feel that my work was insignificant, inadequate, and simply too infrequent. In reality, there is no reason I should have felt this way. In a way, this comparison is disrespectful to those who have reached this level, as it took them a long time to get there, and it’s a humbling reminder that any skill worth learning requires time, patience, and dedication. It is easy to focus on an end product and simply wish to be there, but in order to be truly successful one must start small, and find satisfaction in the struggle of learning something new. I take pride in the many small successes I’ve had throughout my term here, and appreciate the fact that my journey into FreeBSD and open-source software is only just beginning. Closing Thoughts I would like to close with some brief thank-you’s. First, to everyone at the Foundation for being so helpful, and allowing this position to exist in the first place. I am extremely grateful to have been given this unique opportunity to learn about and give back to the open-source world. I’d also like to thank my office mates; Ed: for being an excellent mentor, who offered an endless wealth of knowledge and willingness to share it. My classmate and fellow intern Arshan: for giving me a sense of camaraderie and the comforting reminder that at many moments he was as lost as I was. Finally, a quick thanks to everyone else I crossed paths with who offered reviews and advice. I appreciate your help and look forward to working with you all further. I am walking away from this co-op with a much greater appreciation for this project, and have made it a goal to remain involved in some capacity. I feel that I’ve gained a little bit of a wider perspective on my place in the software world, something I never really got from my previous co-ops. Whether it ends up being just a stepping stone, or the beginning of much larger involvement, I thoroughly enjoyed my time here. Recent Developments in FreeBSD Support for encrypted, compressed (gzip and zstd), and network crash dumps enabled by default on most platforms Intel Microcode Splitter Intel Spec Store Bypass Disable control Raspberry Pi 3B+ Ethernet Driver IBRS for i386 Upcoming: Microcode updater for AMD CPUs the RACK TCP/IP stack, from Netflix Voting in the FreeBSD Core Election begins today: DigitalOcean Digital Ocean Promo Link for BSD Now Listeners Running FreeNAS on a DigitalOcean Droplet Need to backup your FreeNAS offsite? Run a locked down instance in the cloud, and replicate to it The tutorial walks though the steps of converting a fresh FreeBSD based droplet into a FreeNAS Create a droplet, and add a small secondary block-storage device Boot the droplet, login, and download FreeNAS Disable swap, enable ‘foot shooting’ mode in GEOM use dd to write the FreeNAS installer to the boot disk Reboot the droplet, and use the FreeNAS installer to install FreeNAS to the secondary block storage device Now, reimage the droplet with FreeBSD again, to replace the FreeNAS installer Boot, and dd FreeNAS from the secondary block storage device back to the boot disk You can now destroy the secondary block device Now you have a FreeNAS, and can take it from there. Use the FreeNAS replication wizard to configure sending snapshots from your home NAS to your cloud NAS Note: You might consider creating a new block storage device to create a larger pool, that you can more easily grow over time, rather than using the boot device in the droplet as your main pool. News Roundup Network Manager Control for OpenBSD (Updated) Generalities I just remind the scope of this small tool: allow you to pre-define several cable or wifi connections let nmctl to connect automatically to the first available one allow you to easily switch from one network connection to an other one create openbox dynamic menus Enhancements in this version This is my second development version: 0.2. I've added performed several changes in the code: code style cleanup, to better match the python recommendations adapt the tool to allow to connect to an Open-wifi having blancs in the name. This happens in some hotels implement a loop as work-around concerning the arp table issue. The source code is still on the git of Sourceforge.net. You can see the files here And you can download the last version here Feedbacks after few months I'm using this script on my OpenBSD laptop since about 5 months. In my case, I'm mainly using the openbox menus and the --restart option. The Openbox menus The openbox menus are working fine. As explain in my previous blog, I just have to create 2 entries in my openbox's menu.xml file, and all the rest comes automatically from nmctl itself thanks to the --list and --scan options. I've not changed this part of nmctl since it works as expected (for me :-) ). The --restart option Because I'm very lazy, and because OpenBSD is very simple to use, I've added the command "nmctl --restart" in the /etc/apm/resume script. Thanks to apmd, this script will be used each time I'm opening the lid of my laptop. In other words, each time I'll opening my laptop, nmctl will search the optimum network connection for me. But I had several issues in this scenario. Most of the problems were linked to the arp table issues. Indeed, in some circumstances, my proxy IP address was associated to the cable interface instead of the wifi interface or vice-versa. As consequence I'm not able to connect to the proxy, thus not able to connect to internet. So the ping to google (final test nmctl perform) is failing. Knowing that anyhow, I'm doing a full arp cleanup, it's not clear for me from where this problem come from. To solve this situation I've implemented a "retry" concept. In other words, before testing an another possible network connection (as listed in my /etc/nmctl.conf file), the script try 3x the current connection's parameters. If you want to reduce or increase this figures, you can do it via the --retry parameter. Results of my expertise with this small tool Where ever I'm located, my laptop is now connecting automatically to the wifi / cable connection previously identified for this location. Currently I have 3 places where I have Wifi credentials and 2 offices places where I just have to plug the network cable. Since the /etc/apm/resume scripts is triggered when I open the lid of the laptop, I just have to make sure that I plug the RJ45 before opening the laptop. For the rest, I do not have to type any commands, OpenBSD do all what is needed ;-). I hotels or restaurants, I can just connect to the Open Wifi thanks to the openbox menu created by "nmctl --scan". Next steps Documentation The tool is missing lot of documentation. I appreciate OpenBSD for his great documentation, so I have to do the same. I plan to write a README and a man page at first instances. But since my laziness, I will do it as soon as I see some interest for this tool from other persons. Tests I now have to travel and see how to see the script react on the different situations. Interested persons are welcome to share with me the outcome of their tests. I'm curious how it work. OpenBSD 6.3 on EdgeRouter Lite simple upgrade method TL;DR OpenBSD 6.3 oceton upgrade instructions may not factor that your ERL is running from the USB key they want wiped with the miniroot63.fs image loaded on. Place the bsd.rd for OpenBSD 6.3 on the sd0i slice used by U-Boot for the kernel, and then edit the boot command to run it. a tiny upgrade The OpenBSD documentation is comprehensive, but there might be rough corners around what are probably edge cases in their user base. People running EdgeRouter Lite hardware for example, who are looking to upgrade from 6.2 to 6.3. The documentation, which gave us everything we needed last time, left me with some questions about how to upgrade. In INSTALL.octeon, the Upgrading section does mention: The best solution, whenever possible, is to backup your data and reinstall from scratch I had to check if that directive existed in the documentation for other architectures. I wondered if oceton users were getting singled out. We were not. Just simplicity and pragmatism. Reading on: To upgrade OpenBSD 6.3 from a previous version, start with the general instructions in the section "Installing OpenBSD". But that section requires us to boot off of TFTP or NFS. Which I don’t want to do right now. Could also use a USB stick with the miniroot63.fs installed on it. But as the ERL only has a single USB port, we would have to remove the USB stick with the current install on it. Once we get to the Install or Upgrade prompt, there would be nothing to upgrade. Well, I guess I could use a USB hub. But the ERL’s USB port is inside the case. With all the screws in. And the tools are neatly put away. And I’d have to pull the USB hub from behind a workstation. And it’s two am. And I cleaned up the cabling in the lab this past weekend. Looks nice for once. So I don’t want to futz around with all that. There must be an almost imperceptibly easier way of doing this than setting up a TFTP server or NFS share in five minutes… Right? iXsystems Boise Technology Show 2018 Recap OpenZFS User Conference Slides & Videos Thank you ZFS ZSTD Compression Pool Layout Considerations ZFS Releases Helping Developers Help You ZFS and MySQL on Linux Micron OSNEXUS ZFS at Six Feet Up Flexible Disk Use with OpenZFS Batch editing files with ed what’s ‘ed’? ed is this sort of terrifying text editor. A typical interaction with ed for me in the past has gone something like this: $ ed help ? h ? asdfasdfasdfsadf ? Basically if you do something wrong, ed will just print out a single, unhelpful, ?. So I’d basically dismissed ed as an old arcane Unix tool that had no practical use today. vi is a successor to ed, except with a visual interface instead of this ? surprise: Ed is actually sort of cool and fun So if Ed is a terrifying thing that only prints ? at you, why am I writing a blog post about it? WELL!!!! On April 1 this year, Michael W Lucas published a new short book called Ed Mastery. I like his writing, and even though it was sort of an april fool’s joke, it was ALSO a legitimate actual real book, and so I bought it and read it to see if his claims that Ed is actually interesting were true. And it was so cool!!!! I found out: how to get Ed to give you better error messages than just ? that the name of the grep command comes from ed syntax (g/re/p) the basics of how to navigate and edit files using ed All of that was a cool Unix history lesson, but did not make me want to actually use Ed in real life. But!!! The other neat thing about Ed (that did make me want to use it!) is that any Ed session corresponds to a script that you can replay! So if I know Ed, then I can use Ed basically as a way to easily apply vim-macro-like programs to my files. Beastie Bits FreeBSD Mastery: Jails -- Help make it happen Video: OpenZFS Basics presented by George Wilson and Matt Ahrens at Scale 16x back in March 2018 DragonFlyBSD’s IPFW gets highspeed lockless in-kernel NAT A Love Letter to OpenBSD New talks, and the F-bomb Practical UNIX Manuals: mdoc BSD Meetup in Zurich: May 24th BSD Meetup in Warsaw: May 24th MeetBSD 2018 Tarsnap Feedback/Questions Seth - First time poudriere Builder Farhan - Why we didn't go FreeBSD architech - Encryption Feedback Dave - Handy Tip on setting up automated coredump handling for FreeBSD Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
This week on the show we'll be chatting with David Maxwell, a former NetBSD security officer. He's got an interesting project called Pipecut that takes a whole new approach to the commandline. We've also got answers to viewer-submitted questions and all this week's headlines, on BSD Now - the place to B.. SD. This episode was brought to you by Headlines FreeBSD quarterly status report (https://www.freebsd.org/news/status/report-2014-10-2014-12.html) The FreeBSD team has posted an updated on some of their activities between October and December of 2014 They put a big focus on compatibility with other systems: the Linux emulation layer, bhyve (http://www.bsdnow.tv/tutorials/bhyve), WINE and Xen all got some nice improvements As always, the report has lots of updates from the various teams working on different parts of the OS and ports infrastructure The release engineering team got 10.1 out the door, the ports team shuffled a few members in and out and continued working on closing more PRs FreeBSD's forums underwent a huge change, and discussion about the new support model for release cycles continues (hopefully taking effect after 11.0 is released) Git was promoted from beta to an officially-supported version control system (Kris is happy) The core team is also assembling a new QA team to ensure better code quality in critical areas, such as security and release engineering, after getting a number of complaints Other notable entries include: lots of bhyve fixes, Clang/LLVM being updated to 3.5.0, ongoing work to the external toolchain, adding FreeBSD support to more "cloud" services, pkgng updates, work on SecureBoot, more ARM support and graphics stack improvements Check out the full report for all the details that we didn't cover *** OpenBSD package signature audit (http://linux-audit.com/vulnerabilities-and-digital-signatures-for-openbsd-software-packages/) "Linux Audit" is a website focused on auditing and hardening systems, as well as educating people about securing their boxes They recently did an article about OpenBSD, specifically their ports and package system (http://www.bsdnow.tv/tutorials/ports-obsd) and signing infrastructure The author gives a little background on the difference between ports and binary packages, then goes through the technical details of how releases and packages are cryptographically signed Package signature formats and public key distribution methods are also touched on After some heckling, the author of the post said he plans to write more BSD security articles, so look forward to them in the future If you haven't seen our episode about signify (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) with Ted Unangst, that would be a great one to check out after reading this *** Replacing a Linux router with BSD (http://ask.slashdot.org/story/15/01/15/1547209/ask-slashdot-migrating-a-router-from-linux-to-bsd) There was recently a Slashdot discussion about migrating a Linux-based router to a BSD-based one The poster begins with "I'm in the camp that doesn't trust systemd. You can discuss the technical merits of all init solutions all you want, but if I wanted to run Windows NT I'd run Windows NT, not Linux. So I've decided to migrate my homebrew router/firewall/samba server to one of the BSDs." A lot of people were quick to recommend OPNsense (http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach) and pfSense, being that they're very easy to administer (requiring basically no BSD knowledge at all) Other commenters suggested a more hands-on approach, setting one up yourself with FreeBSD (http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/) or OpenBSD (http://www.bsdnow.tv/tutorials/openbsd-router) If you've been thinking about moving some routers over from Linux or other commercial solution, this might be a good discussion to read through Unfortunately, a lot of the comments are just Linux users bickering about systemd, so you'll have to wade through some of that to get to the good information *** LibreSSL in FreeBSD and OPNsense (http://bsdxbsdx.blogspot.com/2015/01/switching-to-openssl-from-ports-in.html) A FreeBSD sysadmin has started documenting his experience replacing OpenSSL in the base system with the one from ports (and also experimenting with LibreSSL) The reasoning being that updates in base tend to lag behind (http://www.openbsd.org/papers/eurobsdcon2014-libressl.html), whereas the port can be updated for security very quickly OPNsense developers are looking into (https://twitter.com/fitchitis/status/555625679614521345) switching away (http://forum.opnsense.org/index.php?topic=21.0) from OpenSSL to LibreSSL's portable version (http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl), for both their ports and base system, which would be a pretty huge differentiator for their project Some ports still need fixing (https://bugs.freebsd.org/bugzilla/buglist.cgi?order=Importance&query_format=advanced&short_desc=libressl&short_desc_type=allwordssubstr) to be compatible though, particularly a few (https://github.com/opnsense/ports/commit/c15af648e9d5fcecf0ae666292e8f41c08979057) python-related (https://github.com/pyca/cryptography/issues/928) ones If you're a FreeBSD ports person, get involved and help squash some of the last remaining bugs A lot of the work has already been done in OpenBSD's ports tree (http://cvsweb.openbsd.org/cgi-bin/cvsweb/ports/) - some patches just need to be adopted More and more upstream projects are incorporating LibreSSL patches in their code - let your favorite software vendor know that you're using it *** Interview - David Maxwell - david@netbsd.org (mailto:david@netbsd.org) / @davidwmaxwell (https://twitter.com/david_w_maxwell) Pipecut (https://www.youtube.com/watch?v=CZHEZHK4jRc), text processing, commandline wizardry News Roundup Jetpack, a new jail container system (https://github.com/3ofcoins/jetpack) A new project was launched to adapt FreeBSD jails to the "app container specification" While still pretty experimental in terms of the development phase, this might be something to show your Linux friends who are in love with docker It's a similar project to iocage (https://github.com/pannon/iocage) or bsdploy (https://github.com/ployground/bsdploy), which we haven't talked a whole lot about There was also some discussion (https://news.ycombinator.com/item?id=8893630) about it on Hacker News *** Separating base and package binaries (https://www.reddit.com/r/BSD/comments/2szofc) All of the main BSDs make a strong separation between the base system and third party software This is in contrast to Linux where there's no real concept of a "base system" - more recently, some distros have even merged all the binaries into a single directory A user asks the community about the BSD way of doing it, trying to find out the advantages and disadvantages of both hierarchies Read the comments for the full explanation, but having things separated really helps keep things organized *** Updated i915kms driver for FreeBSD (https://svnweb.freebsd.org/base?view=revision&revision=277487) This update brings the FreeBSD code closer inline with the Linux code, to make it easier to update going forward It doesn't introduce Haswell support just yet, but was required before the Haswell bits can be added *** Year of the OpenBSD desktop (http://zacbrown.org/2015/01/18/openbsd-as-a-desktop/) Here we have an article about using OpenBSD as a daily driver for regular desktop usage The author says he "ran fifty thousand different distributions, never being satisfied" After dealing with the problems of Linux and fragmentation, he eventually gave up and bought a Macbook He also used FreeBSD between versions 7 and 9, finding a "a mostly harmonious environment," but regressions lead him to give up on desktop *nix once again Starting with 2015, he's back and is using OpenBSD on a Thinkpad x201 The rest of the article covers some of his configuration tweaks and gives an overall conclusion on his current setup He apparently used our desktop tutorial (http://www.bsdnow.tv/tutorials/the-desktop-obsd) - thanks for watching! *** Unattended FreeBSD installation (http://louwrentius.com/freebsd-101-unattended-install-over-pxe-http-no-nfs.html) A new BSD user was looking to get some more experience, so he documented how to install FreeBSD over PXE His goal was to have a setup similar to Redhat's "kickstart" or OpenBSD's autoinstall (http://www.bsdnow.tv/tutorials/autoinstall) The article shows you how to set up DHCP and TFTP, with no NFS share setup required He also gives a mention to mfsbsd, showing how you can customize its startup script to do most of the work for you *** Feedback/Questions Robert writes in (http://slexy.org/view/s20UsZjN4h) Sean writes in (http://slexy.org/view/s219cMQz3U) l33tname writes in (http://slexy.org/view/s2EkzMUMyb) Charlie writes in (http://slexy.org/view/s2nq6L6H1n) Eric writes in (http://slexy.org/view/s21EGqUYLd) *** Mailing List Gold Clowning around (https://www.marc.info/?l=openbsd-cvs&m=142159202606668&w=2) Better than succeeding in this case (https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097734.html) ***
In this video demonstration, we show an example of writing IOS Access Control Lists (ACL's) on a home router. We use the revision control system (RCS) to maintain the master ACL file and push the ACL's to the router via TFTP. This is similar to many production networks, where maintaing comments and old revisions of ACL's is a requirement. We also show examples explaining the "don't care bit" format of IOS ACLs. Many network engineers mistakenly refer to the format as inverse-netmask, but that is incorrect.PIXes, FWSMs, and ASA's use a netmask format for ACLs. It is vitally important not to make the mistake of accidentally pushing a netmask format ACL line to an IOS device. That sort of error could result in an unplanned hole in your firewall and a serious security incident.