Family of computer operating systems that derive from the original AT&T Unix
POPULARITY
Categories
This show has been flagged as Explicit by the host. Overview Several years ago I wrote a Bash script to perform a task I need to perform almost every day - find the newest file in a series of files. At this point I was running a camera on a Raspberry Pi which was attached to a window and viewed my back garden. I was taking a picture every 15 minutes, giving them names containing the date and time, and storing them in a directory. It was useful to be able to display the latest picture. Since then, I have found that searching for newest files useful in many contexts: Find the image generated by my random recipe chooser, put in the clipboard and send it to the Telegram channel for my family. Generate a weather report from wttr.in and send it to Matrix. Find the screenshot I just made and put it in the clipboard. Of course, I could just use the same name when writing these various files, rather than accumulating several, but I often want to look back through such collections. If I am concerned about such files accumulating in an unwanted way I write cron scripts which run every day and delete the oldest ones. Original script The first iteration of the script was actually written as a Bash function which was loaded at login time. The function is called newest_matching_file and it takes two arguments: A file glob expression to match the file I am looking for. An optional directory to look for the file. If this is omitted, then the current directory will be used. The first version of this function was a bit awkward since it used a for loop to scan the directory, using the glob pattern to find the file. Since Bash glob pattern searches will return the search pattern when they fail, it was necessary to use the nullglob (see references) option to prevent this, turning it on before the search and off afterwards. This technique was replaced later with a pipeline using the find command. Improved Bash script The version using find is what I will explain here. function newest_matching_file { local glob_pattern=${1-} local dir=${2:-$PWD} # Argument number check if [[ $# -eq 0 || $# -gt 2 ]]; then echo 'Usage: newest_matching_file GLOB_PATTERN [DIR]' >&2 return 1 fi # Check the target directory if [[ ! -d $dir ]]; then echo "Unable to find directory $dir" >&2 return 1 fi local newest_file # shellcheck disable=SC2016 newest_file=$(find "$dir" -maxdepth 1 -name "$glob_pattern" \ -type f -printf "%T@ %p\n" | sort | sed -ne '${s/.\+ //;p}') # Use printf instead of echo in case the file name begins with '-' [[ -n $newest_file ]] && printf '%s\n' "$newest_file" return 0 } The function is in the file newest_matching_file_1.sh , and it's loaded ("sourced", or declared) like this: . newest_matching_file_1.sh The '.' is a short-hand version of the command source . I actually have two versions of this function, with the second one using a regular expression, which the find command is able to search with, but I prefer this one. Explanation The first two lines beginning with local define variables local to the function holding the arguments. The first, glob_pattern is expected to contain something like screenshot_2025-04-*.png . The second will hold the directory to be scanned, or if omitted, will be set to the current directory. Next, an if statement checks that there are the right number of arguments, aborting if not. Note that the echo command writes to STDERR (using '>&2' ), the error channel. Another if statement checks that the target directory actually exists, and aborts if not. Another local variable newest_file is defined. It's good practice not to create global variables in functions since they will "leak" into the calling environment. The variable newest_file is set to the result of a command substitution containing a pipeline: The find command searches the target directory. Using -maxdepth 1 limits the search to the chosen directory and does not descend into sub-directories. The search pattern is defined by -name "$glob_pattern" Using -type f limits the search to files The -printf "%T@ %p\n" argument returns the file's last modification time as the number of seconds since the Unix epoch '%T@' . This is a number which is larger if the file is older. This is followed, after a space, by the full path to the file ( '%p' ), and a newline. The matching file names are sorted. Because each is preceded by a numeric time value, they will be sorted in ascending order of age. Finally sed is used to return the last file in the sorted list with the program '${s/.\+ //;p}' : The use of the -n option ensures that only lines which are explicitly printed will be shown. The sed program looks for the last line (using '$' ). When found the leading numeric time is removed with ' s/.\+ //' and the result is printed (with 'p' ). The end result will either be the path to the newest file or nothing (because there was no match). The expression '[[ -n $newest_file ]]' will be true if $newest_file variable is not empty, and if that is the case, the contents of the variable will be printed on STDOUT, otherwise nothing will be printed. Note that the script returns 1 (false) if there is a failure, and 0 (true) if all is well. A null return is regarded as success. Script update While editing the audio for this show I realised that there is a flaw in the Bash function newest_matching_file . This is in the sed script used to process the output from find . The sed commands used in the script delete all characters up to a space, assuming that this is the only space in the last line. However, if the file name itself contains spaces, this will not work because regular expressions in sed are greedy . What is deleted in this case is everything up to and including the last space. I created a directory called tests and added the following files: 'File 1 with spaces.txt' 'File 2 with spaces.txt' 'File 3 with spaces.txt' I then ran the find command as follows: $ find tests -maxdepth 1 -name 'File*' -type f -printf "%T@ %p\n" | sort | sed -ne '${s/.\+ //;p}' spaces.txt I adjusted the sed call to sed -ne '${s/[^ ]\+ //;p}' . This uses the regular expression: s/[^ ]\+ // This now specifies that what it to be removed is every non-space up to and including the first space. The result is: $ find tests -maxdepth 1 -name 'File*' -type f -printf "%T@ %p\n" | sort | sed -ne '${s/[^ ]\+ //;p}' tests/File 3 with spaces.txt This change has been propagated to the copy on GitLab . Usage This function is designed to be used in commands or other scripts. For example, I have an alias defined as follows: alias copy_screenshot="xclip -selection clipboard -t image/png -i \$(newest_matching_file 'Screenshot_*.png' ~/Pictures/Screenshots/)" This uses xclip to load the latest screenshot into the clipboard, so I can paste it into a social media client for example. Perl alternative During the history of this family of scripts I wrote a Perl version. This was originally because the Bash function gave problems when run under the Bourne shell, and I was using pdmenu a lot which internally runs scripts under that shell. #!/usr/bin/env perl use v5.40; use open ':std', ':encoding(UTF-8)'; # Make all IO UTF-8 use Cwd; use File::Find::Rule; # # Script name # ( my $PROG = $0 ) =~ s|.*/||mx; # # Use a regular expression rather than a glob pattern # my $regex = shift; # # Get the directory to search, defaulting to the current one # my $dir = shift // getcwd(); # # Have to have the regular expression # die "Usage: $PROG regex [DIR]\n" unless $regex; # # Collect all the files in the target directory without recursing. Include the # path and let the caller remove it if they want. # my @files = File::Find::Rule->file() ->name(qr/$regex/) ->maxdepth(1) ->in($dir); die "Unsuccessful search\n" unless @files; # # Sort the files by ascending modification time, youngest first # @files = sort {-M($a) -M($b)} @files; # # Report the one which sorted first # say $files[0]; exit; Explanation This is fairly straightforward Perl script, run out of an executable file with a shebang line at the start indicating what is to be used to run it - perl . The preamble defines the Perl version to use, and indicates that UTF-8 (character sets like Unicode) will be acceptable for reading and writing. Two modules are required: Cwd : provides functions for determining the pathname of the current working directory. File::Find::Rule : provides tools for searching the file system (similar to the find command, but with more features). Next the variable $PROG is set to the name under which the script has been invoked. This is useful when giving a brief summary of usage. The first argument is then collected (with shift ) and placed into the variable $regex . The second argument is optional, but if omitted, is set to the current working directory. We see the use of shift again, but if this returns nothing (is undefined), the '//' operator invokes the getcwd() function to get the current working directory. If the $regex variable is not defined, then die is called to terminate the script with an error message. The search itself is invoked using File::Find::Rule and the results are added to the array @files . The multi-line call shows several methods being called in a "chain" to define the rules and invoke the search: file() : sets up a file search name(qr/$regex/) : a rule which applies a regular expression match to each file name, rejecting any that do not match maxdepth(1) : a rule which prevents the search from descending below the top level into sub-directories in($dir) : defines the directory to search (and also begins the search) If the search returns no files (the array is empty), the script ends with an error message. Otherwise the @files array is sorted. This is done by comparing modification times of the files, with the array being reordered such that the "youngest" (newest) file is sorted first. The operator checks if the value of the left operand is greater than the value of the right operand, and if yes then the condition becomes true. This operator is most useful in the Perl sort function. Finally, the newest file is reported. Usage This script can be used in almost the same way as the Bash variant. The difference is that the pattern used to match files is a Perl regular expression. I keep this script in my ~/bin directory, so it can be invoked just by typing its name. I also maintain a symlink called nmf to save typing! The above example, using the Perl version, would be: alias copy_screenshot="xclip -selection clipboard -t image/png -i \$(nmf 'Screenshot_.*\.png' ~/Pictures/Screenshots/)" In regular expressions '.*' means "any character zero or more times". The '.' in '.png' is escaped because we need an actual dot character. Conclusion The approach in both cases is fairly simple. Files matching a pattern are accumulated, in the Bash case including the modification time. The files are sorted by modification time and the one with the lowest time is the answer. The Bash version has to remove the modification time before printing. This algorithm could be written in many ways. I will probably try rewriting it in other languages in the future, to see which one I think is best. References Glob expansion: Wikipedia article on glob patterns HPR shows covering glob expansion: Finishing off the subject of expansion in Bash (part 1) Finishing off the subject of expansion in Bash (part 2) GitLab repository holding these files: hprmisc - Miscellaneous scripts, notes, etc pertaining to HPR episodes which I have contributed Provide feedback on this episode.
Interview with Board Member of Cloudflare, John Graham-Cumming My Couples Retreat With 3 AI Chatbots and the Humans Who Love Them Two Judges, Same District, Opposite Conclusions: The Messy Reality Of AI Training Copyright Cases How I Use AI To Help With Techdirt (And, No, It's Not Writing Articles) Google launches Doppl, a new app that lets you visualize how an outfit might look on you The Internet Needs Sex Senate drops plan to ban state AI laws Adam Thierer reacts Denmark To Tackle Deepfakes By Giving People Copyright To Their Own Features - Slashdot The Velvet Sundown are a seemingly AI-generated band with 325k Spotify listeners People are using AI to 'sit' with them while they trip on psychedelics China hosts first fully autonomous AI robot football match AI virtual personality YouTubers, or 'VTubers,' are earning millions AI helps find formula for paint to keep buildings cooler Microsoft's New AI Tool Outperforms Doctors 4-to-1 in Diagnostic Accuracy - Slashdot It's Known as 'The List'—and It's a Secret File of AI Geniuses The AI Company Zuckerberg Just Poured $14 Billion Into Is Reportedly a Clown Show of Ludicrous Incompetence We used Veo to animate archive photography from the Harley-Davidson Museum G/O Media Winds Down by Selling Kotaku, One of Its Last Sites Roadside America Dot Com Cluely pitches itself as undectable AI Lorde's new album: Virgin AI recipe creation Hosts: Leo Laporte, Jeff Jarvis, and Paris Martineau Guest: John Graham-Cumming Download or subscribe to Intelligent Machines at https://twit.tv/shows/intelligent-machines. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: helixsleep.com/twit smarty.com/twit agntcy.org
Interview with Board Member of Cloudflare, John Graham-Cumming My Couples Retreat With 3 AI Chatbots and the Humans Who Love Them Two Judges, Same District, Opposite Conclusions: The Messy Reality Of AI Training Copyright Cases How I Use AI To Help With Techdirt (And, No, It's Not Writing Articles) Google launches Doppl, a new app that lets you visualize how an outfit might look on you The Internet Needs Sex Senate drops plan to ban state AI laws Adam Thierer reacts Denmark To Tackle Deepfakes By Giving People Copyright To Their Own Features - Slashdot The Velvet Sundown are a seemingly AI-generated band with 325k Spotify listeners People are using AI to 'sit' with them while they trip on psychedelics China hosts first fully autonomous AI robot football match AI virtual personality YouTubers, or 'VTubers,' are earning millions AI helps find formula for paint to keep buildings cooler Microsoft's New AI Tool Outperforms Doctors 4-to-1 in Diagnostic Accuracy - Slashdot It's Known as 'The List'—and It's a Secret File of AI Geniuses The AI Company Zuckerberg Just Poured $14 Billion Into Is Reportedly a Clown Show of Ludicrous Incompetence We used Veo to animate archive photography from the Harley-Davidson Museum G/O Media Winds Down by Selling Kotaku, One of Its Last Sites Roadside America Dot Com Cluely pitches itself as undectable AI Lorde's new album: Virgin AI recipe creation Hosts: Leo Laporte, Jeff Jarvis, and Paris Martineau Guest: John Graham-Cumming Download or subscribe to Intelligent Machines at https://twit.tv/shows/intelligent-machines. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: helixsleep.com/twit smarty.com/twit agntcy.org
Interview with Board Member of Cloudflare, John Graham-Cumming My Couples Retreat With 3 AI Chatbots and the Humans Who Love Them Two Judges, Same District, Opposite Conclusions: The Messy Reality Of AI Training Copyright Cases How I Use AI To Help With Techdirt (And, No, It's Not Writing Articles) Google launches Doppl, a new app that lets you visualize how an outfit might look on you The Internet Needs Sex Senate drops plan to ban state AI laws Adam Thierer reacts Denmark To Tackle Deepfakes By Giving People Copyright To Their Own Features - Slashdot The Velvet Sundown are a seemingly AI-generated band with 325k Spotify listeners People are using AI to 'sit' with them while they trip on psychedelics China hosts first fully autonomous AI robot football match AI virtual personality YouTubers, or 'VTubers,' are earning millions AI helps find formula for paint to keep buildings cooler Microsoft's New AI Tool Outperforms Doctors 4-to-1 in Diagnostic Accuracy - Slashdot It's Known as 'The List'—and It's a Secret File of AI Geniuses The AI Company Zuckerberg Just Poured $14 Billion Into Is Reportedly a Clown Show of Ludicrous Incompetence We used Veo to animate archive photography from the Harley-Davidson Museum G/O Media Winds Down by Selling Kotaku, One of Its Last Sites Roadside America Dot Com Cluely pitches itself as undectable AI Lorde's new album: Virgin AI recipe creation Hosts: Leo Laporte, Jeff Jarvis, and Paris Martineau Guest: John Graham-Cumming Download or subscribe to Intelligent Machines at https://twit.tv/shows/intelligent-machines. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: helixsleep.com/twit smarty.com/twit agntcy.org
A year of funded FreeBSD, ZFS Performance Tuning – Optimizing for your Workload, Three Ways to Try FreeBSD in Under Five Minutes, FFS optimizations with dirhash, j2k25 hackathon report from kn@, NetBSD welcomes Google Summer of Code contributors, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines A year of funded FreeBSD (https://www.daemonology.net/blog/2025-06-06-A-year-of-funded-FreeBSD.html) ZFS Performance Tuning – Optimizing for your Workload (https://klarasystems.com/articles/zfs-performance-tuning-optimizing-for-your-workload/) News Roundup Three Ways to Try FreeBSD in Under Five Minutes (https://freebsdfoundation.org/blog/three-ways-to-try-freebsd-in-under-five-minutes/) FFS optimizations with dirhash (https://rsadowski.de/posts/2025/ffs-optimizations-dirhash/) j2k25 hackathon report from kn@: installer, low battery, and more (https://undeadly.org/cgi?action=article;sid=20250616082212) NetBSD welcomes Google Summer of Code contributors (https://blog.netbsd.org/tnf/entry/gsoc2025_welcome_contributors) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
Interview with Board Member of Cloudflare, John Graham-Cumming My Couples Retreat With 3 AI Chatbots and the Humans Who Love Them Two Judges, Same District, Opposite Conclusions: The Messy Reality Of AI Training Copyright Cases How I Use AI To Help With Techdirt (And, No, It's Not Writing Articles) Google launches Doppl, a new app that lets you visualize how an outfit might look on you The Internet Needs Sex Senate drops plan to ban state AI laws Adam Thierer reacts Denmark To Tackle Deepfakes By Giving People Copyright To Their Own Features - Slashdot The Velvet Sundown are a seemingly AI-generated band with 325k Spotify listeners People are using AI to 'sit' with them while they trip on psychedelics China hosts first fully autonomous AI robot football match AI virtual personality YouTubers, or 'VTubers,' are earning millions AI helps find formula for paint to keep buildings cooler Microsoft's New AI Tool Outperforms Doctors 4-to-1 in Diagnostic Accuracy - Slashdot It's Known as 'The List'—and It's a Secret File of AI Geniuses The AI Company Zuckerberg Just Poured $14 Billion Into Is Reportedly a Clown Show of Ludicrous Incompetence We used Veo to animate archive photography from the Harley-Davidson Museum G/O Media Winds Down by Selling Kotaku, One of Its Last Sites Roadside America Dot Com Cluely pitches itself as undectable AI Lorde's new album: Virgin AI recipe creation Hosts: Leo Laporte, Jeff Jarvis, and Paris Martineau Guest: John Graham-Cumming Download or subscribe to Intelligent Machines at https://twit.tv/shows/intelligent-machines. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: helixsleep.com/twit smarty.com/twit agntcy.org
Interview with Board Member of Cloudflare, John Graham-Cumming My Couples Retreat With 3 AI Chatbots and the Humans Who Love Them Two Judges, Same District, Opposite Conclusions: The Messy Reality Of AI Training Copyright Cases How I Use AI To Help With Techdirt (And, No, It's Not Writing Articles) Google launches Doppl, a new app that lets you visualize how an outfit might look on you The Internet Needs Sex Senate drops plan to ban state AI laws Adam Thierer reacts Denmark To Tackle Deepfakes By Giving People Copyright To Their Own Features - Slashdot The Velvet Sundown are a seemingly AI-generated band with 325k Spotify listeners People are using AI to 'sit' with them while they trip on psychedelics China hosts first fully autonomous AI robot football match AI virtual personality YouTubers, or 'VTubers,' are earning millions AI helps find formula for paint to keep buildings cooler Microsoft's New AI Tool Outperforms Doctors 4-to-1 in Diagnostic Accuracy - Slashdot It's Known as 'The List'—and It's a Secret File of AI Geniuses The AI Company Zuckerberg Just Poured $14 Billion Into Is Reportedly a Clown Show of Ludicrous Incompetence We used Veo to animate archive photography from the Harley-Davidson Museum G/O Media Winds Down by Selling Kotaku, One of Its Last Sites Roadside America Dot Com Cluely pitches itself as undectable AI Lorde's new album: Virgin AI recipe creation Hosts: Leo Laporte, Jeff Jarvis, and Paris Martineau Guest: John Graham-Cumming Download or subscribe to Intelligent Machines at https://twit.tv/shows/intelligent-machines. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: helixsleep.com/twit smarty.com/twit agntcy.org
FreeBSD version 14.3 is available, Reliable ZFS Storage on Commodity Hardware, My website is ugly because I made it, Semi distributed filesystems with ZFS and Sanoid, April 2025 Laptop Support and Usability Project Update, UDP sockets instead of BPF in dhcpd(8), and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines FreeBSD 14.3 released (https://www.freebsd.org/releases/14.3R/announce/) Reliable ZFS Storage on Commodity Hardware (https://klarasystems.com/articles/cost-efficient-storage-commodity-hardware/) News Roundup My website is ugly because I made it (https://goodinternetmagazine.com/my-website-is-ugly-because-i-made-it/) Semi distributed filesystems with ZFS and Sanoid (https://anil.recoil.org/notes/syncoid-sanoid-zfs) April 2025 Laptop Support and Usability Project Update (https://freebsdfoundation.org/blog/april-2025-laptop-support-and-usability-project-update/) dhcpd(8): use UDP sockets instead of BPF (https://undeadly.org/cgi?action=article;sid=20250613111800) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions No feedback this week. Send more... Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
BOSSes Anne Ganguzza and Tom Dheere, your "real bosses" and co-hosts, connect to dive deep into the critical world of online security and scam prevention for voiceover professionals. They unpack Tom's recent harrowing experience with an AI voice cloning scam, offering a candid look into the crucial insights needed to navigate digital threats and build a truly secure business in today's landscape. Listeners will discover the essential role of vigilance and proactive measures in protecting their assets, gain an understanding of emerging scam tactics, and appreciate the power of community in safeguarding their careers. Anne and Tom also discuss practical pathways for secure transactions and the evolving nature of digital defense. 00:01 - Anne (Host) Hey guys, it's Anne from VO BOSS here. 00:04 - Speaker 2 (Announcement) And it's George the Tech. We're excited to tell you about the VO BOSS. Vip membership, now with even more benefits. 00:10 - Anne (Host) So not only do you get access to exclusive workshops and industry insights, but with our VIP plus tech tier, you'll enjoy specialized tech support from none other than George himself. 00:22 - Speaker 2 (Announcement) You got it. I'll help you tackle all those tricky tech issues so you can focus on what you do best Voice acting. It's tech support tailored for voiceover professionals like you. 00:32 - Anne (Host) Join us guys at VO BOSS and let's make your voiceover career soar. Visit voboss.com slash VIP-membership to sign up today. 00:45 - Speaker 3 (Announcement) It's time to take your business to the next level, the boss level. These are the premier business owner strategies and successes being utilized by the industry's top talent today. Rock your business like a boss, a VO boss. Now let's welcome your host, Anne Ganguzza. Hey, hey, everyone, welcome to the VO BOSS Podcast. 01:04 - Anne (Host) I'm your host, Anne Ganguzza. Hey, hey everyone, welcome to the VO BOSS Podcast. I'm your host, Anne Ganguzza, and I'm here with my real boss, Tom Deere. I had to think about that, Tom. We've been together so long. I was like what is our subtitle here? We are real bosses. 01:20 - Tom (Host) Yeah, we're real bosses. Thanks for having me back, Anne. 01:23 - Anne (Host) How are you doing, Tom, my real boss? Co-host. 01:26 - Tom (Host) All things considered, I'm doing okay, I had a weird experience recently which it seems like a lot of voice actors are experiencing. I got an email from someone expressing interest in wanting to cast me for a voiceover project. Oh yes, I looked at it and it was this long-form project, something like 9,000 and change words. And I looked at it and I'm like and you know I was reading the ins and outs of it and I'm like, huh, like my spider sense was tingling a little bit, but I'm looking at, I'm like this one is worth replying to and getting some information about. 02:00 So there was a little bit of back and forth about it. 02:03 - Anne (Host) So you did reply, and then there was. 02:05 - Tom (Host) There was more conversation. 02:06 - Anne (Host) Yeah, there was more conversation, which is what I always do when I'm trying to find out more information about a job to make sure it's legit. 02:12 - Tom (Host) Right Now, around the same time, maybe a couple of days after that, someone posted on a Facebook group hey, I got this email. It was saying this and this Did anyone else get it? Does it seem legit? And it looked like it was the same email that I had gotten, so I was following that it turns out. 02:28 It was posted by our friend, bridget Real, who is the co-founder of VA for VO, the virtual assistant site that helps voice actors, and we talked about it a little bit and we're both like, yeah, we're going to keep digging a little bit and see what's going on. And then her business partner, lynn, also got the email and I was getting ready to accept it just to see what would happen. And that morning I got a message from her saying hey, did you accept this project? Yet I'm like no, why? And she said because both of us accepted the project. We both got cast for the same exact project. We both got the same exact script. They sent me the script. 03:00 So then I did this. I went to Gemini, google Gemini, which is my AI bot of choice, and I did the prompts. I said you are an expert at detecting scams. Please analyze this script and let me know if you think that this script could be used to harvest a voice actor's voice to clone it. A voice actor's voice to clone it. And it did its analysis and I've got like the 2.5 advanced. So it takes a little time. And it wrote back oh, yes, it does. And here are all the reasons why this, this, this, this, this, this and this. And then I sent that information to Bridget and Lynn and they're like we knew it. We knew it. So then she created a wonderful post on LinkedIn talking about it. And then I wrote a blog with all the information and, like what happened, it was the most read blog I've had in like three years or something like that. 03:52 Yeah, it was crazy. 03:53 - Anne (Host) What's so interesting is it could have been a legit job, like for payment. You would have done it, they would have paid you for it, but they would have used your voice as an AI voice. 04:05 And so therefore, legally right in the end. Right, if you found out later on they could say, oh no, no, no, we paid you. I mean, it was a job that we paid you for and there was no extenuating circumstances or contracts to be signed which, by the way, I'm going to bring up Nava and the AI writer For all your jobs. You should be attaching that AI writer so that your voice is not going to be used as an AI voice, for sure, for sure. 04:37 - Tom (Host) So, to let everybody know, the website was GigLumin G-I-G-L-U-M-I-N. And if you do a Google search of GigLumin and this is what Bridget had figured out is that the website was only a month or two old. And there's these scam websites that you can enter the URL of a website in and it can tell you how likely that's a scam. It checked every red flag, every box, every single box. 04:56 - Anne (Host) So, yes, vo people, bosses, beware, right. So beware of emails. And you know, it's funny because it's lately, just because of the whole AI thing. Anytime I get an email with a job from someone that I don't know, right, that is just out of the blue, that I didn't audition for, where they have large amounts of words, the hairs on the back of my neck kind of stand up and I immediately, immediately check into it. And I think this really warrants a discussion, bosses, because it's very timely that you want to make sure that these jobs are legitimate. So the more research you can do. And I love, Tom Dheere, how you used AI to fight AI Again. 05:37 We had our previous episode on tools that we use. I mean, we are utilizing it as a tool to help us in our day-to-day jobs, and so I think, being aware of possible scams out there, we absolutely have to be, and I'll tell you if it's somebody that I've never heard of and they don't have a signature file. I've gotten to the point where I don't even like and it's not like from a company.com. I don't even literally take it seriously anymore. I don't know about you, Tom, what do you think? 06:05 - Tom (Host) Yes, I'm equally skeptical these days but, I, really like what you said about when you receive the email, check to see if there is a signature at the Tom of it with the company logo, website and contact information. That is one of many red flags and I don't know how much you've noticed lately, Anne, but since I would say about early April, there has been an explosion of scam attempts going on in the voiceover industry. We've had the overpayment scam. That's been going on for at least 10 or 15 years. 06:37 - Anne (Host) Gosh, at least, and bosses. If you haven't heard about it, Tom, let's talk about the overpayment scam for just a minute. Yeah, yeah, Okay so what happens is it's very common. 06:45 - Tom (Host) It's very common. It's been going on for a really long time. So basically they email you and say hey, we've got a project for you, da-da-da-da-da-da. The classic one was the game show host voiceover. 06:55 - Anne (Host) It has since evolved. 06:56 - Tom (Host) And basically they say that we've booked a studio in the area nearby. We're going to get paid or pay for the studio and then send us back the difference and something like that. And it's never a gig. 07:12 - Speaker 2 (Announcement) All they're trying to do is get you to cash that check and send them money, which is fraudulent, by the way. 07:18 - Anne (Host) And, by the way, I've gotten to the point where, if I have a new client, the only way they can really pay me is electronically. 07:25 And I figure, if you don't have electronic means to pay me immediately before the job and it's even in my terms and I've done this for years, Tom, I always have payment in full prior to job start is appreciated and other options available upon request. 07:39 But if it's a new client, I'll take that out because I must have that money in my bank account before I will even consider finishing that job or sending a file. And I'll tell you what, Tom for all of my career it's worked for me Because if people are serious about hiring you, they know that you're a professional, they know that you're going to get the job done. Of course they have to put their faith in you. But in reality and I'll even say because you're a new client I require payment up front electronically. And here are the ways that you can pay me. And so I'll send them, like a QuickBooks invoice, or I'll give them a PayPal account or however that works, and I expect that money in the account and I wait for that money and I make sure that I have the money and then I'll proceed with the job. 08:21 - Tom (Host) That's a really good idea. There's nothing wrong with even asking for 50% or 25% or just some percentage of it. The fact that they're actually going to fork over money with no expectation of an overpayment or getting it back or disputing the payment or anything like that. 08:37 Once it clears, you know that they're serious. And there's a bunch of like. I use Wave apps, for example. That's a great way to do it and I'm pretty sure they can do a partial payment. Or you can just make one invoice just for the deposit and then issue another invoice for the balance If they're a legitimate client that actually has money that they're planning on paying you with, they would have no problem with paying at least a portion of it up front. 08:59 - Anne (Host) Yeah, a lot of my clients nowadays the larger clients that used to like work off of purchase orders, and then it would be like 90 days after the job has been submitted. We'd have to wait for that check, they'd have to generate the PO and everything. You'd sign contracts like vendor contracts and that sort of thing, which I've done a lot, and so if they've got a contract for you to sign, that's vendor, nda, that sort of thing, and you know the company. It's like a well-known company. They're on the web. They've been on the web for years. I mean you can pretty much trust in that where I'll do the job and then I'll get paid. If I've worked with them before, I know that's typically how larger companies work and so that's when I'll accept a check. But even now most of those companies they're going to electronic deposit, like ACH they call it. 09:42 ACH, yeah, so it's direct deposit to your bank and most of the companies I know will do that and that's a form of payment that I trust and that would be a client that I would trust. So if it's a larger company that I know they exist on the web and they talk about, well, you're going to have to do the job first and then we'll be able to pay you once the purchase order is created, blah, blah, blah, blah, and you sign these contracts. I feel fairly good about that and I don't have to think, oh, this is a scam. But whenever I get an email without an actual signature file that comes from an address that isn't companycom, right, if it's a Gmail or a Yahoo or whatever, even a Microsoft what is the free Microsoft one? 10:20 Hotmail, hotmail, yeah, even if it's Microsoftcom, I feel like there's some sort of free sort of Microsoft. You know what I mean Like email that says that I just don't trust it and I'll immediately. The first thing I'll do is look for a website and when I get to the website I'll look for a phone number and then I'll actually try to call that phone number. What are the steps that you take, Tom, to ensure that your job is legit? 10:41 - Tom (Host) Everything that you just said. I also, by the way, I do love the ACH direct deposit because there's no fee. When PayPal, there is a fee, or wire transfer. That's really nice. Here's one thing that I've been doing lately is, if I get a we'll call it a solicitation, for lack of a better term from a company saying hey, and it'll most often be we found you on Google, we found you on Voice123 or some other front-facing thing. You know what's an interesting thing to do? Go look for them on LinkedIn. 11:11 Look for them on LinkedIn. Look for the company and look for the individual and see if you have any mutual connections. I mean, it could be anybody, whether it's a voice actor or somebody in some other profession, and you can reach out on LinkedIn and say, hey, I got an email from this company and you have a connection with them on LinkedIn. What's your experience with them? And that could give you some really quick insight. Sometimes it's just like, oh, I've been working with them for years, or it's oh, they're a huge scam. I forgot to disconnect with them. Run, run, run. Or I'd sent a rando invite, or they sent a rando invite and I don't have any information for you. But it could increase your chance of vetting them a little bit better. Another thing is that I keep an eye out, for is if they ask me to send them a W-9, the more likely that they are legitimate. 12:00 Yeah, yeah, absolutely, which I find interesting because if they were a real, true scam artist, they would want that W-9, because now they would have your social security number and now they can steal your identity too. 12:11 - Anne (Host) Well, oh my gosh, Tom, and that's scary actually, but that's why you don't put your social security number. You put your EIN number, because you're a company right, and you don't have to give up your EIN number, which is, by the way, one thing. I'm glad you mentioned that like we should all be having an EIN number. I'm glad you mentioned that, like we should all be having an EIN number. 12:30 - Tom (Host) Yes, it's very, very simple to get. It takes very, very little time. So it's a very easy get. I just reminded myself and we just talked about identity theft is that I almost had my identity stolen yesterday. 12:43 - Anne (Host) Whoa, that's scary. Yes. 12:45 - Tom (Host) How do you? 12:46 - Anne (Host) know like what happened. 12:51 - Tom (Host) Okay, so it was about a little after 10 am yesterday is when things started happening, so within a few minutes of each other, I got an email from Credit Karma, norton which, because I have my Norton 360 antivirus software package, I pay a subscription through that and Experian. For those of you who don't know, there are three major credit bureaus there's Experian, there's TransUnion and there's Equifax. I have a free account with Experian and I have a free account with Credit Karma. All three of them, within a few minutes of each other, messaged me and said that there was a hard inquiry. 13:30 - Anne (Host) Yeah. 13:30 - Tom (Host) So what that means is if you are applying for a loan, a mortgage, a credit card or something like that, the company that you're applying to will do a credit check. So they will check your credit and see if you are a safe credit risk to make the loan or to get the credit card, for this was a hard inquiry. If you get enough hard inquiries on your credit, your credit will go down. 13:55 - Anne (Host) Yeah, absolutely. I know that because I'm a stickler about my credit. 13:59 - Tom (Host) Me too. My credit rating, oh my gosh. If mine isn't at least 800, something I freak out, oh my gosh. 14:04 - Anne (Host) Yeah, no, mine has to be like almost close to perfect, and when it goes down like two points, I'm like wait why? Why did that happen? Right? And it's just because you put a charge on it for a few hundred dollars, and then you pay it off next week and then everything's fine, so that's normal. 14:18 - Tom (Host) So all three of them told me at roughly the same time that there was a hard inquiry. So I clicked on all the emails and all three of them said that somebody was applying for a Discover credit card, I think in Salt Lake City, and someone was applying for a Capital One credit card in Delaware, and I was in New York City neither applying for a Discover credit card or a Capital One credit card. I certainly wasn't in Salt Lake City or Delaware at the same exact time. 14:49 - Anne (Host) You know, what's so interesting, Tom, is that, like I don't know, a few months ago I don't know if there was a discussion circulating or maybe I got an email but somebody said, and like I should have done this years ago, I mean you can freeze your account so that if you don't open up a credit card every other day which I'm certainly not right Because again, it affects my credit rating and I'm anal about that and so I'm like well, I don't need to apply for any other credit cards, so you can go and freeze that, so that you can actually reduce the risk of somebody trying to open up credit cards or identity theft. 15:19 So and it's super simple to do it, as I said, everybody should have that free account. You should log in, you should check your credit scores regularly I think they allow you once a month, I think even my credit cards. My American Express will tell me oh, your FICO score has changed, right, so they're monitoring it too, and so literally, I get lots of notifications when that rating goes up and down. But I know that I've reduced my chances of identity theft, which is a very scary thing, by freezing those accounts and it's very simple to unfreeze. So, if you know you want to apply for a credit card. You just got to go and unfreeze it for a certain amount of time so you can apply for it and then freeze it back up again. So that way it reduces the risk. 15:57 - Tom (Host) And all those emails that I got, all those notifications did give me the option to do that. I was also able to say this because it, literally, when Norton 360 popped up and it took me to their website, it literally said is this you and you can check yes or no? And I wrote no and then the whole screen turned red saying okay, we know this is a problem, we will look into it. 16:17 It did it with all those and then I called Capital One Bank. It took me a few people. It had to get escalated a couple of times to the credit card fraud department. 16:25 - Anne (Host) Well, don't you say, they give you a special number, right? 16:27 - Tom (Host) They say call this number if it's not you, or you can call this number. I just called the general number because all that was on the notification, I think, was the Capital One in Salt Lake City or something like that. So I called directly and said please state your problem. I'm like I think I'm getting my identity stolen. And then it got up there and then they manually rejected the credit card application at least for the Capital One. 16:50 And then this morning I got another Credit Karma email saying that there was a check on my Equifax report not the Experian one and I looked at the date of it. It also said yesterday. So that means Credit Karma had my back twice and Experian had my back and Norton had my back twice. Right, right, and Experian had my back and Norton had my back and everybody bosses. This is the takeaway. Creditkarmacom is free, having an account with Experian is free, it doesn't cost you a nickel. 17:18 - Anne (Host) All of them TransUnion, they're all free TransUnion, Equifax, they're all free. 17:23 Exactly and you can check your scores and, like I said, a lot of banks and a lot of credit cards are actually adding that on as like a value add kind of service, but you don't have to pay anything for it. I think there's a lot of it going on, Tom, which is kind of scary. We got to be careful about scammers, that's for sure. And anytime, even in your email, right, if you get like again, if I find something that doesn't have a signature and then they have an attachment like PayPal has been well-known scams where you get like oh, you've got a PayPal invoice, right, and you have to pay this amount and it looks legit. I mean, they've got like the PayPal logo. I've gotten quite a few of those over the last six months. 18:01 - Speaker 2 (Announcement) And. 18:01 - Anne (Host) I just ignore anything. Just remember that most financial institutions will never email you for information and they'll never text you necessarily for that information either, and you should also, Tom. We should have a big discussion on having multi-factor authentication. 18:19 - Tom (Host) Yes. 18:19 - Anne (Host) This is extremely important. 18:21 - Tom (Host) It's annoying as hell or two-factor, two-factor authentication For every account that you have, especially the financial ones, you should have two-factor authentication, which means either they send you a text message and you just click on the link and you're good to go, or it sends you an email and it'll usually give you a passcode of some sort and then you go to the website. When you're trying to log on, you enter that passcode and then it'll let you do it, and most of them are only good. Some of them are only good for 30 days. Sometimes you can check a box saying this is my private computer. It's okay for a certain amount of time, or they make you do it every single time, which isn't the worst thing in the world. Yes, it's annoying. 18:55 - Anne (Host) You know what I just thought about. It is annoying but it keeps you safe. It's funny how much like value you put in that number, that phone number, in this phone which, by the way, I just got a new phone but in this number for the two-factor authentication, right Like text me at this number. So think of the power that these phone companies have right, and that is scary. I mean it used to be a thing where I always thought like the large scale communication companies were a little bit of a monopoly, depending on the area that you're in. I mean, when I lived in the East Coast it was always Verizon right, verizon everything, verizon this, verizon that. Out here it's a couple of different companies but still, if you think about it, I mean I'm glad to have the two-factor authentication and it's super convenient on the phone. 19:39 But, it's interesting to know that you wouldn't want the hackers to get smart right and then start really infiltrating the phone, you know, and impersonating a phone number. 19:50 - Tom (Host) There's a couple of things about that is that, when it comes to authentication, when you're logging on your phone, I've got it set up where I just use my thumbprint for a lot of it. 19:59 - Anne (Host) I love that, or Face ID yeah the Face ID is a great one. 20:05 - Tom (Host) There's also a thing for a lot of the websites where I have a personal PIN that has nothing to do with the PIN or the password to access the site itself. If I am using my phone to log in somewhere, I can enter a four-digit PIN that's different from everything else, so it also increases the chance of having a secure whatever. Also, just as a rule, I don't do anything financial on my phone, with the exception of like Venmo Well, I have mobile banking If I'm like sending money if, like me, and the guys are having pizza, you know what I mean. 20:31 - Anne (Host) I have mobile banking and I do have Apple Pay. 20:35 - Tom (Host) Well, I have GPay too. 20:36 - Anne (Host) Yeah, so. 20:36 - Tom (Host) I'm a Google guy but like I will unless to my bank accounts online or Wave app or Wise or PayPal on the phone, unless I absolutely have to. 20:49 - Anne (Host) Interesting. I go to them quite a bit. Actually, you're probably fine because of all the precautions that you're taking, but I'm just a little extra neurotic about it. Oh, it's constantly got multi-factor authentication, but I get that. I totally get that. Wow, yeah, being careful, and you know what. 21:02 What's interesting is, back in the day and I'm going to date myself when I was working at the school and we had text-based email okay, and text-based email, I could have something and it was all based on like the Unix systems and so like hacking into a text-based, like I don't know how to say this, but hacking into a system like that, like a Unix system, and reading your email with text-based, you didn't always have like the conditions of people attaching things that could be viral, loading a virus on your computer. So I was always proud to say that I used text-based email and I used something called a PGP signature, which was a digital signature at the time, which meant that when I sent mail out, my PGP signature, it would actually negotiate and verify with the person that I would send it to so that it could be a verified digital signature. That indeed, yes, this mail did come from me, and I think that Norton probably has something like that now right. Is that with your email or no? 21:59 - Tom (Host) Yeah, it has all kinds of functions. 22:01 And it works on my desktop and it works on my laptop and it works on my phone. The most important function that it has is when I'm not home and I'm on my phone or my laptop or my tablet is the VPN when you can turn it on to make sure that if you're using Wi-Fi at a cafe or something like that, that it's secure, because apparently there are people who just like sitting around at a Panera or a Starbucks with their laptop and just waiting for someone to have an insecure Wi-Fi connection and they can just steal their life right there through their own laptop. 22:31 - Anne (Host) Well, it's funny how this conversation has turned into a big security conversation, starting off with scamming. Which guys you got to be aware? It's one of the reasons why, for all of my years and because of my years working in technology, I like wired connections. I mean Wi-Fi. I mean it's a wonderful technology and it's convenient as anything. However, it's not as secure as a wired connection, because a wired connection is basically, you know, your digital numbers flowing back and forth along a wire, versus all this information out in the air where, if somebody is sitting outside of my home, they can possibly hack into my wireless network and then they can run some sort of a tracer to see and to actually get my passwords, which is something that you don't really want that to happen. So you should really be cautious, guys, and I think it's always a good idea that, if you are working from home, if you have the opportunity to have a wired connection to your router, I think that that's better rather than using Wi-Fi. Number one it's more stable, right, it's faster and it's also more secure. 23:32 - Tom (Host) I agree. If you have a desktop at home and you are doing any kind of recording or you're doing basically anything, you should have an ethernet connection. That yellow wire with the big old phone jack that plugs right into the back of your computer and plugs into your Wi-Fi router. 23:47 - Anne (Host) And it sounds old school, but it's still the most secure method of data transfer. 23:51 - Tom (Host) Without question so if you are recording from home. If you're doing whatever from home, you have a desktop ethernet. If you have a laptop, I are recording from home. If you're doing whatever from home, you have a desktop Ethernet. If you have a laptop, I think the newer laptops don't even have an Ethernet connection. I have to think about my laptop and whether I even have one anymore, and here's the simple reason. 24:06 - Anne (Host) Think about it. It's a wire, guys. It's a wire. It's not like data floating around in the air which people can listen to. Somehow the frequency of the data traveling in the air right? Wi-fi works on frequencies when your data is traveling via a wire like a physical cable, unless somebody like I don't even know, unless they tap into that wire, right, somehow. 24:26 I don't know how they do that, and we're talking about your wire in your house going from your computer to your router. Right, that's as secure as it gets, right, unless somebody's coming into your house and hacking into the wire and tapping into it. 24:38 - Tom (Host) You've got some foreign embassy bugging your home. 24:41 - Anne (Host) Yeah, yeah, doing some fancy work, you're not going to have to worry about your data being transferred. So if you're working on the internet right, at least the data that's transferring from your house to your router is absolutely secure. And then it's up to your internet provider right on the router, to their routers, to make sure that things are encrypted, things are secure and for the most part I mean that's been handled right. I mean there are hackers out there that they can hack into networks. They can hack into things like that, but you want to be as safe as you possibly can, so wired is best. 25:14 - Tom (Host) Yes, it's fascinating. We talk about hard security and soft security, yes, that's hard security, that's hard security. 25:20 - Anne (Host) So, if we go back to talking about the scams that are floating around these days, one thing I wanted to mention is I think one of the best applications for groups, facebook groups and social media groups and discussion groups is for that thing, so that you and Bridget were talking to one another about this job that you both got, and then it's really wonderful that we can come together as a community and protect each other right and say, hey, look, watch out for the scam. So it is one of the best advantages, I would say, of being a part of the social media groups in that way. Otherwise, we've talked about how it's hard to sometimes they're toxic, sometimes it's really hard to be on social media. But I would say one of the best reasons to be on social media, in those groups and in those forums, would be because of the protection that you're getting of us banding together and saying, hey, watch out, this is a scam. 26:09 - Tom (Host) Absolutely, it's one of the most important things. Community is more than just about you know rah rah and whoop whoop and you know we support you and feel better if you're feeling down, but like just actual education, along with inspiration and commiseration can literally save your identity Absolutely. 26:27 - Anne (Host) Wow, what a great conversation, Tom. So bosses out there, be aware of scams. Be cautious. Research, research. Take a look at those signatures when you get emails coming in, when you get something that's asking for lots of words and a good price and it seems too good to be true, guess what it might be. So make sure that you're communicating with the community as well, checking those jobs out and attach that AI rider to every one of your jobs. Now, it's simple. It's there at NAVA and it's free. You can attach that rider to every job. If you have a new client, make sure you're very careful with the payment options. You know we spoke about that. I always make sure I get money up front, or partial money up front, first to make sure that it's a legit client. What else did I miss, Tom, in this recap? 27:14 - Tom (Host) Hardware and software VPNs. 27:16 - Anne (Host) EINs yes. 27:19 - Tom (Host) Oh yeah, VPNs, EINs, Two-factor authentication. 27:20 - Anne (Host) I love it. Yeah, Make sure you guys are implementing all of that to keep yourself safe and secure. So great topic, Tom. I like geeking out like this. 27:30 - Tom (Host) Yeah, it's fun and helpful. 27:31 - Anne (Host) Yeah, I'm going to give a great big shout out to my sponsor, IPDTL. You too can connect and network like real bosses. Find out more at IPDTL.com. Guys have an amazing week and we'll see you next week. 27:52 - Speaker 3 (Announcement) Bye. Join us next week for another edition of VO BOSS with your host, Anne Ganguzza, and take your business to the next level. Sign up for our mailing list at voboss.com and receive exclusive content, industry revolutionizing tips and strategies and new ways to rock your business like a boss. Redistribution, with permission. Coast-to-coast connectivity via IPDTL.
This week on the show Tom interview Deb Goodkin and Justin Gibbs from the FreeBSD Foundation. NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Guests Deb Goodkin (https://www.linkedin.com/in/deb-goodkin-b282924a/) Justin Gibbs (https://www.linkedin.com/in/justin-gibbs-3974671/) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow) Special Guests: Deb Goodkin and Justin Gibbs.
This show has been flagged as Explicit by the host. More Command line fun: downloading a podcast In the show hpr4398 :: Command line fun: downloading a podcast Kevie walked us through a command to download a podcast. He used some techniques here that I hadn't used before, and it's always great to see how other people approach the problem. Let's have a look at the script and walk through what it does, then we'll have a look at some "traps for young players" as the EEVBlog is fond of saying. Analysis of the Script wget `curl https://tuxjam.otherside.network/feed/podcast/ | grep -o 'https*://[^"]*ogg' | head -1` It chains four different commands together to "Save the latest file from a feed". Let's break it down so we can have checkpoints between each step. I often do this when writing a complex one liner - first do it as steps, and then combine it. The curl command gets https://tuxjam.otherside.network/feed/podcast/ . To do this ourselves we will call curl https://tuxjam.otherside.network/feed/podcast/ --output tuxjam.xml , as the default file name is index.html. This gives us a xml file, and we can confirm it's valid xml with the xmllint command. $ xmllint --format tuxjam.xml >/dev/null $ echo $? 0 Here the output of the command is ignored by redirecting it to /dev/null Then we check the error code the last command had. As it's 0 it completed sucessfully. Kevie then passes the output to the grep search command with the option -o and then looks for any string starting with https followed by anything then followed by two forward slashes, then -o, --only-matching Print only the matched (non-empty) parts of a matching line, with each such part on a separate output line We can do the same with. I was not aware that grep defaulted to regex, as I tend to add the --perl-regexp to explicitly add it. grep --only-matching 'https*://[^"]*ogg' tuxjam.xml http matches the characters http literally (case sensitive) s* matches the character s literally (case sensitive) Quantifier: * Between zero and unlimited times, as many times as possible, giving back as needed [greedy] : matches the character : literally / matches the character / literally / matches the character / literally [^"]* match a single character not present in the list below Quantifier: * Between zero and unlimited times, as many times as possible, giving back as needed [greedy] " a single character in the list " literally (case sensitive) ogg matches the characters ogg literally (case sensitive) When we run this ourselves we get the following $ grep --only-matching 'https*://[^"]*ogg' tuxjam.xml https://archive.org/download/tuxjam-121/tuxjam_121.ogg https://archive.org/download/tuxjam-120/TuxJam_120.ogg https://archive.org/download/tux-jam-119/TuxJam_119.ogg https://archive.org/download/tuxjam_118/tuxjam_118.ogg https://archive.org/download/tux-jam-117-uncut/TuxJam_117.ogg https://tuxjam.otherside.network/tuxjam-115-ogg https://archive.org/download/tuxjam_116/tuxjam_116.ogg https://tuxjam.otherside.network/tuxjam-115-ogg https://tuxjam.otherside.network/tuxjam-115-ogg https://tuxjam.otherside.network/tuxjam-115-ogg https://ogg http://tuxjam.otherside.network/wp-content/uploads/sites/5/2024/10/tuxjam_115_OggCamp2024.ogg https://ogg https://archive.org/download/tuxjam_114/tuxjam_114.ogg https://archive.org/download/tuxjam_113/tuxjam_113.ogg https://archive.org/download/tuxjam_112/tuxjam_112.ogg The last command returns the first line, so therefore https://archive.org/download/tuxjam-121/tuxjam_121.ogg Finally that line is used as the input to the wget command. Problems with the approach Relying on grep with structured data like xml or json can lead to problems. When we looked at the output of the command in step 2, some of the results gave https://ogg . When run the same command without the --only-matching argument we see what was matched. $ grep 'https*://[^"]*ogg' tuxjam.xml This episode may not be live as in TuxJam 115 from Oggcamp but your friendly foursome of Al, Dave (thelovebug), Kevie and Andrew (mcnalu) are very much alive to treats of Free and Open Source Software and Creative Commons tunes. https://tuxjam.otherside.network/tuxjam-115-oggcamp-2024/ https://tuxjam.otherside.network/tuxjam-115-oggcamp-2024/#respond https://tuxjam.otherside.network/tuxjam-115-oggcamp-2024/feed/ With the group meeting up together for the first time in person, it was decided that a live recording would be an appropriate venture. With the quartet squashed around a table and a group of adoring fans crowded into a room at the Pendulum Hotel in Manchester, the discussion turns to TuxJam reviews that become regularly used applications, what we enjoyed about OggCamp 2024 and for the third section the gang put their reputation on the line and allow open questions from the sea of dedicated fans. OggCamp 2024 on Saturday 12 and Sunday 13 October 2024, Manchester UK. Two of the hits are not enclosures at all, they are references in the text to OggCamp what we enjoyed about OggCamp 2024 Normally running grep will only get one entry per line, and if the xml is minimised it can miss entries on a file that comes across as one big line. I did this myself using xmllint --noblanks tuxjam.xml > tuxjam-min.xml I then edited it and replaced the new lines with spaces. I have to say that the --only-matching argument is doing a great job at pulling out the matches. That said the results were not perfect either. $ grep --only-matching 'https*://[^"]*ogg' tuxjam-min.xml https://archive.org/download/tuxjam-121/tuxjam_121.ogg https://archive.org/download/tuxjam-120/TuxJam_120.ogg https://archive.org/download/tux-jam-119/TuxJam_119.ogg https://archive.org/download/tuxjam_118/tuxjam_118.ogg https://archive.org/download/tux-jam-117-uncut/TuxJam_117.ogg https://tuxjam.otherside.network/tuxjam-115-ogg https://archive.org/download/tuxjam_116/tuxjam_116.ogg https://tuxjam.otherside.network/tuxjam-115-ogg https://tuxjam.otherside.network/?p=1029https://tuxjam.otherside.network/tuxjam-115-oggcamp-2024/#respondhttps://tuxjam.otherside.network/tuxjam-115-ogg https://ogg http://tuxjam.otherside.network/wp-content/uploads/sites/5/2024/10/tuxjam_115_OggCamp2024.ogg https://ogg https://archive.org/download/tuxjam_114/tuxjam_114.ogg https://archive.org/download/tuxjam_113/tuxjam_113.ogg https://archive.org/download/tuxjam_112/tuxjam_112.ogg You could fix it by modifying the grep arguments and add additional searches looking for enclosure . The problem with that approach is that you'll forever and a day be chasing issues when someone changes something. So the approach is officially "Grand", but it's a very likely to break if you're not babysitting it. Suggested Applications. I recommend never parsing structured documents , like xml or json with grep. You should use dedicated parsers that understands the document markup, and can intelligently address parts of it. I recommend: xml use xmlstarlet json use jq yaml use yq Of course anyone that looks at my code on the hpr gittea will know this is a case of "do what I say, not what I do." Never parse xml with grep, where the only possible exception is to see if a string is in a file in the first place. grep --max-count=1 --files-with-matches That's justified under the fact that grep is going to be faster than having to parse, and build a XML Document Object Model when you don't have to. Some Tips Always refer to examples and specification A specification is just a set of rules that tell you how the document is formatted. There is a danger in just looking at example files, and not reading the specifications. I had a situation once where a software developer raised a bug as the files didn't begin with ken-test- followed by a uuid . They were surprised when the supplied files did not follow this convention as per the examples. Suffice to say that was rejected. For us there are the rules from the RSS specification itself, but as it's a XML file there are XML Specifications . While the RSS spec is short, the XML is not, so people tend to use dedicated libraries to parse XML. Using a dedicated tool like xmlstarlet will allow us to mostly ignore the details of XML. RSS is a dialect of XML . All RSS files must conform to the XML 1.0 specification, as published on the World Wide Web Consortium (W3C) website. The first line of the tuxjam feed shows it's an XML file. The specification goes on to say "At the top level, a RSS document is a element, with a mandatory attribute called version, that specifies the version of RSS that the document conforms to. If it conforms to this specification, the version attribute must be 2.0." And sure enough then the second line show that it's a RSS file.
We spent the week learning keybindings, installing dependencies, and cramming for bonus points. Today, we score up and see how we did in the TUI Challenge.Sponsored By:Tailscale: Tailscale is a programmable networking software that is private and secure by default - get it free on up to 100 devices! 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps. Unraid: A powerful, easy operating system for servers and storage. Maximize your hardware with unmatched flexibility. Support LINUX UnpluggedLinks:
How to unlock high speed Wi-Fi on FreeBSD 14, What We've Learned Supporting FreeBSD in Production, rsync replaced with openrsync on macOS Sequoia, Framework 13 AMD Setup with FreeBSD, FreeBSD on Dell Latitude 7280, Backup MX with OpenSMTPD, Notes on caddy as QUIC reverse proxy with mac_portacl, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines How to unlock high speed Wi-Fi on FreeBSD 14 (https://freebsdfoundation.org/blog/how-to-unlock-high-speed-wi-fi-on-freebsd-14/) What We've Learned Supporting FreeBSD in Production (https://klarasystems.com/articles/what-weve-learned-supporing-freebsd-production/) News Roundup rsync replaced with openrsync on macOS Sequoia (https://derflounder.wordpress.com/2025/04/06/rsync-replaced-with-openrsync-on-macos-sequoia/) Framework 13 AMD Setup with FreeBSD (https://euroquis.nl/freebsd/2025/03/16/framework.html) FreeBSD on Dell Latitude 7280 (https://adventurist.me/posts/00352) Backup MX with OpenSMTPD (https://blog.feld.me/posts/2025/05/backup-mx-with-opensmtpd/) Notes on caddy as QUIC reverse proxy with mac_portacl (https://mwl.io/archives/24097) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions No feedback this week. Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
The Hidden Costs of Stagnation: Why Running EOL Software is a Ticking Time Bomb, Maintaining FreeBSD in a Commercial Product – Why Upstream Contributions Matter, LLMs ('AI') are coming for our jobs whether or not they work, Implement Anubis to give the bots a harder time, erspan(4): ERSPAN Type II collection, Just my memory here is how I've configure OpenBSD and FreeBSD for a IPv6 Wifi, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines The Hidden Costs of Stagnation: Why Running EOL Software is a Ticking Time Bomb (https://freebsdfoundation.org/blog/the-hidden-costs-of-stagnation-why-running-eol-software-is-a-ticking-time-bomb/) Maintaining FreeBSD in a Commercial Product – Why Upstream Contributions Matter (https://klarasystems.com/articles/maintaining-freebsd-commercial-product-why-upstream-contributions-matter/?utm_source=BSD%20Now&utm_medium=Podcast) News Roundup LLMs ('AI') are coming for our jobs whether or not they work (https://utcc.utoronto.ca/~cks/space/blog/tech/LLMsVersusOurJobs) Implement Anubis to give the bots a harder time (https://dan.langille.org/2025/05/03/implement-anubis-to-give-the-bots-a-harder-time/) erspan(4): ERSPAN Type II collection (https://www.undeadly.org/cgi?action=article;sid=20250512100219) Just my memory here is how I've configure OpenBSD and FreeBSD for a IPv6 Wifi (https://vincentdelft.be/post/post_20250208) Beastie Bits Some Interesting pieces of history Netnews History (https://www.cs.columbia.edu/~smb/papers/netnews-hist.pdf) History of Solaris (https://cse.unl.edu/~witty/class/csce351/howto/history_of_solaris.pdf) Nuclear Wall Charts (https://econtent.unm.edu/digital/collection/nuceng/search) [TUHS] The Case of UNIX vs. The UNIX System (https://www.tuhs.org/pipermail/tuhs/2025-February/031403.html) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Paul - my setup (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/614/feedback/Paul%20-%20my%20setup.md) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
Isolating Containers with ZFS and Linux Namespaces, DragonFly BSD 6.4.2, FreeBSD fans rally round zVault upstart, For Upcoming PF Tutorials, We Welcome Your Questions, Using ~/.ssh/authorized keys to decide what the incoming connection can do, PDF bruteforce tool to recover locked files, How and why typical (SaaS) pricing is too high for university departments, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines Isolating Containers with ZFS and Linux Namespaces (https://klarasystems.com/articles/isolating-containers-with-zfs-and-linux-namespaces/?utm_source=BSD%20Now&utm_medium=Podcast) DragonFly BSD 6.4.2 (https://www.dragonflybsd.org/release64/) FreeBSD fans rally round zVault upstart (https://www.theregister.com/2025/05/12/second_preview_zvault/) News Roundup For Upcoming PF Tutorials, We Welcome Your Questions (https://bsdly.blogspot.com/2025/05/for-upcoming-pf-tutorials-we-welcome.html) Using ~/.ssh/authorized keys to decide what the incoming connection can do (https://dan.langille.org/2025/04/17/using-ssh-authorized-keys-to-decide-what-the-incoming-connection-can-do/) PDF bruteforce tool to recover locked files (https://dataswamp.org/~solene/2025-03-09-test-pdf-passwords.html) How and why typical (SaaS) pricing is too high for university departments (https://utcc.utoronto.ca/~cks/space/blog/tech/UniversityTypicalPricingTooHigh) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Nils - CFP (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/612/feedback/nils%20-%20CFP.md) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems. https://isc.sans.edu/diary/Securing%20Your%20SSH%20authorized_keys%20File/31986 REMOTE COMMAND EXECUTION ON SMARTBEDDED METEOBRIDGE (CVE-2025-4008) Weatherstation software Meteobridge suffers from an easily exploitable unauthenticated remote code execution vulnerability https://www.onekey.com/resource/security-advisory-remote-command-execution-on-smartbedded-meteobridge-cve-2025-4008 https://forum.meteohub.de/viewtopic.php?t=18687 Manageengine ADAuditPlus SQL Injection Zoho patched two SQL Injection vulnerabilities in its ManageEngine ADAuditPlus product https://www.manageengine.com/products/active-directory-audit/cve-2025-41407.html https://www.manageengine.com/products/active-directory-audit/cve-2025-36527.html Dero Miner Infects Containers through Docker API Kaspersky found yet another botnet infecting docker containers to spread crypto coin miners. The initial access happens via exposed docker APIs. https://securelist.com/dero-miner-infects-containers-through-docker-api/116546/
This show has been flagged as Clean by the host. Intro How I know BSD Very minimal NetBSD usage I'm am leaving out Dragonfly BSD Previous episodes Several by Claudio Miranda and others - check the tags page. hpr3799 :: My home router history hpr3187 :: Ansible for Dynamic Host Configuration Protocol hpr3168 :: FreeBSD Jails and iocage hpr2181 :: Install OpenBSD from Linux using Grub History and Overview https://en.wikipedia.org/wiki/History_of_the_Berkeley_Software_Distribution The history of the Berkeley Software Distribution began in the 1970s when University of California, Berkeley received a copy of Unix. Professors and students at the university began adding software to the operating system and released it as BSD to select universities. https://en.wikipedia.org/wiki/Comparison_of_BSD_operating_systems Comparisons to Linux Not better or worse, just different. BSD is a direct descendant of the original UNIX Not distributions - Separate projects with separate code bases. Permissive vs Copyleft One Project vs Kernel + User land Most Open Source software is available on BSD ports and packages Network Devices and DISKS will have different naming conventions. BE CAREFUL Distinctives FreeBSD Probably most widely used Base OS Commercial products Tightly integrated with ZFS Jails OS for Firewall appliances - PFSense and Opensense OpenBSD Focus on Code Correctness and Security Often First to develop new security methodologies - ASLR and Kernel relinking at boot Home of OpenSSH, ... Base includes Xorg and a minimal Window Manager The Best docs - man pages NetBSD Supports the most platforms pkgsrc can be used on any UNIX like. How I use BSD Home Router Recently migrated from FreeBSD to OpenBSD Better support for the cheap 2.5G network adapters in Ali express firewalls Workstations OpenBSD Dual boot laptop - missing some nice features - Vscode and BT audio OpenBSD for Banking NAS FreeBSD Was physical by migrated to Proxmox VM with direct attached drives Jails for some apps ZFS pools for storage My recommendations Router OpenBSD - Any BSD will work Opensense - similar experience to managing DD-WRT Thinkpads - OpenBSD Other laptops / PC - FreeBSD desktop focus derivative. ghost or midnight Servers/NAS FreeBSD ZFS Jails BSD is worth trying Dual booting is supported but can be tricky if unfamiliar. r Provide feedback on this episode.
As CEO & Co-Founder of Sling Money, Mike is transforming how we think about sending funds across borders by making international transfers as effortless as sending a text message.During our conversation, Mike reveals how a personal experience moving USDC between the UK and San Francisco sparked his vision. The transfer itself was instant and free, but everything around it felt clunky – "like using a Unix command line from the 80s." This insight led him to create what he calls "the macOS or iPhone of stablecoins," abstracting away all of the complexity. Sling's elegant approach allows users to add money through local payment methods in 75 countries, convert to stablecoins behind the scenes, and send funds globally in just seconds. Recipients can withdraw to their local currency almost instantly, never needing to understand the underlying technology. The use cases range from practical (managing finances across multiple countries) to spontaneous (buying someone a beer across continents) – transactions that were previously impossible or prohibitively expensive.Mike places this innovation in a fascinating historical context, comparing the evolution of international payments to what happened with telecommunications and streaming video. Just as we no longer think twice about "long-distance calls," he envisions a future where the concept of "international payments" disappears entirely.Ready to experience the future of global money transfer? Download Sling Money today and join the community making international payments instant, free, and frictionless.
I use Zip Bombs to Protect my Server, Owning the Stack: Infrastructure Independence with FreeBSD and ZFS, Optimisation of parallel TCP input, Chosing between "it works for now" and "it works in the long term", Losing one of my evenings after an OpenBSD upgrade, What drive did I just remove from the system?, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines I use Zip Bombs to Protect my Server (https://idiallo.com/blog/zipbomb-protection) Owning the Stack: Infrastructure Independence with FreeBSD and ZFS (https://klarasystems.com/articles/owning-the-stack-infrastructure-independence-with-freebsd-zfs/?utm_source=BSD%20Now&utm_medium=Podcast) News Roundup Optimisation of parallel TCP input (https://www.undeadly.org/cgi?action=article;sid=20250508122430) Chosing between "it works for now" and "it works in the long term" (https://utcc.utoronto.ca/~cks/space/blog/sysadmin/WorksNowVsWorksGenerally) Losing one of my evenings after an OpenBSD upgrade (https://www.ncartron.org/losing-one-of-my-evenings-after-an-openbsd-upgrade.html) What drive did I just remove from the system? (https://dan.langille.org/2025/04/21/what-drive-did-i-just-remove-from-the-system/) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Benjamin - Street PCs (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/613/feedback/Benjamin%20-%20street%20pcs.md) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
GhostBSD: From Usability to Struggle and Renewal, Why You Can't Trust AI to Tune ZFS, Introducing bpflogd(8): capture packets via BPF to log files, What I'd do as a College Freshman in 2025, FreeBSD and KDE Plasma generations, Improvements to the FreeBSD CI/CD systems, FreeBSD as a Workstation, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines GhostBSD: From Usability to Struggle and Renewal (https://freebsdfoundation.org/our-work/journal/browser-based-edition/downstreams/ghostbsd-from-usability-to-struggle-and-renewal/) Why You Can't Trust AI to Tune ZFS (https://klarasystems.com/articles/why-you-cant-trust-ai-to-tune-zfs/?utm_source=BSD%20Now&utm_medium=Podcast) News Roundup Introducing bpflogd(8): capture packets via BPF to log files (http://undeadly.org/cgi?action=article;sid=20250425074505) What I'd do as a College Freshman in 2025 (https://muratbuffalo.blogspot.com/2025/04/what-id-do-as-college-freshman.html) FreeBSD and KDE Plasma generations (https://euroquis.nl//freebsd/2025/03/02/kde5.html) Improvements to the FreeBSD CI/CD systems (https://freebsdfoundation.org/blog/improvements-to-the-freebsd-ci-cd-systems/) FreeBSD as a Workstation (https://darknet.sytes.net/wordpress/index.php/2025/03/16/freebsd-as-a-workstation/) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Effie - FreeBSD as a Workstation (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/611/feedback/effie%20-%20freebsd%20as%20a%20workstation.md) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
This show has been flagged as Clean by the host. Standard UNIX password manager Password management is one of those computing problems you probably don't think about often, because modern computing usually has an obvious default solution built-in. A website prompts you for a password, and your browser auto-fills it in for you. Problem solved. However, not all browsers make it very easy to get to your passwords store, which makes it complex to migrate passwords to a new system without also migrating the rest of your user profile, or to share certain passwords between different users. There are several good open source options that offer alternatives to the obvious defaults, but as a user of Linux and UNIX, I love a minimal and stable solution when one is available. The pass command is a password manager that uses GPG encryption to keep your passwords safe, and it features several system integrations so you can use it seamlessly with your web browser of choice. Install pass The pass command is provided by the PasswordStore project. You can install it from your software repository or ports collection. For example, on Fedora: $ sudo dnf install pass On Debian and similar: $ sudo apt install pass Because the word pass is common, the name of the package may vary, depending on your distribution and operating system. For example, pass is available on Slackware and FreeBSD as password-store. The pass command is open source, so the source code is available at git.zx2c4.com/password-store. Create a GPG key First, you must have a GPG key to use for encryption. You can use a key you already have, or create a new one just for your password store. To create a GPG key, use the gpg command along with the --gen-key option (if you already have a key you want to use for your password store, you can skip this step): $ gpg --gen-key Answer the prompts to generate a key. When prompted to provide values for Real name, Email, and Comment, you must provide a response for each one, even though GPG allows you to leave them empty. In my experience, pass fails to initialize when one of those values is empty. For example, here are my responses for purposes of this article: Real name: Tux Email: tux@example.com Comment: My first key This information is combined, in a different order, to create a unique GPG ID. You can see your GPG key ID at any time: $ gpg --list-secret-keys | grep uid uid: Tux (My first key) tux@example.com Other than that, it's safe to accept the default and recommended options for each prompt. In the end, you have a GPG key to serve as the master key for your password store. You must keep this key safe. Back it up, keep a copy of your GPG keyring on a secure device. Should you lose this key, you lose access to your password store. Initialize a password store Next, you must initialize a password store on your system. When you do, you create a hidden directory where your passwords are stored, and you define which GPG key to use to encrypt passwords. To initialize a password store, use the pass init command along with your unique GPG key ID. Using my example key: $ pass init "Tux (My first key) " You can define more than one GPG key to use with your password store, should you intend to share passwords with another user or on another system using a different GPG key. Add and edit passwords To add a password to your password store, use the pass insert command followed by the URL (or any string) you want pass to keep. $ pass insert example.org Enter the password at the prompt, and then again to confirm. Most websites require more than just a password, and so pass can manage additional data, like username, email, and any other field. To add extra data to a password file, use pass edit followed by the URL or string you saved the password as: $ pass edit example.org The first line of a password file must be the password itself. After that first line, however, you can add any additional data you want, in the format of the field name followed by a colon and then the value. For example, to save tux as the value of the username field on a website: myFakePassword123 username: tux Some websites use an email address instead of a username: myFakePassword123 email: tux@example.com A password file can contain any data you want, so you can also add important notes or one-time recovery codes, and anything else you might find useful: myFake;_;Password123 email: tux@example.com recovery email: tux@example.org recovery code: 03a5-1992-ee12-238c note: This is your personal account, use company SSO at work List passwords To see all passwords in your password store: $ pass list Password Store ├── example.com ├── example.org You can also search your password store: $ pass find bandcamp Search Terms: bandcamp └── www.bandcamp.com Integrating your password store Your password store is perfectly usable from a terminal, but that's not the only way to use it. Using extensions, you can use pass as your web browser's password manager. There are several different applications that provide a bridge between pass and your browser. Most are listed in the CompatibleClients section of passwordstore.org. I use PassFF, which provides a Firefox extension. For browsers based on Chromium, you can use Browserpass with the Browserpass extension. In both cases, the browser extension requires a "host application", or a background bridge service to allow your browser to access the encrypted data in your password store. For PassFF, download the install script: $ wget https://codeberg.org/PassFF/passff-host/releases/download/latest/install_host_app.sh Review the script to confirm that it's just installing the host application, and then run it: $ bash ./install_host_app.sh firefox Python 3 executable located at /usr/bin/python3 Pass executable located at /usr/bin/pass Installing Firefox host config Native messaging host for Firefox has been installed to /home/tux/.mozilla/native-messaging-hosts. Install the browser extension, and then restart your browser. When you navigate to a URL with an file in your password store, a pass icon appears in the relevant fields. Click the icon to complete the form. Alternately, a pass icon appears in your browser's extension tray, providing a menu for direct interaction with many pass functions (such as copying data directly to your system clipboard, or auto-filling only a specific field, and so on.) Password management like UNIX The pass command is extensible, and there are some great add-ons for it. Here are some of my favourites: pass-otp: Add one-time password (OTP) functionality. pass-update: Add an easy workflow for updating passwords that you frequently change. pass-import: Import passwords from chrome, 1password, bitwarden, apple-keychain, gnome-keyring, keepass, lastpass, and many more (including pass itself, in the event you want to migrate a password store). The pass command and the password store system is a comfortably UNIX-like password management solution. It stores your passwords as text files in a format that doesn't even require you to have pass installed for access. As long as you have your GPG key, you can access and use the data in your password store. You own your data not only in the sense that it's local, but you have ownership of how you interact with it. You can sync your password stores between different machines using rsync or syncthing, or even backup the store to cloud storage. It's encrypted, and only you have the key.Provide feedback on this episode.
The S1 operating system can do it all! It can run on any computer, read any disk, and execute any software. It can be UNIX compatible, DOS compatible, and so, so much more! But... can S1 ship? Today we are talking about an operating system that sounds too good to be true. Is it another example of vaporware? Or is S1 really the world's most sophisticated operating system?
Today we're talking all about crimes and murder here on MXTR-FM for Pop Stop 26! Titles all covering this guilty subject...lol Get your fix of passionate songs about passionate people doing very passionate things...lol Have fun with pop, rock, indie mixed blends you will love! Big shout out to new local fan in Greensboro, NC who found us on RhythmBox! Never heard of that server. I looked it up, its used on Linux and Unix so thats cool, probably a systems administrator or programmer etc.... We appreciate the support! Please hit us up let us know who you are! Find everything show related on Halshack.com Its a crime we aren't more known but you fans are helping our rhymes reach many non criminal minds...lol THANK YOU!
OpenBSD 7.7, ZFS Orchestration Tools – Part 2: Replication, Switching customers from Linux to BSD because boring is good, Graphed and measured: running TCP input in parallel, Introducing an OpenBSD LLDP daemon, Hardware discovery: ACPI & Device Tree, The 2025 FreeBSD Community Survey is Here, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines OpenBSD 7.7 (https://OpenBSD.org/77.html) ZFS Orchestration Tools – Part 2: Replication (https://klarasystems.com/articles/zfs-orchestration-tools-part-2-replication/?utm_source=BSD%20Now&utm_medium=Podcast) News Roundup Switching customers from Linux to BSD because boring is good (https://www.theregister.com/2024/10/08/switching_from_linux_to_bsd/) Graphed and measured: running TCP input in parallel (http://undeadly.org/cgi?action=article;sid=20250418114827) Introducing an OpenBSD LLDP daemon (http://undeadly.org/cgi?action=article;sid=20250425082010) Hardware discovery: ACPI & Device Tree (https://blogsystem5.substack.com/p/hardware-autoconfiguration) The 2025 FreeBSD Community Survey is Here (https://freebsdfoundation.org/blog/the-2025-freebsd-community-survey-is-here/) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Brad - new users (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/610/feedback/brad%20-%20new%20users.md) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
More info: https://docs.anthropic.com/en/docs/claude-code/overview The AI coding wars have now split across four battlegrounds: 1. AI IDEs: with two leading startups in Windsurf ($3B acq. by OpenAI) and Cursor ($9B valuation) and a sea of competition behind them (like Cline, Github Copilot, etc). 2. Vibe coding platforms: Bolt.new, Lovable, v0, etc. all experiencing fast growth and getting to the tens of millions of revenue in months. 3. The teammate agents: Devin, Cosine, etc. Simply give them a task, and they will get back to you with a full PR (with mixed results) 4. The cli-based agents: after Aider's initial success, we are now seeing many other alternatives including two from the main labs: OpenAI Codex and Claude Code. The main draw is that 1) they are composable 2) they are pay as you go based on tokens used. Since we covered all three of the first categories, today's guests are Boris and Cat, the lead engineer and PM for Claude Code. If you only take one thing away from this episode, it's this piece from Boris: Claude Code is not a product as much as it's a Unix utility. This fits very well with Anthropic's product principle: “do the simple thing first.” Whether it's the memory implementation (a markdown file that gets auto-loaded) or the approach to prompt summarization (just ask Claude to summarize), they always pick the smallest building blocks that are useful, understandable, and extensible. Even major features like planning (“/think”) and memory (#tags in markdown) fit the same idea of having text I/O as the core interface. This is very similar to the original UNIX design philosophy: Claude Code is also the most direct way to consume Sonnet for coding, rather than going through all the hidden prompting and optimization than the other products do. You will feel that right away, as the average spend per user is $6/day on Claude Code compared to $20/mo for Cursor, for example. Apparently, there are some engineers inside of Anthropic that have spent >$1,000 in one day! If you're building AI developer tools, there's also a lot of alpha on how to design a cli tool, interactive vs non-interactive modes, and how to balance feature creation. Enjoy! Timestamps [00:00:00] Intro [00:01:59] Origins of Claude Code [00:04:32] Anthropic's Product Philosophy [00:07:38] What should go into Claude Code? [00:09:26] Claude.md and Memory Simplification [00:10:07] Claude Code vs Aider [00:11:23] Parallel Workflows and Unix Utility Philosophy [00:12:51] Cost considerations and pricing model [00:14:51] Key Features Shipped Since Launch [00:16:28] Claude Code writes 80% of Claude Code [00:18:01] Custom Slash Commands and MCP Integration [00:21:08] Terminal UX and Technical Stack [00:27:11] Code Review and Semantic Linting [00:28:33] Non-Interactive Mode and Automation [00:36:09] Engineering Productivity Metrics [00:37:47] Balancing Feature Creation and Maintenance [00:41:59] Memory and the Future of Context [00:50:10] Sandboxing, Branching, and Agent Planning [01:01:43] Future roadmap [01:11:00] Why Anthropic Excels at Developer Tools
Inside FreeBSD Netgraph: Behind the Curtain of Advanced Networking, Launching BSSG - My Journey from Dynamic CMS to Bash Static Site Generator, OpenZFS Cheat Sheet, Dipping my toes in OpenBSD in Amsterdam, SSH keys from a command: sshd's AuthorizedKeysCommand directive, How to move bhyve VM and Jail container from one host to another host, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines Inside FreeBSD Netgraph: Behind the Curtain of Advanced Networking (https://klarasystems.com/articles/inside-freebsd-netgraph-advanced-networking/?utm_source=BSD%20Now&utm_medium=Podcast) Launching BSSG - My Journey from Dynamic CMS to Bash Static Site Generator (https://it-notes.dragas.net/2025/04/07/launching-bssg-my-journey-from-dynamic-cms-to-bash-static-site-generator/) News Roundup OpenZFS Cheat Sheet (https://freebsdfoundation.org/blog/openzfs-cheat-sheet/) Dipping my toes in OpenBSD, in Amsterdam (https://ewintr.nl/posts/2025/dipping-my-toes-in-openbsd-in-amsterdam/) SSH keys from a command: sshd's AuthorizedKeysCommand directive (https://jpmens.net/2025/03/25/authorizedkeyscommand-in-sshd/) How to move bhyve VM and Jail container from one host to another host ? (https://vincentdelft.be/post/post_20250215) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Dave - Webstack (https://github.com/BSDNow/bsdnow.tv/tree/master/episodes/609/feedback) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
Robust & Reliable Backup Solutions with OpenZFS, Why I Maintain a 17 Year Old Thinkpad, Motivations, Tinker Writer Deck, How to tell if FreeBSD needs a Reboot using kernel version check, Techie pulled an all-nighter that one mistake turned into an all-weekender, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines World Backup Day 2025: Robust & Reliable Backup Solutions with OpenZFS (https://klarasystems.com/articles/world-backup-day-2025-robust-reliable-backup-solutions-with-openzfs/?utm_source=BSD%20Now&utm_medium=Podcast) Why I Maintain a 17 Year Old Thinkpad (https://pilledtexts.com/why-i-use-a-17-year-old-thinkpad/) News Roundup Motivations (https://stevengharms.com/longform/my-first-freebsd/motivations/) Tinker Writer Deck (https://tinker.sh/) How to tell if FreeBSD needs a Reboot using kernel version check (https://www.cyberciti.biz/faq/freebsd-determine-if-a-system-reboot-is-necessary/) Techie pulled an all-nighter that one mistake turned into an all-weekender (https://www.theregister.com/2025/03/03/who_me/) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Ian - Personal Web Stack (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/608/feedback/ian%20-%20personal%20stack.md) Brendan - Storage Backends (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/608/feedback/brendan%20-%20storage%20backends.md) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
An airhacks.fm conversation with Volker Simonis (@volker_simonis) about: discussion about carnivorous plants, explanation of how different carnivorous plants capture prey through movement, glue, or digestive fluids, Utricularia uses vacuum to catch prey underwater, SAP's interest in developing their own JVM around Java 1.4/1.5 era, challenges with SAP's NetWeaver Java EE stack, difficulties maintaining Java across multiple Unix platforms (HP-UX, AIX, S390, Solaris) with different vendor JVMs, SAP's decision to license Sun's HotSpot source code, porting Hotspot to PA-RISC architecture on HP-UX, explanation of C++ interpreter versus Template interpreter in Hotspot, challenges with platform-specific C++ compilers and assembler code, detailed explanation of JVM internals including deoptimization, inlining, and safe points, SAP's contributions to openJDK including PowerPC port, challenges getting SAP to embrace open source, delays caused by Oracle's acquisition of Sun, SAP's extensive JVM porting work across multiple platforms, development of SAP JVM with additional features like profiling safe points, creation of SAP Machine as an open-source OpenJDK distribution, explanation of Java certification and trademark restrictions, Hotspot Express model allowing newer VM components in older Java versions, Volker's move to Amazon Corretto team after 15 years at SAP, brief discussion of ABAP versus Java at SAP, Volker's recent interest in GraalVM and native image technologies Volker Simonis on twitter: @volker_simonis
We should improve libzfs somewhat, Accurate Effective Storage Performance Benchmark, Debugging aids for pf firewall rules on FreeBSD, OpenBSD and Thunderbolt issue on ThinkPad T480s, Signing Git Commits with an SSH key, Pgrep, LibreOffice downloads on the rise, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines We should improve libzfs somewhat (https://despairlabs.com/blog/posts/2025-03-12-we-should-improve-libzfs-somewhat/) Accurate Effective Storage Performance Benchmark (https://klarasystems.com/articles/accurate-effective-storage-performance-benchmark/?utm_source=BSD%20Now&utm_medium=Podcast) News Roundup Debugging aids for pf firewall rules on FreeBSD (https://dan.langille.org/2025/02/24/debugging-aids-for-pf-firewall-rules-on-freebsd/) OpenBSD and Thunderbolt issue on ThinkPad T480s (https://www.tumfatig.net/2025/openbsd-and-thunderbolt-issue-on-thinkpad-t480s/) Signing Git Commits with an SSH key (https://jpmens.net/2025/02/26/signing-git-commits-with-an-ssh-key/) Pgrep (https://www.c0t0d0s0.org/blog/pgrep-z-r.html) LibreOffice downloads on the rise as users look to avoid subscription costs (https://www.computerworld.com/article/3840480/libreoffice-downloads-on-the-rise-as-users-look-to-avoid-subscription-costs.html) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Felix - Bhyve and NVME (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/607/feedback/Felix%20-%20bhyve%20and%20nvme.md) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
Join hosts Daniel Garcia and Eric Peterson as they dive into the latest news and updates in the BoxLang and CFML world. Don't miss out on insights, discussions, and what's coming next for modern software development!
FreeBSD 13.5-RELEASE Now Available, From Chaos to Clarity: How We Tackled FreeBSD's 7,000 Bug Backlog, zfs-2.3.1, Complications of funding an open source operating system, Why Choose to Use the BSDs in 2025, First Use on GhostBSD, Better Shell History Search, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines FreeBSD 13.5-RELEASE Now Available (https://lists.freebsd.org/archives/freebsd-announce/2025-March/000181.html) From Chaos to Clarity: How We Tackled FreeBSD's 7,000 Bug Backlog (https://freebsdfoundation.org/blog/from-chaos-to-clarity-how-we-tackled-freebsds-7000-bug-backlog/) News Roundup zfs-2.3.1 (https://github.com/openzfs/zfs/releases/tag/zfs-2.3.1) Complications of funding an open source operating system (https://posixcafe.org/blogs/2025/03/11/0/) Why Choose to Use the BSDs in 2025 (https://it-notes.dragas.net/2025/03/23/osday-2025-why-choose-bsd-in-2025/) First Use on GhostBSD (https://technophobeconfessions.wordpress.com/2025/03/18/first-use-on-ghostbsd/) Better Shell History Search (https://tratt.net/laurie/blog/2025/better_shell_history_search.html) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Russell - Questions (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/606/feedback/russell%20-%20questions.md) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
FediMeteo: How a Tiny €4 FreeBSD VPS Became a Global Weather Service for Thousands, Core Infrastructure: Why You Need to Control Your NTP, Automatic Display switch for OpenBSD laptop, Using a 2013 Mac Pro as a FreeBSD Desktop, Some terminal frustrations, Copying all files of a directory, including hidden ones, with cp, You Should Use /tmp/ More, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines FediMeteo: How a Tiny €4 FreeBSD VPS Became a Global Weather Service for Thousands (https://it-notes.dragas.net/2025/02/26/fedimeteo-how-a-tiny-freebsd-vps-became-a-global-weather-service-for-thousands/) Core Infrastructure: Why You Need to Control Your NTP (https://klarasystems.com/articles/core-infrastructure-why-you-need-to-control-your-ntp/?utm_source=BSD%20Now&utm_medium=Podcast) News Roundup Automatic Display switch for OpenBSD laptop (https://www.tumfatig.net/2024/automatic-display-switch-for-openbsd-laptop/) Using a 2013 Mac Pro as a FreeBSD Desktop (https://forums.FreeBSD.org/threads/using-a-2013-mac-pro-as-a-freebsd-desktop.96805/) Some terminal frustrations (https://jvns.ca/blog/2025/02/05/some-terminal-frustrations/) Copying all files of a directory, including hidden ones, with cp (https://bhoot.dev/2025/cp-dot-copies-everything/) You Should Use /tmp/ More (https://atthis.link/blog/2025/58671.html) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Tyler - Toms request (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/605/feedback/Tyler%20-%20Toms%20request.md) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
The Future Looking Back At Us: Joanne McNeil on Cyberpunk, Why ZFS reports less available space, We are destroying software, FreeBSD 13.5 Overcomes UFS Y2038 Problem To Push It Out To Year 2106, 1972 UNIX V2 "Beta" Resurrected, Some thoughts on why 'inetd activation' didn't catch on, If you believe in “Artificial Intelligence”, take five minutes to ask it about stuff you know well, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines The Future Looking Back At Us: Joanne McNeil on Cyberpunk (https://filmmakermagazine.com/127295-joanne-mcneil-cyberpunk/) Why ZFS reports less available space space accounting explained/ (https://klarasystems.com/articles/why-zfs-reports-less-available-space-space-accounting-explained/?utm_source=BSD%20Now&utm_medium=Podcast) We are destroying software (https://antirez.com/news/145) News Roundup FreeBSD 13.5 Overcomes UFS Y2038 Problem To Push It Out To Year 2106 (https://www.phoronix.com/news/FreeBSD-13.5-Beta-2) TUHS: 1972 UNIX V2 "Beta" Resurrected (https://www.tuhs.org/pipermail/tuhs/2025-February/031420.html) Some thoughts on why 'inetd activation' didn't catch on (https://utcc.utoronto.ca/~cks/space/blog/sysadmin/InetdActivationWhyNot) If you believe in “Artificial Intelligence”, take five minutes to ask it about stuff you know well (https://svpow.com/2025/02/14/if-you-believe-in-artificial-intelligence-take-five-minutes-to-ask-it-about-stuff-you-know-well/) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Nelson - gcc puzzlement (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/604/feedback/Nelson%20-%20gcc%20puzzlement.md) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
This week Carter and Nathan take a break from books and discuss the the seminal Worse is Better essays by Richard P. Gabriel. Join them as they how Unix and C were once perceived, tradeoffs in software design, and whether or not worse is truly better!-- Books Mentioned in this Episode --Note: As an Amazon Associate, we earn from qualifying purchases.----------------------------------------------------------Worse is Betterhttps://www.dreamsongs.com/WorseIsBetter.htmlRise of Worse is Betterhttps://www.dreamsongs.com/RiseOfWorseIsBetter.html----------------00:00 Intro01:37 About the Essays06:18 Thoughts on the Essays15:48 "the right thing" vs "worse is better" or MIT vs New Jersey39:59 Usefulness: Why worse beats better49:41 when worse is worse57:31 Final Thoughts----------------Spotify: https://open.spotify.com/show/5kj6DLCEWR5nHShlSYJI5LApple Podcasts: https://podcasts.apple.com/us/podcast/book-overflow/id1745257325X: https://x.com/bookoverflowpodCarter on X: https://x.com/cartermorganNathan's Functionally Imperative: www.functionallyimperative.com----------------Book Overflow is a podcast for software engineers, by software engineers dedicated to improving our craft by reading the best technical books in the world. Join Carter Morgan and Nathan Toups as they read and discuss a new technical book each week!The full book schedule and links to every major podcast player can be found at https://www.bookoverflow.io
OpenZFS RAID-Z Expansion: A New Era in Storage Flexibility, ZFS Orchestration Tools – Part 1: Snapshots, The Case of UNIX vs. The UNIX System, OpenBGPD 8.8 released, OPNsense 25.1, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines OpenZFS RAID-Z Expansion: A New Era in Storage Flexibility (https://freebsdfoundation.org/blog/openzfs-raid-z-expansion-a-new-era-in-storage-flexibility/) ZFS Orchestration Tools – Part 1: Snapshots (https://klarasystems.com/articles/zfs-orchestration-part-1-zfs-snapshots-tools/?utm_source=BSD%20Now&utm_medium=Podcast) News Roundup Manage OpenBSD with AWS Systems Manager (https://rsadowski.de/posts/2025-01-23-manage-openbsd-with-ssm/) TUHS:The Case of UNIX vs. The UNIX System (https://www.tuhs.org/pipermail/tuhs/2025-February/031403.html) OpenBGPD 8.8 released (https://www.undeadly.org/cgi?action=article;sid=20250207192657) OPNsense 25.1 (https://forum.opnsense.org/index.php?topic=45460.msg227323) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
This episode dives into the fascinating evolution of server technology, from room-sized mainframes to today's AI-powered cloud computing. It explores the innovations, rivalries, and key players—IBM, Microsoft, Unix pioneers, and the rise of Linux—that shaped the industry. The discussion covers the transition from minicomputers to personal computing, the impact of open-source software, and the shift toward containerization, hybrid cloud, and AI-driven infrastructure. With a focus on the forces driving technological progress, this episode unpacks the past, present, and future of server technology and its role in digital transformation.
I Tried FreeBSD as a Desktop in 2025. Here's How It Went, Cray 1 Supercomputer Performance Comparisons With Home Computers Phones and Tablets, The first perfect computer, Find Name Wildcard Gotcha, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines I Tried FreeBSD as a Desktop in 2025. Here's How It Went (https://www.howtogeek.com/i-tried-freebsd-as-a-desktop-heres-how-it-went/) Cray 1 Supercomputer Performance Comparisons With Home Computers Phones and Tablets (http://www.roylongbottom.org.uk/Cray%201%20Supercomputer%20Performance%20Comparisons%20With%20Home%20Computers%20Phones%20and%20Tablets.htm) News Roundup State of virtualizing the BSDs on Apple Silicon (https://briancallahan.net/blog/20250222.html) The first perfect computer (https://celso.io/posts/2025/01/26/the-first-perfect-computer/) Find Name Wildcard Gotcha (https://utcc.utoronto.ca/~cks/space/blog/unix/FindNameWildcardGotcha) New Patreon Levels Level 1 - user memory (Tip Jar) @ $1 / month Show your support for the show Level 2 - virtual memory (Ad-Free Episodes) @ $5 / month Ad-free episodes Level 3 - kmem (VIP Patron) @ $10 / month Everything in higher memory levels & Your feedback and questions jump the queue and go in the next episode. Personal shout outs (with your consent) for recommending articles we cover. Level 4 - physical memory @ $20 / month What's included: Everything in higher memory levels & You can send in audio/video questions and we'll air your audio in the show feedback section (if the quality of your recording is decent) Behind-the-scenes content - Raw Video from Recording sessions with intro/outro discussion not included in the show Additional Content when we all make it Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
We are back with Ajai Chowdhry as he launches his latest book, 'Just Aspire', a thought-provoking account of his entrepreneurial journey and insights on technology, innovation, and the future. In this episode, we dive into the fascinating story of HCL's rise to success, from its humble beginnings to its current status as a global IT leader. Join us as we explore HCL's pioneering achievements, its impact on Indian computing, and Ajai Chowdhry's vision for the future of technology in India.Resource list - Just Aspire by Ajai Chowdry - https://amzn.in/d/2c7uXE7 The HCL story - https://hcl.com/hcl-story/ HCL's first computer - https://www.linkedin.com/pulse/story-hcl-8c-first-personal-computer-india-rama-ayyar?utm_source=share&utm_medium=guest_desktop&utm_campaign=copy What is Unix? - https://www.hpc.iastate.edu/guides/unix-introduction https://en.wikipedia.org/wiki/Unix HCL's collaboration with Nokia - https://www.nokia.com/about-us/news/releases/2018/06/21/nokia-signs-five-year-global-it-infrastructure-and-application-services-deal-with-hcl-technologies/#:~:text=%22This%20expansion%20of%20the%20HCL,of%20key%20IT%20systems%20&%20processes.&text=We%20create%20the%20technology%20to,of%20products%2C%20services%20and%20licensing. https://theprint.in/pageturner/excerpt/how-hcl-nokia-partnership-made-mobile-phones-affordable-for-indians-in-the-1990s/1517817/
The PC is Dead: It's Time to Make Computing Personal Again, The Biggest Unix Security Loophole, The monospace Web, What a FreeBSD kernel message about your bridge means, Installing FreeBSD on a HP 250 G9, Networking for System Administrators, and more. NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines The PC is Dead: It's Time to Make Computing Personal Again (https://www.vintagecomputing.com/index.php/archives/3292/the-pc-is-dead-its-time-to-make-computing-personal-again) The Biggest Unix Security Loophole (https://www.tuhs.org/Archive/Documentation/TechReports/Bell_Labs/ReedsShellHoles.pdf) News Roundup The monospace Web (https://owickstrom.github.io/the-monospace-web/) What a FreeBSD kernel message about your bridge means (https://utcc.utoronto.ca/~cks/space/blog/unix/FreeBSDBridgeMacMovedMessage) Installing FreeBSD on a HP 250 G9 (https://brunopacheco1.github.io/posts/installing-freebsd-on-hp-250-g9/) Networking for System Administrators (https://mwl.io/nonfiction/networking#n4sa) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
We have Kernel resignations, A GPL court case of some importance, and Mozilla's potentially broken promise. Curl maintainers have thoughts, Some gaming classics have gone open source, COSMIC has another Alpha, and ROCm probably isn't ready for the 9070. For tips we have Chronic out of MoreUtils, pipewire's pw-loopback for audio looping fun, wall for sending terminal messages, and usbip for spooky USB actions at a distance. You can find the show notes at https://bit.ly/4h3ggLi and we'll see you next time! Host: Jonathan Bennett Co-Hosts: Rob Campbell, Jeff Massie, and Ken McDonald Download or subscribe to Untitled Linux Show at https://twit.tv/shows/untitled-linux-show Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
Lead Asahi Developer stands down, moderators reminiscing about joining the podcast, Support for the Radxa Orian O6 board in OpenBSD, FreeBSD and hi-fi audio setup: bit-perfect, equalizer, real-time, OpenBGPD 8.8 released, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Topics Hector Martin stands down as lead developer on Asahi Linux (https://asahilinux.org/2025/02/passing-the-torch/) No forward progress for Rust to be given first class status in the kernel Having to maintain a thousand plus patches against a fast moving upstream project (Linux Kernel) Dwindling funds What does this mean for sister projects like OpenBSD? 600th episode flash back When did you come across BSDNow? What are some of your highlights? Where are we going in the future...? What would we like to do for the show as hosts. Pie in the sky thinking and discussion. Round Up Support for the Radxa Orian O6 board in OpenBSD (https://marc.info/?l=openbsd-arm&m=173823317816570&w=2) As well, the NetBSD project is trying to bring up this board Conversation around the state of ARM64 SoC and options LibreSSL is not affected by the OpenSSL vulnerabilities (https://www.securityweek.com/high-severity-openssl-vulnerability-found-by-apple-allows-mitm-attacks/) announced today. FreeBSD and hi-fi audio setup: bit-perfect, equalizer, real-time (https://m4c.pl/blog/freebsd-audio-setup-bitperfect-equalizer-realtime/) OpenBGPD 8.8 released (http://undeadly.org/cgi?action=article;sid=20250207192657) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions The Most Important Question (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/600/feedback/jt%20-%20the_most_important_question.md) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
Please enjoy this encore of Career Notes. Senior technical project manager Dwayne Price takes us on his career journey from databases to project management. Always fascinated with technology and one who appreciates the aspects of the business side of a computer implementations, Dwayne attended UMBC for both his undergraduate and graduate degrees in information systems management. A strong Unix administration background prepared him to understand the relationship between Unix administration and database security. He recommends those interested in cybersecurity check out the NICE Framework as it speaks to all the various different types of roles in cybersecurity, Dwayne prides himself on his communication skills and openness. We thank Dwayne for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices
Please enjoy this encore of Career Notes. Senior technical project manager Dwayne Price takes us on his career journey from databases to project management. Always fascinated with technology and one who appreciates the aspects of the business side of a computer implementations, Dwayne attended UMBC for both his undergraduate and graduate degrees in information systems management. A strong Unix administration background prepared him to understand the relationship between Unix administration and database security. He recommends those interested in cybersecurity check out the NICE Framework as it speaks to all the various different types of roles in cybersecurity, Dwayne prides himself on his communication skills and openness. We thank Dwayne for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices
Controlling Your Core Infrastructure: DNS, Laptop Support and Usability Project Update, FreeBSD at FOSDEM 2025, Uploading a message to an IMAP server using curl, The Death of Email Forwarding, Cruising a VPS at OpenBSD Amsterdam, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines Controlling Your Core Infrastructure: DNS (https://klarasystems.com/articles/controlling-core-infrastructure-dns-server-setup/) Laptop Support and Usability Project Update: First Monthly Report & Community Initiatives (https://freebsdfoundation.org/blog/laptop-support-and-usability-project-update-first-monthly-report-community-initiatives/) News Roundup FreeBSD at FOSDEM 2025 (https://freebsdfoundation.org/blog/freebsd-at-fosdem-2025/) Uploading a message to an IMAP server using curl (https://jpmens.net/2025/01/23/uploading-a-message-to-an-imap-server-using-curl/) The Death of Email Forwarding (https://www.mythic-beasts.com/blog/2025/01/29/the-death-of-email-forwarding/) Cruising a VPS at OpenBSD Amsterdam (https://www.tumfatig.net/2025/cruising-a-vps-at-openbsd-amsterdam/) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
Please enjoy this encore of Career Notes. Senior Program Manager for Governance, Risk and Compliance at Illumio, Maria Thompson-Saeb shares experiences that led to her career in cybersecurity. Interested in computers and not a fan of math, Maria opted for information systems management rather than computer science. She started her career as a government contractor. Once in the private sector, Maria moved into the Unix and Linux environments where she says "something that would totally change everything." She gained an interest in security and took it upon herself to train up and move into that realm. Maria notes it was not without roadblocks, but that being flexible helped her address those challenges and make her career in security happen. We thank Maria for sharing her story. Learn more about your ad choices. Visit megaphone.fm/adchoices
Please enjoy this encore of Career Notes. Senior Program Manager for Governance, Risk and Compliance at Illumio, Maria Thompson-Saeb shares experiences that led to her career in cybersecurity. Interested in computers and not a fan of math, Maria opted for information systems management rather than computer science. She started her career as a government contractor. Once in the private sector, Maria moved into the Unix and Linux environments where she says "something that would totally change everything." She gained an interest in security and took it upon herself to train up and move into that realm. Maria notes it was not without roadblocks, but that being flexible helped her address those challenges and make her career in security happen. We thank Maria for sharing her story. Learn more about your ad choices. Visit megaphone.fm/adchoices
Burnie and Ashley discuss Valentine's Day Eve, death by meteor, Duolingo's bizarre mascot lore, Captain America 4, Y2K II, the Unix 2038 problem, and trying to name the last three Marvel movies.
Key Considerations for Benchmarking Network Storage Performance, OpenZFS 2.3.0 available, Updates on AsiaBSDcon, GhostBSD Desktop Conference, Recovering from external zroot, Create a new issue in a Github repository with Ansible, Stories I refuse to believe, date limit in UFS1 filesystem extended, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines Key Considerations for Benchmarking Network Storage Performance (https://klarasystems.com/articles/considerations-benchmarking-network-storage-performance/) OpenZFS 2.3.0 available (https://github.com/openzfs/zfs/releases/tag/zfs-2.3.0) News Roundup Updates on AsiaBSDCon 2025 - Cancelled - (https://lists.asiabsdcon.org/pipermail/announce/2025-January/000046.html) GhostBSD Desktop Conference (https://www.phoronix.com/news/BSD-Desktop-Conference-GhostBSD) Recovering from external zroot (https://adventurist.me/posts/00350) Create a new issue in a Github repository with Ansible (https://jpmens.net/2025/01/25/create-a-new-issue-in-a-github-repository/) Stories I refuse to believe (https://flak.tedunangst.com/post/stories-i-refuse-to-believe) Defer the January 19, 2038 date limit in UFS1 filesystems to February 7, 2106 (https://cgit.freebsd.org/src/commit/?id=1111a44301da39d7b7459c784230e1405e8980f8) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Feedback - Nelson - Ada/GCC (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/598/feedback/Nelson%20Feedback.md) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
The Do-Not-Stab flag in the HTTP Header, FreeBSD jail host with multiple local networks, Generative AI is for the idea guys, Static dual stack networking on OmniOS Solaris Zones, FRAME sockets added to OpenBSD, The problem with combining DNS CNAME records and anything else, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines (due to excessive use of the F-bomb, perhaps we should somewhat censor it... You can do so in words... or I can use Tom's favorite Frequency tone to do it in post). You decide and let me know what you think would be funnier.) Also I'm hoping for some good commentary from you guys on this one. :P The Do-Not-Stab flag in the HTTP Header (https://www.5snb.club/posts/2023/do-not-stab/) FreeBSD jail host with multiple local networks (https://savagedlight.me/2014/03/07/freebsd-jail-host-with-multiple-local-networks/) News Roundup Generative AI is for the idea guys (https://rachsmith.com/ai-is-for-the-idea-guys/) Static dual stack networking on OmniOS Solaris Zones (https://www.tumfatig.net/2024/static-dual-stack-networking-on-omnios-solaris-zones/) FRAME sockets added to OpenBSD (https://www.undeadly.org/cgi?action=article;sid=20241219080430) The problem with combining DNS CNAME records and anything else (https://utcc.utoronto.ca/~cks/space/blog/tech/DNSCNAMEAndOthersWhyNot) Conference Bits BSD-NL (https://bsdnl.nl/) BSDCan (https://www.bsdcan.org/2025/) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
The MacBreak Weekly crew celebrates the 25th anniversary of Mac OS X, discusses Apple's $95 million settlement over Siri privacy concerns, and shares their thoughts on new gaming capabilities coming to the Vision Pro headset. The hosts also debate the future of Google search in light of the US government's antitrust case and touch on the possibility of non-invasive glucose monitoring coming to the Apple Watch. • Release of iOS and iPadOS 16.3.1 with important bug fixes and security updates • 25th anniversary of Mac OS X and its importance in providing a modern, Unix-based foundation that became the basis for Apple's other operating systems • Apple's $95 million settlement over Siri privacy concerns related to accidental recordings, while maintaining that user data was never sold or used for marketing • Speculation on why Apple is unlikely to create its own search engine, particularly due to its lucrative deal with Google and the economic risks involved • Concerns over Apple's AI-generated news summaries sometimes being wildly inaccurate, prompting calls for the company to suspend the feature until it can be improved • Expansion of Apple Fitness+ with new workouts and integration with the Strava workout tracking platform • The gang discusses the ethical implications of Apple potentially securing exclusive rights to non-invasive blood glucose monitoring on the Apple Watch • Nvidia announcing upcoming support for its GeForce Now game streaming service on the Vision Pro headset, plus the ability to use the device for capturing movement to train AI for robotics • 'Wicked' director Jon M. Chu used Apple Vision Pro during the film's post-production process Picks of the Week: • Leo: Ghostty - a macOS terminal with metal integration • Jason: Govee Christmas Lights 2, programmable LED lights for festive decoration • Alex: iPhone Cinematic mode, which allows for impressive video capture and post-production focus adjustments • Andy: Anker's new 140W 4-port charger, offering fast charging capabilities for multiple devices simultaneously Hosts: Leo Laporte, Alex Lindsay, Andy Ihnatko, and Jason Snell Download or subscribe to MacBreak Weekly at https://twit.tv/shows/macbreak-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: zscaler.com/security Melissa.com/twit cachefly.com/twit