A major security vulnerability has been discovered in the GNU Bash (Bourne Again Shell) for the Linux operating system. System administrators running Red Hat Enterprise , Fedora, CentOS, Ubuntu, and Debian distributions will want to update to the latest release of the Bash package. This vulnerability affects Bash versions 1.14 – 4.3 which is even included in the 10.9.4 releases of the Apple OS X operating system also known as Mavericks. Even if you are running another distribution of Linux such as Mint or Zorin this does not exclude you from being affected by this vulnerability. Forks of Red Hat and Debian based distributions will very likely be running Bash and need to be patched.
Indie Nation Tech News
This is the Tech News portion of our news show here at indienation.fm. If you wish to listen to the full two hour show it posted earlier.
We would also like to remind the listeners that we encourage listener participation through chat, comments and you are welcome to actually join us on the air. We do the show live almost every Monday from 8-10 PM DST. To find out how to join us on the air, contact us via our chat room on the Listen Page.
2014.09.22 – Tech Net News and Opinion
We opened this week’s show with Titanic and Cape Cod Girls from the album Choice Cuts by Water Street Bridge. You can find out more about this band by listening to the interview at the end of the newscast or by checking out the individual posting of the interview on Indie Nation. Join Brian and Lumpy as they discuss some Walking Dead spoilers and rumors, Google news in general, drones vs Star Wars and more in tech and science news. We would also like to remind the listeners that we encourage listener participation through chat, comments and you are welcome to actually join us on the air. To find out how to join us on the air, contact us via our chat room on the Listen Page.
- First off, the season premier is 12 October
- Season 5 Episode 2 – Another character from the comic, Father Gabriel.
- Carol is supposedly back at the end of the premier
- FYI – Lumpy did check, Walking Dead Season Marathon begins on 6 October
- The Air Herald reports that there will be a spin off
- There is talk about Beth, it seem that a trailer gave that and a few other things away
- Washington D.C. is in the storyline
- Beth has been in some of the teasers, possibly in a safe place
- It doesn’t look like Glenn dies by episode two
- The best cities for Internet (based on speed and/or price)
- Be kewl by looking the fool, strap your iPhone to your face
- Audible security loophole exploited
- A fewregarding Apple:
- Comcast denies TOR statements from customer
- Star Wars set needs a drone shield
- An analysis of the 5 million leaked gMail passwords
- Native Netflix support for Linux
We closed with a few more tracks from Water Street Bridge:
- Pay Me/Iko
- Zombie Jamboree
- Lumpy’s Interview with them at Gen Con 2014
Tech Net News and Opinion
Welcome to this week’s episode of Tech Net News and Opinion. The week we shall discuss Gen Con 2014, a man not quite legally dead, some Chicago politics, whether satire and fake news need a tag, facial recognition abuse by the police, a dumb criminal using Siri, a recent court decision regarding piracy and ex parte, Linux in Munich, music, technology, a new card reader,”oragamic” solar panels, and smart tattoos.
If you have never been to a Gen Con, Lumpy will spend almost one-quarter of the show playing some of the artists who performed there and talking about his experience. Lumpy has never attended a Gen Con before. There are a few things he knows for sure:
- He had a great time
- He got many interviews
- He learned much
- He has every intention of returning in 2015
While our news director and I love Linux, we both have mentioned, several times, that likely the largest reason for it being “safer” regarding being hacked is because it is not too pretty of a target to the hacker. In short, it is not that popular an operating system. (This does not negate the fact that the OS is most likely more secure than Windows, just that not as many hackers are trying to hack it.)
However, largely due to the success of Android, the operating system which was referred to as a “hobbiest operating system” in the past, is now very common among mobile devices. That said, how soon before it becomes a target?
How about July 29? According to an article at Hacker News, a 17 year old man will demonstrate what they call an ELF virus at a black hat convention. The article states that the infection will allow access to private an confidential data.
It should be interesting to see how this impacts the users of these devices. It could turn people off to it or, due to the likely fact that an open source project will find quicker solutions to it than an project that is limited to a set number of programmers, the users will find comfort in the patches. One thing for sure, I do not plan on ditching my Ubuntu anytime soon.
- Linux Distros For The Paranoid: What Are The Most Secure Distros? (makeuseof.com)
- Cross-platform Trojan found (thedroidguy.com)
- Linux vulnerability found in Web exploit (networkworld.com)
2012.04.23 – Monday Night Tech Net News and Opinion
Hello Indienation listeners join us as Brian, Lumpy, OmniDragon and Cleta bring you tonight’s Tech Net news and Opinion and as always Knowles217 joins us in Teamspeak. Tonight’s news consists of Tech, Copyright, Hacking and Prize worthty news. As always you can find us over on irc.geekshed.net in #indienation you can join us there.
2012.03.19 – Tech Net News and Opinion
We started tonights show with some music from
The Pistol Whipper Snappers
- Drugs Motorcyles And Texas
You can find them at:
- How Did I Google This
You can find them at:
And we played some music by:
You can find him at:
Lumpy, OmniDragon, Cleta, and Matt bring you tonights tech net and news.
Linux and Android, together at last
The latest Linux kernel 3.3 now includes code from Google’s Android project. Most people do not realize that their Android phone’s operating system is really Linux based. Android is merely a fork of the Linux kernel code that is overseen by Linus Torvalds on kernel.org. He announced, with the release of version 3.3 of the Linux Kernel, that the two sets of code are now combined which will mainline the release of patches and new features. The merge has been underway for months and this is merely an announcement of its completion.
Researchers find privacy and security holes in Android apps with ads
Researchers at North Carolina State University discovered that many of the libraries used in free Android apps to display the in-app advertisements are a possible threat to the users privacy. Hackers can use these libraries to bypass Android security and some make it possible to fetch and run code from the Internet. The research team examined 100,000 apps and found that nearly half included code to track the user’s GPS coordinates and that 1 out of 23 allowed data to be passed back to the advertiser.
Super-secret Google builds servers in the dark
In an article from Arstechnica.com, it has been discovered that Google goes to extreme measures to ensure the secrecy of their server designs and networking gear. They give their technical staff lights to go on their heads when working on these super secretive servers to ensure no prying eyes will be able to catch a glimpse of their custom hardware. According to Chris Sharp, Google unscrewed all the light bulbs inside of the hardware cages that house their equipment in the Equinix data center. They have also turned off all of the overhead lights and sent their workers in with miner’s helmets. Google refused to comment, but, with the high end gear being an important edge against their competitors, this behavior is not surprising.’
Google flushes heat from data center with toilet water
This past week Google announced that it is nor working with the Douglasville-Douglas County Water and Sewer Authority to cool its Douglas County, Georgia computing center with 100% recycled water. From taking showers to flushing their toilets, local residents are helping to cool the data center. During a time of drought, Google no longer has to worry about being short on fresh water. They also did not want to contribute to the water shortage. Michael Patton, the deputy director of water and waste water operations for the WSA stated that, “It’s a win-win for both us and for the community, too.”
We talked about Polina Kourakina and her fundraiser for her first full length album, This Erie key of A. Here is the link
indiegogo.com/polinak and you can click on the sidebar widget here on indienation.fm.
we played some music from the very talented
Polina Kourakina from her Wonderlust EP
- Liquor & Wine
You can find the beautiful Polina at:
Microsoft gives cops tools to detect child porn
The software giant along with a Swedish technology company has giving law enforcement agencies a digital tool that sifts through massive amounts of online images to help identify instances of child pornography. Child pornography is one of those rare crimes where perpetrators often post evidence of their illegal acts online.But the vast quantity of images circulating on the Web makes finding specific photos of child abuse a huge challenge.They reviewed more than 65 million images nd videos of child sexual exploitation reported by law enforcement since 2002.
Microsoft seeks patent on monetizing buttons of TV remote
It’s called “Control-based Content Pricing,” and the basic idea is dynamic pricing of the material that you are watching lets say you skip a bunch of commercials the price of what you are watching just went up and apperently it builds on an existing patent that was already issued to Microsoft last year.
Suspicions aroused as exploit for critical Windows bug is leaked
Attack code privately submitted to Microsoft to demonstrate the severity of a critical Windows vulnerability is circulating on the ‘Net, prompting the researcher who discovered it to say it was leaked by the software maker or one of its trusted partners. There is an Update on it that says it wasn’t:
Update: Aaron Portnoy, ZDI’s Manager of Security Research told Ars he’s sure the leak didn’t come from anyone with his company. There is another update on it that says the code match:
Update 2: Yunsun Wee, Director of Microsoft’s Trustworthy Computing division confirmed that the code appeared to be match vulnerability information shared with MAPP partners. He said exploit details have never leaked out of his company, and he added he was unaware of leaks involving other Microsoft partners, either.
We wished Jamie Holm from Sick of Sarah Happy Birthday!!
And played some of their music:
We played a couple of tracks Lumpy recorded live in Cleveland
at The Pirate’s Cove.
- Kiss Me
- Hello, Good Morning (sent out to Lumpy)
The Pirate Bay plans fleet of low orbit server drones to evade the authorities
In what reads like an April 1 missive, The Pirate Bay has announced that it plans to launch “Low Orbit Server Stations” that will act as a front line defense against future take-down attacks and censorship attempts on the world’s largest torrent site.
Details are sketchy, but it sounds like these low orbit servers will act as proxies that redirect users to geographically-hidden servers that host the actual torrent indexes and trackers.
Anonymous Releases Their Own Operating System, Complete with Hacking Tools, and You Should Not Download It
“”Because you could “end up in jail”.
The OS is based off Ubuntu and runs the MATE user interface. It comes complete with many built-in hacking tools that crack passwords, search for vulnerabilities in web sites,
Update: The AnonOps Twitter account claims the OS is fake and full of Trojans, so our dis-recommendations stands. They say if you are interested in testing security use BackTrack.
Lester Chambers, Successful Musician Who Received No Royalties From ’67 To ’94, Planning To Sue
From 1967 to 1994, he recieved no royalties whatsoever. There is a photo on the web site that he posted on Facebook. The author of the article said he almost didn’t publish this because he wasn’t sure if it was real. He published this photo. All you can see is this Gold record and the letter he wrote. Lumpy reads the letter,
“I am the former lead singer of a 60s band. I performed before thousands at Alanta POP2, Miami POP, Newport POP, Alantic POP.” I did not squander my money on drugs or a fancy home. I went from 1967-1994 before I saw my first royalty check. The music giants I recorded with only paid me for 7 of my albums. I have never seen a penny in royalties from my other 10 albums I recorded. Our hit song was licensed to over 100 films and T.V commercials without our permission. One major TV network used our song for a national commercial and my payment was $625 dollars. I am now 72 trying to live on $1200 a month. Sweet relief; a music chairty is taking donations for me. Only 1% of artists can afford to sue. I am the 99%”
You can see the photo in the link.
Bruce Springsteen, Another Pirate Remixer!
According to this techdirt article here is what he is saying
“For me, it was The Animals. … “We Gotta Get Out Of This Place” had a great bass riff, you know it had that—[plays riff on guitar]—and that was just a clock, a clock marking time. [sings the first few lines] That’s every song I’ve ever written. “Badlands”, “Prove It All Night”, “Darkness” was filled with Animals. Youngsters, watch this one. I’ll tell you how it’s done right now. I took “Don’t Let Me Be Misunderstood” [hums and strums the Animals riff, then transitions into his song Badlands]—It’s the same fucking riff man. Listen up youngsters: this is how successful theft is accomplished.”
Lumpy talked about this article from Techdirt.com
Where John Lennon said On Copying Others’ Music:
“It’s Not A Rip Off, It’s A Love In”
“Money’, ‘Twist ‘n’ Shout’, ‘You really got a hold on me’, etc. were all numbers we (the Beatles) used to sing in the dancehalls around Britain, mainly Liverpool. It was only natural that we tried to do it as near to the record as we could – I always wished we could have done them even closer to the original.”
Then we went on to some music from
- Crazy on You
- Magic Man
You can find Heart at:
Most all of their links are on their web site.
ISPs To Become Copyright Cops This Summer
We talked about this article Lumpy brought up about SOPA and the three strike programs where your ISP says hey we think you have been surfing torrents and doing things illegal so they are going to cut you off for lets say two months and you can’t get back online for two months, okay here is your second strike its going to be a year or some other abutory period and thats basically since the recording industry and the motion picture industry couldn’t get it made law they are just striking business deals with all the major internet service providers.
Then we ended the show with music from the very talented.
- Code Monkey
- I Feel Fantastic
- Creepy Doll
Creative Commons, Non-Commercial, Attribution, Share-Alike
Comments and feedback are welcome. You can call us at (818)81-INDIE or hit us up with an email at firstname.lastname@example.org. You can follow us as @indienationfm on Twitter. You can also join our community on Facebook.
Be sure and circle us on Google Plus!
- 2012.03.05 Monday Night Tech Net News and Opinon – Episode 12 (indienation.fm)
- 2012.02.27 – Tech Net News and Opinion – Episode 011 (indienation.fm)
- Tech Net News and Opinion 003 (indienation.fm)
Google Autonomous Cars Legal in Nevada
I think this one boils down to “who do you trust?” While I am well aware that the nut behind the wheel is the most likely cause of an automobile accident, I still must ponder if I desire to share the road with autonomous automobile. Perhaps, it is best that these vehicle go legal in a state known for gambling.