We started producing shows as Today with a Techie 9 years, 1 months, 20 days ago. Our shows are produced by listeners like you and can be on any topic that "are of interest to hackers". If you listen to HPR then please consider contributing one show a year. If you record your show now it could be released in 7 days.
We are running very low on shows at the moment. Have a look at the hosts page and if you don't see "2014-??-??" next to your name, or if your name is not listed, you might consider sending us in something.
There are files ready to process on the FTP server.
Yes it't that time of year when HPR opens it's hands and welcomes all the Tech podcast community to gather and chat. Meet old friends and make a few new ones. This is the 4th Annual show that is streamed live and then podcasted via the Hacker Public Radio feed. While it is enabled by HPR Volunteers, it is put on for the benefit of the FLOSS, Tech, Security podcast community in general.
We would kindly ask as many people as possible to spread the word
- hpr-2015-new-year-show-promo-5150-2minutes.flac (6M)
- hpr-2015-new-year-show-promo-5150-2minutes.ogg (1.3M)
- hpr-2015-new-year-show-promo-5150-2minutes.mp3 (1.8M)
- hpr-2015-new-year-show-promo-ken-1minute.flac (5M)
- hpr-2015-new-year-show-promo-ken-1minute.ogg (600K)
- hpr-2015-new-year-show-promo-ken-1minute.mp3 (1M)
- 10 in the morning New Years eve, UTC, 2014-12-31T10:00:00Z
- Noon New Years Day UTC, 2015-01-01T12:00:00Z
Since April last year the text-to-speech using eSpeak in the Raspberry Pi console has stuttered very badly and regularly crashes the kernel.
Here's how I fixed it.
Cloning my github repo:
cd ttsprojects/raspberry-pi/libilctts/build sudo ./build.sh cd ../../piespeakup sudo ./build.sh
Bingo! Speech should work.
This has only just been released and there is still work to do on the documentation.
Note: I am not connected to the Raspberry Pi Foundation in any way and anything I say or do is not endorsed by them.
My email address is connected with a Freelists email list I set up and an accompanying web site:
The 'VI' is for 'Visually Impaired' and I DID check with the Foundation about the similarity of the web address before I created it.
To join our email list send an email to:
With 'subscribe' in the subject.
Bash parameter manipulation
I'm a great fan of using the Linux command line and enjoy writing shell scripts using the Bash shell.
BASH (or more usually Bash or bash) is the name of a Unix shell. The name stands for Bourne Again SHell, which is a play on words. Bash is an extension of the shell originally written by Stephen Bourne in 1978, usually known as SH.
A shell is the part of the operating system that interprets commands, more commonly known as the command line.
A knowledge of Bash is very helpful if you would like to be able to use the power of the command line. It is also the way to learn how to build Bash scripts for automating the tasks you need to perform.
In this episode we look at what parameters are in Bash, and how they can be created and manipulated. There are many features in Bash that you can use to do this, but they are not easy to find.
As I was learning my way around Bash it took me a while to find these. Once I had found them I wanted to make a "cheat sheet" I could stick on the wall to remind me how to do things. I am sharing the result of this process with you.
The version of Bash which I used for this episode is 4.3.30(1)-release
The full notes for this episode are to be found here: http://hackerpublicradio.org/eps/hpr1648_full_notes.html
- Shell Parameter Expansion http://www.gnu.org/software/bash/manual/html_node/Shell-Parameter-Expansion.html
- Bash Hackers on parameter expansion http://wiki.bash-hackers.org/syntax/pe
- Previous HPR shows on the shell or shell scripting:
- 2008-03-03 HPR0045: Shell Scripting (dosman) http://hackerpublicradio.org/eps.php?id=45
- 2008-03-12 HPR0052: UCLUG: Newbie Shell Scripting (Dave Yates) http://hackerpublicradio.org/eps.php?id=52
- 2010-03-24 HPR0531: bash loops (Ken Fallon) http://hackerpublicradio.org/eps.php?id=531
- 2010-08-11 HPR0562: Introduction to bash scripting (Ken Fallon) http://hackerpublicradio.org/eps.php?id=562
- 2010-11-17 HPR0598: Bash Scripting: Episode 2 Command Line Basics (Ken Fallon) http://hackerpublicradio.org/eps.php?id=598
- 2012-05-22 HPR0992: Linux In The Shell 007 - Chmod and Unix Permissions. (Dann) http://hackerpublicradio.org/eps.php?id=992
- 2012-06-05 HPR1002: Linux In The Shell 008 - free: Understanding Linux Memory Usage (Dann) http://hackerpublicradio.org/eps.php?id=1002
- 2013-03-05 HPR1197: What I do with bash scripts (Jon Kulp) http://hackerpublicradio.org/eps.php?id=1197
- 2013-04-09 HPR1222: LiTS 027: mathematical commands (Dann) http://hackerpublicradio.org/eps.php?id=1222
- 2013-05-14 HPR1247: Recording Terrestrial Radio with bash scipts and cron jobs (Jon Kulp) http://hackerpublicradio.org/eps.php?id=1247
- 2013-05-22 HPR1253: Linux in the Shell Ep 30 - vmstat (Dann) http://hackerpublicradio.org/eps.php?id=1253
- Full show notes http://hackerpublicradio.org/eps/hpr1648_full_notes.html
- Bash man page extract http://hackerpublicradio.org/eps/hpr1648_summary.pdf
- Parameter manipulation "cheat sheet" http://hackerpublicradio.org/eps/hpr1648_diagram.pdf
- Various annotated Bash scripts which make up my Magnatune Downloader (described in show hpr1204) https://gitorious.org/magnatune-downloader/magnatune-downloader/source/master:
OggCast 2014. we cook dinner, I drink beer, a time is had by all. I'd like to amp this, but Audacity won't let me, so listen carefully.
Broam, Briptastic, and FiftyOneFifty talk about the meal they are making for Saturday Night at Oggcast Planet Live 2014 from when they thought about it until dinner was served, as well as that day's fun at Knoebels theme park at Elysburg PA and the plans to visit the ghost town of Centralia the following day.
You can set a Standard Filter from within the AutoFilter drop-down, or you can go there through the Data menu by selecting Data>Filter>Standard Filter. Now lets look at the question we ended the last tutorial with: How many females over the age 40 had a case in 1978. We saw we could get this by manually putting checkmarks in every age that was greater than 40 using AutoFilter, but how do we do this using Standard Filter? - For more go to http://www.ahuka.com/?page_id=897
In this episode
Open source product development most effective when social
Benetech started out in the 90s without even understanding the meaning of the term open source. They just "needed an easy way to interface with different voice synthesizers" to develop readers for people who are blind and "shared the code to be helpful."
Sound familiar? Opensource.com started covering stories like in 2010 and they recur more often than you might think. Stories of people sharing the code to help others—but sharing code to get help developing better code. When code is open, a community has the opportunity to form around it.
Read this interview about what Benetech CEO Jim Fruchterman learned by adopting open source philosophy and furthering technology-for-good.
Read more: http://opensource.com/business/14/7/interview-jim-fruchterman-benetech
OpenStack product management: wisdom or folly?
Two recent, excellent, blog posts have touched on a topic I've been wrestling with since May's OpenStack Summit: What is the role of the Product Management function, if any, in the OpenStack development process?
The first article, "Calling all 'User Landians' to lead OpenStack above the cloud," by Evan Scheessele, talks about the "real user" of OpenStack—those people that need to deliver a solution that brings some sort of value to their organization. The other article, "Who's In Charge Here Anyway?…," by Rob Hirschfeld, speaks to the dynamics of how decisions—which OpenStack features are in in or out—get made in the OpenStack ecosystem.
Read more: http://opensource.com/business/14/7/openstack-product-management-wisdom-or-folly
Giving Sub-Saharan African communities an online presence
People in Sub-Saharan Africa face hurdles to get online. Despite some progress, the region lags behind in Internet connectivity due to the high costs of service and poor infrastructure, according to a recent World Economic Forum report.
This digital divide means some African communities are underrepresented on the web. Without a well-developed online presence, misinformation about them can spread relatively unchallenged.
Read more: http://opensource.com/life/14/7/giving-sub-saharan-african-communities-online-presence
Unison is a file syncing/backup utility, similar to SyncBack on Windows, available in most repros.
- The graphical interface requires the installation of unison, and unison-gtk.. Unison may be installed w/o the graphical component, but all operations must be initiated from a system running the GUI.
- Network backups require RSH or SSH to be installed on both machines
- The standard wisdom seems to be the rsync does not do a true 2 way sync, i.e., to sync to the newest file version going both ways you would have to do
rsync ~/LocalFolder you@server:/home/you/RemoteFolderthen turn around and do
rsync you@server:/home/you/RemoteFolder ~/LocalFolder. Add that to the fact that like cp, or scp, rsync requires separate commands for files with extensions, files without, and hidden files, creating a bash script for syncing files is more complex than creating a Unison profile.
- Step One: If, like me you are syncing only Documents, make your subfolder structure the same on both machines, ergo, if one PC has
/home/you/Documents/recipeand second PC has
/home/you/Documents/Recipes, edit your folder structure to be the same on both PCs to avoid duplicate files and folders
- Launch Unison and create a backup profile First use, create a profile
- Name of profile
- Synchronization kind (Local, SSH, RSH, TCP)
- "First" Directory (you can browse your mounted volumes)
- "Second" Directory, if you chose Local
- Host Machine Name (or IP Address)
- User Name (If you haven't registered SSH keys, you will be prompted for a password on every synchronization.
- Check whether you want to use compression, (on fast networks or slow processors, compression may create more overhead than it's worth).
- Target directory (If it's on a remote server, you will need to type the full path, there is no browsing to the folder.)
- Tell Unison if either folder uses FAT (say an un-reformatted USB stick)
- If you are backing up to another system, Unison needs to be installed on both. If you are backing up to a server with no GUI desktop manager, you can install just the unison package without unison-gtk, but all the syncs will have to be initiated from the machine with a GUI. (Of course, if you back up to a remote volume that is mounted locally, it should be completely transparent to Unison). If you choose to sync via ssh (recommended), you will need ssh and ssh-server installed appropriately on each machine.
- Name of profile
- Select and run your profile.
- The first time, expect to get a warning that no archive files (index files that speed up the synchronization scan) were found. They will be created on the first sync.
- Unison will look for differences between the files in the two selected directories. The differences will be displayed graphically, with arrows pointing left or right, indicating which directory contains the most current version of the file (by modification date). You can choose to merge files either left or right (a conventional backup), do a merge (i.e., Unison itself decides how to combine data from files with the same name (obviously, that could be messy), or to do a sync (ergo, the most current version of a file overwrites older version, regardless of location). Click "Go" to do a true sync.
This episode is about how Al and Jerry Meet at Oggcamp. What we enjoy about the event,what to expect and encourage people to attend next year.
This is my second HPR episode after beni recorded a interview with me at oggcamp and said I should submit my own episode
I am a Linux user since the end of 1999. Which is 15 years already. I've also been trying for almost 15 years to convince other people to try Linux. And I must confess that I very often used wrong arguments doing this. After 15 years it is time to ditch some fake arguments, and to tell you the real reasons why you should switch to Linux. :-)
I apology for the bad audio quality. A full transcript of this episode
can be found on my blog.
Previously we looked at Public Key encryption, which is also called Asymmetric Encryption because it uses two different keys for the encryption and decryption. This allows us to solve one of the biggest problems in secure encrypted communication, which is key distribution. Because the public key can be freely distributed, you dont need to maintain security around the process of distributing keys. Symmetric encryption, on the other hand, relies on a shared key that is used for both encryption and decryption. An example of this is the one-time pad, where you printed up a pad of paper that contained various keys, and each one was used only once. As long as no one can get the key, it is unbreakable, but the big weakness was key distribution. How do you get the one-time pad into the hands of your correspondent? And you would need to do this with separate one-time pads for each person you needed to communicate with. These are the kinds of problems that made asymmetric encryption so popular. Finally, symmetric key crypto cannot be used to reliably create a digital signature. The reason should be clear. If I have the same secret key you used to sign a message, I can alter the message, use the shared secret key myself, and claim you sent it. - For more go to http://www.zwilnik.com/?page_id=650