Site Map - skip to main content

Hacker Public Radio

Your ideas, projects, opinions - podcasted.

New episodes Monday through Friday.



Welcome to HPR the Community Podcast Network

We started producing shows as Today with a Techie on 2005-09-19, 15 years, 0 months, 3 days ago. Our shows are produced by listeners like you and can be on any topic that "are of interest to Hackers". If you listen to HPR then please consider contributing one show a year. If you record your show now it could be released in 18 days.

Meet the team

Please help out tagging older shows !


Latest Shows


hpr3165 :: Spanish Tools Continued

Part two of how I am using a variety of tools to learn Spanish


Hosted by Ahuka on 2020-09-18 is flagged as Clean and released under a CC-BY-SA license.
Tags: Spanish, Language learning.
Listen in ogg, spx, or mp3 format. Comments (0)

I decided to use my time spent in relative isolation to do something productive and learn another language. I picked Spanish because I am hoping to visit Mexico and other Latin American countries whenever the plague lifts. I decided to document this for anyone who wants to know what options I found and how they have worked for me so far. This is the second part of my tools exploration.


hpr3164 :: I'm Learning Spanish

How I am using a variety of tools to learn Spanish


Hosted by Ahuka on 2020-09-17 is flagged as Clean and released under a CC-BY-SA license.
Tags: Spanish, Language learning.
Listen in ogg, spx, or mp3 format. Comments (0)

I decided to use my time spent in relative isolation to do something productive and learn another language. I picked Spanish because I am hoping to visit Mexico and other Latin American countries whenever the plague lifts. I decided to document this for anyone who wants to know what options I found and how they have worked for me so far.


hpr3163 :: Linux Inlaws S01E13: The road to communism and freedom

Our old heroes discuss their legacy and how they arrived at open source software and communism

Hosted by monochromec on 2020-09-16 is flagged as Explicit and released under a CC-BY-SA license.
Tags: open source, communism, escort services, freedom, Mach, VMS, accounts.
Listen in ogg, spx, or mp3 format. Series: Linux Inlaws | Comments (0)



hpr3161 :: How I manage podcast listening

Another reply to MrX's episode on how he listens to podcasts


Hosted by Dave Morriss on 2020-09-14 is flagged as Explicit and released under a CC-BY-SA license.
Tags: podcast,software,mp3 player,database.
Listen in ogg, spx, or mp3 format. Comments (0)

Introduction

I have spoken in the past about the podcast management system I have created, but have never gone into much detail about how I manage the playing of episodes.

Prompted by MrX’s HPR episode hpr3132, “Keeping track of where I am” I will describe it now.

Long notes

Follow this link to read the detailed notes associated with this episode.


hpr3160 :: GIMP: Transform Tools

With Transform Tools you can stretch, move, and crop the image.


Hosted by Ahuka on 2020-09-11 is flagged as Clean and released under a CC-BY-SA license.
Tags: GIMP, images, photos, graphics, transform.
Listen in ogg, spx, or mp3 format. Series: GIMP | Comments (0)

Transform Tools are where you start to manipulate an image. You can move it around, stretch it, rotate it, crop it, and so on. This is the third of the four groups of tools we will look at for GIMP.


hpr3159 :: Vivaldi - The Four Seasons

All four movements of Vivaldi's Four Seasons, celebrating the Creative Commons license


Hosted by Paul Quirk on 2020-09-10 is flagged as Clean and released under a CC-BY-SA license.
Tags: Vivaldi, four seasons, creative commons.
Listen in ogg, spx, or mp3 format. Series: All Songs Considered | Comments (0)

Antonio Vivaldi composed The Four Seasons ('Le quattro stagioni' in its original Italian) in 1723. It is a set of 4 violin concertos that propose an early form of descriptive music: for example, Winter makes prominent use of pizzicato notes in high registers, whereas Summer evokes a storm in its final movement. The work was first presented as part of Op. 8, being later catalogued as RV 269, 315, 293 & 297. The Four Seasons remain very popular to this day, some of its concertos spawning a great number of derivative works, whereas thousands of recordings of the original pieces have been made. It is still debated if Vivaldi wrote this concertos to accompany four sonnets that may have been written by himself.
From Vivaldi The Four Seasons, Op. 8

The Modena Chamber Orchestra Music


hpr3158 :: Fingerprint access control? LOL...

A story about pentesting physical security

Hosted by Cedric De Vroey on 2020-09-09 is flagged as Clean and released under a CC-BY-SA license.
Tags: pentesting,security,hacking,biometrics.
Listen in ogg, spx, or mp3 format. Series: Privacy and Security | Comments (2)

Hello everyone, my name is Cedric and I'm here again with another story on pentesting and security, straight from the trenches.

Today I'm going to share a story with you about an assignment we did some time ago for a large entertainment company. Our client, like many entertainment companies, produces a lot of intellectual property. So, one of their biggest concerns is that someone might physically break into their premises and steal some of these designs and products. They had already taken some precautions, like installing intrusion detection alarms and access controls on all doors etc' The access controls they installed even had a dual function and could be used both as an RFID reader and as a fingerprint reader. So, they were already trying their best to secure their on-site intellectual property. And that's also the reason why they hired me and my team: they wanted to check if their investment in security was actually worth its money so far.

We proposed a plan to hack them, in any way our devious minds could possibly think of. Everything was on the table: We could try and hack ourselves in. We could social engineer ourselves in, basically by manipulating people and abusing their trust and confidence. We could do all of that, and we would, eventually. But first, the grand opening of this show, would be an attempt to physically break into their premises at night. And yes, that was as much fun as it sounds ;-)

Our approach was basically the same as that of a professional burglar: we'd start with a week of preparation and scoping the place.

So how do you do this? Well, we knew the address of course so first we checked out the place on Google Maps. And we were pretty lucky: Google had just recently updated their imagery of the area which meant we had recent maps to work with and the entire thing could be viewed in 3D with a fair amount of detail. That's pretty much as perfect as it comes when you're planning to do a major heist on a place in the physical world out there :-) So, we started with scouting the area from behind our laptops. We saw where all the entrances to the building were. We also saw that on the frontside the building just gave access to the street, while on the backside of the premise there was a public park. This looked very promising as a potential entrypoint, so our next step would be to actually physically go there and scout the area.

So, first we went there during daylight hours and just took a drive around the block using a rental car. We'd look for entrances to the building, camera's guarding these and the general view of the area, basic things… We didn't spot any cameras on the outside of the building. So we figured it would be pretty safe to take a walk and scout the area by foot. There was foot traffic but not too much, so we wouldn't draw any attention by just casually walking around and having a closer look.

The main entrance to the building was in a quiet street which led to a small square where a few kids were playing, and on the other side there was a street with some shops and a few restaurants. The entrance to our clients building had a gate through which we could see a quiet courtyard and the general layout of the building. The first thing that drew our attention was an access control device guarding the entrance, it was a fingerprint reader and it had a brand name Suprema printed on it. Straight across the courtyard we could see the trees of the neighboring park. There was a rooftop terrace on the first floor which gave access to the offices of our client. We also noticed the wall that separated this terrace from the park and it was huge, at least 6 meters.

We couldn't hang around for too long of course so we decided to continue our walk to the second entrance we spotted just around the corner. We could recognise its anonymous door next to a restaurant because it was guarded by the same Suprema fingerprint device. The restaurant however seemed quite popular, and it had a terras in front of it with a dozen tables, so that pretty much dismissed this entrance as a possible entry for our heist.

Needless to say that while we walked around the block we were also continuously scanning the area for Wifi and bluetooth devices. But nothing interesting had shown up so far. We had spotted our clients network but it was protected. We probably could use this information to set up rogue access-points later during our assignment, but for now this information was of little use to us.

We continued our walk and took a left to end up at the park bordering to the other side of our clients building. While the park was empty at that moment, we didn't really feel at ease. On one side the park bordered an apartment building and all of its rear terrasses faced this park. We went to the wall at the far end of the park as casually as possible, and inspected it. It had two large windows, giving the people working in the offices on the inside a nice view of the park. Unfortunately these windows didn't seem to have any way of opening. The wall was high, very high, we estimated about 8 meters. On the other side it would give access to the terrace on the first floor. We figured that this would be the perfect entrypoint for our heist. We'd use the cover of darkness to get a ladder across the park, under the trees against that wall. I'd climb over it to land on the terrace and that would be our first step onto the premise. Next step would be to find a way into the building and for that we'd have to find a way to bypass these Suprema fingerprint readers next to every door.

So we went back to our hackerspace and researched this device and we figured the best way to move forward would be to actually buy one of these to first try and hack it in the safety of our lab. So I spent a fair amount of time researching the exact model they had installed and ordering one from a local supplier. The thing came at a hefty price, these Suprema devices are not cheap. But now I had an electronic lock, a relay board, a power supply and one of these fingerprint readers with which I could start playing.

I started off with reading the manual of course, which already was very interesting on its own. I learned that this thing can be configured in a zillion ways. I figured that, like most things, the guys that installed it would probably stick pretty close to how it came out of the box. So that's what I did as well: I installed the thing exactly as it came, following the instructions in the manual.

I'll give you the summary of this entire installation. Electronic locks are pretty simple technology. Basically it's just an electro-magnet, a coil through which you send current to create a magnetic field that pulls a bolt out of the way so the lock can open, that's when it makes the clicking sound. Inside of the building, the receptionist can just press a button and a current will flow to the lock. However, on the outside of the building it wouldn't be very desirable that anyone can just press a button to open the door. That's why most companies implement access controls like RFID-readers or in this case fingerprint readers. A visitor scans his fingerprint with the device next to the door, the software checks if it finds the signature of the print in the database holding all recognized prints, and if so it will open the door.

So if we'd want to bypass this scheme, we'd basically have two options: hack the device to open the lock, or duplicate a registered fingerprint to fool the scanner and open the lock. Research had shown that this last option wasn't actually so far fetched. It's actually a proven feasible attack, last DEFCON even demonstrated an attack where a print was copied in 3D using a 3D printer. The technique we would try involved etching the negative of a high-contrast image from a lifted latent print onto a copper plate. Next we'd pour hot glue over that etch to actually recreate the fingerprint in 3D. However, this procedure requires some practice and skills, and we didn't have time for that. We tried it using our own prints lifted from a glass plate, following the procedure as best as we could but we failed miserably. So, this would not be an option and we already spent a fair amount of time.

So by now it had become clear we would have to hack the device. And as it was laying there in front of me on my desk, basically running the default setup with just my own print registered in the software, it became obvious that I had missed a crucial error in the design the entire time. I had never actually bothered to install this thing "properly" like mounted to a board with its cables fitted nicely behind a wall etc. The entire thing was just laying there, in front of me on my desk and all the cables really were a mess, but most importantly: the software wasn't showing any warnings whatsoever that the device was not mounted to a wall. I investigated the manual and I learned that the thing has something called a "tamper alarm". But this must have been disabled by default because I never had any alarms while the device was just laying there and was continuously shaking and moving it. So this meant that I could probably just pull this thing from a wall without any alarms going off.

I had to validate this premise first before we could continue. If this turned out to be a false assumption we'd waste valuable time investigating a plan which would probably fail in the end. So the following night I set out again to our clients building. It was like 3:30 in the morning and there was nobody on the streets. We already validated that there were no cameras pointing to the entrance, still I didn't feel too confident. My plan was simple but solid: I'd unscrew the fingerprint reader at the main entrance and put it back in place after 30seconds. I'd then walk to the little square at the end of the street and sit on the bench there so I would have a clear view of our clients entrance. I figured that, if the tamper alarm was enabled, and if they had someone monitoring it, they would probably come and check the device causing the alarm. I'd be interested in their response time of course, but most of all I was just hoping nobody would show up. And that's also what happened. I waited for 2 whole hours on that bench and nobody showed up, so I concluded the tamper alarm must have been disabled as is the default setting on these things, or nobody is monitoring it. Anyway, now I knew I could safely start tinkering on how I could manipulate this thing into letting me.

So the next day after I had a few hours of sleep we went back to work, playing with that Suprema BioLite and its software. I was in a good mood and had lots of inspiration. We started with investigating the general architecture of this access control scheme. So it turns out you have a client device, the scanner which is next to the door and this client device gets a database of recognized fingerprints from a control server which holds a list of all connected devices. So it's on this server where you register new doors and locks and new users that can open these locks. Now, when I installed the setup to experiment with, I learned that I had to register the lock into the control server before I could actually do anything, so I followed that entire procedure but unless I was missing something I didn't notice any real checks to be in place during that registration. So what I was thinking was: maybe I can disconnect this device from its network and the control server and reconnect it to my own server. Then I could upload my own prints to the device and then I'd be able to open the door with my own finger. So that's what I tried. I had the entire setup running in my own network, so I re-installed the software once again on my laptop. I then registered another print of mine into this installation. Next I disconnected the device from my network and connected it to a new temporary network running on my laptop: I had it running DHCP and I had a little USB-powered ethernet switch laying around which came in handy for this job. So the device quickly got an ip address from my new network and when I scanned for new fingerprint devices in my network using the Suprema control server that was installed on my laptop, I easily found it and was able to register it in this installation. I then was able to upload a copy of my fingerprints from my laptop to the device and after reconnecting it to the original network I could still open the lock with my newly registered print. So this meant we had our hack to bypass this device: we'd just upload our own set of prints to it and it would happily accept these and open the door for us.

So we hired a van and a ladder, and with some action cameras geared up we set out in the middle of the following night. We managed to get the ladder across the park and put it against the wall without making too much noise, we didn't wake up any curious neighbours. Next, I'd climb up the ladder, but since it was only 6m and the wall was about 8m high I'd have to climb the last bit by hand. Fortunately there was some vegetation growing on that wall and it felt like it would be strong enough to hold my weight. So, I gave it a try and pulled myself up from the ladder and the vines fortunately didn't break, so I climbed to the top of the wall and hoisted myself on top of it. I jumped off on the other side and landed on the first floor terrace we saw earlier. I went straight to the door and as expected it had one of these Suprema fingerprint readers next to it and I immediately went to work: I unscrewed the device from its mounting bracket and pulled the cables a bit from the wall. I then cut all the wires of the UTP-connection and connected a female RJ-45 socket to the UTP-wires of the fingerprint reader with crocodile clips. Next I hooked it up to my usb-powered switch which connected the device to the network running on my laptop. As I had tested everything in detail, the attack went smooth as a breeze and within no time I had my own fingerprint loaded into the device. I tested it and I could hear the lock of the door clicking while I put my finger onto the reader, so I started screwing the device back into the mounting bracket.

Everything went exactly as planned and I had just put my laptop and all my gear into my backpack again when suddenly I saw the lights go on through the glass door separating me from the inside of the top floor. I could see the elevator doors open and suddenly there I was, standing face to face with a janitor. I could see his face and he could see me so I tried to pull myself together, I had to think quickly. I figured he would let me in, or call the cops and I would probably only get one chance to explain myself. So I pulled my silly face, pointed with a finger to the access control, shrugged my shoulders and lipped slowly "it's not working". Well, I must have been an actor in a previous life because, sure thing the man came up to the door and opened up for me. While I entered and said a quick "hey thanks man", he looked a bit questioning and mumbled something of "who are you and what are you doing here?" and as casual as I could I answered "Oh I'm from IT, I'm here for work". I smiled, thanked him once again while I stepped into the elevator and pressed the button for the ground floor. I was in! My heart was pounding like a racehorse but I was in! This stuff was like straight from the movies.

Now it was time for the fun part of the night: claiming our flag of victory. First I went to the director's office, to leave a friendly signature of my presence: I left a bottle of champagne on his desk and I decorated the place with some CYBER-tape :-) On my way out I left a little present in the form of a LAN Turtle 3G. That's a 3G-enabled remote access toolkit with a network-connection which I hooked up with an empty socket underneath the receptionist's desk. The LAN Turtle would immediately boot and using its 3G connection it established a reverse tunnel using SSH to our command-and-control server. Using that covert connection we now had a way into the network from the outside. Installing it only took about 15 seconds and after having confirmed tunnel using a shell on my phone I went straight to the front-door and left the place. Mission accomplished! We had successfully penetrated the place.

I went to bed with a very big smile on my face early in the morning that day. By Noon I got up after a few hours of sleep and called our clients. They thanked us for the champagne and I gave them the gist of what had happened earlier that day while everyone else was still in bed sleeping.

The following weeks we would continue with our assignment and use our newly granted access into the place to go there physically during daytime hours, posing as an external developer. Eventually we gained full access to the entire place, including their on-premise datacenter holding their intellectual property, the crown jewels as to speak. Apparently, the access control-server was still protected with the default credentials admin/admin so I had pretty easy time expanding my initial foothold.

At the end of our assignment we presented all of our findings to our client and they immediately took appropriate action, including making sure tampering control got enabled on all of their access control devices. And I for my part had learned a whole lot of new fun stuff about access control devices and the possible flaws they can hold.

So, this was yet another story on pentesting and security. I hope you enjoyed this episode. If you'd like to reach out to me, please use the comment section on Hacker Public Radio or contact me on Twitter or Facebook. See you next time!



hpr3156 :: HPR Community News for August 2020

HPR Volunteers talk about shows released and comments posted in August 2020


Hosted by HPR Volunteers on 2020-09-07 is flagged as Explicit and released under a CC-BY-SA license.
Tags: Community News.
Listen in ogg, spx, or mp3 format. Series: HPR Community News | Comments (0)

New hosts

Welcome to our new host:
Cedric De Vroey.

Last Month's Shows

Id Day Date Title Host
3131 Mon 2020-08-03 HPR Community News for July 2020 HPR Volunteers
3132 Tue 2020-08-04 Keeping track of where I am MrX
3133 Wed 2020-08-05 Quick tip - Using MPV with Youtube links Archer72
3134 Thu 2020-08-06 Tomorrowland 2020 Daniel Persson
3135 Fri 2020-08-07 Quick Tips for May 20 20 operat0r
3136 Mon 2020-08-10 Matchbox Restoration Part 6 Tony Hughes AKA TonyH1212
3137 Tue 2020-08-11 Coronavirus Update 2020-07-30 Ahuka
3138 Wed 2020-08-12 Linux Inlaws S01E12: Reminiscing in FLOSS Weekly monochromec
3139 Thu 2020-08-13 MIDI Sysex klaatu
3140 Fri 2020-08-14 GIMP: Selection Tools Ahuka
3141 Mon 2020-08-17 Lessons learnt from Magic the Gathering game design klaatu
3142 Tue 2020-08-18 tcsh klaatu
3143 Wed 2020-08-19 LibreOffice 7.0 Released! Ahuka
3144 Thu 2020-08-20 Pentesting: Insecure Object Reference Cedric De Vroey
3145 Fri 2020-08-21 A light bulb moment, part 1 MrX
3146 Mon 2020-08-24 Help Me Help you with HPR eps! operat0r
3147 Tue 2020-08-25 NIST's Quantum Cryptography Update Ahuka
3148 Wed 2020-08-26 Why Open Source matters (to me) Paul Quirk
3149 Thu 2020-08-27 HPR AudioBook Club 21 - The Terrible Business of Salmon and Dusk HPR_AudioBookClub
3150 Fri 2020-08-28 GIMP: Paint Tools Ahuka
3151 Mon 2020-08-31 How I listen to podcasts Daniel Persson

Comments this month

These are comments which have been made during the past month, either to shows released during the month or to past shows. There are 23 comments in total.

Past shows

There are 2 comments on 2 previous shows:

This month's shows

There are 21 comments on 8 of this month's shows:

  • hpr3131 (2020-08-03) "HPR Community News for July 2020" by HPR Volunteers.
    • Comment 1: Zen_Floater2 on 2020-08-13: "I've learned much.and I'd like to share much as well..."

  • hpr3134 (2020-08-06) "Tomorrowland 2020" by Daniel Persson.
    • Comment 1: fatherfinch on 2020-08-07: "Great Energy"
    • Comment 2: catn0b0t on 2020-08-10: "TML 2020"

  • hpr3137 (2020-08-11) "Coronavirus Update 2020-07-30" by Ahuka.
    • Comment 1: brian-in-ohio on 2020-08-11: "some 'smart' people may not take a vaccine"
    • Comment 2: Ahuka on 2020-08-12: "Why it matters"
    • Comment 3: Zen_Floater2 on 2020-08-13: "The Squirrel from the Magical Forrest"
    • Comment 4: SkepticalA on 2020-08-16: "Condescending"
    • Comment 5: Bob on 2020-08-16: "Fact Checks on one of your claims"
    • Comment 6: brian-in-ohio on 2020-08-16: "sympathy"
    • Comment 7: Ahuka on 2020-08-16: "Clarification"
    • Comment 8: Zen_Floater2 on 2020-08-19: "Detailed research Corbit Report"
    • Comment 9: Anon on 2020-08-21: "Conspiracy Theories: Last Week Tonight with John Oliver"

  • hpr3138 (2020-08-12) "Linux Inlaws S01E12: Reminiscing in FLOSS Weekly" by monochromec.
    • Comment 1: Ahuka on 2020-08-12: "Excellent Interview"
    • Comment 2: ClaudioM on 2020-08-14: "Agree with Ahuka. Great Interview!"
    • Comment 3: brian-in-ohio on 2020-08-16: "follow up question"
    • Comment 4: an anonymous listener on 2020-08-21: "volume"

  • hpr3139 (2020-08-13) "MIDI Sysex" by klaatu.
    • Comment 1: brian-in-ohio on 2020-08-16: "the voice"
    • Comment 2: Ken Fallon on 2020-08-18: "Voice"

  • hpr3143 (2020-08-19) "LibreOffice 7.0 Released!" by Ahuka.
    • Comment 1: brian-in-ohio on 2020-08-19: "slackware"

  • hpr3144 (2020-08-20) "Pentesting: Insecure Object Reference" by Cedric De Vroey.
    • Comment 1: b-yeezi on 2020-08-20: "I deal with this all the time"

  • hpr3148 (2020-08-26) "Why Open Source matters (to me)" by Paul Quirk.
    • Comment 1: Zen_Floater2 on 2020-08-29: "Vic 20"

Mailing List discussions

Policy decisions surrounding HPR are taken by the community as a whole. This discussion takes place on the Mail List which is open to all HPR listeners and contributors. The discussions are open and available on the HPR server under Mailman.

The threaded discussions this month can be found here:

http://hackerpublicradio.org/pipermail/hpr_hackerpublicradio.org/2020-August/thread.html

Events Calendar

With the kind permission of LWN.net we are linking to The LWN.net Community Calendar.

Quoting the site:

This is the LWN.net community event calendar, where we track events of interest to people using and developing Linux and free software. Clicking on individual events will take you to the appropriate web page.

Any other business

Tags and Summaries

Thanks to the following contributors for sending in updates in the past month:
Windigo, Dave Morriss

Over the period tags and/or summaries have been added to 12 shows which were without them.

If you would like to contribute to the tag/summary project visit the summary page at https://hackerpublicradio.org/report_missing_tags.php and follow the instructions there.


Previous five weeks

hpr3155 :: LastPass Security Dashboard hosted by Ahuka

Released: 2020-09-04. Duration: 00:11:20. Flag: Clean. Series: Privacy and Security.
Tags: LastPass, passwords, security, monitoring.
A recent update to LastPass added a Security Dashboard

hpr3154 :: Make NextCloud your next cloud hosted by Paul Quirk

Released: 2020-09-03. Duration: 00:12:51. Flag: Clean.
Tags: Raspberry Pi,NextCloud,federated.
I go into my reasons for using NextCloud, what it is, and why you might want it.

hpr3153 :: Fixing eBooks with Calibre and pdfcrop hosted by Ken Fallon

Released: 2020-09-02. Duration: 00:05:08. Flag: Clean.
Tags: calibre,pdfcrop,epub,pdf.
Ken uses Calibre to convert a epub to PDF then uses pdfcrop to trim the margins

hpr3152 :: My Pocket Knives hosted by Dave Morriss

Released: 2020-09-01. Duration: 00:14:30. Flag: Explicit.
Tags: knife,pocket knife,penknife,Victorinox,Durol,Roxon.
I talk a little about some pocket knives I often carry

hpr3151 :: How I listen to podcasts hosted by Daniel Persson

Released: 2020-08-31. Duration: 00:06:33. Flag: Clean.
Tags: podcast,software,android.
This is a reply to MrX episode on how to listen to podcasts

hpr3150 :: GIMP: Paint Tools hosted by Ahuka

Released: 2020-08-28. Duration: 00:18:17. Flag: Clean. Series: GIMP.
Tags: GIMP, images, photos, graphics, paint, draw.
With Paint Tools you begin to operate on the image.

hpr3149 :: HPR AudioBook Club 21 - The Terrible Business of Salmon and Dusk hosted by HPR_AudioBookClub

Released: 2020-08-27. Duration: 01:45:42. Flag: Explicit. Series: HPR_AudioBookClub.
Tags: Audiobook, Review, Creative Commons.
The HPR Audiobook Club reviews the audiobook The Terrible Business of Salmon and Dusk by Myke Bartle

hpr3148 :: Why Open Source matters (to me) hosted by Paul Quirk

Released: 2020-08-26. Duration: 00:26:52. Flag: Clean.
Tags: history,open source,matters,vic 20,amiga,commodore.
I go briefly into my own history that has lead me to choose open source software exclusively.

hpr3147 :: NIST's Quantum Cryptography Update hosted by Ahuka

Released: 2020-08-25. Duration: 00:13:45. Flag: Clean. Series: Privacy and Security.
Tags: security, encryption, quantum computing.
NIST has concluded Round Two of the quantum encryption search and moved to Round Three

hpr3146 :: Help Me Help you with HPR eps! hosted by operat0r

Released: 2020-08-24. Duration: 00:05:58. Flag: Clean.
Tags: podcasting, hpr.
What should I do and how should I do it ?

hpr3145 :: A light bulb moment, part 1 hosted by MrX

Released: 2020-08-21. Duration: 00:10:49. Flag: Explicit.
Tags: Hardware, electrical.
Finding the working voltage of a bulb

hpr3144 :: Pentesting: Insecure Object Reference hosted by Cedric De Vroey

Released: 2020-08-20. Duration: 00:12:06. Flag: Clean. Series: Privacy and Security.
Tags: pentesting,security,hacking.
How an insecure object reference lead to a covid-related databreach

hpr3143 :: LibreOffice 7.0 Released! hosted by Ahuka

Released: 2020-08-19. Duration: 00:15:27. Flag: Clean. Series: LibreOffice.
Tags: LibreOffice, new release.
LibreOffice releases a new major update, LibreOffice 7.0

hpr3142 :: tcsh hosted by klaatu

Released: 2020-08-18. Duration: 00:28:39. Flag: Clean.
Tags: shell,csh,bash,tcsh.
Klaatu talks about tcsh

hpr3141 :: Lessons learnt from Magic the Gathering game design hosted by klaatu

Released: 2020-08-17. Duration: 00:37:49. Flag: Clean. Series: Tabletop Gaming.
Tags: magic, mtg.
Lessons learnt from Magic the Gathering game design

hpr3140 :: GIMP: Selection Tools hosted by Ahuka

Released: 2020-08-14. Duration: 00:16:02. Flag: Clean. Series: GIMP.
Tags: GIMP, images, photos, graphics, selection.
The key to using GIMP effectively is to select the area you want to work on.

hpr3139 :: MIDI Sysex hosted by klaatu

Released: 2020-08-13. Duration: 00:20:38. Flag: Clean.
Tags: midi,music,synth.
Klaatu talks about Sysex functions in MIDI

hpr3138 :: Linux Inlaws S01E12: Reminiscing in FLOSS Weekly hosted by monochromec

Released: 2020-08-12. Duration: 01:34:24. Flag: Explicit. Series: Linux Inlaws.
Tags: Linux inlaws, communism, free and open source software, FLOSS Weekly, Perl, ship cruises.
An interview with Randal Schwartz of FLOSS Weekly fame

hpr3137 :: Coronavirus Update 2020-07-30 hosted by Ahuka

Released: 2020-08-11. Duration: 00:22:44. Flag: Clean. Series: Health and Healthcare.
Tags: Health, Coronavirus.
Where we are with this pandemic, and how should we respond?

hpr3136 :: Matchbox Restoration Part 6 hosted by Tony Hughes AKA TonyH1212

Released: 2020-08-10. Duration: 00:04:46. Flag: Clean. Series: Model Hacking.
Tags: Matchbox Cars, Diecast Models, Restoration, Reassembly of the model.
Matchbox Cars, Diecast Models, Restoration, Reassembly of the model

hpr3135 :: Quick Tips for May 20 20 hosted by operat0r

Released: 2020-08-07. Duration: 00:16:17. Flag: Explicit.
Tags: BlueTooth,Carseats,tweezers,waffles .
BlueTooth,Carseats,tweezers,waffles

hpr3134 :: Tomorrowland 2020 hosted by Daniel Persson

Released: 2020-08-06. Duration: 00:09:44. Flag: Clean.
Tags: music,dance,house,festival,tomorrowland.
Explaining the experience of the first virtual music festival

hpr3133 :: Quick tip - Using MPV with Youtube links hosted by Archer72

Released: 2020-08-05. Duration: 00:02:04. Flag: Clean.
Tags: Video, media, bash, i3, Gnome3, Xfce.
I give a quick tip on shortcut keys for watching Youtube or other video sites in MPV

hpr3132 :: Keeping track of where I am hosted by MrX

Released: 2020-08-04. Duration: 00:22:42. Flag: Explicit.
Tags: Linux, bash, podcasts, audio, scripts.
How I keep track of where I am

hpr3131 :: HPR Community News for July 2020 hosted by HPR Volunteers

Released: 2020-08-03. Duration: 02:00:27. Flag: Explicit. Series: HPR Community News.
Tags: Community News.
Warning Ken and Dave discuss some disturbing agricultural practices. Listener discretion is advised.

hpr3130 :: More Quick Tips hosted by operat0r

Released: 2020-07-31. Duration: 00:11:07. Flag: Explicit.
Tags: Nvidia ffmpeg transcoding,Fallout Perks,Late to Movies,Shared 2FA,Time to leave app.
This time tips onNvidia ffmpeg transcoding Fallout Perks Late to Movies,Shared 2FA,Time to leave app

hpr3129 :: Followup on HPR3122 hosted by Zen_Floater2

Released: 2020-07-30. Duration: 00:35:57. Flag: Clean.
Tags: Followups MORE.
Followup on HPR3122 and *MORE* - percent *MORE* undescribed

hpr3128 :: Linux Inlaws S01E11 The Python Bumper Part 2 hosted by monochromec

Released: 2020-07-29. Duration: 01:07:45. Flag: Explicit. Series: Linux Inlaws.
Tags: Python 3.9, Mortgages in New York, Williamsburg, Wirecard, middle-aged blondes.
The chaps continue to shed more light on our beloved programming language

hpr3127 :: HPR AudioBook Club 20 - Quarter Share hosted by HPR_AudioBookClub

Released: 2020-07-28. Duration: 02:32:11. Flag: Explicit. Series: HPR_AudioBookClub.
Tags: Nathan Lowell, Audiobooks, SciFi, Space Opera.
The HPR Audiobook Club reviews the audiobook Quarter Share by Nathan Lowell

hpr3126 :: Metrics part II hosted by Andrew Conway

Released: 2020-07-27. Duration: 00:32:47. Flag: Clean.
Tags: maths,relativity,physics,earth.
The metric of a 2D curved surface

hpr3125 :: GIMP: The Canvas hosted by Ahuka

Released: 2020-07-24. Duration: 00:13:05. Flag: Clean. Series: GIMP.
Tags: GIMP, images, photos, graphics, canvas, layer.
The Canvas is the first key concept in learning Gimp

hpr3124 :: Matchbox Restoration Part 5 hosted by Tony Hughes AKA TonyH1212

Released: 2020-07-23. Duration: 00:05:10. Flag: Clean. Series: Model Hacking.
Tags: Matchbox Cars, Diecast Models, Restoration, painting, Rattle cans, Air brushing, Plastic polishing.
In this the 5th in the series Tony discusses the painting process on the castings of the MK10 Jaguar

hpr3123 :: Arduino controlled Christmas lights hosted by Archer72

Released: 2020-07-22. Duration: 00:02:50. Flag: Clean. Series: Arduino and related devices.
Tags: Arduino, Christmas, lights, Solid state relays.
Controlling Christmas LED lights with an Arduino

hpr3122 :: Devuan review - and commentary hosted by Zen_Floater2

Released: 2020-07-21. Duration: 00:34:46. Flag: Clean.
Tags: Devuan, Debian, sysvinit, OpenRC, systemd.
Devuan Review plus I talk about race

hpr3121 :: Opposing Views on Tattoos hosted by Windigo

Released: 2020-07-20. Duration: 00:31:06. Flag: Explicit.
Tags: tattoos.
Windigo and Mrs. Honeyhume discuss their views on tattoos

hpr3120 :: How open are roleplaying games? hosted by Andrew Conway

Released: 2020-07-17. Duration: 00:46:07. Flag: Clean.
Tags: open,free,roleplaying,licensing.
Klaatu and mcnalu talk through what open and free mean in roleplaying games.

hpr3119 :: Converting to FFS2 hosted by Zen_Floater2

Released: 2020-07-16. Duration: 00:40:26. Flag: Clean.
Tags: FFS2, SD cards, OpenBSD.
FFS2, FuguIta encryption and UUID's and 9 volt batteries

hpr3118 :: Linux Inlaws S01E10 The Python Bumper Part 1 hosted by monochromec

Released: 2020-07-15. Duration: 01:30:36. Flag: Explicit. Series: Linux Inlaws.
Tags: Python, PEP, Linux, Alia Shawkat, Brad Pitt, Stackless Python.
A discussion of Python questions and their answers (part 1). Plus news on Brad and Alia

hpr3117 :: The joy of retro computing hosted by knightwise

Released: 2020-07-14. Duration: 00:31:54. Flag: Clean.
Tags: Retro computer.
Knightwise talks about the old computers in his attic and how it is a loverly geek getaway

hpr3116 :: Unscripted ramblings on a walk: Crisis at The Manor hosted by Christopher M. Hobbs

Released: 2020-07-13. Duration: 00:18:57. Flag: Explicit.
Tags: networks,post-mortem,retrospective,community,walk,rambling.
A walk and a talk about a lightning strike zapping a network.

Older Shows

Get a full list of all our shows.