10 episodes

Hacker Public Radio is an podcast that releases shows every weekday Monday through Friday. Our shows are produced by the community (you) and can be on any topic that are of interest to hackers and hobbyists.

Hacker Public Radio Hacker Public Radio

    • Technology

Hacker Public Radio is an podcast that releases shows every weekday Monday through Friday. Our shows are produced by the community (you) and can be on any topic that are of interest to hackers and hobbyists.

    HPR4122: The Conference for Creative Use of the Radio Spectrum in Open Systems

    HPR4122: The Conference for Creative Use of the Radio Spectrum in Open Systems

    Ken Talks to Marc Balmer and Kristoff Bonne about spectrum24, The
    Conference for Creative Use of the Radio Spectrum in Open Systems.
    Following the success of the Software-Defined Radio and Amateur Radio
    devroom at FOSDEM, spectrum24 plans to bring users of the radio spectrum
    together.
    For over a century, technology has made it possible to transfer more
    data, faster, further. Today, wireless technology is everywhere and
    commonplace. However, it remains a playground and a ground for
    innovation for many communities.
    This conference is an opportunity to publicize your projects and
    allow the different communities that use the spectrum to meet over a
    weekend.
    If you have an interesting talk you would like to give please see https://spectrum-conference.org/24/cfp for more
    information
    spectrum24 will take place September 14./15. at SmartCity Campus (1
    rue de Clairefontaine, 78120 Rambouillet.) at an old radio factory in
    Rambouillet near Paris, a short 15 minute walk from the train
    station.

    Conference Website: https://spectrum-conference.org/
    Conference Mastodon: https://mastodon.radio/@spectrumconf
    Conference Location: https://smartcitycampus.fr/
    FOSDEM Dev Track: https://fosdem.org/2024/schedule/event/fosdem-2024-1662-trx-control-modern-software-to-control-amateur-radio-transceivers-and-other-hamradio-hardware/
    Marc Balmer: https://trx-control.msys.ch/, https://msys.ch/, https://marcbalmer.ch, https://www.linkedin.com/in/mbalmer/
    Kristoff Bonne: https://mastodon.radio/@on1arf

    HPR4121: RODE wireless microphones

    HPR4121: RODE wireless microphones

    All right. Well, good evening, hackers. My name is Clinton. And this
    is a very off the cuff episode for me just to announce that I've got a
    new microphone. So I just wanted to run through a couple of details of
    that. Make a show, say a little about the microphone while I got it.
    What I hope to do with it. So this is a roadie wireless go to setup. It
    comes with three little boxes. Roughly, roughly, you can fit each one of
    the little boxes inside a matchbox. So there are three of these that
    come with the set that I bought. Two of them are microphones that you
    clip onto your lapel. The third is a transceiver. So at the moment, I've
    got the transceiver on and I've got one of the microphones on. I bought
    this because I'm going to be going to a conference soon. And one of the
    things that I do try to do at conferences is to interviews with people.
    And this is kind of nice in that I can switch these two microphones on.
    Give one to myself. Give one to the person I'm interviewing. And I don't
    have to use a single microphone and shove it underneath their faces. And
    I don't have to swap the microphone between the two of us. The other
    feature, like the particular reason I've got this model is that each of
    the two microphone units actually has built in RAM. So it will actually
    record, like if you've got it set up in the mode, which I do, you can
    get each microphone to do a backup recording of your presentation. The
    regular mode for this set of microphones is to actually treat the
    transceiver as a source and plug it into computer or plug it into your
    camera as a external microphone. But it has this lovely mode, which I'm
    recording this particular episode to. We can just turn it on. It's not
    the transceiver is not plugged into a computer. It's not plugged into
    anything. And it'll record something like 40 hours of voice. And later
    on, I can hook it up to my computer as a standard mass storage device
    and just download the waveform I believe. So it does have some Windows
    firmware or Mac firmware. I didn't have too much fun getting that to
    work under Linux. I tried under a couple of different VM products and
    wasn't having any luck. So try it under wine. I tried under open box.
    Eventually I did end up installing like a full Windows 10 install onto a
    qemu image. And that had enough stuff working such that I could install
    the Rode firmware on it. That let me do an upgrade of the firmware on
    the two microphones and the transceiver because the first thing you do
    when you buy something these days is out of the box you have to upgrade
    the firmware because why would they do that at the factory before they
    send it out when they can just make the users do that. And there is a
    phone app but it does not let you update the firmware on these
    particular hardware models. If I remember the error message correctly it
    does look like the Android app lets you update the firmware on other
    Rode microphone devices but not this particular model. So I had to go
    down the track of setting up a qemu. I did find a good blog post on how
    to set up a Windows box on qemu. It had a few things that seem outdated
    so maybe it's a job for future me to write an updated blog post on how
    to do this. If for nothing else instructions on how to do this in future
    when I need to rerun the firmware update. The other thing that I really
    needed to use the software for though is to switch on the recording
    option. So out of the box these things do not record to the memory
    that's built into the microphones. So I had to get, I had to update the
    firmware and then I had to run the software on both of the microphones
    to switch on the recording option. But now that that switched on I can
    just hook it up as a USB master device as I've mentioned before and
    presumably I can just copy the files and delete the files and I won't
    actually have to run that software. So yeah there's a number of options
    going forward so I can write that blog post with the updated details.
    There were a number of hoops that I fo

    HPR4120: South Carolina to Home

    HPR4120: South Carolina to Home

    We finish our South Carolina visit touring a plantation, and then go
    to see a magnificent live oak tree. After that, it is time for us to
    head back home.
    Links

    https://flic.kr/s/aHBqjAvW57
    https://flic.kr/s/aHBqjAvWaN
    https://www.palain.com/travel/rv-trip-2022-2023-southeast-us/south-carolina-to-home/

    HPR4119: Cov's Jams 003

    HPR4119: Cov's Jams 003

    Welcome to the third episode of Cov's jams.
    We'll start with a couple electronica pieces from Arkadii Kaplan:
    Corporate Success and Chasing the Shadow. I also featured Kaplan in the
    second episode of Cov's Jams, way back in 2016. I'm glad to be back.
    Next up are two dubstep selections: Time to Army by Muciojad and
    Sweet Nothing by K4MMERER.
    Daniel Bautista's Symphony Number 5 will close out the episode.
    Daniel Bautista wins at Free, Libre, and Open Source. Not only is he
    playing public domain Beethoven, but he recorded and mixed the album (in
    May and June of 2008) on a Gentoo
    Linux box. Gentoo is how I really learned Linux. He's still
    releasing libre licensed albums and his newer releases have video
    recordings which he edits in kdenlive.
    The first four tracks are under the Creative Commons
    Attribution-Share Alike license: Corporate Success and Chasing the
    Shadow by Arkadii Kaplan, Time to Army by Muciojad, and Sweet Nothing by
    K4MMERER. Daniel Bautista's Symphony Number 5 is licensed Creative
    Commons Attribution.
    Thank you for listening to this third episode of Cov's Jams. I hope
    we can enjoy some new tunes together soon!
    Links:

    Arkadii
    Kaplan - Corporate Success
    Arkadii
    Kaplan - Chasing the Shadow
    Muciojad -
    Time to Army
    K4MMERER -
    Sweet Nothing
    Daniel
    Bautista - Symphony Number 5

    HPR4118: Toil versus Livelihood

    HPR4118: Toil versus Livelihood

    This is sort of a response to hpr4097 :: Will they take our jobs? Of course they will. by dodddummy, and also the latest community news show, and other shows about the topic.

    References:

    Economic Possibilities for our Grandchildren, John Maynard Keynes
    Domenico de Masi, O Ócio Criativo, book was never released in English, I think.
    In Praise of Idleness, Bertrand Russell

    HPR4117: JAMBOREE !

    HPR4117: JAMBOREE !

    https://github.com/freeload101/Java-Android-Magisk-Burp-Objection-Root-Emulator-Easy
    Java Android Magisk Burp Objection Root Emulator Easy
    (JAMBOREE)
    Get a working portable Python/Git/Java environment on Windows in SECONDS
    without having local administrator, regardless of your broken Python or
    other environment variables. Our open-source script downloads directly
    from proper sources without any binaries. While the code may not be
    perfect, it includes many useful PowerShell tricks.
    Run Android apps and pentest without the adware and malware of
    BlueStacks or NOX.
    Features / Request
    Core Status
    RMS:Runtime Mobile Security ✔️
    Brida, Burp to Frida bridge ❌
    SaftyNet+ Bypass ❌
    Burp Suite Pro / CloudFlare UserAgent Workaround-ish ✔️
    ZAP Using Burp ✔️
    Google Play ✔️
    Java ✔️
    Android 11 API 30 ✔️
    Magisk ✔️
    Burp ✔️
    Objection ✔️
    Root ✔️
    Python ✔️
    Frida ✔️
    Certs ✔️
    AUTOMATIC1111 ✔️
    AutoGPT ✔️
    Bloodhound ✔️
    PyCharm ✔️
    OracleLinux WSL ✔️
    Ubuntu/Olamma WSL ✔️
    Postgres No admin ✔️
    SillyTavern ✔️
    Volatility 3 ✔️
    Arduino IDE / Duck2Spark ✔️
    Youtube Downloader Yt-dlp ✔️
    How it works:
    Temporarily resets your windows $PATH environment variable to fix any
    issues with existing python/java installation
    Build a working Python environment in seconds using a tiny 16 meg
    nuget.org Python binary and portable PortableGit. Our solution doesn't
    require a package manager like Anaconda. I would like to make it even
    easier to use but I don't want to spend more time developing it if
    nobody is going to use it! Please let me know if you like it and open
    bugs/suggestions/feature request etc! You can contact me at https://rmccurdy.com !
    Installation/Requirements ( For Android AVD Emulator) :
    Local admin just to install Android AVD Driver:
    HAXM Intel driver ( https://github.com/intel/haxm )
    OR
    AMD ( https://github.com/google/android-emulator-hypervisor-driver-for-amd-processors
    )
    Usage:
    Put ps1 file in a folder
    Rightclick Run with PowerShell
    OR
    From command prompt
    powershell -ExecutionPolicy Bypass -Command
    "[scriptblock]::Create((Invoke-WebRequest "https://raw.githubusercontent.com/freeload101/Java-Android-Magisk-Burp-Objection-Root-Emulator-Easy/main/JAMBOREE.ps1").Content).Invoke();"
    More infomation on bypass Root Detection and SafeNet https://www.droidwin.com/how-to-hide-root-from-apps-via-magisk-denylist/
    ( Watch the Video Tutorial below it's a 3-5 min process. You only
    have to setup once. After that it's start burp then start AVD )
    Burp/Android Emulator (Video Tutorial )
    Update Video with 7minsec Podcast!
    https://youtu.be/XdXleap0BiM
    name
    (Video Tutorial)
    https://youtu.be/pYv4UwP3BaU
    name
    USB Rubber Ducky Scripts & Payloads Python 3 Arduino
    DigiSpark
    http

Top Podcasts In Technology

Your Undivided Attention
Tristan Harris and Aza Raskin, The Center for Humane Technology
Acquired
Ben Gilbert and David Rosenthal
Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Hard Fork
The New York Times
Darknet Diaries
Jack Rhysider

You Might Also Like

Darknet Diaries
Jack Rhysider
Security Now (Audio)
TWiT
Hacking Humans
N2K Networks
Hacked
Hacked
Smashing Security
Graham Cluley & Carole Theriault
Late Night Linux
The Late Night Linux Family