The Tricaster Mini: A New Mini-Video Studio System

Posted to YouTube by Robert Scoble – TriCaster Mini from NewTek: the all-in-one portable TV studio

“Philip Nelson, chief relationship officer for NewTek, dropped by and pulled out an entire TV studio from his backpack and to our amazement, set it up in less than 5 minutes. At the heart of it is the new TriCaster Mini, that makes it easy for anyone to make great looking network-style TV anywhere.”

Netflix via Google Chrome Now Works in Linux!

There are a lot of tricks to get Netflix to work in Linux. Now, it will work via Chrome… awesome!

Netflix comes to Linux via Ubuntu and Chrome

PCWorld – By: Jared Newman – Ubuntu Linux users no longer need to employ arcane workarounds to watch Netflix on their computers.

“Instead, they can just head to Netflix’s website through Google’s Chrome browser to start streaming. Netflix is supported in Chrome 37, which runs on up-to-date Ubuntu installations of 12.04 LTS, 14.04 LTS or later.

Why this matters: Previously, users had to tweak the user agent string in Chrome to fool Netflix into thinking the browser was Internet Explorer. And before that, users had to run a Netflix desktop app through WINE, a popular Windows software emulator. While many Linux users are presumably savvy enough to jump through an extra hoop or two, it’s nice that they no longer have to.

A matter of DRM

The reason Netflix hasn’t worked across all Linux distributions and browsers is related to digital rights management. As PCWorld’s Chris Hoffman explained last month, Netflix streams its video in HTML5, but uses a technology called Encrypted Media Extensions to prevent piracy. These extensions in turn require a set of libraries called Network Security Services that the browser can access.

Until recently, Ubuntu hadn’t included NSS in its normal updates. That changed with Ubuntu 12.04 and 14.04, and so Netflix has made good on a promise to allow streaming without any changes to the user agent string.

Although there’s no official word on Netflix working with other Linux distributions, they should also be able to stream from Chrome if they include a recent version of NSS. One user on Reddit’s Linux section claims that no user agent switching is required in Linux Mint 17, kernel 3.17.

As for Firefox, support won’t be possible until Mozilla supports Encrypted Media Extensions. After some resistance, Mozilla is working to add EME support in a future.”

Dr. Bill.TV #355 – Video – The Aforementioned Edition!

Microsoft skips Windows 9, goes straight to Windows 10, tech hype demonstrated in MyBook, then, the Windows Insider Program, a new Mac OS X botnet, so use anti-virus Mac users! Red Hat CEO goes toward cloud computing, GSotW: Guake, Solarbox in England!

Links that pertain to this Netcast:

TechPodcasts Network

International Association of Internet Broadcasters

Blubrry Network

Dr. Bill Bailey.NET

Guake – Drop-Down Terminal


Start the Video Netcast in the Blubrry Video Player above by
clicking on the “Play” Button in the center of the screen.

(Click on the buttons below to Stream the Netcast in your “format of choice”)
Streaming M4V Audio





Streaming MP3 Audio

Streaming Ogg Audio

Download M4V Download WebM Download MP3 Download Ogg
(Right-Click on any link above, and select “Save As…” to save the Netcast on your PC.)

You may also watch the Dr. Bill.TV Show on these services!

 

Dr. Bill.TV on YouTube Dr. Bill.TV on Vimeo

 


Dr. Bill.TV #355 – Audio – The Aforementioned Edition!

Microsoft skips Windows 9, goes straight to Windows 10, tech hype demonstrated in MyBook, then, the Windows Insider Program, a new Mac OS X botnet, so use anti-virus Mac users! Red Hat CEO goes toward cloud computing, GSotW: Guake, Solarbox in England!

Links that pertain to this Netcast:

TechPodcasts Network

International Association of Internet Broadcasters

Blubrry Network

Dr. Bill Bailey.NET

Guake – Drop-Down Terminal


Start the Video Netcast in the Blubrry Video Player above by
clicking on the “Play” Button in the center of the screen.

(Click on the buttons below to Stream the Netcast in your “format of choice”)
Streaming M4V Audio





Streaming MP3 Audio

Streaming Ogg Audio

Download M4V Download WebM Download MP3 Download Ogg
(Right-Click on any link above, and select “Save As…” to save the Netcast on your PC.)

You may also watch the Dr. Bill.TV Show on these services!

 

Dr. Bill.TV on YouTube Dr. Bill.TV on Vimeo

 


British Phone Boxes Turn Green to Charge Phones

SolarboxNow, if they were just blue! Grin!

Phone boxes turn green to charge mobiles

BBC News – Technology – “Disused phone boxes in London are being put to a novel use – as solar-powered charging stations for mobile phones.

The first of six boxes was unveiled on Tottenham Court Road this week.

The service is free to use although users will be shown adverts as they wait for their phone to charge.

Many of the UK’s red telephone boxes have largely fallen into disuse although some are being revived as libraries or being fitted with medical equipment.

The boxes have had a makeover for the project – painted green and fitted with a roof-mounted 86cm solar panel.

Inside there are a variety of charging stations for different models of phone and a screen which shows adverts.

Battery life
The advertising screen is reinforced to deter vandals and the boxes are maintained daily and locked overnight.

The project was the brainchild of two geography students turned entrepreneurs Harold Craston and Kirsty Kenny.

Both studied at the London School of Economics (LSE) and were interested in finding new ways to use public spaces.

‘I lived next to a phone box in my second year at uni and walked past it every day. I thought, ‘There are 8,000 of these lying unused in London and we must be able to find a use for them,’ explained Mr Craston.

The solarbox can charge up to 100 phones a day, offering a 20% battery boost in 10 minutes.

Since launch, about six people per hour use the booth, according to the founder.

Running out of battery is a perennial problem for smartphone users as they become ever more powerful without an equivalent technology leap in battery life.

‘On launch day, my phone ran out of battery and I genuinely had to use the box,’ said Mr Craston.

Geek Software of the Week for Linux: Guake – Drop-Down Terminal

Guake is a drop-down terminal (hit F12, and “BAM!” there it is!) for Linux! It is designed to look and act like the messaging widget in the game “Quake” thus the odd spelling on the name. It is pretty cool, and very handy!

Guake – Drop-Down Terminal

“Guake is a dropdown terminal made for the GNOME desktop environment. Its style of window is based on an fps games, and one of its goals is be easy to reach.

Guake is written mostly in python and has a little piece in C (global hotkeys stuff). The code is placed in the src directory. Files and images are in the data directory. Translation stuff is in the po directory.

Features? Bugs? Information? Visit: https://guake.org/

Red Hat is Moving From a Client-Server Company to a Cloud Computing Company

This is VERY interesting, they are betting the farm on Cloud Computing!

Red Hat CEO announces a shift from client-server to cloud computing

ZDNet – By: Steven J. Vaughan-Nichols – “Red Hat is in the midst of changing its image from a top Linux company to the future king of cloud computing. CEO Jim Whitehurst told me in 2011 that the Platform-as-a-Service (PaaS) cloud would be Red Hat’s future. Today in a blog posting, Whitehurst underlined this shift from Linux to OpenStack.

Whitehurst wrote:

Right now, we’re in the midst of a major shift from client-server to cloud-mobile. It’s a once-every-twenty-years kind of change. As history has shown us, in the early days of those changes, winners emerge that set the standards for that era – think Wintel in the client-server arena. We’re staring at a huge opportunity – the chance to become the leader in enterprise cloud, much like we are the leader in enterprise open source. The competition is fierce, and companies will have several choices for their cloud needs. But the prize is the chance to establish open source as the default choice of this next era, and to position Red Hat as the provider of choice for enterprises’ entire cloud infrastructure.

In case you haven’t gotten the point yet, Whitehurst states, ‘We want to be the undisputed leader in enterprise cloud.’ In Red Hat’s future, Linux will be the means to a cloud, not an end unto itself.

He’s not the only Linux leader who sees it that way. Mark Shuttleworth, Canonical and Ubuntu’s founder, agrees. If you read Shuttleworth’s blog, you’ll see he focuses far more on Ubuntu’s inroads into the cloud than, say, Ubuntu on the smartphone or tablet.

They both have excellent reasons for seeing it this way. With the exception of Microsoft Azure, all other cloud platforms rely on Linux and open source software. Amazon’s cloud services, for example, run on top of Red Hat Enterprise Linux.

So neither Linux leader is walking too far away from Linux. Shuttleworth, for example, is quite proud that Ubuntu is the leading Linux OS on OpenStack. Whitehurst was quick to note that ‘Red Hat Enterprise Linux is easily the best operating platform in the world, counting more than 90 percent of the Fortune 500 as customers.’

Linux leaders see a future where IT is based on Linux and the open source cloud. And if Whitehurst has his way, it will be a Red Hat-dominated future.”

A New Mac OS X Botnet Has Been Discovered

This is a nasty botnet exploit, and a real indication that EVEN A MAC needs anti-virus. I use Kaspersky AV on my Macbook Pro. Dr. Web is another excellent anti-virus, this is from their web site!

New Mac OS X botnet discovered

Dr. Web Anti-Virus Web Site – to Mac OS X. One of them turned out to be a complex multi-purpose backdoor that entered the virus database as Mac.BackDoor.iWorm. Criminals can issue commands that get this program to carry out a wide range of instructions on the infected machines. A statistical analysis indicates that there are more than 17,000 unique IP addresses associated with infected Macs.

Criminals developed this malware using C++ and Lua. It should also be noted that the backdoor makes extensive use of encryption in its routines. During installation it is extracted into /Library/Application Support/JavaW, after which the dropper generates a p-list file so that the backdoor is launched automatically.

When Mac.BackDoor.iWorm is initially launched, it saves its configuration data in a separate file and tries to read the contents of the /Library directory to determine which of the installed applications the malware won’t be interacting with. If ‘unwanted’ directories can’t be found, the bot uses system queries to determine the home directory of the Mac OS X account under which it is running, checks the availability of its configuration file in the directory, and writes the data needed for it to continue to operate into the file. Then Mac.BackDoor.iWorm opens a port on an infected computer and awaits an incoming connection. It sends a request to a remote site to acquire a list of control servers, and then connects to the remote servers and waits for instructions. It is worth mentioning that in order to acquire a control server address list, the bot uses the search service at reddit.com, and—as a search query—specifies hexadecimal values of the first 8 bytes of the MD5 hash of the current date. The reddit.com search returns a web page containing a list of botnet C&C servers and ports published by criminals in comments to the post minecraftserverlists under the account vtnhiaovyd.

The bot picks a random server from the first 29 addresses on the list and sends queries to each of them. Search requests to acquire the list are sent to reddit.com in five-minute intervals.

While establishing a connection to the server whose address is picked from the list using a special routine, the backdoor attempts to determine whether the server address is on the exceptions list and engages in a data exchange with the server to employ special routines for authenticating the remote host. If successful, the backdoor sends the server information about the open port on the infected machine and its unique ID and awaits directives.

Mac.BackDoor.iWorm is able to perform two types of commands: different directives depending on the binary data provided and Lua scripts. Basic backdoor commands for Lua-scripts can be used to perform the following actions:

  • Get the OS type.
  • Get the bot version.
  • Get the bot UID.
  • Get a value from the configuration file.
  • Set a parameter value in the configuration file.
  • Remove all parameters from the configuration file.
  • Get bot uptime.
  • Send a GET query.
  • Download a file.
  • Open a socket for an inbound connection and then execute the commands received.
  • Execute a system instruction.
  • Sleep.
  • Ban a node by IP.
  • Clear the list of banned nodes.
  • Get the node list.
  • Get a node IP.
  • Get node type.
  • Get node port.
  • Execute a nested Lua-script.

Information collected by Doctor Web’s researchers shows that as of September 26, 2014, 17,658 IP addresses of infected devices were involved in the botnet created by hackers using Mac.BackDoor.iWorm. Most of them—4,610 (representing 26.1% of the total)—reside in the United States. Canada ranks second with 1,235 addresses (7%), and the United Kingdom ranks third with 1,227 IP addresses of infected computers (6.9% of the total). The late September 2014 geographical distribution of the botnet created with Mac.BackDoor.iWorm is shown in the following illustration:

The signature of this malware has been added to the virus database, so Mac.BackDoor.iWorm poses no danger to Macs protected with Dr.Web Anti-virus for Mac OS X.”

1 117 118 119 120 121 394