Andrew Janke | 27 Mar 08:04 2015
Picon

[clug] USB webcam video capture

Hi all,

Anyone happen to have done this successfully and have a magic C/L
incantation for me? I'm attempting to use vlc but the arguments seem
even closer to line noise than what I can achieve in perl...

I figure something like this should work:

   vlc v4l2:///dev/video1 --sout <magical incantations>out.avi

On this note, any clues on how to make /dev/video devices 660 by
default? The user is in the video group but it's not enough as the
permissions are

   crw-------+

When I'd like:

   crw-rw---+

or even

   crw-rw-rw+

ta

a
--

-- 
linux mailing list
linux@...
(Continue reading)

Bryan Kilgallin | 27 Mar 07:52 2015
Picon

[clug] OT 300,000 Optus customers' information insecure

{In the first incident, Optus mistakenly released the names, addresses 
and mobile phone numbers

<http://www.canberratimes.com.au/digital-life/mobiles/optus-exposes-customers-silent-listings-20140613-zs7id.html> 
of about 122,000 Optus customers in the White Pages online directory 
without the consent of those customers.

The issue, which occurred due to a "coding error", also resulted in the 
majority of those customers' information also being published in various 
print editions of the White Pages.

The second incident concerned a flaw that left customers vulnerable to 
'spoofing' attacks

<http://www.canberratimes.com.au/it-pro/security-it/optus-left-customers-mobile-voicemail-accounts-exposed-20140517-zraz7.html>, 
where an unauthorised party could potentially access and use customer 
voicemail accounts messages, including being able to listen to recorded 
messages and change settings and preferences.

The third incident concerned Optus "deliberately" leaving the management 
ports of customer-issued modems open

<http://www.canberratimes.com.au/it-pro/security-it/default-password-leaves-tens-of-thousands-of-optus-cable-subscribers-at-risk-20140403-zqprz.html>, 
incorrectly assuming that they were only accessible by Optus staff for 
network management purposes.

In addition, Optus issued 197,000 Netgear modems and 111,000 Cisco 
modems to its customers with factory default settings, including user 
default names and passwords in place.}

(Continue reading)

Bryan Kilgallin | 26 Mar 14:14 2015
Picon

[clug] OT Customer data are corporate assets

{For years, RadioShack made a habit of collecting customers’ contact 
information at checkout. Now, the bankrupt retailer is putting that data 
on the auction block.

A list of RadioShack assets for sale 
<http://www.hilcostreambank.com/assets/radioshack-assets-for-sale> 
includes more than 65 million customer names and physical addresses, and 
13 million email addresses. Bloomberg reports

<http://www.bloomberg.com/news/articles/2015-03-24/standard-general-said-to-prevail-in-bid-for-radioshack-assets> 
that the asset sale may include phone numbers and information on 
shopping habits as well.

The auction is already over, with Standard General—a hedge fund and 
RadioShack’s largest shareholder—reportedly emerging as the victor.}

http://www.itworld.com/article/2901029/radioshack-puts-customers-personal-data-up-for-sale-in-bankruptcy-auction.html

-- 
www.netspeed.com.au/bryan/

--

-- 
linux mailing list
linux <at> lists.samba.org
https://lists.samba.org/mailman/listinfo/linux
Paul Rands | 23 Mar 13:05 2015

[clug] Dual boot and shared home folder

Hi Guys,

I have unfortunately found the need to go back to a dual boot system for 
my PC.

The old PC is a bit too slow to run a Windows VM all that well, so I am 
left with little choice.

Was planning to chuck Windows on a separate hard disk, and use Grub to 
select drives.

I want to avoid doubling up on a "home" folder, and was hoping for some 
suggestions to what I could use. Should I use an NTFS partition (which 
isn't journalised and a pain the arse) or should I look at an EXT3 / 4 
driver for Windows 8?

Thanks in advance
-- 

Paul Rands
lists@... <mailto:lists@...>

--

-- 
linux mailing list
linux@...
https://lists.samba.org/mailman/listinfo/linux

Robert Edwards | 23 Mar 10:15 2015
Picon
Picon

[clug] iVote compromise

Too late now, but I just returned from an excellent talk at ANU
by Prof. J Alex Halderman ( https://jhalderm.com/ ) about online
voting vulnerabilities, in which he discussed his latest compromise
(along with Prof. Vanessa Teague) of the NSW iVote system:
https://freedom-to-tinker.com/blog/teaguehalderman/ivote-vulnerability/

Great stuff. Also discussed work he has done on the Estonia online
system, built on Debian GNU/Linux! (YEAH! got a Linux ref. in there!)

Also discussed various other open (and close) source voting systems.

Anyone else on this list there? Alas, I am not sure if the ANUs brave
new proprietry lecture recording system did the business for us. We'll
see...

cheers,

Bob Edwards.
--

-- 
linux mailing list
linux@...
https://lists.samba.org/mailman/listinfo/linux

George at Clug | 23 Mar 06:04 2015

[clug] Personal paranoia

     Brian,

I appreciate your posting.  I apologise if people were troubled by
it. 

I may have been the person who started the "personal internet
security" thread, if not, at times I certainly have contributed to it.

My concern is that for some time the Internet has been a fun place we
can share information and ideas with a wider group of people than our
own small communities, it has been great thing for people who live
isolated by geography or by physical limitations,but now things are
changing. 

Where once we could be relative anonymous, now there are groups who
will be able to identify us and know more about ourselves than even we
do, and to make matter worse, they may get the wrong idea about us,
they may gather a false understanding, and then use this to judge us.
Has anyone every had issues with a credit company deciding you are a
risk because you once forgot to pay a bill, or the worse case
scenario, someone abused your identity? Fortuately this has never
happened to me personally, but it does happened to people form time to
time.

My concern is about what will people do with technology.  It is not
just hiding from a terrorist group or a rogue government. How about a
wife and children are relocated and given a new home away from a
violent father, a criminal person trying to start a new life, someone
trying to get a way from a stalker.  There was once a time some of
this was possible, now it will be increasingly difficult.
(Continue reading)

Tony Breeds | 23 Mar 03:29 2015

[clug] CLUG Meeting - 26 February 2015

Canberra Linux Users Group Meeting - 26 February 2015
==================================

Date:          26 March 2015 (Fourth Thursday of the month)

Time:          19:00 - 21:00 (or when it finishes)

Speaker:       Daniel

Abstract:      A Chromebook as a real (and libre) Computer

               Chromebooks are popular - but even more useful if they run
               actual Linux. Daniel will talk about the process of turning
               Google hardware into a real computer running coreboot and a
               Linux distro of your choosing; why you would want to do that;
               and also discuss the limits of such a device.

Venue:         Room N101
               Computer Science and Information Technology Building
               North Road
               The Australian National University

               See http://clug.org.au/ for more directions and a map

Food/drink:    Pizza and soft drink/juice. Come hungry, and bring
               about $6 to cover the cost of your share if you
               want some.

Yours Tony.
(Continue reading)

Bryan Kilgallin | 22 Mar 14:20 2015
Picon

[clug] Personal revenge

{In a new online threat to American military personnel, the Islamic 
State has called on its members and sympathizers in the United States to 
kill 100 service members whose names, photos and purported addresses it 
posted on a website.

The group said that the personnel had participated in efforts to defeat 
it in Syria, Iraq, Yemen and elsewhere.

Defense Department and F.B.I. officials said that they were aware of the 
website and were investigating the posting.

It does not appear that the information had been hacked from government 
servers. One Defense Department official, who was not authorized to 
speak publicly, said that most of the information could be found in 
public records, residential address search sites and social media.

The officials said the list appears to be drawn from personnel who have 
appeared in news articles about airstrikes on the militant group.}

http://www.nytimes.com/2015/03/22/world/middleeast/isis-urges-sympathizers-to-kill-us-service-members-it-identifies-on-website.html

-- 
www.netspeed.com.au/bryan/

--

-- 
linux mailing list
linux@...
https://lists.samba.org/mailman/listinfo/linux

(Continue reading)

Brenton Ross | 21 Mar 10:33 2015
Picon

Re: [clug] What Meta-Data?

I came across the link to the actual amendment. Item (8) lists the data
to be kept.

http://parlinfo.aph.gov.au/parlInfo/download/legislation/amend/r5375_amend_bb5b4d2f-8bf3-4654-8df5-b4095d7d3ee0/upload_pdf/GT140.pdf;fileType=application%2Fpdf

Note that it includes location info and also it includes not just
successful connections but attempted connections. Perhaps we could all
just make zillions of attempts to non-responsive IP addresses and flood
the databases with rubbish.

Brenton

> Message: 7
> Date: Sat, 21 Mar 2015 15:23:46 +1100
> From: jm <jeffm@...>
> To: CLUG List <linux@...>
> Subject: [clug] What Meta-Data?
> Message-ID: <550CF252.4060301@...>
> Content-Type: text/plain; charset=utf-8; format=flowed
> 
> Can anyone point me to a concrete list of the government's definition of 
> "meta-data" as this term seems to be very wishy-washy? I was talking to 
> someone in the office about the discussion on the CLUG list and his 
> impression was very different to mine of what was meant by meta-data. He 
> thought it only pertained to who had what IP address at what time or who 
> made what phone call to what number and when. I got the impression that 
> it was at least a layer or two up in the network stack that was being 
> talked about. I sort of tuned out of this debate for a while, so is 
> there something beyond the speculation of the journos and public yet?
> 
(Continue reading)

jm | 21 Mar 05:23 2015

[clug] What Meta-Data?

Can anyone point me to a concrete list of the government's definition of 
"meta-data" as this term seems to be very wishy-washy? I was talking to 
someone in the office about the discussion on the CLUG list and his 
impression was very different to mine of what was meant by meta-data. He 
thought it only pertained to who had what IP address at what time or who 
made what phone call to what number and when. I got the impression that 
it was at least a layer or two up in the network stack that was being 
talked about. I sort of tuned out of this debate for a while, so is 
there something beyond the speculation of the journos and public yet?

Jeff.

--

-- 
linux mailing list
linux@...
https://lists.samba.org/mailman/listinfo/linux

Bryan Kilgallin | 20 Mar 12:09 2015
Picon

[clug] Evading surveillance in Syria & Australia

{For example, I learned not to mention the religious classes over the 
phone, but I didn’t stop attending the classes. Similarly, those with 
violent intentions will learn how to avoid detection by not engaging 
electronically — and in doing so, become even more elusive to authorities.}

http://www.crikey.com.au/2015/03/20/assads-mass-surveillance-scheme-didnt-work-and-neither-will-abbotts/

-- 
www.netspeed.com.au/bryan/

--

-- 
linux mailing list
linux <at> lists.samba.org
https://lists.samba.org/mailman/listinfo/linux

Gmane