Hacker Public Radio

The Hacker Public Radio Old Microphone Logo


Eine durchschnittliche Folge dieses Podcasts dauert 15m. Bisher sind 758 Folge(n) erschienen. Dies ist ein täglich erscheinender Podcast.

Gesamtlänge aller Episoden: 7 hours 8 minutes


HPR3785: Hacking Boba Bubble Tapioca Pearls Fail

Listen to me cook / fail / hack Boba Green Tea! Links Wikipedia's article on Bubble or Boba tea



HPR3784: Two factor authentication without a phone number

Many services implement 2FA (Two factor authentication) by sending you a OTP (One Time Password) using an SMS with a random code, but this forces you to give them your valuable phone number. What alternatives do exist? Let's dive into the HOTP, used by some banks years ago through a physical token and the recent TOTP, which both let you generate completely offline codes without using any phone number or any other personal detail...



HPR3783: Accessibility, and Navigating the HPR Web Pages with a Screen Reader

Accessibility, and Navigating the HPR Web Pages with a Screen Reader Some time in the last year there has been some discussion on the HPR mailing list about some of the problems I was having, particularly with the tags page, on the HPR site. Here is a show in which you can hear both me and my screen reader, as I navigate the HPR home page, and then the HPR tags page...




HPR3781: The Joule Thief

The Joule Thief is a delightfully simple circuit that can light an LED that requires 2V or more from a battery that is depleted to 1V or less. There are three components in addition to the battery and LED: an NPN transistor, a resistor and a double wound inductor. The key thing about the inductor is that the same core shares two windings but in opposite directions. The explanation of how it works is simple enough, as long as you already understand how inductors and transistors work...



HPR3780: Fediverse Update May 2022

One of the things I love about the Fediverse is that there is constant activity and development. As I mentioned in the previous report on Bookwyrm, it is not unusual to return to an app a few months later and see new features have been added that make it better. In this report I want to highlight three news stories that I think may be of interest. Links: https://www.starshipchangeling.net/mastodon/ https://www.theverge...



HPR3779: Just Because You Can Do a Thing...

Hello Hacker Public Radio fans. This is Trey, and I am throwing this recording together for several reasons: The queue of shows is abysmally sparse. There are far more openings for shows in the next few weeks than there are shows posted. This show is a pitiful excuse for why I haven't posted any shows recently If you like what you hear on Hacker Public Radio, please express your gratitude by recording your own show. It doesn't need to be long, or sound professional, or anything...



HPR3778: A Squirrel Beeing on Google Products and Google Security

I have a discussion about my Android "WIPING" and how it affected my 2 factor authorization with Google. Further I "beein" some more about Android not being able to authenticate against a known chromebook using GOOGLE SECURITY, what a "beeing" , "beeing"!!!!

And I also cover Google's lousy support for chromebooks through Android, not sharing bandwidth via the cell communication channels...



HPR3777: Running Haiku on Bhyve, the BSD Hypervisor

Bhyve - The BSD Hypervisor https://bhyve.org/ vm-bhyve - Management system for FreeBSD bhyve virtual machines https://github.com/churchers/vm-bhyve Haiku - Open-source OS inspired by BeOS https://www.haiku-os.org/ UEFI Booting Haiku https://www.haiku-os.org/guides/uefi_booting/



HPR3776: A linux distro review

Xerolinux https://xerolinux.xyz I installed XeroLinux on an older I mac I had, mostly due to 2 factors, I had the hardware and A review I saw touted the MAC like interface from a modified KDE Plasma base. As a Plasma user, how could I resist. I had previously installed Fedora 36 on the MAC and was receiving random hardware issues at boot time, I wanted to see if the issue persisted on and Arch base, and since I had never used Arch, this was a perfect test case...