S3E12: "Let Me AIX You A Question, Forge"
|Previous Episode||Next Episode|
|S3E11: "But First, Let Paden Take a SELFie"||S3E13: "Jason Scott is Breaking Out in Archives"|
|Recorded (UTC)||Aired (UTC)||Editor|
|2018-08-02 03:01:04||2018-08-12 14:55:24||"Edita"|
Forge joins us as a stand-in for Jthan to talk/rant/rave (and provide some valid criticism and honest & informative answers to questions we have) about IBM’s AIX platform.
- Bitfi has released a pseudo-cryptowallet it claims is “unhackable”…
- A Steam vulnerability (now fixed) in their new chat system (which has voice chat rolled in) allowed others to listen through your mic without your knowledge/permission.
- Criminals breach a bank twice within 8 months and steal 2.4 million USD.
- Yet ANOTHER RCE vuln in Intel’s AMT.
- The TLS eSNI draft proposal has been released.
- It is possible to geographically track a cellphone without using GPS or triangulation!
- A man is put in jail for contempt charges because he did not unlock his cellphone.
- Various military docs were leaked from an FTP server using… default creds.
- In case you didn’t hear yet, Reddit was compromised
Starts at 1m39s.
I was drinking water and Jefferson’s Reserve Bourbon. Paden was drinking nothing.
Jthan Forge was drinking water.
- AIX is the fanboyism justified? Does it deserve the hype?
- It has K(orn)SH as the shell.
- It is hella expensive — you pay for the hardware, the software’s just bundled on it (and is written and tailored specifically to that hardware).
- Forge mentions SMIT (pronounced ‘smitty’).
- We mention nmon more than once, and the associated Linux port.
- For more handy AIX commands, you may want to reference this handy article that Forge tossed our way.
- As much as Forge and Paden dislike the experience of running AIX, the features it provides for hot rollover with disks, the LVM layouts, etc. are much more cleaner and comfortable.
- I was trying to reference this ship.
- Forge and I take a brief detour to talk about HP-UX.
- We compare IBM AIX to their PowerKVM line.
In this segment, we highlight system administration mistakes. Think of them as the IT equivalent of the Darwin Awards. (1h12m08s)
An admin was compromised because his iLO login was exposed to the WAN unfirewalled. (iLO is HP’s equivalent of IMPI, DRAC, etc.)
- I was surprised to learn that AIX even has python 3.7.0 (as of the time of release of this episode)! Granted, through a third-party (to my knowledge), but it IS available.
|Intro||La Calahorra||Rolemusic||click||CC-BY 4.0||Outro||Dub Steps||Dub Terminator||click||CC-BY-SA 3.0|