17 Burst results for "Shell"
"shell" Discussed on The 443 - Security Simplified
"I am willing to bet. There's a bit of a double standard here. Like obviously microsoft is one of the largest tech companies in the world. Almost everyone uses windows. Lot of people use exchange so you could argue that yes maybe taking this down the net benefit to society. I'm willing to bet they're not gonna go in there and remove a vulnerability. Poc or an apple poc only microsoft ones. And there's a bit of. I mean yes. I don't know i is this. A is this a trend yet though. Mark i like. I don't think there's enough to say microsoft is policing get up yet This is the first time. That i'm aware of maybe. There's more that we're not aware of that. They've done it So i'm not willing to start saying. Oh they're just doing this to save themselves not others who knows So i don't think it's even worse that discussion yet until it happens in my opinion but I i could. I could see why they did it. But i can. Also i will concede to the fact whatever even if they had ultimately pure motives to do it. I actually am one over by the the argument that doing it. Just cause more media attention which is causing more people to find this vulnerable this exploit which is now out in the world regardless of them removing it from get up exactly either way though like i am concerned with the precedent it sets in general. I hoping it's not a precedent. So i guess it's something we'll watch from this point on. Is this suppressant microsoft. Are you going to be good or bad was trustworthy computing. Really something you believed in exactly. I mean so far i will give microsoft benefit that like since the acquisition to get hub. I've actually been pretty happy. They've turned a lot of paid features into free features We were able to downgrade our level for some of our accounts. Don't tell them don't want the costs going back into my budget. Exactly you're paying less. Let me up your price. Mark man and that is never mind. we've all got super premium. Ultra pro accounts.
"shell" Discussed on The 443 - Security Simplified
"shell" Discussed on Lore
"It had been a full century. Since the boots of their soldiers had tread on european soil. In the early days of the first world war britain had stayed outside the fray watching from the sidelines and planning for an unpredictable future. But of course that's the way of war. Isn't it coping with things. We cannot control with human lives hanging in the balance and august of nineteen fourteen. All of that changed one hundred. Thousand troops from the british expeditionary force landed in france to help hold back the oncoming wave of german invasion. If you read about them you'll hear them described as professional soldiers and some people assume that means battle-hardened then experienced but it just means that they weren't enlisted men called up weeks before most of them had never seen combat in their lives however green they might have been. They were still a welcome sight. They were cheered by fishermen when they landed and praised as they pass through the countryside on their way to the front their help was badly needed and so were their guns. Their destination was an old mining town called months which sat alongside a canal. From what i can tell. Monse was chosen because the canal had to make a few sharp bends around the town creating a little peninsula that gave the french and british strong tactical view of the oncoming germans but the british failed to use that position to their advantage. They made a few mistakes in setting up. I even though a number of bridges connected monster. The german side of a canal. No-one destroyed them and second. That wide view of the other side turned out to have a number of blind spots where hills of mining debris blocked their view and lastly yes that peninsula of land offered them a great position but if the germans managed to sneak around behind them they'd be trapped. Details of the battle itself depends solely on the soldiers who survived when the germans finally showed up said that they marched toward the canal in parade formation like one massive sea of bodies the british had set up heavy machine guns and made quick work of that initial wave mowing them down like a field at harvest time after that though things became much less controllable up and down the canal that stretched out from their flanks. The french troops collapsed quickly and began to retreat deeper into the countryside behind months the british held on his best. They could though but that's when their failure to destroy. The bridges came back to haunt them as the germans advanced. They took bridge after bridge surging into months. The battle was over and the british made a hasty retreat following after their french allies. That's the battle of mons as we know. But there's more because as those soldiers began to return to the safety of french territory. Stories began to leak out. Not just one or two mind you but a whole chorus of whispers all describing the same thing. It seems that the reason the british were able to hold on for so long was that they had been protected by an angel. Most of the stories contained the same details to all throughout the afternoon and evening of the battle of figure could be seen amongst the british troops. It was described as glowing brightly with a golden light and seated upon a white horse. One later description by a soldier who is there says it best. We all saw i. There was a sort of yellow missed sort of rising before the germans as they come to the top of the hill. The next minute comes this funny cloud of light and when it clears off. There's a tall man with yellow hair and golden armor on a white horse holding his sword up and his mouth open as if he were saying. Come on boys. I'll put the kibosh on the devils. How figure was interpreted varied from soldier to soldier. Some assumed it was angel while others were convinced it was saint george. The french soldiers who witnessed it believe the ghostly figure was none other than joan of arc. But what was agreed. Upon was that something was seen and its presence gave them hope and this is what we talked about a little while ago in war with so much fear and anxiety wayne down upon them. It has always been easy for soldiers to grasp for anything that might give them. Hope rabbit's foot a stylized doll or an odd shape in the clouds. I've even read stories of soldiers hiding little scraps of paper in their uniforms papers. That contain significant quotes holy scripture or notes from loved ones but most of the time folklore turns out to be a lot like the wizard of oz. You can see him standing there. But he's really just an illusion controlled by someone else behind the curtain and when it comes to the story of the angel of monse that analogy holds true because it seems something else was going on behind the scenes it turns out that almost all of the reports of ghostly golden figure seemed to arrive in the summer of nineteen fifteen nearly a year after the battle itself now granted the war was still going on and a lot of those soldiers were too busy fighting elsewhere to tell their stories right away but it creates an interesting time line interesting because of what had happened back in england months earlier in september of nineteen fourteen. The london evening times published a short story by a man named arthur machen. He was a well known author whose book the great god pan has been cited as deeply influential to writers like brom stoker and hp lovecraft as well as modern storytellers. Like guillermo del toro and stephen king but this new short story called the bowman at an altogether different sort of influence in it's a group of english soldiers are taking intense artillery fire from german troops and just at the moment when they believe all hope is lost. An electric shock seemed to flow through the english troops. At that moment they looked up to see a line of ghostly figures on their side each with shimmering bow in hand at once. The boman released their arrows into the germans. Helping the english win the day. That story was published just when news reports of the battle of months were sweeping into england. And because so much of machen story sounded similar to the real life events to seem to have become confused in the minds of the general public and well. I think we can see the results. A century later. Historians and experts in folklore moore. What happened to create the legend of the angel of months. But it's clear that machen story and the news reports eventually blended. It was a tale that the english wanted to believe was true and much like a fake. Social media post rides to viral status on the wave of gullibility. Most people swallowed it as fact true or not. The results of the stories impact are clearly documented. It went on to become a major piece of british propaganda during the first world war and assign to the english at least that their cause was the just one at unified people whether they were on the battlefield or not and it gave them.
"shell" Discussed on Lore
"The conflict had been a longtime coming. Tensions had been building between the supporters of king. Charles the first known as royalists and his enemy the parliamentarians for a very long time but on october twenty third of sixteen forty two all that angst was unleashed at the battle of edgehill. The first chapter of the english civil war was also too close to call. Both sides incurred such massive losses that most modern historians are in agreement that no one was victorious over the other it was a draw that bloody battle left. Its mark in more ways than one two months later in december of sixteen forty two some shepherds were working in the field where the fighting had taken place when an unusual noise took them by surprise they described it as the sound of horses screaming in pain followed by the distinct class of metal weapons on metal armor and when the shepherds the field around them they were paralyzed by fear. A ghostly battle was playing out before there is more reports of similar experiences. There began to be whispered across the countryside and eventually made their way to king. Charles himself curious he sent officials to investigate the stories. And their findings were revolutionary. Not only were the investigators able to witness the ghostly battle for themselves but some of the king's men who had participated in the battle of edgehill claim they recognised fallen friends. Among the phantom faces clearly wore puts us closer to the world beyond our own more than just about any other activity and while ghostly reminders of bloody battles are a common tale in the world folklore. It goes beyond simple reenactments the some. It's a sign that the supernatural world is right there waiting to help and protect them. One of the most common forms of battlefield folklore is premonitions and visions. A great example. Comes to us from an article in an eighteen. Eighty six edition of the detroit. Free press written by a former confederate soldier tells the story of how one morning while making coffee around the fire with a few of his fellow soldiers. One of the men claim to have had a dream the night before in its. He saw something that convinced him that he was destined to die in battle that day. I looked down upon a sheet of water. The frightened man had said who surface was covered in bubbles and amidst them. I saw my own dead face. I shall be shot before nights. He claimed of course his friends told him. It was nothing to worry about but later that day. During a skirmish with union troops an enemy canon ball rocketed across the battlefield. Cutting that very say man in half as it struck him in the same article. The author also discusses another type of folklore found within the theater of war charms according to him a common object found on a chain around the neck or in the pockets of his fellow. Confederate soldiers was a rabbit's foot. Some of the men even made a small business out of it making and selling them to the most desperate in fright among them decades. Later in the midst of the first world war another charm would become equally popular. They were type of stylized doll known as eight thumbs up. The name comes from the pos. They were fashioned in a wooden head on a metal body with arms raised to show two thumbs up over time. Thumbs-up became thumbs up. Some soldiers knocked on the wooden head of the doll for good luck while others carried them in their pockets or packs at all times. Early pilots even painted images of them on the signs of their airplanes charms. Like these represented the human desire to control things. Just put a rabbit's foot in your pocket and you'd be okay right. It's an understandable practice especially in an environment where so much was out of their control but battlefield superstitions went beyond good luck charms and some of the most common tales involve something much less physical ghostly assistance one. Such story comes to us from a battle that took place in serbia in nineteen twelve during the first balkan war in it. The army was stationed at the foot of a mountain while their enemy. The turkish troops had taken up a position above them inside in kassel. It was a fortress closely associated with a serbian national hero. A fourteenth century warrior king named marco initially orders from the serbian command. Were that their troops. Were to hold their position at the base of the mountain and wait for artillery fire to weaken the castles wall. But before that could happen. The soldiers there had a mass vision. The east claimed that marco had appeared before them sword raised commanding them to advance and take back his castle and amazingly it worked despite having the protection of those high walls. The turks were defeated by the serbian forces. Of course they were still lectured afterward by their commanding officers. When asked why they disobeyed a direct order. The soldier is relayed the story of the ghostly. Vision of king marco. I can't find record of their commanders response. But honestly i'm not sure that's important after all they won but not visions were of fallen soldiers or long dead focusses. Sometimes the ghostly help came in a much more religious package a great example of this can be found in a letter written by a british soldier to his mother back home in sussex in may of nineteen sixteen in the midst of the first world war. He wrote home describing something miraculous. That happened during a recent battle across had appeared in the sky. Above the fighting. Not just a flash either. This cross was said to have stayed visible for a full fifteen minutes. It was a scene later. Immortalized in a painting called the cross in the heavens above the trenches with was published by the illustrated london news and it wouldn't be the last during the war countless paintings. Etchings and illustrations appeared all throughout europe depicting christian imagery. Some like the story. I just told showed the cross shining above one army or another other images showed christ himself standing. Among the soldiers and a few even included the madonna. Not the pop star. Mind you but mary. The mother of jesus but the most common reports of all were of something witnessed in nearly every country across europe. No matter what side of the battle of soldier found themselves on it seems that visions of this other worldly protector. Were never that far away and it was hard to miss them to thanks.
"shell" Discussed on Lightfin Casefiles
"Clean the parasites off my skin or small fish that can cling to the skin of Aweil turtle or shark and live off the parasites that surround the larger animal. Anyway light fans seemed a lot more relaxed now that he was on holiday. I practically feel like a new shark now if only fish would stop asking me about Ray Manta. What does he really like if he's actually that good looking? Maybe he wasn't that relaxed as he swam along. He tried not to think about it. Trying to avoid the red mist of anger. Cloudiness mind breathing out berry thin. Just relax the oceans slowly became deeper and deeper with the bottom sloping downwards the current gently move seaweed shells and pebbles along the floor. Suddenly there was a cry from close by very thank me out. Make Life in briefly. Thought about zooming away. He was supposed to be on holiday and he felt he really didn't need this right now but when he looked around he couldn't see anyone else moving to help the hermit crab who was calling for help so he swam over. Oh what seems to be the problem. You must tell me. It's terrible disaster. Why Oh why do these things happen to me? Just take a deep breath down to something less than a panic now. What exactly has happened? Hermit crab was actually quite large for a hermit crab almost four centimeters big. His red legs were waving around in a very agitated fashion. He's to Glean is on their long stalks were weaning backwards and forwards as he took in the sight of Light Fin. Omar Omar Your door. Yes I know. I'm a shark but honestly I'm here to help you. I just ate a huge platter of Sushi for breakfast. And besides you really are in my type. No not that your detective from the news that well you. There's this brilliant dog with the mastermind like you educated. My problem will be solved. No time at all yes. A what exactly is your problem. I can't really see why you were shouting. If it's not too much trouble I would like to get back to my holiday. You mean you didn't notice you're missing my shell detective. I'm a hermit crab and it must have a shuttle living is what protects me from national predators in the Ocean Avenue. Of course I see. And where did you last year Shell? If you don't mind me also asking isn't that part of your body like other crabs not at all. We hermit crabs live inside shells that are painted by others. Wow what happened was I was in the process of moving between shells for weeks. My Shell had been getting a bit small if I had a big meal like some delicious plankton barely fit inside. This morning I was thrown. I found an empty round grass. Stripe odd show that look just a little perfect. It looks so roomy inside my old show to get things from a new home. When they came out of the shows. God I rushed out of my oath shown looked everywhere but it was nowhere to be found. Why didn't you just go back to your old shell? Well when I turn around to in fact the more I have looked there are new. Shows up around here which is impossible. I know that something's going on now. I understand it out here unprotected. So exposed is there anyone you can think of. That might want your old shell or your new shell well. My cousin. Ernie is smaller than me. Although don't mention that around him he has a real temper and being called small really like him worked up. He's been bugging me. Leave myself for a while. You know. That's how it works for us. Hermit crabs when you grow too big for your shop. You'll behind for so much smaller than estimating. Oh and shelly the decorator crap. She's always gathering all sorts of shells. Coral peace isn't sticking them to herself. Frankly I think it's your fashion taste is a little bit out there. But she thinks it looks good and it's came a flash of anything that might WANNA eat her. Oh Koko the KLEPTO. Excuse me I feel a headache. Coming on what's clipped. It clipped told us well. That's just what I call it. She is actually obeyed octopus. She is often also looking for shells and taking them. I mean she hasn't even a grab. Where does she need? Shell let me see what I can find out. Do you have somewhere to hide while I go and investigate. I'm going to grow into that rock over. There are not enough. We'll be able to see me. Life in slipped through the water silently keeping an eye out for shells crabs in occupy as he went duck story definitely sounded odd but life included workout. Want anyone would be stealing shows. Why would anyone want the shelf? I mean they are Sparkley but they don't seem to do anything. Look at that hermit crab over their boy. Oh boy he seemed angry bashing that. Oh coconut shell with his left claw. What a strange looking fellow without a shell hold on. This hermit crab look quite different from Doug a bit smaller but he had a giant left claw which was almost as big as the rest of his body his legs and clone were striped black and white legs zebra. Excuse me are you okay? What's it to you pal? Hey Watch it. I'm just trying to help. Keep that up and someone might take it personally are you Ernie. That's me why you think I need a big sharkey helping this little crab. How're you going to do that? You're GONNA eat me. Put an end to all my problems. Lengthened was surprised when Ernie scuttled towards him. He's is stokes. Were almost touching the tip UV. Light Fins knows. It would've looked quite funny to anyone who might have been passing not for the first time today. Light food wished he can just go back to his holiday. What is your problem? I spoke to your cousin and he mentioned some sort of issue with shells at they went missing. Yeah well that's what he says happened and I bet he's probably lying. I mean they didn't WanNa give me shelter. He should just say so. It's always the same with him. He wants to keep everything for himself. Could the shells have been stolen? I don't know about that. Detective could be the case then it could also be the Doug just misplaced. His Shell is kind of forgetful. And you haven't seen as old shell You know why do you think I'm so angry? Or perhaps he think that all of us left. These are just this way. Well if the cloth fits all I know is that he promised it to me now. He says it's gone and I need to find something else ridiculous. I have very specific needs. You know I won't just take any old shell. It needs to be the right one for me and my claw. The right one for a lefty Ernie's face seemed to be turning a shade of purple. Okay Okay. He did mention a decorator crab. Shelly intervened octopus called Coco. Who could have taken the shell? Oh you think one of those two might have taken the shelves. Wi Fi catch them. Are you think they could have while they both like shells but I have my doubts as they have very different? Tastes Shelly tends to like the smaller shells that she then sticks to her body. Koko look for shells that she can use to move around and hide in. She might have done it but I don't know say aren't you that shock from the new story? No sorry I really don't know what you're talking about and no I don't know Ray Manta gotta go. I'll let you know if I find anything nights in quickly hustled away from Ernie who is beginning to wave around his oversize left claw as he was starting to say something how fine then. There's no chance I'll see that. Shell again packed soon after life in was passing through and even more beautiful part of the ocean. The reefs were arranged a beautiful tropical colors. Reds Greens and Blues Slope in the ocean floor was flattening out and large piles of rocks shells. Algae and Moss rested against the coral. He almost swam right passionately but then he noticed one of those piles shift in the opposite direction to the current and he quickly turned around. Hello sorry but is there anyone in there too is peer douse from what looked like a policy debris but life in now saw that it was carefully attached to the crab's body There isn't anyone here. Please leave us alone. Shelley the decorator crab. I don't want to hurt you. I am just looking for some information about some missing shells. Oh shells I love shells. Actually I love anything I can stick to myself and as I grow. I keep needing more and more things to stick to my body. I guess you might say this. A bit of an obsession. Did you see any shells that were suitable for a hermit crab delivering Ernie in? Doug missing their shells. Before Shelley could answer a clam. Shell came scuttling towards them propelled forward by tentacles. What under the seeking that be. I haven't seen a. Shell moving quite like that before. How on Earth am I ever going to figure this out if everyone around here hides inside or under things? Sidley the head of Octopus pumped out of the Shell. Hello Detective Hello Shelly. I'm sorry but do we know each other. No we never met but I saw how you say those fish on the news the other night you were you were so brave. I'm Cocoa High Cocoa Nice. Show Oh wow. That wasn't anything really. I was just talking to shelly here but I was actually looking for you to I heard from Ernie and Doug that you collect seashells Szili quickly piped up duggan. Ernie are an odd couple. Earning always comes across as so angry. But he's really a sweetheart and Doug he's always confused. I swear. Sometimes he forgets what day of the week it is. I do like seashells but they need to be a specific size and shape. I'm very picky. But shells are so fabulous stalling. Oh are they similar to the type shows which hermit crabs might use as their homes? No not really. I'm actually very particular about my shells as I am a bit. Najjar the most hemmitt crops. I wouldn't be interested in this shells also like them round. I've even been known to use a coconut show. You can check out my video on Youtube. Sorry you what I saw that one. It was so funny..
"shell" Discussed on Beers with Talos
"The closet analogy. I mean he gave that IPAD. It was fully loaded with power. Do his kids once you got back on it right same thing you know. Oh did I ever tell you. Guys that my voice and Craig's voice or sonically similar enough that I can trigger his. Hey Siri really my hey. Siri is is triggered by anything. It's just you're keeping shocking. I think you just have the basic bitch Craig. You're up next which are basic bitch close. you know. I think it's interesting. You know when people talk about security in software. Sometimes they have a negative reaction to the knee-jerk removed. If you don't need it you know what I disagree. I think if you truly don't need it now is that a solution for everyone. Of course not. Is it realistic for everyone. Everyone of course. Not But if you don't need flash remove it if you don't Need Java script turn it off right if you do need that kind of thing if you do need things like power show obviously Veasley take the next steps to turn them off. Take the steps to secure them. Getting logging whatever you need to do. But I think it's important to remember that whenever you do evaluate your systems in the risks risks. You have the first thing you should always ask yourself as do I even need it on right. I think that's a normal question that everyone should ask themselves. And so you know I. I understand why a lot of people on twitter weren't happy with that sort of idea being thrown out there but I think it should be your step number one and then obviously we. We can all agree that most systems do need administrative functionality. And so then how do we do that securely. And that's where the security controls come into place that's where visibility comes into play that's where you know reducing access or do some control it in that kind of thing all steps in and of course there's an entire blog post there's a whole guide guide a minor wheeling to in our blog post. You can look at it to see what the abt groups are doing. The power shown things like that so by all means take a moment go give it a read educate yourself and then you can make much more informed decisions. You know when I have to make those decisions I. I've started a slack channel with all thirty eight administrators on my medicine. Believable Machine Twenty Percent Company. Yeah there are administrators. They gotTa Know Right Matt Parting shot closing thought. I I I think I'm just GONNA shout out to one of our fellow Cisco People who you can find on twitter at door Phoenix where The OS was endure Phoenix. Arizona's I I love her feed. It's actually really good. Yeah I love her I love her comedic takes and I think I'd never going to play poker with her. Because I've watched your fat stacks. She wrecks poker rooms all over the country. Follow lots and lots of smart stuff coming out of that account and Yeah Yeah keep walking through hell if if DORK PHOENIX CERTAIN SHOWS UP IN VEGAS. This year I think we should arrange for her to sit down at a poker table with Eric. I mean quick fund but it would be fun on. I was going to go for Craig. I don't gamble I don't win I've I know. Actually I think it would even better her to have her sit down with Warren and just watch him just get completely flummoxed it what is it. is she watching the boker. It would be the same anything. It was the same thing I've watched this once. In in one of the smart thing I've ever done poker. I'm sitting there playing poker in Vegas one year and and this woman walks in and she says hide all the dealers in an sits down at my table and I take all my chips up and I stand up and I'm he's like no. That was on the dummy. I'm leaving no I don't think you were because you left. Everybody else stayed on the other hand. Listen I want to thank everybody for joining us today. For episodes seventy one stay tuned in a couple of weeks episodes seventy-two oddly is going to follow this one pineapple Naib and talk about it and talk about it yet. But it's coming. I'm super excited. That's going to be the best. We are fast. Approaching are essential Eh. You'll see your favorite warm. We will be at our say. We have a lot of good stuff coming up there matt which is going to be there with us. He's going to be doing a session at the Cisco Innovation Day Security Invasion Index So we have a couple of sessions We'll be in the booze and we will also see all of you. The customer appreciation. That's always a big probably talk a little bit more about that in the coming weeks until then remember to subscribe and leave a comment wherever it is that you listened to the towers and we will see you next time..
"shell" Discussed on Beers with Talos
"Yeah on Craig's been working on this metaphor for a while we keep talking and do a little bit. Listen to anybody just like poincare five. We negotiated down to the to the utility knife slash Swiss army knife. You're all okay with it. And he just couldn't make it to the episode without screwing up but I think I think it is important realized that will power shelve is a very valuable tool. It can be abused and it is and to make matters worse. There are instructions out there that make power. Shell abuse trivial so restricting access to power shell and taking those security control seriously. Something you have to do you know if you have say riding you gotTa do you gotta you. You know even better maybe have. Security software plugged into it monitor the logs. And if you can't do that manually. Pay For something to do. It gets him. Get some advanced malware protection software. Sure but you've got to do it. It's just one of those things about running a system. These days and that kind of figures into our the second topic wanted to talk about when we talk about abt strategies ogies and defense in depth. So obviously you can't just depend on your firewall or you're whatever local AV software. You're running to detect a power shell expert or somebody else like you know administering power show on your end so even beyond just power shell when we you are talking about You know advanced persistent threats ordination State actors and were looking at different ways that we can defend against sat. Whether it's it's it's something as simplistic or utilitarian as power shell style attack or whether this is an Oday that somebody has in their back pocket. What are the ways that we can look at to defend against these those broader scale tax? There's not a single point solution by. I hate this question. This is the worst question. How do I protect myself against this? OR HOW DO I. How do I keep the Chinese or the or the the Americans at work or the Canadians my network? Good luck. Good luck out but believes all day long on those guys slashing five flashing Maple leafs of danger. It's like saying you know. How do I put the hanging curve ball over the fence for a home run right? You're in you're looking at you like you've never swung a bat before it is. That should not be you know I recognize and I want to acknowledge that in the moment. You're getting an enormous amount of pressure sure from your superiors when you're executive suite. You know to to answer this question but you know the real answer is you have to advance constantly your security maturity and I tell you like we see like one of the best things example. VR TEAM DIS is as part of their instant instant response. They rate the companies that they're responding to their security maturity in have guide for them to move up that chain. There're there are so many options available to the attacker that you can't just be like I'm GonNa install this control and we can. It is more about. How do I advance my overall security practice forward to reduce the opportunities that are available to scripted? UNSCRIPTED criminal advanced actors. So some it takes huge chunks of your of your of your threat surface away. Like that's why we he pushed two factor. Authentication is low impact high. You know high value sorta stuff but again only one piece of the overall discussion that you have to have the there is no. There is no way to walk into someplace and be like. Oh you defend against Russia visit when you do this. You need fins since China. You're GONNA do this. They're not separate answers whether you're trying to defend yourself against Americans. Australians Russians Chinese you know Israelis Ukrainians trainings led to the Middle East yet. If you want to go there well yeah so but it doesn't matter right you have to. You never know who's coming after you so you have to work on salvaging a hold on L. Bill security practice. I think this will help. People understand. Stand right for every network. That's out there. There's going to be networks. That are similar right. I think we can all get in that page at every single security level. You're not the only only one appears in that same field. The problem is that these nation state actors will invest heavily in targeting very specific companies. That are all across the spectrum and they'll continue to invest until they're successful and so by the time they get to your company even if you're not a primary sorry target. They already know how to successfully compromise companies in your segment and so the question is have you invested and things that your competition didn't have how do you have extra layers of defense that could delay them for a period of time because that's really what we're talking about here. I mean of a nation. State style actor is hell-bent uncompromising you they're going to keep trying until they get in and so you got to really evaluate yourself serious perspective and say what are we points. Let's do. I think those are something that others have. Do you think they've already found a way to compromise that and unfortunately I think a lot of the time. The answer's yes fair. Fair Man I want to. I want to extend your analogy actually correct your analogy a little bit I think e USA question phrases. Like how do I hit a hanging curve ball and I think that's that's that's the wrong question. I think the question people are actually asking is. How do I become a major league baseball player? It really is and like so. It's not not a tactical answer. There's not like well you're going to do this. You can keep your elbows in. You're going to wait for it and then you're GonNa like WanNa hang for a second you're just going to swing. Keep your elbows down and the question is more strategic than that right. It's like how do I get to the point where I can defend against this. It's how do I get to the point where I can swing at that. The Major League curveball. So how the point. The point is there's a number of different other pitches that you're not going to be able to hand right. So you're you're you're you're asking these weird questions that aren't about how do I become. You know the correct answer is how do I become a major league baseball player. That's the correct right. It's not how do I do this. One specific thing Bryan's league baseball players can do right. That's that's what I'm saying. So they're asking the wrong question. Let me put. But there's a perspective for certain companies right like they're wanting to know how to be successful Major League player. Meanwhile they have one shoe their legs broken. They're missing most of the fingers angers on the right hand they don't have good eyesight and they don't have glasses well so the reason. I say that I mean that. Sounds like ha ha but the reason I say that is because we all know. There's lots of systems out there. Most companies that they are sort of peripherally or fully aware of and they kind of turned a blind eye to don't WanNA patch and they're like well yes sure we have windows. NT systems in the basement. But that's for Bubba right and it's like well hold on now now. Are they on your network or not they are. You know that's vulnerable to literally everything. I mean. You have to understand that that. Oh how this happens right. They have to answer to an executive authority their their direct supervisor Executive Swede cease or somebody and they and they're looking for help and describing how they're going to change their environment to approaches and I guess what we're saying is we acknowledged that you're under this pressure pressure but the correct answer is should be okay. We've been thinking about this for a while here the steps we've taken over the last year. Here's our roadmap going forward. We we'll continue to do this. Because we know that this is the correct path to harden US across the board going out. It's all about you know it's it's it's all about then using that situation to advocate for additional resources to address those things you haven't been able to address. Hey I understand your concern about Iran but turned around about thirty percent of my budget in the last year. This is what I can't do because of those budget cuts. This is what I have have done. This is what I plan to do next year's but you need to give me the resources but you have to be ready for that conversation right. You can't just. You always have to be ready for that conversation it would be my guidance professionally as is. That's how you approach this problem. You're like okay. This is the realistic where we are. And you know you can. You can always kind kinda shade and cover things and not not be really brutal about your assessment but inside your head you have to know this is what's going to kill me is what's going to give me fire. These are the things that we're GonNa do and then and have a sit down for a week and build out. This plan is where I want to get to. How do given the budget? I have this how I would do it if I had add three percent more budget and then that every time they come to you with a question like how are we gonNA defend ourselves against this. This is the plan you can't. You cannot move. You've tactically on these situations. It has to be a strategic measured approach. Well so I think it's important to realize so I want to be clear here in highly this for the users because they may be unclear about the difference between this like a worm right when we're talking about advanced tax. We're talking about an adversary trying to get in your network. We're not talking about automated worm. That's just grinding away. That's become the background noise and the Internet right. This is different. This is someone actively trying to get into your system and this is someone that you've got to worry about. It's it's someone who's going to try new tactics and new techniques and that's why when we talk about defence in-depth we literally mean it because the rattle one lock and if it holds they'll try and find find a way around it and if it doesn't hold while they've gotten in and that's why if you do have problems that are basic in your environment where you are having trouble with the background noise of the Internet. This isn't even something that you need to be concerned about. This isn't this isn't going to be your primary concern because you're going to have multiple compromises with multiple adversaries inter system if you remember back while my my own all like many years ago we used Demo of inquiries we would get from people back on the early Snot as were it was Somebody's port scanning my stuff on the Internet. The amount of those thoughts. That's that's what you concerned by as probably not the best thing to be concerned about. Let's put it that way. I mean first of all. There's there's many other things that are foulis and somebody port scanning boxes plus mean if somebody's light right Craig sign if you've got an adversary who wants to find open ports. They're not going to be silly enough to do it. In a manner that you can detect and showed food. They're not gonNA on it and be noisy boats it right so you gotta you gotTa figure are just accept that these people are going going to be trying to get in high. Were they going to do it. And one of the best ways you can figure that out is by hiring somebody to come in and do red team event for you. If you don't have that money money then you're going to have to figure out you know yourself and hopefully got the skills to be able to figure those things out and figure out the possible entry points Winston still flat dot and you know. I can tell you how to do that. Okay cool us have your CTO get on twitter and say we're on hackel ban. Ah We've talked about this before the documentation for those efforts.
"shell" Discussed on Beers with Talos
"Answer and expect. That doesn't have right. Yeah Yeah it is never act well. Basically the to the ones that you'll hear most is going to be Wm. I and the steelers. Ws Management Process. All all right. So there's there's two ways of doing it one of them wwl am. I want a bit of a pain. 'cause you're looking at some of the. MVP was at one thirty five four forty five. I don't if it uses one of those might use one thirty now I don't know but anyway it's going to be catching on those couple and then and and then it open up so my fam- Reports or something ten twenty four and higher on the box and that makes it kind of bit squarely to to kind of monitor right right because you ought to kind of let it work properly and be happy. You'd have to allow those things to happen on from your firewall standpoint right. You'd have to say all right. It's used those ports good and then all of these ports here you can also use right for your communications right and then Bo Bo. The other thing is is the on the WS management side if you use that instead there's only two post to look at now they're ephemeral one of them's ACP one one of them's ACS right. So you can even lock it down to just us as and so that you're going to be using a cell when you do anyway and then you can start monitoring monitoring it a lot more closely and if you know that your remote Polish L. Sessions are going over a singular port using SSL and stuff then anew anew see them doing something different this bit of it indicates that there that something maybe isn't quite right. You know spoken like a true old school intrusion Detection Actions System Really Microsoft now is like Oh. We're on version five of our show. It's not like they came out of the gate with a whole lot of good tools to manage. Is this particular problem. They put in front of us. I don't I don't it's not whatever but in terms of logging. They've really added the some abilities to log. Power show behaviors with transcript logging script block logging and protected event logging the various things but the problem is now is you have to be you know you have to now talk to are the end users power. Shell is a very the capable and dangerous tool. And that's I think that is a completely fair statement and and as useful it is to you you. There are things that you have to do in terms of especially at the enterprise level in terms of ensuring that is used only by you for your for purposes so you have to have script signing turned on and you have to be. Have Your Sim able to look at what is coming out of the logging and analyze it and be able to say. Hey this this is not authorized or this is unusual and you have to limit the languages that has access to to hook to to only those necessary in terms of language. Control in only those necessary for you to execute what you're trying to do with the power shell script. You can lock many of those things down to on the on the individual machine but what you've got to be careful with that stuff with logging is how much information you're log. It has an impact on the machine itself right so the mission that he's actually. Logging is going to start affecting performance elements of that machine. So if you're talking about high performance servers you don't want to just throw on alright lug all these locked up the module log in a script log in into transcript longing. Whatever turn them all on and then we'll get permission because you're going to affect him performance for one and the volume of information that's coming from all the machines and when you talking enterprise wide? That's going to be a hefty of information right to. That's that's where I wanted to kind of jump in because I know that Microsoft's guidance on this one of the main I think five pillars was basically look at your logs turns out there which is a shitty pillar. Well it turns out there are ways to cheat at it right eight because there are certain things that are more interesting than others so I started. Digging through the transcript. The transcript log is the one that Matt was talking about which is really useful which logs kind of everything that goes into a shell command on what happens and welcomes the other side all right. So you get the whole session on a transcript log log wall so severe behavioral indicators. We actually filtered down to just the really interesting ones right. Let me give you an example. So you guys can get an idea of what I'm talking about because I forgot to send the link to everybody basically a shortcut. The calls power. Shell power shell launched from a website power shell used the download and execute a file para show was seen using the expand archive feature all things that might not be super normal more downloading and running sample being called from a webpage. You know there are ways to look at power. Show us a management tool in this particular case it's armoured protection system basically monitoring the systems pulling out the ones that we would find interesting and using that to wait actions. But even if you don't have that you can still look for that type of activity and your log vials just paying for software to do it for. You obviously obviously makes it a lot easier and less cumbersome Nigel's complaining about what are these what are these pillars of. You're talking about Greg. Well so when the discussion came up on twitter her somehow we got tagged. I'm still not entirely sure exactly how that happened. Because we didn't advocate for removing power. Shell on our blog posts But anyway if I get tagged into a discussion I'm happy to stick my nose and somebody else business. So Microsoft had five core recommendations into one of the first one. I believe we've already spoken about is deployed earliest version right power. Shell five built into windows ten standard advice for any soft well. This is the second one. But for different reasons Nigel their security protections and controls that went into power show five like this is an update or patch like that. There are things that they've recognized that potentially empower show two or so there were problems with how the implemented in how uncontrollable that tool was so so you have to power show five. We're talking about. Yeah so you're not talking about a bug you're talking about like architecture of the actual product itself. Yes so these aren't next. We're jumping ahead number five but just to tie it together. So we'll number one update power show for the reasons Matt outlined number. Five is actually. Make sure that you're running windows. There's ten because those two together can actually give your security software granular access to what's going on so like windows. Ten has that visibility cut out into into the coral s so that can hook it and see what's happening which is exactly what I was talking about like we do with our software. I suppose the second one is of course collect the logs and monitor them now. Obviously that's not easy simple. Well it's easy to collect them right. It is turning on logging. All the things is super easy. It's everything after that the cumbersome and boring and the third one is basically they call it just enough administration. Right Insert factory with that means is used minimal access which makes sense. It's a safe bet for everything. If yeah I mean I try. It's really about local admin access when you talking about the just enough stuff so if you're doing everything in an enterprise it's all remote access administration than you can limit the amount of access to local ministry to mine have and a new. Your normal user obviously would not be a an administrator on on the local box anyway so he kind of limits Emma things that that person can do whatever but then when I am administrates comes along logs in there are some things that they can do. Luckily but maybe not all of the things into that kind of pairs up with number four which is basically have pre-approved tasks that people can run they call it device guard and application control and basically that means have a subset of the power shell language available to users. Here's based upon what they should have the ability to do. So you know simple acts knots another. That's another version. Five thing benefit Yeah I I'm sure I mean it. Sounds like when they started doing five when they got really serious about security paired with windows ten. I think we can all agree that the security posture of windows ten is A great improvement over previous versions. I mean just to be completely honest and this is my story so if anybody thinks I'm wrong they can himselves but but I recently think windows. Ten is probably one of the more stable in painless versions of windows of ever run. I Yeah I don't use it at work really anymore but I use it for gaming and just a lot of standard whom you stuff and it seems reasonably security easy to update and I don't know I like it a lot more than I have the previous versions. I guess as long as as long as all your inbox work properly.
"shell" Discussed on Beers with Talos
"I'm kind of abused. Power Shell is. It is being used in a similar manner to you. Know attackers can use it just in the sand where that your systems administrators can use it to and that's where the issue stuck coming coming in right using it remotely. Will you start having problems and is a powerful tool and you can do lots of things with it and that's GonNa make it very attractive. It's who attack us as well as well as administrators right. They both want to do jobs and stuff so I think the question is you know not so much as this is power shell secure. It's it's Ho- do you use it in a secure manner right. There's ways and things you can do. Yeah and so. It takes to give the context of this discussion and how it came up from from a security perspective and I mean there's from purely a security guy not like an administrator we see power our show us all the time and attacks like Nigel said now. The reason is nothing nefarious power shelf. Swiss army knife. You know you can use it to make all kinds the fun stuff. It's an extremely valuable tools and extremely useful tool but from a security guy perspective every time we see it being used by bad guy we ask ourselves also did they really need to leave a pocket knife sitting out from the administrator standpoint of course the answer is usually yes because I needed to use the pocket knife to make things on that system and so that's where it kind of the the discussion came from is because from an I. R. Perspective or Security Guy Perspective active. It's very easy to say. No that's system shouldn't have it on there. We should remove it for not using it but the reality is that's not always a really feasible solution. Russian right I mean that's like saying you shouldn't have administrator accounting system you know that's really easy to say yes it's technically possible. I suppose but the reality is from day to day basis. It's just not super feasible. For most people especially at the enterprise level you just have to acknowledged that power shows wildly useful and widely almost universally used to master modern windows network. Yeah Yeah I think it's safe to say it's probably universally used. I mean I mean if you're not using power shell you have gone to great lengths to replace it. Yeah I mean especially if you count the bad guys it's universally there's I mean there's worse to use it securely and this list to monitor it right. I mean it's kind of like like everything else. If you have to use something or you are using something you should be monitoring and logging and paying attention to what's going on right. Let's his why we keep going back to segment your networks. This is why you do segmentation then you can see what's going on. Am I have a segment that say only as desktop machines on it then. I'm not expecting those desktop machines to start remotely administering each other all trying to remotely administer something else right. What I what I expect to see is is my administration has been on you know their little segment administering certain machines service for example? Maybe they do have to reach into the desktop network and administer machines there but I wouldn't expect them to be not desktop network incoming out somewhere else right so there's west to look at will worship your administration's becoming from what should it be looking at. What should it be doing? I mean and there's ways to lock down on windows machines to write. See this the the that does this to Wiz the power shell can be accessed on. Maybe three years that can be accessed remotely. I don't remember exactly I mean you know the windows administrators will tell me by let probably when and they listen to this. You forgot this. You forgot no way. You could put something on the Internet with the wrong.
"shell" Discussed on Beers with Talos
"Now. I'm just curious from your perspective. Do we see more chatter about the impending threat from Iran or during the the ongoing threat from say Russia or one of the other obviously career. Whatever I figured like every every every partner we had every like low level contact? We have everyone that knows us From from different agencies he's an organizations globally reached out A. Hey just letting you know. We're interested in Iran. If you know anything let us know and it was just like yeah. We know we know we're just making lists. Yeah yeah you and everybody else buddy got it got it got it got it. It was it was in terms of different different organizations globally kind of watching shing in collectively coming to an understanding that there was a potential for a ground change in terms of what was acceptable to in Iran's mind to engage in in a great deal of concern globally that that hopefully hopefully things are settling down now a little bit. So Oh yeah I I just to respond to Matt. I saw the same thing which I thought was pretty interesting. It was almost like the ongoing threat. It of something happening was paid attention to more than when something happens. Which I've thought especially ironic? We spent last episode talking talking primarily pretty much only about Iran and related ABT issues. And we want to talk about a couple of those the same things today. We're GONNA talk a little bit later in the show about abt strategies and how they work and also how defense in depth works from the blue team side from the defender's side. But before we get into that we didn't WanNa talk a little bit today about a favorite tool of SYS admins and of you know black hat. Hackers alike is very familiar tool to windows environments called power Shell and that's where he wanted to kick things off today. We'll talk about off a will will will explain real quick. Exactly what power shall is how it's used and then how you can actually secure power shell to ensure that you can get some of those advantageous things of using a tool like that without putting yourself at unnecessary risk. Craig you brought. This went up so I wanted to kick it it off with you. I'll give a quick intro and all that Neidl chiming because I'm sure he's more familiar with the details than I am. But basically when you're assistant administrator there oftentimes you need run. A large number of things on multiple systems like installing applications patches standard admin stuff historically people would use tools that were kind of like like a round peg in a square hole. You know like w Mike were passing things through the command line as far as the credits and while those tools worked from just like a pure functionality standpoint from a security perspective they were kind of disastrous and the reason I say that is because they will leave credentials and memory. Marie and if you've been involved in the security seen at all you know I would say from any perspective this day and age. You're well aware that there are and I don't know dozens if not hundreds of off the shelf tools that I'll just car password hashes out of memory which can then be used in pass the hash attacks and attackers can get credit ads for all your systems and obviously if it's an administrator credential you're using to do whatever it is you're doing that super bad and so there was a tool being developed I Dunno Nigel several years ago now probably ten years. I don't know the exact since Ten years released called power shell which is a very powerful scripting language designed with you know some security in mind where it doesn't credentials in memory and it's designed specifically to do these L. at night we'll talk a little bit about the guts. I'm sure he knows more than I do. Now it's I mean yeah you're right. I mean power. Shell was introduced and it does for a you know had security mind when it was introduced because of all the problems that you just mentioned him with the tools and things that people were doing And is you know obviously a lot better than those tools were but essentially say way of administering machines either individually or and is where it comes in your your issue. Start when you doing it remotely if you remember back twenty odd years ago and I twenty five years ago. When Becker was introduced as a tool you know now people were running not because it was the most convenient and easiest way to remotely administer windows machines when you had them right? That's what back orifice was used for. Fortunately you know people who with more nefarious people should we. Shall we say that also started to use Kara fees and would install that machine so they could. They could remotely administered machines even though they weren't supposed to be doing. Aw He's on our shelves but he's not..
"shell" Discussed on Beers with Talos
"Did you break on your new car this week? Oh well actually we should back up a little bit Craig. God New car for anybody who doesn't cut it twenty twenty minutes talking about this awful. Craig has a new crisis car and the what did you broke center Porsche nine eleven MLC midlife crisis edition. And that I mean this is true. No nothing it's good shape so it did did break the day before I got it They were well according to my guy they were cleaning it with a pressure Washer. And if you have the paint protective film on the car you have to be real careful about how you do it. Apparently they tore it but porsche vase was really cool. They went and replaced at all. So it's all in That's nice if they can see Soka combing county now when I read a tree later today than a few minutes for you ask you. Have you have plastic. Wrap on your car. Is this not like the same thing is like leaving the plastic cover on the couch. No it's just called the clear Bra. It's SOFA rocket your car. Because Austin is perpetually under construction. It's you know you may as well candied. Peel it off like a giant satisfying slow plastic peel. No it's like glued on. Its apparently quite difficult to remove. Move I hear using a pressure. Washers the way to go though. Correct if you want to remove that stuff since since we're GONNA questions questions today instead of round table I have a question for Nigel. Oh Okay you're heading down here next week. Yes it's Gasparilla week did. Did you remember yes to bring separate.
"shell" Discussed on Aaron Mahnke's Cabinet of Curiosities
"There's a reason so. Many people have searched the world for the holy grail. The Cup from which Jesus drank at the last supper to sip from the cup is to gain eternal life. They say. Other legends of immortality have been passed down through the ages as well the ancient Greeks wrote about a special water in Africa belonging. To a people known as the microbials water was said to allow these macro biens to to live well beyond one hundred years of age. We know that story better today. Thanks to conquistador on Staley on who famously went in search of it during the mid eight. Fifteen hundreds because of his expedition the concept of a fountain of Youth has spread throughout the world as something of a common legend. However ponts De Leon looked for the Fountain of Youth on an island off the coast of Florida when he should have been searching? The Kingdom of Tonga a Polynesian sovereign states eleven hundred miles off the coast of New Zealand island was once home to a great king to eat. Melilla came to power in seventeen seventy seven. It was at that time when he met James Cook a British captain within the Royal Navy who was the first European explorer to have ever set foot on the shores of such exotic places as Hawaii and eastern Australia. Captain Cook came. I'm bearing a gift to which he presented to the people of Tonga before leaving to see the rest of the world and this gift remained on the island to be cared for by the royal family. Eventually eventually became clear that this gift was special as to Melilla despite his growing age continued to live through numerous historical milestones where other leaders. Here's would abdicate. The throne to their children to eat. Melilla kept on ruling the French Revolution the American civil war as well as the inventions of the Telegraph. The lightbulb and the telephone all occurred while he was sitting on the Tongan thrown during Manila's reign as King New York became a bustling metropolis and two presidents residents were assassinated. The horse drawn carriage gave way to the steam engine which eventually led to Henry Ford's model t and to eat Melilla. was there to see it. All so when word of the seemingly immortal king made its way to other countries. They're leader is made plans to meet with him. Queen Elizabeth the second took a tour of the island in nineteen fifty three with the express purpose of speaking with the king. There are even photographs of the two monarchs walking the royal grounds together ten years later after having met with the Queen and witnessing historical events like the seeking of the titanic and the entirety of World War Two to eat Melilla passed away from natural causes so he was one hundred eighty eight years old. The thing about the king though was that he had discovered the Fountain of Youth Nor had the gift the Captain Cook delivered to him given him immortality mortality to we Mulela you see was captain. Cook's gift a turtle or radiated turtle to be exact. Originally from Madagascar Captain Cook had found him during one of his expeditions and took him aboard his ship only to present him to the Tongan Royal Family when he arrived to e Molla. Ella wasn't a real king. No turtle can be of course but he was a symbol and a cultural icon for both the family and the island as a whole he holds the Guinness. This world record for longest living tortoise and his body has been preserved for display in the Tongan National Center on Tonga's made island of Tongatapu however twohey Louima Leila isn't the only no internal to have lived over one hundred fifty years in the mid seventeen hundreds a young Algebra giant tortoise was given to Robert Clive an official L. with the east India company named Aguada. The animal lived on his estate for some time before it was transferred to the alley poor zoo in India in eighteen. Seventy five where it lived until its death in two thousand six. If zoologist had known it's official birthday they could accurately determined his age for now. Oh to eat. Melilla still holds the record but it is estimated that odd way eats a live to be even older passing away at the ripe old age of two hundred fifty years. So it seems the old fable about the tortoise and the Hare still has a lot to teach us when it comes to living longer. Slow and steady wins the race..
"shell" Discussed on Command Line Heroes
"Ryan fox involving set good. We're gonna define what the standard shell is and the two the most important people on input for that were myself and david corn and david corn had already written this shell chaos h. and every feature teacher that he had put into chaos h he said that should be a standard feature right this would be easy for him then to have the most perfect positive shell if it was simply simply his shell and some of those features were not good features. We're not good choices and made the shell somewhat incompatible with the bourne shell or i felt were miss features and so there were several discussions arguments about that and so <hes> building posits compliant shell that was one hundred percent perfectly compatible with every single michelle script that had been written for the bourne shell took longer than three months so if you are designing something that not only replaces the bourne shell but also is trying into mimic every part of the bourne shell. It's like you might have run into some copyright issues. How did you approach that in order to build true open source and free software. You have to do it in a clean room. You can't look at somebody. Else's code start from there and re- implemented so i'd never ever seen any of the software associated with any bell systems unix or berkeley unix. I'd never seen the source code for any of these things <hes>. When i i started building the best shell i used a parcel called bison which was something that <hes> richard had started to put the free software foundation <hes> and that was is completely different from basically every any any other program that had come before so i knew already that the thing i was building was not ever going to be a copyright infringement on something that have been built. Previously the work to create bash had plenty of hiccups. Here's just one example for the hardcore hardcore heroes out there at one point. I was working on implementing lobbying in the shell. This is the wildcard expansion are allows you to match a large number of files for example you could say star dot c. and that would match every filed at had an extension of dot c. so i worked on lobbing for several hours and i got a working and i was excited about it was a good implementation <hes> and in the course of creating this implementation i had created a file in my directory calls asterisk asterisk dot c. was star dot c. and i thought why should get rid of that file and i typed in r._a._m. Space quote start at sea close quote which in a modern michelle when you use the quotes it means do not expand this and i pressed return and it was taking a long time for the prompt to come back because we're using zing son. Three fifties and things are slow and i realized it's taking a long time because it's deleting all of the source files in this directory yeah so i deleted the source to bash at that point my goodness yeah which which caused me to just laugh loudly for a really along time i wasn't even slightly upset and then in over the next couple of days i typed it. All back in the code was completely fresh in my mind. The problems had been solved. It was just a matter of putting it down into into files so okay. It's the most people would completely freak out at that moment. You laugh you you said. I guess i have to do it all over again. Why were you so calm. It's it struck me as insanely absurd and very funny that i'm i'm building this tool and to make sure you know it's good to eat your own dog food to make sure the tool works correctly. You use the tool while you're building but the tool didn't work correctly. I had had not yet implemented quoting because i had an appointment quoting commanded i casually typed did not did not do what i expected it to do and i. I thought that was really funny. And then i mean that's amazing even that story about a mistake speaks to fox's brilliant though they say that mozart finished symphonies in his head and then just had to write them down once he'd finished fox had a similar similar talent so when you were finally done and you've got to deliver bash how'd that feel i actually felt spectacular occular so <hes> here's the story that i don't actually usually tell it was about eight months into building shell. I knew i needed about a month before i'd be done and another. Shell was released <hes> a._s. h. A. open source shell got released and i was crestfallen because we had not released the bash. Shell anyone yet so only a handful of people were using it <hes>. I knew it needed another another months worth of work and i thought oh this is terrible. All this energy and effort of put in <hes> will not be appreciated and might not even be seen and so. I was pretty i was pretty distraught. I was not laughing. The proof was in the pudding. Though canoes bash was released in nineteen eighty nine and became the default shell for lennox connects. Today it saturates our whole computing experience but it is everywhere someone who will use it every single day. It's on every single computer. How does it still being the author of bash most of the time. I don't even notice that bashes a thing other than a tool that i i use in my daily life. I don't really think about it but every so often i'll walk into an apple store and look around and think wow every computer around here is not only running software. I wrote twenty seven years ago more now. It also has my name in it and then i think every in computer on the internet you know every server on the internet is running the bash shell and has my name in it and and then windows last year the year before came out with the power shell which is bash and i was like oh my goodness. My my name is in every computer on the planet. I want you to really hear what fox told me next. Though because it's so important he was never trying to coach his way through this global domination nomination. He was trying to help trying to help the culture of programming that he was part of. I didn't set out to achieve some grandiose goal goal of being on everybody's computer. I was interested in that at all. I wanted to make a useful piece of software and i expected it to have a kind of typical software oft lifespan of you know three to five years not this kind of crazy thirty year term that that it's had or were you always always so frankly so nonchalant of how the impacts that you've had on computing. I'm proud that i wrote bash and i have an ego so i do things like except podcasts request to talk about the shell thank you but but it isn't it is not something that is there in my everyday life unfortunately unjust an obscure person right it. It is true that mice offers running on everybody's computer everybody's house and it's also true that nobody knows that uh-huh right so so i have.
"shell" Discussed on One Great Book
"In writing about upper-class. Bohemians hands like the Bloomsbury group or more to the point like the artists colony she grew up in around Cornwall. She was intrigued by the disastrous effect. The prospect of an inheritance tense can have on a perfectly normal family. How Green can destroy what once we're good relationships and it also felt important to her that she right about the days before World War Two because that era was so important to her generation add these together and you get the shell seekers at the heart of the stories at sixty four year old penelope annella keeling mother of three daughter of a deceased Victorian artist. Whose work is newly popular? The title of the book refers not to the characters specifically but to a painting painting the Shell Seekers Penelope's favourite of her father's works. It's her most treasured possession. He gave it to Bonilla for a wedding present. Hardly anyone outside the family. You know this painting even exists works from the Victorian school never sold for much but apparently that's changed now. Penelope is shocked by her sons news that the shell seekers is now worth a small fortune her children well most of her children are eager for her to sell the painting now right now while it is sure to fetch a high price and they have detailed plans for what should be done with the windfall but that doesn't mean penelope agrees each of the books fourteen chapters focuses focuses on a new character in the story a setup. I found worrisome when I first saw it because it looks like a lot of people too many to really get to know is a reader but what pilcher does through with these new characters is dry you in more deeply to their lives and especially to penelope's life when the book opens you know where she is in life but you don't know. Oh how she got there by suddenly turning the prism in each successive chapter pilcher illuminates different aspects of these people's lives shows us how their circumstances made them who they they are reveals. How their past lives influence the president.
"shell" Discussed on Programming Throwdown
"But like other ones that's. The setting up that environment is the job of the shell. Yep. And so that that's really upset that command prompt that you see is another function of the shell. And you know, back in the day, I didn't know it could do cool things. But today it feels like I see people I go to other people's computers, at work in duck, and they've got all sorts of crazy things displayed, and some of them, are, you know, h theme, some of them are even just things you can do in bash, but they can show what get branch, you're on, so mine will tell me if I'm in a, I'm in this python virtual environment on this, get branch and let me know, kind of my current state of that window because I have multiple open on, that's really useful being able to tab complete is super helpful, and one of the things I like about that. I think does work in bash but it doesn't work as well is the fuzzy matching so oh, yeah. The fuzzy matches so much better. Yeah. I love the fuzzy matching and also like in h configured you know, you can double tap the tab. And it'll give you the ability your cursor to select the thing you want to complete too. So if you just to give an example this, let's say on Lennox all case sensitive. So let's say you have a folder called my picks and peas capitalized. And so you do LS my picks. And you don't capitalize P Y P and then hit tab, it won't do anything because there's nothing there's no folder like that. I'm sorry with the fuzzy matching will actually just match it. But let's say you, you do something where the fuzzy matching matches it but it's not quite what you want it. So it's you have my pets and my picks. And he do NY P you hit tab, and you get my pets you can actually hit tab again. And it will, yeah. Give you this really cool menu where you can kind of hit tap to cycle through the menu. And that's configuration will and you know, people have very elaborate configurations and not elaborate configurations, but as Jason was pointing out earlier, like spending time on your tooling, like making sure that you haven't environment that suits. You kinda sometimes feels like a waste and some people obviously take it to an extreme where they spend this men more times making it tricking out making local than actual functionally improving what they're doing. But spending some out of. Getting something that works well for you really does make things faster and learning enough show commends that, you know, you can get by and get stuff done, and do simple. Scripting really does get you out of a lot of binds, because it is often much faster, I sort of Jason was indicating to right. Sort of like a one line lenox script, then to write a python script. That would be really over complicated to do it or try to figure, how to do NC post boss. I guess, all of those will be pretty hard to do so learning enough of it to get you out of the easiest examples is desirable feature, but there's other kinds of shows as we mentioned like CS, h there was chaos, h these are ones, like I personally, never use them before I've done like launch by accident. And then realize I don't know what I'm doing. Done that, too. But I will say the other. Thing is if you wanna write the sort of maybe the best way. But if you don't know what other people are going to be using, it's often at the beginning of your script. You do the what is that? The they called like the she bang, right? Like pound this round Bank pound exclamation point. And then the program that should execute to launch the script. And if you do sort of slash bins last S H, instead of like been slash bash and actually make sure your script is compatible with the sort of just S H shell the simplest shell then you have more likelihood that it's going to be portable to other things if you don't do that very likely you end up running as a bash script or is, yes, h crypt or whatever your current shell is. Yeah, that's right. As long as you do that..
"shell" Discussed on Programming Throwdown
"Can actually have one window, and it split into to the left half of the screen might be running top the right half of the screen is Iraq. Give. And so, so the turtle emulator went have one or more shells, when you hit L it finds the right shell that's the active shell the one that's that that is expecting accepting your input and it sends your L command to the shell program. Right. So when you start the terminal emulator, it doesn't know anything about prompts, or file systems, or any of that. What it does is it launches a program inside of it called the shell. And with the shell does is a shell is responsible for, you know, connecting you all those commands. So when you type alas and to the shell has to go and find the LS execute -able run, it get some kind of output. And then it will send that back to the terminal emulator, which will render screen. Does that make sense? Patrick. Yeah, I actually know that the dummies a lot of sense. Okay. Cool. So, so now the terminal emulator and the show are actually talking to each other. Now most of the time is very transparent. You present all the turmoil. Emulator tells the shell. Hey L and the shell says, okay. Let's, let's, let's just acco that L back to the person. Because, you know, there's nothing for me to d they haven't hit enter to remind me later says, okay. I'm going to draw L utopia drawn now but there's actually a protocol now by default. The protocol is a pass through type Elliott now. But there are what's called and see codes. A N S, I, I think I don't know what that acronym stands for. But ANSI is dick of it as like as the protocol. So, for example, if you do. If you remember you're asking codes. There's I think it starts at once they somewhere in the twenties or thirties. Do you remember what capital is in the Ascii code capital? A is men. I don't notice off my head, but sixty five are heck's forty one six oh. But there's a number of there's number of codes that, that are not the don't mapped anything. Right. And so I think so twenty x twenty starts the like printable command starting with space. Okay. There you go. So before that, there's, you know, there's opportunity there to use those extra codes to send some special information. And so there's, there's a set of these codes that you can run in sequence, and that's going to tell the terminal emulator. Hey, I'm going to do something special. So these letters that you're gonna see next they're not just regular. Letters, you need to draw they're going to they're Kanana's Satele you to act a certain way. And you could do a variety of things with that you can actually move the cursor around G could tell the terminal emulator. Hey, I want you to take the cursor and move it to, you know, row three. Even if you might be on rose thirty thousand or something like that. Well, I guess you're screens date, if you're out row at twenty years, just go to road three. You could also change colors. So if you've ever run a shell command or so you've ever on a command line command, and it actually displays colors on your terminal. That's those are special ANSI sequences says part of that, protocol the show is running your program. Your program is telling the shell. Hey, you know, send the special code, and then to, to, to turn the tax to read that shall is telling your terminal emulation to do that. Sure emulators is okay for now on all the letters. I see they're all going to be read, and then you say Hello world. And then hopefully if you're if you're if you're nice to the person comes after you change it back to white, and then you exit the program, right? There's actually a bunch of really crazy ANSI commands that are supported by most ten Terrell laters. You can actually render an image to the terminal, which is pretty wild. I mean imagine just didn't command Dadi occc and all of a sudden image shows us doable..
"shell" Discussed on KTRH
"Shell fc you family check them out at shell fc u dot org again the what everybody has dreams filling career a happy home and are checked off bucket list a scrapbook filled with travel photos ticket stubs and little moments of glory keepsake memories of a life well last with an affordable quality education from an accredited state university stoves and little moments of glory keepsake memories of a life well left with an affordable quality education from an accredited state university icty healthcare and more by providing career relevant skills tub i was stuck to faculty practicing in the field unu seat belts the confidence uni icty healthcare and more by providing career relevant skills top i respect to faculty practicing in the field un you see those the confidence you need to set your career in motion online and onsite at more than twenty locations in the dc metro area you you see offers ninety plus degrees specializations in certificate seething gain the skills you need to advance in indemand fields like cloud computing data analytics healthcare and more get started earning you and your husband have gone through life sidebyside hand in hand but now his addiction is tearing your family hiring is an important people are what make your business work but how do you find the right talent and ziprecruiter makes it simple compromising care battling addiction with innovative treatment programs that will lead your loved one back to you take the next step at sea instantly alert quality candidates about your job that means you'll start getting great candidates with the right experience almost as soon as your job is posted.