{"id":5162,"date":"2014-06-22T19:02:05","date_gmt":"2014-06-23T02:02:05","guid":{"rendered":"http:\/\/www.podfeet.com\/blog\/?p=5162"},"modified":"2024-12-15T19:15:54","modified_gmt":"2024-12-16T03:15:54","slug":"476-podfeet-speed-improvement-leaf-antenna-for-cord-killing-projive-xlr-intro-to-programming-languages","status":"publish","type":"post","link":"https:\/\/www.podfeet.com\/blog\/2014\/06\/476-podfeet-speed-improvement-leaf-antenna-for-cord-killing-projive-xlr-intro-to-programming-languages\/","title":{"rendered":"#476 Podfeet Speed Improvement, Leaf Antenna for Cord Killing, ProJive XLR, Intro to Programming Languages"},"content":{"rendered":"<p>How Steve and I are cord killing $10 at a time using a <a href=\"http:\/\/www.amazon.com\/Mohu-Leaf-Indoor-HDTV-Antenna\/dp\/B00APPDX86\/ref=as_sl_pc_ss_til?tag=httppodfeecom-20&#038;linkCode=w01&#038;linkId=CFF6IO2ICCXOQ5JW&#038;creativeASIN=B00APPDX86\" target=\"_blank\">Leaf antenna<\/a>. Turns out you <em>can<\/em> use an external mic to record to Recolive&#8217;s Multicam using the <a href=\"http:\/\/www.amazon.com\/CableJive-ProJive-Microphone-Adapter-recording\/dp\/B007R5WRHU\/ref=as_sl_pc_ss_til?tag=httppodfeecom-20&#038;linkCode=w01&#038;linkId=CZLPZGITRXSYD4OQ&#038;creativeASIN=B007R5WRHU\" target=\"_blank\">ProJive XLR from CableJive<\/a>. Learn how I used Automator to launch all of my apps to create the live show. In Chit Chat Across the Pond Bart starts <a href=\"http:\/\/www.bartbusschots.ie\/blog\/?p=4696\".target=\"_blank\">Programming Languages &#8211; a 40,000 Foot View (Part 1 of 2)<\/a>.<\/p>\n<p><audio class=\"wp-audio-shortcode\" id=\"audio-5162-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"http:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/NC_2014_06_22.mp3?_=1\" \/><a href=\"http:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/NC_2014_06_22.mp3\">http:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/NC_2014_06_22.mp3<\/a><\/audio><br \/>\n<a href=\"http:\/\/phobos.apple.com\/WebObjects\/MZStore.woa\/wa\/viewPodcast?id=81677867\"><img loading=\"lazy\" decoding=\"async\" style=\"float: none;\" alt=\"itunes\" src=\"https:\/\/podfeet.com\/NosillaCast\/artwork\/itunes_subscribe_button.png\" width=\"125\" height=\"43\" \/><\/a><br \/>\n<a title=\"mp3 download\" href=\"http:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/NC_2014_06_22.mp3\" target=\"_blank\">mp3 download<\/a><br \/>\n<!--more--><\/p>\n<h3>Blog Posts<\/h3>\n<h4><a href=\"https:\/\/www.podfeet.com\/blog\/2014\/06\/podfeet-might-be-a-wee-bit-faster\/\" target=\"_blank\">Podfeet Might be a Wee Bit Faster<\/a><\/h4>\n<h4><a href=\"https:\/\/www.podfeet.com\/blog\/2014\/06\/killing-the-cord-10-at-a-time\/\" target=\"_blank\">Killing the Cord $10 at a Time<\/a><\/h4>\n<h4><a href=\"https:\/\/www.podfeet.com\/blog\/2014\/06\/projive-xlr-for-mic-input-to-recolive-multicam\/\" target=\"_blank\">ProJive XLR for Big Girl Mic Input to RecoLive MultiCam<\/a><\/h4>\n<h4><a href=\"https:\/\/www.podfeet.com\/blog\/2014\/06\/automator-live-show\/\" target=\"_blank\">Using Automator to Launch Applications<\/a><\/h4>\n<h3>Clarify<\/h3>\n<p>This week I needed to test an old Linksys WRT54G I found in my closet, figuring if I could prove to myself it was still functional I could sell it for around $25 on Amazon.  I started fussing around with plugging it into my Verizon FiOS router, then my Airport Extreme, threw in my gigabit Ethernet switch (thanks Pat!) but I was having trouble remembering the topology of my network so that I could get it working.  The great thing is that I document EVERYTHING I do around here using Clarify.  I was able to whip open <a href=\"https:\/\/www.podfeet.com\/blog\/tutorials-5\/how-to-configure-verizon-fios-router-to-give-network-control-to-airport-extreme\/\" target=\"_blank\">my tutorial on how to bypass the Verizon FiOS router and use my Airport Extreme instead<\/a>, and there was the lovely diagram Bart had created for me and I had pasted into Clarify along with all of the other instructions.  Without Clarify I don&#8217;t think I could remember how to get dressed in the morning! If you do lots of complex stuff but find it hard to remember what you&#8217;ve done, you really should check out the beta of Clarify 2 over at <a href=\"http:\/\/www.clarify-it.com\/download\/beta\" target=\"_blank\">clarify-it.com<\/a> and see how awesome it is for you.  By the way, it works on Windows too!<\/p>\n<h3>Chit Chat Across the Pond &#8211; Start Time: 20:41<\/h3>\n<h4>Security Light (Bumper edition)<\/h4>\n<p>A Correction:<\/p>\n<p>I totally misunderstood the EU court ruling in the last CCATP. I&#8217;ve done a lot more reading on it since, and while it&#8217;s a lot more complicated than I first realised, I don&#8217;t believe it&#8217;s the catastrophe many in the tech industry and media tried to make it out to be. Obviously only time will tell for sure.<\/p>\n<ul>\n<li><span style=\"font-size: 13px; line-height: 1.5em;\">A European Lawyer&#8217;s take on it: <a href=\"http:\/\/amberhawk.typepad.com\/amberhawk\/2014\/05\/press-and-google-misrepresent-european-courts-google-judgement.html\">http:\/\/amberhawk.typepad.com\/amberhawk\/2014\/05\/press-and-google-misrepresent-european-courts-google-judgement.html<\/a><\/span><\/li>\n<li><span style=\"line-height: 1.5em;\">Google Creates an online form for <\/span>European<span style=\"line-height: 1.5em;\"> Citizens to apply to have private data removed from search results &#8211; <\/span><a style=\"font-size: 13px; line-height: 1.5em;\" href=\"http:\/\/nakedsecurity.sophos.com\/2014\/05\/30\/google-unenthusiastically-launches-right-to-be-forgotten-request-form\/\">http:\/\/nakedsecurity.sophos.com\/2014\/05\/30\/google-unenthusiastically-launches-right-to-be-forgotten-request-form\/<\/a><span style=\"line-height: 1.5em;\"> <\/span><\/li>\n<li><span style=\"font-size: 13px; line-height: 1.5em;\"> <\/span><span style=\"font-size: 13px; line-height: 1.5em;\">12,000 Europeans apply to be forgotten: <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/06\/02\/12000-europeans-ask-google-to-forget-them\/\">http:\/\/nakedsecurity.sophos.com\/2014\/06\/02\/12000-europeans-ask-google-to-forget-them\/<\/a><\/span><\/li>\n<li><span style=\"font-size: 13px; line-height: 1.5em;\"> <\/span><span style=\"font-size: 13px; line-height: 1.5em;\">Google To Show When Results are Filtered: <\/span><a style=\"font-size: 13px; line-height: 1.5em;\" href=\"http:\/\/nakedsecurity.sophos.com\/2014\/06\/09\/google-to-flag-right-to-be-forgotten-censored-search-results\/\">http:\/\/nakedsecurity.sophos.com\/2014\/06\/09\/google-to-flag-right-to-be-forgotten-censored-search-results\/<\/a><\/li>\n<\/ul>\n<p>Important Security updates:<\/p>\n<ul>\n<li>Patch Tuesday has been and gone with important updates from Microsoft &amp; Adobe (including IE, Word, Flash &amp; AIR) &#8211; <a href=\"http:\/\/krebsonsecurity.com\/2014\/06\/adobe-microsoft-push-critical-security-fixes-4\/\">http:\/\/krebsonsecurity.com\/2014\/06\/adobe-microsoft-push-critical-security-fixes-4\/<\/a> <\/li>\n<li>Microsoft patches a security vulnerability in it&#8217;s anti-malware engine (affects many products, including Security Essentials) &#8211; <a href=\"http:\/\/www.us-cert.gov\/ncas\/current-activity\/2014\/06\/17\/Microsoft-Releases-Security-Advisory-Microsoft-Malware-Protection\">http:\/\/www.us-cert.gov\/ncas\/current-activity\/2014\/06\/17\/Microsoft-Releases-Security-Advisory-Microsoft-Malware-Protection<\/a><\/li>\n<li>Apple release security updates for Safari: <a href=\"http:\/\/www.us-cert.gov\/ncas\/current-activity\/2014\/05\/22\/Apple-Releases-Security-Updates-Safari\">http:\/\/www.us-cert.gov\/ncas\/current-activity\/2014\/05\/22\/Apple-Releases-Security-Updates-Safari<\/a> <\/li>\n<li>Mozilla patch FireFox &amp; Thunderbird &#8211; <a href=\"http:\/\/www.us-cert.gov\/ncas\/current-activity\/2014\/06\/13\/Mozilla-Releases-Security-Updates-Firefox-Firefox-ESR-Thunderbird\">http:\/\/www.us-cert.gov\/ncas\/current-activity\/2014\/06\/13\/Mozilla-Releases-Security-Updates-Firefox-Firefox-ESR-Thunderbird<\/a> <\/li>\n<\/ul>\n<p>Important Security News:<\/p>\n<ul>\n<li>iPhones around the world mysteriously locked with ransom notices &#8211; Russian authorities claim to have arrested those responsible (I find it hard to believe anything Russian authorities say these days, so I&#8217;m taking this with a whole cellar of salt) &#8211; <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/05\/27\/apple-ransomware-strikes-australia-pay-oleg-100-or-else\/\">http:\/\/nakedsecurity.sophos.com\/2014\/05\/27\/apple-ransomware-strikes-australia-pay-oleg-100-or-else\/<\/a> &amp; <a href=\"http:\/\/www.intego.com\/mac-security-blog\/moscow-hacking-duo-confess-to-hijacking-apple-devices-in-the-name-of-oleg-pliss\/\">http:\/\/www.intego.com\/mac-security-blog\/moscow-hacking-duo-confess-to-hijacking-apple-devices-in-the-name-of-oleg-pliss\/<\/a> <\/li>\n<li>TrueCrypt developers call it day &#8211; <a href=\"http:\/\/krebsonsecurity.com\/2014\/05\/true-goodbye-using-truecrypt-is-not-secure\/\">http:\/\/krebsonsecurity.com\/2014\/05\/true-goodbye-using-truecrypt-is-not-secure\/<\/a>, <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/06\/20\/truecrypt-mystery-forking-weirder-than-before\/\">http:\/\/nakedsecurity.sophos.com\/2014\/06\/20\/truecrypt-mystery-forking-weirder-than-before\/<\/a> &amp; Security Now Episode 458 (<a href=\"https:\/\/www.grc.com\/sn\/sn-458.htm)\">https:\/\/www.grc.com\/sn\/sn-458.htm)<\/a><\/li>\n<li>Microsoft update their TOS &#8211; stress privacy (they seem to be trying to position themselves as an anti-Google) &#8211; <a href=\"http:\/\/windows.microsoft.com\/en-us\/windows\/microsoft-services-agreement-faq\">http:\/\/windows.microsoft.com\/en-us\/windows\/microsoft-services-agreement-faq<\/a> <\/li>\n<li>Related &#8211; r<span style=\"font-size: 13px; line-height: 1.5em;\">ecently un-sealed court documents show MS successfully challenged a national security letter in court &#8211;<a href=\"http:\/\/blogs.technet.com\/b\/microsoft_on_the_issues\/archive\/2014\/05\/22\/new-success-in-protecting-customer-rights-unsealed-today.aspx\">http:\/\/blogs.technet.com\/b\/microsoft_on_the_issues\/archive\/2014\/05\/22\/new-success-in-protecting-customer-rights-unsealed-today.aspx<\/a> <\/span><span style=\"font-size: 13px; line-height: 1.5em;\"> <\/span><\/li>\n<li>Smartphone kill-Switch Developments:<\/li>\n<\/ul>\n<ul>\n<li>Study shows iOS7 Activation lock has cut down on iPhone thefts: <a href=\"http:\/\/arstechnica.com\/apple\/2014\/06\/ios-7-activation-lock-cutting-iphone-theft-damages-resale-market\/\">http:\/\/arstechnica.com\/apple\/2014\/06\/ios-7-activation-lock-cutting-iphone-theft-damages-resale-market\/<\/a><\/li>\n<li>Google &amp; Microsoft to follow suit and add Kill-Switches to: <a href=\"http:\/\/www.bloomberg.com\/news\/2014-06-19\/android-windows-phone-will-have-kill-switches-n-y-says.html\">http:\/\/www.bloomberg.com\/news\/2014-06-19\/android-windows-phone-will-have-kill-switches-n-y-says.html<\/a> <\/li>\n<\/ul>\n<li>Apple recall some European iPhone chargers because they could overheat dangerously &#8211; <a href=\"http:\/\/www.apple.com\/ie\/support\/usbadapter-european\/\">http:\/\/www.apple.com\/ie\/support\/usbadapter-european\/<\/a> <\/li>\n<li>Facebook make public sharing opt-in for new users, and add more privacy controls &#8211; <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/05\/23\/facebook-finally-makes-public-sharing-opt-in-for-new-users-gives-everyone-else-more-controls\/\">http:\/\/nakedsecurity.sophos.com\/2014\/05\/23\/facebook-finally-makes-public-sharing-opt-in-for-new-users-gives-everyone-else-more-controls\/<\/a> <\/li>\n<li>But &#8230;.. Facebook to start tracking users as the move around the web, and sell that data to advertisers (ironically Zuckerberg dissed Google, Yahoo &amp; MS for doing this back in 2011) &#8211; <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/06\/13\/facebook-to-let-advertisers-see-where-youre-surfing\/\">http:\/\/nakedsecurity.sophos.com\/2014\/06\/13\/facebook-to-let-advertisers-see-where-youre-surfing\/<\/a> <\/li>\n<li>iOS 8 will help protect users from passive tracking by randomising wifi MAC addresses when searching for networks (some cynics have tried to claim this is meaningless because of iBeacons, but that shows a fundamental misunderstanding of iBeacons, which are entirely passive devices, and can&#8217;t be used to track anyone unless they choose to install the owner of the beacon&#8217;s app, totally different to wifi tracking which actively tracks everyone with WiFi turned on) &#8211; <a href=\"http:\/\/arstechnica.com\/apple\/2014\/06\/ios8-to-stymie-trackers-and-marketers-with-mac-address-randomization\/\">http:\/\/arstechnica.com\/apple\/2014\/06\/ios8-to-stymie-trackers-and-marketers-with-mac-address-randomization\/<\/a><\/li>\n<li>A US Federal Appeals Court rules that  warrantless tracking of cell phones is unconstitutional (breaches the 4th amendment). This is definitely a positive step, but other courts have ruled differently, so really, this needs to go to the Supreme court for a final say &#8211; <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/06\/12\/us-court-finds-warrantless-tracking-of-mobile-phones-unconstitutional\/\">http:\/\/nakedsecurity.sophos.com\/2014\/06\/12\/us-court-finds-warrantless-tracking-of-mobile-phones-unconstitutional\/<\/a><\/li>\n<li>Two teenage boys hack into an ATM machine on their lunch break &#8211; they try tell the bank manager but he won&#8217;t believe them, and asks them to prove it, so they do &#8211; <a href=\"http:\/\/www.winnipegsun.com\/2014\/06\/08\/code-crackers--charleswood-teens-hack-into-grant-avenue-atm?utm_source=facebook\">http:\/\/www.winnipegsun.com\/2014\/06\/08\/code-crackers&#8211;charleswood-teens-hack-into-grant-avenue-atm?utm_source=facebook<\/a> <\/li>\n<li>Art takes on privacy with a dress that disappears to leave you ever more exposed as you tweet and post to Facebook &#8211; <a href=\"http:\/\/www.macobserver.com\/tmo\/article\/wearable-dress-disappears-one-tweet-at-a-time\">http:\/\/www.macobserver.com\/tmo\/article\/wearable-dress-disappears-one-tweet-at-a-time<\/a> <\/li>\n<p>Notable Data Breaches:<\/p>\n<ul>\n<li>Android Spotify users asked to upgrade and reset their passwords &#8211; <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/05\/27\/spotify-warns-its-android-app-users-of-breach-says-to-download-new-version\/\">http:\/\/nakedsecurity.sophos.com\/2014\/05\/27\/spotify-warns-its-android-app-users-of-breach-says-to-download-new-version\/<\/a> <\/li>\n<li>US Chinese restaurant chain PF Chang: <a href=\"http:\/\/krebsonsecurity.com\/2014\/06\/p-f-changs-confirms-credit-card-breach\/\">http:\/\/krebsonsecurity.com\/2014\/06\/p-f-changs-confirms-credit-card-breach\/<\/a> &amp; <a href=\"http:\/\/krebsonsecurity.com\/2014\/06\/p-f-changs-breach-likely-began-in-sept-2013\/\">http:\/\/krebsonsecurity.com\/2014\/06\/p-f-changs-breach-likely-began-in-sept-2013\/<\/a><\/li>\n<li>Dominos Pizza customer data in France &amp; Belgium held to randsom &#8211; <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/06\/16\/dominos-pizza-hacked-customer-database-held-to-ransom\/\">http:\/\/nakedsecurity.sophos.com\/2014\/06\/16\/dominos-pizza-hacked-customer-database-held-to-ransom\/<\/a> <span style=\"font-size: 13px; line-height: 1.5em;\"> <\/span><\/li>\n<\/ul>\n<p>Suggest Reading (Bumper edition):<\/p>\n<ul>\n<li>* Brian Krebs looks at some hardware devices for protecting you from &#8216;Juice-Jacking&#8217; &#8211; <a href=\"http:\/\/krebsonsecurity.com\/2014\/06\/gear-to-block-juice-jacking-on-your-mobile\/\">http:\/\/krebsonsecurity.com\/2014\/06\/gear-to-block-juice-jacking-on-your-mobile\/<\/a> <\/li>\n<li>* Contrary to some reports, a super computer did not pass the Turing test &#8211; <a href=\"https:\/\/www.techdirt.com\/articles\/20140609\/07284327524\/no-supercomputer-did-not-pass-turing-test-first-time-everyone-should-know-better.shtml\">https:\/\/www.techdirt.com\/articles\/20140609\/07284327524\/no-supercomputer-did-not-pass-turing-test-first-time-everyone-should-know-better.shtml<\/a> <\/li>\n<li>* Ars Technia have a nice article explaining how iOS8 allows extensibility via plugins without compromising security &#8211; <a href=\"http:\/\/arstechnica.com\/apple\/2014\/06\/explaining-ios-8s-extensions-opening-the-platform-while-keeping-it-secure\/\">http:\/\/arstechnica.com\/apple\/2014\/06\/explaining-ios-8s-extensions-opening-the-platform-while-keeping-it-secure\/<\/a><\/li>\n<li><a href=\"http:\/\/arstechnica.com\/apple\/2014\/06\/explaining-ios-8s-extensions-opening-the-platform-while-keeping-it-secure\/\"><\/a>* A year on from the first Snowden Leaks Naked Security look back on what we&#8217;ve learned: <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/06\/06\/snowden-one-year-on-and-its-still-not-1984\/\">http:\/\/nakedsecurity.sophos.com\/2014\/06\/06\/snowden-one-year-on-and-its-still-not-1984\/<\/a> &amp; <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/06\/06\/what-we-learned-from-edward-snowden\/\">http:\/\/nakedsecurity.sophos.com\/2014\/06\/06\/what-we-learned-from-edward-snowden\/<\/a> <\/li>\n<li>* Mobile Malware turns 10 &#8211; Naked Security provide a retrospective: <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/06\/01\/from-cabir-to-koler-10-years-of-mobile-malware\/\">http:\/\/nakedsecurity.sophos.com\/2014\/06\/01\/from-cabir-to-koler-10-years-of-mobile-malware\/<\/a> <span style=\"font-size: 13px; line-height: 1.5em;\"> <\/span><\/li>\n<li>Vodafone reveal government phone tapping in 29 countries in Europe and beyond &#8211; <a href=\"http:\/\/www.rte.ie\/news\/2014\/0606\/621912-vodafone\/\">http:\/\/www.rte.ie\/news\/2014\/0606\/621912-vodafone\/<\/a> <\/li>\n<li>Another Open SSL problem, though not nearly as catastrophic as HeartBleed &#8211; <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/06\/06\/latest-openssl-flaws-can-lead-to-information-leakage-code-execution-and-dos\/\">http:\/\/nakedsecurity.sophos.com\/2014\/06\/06\/latest-openssl-flaws-can-lead-to-information-leakage-code-execution-and-dos\/<\/a> <\/li>\n<li>Apple, Google &amp; Facebook CEOs sign open letter for the Reset the Net campaign &#8211; <a href=\"http:\/\/www.macobserver.com\/tmo\/article\/apple-google-and-facebook-ceos-sign-open-letter-for-reset-the-net-campaign\">http:\/\/www.macobserver.com\/tmo\/article\/apple-google-and-facebook-ceos-sign-open-letter-for-reset-the-net-campaign<\/a> <\/li>\n<li>Irish Court refers Facebook privacy case to European Court &#8211; when this verdict comes in a few months, it will be important, one way or the other &#8211; <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/06\/20\/facebook-privacy-case-to-be-referred-to-european-court-of-justice\/\">http:\/\/nakedsecurity.sophos.com\/2014\/06\/20\/facebook-privacy-case-to-be-referred-to-european-court-of-justice\/<\/a><\/li>\n<li>A Canadian court orders Google to block links world-wide (worth reading, not nearly as outrageous as you might suspect) &#8211; <a href=\"http:\/\/www.theglobeandmail.com\/report-on-business\/industry-news\/the-law-page\/bc-court-seeking-global-reach-orders-google-to-block-sites\/article19212708\/\">http:\/\/www.theglobeandmail.com\/report-on-business\/industry-news\/the-law-page\/bc-court-seeking-global-reach-orders-google-to-block-sites\/article19212708\/<\/a> <\/li>\n<li>Researcher finds that many apps in the Google Play store store important keys in plain text &#8211; <a href=\"http:\/\/phys.org\/news\/2014-06-thousands-secret-keys-android-apps.html\">http:\/\/phys.org\/news\/2014-06-thousands-secret-keys-android-apps.html<\/a> <\/li>\n<li>US Marshals swoop in to snatch phone surveillance data requested by ACLU under FOI &#8211; <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/06\/09\/feds-swoop-in-snatch-mobile-phone-tracking-records-away-from-aclu\/\">http:\/\/nakedsecurity.sophos.com\/2014\/06\/09\/feds-swoop-in-snatch-mobile-phone-tracking-records-away-from-aclu\/<\/a> <\/li>\n<li>Dashline release their list latest Password security roundup &#8211; <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/05\/29\/which-of-your-favourite-websites-are-terrible-at-passwords\/\">http:\/\/nakedsecurity.sophos.com\/2014\/05\/29\/which-of-your-favourite-websites-are-terrible-at-passwords\/<\/a> <\/li>\n<li>Security researcher claims to have written an Android apps to use the camera to spy on users even when the phone is locked &#8211; <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/05\/28\/yes-your-smartphone-camera-can-be-used-to-spy-on-you\/\">http:\/\/nakedsecurity.sophos.com\/2014\/05\/28\/yes-your-smartphone-camera-can-be-used-to-spy-on-you\/<\/a> <span style=\"font-size: 13px; line-height: 1.5em;\"> <\/span><\/li>\n<\/ul>\n<h4>Main Topic &#8211; Programming Languages &#8211; a 40,000 Foot View (Part 1 of 2):<\/h4>\n<p><a href=\"http:\/\/www.bartbusschots.ie\/blog\/?p=4696\">http:\/\/www.bartbusschots.ie\/blog\/?p=4696<\/a><\/p>\n<p>That&#8217;s going to wind this up for this week, many thanks to our sponsor for helping to pay the bills, Blue Mango Learning at <a href=\"http:\/\/bluemangolearning.com\">bluemangolearning.com<\/a> makers of Clarify. Don&#8217;t forget to send in your Dumb Questions, comments and suggestions by emailing me at <a href=\"mailto:allison@podfeet.com\">allison@podfeet.com<\/a>, follow me on <a href=\"http:\/\/twitter.com\/podfeet\">twitter<\/a> and <a href=\"https:\/\/alpha.app.net\/podfeet\" target=\"_blank\">app.net<\/a> @podfeet.  Check out the <a href=\"https:\/\/plus.google.com\/communities\/117336672755291339814\" target=\"_blank\">NosillaCast Google Plus Community<\/a> too &#8211; lots of fun over there!  If you want to join in the fun of the live show, head on over to <a href=\"https:\/\/podfeet.com\/live\">podfeet.com\/live<\/a> on Sunday nights at 5pm Pacific Time and join the friendly and enthusiastic NosillaCastaways.  Thanks for listening, and stay subscribed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How Steve and I are cord killing $10 at a time using a Leaf antenna. Turns out you can use an external mic to record to Recolive&#8217;s Multicam using the ProJive XLR from CableJive. Learn how I used Automator to launch all of my apps to create the live show. In Chit Chat Across the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[147,173,1],"tags":[],"class_list":["post-5162","post","type-post","status-publish","format-standard","hentry","category-blog-posts","category-nosillacast","category-podcasts"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/5162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/comments?post=5162"}],"version-history":[{"count":3,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/5162\/revisions"}],"predecessor-version":[{"id":5165,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/5162\/revisions\/5165"}],"wp:attachment":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media?parent=5162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/categories?post=5162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/tags?post=5162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}