{"id":6074,"date":"2015-01-11T18:24:29","date_gmt":"2015-01-12T02:24:29","guid":{"rendered":"http:\/\/www.podfeet.com\/blog\/?p=6074"},"modified":"2024-12-15T19:22:04","modified_gmt":"2024-12-16T03:22:04","slug":"505","status":"publish","type":"post","link":"https:\/\/www.podfeet.com\/blog\/2015\/01\/505\/","title":{"rendered":"#505 Mophie Juice Pack for iPhone 6, Lowes Innovation Labs, Taming the Terminal Part 27 DNS"},"content":{"rendered":"<p>How much you really walk at CES, and the many faces of CES. We start playing our CES interviews with <a href=\"http:\/\/mophie.com\" target=\"_blank\">Mophie<\/a> announcing their new Juice Packs for the iPhone 6 and 6+.  Next we talked to the <a href=\"http:\/\/www.lowesinnovationlabs.com\/\" target=\"_blank\">Lowes Innovation Labs<\/a> about their OSHBot Robot and their virtual reality home improvement system using the Oculus Rift. I give my view on how maybe the Z-Wave Alliance could make home automation all play together.  Allister Jenks gives us a tutorial (made with Clarify) on how to add Flickr to your WordPress website at <a href=\"http:\/\/zkarj.clarify-it.com\" target=\"_blank\">http:\/\/zkarj.clarify-it.com\/d\/9g4rwa<\/a>.  In Chit Chat Across the Pond Bart starts explaining DNS to us in <a href=\"https:\/\/www.bartbusschots.ie\/s\/2015\/01\/10\/taming-the-terminal-part-27-of-n-dns\/\" target=\"_blank\">Taming the Terminal Part 27 of n<\/a>.<\/p>\n<p><audio class=\"wp-audio-shortcode\" id=\"audio-6074-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"http:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/NC_2015_01_11.mp3?_=1\" \/><a href=\"http:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/NC_2015_01_11.mp3\">http:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/NC_2015_01_11.mp3<\/a><\/audio><br \/>\n<a href=\"http:\/\/phobos.apple.com\/WebObjects\/MZStore.woa\/wa\/viewPodcast?id=81677867\"><img loading=\"lazy\" decoding=\"async\" style=\"float: none;\" src=\"https:\/\/podfeet.com\/NosillaCast\/artwork\/itunes_subscribe_button.png\" alt=\"itunes\" width=\"125\" height=\"43\" \/><\/a><br \/>\n<a title=\"mp3 download\" href=\"http:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/NC_2015_01_11.mp3\" target=\"_blank\">mp3 download<\/a><\/p>\n<p><!--more--><br \/>\nHi this is Allison Sheridan of the NosillaCast Mac Podcast, hosted at Podfeet.com, a technology geek podcast with an EVER so slight Macintosh bias. Today is Sunday January 11, 2015 and this is show number 505. <\/p>\n<h3>Blog Posts<\/h3>\n<h4><a href=\"https:\/\/www.podfeet.com\/blog\/2015\/01\/how-much-do-you-really-walk-at-ces\/\" title=\"How Much Do You Really Walk at CES?\" target=\"_blank\">How Much Do You Really Walk at CES?<\/a><\/h4>\n<h4><a href=\"https:\/\/www.podfeet.com\/blog\/2015\/01\/the-many-faces-of-ces\/\" title=\"The Many Faces of CES\" target=\"_blank\">The Many Faces of CES<\/a><\/h4>\n<h3>CES Interviews<\/h3>\n<p>Steve and I conducted THIRTY SEVEN interviews at CES. We&#8217;re struggling with how to get the content to you without overwhelming you and yet not taking forever to get them all out.  I think what we&#8217;ve settled on is that Steve will render all the videos and get them up on Youtube, and then I&#8217;ll spoon feed them out on the blog throughout the coming weeks.  On the podcast we&#8217;ll play the audio from those interviews that work well in audio only. There are some that are so visual that I&#8217;ll talk about them on the podcast but suggest you go watch rather than listen.  For example there&#8217;s one of a guy riding a motocross bike by using his arms and legs with no bike there at all.  Cool thing but the video really makes the interview.  We&#8217;d better dig in and get started!<\/p>\n<h4><a href=\"https:\/\/www.podfeet.com\/blog\/2015\/01\/mophie-6\/\" target=\"_blank\">Finally Mophie Juice Packs for the iPhone 6\/6+<\/a><\/h4>\n<p>Everyone is excited that Mophie has finally come out with the Juice Packs for the iPhone 6 and 6+. They sure could have done a better job with the naming convention. How many people do you think will buy the Juice Pack Plus for their iPhone 6+&#8217;s and then find out it only fits the 6?  Anyway, before you go out and buy a Mophie, you might want to stay tuned for an interview next week with Mobee who has a solution set that might be even better for you than the Mophie.<\/p>\n<h4><a href=\"https:\/\/www.podfeet.com\/blog\/2015\/01\/lowes-innovation-labs-brings-us-helpful-robots-and-virtual-reality-bathrooms\/\" target=\"_blank\">Lowes Innovation Labs Brings Us Helpful Robots and Virtual Reality Bathrooms<\/a><\/h4>\n<p>You can hear in this interview how weird the Oculus Rift was, the video is worth watching too so you can se how dorky I was! Check it out at <a href=\"http:\/\/www.lowesinnovationlabs.com\/\" target=\"_blank\">lowesinnovationlabs.com<\/a><\/p>\n<h4><a href=\"https:\/\/www.podfeet.com\/blog\/2015\/01\/z-wave\/\" target=\"_blank\">Can The Z-Wave Alliance Make Home Automation Devices Play Nice?<\/a><\/h4>\n<p>That&#8217;s enough interviews for this week.  There&#8217;s lots more to come, Steve&#8217;s encoding like a maniac so if you want to watch the videos early just go over to Podfeet.com and get a head start.<\/p>\n<h3>Clarify<\/h3>\n<p>Yesterday our good friend and frequent contributor and sometimes host of the NosillaCast, Allister Jenks told me about a cool plugin for WordPress that lets you embed your Flickr stream onto your website. He thought it might be fun for me. If you only want to have Flickr embedded on a single page, you only need the plugin called Flickr Justified.  If you want to embed it onto the sidebar though you also need one called Shortcode Widget.  As soon as I heard there were plugins into plugins I panicked and told him it was too hard.  You know where this is going, right?  <\/p>\n<p>Allister undid his own installation, then launched Clarify and ran through the installation steps again so he could take screen snapshots, add some lovely rounded rectangle red boxes to highlight where I should be looking, and even one <em>oval<\/em> to really get fancy.  He added a couple of sequence steps where things needed to be done in a certain order, then dropped in titles to the steps and added a short bit of explanations on each step.  When he was done he pushed the share to Clarify-it.com website and he had a link to send me with perfect instructions.  I followed along and it worked exactly as he showed me and I had no confusion in how to follow his steps.<\/p>\n<p>I&#8217;m including a <a href=\"http:\/\/zkarj.clarify-it.com\/d\/9g4rwa\" target=\"_blank\">link in the shownotes to Allister&#8217;s How to Add Flickr to Your Sidebar tutorial over on clarify-it.com<\/a> for you to enjoy. If you would like to be able to help people like this, or just get them off your back from asking the same questions over and over again, head over to <a href=\"http:\/\/clarify-it.com\">clarify-it.com<\/a> and give their free trial a spin.  When you go to buy, remember you can buy it for Mac or Windows or even a slider license!<\/p>\n<h3>Chit Chat Across the Pond &#8211; Time: 23:45<\/h3>\n<h4>Security Lite<\/h4>\n<p>Followup 1 &#8211; Did North Korea Hack Sony? Make up your own mind:<\/p>\n<ul>\n<li>The case AGAINST it having been North Korea (by Bruce Schneier) &#8211; <a href=\"http:\/\/www.theatlantic.com\/international\/archive\/2014\/12\/did-north-korea-really-attack-sony\/383973\/\">http:\/\/www.theatlantic.com\/international\/archive\/2014\/12\/did-north-korea-really-attack-sony\/383973\/<\/a><\/li>\n<li>The case FOR it having been North Korea (by Brian Krebs) &#8211; <a href=\"http:\/\/krebsonsecurity.com\/2014\/12\/the-case-for-n-koreas-role-in-sony-hack\/\">http:\/\/krebsonsecurity.com\/2014\/12\/the-case-for-n-koreas-role-in-sony-hack\/<\/a> <\/li>\n<li>FBI Director James Comey said in a speech that North Korea &#8216;got sloppy&#8217;, exposing their involvement &#8211; <a href=\"http:\/\/arstechnica.com\/security\/2015\/01\/fbi-director-says-sony-hackers-got-sloppy-exposed-north-korea-connection\/\">http:\/\/arstechnica.com\/security\/2015\/01\/fbi-director-says-sony-hackers-got-sloppy-exposed-north-korea-connection\/<\/a> <\/li>\n<\/ul>\n<p>Important Security Updates<\/p>\n<ul>\n<li><span style=\"font-size: 12.7272720336914px; line-height: 1.5em;\">None!<\/span><\/li>\n<\/ul>\n<p>Important Security News<\/p>\n<ul>\n<li>Apple used their ability to push updates to OS X pro-actively for the first time this month, patching a nasty bug in NTP &#8211; <a href=\"http:\/\/arstechnica.com\/apple\/2014\/12\/apple-automatically-patches-macs-to-fix-severe-ntp-security-flaw\/\">http:\/\/arstechnica.com\/apple\/2014\/12\/apple-automatically-patches-macs-to-fix-severe-ntp-security-flaw\/<\/a> <\/li>\n<li>gogo in-air wifi provider discovered clumsily forging *.google.com SSL certs &#8211; they say they are just trying to break into SSL for load balancing, but once you break SSL you break SSL &#8211; IMO this is a Man in the Middle attack, and the hail of criticism is 100% justified. You don&#8217;t need to know WHAT people are doing to manage bandwidth &#8211; <a href=\"http:\/\/arstechnica.com\/security\/2015\/01\/gogo-issues-fake-https-certificate-to-users-visiting-youtube\/\">http:\/\/arstechnica.com\/security\/2015\/01\/gogo-issues-fake-https-certificate-to-users-visiting-youtube\/<\/a><\/li>\n<li>MoonPig take down their spectacularly badly designed API after 17 months of ignoring reports from a security researcher &#8211; <a href=\"https:\/\/nakedsecurity.sophos.com\/2015\/01\/07\/moonpig-takes-down-customer-data-leaking-apps-after-vulnerability-found\/\">https:\/\/nakedsecurity.sophos.com\/2015\/01\/07\/moonpig-takes-down-customer-data-leaking-apps-after-vulnerability-found\/<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2015\/01\/07\/moonpig-takes-down-customer-data-leaking-apps-after-vulnerability-found\/\"><\/a>Security researcher finds a bug in how browsers deal with HTTP Strict Transport Security (HSTS) allowing tracking of users even when using private browsing modes &#8211; FireFox have already issued a partial patch, expect more browser updates to follow. Researchers have dubbed this new technique &#8216;HSTS super-cookies&#8217; &#8211; <a href=\"http:\/\/arstechnica.com\/security\/2015\/01\/browsing-in-privacy-mode-super-cookies-can-track-you-anyway\/\">http:\/\/arstechnica.com\/security\/2015\/01\/browsing-in-privacy-mode-super-cookies-can-track-you-anyway\/<\/a> <\/li>\n<li>Security researchers found a way to circumvent rate limiting on iCloud login attempts &#8211; this enabled brute-force attacks, but does not by-pass passwords &#8211; your best defence is still a strong password &#8211; <a href=\"http:\/\/www.macobserver.com\/tmo\/article\/new-icloud-vulnerability-claims-to-circumvent-failed-password-limit-and-2-f\">http:\/\/www.macobserver.com\/tmo\/article\/new-icloud-vulnerability-claims-to-circumvent-failed-password-limit-and-2-f<\/a> &#8211; Apple have patched fixed the problem &#8211; <a href=\"http:\/\/www.intego.com\/mac-security-blog\/apple-patches-brute-force-password-cracking-security-hole-in-icloud\/\">http:\/\/www.intego.com\/mac-security-blog\/apple-patches-brute-force-password-cracking-security-hole-in-icloud\/<\/a><\/li>\n<li>It seems that at least one member of the &#8216;Lizard Squad&#8217; who rained on a lot of people&#8217;s Christmases by DDOSing gaming networks has been arrested &#8211; <a href=\"https:\/\/nakedsecurity.sophos.com\/2015\/01\/01\/have-the-cops-busted-one-of-the-lizard-squad\/\">https:\/\/nakedsecurity.sophos.com\/2015\/01\/01\/have-the-cops-busted-one-of-the-lizard-squad\/<\/a> &#8211; related: Brian Krebs has a long history with this group, some relevant posts for more context: <a href=\"http:\/\/krebsonsecurity.com\/2014\/12\/cowards-attack-sony-playstation-microsoft-xbox-networks\/\">http:\/\/krebsonsecurity.com\/2014\/12\/cowards-attack-sony-playstation-microsoft-xbox-networks\/<\/a>, <a href=\"http:\/\/krebsonsecurity.com\/2014\/12\/whos-in-the-lizard-squad\/\">http:\/\/krebsonsecurity.com\/2014\/12\/whos-in-the-lizard-squad\/<\/a> &amp; <a href=\"http:\/\/krebsonsecurity.com\/2014\/12\/lizard-kids-a-long-trail-of-fail\/\">http:\/\/krebsonsecurity.com\/2014\/12\/lizard-kids-a-long-trail-of-fail\/<\/a><\/li>\n<li>RELATED &#8211; the Lizard Stresser (the DDOS platform that took out Sony &amp; Microsoft&#8217;s gaming networks over Christmas) uses hacked home routers to execute the attacks &#8211; <a href=\"http:\/\/krebsonsecurity.com\/2015\/01\/lizard-stresser-runs-on-hacked-home-routers\/\">http:\/\/krebsonsecurity.com\/2015\/01\/lizard-stresser-runs-on-hacked-home-routers\/<\/a><\/li>\n<li>RELATED &#8211; the Lizard Stresser DDOSed 8chan &#8211; <a href=\"http:\/\/arstechnica.com\/security\/2015\/01\/8chan-related-sites-go-down-in-lizard-squad-powered-ddos\/\">http:\/\/arstechnica.com\/security\/2015\/01\/8chan-related-sites-go-down-in-lizard-squad-powered-ddos\/<\/a> <\/li>\n<li>Twitter&#8217;s lack of a business plan bites again &#8211; users are now having brands added to their follow list against their will &#8211; <a href=\"http:\/\/www.macobserver.com\/tmo\/article\/twitter-goes-over-to-dark-side-decides-who-youll-follow\">http:\/\/www.macobserver.com\/tmo\/article\/twitter-goes-over-to-dark-side-decides-who-youll-follow<\/a> (RELATED &#8211; Twitter reportedly planning to have video ads auto-play a 6 second preview &#8211; <a href=\"http:\/\/adage.com\/article\/digital\/twitter-s-video-plans-include-autoplay-ad-previews\/296522\/\">http:\/\/adage.com\/article\/digital\/twitter-s-video-plans-include-autoplay-ad-previews\/296522\/<\/a>)<\/li>\n<li>Microsoft stops publishing advanced notification of patches to everyone who does not pay &#8211; <a href=\"https:\/\/nakedsecurity.sophos.com\/2015\/01\/09\/microsoft-discontinues-advance-notification-service-but-why\/\">https:\/\/nakedsecurity.sophos.com\/2015\/01\/09\/microsoft-discontinues-advance-notification-service-but-why\/<\/a> <\/li>\n<li>Spotlight opens images in emails even when a user configures Mail.app not to open images &#8211; this minor bug has been ridiculously over-reported. If you didn&#8217;t change the setting in Mail.app, this does not affect you, and that&#8217;s the vast majority of people! Also, this is being reported as exposing &#8220;private information&#8221;, that seems utterly OTT, it lets spammers know if an email was opened, and from what IP. I.e. it tells spammers exactly what they already know each time we open an email with an embedded image. Apple should fix this of course, but there is some serious crying of wolf going on here IMO &#8211; <a href=\"http:\/\/arstechnica.com\/security\/2015\/01\/spotlight-search-in-yosemite-exposes-private-user-details-to-spammers\/\">http:\/\/arstechnica.com\/security\/2015\/01\/spotlight-search-in-yosemite-exposes-private-user-details-to-spammers\/<\/a><\/li>\n<li>Computer Researchers have reported on a very interesting hack that can allow an attacker with physical access to your computer to alter the firmware and hence create a very sticky root kit. Apple are reportedly already working on a fix. This is the kind of very theoretical stuff you really shouldn&#8217;t panic about BTW (oh, and it&#8217;s been given the cutesy name &#8216;Thunderstrike&#8217;, because it uses Thunderbolt, and all bugs seem to need a cute name these days) &#8211; <a href=\"https:\/\/nakedsecurity.sophos.com\/2015\/01\/09\/thunderstrike-new-mac-ueberrootkit-could-own-your-apple-forever%E2%80%8F\/\">https:\/\/nakedsecurity.sophos.com\/2015\/01\/09\/thunderstrike-new-mac-ueberrootkit-could-own-your-apple-forever%e2%80%8f\/<\/a> &amp; <a href=\"http:\/\/arstechnica.com\/security\/2015\/01\/worlds-first-known-bootkit-for-os-x-can-permanently-backdoor-macs\/\">http:\/\/arstechnica.com\/security\/2015\/01\/worlds-first-known-bootkit-for-os-x-can-permanently-backdoor-macs\/<\/a><\/li>\n<li>A zero-day in almost all Asus routers has been reported. Thankfully the vulnerability requires the attacker to be on your network, so it&#8217;s not as bad as it could be. There is no patch yet, but all Asus router users should keep an eye out for a firmware update in the near future &#8211; <a href=\"http:\/\/arstechnica.com\/security\/2015\/01\/got-an-asus-router-someone-on-your-network-can-probably-hack-it\/\">http:\/\/arstechnica.com\/security\/2015\/01\/got-an-asus-router-someone-on-your-network-can-probably-hack-it\/<\/a> <\/li>\n<\/ul>\n<p>Notable Breaches<\/p>\n<ul>\n<li>A great infographic from Information is Beautiful showing the relative scales of recent breaches: <a href=\"http:\/\/www.informationisbeautiful.net\/visualizations\/worlds-biggest-data-breaches-hacks\/static\/\">http:\/\/www.informationisbeautiful.net\/visualizations\/worlds-biggest-data-breaches-hacks\/static\/<\/a><\/li>\n<li>Banks reporting breach in some Chick-fil-A outlets &#8211; <a href=\"http:\/\/arstechnica.com\/security\/2014\/12\/us-banks-trace-credit-fraud-to-chick-fil-a-locales-in-possible-data-breach\/\">http:\/\/arstechnica.com\/security\/2014\/12\/us-banks-trace-credit-fraud-to-chick-fil-a-locales-in-possible-data-breach\/<\/a><\/li>\n<li>OneStopParking.com appear to have been hit by the same gang that got so much card data from Target &#8211; <a href=\"http:\/\/krebsonsecurity.com\/2014\/12\/target-hackers-hit-onestopparking-com\/\">http:\/\/krebsonsecurity.com\/2014\/12\/target-hackers-hit-onestopparking-com\/<\/a> <\/li>\n<li>The UK&#8217;s Immobilise National Property Register website has been patched, having been vulnerable for a year, allowing would-be burglars to find the addresses for any valuables they might want to steal &#8211; <a href=\"https:\/\/nakedsecurity.sophos.com\/2015\/01\/08\/goldmine-for-burglars-hole-closed-in-immobilise-national-property-register\/\">https:\/\/nakedsecurity.sophos.com\/2015\/01\/08\/goldmine-for-burglars-hole-closed-in-immobilise-national-property-register\/<\/a> <\/li>\n<\/ul>\n<p>Suggested Reading<\/p>\n<ul>\n<li>Latest Snowden revelation &#8211; NSA has VPNs in a &#8216;vulcan death grip&#8217; &#8211; <a href=\"http:\/\/arstechnica.com\/tech-policy\/2014\/12\/nsa-has-vpns-in-vulcan-death-grip-no-really-thats-what-they-call-it\/\">http:\/\/arstechnica.com\/tech-policy\/2014\/12\/nsa-has-vpns-in-vulcan-death-grip-no-really-thats-what-they-call-it\/<\/a><\/li>\n<li><a href=\"http:\/\/arstechnica.com\/tech-policy\/2014\/12\/nsa-has-vpns-in-vulcan-death-grip-no-really-thats-what-they-call-it\/\"><\/a><span style=\"font-size: 13px; line-height: 1.5em;\">* Der Spiegel reports that NSA can access all Skype traffic &#8211; <a href=\"http:\/\/arstechnica.com\/tech-policy\/2014\/12\/newly-published-nsa-documents-show-agency-could-grab-all-skype-traffic\/\">http:\/\/arstechnica.com\/tech-policy\/2014\/12\/newly-published-nsa-documents-show-agency-could-grab-all-skype-traffic\/<\/a> <\/span><\/li>\n<li>A good article describing the new secure-by-default Dark Mail system Levar Levinson is working on (among others) &#8211; <a href=\"http:\/\/arstechnica.com\/security\/2015\/01\/lavabit-founder-wants-to-make-dark-e-mail-secure-by-default\/\">http:\/\/arstechnica.com\/security\/2015\/01\/lavabit-founder-wants-to-make-dark-e-mail-secure-by-default\/<\/a><\/li>\n<li>A cool list of sites that let you track cyber attacks in (near)real-time &#8211; <a href=\"http:\/\/krebsonsecurity.com\/2015\/01\/whos-attacking-whom-realtime-attack-trackers\/\">http:\/\/krebsonsecurity.com\/2015\/01\/whos-attacking-whom-realtime-attack-trackers\/<\/a> <\/li>\n<li>Can malware really cause terrible physical damage? YES! &#8211; <a href=\"https:\/\/nakedsecurity.sophos.com\/2014\/12\/29\/can-malware-and-hackers-really-cause-giant-physical-disasters\/\">https:\/\/nakedsecurity.sophos.com\/2014\/12\/29\/can-malware-and-hackers-really-cause-giant-physical-disasters\/<\/a> <\/li>\n<li>A journalist targeted by the Obama administration is suing the US government for using the USPS network to hack her computers &#8211; <a href=\"http:\/\/arstechnica.com\/tech-policy\/2015\/01\/going-postal-reporter-sues-government-for-spying-from-usps-network\/\">http:\/\/arstechnica.com\/tech-policy\/2015\/01\/going-postal-reporter-sues-government-for-spying-from-usps-network\/<\/a><\/li>\n<li>US Hotels, led by the Marriot, are fighting to legalise wifi blocking so they can create a monopoly on wifi within their hotels &#8211; <a href=\"http:\/\/boingboing.net\/2014\/12\/31\/marriott-hotels-plans-to-block.html\">http:\/\/boingboing.net\/2014\/12\/31\/marriott-hotels-plans-to-block.html<\/a><\/li>\n<li>Google cause some controversy by releasing proof of concept code for a zero-day bug in Windows 8.1. They gave MS 90 days to fix the bug before releasing the full details (the bug is &#8216;only&#8217; a privilege escalation bug, so there is no need to panic, but it is still serious) &#8211; <a href=\"https:\/\/nakedsecurity.sophos.com\/2015\/01\/03\/zero-day-in-windows-8-1-disclosed-by-google\/\">https:\/\/nakedsecurity.sophos.com\/2015\/01\/03\/zero-day-in-windows-8-1-disclosed-by-google\/<\/a> <\/li>\n<li>FTC suing data broker for selling payday loan data to scammers &#8211; <a href=\"http:\/\/krebsonsecurity.com\/2014\/12\/payday-loan-network-sold-info-to-scammers\/\">http:\/\/krebsonsecurity.com\/2014\/12\/payday-loan-network-sold-info-to-scammers\/<\/a> <\/li>\n<li>A look inside CryptoWall 2.0, the next generation of ransomware: <a href=\"http:\/\/arstechnica.com\/information-technology\/2015\/01\/inside-cryptowall-2-0-ransomware-professional-edition\/\">http:\/\/arstechnica.com\/information-technology\/2015\/01\/inside-cryptowall-2-0-ransomware-professional-edition\/<\/a> <\/li>\n<\/ul>\n<p><span style=\"font-size: 12.7272720336914px; line-height: 1.5;\"> <\/span><\/p>\n<p>Taming the Terminal Part 27 of n: DNS <a href=\"https:\/\/www.bartbusschots.ie\/s\/2015\/01\/10\/taming-the-terminal-part-27-of-n-dns\/\">https:\/\/www.bartbusschots.ie\/s\/2015\/01\/10\/taming-the-terminal-part-27-of-n-dns\/<\/a> <\/p>\n<p>That&#8217;s going to wind this up for this week, many thanks to our sponsor for helping to pay the bills, the makers of Clarify over at <a href=\"clarify-it.com\">clarify-it.com<\/a>. Don&#8217;t forget to send in your Dumb Questions, comments and suggestions by emailing me at <a href=\"mailto:allison@podfeet.com\">allison@podfeet.com<\/a>, follow me on <a href=\"http:\/\/twitter.com\/podfeet\">twitter<\/a> @podfeet.  Check out the <a href=\"https:\/\/plus.google.com\/communities\/117336672755291339814\" target=\"_blank\">NosillaCast Google Plus Community<\/a> too &#8211; lots of fun over there!  If you want to join in the fun of the live show, head on over to <a href=\"https:\/\/podfeet.com\/live\">podfeet.com\/live<\/a> on Sunday nights at 5pm Pacific Time and join the friendly and enthusiastic NosillaCastaways.  Thanks for listening, and stay subscribed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How much you really walk at CES, and the many faces of CES. We start playing our CES interviews with Mophie announcing their new Juice Packs for the iPhone 6 and 6+. Next we talked to the Lowes Innovation Labs about their OSHBot Robot and their virtual reality home improvement system using the Oculus Rift. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[147,173,1,1056],"tags":[],"class_list":["post-6074","post","type-post","status-publish","format-standard","hentry","category-blog-posts","category-nosillacast","category-podcasts","category-ttt"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/6074","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/comments?post=6074"}],"version-history":[{"count":2,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/6074\/revisions"}],"predecessor-version":[{"id":6076,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/6074\/revisions\/6076"}],"wp:attachment":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media?parent=6074"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/categories?post=6074"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/tags?post=6074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}