<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 22 Apr 2026 01:11:54 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Facebook”</title>
    <link>https://techsnap.systems/tags/facebook</link>
    <pubDate>Fri, 09 Aug 2019 00:15:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>409: Privacy Perspectives</title>
  <link>https://techsnap.systems/409</link>
  <guid isPermaLink="false">fb83ed86-b76d-4837-ac24-17ceb1f787aa</guid>
  <pubDate>Fri, 09 Aug 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/fb83ed86-b76d-4837-ac24-17ceb1f787aa.mp3" length="28249466" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We examine why it's so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.</itunes:subtitle>
  <itunes:duration>39:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We examine why it's so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.
Plus Apple's blaring bluetooth beacons and Facebook's worrying plans for WhatsApp. 
</description>
  <itunes:keywords>Privacy, privacy badger, ghostery, incognito, private browsing, canvas, webgl, VPN, wireguard, openvpn, browser fingerprinting, panopticlick, amiunique, apple, bluetooth, bluetooth le, bleee, mozilla, firefox, chrome, google, ad-blocking, advertising, adblock plus, ublock, ublock origin, facebook, WhatsApp, encryption, encryption debate, iphone, iOS, security, sysadmin podcast, DevOps, TechSNAP, jupiter broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We examine why it&#39;s so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.</p>

<p>Plus Apple&#39;s blaring bluetooth beacons and Facebook&#39;s worrying plans for WhatsApp.</p><p>Links:</p><ul><li><a title="Apple bleee. Everyone knows What Happens on Your iPhone – hexway" rel="nofollow" href="https://hexway.io/blog/apple-bleee/">Apple bleee. Everyone knows What Happens on Your iPhone – hexway</a> &mdash; If Bluetooth is ON on your Apple device everyone nearby can understand current status of your device, get info about battery, device name, Wi-Fi status, buffer availability, OS version and even get your mobile phone number

</li><li><a title="Facebook Plans on Backdooring WhatsApp - Schneier on Security" rel="nofollow" href="https://www.schneier.com/blog/archives/2019/08/facebook_plans_.html">Facebook Plans on Backdooring WhatsApp - Schneier on Security</a> &mdash; In Facebook's vision, the actual end-to-end encryption client itself such as WhatsApp will include embedded content moderation and blacklist filtering algorithms. These algorithms will be continually updated from a central cloud service, but will run locally on the user's device, scanning each cleartext message before it is sent and each encrypted message after it is decrypted.

</li><li><a title="Signal" rel="nofollow" href="https://signal.org/">Signal</a> &mdash; Privacy that fits in your pocket.
</li><li><a title="xkcd: Security" rel="nofollow" href="https://xkcd.com/538/">xkcd: Security</a> &mdash; Turns out it's a $5 wrench, even better!</li><li><a title="Jim Salter on Twitter" rel="nofollow" href="https://twitter.com/jrssnet/status/1152281183692185600">Jim Salter on Twitter</a> &mdash; I wonder why #privacy wonks aren't talking about browser fingerprinting more frequently? Privacy Badger, Ghostery, etc don't do a damn thing to prevent or mitigate Canvas / WebGL #fingerprinting.
</li><li><a title="Browser Fingerprinting: What Is It and What Should You Do About It? - PixelPrivacy" rel="nofollow" href="https://pixelprivacy.com/resources/browser-fingerprinting/">Browser Fingerprinting: What Is It and What Should You Do About It? - PixelPrivacy</a> &mdash; Browser fingerprinting is a powerful method that websites use to collect information about your browser type and version, as well as your operating system, active plugins, timezone, language, screen resolution and various other active settings.</li><li><a title="Canvas Fingerprinting - BrowserLeaks.com" rel="nofollow" href="https://browserleaks.com/canvas">Canvas Fingerprinting - BrowserLeaks.com</a> &mdash; The technique is based on the fact that the same canvas image may be rendered differently in different computers. This happens for several reasons. At the image format level – web browsers uses different image processing engines, image export options, compression level, the final images may got different checksum even if they are pixel-identical. At the system level – operating systems have different fonts, they use different algorithms and settings for anti-aliasing and sub-pixel rendering.

</li><li><a title="WebGL Browser Report - WebGL Fingerprinting - WebGL 2 Test - BrowserLeaks.com" rel="nofollow" href="https://browserleaks.com/webgl">WebGL Browser Report - WebGL Fingerprinting - WebGL 2 Test - BrowserLeaks.com</a> &mdash; WebGL Browser Report checks WebGL support in your web browser, produce WebGL Device Fingerprinting, and shows the other WebGL and GPU capabilities more or less related web browser identity.

</li><li><a title="AmIUnique" rel="nofollow" href="https://amiunique.org/faq">AmIUnique</a> &mdash; Device fingerprinting or browser fingerprinting is the systematic collection of information about a remote device, for identification purposes. Client-side scripting languages allow the development of procedures to collect very rich fingerprints: browser and operating system type and version, screen resolution, architecture type, lists of fonts, plugins, microphone, camera, etc.

</li><li><a title="Panopticlick" rel="nofollow" href="https://panopticlick.eff.org/">Panopticlick</a> &mdash; Panopticlick will analyze how well your browser and add-ons protect you against online tracking techniques. We’ll also see if your system is uniquely configured—and thus identifiable—even if you are using privacy-protective software. However, we only do so with your explicit consent, through the TEST ME button below.

</li><li><a title="How private is your browser’s Private mode? Research into porn suggests “not very” | Ars Technica" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/07/researchers-investigate-whether-major-advertisers-track-porn-habits-seems-likely/">How private is your browser’s Private mode? Research into porn suggests “not very” | Ars Technica</a> &mdash; This leaves browser fingerprinting as a method to tie your profiles together—and unfortunately, Incognito mode doesn't appear to help. </li><li><a title="Privacy Tools - Encryption Against Global Mass Surveillance" rel="nofollow" href="https://www.privacytools.io/">Privacy Tools - Encryption Against Global Mass Surveillance</a> &mdash; You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

</li><li><a title="‘Fingerprinting’ to Track Us Online Is on the Rise. Here’s What to Do. - The New York Times" rel="nofollow" href="https://www.nytimes.com/2019/07/03/technology/personaltech/fingerprinting-track-devices-what-to-do.html">‘Fingerprinting’ to Track Us Online Is on the Rise. Here’s What to Do. - The New York Times</a> &mdash; Fingerprinting involves looking at the many characteristics of your mobile device or computer, like the screen resolution, operating system and model, and triangulating this information to pinpoint and follow you as you browse the web and use apps. Once enough device characteristics are known, the theory goes, the data can be assembled into a profile that helps identify you the way a fingerprint would.</li><li><a title="Digital &#39;Fingerprinting&#39; Is The Next Generation Tracking Technology | The Takeaway | WNYC Studios" rel="nofollow" href="https://www.wnycstudios.org/story/digital-fingerprinting-next-generation-tracking-technology">Digital 'Fingerprinting' Is The Next Generation Tracking Technology | The Takeaway | WNYC Studios</a> &mdash; This growing technology is almost invisible, making it impossible for users to opt-out of the tracking system. As it becomes more popular, tech companies are developing new ways to try and protect consumers from this form of tracking. But is it going to work?

</li><li><a title="New Warning Issued Over Google&#39;s Chrome Ad-Blocking Plans" rel="nofollow" href="https://www.forbes.com/sites/kateoflahertyuk/2019/08/01/warning-issued-over-google-chrome-ad-blocking-plans/#7b020974219a">New Warning Issued Over Google's Chrome Ad-Blocking Plans</a> &mdash; The plans, dubbed Manifest V3, represent a major transformation to Chrome extensions including a revamp of the permissions system. As a result, modern ad blockers such as uBlock Origin—which uses Chrome’s webRequest API to block ads before they’re downloaded–won’t work. </li><li><a title="Comment on Chrome extension manifest v3 proposal by gorhill" rel="nofollow" href="https://github.com/uBlockOrigin/uBlock-issues/issues/338#issuecomment-496009417">Comment on Chrome extension manifest v3 proposal by gorhill</a> &mdash; The blocking ability of the webRequest API is still deprecated, and Google Chrome's limited matching algorithm will be the only one possible, and with limits dictated by Google employees.

It's annoying that they keep saying "the webRequest API is not deprecated" as if developers have been worried about this -- and as if they want to drown the real issue in a fabricated one nobody made.</li><li><a title="CanvasBlocker" rel="nofollow" href="https://addons.mozilla.org/en-US/firefox/addon/canvasblocker/">CanvasBlocker</a></li><li><a title="Ghostery" rel="nofollow" href="https://www.ghostery.com/">Ghostery</a></li><li><a title="Disconnect" rel="nofollow" href="https://disconnect.me/">Disconnect</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We examine why it&#39;s so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.</p>

<p>Plus Apple&#39;s blaring bluetooth beacons and Facebook&#39;s worrying plans for WhatsApp.</p><p>Links:</p><ul><li><a title="Apple bleee. Everyone knows What Happens on Your iPhone – hexway" rel="nofollow" href="https://hexway.io/blog/apple-bleee/">Apple bleee. Everyone knows What Happens on Your iPhone – hexway</a> &mdash; If Bluetooth is ON on your Apple device everyone nearby can understand current status of your device, get info about battery, device name, Wi-Fi status, buffer availability, OS version and even get your mobile phone number

</li><li><a title="Facebook Plans on Backdooring WhatsApp - Schneier on Security" rel="nofollow" href="https://www.schneier.com/blog/archives/2019/08/facebook_plans_.html">Facebook Plans on Backdooring WhatsApp - Schneier on Security</a> &mdash; In Facebook's vision, the actual end-to-end encryption client itself such as WhatsApp will include embedded content moderation and blacklist filtering algorithms. These algorithms will be continually updated from a central cloud service, but will run locally on the user's device, scanning each cleartext message before it is sent and each encrypted message after it is decrypted.

</li><li><a title="Signal" rel="nofollow" href="https://signal.org/">Signal</a> &mdash; Privacy that fits in your pocket.
</li><li><a title="xkcd: Security" rel="nofollow" href="https://xkcd.com/538/">xkcd: Security</a> &mdash; Turns out it's a $5 wrench, even better!</li><li><a title="Jim Salter on Twitter" rel="nofollow" href="https://twitter.com/jrssnet/status/1152281183692185600">Jim Salter on Twitter</a> &mdash; I wonder why #privacy wonks aren't talking about browser fingerprinting more frequently? Privacy Badger, Ghostery, etc don't do a damn thing to prevent or mitigate Canvas / WebGL #fingerprinting.
</li><li><a title="Browser Fingerprinting: What Is It and What Should You Do About It? - PixelPrivacy" rel="nofollow" href="https://pixelprivacy.com/resources/browser-fingerprinting/">Browser Fingerprinting: What Is It and What Should You Do About It? - PixelPrivacy</a> &mdash; Browser fingerprinting is a powerful method that websites use to collect information about your browser type and version, as well as your operating system, active plugins, timezone, language, screen resolution and various other active settings.</li><li><a title="Canvas Fingerprinting - BrowserLeaks.com" rel="nofollow" href="https://browserleaks.com/canvas">Canvas Fingerprinting - BrowserLeaks.com</a> &mdash; The technique is based on the fact that the same canvas image may be rendered differently in different computers. This happens for several reasons. At the image format level – web browsers uses different image processing engines, image export options, compression level, the final images may got different checksum even if they are pixel-identical. At the system level – operating systems have different fonts, they use different algorithms and settings for anti-aliasing and sub-pixel rendering.

</li><li><a title="WebGL Browser Report - WebGL Fingerprinting - WebGL 2 Test - BrowserLeaks.com" rel="nofollow" href="https://browserleaks.com/webgl">WebGL Browser Report - WebGL Fingerprinting - WebGL 2 Test - BrowserLeaks.com</a> &mdash; WebGL Browser Report checks WebGL support in your web browser, produce WebGL Device Fingerprinting, and shows the other WebGL and GPU capabilities more or less related web browser identity.

</li><li><a title="AmIUnique" rel="nofollow" href="https://amiunique.org/faq">AmIUnique</a> &mdash; Device fingerprinting or browser fingerprinting is the systematic collection of information about a remote device, for identification purposes. Client-side scripting languages allow the development of procedures to collect very rich fingerprints: browser and operating system type and version, screen resolution, architecture type, lists of fonts, plugins, microphone, camera, etc.

</li><li><a title="Panopticlick" rel="nofollow" href="https://panopticlick.eff.org/">Panopticlick</a> &mdash; Panopticlick will analyze how well your browser and add-ons protect you against online tracking techniques. We’ll also see if your system is uniquely configured—and thus identifiable—even if you are using privacy-protective software. However, we only do so with your explicit consent, through the TEST ME button below.

</li><li><a title="How private is your browser’s Private mode? Research into porn suggests “not very” | Ars Technica" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/07/researchers-investigate-whether-major-advertisers-track-porn-habits-seems-likely/">How private is your browser’s Private mode? Research into porn suggests “not very” | Ars Technica</a> &mdash; This leaves browser fingerprinting as a method to tie your profiles together—and unfortunately, Incognito mode doesn't appear to help. </li><li><a title="Privacy Tools - Encryption Against Global Mass Surveillance" rel="nofollow" href="https://www.privacytools.io/">Privacy Tools - Encryption Against Global Mass Surveillance</a> &mdash; You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

</li><li><a title="‘Fingerprinting’ to Track Us Online Is on the Rise. Here’s What to Do. - The New York Times" rel="nofollow" href="https://www.nytimes.com/2019/07/03/technology/personaltech/fingerprinting-track-devices-what-to-do.html">‘Fingerprinting’ to Track Us Online Is on the Rise. Here’s What to Do. - The New York Times</a> &mdash; Fingerprinting involves looking at the many characteristics of your mobile device or computer, like the screen resolution, operating system and model, and triangulating this information to pinpoint and follow you as you browse the web and use apps. Once enough device characteristics are known, the theory goes, the data can be assembled into a profile that helps identify you the way a fingerprint would.</li><li><a title="Digital &#39;Fingerprinting&#39; Is The Next Generation Tracking Technology | The Takeaway | WNYC Studios" rel="nofollow" href="https://www.wnycstudios.org/story/digital-fingerprinting-next-generation-tracking-technology">Digital 'Fingerprinting' Is The Next Generation Tracking Technology | The Takeaway | WNYC Studios</a> &mdash; This growing technology is almost invisible, making it impossible for users to opt-out of the tracking system. As it becomes more popular, tech companies are developing new ways to try and protect consumers from this form of tracking. But is it going to work?

</li><li><a title="New Warning Issued Over Google&#39;s Chrome Ad-Blocking Plans" rel="nofollow" href="https://www.forbes.com/sites/kateoflahertyuk/2019/08/01/warning-issued-over-google-chrome-ad-blocking-plans/#7b020974219a">New Warning Issued Over Google's Chrome Ad-Blocking Plans</a> &mdash; The plans, dubbed Manifest V3, represent a major transformation to Chrome extensions including a revamp of the permissions system. As a result, modern ad blockers such as uBlock Origin—which uses Chrome’s webRequest API to block ads before they’re downloaded–won’t work. </li><li><a title="Comment on Chrome extension manifest v3 proposal by gorhill" rel="nofollow" href="https://github.com/uBlockOrigin/uBlock-issues/issues/338#issuecomment-496009417">Comment on Chrome extension manifest v3 proposal by gorhill</a> &mdash; The blocking ability of the webRequest API is still deprecated, and Google Chrome's limited matching algorithm will be the only one possible, and with limits dictated by Google employees.

It's annoying that they keep saying "the webRequest API is not deprecated" as if developers have been worried about this -- and as if they want to drown the real issue in a fabricated one nobody made.</li><li><a title="CanvasBlocker" rel="nofollow" href="https://addons.mozilla.org/en-US/firefox/addon/canvasblocker/">CanvasBlocker</a></li><li><a title="Ghostery" rel="nofollow" href="https://www.ghostery.com/">Ghostery</a></li><li><a title="Disconnect" rel="nofollow" href="https://disconnect.me/">Disconnect</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>407: Old School Outages</title>
  <link>https://techsnap.systems/407</link>
  <guid isPermaLink="false">a442674d-ddd6-471a-ac89-448f1d9a3284</guid>
  <pubDate>Wed, 10 Jul 2019 22:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a442674d-ddd6-471a-ac89-448f1d9a3284.mp3" length="30618354" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Jim shares his Nagios tips and Wes chimes in with some modern monitoring tools as we chat monitoring in the wake of some high-profile outages.</itunes:subtitle>
  <itunes:duration>42:31</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.
Plus we turn our eye to hardware and get excited about the latest Ryzen line from AMD. 
</description>
  <itunes:keywords>Ryzen, AMD, Epyc, Intel, CPU, server, server builds, performance, benchmarks, internet, xeon, ecc, outages, google, cloudflare, facebook, microsoft, BGP, regex, deployment, verizon, RKPI, bgp leak, internet infrastructure, monitoring, openNMS, libreNMS, nagios, zabbix, prometheus, riemann, time series, metrics, logs, logging, observability, grafana, netdata, NRPE, old school, sysadmin, infosec, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.</p>

<p>Plus we turn our eye to hardware and get excited about the latest Ryzen line from AMD.</p><p>Links:</p><ul><li><a title="Third parties confirm AMD’s outstanding Ryzen 3000 numbers | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/07/third-parties-confirm-amds-outstanding-ryzen-3000-numbers/">Third parties confirm AMD’s outstanding Ryzen 3000 numbers | Ars Technica</a> &mdash; AMD debuted its new Ryzen 3000 desktop CPU line a few weeks ago at E3, and it looked fantastic. For the first time in 20 years, it looked like AMD could go head to head with Intel's desktop CPU line-up across the board. The question: would independent, third-party testing back up AMD's assertions?</li><li><a title="The Internet broke today: Facebook, Verizon, and more see major outages | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2019/07/facebook-cloudflare-microsoft-and-twitter-suffer-outages/">The Internet broke today: Facebook, Verizon, and more see major outages | Ars Technica</a> &mdash; Last week, Verizon caused a major BGP misroute that took large chunks of the Internet, including CDN company Cloudflare, partially down for a day. This week, the rest of the Internet has apparently asked Verizon to hold its beer.

</li><li><a title="It was a really bad month for the internet | TechCrunch" rel="nofollow" href="https://techcrunch.com/2019/07/05/bad-month-for-the-internet/">It was a really bad month for the internet | TechCrunch</a> &mdash; In the past month there were several major internet outages affecting millions of users across the world. Sites buckled, services broke, images wouldn’t load, direct messages ground to a halt and calendars and email were unavailable for hours at a time.</li><li><a title="Cloudflare outage caused by bad software deploy (updated)" rel="nofollow" href="https://blog.cloudflare.com/cloudflare-outage/">Cloudflare outage caused by bad software deploy (updated)</a> &mdash; For about 30 minutes today, visitors to Cloudflare sites received 502 errors caused by a massive spike in CPU utilization on our network. This CPU spike was caused by a bad software deploy that was rolled back.
</li><li><a title="How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today" rel="nofollow" href="https://blog.cloudflare.com/how-verizon-and-a-bgp-optimizer-knocked-large-parts-of-the-internet-offline-today/">How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today</a> &mdash; Today at 10:30UTC, the Internet had a small heart attack. A small company in Northern Pennsylvania became a preferred path of many Internet routes through Verizon (AS701), a major Internet transit provider. </li><li><a title="Getting started | Prometheus" rel="nofollow" href="https://prometheus.io/docs/prometheus/latest/getting_started/">Getting started | Prometheus</a> &mdash; This guide is a "Hello World"-style tutorial which shows how to install, configure, and use Prometheus in a simple example setup. </li><li><a title="prometheus/node_exporter" rel="nofollow" href="https://github.com/prometheus/node_exporter">prometheus/node_exporter</a> &mdash; Prometheus exporter for hardware and OS metrics exposed by *NIX kernels, written in Go with pluggable metric collectors.

</li><li><a title="Using netdata with Prometheus" rel="nofollow" href="https://docs.netdata.cloud/backends/prometheus/">Using netdata with Prometheus</a> &mdash; Prometheus is a distributed monitoring system which offers a very simple setup along with a robust data model. Recently netdata added support for Prometheus.</li><li><a title="prometheus/nagios_plugins" rel="nofollow" href="https://github.com/prometheus/nagios_plugins">prometheus/nagios_plugins</a> &mdash; Nagios plugin for alerting on prometheus query results.</li><li><a title="RobustPerception/nrpe_exporter" rel="nofollow" href="https://github.com/RobustPerception/nrpe_exporter">RobustPerception/nrpe_exporter</a> &mdash; The NRPE exporter exposes metrics on commands sent to a running NRPE daemon.

</li><li><a title="m-lab/prometheus-nagios-exporter" rel="nofollow" href="https://github.com/m-lab/prometheus-nagios-exporter">m-lab/prometheus-nagios-exporter</a> &mdash; The Prometheus Nagios exporter reads status and performance data from nagios plugins via the MK Livestatus Nagios plugin and publishes this in a form that can be scrapped by Prometheus.</li><li><a title="Comparison to alternatives | Prometheus" rel="nofollow" href="https://prometheus.io/docs/introduction/comparison/">Comparison to alternatives | Prometheus</a> &mdash; Prometheus is a full monitoring and trending system that includes built-in and active scraping, storing, querying, graphing, and alerting based on time series data.</li><li><a title="Quality server monitoring solution using NetData/Prometheus/Grafana" rel="nofollow" href="https://nemanja.io/quality-server-monitoring-solution-using-netdata-prometheus-grafana/">Quality server monitoring solution using NetData/Prometheus/Grafana</a> &mdash; I’m going to quickly show you how to install both netdata and Prometheus on the client and server. We can then use grafana pointed at Prometheus to obtain long-term metrics netdata offers.</li><li><a title="Monitoring stack by using Grafana + Prometheus + Netdata" rel="nofollow" href="https://medium.com/@jomzsg/monitoring-stack-by-using-grafana-prometheus-netdata-f9940d6804c8">Monitoring stack by using Grafana + Prometheus + Netdata</a> &mdash; This monitoring stack you can monitoring in real-time by Netdata and see the history by using Grafana.</li><li><a title="Monitoring Agent · NCPA" rel="nofollow" href="https://www.nagios.org/ncpa/">Monitoring Agent · NCPA</a> &mdash; New to NCPA? See some of the awesome features present in the Web GUI and API, available on any operating system.

</li><li><a title="Nagios 101: Understanding the Fundamentals - Nagios" rel="nofollow" href="https://www.nagios.com/nagios-101-understanding-fundamentals/">Nagios 101: Understanding the Fundamentals - Nagios</a></li><li><a title="Nagios Documentation " rel="nofollow" href="https://www.nagios.org/documentation/">Nagios Documentation </a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.</p>

<p>Plus we turn our eye to hardware and get excited about the latest Ryzen line from AMD.</p><p>Links:</p><ul><li><a title="Third parties confirm AMD’s outstanding Ryzen 3000 numbers | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/07/third-parties-confirm-amds-outstanding-ryzen-3000-numbers/">Third parties confirm AMD’s outstanding Ryzen 3000 numbers | Ars Technica</a> &mdash; AMD debuted its new Ryzen 3000 desktop CPU line a few weeks ago at E3, and it looked fantastic. For the first time in 20 years, it looked like AMD could go head to head with Intel's desktop CPU line-up across the board. The question: would independent, third-party testing back up AMD's assertions?</li><li><a title="The Internet broke today: Facebook, Verizon, and more see major outages | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2019/07/facebook-cloudflare-microsoft-and-twitter-suffer-outages/">The Internet broke today: Facebook, Verizon, and more see major outages | Ars Technica</a> &mdash; Last week, Verizon caused a major BGP misroute that took large chunks of the Internet, including CDN company Cloudflare, partially down for a day. This week, the rest of the Internet has apparently asked Verizon to hold its beer.

</li><li><a title="It was a really bad month for the internet | TechCrunch" rel="nofollow" href="https://techcrunch.com/2019/07/05/bad-month-for-the-internet/">It was a really bad month for the internet | TechCrunch</a> &mdash; In the past month there were several major internet outages affecting millions of users across the world. Sites buckled, services broke, images wouldn’t load, direct messages ground to a halt and calendars and email were unavailable for hours at a time.</li><li><a title="Cloudflare outage caused by bad software deploy (updated)" rel="nofollow" href="https://blog.cloudflare.com/cloudflare-outage/">Cloudflare outage caused by bad software deploy (updated)</a> &mdash; For about 30 minutes today, visitors to Cloudflare sites received 502 errors caused by a massive spike in CPU utilization on our network. This CPU spike was caused by a bad software deploy that was rolled back.
</li><li><a title="How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today" rel="nofollow" href="https://blog.cloudflare.com/how-verizon-and-a-bgp-optimizer-knocked-large-parts-of-the-internet-offline-today/">How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today</a> &mdash; Today at 10:30UTC, the Internet had a small heart attack. A small company in Northern Pennsylvania became a preferred path of many Internet routes through Verizon (AS701), a major Internet transit provider. </li><li><a title="Getting started | Prometheus" rel="nofollow" href="https://prometheus.io/docs/prometheus/latest/getting_started/">Getting started | Prometheus</a> &mdash; This guide is a "Hello World"-style tutorial which shows how to install, configure, and use Prometheus in a simple example setup. </li><li><a title="prometheus/node_exporter" rel="nofollow" href="https://github.com/prometheus/node_exporter">prometheus/node_exporter</a> &mdash; Prometheus exporter for hardware and OS metrics exposed by *NIX kernels, written in Go with pluggable metric collectors.

</li><li><a title="Using netdata with Prometheus" rel="nofollow" href="https://docs.netdata.cloud/backends/prometheus/">Using netdata with Prometheus</a> &mdash; Prometheus is a distributed monitoring system which offers a very simple setup along with a robust data model. Recently netdata added support for Prometheus.</li><li><a title="prometheus/nagios_plugins" rel="nofollow" href="https://github.com/prometheus/nagios_plugins">prometheus/nagios_plugins</a> &mdash; Nagios plugin for alerting on prometheus query results.</li><li><a title="RobustPerception/nrpe_exporter" rel="nofollow" href="https://github.com/RobustPerception/nrpe_exporter">RobustPerception/nrpe_exporter</a> &mdash; The NRPE exporter exposes metrics on commands sent to a running NRPE daemon.

</li><li><a title="m-lab/prometheus-nagios-exporter" rel="nofollow" href="https://github.com/m-lab/prometheus-nagios-exporter">m-lab/prometheus-nagios-exporter</a> &mdash; The Prometheus Nagios exporter reads status and performance data from nagios plugins via the MK Livestatus Nagios plugin and publishes this in a form that can be scrapped by Prometheus.</li><li><a title="Comparison to alternatives | Prometheus" rel="nofollow" href="https://prometheus.io/docs/introduction/comparison/">Comparison to alternatives | Prometheus</a> &mdash; Prometheus is a full monitoring and trending system that includes built-in and active scraping, storing, querying, graphing, and alerting based on time series data.</li><li><a title="Quality server monitoring solution using NetData/Prometheus/Grafana" rel="nofollow" href="https://nemanja.io/quality-server-monitoring-solution-using-netdata-prometheus-grafana/">Quality server monitoring solution using NetData/Prometheus/Grafana</a> &mdash; I’m going to quickly show you how to install both netdata and Prometheus on the client and server. We can then use grafana pointed at Prometheus to obtain long-term metrics netdata offers.</li><li><a title="Monitoring stack by using Grafana + Prometheus + Netdata" rel="nofollow" href="https://medium.com/@jomzsg/monitoring-stack-by-using-grafana-prometheus-netdata-f9940d6804c8">Monitoring stack by using Grafana + Prometheus + Netdata</a> &mdash; This monitoring stack you can monitoring in real-time by Netdata and see the history by using Grafana.</li><li><a title="Monitoring Agent · NCPA" rel="nofollow" href="https://www.nagios.org/ncpa/">Monitoring Agent · NCPA</a> &mdash; New to NCPA? See some of the awesome features present in the Web GUI and API, available on any operating system.

</li><li><a title="Nagios 101: Understanding the Fundamentals - Nagios" rel="nofollow" href="https://www.nagios.com/nagios-101-understanding-fundamentals/">Nagios 101: Understanding the Fundamentals - Nagios</a></li><li><a title="Nagios Documentation " rel="nofollow" href="https://www.nagios.org/documentation/">Nagios Documentation </a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 377: Linux Under Pressure</title>
  <link>https://techsnap.systems/377</link>
  <guid isPermaLink="false">01754d0c-6956-4f6e-a545-e7ec9f178bb5</guid>
  <pubDate>Wed, 01 Aug 2018 10:30:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/01754d0c-6956-4f6e-a545-e7ec9f178bb5.mp3" length="25089856" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.</itunes:subtitle>
  <itunes:duration>29:15</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.
Plus the death of a TLD, the return of SamSam, and more! 
</description>
  <itunes:keywords>PSI, oomd, Facebook, out-of-memory, oom, SamSam, Ransomeware, Malware, cryptoware, Open source Jobs, Sysadmin Podcast, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.</p>

<p>Plus the death of a TLD, the return of SamSam, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="psi: pressure stall information for CPU, memory, and IO v2" rel="nofollow" href="https://lwn.net/Articles/759658/">psi: pressure stall information for CPU, memory, and IO v2</a> &mdash; PSI aggregates and reports the overall wallclock time in which the
tasks in a system (or cgroup) wait for contended hardware resources.</li><li><a title="Chinese “hackers” are sending malware via snail mail" rel="nofollow" href="https://techcrunch.com/2018/07/30/chinese-hackers-are-sending-malware-via-snail-mail/">Chinese “hackers” are sending malware via snail mail</a> &mdash; The trick is simple: a package arrives with a Chinese postmark containing a rambling message and a small CD. The CD, in turn, contains a set of Word files that include script-based malware. These scripts run when the victims access them on their computers, presumably resulting in compromised systems.</li><li><a title="The death of a TLD" rel="nofollow" href="https://blog.benjojo.co.uk/post/the-death-of-a-tld">The death of a TLD</a></li><li><a title="SamSam: The (almost) $6 million ransomware" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/07/31/samsam-the-almost-6-million-ransomware/">SamSam: The (almost) $6 million ransomware</a> &mdash; Through original analysis, interviews and research, and by collaborating closely with industry partners and a specialist cryptocurrency monitoring organisation, Sophos has uncovered new details about how the secretive and sophisticated SamSam ransomware is used, who’s been targeted, how it works and how it’s evolving.</li><li><a title="Open sourcing oomd, a new approach to handling OOMs" rel="nofollow" href="https://code.fb.com/production-engineering/open-sourcing-oomd-a-new-approach-to-handling-ooms/">Open sourcing oomd, a new approach to handling OOMs</a> &mdash; As our infrastructure has scaled, we’ve found that an increasing fraction of our machines and networks span multiple generations. One side effect of this multigenerational production environment is that a new software release or configuration change might result in a system running healthily on one machine but experiencing an out-of-memory (OOM) issue on another.</li><li><a title="Tyler&#39;s recent job story" rel="nofollow" href="https://pastebin.com/FnfbWygS">Tyler's recent job story</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.</p>

<p>Plus the death of a TLD, the return of SamSam, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="psi: pressure stall information for CPU, memory, and IO v2" rel="nofollow" href="https://lwn.net/Articles/759658/">psi: pressure stall information for CPU, memory, and IO v2</a> &mdash; PSI aggregates and reports the overall wallclock time in which the
tasks in a system (or cgroup) wait for contended hardware resources.</li><li><a title="Chinese “hackers” are sending malware via snail mail" rel="nofollow" href="https://techcrunch.com/2018/07/30/chinese-hackers-are-sending-malware-via-snail-mail/">Chinese “hackers” are sending malware via snail mail</a> &mdash; The trick is simple: a package arrives with a Chinese postmark containing a rambling message and a small CD. The CD, in turn, contains a set of Word files that include script-based malware. These scripts run when the victims access them on their computers, presumably resulting in compromised systems.</li><li><a title="The death of a TLD" rel="nofollow" href="https://blog.benjojo.co.uk/post/the-death-of-a-tld">The death of a TLD</a></li><li><a title="SamSam: The (almost) $6 million ransomware" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/07/31/samsam-the-almost-6-million-ransomware/">SamSam: The (almost) $6 million ransomware</a> &mdash; Through original analysis, interviews and research, and by collaborating closely with industry partners and a specialist cryptocurrency monitoring organisation, Sophos has uncovered new details about how the secretive and sophisticated SamSam ransomware is used, who’s been targeted, how it works and how it’s evolving.</li><li><a title="Open sourcing oomd, a new approach to handling OOMs" rel="nofollow" href="https://code.fb.com/production-engineering/open-sourcing-oomd-a-new-approach-to-handling-ooms/">Open sourcing oomd, a new approach to handling OOMs</a> &mdash; As our infrastructure has scaled, we’ve found that an increasing fraction of our machines and networks span multiple generations. One side effect of this multigenerational production environment is that a new software release or configuration change might result in a system running healthily on one machine but experiencing an out-of-memory (OOM) issue on another.</li><li><a title="Tyler&#39;s recent job story" rel="nofollow" href="https://pastebin.com/FnfbWygS">Tyler's recent job story</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
