Pushing your boundaries and learning

The authors inner sprit animal when it comes to warm calling people…

So that was it – a week at Cyrise cyber boot camp for entrepreneurs of Australian cyber security. In a nut shell it was mind blowing! If your an Australian and you think you might have a great cyber security based idea, then this is a gig you must get in on.

Be prepared as your going to learn stuff, real important stuff, like being sat down in front of an excel spread sheet. Asked to crank on some initial financial projections by an experienced accountant (who has put some of his own money into startups).

Your going to have to get up in front of people and be able to talk about your product. Explain what it does and why it’s valuable, your going to learn to pitch and why it’s bloody important!

Calling industry people you don’t know on the phone to talk about your product (this really pushed my inner introvert I can tell you). I probably stunk like an old goat at the end of it (I could feel the sweat dripping off me) but hay that’s pushing your boundaries and learning.

If you have a great idea and have been thinking about it. Get into the next round you won’t regret it.

In closing I’d like to offer a big heart felt thanks to all the people who participated and contributed to our boot camp. But especially those on the coal front…

KIRSTIN MCINTOSH – Multitasker and social networker supreme (also the person who had faith in my idea).

CHLOÉ DUTSCHKE – Creative, marketing and brand guru who also kept us all very well fed (She also does a mean pod cast).

SCOTT HANDSAKER – The quiet guy at the back doing all the email stuff.

ALLEN JONES – (Not the bad one) Mr cool calm and collected who taught us all how to stand like gun slingers!


Challenges!

So I have been lucky enough to get into the CyRise Cyber Bootcamp it’s pushing lots and lots of buttons and making my brain hurt! But that’s a good thing – today there was this T-shirt that Allen was wearing and I sort of agree with it, but also I think about Steve Jobs and also the old addage “Build it and they will come!” and also this qoute… and yet other people who agree to disagree...

Hmm on one level at some point one must ship product ! The argument is still how and when! And what of the customer!

My Brain is full 🙂

(No 2 is Find a problem they will pay for…

Outages and other stuff

Well that took longer than I thought it would (site being down!). It’s interesting trying to get a computer server stack just right – I’m close with this build but it’s something that you have to keep on top of. Hence it took me a week or so to get the site up again – and I may have a hardware issue to sort out but that’s a story for another day, but also part of the reason it took me a while to re build. But I must also admit that the last build stood the test of time (about 2-3 years) so it’s not all bad.

Computer

Onward and up ward, the next phase is a blue green development enviroument so that hopefully this won’t happen again. We learn from our mistakes!

Runeaudio some thoughts

I spent a few hours this weekend mucking about with an old V2 Raspberry pi and the open source product roon audio. http://www.runeaudio.com It’s a pretty good little media management system. I can keep all my music (I’ve copied it to a usb attached to the pi) in one place and access – play that data from the pi to the amplifier. The beauty of course is that I can control the playback and search etc via any device on my local network (be it a phone or computer, ipad, tablet – anywhere in the house). One thing that is nice is it’s simple interface, and it is fairly easy set up. But I also have a few concerns that I thought I’d mention hear.

Security Once you have burnt the roon audio image to your pi you just plug it in and start the device. You can access it via the url http://runeaudio.local/ or by working out the ip address / number (you might have to look at your router to find this).This is very convenient but the issue is the product is not Password protected. So if your neighbour some how hacks your wireless network password, he or she could crank up your music system at 4 AM as a prank!

Another thing to consider is that the image has – uses a root super god user, and the password to that user is publicly available.  So after that neighbour cranks up your music they can ssh to the device with root privileges! Also there is no basic user space (ie anyone on the network can control the server) although there is a hack that can be run via the htpasswd process within the web server . This allows you to hand code that functionality into the product. http://www.runeaudio.com/forum/password-protection-t4372.html This is not ideal for a basic user! If you do install a roon audio server in your house – Do change the root ssh password, … NOW!

See this link for more information on how to do that. https://www.cyberciti.biz/faq/linux-set-change-password-how-to Also at the time of writing – wireless is not a secure medium. I recommend a long wireless password that will take hours if not days to hack. As it is currently configured a roon audio server could be a nasty attack vector for a hacker. Changing the root ssh user password is a good start but the file system is rather open (see screen shot) and that could be problematic if not managed in a better way. Unfortunately this is typical of may IOT style products – they need to take security as an important issue – an  initial configuration script could easily manage all of these faults and create a rounder better more secure product. So to sum up.

Ease of setup 8/10
User interface 8/10
Security 2/10

I’ll be keeping an eye on this product – If your not comfortable with the command line and security is important (it should be to everyone!)  it’s probably a good idea not to use this product just now – but if they get their act together around the security issues, I think it has the potential to be something that rivals some of the more expensive commercial products.