Yep. Jack Bauer uses them all the time. Every movie, TV show, novel, and newspaper article talks about them. Apparently, they exist as some magical device that at one time both renders a “server” impenetrable and throws open secret files to terrorists. Depending on the character in our little drama, there seems to always hide some trick or pathway around this “firewall” thing, and the description usually relies on pseudo-technical jargon to explain it away.
My wife and I home school our children using excellent videos from Abeka, and it works out very well. They can travel with me when the opportunity arises, work from the dentist’s waiting room, or whatever. Except for the problem of how to let the kids get to the Internet safely. Well, there’s all kinds of thoughts out there on the subject. Everything from “Don’t” (absolutist) to the school of thought that says “They’re Going to See It Anyway” (defeatist). Then there are the people who say, “My kids would never do anything like that…”
Well, it has been a while, so I thought I better at least complete this thought regarding XBMC. Overall, it is one of the slickest open source projects I’ve encountered. Well run, well designed, and very active. However, there are some downsides. Let me break this down as well as I can from my perspective.
Here is a link to my article on Linux.com. It is my first effort, and while it turned out pretty well, I think I’ll do some things different next time. And there will be a next time. 🙂
Give it a read and let me know what you think!
It’s been a little too long since my last post–apologies. Here’s what I’ve found out since then.
Well, this little issue hit me with a brief feeling of deja-vu. It is the exact same trouble that I faced trying to get Nessus security scanner frontend to write data to a MySQL database. I don’t know when exactly it changed, but new versions of MySQL writes passwords in a hashed table (and perhaps a new location, too) so that older apps trying to connect simply cannot read (or find) the password to authenticate the transaction. In other words, the biggest issue I was having with the XBMCMythTV script was this authentication issue.
Yes, I will now be referring to these efforts as the Joseph Baxter’s Smart Home Media Project ™. There’s no way I’ll be able to resist coming up with some sort of logo for that, I’m sure. 🙂
So, now to the part that, quite frankly, spooked me a little. Yeah, the Myth stuff was fairly hard, and my Linux knowledge is somewhat lacking, but it was just computer stuff. Nothing really too far outside of my comfort level. But this – hacking an xbox? That’s something only DJ Micro can do!
I’m very happy with MythTV up to this point. It is no where near as fragile as I feared it might be–in fact, it seems to be quite robust. A recent power outage knocked its pins out from under it, but by the time I checked, the machine was already back up and running. Part of that is the BIOS setting “Last State on Power Restore,” but if the software wasn’t up to the task no hardware setting is going to help.
It is official – I am a MythTV user. Well…let’s ammend that: I am in the possession of a fully installed and functional MythTV backend server. There were two things wrong with the Channel Changer program.