Related link: http://digitalmedia.oreilly.com/2005/08/17/myth_tv.html
After a longer gap than I would have liked, the second article in the MythTV series is up. The gap between the first and second articles was due to a grand tour of Asia for most of July. At the end of June, I rushed to get my system operational in advance of the trip, and I intended to file the second installment from my first stop in Australia.
Midway through the QuestNet conference in Australia, I logged in remotely to look at some configuration files to start filling in the sketchy parts of the article, but discovered instead that my machine had been compromised. The compromise was extremely easy to detect because the person (or script) that owned my machine made a mess of the rootkit installation, and several key commands stopped working. I had carefully secured the network, allowing only ssh in through my home firewall, but my Fedora installation enabled both ssh version 1 and ssh version 2. I suspect that I was hit with an ssh1 exploit, though I don’t know for sure.
One of the biggest surprises for me was where my time went. Although MythTV itself is complex, its installation is fairly straightforward, especially if you use a package system with good dependency checks. By far, the two most time-consuming tasks were getting the LCD panel on the front of my case working, and getting the remote control to work, both of which preceded the MythTV installation.