Liên kết hữu ích
- MARTIN - G8JNJ - ECLECTIC AETHER - Adventures with Amateur Radio
- Owen Duffy VK2OMD (ex VK1OD) - Good practical information relating to Electronics, Antennas, Feedlines, Baluns & just about everything else
- Steve G3TXQ - Home of the Broadband Hexbeam and 1:1 Balun common mode impedance charts
- Tom W8JI - Lots of practical antenna information and theoretical analysis
- Dan N3OX - Lots of antenna practical construction information (especially verticals) and theoretical analysis
- Adam AB4OJ/VA7OJ - Excellent information relating to Icom Radios and associated items
- Alan K0BG - Everything you will ever need to know about mobile operation and compact antennas
- Phil AD5X - Lots of very interesting articles and construction projects
- Ian GM3SEK - Lots of practical design info. Especially these pages on cost effective common mode choke design
- Jim KY9C - Loads of design and measurement information relating to common mode chokes
- Chuck W1HIS - More notes on ferrite common mode chokes. Showing what you need to do to reduce EMI problems
- L.B Cebik W4ML (SK) - The best resource for antenna design and modelling (free but you need to create a login account)
- https://re-ws.pl
Run my testbed experiment
- UAV-assisted wireless localizationYou've been asked to contribute your machine learning expertise to a crucial and potentially life-saving mission.A pair of hikers has gone missing in a national park, and they are believed to be critically injured. Fortunately, they have activated a wireless locator beacon, and it transmits a constant
- Exploring the 5G RANIn this experiment, you will explore the 5G RAN by bringing up an end-to-end 5G network on a single server. You will see:how a 5G RAN can be split with the CU (centralized unit) handling SDAP, PDCP, and RRC layers, and the DU (distributed unit) handling RLC, MAC, PHY
- Exploring the 5G core networkIn this experiment, you will explore the 5G core network by bringing up an end-to-end 5G network on a single server. You will see:how 5G core network functions can be deployed in containersthe HTTP2/TCP interfaces between network functionsthe NGAP/SCTP interface between the 5G gNodeB and
Blog – Hackaday
- Reverse-Engineering The Holy Stone H120D DroneThere are plenty of drones (and other gadgets) you can buy online that use proprietary control protocols. Of course, reverse-engineering one of these protocols is a hacker community classic. Today, …read more
- Solar Balconies Take Europe By StormSolar power has been around for a long time now. Once upon a time, it was mostly the preserve of research projects and large-scale municipal installations. Eventually, as the technology …read more
- Refill UV Printer Ink Cartridges Like It’s The Late 90sThe Eufymake E1 is a recently-released prosumer UV printer that can print high-resolution color images onto pretty much anything. It also uses proprietary ink cartridges (which integrate a magnetic stirrer, …read more
ZephrSec – Adventures In Information Security
- Roll Your Own... LMSPeople say don't roll your own crypto but nobody ever warns you not to roll your own LMS (when you have minimal dev experience).
- LTR101 - Getting into Industry in 2026Breaking into cybersecurity in 2026: SOC roles, blue team skills, labs, certifications, and practical advice to help you land your first job.
- 2025 - Excelling at the Edge of BurnoutA look at my year: moving back to technical work, recovering from shoulder surgery, diving into photography, and building tools, blogs and labs.
fetch( ); decode( ); execute( );
- Running Blink Example on Raspberry Pi PicoToday, I managed to find some time to try out a Raspberry Pi Pico module that had been awaiting my attention at the lab for some months. More details about this module can be found in their website's documentation. The following are the steps that I followed to get their default LED blink example running […]
- Fundamentals of Radio Tomographic Imaging - Part 1Nodes vs Links Consider a wireless network consisting of \(K\) number of devices. If each and every device is communicating with each other, there will be a wireless link between each and every pair of nodes. The number of such unique two-way links is depicted as \(M\). The following equation describes relationship between \(M\) and […]
- Observing I2C Communication using Logic AnalyserFigure: Connectivity between a master (controller) and slaves (target). (source: https://en.wikipedia.org/wiki/I²C)Inter-integrated circuit (I2C) protocol is an advanced protocol, that eliminates many weaknesses in the UART and SPI protocols to provide communication between ICs using minimum number of wires. I2C consists of just two wires interconnecting one or many master devices with one or many slave […]
AMSAT-UK
- ISS Astronaut to use Amateur Radio to Talk to UK StudentsStudents at Simon Langton Grammar School for Boys will use amateur radio to speak to astronaut Jack Hathaway, KJ5NIV, on the International Space Station (ISS). The ARISS contact, between NA1SS on the ISS and GB4SLS at the school, will take … Continue reading →
- Students On The Air Satellite Activity Starts March 3AMSAT has announced the launch of Students On The Air (StOTA) Days, a new initiative aimed at encouraging student participation in amateur satellite operations. The activity was inspired by AMSAT President Drew Glasbrenner, KO4MA, and his son Carsten, KQ4SJM, and … Continue reading →
- Wick High School students to contact ISSStudents at Wick High School in East Caithness have been chosen by ARISS International to have an amateur radio contact with an astronaut on the International Space Station. The Wick High School Radio Club @GM0WHS posted on X: HUGE NEWS … Continue reading →
Gough's Tech Zone
- Teardown: UGREEN Finetrack G Item Finder for Google Find Hub (CM916, 65543P)In recent years, it seems the applications for Bluetooth Low Energy have grown and now, there are often a soup of different devices advertising even when you don’t expect it. Adding to this soup are Bluetooth tracking tags, which were … Continue reading →
- Project: Building an Optical Drive Tower of Power (& Associated Challenges)If you’re a bit of an optical media enthusiast like myself, you probably understand that an optical drive isn’t just an optical drive. They each have their own strengths and weaknesses – having more can be advantageous when you have … Continue reading →
- Tested: How Many Times Can a DVD±RW Be Rewritten? – Part 2: Methodology & ResultsNow that we’ve covered the contenders for this test, I will cover how this test will be performed and go through the results. It was a long time for me, but for you, it’ll just be a few hours between … Continue reading →
Compass Security Blog
- Common Entra ID Security Assessment Findings – Part 2: Privileged Unprotected GroupsIn part 2 of our 4-part series on common Entra ID security findings, we show how seemingly harmless group configurations can be abused to bypass security controls and gain high privileges. The post shows scenarios where insufficiently protected groups are used to: weaken Conditional Access protections for administrators enable privilege escalation through PIM for Groups […]
- Common Entra ID Security Assessment Findings – Part 1: Foreign Enterprise Applications With Privileged API PermissionsThis post is part of a small blog series covering common Entra ID security findings observed during real-world assessments. Each article explores selected findings in more detail to support a clearer understanding of the underlying risks and practical implications. Introduction In the vast majority of tenants we review, there are enterprise applications that originate from […]
- From Enumeration to Findings: The Security Findings Report in EntraFalconWe just released a big update for EntraFalcon. The new Security Findings Report adds an interactive HTML overview to EntraFalcon that consolidates tenant settings and object-based checks into structured security findings. Over 60 checks, graphical charts, filtering, export, and more options are now available.
Nick Whyte
- Ender 3 v2 Pen PlotterLast year I purchased myself an Ender 3 V2 3D Printer. It was a logical purchase, to compliment my home automation hobby, allowing me to design and print custom enclosures for miscellaneous ESPHome and Zigbee nodes. It turns out having a CoreXY 3D printer allows you to do more than just 3D printing if you’re […]
- 100 Warm Tunas 2018 Prediction AnalysisOver the space of 6 weeks, 100 Warm Tunas collected a large sum of data and chugged away at it to make some predictions about what the Hottest 100 of 2018 would look like. In summary, We collected 6,234 entries (13.6% decrease since 2017 🔻). We tallied 58,463 votes across these entries (12.9% decrease since […]
- 100 Warm Tunas has a new home!100 Warm Tunas has found a new home this year! This year’s results, along with the past 2 years can now be found at 100warmtunas.com. The existing domain (100-warm-tunas.nickwhyte.com) will simply perform a 301 permanent redirect to the new domain, so all existing inbound links should be unaffected.
Baltic Lab
- Conducted Emissions on the Bench: Implementing the CISPR 25 Voltage MethodThis article pulls back the curtain on CISPR 25 conducted-emissions testing, demonstrating how a fully functional voltage-method setup can be built and operated on a standard lab bench. This approach shows how conducted emissions can be characterized with precision using accessible tools and a carefully structured setup, while walking through all critical elements needed to […]
- WebP-Images without PluginWebP is a modern image format which shines through its fairly small filesize. Google recommends through their PageSpeed Insights that all PNG- and JPEG-files should be served as WebP images instead. There are of course plugins to facilitate the automatic generation of WebP versions of existing images but a few lines of PHP code and […]
- Firewall Rules with (dynamic) DNS HostnameUpdating and installing new firewall rules on remote servers always comes with the risk of locking yourself out completely. Many server administrators have inadvertently lost access to their servers, including SSH access, at some point due to a moment of inattention. This article shows how to install a backdoor on your own server that can […]