Liên kết hữu ích

  • MARTIN - G8JNJ - ECLECTIC AETHER - Adventures with Amateur Radio
  • Owen Duffy VK2OMD (ex VK1OD) - Good practical information relating to Electronics, Antennas, Feedlines, Baluns & just about everything else
  • Steve G3TXQ - Home of the Broadband Hexbeam and 1:1 Balun common mode impedance charts
  • Tom W8JI - Lots of practical antenna information and theoretical analysis
  • Dan N3OX - Lots of antenna practical construction information (especially verticals) and theoretical analysis
  • Adam AB4OJ/VA7OJ - Excellent information relating to Icom Radios and associated items
  • Alan K0BG - Everything you will ever need to know about mobile operation and compact antennas
  • Phil AD5X - Lots of very interesting articles and construction projects
  • Ian GM3SEK - Lots of practical design info. Especially these pages on cost effective common mode choke design
  • Jim KY9C - Loads of design and measurement information relating to common mode chokes
  • Chuck W1HIS - More notes on ferrite common mode chokes. Showing what you need to do to reduce EMI problems
  • L.B Cebik W4ML (SK) - The best resource for antenna design and modelling (free but you need to create a login account)
  • https://re-ws.pl

RSS Radio for Everyone

  • FM Audio Transmitters - Portables and Car Hands-Free
    FM Audio Transmitters - Portables and Car Hands-FreeI'm using FM transmitters for years, both portables and vehicle versions, and pretty much used the majority of types on the market, so here's how they work and which ones I recommend.How FM transmitters work?Output audio from a device via FM transmission standard: you set a frequency on […]
  • Review: Nooelec Rattlesnake 3-antenna kit
    Three antennas with magnetic mount and coax for $16:Review and observations are based on over half a year's use, summary: order from manufacturer, Amazon USA, or eBay right away. Rattlesnake kit is the best value aftermarket antenna package I ever came across. Period.Direct competitor on price ($15 on Amazon) is rtl-sdr.com's antenna kit, separate review here.First impressionsHeavy, feels good when opening the envelope:M5: Screw standard referring to […]
  • Portable Bluetooth Audio Signal Receivers
    Receive an audio signal up to 50 feet / 15 meters - best replacement for wires, also work as hands-free in a vehicle. Hands-on guide and five units tested and compared: cheap from China, for Hi-Fi, and midrange and expensive hands-free. Regardless of locale and prices, these four types cover most flavors on the market.What […]
  • Maximum USB cable length
    Question often comes up, Answer: 27 feet / 9 meters with RTL-SDR dongles:For testing, I tried four separate RTL-SDR dongles in image above: rtl-sdr.com v3, Nooelec Mini 2, Nooelec E4000 SMArtee and regular Nooelec SMArt.USB connector cable is crucial, as mentioned in a previous post detailing stuff I'm happy with, blue 5 feet / 1.5 m […]
  • RTL-SDR Dongles Image Gallery
    Studio Photos of over 20 RTL-SDR dongles on the market:More than 200 high-resolutions PCB, case and comparison images by clicking here.

RSS Run my experiment on GENI

  • TCP BBR for Ultra-Low Latency Networking: Challenges, Analysis, and Solutions
    In this experiment, we will show how to replicate the key result of the following published paper: Rajeev Kumar, Athanasios Koutsaftis, Fraida Fund, Gaurang Naik, Pei Liu, Yong Liu, Shivendra Panwar, "TCP BBR for Ultra-Low Latency Networking: Challenges, Analysis, and Solutions", in proceedings of IFIP Networking 2019, Warsaw, Poland. To
  • Network reconnaissance and vulnerability assessment
    In this experiment, we will practice network reconnaissance: gathering information about a network, such as the network structure, applications and services, and vulnerabilities. This experiment involves running a potentially disruptive application over a private network within your slice on GENI. Take special care not to use this application in ways
  • SSL Stripping Attack
    In this experiment, we will set up an SSL stripping attack on GENI and will demonstrate what the attack does to the encrypted communication between a client and a site. We will examine what information an “attacker” can see by using the attack and under what conditions the attack works.

RSS Crazy Danish Hacker

RSS Blog – Hackaday

  • Build Yourself A Set Of Glowing Wings
    Humans didn’t come with wings from the factory, and most efforts to fit them after the fact have been at least as far as flight is concerned, largely fruitless. That doesn’t mean you can’t cut a devastatingly sharp aesthetic though, and [Natalina’s] fiber optic wings are a great way to …read more
  • An Optocoupler Doorbell Notifier
    Over the years we’ve seen several attempts at adding Internet connectivity to the lowly wired doorbell. Generally, these projects aim to piggyback on the existing wiring, bells, and buttons rather than replace them entirely. Which invariably means at some point the AC wiring is going to need to interface with …read more
  • A DIY Retrocomputer Programmed in Pure Rust
    Can you generate VGA and handle a PS/2 keyboard with a Cortex-M4 in Rust? That’s precisely what [theJPster] wanted to find out with Monotron, a 1980s style home computer programmed in pure Rust. In order to run embedded Rust without a working operating system, some tools are necessary: an LLVM …read more

RSS ZeroSec – Adventures In Information Security

  • So You Want to Learn [Red] Teaming?
    Red Teaming is something that takes a bit of experience to actually nail, it's not something you expect to walk into after doing a four year uni course or something to pick up with little to no actual security experience.
  • DNS - Setting the Record Straight
    The domain name systems, more commonly referred to as DNS is essentially a phone book of the Internet. Ler's take a deep dive into DNS.
  • Bloodhound 2.2 - A Tool for Many Tradecrafts
    Bloodhound is a tool for enumeration of an active directory environment. It maps out relationships between active directory objects and is useful for Pentesting and Red Teaming.

RSS Genesys Guru Blog

  • Genesys Integration on The Wire (IOTW)
    Following on from a previous post on Genesys Management 2.0 here I’ve been doing some additional work on integrating Genesys environments with Elasticsearch. The result is what I call Genesys Integration on The Wire (IOTW).     Integration on The Wire (IOTW) is a technology which enables system level integration based on a “zero touch” […]
  • Genesys Management 2.0
    Hi – I’m back! Unfortunately, due to client confidentiality I’ve not been able to blog about Genesys work projects for a few years. Let’s change that .. This post is about something I have been looking at for several years in the form of a shelved project which gets events from Genesys components via the […]
  • 2016 Xmas Light show using Raspberry Pi Controller
    Enjoy!  

RSS fetch( ); decode( ); execute( );

  • Sending Samples to Python from GRC using ZMQ Sink
    When we need to process some data generated by an SDR device, the most convenient approach we have currently is saving the data into a file and then reading the files from Python. However, if the requirement is to process data in real-time as they are generated from the SDR device, saving to a file […]
  • Starting Viber with too large resolution
    After installing a brand new Ubuntu 18.04 LTS on my computer, I made some adjustments to the font sizes of the operating system in order to make it better suit for my perception. However, I realized that something is wrong after installing Viber on my desktop. The GUI of the Viber application appears so huge […]
  • Truly Reproducible Research Papers
    A slide from Prof. Barry Smyth's presentationIf you perform an experiment and get some interesting results which cannot be redone and get the same results by somebody else, something is wrong with your finding. This is called reproducibility of research. If it is not reproducible, it is not science. You might think that systematic research […]

RSS AMSAT-UK

  • Report on Es’hail-2 / QO-100 geostationary satellite carrying amateur radio
    Videos of the presentations given at the AMSAT-UK International Space Colloquium, which was held as part of the RSGB Convention in Milton Keynes, October 12-13, 2019, are being made available on YouTube. A recent release is the talk on the … Continue reading →
  • Inspiring Youth with Science in Space
    NASA highlight the role of amateur radio in letting young people speak directly with astronauts and cosmonauts on the International Space Station: An ARISS contact takes place as a part of a comprehensive suite of education activities. To prepare for … Continue reading →
  • Brazil: High school students shown amateur radio
    Brazilian radio amateurs participated in a Science Fair at Gonçalves Dias School, Boa Vista on October 16, 2019. Paulo PV8DX used basic concepts of physics and geography when explaining amateur radio to the students. As well as theory they there … Continue reading →

RSS Gough's Tech Zone

RSS Compass Security Blog

  • Introducing Web Vulnerabilities into Native Apps
    Mobile applications nowadays make heavy use of WebViews in order to render their user interfaces. Frameworks such as PhoneGap / Apache Cordova are even used to implement most of the application's functionalities using WebViews only. While native code, both in Android and in iOS, can quickly be analyzed using dynamic analysis tools like Frida, operations […]
  • There is such thing as a free lunch
    Usually you need to pay for lunches with cash or using your credit card. But in some places employees can pay for a lunch using their access badge. And this is the payment method that will be covered in this blogpost.
  • A Smart Card Odyssey
    Black box analysis of a not so smart card in ID-1 form factor that is in use for the billing of washing machines and tumble driers.

RSS 0xicf

  • ClearEnergy ransomware can destroy process automation logics in critical infrastructure, SCADA and industrial control systems.
    Schneider Electric, Allen-Bradley, General Electric (GE) and more vendors are vulnerable to ClearEnergy ransomware. Researchers at CRITIFENCE® Critical Infrastructure and SCADA/ICS Cyber Threats Research Group have demonstrated this week a new proof of concept ransomware attack aiming to erase (clear) the ladder logic diagram in Programmable Logic Controllers (PLCs). The ransomware a.k.a ClearEnergy affects a massive […]
  • Flaws in Samsung’s ‘Smart’ Home Let Hackers Unlock Doors and Set Off Fire Alarms
      A smoke detector that sends you a text alert when your house is on fire seems like a good idea. An internet-connected door lock with a PIN that can be programmed from your smartphone sounds convenient, too. But when a piece of malware can trigger that fire alarm at four in the morning or […]
  • Waze | Another way to track your moves
    Millions of drivers use Waze, a Google-owned navigation app, to find the best, fastest route from point A to point B. And according to a new study, all of those people run the risk of having their movements tracked by hackers. Researchers at the University of California-Santa Barbara recently discovered a Waze vulnerability that allowed […]

RSS Nick Whyte

  • 100 Warm Tunas 2018 Prediction Analysis
    Over the space of 6 weeks, 100 Warm Tunas collected a large sum of data and chugged away at it to make some predictions about what the Hottest 100 of 2018 would look like. In summary, We collected 6,234 entries (13.6% decrease since 2017 🔻). We tallied 58,463 votes across these entries (12.9% decrease since […]
  • 100 Warm Tunas has a new home!
    100 Warm Tunas has found a new home this year! This year’s results, along with the past 2 years can now be found at 100warmtunas.com. The existing domain (100-warm-tunas.nickwhyte.com) will simply perform a 301 permanent redirect to the new domain, so all existing inbound links should be unaffected.
  • 100 Warm Tunas 2017 Prediction Analysis
    🔥💯 🔥💯 Over the space of 6 weeks, 100 Warm Tunas collected a large sum of data and chugged away at it to make some predictions about what the Hottest 100 of 2017 would look like. Along the way we encountered a bug in the collection process, however data was backfilled and showed that I […]

RSS DB6SW (KF5OBS)

  • Arduino |Automatically Save Variables to EEPROM on Power-Down
    A recurring challenge for Arduino projects is that variables are volatile and will be lost completely unless previously stored to some sort of non-volatile storage such as de inbuilt EEPROM. This article shows a minimalistic approach to detect sudden loss of power and automatically store a variable to an EEPROM adress. First I should mention […]
  • Diamex Prog-S2 | Arduino IDE
    The Diamex Prog-S2 is an universal USB ISP programmer vor various microcontrollers including Atmel AVRs. This article shows how to integrate the programmer into the Arduino IDE There are a few articles on the web that talk about the Diamex Prog-S2 and Arduino. But it seemed to me like they were either outdated or faulty. […]
  • Automated Forward Gain Measurement
    This article is going to take you into the world of automation. Using MATLAB and commercial off-the-shelf bits and pieces, this article will show how to measure the forward gain of a RF device. For a long time now I had a bunch of Mini Circuits portable test equipment bits and pieces sitting around. S […]

RSS owenduffy.net

  • SimSmith – looking both ways – an LNA design task
    This article shows the use of SimSmith in design and analysis of the input circuit of an MGF1302 LNA. The MGF1302 is a low noise GaAs FET designed for S band to X band amplifiers, and was very popular in ham equipment until the arrival of pHEMT devices. An important characteristic of the MGF1302 is […]
  • Transmitter / antenna systems and the maximum power transfer theorem
    Jacobi’s Maximum Power Transfer Theorem Jacobi’s law (also known as Jacobi’s Maximum Power Transfer Theorem) of nearly 200 years ago stated Maximum power is transferred when the internal resistance of the source equals the resistance of the load. Implied is that the internal resistance of the source is held constant, it does not work otherwise. […]
  • CNC6040 router project – test cut of a Jiffy box
    One of the intended applications of the CNC router is to cut openings in Jiffy boxes for things like LCD displays, tactile button switches, connectors etc. After a lot of testing, it came time to try it on some target work. Above is a scrap Jiffy box and the milling job is to cut holes […]