Liên kết hữu ích
- MARTIN - G8JNJ - ECLECTIC AETHER - Adventures with Amateur Radio
- Owen Duffy VK2OMD (ex VK1OD) - Good practical information relating to Electronics, Antennas, Feedlines, Baluns & just about everything else
- Steve G3TXQ - Home of the Broadband Hexbeam and 1:1 Balun common mode impedance charts
- Tom W8JI - Lots of practical antenna information and theoretical analysis
- Dan N3OX - Lots of antenna practical construction information (especially verticals) and theoretical analysis
- Adam AB4OJ/VA7OJ - Excellent information relating to Icom Radios and associated items
- Alan K0BG - Everything you will ever need to know about mobile operation and compact antennas
- Phil AD5X - Lots of very interesting articles and construction projects
- Ian GM3SEK - Lots of practical design info. Especially these pages on cost effective common mode choke design
- Jim KY9C - Loads of design and measurement information relating to common mode chokes
- Chuck W1HIS - More notes on ferrite common mode chokes. Showing what you need to do to reduce EMI problems
- L.B Cebik W4ML (SK) - The best resource for antenna design and modelling (free but you need to create a login account)
- https://re-ws.pl
One-Forever Radio
- The Rise of Radio: How One Invention Changed Everyday LifeRadio did not appear overnight. Many people worked for years on signals, transmitters, and receivers. By 1920, radio was ready for public use. In Pittsburgh, […] The post The Rise of Radio: How One Invention Changed Everyday Life appeared first on One-Forever Radio.
- Who Really Invented the Radio?If you enjoy listening to music, podcasts, or even using your phone, you are already using radio waves. These waves are all around you—even when […] The post Who Really Invented the Radio? appeared first on One-Forever Radio.
- Top Internet Radio Shows and Podcasts in Surrey, BC—And Where They Store Their GearPodcasting and internet radio have seen tremendous growth in recent years, and Surrey, BC, is no exception. From local business insights to cultural discussions and […] The post Top Internet Radio Shows and Podcasts in Surrey, BC—And Where They Store Their Gear appeared first on One-Forever Radio.
- Tune In to Fun: Planning the Perfect DJ Birthday PartyIntroduction Picture this: a dance floor bathed in pulsating lights, the beat of your favorite tunes reverberating through the room, and a crowd of friends […] The post Tune In to Fun: Planning the Perfect DJ Birthday Party appeared first on One-Forever Radio.
- The difference between digital radio and internet radioDigital radio is not the same as Internet radio. Online radio uses a data stream received through Internet access via a computer, personal devices, or Internet-enabled radio. The post The difference between digital radio and internet radio appeared first on One-Forever Radio.
Blog – Hackaday
- ZPUI Could Be Your Tiny Embedded GUIOne of the most frustrating things to me is looking at a freshly-flashed and just powered up single board computer. My goal with them is always getting to a shell …read more
- ESP32 Dashboard is a Great Way to Stay InformedThe original ESP32 may be a little long in the tooth by now, but it remains a potent tool for connected devices. We were drawn to [Max Pflaum]’s ESP32 Dashboard …read more
- Just for Laughs: Charlie Douglass and the Laugh TrackI ran into an old episode of Hogan’s Heroes the other day that stuck me as odd. It didn’t have a laugh track. Ironically, the show was one where two pilots …read more
ZephrSec – Adventures In Information Security
- Expanding on ChunkyIngress - Clippy Goes Rogue (GoClipC2)GoClipC2: A covert Windows clipboard-based C2 channel for VDI/RDP environments. Bypasses network monitoring with encrypted Base64 messaging.
- The Human Element: Why AI-Generated Content Is Killing AuthenticityThey say AI is the future, but what they meant was Andy Intelligence.
- LOLCLOUD - Azure Arc - C2aaSExploring Azure Arc’s overlooked C2aaS potential. Attacking and Defending against its usage and exploring usecases.
fetch( ); decode( ); execute( );
- Running Blink Example on Raspberry Pi PicoToday, I managed to find some time to try out a Raspberry Pi Pico module that had been awaiting my attention at the lab for some months. More details about this module can be found in their website's documentation. The following are the steps that I followed to get their default LED blink example running […]
- Fundamentals of Radio Tomographic Imaging - Part 1Nodes vs Links Consider a wireless network consisting of \(K\) number of devices. If each and every device is communicating with each other, there will be a wireless link between each and every pair of nodes. The number of such unique two-way links is depicted as \(M\). The following equation describes relationship between \(M\) and […]
- Observing I2C Communication using Logic AnalyserFigure: Connectivity between a master (controller) and slaves (target). (source: https://en.wikipedia.org/wiki/I²C)Inter-integrated circuit (I2C) protocol is an advanced protocol, that eliminates many weaknesses in the UART and SPI protocols to provide communication between ICs using minimum number of wires. I2C consists of just two wires interconnecting one or many master devices with one or many slave […]
AMSAT-UK
- ISS Contact with Dublin StudentsStudents at Technological University of Dublin will talk via ham radio with astronaut Takaya Onishi KF5LKS on the International Space Station. The contact is scheduled for Wednesday, June 4, at 12:10 UTC (1:10 PM BST) via EI1ISS. The contact on … Continue reading →
- Video: A guide to using satellites in amateur radioThe online talk ‘Guide to using satellites in amateur radio’ given by Tim GW4VXE, on May 21, 2025, is now available to watch in the Pennine Ham channel on YouTube
- ISS Slow Scan TV May 5-12Slow Scan TV (SSTV) transmissions from the International Space Station are planned to take place from 1200 GMT on Monday, May 5, until 1800 GMT on Monday, May 12. The ARISS Series 27 images will commemorate the 80th anniversary of … Continue reading →
Gough's Tech Zone
- Project: Intentionally Defective DVDs (ft. LabelFlash) & Quality Scanning DoubtsMost of the time, a lot of effort is spent trying to get the best quality burns possible from a given combination of optical disc and potential candidate drives. But sometimes, producing intentionally defective discs may be useful in order … Continue reading →
- Review, Teardown: VTOMAN Jump 600X Extra Battery 640Wh (PB-23)A while back, I reviewed the VTOMAN Jump 600X Power Station and it seemed like a fair offering with a warranty that’s a bit on the short side (two years) but otherwise mostly did as it was advertised but with … Continue reading →
- Overdue Random: Vodafone Quirks, Short Circuits, Light Rail Testing, Cyberattacks & So Much MoreLet’s welcome the long weekend with this long post that I’ve been working on over a few weeks. Regular readers may think that, over the years, I’ve become some sort of purpose-driven blogging machine with the last true random posting appearing in … Continue reading →
Compass Security Blog
- LinkedIn for OSINT: tips and tricksWhen it comes to open source intelligence (OSINT), LinkedIn is a treasure trove of information. With millions of professionals voluntarily sharing details about their careers, connections, personal achievements, or keeping up to date with what is happening in their professional sphere, the famous networking platform is not to be underestimated when it comes to OSINT. […]
- Renovate – Keeping Your Updates Secure?Renovate is an OSS CLI/bot that updates your software dependencies automatically. It is usually integrated into the CI/CD process and runs on a schedule. It will create a Pull Request / Merge Request (PR/MR) to your repository with dependency updates. It can optionally auto-merge them. If you host it for several repositories or an organization, it […]
- Bypassing BitLocker Encryption: Bitpixie PoC and WinPE EditionDepending on the customer’s preference, possible initial access vectors in our red teaming exercises typically include deployment of dropboxes, (device code) phishing or a stolen portable device. The latter is usually a Windows laptop protected by BitLocker for full disk encryption without pre-boot authentication i.e. without a configured PIN or an additional key file. While […]
Nick Whyte
- Ender 3 v2 Pen PlotterLast year I purchased myself an Ender 3 V2 3D Printer. It was a logical purchase, to compliment my home automation hobby, allowing me to design and print custom enclosures for miscellaneous ESPHome and Zigbee nodes. It turns out having a CoreXY 3D printer allows you to do more than just 3D printing if you’re […]
- 100 Warm Tunas 2018 Prediction AnalysisOver the space of 6 weeks, 100 Warm Tunas collected a large sum of data and chugged away at it to make some predictions about what the Hottest 100 of 2018 would look like. In summary, We collected 6,234 entries (13.6% decrease since 2017 🔻). We tallied 58,463 votes across these entries (12.9% decrease since […]
- 100 Warm Tunas has a new home!100 Warm Tunas has found a new home this year! This year’s results, along with the past 2 years can now be found at 100warmtunas.com. The existing domain (100-warm-tunas.nickwhyte.com) will simply perform a 301 permanent redirect to the new domain, so all existing inbound links should be unaffected.
Baltic Lab
- WebP-Images without PluginWebP is a modern image format which shines through its fairly small filesize. Google recommends through their PageSpeed Insights that all PNG- and JPEG-files should be served as WebP images instead. There are of course plugins to facilitate the automatic generation of WebP versions of existing images but a few lines of PHP code and […]
- Firewall Rules with (dynamic) DNS HostnameUpdating and installing new firewall rules on remote servers always comes with the risk of locking yourself out completely. Many server administrators have inadvertently lost access to their servers, including SSH access, at some point due to a moment of inattention. This article shows how to install a backdoor on your own server that can […]
- Restoring proxied visitor IPs from CloudflareProxy servers are a great tool. Be it for security, filtering, load balancing through multiple origin servers or origin shielding. Unfortunately, reverse proxy requests make it a bit more difficult to recover the original visitor IPs. This article shows how to securely restore visitor IPs through the use of the Apache module mod_remoteip.