You can still get some electronic parts at Radio Shack. But they
aren't what they used to be.
Yeah, the huge section of components we remember from the Radio Shack of the 1970's has been replaced by a single cabinet with a bunch of tiny drawers in it, in which you might find a few fuses and connectors and things. RadioShack (note the innovative switch from two words to a single CamelCase word) now needs the floor space for crappy consumer electronics and overpriced HDMI cables.
We may do a little proof of concept hackup to see if we can get it to work for just a while. We won't be able to do a permanant install until "Point A" moves to a new building downtown which could be a month or two, but we can't do without Internet at "Point B" until then. I astill need to find some topographic maps to see just what we're up against. I won't be able to do line-of-sight I don't think. I'll have to do nLOS aiming high to get over some obstacles just odown the road from Point A, where we can't really put a mast. Point B shouldn't be very limited regarding what can we put up.
Wonder how much it costs to colo something on a cell twower as there's one literally right across the property line from us.
do it for cost savings as much as because the only internet we can get
is 1.5 MBPS for $129 a month after $200 setup and $395 equipment costs
Do you just call AT&T and say you want a T1 or something? I imagine
that's probably around $1000+ a month plus installation anyway, and for
1.544 MBPS at that.
Coworker got a strange call from a number in oklahoma. Call went
unanswered, but a voicemail was left. Coworker dialed into his VM box,
message was silence.
Then his phone started dialing an 866 number. He hung up.
Dialed back into voicemail, play the message, same thing happens.
Googling the 866 number returns hits that it's a credit card scam.
How the hell can a voicemail prompt a phone to dial out like that?
We have an Avaya IP Office phone system here.
I haven't heard of this particular trick before, but I can't see any way that it would actually work.
the voicemail. The call log on the phone showed two outbound calls.
In other news... i'm fed the fuck up with my ipod. So... put up a few
Looking at a Droid X or X2 as its replacement, eventually it may
replace my Treo. I have very little experience with droids, but since
they're not tied to itunes it's got to be an improvement. Used my ipod
mostly as a music player, same way my old 2nd-gen iPod got used... Nice
to throw pics on it though, and the browser/email features on wifi was
nice. I really didn't use "apps" aside from iBooks with all my service
manuals on it.
Having previous experience with TI's OMAP processors... snappy and work
well... the X has that going for it. Newer hardware, dual-core
processor are the benefits to the x2... which one would you go with?
Remember when we used to set modems to dial dtmf with such short tones and delays you could barely tell it was dialling? That was 20 years ago, I'm sure the technology has gotten a lot better.
Wed Sep 14 2011 01:26:40 EDT from the8088er @ UncensoredDoes anyone have any experience setting up a long range ewireless ethernet bridge? I'm looking at using Motorola Canopy equipment to span around 4.1 miles.
We used Ubiquiti (2.4,g) equipment to go much further than that - assuming you have LOS or NLOS.
It is cheap, and it works - you only need to get a good higain grid or panel antenna to pull it off..
We covered 6000km2 of jungle with wifi, and hooked up to 35km at the longest link.
If you are trying to look through a building, a hillside or whatever then it is a different story altogether.
We considered the Canopy system for about a year before deciding it was simply too unreliable and expensive..
Subject: Re: NLOS
Yesterday I was trying to debug an issue with one of our Linux hosts sending e-mail to our corporate mail server. My first instinct was to do grab a trace of the SMTP session via tcpdump. I was quickly foiled when sendmail decided to do a "STARTTLS."
Before I go any further, I did eventually decide to just disable TLS in the sendmail config so I could get a plain-text capture.
Before I got to that point, though, I tried to get Wireshark to decrypt the TLS session to no avail. I found instructions on Wireshark's website about how to configure it to use a key file, but I think my issue was that I was never able to figure out where exactly sendmail gets its keys from. I was able to find in the sendmail.mc file where all the certificate and key files and directories are configured (/etc/pki/tls/certs), but when I checked in that directory, the only file that exists is ca-bundle.crt, which contains a bunch of certificates. None of the .pem files that were referenced exist.
From poking around, I did find a localhost.key in the /etc/pki/tls/private directory, but when I tried that with Wireshark, it still wasn't able to decrypt the session.
Is this a case where I would need the private key for the corporate e-mail server? Or did I just not grab the right key file from the host?
It's much easier to simply turn off TLS while troubleshooting, unless that *is* the source of the problem (which it occasionally is).
It's even harder, if both ends negotiated an Ephemeral Diffie-Hellman cipher suite. In this case, an temporary DH keypair is created by each end, and authenticated with the private RSA key. You can't know the temporary private key, because presumably it is only stored in RAM long enough for the key exchange to take place, and then thrown away. So you need to be able to mount an active MITM attack in this case, even just to observe traffic.
host -t aaaa fedoraproject.org
Dead beef cafe - ha.
Miss old "dead dad" we used to use for the IPX/SPX address on the Novell test server back in the day.