Playing with the Airspy HF+ Discovery (or trying to). It works fine with GQRX but the airspy utils, like airspy_rx don't work on my Pi or my Mac.
I *think* I need to update its firmware, but to do that I need to use Windows, so I'll have to do it at work.
Also, since I can't use the airspy tools I can't even work out what firmware release it currently has! Frustrating!
It was so badly crimped I was able to reuse the plugs and sleeves to make a new cable, with a slightly nicer bit of coax.
For those of you that use VPN: "CVE-2019-14899 - Inferring and hijacking VPN-tunneled TCP connections." sounds like a load of fun:
<Here is a list of the operating systems we have tested which are
vulnerable to this attack:
Ubuntu 19.10 (systemd)
Debian 10.2 (systemd)
Arch 2019.05 (systemd)
Manjaro 18.1.1 (systemd)
Devuan (sysV init)
MX Linux 19 (Mepis+antiX)
Void Linux (runit)
Slackware 14.2 (rc.d)
This list isn’t exhaustive>
To help even more people access better online privacy, we decided to extend the #BlackFriday deal until the end of the week. Get up to 50% off on ProtonVPN Plus during our only sale of the year. https://protonvpn.com/blog/black-friday-2019/?pk_campaign=ww-en-vpn-coms_com-black_friday_2019&pk_source=mastodon.social&pk_medium=link&pk_content=vpn_mastodon_account&pk_kwd=bf_post_3 Happy #CyberMonday! 💚
In case you missed it, WSJT-X
2.1.2 was released:
The release was hot on the heels of 2.1.1:
There's not a lot of interesting content in the release notes but it's always worth upgrading:
Downloads at: http://physics.princeton.edu/pulsar/k1jt/wsjtx.html
* mastodon really likes HTTPS, this isn't using it so you might need to manually tweak urls
* it defaults to the normal url (https://mastodon.radio) for images, avatars, etc.
* this is the first time I've tried this, so it might be misconfigured and/or break
I've been using it, and it seems to work.
Let me know how you get on!
Some of our readers asked us what is wrong with our code snippets. They simply copied and pasted them, including some generic and clearly-marked placeholders.
So it is not that unlikely that some people blindly install or configure software on their servers.
Did you just lose 100m customer SSNs because your root password was "password", you set an S3 bucket to public or you didn't patch a well known vulnerability for 8 months? Worry not! Our free excuse generator will help you develop an air-tight breach statement in no time!
Nice, a new RadCom plus issue:
Not sure there has been one of these released since I joined.
It's a shame the subscription process is such a farce though. The email called it quick and easy and the link took me to the RSGB shop, (which looks like it's from 1990), and then I had to supply a load of details to subscribe!
The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!