Things relevant to my interest, and maybe yours.

Propforth 5.0 yeah

Thanks to prof_braino I elaborate a bit about my spinneret setup:

I'll try to explain On the network side things are simple. Netmask for ALL is /24 aka 255.255.255.0, gateway for all but the router is the router's IP 192.168.1.1 The core components are:

  • A Router setup as 192.168.1.1 (providing dhcp for the 192.168.1.100+ Range)
  • My Qnap NAS/Server (castle) setup with a static 192.168.1.10
  • The Spinneret is configured at 192.168.1.5
  • My Notebook via Wlan 192.168.1.23

It's the easiest way to let the spinneret be a part of your "real" net, as long as its private and you have a router, there are only very few security concerns. Having it this way there is no need at all to modify your routing or your IP addresses.

Some ports are forwarded to the server (22,80 ...) also I can enable a port forwarding to the spinneret from the outside world if the need should arise, but as I have no authentication implemented in propforth nor is there any cryptography available, that's not always on.

At the Moment the Spinneret is fed by the Qnap server itself via USB shared with the propplug. So the develpement can be done completely remote. The main feature is the connection of Pin 26 and 27 to the native UART on the Mainboard of the QNAP. (you can find details in the links on my blog entry). Normally that UART is not meant to be used by the customer, so One need to open up the Case to get Debian running and anytime net access fails for whatever reason. Having an out-of-band management available is a real nice to have.

A few words about the remote programming: As there are very few tools available to get things onto the propeller for an ARM enviroment and pyloader failed for some reason, I was on the hunt for some comfy solution. Netcat or socat came in mind to tunnel the serial communication over the net, which works fine for "normal" data, but it turned out the timing needed by the loaders (bst, propellent, you name it) is much to harsh for my trusty "*cats" so I found usbip to be quite a sharp sword for that situation. It basically takes the Propplug (FTDI) from the USB Stack of the Server (QNAP) and let it pop up on the client side (my Laptop) which shows the FTDI Device right in dmesg so I had a locally available /dev/ttyUSB0 to work with. Made me quite happy. I had some fear to get things together on the software side but after I decided to give propforth a try it really was just a walkt hrough the tests (now tutorial) and giving the thing a serial cog and some (ioconn) and ... done. Actually I was even a bit frustrated to see my plans of a week full of propeller coding gone in just an evening of propforth.

Some developement v2

At first some Soldering:

Then heavy testing:

Differential signals are a perfect opportunity to max out the Rigol. Ch 1: TX Ch 2: RX Ch 3: RS484- A Ch 4: RS485+ B Math: A-B Decode1: TX+RX

Luckily my initial Problems tuned out to be soft ones.

For now my new Version is much more usable.

CANNode

A CAN Node for Home Automation

PCB:

Sources:

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License

Some developement v2

At first some Soldering:

Then heavy testing:

Differential signals are a perfect opportunity to max out the Rigol. Ch 1: TX Ch 2: RX Ch 3: RS484- A Ch 4: RS485+ B Math: A-B Decode1: TX+RX

Luckily my initial Problems tuned out to be soft ones.

For now my new Version is much more usable.

Posted
Unmanned harpoon

That's what Rosetta will fire at poor ol' Churyumov–Gerasimenko in November, any other Duck might be scared. Remember all the technology has been launched Years before the first Smartphone. Mankind has come quite a long way.

Rosetta's harpoon

On Max-Planck-Institut für extraterrestrische Physik is a very detailed (german) Presentation.

Further Informations from the Manufacturer: Faulhaber

See it in action : Scientists Test Harpoon Used in Rosetta Probe

exim

Anzahl Mails in Queue:

exim -bpc

Listing der Queue:

exim -bpr

Suchen in der Queue: siehe exiqgrep -h

  • Beispiel: Alle Frozen Mails loeschen

    exiqgrep -z -i | xargs exim -Mrm
    

To delete all queued messages containing a certain string in the body:

grep -lr 'a certain string' /var/spool/exim/input/ | \
sed -e 's/^.*\/\([a-zA-Z0-9-]*\)-[DH]$//g' | xargs exim -Mrm
syn-ack shirt

T-Shirt inspired by the web

.. esp. ThinkGeek

The font (if I might call it so) was truthfully copied from my trusty HP32s.

The svgs are outlined so a cutter should be able to parse it.

Front:

Back:

Posted
tidy-acl

Tidy ACLs listings on ASA

Normaly a show access-list would bring up something like

access-list OUTSIDE-IN line 1 extended permit ip object-group FOO any (hitcnt=9001)
  access-list OUTSIDE-IN line 1 extended permit ip host 10.42.23.1 any (hitcnt=9000)
  access-list OUTSIDE-IN line 1 extended permit ip host 10.42.23.2 any (hitcnt=1)
  access-list OUTSIDE-IN line 1 extended permit ip host 10.42.23.3 any (hitcnt=0)
  access-list OUTSIDE-IN line 1 extended permit ip host 10.42.23.4 any (hitcnt=0)
  access-list OUTSIDE-IN line 1 extended permit ip host 10.42.23.5 any (hitcnt=0)
  access-list OUTSIDE-IN line 1 extended permit ip host 10.42.23.6 any (hitcnt=0)
  access-list OUTSIDE-IN line 1 extended permit ip host 10.42.23.7 any (hitcnt=0)
access-list OUTSIDE-IN line 2 extended permit ip object-group BAR any (hitcnt=9002)
  ...

Sometimes you just like to see the leading configuration lines. To get there you can simply exclude a double whitespace like:

show access-list | exclude \ \ 
access-list OUTSIDE-IN line 1 extended permit ip object-group FOO any (hitcnt=9001)
access-list OUTSIDE-IN line 2 extended permit ip object-group BAR any (hitcnt=9002)
Kalender 2014
Kalender 2014

Kalender 2014


ALT

ALT ALT ALT ALT ALT ALT ALT ALT ALT ALT ALT ALT

Posted


We did not invent the algorithm.
The algorithm consistently finds Jesus.
The algorithm killed Jeeves.
The algorithm is banned in China.
The algorithm is from Jersey.
The algorithm constantly finds Jesus.
This is not the algorithm.
This is close.


This wiki is powered by ikiwiki.