2019-04-07 Goose IPA from Goose Island Beer company 2 months ago
I had a look at the beer on display in our local supermarket and noticed Goose IPA from Goose Island Beer company and I got reminded of Goose Island, Oregon which is mentioned in the Wargames movie. So I bought a bottle of the beer and did some research when I got home. And everything about that link turned out to be wrong. The Goose Island Beer company has nothing to do with Oregon, they are from Chicago, Illinois. And according to Anderson Island (Washington) - Wikipedia English the scene around entering "Goose Island, Oregon" in the movie WarGames was actually filmed on Anderson Island in the state of Washington. There is a small island named "Goose Island" in the state of Oregon, it's an island in the Columbia river. Goose island measures almost 1000 meters by 680 meters. Goose Island Oregon USA on google maps. Having left me with nothing of the link(s) I suspected when I saw the bottle there is only one thing to do: try the beer. I would describe the colour as amber / dark amber. The smell and taste have a strong hop influence. I personally like IPA beers, but this one is a bit too bitter for me.
The beer details
Company Goose Island Beer company Beer name Goose IPA Beer style IPA - India Pale Ale Alcohol by volume 5.9 %
2019-04-01 Plotting the number of radio contacts after varying months 2 months ago
After a month with a holiday and a month with one contest I redid the QSO count plot to see the development. before, before, before, before, before
2019-04-01 Wat volts extra 2 months ago
Het viel me op in de grafieken van het invoer voltage volgens de UPS dat het voltage vanaf het stroomnet is gestegen tot 238 volt aan het eind van september 2018. Ik vraag me af wat de oorzaak is van deze wijziging. Het kan niet zijn door de toename van zonnepanelen in de omgeving, het gestegen voltage is zowel overdag als 's nachts.
2019-03-29 Still looking for the correct frequency for FT8 on the 70 centimeter band 2 months ago
Although FT8 does great work for weak signal reception on HF bands it's also nice for the 2 meter band and the 70 centimeter band. So after lots of tries with the 2 meter band I decided to give the 70 centimeter band another try. But, there is one thing: there aren't many stations active in FT8 on 70 centimeter and even when one is active in the nearby area that station may be on a different FT8 frequency. The real standard is not there yet. Until now I've seen:
I check for activity via the PSKreporter site. My two FT8 on 70 centimeter contacts where on 432.174 and 432.176.
- 432.174 MHz
- 432.176 MHz
- 434.670 MHz
2019-03-24 Now also mapping 70cm gridsquares 3 months ago
In the past week I made my second 70cm FT8 contact, and again with another amateur in the JO22 gridsquare. So the map for 70cm gridsquares contacted and confirmed isn't very spectacular yet, but I'm going to generate and maintain it anyway. Now in the list of maps at pe4kh.idefix.net.
2019-03-22 Distributed authenticated smtp scanning 3 months ago
I noticed a lot of entries in my mail logging about aborted smtp transactionsMar 22 21:04:04 gosper sm-mta: x2MK437r030180: [22.214.171.124] did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA-v6 Mar 22 21:04:58 gosper sm-mta: x2MK4vv0030229: [126.96.36.199] did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA-v6 Mar 22 21:05:25 gosper sm-mta: x2MK5Oas030307: [188.8.131.52] did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA-v6 Mar 22 21:06:01 gosper sm-mta: x2MK5xAc030328: [184.108.40.206] did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA-v6 Mar 22 21:06:02 gosper sm-mta: x2MK5xg5030331: [220.127.116.11] did not issue MAIL/EXPN/VRFY/ETRN during connection to MSP-v6And I wondered what was going on, until I did a capture of the session and had a look:1 0.000000 18.104.22.168 → 22.214.171.124 TCP 68 55448 → 25 [SYN, ECN, CWR] Seq=0 Win=8192 Len=0 MSS=1460 WS=256 SACK_PERM=1 2 0.000314 126.96.36.199 → 188.8.131.52 TCP 68 25 → 55448 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460 SACK_PERM=1 WS=128 3 0.034751 184.108.40.206 → 220.127.116.11 TCP 56 55448 → 25 [ACK] Seq=1 Ack=1 Win=65536 Len=0 4 6.038967 18.104.22.168 → 22.214.171.124 SMTP 395 S: 220-gosper.idefix.net ESMTP Sendmail 8.15.2/8.15.2/Debian-8; Fri, 22 Mar 2019 21:00:55 +0100; (No UCE/UBE) | 220- This is a private SMTP server. | 220- The use of this or any related system for the transmission of | 220- Unsollicited Bulk E-mail (UBE) is prohibited. | 220 logging access from: [126.96.36.199](FAIL)-[188.8.131.52] 5 6.072501 184.108.40.206 → 220.127.116.11 SMTP 76 C: EHLO 18.104.22.168 6 6.072915 22.214.171.124 → 126.96.36.199 TCP 56 25 → 55448 [ACK] Seq=340 Ack=21 Win=29312 Len=0 7 6.073011 188.8.131.52 → 184.108.40.206 SMTP 267 S: 250-gosper.idefix.net Hello [220.127.116.11], pleased to meet you | 250-ENHANCEDSTATUSCODES | 250-PIPELINING | 250-EXPN | 250-VERB | 250-8BITMIME | 250-SIZE | 250-DSN | 250-ETRN | 250-STARTTLS | 250-DELIVERBY | 250 HELP 8 6.106154 18.104.22.168 → 22.214.171.124 SMTP 68 C: AUTH LOGIN 9 6.106585 126.96.36.199 → 188.8.131.52 SMTP 86 S: 503 5.3.3 AUTH not available 10 6.141445 184.108.40.206 → 220.127.116.11 TCP 56 55448 → 25 [FIN, ACK] Seq=33 Ack=581 Win=65024 Len=0 11 6.141775 18.104.22.168 → 22.214.171.124 TCP 56 25 → 55448 [FIN, ACK] Seq=581 Ack=34 Win=29312 Len=0 12 6.174430 126.96.36.199 → 188.8.131.52 TCP 56 55448 → 25 [ACK] Seq=34 Ack=582 Win=65024 Len=0Each session starts ESMTP and even with the ESMTP reply not listing AUTH the next command is 'AUTH LOGIN' for authenticated smtp, and as soon as my server denies offering this the session gets aborted. This does mean no failed authentication attempt is logged which would trigger fail2ban. This does look like a bit of a distributed attack, but without the network remembering that the attack is not going to work in this way and therefore trying it again and again. Update: IPs active in this scanning attack sofar: 184.108.40.206 220.127.116.11 18.104.22.168 22.214.171.124 126.96.36.199 188.8.131.52 184.108.40.206 220.127.116.11 18.104.22.168 22.214.171.124 126.96.36.199 188.8.131.52 184.108.40.206 220.127.116.11 18.104.22.168 22.214.171.124 126.96.36.199 188.8.131.52 184.108.40.206 220.127.116.11 18.104.22.168 Update 2019-03-24: I noticed the incorrect EHLO above and looked at options for HELO/EHLO checking in sendmail. Searching did not show a lot of options, trying with the $&s delayed s macro did not fire on the given HELO/EHLO. So I kept searching and found the latest sendmail administration guide ('Bat book') with FEATURE(block_bad_helo). I activated this feature to see if it stops some of this traffic.
2019-03-19 Time to update putty 3 months ago
An interesting bit of news: SSH client gets patched after RSA key exchange memory vuln spotted.The fixes implemented on PuTTY over the weekend include new features plugging a plethora of vulns in the Telnet and SSH client, most of which were uncovered as part of an EU-sponsored HackerOne bug bounty.Get your updated putty at the PuTTY download page. Update: Interesting visual change in putty: informational lines from the client are now prefixed by a putty logo. This could make it harder to mislead the user in certain attacks.
2019-03-17 Still working and sometimes struggling learning morse 3 months ago
Every week there is an hour of morse training at my radio club, see article CW cursus op PI4UTR (Dutch). And I'm going there every week I can, as learning morse is an important part of my amateur radio resolutions for 2019. We're training with the G4FON morse trainer which uses the Koch method (order of characters to learn) to learn morse and so-called Fairnsworth timing (playing the dits and dahs of the characters at the high speed but leaving room to think about what you just heard). I am doing ok, now we're getting to the level of 37 characters I have a hard time remembering the newest characters. Constant exercise seems the only way to fix this a bit, making exercises with just the characters I keep making mistakes in, although I can go blank again on new characters when switching to testing the whole set. As soon as I get reasonable low amounts of errors I'll try to raise the speed (by raising the effective speed, the dits and dahs of a single letter still come at 15 words per minute). I want to learn this, with the plan to pass the Belgian CW test some day, and get up to enough speed to be able to participate in morse parts of contests and DX contacts. But there will be a lot of practice before I'm at that level.
2019-03-13 Scam mail really on the rise 3 months ago
According to “FINAL WARNING” email – have they really hacked your webcam? - Naked Security there is a big flood the last day(s) of "Sextortion" scam mails going around. Don't fall for these. It's all fake.
2019-03-13 My lineup of amateur radio related podcasts 3 months ago
I like hearing about other experiences in amateur radio from around the world. Podcasts are an easy way to hear experiences, news and opinions from other amateurs. And they fit nicely into my daily commute. The list of amateur radio related podcasts I follow:
2019-03-12 A stupid extortion attempt: with an embedded image 3 months ago
A new level of stupid in the "I have you on video watching porn" extortion scams: the whole message embedded as an image, including the instructions to carefully cut and paste the bitcoin wallet address. Links: Report history for 12Vso1cRX7zQovZG4wH7RAz2HqtdW1Lvek - Bitcoin Abuse Database, Bitcoin Address 12Vso1cRX7zQovZG4wH7RAz2HqtdW1Lvek. Before, before, before.
2019-03-11 I participated in the EA PSK63 contest 2019 3 months ago
This weekend was the EA PSK63 Contest and I participated Saturday evening, Sunday morning and a bit Sunday afternoon. I planned to participate in this contest so I set up the endfed antenna outside Friday evening because I would be away most of the Saturday daytime. With the current radio propagation and a serious part of my participation after sunset I decided to enter in the single operator 40 meter category. I made 106 contacts, with 25 different spanish provinces in the log (out of 52 possible province codes). Spain by itself has 50 provinces with Ceuta and Melilla not counting as a province but they do count in the contest. I also participated in the EA PSK63 contest 2016 with 60 contacts and EA PSK63 contest 2018 with 125 contacts (but only 79 in the 40 meter band).
2019-03-08 Another extortion attempt mentioning video 3 months ago
In the inbox this morning, another attempt at extortion.Subject: IMPORTANT! You have been recorded masturbating! I have Koos Website.mp4! Hi there, The last time you visited a porn website with teens, you downloaded and installed the software I developed. My program has turned on your camera and recorded the process of your masturbation. My software has also grabbed all your email contact lists and a list of your friends on Facebook. I have the - Koos Website.mp4 - with you jerking off to teens as well as a file with all your contacts on my computer. You are very perverted! If you want me to delete both the files and keep the secret, you must send me Bitcoin payment. I give you 72 hours for the payment. If you don't know how to pay with Bitcoin, visit Google and search. Send 2.000 USD to this Bitcoin address as soon as possible: 34vKT8SpK2zYAgJUDww9ih1o7Ky3JKmCdP (copy and paste) 1 BTC = 3,850 USD right now, so send exactly 0.525386 BTC to the address provided above. Do not try to cheat me! As soon as you open this Email I will know you opened it. I am tracking all actions on your device. This Bitcoin address is linked to you only, so I will know when you send the correct amount. When you pay in full, I will remove both files and deactivate my program. If you don't send the payment, I will send your masturbation video to ALL YOUR FRIENDS AND ASSOCIATES from your contact lists I hacked. Here are the payment details again: Send 0.525386 BTC to this Bitcoin address: ---------------------------------------- 34vKT8SpK2zYAgJUDww9ih1o7Ky3JKmCdP ---------------------------------------- You саn visit police but nobody can help you. I know what I am doing. I don't live in your country and I know how to stay anonymous. Don't try to deceive me - I will know it immediately - my spy software is recording all the websites you visit and all keys you press. If you do - I will send this ugly recording to everyone you know, including your family. Don't cheat me! Don't forget the shame and if you ignore this message your life will be ruined. I am waiting for your Bitcoin payment. You have 72 hours left. Anonymous HackerGiven the address it's clear someone managed to visit this website. Actually hacking my computer and removing the webcam cover or installing the webcam is harder! Bitcoin links: Report history for 34vKT8SpK2zYAgJUDww9ih1o7Ky3JKmCdP - Bitcoin Abuse Database and Bitcoin Address 34vKT8SpK2zYAgJUDww9ih1o7Ky3JKmCdP.
2019-02-17 Sunday ISS pass with good results 4 months ago
Sunday had less time to be at the radio for ISS passes but one pass was ok. It started with the end of one image, one full image and the start of the next image. The audio recording of the whole pass is included.
Listen to audio attachment:
2019-02-16 One more ISS pass with good results receiving slow scan TV 4 months ago
After hickups in recording audio from the radio on two previous passes I rebooted the whole system (it was nagging about a reboot anyway) and I received two more partial images. Thanks to ARISS Russia team member Sergey Samburov, RV3DR for making this possible!
2019-02-16 Second ISS SSTV pass: more results 4 months ago
Second pass of the International space station gave me one partial picture and one complete (with some noise).
2019-02-16 Received SSTV from the ISS 4 months ago
In this weekend there are extra slow scan tv (SSTV) transmissions from the international space station (ISS). The ISS moves across the sky when viewed from earth so I calculate beforehand when it will pass across the sky and what the trajectory will be. I woke up in time to be outside for the first one. A low pass over the horizon and most of the pass matched a pause between transmissions, so not much image received.
2019-02-05 Starting tcpdump causes bluetooth drivers to be loaded .. on a virtual machine 4 months ago
I noticed something really weird in the kernel log of a virtual machine:Feb 5 11:46:54 server kernel: [2936066.990621] Bluetooth: Core ver 2.22 Feb 5 11:46:54 server kernel: [2936067.005355] NET: Registered protocol family 31 Feb 5 11:46:54 server kernel: [2936067.005901] Bluetooth: HCI device and connection manager initialized Feb 5 11:46:54 server kernel: [2936067.006404] Bluetooth: HCI socket layer initialized Feb 5 11:46:54 server kernel: [2936067.006838] Bluetooth: L2CAP socket layer initialized Feb 5 11:46:54 server kernel: [2936067.007280] Bluetooth: SCO socket layer initialized Feb 5 11:46:54 server kernel: [2936067.009650] Netfilter messages via NETLINK v0.30. Feb 5 11:46:54 server kernel: [2936067.056017] device eth0 entered promiscuous modeThe last two are the giveaway about what really happened: I started tcpdump to debug a problem. But I did not expect (and do not need) bluetooth drivers on a virtual machine, it will never have access to a bluetooth dongle. After setting up /etc/modprobe.d/local-config.conf withblacklist bluetoothtcpdump still works fine and no bluetooth drivers are loaded. Update: Most recommendations are to disable the bluetooth network family:alias net-pf-31 off
2019-02-01 Plotting the number of amateur radio contacts after a contesting month 4 months ago
After a month with three digimode radio contests I plotted the number of amateur radio contacts again. The number of contacts is clearly higher each January as a contest month, with this January a new peak. The contests were the ARRL RTTY Roundup on 6 and 7 January, the UBA PSK63 prefix contest on 12 and 13 January and the BARTG RTTY Sprint Contest on 26 and 27 January. Nicer looking font due to the upgrade of "radio workstation" thompson. I guess even gnuplot is coming along with the modern times. before, before, before, before
2019-01-30 Misconfigured backups 4 months ago⇐ Newer news items for tag english Older news items for tag english ⇒
I have "always" been running amanda for backups on linux. Or rather, I can't find any indication when I started doing that several homeserver versions ago, it's just still running. Or it was running, but first I had to tackle a hardware problem: all SCSI controllers I have are PCI and the newest homeserver has no PCI slots. So I searched for a solution. The first solution was to try using the desktop system for the tapedrive, but the powersupply in that system has no 4-lead Molex connectors so I can't connect the tapedrive. For now I use an old 'test' system with some software upgrades to run amanda and shut it down when all backups are done and flushed to tape. But amanda had a serious problem writing stuff to tape. With some debugging this turned out to be caused by the variable blocksize I used on the previous systems, with# mt -f /dev/nst0 setblk 0and I can't even find out why this seemed like a good idea years ago. But now amanda really wants to use 32768 byte blocks and filled a DDS-3 tape (12 Gb without compression) with about 1.8 Gb of data before reaching the end of the tape. Why this default has changed isn't clear to me, but I found a way to re-initialize the tapes so the backups fit again. Based on block size mismatch - backup central I created a script to do this. I did not get the error about the blocksize, but I searched specifically for 'amanda 3.3.6 blocksize'.#!/bin/sh if [ "$1" = "" ]; then echo "Usage: $0 <tapename>" fi mt -f /dev/nst0 setblk 32768 mt -f /dev/nst0 compression 1 mt -f /dev/nst0 rewind dd if=/dev/zero of=/dev/nst0 bs=32768 count=200 mt -f /dev/nst0 setblk 32768 mt -f /dev/nst0 compression 1 mt -f /dev/nst0 rewind amlabel -f kzdoos $1And now normal amounts of data fit on a tape again. I just have to initialize every tape before using it for the first time in this setup.