This document is outlining the schema for a CoAP bridge for LiFX devices.
/discover
- Post to force rediscovery of LiFX equipment./d/
all/
raw
- Send a raw frame to all devices.
power
/* @file assert-macros.h | |
** @author Robert Quattlebaum <darco@deepdarc.com> | |
** | |
** Originally published 2010-8-31. | |
** | |
** This file was written by Robert Quattlebaum <darco@deepdarc.com>. | |
** | |
** This work is provided as-is. Unless otherwise provided in writing, | |
** Robert Quattlebaum makes no representations or warranties of any | |
** kind concerning this work, express, implied, statutory or otherwise, |
U͎̙̮̞͙ͫ͆̑̓n͍̞̼̜̓̈́ͣ̀̒i̜̻̦ͧ͌̊̉ͨ̾͌̾̂c̝̘̗͎̼̠̩̜ͮ̃ͩ̑̐ͅo̳̲͌̌ͦͪ̒ͩ̚d͇̹ͯ̉ͣ̿ͯë̬͇͎̻̖̩́̒̔ͧ̈́ ̹̹͐ͩͥͩͯͥ͑ͅR͍̩̻̝͔̉̌̒̍̆o̯̬͎̟̗̦̚c̞̣̪̼͓̻̜̲̅ͨ̂̿̽k̞̜͓̠̤͉͍̊ͧͭ́s̳̱̳̫̦̭ͤ̂̾ͤͧ!̙̺͖͎̘̩̾͒̌̆ͪ̅ͅ | |
Note to self:
docker-machine ssh default sudo /usr/local/sbin/tc qdisc add dev eth0 root netem delay 10ms
Undo:
docker-machine ssh default sudo /usr/local/sbin/tc qdisc change dev eth0 root netem delay 0ms
Congress Reimagined | |
=================== | |
This is a document which summarizes my thoughts on how congress could be organized differently | |
in order to allow for more than two viable political parties. | |
Senate | |
------ | |
The senate would be changed quite dramatically. Instead of each state voting for two |
# These next three lines monitor the log for indications | |
# that the USB device has gotten into a bad state. When we | |
# notice that the USB device is in a bad state, we want to | |
# reboot. However, in order to avoid reboot loops, we only | |
# allow a reboot to occur if the system has been up for | |
# longer than 5 minutes. -- RQ 2016-09-17 | |
filter f_usbfail { program("pcscd") and match("LIBUSB_ERROR_PIPE" value("MESSAGE")); }; | |
destination usbfail_monitor { program("awk '/LIBUSB_ERROR_PIPE/ { system(\"test \$(cut -f 1 -d . /proc/uptime) -gt \$((5*60)) && reboot\") }'"); }; | |
log { source(src); filter(f_usbfail); destination(usbfail_monitor); }; |
By Robert Quattlebaum darco@deepdarc.com
Keywords: Remotizer, Teardown, Hack, Reverse Engineering
Official device website: http://www.remotizer.com
There are hardware encrypted USB sticks on the market, but a few things make me uncomfortable about them:
Instead of using a vendor-provided executable, I propose a mechamism which allows the encrypted USB drive to be securely mounted on any machine that has a web browser.
I hereby claim:
To claim this, I am signing this object:
/* ATTiny LED Twinkler | |
* | |
* This is come code I wrote a while back to "twinkle" | |
* four GPIO outputs that would drive LEDs. It was designed | |
* to be run on an eight-pin ATTiny13 chip. It works | |
* quite well, even considering how inefficient it is. | |
* | |
* - Robert Quattlebaum, 2012 | |
*/ |