Baofeng bf-t1 default frequency
Channel | Frequency | DCS /CTCSS |
---|---|---|
ch1 | 437.150 | ct 69.3 |
ch2 | 439.250 | ct 100.0 |
ch3 | 441.750 | ct 151.4 |
ch4 | 443.450 | ct 203.5 |
ch5 | 445.550 | ct 241.8 |
Original: | |
https://github.com/mirror/nuvee/blob/master/ps1%20-%20gun%20flash%20removal/pec_hacks.txt | |
Crypt Killer (USA) | |
80059458 0000 | |
8005945a 0000 | |
Elemental Gearbolt (USA) |
curl https://raw.githubusercontent.com/danmons/retronas/main/ansible/retronas_systems.yml | yq "(.[].[].mister | select(length!=0))" - | sort | uniq > folder.txt | |
while read p; do | |
mkdir "$p" | |
done <list.txt |
#!/usr/bin/env python | |
############################### | |
# Extract SHA1 file hashes from archive.org metadata files | |
# | |
# Usage: place archive.org {item_name}_files.xml in ./xml/ | |
# Run ./extract-hashes.py | |
# sha1 files get written to ./sha1 | |
############################### |
-=MiSTer Computer Cheat Sheet FAQ v1.8.4 by Owlnonymous=- | |
------------------ | |
Notes: On a few cores " = L Shift+2, * = ], and ? = not working. CAPITALIZED = type command or action. On most cores, leave the .xxx files name extension off the launch command. | |
Help: I could use help with the MulitComp, and Sinclair QL. | |
------------------ | |
Amstrad: files DSK, TAPE " | |
DSK file- | |
1) load DSK through OSD |
#!/usr/bin/env bash | |
# Author: tleish from https://github.com/kubernetes/kubernetes/issues/72597#issuecomment-693149447 | |
set -e | |
TEMP_POD_NAME=mysql-jump-server | |
LOCAL_PORT=3307 | |
REMOTE_HOST=prod.abc123.region-1.rds.amazonaws.com | |
REMOTE_PORT=3306 |
Baofeng bf-t1 default frequency
Channel | Frequency | DCS /CTCSS |
---|---|---|
ch1 | 437.150 | ct 69.3 |
ch2 | 439.250 | ct 100.0 |
ch3 | 441.750 | ct 151.4 |
ch4 | 443.450 | ct 203.5 |
ch5 | 445.550 | ct 241.8 |
echo "none" > /sys/class/leds/ath9k_htc-phy1/trigger |
[Unit] | |
Description=RTL-SDR Server | |
Wants=network-online.target | |
After=network-online.target | |
[Service] | |
ExecStartPre=/bin/sleep 15 | |
ExecStart=/bin/sh -c '/usr/bin/rtl_tcp -a 0.0.0.0 -s 1024000' |
CH Frequency | |
1 446.00625 | |
2 446.01875 | |
3 446.03125 | |
4 446.04375 | |
5 446.05625 | |
6 446.06875 | |
7 446.08125 | |
8 446.09375 | |
9 446.10625 |
The badge of the Syscan 2015 conference included an ARM-based STM32F030R8 processor running some challenges. Although SWD pins are accessible on the badge, some have noted that the STM32 is readout-protected, meaning that it will refuse to dump its flash memory.
Fortunately, two researchers (Johannes Obermaier and Stefan Tatschner) recently published a paper at the WOOT '17 conference, in which they reveal a vulnerability allowing to bypass the readout protection. Their technique allows to dump the flash one DWORD at a time, rebooting the CPU between each access.
I implemented this attack using a BusPirate and the PySWD module. Here is a quick'n dirty PoC to