Skip to content

Instantly share code, notes, and snippets.

View symm's full-sized avatar
🦄

Gareth Jones symm

🦄
View GitHub Profile
[Unit]
Description=RTL-SDR Server
Wants=network-online.target
After=network-online.target
[Service]
ExecStartPre=/bin/sleep 15
ExecStart=/bin/sh -c '/usr/bin/rtl_tcp -a 0.0.0.0 -s 1024000'

Baofeng bf-t1 default frequency

Channel Frequency DCS /CTCSS
ch1 437.150 ct 69.3
ch2 439.250 ct 100.0
ch3 441.750 ct 151.4
ch4 443.450 ct 203.5
ch5 445.550 ct 241.8
@symm
symm / gist:c66674e05a46c0a01e0f871c703b3316
Created November 18, 2021 19:01
MiSTer Computer Cheat Sheet FAQ
-=MiSTer Computer Cheat Sheet FAQ v1.8.4 by Owlnonymous=-
------------------
Notes: On a few cores " = L Shift+2, * = ], and ? = not working. CAPITALIZED = type command or action. On most cores, leave the .xxx files name extension off the launch command.
Help: I could use help with the MulitComp, and Sinclair QL.
------------------
Amstrad: files DSK, TAPE "
DSK file-
1) load DSK through OSD
@symm
symm / extract-archive-org-hashes.py
Last active December 17, 2021 00:35
Get SHA1 hashes from archive.org metadata
#!/usr/bin/env python
###############################
# Extract SHA1 file hashes from archive.org metadata files
#
# Usage: place archive.org {item_name}_files.xml in ./xml/
# Run ./extract-hashes.py
# sha1 files get written to ./sha1
###############################
curl https://raw.githubusercontent.com/danmons/retronas/main/ansible/retronas_systems.yml | yq "(.[].[].mister | select(length!=0))" - | sort | uniq > folder.txt
while read p; do
mkdir "$p"
done <list.txt
@symm
symm / instructions.txt
Created July 23, 2022 17:33
Guncon flash removal
Original:
https://github.com/mirror/nuvee/blob/master/ps1%20-%20gun%20flash%20removal/pec_hacks.txt
Crypt Killer (USA)
80059458 0000
8005945a 0000
Elemental Gearbolt (USA)
@symm
symm / pmr-446.csv
Created May 2, 2023 17:27
PMR 446 channels
Location Name Frequency Duplex Offset Tone rToneFreq cToneFreq DtcsCode DtcsPolarity Mode TStep Skip Comment URCALL RPT1CALL RPT2CALL DVCODE
0 P1 446.006250 0.000000 88.5 88.5 023 NN NFM 5.00
1 P1 446.006250 0.000000 88.5 88.5 023 NN NFM 5.00
2 P2 446.018750 0.000000 88.5 88.5 023 NN NFM 5.00
3 P3 446.031250 0.000000 88.5 88.5 023 NN NFM 5.00
4 P4 446.043750 0.000000 88.5 88.5 023 NN NFM 5.00
5 P5 446.056250 0.000000 88.5 88.5 023 NN NFM 5.00
6 P6 446.068750 0.000000 88.5 88.5 023 NN NFM 5.00
7 P7 446.081250 0.000000 88.5 88.5 023 NN NFM 5.00
8 P8 446.093750 0.000000 88.5 88.5 023 NN NFM 5.00 s
#/etc/apt/apt.conf.d/50unattended-upgrades
Unattended-Upgrade::Origins-Pattern { "site=downloads.plex.tv"; };
[AVision]
preset_default=Core Specific/Adventure Vision
[AtariLynx]
preset_default=Core Specific/Lynx
[GBA]
preset_default=Core Specific/Game Boy Advance
[GameGear]
@symm
symm / nfc.ini
Last active September 5, 2023 12:11
dmesg log:
[ 273.098663] usb 1-1.2: new full-speed USB device number 6 using dwc2
[ 273.187435] usb 1-1.2: New USB device found, idVendor=1a86, idProduct=5523, bcdDevice= 3.04
[ 273.187472] usb 1-1.2: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[ 273.190084] ch341 1-1.2:1.0: ch341-uart converter detected
[ 273.192037] usb 1-1.2: ch341-uart converter now attached to ttyUSB0