Powered by Blogger.

Saturday, November 14, 2015

Stratux + Canakit + DVB-T usb dongle = Real-time weather and air-traffic updates in the cockpit.


Approximate cost: $84

Downloaded stable Stratux release:

I use Linux, so after downloading, I extracted the image and then wrote it to the 8GB microSD card that came included with the Canakit.

sudo dd -if=\locationofimage\stratux...img of=\dev\mmcxblk0

Next I assembled the kit, inserted microSD, plugged in the WiFi dongle included with the Canakit, the DVB-T usb dongle and powered it up.

No WiFi AP showed up...uh-oh
Turns out the Canakit WiFi dongle isn't compatible with Stratux out of the box.

No Problem...
Connect pi2 to the network via Ethernet and ssh into it. Default username:pi password:raspberry

once logged in, I ran:
sudo aptitude update; sudo aptitude -y upgrade
sudo cp /etc/hostapd/hostapd.conf /etc/hostapd/hostapdORG.confsudo nano /etc/hostapd/hostapd.confdelete all contents and pasted this in:interface=wlan0ssid=stratuxhw_mode=gchannel=1macaddr_acl=0auth_algs=1ignore_broadcast_ssid=0
then exit (ctrl+x) and save
issued a reboot:
sudo reboot 
and voila! It was alive.

Friday, August 28, 2015


I've compiled a Google maps mashup of the conference related gatherings with BART layer. Gatherings are grouped by day, location is shown and time of even are the labels of the pins. ENJOY!!! and perhaps I will see you there.

Don't forget, be looking for the \//\/\ \/\/4R3 R3534RCH3R!
He's lurking at VMWorld yet again this year!

Here's the map

This site has a list.

Tuesday, June 23, 2015

SECURITY ALERT: Samsung Android devices

Currently, no patch exists for this vulnerability. Samsung has indicated that they will use their Knox security solution to remotely issue a fix, but when this will be released is unclear. In the official statement released by Samsung, they only mention that they will “begin rolling out a security policy update in the coming days.” Samsung has also advised users to ensure their devices automatically receive security policy updates. Steps to configure their devices to do so can also be found in the statement.
Until then, there are two possible countermeasures. The first countermeasure is to only connect to Wi-Fi networks that are secure, in order to prevent any man-in-the-middle attacks. This can be a problem if the user has to connect to public Internet connections. The use of a Virtual Private Network (VPN) helps secure a user’s connection in these cases.
Secondly, the user can stop the use of the default Samsung keyboard. To do this, they have to do two things: first, select an alternate keyboard instead of the default system keyboard. This can be done under the Language and input section of the device’s settings:

Figures 2-4. Steps to change Android keyboard

However, using a different keyboard is not enough. The system keyboard itself has to be turned off. Unfortunately, this has to be done every time the device is turned on. This can be done under the Applications part of the settings menu:

Figures 5-7. Steps to disable system keyboard

These steps will mitigate the risk to the user from this vulnerability.

Friday, June 19, 2015

Virtually playing

Check out.
OpenXT...really like...Hard for now, too new to be easy.

Friday, May 22, 2015