The default serial speed on the ESP8266 WiFi chip is 115200 baud. If you connect this chip to an Arduino and want to use SoftSerial to talk to it, it will not work. The SoftSerial library is limited to 9600 baud because of hardware limitations of the Arduino. If you want to talk to the ESP8266 with an Arduino at lower speeds, you need to tell the ESP8266 to slow down.
This is the pinout for the Seeed WiFi ESP8266 breakout board. Please be careful, it only accepts 3.3 Volt nominal input voltage and logic. Putting 5 Volts on any of the pins may permanently damage the chip.
The ESP8266 on this board is programmed to do serial communications at 115.2 kilobaud, and accepts AT commands.
client$ ssh -p 8123 email@example.com -i ~/.ssh/id_dsa Permission denied (publickey).
The answer to this problem is replacing the DSA key with an RSA key, but how do you do on the server when your only means for connecting is the OSX client machine you just upgraded? Here’s how:
Many years ago, I used to do some radio fox hunting with cars. Usually these hunts are at night to make it more exciting, and can be great fun. As I got older I lost interest and moved on to other things. But last year, I decided to have a go at a popular balloon fox hunt on 144MHz. This is quite a large scale and professionally organized fox hunt by Dutch Radio Amateurs. Read the rest of this entry »
Ever wondered how well your 50Ω coaxial cable is working? If you have a reasonably fast oscilloscope, preferably up to 100MHz and a signal generator which can generate short bursts, you can measure not only the length of your cable, but also the return loss at a certain frequency. From that, we can learn the attenuation of the cable.
This blog post describes the classic time domain reflection measurement using the following setup:
In every Java project where I need to do strong cryptography, I run into these dreaded unreadable stacktraces which send you into the woods. After a long search I usually discover that the Unlimited Strength Java Cryptography Extensions are not installed. To prevent frustration of users of your software, you can simply add a bit of informative logging to help him/her solve it when the solution is known.
However I disagree with sites like Ashley Madison and the way its owners scam people, last week I have noticed something far more disturbing. As I understand, Ashley Madison was charging people for their profiles to be deleted, and then did not (promptly) delete them. I guess some of it’s “hackers” got caught up in this and decided to attack Ashley Madison for that. Up to this point, merely a quarrel between two parties which may have better been solved by legal procedure.