Legend has it that once upon a time a networking instructor named Bob taught a class of students a method of subnetting any address using a special chart. This was known as the Bob Maneuver. These students, being the smart type that networking students usually are, added a row to the top of the chart and the Enhanced Bob Maneuver was born. The chart and instructions on how to use it follow. With practice, you should be able to subnet any address and come up with an IP plan in under a minute. After all, it's just math!
Three traditional BBS-circulated documents about the QWK format, based on reverse engineering; the official spec, excerpted from the documentation of 1stReader; and the official QWKE specification, all re-formatted with Markdown. Although I consider some of this material to be inaccurate, I’ve tried to avoid editing for content, except to remove references to web sites, boards and addresses that are no longer working.
This article, Stupid .htaccess Tricks, covers just about every .htaccess “trick” in the book, and easily is the site’s most popular resource. I hope that you find it useful, and either way thank you for visiting :)
The Amazing All-Band Receiver is basically a diode detector followed by a high-gain audio amplifier. This is not a multi-band receiver; it picks up everything at once! The detector uses a biased Schottky diode for excellent sensitivity and bandwidth; the detector will detect signals from below the AM broadcast band up to the microwave bands. The number of interesting signals is surprising; it is fun to drive around listening to the numerous strange sounds.
By trying different antennas and locations, this receiver has picked up AM radio stations, FM stations, TV video (buzz), car lock transmitters, cell phones, and even the microwave oven (a whoosh-whoosh sound as the microwave spreader rotated). It isn't clear how FM stations are demodulated; perhaps the antenna Q is sufficient for slope detection. (See reader Karen's excellent theory.) Even the familiar buzz from a narrow-band FM pager transmitter has been heard - somehow. There are some mysterious signals out there, too! What is that occasional descending whistle over by the highway? Some vehicles emit a curious buzz, too. If you hear a mysterious click-click now and then, its your cell phone! Don't expect to tune in international shortwave stations. This receiver is for strong, local sources. The advanced experimenter will find it useful as a detector section for low power tuned receivers.
This document includes resources and guidelines for preparing and running 5e and other fantasy roleplaying games taken from several books written by Michael E. Shea and available at SlyFlourish.com. Much of this material is useful for any fantasy RPG but some is specific to the 5th edition of the world's most popular roleplaying game.
This work is licensed under a Creative Commons Attribution 4.0 International License. Please attribute Michael E. Shea of SlyFlourish.com in any works derived from this document.
This document is a single self-contained HTML file. To save an offline local copy, "save as" either the page source or HTML in your browser. Use tools such as Calibre and Pandoc to convert this document to markdown, PDF, ePub or another format of your choice. Use Send to Kindle to send a version to your Kindle. You can find several versions of this document including EPUB, Markdown, and JSON on Crit.Tech's LGMRD Github Repo
A short, sweet, and "just the facts" overview of how to use a Yubikey and what their operational limits are (e.g., a single Yubikey can be used to authenticate against up to 32 services).
A page that explains how to reconfigure your ADSB traffic node to send what it hears to adsb.fi
FREETONE by Stuart Semple contains 1280 colours including digital versions of his Pinkest Pink, Incredibly Kelinish Blue, Black 3.0 and TIFF.
A SIMPLE & TOTALLY FREE COLOUR PALETTE PLUGIN FOR ADOBE
That unlocks a whole books worth of very Pantone-ish colours.
1280 Liberated colours are extremely Pantoneish and reminiscent of those found in the most iconic colour book of all time. In fact it's been argued that they are indistinguishable from those behind the Adobe paywall.
Cost: Nothing. Click through the cart and you don't have to pay (unless you want to leave a tip).
Here’s a list of EPROM device IDs, as used in EPROM programming software such as XGPro. This is the most complete list I’ve come across and I struggled to find one, so it’s presented here for reference just in case it’s of any use to anyone.
Ways to play network streams on a Kodi box.
An introductory document that describes how to flash a project keyboard with the QMK firmware.
So you have a Four Thieves Abortion Card, what do you do with it?
First off, if you don't need it now, do not break the seal of the mylar bag. The main vulnerability of Misoprostol is humidity. So, keep it sealed, and out of extreme heat or sunlight.
Read and save for later, should you need it.
A build log of the Null 2 Retropie handheld. Includes how to modify existing builds of Raspbian to work with that custom hardware.
With every Python release, there are new modules being added and new and better ways of doing things get introduced. We all get used to using the good old Python libraries and to certain way of doing things, but it's time upgrade and make use of the new and improved modules and their features.
- Use f-strings.
This page is organized into different security-related threats. You can jump to the ones that most concern you. Along with each scenario is a list of digital security tips to neutralize the threat!
With a little file creation trickery, it's really quite easy to build an ActivityPub server.
The homepage of a relatively simple microcontroller-based frequency counter. This design is common to just about all of the kits that you'll find on eBay or Amazon (you know the ones - they don't have any instructions). Usually you'll be looking up construction variant 2 (five digit display) with a 20MHz crystal.
Designed by Wolfgang "Wolf" Büscher, DL4YHF.
Microcontroller used: PIC 16F628
How to identify servers and running apps that are vulnerable to log4shells without being able to log into them.
5070 links, including 359 private