In this presentation, we’ll take a look at how the secure shell (SSH) protocol can be used to to tunnel many different types of network traffic. We’ll cover X Window forwarding, local port forwarding (think VNC), and how to use its support for the SOCKS protocol.
We will be conducting Virtual Meetings for the next few weeks using Jitsi, a free video-conferencing system. Please use Chrome or Chromium for the best experience, or download one of the pre-built clients: https://jitsi.org/downloads
Due to the current situation @ March 14, 2020, in-person meetings have been suspended until further notice. Please do join us on Slack or at our online learning sessions using Jitsi. Write to hello at vicpimakers.ca for invitations and information.
Q-CollegeSuite 303 771 Vernon Ave · Victoria, BC – 10am
1) Hack Challenge, by George Modify a window alarm to be a useful or entertaining device. Window alarms to be supplied free March 14th, one per attendee.
3) … bring projects that you want to share or need help with… If you like, email a description to be added to this page.
It is fun to repurpose battery powered consumer products. For instance, here is a Leak Detector made from a window alarm. The article includes the window alarm schematic.
And George made a bike theft deterrent alarm with remote radio alerting from the same window alarm.
In normal operation, the window alarm senses separation from its external magnet via its internal reed switch and feeds its piezo disk with an oscillation. The window alarm runs on 3 button cells and draws no current when the reed switch is open. There is also a slide switch to enable/disable the alarm.
Here is a photo of the circuit board: The OUT signal from the 8 pin oscillator chip is a 10V DC wave, pumped up by the inductor from 5 volts. A voltage divider can be added to lower this chip output signal to less than 5v to feed another device.
Deid successfully connected a 50 light string of addressable LEDs to an ESP8266 to cause the lights to light and change colour and move and …
Deid created the following patterns:
Primary
Random
Web Safe
Follow
Lead
Random On ***
All On
All Off
Rainbow
Moving
Colour
Christmas
Rainbow Group
Dual Colour *** *** Shown in the images
The ESP8266 C code to do this can be found here. Deid makes no representation that the existing code is good. In fact he knows some of it is not. Feel free to fix.
The challenge is to add more patterns and the code to implement the patterns. If you send Deid the code he will load and try the code. Unless someone comes up with a better way for folks to test remotely.
A Special Interest Group focused on computer networking. Building networks for Today and Tomorrow! Half of the meeting is education, or presentation. Half is sharing, and problem solving. Bring a laptop with Wireshark installed: We’ll be running a hands on workshop using iptables/ip6tables/bpf (BSD Packet Filter) Thursday, February 20, 2020 6:30 PM to 8:00 PM Q-CollegeSuite 303 771 Vernon Ave · Victoria, BC
Bring a laptop with Wireshark (download) installed: We’ll be covering the basics of packet capture, and seeing what is actually on your network. More Wireshark: pad
What is NetSig?
A Special Interest Group focused on computer networking. Building networks for Today and Tomorrow!
1.5 hours on a weekday evening Half of the meeting is education or presentation. Half is sharing, and problem-solving.
A gathering of like-minded persons. Understand and solve some of the challenges in networking today. Are you IPv6 ready? Help Victoria become a leader, rather than a follower in Networking.
Topics
Education | Traffic analysis: ELK stack and Packet Beat | Virtualized Networking in Cloud containers | IPv6 | Routing |
Jekyll sites can be connected to cloud-based CMS software such as CloudCannon, Forestry, Netlify or Siteleaf, and Github enabling content editors to modify site content without having to know how to code.