Author Archives: Jaroker Jon

Article
0
Comments
Tech Note: SSH timeout failures between linux hosts

PROBLEM: could not ssh between Synology nas and Qnap nas using commandline ssh. Putty from windows worked fine. Symptom: SSH timeout occurs at “expecting SSH2_MSG_KEX_ECDH_REPLY” stage. SSHd config file must be fine because I am able to putty from a…

Read more →
Article
0
Comments
Synology NAS Manual Raid Repair

This is a technical note for a solution to a re-occurring problem with my Synology DS1815+ NAS and DX513 expansion unit. PROBLEM: IO Errors appear on one or more hard disks. Array enters degraded mode. Re-seating the drive puts the…

Read more →
Article
0
Comments
Yes, we have no bananas

Here is an example of a user interface that uses an “on/off” control on a negative assertion. In other words, “On” will “Disable” a feature. A control that uses “Enabled/Disabled” or “On/Off” and a positive assertion would have been simpler….

Read more →
Article
0
Comments
Zipabox is an alpha product

Zipato’s Zipabox looks promising. It uses an MIT Scratch approach to rules creation that my kids know how to use. As of version 0.9, the product is in alpha state with potemkin features, silent failures and dysfunctional operations. It had…

Read more →
Article
0
Comments
Vera Lite U17 is Crude but Functional

Vera Lite with the U17 version of the interface was my first z-wave controller. It is a low-cost controller that is popular on Amazon (at least in October 2014) with acceptable user reviews. It is one of the worst computing…

Read more →
Article
0
Comments
Adobe Hacked Oct 2013

Adobe announced its security breach on 3 October 2013. The private, custom email addresses I use for Adobe and Macromedia started receiving Russian spam in January 2013. My Macromedia-specific email address existed prior to its acquisition by Adobe. The lack…

Read more →
Article
0
Comments
Verizion Wireless Appears to be Hacked

An email address I use solely for my Verizon Wireless account has received a phishing scam email.  This is a strong indication that Verizon Wireless’s systems have been compromised. A few days prior, I contacted the porting department of Verizon…

Read more →
Article
0
Comments
Make Extensions Visible in Microsoft Windows

Microsoft Windows hides extensions for known file types. This “feature” is used by hackers to disguise executable and zip viruses as benign PDF files.  It is a “feature” exploited by the CrytoLocker virus writers. Hiding extensions undermines users. The steps…

Read more →
Article
0
Comments
Tuning Forks

Tuning forks are used for observing sound waves and resonance. They provide an almost-pure harmonic frequency that can be used as a reference to check an oscilloscope as well as demonstrate wave physics. Here is a list of sellers on…

Read more →
Article
0
Comments
Puppet 400 Error ‘getcwd’

Technical Note puppet:  Could not retrieve catalog from remote server Error 400 on SERVER “Could not parse for environment” getcwd Puppet Master Version 2.7.18. Puppet Agent Version 2.7.18. Intermittent 400 error “could not parse environment: dev’ occurs on an otherwise normally…

Read more →
Page 1 of 912345...Last