Monday, May 21, 2018

Acoustic Weapon

anyway...definitely...and ignoring lamb waves...(in fact what they use) let's just get this 70hz-120Khz ...sound exciter...and let's use bat sound sample...see what we got...
4 Ohms Exciter Exciter 20W 70Hz ~ 15kHz Top Round, Square Frame 105dB
DIGIKEY.COM

ACOUSTIC WEAPON

actually what I need is this ...besides the sample is bullshit...I just found out they use lamb waves..I can not found a sample...maybe I'll find it...
Piezo Horn Speaker Tweeter 30KHZ Piezoelectric Head Driver Altifalante Treble
BANGGOOD.COM

Ah! Ah! another week...monday, 07.45 am ..welcome back to war! óh óh óh ...Santa just told me, baby Oracle (11g2) has a cloud server called exodata, where it migrates ...I said to Santa...niet problema, I have a trick to find out the bastard server location...check it out: "Here was my starting situation. sudo netstat shows port with PID/Program of -. lsof -i shows nothing....Now let's go fishing. First let's get the inode by adding -e to our netstat call..."

Here was my starting situation. sudo netstat shows port with PID/Program of -lsof -i shows nothing.
$ sudo netstat -ltpna | awk 'NR==2 || /:8785/'
Proto Recv-Q Send-Q Local Address           Foreign Address         State       PID/Program name
tcp6       0      0 :::8785                 :::*                    LISTEN      -
tcp6       1      0 ::1:8785                ::1:45518               CLOSE_WAIT  -
$ sudo lsof -i :8785
$
Now let's go fishing. First let's get the inode by adding -e to our netstat call.
$ sudo netstat -ltpnae | awk 'NR==2 || /:8785/'
Proto Recv-Q Send-Q Local Address           Foreign Address         State       User       Inode       PID/Program name
tcp6       0      0 :::8785                 :::*                    LISTEN      199179     212698803   -
tcp6       1      0 ::1:8785                ::1:45518               CLOSE_WAIT  0          0           -
Next use lsof to get the process attached to that inode.
$ sudo lsof | awk 'NR==1 || /212698803/'
COMMAND      PID    TID                USER   FD      TYPE             DEVICE   SIZE/OFF       NODE NAME
envelope_ 145661 145766               drees   15u     IPv6          212698803        0t0        TCP *:8785 (LISTEN)
Now we know the process id so we can look at the process. And unfortunately it's a defunct process. And its PPID is 1 so we can't kill its parent either (see How can I kill a process whose parent is init?). In theory init might eventually clean it up, but I got tired of waiting and rebooted.
$ ps -lf -p 145661
F S UID         PID   PPID  C PRI  NI ADDR SZ WCHAN  STIME TTY          TIME CMD
0 Z drees    145661      1  2  80   0 -     0 exit   May01 ?        00:40:10 [envelope] 
This question is similar to Network port open, but no process attached? I've tried everything from there, reviewed the logs, etc... and can't find anything. My netstat shows a TCP listening port ...
SERVERFAULT.COM

Satellite hacking Intel 1 (BACK@WAR CyberArmy friends let´s start Satellite GPS navigation hack IT WILL HV A PRICE)

  https://stackoverflow.com/questions/63010812/how-to-access-http-port-5001-from-public-internet