Friday, September 9, 2016

HACKING A SATELITE

Wideband 2GHz to 14GHz Mixer with Integrated LO Frequency Doubler Delivers IF Bandwidth from DC to 6GHz

MILPITAS, CA - March 7, 2016 - Linear Technology announces the LTC5548, a double balanced mixer that operates either as an up- or downconverter with an exceptionally wide frequency range from 2GHz to 14GHz. The LTC5548 features integrated balun transformers at the RF and LO ports, providing 50Ω match from 2GHz to 13.6GHz and from 1GHz to 12GHz at each port, respectively, while enabling single-ended operation. Additionally, the IF port is capable of DC to 6GHz, supporting wideband transmitters and receivers at the baseband. The LTC5548 has high linearity of 24.4dBm IIP3 at 5.8GHz, and 21.4dBm at 9GHz.
The LTC5548 simplifies microwave transmitter and receiver designs with its integrated LO buffer, requiring only a 0dBm drive, effectively eliminating an external high power LO amplifier circuit

http://www.linear.com/solutions/7159 

It's Surprisingly Simple to Hack a Satellite

Written by

J.M. Porup

Image: J.M. Porup
Hacker conferences are famous for using quirky, hackablebadges. DefCon's 2015 badge was a working vinyl LP containing a spoken-word ciphertext copy of the Hacker Manifesto.
But at the Chaos Communication Camp, held in Zehdenick, Germany last week, the organizers did something different: they gave out 4500 rad1o badges. These software-defined radios are sensitive enough to intercept satellite traffic from the Iridium communications network.
During a Camp presentation entitled "Iridium Hacking: please don't sue us," hackers Sec and schneider demonstrated how to eavesdrop on Iridium pager traffic using the Camp badge.

http://motherboard.vice.com/read/its-surprisingly-simple-to-hack-a-satellite 

1.  Helix 2. 4 Ghz WLAN Antenna (DIY)Hochgeladen am 0. This is my DIY Helix 2. Ghz WLAN Antenna, it has a range of about 2 km & unlike most helix's this has a reflector boom for maximum performance.

 

2. 

System object: comm.DifferentialDecoder
Package: comm

Decode binary signal using differential decoding

http://www.mathworks.com/help/comm/ref/comm.differentialdecoder.step.html 

 

3. 

This is a work-in-progress code branch of Django implemented as a third-party app, which aims to bring some asynchrony to Django and expand the options for code beyond the request-response model, in particular enabling WebSocket, HTTP2 push, and background task support.

This is still beta software: the API is mostly settled, but might change a bit as things develop.

 https://pypi.python.org/pypi/channels

Monday, September 5, 2016

"Smart" windows (electrochromic glass) - The optic electronics device is:

electrochromic glass ("smart" glass), which changes from light to dark (clear to opaque) and back again, at the push of a button


http://www.explainthatstuff.com/electrochromic-windows.html 

Flexible window-type black electrochromic device (how much invisble is the suitcase?)

Thermal/optical camouflage with controlled heat emission....20 yellow cakes ready to use

PATENT : http://www.google.com/patents/US4560595


WITCH IS BASICLY THIS...HOWEVER STILL WITH OPTIC-ELECTRONICS..RADIANT BARRIER


http://www.radiantbarrier.com/plus-insulation.htm
welcome back to war! Good morning! so, again how to cover a yellow cake from the gamma rays radar detection? I've been here making a quick search, and something come up, why not a quartz crystal modulator??? and how exacly can be used,,, can we skip the vaccum??? we already checked that vaccum deposit would work...but there's some difficulty on the right transportation for that! In this case we need to microbalance the gamma ray frequency...


Quartz crystal microbalance

20 YELLOW CAKES READY TO USE...

I ended the computation discipline for a while, I achieved my goal, I let you think about it! So, you're saying you have 20 yellow cakes ready to use? And you say the botton question are in fact the gamma rays detection; I know that! I've been trought a lot of aspects, including the temperature, nevertheless gamma emissions cross trought cold; I've been trough dense materials, and I defintely not overcome the lead question, because its only possible to cover the nuke with as much dense lead is, or to replace it, platinium, the most rare and expensive metal that is; So, don't break our agreement, and I will find a solution.

 Ok! I have a break here !!!! electronics !!! let me start by this
"If the metal is not grounded or connected to any other electron source, there will be excess positive charge accumulated on the surface which will stop further photoemission"


 in that case we need an eletrostatic material...as a conductor to change the charge

https://en.wikipedia.org/wiki/Conductive_polymer 

Sunday, September 4, 2016

You're the top geeks on the world I'm very very proud to have you as my friends, I said this morning to you, I know something you don't know, but I don't remember what it is, Jesus doesn't want to me to remember and doesn't want me to say to you right now; I'm the google cracker :) the first 4 bytes, 4 imput class on a java object must match the firewall code;
"This means making the constructor private or default access ("package-private"), or being in a package controlled by the package.access security property. Immutable classes themselves should declare fields final and protect against any mutable inputs and outputs as described in Guideline 6-2. Construction of immutable objects can be made easier by providing builders (cf. Effective Java [6])."


http://www.oracle.com/technetwork/java/seccodeguide-139067.html#6 


How can I access a private constructor of a class?


One way to bypass the restriction is to use reflections:
import java.lang.reflect.Constructor;

public class Example {
    public static void main(final String[] args) throws Exception {
        Constructor<Foo> constructor = Foo.class.getDeclaredConstructor(new Class[0]);
        constructor.setAccessible(true);
        Foo foo = constructor.newInstance(new Object[0]);
        System.out.println(foo);
    }
}

class Foo {
    private Foo() {
        // private!
    }

    @Override
    public String toString() {
        return "I'm a Foo and I'm alright!";
    }
}

Cisco Crypto ACLs – Do they really need to match?

When starting out with IPsec tunnels it seems to be a common misconception that the crypto ACL, sometimes referred to as the encryption domain or the interesting traffic, must match 100% or be mirrored at both peers or the tunnel won't come up. This isn't strictly true. Whilst the ISAKMP phase 1 and IPsec phase 2 proposals must match, the crypto ACL can be different.
Assume that at the local peer traffic to be encrypted originates from 10.0.0.0/24 and is destined for 192.168.0.0/24. The crypto ACL would be:
But what about the following?
IPsec phase 2 can still be established even though the crypto ACL isn't mirrored at the local and remove peer. The local peer specifies 10.0.0.0/24 but the remote peer specifies 10.0.0.0/8. In this scenario IPsec phase 2 can only be initiated from the peer that has the larger subnet. This is true for both Cisco ASA and IOS.
And in the example above, in the local peer's ACL there's a deny ACE but none on the remote peer's ACL. In this scenario any traffic originating on the local peer from 10.0.0.0/24 destined to 192.168.0.200/32 won't traverse the tunnel. The device (ASA or IOS router) will look at the next crypto map in the sequence and try to match traffic there. If no crypto maps are found it'll flow unencrypted out of the egress interface.
Obviously be careful with mismatching subnets and using deny ACEs in the crypto ACL because you may end up with traffic trying to enter the wrong tunnel and other strange things happening.

https://0wned.it/2014/10/13/cisco-crypto-acls-do-they-really-need-to-match/