Wednesday, March 13, 2019
does ur business this HF map prediction?
VOACAP.COM
Transmitter Site TX antennas: 10M: 12M: 15M: 17M: 20M: 30M: 40M: 60M: 80M: Receiver Site RX antennas: 10M: 12M: 15M: 17M: 20M: 30M: 40M: 60M: 80M: General Propagation Settings Noise: SSN: Method: Min.TOA: ° Coverage Area Map Settings Band: UTC: Range: hrsPropagation Planner Settings DX sites: ...
Tuesday, March 12, 2019
I have here, a listen port for a microwaves satellite! Why is it great? If you hv the right antenna dish, you can transmit this frequency around your block neiborghood...this means, around here, nobody has fucking nothing working..cars, tv's cell phones, public transportation, tottaly blackout!
188.210.92.22
Note: you need both Java and JavaScript enabled for this page to work properly. If you don't hear anything, probably Java is disabled or its…
Monday, March 11, 2019
ok...let me inform you! You are on facebook research scanning intel information. You were already informed, by another station, to cover this guy work. Then you find this! Then, a spy works always with radio encryption, nothing related in fact, with emails!!! Then, this message, (the article) is codify and sended encrypted to the base. The base then, with schedule transmission previouse arranged, sends the "job" ..."eliminate" for instance. But usually that job is for James Bond! The usual work, is to follow the man the all day, which is the job of another member of the station team! So, do you now understand what a spy job is???? Good! Because I won't last forever!
any one wants to listen to a european satellite transmission?
This WebSDR, hosted at Goonhilly Earth Station in Cornwall, enables you to listen to the Qatar OSCAR-100 Narrow band transponder onboard the Es'hail-2 satellite.
You can read more about the WebSDR & Spectrum Viewer station at wiki.batc.org.uk/Es'hail-2 Ground Station
- For more details on Qatar OSCAR-100 see amsat-dl.org/eshail-2-amsat-phase-4-a
- The QO-100 wideband spectrum monitor can be found here eshail.batc.org.uk/wb/
- More information about the WebSDR software can be found on www.websdr.org
- New: BPSK data on the Upper Beacon can be decoded with GNUradio by following this guide.
182 user(s) online.


Lower Beacon
CW ->
NB Digi ->
Digi ->
Mixed ->
SSB ->
Guard Band ->
Upper Beacon




Filter: 2.70 kHz
squelch autonotch
Audio recording
squelch autonotch
Audio recording
![[scale]](https://eshail.batc.org.uk/nb/smeter1.png)
Volume: mute
Signal strength plot:
Waterfall zoom
Sunday, March 10, 2019
LOKIBOT
nevermind the shit page configuration!!!!! LOKIBOT library code
Join GitHub today
GitHub is home to over 31 million developers working together to host and review code, manage projects, and build software together.
Sign up1 contributor
# Date: 07/02/2018 | |
# Author: Pure-L0G1C | |
# Description: DBMS | |
import bcrypt | |
import sqlite3 | |
from . import const | |
from time import time | |
from os import urandom | |
from hashlib import sha256 | |
from base64 import b64encode | |
from datetime import datetime | |
class Database(object): | |
def __init__(self): | |
self.db_path = const.DATABASE | |
self.create_tables() | |
self.create_default_account() | |
def create_tables(self): | |
self.db_create(''' | |
CREATE TABLE IF NOT EXISTS | |
Account( | |
user_id TEXT PRIMARY KEY, | |
username TEXT, | |
password TEXT | |
); | |
''') | |
self.db_create(''' | |
CREATE TABLE IF NOT EXISTS | |
Status( | |
last_online INTEGER, | |
date_created INTEGER, | |
stat_id TEXT NOT NULL, | |
FOREIGN KEY(stat_id) REFERENCES Account(user_id) | |
); | |
''') | |
self.db_create(''' | |
CREATE TABLE IF NOT EXISTS | |
Attempt( | |
last_attempt INTEGER, | |
attempts_made INTEGER, | |
ampt_id TEXT NOT NULL, | |
FOREIGN KEY(ampt_id) REFERENCES Account(user_id) | |
); | |
''') | |
self.db_create(''' | |
CREATE TABLE IF NOT EXISTS | |
Lock( | |
time_locked INTEGER DEFAULT 0, | |
lock_id TEXT NOT NULL, | |
FOREIGN KEY(lock_id) REFERENCES Account(user_id) | |
); | |
''') | |
def add_account(self, username, password): | |
username = username.lower() | |
user_id = self.gen_user_id(username, password) | |
hashed_password = self.hash_password(password) | |
self.db_update(''' | |
INSERT INTO Account(user_id, username, password) | |
VALUES(?, ?, ?); | |
''', [user_id, username, hashed_password]) | |
self.db_update(''' | |
INSERT INTO Status(last_online, date_created, stat_id) | |
VALUES(?, ?, ?); | |
''', [time(), time(), user_id]) | |
self.db_update(''' | |
INSERT INTO Attempt(last_attempt, attempts_made, ampt_id) | |
VALUES(?, ?, ?); | |
''', [time(), 0, user_id]) | |
self.db_update(''' | |
INSERT INTO Lock(lock_id) | |
VALUES(?); | |
''', [user_id]) | |
def account_exists(self, username): | |
data = self.db_query('SELECT * FROM Account WHERE username=?;', [username], False) | |
return True if len(data) else False | |
def compare_passwords(self, user_id, password): | |
hashed_password = self.db_query('SELECT password FROM Account WHERE user_id=?;', [user_id]) | |
return True if bcrypt.hashpw(password.encode('utf-8'), hashed_password) == hashed_password else False | |
def check_password(self, username, password): | |
hashed_password = self.db_query('SELECT password FROM Account WHERE username=?;', [username]) | |
return True if bcrypt.hashpw(password.encode('utf-8'), hashed_password) == hashed_password else False | |
def authenticate(self, username, password): | |
username = username.lower() | |
if self.account_exists(username): | |
user_id = self.get_user_id(username) | |
if not self.is_locked(user_id): | |
if self.check_password(username, password): | |
return self.get_user_id(username) | |
else: | |
self.failed_attempt(user_id) | |
return None | |
def is_empty(self): | |
data = self.db_query('SELECT * FROM Account;', [], False) | |
return False if len(data) else True | |
def create_default_account(self): | |
if self.is_empty(): | |
self.add_account('loki', 'ikol') | |
# -------- Attempts -------- # | |
def lock_account(self, user_id): | |
self.db_update('UPDATE Lock SET time_locked=? WHERE lock_id=?;', [time(), user_id]) | |
def failed_attempt(self, user_id): | |
current_value = self.failed_attempts_counts(user_id) | |
if current_value >= const.MAX_FAILED_ATTEMPTS-1: | |
if not self.is_locked(user_id): | |
self.lock_account(user_id) | |
else: | |
self.db_update('UPDATE Attempt SET attempts_made=? WHERE ampt_id=?;', [current_value + 1, user_id]) | |
def failed_attempts_counts(self, user_id): | |
return self.db_query('SELECT attempts_made FROM Attempt WHERE ampt_id=?;', [user_id]) | |
def is_locked(self, user_id): | |
time_locked = self.locked(user_id) | |
if time_locked: | |
if (time() - time_locked) >= const.LOCK_TIME: | |
self.remove_locked_account(user_id) | |
return False | |
else: | |
return True | |
else: | |
return False | |
def locked(self, user_id): | |
return self.db_query(''' | |
SELECT time_locked | |
FROM Lock | |
INNER JOIN Account ON account.user_id = Lock.lock_id | |
WHERE Lock.lock_id=?; | |
''', [user_id]) | |
def remove_locked_account(self, user_id): | |
self.db_update('UPDATE Attempt SET attempts_made=? WHERE ampt_id=?;', [0, user_id]) | |
# -------- Database Wrappers -------- # | |
def db_query(self, cmd, args, fetchone=True): | |
database = sqlite3.connect(self.db_path) | |
sql = database.cursor().execute(cmd, args) | |
data = sql.fetchone()[0] if fetchone else sql.fetchall() | |
database.close() | |
return data | |
def db_update(self, cmd, args): | |
database = sqlite3.connect(self.db_path) | |
database.cursor().execute(cmd, args) | |
database.commit() | |
database.close() | |
def db_create(self, cmd): | |
database = sqlite3.connect(self.db_path) | |
database.cursor().execute(cmd) | |
database.commit() | |
database.close() | |
# -------- Update -------- # | |
def update_password(self, user_id, password): | |
hashed_password = self.hash_password(password) | |
self.db_update('UPDATE Account SET password=? WHERE user_id=?;', [hashed_password, user_id]) | |
def update_username(self, user_id, username): | |
self.db_update('UPDATE Account SET username=? WHERE user_id=?;', [username.lower(), user_id]) | |
# -------- Misc -------- # | |
def hash_password(self, password): | |
return bcrypt.hashpw(password.encode('utf-8'), bcrypt.gensalt()) | |
def gen_user_id(self, username, password): | |
_username = username.encode('utf-8') + urandom(64 * 1024) | |
_password = password.encode('utf-8') + urandom(64 * 1024) | |
_username_password = b64encode(_username + _password + urandom(64 * 64)) | |
secure_hash = sha256(_username_password).digest().hex() | |
return secure_hash | |
def get_date_created(self, user_id): | |
return self.db_query('SELECT date_created FROM Status WHERE stat_id=?;', [user_id]) | |
def get_user_id(self, username): | |
return self.db_query('SELECT user_id FROM Account WHERE username=?;', [username]) | |
def get_last_active(self, user_id): | |
epoch_time = self.db_query('SELECT last_online FROM Status WHERE stat_id=?;', [user_id]) | |
self.db_update('UPDATE Status SET last_online=? WHERE stat_id=?;', [time(), user_id]) | |
return datetime.fromtimestamp(epoch_time).strftime('%b %d, %Y at %I:%M %p') | |
def get_account_status(self, user_id, username): | |
default_username = 'loki' | |
default_password = 'ikol' | |
username = username.lower() | |
is_same_password = self.compare_passwords(user_id, default_password) | |
if all([username == default_username, is_same_password]): | |
status = '** Please consider changing your username and password **' | |
elif username == default_username: | |
status = '** Please consider changing your username **' | |
elif is_same_password: | |
status = '** Please consider changing your passsword **' | |
else: | |
status = None | |
return status |
Subscribe to:
Posts (Atom)