Category Archives: IT


BASE64 email raw attachment – Decode on MacOS

Take the attachment file which is Base64 encoded. The section should look like below. There is an opening string “–00000000000039139405d8b03aff” and closing with the same string “–00000000000039139405d8b03aff”. Your code will be different but beginning and ending will be always the same.

Content-Type: application/msword;
Content-Disposition: attachment;
Content-Transfer-Encoding: base64
Content-ID: <17f26f7ffc9d845639d2>
X-Attachment-Id: 17f26f7ffc9d845639d2




Get the encoded text which starts on a new line and ends on the line before the last string “-00xxxxxx” (Bolded text below).

Method 1 – Save to text file and decode it

Save it as text file (base64.txt) in a directory.

Open it in Terminal , go to this directory and execute the command replacing the filename properly:

base64 --decode base64.txt > File22.doc

Method 2 – all in one command

base64 --decode > File22.doc

and press [ctrl+d] to send the pasted text.

Method 3 – use site for files up to 2MB

Dr. Rober Epstein при Joe Rogan (podcast #1768)

Един интересен подкаст с Dr. Rober Epstein при Joe Rogan – интересни факти и истории и наблюдения за търсенето в google, може ли и как се манипулират изборите ни на избори и всеки ден с резултатите, подсказванията и т.н.

Амазон – най-големият рекламодател в Google

Apple и те събират, но не е ясно за какво ползват инфо.

Facebook – ясно, че основно събират и търгуват с информация за хората

Войната с Микромеките на Google до 2015-2016та е повсеместна по съдилища и изведнъж свалят всички дела и М$ почват с Win10 и 11 да следят потребителите си. (Т.нар. surveillance business model).

70% от гледаните клипове в YouTube са препоръчаните в “Up next”…

WOL = Wake-on-lan

How to make a Wake-on-LAN (WOL) wakeup call to a PC from your Mac OS in the same network or from Internet.

So the case is you have a home PC (Windows 10 desktop) running behind a Synology NAS, which is always connected to the Internet. The NAS is always on, but the PC is rarely accessed just for some special software installed on it.

To access the PC in my home network I have setup:

  • OpenVPN server setup on the Synology
  • Windows 10 Pro version which allows Remote desktop connection

So to use the software on the PC remotely you have t setup on you Mac OS:

  • OpenVPN client in order to connect to your home network – Tunnelblick (free)
  • Microsoft Remote Desktop app (free)

And this is working fine. But… You may want to sleep the PC and wake it only when you need it.

In order to be able to wake the PC you need to allow this feature in the BIOS of your PC. Also check the settings in Windows.

And then you have two cases:

A) Wake PC from Mac in the same network (WiFi):

Check this Q&A:

I liked the Ruby way:

The RubyGems package which is stock (installed by default) on Mac, can also be used to install a wake on lan app. Just use the “gem install wol” command in terminal.

   gem install wol

It will install the activity in /usr/bin/local/wol.

As an aside, the wol tool can wake a properly configured Synology NAS or my Home PC.

cd /usr/local/bin

Now you have “wol” command script in this directory.

Create a new script:

sudo nano wol_pc
/usr/local/bin/wol 70:85:C2:70:23:8D

Use keys to save & exit:
^O , Enter

sudo chmod +x wol_pc

This is the simple way, but not so common in use. Usually you are away and want to connect to the PC, do some work and leave without to go home for this task. Then see case B)

B) Wake PC from Mac NOT in the same network using VPN connection and Synology NAS to send the Wake-on-LAN signal.

Mac –(internet)–> Synology VPN server –(local network)–> Home PC

The WOL signal is send on port 9 using the broadcast address in your network. The issue is that using VPN you may have issues to send this WOL signal through the VPN tunnel and wake the PC.

The solution I implemented is:

to have a web page in my local network hosted on my NAS. By opening this page in my browser (when I am connected with the VPN) it will send locally from NAS the Wake-on-LAN(WOL) signal and wake the PC as if I am at home on my NAS.

Enable Synology “Web station” in order to be able to be able to open a page in my Mac OS browser.

Create “” and “wol.php” page


!/usr/bin/env python
import socket
import sys
if len(sys.argv) < 3:
  print 'Usage: (example: 00:11:22:33:44:55)'
mac = sys.argv[2]
data = ''.join(['FF' * 6, mac.replace(':', '') * 16])
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
sock.setsockopt(socket.SOL_SOCKET, socket.SO_BROADCAST, 1)
sock.sendto(data.decode("hex"), (sys.argv[1], 9))

So calling this in shell/terminal:

python FF:85:C2:70:23:8D

Will send a message on port 9 for the specified Network MAC Address!

Useful info: You cannot wake-up your PC by simply making PING to its IP address, because in Sleep state it does not keep/have IP address (even if it is fixed on your router or the PC!).
Wake-on-LAN relies on the NIC (network interface card) to be the only not-sleeping device which waits the wakeup call on port 9 and it recognises calls addressed to it by its MAC address (e.g. FF:85:C2:70:23:8D as in the example above).

Activate in “Package center” the “Web station”
in Web station (for DSM ver 6.2) :
–> “General settings” –> select PHP version: e.g. 7.3
I have NOT enabled the personal web sites!!! If you have enabled them, then your web directory will be at different path than mine!!!

Create the following PHP script in /volume1/web/ :


// outputs the username that owns the running php/httpd process
// // (on a system with the "whoami" executable in the path)
exec('whoami', $output, $retval);
echo "Returned with status $retval and output:\n";

$output = "";
exec('python FF:85:C2:70:23:8D', $output, $retval);

echo "Calling WAKE-ON-LAN command:";

So now once you have established VPN connection to your home network via OpenVPN, you have to open your browser and the local page on your Synology like this:


And depending on the speed of your PC (for mine it’s 5-6 seconds) you can use the Remote Desktop as usual to connect to Windows 10 desktop.


Интересна тема за размисъл – Дали не подкопахме бъдещите дигитални професии?

Източник: – “Дали не подкопахме бъдещите дигитални професии?”

Определено първият досег с компютъра не донесе очарованието, което би запленило децата.

Един възрастен професор по медийните науки разказва, че някога да имаш радиоапарат у дома е било рядкост. По това време радиото е било по-скоро екстра за най-богатите или, в по-честия случай, хоби за любителите-техничари, които са сглобявали самостоятелно лампови радиоприемници. Имало е даже кръжоци по радио-моделиране. По-късно, в края на 90-те, сходна беше картината с компютъра: младите хора нерядко си купуваха компоненти и си сглобяваха компютрите сами. Тогава процесът беше забавление и вълнение – да го сглобиш и да заработи, че да поиграеш или да си сред първите, влезли в това ново чудо интернет. Компютърът имаше своята магия…

Някой хора ще разберат от личен опит за какво става дума…

List of Android hidden USSD codes

Да не изчезне от източника: е това копие на интересни кодове за Андроид.

List of Android hidden USSD codes – Списък с кодове за управление на Андроид устройства

  1. *#06# = Check IMEI of your device.
  2. *#0*# = Enter service menu on the very new Android phones.
  3. *#0228# = Check battery status.
  4. *#9090# / *#1111# = Make device in Service mode.
  5. *#*#4636#*#* = Get information about battery, usage statistics and device.
  6. *#*#34971539#*#* = Get all information about camera.
  7. *#12580*369# = Get software and hardware info.
  8. *#228# = For ADC Reading.
  9. #7353# = Hide test menu 2/Self Test Mode.
  10. ##7764726 = Hide service menu for Motorola Droid.
  11. *#*#273283*255*663282*#*#* =For backup of our all media files.
  12. *#*#232338#*#* = Display the Wi-Fi mac address.
  13. *#7465625# = View status of lock-phone.
  14. *#*#3264#*#* = Show RAM version.
  15. *#*#44336#*#* = Display build time and change list number.
  16. *#*#232337#*# = Display device’s Bluetooth address.
  17. *#*#197328640#*#* = Enables test mode for service.
  18. *#*#8351#*#* = Enable voice dial mode.
  19. *#*#8350#*#* = Disable the voice dial mode.
  20. *#*#0842#*#* = Test Back-light/vibration.
  21. *#*#2664#*#* = Test the touch-screen.
  22. *#*#0289#*#* =For Audio test.
  23. *#*#0*#*#* =For LCD display test.
  24. *#*#232331#*#* = Test Bluetooth of any Android device.
  25. *#*#0283#*#* = Perform a packet loop-back test.
  26. *#*#1575#*#* =For advanced GPS test.
  27. *#*#1472365#*#* =Perform a quick GPS test.
  28. *#*#0588#*#* = Perform a proximity sensor test.
  29. *#*#7262626#*#* = Perform field test.
  30. *#*#232339#*#* =Testing Wireless LAN.
  31. *#9090# = Diagnose configuration of device.
  32. *#872564# = Control U-S-B logging.
  33. *#9900# =System dump mode.
  34. *#*#7780#*#* =Resetto factory state.
  35. *2767*3855# = Format Android device.
  36. *#*#4986*2650468#*#* = Get PDA, phone, H/W and RF Call Date.
  37. *#*#1234#*#* = Know about PDA and firmware version.
  38. *#*#1111#*#* =FTA Software version.
  39. *#*#2222#*#* =FTA Hardware version.
  40. *#*#7594#*#* = Change power button behavior once code enabled.
  41. *#*#8255#*#* = Launch Google Talk service monitor.

Цифрови монополисти и системи

Много хора се учудват на искрената ми ненавист по адрес на Цифрови Системи и техния Register.BG. Откакто има интернет в България ревниво се пази да няма втори регистратор в BG домейна, а процедурата за регистрация е направо като от преди два века – документи, факсове, такси и не на последно място цени на монопол ПАК
Ето защо пак сме на последно място в ЕС :
“С .bg са регистрирани 38 704 сайта, а страната ни се намира непосредствено над несъществуващата вече Югославия (с домейн .yu).
За сметка на това ние сме изпреварени от Естония, Словения, Беларус, Исландия, Лихтенщайн и в интерес на истината от почти всички европейски държави.”.
Така е, като регистрацията в БГ е 36 евро !!! а EU и COM са около 10 евро.

Цифрови системи и монополисти Бе Ге да го Е***
Цифрови системи и монополисти Бе Ге да го Е***