Category Archives: IT

IT

Chrome browser: Bypass “Your connection is not private” Message

Interesting post on how to bypass the Chrome browser “Your connection is not private” and other SSL errors.

What I learned and I liked is Option 2:

Option 2 – Prevent Warning

  1. Click a blank section of the denial page.
  2. Using your keyboard, type thisisunsafe. This will add the website to a safe list, where you should not be prompted again.

It surely works! Tested!

Инсталация на stampit КЕП (квалифициран електронен подпис) на Apple лаптопи с M2 чип

Едно бързо и конкретно ръководство за инсталация на КЕП от StampIT (от Информационно обслужване АД) на Macbook Pro с новия M2 чип и MacOS Monterey v.12.4.

Моят КЕП и това ръководство е за:

  • четец – CIR1158
  • карта – StampIT ID Prime 940

Ето как да проверите моделите на вашия четец на карта и на самата карта:

Continue reading Инсталация на stampit КЕП (квалифициран електронен подпис) на Apple лаптопи с M2 чип

Unrar notes

wwW.sanet.me – December, 2016
wWw.sanet.me – November , 2016
softarchive.net – 2012-2015

110110110

softarchive.la
www.softachive.la

www.softarchive.la
softarchive.la
wwW.sanet.me
wWw.sanet.me
softarchive.net
sanet.me
www.sanet.cd
sanet.cd

And for:

SAnet.st.Learnhowtoextractdatafromwebpagesusing.rar

File size: 496.18 MB MD5: ed9934ab57420e733a273dac96e97afd

Try with pass: SAnet.ST

Compatible PoE adapter for camera Reolink RLC-520A

I have ordered in March 2022 the Reolink PoE Security Camera RLC-520A at amazon.de

The camera comes without power adaptor! So I had to find one. It is really hard to find what are the compatible devices for PoE option to supply the camera.

On the Reolink page it is written that the PoE should be compatible with:

PoE: IEEE 802.3af, 48V Active

Though on most of PoE adapters it is not written if they are “Active” or not. And in some forums you can find a lot of failed attempts to use different PoE adapters and some replies that they are failing to work because they are not active.

I got from a friend a spare PoE power adapter as follow:

Ubiquiti Networks POE-48-24W PoE adapter 48 V
EAN: 810354023064
SKU: POE-48-24W

Although it is not stated that it is “Active” adapter it works and successfully powers the Reolink RCL-520A camera. So Ubiquiti POE-48-24W is COMPATIBLE with Reolink RCL-520A. ✅✅✅

  • Note (tip): You need to connect power AND wired LAN signal in order to adapter to send power to the camera! Otherwise using only power adapter and camera may trick you that it is not working.

3d Flag Map Of Bulgaria Royalty Free Stock Images - Image: 5610649Lang: bg (на български) :
Съвместимост на камера Reolink RCL-520A с PоE адаптер от Ubiquiti

– Камера Reolink RCL-520A е съвместима и може да се ползва с PoE адаптер от Ubiquiti POE-48-24W PoE adapter 48 V.
* Важно: За да работи освен захранване и UTP кабел от захранването към камерата, трябва да се подаде и LAN сигнал по кабела за интернет връзка! ✅✅✅

BASE64 email raw attachment – Decode on MacOS

Take the attachment file which is Base64 encoded. The section should look like below. There is an opening string “–00000000000039139405d8b03aff” and closing with the same string “–00000000000039139405d8b03aff”. Your code will be different but beginning and ending will be always the same.

–00000000000039139405d8b03aff
Content-Type: application/msword;
name=”File22.doc”
Content-Disposition: attachment;
filename=”File22.doc”
Content-Transfer-Encoding: base64
Content-ID: <17f26f7ffc9d845639d2>
X-Attachment-Id: 17f26f7ffc9d845639d2

0M8R4KGxGuEAAAAAAAAAAAAAAAAAAAAAPgADAP7/CQAGAAAAAAAAAAAAAAABAAAAXgAAAAAAAAAA
pcEAa+ACBAAA8BK/AAAAAAAAEAAAAAAACAAA2jEAAA4AYmpialvdW90AAAAAAAAAAAAAAAAAAAAA

…………
…………
AAAAAAAAAAAAAAAAAA==

–00000000000039139405d8b03aff

Get the encoded text which starts on a new line and ends on the line before the last string “-00xxxxxx” (Bolded text below).

Method 1 – Save to text file and decode it

Save it as text file (base64.txt) in a directory.

Open it in Terminal , go to this directory and execute the command replacing the filename properly:

base64 --decode base64.txt > File22.doc

Method 2 – all in one command

base64 --decode > File22.doc
Paste_from_clipboard_the_encoded_text_here_VGhpcyBpcyBiYXNlNjQgZW5jb2RlZAo=

and press [ctrl+d] to send the pasted text.

Method 3 – use site for files up to 2MB

https://www.freeformatter.com/base64-encoder.html

Dr. Rober Epstein при Joe Rogan (podcast #1768)

https://open.spotify.com/episode/4q0cNkAHQQMBTu4NmeNW7E?si=a5d8de91f2b44c5b

Един интересен подкаст с Dr. Rober Epstein при Joe Rogan – интересни факти и истории и наблюдения за търсенето в google, може ли и как се манипулират изборите ни на избори и всеки ден с резултатите, подсказванията и т.н.

Амазон – най-големият рекламодател в Google

Apple и те събират, но не е ясно за какво ползват инфо.

Facebook – ясно, че основно събират и търгуват с информация за хората

Войната с Микромеките на Google до 2015-2016та е повсеместна по съдилища и изведнъж свалят всички дела и М$ почват с Win10 и 11 да следят потребителите си. (Т.нар. surveillance business model).

70% от гледаните клипове в YouTube са препоръчаните в “Up next”…

WOL = Wake-on-lan

How to make a Wake-on-LAN (WOL) wakeup call to a PC from your Mac OS in the same network or from Internet.

So the case is you have a home PC (Windows 10 desktop) running behind a Synology NAS, which is always connected to the Internet. The NAS is always on, but the PC is rarely accessed just for some special software installed on it.

To access the PC in my home network I have setup:

  • OpenVPN server setup on the Synology
  • Windows 10 Pro version which allows Remote desktop connection

So to use the software on the PC remotely you have t setup on you Mac OS:

  • OpenVPN client in order to connect to your home network – Tunnelblick (free)
  • Microsoft Remote Desktop app (free)

And this is working fine. But… You may want to sleep the PC and wake it only when you need it.

In order to be able to wake the PC you need to allow this feature in the BIOS of your PC. Also check the settings in Windows.

And then you have two cases:

A) Wake PC from Mac in the same network (WiFi):

Check this Q&A:

https://apple.stackexchange.com/questions/95246/wake-other-computers-from-mac-osx

I liked the Ruby way:

The RubyGems package which is stock (installed by default) on Mac, can also be used to install a wake on lan app. Just use the “gem install wol” command in terminal.

   gem install wol

It will install the activity in /usr/bin/local/wol.

As an aside, the wol tool can wake a properly configured Synology NAS or my Home PC.

cd /usr/local/bin

Now you have “wol” command script in this directory.

Create a new script:

sudo nano wol_pc
/usr/local/bin/wol 70:85:C2:70:23:8D

Use keys to save & exit:
^O , Enter
^X

sudo chmod +x wol_pc

This is the simple way, but not so common in use. Usually you are away and want to connect to the PC, do some work and leave without to go home for this task. Then see case B)

B) Wake PC from Mac NOT in the same network using VPN connection and Synology NAS to send the Wake-on-LAN signal.

Mac –(internet)–> Synology VPN server –(local network)–> Home PC

The WOL signal is send on port 9 using the broadcast address in your network. The issue is that using VPN you may have issues to send this WOL signal through the VPN tunnel and wake the PC.

The solution I implemented is:

to have a web page in my local network hosted on my NAS. By opening this page in my browser (when I am connected with the VPN) it will send locally from NAS the Wake-on-LAN(WOL) signal and wake the PC as if I am at home on my NAS.

Enable Synology “Web station” in order to be able to be able to open a page in my Mac OS browser.
https://kb.synology.com/en-us/DSM/tutorial/How_to_host_a_website_on_Synology_NAS

Create “wakeonlan.py” and “wol.php” page

/volume1/web/wakeonlan.py

!/usr/bin/env python
import socket
import sys
if len(sys.argv) < 3:
  print 'Usage: wakeonlan.py (example: 192.168.1.255 00:11:22:33:44:55)'
  sys.exit(1)
mac = sys.argv[2]
data = ''.join(['FF' * 6, mac.replace(':', '') * 16])
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
sock.setsockopt(socket.SOL_SOCKET, socket.SO_BROADCAST, 1)
sock.sendto(data.decode("hex"), (sys.argv[1], 9))

So calling this in shell/terminal:

python wakeonlan.py 192.168.10.255 FF:85:C2:70:23:8D

Will send a message on port 9 for the specified Network MAC Address!

Useful info: You cannot wake-up your PC by simply making PING to its IP address, because in Sleep state it does not keep/have IP address (even if it is fixed on your router or the PC!).
Wake-on-LAN relies on the NIC (network interface card) to be the only not-sleeping device which waits the wakeup call on port 9 and it recognises calls addressed to it by its MAC address (e.g. FF:85:C2:70:23:8D as in the example above).

Activate in “Package center” the “Web station”
in Web station (for DSM ver 6.2) :
–> “General settings” –> select PHP version: e.g. 7.3
I have NOT enabled the personal web sites!!! If you have enabled them, then your web directory will be at different path than mine!!!

Create the following PHP script in /volume1/web/ :

wol.php

<?php
// outputs the username that owns the running php/httpd process
// // (on a system with the "whoami" executable in the path)
$output=null;
$retval=null;
exec('whoami', $output, $retval);
echo "Returned with status $retval and output:\n";
print_r($output);

$output = "";
exec('python wakeonlan.py 192.168.10.255 FF:85:C2:70:23:8D', $output, $retval);

echo "Calling WAKE-ON-LAN command:";
print_r($output);
?>

So now once you have established VPN connection to your home network via OpenVPN, you have to open your browser and the local page on your Synology like this:

http://your_synoklogy_ip/wol.php

And depending on the speed of your PC (for mine it’s 5-6 seconds) you can use the Remote Desktop as usual to connect to Windows 10 desktop.

Enjoy.


Интересна тема за размисъл – Дали не подкопахме бъдещите дигитални професии?

Източник:
https://technews.bg/article-128096.html – “Дали не подкопахме бъдещите дигитални професии?”

Определено първият досег с компютъра не донесе очарованието, което би запленило децата.

Един възрастен професор по медийните науки разказва, че някога да имаш радиоапарат у дома е било рядкост. По това време радиото е било по-скоро екстра за най-богатите или, в по-честия случай, хоби за любителите-техничари, които са сглобявали самостоятелно лампови радиоприемници. Имало е даже кръжоци по радио-моделиране. По-късно, в края на 90-те, сходна беше картината с компютъра: младите хора нерядко си купуваха компоненти и си сглобяваха компютрите сами. Тогава процесът беше забавление и вълнение – да го сглобиш и да заработи, че да поиграеш или да си сред първите, влезли в това ново чудо интернет. Компютърът имаше своята магия…

Някой хора ще разберат от личен опит за какво става дума…

List of Android hidden USSD codes

Да не изчезне от източника: http://www.geekboots.com/tips-and-tricks/list-of-android-hidden-ussd-codes-that-you-must-know е това копие на интересни кодове за Андроид.

List of Android hidden USSD codes – Списък с кодове за управление на Андроид устройства

  1. *#06# = Check IMEI of your device.
  2. *#0*# = Enter service menu on the very new Android phones.
  3. *#0228# = Check battery status.
  4. *#9090# / *#1111# = Make device in Service mode.
  5. *#*#4636#*#* = Get information about battery, usage statistics and device.
  6. *#*#34971539#*#* = Get all information about camera.
  7. *#12580*369# = Get software and hardware info.
  8. *#228# = For ADC Reading.
  9. #7353# = Hide test menu 2/Self Test Mode.
  10. ##7764726 = Hide service menu for Motorola Droid.
  11. *#*#273283*255*663282*#*#* =For backup of our all media files.
  12. *#*#232338#*#* = Display the Wi-Fi mac address.
  13. *#7465625# = View status of lock-phone.
  14. *#*#3264#*#* = Show RAM version.
  15. *#*#44336#*#* = Display build time and change list number.
  16. *#*#232337#*# = Display device’s Bluetooth address.
  17. *#*#197328640#*#* = Enables test mode for service.
  18. *#*#8351#*#* = Enable voice dial mode.
  19. *#*#8350#*#* = Disable the voice dial mode.
  20. *#*#0842#*#* = Test Back-light/vibration.
  21. *#*#2664#*#* = Test the touch-screen.
  22. *#*#0289#*#* =For Audio test.
  23. *#*#0*#*#* =For LCD display test.
  24. *#*#232331#*#* = Test Bluetooth of any Android device.
  25. *#*#0283#*#* = Perform a packet loop-back test.
  26. *#*#1575#*#* =For advanced GPS test.
  27. *#*#1472365#*#* =Perform a quick GPS test.
  28. *#*#0588#*#* = Perform a proximity sensor test.
  29. *#*#7262626#*#* = Perform field test.
  30. *#*#232339#*#* =Testing Wireless LAN.
  31. *#9090# = Diagnose configuration of device.
  32. *#872564# = Control U-S-B logging.
  33. *#9900# =System dump mode.
  34. *#*#7780#*#* =Resetto factory state.
  35. *2767*3855# = Format Android device.
  36. *#*#4986*2650468#*#* = Get PDA, phone, H/W and RF Call Date.
  37. *#*#1234#*#* = Know about PDA and firmware version.
  38. *#*#1111#*#* =FTA Software version.
  39. *#*#2222#*#* =FTA Hardware version.
  40. *#*#7594#*#* = Change power button behavior once code enabled.
  41. *#*#8255#*#* = Launch Google Talk service monitor.