Here are some US calls appearing over the last couple of hours
on HAMSPOTS: 

Injected via TELNET or other.

KN6V
KE5AKG
K3ML
W7YW
KR6E
KI6JL


for more or no info on these callsigns per official FCC records
see

   http://www.qrz.com/db/?cmd=1

73 Rein W6SZ


-----Original Message-----
>From: Steinar Aanesland <saa...@broadpark.no>
>Sent: Jul 8, 2010 4:25 PM
>To: digitalradio@yahoogroups.com
>Subject: Re: [digitalradio] ROS are sending data from your PC
>
>
>Yes , that is what is seems to me Rein.
>
>Let me try to explain the in my Norwegian English.
>Lest assume you are on mister ROS's hate list,  but what to test the
>software i RX mod. You are using a fake call sign to get the software is
>working.
>When you are starting the software it connect it self to a cluster via
>telnet using the fake call sing, and all your logging are sent to the
>cluster.
>
>la5vna Steinar
>
>
>
>
>On 08.07.2010 22:04, rein...@ix.netcom.com wrote:
>> Hello Steinar,
>>
>> Are you telling me that people are sending those calls to the cluster and 
>> then
>> from there end up at the  HAMSPOTS site, and never actually use those calls 
>> in 
>> transmissions? 
>>
>> Just noticed a call sign from somebody, some 25 miles from here, logged on 
>> the 
>> Twente WEBSDR! 
>>
>> 73 Rein W6SZ
>>
>> -----Original Message-----
>>   
>>> From: Steinar Aanesland <saa...@broadpark.no>
>>> Sent: Jul 8, 2010 3:28 PM
>>> To: * Digitalradio <digitalradio@yahoogroups.com>
>>> Subject: [digitalradio] ROS are sending data from your PC
>>>
>>> Hi Rain
>>>
>>> You have absolutely right . ROS are sending data from your PC to the
>>> cluster. Try to type the IP address  90.225.73.203:8000 into your
>>> browser and you get this:
>>>
>>> login: GET / HTTP/1.1
>>>
>>> Host: 90.225.73.203:8000
>>> User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; nb-NO; rv:1.9.2.6)
>>> Gecko/20100625 Firefox/3.6.6
>>> Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
>>> Accept-Language: nb,no;q=0.8,nn;q=0.6,en-us;q=0.4,en;q=0.2
>>> Accept-Encoding: gzip,deflate
>>> Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
>>> Keep-Alive: 115
>>> Connection: keep-alive
>>>
>>> Sorry GET / HTTP/1.1 is an invalid callsign
>>>
>>>
>>> -------------------------
>>>
>>>
>>> Then try to type c:>telnet 90.225.73.203 8000 , then you will see that
>>> this is TELNET and  that explains the funny call sings . Whe people is
>>> bande in this software whey are using a fake call sign . This fake call
>>> sign is the sent to the cluster when people is in RX mode.
>>>
>>> I hope this is understandable .
>>>
>>>
>>> LA5VNA Steinar
>>>
>>>
>>>
>>>
>>> On 08.07.2010 20:53, Steinar Aanesland wrote:
>>>     
>>>> Hi Rein
>>>>
>>>> After reading your mail about ROS and the HamSpots , I have done some
>>>> testing. I have monitored the activity of the latest  ROS v4.5.7 in RX
>>>> mode. I have been using Process Explorer from Sysinternals (microsoft)
>>>> .With The Process Explorer you have the possibility to see the network
>>>> activity in real time .
>>>>
>>>> What I fount out was that  the ADIFdata2 module in ROS was trying to
>>>> connect to the address: 90.225.73.203,  217.31.161.71,8  or
>>>> 217.31.161.34.50 on port 8000 and sending data from my computer.
>>>>
>>>> LA5VNA Steinar
>>>>
>>>>       
>>>>>         
>>>>
>>>>
>>>>
>>>>
>>>> On 08.07.2010 05:20, Rein A wrote:
>>>>       
>>>>>  Thank you, Laurei:
>>>>>
>>>>> Where Do The Spots Come From?
>>>>> 08-Jul-2010 14:45utc
>>>>> There has been much internet speculation that HamSpots gets the ROS
>>>>>         
>>>> spots directly from the ROS Software. This is INCORRECT.
>>>>       
>>>>> ROS spots are retrieved from the DX Cluster ONLY.
>>>>> This site has no relationship with the ROS software or its developer.
>>>>>
>>>>> HamSpots maintains a private dedicated Cluster Node and processes all
>>>>>         
>>>> incoming spots to that node to determine the mode being used (ROS, PSK,
>>>> RTTY, SSTV, HELL, etc.) to display correctly on the individual Mode Pages.
>>>>       
>>>>> HamSpots also takes direct feeds from the PSKReporter Network (thanks
>>>>>         
>>>> to N1DQ) and the JT65 Reverse Beacon Network (thanks to W6CQZ).
>>>>       
>>>>>
>>>>> 73 Rein, W6SZ
>>>>>
>>>>>
>>>>>         
>>>>
>>>>       
>>>
>>>
>>>
>>> ------------------------------------
>>>
>>> http://www.obriensweb.com/digispotter.html
>>> Chat, Skeds, and "Spots" all in one (resize to suit)
>>>
>>> Facebook= http://www.facebook.com/pages/digitalradio/123270301037522
>>>
>>> Yahoo! Groups Links
>>>
>>>
>>>
>>>     
>>
>>   
>
>
>
>------------------------------------
>
>http://www.obriensweb.com/digispotter.html
>Chat, Skeds, and "Spots" all in one (resize to suit)
>
>Facebook= http://www.facebook.com/pages/digitalradio/123270301037522
>
>Yahoo! Groups Links
>
>
>

Reply via email to