Steinar,

Let me try that again.

People are banned ( they are not allowed to use ROS, an absurd idea to start 
with. )

If I think of other authors wanting to add ROS to their package and then,
users or perhaps buyers of those packages, discovering they can not use the ROS 
software because their call signs are on an hard programmed list of banned 
calls as
part of ROS! Imagine that!!

Can't believe Jose is so stupid.

So they are banned. They semi bypass the ban by injecting their calls into 
the cluster so those calls appear as using ROS modem.

I hope I got this right?

Then what is the use of doing this? 

Irritating Jose ( not difficult to accomplish ) ?
Playing games with the regulating authority?
Showing a perverted mind?

Explain please.

73 Rein W6SZ






-----Original Message-----
>From: Steinar Aanesland <[email protected]>
>Sent: Jul 8, 2010 4:11 PM
>To: * ROSDIGITALMODEMGROU <[email protected]>, * 
>Digitalradio <[email protected]>
>Subject: [digitalradio] Fwd: Re: [ROSDIGITALMODEMGROUP] HAMSPOTS the final word
>
>
>Hoho, world champion in typo. Here is what I was trying to explain:
>
>
>Then try to type c:>telnet 90.225.73.203 8000 , then you will see that
>this is TELNET and  that explains the funny call sign . When people is
>banned to use this software they are using a fake call sign . This fake call
>sign is then sent to the cluster when people are in RX mode.
>
>
>
>I hope the is better...
>
>LA5VNA Steinar
>
>
>
>
>
>-------- Original Message --------
>Subject:     Re: [ROSDIGITALMODEMGROUP] HAMSPOTS the final word
>Date:     Thu, 08 Jul 2010 21:26:30 +0200
>From:     Steinar Aanesland <[email protected]>
>Reply-To:     [email protected]
>To:     * ROSDIGITALMODEMGROU <[email protected]>
>
>
>Hi Rain
>
>You have absolutely right . ROS are sending data from your PC to the
>cluster. Try to type the IP address  90.225.73.203:8000 into your
>browser and you get this:
>
>login: GET / HTTP/1.1
>
>Host: 90.225.73.203:8000
>User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; nb-NO; rv:1.9.2.6)
>Gecko/20100625 Firefox/3.6.6
>Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
>Accept-Language: nb,no;q=0.8,nn;q=0.6,en-us;q=0.4,en;q=0.2
>Accept-Encoding: gzip,deflate
>Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
>Keep-Alive: 115
>Connection: keep-alive
>
>Sorry GET / HTTP/1.1 is an invalid callsign
>
>
>-------------------------
>
>
>Then try to type c:>telnet 90.225.73.203 8000 , then you will see that
>this is TELNET and  that explains the funny call sings . Whe people is
>bande in this software whey are using a fake call sign . This fake call
>sign is the sent to the cluster when people is in RX mode.
>
>I hope this is understandable .
>
>
>LA5VNA Steinar
>
>
>
>
>
>
>
>
>
>
>
>
>On 08.07.2010 20:53, Steinar Aanesland wrote:
>>
>> Hi Rein
>>
>> After reading your mail about ROS and the HamSpots , I have done some
>> testing. I have monitored the activity of the latest  ROS v4.5.7 in RX
>> mode. I have been using Process Explorer from Sysinternals (microsoft)
>> .With The Process Explorer you have the possibility to see the network
>> activity in real time .
>>
>> What I fount out was that  the ADIFdata2 module in ROS was trying to
>> connect to the address: 90.225.73.203,  217.31.161.71,8  or
>> 217.31.161.34.50 on port 8000 and sending data from my computer.
>>
>> LA5VNA Steinar
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> On 08.07.2010 05:20, Rein A wrote:
>>>
>>>  Thank you, Laurei:
>>>
>>> Where Do The Spots Come From?
>>> 08-Jul-2010 14:45utc
>>> There has been much internet speculation that HamSpots gets the ROS
>> spots directly from the ROS Software. This is INCORRECT.
>>> ROS spots are retrieved from the DX Cluster ONLY.
>>> This site has no relationship with the ROS software or its developer.
>>>
>>> HamSpots maintains a private dedicated Cluster Node and processes all
>> incoming spots to that node to determine the mode being used (ROS, PSK,
>> RTTY, SSTV, HELL, etc.) to display correctly on the individual Mode Pages.
>>>
>>> HamSpots also takes direct feeds from the PSKReporter Network (thanks
>> to N1DQ) and the JT65 Reverse Beacon Network (thanks to W6CQZ).
>>>
>>>
>>> 73 Rein, W6SZ
>>>
>>>
>>
>>
>
>
>
>
>
>
>------------------------------------
>
>http://www.obriensweb.com/digispotter.html
>Chat, Skeds, and "Spots" all in one (resize to suit)
>
>Facebook= http://www.facebook.com/pages/digitalradio/123270301037522
>
>Yahoo! Groups Links
>
>
>

Reply via email to