Hi Laurie

This is exactly the same as I have discovered. Thanks for writing  this
in an understandably English ;)

la5vna Steinar






On 09.07.2010 04:55, Laurie, VK3AMA wrote:
> While researching ROS cluster spots arriving at HamSpots.net via the 
> Cluster, I have discovered how the ROS software is auto-spotting to a 
> list of nodes that may be of concern to the Node Sysops.
>
> The following Node addresses are hard-coded in the software.
>
> dxc.us6iq.com
> dxc.ham.hr
> 9a0dxc.hamradio.hr
> remo3.renet.ru
> cluster.sk4bw.net
> ax25.org
> sk3w.se
> sector7.nu
> sm7gvf.dyndns.org
>
> ROS software establishes a connection at startup using your callsign and 
> varies which node it connects to, not always the same node.
>
> When a qso is logged  a spot is auto generated (there is no option in 
> ROS to turn this off that I could find) and the text of the spot is 
> changed based on another hard-coded list of messages. This is obviously 
> done to give the impression that the spot is sent from a human (unlike 
> the past flooding of the network, same text and same node).
>
> *******************************************************************
> No where in the ROS FAQ or User Guide is this behaviour documented.
> *******************************************************************
>
> I ran ROS in RX mode today, after a callsign was decoded, I hit the log 
> button and it sent a spot to the cluster without permission with my name 
> and call thanking the other station for the QSO.
>
> A quick review of recent ROS spots shows the same listed nodes being 
> used and similar style comments.
>
> What other surprises are hidden in this software?
>
> de Laurie, VK3AMA
>
>
>   

Reply via email to