extremely wicked; "nefarious schemes"; "a villainous plot"; "a villainous 
band of thieves"

I had to use Google to learn that expression. Not using it much in daily 
conversations.

What are you trying to get to James?

Why is it that trying to figure out how systems work excites you?

Once I am through with this little project you might understand or
perhaps not why I am doing this. 

73 Rein W6SZ


I had to use Google to learn that expression.

-----Original Message-----
>From: James Hall <[email protected]>
>Sent: Jul 8, 2010 4:00 PM
>To: [email protected]
>Subject: Re: [digitalradio] ROS are sending data from your PC
>
>Looks like this is a DX Cluster server available on the Internet running a
>software package called DXSpider.
>http://wiki.dxcluster.org/index.php/Main_Page Doesn't seem to be nefarious
>at all to me. Telnet in, give your callsign and it'll start giving you info.
>I have no clue how to read this but there it is.
>
>On Thu, Jul 8, 2010 at 3:28 PM, Steinar Aanesland <[email protected]>wrote:
>
>>
>>
>> Hi Rain
>>
>> You have absolutely right . ROS are sending data from your PC to the
>> cluster. Try to type the IP address 90.225.73.203:8000 into your
>> browser and you get this:
>>
>> login: GET / HTTP/1.1
>>
>> Host: 90.225.73.203:8000
>> User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; nb-NO; rv:1.9.2.6)
>> Gecko/20100625 Firefox/3.6.6
>> Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
>> Accept-Language: nb,no;q=0.8,nn;q=0.6,en-us;q=0.4,en;q=0.2
>> Accept-Encoding: gzip,deflate
>> Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
>> Keep-Alive: 115
>> Connection: keep-alive
>>
>> Sorry GET / HTTP/1.1 is an invalid callsign
>>
>> -------------------------
>>
>> Then try to type c:>telnet 90.225.73.203 8000 , then you will see that
>> this is TELNET and that explains the funny call sings . Whe people is
>> bande in this software whey are using a fake call sign . This fake call
>> sign is the sent to the cluster when people is in RX mode.
>>
>> I hope this is understandable .
>>
>> LA5VNA Steinar
>>
>> On 08.07.2010 20:53, Steinar Aanesland wrote:
>> >
>> > Hi Rein
>> >
>> > After reading your mail about ROS and the HamSpots , I have done some
>> > testing. I have monitored the activity of the latest ROS v4.5.7 in RX
>> > mode. I have been using Process Explorer from Sysinternals (microsoft)
>> > .With The Process Explorer you have the possibility to see the network
>> > activity in real time .
>> >
>> > What I fount out was that the ADIFdata2 module in ROS was trying to
>> > connect to the address: 90.225.73.203, 217.31.161.71,8 or
>> > 217.31.161.34.50 on port 8000 and sending data from my computer.
>> >
>> > LA5VNA Steinar
>> >
>> >>
>> >
>> >
>> >
>> >
>> >
>> > On 08.07.2010 05:20, Rein A wrote:
>> >>
>> >> Thank you, Laurei:
>> >>
>> >> Where Do The Spots Come From?
>> >> 08-Jul-2010 14:45utc
>> >> There has been much internet speculation that HamSpots gets the ROS
>> > spots directly from the ROS Software. This is INCORRECT.
>> >> ROS spots are retrieved from the DX Cluster ONLY.
>> >> This site has no relationship with the ROS software or its developer.
>> >>
>> >> HamSpots maintains a private dedicated Cluster Node and processes all
>> > incoming spots to that node to determine the mode being used (ROS, PSK,
>> > RTTY, SSTV, HELL, etc.) to display correctly on the individual Mode
>> Pages.
>> >>
>> >> HamSpots also takes direct feeds from the PSKReporter Network (thanks
>> > to N1DQ) and the JT65 Reverse Beacon Network (thanks to W6CQZ).
>> >>
>> >>
>> >> 73 Rein, W6SZ
>> >>
>> >>
>> >
>> >
>>
>>  
>>

Reply via email to