http://beagleboard-usbsniffer.blogspot.com/?m=1 and I think there are a few
newer variants.

On Wed, Apr 8, 2015, 7:23 PM Pavel Kirkovsky <[email protected]> wrote:

> Thanks for the replies, everyone!
> I’ll continue on with USBpcap and follow up with Kenny to try a hardware
> capture
>
> ----------------
> [email protected] (Email/XMPP)
> https://kirkovsky.com
>
> OTR Fingerprint: 0DC94FB7 CF0F6989 E2746A37 0EADCF54 00145E35
> Key fingerprint: 4328CFD67B46A8FB32270F4F0CE4A0B83F3FC81F
> Public Key: https://kirkovsky.com/[email protected]
> Public Key (PKA): `gpg --auto-key-locate pka -ea -r [email protected]`
> Public Key (Github): https://gist.github.com/pkirkovsky/
> 01071907297b34829249
>
> _______________________________________________
> dorkbotpdx-blabber mailing list
> [email protected]
> http://music.columbia.edu/mailman/listinfo/dorkbotpdx-blabber
_______________________________________________
dorkbotpdx-blabber mailing list
[email protected]
http://music.columbia.edu/mailman/listinfo/dorkbotpdx-blabber

Reply via email to