Router Console Port Connection using USB to Serial TTL Adapter
They mean to say serial port .
They mean to say serial port .
Click on the image for a larger version I have an access point with a USB port on it. It also has a console and ethernet port. What is the USB port used for? At first I thought it might be the port used for serial but rechecking using google that is the console port. It turns out the more modern routers can connect with other peripherals such as external hard disk and printer and even to a 3G dongle. I think there might be exceptions such as with the Alfa AP121U access point. When you flash it with Pinneaple router you use the Read more…
There is no excerpt because this is a protected post.
Software dongles are hardware protection for proprietary software. This is my research page on the topic. Research Links USB Dongle emulator for SafeNet Inc USB Key, SafeNet Inc. Sentinel HL Key, SafeNet USB SuperPro/UltraPro Genuine SafeNet SoftDog dongle UDA v5 USB dongle copy protection dongle Alibaba: New arrival Wireless dongle USB Dongle key
How the CIA / Deep State took control of our government. I am sure it starts before Eisenhower but this is the time aperture I have figured out. Eisenhower – the flight of Gary Powers was sabotaged by our side to prevent negotiations between Nikita Khrushchev Kennedy – Killed because he was not going to take us into Vietnam, threatened the oil depletion allowance, printed 5 billion in United States Notes. Our government was involved. It was a public execution left as an object lesson for later presidents. Johnson knew about and had his henchmen help assassinate Kennedy. He and J. Read more…
When using WordPress with candied URLs you are using .htaccess files to do URL rewrites to make the more human and google friendly URL version. It turns out that when you try to access a subdirectory that is password protected it returns the web server responds with a “401 Unauthorized” header and an optional error document, then prompts the user for Authentication details. When rewrite rules are in place, the default error document path used by the web server is evaluated using the rewrite rules. If an actual error document does not exist in the default error document path, this is passed Read more…
Multipool is a mining pool that switches to whichever cryptocurrency is most profitable at the moment. The graphic below is a pie chart of the cryptocurrencies mined over the past 24 hours.
Currently I decided to just point at NiceHash.com and have everything converted into BTC because I do not have to set up a wallet that way. That was the quickest way to get up and running. Research Links LiteCoin.org: Litecoin core
L. Fletcher Prouty discusses his point of view of the Kennedy assassination from his position within the Pentagon. For those aware of the Deep State it leaves little doubt of the government's involvement in killing JFK. Audio only version for on the go listening: L. Fletcher Prouty discusses his point of view of the Kennedy assassination from his position within the Pentagon. MP3 audio format Backup for the eventual takedown by YouTube. They are heavily censoring viewpoints that are not "correct thinking" according to them who see themselves as your owner.
L. Fletcher Prouty describes the operation of the CIA inside government. This is a 6 hour long podcast full of information from an insiders perspective. CIA sprinkles their employees throughout government. The bosses of any given department move on faster than any of the lower level employees and thus when first placed the boss knows the person is CIA. However when a new boss is installed they are not informed that said employee is CIA. By this method CIA secrets its members all over government. It is also quite evident they end up in congress and given that Bush Sr, Clinton, Read more…