DRT 142 - 20180104

Thursday Night D-STAR Round Table. Join us on reflector XRF002A, XRF310A and XRF555A 7:00pm PDT weekly.

You can find the shout box show notes on D-STAR Round Table Board

Shoutbox History

 K6KD: Please give us your thoughts for additional useful discussions or nets on the Constellation. d-star-roundtable.boards.net/thread/310/interest-another-net-on-constellation

KEØOSY: Many thanks to Guus for resolving my ID4100A + DVMega (RPi single band) RX deviation issue!! He said a v3.19 should be out very soon. ;) 

W6KD: dvMega firmware v3.19 is now up at Guus VanDooren's site: www.dvmega.auria.nl/Downloads.html Ensure you get the right version (the Raspberry Pi-based files are in the second-to-last block at bottom of page and have "UNO" in the file name)

KG5SLG: Does anyone have information on what the new firmware for the DvMEGA V3.19 is supposed to addressed?

N6HKH: KG5SLG: The FW-Up resolves the deviation issue affecting Icom radios and the DVMega. We will discuss this during tonight's Round Table at 7pm Pacific.

de W4RFJ: Good Evening Everyone...

k6uda: Hello guys, Sitting here in lurk mode, I'm Scheduled to be net control on my local repeater in a 1/2 hr.

W4RFJ: Testing... ;-)

KF4UCE: Most people have jumped ship from Yahoo Groups but Guus did explain what the update addressed in his post to the dvmega group. DVMEGA firmware V3.19 available now. Deviation is adjusted to comply with ID4100 and pins for RX and TX status is available.[/

W4RFJ: Should I update my DVMega if I do not use the radios mentioned?

W6KD: @w4rfj--IMHO, if it ain't broke...

W4RFJ: I agree... 24

W4RFJ: Thanks Bob!

k6uda: I'm currently working on next weeks K6UDA Radio Show. Next week is my discovery of the XRF reflectors with all the cool nets, subject matter, constellations and cool people. If you have any suggestions, email me at k6udaradio@gmail.com

wb5eku: Bay-Net conference URL: www.baycon.us/ 

k6jm: Following up on Don-WB5EKU's reference to the BayCon Hamfest in Sunnyvale,CA, on Jan 20 2018, check out www.baycon.us/ 

N6HKH: DV Mega site ref'd by W6KD www.dvmega.auria.nl/ 

k6jm: ZUMSpot with Pi Zero W -- Very late to the party (both a Pi Zero W and a ZumSpot were sitting in the closet), but I am finally taking the time to configure. First reaction -- I'm amazed how small both are. Will use Pi_star and MMDVM software. Very nice.

W4RFJ: I have experienced the same doing the update to dvmega... but it will work from the pi!

k6jm: Guus of DVMega is not particular about how you pronounce his name, but at Dayton a few years ago, I asked him how -- best I can describe: hewss, except on the h, blow out more air than an English h. He had to say it 3 times for me to understand....

W4RFJ: I also have the wire on my single band DVMEGA

W4RFJ: It is not easy to get into the net! ;-)

W4RFJ: I guess I do not understand what I am doing wrong!

W4RFJ: I just figured it out

W4RFJ: I use the Dashboard for pistar

k6jm: UDP used by DV modes over the internet: promises best effort to deliver, but no guarantee (versus TCP's error correction. UDP is used when speed is more important than any one packet getting there. Bob just did a great description of what that means to us.

W4RFJ: Still Lurking! ;-)

W6KD: CERT website on Meltdown and Spectre CPU hardware vulnerabilities www.kb.cert.org/vuls/id/584653 

W6KD: UK article on the same: www.theregister.co.uk/2018/01/04/intel_amd_arm_cpu_vulnerability/ 

k6jm: Bob -- Bloomberg financial channel highlighted this problem today, asking how it might affect chip mfr's stock prices. So far, no affect, but they plan to watch.... a

W6KD: I'd love to see if Intel's execs have been dumping their stock lately...

k6jm: Maybe this vulnerability will bring more focus on making sure malware just does not get into affected computers.

KF4UCE: It's fairly easy to stand-up a basic computer capable of financial and/or sensitive transactions using a Raspberry Pi or any other number of Small Board Computers that use processors not affected by this exploit.

k6jm: I wonder if the Microsoft suggested fix that slows the processor down significantly could be something that users could turn on, run their banking apps, for example, then turn off and do their ham and other apps....

KF4UCE: If you might be thinking about going down the SBC route, I like the Odroid C2. The XU4 while more powerful, does have a processor affected by this exploit. www.hardkernel.com/main/products/prdt_info.php?g_code=G145457216438 

KF4UCE: Here is a good comparison between a RPi3 and an Odroid C2. More RAM, slightly faster CPU www.phoronix.com/scan.php?page=article&item=raspberry-pi3-odroid2&num=1 

KF4UCE: Running a live session disk or USB drive, to the best of my knowledge, does not circumvent the vulnerabilities that this exploit exposes since it targets the CPU while it's in operation.

k6jm: Again, if no malware is in memory, there is no vulnerability. So the focus should be there also, at least until a new generation of hardware and compatible software becomes available.

KF4UCE: Malware is tough to pin down and some programs are having a hard time being patched correctly to address this exploit. support.microsoft.com/en-us/help/4072699/important-information-regarding-the-windows-security-updates-released

Share | Download(Loading)