Latest posts

“Verbannen” is a dutch verb and means “to ban”. As in Napoleon being send to St. Helena. To ban in the context of gaming is being blocked out. With the rise of Facebook and the like, you can even be locked out of groups and communities. But to ban also has a meaning in context of IT security. For example, your account might get blocked after too many failed password attempts. This requires processes to unlock and restore access. One way to avoid this, is to automatically restore access after a certain amount of time. Napoleon was banned until his dead, 6 years later… ItRead More →

Icom’s new IC-9700 can receive two bands at the same time. In DV mode, it can decode two digital signals at the same time, something even the IC-5100 cannot do. Since it has a stereo USB audio interface build in, it’s logical to expect the IC-9700 to output main and sub band audio at the same time over USB as well. Some sources on the Internet mention that only main band audio is output via USB. Given all the “at the same time” features of the IC-9700, I resisted to believe this to be true. So … let’s check the schematics first. Not only inRead More →

Some time ago, I read the statement that the sample rate of a DAC is set by the audio file that you play. It then occurred to me, that this is – sort of – wrong. Let me explain why, using a turntable for comparison. The turntable speed is set by you, after you looked at the label on the record (or the size..). You can put on a single, and play that “file” at LP speed. With digital audio, it’s the same. Set the DAC to 44.1 sample rate, and feed it a 96 kHz file. The DAC will process 44.100 samples per second,Read More →

I use SSH with port forwarding for secure remote access. For me it’s better than using a VPN. Here are my reasons why: Clear visibility on what’s happening on the network. You control what happens. Easy configuration of IP ports and addresses. Single config file for OpenSSH client. Asymmetric, i.e. client-server model. Better suited for remote access. Public/Private key based security setup. No PKI needed. User space client. No encapsulation, only encryption overhead on the payload. The biggest downside is that you cannot forward UDP ports. There’s no such thing as a free lunch. There are workarounds for this limitation, such as using netcat forRead More →