Just put my Zeo Sleep Manager birthday present through its first test – the obligatory birthday nap. Five minutes of deep sleep in a 31 minute nap.
I’m going to enjoy putting this thing through its paces!
Extreme geekiness
There are 699 posts filed in X-Geek (this is page 35 of 70).
Just put my Zeo Sleep Manager birthday present through its first test – the obligatory birthday nap. Five minutes of deep sleep in a 31 minute nap.
I’m going to enjoy putting this thing through its paces!
Officials from Raleigh and N.C. State announced a partnership Monday to make Raleigh a “city of innovation.” A conference, known as the Raleigh Innovation Summit, will take place on January 18th, 2012 to discuss ways to give the city’s startup scene a boost. Being that I’m not yet working again and I have experience with startups, I grabbed my camera and headed to the press conference, eager to hear more details.
The press has already done a good job covering the details, it turns out. Thus there’s not much I can add to this except a few thoughts after the fact.
Continue reading
Now that I understand why my Droid phone is using a panic-inducing IP address, I decided to try my hand again at getting the SIPdroid app to work with my home phone system.
My first try was to set my firewall rules to allow traffic from 28.x.x.x. The problem with this is that since the 28.x.x.x addresses aren’t advertised (and thus routable), my home server can get packets from them all day, but can’t send anything back. My ISPs routers don’t know what to do with them.
Continue reading
A commenter’s tip has solved the mystery of why my phone’s voice traffic is coming from an IP address owned by the Department of Defense. By entering the code *#*#INFO#*#*, I was able to pull up a hidden menu which shows the rogue IP address as assigned to my phone.
The Department of Defense is squatting on a massive number of IPv4 addresses and is not using most of it. Phone networks like Sprint are borrowing these IP addresses because their networks are larger than the 16 million hosts that the 10.x.x.x network can provide.
It looks, as another MT.Net visitor theorized, like Sprint is assigning the (unused) DoD IP addresses internally to its phones and then NATting the traffic from the phones to the public IPs. Since SIP packets have an additional IP address embedded inside, Sprint’s firewalls aren’t NATting that IP and thus the ordinarily “private” IP address is getting through the NAT process.
Whew!
Update Nov. 10: The mystery has been solved. Sprint’s borrowing DoD IP addresses, most likely without DOD’s knowledge. It appears to be entirely harmless.
A few of my friends have weighed in with their theories as to why I was seeing my phone traffic coming from a DoD network. Many of these theories point out how the DoD is the owner of vast stretches of IP address space, many of which aren’t advertised as public routes. Some organizations treat these addresses as non-routable addresses, making it appear traffic originates from the DoD. One blogger discovered the IPs of the UK Ministry of Defence being used similarly by T-Mobile.
Continue reading
I decided to see if I could find out more about this mysterious IP address that apparently belongs to the Department of Defense.
One of the best ways to do this is to run a traceroute, which shows the path back to the IP through the Internet’s routers. I also wanted to see if I could find any evidence that my router or my ISP’s router was compromised or broken.
Performing a traceroute from my home computer to the IP provides me this output:
root@maestro:# traceroute 28.191.58.169
traceroute to 28.191.58.169 (28.191.58.169), 30 hops max, 60 byte packets
1 wireless.tonsler (192.168.3.252) 0.971 ms 1.419 ms 1.634 ms
2 user-0c2h181.cable.mindspring.com (24.40.133.1) 14.064 ms 13.993 ms 24.788 ms
3 66.26.46.13 (66.26.46.13) 18.689 ms 18.942 ms 19.029 ms
4 * * *
5 * * *
6 * * *
7 * * *
8 * * *
It’s not unusual that the traceroute dies on the way back: many hosts and/or networks go down and the packet trace stops. However, it is interesting that the traceroute dies on Time Warner’s network. That last router, 66.26.46.13, belongs to Road Runner:
Continue reading
Update Nov 9 11:00 AM. Mystery solved! Sprint is apparently squatting on the DoD addresses, using them for their internal phone network. Sprint understandably wants to firewall these phones from the wild and wooly Internet, so it NATs the phone traffic from these supposedly-private IPs to the phone’s public IP address. SIP packets have the internal IP embedded in them, however, and aren’t easily NATted. This address slipped through Sprint’s firewall, causing me alarm (fortunately undue alarm!)
Break out your tinfoil hats because this will blow your mind.
I found something quite disturbing today while trying to get my Virgin Mobile LG Optimus V phone talking completely through Voice-Over-IP (VoIP). For reasons not entirely clear yet, I discovered that voice packets from my phone are being routed to an IP address belonging to the Department of Defense.
Some background
I had long been a “dumb phone” kind of guy when it comes to mobile phones but finally bit the bullet and got an Android phone from Virgin Mobile when the right plan came along. I am also a VoIP enthusiast and have been sending phone calls over the Internet for almost ten years now. I’m also a cheapskate, so naturally when I got my Android phone one of the first things I wanted to do was to figure out how to make calls with it completely over VoIP – using my unlimited data plan instead of burning my limited voice minutes. That’s what hackers do, you know.
Continue reading
Since it’s Halloween, I had my speakers on the porch again, playing spooky sounds. I use the LaserLight Digital’s 101 Digital Sound Effects – Sounds of Horror CD for my effects. I’ve had the CD for a few years now but this year I finally got the mix right.
Here’s what I played:
On my Linux box, that’s four separate instances of mplayer running at once. In one window, for instance, I did this:
while [ 1 ]; do mplayer LaserLight_Digital-Wood_gate_creaking.ogg; sleep 17; done
In another I ran this:
while [ 1 ]; do for i in LaserLight_Digital-Terrified_Scream__Woman.ogg LaserLight_Digital-Shrill_Scream__Woman.ogg LaserLight_Digital-Owl_Hooting.ogg; do mplayer $i; sleep 12; done; done
In hindsight, I should’ve moved one of the players from 17 seconds to something that didn’t match the other, so that they would play out of sync.
Right before 9 AM, I had a group of teenage girls venture up onto the front porch. As the spooky sounds are playing, I put my alien mask on and slowly opened the door. You should’ve heard the screams! I took my mask off and laughed my head off! It was the highlight of the night.
Next year, I’ll put up a ghost and get some other spooky additions. I eat this stuff up!
From the University of Louisville comes Matt Hanka, ABD; and John Gilderbloom, Ph.D.’s paper entitled How One-Way Thinking is Hurting Historic Downtown Neighborhoods (a short but informative read):
One-way streets pose many threats for pedestrian and motorist safety, make city streets seem less safe, disproportionately impact poor and minority neighborhoods, hurt downtown businesses, reduce the property values of homes, and negatively impact the environment and contribute to global warming. Conversions to two-way have already happened in more than 100 cities around the United States.
Continue reading
More astonishing overreach from our intellectual property overlords and their corrupt cronies in Congress.
The Stop Online Piracy Act also goes by another name: The E-PARASITES Act. It stands for Enforcing and Protecting American Rights Against Sites Intent on Theft and Exploitation Act. If it passes, that muscle would certainly be available.
Mark A. Lemley is a professor at Stanford Law School and director of the Stanford Program in Law, Science, and Technology. He says, “What’s remarkable about this provision is that it would allow the government and in many cases private parties to come into court, get a temporary restraining order without the participation of the accused website and shut down not just the infringing material, but the whole website.”