The new iTunes iOS app that goes with the Apple Radio launch annoys the heck out of me. For some reason the GUI designers (and marketing peoples) think that the Apple online services are the only thing you'll ever need. This results in an iTunes menu bar where 80% is useless to me.
Domotica Babysteps
The first steps with domotica have been made over here. We now have an overview of our electricity and gas usage by using a smart-meter with solar-panels and a Raspberry Pi with Domoticz software.
The image below indicates that the solar panels are delivering 558W at that moment and the smart-meter reports that it's delivering to the net (139W). So we were self sustaining at that moment.
Actual electricity and gas usage
Some statistics over the last couple of days indicate that we produce more electricity than we consume. Don't think that those graphs look anything like this during the winter though :-)
The green columns are topping the blue, so we're making 'money' on those days. And that 'money' will most likely be consumed during the winter period, when solar output is much less.
Electricity consumption during the week where green is good :-)
I'll make a more extensive post about the set-up in due time, but for now, these are the things I used:
- Raspberry Pi 2B
- Domoticz software
- Smart-meter cable P1 (serial-to-usb)
- Omnik Solar import script by Woutrrr
Total cost: ~75 euros (Raspberry Pi 2B starter kit + Smart meter cable), and a crap-load of time (experimenting, research, etc.).
Next steps are adding z-wave functionality to the set-up for more monitoring enhancements.
Custom Raspberry Pi Console Login Message
The Raspberry Pi tweaking continues. I did a fresh install of my first project to make sure that I documented all the steps correctly. To make sure I didn't loose any work I created a backup of the SD card.
The documentation was relatively complete. I did miss some things I added to the Pi, but forgot to document. One of these was a nicer welcome screen when you log in to the Pi via console or SSH.
I added the following to the /etc/bash.bashrc file for all users, or just in the ~/.bash_profile file (at the end):
let upSeconds="$(/usr/bin/cut -d. -f1 /proc/uptime)" let secs=$((${upSeconds}%60)) let mins=$((${upSeconds}/60%60)) let hours=$((${upSeconds}/3600%24)) let days=$((${upSeconds}/86400)) UPTIME=`printf "%d days, %02dh%02dm%02ds" "$days" "$hours" "$mins" "$secs"` # get the load averages read one five fifteen rest < /proc/loadavg echo "$(tput setaf 2) .~~. .~~. `date +"%A, %e %B %Y, %r"` '. \ ' ' / .' `uname -srmo`$(tput setaf 1) .~ .~~~..~. : .~.'~'.~. : Uptime.............: ${UPTIME} ~ ( ) ( ) ~ Memory.............: `cat /proc/meminfo | grep MemFree | awk {'print $2'}`kB (Free) / `cat /proc/meminfo | grep MemTotal | awk {'print $2'}`kB (Total) ( : '~'.~.'~' : ) Load Averages......: ${one}, ${five}, ${fifteen} (1, 5, 15 min) ~ .~ ( ) ~. ~ Running Processes..: `ps ax | wc -l | tr -d " "` ( : '~' : ) Local IP Addresses.: `hostname -I` '~ .~~~. ~' WAN IP Address.....: `wget -q -O - http://icanhazip.com/ | tail` '~' Weather............: `curl -s "http://rss.accuweather.com/rss/liveweather_rss.asp?metric=1&locCode=EUR|NL|NL001|UTRECHT|" | sed -n '/Currently:/ s/.*: \(.*\): \([0-9]*\)\([CF]\).*/\2°\3, \1/p'` $(tput sgr0)"
The result is this:
I got the 'original' script form the Raspberry Pi forum, and I altered the IP Address section and the weather forecast.
Rsync And Encrypted Containers
My 'little' off-site Raspberry Pi backup/remote storage project will probably use a combination of Bittorrent Sync and rsync. The latter will be used to backup personal information, but I want that data to be absolutely secure. So I want to use encryption. Preferably by using container that I can mount (e.g. Truecrypt or the Apple OSX encrypted disk images).
The problem with containers is that many backup solutions tend to backup / transfer the entire container when a change occurred. Thankfully, rsync only copies the changes.
Cloning Raspberry Pi Disk Images on OSX
The Raspberry Pi uses (micro)SD cards for its operating system and basic storage. Since I have more projects in mind than physical Raspberries I need to swap SD cards to accomplish this. And for backup it's nice to be able to clone the SD card to an image file for future use.
Raspberry Pi 2 and PiTFT 480x320 Touchscreen
I'm starting to experiment with the Raspberry Pi form several purposes. For one of my little projects (RTL-SDR Scanner) I need a little TFT screen on the Pi. So I bought the 3.5 inch PiTFT 480x320 Touchscreen.
Getting it to work was not as easy as the tutorial would like it to be. I tried the 'advanced' setup with the DIY Installer script first, but that didn't work at all. The screen stayed bright white. No console or desktop to be found. So after that I tried the easy install where I needed to download an image with all the stuff included.
Importing Devices in Microsoft Active Directory
The Microsoft Active Directory is a place where you can find different kind of objects;
- Users
- Computers
- Servers
- Printers
- (Security) Groups
- etc.
One thing you don't find are generic devices. And with devices I mean devices according to the LDAP definition (ObjectClass: device).
Made Our Own Pinkpop Shirt
This year we'll be going to Pinkpop in style. This year we're wearing our own shirts. And to make sure that our shirts are original we created the heavenly edition theme. Meaning that all the performing artists are no longer among us.
The idea of creating this shirt was born during last years Pinkpop while wondering which artists we would have wanted see (LIVE) in our lifetime.
I guess it's the only festival ever featuring these artists :-)
The following images are not the definite versions (B.B. King has not been added to the list), and the logo on the front will probably be a bit larger.
Create An 802.1x Evil Access Point
The last couple of weeks, I've been playing with Kali Linux to explore exploits on networks (wireless and switched networks). One of the exploits I'd liked to explore was that of an 'Evil Access Point' which can be done with Kali Linux and a suitable wireless LAN adapter.
An Evil Access Point creates an wireless network SSID to lure unsuspecting users/computers in to connecting to it. This network is pretending to use 802.1x for security (which is mainly used in corporate network environments), and those networks require typically a username and password (or certificate) to connect.
When the user/computer tries to connect, it (the evil AP) collects the user-name and a hash of the password. The password can be recovered by using dictionary files, rainbow tables, or by using brute-force. After the password has been found it can be used with the captured user-name to connect to the corporate network.
Log Conversation Only with TCPDUMP
Not exactly the conversation view from Wireshark, but it's a relatively clean and readable output showing the source, destination IP addresses, and ports.
tcpdump -q -i <interface>
Add the '-t' switch to remove the time stamp as well