The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My badges

  • Twitter Updates

  • My Flickr Stream

  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,854 other subscribers

GitKon Sept 22 – 23, 2021 – Virtual Git Conference | Presented by GitKraken

Posted by jpluimers on 2022/07/12

GitKon was a cool virtual conference about git and the git ecosystem: [Wayback/Archive.is] GitKon Sept 22 – 23, 2021 – Virtual Git Conference | Presented by GitKraken

Navigation was a bit hard because of the visual overload on the site (look at the various Archive.is archivals), so here is the outlined list of sessions with the rough timestamps in the below live recordings:

Global sitemap:

Live recordings are below. Hopefully they will last and per session splits will have become available.

None of them are at listed at [Wayback/Archive.is] www.youtube.com/c/Gitkraken/videos.

Via: [Wayback/Archive.is] Attendee Registration Thank You – GitKon 2021

–jeroen


Day 1 live recordings

Day 2 live recordings

Posted in Development, DVCS - Distributed Version Control, git, Mobile Development, Software Development, Source Code Management, Web Development | Leave a Comment »

Last days until the May Contain Hackers 2022 camp; the badge project can still use some help on the software side: Python apps, FPGA, documentation, etc

Posted by jpluimers on 2022/07/11

After yesterdays post (which I will be editing to add some more pictures) MCH2022 badge sneak previews from tweeps that attended the Bitlair 20220709 Sweatshop (@MCH2022Camp) now a call for help:

The Badge Team needs volunteers helping them on the software side.

At the badge event, the version 1.0 firmware was flashed so the badge will function perfectly fine during the event, but it would be cool if more features are available that attendees can get when upgrading at the event or downloading from the hatchery.

There is a virtual environment to test and a GitHub projects page with open issues to get started.

See the links below on how you can help:

Read the rest of this entry »

Posted in Development, ESP32, Hardware Development, Python, Raspberry Pi, RP2040, Scripting, Software Development | Leave a Comment »

Firewall whitelist for Windows Update

Posted by jpluimers on 2022/07/11

For Windows 10 to update at all, I had to add a truckload of domains to the Fritz!Box whitelist configuration; this is the list for now:

fe3.delivery.dsp.mp.microsoft.com.nsatc.net
fe3cr.delivery.mp.microsoft.com
www.tm.a.prd.aadg.akadns.net
prda.aadg.msidentity.com
www.tm.lg.prod.aadmsa.trafficmanager.net
login.msa.msidentity.com
login.live.com
geo.prod.do.dsp.mp.microsoft.com
ocsp.comodoca.com.cdn.cloudflare.net
ocsp.sectigo.com
crl.usertrust.com
ocsp.usertrust.com
fe2cr.update.microsoft.com.akadns.net
fe2cr.update.microsoft.com
ocsp.digicert.com
vip1-wns2-db5p.wns.notify.trafficmanager.net
wns.notify.trafficmanager.net
client.wns.windows.com
time.windows.com
*.prod.do.dsp.mp.microsoft.com
emdl.ws.microsoft.com
*.dl.delivery.mp.microsoft.com
*.windowsupdate.com
*.delivery.mp.microsoft.com
*.update.microsoft.com
adl.windows.com
tsfe.trafficshaping.dsp.mp.microsoft.com
fe2cr.update.microsoft.com
fe3cr.delivery.mp.microsoft.com
ctldl.windowsupdate.com
emdl.ws.microsoft.com
*.prod.do.dsp.mp.microsoft.com
*.au.download.windowsupdate.com
download.windowsupdate.com
ocsp.digicert.com
slscr.update.microsoft.com
adl.windows.com
*dl.delivery.mp.microsoft.com
*.tlu.dl.delivery.mp.microsoft.com
windowsupdate.microsoft.com
*.windowsupdate.microsoft.com
download.windowsupdate.com
download.microsoft.com
*.download.windowsupdate.com
test.stats.update.microsoft.com
ntservicepack.microsoft.com
update.microsoft.com
*.update.microsoft.com
*.download.microsoft.com
windowsupdate.com
wustat.windows.com
login.live.com
mp.microsoft.com
*.mp.microsoft.com
www.update.microsoft.com
support.microsoft.com
www.msftconnecttest.com

Related:

–jeroen

Posted in Power User, Windows, Windows 10 | Leave a Comment »

MCH2022 badge sneak previews from tweeps that attended the Bitlair 20220709 Sweatshop (@MCH2022Camp)

Posted by jpluimers on 2022/07/10

The MCH2022 badge has an ESP32 (with WiFi!), a RP2040 and an FPGA next to a full colour TFT LCD, buttons (including joystick!), LEDs, LiPo battery, USB-C connector, micro SD-card slot and more (see below) and SHA2017 badge compatibility. How cool is that!

There is a wealth on information for this at [Wayback/Archive] Badge.team (some 22 repositories and counting: [Wayback/Archive] Badge.team: search for repositories containing mch2022).

Good starts are [Wayback/Archive] MCH2022 badge | BADGE.TEAM and [Wayback/Archive] Software Development | BADGE.TEAM (yes of course you can write your own software for it and even distribute it through the [Wayback/Archive] hatchery.badge.team Hatchery).

Below are lots of tweets including some of the Twitter retrospect that organically grew (just like the sweatschop event) on Twitter the day after.

From the original announcement [Wayback/Archive] May Contain Hackers 2022: Presenting: The MCH2022 badge! , this is what hardware is in it

Read the rest of this entry »

Posted in Development, ESP32, Hardware Development, Raspberry Pi, RP2040, Soldering | Leave a Comment »

HTTPS Is Actually Everywhere | Electronic Frontier Foundation (so HTTPS everywhere will sunset January 2023)

Posted by jpluimers on 2022/07/08

I missed this announcement: [Wayback/Archive] HTTPS Is Actually Everywhere | Electronic Frontier Foundation.

Though in practice there still are a few sites not having HTTPS (usually old blogs, sometimes old forums too), almost all have (thanks Let’s Encrypt!) and many not even support HTTP any more.

So the HTTPS Extension in Google Chrome recently pointed me to [Wayback/Archive] Set Up HTTPS by Default in Your Browser | Electronic Frontier Foundation, which pointed me to the above post, which taugt me that most browsers (Firefox, Chrome, Edge and Safari) by now have an HTTPS-only mode which you can enable by hand or sometimes is just the only way.

Cool, I love progress!

–jeroen

Posted in Encryption, HTTPS/TLS security, Let's Encrypt (letsencrypt/certbot), Power User, Security | Leave a Comment »

Editing your Windows hosts file as administrator from a “simple” batch file or PowerShell command

Posted by jpluimers on 2022/07/07

Sometimes you want to edit your Windows hosts file.

Next to that it is not in /etc/hosts, but in %windir%\system32\drivers\etc\hosts., you also have to edit it elevated with an elevated Administrator token (see Source: User Account Control – Wikipedia).

The Windows GUI by default runs without that token, and for a keyboard person like me, doing the mouse clicking elevation can be cumbersome especially combined with the unintuitive path to the hosts file.

Basically the below batch file executes this, but than elevated:

start notepad %windir%\system32\drivers\etc\hosts.

So I created a small batch file that does that for me: start notepad as an elevated user opening the correct file.

powershell -command "Start-Process notepad.exe -Verb runas -Args %windir%\system32\drivers\etc\hosts."

I named it edit-hosts-as-administrator.bat, but consider naming it edit-hosts.bat as the elevation is mandatory anyway.

It is based on by blog post Run cmd as elevated user (via: windows – How to run batch file command with elevated permissions? – Super User).

It helped setting up the localghost address explained in my blog post The spookback localghost address to resolve 👻.

That one in turn needed unicode support which I showed last week in Unicode symbols in a batch file – Stack Overflow.

Related:

–jeroen

Posted in Uncategorized | Leave a Comment »

Hardware MAC address formats (which I need for Wake-on-LAN.ps1)

Posted by jpluimers on 2022/07/06

Early june, I blogged about Wake-on-LAN from a Windows machine.

My plan was to adopt [Wayback/Archive.is] Wake.ps1 into Wake-on-LAN.ps1 (as naming is important).

One of the goals was to support multiple hardware MAC address formats, especially as Wake.ps1 had the below comment, but did support the AA-BB-CC-DD-EE-FF, though not the AA:BB:CC:DD:EE:FF hardware MAC address format:

<#
...
.NOTES
Make sure the MAC addresses supplied don't contain "-" or ".".
#>

A colon separated hardware MAC address would result in this error inside the call to the [Wayback/Archive.is] PhysicalAddress.Parse Method (System.Net.NetworkInformation) | Microsoft Docs:

Send-Packet : Exception calling "Parse" with "1" argument(s): "An invalid physical address was specified."

So I did some digging, starting inside the above mentioned blog post, and adding more:

  1. Wake.ps1 uses the [Wayback/Archive.is] Parse method in the [Wayback/Archive.is] PhysicalAddress.cs source code in C# .NET,  which contains code like this:
                //has dashes? 
                if (address.IndexOf('-') >= 0 ){ 
                    hasDashes = true;
                    buffer = new byte[(address.Length+1)/3]; 
                }
  2. The Perl script at [Wayback/Archive.is] wakeonlan/wakeonlan at master · jpoliv/wakeonlan that started my first blog post in this series which mentions:
    • xx:xx:xx:xx:xx:xx (canonical)
    • xx-xx-xx-xx-xx-xx (Windows)
    • xxxxxx-xxxxxx (Hewlett-Packard switches)
    • xxxxxxxxxxxx (Intel Landesk)

    I should rename the first one IEEE 802, as per this:

  3. The MAC address: Notational conventions – Wikipedia

    The standard (IEEE 802) format for printing EUI-48 addresses in human-friendly form is six groups of two hexadecimal digits, separated by hyphens (-) in transmission order (e.g. 01-23-45-67-89-AB). This form is also commonly used for EUI-64 (e.g. 01-23-45-67-89-AB-CD-EF).[2] Other conventions include six groups of two hexadecimal digits separated by colons (:) (e.g. 01:23:45:67:89:AB), and three groups of four hexadecimal digits separated by dots (.) (e.g. 0123.4567.89AB); again in transmission order.[30]

    The latter is used by Cisco (see for instance [Wayback/Archive.is] Cisco DCNM Security Configuration Guide, Release 4.0 – Configuring MAC ACLs [Support] – Cisco and [Wayback/Archive.is] Cisco IOS LAN Switching Command Reference – mac address-group through revision [Support] – Cisco), so another format to add:

    • xxxx.xxxx.xxxx (Cisco)
  4. [Wayback/Archive.is] PhysicalAddress.Parse Method (System.Net.NetworkInformation) | Microsoft Docs remarks:

    The address parameter must contain a string that can only consist of numbers and letters as hexadecimal digits. Some examples of string formats that are acceptable are as follows:

    • 001122334455
    • 00-11-22-33-44-55
    • 0011.2233.4455
    • 00:11:22:33:44:55
    • F0-E1-D2-C3-B4-A5
    • f0-e1-d2-c3-b4-a5

    Use the GetAddressBytes method to retrieve the address from an existing PhysicalAddress instance.

  5. After a bit more digging via [Wayback/Archive.is] “three groups of four hexadecimal digits separated by dots” – Google Search , I found that even more hardware MAC address formats are in use as per [Wayback/Archive.is] What are the various standard and industry practice ways to express a 48-bit MAC address? – Network Engineering Stack Exchange.

    I really do not have all the sources for the various representations for 48-bit MAC addresses, but I have seen them variously used:

    AA-BB-CC-DD-EE-FF
    AA.BB.CC.DD.EE.FF
    AA:BB:CC:DD:EE:FF
    AAA-BBB-CCC-DDD
    AAA.BBB.CCC.DDD
    AAA:BBB:CCC:DDD
    AAAA-BBBB-CCCC
    AAAA.BBBB.CCCC
    AAAA:BBBB:CCCC
    AAAAAA-BBBBBB
    AAAAAA.BBBBBB
    AAAAAA:BBBBBB

From the last list, which is far more complete than the others, I recognise quite a few from tools I used in the past, but too forgot the actual sources, so I took the full list from there and tried to name them in parenthesis after the links I found above and what I remembered:

  • AABBCCDDEEFF (Bare / Landesk)
  • AA-BB-CC-DD-EE-FF (IEEE 802 / Windows)
  • AA.BB.CC.DD.EE.FF (???)
  • AA:BB:CC:DD:EE:FF (Linux / BSD / MacOS)
  • AAA-BBB-CCC-DDD (???)
  • AAA.BBB.CCC.DDD (Cisco?)
  • AAA:BBB:CCC:DDD (???)
  • AAAA-BBBB-CCCC (???)
  • AAAA.BBBB.CCCC (Cisco / Brocade)
  • AAAA:BBBB:CCCC (???)
  • AAAAAA-BBBBBB (Hewlett-Packard networking)
  • AAAAAA.BBBBBB (???)
  • AAAAAA:BBBBBB (???)

Some additional links in addition to the ones above:

–jeroen

Posted in .NET, CommandLine, Development, Encoding, HEX encoding, Network-and-equipment, Power User, PowerShell, PowerShell, Scripting, Software Development | Leave a Comment »

Bestel je op de @KVK_NL, zorg dan dat je *niet* in het handelsregister bent ingelogd: ben je dat wel, dan werkt de automatische incasso niet, lijkt het alsof je betaald hebt, maar krijg je geen product te zien of gemaild

Posted by jpluimers on 2022/07/06

Het staat helaas nog nergens op de site van de Kamer van Koophandel, noch hun Social Media accounts (ondanks herhaalde verzoeken per telefoon en Social Media):

De enige optie om op dit moment dingen op de site van de Kamer van Koophandel te bestellen en betalen is door middel van iDEAL.

De makkelijkste manier om dat te forceren is uitloggen van het handelsregister voor je iets bestelt: dan gaat de betaling automatisch naar “handmatig”, en kun je kiezen tussen iDEAL of creditcard.

Eventuele kortingsregelingen gelden dan niet.

Als je toch bent ingelogd, dan gebeurt er in Chrome dit nadat je je betaling bevestigd:

Read the rest of this entry »

Posted in LifeHacker, Power User | Leave a Comment »

Powershell code formatting and coding style and style guides: some links and elaboration

Posted by jpluimers on 2022/07/05

I started doing occasional PowerShell “work” long before Visual Studio Code came along with its [Wayback] PowerShell Extension.

Back then, my tool of choice was PowerGUI: Settling on PowerGUI for PowerShell development. Before that it was PowerShell ISE.

Since then, I fiddled around a bit with Visual Studio Code, but not much. Then I got treated for rectum cancer, and when writing this, I’m back to Visual Studio code with the PowerShell Extension and already figured out a lot has improved.

One of the things is code formatting. Back some 7 years ago, this was all not set in stone. Now it is, so it is important to adhere to.

I already posted Code Layout and Formatting: Indentation · PowerShell Practice and Style last year, so now it is good repeat the link in it and add some more.

For my link archive:

Read the rest of this entry »

Posted in Development, PowerShell, Scripting, Software Development, Technical Debt | Leave a Comment »

Nationale testdag: Test vandaag ook je rookmelders nu dat de sirenes gegaan zijn (via Jessica Reintjens op Twitter)

Posted by jpluimers on 2022/07/04

[Wayback/Archive] Jessica Reintjens on Twitter: “De maandelijkse sirenes zijn straks om 12.00u weer te horen, omdat het de 1e maandag vd maand is, Dat is een mooi moment om u rookmelders vandaag ook weer eens te testen! #rookmelder #rookmeldersreddenlevens #rookmelders #veiligheid #testjerookmelder”.

Read the rest of this entry »

Posted in Awareness, LifeHacker, Power User | Leave a Comment »