<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>I Never Finish Anyth</title>
    <link>https://blog.jonaskoeritz.de/</link>
    <description>Recent content on I Never Finish Anyth</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-EN</language>
    <managingEditor>jonas.koeritz@gmail.com (Jonas Köritz)</managingEditor>
    <webMaster>jonas.koeritz@gmail.com (Jonas Köritz)</webMaster>
    <lastBuildDate>Mon, 20 Jun 2022 13:00:00 +0100</lastBuildDate>
    
        <atom:link href="https://blog.jonaskoeritz.de/index.xml" rel="self" type="application/rss+xml" />
    
    
    <item>
      <title>ExpressLRS integration for Orqa FPV.Connect</title>
      <link>https://blog.jonaskoeritz.de/2022/06/20/expresslrs-integration-for-orqa-fpv-connect/</link>
      <pubDate>Mon, 20 Jun 2022 13:00:00 +0100</pubDate>
      <author>jonas.koeritz@gmail.com (Jonas Köritz)</author>
      <guid>https://blog.jonaskoeritz.de/2022/06/20/expresslrs-integration-for-orqa-fpv-connect/</guid>
      <description>Motivation Since starting to fly FPV drones about two years ago I steadily upgraded my gear. I settled on ExpressLRS for my radio link because of the superb featureset, speed and range as well as a super low price for individual components. One of the features that ExpressLRS offers is the support of so called Backpacks, that integrate the video receiver with the system to enable automatic band and channel switching.</description>
    </item>
    
    <item>
      <title>Imprint</title>
      <link>https://blog.jonaskoeritz.de/imprint/</link>
      <pubDate>Mon, 08 Mar 2021 17:01:00 +0100</pubDate>
      <author>jonas.koeritz@gmail.com (Jonas Köritz)</author>
      <guid>https://blog.jonaskoeritz.de/imprint/</guid>
      <description>Information in accordance with section 5 TMG Jonas Köritz
Stifter Berg 10
23827 Wensin OT Garbek
Contact E-Mail: jonas.koeritz@gmail.com
Website: https://blog.jonaskoeritz.de
Person responsible for content in accordance with 55 Abs. 2 RStV Jonas Köritz
Disclaimer Accountability for content The contents of our pages have been created with the utmost care. However, we cannot guarantee the contents&amp;rsquo; accuracy, completeness or topicality. According to statutory provisions, we are furthermore responsible for our own content on these web pages.</description>
    </item>
    
    <item>
      <title>Revisiting Cheap Action Cams</title>
      <link>https://blog.jonaskoeritz.de/2019/09/11/revisiting-cheap-action-cams/</link>
      <pubDate>Wed, 11 Sep 2019 19:00:00 +0100</pubDate>
      <author>jonas.koeritz@gmail.com (Jonas Köritz)</author>
      <guid>https://blog.jonaskoeritz.de/2019/09/11/revisiting-cheap-action-cams/</guid>
      <description>In the last blog post (from over two years ago!) I had a first look at the protocol that is used to control cheap action cameras via their corresponding smartphone apps. It turns out that this protocol is used by many similar cameras without any modifications and any app can be used for any camera.
I&amp;rsquo;ve been contacted by several people that had problems using the example code that I provided, written in Node.</description>
    </item>
    
    <item>
      <title>Hacking the TecTecTec! XPro2 Action Camera</title>
      <link>https://blog.jonaskoeritz.de/2017/02/21/hacking-the-xpro2-action-camera/</link>
      <pubDate>Tue, 21 Feb 2017 15:28:08 +0100</pubDate>
      <author>jonas.koeritz@gmail.com (Jonas Köritz)</author>
      <guid>https://blog.jonaskoeritz.de/2017/02/21/hacking-the-xpro2-action-camera/</guid>
      <description>A friend of mine baught a cheap Action Camera through Amazon a few days ago. He asked me to take a look at the mobile app to see if it was possible to stream the live preview to a PC or a RaspberryPi to use it as a cheap surveillance camera. The camera is running Android and it&amp;rsquo;s possible to connect to ADB though USB.
XPro2HD Action Camera The first step was to make it easier to connect to the camera.</description>
    </item>
    
    <item>
      <title>How to Simplify LetsEncrypt Certificate Expansion and Renewal with a Config File</title>
      <link>https://blog.jonaskoeritz.de/2017/01/11/how-to-simplify-letsencrypt-certificate-expansion-and-renewal-with-a-config-file/</link>
      <pubDate>Wed, 11 Jan 2017 13:28:25 +0100</pubDate>
      <author>jonas.koeritz@gmail.com (Jonas Köritz)</author>
      <guid>https://blog.jonaskoeritz.de/2017/01/11/how-to-simplify-letsencrypt-certificate-expansion-and-renewal-with-a-config-file/</guid>
      <description>In my post Securing the Blog with TLS, I created my TLS certificate using certbot and provided all options as command line parameters. Using this approach it is cumbersome to add new domain names to an existing certificate and it&amp;rsquo;s not easy to renew your certificate. At least not easy enough for me. After the second expiration notice, kindly provided by the Let&amp;rsquo;s Encrypt Expiry Bot, I wanted to simplify this task as much as possible.</description>
    </item>
    
    <item>
      <title>Securing SSH With fail2ban</title>
      <link>https://blog.jonaskoeritz.de/2016/11/13/securing-ssh-with-fail2ban/</link>
      <pubDate>Sun, 13 Nov 2016 20:04:38 +0100</pubDate>
      <author>jonas.koeritz@gmail.com (Jonas Köritz)</author>
      <guid>https://blog.jonaskoeritz.de/2016/11/13/securing-ssh-with-fail2ban/</guid>
      <description>The Problem Shortly after setting up my server I noticed increasing amounts of authentication log data. The files contained many thousand lines of failed password attempts for the root user account. The attempts not only put my system at risk but also clogged up the log files and introduced stress on the small server instance.
Nov 13 20:20:06 v36436 sshd[7001]: Failed password for root from 116.31.116.36 port 12984 ssh2 Nov 13 20:20:10 v36436 sshd[7001]: message repeated 2 times: [ Failed password for root from 116.</description>
    </item>
    
    <item>
      <title>Understanding CSTA - Part 2</title>
      <link>https://blog.jonaskoeritz.de/2016/10/25/understanding-csta-part-2/</link>
      <pubDate>Tue, 25 Oct 2016 14:40:00 +0200</pubDate>
      <author>jonas.koeritz@gmail.com (Jonas Köritz)</author>
      <guid>https://blog.jonaskoeritz.de/2016/10/25/understanding-csta-part-2/</guid>
      <description>When an application successfully established an ApplicationSession with a Switching Function there will mostly be silence on the wire, except for your regular ResetApplicationTimer request to keep the session alive. The first thing a Computing Function might want to do is discover what devices are available on the target system. Some applications implement a scraping function that requests device details for every possible identifier they can come up with (or the administrator specified), others implement the GetSwitchingFunctionDevices request.</description>
    </item>
    
    <item>
      <title>Understanding CSTA - Part 1</title>
      <link>https://blog.jonaskoeritz.de/2016/10/23/understanding-csta-part-1/</link>
      <pubDate>Sun, 23 Oct 2016 22:34:20 +0200</pubDate>
      <author>jonas.koeritz@gmail.com (Jonas Köritz)</author>
      <guid>https://blog.jonaskoeritz.de/2016/10/23/understanding-csta-part-1/</guid>
      <description>What does it take to connect to a communications system using CSTA? What does it take to implement the service provider side of CSTA communications? What exactly is CSTA and what purpose does it serve? As for all questions, lets have a look at the Wikipedia article.
Computer Supported Telecommunications Applications (CSTA) is an abstraction layer for telecommunications applications. It is independent of underlying protocols. &amp;ndash; Wikipedia
CSTA is used to connect applications to PBXs to be able to control the connected phones, control the routing of calls and monitor events happening inside the PBX.</description>
    </item>
    
    <item>
      <title>Securing the Blog with TLS</title>
      <link>https://blog.jonaskoeritz.de/2016/10/23/securing-the-blog-with-tls/</link>
      <pubDate>Sun, 23 Oct 2016 20:32:47 +0200</pubDate>
      <author>jonas.koeritz@gmail.com (Jonas Köritz)</author>
      <guid>https://blog.jonaskoeritz.de/2016/10/23/securing-the-blog-with-tls/</guid>
      <description>Using HTTPS on every HTTP-based system seems like a good idea, but the cost of trusted certificates has been a deterrent for many non-commercial blog authors and open source projects. For some time now letsencrypt offers a free and secure alternative to the costly certificate authorities. I wanted to secure this blog using HTTPS too and went through the Let&amp;rsquo;s Encrypt certification process.
Let&amp;rsquo;s Encrypt uses the ACME Protocol to verify that you are the owner of the domain name you are requesting a certificate for.</description>
    </item>
    
    <item>
      <title>Setting up Hugo</title>
      <link>https://blog.jonaskoeritz.de/2016/10/23/setting-up-hugo/</link>
      <pubDate>Sun, 23 Oct 2016 16:29:16 +0200</pubDate>
      <author>jonas.koeritz@gmail.com (Jonas Köritz)</author>
      <guid>https://blog.jonaskoeritz.de/2016/10/23/setting-up-hugo/</guid>
      <description>Hugo Logo (by Steve Francia) I planned to setup a blog to keep track of some projects and learnings for quite some time now. I&amp;rsquo;ve worked with Wordpress a couple of times before and I didn&amp;rsquo;t like the idea of this much overhead for a mostly single-author site. I stumbled upon Julia Evans Blog a while ago and added her to my feed-reader, thats where I first heard of Hugo.</description>
    </item>
    
    <item>
      <title>DISA for Android - Privacy Policy</title>
      <link>https://blog.jonaskoeritz.de/disa-privacy-policy/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <author>jonas.koeritz@gmail.com (Jonas Köritz)</author>
      <guid>https://blog.jonaskoeritz.de/disa-privacy-policy/</guid>
      <description>Information in accordance with section 5 TMG Jonas Köritz
Stifter Berg 10
23827 Wensin OT Garbek
Contact E-Mail: jonas.koeritz@gmail.com
Website: https://jonaskoeritz.de
Person responsible for content in accordance with 55 Abs. 2 RStV Jonas Köritz
Privacy DISA for Android only stores configuration data supplied on the &amp;ldquo;Settings&amp;rdquo; screen to support he apps functionality. The configuration data is only stored on the device itself and the app does not transmit any of it to third parties.</description>
    </item>
    
  </channel>
</rss>
