Sat May 31 21:31:33 PDT 2020 How to connect using OpenComputers Yes you can connect to our chat network from inside our modded minecraft server using OpenComputers! We wanted to keep the main chat absent from the irc chat (we've been there before) but of course you can opt in to the chat by setting up OpenComputers to connect to our IRC server! In the below video we cover 2 different ways to connect, one using wocchat from the oppm repository (more like weechat); and how to join using the OpenIRC disk provided by the OpenComputers Devs (more like irssi). Both work great, and both will require the internet card. Sorry I guess your browser doesn't support the video tag... bummer for you! Try downloading it instead! https://italktomachines.com/videos/irc-help.mkv

Wed May 27 17:12:48 PDT 2020 Fully Unreal 5! So Unreal IRCD has made version 5 their new stable and main-line irc daemon, and we've fully upgraded! So yes, as more irc3 commands are made available they will be implemented as we grow! Services are also updated so we are as bleeding edge as we can be currently, and hope to stay that way, of course any issues or concerns you notice with the services or connections please do continue to let us know! Thanks! Ammended, we've updated again due to a security reported 2 days later... all up to date again!

Fri Jan 11 14:23:14 PDT 2019 Rust Server Online Again! I got tired of playing on other servers (read, not being able to abuse admin privs and also mess with my members) I decided to stop hosting my minecraft server and instead go back to Rust! I have been watching so many youtube videos of gameplay, I just missed it, and it can be a casual game (especially when your server is brand new and has no other people playing on it.) but farming's boring, so I figured it had to be at least a 2x server. I played on some random 2x server (that spammed you constantly and I hate that) but still had to do too much farming, and also there was no stack changes, so boxes filled up fast. To fix that I have upped my servers limits for most stackable items and went up to 4x. Life is better! Now you just need to join and have some fun with us! The link above has all the details you could need! Come and play!

Tue Jan 31 17:32:25 PDT 2017 Getting your official raspberry pi camera working on the Synology Surveillance Station v8.0 For reference, I'm using an official raspberry pi camera on a raspberry pi 3 running the motioneyeos found here. Get your pi up and running on your network, update the UI to allow "expert settings" and make sure to check the option for "Fast Network Camera" is set to "ON". I also go ahead and disable samba, ftp, motion detection etc as all I really want is the network stream, the synology will be doing the rest of the work. Let it reboot and you should be good to go. Next is a bit more tricky, on your synology you'll need to have SSH enabled access. Log in and cd over to in my case /volume2/@appstore/SurveillanceStation/device_pack (yours might be on /volume1/.. or /volume3/.. etc. Create a new file named RaspberryPi.conf and enter in the following text: [RaspberryPi*Official] api = rpi1 channel_list = 1 default_channel = 1 resolutions_mjpeg = 640x480, 800x600, 1024x576, 1024x768, 1280x720 fps_mjpeg_[640x480, 800x600, 1024x576, 1024x768, 1280x720] = 1-20 default_image_quality = 5 mjpeg = http motion = mjpeg default_username = user default_password = blank Then stop and start the surveillance station from the synology control panel. Now when you go back to the surveillance station you will have a camera brand and model for the official raspberry pi camera working! Set your IP accordingly, set your port to 8081 and your username to "user" and clear out the password, test the connection and enjoy!

Tue Sep 20 13:29:19 PDT 2016 How to setup wifi on your SoC pc be it raspberry pi, orange pi, odroid etc. using wpa_supplicant the RIGHT way! Why is this the right way? Well quite simply it removes the cleartext of your password from the config file. Also yes I'm aware that it's pretty trivial to deauth and generate alot of traffic and sniff the password right out of the air these days. That still requires local proximity to the network, so there's still an argument to obfuscate your configs as much as possible. First we are going to list our wireless devices, iwconfig works, but there's actually iw that does the job easier sudo iw dev See? Isn't that a nice easy to read output?! Assuming you have a wireless device above, you'll need to scan for your wireless access point's name, odd's are good you already know what it's called and can skip this, but not everyone does so I'm posting this to be complete. Replace wlan0 below with whatever the device's name was above. sudo iwlist wlan0 scan This next step will require root though, sudo isn't enough so we'll enter the next 2 commands sudo su wpa_passphrase SSID >> /etc/wpa_supplicant.conf Replaceing your Access Point's name for the SSID above. Use quotes if there are spaces in the SSID "like so". This will return you to a blank line. It's waiting for you to type in your Pre Shared Key (PSK) or the password to your wifi, just enter it on this line and press enter. Now if you check your /etc/wpa_supplicant/wpa_supplicant.conf file you'll see you have your PSK entered and commented out, using a hashed version of it below instead. If your parinoid about computer security like myself, you'll want to delete this line and just leave the hashed version. It should work just fine. Now you should be good to cycle your wireless card and get connected! Easy enough, just enter the following and you should be up and running! (or just reboot) sudo ifdown wlan0 sudo ifup wlan0 Give it a few seconds to connect and check you should see you all connected pi@demo:~ $ iw dev phy#0 Interface wlan0 ifindex 3 wdev 0x1 addr 7c:dd:90:8d:e1:38 ssid Flaming Unicorns type managed