jks

About

Username
jks
Joined
Visits
35,656
Last Active
Roles
Member, Administrator, Moderator
Points
603
  • v1.804

    From the CHANGE_LOG file:

    v1.804 February 21, 2025

      Antenna switch:

        Fixed curl command processing. Use a plus sign ("+") to indicate a space in your curl URL.

                E.g. "http://192.168.1.2?cmd=ant+1" runs curl with a URL argument of

                "http://192.168.1.2?cmd=ant 1". A space is used as before to separate the arguments for

                multiple commands. E.g. "http://192.168.1.2?cmd=ant+1 http://192.168.1.3?tune=144MHz".

          (thanks Steffen)

        Added a field for specifying a curl command to run when the antenna is switched to ground

          (because the "Ground antennas when no users connected" option is enabled).

        Added backend for Kmtronic 2-channel device [but needs testing]. (thanks Fernando)

       

      TDoA:

        Added URL parameter to populate sampling station list with custom/private entries

          (i.e. sampling hosts that are not on the map). See TDoA help panel.

       

      Fixed admin backup tab function broken by the admin password reset change.

      Disabling user connections (admin control tab) now also stops autoruns.


    TremolatHB9TMCjimjackii
  • Continuous Freezing Issues with KiwiSDR via Proxy: Troubleshooting Tips

    I should also mention in connection with the voltage drop post above. I knew about the problem many years ago. One day I made up some short cables out of some random "speaker wire" I had where it wasn't immediately obvious what the wire gauge was. I was astonished when the brownout problem happened when running the admin sd card backup function! (it is known that sd card writes take a lot of additional current).

    I didn't believe it until I put a scope on the power connector at the Kiwi set to trigger at lower than 4.8V... And it triggered! lol

    I measured the wire gauge and it was 24 AWG or something. I used one of those online voltage drop calculators and it pretty much confirmed the problem for the length of wire I was using (given a guess at the current spike amount -- with some effort I could have measured that too).

    Tremolat
  • New product accessories in our store: SDR protection circuit, MW filter

  • v1.803

    From the CHANGE_LOG file:

    v1.803 February 14, 2025

      Added admin password reset scheme. See KiwiSDR forum for discussion.

       

      Iframe extension

        Show all 16 instances in user extension menu. (thanks VK3KHZ)

        Prevent duplicate menu names from being setup. (thanks Steffen)

       

      SSTV extension

        Added support for modes:

          PD: PD120 (used by ISS) PD160 PD180 PD240 (but not PD290)

          Robot: R12

          Wraase: SC60

          Pasokon: P3 P5 P7

          FAX480

       

      Fixed bug preventing proxy client start if not running in certain situations.


    HB9TMCTremolatnitroengineG4ZFEjimjackii
  • Forgot your admin password? v1.803+ has an admin password reset feature

    Okay, I think the new admin password reset scheme is working well. See image below.

    The option will appear only if you connect from your local network. Not from an Internet connection (e.g. not from a Kiwi-2 serial number based proxy connection: 2xxxx.proxy.kiwisdr.com/admin). Use my.kiwisdr.com to find the local IP address link to your Kiwi's admin page (e.g. 192.168.1.101:8073/admin).

    You must also provide the Kiwi's serial number. This should be easy since it's written on the physical hardware (Kiwi-1: written in the white box on the Kiwi PCB, Kiwi-2: written on a label on bottom of case).

    As a further security measure the option will only appear for the first 5 minutes after the Kiwi software starts (power-up or software restart).

    So the restrictions should guarantee the Kiwi is in your immediate physical control. So no good for your remote Kiwi located 300 km away on a mountain top.

    If anyone can think of a flaw in this reasoning please let me know ASAP.

    Everything is carefully validated on the server-side. So anyone hacking Javascript on the browser shouldn't be able to exploit the scheme.

    Nate_Rstudentkrasmgjolo22