Saturn, Mars and Jupiter “beside” one another


One of these things is not like the other


Google Maps (Desktop) thinks I’m in Miami

I am not. Not uncommon, I guess.


Photos from the Seminole Gulf Railway

Soon the be turned into the North Legacy Trail, Phase 2:

Tuttle @ Novus/Poplar St

Webber @ just West of Greendale Dr


Seminole Gulf Railway – Wikipedia archive

Seaboard Air Line Railroad – Wikipedia archive

Seminole Gulf Railway, L.P. – Exempt Abandonment – Legal Proceedings

Converting WordPress Categories to tags (and Vice-Versa)

Helpful article here (thank you Manoj at Blogging Triggers)

Creating and installing SSH Keys (Mac)

Great article here (thanks HowtoForge) that pretty much worked as-is on my Mac running macOS 10.13.6. Never knew about about ‘ssh-copy-id’, will come in very handy!


Scanning Mac WiFi networks from the command line

Thanks to for this tip.

First, do this (one-time operation):

$ sudo ln -s /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/local/bin/airport

Then, anytime you want to query the nearby Wi-Fi networks, make sure Wi-Fi is enabled, and do this:

$ airport -s

This will create output that looks like this (B/SSIDs changed to protect the innocent 🙂 ):

SSID BSSID             RSSI CHANNEL HT CC SECURITY (auth/unicast/group)
XXXX 1a:2b:3c:4d:5e:6f -66 149 Y US WPA2(PSK/AES/AES)
XXXX 1a:2b:3c:4d:5e:6f -68 6 Y -- WPA2(PSK/AES/AES)
XXXX 1a:2b:3c:4d:5e:6f -43 6 Y US WPA2(PSK/AES/AES)
XXXX 1a:2b:3c:4d:5e:6f -65 6 Y -- WPA2(PSK/AES/AES)
XXXX 1a:2b:3c:4d:5e:6f -84 1 Y US WPA2(PSK/AES/AES)
XXXX 1a:2b:3c:4d:5e:6f -70 1 Y US WPA2(PSK/AES/AES)
XXXX 1a:2b:3c:4d:5e:6f -58 1 Y US WPA2(PSK/AES/AES)
XXXX 1a:2b:3c:4d:5e:6f -86 11 Y -- WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
XXXX 1a:2b:3c:4d:5e:6f -85 11,-1 Y US WPA2(PSK/AES/AES)
XXXX 1a:2b:3c:4d:5e:6f -58 11 Y US WPA2(PSK/AES/AES)

Find that program running on that port

macOS (tested on 10.11.6):
sudo lsof -i :80
…where ’80’ is the port you’re curious about (substitute any value)

Thanks to Databasically.

Windows (tested on 10 Pro version 1709):
netstat -ano
…this will produce a list of ports in use and the PIDs using them)

Thanks to @RickVanover.

Fedora 20
netstat -npl | grep 8013
…this will find the name of the process running on port 8013. Thanks to Vivek Gite at nixCraft.

Segfault error

Ever end up with messages like these in your Linux system’s system log? (/var/log/messages or journalctl or whatever system log system you’re using)?

Apr 1 08:09:27 machinename kernel: ProcessNameThatCrashed[22041]: segfault at 00000000e5c5e000 rip 00000000081473d0 rsp 00000000e5c5aa30 error 4

Ever wonder what that error number means? Well, Raphael Geissert over at Raphael’s blog has a handy little lookup tool that I made use of today.

In my case, error 4 means “The cause was a user-mode read resulting in no page being found.”

As commenter “LittleAncientForestKami” explains, maybe not rocket science, but since I had no idea how to figure this out, really appreciated.

So, I thought I’d figure out what “rip” and “rsp” meant. “rsp” is probably a little hard to use, but “rip” is the address of the instruction where the crash occured, and you can figure out what function it points to using this technique described by StackOverflow user qrtt1:

  1. Dump the addresses of the crashing application by saying “objdump -d ProcessNameThatCrashed | less” (where “ProcessNameThatCrashed” is the name of the crashing app)
  2. Search for the address in ‘less’ by typing “/”, then entering the address name (in this case, the address I’m searching for is ‘81473d0’).

A few (or maybe many) lines up from the line matching the address in question, you should see the name of the function that crashed:

0081473c4 <fourBytesNetworkToHost>:
81473c4: 55 push %ebp
81473c5: 89 e5 mov %esp,%ebp
81473c7: 83 ec 18 sub $0x18,%esp
81473ca: 8d 55 fc lea 0xfffffffc(%ebp),%edx
81473cd: 8b 45 08 mov 0x8(%ebp),%eax
81473d0: 8b 00 mov (%eax),%eax

In this case ‘fourBytesNetworkToHost’ is the name of the function that crashed.

Protected: Andrea’s Surprise Party

This content is password protected. To view it please enter your password below: