各种插头的用途
点击数:20
From Wikipedia, the free encyclopedia
This list of WLAN channels is the set of legally allowed wireless local area network channels using IEEE 802.11 protocols, mostly sold under the trademark WiFi. The 802.11 workgroup currently documents use in five distinct frequency ranges: 2.4 GHz, 3.6 GHz, 4.9 GHz, 5 GHz, and 5.9 GHz bands.[1] Each range is divided into a multitude of channels. Countries apply their own regulations to the allowable channels, allowed users and maximum power levels within these frequency ranges.allo
There are 14 channels designated in the 2.4 GHz range spaced 5 MHz apart (with the exception of a 12 MHz spacing before channel 14).[2]
Note that for 802.11g/n it is not possible to guarantee orthogonal frequency-division multiplexing (OFDM) operation thus affecting the number of possible non-overlapping channels depending on radio operation.[3]
As the protocol requires 16.25 to 22 MHz of channel separation (as shown above), adjacent channels overlap and will interfere with each other. Leaving 3 or 4 channels clear between used channels is recommended to avoid interference.[4] The exact spacing required depends on the protocol and data rate selected as well as the electromagnetic environment where the equipment is used.
When two or more 802.11b transmitters are operated in the same airspace, their signals must be attenuated by -50 dBr and/or separated by 22 MHz to prevent interference.[5] This is because the DSSS algorithm transmits data logarithmically along a 20 MHz bandwidth. The remaining 2 MHz gap is used as a guard band to allow sufficient attenuation along the edge channels.
Note: The 40 MHz bands in the diagram above are labelled with their centre channel numbers, but the management interface of many Wi-Fi devices labels one of these bands with the centre channel of one of the 20 MHz bands it overlaps plus an Up or Down notation to specify the other half of the band i.e. Channel 3 in the diagram is called Channel 1+Upper or Channel 5+Lower and Channel 11 in the diagram is called Channel 9+Upper or Channel 13+Lower.
Countries apply their own regulations to the allowable channels, allowed users and maximum power levels within these frequency ranges. Network operators should consult their local authorities as these regulations may be out of date as they are subject to change at any time. Most of the world will allow the first thirteen channels in the spectrum.
点击数:47
Since Windows 10 Insider Build 14986 Microsoft has started to use new Unified Update Platform(UUP), which no longer offers the install.esd file (read more in this post). Through some registry modifications users can at least for now disable UUP and get ESD version of the build upgrade, but it seems that this option might not be available in the future.
UUP is of course a positive change. It is differential, scanning user’s existing Windows 10 installation only downloading and installing those system files that have changed. In ESD upgrade full Windows system (all system files and native applications) were replaced, with the same file or app version even in case the new build did not include a newer updated version. Regardless if a system file, component or application was updated, ESD upgrade replaced it. This caused download size to be bigger, in addition to longer time required for upgrade because full Windows was downloaded and everything overwritten with every upgrade.
However, the possibility to create an ISO image is, has been and will be important to us Insiders. Microsoft has usually released an ISO when a build has been released to Insider Slow Ring, but weFast Ring users do need an option to create our own install media.
This tutorial will show how to do that, how to create an ISO image out of a UUP upgraded Windows 10.
These files will in some cases be removed when upgrade is done. If you want to make an ISO for future needs, you have to do it before starting the upgrade process itself, after downloading the upgrade files but before clicking Restart now button!
1.2) Installer is digitally signed, accept UAC prompt:
1.3) Accept license, select where to install (default: C.\UUPtoISO):
1.4) Select name of Start Menu group (or accept default). If you do not want any Start Menu group being created, selectDon’t create a Start Menu folder:
1.5) Select if you want a desktop shortcut or not:
1.6) Click Next to start setup:
1.7) If you don’t want to run UUPtoISO now, unselect Launch UUPtoISO. Click Finish to exit setup:
1.8) You will find UUPtoISO in Start > U > UUPtoISO. To uninstall go to Settings > Apps, select UUPtoISO, select Uninstall, or right click UUPtoISO in Start Menu and select Uninstall
1.9) See Quick Start.pdf for simple one page printable instructions. It can also be found in folder where you installedUUPtoISO.
2.2) In File Explorer, search for ext:esd to find all ESD files. Only one of the subfolders ofC:\Windows\SoftwareDistribution\Download contains ESD files (extension .esd). So called express UUP upgrade has only one ESD file, canonical UUP upgrades can have 10+ ESD files. Regardless of how many ESD files your search finds, they are all stored in same subfolder, the one containing necessary files to make an ISO image
Usually upgrades are differential (express) only containing one ESD file as in this example. Search for ESD files finds one file in folder staring with 5721f7. Right click it and select Open file location to open folder we need:
In this example upgrade has been canonical containing 13 ESD files, all in same folder starting with a526e. Right click any of them and select Open file location:
2.3) Right click File Explorer addressbar, select Copy address to copy path of UUP folder to clipboard:
3.1) Run UUPtoISO, right click to automatically paste the UUP folder path copied in step 2.3, press Enter to start. Main menu will be shown:
If this happens to you, use the temporarily fix posted in this post.
I will remove this notice when Microsoft has fixed the bug in coming builds.
3.3) The information option (#3) is useful to check that ISO will be what you expect:
Press any key to return to main menu
3.4) Press 1 or 2 depending on if you want to make an ISO image or install.wim file, the process starts. Be patient, it will take several minutes
That’s it. You can now start upgrade or repair install using your ISO. To clean install Windows 10, ISO must first be burned to a DVD or USB flash drive (tutorial)
Kari
UUPtoISO Changelog:
All versions using original UUP decrypter script (uup-converter-wimlib-5) by abbodi1406 and rgadguard at MDL.
点击数:18
一是商家出售的成品中一个金属封装的吸收电阻太过于神秘,阻止了部分DIYer,不知其为何物而无法仿制,二是1:9巴伦的制作或者购买,要么是快递费太贵,要么是缺东少西元件难以凑齐,无法开工。
点击数:37
海能达(hytera)不同设备之间频率互导
本次测试 使用了 X1p 导入 PD980
1. 打开CPS 读取数据
2. 导出常规信道
3. 正常打开 报错直接点是
4. 正常显示出参数
5. 读取被导入机器信息 操作步骤一样 同样导出一份常规信道
6.机器参数信息
7.吧这个文件直接 另存为 一份Excel 97-2003*.xls 文件
8.打开保存并且不报错的 .XLS 文件 并 增加 宏
9.创建一个 宏
10.全选 删除
11.黏贴 宏脚本
Option Explicit
Public Sub AllInternalPasswords()
‘ Breaks worksheet and workbook structure passwords. Bob McCormick
‘ probably originator of base code algorithm modified for coverage
‘ of workbook structure / windows passwords and for multiple passwords
‘
‘ Norman Harker and JE McGimpsey 27-Dec-2002 (Version 1.1)
‘ Modified 2003-Apr-04 by JEM: All msgs to constants, and
‘ eliminate one Exit Sub (Version 1.1.1)
‘ Reveals hashed passwords NOT original passwords
Const DBLSPACE As String = vbNewLine & vbNewLine
Const AUTHORS As String = DBLSPACE & vbNewLine & _
“Adapted from Bob McCormick base code by” & _
“Norman Harker and JE McGimpsey”
Const HEADER As String = “AllInternalPasswords User Message”
Const VERSION As String = DBLSPACE & “Version 1.1.1 2003-Apr-04”
Const REPBACK As String = DBLSPACE & “Please report failure ” & _
“to the microsoft.public.excel.programming newsgroup.”
Const ALLCLEAR As String = DBLSPACE & “The workbook should ” & _
“now be free of all password protection, so make sure you:” & _
DBLSPACE & “SAVE IT NOW!” & DBLSPACE & “and also” & _
DBLSPACE & “BACKUP!, BACKUP!!, BACKUP!!!” & _
DBLSPACE & “Also, remember that the password was ” & _
“put there for a reason. Don’t stuff up crucial formulas ” & _
“or data.” & DBLSPACE & “Access and use of some data ” & _
“may be an offense. If in doubt, don’t.”
Const MSGNOPWORDS1 As String = “There were no passwords on ” & _
“sheets, or workbook structure or windows.” & AUTHORS & VERSION
Const MSGNOPWORDS2 As String = “There was no protection to ” & _
“workbook structure or windows.” & DBLSPACE & _
“Proceeding to unprotect sheets.” & AUTHORS & VERSION
Const MSGTAKETIME As String = “After pressing OK button this ” & _
“will take some time.” & DBLSPACE & “Amount of time ” & _
“depends on how many different passwords, the ” & _
“passwords, and your computer’s specification.” & DBLSPACE & _
“Just be patient! Make me a coffee!” & AUTHORS & VERSION
Const MSGPWORDFOUND1 As String = “You had a Worksheet ” & _
“Structure or Windows Password set.” & DBLSPACE & _
“The password found was: ” & DBLSPACE & “$$” & DBLSPACE & _
“Note it down for potential future use in other workbooks by ” & _
“the same person who set this password.” & DBLSPACE & _
“Now to check and clear other passwords.” & AUTHORS & VERSION
Const MSGPWORDFOUND2 As String = “You had a Worksheet ” & _
“password set.” & DBLSPACE & “The password found was: ” & _
DBLSPACE & “$$” & DBLSPACE & “Note it down for potential ” & _
“future use in other workbooks by same person who ” & _
“set this password.” & DBLSPACE & “Now to check and clear ” & _
“other passwords.” & AUTHORS & VERSION
Const MSGONLYONE As String = “Only structure / windows ” & _
“protected with the password that was just found.” & _
ALLCLEAR & AUTHORS & VERSION & REPBACK
Dim w1 As Worksheet, w2 As Worksheet
Dim i As Integer, j As Integer, k As Integer, l As Integer
Dim m As Integer, n As Integer, i1 As Integer, i2 As Integer
Dim i3 As Integer, i4 As Integer, i5 As Integer, i6 As Integer
Dim PWord1 As String
Dim ShTag As Boolean, WinTag As Boolean
Application.ScreenUpdating = False
With ActiveWorkbook
WinTag = .ProtectStructure Or .ProtectWindows
End With
ShTag = False
For Each w1 In Worksheets
ShTag = ShTag Or w1.ProtectContents
Next w1
If Not ShTag And Not WinTag Then
MsgBox MSGNOPWORDS1, vbInformation, HEADER
Exit Sub
End If
MsgBox MSGTAKETIME, vbInformation, HEADER
If Not WinTag Then
MsgBox MSGNOPWORDS2, vbInformation, HEADER
Else
On Error Resume Next
Do ‘dummy do loop
For i = 65 To 66: For j = 65 To 66: For k = 65 To 66
For l = 65 To 66: For m = 65 To 66: For i1 = 65 To 66
For i2 = 65 To 66: For i3 = 65 To 66: For i4 = 65 To 66
For i5 = 65 To 66: For i6 = 65 To 66: For n = 32 To 126
With ActiveWorkbook
.Unprotect Chr(i) & Chr(j) & Chr(k) & _
Chr(l) & Chr(m) & Chr(i1) & Chr(i2) & _
Chr(i3) & Chr(i4) & Chr(i5) & Chr(i6) & Chr(n)
If .ProtectStructure = False And _
.ProtectWindows = False Then
PWord1 = Chr(i) & Chr(j) & Chr(k) & Chr(l) & _
Chr(m) & Chr(i1) & Chr(i2) & Chr(i3) & _
Chr(i4) & Chr(i5) & Chr(i6) & Chr(n)
MsgBox Application.Substitute(MSGPWORDFOUND1, _
“$$”, PWord1), vbInformation, HEADER
Exit Do ‘Bypass all for…nexts
End If
End With
Next: Next: Next: Next: Next: Next
Next: Next: Next: Next: Next: Next
Loop Until True
On Error GoTo 0
End If
If WinTag And Not ShTag Then
MsgBox MSGONLYONE, vbInformation, HEADER
Exit Sub
End If
On Error Resume Next
For Each w1 In Worksheets
‘Attempt clearance with PWord1
w1.Unprotect PWord1
Next w1
On Error GoTo 0
ShTag = False
For Each w1 In Worksheets
‘Checks for all clear ShTag triggered to 1 if not.
ShTag = ShTag Or w1.ProtectContents
Next w1
If ShTag Then
For Each w1 In Worksheets
With w1
If .ProtectContents Then
On Error Resume Next
Do ‘Dummy do loop
For i = 65 To 66: For j = 65 To 66: For k = 65 To 66
For l = 65 To 66: For m = 65 To 66: For i1 = 65 To 66
For i2 = 65 To 66: For i3 = 65 To 66: For i4 = 65 To 66
For i5 = 65 To 66: For i6 = 65 To 66: For n = 32 To 126
.Unprotect Chr(i) & Chr(j) & Chr(k) & _
Chr(l) & Chr(m) & Chr(i1) & Chr(i2) & Chr(i3) & _
Chr(i4) & Chr(i5) & Chr(i6) & Chr(n)
If Not .ProtectContents Then
PWord1 = Chr(i) & Chr(j) & Chr(k) & Chr(l) & _
Chr(m) & Chr(i1) & Chr(i2) & Chr(i3) & _
Chr(i4) & Chr(i5) & Chr(i6) & Chr(n)
MsgBox Application.Substitute(MSGPWORDFOUND2, _
“$$”, PWord1), vbInformation, HEADER
‘leverage finding Pword by trying on other sheets
For Each w2 In Worksheets
w2.Unprotect PWord1
Next w2
Exit Do ‘Bypass all for…nexts
End If
Next: Next: Next: Next: Next: Next
Next: Next: Next: Next: Next: Next
Loop Until True
On Error GoTo 0
End If
End With
Next w1
End If
MsgBox ALLCLEAR & AUTHORS & VERSION & REPBACK, vbInformation, HEADER
End Sub
12. 选中运行它 去除保护
12.再次保存 运行宏后文档保护被去除
13.打开 X1p 原始常规信道Xls 报错 无视 复制数字\模拟信道
14.全选Pd980数字\模拟 信道表 后粘贴 保存
15.打开PD980存档或读取机器数据 后选择 导入常规信道
16.数据复制完成
点击数:25