Pocket Wizard Flex TT5 Cheep Shutter Release Cable

I have just got hold of a pair of TT5’s and I am very impressed with the flash capability. Now I want to fire the shutter from far away. So I priced up the cable and its ?130… Wow for a cable I can get another TT5 for that. So I spoke to a sales man at my local camera shop to see if I could see one. I thought it must be pretty special for that price. They didn’t have any but the salesman said that it is just a cable no bulge in the middle for secret electronics. So I decided to have a go at making one.

To start with get hold of a (I have a Canon but I bet there is an equivalent Nikon cable.
Update: There is I reckon it is the Calumet: CF0066 ?8 ish though I have not tried it) N3 Adapter cable. Calumet product code CF0061 this cost a bit over ?4. This cable has a Male N3 on one end and a female 3.5mm 3 pole jack on the other.

The N3 cable is wired in the standard way as bellow:

Pin Use
1 Ground
2 Focus
3 Shutter

Now to make this adapter work with the TT5 you need to buy a cheep 3.5mm Male to 3.5 mm Male stereo lead (I got one from Tesco for about ?4). You need to cut the cable in half (or shorten it if needed) and figure out with a meter which cable goes to which pin on the plug. Now we need to re solder the cables basically swapping pins 2 and 3 over:

End A Pin Use Connects to End B Pin Use
1 Ground 1 Ground
2 Focus 3 Focus
3 Shutter 2 Shutter

Pop a bit of heat shrink over the cables to keep that together and give it a test.

There you go a ?130 cable for ?8 ish and 30 mins work.

Quick nagios host config generator

Here is a quick script I have cobbled to generate nagios host configs it may need to be changed for template etc but you get the gist.

It includes support for padding of hostname numbers e.g. padding of 3 = web001, web002….web045…web999.

#!/bin/bash
# Nagios host config generater.
# Bruce Tonge
#
#If you need to gen a config for a large number of sequentialy numbered hosts
#just run:
#nagios.sh web example.com 1 50 3
#
#This will create host entries for machines 1-50 but named web001 - web050
#The output should be redirected to a file.

if [ “$#” -lt “4” ]
then
echo “usage: $0 <hostprefix> <fqdn> <first node number> <last node number> <host number padding>”
exit 0
fi

host_str=$1 #host prefix
fqdn_str=$2 #domain name
fnode_num=$3 #first node number
lnode_num=$4 #last node number
pad_num=$5 #charicters to pad

for hostnum in `seq -f”%0$5g” $3 $4`;
do
shorthostname=$host_str$hostnum
longhostname=$host_str$hostnum.$fqdn_str
printf “#Host Entry for Node $shorthostname.\n”
printf “define host{\n”
printf “\tuse\tbasic-host\n”
printf “\thost_name\t$shorthostname\n”
printf “\talias\t$shorthostname\n”
printf “\taddress\t$longhostname\n”
printf “\t}\n”
printf “\n”;
done
exit 0

PSN more detail please…

On reading through the FAQ of the PSN “outage” it seems that Sony are trying to skirt the difficult questions. Mainly well for me anyway over the disclosure of the incident . Question 12 demon straits there intersessions I fear:

Q.12?????How serious is this???Have the hackers broken the? security on PSN/Qriocity???Are you taking necessary measures to prevent such outage happening in the future?

Since this is an overall security related issue, we will not comment further on this case but we are working to restore and maintain the services, including countermeasures against future intrusions.

This would lead me to believe that Sony doesn’t intend to outline the failing of the system and what they have done to put this right.

I have posted a question to Sony about this as well as asking for detail of the format of my password as stored on there system (ether hashed or plan). If I get an answer I will post it here.

I have herd rumours but that is all they are that the CVT codes for credit cards might have got out as well. These should never have been stored and so I am sceptical but will post more as I find out.