Перейти до основного вмісту

Публікації

ffmpeg IP Camera DVR recording

If you have home server and want to record streams from your IP camera you can use siple script like this: while true; do     ffmpeg -i "rtsp:// :554/user=admin&password=&channel=0&stream=0.sdp?Real_stream" -acodec copy -vcodec copy -fs 20000000 "/srv/ftp/cam1/vid `date`.mov" | true ; done Option -fs 20000000  limits file sizes to ~20MB CPU usage is very low. Even raspberry pi should be able to save your data from multiple cameras. NOTE: deleting old files is not implemented.

XMeye dirrect connect to Chineese Gadinan IP camera

I have camera like this: https://www.aliexpress.com/item/32919966679.html?spm=a2g0s.9042311.0.0.27424c4dVHBeAZ It is possible to connect to this camera even if you are behind firewalls. Use Zerotier to set up linux server at your home. Any lowcost computer will work like raspberry pi or orange pi. Install zerotier on your phone - amazingly it is not resource hungry and can be constantly ON. On home server run this command on boot:  socat tcp-l:34567,fork,reuseaddr tcp: :34567 Or forward port 34567 with any other tool like firewall. Now add new camera in your XMEye app using IP address of home server from Zerotier management console.

How to capture network trafic from iOS iPhone iPad device with Wireshark

1.Connect your iOS device to your Mac via USB. 2. Get the UDID for the connected device from iTunes or xcode organiser . 3.Open terminal in your Mac 4.type the following commands in the terminal $ ifconfig -l // First get the current list of interfaces. $ rvictl -s // Then run the tool with the UDID of the device. // This adds a new virtual network interface rvi0. $ ifconfig -l // Get the list of interfaces again, and you can see the new virtual network interface, rvi0, added by the previous command. $ sudo tcpdump -i rvi0 -w ./output.pcap // Get the traced packets and save it to a file Note : output.pacp is the packet traced file and will be located in the systems root directory When you're done you can stop the process with the following command. $ rvictl -x open the .pacp using wireshark and do your default procedures. Thats it !!!!!!!! No...

How to symbolicate crash logs in XCode organizer

If you have application distributed through Apple appstore or Testflight you should be able to get automatic crash reports by opening XCode/Window/Organizer menu, then select app and go to Crashes tab. If crashes are not symbolicated you can symbolicate them manually by: 1. In organizer, call for context menu by pressing on crash log call stack section 2. Select "show in finder ..." menu item 3. Navigate up to ~/Library/Developer/Xcode/Products/ [app bundle id]/ [app version]/Crashes/Appstore/ 4. Copy debug symbols there: 5. Go back to Organizer and select "Resymbolicate" context menu item on call stack area. Now you should be able to see symbolicated log. Works for me on XCode 10 and Testflight.