Ossi HerralainSensorFuBidirectional escape testingBidirectional or two-way escape testing verifies that escape from an isolated network can communicate both ways: from isolated environment…3 min read·Oct 12, 2023----
Ossi HerralaRevenge of the WhitefishLast spring (2022–04–10) I was activating WWFF reference in a small municipality in Finland called Siikajoki. That day I only got 22 QSOs…2 min read·Oct 20, 2022----
Ossi HerralaWWFF Ninja Activation in HiastinlahtiNinja Activation: Go to site, seen by nobody, have QSOs. Then leave no trace behind and vanish. Nobody knew about your activation before…2 min read·Apr 13, 2022----
Ossi HerralaSunday WWFF activationToday’s ham radio WWFF activation headed to a small municipality in Finland called Siikajoki with a population of 5024 people and…3 min read·Apr 13, 2022----
Ossi HerralaOvernight ham radio activation in Hailuoto, FinlandOur operation was in Hailuoto, a small island (200.53 km²) in the Gulf of Bothnia with a population less than thousand people. This is my…4 min read·Nov 10, 2021----
Ossi HerralaHam radio activation in Hailuoto, FinlandOur operation was in Hailuoto, a small island (200.53 km²) in the Gulf of Bothnia with a population less than thousand people. This is my…3 min read·May 10, 2021--1--1
Ossi HerralainSensorFuInternet Protocol Next Header escapeIn IPv6 header it’s called “Next Header” and in IPv4 header it’s just “Protocol”. This eight bit value contains information about what…3 min read·Jan 26, 2021----
Ossi HerralainSensorFuHow we turned 5G into 5kHacking is a good way of learning and hackathons are a great place to learn with other like minded people. And that was exactly what we…4 min read·Dec 9, 2019----
Ossi Herrala110 m/s towards a planet!This is a short story about a survival scenario I played in the game Space Engineers by Keen Software House. I got inspiration to play…7 min read·Jan 4, 2019----
Ossi HerralainSensorFuUsing static typing to protect against code injection attacksCode injection attack is a method of taking advantage of a flaw where an application can be tricked to relay malicious code from a system…3 min read·Jan 16, 2018--1--1