[Xastir] New script: ads-b.pl for snagging airplane positions

Lee Bengston lee.bengston at gmail.com
Fri Feb 26 11:45:46 EST 2016


Yeah I thought of doing something like that but started with a quick and
dirty denial of a match.

I'm familiar with using back ticks - already used them in the script to
launch and save the results of callpass.  :-)

Stuck at work for the day...

Lee - K5DAT

On Feb 26, 2016 10:36 AM, "Curt Mills" <curt.we7u at gmail.com> wrote:
>
> Want to do it in an even cooler way?
>
>     $ xastir_udp_client localhost 2023 <callsign> <passcode> -identify
>     Received: WE7U-13
>
> Maybe that gives you some ideas...  If you don't do it, I'll get around to
> doing it soon. Soon being relative.
>
> Hint: Use backticks instead of the system() command to save the results of
> a command. So something like this might work (untested code):
>
>   $result = `xastir_udp_client localhost 2023 <callsign> <passcode>
> -identify`;
>
> Then split the callsign/SSID up into two (if SSID is present) with
> "split()" and figure out if the SSID you want to inject with is different
> than the running Xastir's SSID. If not, increment mod 16.
>


More information about the Xastir mailing list