Hoffman Amplifiers Tube Amplifier Forum

Amp Stuff => Tube Amp Building - Tweaks - Repairs => Topic started by: 12AX7 on January 28, 2017, 02:56:33 pm

Title: Shielded PI grid wires?
Post by: 12AX7 on January 28, 2017, 02:56:33 pm
yes or no? Got about 3" of wire from master volume to the cap on the turret board, 2' for the cap from turret to turret, then 3 more inches on the other side of the cap to the PI grid. Would it be a good idea to put the cap on the pot and run a shielded wire direct from there to the grid if the amps isn't a solid known good layout?
Title: Re: Shielded PI grid wires?
Post by: sluckey on January 28, 2017, 03:31:53 pm
no
Title: Re: Shielded PI grid wires?
Post by: sluckey on January 28, 2017, 03:49:13 pm
Are you 'iknowjohnny' over on TAG?
Title: Re: Shielded PI grid wires?
Post by: 12AX7 on January 28, 2017, 04:20:05 pm
Could be, but you just never know.
Title: Re: Shielded PI grid wires?
Post by: sluckey on January 28, 2017, 05:04:25 pm
I read TAG daily but don't post often.  It's always nice to see Hoffman people over there too.
Title: Re: Shielded PI grid wires?
Post by: 12AX7 on January 28, 2017, 05:16:55 pm
What I wanna know is why that place has that virus warning that never goes aways. Whats that about?
Title: Re: Shielded PI grid wires?
Post by: Retrovert on February 01, 2017, 01:49:16 am
What I wanna know is why that place has that virus warning that never goes aways. Whats that about?

Yeah, you and me both. 

According to Google:
Quote
https://www.google.com/transparencyreport/safebrowsing/diagnostic/index.html?hl=en#url=http://ampgarage.com/ (https://www.google.com/transparencyreport/safebrowsing/diagnostic/index.html?hl=en#url=http://ampgarage.com/)
Site Safety Details
Some pages on this website install malware on visitors' computers.
Testing details
We last updated our information about ampgarage.com on January 31, 2017.

What this sort of error usually means is that a banner ad is malware.  Such ads are hosted on third party machines, and sometimes are rotated in and out to evade detection.  Malware has become highly sophisticated and can evade a lot of safeguards in the browser and malware blockers.  Many of the ads used contain embedded programs decoded by otherwise innocuous-looking JavaScript:
https://www.bleepingcomputer.com/news/security/new-stegano-exploit-kit-hides-malvertising-code-in-image-pixels/ (https://www.bleepingcomputer.com/news/security/new-stegano-exploit-kit-hides-malvertising-code-in-image-pixels/)
https://arstechnica.com/security/2016/12/millions-exposed-to-malvertising-that-hid-attack-code-in-banner-pixels/ (https://arstechnica.com/security/2016/12/millions-exposed-to-malvertising-that-hid-attack-code-in-banner-pixels/)
https://www.schneier.com/blog/archives/2016/12/www_malware_hid.html (https://www.schneier.com/blog/archives/2016/12/www_malware_hid.html)

One could use a proxy which disables ads and JavaScript, but even that might not be totally safe.

Disclaimer: I don't know if TAG (a) contains actual malware on its servers; (b) has banner ads which have it some or all of the time; or (c) has malware none of the time and all of this is a false positive.  I have gone there in the past using a proxy server which strips ads and JavaScript, but since I learned about the payload tricks I haven't been back.