Have you ever wanted to search the FCC database outside the shack on a POTA or at Field Day? It’s easy when you have cell coverage, but what if you are in the middle of nowhere? Or what if you want to see all the amateurs around you, search by last name or even who have a callsign like yours?
K3NG’s has come up with a powerful command line tool called HamDB that let’s you have the entire FCC database available locally on your Raspberry Pi. One thing I thought was missing was an easy to use UI, so I have put something together called HamDB GUI.
With it you can search by call, name, zip code or callsign wildcard, right in your web browser.
It’s easy to get installed and up and running. All you need is a Raspberry Pi 3B or better and a 32GB SD card.
If you are looking to power you Raspberry Pi in the field there are a number of <$10 converters like this one on Amazon that will allow you to run the Pi off 12 volts easily.
First you’ll need to setup your Pi.
1.Preparing the Raspberry Pi SD card
a. Put your SD card in your reader and plug this into your computer’s usb port.
b. Download and install Raspberry Pi card management software.
Go to https://www.raspberrypi.org/software/ and download and install Raspberry Pi Imager.
Follow the illustrations below to install the base lite image on your SD card:
Pick your computer model.
Name your system, the default instructions below reference the computer being named as “raspberrypi” with a user of “pi” and a password of “raspberry”. So it is easiest to use that name and password, and then enter your wifi network name and password.
Then scroll down and select your time zone. Then continue on like the pictures below.
2. Connect the hardware and SD card.
Insert the SD card into your Raspberry Pi, connect your CAT interface (USB cable) and (optional) connect your ethernet cable. Wifi is not recommended because it can introduce issues but we have it set up with your network on the previous step if you’d like to try it.
3. Connect via SSH to your Raspberry Pi
Wait a minute or two for the Raspberry Pi to boot up and then connect to it with the steps below in Putty.
If you have a “Putty Security Alert” window click “yes”.
A black window will open. On the line “login as:” put “pi” On the line “pi@raspberrypi.local’s password:” put “raspberry” (Warning, it is normal that nothing is displayed on the password line, in fact your password is hidden for discretion).
You should then see this:
4. Software Installation
At the pi@raspberry prompt enter (type this command as one line – it is best if you copy/paste it).
Then at the next prompt type (to make it executable):
chmod +x Ham_DB_Gui.sh
then run the installer and make sure you select the option to download the FCC database. This is take a little time so allow about 15-30 for the install to finish.
./Ham_DB_Gui.sh
After the installation completes, just go to http://raspberrypi.local and you’ll see the system webpage. Initial lookups will be slow while the system indexes the FCC data. After an hour or so, they should be much faster. At 2:30AM daily, the system will download updates for you so you’ll always have the latest call information.
I’ve been using a WaveNode WN-2 power meter at our remote station for years now. It’s a fantastic piece of gear – four independent RF channels, high SWR alarms, forward and reverse wattage monitoring and a Windows app that displays everything in real time. Check it out at:
But here’s the problem: the data lives in the WaveNode application and nowhere else. I wanted that data in my Node-RED dashboard. I wanted it in Grafana for historical trending. I wanted to trigger automations based on SWR readings or power levels. The WaveNode software wasn’t designed to share its data with other applications.
So I built a bridge.
The result is WaveNode-to-MQTT, a small Windows utility that grabs all the WaveNode data and republishes it to MQTT topics. Once it’s in MQTT, you can do anything with it – display it in dashboards, log it to databases, trigger alerts, whatever you need.
Here is the project link: https://github.com/n3bkv/WaveNode-to-MQTT
Why MQTT?
If you’re not familiar with MQTT, it’s a lightweight messaging protocol designed for IoT and automation. It uses a publish/subscribe model – applications publish messages to topics, and other applications subscribe to the topics they care about.
MQTT has become the de facto standard for home automation and monitoring systems. Node-RED speaks MQTT natively. InfluxDB can subscribe directly to MQTT topics. Grafana can pull from MQTT. If you want to integrate something into a larger automation system, MQTT is the way to do it.
The WaveNode software, being a specialized RF measurement tool, doesn’t have any automation hooks built in. But it does use Windows message passing internally – it posts messages to its own window handle whenever readings change. I just needed to intercept those messages and forward them to MQTT.
What Data Gets Published
The bridge captures everything the WaveNode measures:
RF Power (per channel 1-4): – Peak forward watts – Average forward watts – SWR (Standing Wave Ratio)
Computed Metrics: – Reflected power (peak and average) – calculated from forward power and SWR – Return loss in dB – how good your antenna match is
DC Power: – Supply voltage and current
Rotator Data: – Current heading(s) – Destination heading – In-motion status
Auxiliary Inputs: – Two additional analog inputs for whatever you want to monitor
All of this gets published to individual MQTT topics like wavenode/peak_watts/1, wavenode/swr1, wavenode/dc/volts, etc.
Reflected Power and Return Loss
One thing I added that the WaveNode software doesn’t show directly is reflected power in watts and return loss in dB.
The WaveNode gives you forward power and SWR. From those two values, you can calculate reflected power using some RF math:
The bridge does this calculation automatically and publishes the results. Now I can see exactly how many watts are reflecting back from my antenna mismatches, not just the ratio. And return loss in dB is a more intuitive metric for antenna matching – higher numbers are better, and 20 dB return loss or better is generally considered excellent.
How It Actually Works
The WaveNode Windows application uses the Win32 messaging system to communicate internally. Every time a reading changes, it posts a window message with specific parameters encoding the measurement type and value.
The bridge application:
Finds the WaveNode application’s window handle (either from the registry or by process name)
Registers itself to receive those window messages
Decodes the message parameters to extract measurement type and value
Publishes the data to the appropriate MQTT topic
It’s essentially eavesdropping on WaveNode’s internal messaging and republishing it in a format other software can use.
Setting It Up
The setup is straightforward. The bridge runs on the same Windows computer as the WaveNode software (since it needs to intercept local window messages).
First, make sure you have an MQTT broker running somewhere. I use Mosquitto on a Raspberry Pi, but any MQTT broker works. It doesn’t have to be on the same computer – mine is across the network.
Download the WaveNode-to-MQTT executable from the GitHub releases (or build it yourself if you want – it’s a simple .NET application). Here’s the direct link to the download for the compiled Windows installer.
Run it the first time and you’ll get a setup dialog asking for:
Your MQTT broker’s IP address and port (default is 1883)
Username and password if your broker requires authentication
Base topic name (default is “wavenode”)
Some technical settings with tooltips that explain what they do
You can keep most of the defaults. If your broker doesn’t require authentication, leave those fields blank. Then make sure to change the IP to point to your computer running Mosquitto.
Click Save, and the bridge minimizes to run in the background. That’s it. It immediately starts publishing WaveNode data to MQTT.
The settings get saved to a JSON file in your AppData folder, so you don’t have to configure it again. If you do need to change something, just go into your Task Manager, kill the program and then delete the configuration settings in your AppData folder (C:\YourUser\AppData\Roaming\WaveNode.Mqtt\config.json). This will allow you to see the configuration dialog box to re-enter your setup parameters.
If you do not see the AppData folder in your user directory, turn on View Hidden Files.
The Throttling Feature
One thing I learned quickly: WaveNode updates fast. Like, really fast. With four RF channels updating multiple times per second, you can easily flood your MQTT broker with messages.
The bridge includes throttling to prevent this. You can configure:
Minimum publish interval: Don’t publish the same topic more often than X milliseconds (default 200ms)
Minimum delta: Only publish if the value changed by at least X amount (default 0.1)
These settings are adjustable in the config file or via environment variables. For most dashboards and logging, 200ms is plenty fast. If you need real-time updates for something specific, you can reduce it.
What I’m Using It For
Node-RED Dashboard: I have gauges showing real-time SWR and power on each antenna. The reflected power calculation is particularly useful – I can see instantly if something’s wrong with an antenna just by watching the reflected watts climb. See the file node-red-flow.json in the Github project repository for a sample dashboard.
Grafana Trending: I’m working on feeding data into InfluxDB, then into Grafana. So I can have charts showing power output over time, SWR trends, etc. It will be fascinating to see how our station performs over time and in different weather conditions.
Automation Triggers: One area I’m considering is having Node-RED watch the SWR topics. If SWR goes above 2.5:1 on any antenna, it could send me a Discord notification to check out what is going on.
Technical Details
DirectMode: The bridge can ask WaveNode to send messages directly to its window instead of broadcasting. This is more efficient and reduces message clutter. It’s enabled by default.
UpdateMode: You can configure WaveNode to send all samples, only changed values, or only on request. I use “only changed values” (mode 1) to reduce unnecessary traffic.
Retained Messages: By default, MQTT messages are published with the “retain” flag. This means when a new client subscribes, it immediately gets the last value for each topic. Perfect for dashboards – they show current readings right away without waiting for the next update.
Building It Yourself
The code is simple enough that you can build it yourself if you want. It’s a .NET 8 WinForms application – just a few hundred lines of code.
Clone the repo, make sure you have .NET 8 installed, and run:
The generated .exe includes the entire .NET runtime, so you can copy it to any Windows machine without installing dependencies.
Troubleshooting Tips
If you get no MQTT output: Double-check your broker address and port. Try connecting to the broker with another MQTT client (like MQTT Explorer) to verify it’s accessible. Check the console output from the bridge for connection errors.
If the WaveNode HWND isn’t found: Make sure the WaveNode application is running and has been opened at least once. The bridge looks for it by registry key or process name. Sometimes on first run, WaveNode hasn’t created its registry entries yet.
If you’re getting too many messages: Increase the PublishMinIntervalMs value in the config. I started at 200ms, but for simple dashboards, even 500ms or 1000ms is fine.
If dashboard values look stale: This is usually because you’ve disabled the Retain flag. Keep it enabled so subscribers immediately get the latest value when they connect.
Why This Approach Works
I could have tried to reverse-engineer WaveNode’s data protocol or hack into its database files. But intercepting Windows messages is simpler, more reliable and less likely to break when WaveNode updates its software. There was some great info on the Wavenode site on how the Windows messaging worked that helped a lot in developing this solution.
The bridge is essentially invisible to WaveNode – it just listens passively and doesn’t interfere with normal operation. WaveNode doesn’t know or care that something else is reading its messages.
And by using MQTT as the output, I’m not locking myself into any particular dashboard or automation platform. Anything that speaks MQTT can consume this data.
The Results
Since deploying this bridge, my station monitoring has become much more comprehensive. Having WaveNode data integrated into my Node-RED dashboard means I can see everything going on at the station on one screen. No more program switching.
Where to Get It
The complete project is on GitHub:
https://github.com/n3bkv/WaveNode-to-MQTT
You can download the prebuilt executable from the releases, or clone and build it yourself. Everything’s open source under MIT license.
And if you make improvements or add features, pull requests are always welcome!
I just spent a frustrating morning/afternoon trying to deploy a new Raspberry Pi image for testing a script I developed. It should have been simple – flash the latest Raspberry Pi OS Lite (Trixie), configure SSH keys and hostname in the Imager, boot them up, and get to work.
Except none of my customization settings actually applied. At all.
Here’s what happened and how I fixed it.
The Problem
I was using Raspberry Pi Imager v2.0.0 to flash the latest Raspberry Pi OS Lite (64-bit) Trixie release dated 2024-11-24. I went through the OS customization dialog like I always do:
•Set a custom hostname
•Configured my SSH public key for authentication
•Set my timezone
•Configured WiFi settings
•Set my username and password
Clicked “Write,” waited for it to finish, popped the SD card into a Pi, and… nothing. The Pi booted to the initial setup wizard asking me to configure keyboard, mouse, and locale. All the customizations I’d carefully entered were completely ignored.
I tried again thinking I’d made a mistake, I tried deleting preferences, using different computers, older versions of Raspberry Pi Imager, etc. Same results. The customization settings simply weren’t being applied on first boot.
What’s Actually Broken
After some digging and finding GitHub issue #1320 on the rpi-imager repository, I learned I wasn’t alone. Multiple people are reporting the same problem specifically with:
1. SSH public key authentication – When you choose to use SSH keys instead of password auth, it seems to break the entire customization process
2. Hostname settings – Not being applied
3. Username configuration – Ignored
4. Locale settings – Timezone and keyboard layout not set
The weirdest part? If you use SSH password authentication instead of public key, everything works fine. But I don’t want to use passwords – that defeats the entire point of having SSH keys.
Apparently this is related to Raspberry Pi OS moving from their custom initialization system to cloud-init. During this transition, something broke in how the Imager’s customization settings get processed by newer Trixie images. The old custom rpi-imager stuff was stripped out in preparation for cloud-init, but cloud-init support isn’t fully implemented yet. So we’re in this awkward in-between state where neither system works properly.
The Fix: Roll Back to October 1st Release
The solution is surprisingly simple: use an older Trixie image that still has the working customization system.
Instead of using the latest image (2024-11-24) that the Imager downloads by default, manually download the October 1st, 2024 release of Trixie:
(Yes, the folder says 2025-10-02, but the image inside is dated 2024-10-01. Don’t ask me about the date confusion – it’s probably a mirror/upload timestamp thing.)
How to Use the Older Image
Option 1: Use Custom Image in Imager
1. Download the October 1st image from the link above
2. Open Raspberry Pi Imager
3. Click “Choose OS”
4. Scroll to the bottom and select “Use custom”
5. Point it to your downloaded image file
6. Configure your customization settings as normal
7. Write to your SD card
Your settings will actually apply this time.
Option 2: Direct Download and Flash
If you’re comfortable with command-line tools or other imaging software:
Then manually configure your settings by editing files in the boot partition before first boot, if you prefer that approach.What I Actually Did
I downloaded the October 1st image, used it as a custom image in Raspberry Pi Imager v2.0.0, and configured all my settings:
• Hostname: testpi
• SSH: Public key authentication (copied my Ed25519 public key)
• Username: My standard deployment username
• WiFi: My network credentials
• Locale: America/Los_Angeles timezone, US keyboard
Wrote it to the SD card, popped it in the Pi, powered it up, and… it worked. All settings applied correctly. The Pi booted directly to a configured system, SSH was enabled with my key, hostname was set, everything was ready to go.
This is how it’s supposed to work.
What About Updates?
You might be wondering: “If I use an older image, won’t I be out of date?”
Not really. Once the Pi boots and you can SSH in, just run:
sudo apt update
sudo apt upgrade -y
This brings the system completely up to date with the latest packages, including kernel updates. You’ll end up at the same patch level as the November image, but with working customization.
The October 1st image is only about a month older. It’s not like we’re using something from last year.Why This Matters for My Setup
I’m deploying multiple Raspberry Pis for testing and infrastructure builds. Each one needs:
• A unique hostname for DNS
• SSH key authentication only (no passwords)
• Proper timezone settings for logging
• Automated deployment without manual intervention
When the customization doesn’t work, I have to:
1. Boot the Pi with a monitor and keyboard attached
2. Go through the setup wizard manually
3. Enable SSH
4. Add my public key to authorized_keys
5. Configure hostname
6. Set timezone
Multiply that by five or six Pis and it’s an entire afternoon wasted on manual configuration that should have been automated.
With the October 1st image, I can flash all the cards in advance, configure them all identically (except for hostnames), and then deploy them to their locations. When they boot up, they’re ready to go. This is especially important for remote deployments where I don’t have easy physical access.
The Bigger Picture
This is a great example of why I always keep older, known-working images around. When new releases come out, I don’t immediately trash the old ones. I test the new release first and if something’s broken, I roll back.
It’s also why I’m a bit wary of major OS transitions. The move from Bookworm to Trixie is generally solid, but this customization issue shows that complex migrations (like moving to cloud-init) can introduce unexpected breakage.
I’m looking forward to proper cloud-init support. Cloud-init is the standard for automated cloud instance provisioning, and having it on Raspberry Pi OS will be great for automated deployments. But right now, we’re in the transition period where the old system is partially removed and the new system isn’t fully implemented.
When Will This Be Fixed?
According to the GitHub issue, the Raspberry Pi team is aware of this and is working on proper cloud-init support. Once that’s fully implemented and tested, the Imager customization should work reliably again.
Until then, the October 1st image is your friend.Other Reports
The GitHub issue (#1320) has multiple people confirming this problem:
• Settings completely ignored when public key SSH is selected
• Initial setup wizard appearing when it shouldn’t
• Hostnames reverting to default
• Locale settings not applied
It’s not just me. This is a real, reproducible bug affecting the latest Trixie release when used with Raspberry Pi Imager v2.0.0.
Some people also report issues with the Imager itself, where certain combinations of settings cause failures. The SSH public key authentication option seems to be the main trigger – if you use password auth instead, things mostly work. But that’s a workaround, not a solution.
My Recommendation
Until this gets fixed in a newer Trixie release:
1. Download the October 1st Trixie image and keep it locally
2. Use it as a custom image in Raspberry Pi Imager for any new deployments
3. Configure your customization settings as normal – they’ll actually work
4. After first boot, run apt update/upgrade to get current packages
This gives you a working, up-to-date system without the hassle of manual configuration.
And if you’re doing any kind of automated or remote deployment where you can’t easily fix configuration issues after the fact, this is even more critical. Don’t trust the latest image right now – use the October 1st release.
Hopefully this saves someone else the morning/afternoon I lost figuring this out. When the Raspberry Pi Imager’s customization settings mysteriously stop working, it’s not you – it’s a known bug with the latest Trixie release. Roll back to October 1st and you’ll be fine.
73
P.S. – If you’re reading this months from now, check if there’s a newer Trixie release available. The cloud-init implementation might be finished by then, and newer images should work properly. But for now, October 1st is the way to go.
I always thought it would be good to have information resources on my computer that aren’t internet dependent. What if I’m out in the field doing a POTA and need a reference manual or some medical information? Or my cable modem goes out and I really need to look up an old club newsletter from 2016?
Kiwix is an app for offline reading on the go, remote areas, emergencies, or independent knowledge access. It is a program you can install on your Raspberry Pi, Windows or Mac computer that gives you offline access to resources like Wikipedia, TED, Stack Exchange, or your favorite website (via Zimit) so you can have a library of manuals or other reference materials specific to your needs.
Let’s install Kiwix – to download the program go to https://kiwix.org/en/applications/
Pick the correct version for your computer and install the program.
Upon starting the program and choosing Categories you will see a list of databases you can download, including the entire Wikipedia (110GB with pictures), Urban Prepper, MDWiki Medical Encyclopedia, and more. All great info to have out in the field and off grid.
Let’s look for some Amateur Radio content – I searched all the categories and found a database in StackExchange and then searched for “radio”.
Now I see that it has 8K articles and is only 68MB to download.
If I click on it, I can get more information and an option to download it.
After downloading it, click the option to open the main page.
Now you can scroll through the article entries.
Or search a topic with the search bar, choosing the database(s) you want to search in.
Then you can click on the articles that interest you.
I think all that is cool, but here’s where things can get interesting. You can also download entire websites to have them at you fingertips by using Zimit (https://zimit.kiwix.org/).
Fill in the website and your email. The reason why they need your email is if you close the window you’ll lose the download link. They will send you a link so you can access the file for a week. You can even build your own Zim server, if you want to do everything yourself.
Then click the advanced options button and enter a title and description for future reference to the database. If you want to download everything on the site, under Scope Type, chose any. Files can get big, so be careful which option you pick. Then click Let’s ZIM it!
You might have to wait a while until a slot opens up on the website download server, but then it will start capturing the site.
Once a slot opens up it will begin downloading the site.
Once it is complete – open the .zim file you downloaded in Kiwix.
Next, select it and then press Open Main Page.
Now you will see the site in the Kiwix window and you just click on links like you would normally do in a web browser but everything is local to your computer.
That’s all there is to it. I found some sites online with equipment manuals and have used Zimit to download them so I can have them on my computer. It is great to have a full manual set when you are out in the field
I had a big problem with my blog. Since it’s hosted on Blogger, there were issues with Google and Bing indexing it. I must have spent nearly two weeks trying to figure out why search engines were having trouble with redirects and couldn’t index the site. After some research, I found out this is a common problem with Blogger.
So, I decided it was time to set up my own web server. That way, I’d have full control over everything—from which content management system and plug-ins I use to how the site is hosted. I had a spare Raspberry Pi sitting around that I could use, since my site doesn’t get a lot of traffic. All I needed was a static, internet-addressable IP address. But those are generally hard to come by without an expensive business-class internet connection.
As hams, we have access to millions of IPs for free, thanks to some forward-thinking operators from the 1980s via 44Net. Here’s a link to an article and a short video on the history of 44Net:
What I needed was an internet-routable 44.x IP so my web server could appear on that IP on the public internet. Most home internet service providers (ISPs) don’t allow this kind of setup, so I needed a way to route my traffic through someone who could provide internet connectivity for my 44Net IP.
Enter 44Net Cloud. It lets you create a Virtual Private Network (VPN) tunnel from your computer to the 44Net Cloud, and they route your traffic to the internet. There’s a bit of latency, so it’s not ideal for radio traffic, but for websites or file sharing with your club (e.g., using Nextcloud – https://nextcloud.com/), it’s a great solution.
If you want to put entire networks on 44Net, check out this YouTube video from the 2018 TAPR Conference:
Here’s a diagram of what we’re building.
So, let’s walk through step-by-step how to make your Amateur Radio applications available on the internet via a Raspberry Pi in your shack.
Important Notes
Security:
Your computer will be fully exposed to the internet, so make sure it’s hardened and isolated from your home network. You’re currently protected by your ISP and your Mac/Windows firewall, but once online, you’ll need additional protection. I recommend putting your Pi on a separate guest network and following the hardening instructions below.
Never use the default Raspberry Pi password, and see my post on “Using SSH Keys on Your Pi” for a more secure way to protect your system than passwords.
44Net IPs are strictly for amateur/non-commercial use. You’ll agree to this when you accept the terms and conditions on the 44Net Portal. It’s essential that we all respect this rule, as these are valuable community resources that we don’t want to lose.
Step 1 – Set Up Your 44Net Account
Start by creating an account on the main 44Net portal. Follow the instructions here:
https://wiki.ampr.org/wiki/GetStarted
Just complete steps 1–3 for now.
Once your account is set up, go to the 44Net Cloud portal and register at https://dashboard.44net.cloud/.
Step 2 – Create Your Tunnel
After logging in, click “Create.” Then pick the interface closest to your location.
You’ll then see a screen like the one below. We’ll fill it out shortly.
Step 3 – Set Up WireGuard on Your Raspberry Pi
Now go to your Raspberry Pi so you can install WireGuard for your tunnel and generate your public key.
Login to your Pi (see my post on How to Set Up Your Own Remote Station – https://hamradiohacks.blogspot.com/2025/09/how-to-set-up-your-own-remote-station.html for how to set up and access your Pi) and run the following commands:
Private key: Yxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx= Public key: +xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx=
Make sure to copy these keys to a safe location.
Step 4 – Register Your Key
Now go back to the 44Net Cloud dashboard on your main computer, paste in your public key, and name your tunnel. Click Add.
On the next screen, copy everything you see in the configuration box. You should still be seeing the text below on you Pi since this is where we left off.
>> Copy the PUBLIC key and paste it into the PUBLIC key prompt on your 44net Cloud tunnel prompt.Press Enter to continue…
Enter interface name to create (default: wg0):
Return to your Raspberry Pi, Press Enter twice and then paste the info you copied from the config section into the script prompt.
Then type EOF, and hit Enter again.
You’ll see a confirmation message—press Y and Enter. Next you’ll see:
==== 6) Bringing interface up: wg-quick up wg0 ====
You’re now connected to 44Net!
Step 5 – Enable Auto-Start and Security
If you want your Pi to reconnect automatically at boot, choose Y when prompted:
Enable auto-start at boot for wg0? [Y/n]
Next, you’ll harden your Pi by installing a firewall:
Install and enable UFW firewall (recommended)? [Y/n]
Choose Y, then open ports 80 and 443 for your web server:
Open web server ports 80 and 443 (recommended if you host a web server)? [Y/n]
If you’re hosting a web server, press Y. Otherwise, the firewall will block all ports except SSH (22), so you can still log in for configuration.
Example output:
To Action From
— —— —-
22/tcp ALLOW IN Anywhere
80/tcp ALLOW IN Anywhere
443/tcp ALLOW IN Anywhere
22/tcp (v6) ALLOW IN Anywhere (v6)
80/tcp (v6) ALLOW IN Anywhere (v6)
443/tcp (v6) ALLOW IN Anywhere (v6)
Finally, enable Fail2Ban for basic SSH protection:
Install and enable fail2ban for basic SSH protection? [Y/n]
Press Y and Enter. Fail2Ban helps block repeated failed login attempts and adds another layer of security.
==== All done! ====
That’s it—you’re done! You now have an internet-routable Raspberry Pi ready for all your ham radio applications.
73
Cookie Consent
We use cookies to improve your experience on our site. By using our site, you consent to cookies.
Contains information related to marketing campaigns of the user. These are shared with Google AdWords / Google Ads when the Google Ads and Google Analytics accounts are linked together.
90 days
__utma
ID used to identify users and sessions
2 years after last activity
__utmt
Used to monitor number of Google Analytics server requests
10 minutes
__utmb
Used to distinguish new sessions and visits. This cookie is set when the GA.js javascript library is loaded and there is no existing __utmb cookie. The cookie is updated every time data is sent to the Google Analytics server.
30 minutes after last activity
__utmc
Used only with old Urchin versions of Google Analytics and not with GA.js. Was used to distinguish between new sessions and visits at the end of a session.
End of session (browser)
__utmz
Contains information about the traffic source or campaign that directed user to the website. The cookie is set when the GA.js javascript is loaded and updated when data is sent to the Google Anaytics server
6 months after last activity
__utmv
Contains custom information set by the web developer via the _setCustomVar method in Google Analytics. This cookie is updated every time new data is sent to the Google Analytics server.
2 years after last activity
__utmx
Used to determine whether a user is included in an A / B or Multivariate test.
18 months
_ga
ID used to identify users
2 years
_gali
Used by Google Analytics to determine which links on a page are being clicked
30 seconds
_ga_
ID used to identify users
2 years
_gid
ID used to identify users for 24 hours after last activity
24 hours
_gat
Used to monitor number of Google Analytics server requests when using Google Tag Manager
1 minute
Marketing cookies are used to follow visitors to websites. The intention is to show ads that are relevant and engaging to the individual user.