The only thing that's changed is that the patents on the underlying technology have expired.
People can now use and further develop the technology without paying a royalty so the developer (the Fraunhofer Institute) Fraunhofer desperately wants people to move to a newer (patented) technology so they can get back their cash spigot.
MP3 isn't going away anytime soon.
Since this post involves hacking the EAS system I'd like to point out that someone set off all 156 tornado sirens in Dallas at midnight on the 8th of April.
http://hackaday.com/2017/04/12/every-tornado-siren-in-dallas-hacked/
OSX Snow Leopard counts in base 10 instead of base 2; this is why it looks like 16 GB whereas in reality it'd be a bit less (counting in 1000s vs 1024s).
Edit: Apparently, counting in 1000s is the right way to go for disk space in KB, MB, GB, etc. Windows displays them in 1024s, which is supposed to be KiB, MiB, GiB, etc. TIL.
Relevant xkcd
https://xkcd.com/350
And somebody actually made it
http://hackaday.com/2014/06/28/xkcds-virus-aquarium-made-real/
But the aquarium website doesn't reply
Or you can dowload this one
http://www.viruszoo.com/about
Look into Intel's Management Engine
The government has their fingers in it at the basest levels, the discussion should've happened after Snowden revealed the NSA's mass collection.
I designed a headband with a motion detector that is sensitive enough to pick up the heartbeat and can thus easily detect rapid eye movements. And I wrote a program that records my sleep each night and plays an audio track when it detects that I am dreaming. I post the raw logs along with a printout of the most interesting minute in the recording to the Lucid Scribe Project every other day.
Furthermore, I have been training myself to blink in Morse Code patterns that my device can decode in hope that I can communicate live from within a dream one day: http://hackaday.com/2012/06/20/communicating-from-inside-your-dreams/.
One way to achieve laminar flow is to get rid of as much turbulence as possible by way of smaller parallel paths. Think of a bundle of straws as one way to achieve this.
After some light googling I found this hackaday blog post
Hackaday seems to think this is a scam. Or, at least, being developed by people that don't know what they're doing.
saw it on hackaday last year. Yea it exists.
EDIT. Thanks /u/One_In_The_Pink For finding the link. I was too lazy to do so. http://hackaday.com/2011/11/18/kitchen-hacks-microwave-plays-youtube-videos-matched-to-your-cooking-time/
By the way, here is the original project, Hackaday Prize (not yet finished) semi-finalist, and based on the Adafruit onionPi : http://hackaday.com/2014/09/06/secure-your-internets-with-web-security-everywhere/
There are many obvious similarities and anonabox are even using almost the same sentences I'm using for my HaD project, same arguments.
The anonabox campaign started one day before the contest judging, and his website has been registered on 18 of september, (after I released the project details). This is a very aggressive move and everyone should be carefull about this campaign.
Microwave that plays a YouTube video that matches your cooking time.
And a fridge with an ice dispenser.
List of online retailers for adaptive game controllers
Also The AbleGamers Charity is located in West Virginia.
And take a look at this Hackaday article on custom game controllers which probably has even more resources.
I can confirm that /u/scottpid was there.
To summarize a rather long story:
I was boiling sulfuric acid to remove the packaging of some integrated circuits. I accidentally set the hotplate to the wrong setting and the sulfuric acid ended up violently boiling over and splashing out of the beaker it was contained in. A not so insignificant quantity of acid splashed onto a nearby wooden table.
Unfortunately, many organic materials are decomposed by acid and this is exactly what happened when the acid splashed onto the wooden table. This horrible black smoke gushed from the decomposing table and set off a nearby fire alarm (smoke was caused by acid reaction, not fire).
The entire building was evacuated when the fire alarm was set off. When the fire department arrived they called the HAZMAT team to deal with the spill. The HAZMAT team went in to check out the spill and basically came back and just said "ok, it's safe to reenter the building. We will leave cleanup to you", and then left.
The faculty member who commented on the pie chart was unfortunately the one that had to deal with all the paperwork afterwards. I thought he would appreciate the humour. This is a really short summary that leaves out a lot of details, many of which incriminate me even more ಠ_ಠ
this was on hackaday last week - they dropped one by nullspace labs.
one of the nullspace folks also made a blog entry about it:
http://charliex2.wordpress.com/2011/03/23/redbull-marketing-whats-the-latest-craze-campaign/
their consensus seemed to be that it was somewhat lame.
They would custom make it more than likely. I assume the black liquid is oil based and has some type of magnetic metal dust in it, and there's a mechanism in the back with magnets that line up to become the numbers.
This is just my assumption though.
Edit: Looked it up, apparently you can buy one for $8,300.
Forget the KVM or remote Android, you don't need a Kickstarter, you just need a programmable keyboard emulator (you can make one from an Arduino board) and a script that clocks in and out. Make sure you vary the times randomly, just by a minute or two at most.
> "aren't you going to do something about that?"
be sure to bring a 90000 lumens flashlight next time: http://hackaday.com/2015/11/27/90000-lumen-flashlight-is-illuminating-impractical-and-blindingly-good/
If you are really looking at good volume, it may be worth buying/using a 3d printer and just doing a custom case from scratch as opposed to modification (that I assume you do - the blog post is down... reddit hug of death)
for the comment that was deleted:
the stingray is actually spoofing a cell phone tower, forcing ALL cell phones in the area to connect to it before they pass your signal along to a real phone tower. Then they can track your movement and listen into your conversation. There is a reason why police need warrants to even look at phone records, and with this they are intercepting everyone's communications. Rather than being targeted (think of police obtaining a warrant to bug one person's phone) - they are getting everyone's information with abandon.
Tech enthusiasts and hackers are definitely NOT doing this - it takes a lot of technology (sometimes in the $100,000 dollar range) - and would be very illegal...
read more on hackaday
You used the worst fucking example.
The guy built that desk himself: Link And I think it's safe to say he's old enough to afford everything without his parent's help.
Another option is using something like this.
http://hackaday.com/2014/01/16/build-a-cheap-airplane-ads-b-radio-receiving-tracking-station/
Also, check with local airports for flightplans where the pilot passes over your house. It's worth a shot
source by /u/prongs95
http://hackaday.com/2014/04/01/e-waste-quadcopter-lifts-your-spirits-while-keeping-costs-down/
Using the old Steve Wozniak trick, I see!
Start by understanding what is happening here ...
https://www.youtube.com/watch?v=jQhqKsd6e54
http://hackaday.com/2008/11/25/how-to-read-a-fedex-kinkos-smart-card-sle4442/
http://dangerousprototypes.com/docs/SLE4442_(FedEx_Kinko's)_smart_card_update
I rolled my own - a headband with a motion detector that is sensitive enough to pick up the heartbeat and can thus easily detect rapid eye movements: http://imgur.com/P7ugs (the halograph next to my watch that only works when I am dreaming).
And I wrote a program that records my sleep each night and plays an audio track when it detects that I am dreaming.
Furthermore, I have been training myself to blink in Morse Code patterns that my device can decode in hope that I can communicate live from within a dream one day: http://hackaday.com/2012/06/20/communicating-from-inside-your-dreams/.
Aside from the hacking, I have found that the greatest variable is how much time and effort I spend focusing on awareness during the day. As in, right now, you are probably not aware of your breathing, blinking, heartbeat, temperature, the background sounds or movements in your peripheral vision. But if you focused on those things you could be. You can only do it for a minute at a time at first and it takes years of practice, so get cracking!
Let me save you 5 minutes of your life:
Chinese market Fluke 12E+
Alternatives: 15B & 17B
Found this while confirming the model number
http://hackaday.com/2016/06/07/hacking-a-fluke-multimeter-hertz-so-good/
This has been around for a while... you can even re-flash your arduino over Wi-Fi.
Heck, you can just run Arduino code directly on the ESP...
It was bullshit, a con. It was proven by multiple sources (I recommend Hackaday) that it can't be accomplished in a package as small as this. There were some big inconsistencies in their videos and specs that didn't get explained so they were shut down.
Also, just because they got the money doesn't mean shit - people without engineering know how can be fooled more easily, especially if the marketing is good. I mean, look at those balance bracelets or whatever they're called.
edit: http://drop-kicker.com/ was linked from the Hackaday page I mentioned above and they seem to do a good job at debunking shitty projects.
The guy that built this needed native Mac hardware for software testing, and his company required that he followed the EULA.
Here's his explanation: http://hackaday.com/2012/12/09/160-mac-minis-one-rack/#comment-900394
Funnily enough some cheap unamanged ones actually are managed, presumably because silicon is so cheap there is no point making separate chipset for unmanaged one
Wozniak used to carry sheets around in little perforated booklets he had bound together professionally. He may still, but he used to too.
http://hackaday.com/2012/08/03/woz-prints-and-spend-his-own-2-bills/
A suggestion. When doing work with AC use just one hand. I learned this from a mentor when I was a kid. He had me sit on one hand for most operations (when possible).
The logic is that the higher amperage stuff can't travel through both hands and pass through the heart. What ends up happening is it just reminds you to be much more mindful of what you're doing. I don't always do it now, I do a lot of house wiring, but I think that training made me much more aware of what I'm doing.
EDIT: Relevant hack a day post
Thermite data destruction charge, just in case of emergencies.. Just make sure you have concrete barriers. Like on Hack-a-day http://hackaday.com/2008/09/16/how-to-thermite-based-hard-drive-anti-forensic-destruction/
Effectively, a lot of people posted stuff to thingiverse and other places that improve 3D printing and how the Makerbot functions. Makerbot gets bought and yanks a bunch of stuff that people posted and patents it.
http://hackaday.com/2014/05/24/makerbot-files-patents-internet-goes-crazy/
Now they are asking for forgiveness because profits are down.
You can also make your own version of it with silicone caulking and corn starch. The homemade version has slightly different properties, but it's a reasonable substitute in some cases.
Looks like they used radio frequencies vs. a good ol' fashioned system hack. The "hack" actually exposed the vulnerability & now they're using some sort of encryption to prevent it from happening again.
from OP's source:
During the kickstarter campaign a few months ago it became clear that they were lying about having working prototypes of their device. They produced a fake video.
http://hackaday.com/2014/09/04/scribble-and-the-failings-of-tech-journalism/
Not disputing that planned obsolescence doesn't exist, but some of the examples mentioned are arguable. XP has had a long enough run that it probably qualifies as plain old regular obsolescence. Lithium-ion batteries wear out over time, it can't be helped due to the chemistry involved. Replacing old components is only expensive if you take it to the manufacturer for service, and they probably charge the extra for labour, doing it yourself is pretty cheap.
Just to reinforce that planned obsolescence does actually exist, there's a particularly infuriating example that's pretty common and still on-going: printers. Some printers are programmed to stop printing after a certain number of pages. There are ink cartridges with similar functionality that deliberately makes you waste ink. A printer company even had the gall to sue people for trying to circumvent these practices.
That said, I don't think planned obsolescence applies to game console's shorter lifespans. Increased complexity is a perfectly acceptable explanation.
TL:DR there was an internal breakup after claims of a betrayal, both sides formed groups claiming to be The Real Arduino, and one side was forced to trade as Genuino in Europe for a while because of a trademark issue. As a result the two sides spent a year or two trying to sue each other and badger suppliers into only using their products instead of making things the community wanted. Meanwhile the ESP8266 became hugely popular while the Arduinos were too busy bickering to do much about it
There's a longer writeup of it here, but eventually they came back together and said they've worked things out.
You shouldn't use clock speeds as measurement. GFlops is a more accurate measurement.
Nintendo DS has 0.6 GFlops (600 MFlops) of power (source: http://kyokojap.myweb.hinet.net/gpu_gflops) whereas Raspberry Pi B + has 41 MFlops* (source: http://hackaday.com/2015/02/05/benchmarking-the-raspberry-pi-2).
One can still probably emulate it there, keep an eye on new DS emulation projects popping up, specially Medusa and MelonDS if you can't get Drastic to work*
From the thumbnail it looks like the Orange Pi 2G IOT, which uses 2G connections for cellular. As such, this device may not work in countries where 2G is being phased out.
Making a diode at home is easy, I started when I was 12 or 13 years old, using natural galena crystals.
Diodes that emit visible light aren't as easy to make, but there seems to be people who make them.
According to this hackaday post, "USB and Ethernet is still handled by the LAN9514 USB/Ethernet controller."
So, yes. Sorry to be the bearer of bad news.
Steve Wozniac plays jokes on people with $2 bills. He buys sheets of them and then has them bound into pads with perforations. He'll peel off a few to pay for stuff and has tons of stories, including interactions with the Secret Service Counterfeit Agents. http://hackaday.com/2012/08/03/woz-prints-and-spend-his-own-2-bills/
http://hackaday.com/2015/11/10/your-unhashable-fingerprints-secure-nothing/
To copy the slashdot summary of the article:
> Fingerprints aren't terribly secure; you leave them on almost everything you touch. Many people won't realize that fingerprints can be captured and reproduced from casual photographs. It's actually worse than that. The very method with which fingerprints are stored is much weaker than passwords. Fingerprints cannot be hashed. By their very nature, each read of your fingerprint will be a little different, which breaks the hashing method. They can only be stored using encryption, which requires the same master password each time a new print read is compared to the stored key — a much weaker method than salted hashes. This more easily opens fingerprint credentials up to theft and brute forcing.
Yes, I'm aware that he's talking about the gyro within a mobile phone. I found this article which mentions 72% accuracy but only on 10key. If someone found a way to get 80% accuracy on qwerty I'd be interested to read about it.
No phone is secure. Every phone can be backdoored trivially (c.f. using a stingray device.)
Quoting this (old) comment: http://hackaday.com/2014/08/27/defcon-blackphone/#comment-1759512
>A device driver has full access to the hardware and nobody but whom has its sources (Google) can control it. This means it reads your text, copies your photos, reads your storage memory and listens to your communications before they are being encrypted no strong algorithm or long password would help. Also, every sniffer/debugger that comes as an app runs at a lower privilege and will likely never see its traffic, so no way to block it, not even be aware of its existence.
>The above can be applied to every operating system out there, including those on home PCs, notebooks, tablets etc. You choose strong passwords and encrypt all your disks, then a small binary blob required to make a card work intercepts all your passwords while you type them, reads all your storage and does whatever it’s progammed to. We’re talking about a device driver: full access to the hardware, full privileges and zero control by the user; if there’s a place to hide spyware code, there it is. Being 100% secure requires a 100% trustworthy platform, that unfortunately is not possible if a closed source driver can contain code that does the above. So we need to push to obtain open hardware and open drivers. Today this is 100% impossible, most hardware is closed, but spreading the awareness of the importance of being open at hardware level can help to change things tomorrow either by pushing manufacturers into opening their hardware or by building a critical mass of developers and backers for commercial availability of open hardware solutions in that field.
>Until that day, I’m sorry but no phone is secure.
Paging /u/y45y564 . As open-source as it realistically can get. I've been following "pure open-source" GSM stack developments popping up here and there.
To sum up - it's hard. The open-source GSM part is just so hella hard that there still aren't any open-hardware blobless GSM modules - none of the Wiki-listed "open hardware phones" are nearly as open as you suggest (and my project is better than many of them in other ways). It's like developing your own Bluetooth peripheral full from scratch (Bluetooth specification is thousands of pages for one revision), just much harder, with the RF and programming skills necessary. It's just not possible at this point, it's millions of $ and thousands of manhours for the big companies with brilliant engineers, and I can only look in astonishment on what Osmocom is trying to achieve.
However, what I can do is a platform you can use with any GSM module with a datasheet - no matter the openness. Once we have an open-source GSM module, it'll fit right in. Moreover, it's not going to work without a platform like that. So, while I'm not developing an open-source GSM module (that'd be crazy), I'm developing an ecosystem that's willing to accept those - and if you follow the technology trends, the ecosystem is what actually matters and makes impossible things possible.
Meanwhile, I just got news that we're one step closer for Raspberry Pi to be deblobed and become closer to "pure open-source" - and that's big news, especially for this project,
Lenovo Caught (3rd Time) Pre-Installing Spyware on its Laptops
http://thehackernews.com/2015/09/lenovo-laptop-virus.html
Lenovo Shipped Pc’s With Spyware That Breaks Https
http://hackaday.com/2015/02/19/lenovo-shipped-pcs-with-spyware-that-breaks-https/
HP caught red-handed installing secret backdoors into their enterprise storage products
I watched a video of a story he told, where he bought uncut sheets of actual money (from the treasury directly), then cut them into 1 x 4 (or so) tall sheets, perforated them, and had them binded into a sort of money-bill-book. then he would go to stores, rip off a bill, and try to pay with them. naturally, the people at the store would think they are fake... so Woz would wait for the cops to show up, show the cops that they are actually legal tender just in a different form factor, have a giggle, then get on with his day.
edit: source.
> deauth packets
Apparently
http://hackaday.com/2011/10/04/wifi-jamming-via-deauthentication-packets/
And there is a solution (Ylearn user post)
http://security.stackexchange.com/questions/20219/preventing-deauthentication-attacks
Actually, radiation will also register on a silicon sensor when it hits it, just like light does. See for example this: http://hackaday.com/2012/01/15/turn-your-camera-phone-into-a-geiger-counter/
EDIT: Source: Master's degree in silicon pixel sensors for high energy physics. We were testing them using 120 GeV/c pions from SPS, one of the smaller CERN accelerators. The sensors are today installed in ATLAS, about 20mm from the collission point. Such sensors is how we can track the particles coming out of the collission process, as illustrated in these events: http://atlasexperiment.org/photos/events-collision-proton.html
You are already trusting Intel/AMD, though.
> Five or so years ago, Intel rolled out something horrible. Intel’s Management Engine (ME) is a completely separate computing environment running on Intel chipsets that has access to everything. The ME has network access, access to the host operating system, memory, and cryptography engine. The ME can be used remotely even if the PC is powered off. If that sounds scary, it gets even worse: no one knows what the ME is doing, and we can’t even look at the code. When — not ‘if’ — the ME is finally cracked open, every computer running on a recent Intel chip will have a huge security and privacy issue. Intel’s Management Engine is the single most dangerous piece of computer hardware ever created.
http://hackaday.com/2016/11/28/neutralizing-intels-management-engine/
(AMD has something similar)
This response REALLY depends on what you're trying to do with the SDR. There are lots of uses where directional dishes come in handy. I'm desperately watching for any deals in my area! Edit to add second example.
I don't know. But the crowdfunding page for Open-V, an open source microcontroller that runs RISC-V, says they are in testing phase, --even though it didn't meet the funding goal. (more about this microcontroler here)
There's a project called (Icestorm) that reverse engineered some FPGA so that at least you don't need proprietary synthesis tools. Not sure what they can run.
The situation for free hardware today is perhaps analogous to what free software was in the end of 80s. Very promising, and some parts are available to varying degrees of completion, but I don't know of a fully free system to date.
You are just experiencing a normal part of becoming an adult. Most people that reach their fourties realise that you can make your dream come trough and still not be more happy than the next guy. Perhaps you are just experiencing it a bit sooner.
So ultimately you start to find a better balance between work and play and live a happier life.
Furthermore if you are a technical curious person you also need to find a new career about every 10 years to prevent burnout. What about robotics and electronics. There are some really exciting things going on there right now.
Inspiration: http://hackaday.com/ & http://blog.makezine.com/
Their claim is that they are using supercapacitors as batteries. You charge this device in 5 min , which in turn can charge your phone later. Supercaps are indeed can be charged fast , and discharged fast.
But supercaps capacity is small. Quoting this Hackaday article about "WILL SUPERCAPACITORS EVER REPLACE BATTERIES?", "energy per unit volume, supercapacitors are also far behind at 15 Wh/L, and 1200 Wh/L for batteries." They claim they made "The ZEUS makes the supercapacitors and lithium-ion cells work together dynamically." , im curious about what they mean by that.
AFAIK, there was a project like this a while ago where the VMs would have screenshots taken every ~5 minutes, but I'm blanking on the URL. It was like wecanhazthe.technology or something.
Edit: found it: http://hackaday.com/2014/06/28/xkcds-virus-aquarium-made-real/
"Cobalt-60 has a half-life of 5.26 years, which means that steel is getting less and less radioactive on its own (Cobalt-60 from 1945 would now be at .008% of original levels). The newer BOS technique exposes the steel to fewer impurities from the air, too. Eventually the need for special low background steel will be just a memory."
Source: http://hackaday.com/2017/03/27/low-background-steel-so-hot-right-now/
Hopefully no country starts a war with nukes
http://hackaday.com/2016/08/31/working-for-elon-musk/
I don't get the impression he expects any more from his employees than he expects from himself, but I don't get the impression he's got employees who want to work there for their whole career. It's not sustainable.
Steve Wozniak actually goes to the US mint and buys uncut sheets of 2-dollar bills, then gets them perforated and makes notepads out of them. So he tears 2-dollar bills off of his notepad to pay for stuff, and nobody knows what the fuck to do with them.
I guess the lesson here is that you can have a lot more fun fucking with drive-through workers if you're stupidly rich.
edit: yes, it's true.
Yes.
The concept you are looking for is gain, measured in decibles.
Http://en.wikipedia.org/wiki/Antenna_gain
In essence, a simple antenna (think a wire sticking straight up) transmits and receives in a circle. This is a simplification of how the real world works, but an OK one.
By changing the shape of the antenna, you can in essence focus it, meaning it receives or transmits less well in some directions and better in other directions.
Antenna design is a) Insane and b) powered through the consumption of human souls. It also works amazingly. Don't let the math scare you away, just go online and look for directional wifi, or if you want learn more about antennas in general go to someplace like dxengineering.com or hamradiooutlet.com to start looking at antennas.
Finally, find and go to your local ham radio club. They are filled with people who love radio in general, and have learned a lot about antennas, laws, and doing things you didn't think possible.
See http://hackaday.com/2016/07/02/ham-radio-wifi for example of directional antenna hacked into a low power wifi device.
Best stories I've heard about are hams using 1500 watt transmitters and directional antennas to set up data links (not wifi, different frequency and hardware but same concept) over very long ranges.
Edit: found another better example of antenna gain, transmit power, and laws:
http://hak5.org/episodes/hak5-1515
Enjoy! You can end up doing crazy things: build an effective 60 watt wifi transmitter, aim it at a skyscraper or mountain, and reflect the beam into a place you cant see into (a valley for example).
My race car runs on an engine compluter I've implemented from scratch. From http://hackaday.com/2014/01/01/building-an-engine-control-unit-with-the-stm32f4/ to http://rusefi.com/images/Frankenso/frankenso_0_4_assembled_front.jpg
Fingerprints, no matter what platform, are not all that secure. Fingerprints can be reproduced from photographs and they can't be stored the same way you would store a password. Personally, I wouldn't get into this discussion as fingerprints are insecure to begin with. Additionally I would not use the fingerprint scanner for authenticating apps. Especially banking.
I used to fly on JSTARS which has the capability to image the ground (fucking poorly, but still) with radar from very far away. We could barely even make out buildings, but it could still do it. Those images (called Synthetic Aperture Radar) contain shadows like this. The reason is because it is taken from an angle, and then processed to display as if being viewed from directly above. The shadows are just spots where the sonar is blocked by the wreck from reaching the ground. This sort of imaging is really cool, but takes a long time to process and is usually very low quality. We used to take shots of our own airfield to calibrate the radar and it would take 10-20 shots just to get one that was good enough quality to identify our parking ramp. This article has a few examples of really high quality SAR shots that have shadows.
Basically, you're right. The pictures were taken from an offset angle, but then processed by the imaging software to be displayed as they look from above, hence the shadows.
I hope that helps lol, sorta rambled.
Nothing http://arduino.cc/en/Main/ArduinoBoardZero . Arduino.org is the site from the italian factory that manufactures the official arduino boards. They don't actually hold any copyright to the name hence: http://hackaday.com/2015/02/25/arduino-v-arduino/
Since he's setting bytes by arranging things in the level/spawning sprites, I'm guessing he's loading values to be executed as code into the SNES' ~~zero page/work ram~~ Object Attribute Memory. Since it's executed with the Item Swap glitch, I'd guess the process is started from going out of bounds on a jump table.
Edit: Hackaday has a post about it that's a little more specific - the data executed as code is in the sprite X-coordinate table (I know on the GBA there's memory specifically reserved for the object attribute table, I'm not sure if that's the case on the SNES. Edit 2: It is ). It links a TASvideos post explaining the low-level details of the Item Swap Glitch.
Edit++: To clarify, it's not a buffer overflow. A buffer overflow does a write out of bounds on some piece of data, putting data in a code segment by overwriting another function. This, on the other hand, is causing a read from an invalid location on a jump table, causing data in a data segment to be read as code. They do have the similarity of usually being caused by an out-of-bounds access on a list (but for this, the invalid location could also be in the middle of the list).
Caleb! Thanks for the compliment! For those that don't know, Caleb Kraft was our Senior Editor for several years and is ~~not~~ now the Community Editor for MAKE.
I have no idea what we're going to do for the International Day of hacking. But I have the email you sent me about it starred in my overflowing inbox. I show August 11th but I don't have a source (other than a 2012 Hackaday post for it). Do you have a link to more info?
Currently I'm trying to nail down plans for the Hackaday 10th Anniversary which will happen sometime between the beginning of September and October. But once plans are underway for that we'll figure something out for Hack Day.
EDIT: changed "not" to "now"... hehe!
Hijacking top comment to post this: http://hackaday.com/2016/11/28/neutralizing-intels-management-engine/
Management Engine is a known worry in the IS community. When, not if, it gets cracked, prepare for the computer apocalypse.
Because home routers are so hard to hack....
https://www.exploit-db.com/docs/252.pdf
http://hackaday.com/2015/12/29/32c3-beyond-your-cable-modem/
I hate when people bring up the evil intel agency as an adversary you can't protect against and ignore the fact that most of the devices we use on a daily basis are just inherently insecure, period. Cable modems, home/office wifi routers, televisions, refridgerators, etc are all running buggy as hell firmware that could easily be fixed if simple coding and testing standards were followed by the monkeys that churn out the code in india, pakistan, taiwan, and china, and here in the US of A.
I guess what I'm saying is there's a huge intermediary threat that we're all missing in the form of criminal behavior that sits firmly between Joe Hacker(R) and Intel Agency x. This will become more prevalent as it becomes more profitable, making all of this damn vulnerable infrastructure their playpens. </soapbox>
2.0 http://hackaday.com/2015/10/10/the-usb-killer-version-2-0/
He's even talking about making it where it would hold data like a regular USB and having a real and fake password (stated in comments). If someone took it from you and plugged it into their machine and then tried to get the password from you....you give them the fake password and it does its thing.
I was just googling "electronic price tags", they could change the price via RFID. I wonder if there is a standard protocol for it.
Check out the comments in this page, it's not the same one as yours but it might give you some ideas.
http://hackaday.com/2011/04/07/hacking-electronic-price-tags/comment-page-2/
And, no I don't know of a safe way to open it other than "just be really careful" lol.
Edit: Once you figure out how to change the price you could "go shopping" at kohls https://www.youtube.com/watch?v=nCDuQyVknoc
You might be interested to learn that the original Pitfall on Atari has procedurally generated levels.
There wasn't enough ROM on the Atari cart, so they made a level generator. Then they tried different seeds values for initializing the random number generator, and played through until they found a random set that was fun, and fixed that value as seed used in the final game.
http://hackaday.com/2013/06/05/retrotechtacular-how-i-wrote-pitfall-for-the-atari-2600/
In openish areas (read not the cities) this can be achieved with a few arduinos . The hard part is when sound multi paths off of buildings so you would have to have a 3D map of the area to actually figure out where it would have reflected from
I found that: http://hackaday.com/2013/03/12/hinged-nes-case-hides-an-integrated-lcd-screen/
Edit: and this with some Information on costs: http://www.cnet.com/news/nes-modded-with-a-built-in-screen/
Yes, and corporations have quietly slipped this one by many times... a few examples have been publicized. From Hackaday again, this in May:John Deere is trying to convince the Copyright Office that farmers <strong>don’t really own the tractors they buy from them.</strong> They argue that the computer code that runs the systems is not for sale, and that purchasers of the hardware are simply receiving <strong>“an implied license for the life of the vehicle to operate the vehicle.”</strong>
The great thing about the RPi and other microcontrollers is that you can do so much "cool" stuff with it - once any kid learns that they can control lights, motors, power switches, etc by echo'ing stuff into GPIO, I think they'd have to be hooked!
For some inspiration, take a look at:
Games like Minecraft, TIS-100, or the forthcoming Quadrilateral Cowboy might also be worth checking out and would do lots to inspire the curious, engineering mindset that's even more important than learning the command-line, or even any specific programming language.
Oh, I remember that one from hackaday. They're not exaggerating when they say it was slow, as it took hours to boot, apparently. Here's a link to the article.
You absolutely have to give us a build log or schematics or code or something - this is fantastic!
How exactly does the PIC act as a BIOS? How does it interface with the rest of the system?
Also, why not submit a tip to HackADay? It's the sort of thing they'll like.
I actually like this idea a lot it is super simple and effective and relatively low cost.
You could also just put a magnet on a harness and have pullies to each of the 4 corners (think getting drawn and quartered) then have 4 steppers take up the string in the correct amount to move it. somethign like this depends on what you have for materials. If you wanted to go bargain basement you might be able ot rig the strings to a stylus and a duplicate board to make an analog version.
Depends on your definition of AI, and surveilance system... but yes, if you have the old generatino of PS3s that can run linux you can use them for AI tasks. I'm sure you could also run facial, voice, and gait recognition systems too.
No more stepping on the cable and pulling the headphones off the table!
I finally learned how to solder headphone wire using this: http://hackaday.com/2016/11/22/iron-tips-soldering-headphones-and-enamel-wire/
It just takes a bit more time, but otherwise once you get the solder to stick, it acts like a normal wire.
It sounds great, no issues.
Not really something useful in you case, but it's interesting to see how small a linux device can be (storage, webserver and wifi in a SD-card)
http://hackaday.com/2015/06/11/does-the-worlds-first-9-computer-cost-9/
They're selling it at a loss to get all the publicity of being cheap af and create a CHIP ecosystem that will generate a profit in the future.
From a response in the HackerNews thread:
>"In short, there are two companies calling themselves “Arduino” at the moment. One, Arduino LLC was founded by [Massimo Banzi], [David Cuartielles], [David Mellis], [Tom Igoe] and [Gianluca Martino] in 2009, runs the website arduino.cc, and has been directing and releasing the code that makes it all work. Most of these folks had been working together on what would become the Arduino project since as early as 2005.
>The other “Arduino” used to be called Smart Projects and was the manufacturing arm of the project founded and run by [Gianluca Martino]. Smart Projects changed their name to Arduino SRL in November 2014. (A “Società a responsabilità limitata” is one form of Italian limited-liability company.) They have been a major producer of Arduino boards from the very beginning and recently registered the domain arduino.org."
>Read more at HAD (http://hackaday.com/2015/03/12/arduino-v-arduino-part-ii/)
Also:
> When Arduino got popular, the original team of five spun off a manufacturing company, Smart Projects, to handle the manufacturing and distribution tedium, with 4 of the 5 partners staying in the Development arm. When push came to shove and the development side wanted to make the manufacturing non-exclusive, Smart Projects beat them to the legal punch and registered the trademark before the development team did, forked and uprevved what they could, and cut off the income from sales going back to the dev team.
This seems bigger than just some random dude forking and fucking around.
Some emphasis added.
> How much would a graphene printer cost I wonder?
Apparently all you need is a DVD Burner:
http://hackaday.com/2012/12/21/making-graphene-with-a-dvd-burner/
I haven't heard anything since this discovery 2 years ago though. I'm curious if that means it didn't work out or they're just taking a while to make it commercially viable.
Anyone hear anything new about this?
Hey, another HaD writer here. Brian.
The one thing that's surprised me in the last few months is the "USB TV tuner dongle turned into a software defined radio"
This hack was just the product of some guy figuring out a certain chipset of USB TV tuners didn't send a video stream directly to the computer. It only sent the received radio signals to the computer for further decoding.
This served as the basis for a very, very inexpensive software radio that can receive GPS signals and a whole bunch of frequencies outside its range.
To me, this is pretty much the definition of a 'hack' - taking something that's extremely common, figuring out how it works, and turning it in to something that's really useful and really cool. If we gave out awards, this would be the top hack this year.
You are looking at a 1600x800 render of collected Munar elevation data from the ISA Mapsat plugin. Think radar imaging. There's a decent writeup of it on Hack A Day. I love this plugin. It's almost all I do.
Paint would work briefly, but with such a thin substrate, natural flexing & thermal expansion & contraction would result in it flaking off within a season.
In addition, the primers required for good adhesion to polyethylene terephthalate (the plastic 2-liters are made out of) are expensive and not particularly environmentally sound.
Your best bet on-the-cheap is to get a bottle of those non-wax, 'once a year' car polishes, and apply a good couple of coats. About $10 to cover an area roughly the size of the shed's roof in the picture, and you might get an extra 6 months-year of lifespan.
Another interesting use of 2-liters is as skylights. The thermal mass of the water will help the plastic last longer, probably close to 2-3 years, esp. if UV protection, like the Nu Finish linked above, is applied.
True and false. Electric motors don't necessarily have full torque at 0rpm. Especially induction motors. Check out this teardown video of an electric chainsaw: http://hackaday.com/2014/06/24/electric-chainsaw-teardown/
> There's nothing at the level of human systems, organs, cells, or molecules that exhibits or explains language or agency.
What does that mean? Is there something at the molecular level that explains the wetness of water?
Reductionist theories allow us to understand (and build!) computers that do crazy stuff like have a computer recognize and track squirrels and shoot at them with a squirt gun. Is there something at the electron level that explains squirrelness?
Also, is there even an actual definition of "non-mechanistic" aside from "mysterious"?
The title is a bit confusing: it's not some set of default passwords for every Windows host on a particular account set or something.
This is testing every combination of uppercase letters, lowercase letters, numbers, and symbols you can type on a standard US keyboard.
If a cracker were able to acquire the hashes for a system and use this cluster to crack it, any user that put in a password that is 8 chars or less using naught but a keyboard would have their password compromised. From dumb passwords like password or a all the way to the random garbage of v%3{jM-4, every combination is in there.
Of course, they're talking about cracking passwords at a rate of 350 billion (3.5 E+11) / second, and that's pretty quick for doing it live. However, if you pre-compute the tables, you can supposedly crack the same password set with over 95% success at 1.57 E+13 (15.7 quadrillion) passwords per second using <em>one</em> Radeon R9 280X in a midrange desktop.
So: a cracker could probably crack faster than this cluster using a precomputed table downloaded from the internet (though it'd be 400+GB of data!) and a lot less hardware.
Of course, this cluster would be incredible at generating those tables for a variety of character sets, and maybe could achieve a huge performance boost for every crack after the first by splitting up and distributing the rainbow tables across all the hosts and GPUs.
edit: even more important, this amount of compute power allows for more general, non-brute-force attacks that could also achieve incredible performance. You know, something juicy like generating rogue ssl certs. Of course, that (academic) attack is from 7 years ago and counted on a very old hashing algorithm still being in use.
For those that don't know, Sprite_TM is a legendary hacker and one of the judges for The Hackaday Prize. He recently shared some extra tidbits in a Judge Spotlight
Hackaday's acquisition by Supplyframe last July has been quite excellent. The first time I met all the "overlords" in person they asked what the Hackaday community need and project hosting is something the staff has always wanted. I mentioned that and didn't hear anything until late in December when Alek sent me a link to a working site they coded from the ground up (I'm sure they're using libraries, etc. but you know what I mean).
I love the site, especially the fact that it won't let you save a draft. This forces hackers to show off their build during the project, instead of waiting until everything is done. Love That!
So right now we're not actively developing sharks with lasercutters as we want to continue adding features (new Feed on the way soon!) as fast as we can.
There is a Hackerspace in the works which I'm pretty excited about. Have you seen this?
If you are referring to the nicotine stained / yellowing effect that computers often suffer from, it's usually a flame retardant chemical in the plastics that causes this effect over time. It can be reversed in some cases.
This rather famous (is somewhat eccentric) electronic designer has built such a device.
the_bob_widlar_hassler_circuit
He installed it in his office at his high-tech company. If someone came into his office and started yelling, the circuit would squawk out a high-pitched distorted version of the yelling. Then after a moment the circuit would stop squawking and wait for the next yell. Bob Widlar said that after he installed this device, he successfully conditioned a number of people to stop yelling at him in his office.
PSA: do not share passwords between sites. Use a cloud-based password manager like LastPass or a local password manager like password-store or figure out a heuristic like http://hackaday.com/2017/05/10/how-a-hacker-remembers-a-pin/
Whatever you do, do not share passwords between sites. ESPECIALLY your password-recovery channels like your web-based mail.
Because why not just rewrite it in X?
lol but seriously, I don't really have a good answer to that, other than the fact that it's a good exercise for me to fully understand the math and the workflow until I've transcribed it into a language that I'm more comfortable with. It's really more about the journey and the learning experiences than something as pragmatic as what you ask.
It's the same reason why there are so many oddball programming languages out there, and so many oddball homebrew computers out there. Sure, better ones exist, but what better way to learn than to implement something yourself?
It doesn't look bad on a resume either.