«
Expand/Collapse
1067 items tagged "audio"
Related tags:
chaos communication congress [+],
security [+],
privacy [+],
hacking [+],
winn schwartau [+],
tim pritlove [+],
tags [+],
hackers [+],
virus [+],
radio [+],
network [+],
hacker [+],
hacks [+],
digital [+],
overview [+],
john q. newman [+],
john q newman [+],
ira winkler [+],
information [+],
hack [+],
full [+],
free [+],
event [+],
defcon 1 [+],
dan kaminsky [+],
culture [+],
cryptography [+],
wordpress [+],
tierra [+],
tcp [+],
talk [+],
speaker [+],
social [+],
raspberry [+],
peter shipley [+],
party plugin [+],
party [+],
lightning talks [+],
lightning [+],
jeopardy [+],
internet [+],
identity [+],
ian goldberg [+],
future [+],
disclosure [+],
denial of service exploit [+],
denial of service [+],
day [+],
curtis e.a. karnow [+],
converter [+],
computer [+],
closing [+],
bruce schneier [+],
audio path [+],
audio converter 1 [+],
21c3 [+],
zero [+],
wlans [+],
wire [+],
weis [+],
web [+],
way [+],
war [+],
virus creation [+],
unix [+],
thorsten holz [+],
thackeray [+],
terrorism event [+],
terrorism [+],
technology event [+],
technology authors [+],
technology [+],
surveillance [+],
stephen cobb [+],
state [+],
social event [+],
social engineering [+],
satellite event [+],
rose white [+],
richard thieme [+],
review [+],
private investigations [+],
presentation [+],
portable [+],
player [+],
pirate radio [+],
phreaking [+],
paper [+],
oscar meyer [+],
opening [+],
noise pollution [+],
music [+],
michael hess [+],
mark ludwig tags [+],
mark ludwig [+],
management event [+],
live [+],
laws [+],
jukebox [+],
jan michael hess [+],
jan michael [+],
introduction [+],
goldberg [+],
georgia [+],
gail thackeray [+],
frank rieger [+],
firewall [+],
feds [+],
european [+],
engineering [+],
dns [+],
diy [+],
display [+],
dead [+],
dan veeneman [+],
cult of the dead cow [+],
cult [+],
credit [+],
congress [+],
code authors [+],
boombox [+],
bluetooth [+],
audio player [+],
audio introduction [+],
attacking [+],
arduino [+],
Wireless [+],
Software [+],
23th [+],
zurich [+],
zero knowledge systems [+],
year in review [+],
year [+],
x event [+],
wsis [+],
world [+],
wiretapping [+],
wireless speaker [+],
wire tap [+],
winning team [+],
windows virus [+],
windows [+],
william [+],
wii [+],
why [+],
western democracies [+],
web bugs [+],
web apps [+],
weather effects [+],
wearable [+],
washington [+],
warriors [+],
warfare [+],
wadlow [+],
voting machine [+],
voip [+],
voice [+],
viruses [+],
virus programming [+],
virtual reality [+],
vienna [+],
vibrant history [+],
version [+],
vaneck [+],
use [+],
unusual things [+],
unusual [+],
unterzoegersdorf [+],
unix security software [+],
ugly [+],
two versions [+],
tunnel data [+],
tunes [+],
trust [+],
tricks [+],
trends [+],
transmitter [+],
train [+],
tradecraft [+],
toyota matrix [+],
toyota [+],
touchtune [+],
touch tunes [+],
touch [+],
tor event [+],
tor [+],
tool [+],
tobias engel tags [+],
tit [+],
timo kasper tags [+],
time based security [+],
time [+],
ti99 [+],
thomas eisenbarth [+],
the road [+],
than [+],
textfiles [+],
test authors [+],
test [+],
tempest [+],
teledesign management [+],
teledesign [+],
telecommunications [+],
technological trends [+],
technical context [+],
teac [+],
tcpa [+],
tcp ip [+],
tascam [+],
symbiotic relationship [+],
swarm robotics [+],
swarm [+],
sustainability [+],
susan thunder [+],
survival [+],
survey [+],
surveillance technologies [+],
surveillance issues [+],
surveillance camera players [+],
supervisory control and data acquisition [+],
sun microsystems [+],
summer thanks [+],
suitcase [+],
sucks [+],
subversion [+],
stripe reader [+],
stock stereo [+],
steven dunnifer [+],
steven alexander tags [+],
steven alexander [+],
steve mann [+],
stereo [+],
stephen wadlow [+],
stefano di paola tags [+],
stefan sels [+],
stefan arentz [+],
static analysis [+],
state authorities [+],
stack overflow [+],
ssl [+],
squeezebox [+],
spy novels [+],
speech tags [+],
speaker projects [+],
speaker project [+],
spam prevention [+],
spam [+],
soviet [+],
south america [+],
source [+],
soundpuddle [+],
soundcard [+],
sound volume [+],
sound o [+],
sound generators [+],
solaris kernel [+],
software scene [+],
software protection agency [+],
software development [+],
soft [+],
society [+],
social elements [+],
sniffing [+],
smart software [+],
sip [+],
silicon chips [+],
silence [+],
side trip [+],
show [+],
shout out louds [+],
should [+],
session initiation protocol [+],
server [+],
serioux [+],
sensor data [+],
sels [+],
security utilities [+],
security problems [+],
security practices [+],
security model [+],
security incidents [+],
security event [+],
security announcement [+],
secret [+],
se7en [+],
scott harden [+],
scientology [+],
science event [+],
science [+],
scene [+],
scalable [+],
scada [+],
satellite systems [+],
satellite decoders [+],
satellite [+],
sarah gordon tags [+],
sarah gordon [+],
sansa clip [+],
sansa [+],
sandro [+],
san francisco [+],
sameer parekh [+],
sam [+],
salt ii [+],
ryan [+],
rudy rucker [+],
rpi [+],
routing protocols [+],
routing [+],
root privilege [+],
roll [+],
role [+],
roger dingledine [+],
robots [+],
robotic systems [+],
roberto preatoni [+],
robert steele [+],
robert lupo [+],
robert guerra [+],
rising [+],
rights [+],
rig [+],
rick astley [+],
rich internet [+],
rgine dbatty [+],
rfid [+],
rf module [+],
rf link [+],
rf board [+],
reworking [+],
rest [+],
resistance [+],
research platforms [+],
relationship [+],
recorder [+],
record [+],
recombinant culture [+],
recombinant [+],
receiver pair [+],
rebinding [+],
ray kaplan [+],
ray [+],
raoul chiesa [+],
random collection [+],
ralf bendrath [+],
ralf [+],
radio waves [+],
radio case [+],
radiation [+],
radar gun [+],
radar [+],
question [+],
quantum information science [+],
quantum cryptography [+],
quantum [+],
pvc elbow [+],
public networks [+],
public consciousness [+],
pseudonymously [+],
protocol [+],
protection [+],
project [+],
program [+],
proactive measures [+],
privacy rights [+],
presenation [+],
potentiometer [+],
pop [+],
pool [+],
pollution [+],
politix [+],
police radar [+],
ploy [+],
pitbull [+],
pirate [+],
piercing [+],
picking [+],
pic microcontroller [+],
pic [+],
physical spaces [+],
pht [+],
phone [+],
phishing [+],
peter panter [+],
peter buruk [+],
personal privacy [+],
personal [+],
peros [+],
performance [+],
pbx [+],
paul kocher [+],
paul bhm [+],
paramount [+],
parabolic microphone [+],
parabolic [+],
panda [+],
pair [+],
packet [+],
overflow [+],
oscar meyer tags [+],
orbit satellites [+],
oracle security [+],
oracle databases [+],
oracle [+],
open spaces [+],
open source tools [+],
open source tool [+],
open source solutions [+],
open source initiative [+],
open [+],
old radio [+],
null pointer [+],
northwest passage [+],
northeast passage [+],
noise [+],
nohl [+],
noc [+],
nixie tubes [+],
nixie [+],
nintendo wii [+],
nils magnus tags [+],
nfl football games [+],
news [+],
new york city [+],
networking [+],
networked computers [+],
network storage servers [+],
net neutrality [+],
neighbors [+],
national asset [+],
myths [+],
music thanks [+],
music player [+],
munich [+],
multi modem [+],
mr. t [+],
mr t [+],
movement [+],
move objects [+],
monkey [+],
mod files [+],
mobile phone number [+],
military strategies [+],
mike peros [+],
mike field [+],
mifare [+],
middle east [+],
microphone [+],
michael clemens [+],
michael chen [+],
michael [+],
messes [+],
member companies [+],
mel [+],
media [+],
measurement results [+],
matthew br [+],
matt [+],
matrix [+],
math [+],
master of puppets [+],
martin ling tags [+],
markus beckedahl [+],
mark will [+],
mark lottor [+],
marco gercke [+],
management [+],
malware [+],
major computer [+],
major [+],
mail [+],
maik hentsche [+],
mag stripe [+],
macintosh security [+],
macintosh [+],
mac os x [+],
mac os [+],
mac [+],
lupo [+],
luis miras [+],
low earth orbit [+],
low [+],
lossless audio [+],
loose wires [+],
logging mechanisms [+],
lock [+],
locating mobile phones [+],
locating [+],
load [+],
live pirate [+],
live performance [+],
lithium cell [+],
linux [+],
link [+],
lindner [+],
lies [+],
liberalization [+],
liability [+],
leds [+],
lawrence lessig [+],
law [+],
latin america [+],
lastest [+],
laser diode [+],
laser [+],
lars weiler [+],
lars eilebrecht [+],
lamer [+],
l0pht [+],
l. r. pennasilico [+],
knitting projects [+],
keynote speech [+],
keynote [+],
kernel [+],
ken kumasawa [+],
keeloq [+],
karnow [+],
kai kunze [+],
joshua ellis tags [+],
joshua ellis [+],
joseph pelrine [+],
joke [+],
joi [+],
john gilmore [+],
jennifer granick [+],
jeff gough [+],
jason scott tags [+],
jason scott [+],
ito [+],
isolation booth [+],
isolation [+],
irc [+],
iraq [+],
ipv [+],
iphone [+],
investigations [+],
investigation [+],
inventor [+],
intrusion detection [+],
intrusion [+],
intro [+],
intrinsic complexity [+],
intersection [+],
internet privacy utility [+],
internet corporation for assigned names and numbers [+],
internet authors [+],
interference [+],
interface [+],
intelligence [+],
institution [+],
information warfare [+],
information technology report [+],
information superiority [+],
information overflow [+],
information operation [+],
industry authors [+],
industrial civilisation [+],
important tools [+],
implementation problems [+],
illegal [+],
ice [+],
icann [+],
how to make cool things [+],
honeypot [+],
home recording studio [+],
home [+],
history [+],
high [+],
hex editor [+],
hendrik scholz [+],
headphones [+],
headphone [+],
hardware projects [+],
harder [+],
hardened [+],
handheld terminals [+],
hand [+],
halleck [+],
gyroscopes [+],
gun [+],
gsm [+],
grills [+],
gregory charvat [+],
governmental activities [+],
governmental [+],
government level [+],
glenn campbell [+],
gigabit networks [+],
ghz [+],
germany [+],
georgia authors [+],
gentoo [+],
gamer [+],
game tags [+],
gala presentation [+],
gadi [+],
g philes [+],
g investigations [+],
freeze [+],
freedom of speech [+],
francesco ongaro [+],
fossil fuel production [+],
followup [+],
fnord [+],
flying [+],
florian amrhein [+],
flag [+],
firewalls [+],
firewall gateway [+],
filter implementations [+],
felix von leitner [+],
felix [+],
federal agents [+],
fbi [+],
favorite music [+],
false identity [+],
face recognition software [+],
fabio ghioni [+],
extreme programming [+],
extreme [+],
extraordinary rendition [+],
external eeprom [+],
exploits [+],
exploitation techniques [+],
explanation [+],
excellent [+],
everybody [+],
european models [+],
ethical obligation [+],
estonia [+],
erich [+],
energy radio [+],
empirical measurement [+],
emmanuel goldstein [+],
embracing [+],
embarking [+],
electroluminescent wire [+],
electro magnetic pulse [+],
eff [+],
edge techniques [+],
economy [+],
ebay [+],
earth [+],
earning [+],
drunken friend [+],
driven futures [+],
doppler shift [+],
don [+],
dollar bills [+],
do the right thing [+],
diy speakers [+],
dingledine [+],
digital playground [+],
digital authentication [+],
device [+],
deviants [+],
development environments [+],
development [+],
developements [+],
detection [+],
des [+],
default passwords [+],
deep freeze [+],
decoding [+],
datagram [+],
danman [+],
daniel kirstenpfad [+],
dangerous technologies [+],
dancing to the music [+],
dan farmer [+],
dale [+],
cyborgs [+],
currency systems [+],
currency [+],
culture event [+],
cryptographical [+],
cryptographic primitives [+],
cryptographic algorithms [+],
cryptanalysis [+],
criminal investigations [+],
credit card fraud [+],
creation [+],
craig balding [+],
craig [+],
cracker [+],
counter [+],
corp [+],
corba [+],
copyright [+],
convert [+],
convention [+],
control protocol [+],
control mechanisms [+],
context [+],
contest rules [+],
contest [+],
concert bootlegs [+],
computing [+],
computer world [+],
computer viruses [+],
computer speakers [+],
computer speaker [+],
computer crime cases [+],
computer authors [+],
communication [+],
collection [+],
closing ceremony [+],
climate [+],
clifford wolff [+],
clark tags [+],
ciphire mail [+],
ciphire [+],
cifs [+],
chronos [+],
christian heller [+],
christian carstensen [+],
chris hall [+],
chiptunes [+],
chiptune [+],
chip reverse [+],
china [+],
character [+],
change [+],
ceremony [+],
cellular phones [+],
cell [+],
caspar bowden [+],
case [+],
carstensen [+],
carefully [+],
card [+],
capture the flag [+],
capture [+],
capitalist economy [+],
capabilities of the computer [+],
campbell tags [+],
bug [+],
buffer overflow attacks [+],
buffer [+],
briefcase [+],
brain [+],
bpf [+],
booth [+],
boomcase [+],
boom box [+],
bookshelf speakers [+],
bogdan [+],
bo [+],
black ops [+],
black [+],
bitrate [+],
bar graph [+],
bar [+],
banking [+],
aware [+],
automated [+],
austin hill [+],
auditing [+],
audiobook [+],
audio windows [+],
audio voice [+],
audio transmitter [+],
audio survey [+],
audio spectrum [+],
audio security [+],
audio recorder [+],
audio playback [+],
audio overview [+],
audio input [+],
audio hardware [+],
audio culture [+],
associated [+],
asimov [+],
artimage [+],
arien [+],
argus [+],
area 51 [+],
arctic sea ice [+],
arctic sea [+],
arctic [+],
applications flash [+],
apple [+],
anti virus [+],
anti [+],
antenna analyzer [+],
antenna [+],
anonymity on the internet [+],
anonymity [+],
annual [+],
annie machon [+],
anne roth tags [+],
anime character [+],
anime [+],
andrej holm [+],
andreas bogk [+],
ancient wisdom [+],
analyzer [+],
analogies [+],
algorithmic music [+],
algorithmic [+],
algorithm [+],
alexander kornbrust [+],
alexander [+],
alex [+],
aircraft techniques [+],
activex [+],
accessibility [+],
access control system [+],
access [+],
abstract presentation [+],
abstract overview [+],
Public [+],
Programming [+],
Philes [+],
IPv6 [+],
Hackerspaces [+],
FCC [+],
90th birthday [+],
21th [+],
privacy event [+],
authors [+],
zusman,
zune,
zombies,
zombie apocalypse,
zinf,
zane lackey,
zage,
zach hoeken,
zaborowski,
yukikaze,
yourself,
you,
yoshi akai,
yann seznec,
yamaha dd35,
yamaha,
xss,
xna,
xion,
xen hypervisor,
xen,
x rop,
x quicktime,
x linux,
x kernel,
x google,
x appletv,
x 509,
wub,
writeup,
wpa,
wouters,
worm,
world of warcraft,
world authors,
workstation,
workshop authors,
works,
workgroups,
wooden craft,
won,
women,
wolfgang draxinger,
wolf,
wojciech bojdol,
with,
wireless sensors,
wireless radio,
wireless headset,
wireless headphones,
winning the race,
windows vulnerability,
windows kernel,
win,
wimax,
wilson,
william kimball,
wilderness,
wikileaks,
wiimote,
wifi,
wes faler,
wes brown tags,
wes brown,
wep wpa,
wells,
weir,
weighted keyboard,
week,
wedding,
webgoat,
web web,
web service,
web server,
web programming languages,
web interface,
web event,
web conferencing,
web authors,
web attacks,
web application servers,
web application,
weaponry,
weaponizing,
weapon of mass destruction,
ways,
wayne zage,
wayne huang,
wax cylinders,
wax cylinder,
wax,
wave forms,
wav file,
watt amplifier,
water infrastructure,
warranties,
wargamez,
wardriving,
want,
walter van host,
walt tags,
waf,
wade polk,
vuvuzela,
vulnerability research,
vulnerability assessment,
vulnerability,
vulnerabilities,
vtol,
vsergeev,
volume leveling,
volume level,
volume,
voltage,
voice recorder,
voice coils,
vmusic,
vladimir demin,
vladimir,
visualization system,
visual feedback,
visual,
vista,
viscount,
virtualization,
virtual security,
virtual machines,
virtual machine,
virtual,
viral infections,
viral,
violins,
vintage hardware,
vintage car,
vintage,
vinod,
vigorous,
video library,
video application,
video,
vidas,
victorian hardware,
victor,
vibrations,
vibraphone,
vertical strips,
vendor patches,
vendor,
velosynth,
vega tags,
vega,
vault,
vaughn tags,
van der walt,
van beek,
valentin,
val smith,
usn,
using proxy servers,
using flash,
user interface,
user,
usb,
usa,
upnp,
upgrade,
updates,
unreal,
unmasking,
university of hokkaido,
university of dundee,
universe,
unit,
unique,
unicornscan,
unfair,
unexpected corners,
underwater microphone,
understanding,
uncrippling,
unclassified,
ultimate,
ufos,
ufology,
ufo event,
uble,
uav,
u.s.,
u buffer,
tyler,
ty miller,
txt power,
txt,
two fer,
turntable,
turn table,
turn,
turbo,
tunnels,
tune,
tube preamp kit,
tube amps,
tube amp,
tube,
trying,
true random number,
trombone,
trolling,
trojans,
trey ford,
travis goodspeed,
travis,
travel authors,
tranz 330,
transmission rates,
translation,
transistors,
training,
trainer,
traffic,
traditional midi,
trade deficit,
track,
tracing,
trace,
toyota corolla,
touch screen,
tor network,
tor e. bjrstad,
top notch,
toolsmithing,
toolbar,
tony howlett,
tony flick tags,
tonematrix,
tone generator,
tom stracener,
token,
tobias matt fiddler,
tobias bluzmanis,
tire pressure,
tire,
tiny tube,
tiny speakers,
tiny,
time scientists,
tim vidas,
tim okeefe,
tiles,
tiffany strauchs,
tiffany rad,
tiffany,
threats,
thousand,
thoughts,
thompson mathew monroe tags,
thomas wilhelm tags,
thomas wilhelm,
thomas j. holt tags,
thomas j. holt max kilger,
thinking,
things that go bump in the night,
theramin,
textbook authors,
textbook,
tetrahedral,
testing management,
testing,
terminator 3,
terminally,
temporal,
television,
telephone company,
telephone,
technology concepts,
technical vulnerability,
techie,
tears,
tape decks,
tape deck controls,
tape,
taichi,
tags hardware,
tag team,
tactical,
tables,
systems computers,
system management mode,
system controller,
system,
synthesizer system,
synthesizer,
synth manufacturer,
synth,
synapse,
symbian,
swf,
sweet tunes,
sushi,
survival preparedness,
surround,
supply vessel,
super,
sudoglove,
sudhir aggarwal,
subverting,
stylophone,
style,
styharp,
stuxnet,
strom carlson,
strom,
stroke,
string musical instrument,
string,
street performances,
street,
streaming audio,
streaming,
streamer,
stream ciphers,
stream,
strategic initiatives,
storm botnet,
storage options,
stock option,
stock market,
stock condition,
stock,
steve pate,
steve dunker,
steve adegbite,
stereo amplifier,
stephen janansky,
stephen,
step,
stender,
steampunk,
steam powered,
stealth,
stealing,
status,
station,
static files,
stage lighting,
stack buffer,
ssx tricky,
ssliverse,
squire,
square wave,
sql server,
sql injection,
sql,
spyware,
spirit of times,
spill,
spent three,
spent,
speculations,
spectrum analyzer,
spectrum,
speakers,
speaker mounted wav,
speaker mounted,
spdif output,
spdif,
spark plug,
spark,
space,
soundboard,
sound synthesis,
sound speakers,
sound quality,
sound generator,
sound files,
sound chips,
sound chip,
sound,
sorinara,
sonata,
something,
solenoids,
solenoid,
solderless,
solar garden,
sohail ahmad,
software vulnerabilities,
software radio,
software protection,
software packages,
software filter,
socially,
social responsibility,
social networks,
snort,
sniff,
snap,
snake oil,
sms,
smells,
smashing,
smartcard,
smart project,
smart card authentication,
smart card,
smart,
slow,
slouch,
sleep lab,
slap,
skool,
site,
sinterklaas,
single column,
single chip,
simultaneous notes,
simple,
simon inns,
simon frank,
silberman,
signatures,
signal generator,
signal,
sight and sound,
sie,
side channel,
side,
siddharth tags,
sid music,
sid,
shovel,
shoutcast,
shot,
shodan,
shifter,
shield,
shewmaker,
sherri sparks,
sherri davidoff,
sherri,
shellcodes,
shellcode,
shawn moyer,
shawn embleton,
shark,
sharepoint,
seznec,
seven segment display,
session,
service vulnerability,
service,
servers,
sequencer,
sequence prediction,
sensors,
sensitive pen,
sennheiser,
semi,
self,
seki tags,
seizure,
security vulnerabilities,
security toolbox,
security tags,
security risks,
security program,
security professional,
security phone,
security operations,
security network,
security law,
security infrastructure,
security guide,
security experts,
security career,
security authors,
security applications,
securing,
secure,
secret handshake,
sebastian fernandez,
searle,
searching,
search engines,
search and seizure,
search,
sean taylor,
sean m. bodmer,
sean barnum,
sd card,
sculpting,
screen scraper,
screen,
scott wolchok,
scott stender,
scott moulton,
scott dunlop,
scott,
schuyler towne,
schuyler,
schuble,
schober,
schlesinger,
scanning,
scada systems,
satellite hacking,
satan,
sandy clark tags,
sandy clark,
sandberg,
sand,
samuel petreski,
sample,
salvatore,
saludos,
safecracking,
ryan pentney,
ryan linn tags,
ryan challinor,
ryan c. barnett,
ryan boudreau,
ryan anguiano,
russian hacker,
russian engineer,
russia,
russ rogers tags,
russ rogers,
russ mcree,
runtime environments,
runtime,
rucci,
rubens tube,
rubens,
ruben,
routers,
router,
rotary phone,
rotary,
rop,
rootkits,
rootkit,
root,
roommate,
rook,
ron,
rogers gomez,
rodney mcgee,
rod beckstrom,
rock your,
robot,
robomow,
robo vibe,
robin upton,
roberto suggi,
robert lentz,
robert imhoff ,
robert edmonds,
robert e. lee tags,
robert e lee,
robert clark tags,
robert,
rob rehrig,
rob degulielmo,
rob carter tags,
rob carter,
road bikes,
rng,
ristic,
risk management,
risk,
ripping,
rip,
ring 0,
ring,
riley repko,
riley eller,
rightmark audio analyzer,
rightmark,
riding,
ricky lawshae,
ricky,
rickrolling,
rickroll,
rick wesson,
richard theime,
rich smith,
rich decibels,
rich decibel,
ria world,
rfidj,
rfid based,
rf noise,
reverse engineering,
reverse dns,
reverse,
revenge,
retro radio,
resistive touch screen,
resilient,
residential gateways,
residential,
repository,
repko,
removal,
remote viewing,
remote controls,
remote controlled,
remote buffer overflow vulnerability,
remote buffer overflow,
remote,
reloaded,
rehrig,
refrigerator,
refresh,
refit,
reference design,
reference,
redux,
red noise,
recovery,
record player,
recognition,
rechargeable tools,
recent windows,
receiver,
recaptcha,
reason,
rear ends,
rear derailleur,
realtek hd audio control panel,
realtek,
realplayer,
reality,
real time,
read,
rca plugs,
rave,
ratchet,
randy robbins,
random number generator,
randal,
rambler ambassador,
raid recovery,
raid,
ragan,
rafal wojtczuk,
rafael dominguez,
radios,
radio volume,
radio stores,
radio shack,
race,
raber,
rabbit hole,
rabbit,
r. software,
r software,
quynh,
quist,
quietriatt,
quieter,
quicktime apple,
quick,
quadrature,
qr code,
python,
pwned,
pwnage,
pwn,
pujol,
psychology,
proxy,
proximity card,
proximity,
prototyping system,
prototype,
protecting,
propeller,
proof of concept,
pronged approach,
project details,
programming guru,
program authors,
processing,
privilege,
privacy office,
pridgen,
press,
presidential election,
presidential,
preserving,
presence,
preparing,
predictable,
pratap,
prank o,
practical,
prabhu,
powershell,
power source,
power button,
power,
potato,
postage,
post,
portable cd player,
port hunter,
polymorphic,
pollet,
point,
pocket,
poc,
pnp transistor,
plugin version,
plug,
pls file,
pleasing sound,
player v3,
player v2,
player 1,
playback,
play,
plausible deniability,
plausible,
platform,
planet,
pla,
pl sql,
pki,
pitch shifter,
pitch,
piracy,
pinky finger,
pink noise generator,
ping pong ball,
pig sty,
pig,
piezo sensors,
piezo elements,
piece of music,
pic based,
piano hammers,
piano,
physical tokens,
physical security,
physical,
photo transistors,
photo one,
photo camera,
phonograph,
phishers,
philip r. zimmermann,
philip r zimmermann,
phil,
petkov,
peter silberman,
peter gutmann,
peter ferrie,
peter eckersley,
peter,
perspectives,
perspective,
personal survival,
personal audio player,
personal account,
persistent web,
permanent magnet,
perfect shot,
perfect,
percussion instruments,
perceptual illusions,
pentium 4 pc,
penetration testers,
penetration,
pending,
pen,
pedro joaquin tags,
pdif,
pdf specification,
pdf,
pcb layout,
pcb,
pc. he,
paul wouters,
paul vixie,
paul royal,
paul malkewicz,
paul judge,
paul graham tags,
paul,
patryk,
patrick thomas tags,
patrick thomas,
patrick mullen,
patrick mcgregor,
patrick,
pat metheny,
passwords,
passthrough,
passive infrared sensor,
party lighting,
part,
papathanasiou,
panel,
pain,
pahl,
pad,
packing,
packet radios,
p2p networks,
p networks,
p event,
ozer,
owner,
owned,
owen,
overhead projector,
overflow vulnerability,
overdue,
output,
outdoor,
other,
ostrom,
oskar,
os x,
original radio,
original design,
organ,
oren isacson,
oren,
orchestra,
orange tiles,
orange square,
orange,
oracle database server,
oracle database,
optional,
optimized,
ops 2005,
ops,
operating,
openzdk,
openssl,
openly,
openleaks,
open source implementation,
open source framework,
online encyclopedias,
one liners,
omg wtf,
omg,
omfg,
ollybone,
oliver nash,
oliver friedrichs,
olga smirnova,
old time music,
old skool,
old,
ogg file,
ogg,
officer,
office documents,
office,
ofer shezaf,
ofer,
octf,
obsolete technology,
observers,
observatory,
obscurity,
objects,
obfuscation,
obfuscated,
o keefe,
o fly,
numark,
ntlm,
nsa,
not,
nosql,
noisy,
noisemakers,
noise complaints,
nodal analysis,
no way,
nmap,
niklas roy,
nike air force 1 shoes,
nike air force,
nightmares,
nicole ozer,
nick waite,
nick harbour,
nick freeman,
nicholas j. percoco,
nicholas arvanitis,
nguyen anh,
next generation,
next,
newspaper,
new orleans,
new breed,
new approach,
new,
network traffic,
network spam,
network protocols,
network privacy,
network monitor,
network flow analysis,
net,
nesbit,
nes,
needle in a haystack,
necessary connections,
neal,
naturpic,
national governments,
national drinking water,
national collegiate,
national,
nathan mcfeters,
nathan keltner,
nathan hamiel,
nathan,
nate lawson tags,
name,
nali,
mythbusting,
mysql,
musical toy,
musical,
music visualizations,
music controller,
music composition,
music collections,
museum staff,
museum exhibits,
museum,
munki,
multiple buffer overflow,
multiple,
multiplayer,
multi boot,
muff,
muck,
msp430,
msp,
mpeg layer 3,
mpeg,
mp3s,
mp3 solutions,
mp3 player,
mp3 decoder,
mp3 audio mixer,
moyer,
moxie,
mower,
movie,
motorola dc800,
motorola,
motion sickness,
motion,
mosquito,
mosdef,
moritz wolpert,
moritz,
morehouse,
mooney,
moon bouncer,
monta elkins,
monotron,
mono filament thread,
monitoring systems,
monitor,
money system,
money,
momentary,
moment of silence,
moisture sensor,
module,
modern,
modem,
model,
mobitex network,
mobitex,
mobile market,
mobile devices,
mobile application,
mobile,
mixer,
mitel,
misa,
miras,
mining,
minds,
military documents,
miles,
mila,
mike zusman,
mike reavey,
mike murray lee kushner,
mike murray,
mike metzger,
mike kershaw,
mike davenport,
mike cooper tags,
mike cooper,
mike bailey,
migrating,
midibox,
midi synthesizer,
midi station,
midi signals,
midi device,
midi controller,
midi connection,
midi,
middler,
microsoft mpeg,
microsoft,
microsd memory card,
microsd card,
microphones,
microphone calibration,
microminded,
microcontroller,
micro,
michael weigand,
michael sutton,
michael steil,
michael schrenk,
michael schearer,
michael ossmann,
michael mcintyre,
michael ligh,
michael l. davis tags,
michael d. glasser,
michael brooks,
michael anderson,
miceuz,
methods,
meter maids,
meter,
metasploit,
metapost exploitation,
metaphish,
metamorphic,
met,
messaging,
messages,
message,
mesoiam,
merrill,
mentor,
memory protection,
memory,
meme,
melody generator,
meet,
meditation workshop,
medicine,
media player version,
mechanical energy,
mckenney,
mccray,
mccoy,
maynor,
maximum,
maximiliano,
max msp,
max kilger,
max kelly,
max,
matthew wollenweber,
matthew richard tags,
matthew richard,
matthew herbert,
matthew flick tags,
matthew,
matt zimmerman,
matt weir,
matt ryanczak,
matt richard steven adair tags,
matt krick,
matt kemp,
matt keeter,
matt flick tags,
mathieu,
mathew,
math event,
mateusz jurczyk,
mateusz,
master,
massive midi,
massexploitation,
mashup,
marv,
martin mocko,
marshall,
marpet,
marlinspike,
markus gritsch,
mark steward tags,
mark steward,
mark shelhart,
mark ryan del moral,
mark ryan,
mark houston,
mark dowd,
mark,
marisa fagan,
mario heiderich,
mario ceballos,
mario,
marine speakers,
marco slaviero,
marco bonetti,
marcia hofmann,
marc weber tobias matt,
marc weber tobias,
marc weber,
maple,
map,
manipulation applications,
manipulation,
man,
makita,
making money on the web,
mainstream press,
magnetic reed switch,
machine,
mach,
macbook,
mac osx,
m3u file,
m3u,
lung power,
luke jerram,
luiz eduardo tags,
luedke,
luciano bello maximiliano bertacchini,
lst files,
lst file,
lst,
lot,
lost in translation,
lonely soul,
lonely heart,
logan,
lockpicking,
local buffer overflow,
local,
lizzie,
live electronics,
little,
listening to music,
list,
linton wells,
linn,
linksys wrt54g,
linksys,
linguistic,
lineberry,
line leakage,
line,
lindell,
light sensors,
light sensor,
light amp,
light,
ligh,
life,
lie detector,
lie,
libsndfile,
library version,
library,
lib,
leveraging,
level applications,
let,
leonard gallion,
lens,
leigh honeywell,
lego,
legal channels,
legal,
left half,
lee,
led,
lcd screen,
lawyers,
lawson,
laws related,
lawn mower,
lawn,
laser projectors,
laser projection,
larry aiello,
laptop,
lady gaga,
lady,
lackey,
l. gavas,
kushner,
kurtz,
kunkel,
kung fu,
kung,
kristofer erickson,
kristie dunker,
krick,
krakow,
korg triton,
korg keyboard,
korg,
kongs,
knowledge network,
knowledge,
knock off,
kit,
kirschbaum,
kiosk,
kingdom,
king diamond,
kinect,
kim tags,
kim jong il,
kidnapping,
kibler,
keytar,
keystrokes,
keystroke,
keys to the kingdom,
keys,
keyboard emulation,
keyboard,
key tags,
key,
kevin stadmeyer,
kevin mahaffey,
kevin johnson tom eston,
kevin johnson frank dimaggio,
kevin fu,
kevin estis,
kevin bankston,
kevin archer tags,
kevin archer,
kershaw,
kernel level,
kerb,
kequencer,
kenneth geers,
keltner,
keith biddulph,
keeter,
katie moussouris,
katana,
kartograph,
kaoss pad,
kaoss,
kaminsky,
k.c. budd,
justine osborne tags,
justin searle,
justin morehouse,
jumper wires,
julian wa,
julian grizzard,
julia wolf tags,
jtag debugger,
jtag,
jrmie,
joshua wise,
joshua marpet,
joshua bienfang,
joshua,
josh pyorre,
josh marks,
josh kelley tags,
josh kelley,
josh,
joseph mccray,
jose,
jong il,
jonathan squire,
jonathan rom,
jonathan levin,
jonathan lee neil pahl,
jonathan lee,
jonathan danforth,
jonathan,
jon rose tags,
jon r. kibler,
jon oberheide,
jon mccoy,
jon,
jokes,
johnny long,
john williams,
john mcnabb,
john hering,
john heasman,
john curran,
john benson,
john,
joey calca,
joe stewart tags,
joe stewart,
joe grand,
joe damato,
joe cicero tags,
jocelyn lagarenne,
jocelyn,
jobsite radio,
jobsite,
joanna rutkowska,
jinx,
jimmy,
jimi fiekert,
jim rennie,
jim christy tags,
jim christy,
jim,
jibran,
jet,
jesse daguanno,
jesse burns,
jerram,
jeri,
jeremy chiu,
jeremy brown tags,
jeremy brown,
jeremy blum,
jeremiah grossman,
jensen,
jeff yestrumskas,
jeff ledger,
jeff bryner,
jean philippe roch,
jean philippe,
jean,
jboss,
jay beale,
javascript,
jason schlesinger,
jason raber,
jason ostrom,
jason lee tags,
jason lee,
jaroslav novak,
jaquard,
jane,
jan torben,
jan,
james shewmaker,
james luedke,
james lee tags,
james arlen,
jam iii,
jailbreaking,
jacob carlson,
jacob appelbaum,
jackpotting,
jack o lantern,
jack black,
jabra,
j. stolfo,
ivan ristic,
ivan buetler,
itzhak avraham tags,
itzhak,
isp,
isn,
isc,
irrigation pipe,
irk,
ir photo,
ipod touch,
ipod shuffle,
ipod,
ipad,
invented,
intrusion detection solutions,
internet surveillance systems,
internet security,
internet radio player,
internet applications,
international ngos,
internals,
internal networks,
internal,
interface implementation,
interest,
inter,
intelligence data,
intel,
integrity protection,
integrated circuits,
integer overflow vulnerability,
integer,
instrumented,
instrument,
insider,
insecurity,
insecure,
input signal,
input connector,
input and output,
input,
injection molded plastic,
injection,
injectable,
infrared remote control,
information security industry,
information gathering,
information attacks,
infections,
infection rate,
infancy,
inequality,
industrial,
inducing,
incompetence,
incident response,
improving,
import address table,
import,
implementing,
implantable,
imhoff,
image,
ilyas,
iis,
idj,
identifying,
ida pro,
ida bridge,
ics,
icecast server,
icebox,
ian o. angell,
ian clarke oskar sandberg,
ian amit tags,
hz hum,
hyundai sonata,
hyundai,
hypervisors,
hypervisor,
hype,
hybrid approach,
hybrid,
humberto,
human brain,
human,
huge collection,
huffman,
htpc,
howlett,
how to rule the world,
how to impress girls,
how to,
how things work,
housing,
hot glue,
hostname,
horsemen,
hooking,
homemade music,
homemade,
home entertainment center,
home automation,
holyfield,
holt,
holes,
hokkaido japan,
hokkaido,
hofmann,
hijacking,
highway to hell,
highway,
high security locks,
hideout,
hidden messages,
hidden,
hibernation,
hey,
hering,
hell,
heffner,
heavy lifting,
heat sink,
hearts,
heartfelt message,
heart,
hearing,
heap,
headset,
headphone port,
head,
hdd,
hd radio receiver,
harrison pham,
hardware hacking,
hardware hackers,
hardening,
hanna tags,
handles,
handcuffs,
halloween,
half,
hadoop,
hacking web,
hacking trojan,
hacking mac,
hacking games,
hacking game,
hacker world,
hackaday,
hackable,
gustibus,
gustav rydstedt,
gustav,
gupta,
guitar effect,
guitar echo,
guitar,
guided missiles,
guide,
groovebox,
grissini,
griffin milsap,
gregory fleischer,
greg white,
greg conti,
greeting cards,
grant jordan,
government entities,
government,
gourdin,
got,
google toolbar,
google hacking,
google,
goodspeed,
good job,
good,
gmr,
glue,
glove,
global security,
global cyber,
global,
glasser,
glass,
glados,
gist,
girlfriend,
gimmick,
gift,
get,
gesture recognition,
gerhard eschelbeck,
gerald kane tags,
georgia tech center,
george louthan,
georg,
geoip,
gently,
generator,
generation,
generating,
gender differences,
gem,
geers,
gavas,
garry pejski,
garden lamps,
gaming,
games,
game servers,
game of life,
game boy program,
game authors,
game,
gallion,
gallery,
gadgets,
fyodor tags,
fyodor,
funky beat,
fundamental defense,
function,
fun time,
fun project,
fun,
fsck,
fritz,
friendly skies,
friendly,
friend,
frequent flyer miles,
free audio converter,
fred von lohmann,
freak show,
freak,
frank breedijk,
francisco amato,
framework,
fragging,
fpga development board,
fpga board,
fpga based,
fpga,
fox in the hen house,
fox,
four horsemen,
foss desktop,
foss,
form,
forgery,
forensics,
forensic investigation,
forensic data,
forensic analysis,
forensic,
foreign language,
foreign,
force posture,
force,
for,
fones,
foe,
foca,
flight of stairs,
flick,
flex sensors,
flex,
fleischer,
fleetwood audio,
flat bass,
flash storage,
flash developers,
flash application,
flash,
flag games,
fixed,
fish finder,
fish,
firefox addons,
firefox,
firearms,
fire exercise,
fire,
finished board,
fingerprinting,
fingerpinting,
finding,
filter circuits,
film camera,
file processing,
file cutter,
file,
fifty dollars,
fifty,
fidelity,
fiddler,
ferdinand schober,
fellow hacker,
feet,
feeding,
fed,
feature,
favorite songs,
fault,
fat16 file system,
faraday cage,
fanboys,
failure,
fagan,
fader control,
facts fiction,
fact fiction,
facial,
facebook,
face,
fab lab,
eye of a needle,
eye,
extreme range,
extractor,
express,
exploring,
exploitspotting,
exploiting,
exploitation,
explain,
exercise,
execution technology,
executables,
examination,
evilgrade,
european citizens,
europe,
ethernet features,
ethernet,
eston,
esto,
esteban martnez,
erik dean tags,
erickson,
eric d. laspe,
epassports,
entertainment,
enough,
enjoy,
engineering workshop,
engineering tools,
engineering network,
engine,
encryption keys,
encryption,
enclosure,
emulation based,
elevator music,
electronics project,
electronic musical instruments,
electronic money,
electronic locks,
electronic discovery,
electronic access control,
electronic,
electrical signals,
electric guitar,
eight steps,
effective,
effect,
edward zaborowski,
edmonds,
editor dll,
editor,
economic history,
eckersley,
easy,
ears,
earl zmijewski,
ear warmers,
ear muffs,
ear,
e. street,
dunlop,
dunker,
duc nguyen,
dubstep,
dub,
drummer,
drum machine,
drum kit,
drum head,
drug testing,
drug event,
drug,
droid,
drivesploit,
driver chip,
drive music,
drive bys,
drawdio,
dradis,
downstairs neighbors,
douglas c. merrill,
douglas c,
doug mohney,
douchebag,
double slide,
double feature,
dos vulnerability,
doppler effect,
doppelganger,
doorbell,
door,
dont see,
dondi west,
donation,
don bailey,
dominik,
dominic spill,
dominic,
dolores zage,
dod,
docsis,
docking system,
dock,
dna,
dmx,
dll,
diy project,
ditches,
discovery kit,
discovery,
disasters,
disaster survival,
dino segovis,
dimaggio,
dillon,
digital volume control,
digital to analog converter,
digital guitar,
digital cameras,
digital camera manufacturers,
digital audio workstation,
digital audio signals,
digital audio player,
digital audio editor,
digital analog converter,
different materials,
different colored pens,
didn,
didgeridoo,
diaphragm,
dhts,
development timeline,
development kit,
deterrence,
detector,
detail work,
desktop security,
desktop computer,
desirable feature,
design contest,
design consideration,
design,
derek enos,
deobfuscator,
dennis brown tags,
dennis brown,
denial,
deniability,
demo,
demin,
deluxe,
degree panoramic views,
degree,
defense mechanisms,
defense,
defcon,
def,
decorative fabric,
decompilers,
decoder chips,
decibels,
decibel,
deceiving,
debraj,
deblaze,
death of a thousand cuts,
death,
dead battery,
de gustibus,
dcflux,
dc jack,
dbpoweramp,
david weston tags,
david weston,
david rook,
david litchfield,
david kerb,
david kennedy,
david hulton,
david dagon,
david cowan,
david c. smith,
david c smith,
david byrne,
david bryan michael anderson tags,
david bryan,
david aslanian,
dave maynor,
dave king,
dave aitel,
dave,
data mining,
data encryption standard,
data,
dashboard,
dark,
danny quist,
daniel domscheit ,
daniel burroughs,
dangerous waters,
dangerous minds,
dang,
dan hemingson,
dan boneh,
dan,
dagon,
dac chip,
d.r. software,
d. degree,
d day,
cylinder,
cyberterrorism,
cyberspace,
cybercrime,
cyber warfare,
cyber war,
cyber security,
cyber defense,
cyber crime,
cyber army,
cyber,
current state,
current,
cube,
ctf,
csrf,
cryptographic authentication,
crt,
crossover,
crossfader,
cross,
critical vulnerability,
critical infrastructure,
crime war,
crime,
crenshaw,
credit cards,
creating music,
crawling,
crash space,
crash proof,
crash,
craig heffner,
crafting,
coworkers,
covert channel,
course authors,
counterlobbying,
countering,
cost,
corporate,
cornell,
convexsoft,
convertor,
conversion,
controversial,
controller,
control panel 1,
control,
contest submission,
content authors,
content,
consumer credit reporting agencies,
consciousness,
confidence game,
confidence,
concurrency,
concept,
con kung ,
con groups,
con,
computer security,
computer science degree,
computer organization,
computer motherboard,
computer architectures,
composing music,
company,
companion,
compact,
communication protocols,
communication channels,
commodore64,
color organ,
color,
collin mulliner,
collegiate,
collective eye,
collaborative,
collaboration engine,
colin ames,
cold boot,
cold,
coil,
cognitive,
codec,
code obfuscation,
code execution,
code,
cloud,
clobbering,
clip,
client side,
client platforms,
client,
clever one,
clay,
classmates,
class d audio amplifier,
class d amplifier,
clap your hands,
clap,
city,
citrix,
ciso,
cisco ios,
cisco event,
cisco,
circumventing,
circuit,
chuck taylor all stars,
chuck taylor,
christopher tarnovsky,
christopher soghoian,
christopher mooney,
christopher mitchell,
christian papathanasiou,
christian grothoff,
christian bahls,
christian,
chris tarnovsky,
chris palmer,
chris paget,
chris mckenney,
chris gates,
chris eagle,
chris conley,
chon,
children,
chief security officer,
chief security,
chet hosmer,
charlie vedaa,
charlie miller,
charles,
chaosvpn,
chan ahn,
chan,
chad,
cesar cerrudo,
centric world,
cellphone manufacturers,
cellphone,
cell phone users,
ceballos,
cavity,
cassette adapter,
cassette,
case study,
case studies,
cares,
carelessness,
cards,
card characteristics,
car audio speakers,
car,
camel through the eye of a needle,
camel,
californians,
caleb kraft,
caleb,
calca,
cabinet,
bytes,
bypassing,
button accordion,
business authors,
burroughs,
burns,
burning man festival,
bump,
bullets,
build,
bugtraq,
buffer overflow vulnerability,
buffer overflow vulnerabilities,
buffer overflow exploit,
buffer overflow,
buetler,
budd,
bsd,
bryan sullivan,
bryan,
bruno ratnieks,
bruce potter,
bruce dang,
browsers,
browser,
brown rob ragan,
brother,
bronislow,
brock roland,
bright images,
brief,
bridge,
brian krumheuer,
brian holyfield,
brevet,
breakout box,
breakout,
break,
breadboard,
braving,
brass,
brandon nesbit,
brandon dixon tags,
brandon dixon,
brand,
brains,
brad smith,
boy,
box,
bowne,
botnet,
boss,
boris,
boring class,
bored,
boot security,
board fabrication,
board,
blurring,
blum,
bluetooth module,
bluetooth headset adapter,
bluetooth headphones,
blue leds,
blocking,
blitzableiter,
blair,
blackjacking,
blackberry,
black hat,
bittorrent,
bitton,
bit,
biohacking,
bing,
binary,
billy rios,
billy hoffman,
billy,
billion dollars,
bill porter,
bill of materials,
bill,
bike computer,
bigtime,
big picture,
big,
bienfang,
biddulph,
bgp,
bezel,
beth,
best friends,
bertrand fan,
bertrand,
bending,
ben laskowski,
ben kurtz,
ben hawkes,
ben cohen,
bells and whistles,
behavior,
beat,
beach,
bayan,
battery life,
battery,
batch,
bastille,
bass,
based intrusion detection,
based computers,
barnum,
barnett,
barnaby jack tags,
bare metal,
bare,
baptiste gourdin,
band,
baltic,
ball,
balancing,
bahls,
bad memories,
bad,
backyard parties,
background noise,
backdoors,
baby,
awesome,
ava latrope,
ava,
automatic volume,
automatic browser,
automated teller machines,
auto adapting,
authentication,
aurora,
aural experience,
audio welcome,
audio web,
audio volume,
audio synthesizer,
audio streamer,
audio stations,
audio signal,
audio session,
audio search,
audio quality,
audio plugin,
audio panel,
audio mixer,
audio message,
audio manipulation,
audio inputs,
audio gallery,
audio filters,
audio file library,
audio extractor,
audio editor,
audio crossover,
audio convertor,
audio converter,
audio connector,
audio companion,
audio codec,
audio chips,
audio cassettes,
audio cabinet,
audio auto,
audio amplifier,
audio amp,
audio ads,
audible sound,
audacity,
attacks,
attackers,
attack,
asymmetric,
assortment,
assessment tool,
assessment data,
assessment,
aslanian,
asia,
artificial intelligence,
art,
arrested,
arrays,
array,
arm processor,
arkin tags,
arjun,
ariel,
arian evans,
archophone,
arcade systems,
arcade gaming,
arcade,
arc music,
arai,
approach,
application web,
application layer,
application asp,
application,
apple tv,
apple quicktime,
apple mac os,
apple lossless,
app,
ape file,
apdu,
aoa,
antonio rucci,
antoine gademer,
antique radio,
antique,
antibore,
anthropologist,
anthony lineberry,
anthony lai,
anthony,
anonymous browser,
anonymous,
anonymity privacy,
annoy,
anna,
anguiano,
android,
andrew whitaker,
andrew lindell,
andrew kongs,
andrea barisani,
anatomy,
analysis,
analog telephone,
analog tape,
analog input,
analog,
an6884,
amplifier circuit,
amplifier,
amplification,
amp,
amount of time,
amit,
amf,
american readers,
alternative medicine,
alternative,
altarsoft,
alonso jose palazon,
alonso,
allowed,
allomani,
all,
algorithms,
alfredo ortega,
alexander tereshkin,
alexander sotirov,
alexander klink,
alex stamos,
alex nash,
alex ionescu,
alek amrani,
alarm clock,
airport express,
airport,
air traffic control,
air interface,
air,
aicap,
aic,
ahn,
ahmad tags,
advanced,
adrian crenshaw,
admirable goal,
adequacy,
adapter,
adam savage,
adam pridgen,
adam laurie tags,
adam laurie,
adam,
adair,
activex controls,
active x,
acoustica mp3 audio mixer,
acoustica,
academic research community,
abusing,
abuse,
abstract time,
abraham tags,
about,
abbs,
aaron newman,
aaron,
aapl,
Soporte,
Release,
Hardware,
General,
Discussion,
ARM,
9v battery,
5 years,
36 stratagems,
0 day
Skip to page:
1
2
3
...
5
-
-
4:00
»
Hack a Day
[Don] bought some off-brand Bluetooth earbuds online that actually sound pretty good. But while it’s true that they don’t require wires for listening to tunes, the little storage/charging box they sleep in definitely has a micro USB port around back. Ergo, they are not truly wireless. So [Don] took it upon himself to finish what the manufacturer started. Because it’s 2019, and words have meaning.
Finally, he had a use for that Qi charger he’s had lying around since the Galaxy S5 era. [Don] pried the earbud case open with a guitar pick and found a nicely laid-out charging circuit board without any black goop.
Once he located ground and Vcc pads, it was just a matter of performing a bit of surgery on the coil’s pins so he could solder wires there instead. Miraculously, the Qi coil fit perfectly inside the bottom of the case and the plastic is thin enough that it doesn’t interfere with the charging.
Want to try it for yourself? [Don]’s done an excellent job of documenting this hack, with clear pictures of every step. Soon you’ll be able to rid yourself of all those pesky USB cables.
Of course, [Don] still has to plug the charging base into the wall. If he ever wanted to add another level of wireless, he could always retrofit the base coil into his laptop.
-
1:00
»
Hack a Day
We’ve always felt that sections of PVC pipe from the home improvement store are a criminally underutilized construction material, and it looks like [Troy Proffitt] feels the same way. Rather than trying to entirely 3D print the enclosure for his recently completed portable Bluetooth speaker, he combined printed parts with a piece of four inch pipe from the Home Depot.
While using PVC pipe naturally means your final hardware will have a distinctly cylindrical look, it does provide compelling advantages over trying to print the entire thing. For one, printing an enclosure this large would have taken hours or potentially even days. But by limiting the printed parts to accessories like the face plate, handle, and caps, [Troy] reduced that time considerably. Of course, even if you’re not in a rush, it’s worth mentioning that a PVC pipe will be far stronger than anything your desktop FDM printer is likely to squirt out.
[Troy] provides links for all the hardware he used, such as the speakers, tweeters, and the Bluetooth audio board itself. The system is powered by an 1800 mAh 3S RC-style battery pack that he says lasts for hours, though he also links to a wall adapter that can be used if you don’t mind being tethered. Unfortunately it doesn’t look like he has any internal shots of the build, but given the relatively short parts list, we imagine it’s all fairly straightforward inside.
While this is certainly a respectable looking build considering it started life in the plumbing aisle, we have to admit that we’ve seen some portable Bluetooth speakers with fully 3D printed enclosures in the past that looked absolutely phenomenal. The tradeoff seems pretty clear: reuse existing materials to save time, print them if you don’t mind reinventing the wheel occasionally.
-
-
1:00
»
Hack a Day
The guitar ‘Toing’ sound from the ’70s was epic, and for the first time listener it was enough to get a bunch of people hooked to the likes of Aerosmith. Reverb units were all the rage back then, and for his DSP class project, [nebk] creates a reverb filter using Matlab and ports it to C++.
Digital reverb was introduced around the 1960s by Manfred Schroeder and Ben Logan. The system consists of essentially all pass filters that simply add a delay element to the input signal and by clubbing a bunch together and then feeding them to a mixer. The output is then that echoing ‘toing’ that made the ’80s love the guitar so much. [Nebk]’s take on it enlists the help of the Raspberry Pi and C++ to implement the very same thing.
In his writeup, [nebk] goes through the explaining the essentials of a filter implementation in the digital domain and how the cascaded delay units accumulate the delay to become a better sounding system. He also goes on to add an FIR low pass filter to cut off the ringing which was consequent of adding a feedback loop. [nebk] uses Matlab’s filter generation tool for the LP filter which he includes the code for. After testing the design in Simulink, he moves to writing the whole thing in C++ complete with the filter classes that allows reading of audio files and then spitting out ‘reverbed’ audio files out.
The best thing about this project is the fact that [nebk] creates filter class templates for others to play with. It allows those who are playing/working with Matlab to transition to the C++ side with a learning curve that is not as steep as the Himalayas. The project has a lot to learn from and is great for beginners to get their feet wet. The code is available on [GitHub] for those who want to give it a shot and if you are just interested in audio effects on the cheap, be sure to check out the Ikea Reverb Plate that is big and looks awesome.
-
-
1:01
»
Hack a Day
There are times when being seen to listen to music through headphones might get you into trouble. For these moments, reach for a handy solution: bone conduction speakers that discreetly pipe the music to your eardrums through the bone of your skull. [Samuel] wanted just such a covert music listening device, so created his own in a set of 3D-printed glasses.
He first tried using an Adafruit bone-conducting transducer but found that to be too bulky. What you see here is a smaller module that [Samuel] found on AliExpress (search for bone conduction module). The GD-02 is much smaller and thus more suitable for hiding in the arm of a pair of glasses. For the rest of the electronics he used a PCB and battery from a donated set of broken Bluetooth headphones, a space for which he was able to conceal easily in the 3D-printed frame of the glasses. The battery is in one arm and the board in the other, and he says the wiring was extremely fiddly.

The result is a surprisingly svelte set of specs that you might not immediately think concealed some electronics. His choice of bright yellow filament might give the game away, but overall he’s done a great job. This certainly isn’t the first bone conduction project we’ve shown you, some of the others have used motors instead of bone conduction transducers.
-
-
7:00
»
Hack a Day
Streaming music may now come from somewhere in the cloud to an app on your phone and be sent to the client built in to almost every entertainment device you own, but there was a time when the bleeding edge lay in dedicated streaming device that connected to your existing …read more
-
-
7:00
»
Hack a Day
The Compact Disc is 40 years old, and for those of us who remember its introduction it still has that sparkle of a high-tech item even as it slides into oblivion at the hands of streaming music services.
If we could define a moment at which consumers moved from analogue …read more
-
-
22:00
»
Hack a Day
When it comes to audio, the number of speakers you want is usually governed by the number of tracks or channels your signal has. One for mono, two for stereo, four for quadrophonic, five or more for surround sound and so on. But all of those speakers are essentially playing different tracks from a “single” audio signal. What if you wanted a single audio device to play eight different songs simultaneously, with each song being piped to its own speaker? That’s the job [Devon Bray] was tasked with by interdisciplinary artist [Sara Dittrich] for one of her “Giant Talking Ear” …read more
-
-
10:01
»
Hack a Day
What if I told you that you can get rid of your headphones and still listen to music privately, just by shooting lasers at your ears?
The trick here is something called the photoacoustic effect. When certain materials absorb light — or any electromagnetic radiation — that is either pulsed or modulated in intensity, the material will give off a sound. Sometimes not much of a sound, but a sound. This effect is useful for spectroscopy, biomedical imaging, and the study of photosynthesis. MIT researchers are using this effect to beam sound directly into people’s ears. It could lead to …read more
-
-
11:30
»
Hack a Day
We (and by extension, you) have seen the Raspberry Pi crammed into nearly every piece of gear imaginable. Putting one inside a game console is to popular it’s bordering on a meme, and putting them into old stereos and other pieces of consumer electronics isn’t far behind. It’s always interesting to see how hackers graft the modern Raspberry Pi into the original hardware, but we’ll admit it can get a bit repetitive. So how about somebody scratch building an enclosure for their jukebox project?
[ComfortablyNumb] took the road less traveled when he created this very nice wooden Raspberry Pi enclosure …read more
-
-
13:00
»
Hack a Day
It seems a reasonable assumption that anyone who’d be willing to spend a few hundred dollars on a pair of headphones is probably the type of person who has a passion for high quality audio. That, or they work for the government. We’re fairly sure [Daniel Harari] falls into that former category though, given how much thought he gave to adding a decent microphone to his Sennheiser HD650 headphones.
Not happy with the results he got from microphones clipped to his shirt or mounted on a stand, [Daniel] realized what he really wanted was a sensitive boom microphone. This would …read more
-
-
1:00
»
Hack a Day
There was a time when any hi-fi worth its salt had a little row of sliders on its front panel, a graphic equalizer. On a hi-fi these arrays of variable gain notch filters were little more than a fancy version of a tone control, but in professional audio and PA systems they are used with many more bands to precisely equalise a venue and remove any unwanted resonances.
On modern hi-fi the task is performed in software, but [Grant Giesbrecht] wanted an analogue equalizer more in the scheme of those fancy tone controls than the professional devices. His …read more
-
-
13:00
»
Hack a Day
A stereo setup assumes that the listener is physically located between the speakers, that’s how it can deliver sound equally from both sides. It’s also why the receiver has a “Balance” adjustment, so the listener can virtually move the center point of the audio by changing the relative volume of the speakers. You should set your speaker balance so that your normal sitting location is centered, but of course you might not always be in that same position every time you listen to music or watch something.
[Vije Miller] writes in with his unique solution to the problem of the …read more
-
-
8:00
»
Hack a Day
With all due respect to the hackers and makers out there that provide us with all these awesome projects to salivate over, a good deal of them tend to prioritize functionality over aesthetics. Which isn’t a bad thing necessarily, and arguably better than the alternative. But for many people there’s a certain connotation around DIY, an impression that the final product is often a little rough around the edges. It’s usually cheaper, maybe even objectively better, but rarely more attractive.
Which makes builds like this absolutely beautiful 3D printed Bluetooth speaker by [Ahmsville] especially impressive. Not only did he engineer …read more
-
-
16:00
»
Hack a Day
Sometimes a mix of old and new is better than either the old or new alone. That’s what [Brad Carter] learned when he was given an old 1990s sound board with a noisy SCSI drive in it. In case you don’t know what a sound board is, think of a bunch of buttons laid out in front of you, each of which plays a different sound effect. It’s one way that radio DJ’s and podcasters intersperse their patter with doorbells and car crash sounds.
Before getting the sound board, [Brad] used a modern touchscreen table but it wasn’t responsive enough …read more
-
-
19:00
»
Hack a Day
Once relegated to the proverbial Linux loving Firefox user, ad blocking has moved into public view among increased awareness of privacy and the mechanisms of advertising on the internet. At the annual family gathering, when That Relative asks how to setup their new laptop, we struggle through a dissertation on the value of ad blockers and convince them to install one. But what about mediums besides the internet? Decades ago Tivo gave us one button to jump through recorded TV. How about the radio? If available, satellite radio may be free of The Hated Advertisement. But terrestrial radio and online …read more
-
-
11:30
»
Hack a Day
Even though it’s now a forgotten afterthought in the history of broadcasting technology, we often forget how innovative the TiVo was. All this set-top box did was connect a hard drive to a cable box, but the power was incredible: you could pause live TV. You could record shows. You could rewind TV. It was an incredible capability, that no one had ever seen before. Of course, between Amazon and Netflix and YouTube, no one watches TV anymore, and all those platforms have a pause button, but the TiVO was awesome.
There is one bit of broadcasting that still exists. …read more
-
-
22:01
»
Hack a Day
Ultrasonic phased arrays are one of the wonders of the moment, with videos of small items being levitated by them shared far and wide. We’ve all seen them and some of us have even wondered about building them, but what about the practical considerations? Just how would you drive a large array of ultrasonic transducers, and how would you maintain a consistent phase relationship between their outputs? It’s a problem [Niklas Fauth] has been grappling with over the three iterations so far of his ultrasonic phased array project, and you can follow his progress on the latest build.
The arrays …read more
-
-
7:01
»
Hack a Day
Given its appearance in one form or another in all but the cheapest audio gear produced in the last 70 years or so, you’d be forgiven for thinking that the ubiquitous VU meter is just one of those electronic add-ons that’s more a result of marketing than engineering. After all, the seemingly arbitrary scale and the vague “volume units” label makes it seem like something a manufacturer would slap on a device just to make it look good. And while that no doubt happens, it turns out that the concept of a VU meter and its execution has some serious …read more
-
-
1:00
»
Hack a Day
Sound eXchange, or SoX, the “Swiss Army knife of audio manipulation” has been around for as long as the Linux kernel, and in case you’re not familiar with it, is a command line tool to play, record, edit, generate, and process audio files. [porkostomus] was especially interested about the generating part, and wrote a little shell script that utilizes SoX’s built-in synthesizer to compose 8-bit style music.
The script comes with a simple yet straightforward user interface to record the lead and bass parts into a text file, and play them back later on. Notes from C2 to C5 are …read more
-
-
8:31
»
Hack a Day
Many of us have aspirations of owning a tube amp. Regardless of the debate on whether or not tube audio is nicer to listen to, or even if you can hear the difference at all, they’re gorgeous to look at. However, the price of buying one to find out if it floats your boat is often too high to justify a purchase.
[The Post Apocalyptic Inventor] has built a stereo tube amplifier in the style of the Fallout video games. The idea came when he realised that the TK 125 tape recorder manufactured by Grundig was still using tube audio …read more
-
-
7:01
»
Hack a Day
A few summers of my misspent youth found me working at an outdoor concert venue on the local crew. The local crew helps the show’s technicians — don’t call them roadies; they hate that — put up the show. You unpack the trucks, put up the lights, fly the sound system, help run the show, and put it all back in the trucks at the end. It was grueling work, but a lot of fun, and I got to meet people with names like “Mister Dog Vomit.”
One of the things I most remember about the load-in process was running …read more
-
-
8:30
»
Hack a Day
There’s a lot of fun to be had in modernizing an old boombox but what about turning one of those ubiquitous shelf speakers into a portable boombox, complete with a handle for carrying? That’s what [GreatScott] did when a friend gave him a just such a shelf speaker.
These days you’d very likely use your phone as the audio source so he included a 20 watt stereo class D amplifier which could be disconnected at the throw of a switch if not needed. To power the amplifier he used 16 18650 lithium-ion batteries which were leftover from previous projects. He …read more
-
-
4:00
»
Hack a Day
There’s a school of thought that says complexity has an inversely proportional relation to reliability. In other words, the smarter you try to make something, the more likely it is to end up failing for a dumb reason. As a totally random example: you’re trying to write up a post for a popular hacking blog, all the while yelling repeatedly for your Echo Dot to turn on the fan sitting three feet away from you. It’s plugged into a WeMo Smart Plug, so you can’t even reach over and turn it on manually. You just keep repeating the same thing …read more
-
-
16:00
»
Hack a Day
[KaZjjW] wanted to retrofit a pair of nicely styled vintage headphones to be able to play wirelessly over Bluetooth. In principle this is an easy task: simply stick a Bluetooth audio receiver on the line-in, add a battery, and you’re all set. However, [KaZjjW] wanted to keep the aesthetic changes to the headphones at an absolute minimum, retaining the existing casing and volume control, whilst cramming the electronics entirely inside and out of sight.
With the inherent space constraints inside the cups of the headphones, this proved to be quite a challenge. The existing volume potentiometer which hung half outside …read more
-
-
22:00
»
Hack a Day
Have you ever seen something and instantly knew it was something you wanted, even though you weren’t aware it existed a few seconds ago? That’s how we felt when we received a tip about Zynthian, a fully open source (hardware and software) synthesizer. You can buy the kit online directly from the developers, or build your own from scratch using their documentation and source code. With a multitude of filters, effects, engines, and essentially unlimited upgrade potential, they’re calling it a “Swiss Army Knife of Synthesis”. We’re inclined to agree.
At the most basic level, the Zynthian is a Raspberry …read more
-
-
22:00
»
Hack a Day
Following time backward, for portable music we’ve had iPods, CDs, and cassette tapes which we played using small Walkmans around the size of a cigarette box. And for a brief time before that, in the 1960s and 1970s, we had 8-track tapes. These were magnetic tapes housed in cases around the size of a large slice of bread. Car dashboards housed players, and they also came in a carry-around format like the one [Todd Harrison] recently bought at a Hamfest for $5 and made more portable by machining clips for a strap and adding a headphone jack.
But before hacking …read more
-
13:00
»
Hack a Day
This delightful marketing ploy requires the listener to fabricate their own record out of ice. The band Shout Out Louds wanted to make a splash with their newest single. So they figured out how to make a playable record out of ice. The main problem with this is the grooves start to degrade immediately when [...]
-
-
15:00
»
SecDocs
Tags:
rootkit Event:
DEFCON 7 Abstract: What will we be doing? R0xiN the HAU-aus, BIzaTch!!!@@!2121lf... But that goes with out saying. In addition to the rocking of the aforementioned house, we will also be releasing BO2k. We won't reveal our sekrets of BO-Fu, but trust me when we tell you that it will make BackOrifice v1.0 look like LOGO for the TI99/4a.
-
-
21:33
»
SecDocs
Tags:
law Event:
DEFCON 6 Abstract: As policy and the economics of a world wide economy force us to attempt an information based economy, the manufactured concept of Intellectual Property becomes paramount.
-
21:33
»
SecDocs
-
7:09
»
SecDocs
-
7:09
»
SecDocs
Authors:
Dan Veeneman Tags:
satellite Event:
DEFCON 6 Abstract: Several low earth orbiting satellite systems are already in orbit, and commercial service is just around the corner. Global wireless voice and data services will be available from handheld terminals.
-
7:08
»
SecDocs
-
7:01
»
Hack a Day
[Bogdan] received this set of Serioux Panda speakers as a gift. I turns out that they sound very good and he decided to make them more useful to him by converting them to work as Bluetooth speakers. To begin with he bought the cheapest A2DP device he could find. This is the protocol that identifies [...]
-
9:01
»
Hack a Day
[Jacken] loves his lossless audio and because of that he’s long been a fan of Squeezebox. It makes streaming the high-bitrate files possible. But after Logitech acquired the company he feels they’ve made some choices which has driven the platform into the ground. But there is hope. He figured out how to use a Raspberry [...]
-
5:01
»
Hack a Day
[Michael] wanted a stereo that he could use outside, be it at the beach, beside the pool, or while tailgating. He decided to build this boom box himself, and didn’t cut any corners when it came to a professional looking finish. Because of the locale in which he plans to use the stereo he went [...]
-
12:01
»
Hack a Day
[Reza] continues his work with the remote control protocol for a Touch Tunes Jukebox. This time around he had a universal remote PCB fabricated and wrote code to skip to the next track. Regular readers will remember that he started by making an Arduino transmit all possible remote codes to give him free credits. This [...]
-
4:00
»
Hack a Day
Not since the great jukebox war of 2007 has anyone been as dangerous as a drunken friend with a wallet full of one dollar bills. Now whenever [Reza] goes out to the pub, he can play tracks on the TouchTune jukebox for free. TouchTune jukeboxes are basically a computer with a touch screen monitor connected [...]
-
-
11:01
»
Hack a Day
[Florian Amrhein] made use of some old hardware to build his own internet radio in a 1930′s radio case. The original hardware is a tube-amplified radio which he picked up on eBay. There’s tons of room in there once he removed the original electronics and that’s a good thing because he crammed a lot of [...]
-
8:01
»
Hack a Day
Seriously, nothing says ‘Look at me!’ like these headphones. [Yardley Dobon] added a rainbow of colored electroluminescent wire to his headphones and made them pulse to the music. The video after the break shows the headphones bumping to the tunes. This is one of two versions of the project, the other runs the EL wire [...]
-
-
10:01
»
Hack a Day
Here are two different briefcase speaker projects. [Dale] built the offering on the right back in high school and the upgraded version 2.0 more recently. He was inspired to send in a tip for the projects after seeing yesterday’s suitcase full of tunes. The first version uses a pair of speakers pulled out of a [...]
-
8:01
»
Hack a Day
[Texane] picked up a 2.4 GHz transmitter/receiver pair for transmitting sensor data wirelessly. After using them in a project he wanted to try pushing them a bit to see what the limits are when it comes to higher bandwidths. He ended up building a wireless speaker that transmits audio at about 90 KB/s. That link [...]
-
-
15:01
»
Hack a Day
Take the party with you by building your own boomcase. It’s an amplifier and set of speakers built into luggage. It uses an audio jack to connect to your favorite music player, and with a bit of added protection — like grills for those speakers — it could still be gently used to transport your [...]
-
-
11:25
»
Hack a Day
[Alex] just bought a really nice TEAC VR-20 audio recorder, a very capable recorder perfect for recording your thoughts or just making concert bootlegs. This model was recently replaced by the Tascam DR-08 audio recorder. It’s essentially the same thing, but the Tascam unit can record at 96kHz, whereas the TEAC can only record at [...]
-
-
12:01
»
Hack a Day
This VU meter uses Nixie tubes as the display. There are a total of fourteen IN-13 bar graph tubes that map out the audio spectrum. The build uses purely hardware for the display; no microcontroller processing, or dedicated VU-meter chips were used. Input begins with a dual Op-Amp along with a pair of potentiometers which [...]
-
-
10:31
»
Hack a Day
[Michael Clemens] was looking for gifts for his Grandmother’s 90th Birthday. She is visually impaired and loves to be able to listen to audiobooks. The problem is that she doesn’t really get the hang of using electronics. He made things easy by building her a one-button audiobook player. The Raspberry Pi board is a perfect [...]
-
9:31
»
Hack a Day
[Gregory Charvat] decided to see what he could do with this old Police radar gun. It is an X-band device that broadcasts continuous waves and measures the Doppler shift as they echo back. He cracked it open to see if he could interface the output with a computer. After a little poking around he’s able to get [...]
-
12:01
»
Hack a Day
Believe it or not, this VK5JST aerial analyzer kit is going to rickroll you. [Erich] wanted to see if he could use the device in a different way. His adventure led him to use it to feed different tones to an AM radio, producing the all too familiar [Rick Astley] offering. There’s a fair bit of math that [...]
-
-
21:33
»
SecDocs
Authors:
Clifford Wolff Tags:
buffer overflow Event:
Chaos Communication Congress 18th (18C3) 2001 Abstract: Using examples under Linux (IA-32) I will demonstrate how buffer overflow attacks work and how to implement them. I will explain the technical background and present “recipes”. Additionally, I will demonstrate the most important tools to prevent buffer overflow attacks. You should know about C to follow my talk.
-
21:33
»
SecDocs
-
-
21:47
»
SecDocs
Authors:
Joseph Pelrine Tags:
software development Event:
Chaos Communication Congress 18th (18C3) 2001 Abstract: Few new technologies have so polarized the computer world in the past years as much as eXtreme Programming has. Is it a new breakthrough in methodology, or just hype? This talk presents the basic principles and practices of eXtreme Programming, lets you ask questions, and gives you the chance to decide for yourself.
-
21:47
»
SecDocs
-
-
21:55
»
SecDocs
Authors:
Nils Magnus Tags:
penetration testing Event:
Chaos Communication Congress 19th (19C3) 2002 Abstract: Hacking used to be an art; one may get the impression that this turned recently in other questions of, say how many toolz you have and which systems you own. Within our presentation we will demonstrate hacking approaches with little or even no tools at all. Given a reasonable number of standard operating system utilities, much information about a network can be obtained and several hacks deem possible. This is no presenation of cutting-edge techniques, most of the approaches have been possible since many years/for a long time. However, we will not explain what TCP/IP means or how to calculate a netmask. Targetetd to an audience that knows what networking is all about but wishes to see more obfruscated means of using well-known utilities. During the hands-on session we will explain and demonstrate how we can draw maps of segments with traceroute, how to identify filtered hosts with ping and arp, how to do IP spoofing and segment invasion with ifconfig or how to get some more reliable information about a webserver. We conclude with a discussion of the feasibility of this approach, identify useful tools that can be of effective help and name those which mainly keep you stupid whilst they do not do any better.
-
21:55
»
SecDocs
Authors:
Stefan Sels Tags:
spam Event:
Chaos Communication Congress 19th (19C3) 2002 Abstract: SPAM is a growing problem that is hard to fight. On the one hand you want to communicate with everybody, on the other hand you don´t want to be filled up with SPAM. To fight spam effectifly there are some server and clientside solutions which help and put some mails into the trash by their own.
-
21:55
»
SecDocs
-
-
21:30
»
SecDocs
-
-
21:56
»
SecDocs
-
21:56
»
SecDocs
-
10:40
»
SecDocs
Authors:
Christian Carstensen Tags:
network Event:
Chaos Communication Congress 20th (20C3) 2003 Abstract: An introduction to the features and capabilities of the computer network at 20C3. We explain how to use IPsec, IPv6 and 802.11a and 802.11b wireless networks.
-
-
21:29
»
SecDocs
Authors:
Tim Pritlove Tags:
hacking Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: The final get-together looking back at three days of genuine hacking experience at bcc. 21C3 tried to reinvent the Congress in a couple of ways. Did we succeed? Could we do better? Of course we can, but looking ahead to 22C3 should bring us finally on the road to a true international event that serves the community as one of the best and funniest events on this planet.
-
-
21:51
»
SecDocs
Authors:
Maik Hentsche Tags:
firewall Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: IT will be shown how IPv4 based protocols can be used to tunnel data through Firewalls while maintaining RFC compatibility. The goal is to show a broad spectrum of techniques. However, a few examples are presented in more detail.
-
-
21:51
»
SecDocs
Authors:
Thorsten Holz Tags:
honeypot Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Current Honeypot-based tools have a huge disadvantage: Attackers can detect honeypots with simple techniques and are to some extent also able to circumvent and disable the logging mechanisms. On the basis of some examples, we will show methods for attackers to play with honeypots. Honeypots / Honeynets are one of the more recent toys in the white-hat arsenal. These tools are usually assumed to be hard to detect and attempts to detect or disable them can be unconditionally monitored. The talk sheds some light on how attackers usually behave when they want to defeat honeypots. We will encompass the process of identifying and circumventing current honeypot technology and demonstrate several ways to achieve this. The focus will be on Sebek-based honeypots, but we will also show some ways how to accomplish similar results on different honeypot-architectures. Upon completion of this lecture, the attendees will have some insight in the limitations of current honeypot technology. Individuals or organization that would like to setup or harden their own lines of deception-based defense with the help of honeypots will see some constraints on the reliability and stealthiness of honeypots. On the other side, people with more offensive mindsets will get several ideas on how to identify and exploit honeypots.
-
-
21:28
»
SecDocs
Authors:
Lars Eilebrecht Tags:
mail cryptography Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: A technical introduction to Ciphire Mail, a new email encryption solution. We will discuss the design, concept, and technical aspects of the system, and demonstrate how usability, security, and trust mechanisms are improved.
-
3:28
»
SecDocs
Tags:
hardening Linux Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: An introduction to the hardened toolchain used at the Hardened Gentoo project, which, combined with the PaX kernel, strong DAC/MAC control mechanisms and a thorough low-entry oriented user documentation provides "full scale" protection for a wide range from home users to enterprise businesses.
-
-
9:41
»
SecDocs
Authors:
Josef Spillner Tags:
Linux Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Overview about the young and still developing Free Software scene in South and Latin America (mostly Brazil), ways to achieve independence of existing structures, and some specific projects. While in Germany people still talk about the ongoing partial migration in Munich, which is mostly in the hands of only few companies, other places have advanced some more already: where interested citizens are part of IT migrations in both companies and organizations. Not only is this a cultural difference, but also gives all hackers the possibility to block decisions heading the wrong way, and to integrate their own perspective.
-
9:41
»
SecDocs
Authors:
Stefan Arentz Tags:
embedded Linux Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: More and more devices like wireless access points, personal network storage servers or satellite decoders are powered by Linux. Some vendors are even publicly distributing the (base) source code for their products. This session will show the details of embedded Linux and how you can change these devices to your own needs.
-
-
16:07
»
SecDocs
Authors:
Peter Panter Tags:
phishing Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Phishing became a serious problem in 2004 with media coverage even in non-technical context. The lecture will gather the incidents, shows common attacks-techniques and tries to give a prognosis for the near future.
-
-
8:41
»
SecDocs
Authors:
Tim Pritlove Tags:
social Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Please join us as we look back to what happened and look forward to what's next on our agenda.
-
-
21:52
»
SecDocs
Authors:
Paul Böhm Tags:
secure development Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: This talk will introduce new strategies for dealing with entire bug classes, and removing bug attractors from development environments.
-
7:44
»
Hack a Day
Parabolic microphones are used to listen in from a distance. You see them on the sidelines of NFL football games, but they’re part of the standard issue in detective and spy novels. Now you can build your own parabolic microphone by following this example. The one component that may be hard to find is the [...]
-
-
5:01
»
Hack a Day
This anime character is dancing to the music thanks to some animatronic tricks which [Scott Harden] put together. She dances perfectly, exhibiting different arm and head movements at just the right time. The secret to the synchronization is actually in the right channel of the audio being played. The character in question is from an [...]
-
5:01
»
Hack a Day
[Sam] picked up a Sansa Clip audio player to listen to some tunes while working on projects. He liked the fact that he could run the Rockbox alternative firmware on the device, but thought the 15 hour battery life needed some improving. He swapped out the stock cell with a larger Lithium cell for a [...]
-
-
3:11
»
Packet Storm Security Exploits
WordPress Tierra Audio third party plugin suffers from full path disclosure and directory listing vulnerabilities. Note that this finding houses site-specific data.
-
3:11
»
Packet Storm Security Recent Files
WordPress Tierra Audio third party plugin suffers from full path disclosure and directory listing vulnerabilities. Note that this finding houses site-specific data.
-
3:11
»
Packet Storm Security Misc. Files
WordPress Tierra Audio third party plugin suffers from full path disclosure and directory listing vulnerabilities. Note that this finding houses site-specific data.
-
-
2:52
»
SecDocs
Authors:
Dan Kaminsky Tags:
TCP/IP Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: I will discuss new experiences and potential directions involving scanning massive networks, such as the entire world's DNS infrastructure. Our networks are growing. Is our understanding of them? This talk will focus on the monitoring and defense of very large scale networks, describing mechanisms for actively probing them and systems that may evade our most detailed probes. We will analyze these techniques in the context of how IPv6 affects, or fails to affect them.
-
-
13:52
»
SecDocs
Authors:
Achim Friedland Daniel Kirstenpfad Tags:
network GSM phone Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: We are giving an overview of ip networks used for >=2.5G technologies. Our main focus is on scanning the overlaying ip network, on different Voice-over-IP filter implementations and the possibilities to circumvent them. We want to explain the ip networks used in GPRS and UMTS cellular networks from the enduser point of view. How do they work today and what has to be done to get a normal webpage, voice-over-ip or even a video stream onto your PDA or SmartPhone. For your private investigations inside your providers ip network we want to demonstrate you a tcp/udp port and round-trip-time based traceroute program based on the .NET compact framework. With the help of this program we want to analyse the anti voice-over-ip filters implemented by different cellular providers and show you some possibilities how to circumvent them _efficently_. So we don't just tunnel all the traffic through a VPN. But even when these filters become more sophisticated in the future we want to present some ideas how to defeat your right to talk via voice-over-ip whereever and whenever you want to.
-
-
5:23
»
SecDocs
Authors:
André Rebentisch Tags:
social Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Information overflow is a general problem of today's open information infrastructures. Everything can be found on the web but unfortunately not by everyone. Getting informed about the European Union and its projects is a task which you cannot leave to the Commission's public relations department. You should better start your own investigation. European decisions effect your interests and your business. Community building, interest representation through communication and influencing public opinion is not sufficient for effective lobbying. Information superiority by better access, knowledge retrieval and social engineering techniques gives you an advantage.
-
-
12:47
»
SecDocs
Authors:
Hendrik Scholz Tags:
VoIP Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Within the last year VoIP devices and applications flooded the market. SIP (Session Initiation Protocol) became the industry standard although it's still under constant development. VoIP networks converge with the PSTN and thus offer ways and means for new (and old) attacks. The talk gives a brief introduction on how various components in the VoIP universe interact. The main part deals with implementation problems within SIP in both end user as well as ISP site devices and applications.
-
-
21:46
»
SecDocs
Authors:
Joi Ito Tim Pritlove Tags:
culture Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Introductory opening session by Tim Pritlove and keynote speech on the 22C3 topic "Private Investigations" by Joi Ito.
-
-
8:31
»
Hack a Day
Here’s a way of transmitting audio that makes it virtually impossible for someone else to listen in. Instead of sending radio waves bouncing all over creation, this uses the focused light of a laser to transmit audio. In the image above you can see the silver cylinder which houses the laser diode. It is focusing [...]
-
-
21:48
»
SecDocs
-
-
21:46
»
SecDocs
Tags:
vulnerability Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: In this presentation I'll present a series of unusual security bugs. Things that I've ran into at some point and went "There's gotta be some security consequence here". None of these are really a secret, and most of them are even documented somewhere. But apparently most people don't seem to know about them. What you'll see in this presentation is a list of bugs and then some explanation of how these could be exploited somehow. Some of the things I'll be talking about are (recursive) stack overflow, NULL pointer dereferences, regular expressions and more.
-
-
21:33
»
SecDocs
Authors:
Sandro Gaycken Tags:
social Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Civil disobedience is a fundamental human right in all democracies, and it has to be accessible for everyone. This includes the accessibility of politically laden technologies which have to be understandable and destructible. Many current technologies however refuse accessibility to lay people. Thus it becomes the ethical obligation of the technical expert to provide understanding and accessible means for the destruction of potentially dangerous technologies.
-
-
16:01
»
Hack a Day
[Matt the Gamer] loved his pair of Minimus 7 bookshelf speakers. That is until a tragic hacking accident burned out the driver and left him with a speaker-shaped paper weight. But the defunct audio hardware has been given new life as a single portable powered speaker. Now he can grab it and go, knowing that [...]
-
-
5:45
»
SecDocs
Authors:
Luis Miras Tags:
reverse engineering Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: In this talk, we will introduce the audience to the concepts involved in static analysis, and different implementations of those concepts with advantages and disadvantages of each. We will show how the open source tool bugreport (http://bugreport.sf.net) implements these concepts and will demonstrate the tool finding exploitable bugs in real-world binaries.
-
-
12:05
»
SecDocs
-
-
15:02
»
SecDocs
Authors:
Régine Débatty Tags:
privacy Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: In 1996, The Surveillance Camera Players started manifesting their opposition to the culture of surveillance by performing silent, specially adapted plays directly in front of CCTV cameras. 10 years after, their work is more relevant than ever. This talk will take you through artists' strategies to raise the debate on privacy, the society of the spectacle, the aftermath of September 11th, face recognition software, panopticism, electronic tagging, etc.
-
12:04
»
Hack a Day
This is a great project for a slow afternoon, or a beginners introduction to DIY. [William] shows off a really simple speaker project that results in a light show as well as a decent enclosure. He’s using a PVC elbow to mount the speakers. They’re just glued in place. Below that, a section of clear [...]
-
-
15:08
»
SecDocs
Tags:
hacking Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Hackerspaces are community-run places where you can meet, work on projects, organize events and workshops, or just generally hang out with other hackers. More and more of those open spaces are being created all the time. Some of them are more than a decade old already, some just started out recently, and yet others might become a reality soon. Building and running a Hacker Lab is a tough thing. This is a talk about problems encountered, and lessons learnt. In this talk you'll see pictures and hear stories from Hacklabs around the world. Some of them old, some of them new, some big, some small, some squatted, and some of them even government funded, and what problems they've encountered, and how they've dealt with them. These stories are meant to inspire, and convey the mindset and organizational structure some of those hackerspaces have learned, to build and foster their community.
-
15:00
»
SecDocs
Authors:
Roger Dingledine Tags:
Tor Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Websites like Wikipedia and Blogspot are increasingly being blocked by government-level firewalls around the world. Although many people use the Tor anonymity network to get around this censorship, the current Tor network is not designed to withstand a government-level censor. In this talk we describe a design for providing access to the Tor network that is harder to block.
-
-
13:01
»
Hack a Day
[Brattonwvu] wanted to lay down some tracks with as high an audio quality as possible. To help get rid of the noise pollution of the everyday world he built this isolation booth in his attic. The project started off with a trip to the home store for some 2×4 stock and OSB to use as [...]
-
-
21:39
»
SecDocs
Authors:
Caspar Bowden Tags:
privacy Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Microsoft has proposed architectural principles ("7 Laws of Identity") to support convergence towards an inter-operable, secure, and privacy-enhancing plurality of identity systems - an "Identity Metasystem". This new concept presupposes that a single monolithic identity system for the Internet is neither practicable nor desirable.
-
-
13:01
»
Hack a Day
[Michael Chen] liked the sound he was getting out of these Corsair SP2200 computer speakers, with one big exception. They were giving off some unpleasant crackling sounds. He figured this might be as easy as replacing a faulty potentiometer, but soon found out the fix was going to be more complicated than that. All said [...]
-
9:01
»
Hack a Day
The SoundPuddle project drives thousands of LEDs based on audio input. The team is working on a replacing the controller for this wire-filled setup with something more robust. They took the mess seen above to the Apogaea Festival and were plagued by loose wires and unreliable communications due to noise and interference. The aim of [...]
-
-
15:31
»
SecDocs
Authors:
Joshua Ellis Tags:
technology Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Most modern futurism describes technology-driven futures: the nanotech future, the biotech future, etc. But there's also another future, just as or more possible: the future where technology is marginalized by social and cultural forces (such as the rise of fundamentalism as a political force in the US and Middle East). This lecture talks about how technology and design can help humanity avoid a grim future.
-
-
11:01
»
Hack a Day
In this project [Ryan] shows how he added Bluetooth audio to the stock stereo of his Toyota Matrix. The work he did with his add-on hardware is quite good. And the installation was surprisingly easy. For example, the dashboard bezel which is hanging in the foreground of this picture simply pulls off without the need [...]
-
-
21:38
»
SecDocs
Authors:
Marco Gercke Tags:
social Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: The balance between effective criminal investigations and the protection of human rights is currently intensively discussed. A number of approaches demonstrate a tendency that state authorities gain for more access to sensitive data. But do these information really help to prevent crimes (e.g. terrorist attacks) and how save are these information in the hands of state authorities'?
-
-
14:32
»
SecDocs
-
-
21:47
»
SecDocs
Tags:
web application vulnerability Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: While many issues in web apps have been documented, and are fairly well known, I would like to shine some light on mostly unknown issues, and present some new techniques for exploiting previously unexploitable bugs. This lecture will not be an introduction to webappsec as many lectures are, so I will assume that everyone knows about common web vulnerabilities/exploits and why they are bad, and I will present a bunch of esoteric and previously unknown knowledge about how to exploit webapps, primarily those written in PHP, but some techniques are applicable to other languages, etc.
-
-
21:26
»
SecDocs
-
21:26
»
SecDocs
Authors:
Alexander Kornbrust Tags:
Oracle Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Oracle databases are the leading databases in companies and organizations. In the last 3 years Oracle invested a lot of time and engery to make the databases more secure, adding new features ... but even 2007 most databases are easy to hack. This talk will describe the current status, the typical problems in customer installations and the trends for the future for Oracle Security. I will show some scenarios how to attack (and prevent) databases, abuse Oracle security features (like Oracle Transparent Database Encryption (TDE)) and the latest trends in SQL Injection (e.g. why a table "!rm -rF /" sometimes executes code).
-
-
21:45
»
SecDocs
Tags:
vulnerability Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: This talk will be similar to my unusual bugs talk last year. I'll present a couple of completely unrelated somewhat interesting and unusual things. Hence, a random collection of them.
-
-
21:47
»
SecDocs
Tags:
hacking Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: It is thought by many that the world may be facing Peaks in fossil fuel production and catastrophic climate change. These huge problems put into question the Industrial Civilisation and call for, at the very least, massive changes to society if humanity is to survive. Do hackers have a role to play in a post transition society? What sort of things should hackers know and prepare for in such a future?
-
-
21:35
»
SecDocs
Tags:
kernel exploiting Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: The process of exploiting kernel based vulnerabilities is one of the topics which have received more attention (and kindled more interest) among security researchers, coders and addicted. Due to the intrinsic complexity of the kernel, each exploit has been mostly a story on itself, and very little work has been done into finding a general modelization and presenting general exploiting approaches for at least some common categories of bugs. Moreover, the main target has usually been the Linux operating system on the x86 architecture. This talk reprises and continues the attempt done in this direction with the Phrack64 paper “Attacking the Core: Kernel Explotation Notes” that we released six months ago. A more in-depth discussion of some Solaris kernel issue (both on x86 and SPARC) and a more detailed analysis of Race Conditions will be presented.
-
-
21:56
»
SecDocs
Authors:
Rose White Tags:
social Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: "Guerrilla knitting" has a couple of meanings in the knitting community - to some, it merely means knitting in public, while to others, it means creating public art by knitted means. Contemporary knitters feel very clever for coming up with edgy language to describe their knitting, but the truth is that for decades there have been knitters and other textile artists who are at least as punk rock as today's needle-wielders. This talk will cover the vibrant history of contemporary knitting, with a focus on projects that will make you say, "Wow, that's knitted?" Feel free to bring knitting projects to the talk - let's get some public knitting going on at the conference!
-
21:56
»
SecDocs
Tags:
hacking Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: The Open Source initiative re-interpreted Free Software to include it into the neo-liberal ideology and the capitalist economy - whose aims are contrary to the FS starting axioms/freedoms. This platform will focus on ideological and political aspects of this. It will also suggest FS recovery strategies.
-
-
15:06
»
SecDocs
Authors:
Annie Machon Tags:
intelligence Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: A presentation about the role of intelligence agencies in the current era of the unending “war on terror”, how they monitor us, the implications for our democracies, and what we can do to fight back. In the name of protecting national security, spy agencies are being given sweeping new powers and resources. Their intelligence has been politicised to build a case for the disastrous war in Iraq, they are failing to stop terrorist attacks, and they continue to collude in illegal acts of internment and torture, euphemistically called “extraordinary rendition”. Most western democracies have already given so many new powers to the spies that we are effectively living in police states. As an informed community, what can we do about this?
-
14:53
»
SecDocs
Authors:
Henryk Plötz Karsten Nohl Tags:
RFID Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Mifare are the most widely deployed brand of secure RFID chips, but their security relies on proprietary and secret cryptographic primitives. We analyzed the hardware of the Mifare tags and found weaknesses in several parts of the cipher.
-
-
14:59
»
SecDocs
-
-
15:02
»
Hack a Day
[Mike Field] was working on interfacing his TI Chronos eZ430 watch with the Raspberry Pi. As things were going pretty well, he took a side-trip from his intended hack and implemented watch-based control for an RPi audio player. It really comes as no surprise that this is possible, and even easy. After all, the RPi [...]
-
8:02
»
Hack a Day
Here [Matthew Br] explains the situation he’s in with the neighbors that share this wall of his apartment. When they listen to music they like it loud and so he gets to ‘enjoy’ the experience as well. But he can’t ignore it any longer, and has decided to use a sound volume detector to blast [...]
-
-
15:06
»
Hack a Day
[Ray] wanted to use a microcontroller to send signals to some wireless power outlets. Instead of tapping into the buttons on the remote control he is using an RF board to mimic the signals. There are two hurdles to overcome with this method. The first is to make sure your RF module operates on the [...]
-
-
21:57
»
SecDocs
Authors:
Alessio L. R. Pennasilico Raoul Chiesa Tags:
SCADA Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: SCADA acronym stand for “Supervisory Control And Data Acquisition”, and it's related to industrial automation inside critical infrastructures. This talk will introduce the audience to SCADA environments and its totally different security approaches, outlining the main key differences with typical IT Security best practices. We will analyze a real world case study related to industry. We will describe the most common security mistakes and some of the direct consequences of such mistakes to a production environment. In addition, attendees will be shown a video of real SCADA machines reacting to these attacks in the most “interesting” of ways! :)
-
-
9:01
»
Hack a Day
[Kayvon] just finished building this chiptune player based on a PIC microcontroller. The hardware really couldn’t be any simpler. He chose to use a PIC18F2685 just because it’s big enough to store the music files directly and it let him get away with not using an external EEPROM for that purpose. The output pins feed a [...]
-
-
21:31
»
SecDocs
Tags:
quantum cryptography Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Quantum cryptography is the oldest and best developed application of the field of quantum information science. Although it is frequently perceived as an encryption method, it is really a scheme to securely distribute correlated random numbers between the communicating parties and thus better described as quantum key distribution (QKD). Any attempt at eavesdropping from a third party is guarantied to be detected by the laws of physics (quantum mechanics) and shows up as an increased error rate in the transmission (the QBER).
-
-
12:01
»
Hack a Day
[Danman1453] is ready to face the rest of his summer thanks to this toolbox boombox he built for outside use. It’s always nice to have some tunes when laboring at those not-so-fun jobs (we’ve got some windows that need re-glazing and you can bet we’re not doing that in silence). But if you can’t really hear it [...]
-
-
21:27
»
SecDocs
-
21:27
»
SecDocs
Tags:
network management Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: The Internet Corporation for Assigned Names and Numbers (ICANN) needs to include users in its policy making: We propose and discuss tactics to hack the individual into the system.
-
-
21:47
»
SecDocs
Authors:
Dan Kaminsky Tags:
DNS Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: DNS Rebinding has proved itself to be an effective mechanism for turning standard web browsers into proxy servers. This talk will go into further depth regarding mechanisms for hijacking browser connectivity, and will illustrate some new tricks for measuring network neutrality. Having already shown some basic aspects of this attack at previous conferences, we'll be expanding DNS rebinding to show demos not dependent on Flash - specifically, we'll be going after home routers that really, really need to stop having default passwords.
-
-
21:34
»
SecDocs
Authors:
Meike Richter Tags:
corporate management Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Happy digital world: Everything is information, and it grows by sharing. Scarcity seems to be a problem of the "meatspace". On the internet, there is space for everybody, for every activity and for every opinion. Really? This lectures explores the power of intellectual property rights, the principle of net neutrality and surveillance issues and explains their impact on everyday (digital) life. The net as we know it is in danger. What is needed to make it stay a resource which is valuable, open and free for everybody? How could a concept of digital sustainability look like?
-
-
21:48
»
SecDocs
Tags:
hacking brain microcontroller Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Learn how to make cool things with microcontrollers by actually making fun projects at the Congress -- blink lights, hack your brain, move objects, turn off TVs in public places -- microcontrollers can do it all. Ongoing workshops each day of the Congress.
-
-
21:28
»
SecDocs
Authors:
Arien Vijn Tags:
network sniffer Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: There are many open source tools available to do packet capturing and analysis. Virtually all networkers use these tools. However millions of packets per seconds are just too much for general-purpose hardware. This is a problem as 10 Gigabit networks allow for millions of packets per second.
-
-
21:35
»
SecDocs
Authors:
Rose White Tags:
social Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: I'm planning to look at how hackers and other "folks like us" get the "real world" to let us be crazy deviants, and continue to pay us anyway. Clearly not everyone is able to do this - hence the sort of person who says, "I'd love to [go to Burning Man] [blow things up] [dress eccentrically]" but never does any of it. But some of us are able to get the world to play along, and I am looking at that from a sociological point of view.
-
-
21:31
»
SecDocs
-
21:31
»
SecDocs
Authors:
Dan Kaminsky Tags:
DNS web SSL voting machine Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: SSL wasn't enough. Encryption is nonexistent. Autoupdaters are horribly broken. Why is all this the case?
-
21:31
»
SecDocs
Authors:
Thomas Eisenbarth Timo Kasper Tags:
hardware hacking lockpicking Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: We demonstrate a complete break of the KeeLoq crypto-system. Thanks to Power Analysis, even non-specialists can gain access to objects secured by a KeeLoq access control system.
-
21:31
»
SecDocs
Authors:
Tobias Engel Tags:
phone locating Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: You are used to your mobile phone number following you around the globe. But the same functionality that makes you reachable worldwide can also be used to track your whereabouts down to city-level – without you ever knowing about it.
-
-
21:43
»
SecDocs
Tags:
terrorism Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: At the latest since 9/11, the EU took severe changes in their home affairs policy. New agreements and institutions were created to facilitate police networking (Europol, Frontex, CEPOL, new databases and their shared access). The european "cross border crime fighting" has become an EU framework. Providing that this should help to win a "war on terrorism", lots of the changes follow the US model of "Homeland Security". Risks" should be minimized by taking more and more "proactive" measures and foresee possible "threats".
-
21:43
»
SecDocs
Tags:
hacking iPhone Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: Apple's iPhone has made a tremendous impact on the smartphone market and the public consciousness, but it has also highlighted their desire to carefully control the device with draconian restrictions. These restrictions prevent users from choosing to run third-party applications unauthorized by Apple and using the devices on carriers not approved by Apple.
-
21:43
»
SecDocs
Authors:
Karsten Nohl Tags:
reverse engineering RFID chip Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: Cryptographic algorithms are often kept secret in the false belief that this provides security. To find and analyze these algorithms, we reverse-engineering the silicon chips that implement them.
-
21:43
»
SecDocs
Authors:
Anne Roth Tags:
terrorism Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: After more than a year of mostly dealing with the terrorism investigation against my partner Andrej Holm, and the resulting total surveillance directed at him and our family, it has become more quiet lately for us. The investigation is still going on though. In the course of my new preoccupation 'terrorism' I keep hearing about similarly absurd cases of such investigations. All different, but all with analogies. All hard to bear for those who are subjected tot them. The talk will introduce some cases and search for patterns in cases against 'terrorists' who are clearly not terrorists.
-
21:43
»
SecDocs
Authors:
Gadi Evron Tags:
warfare intelligence Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: Estonia and Georgia are just two examples of where global scale cooperation is required for handling security incidents on the Internet.
-
7:01
»
SecDocs
Authors:
Frank Rieger Tags:
engineering Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: Robotic systems become more and more autonomous, and telepresence develops very rapidly. But what happens if things go wrong? Who is responsible for that autonomous cleaning car murdering tourists? How can you identify the owner of that spy-drone filming you naked at the pool? This talk outlines some ideas to trigger a debate on how to deal with these problems, without stifling innovation and fun.
-
-
21:55
»
SecDocs
Authors:
Kai Kunze Tags:
biometric Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: In this talk I present the current state of wearable computing, computing as common and useful as clothes, focusing on activity recognition (the inference of the users current actions) using on-body sensors (accelerometers, gyroscopes and other modalities), explaining possibilities, dealing with challenges and limitations and presenting some perils.
-
21:55
»
SecDocs
Tags:
social Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: We live in interesting times to build hacker spaces: physical spaces where hackers make things, inspired by European models, pop up everywhere. Whether you need inspiration to build your own hacker space or want an update on what happened in places like New York City, Washington D.C., San Francisco, or Vienna since last year: This international panel will provide you with insight.
-
-
21:37
»
SecDocs
Authors:
Sandro Gaycken Tags:
privacy Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: In many social situations, people start to adjust their behaviour due to surveillance. Inspired by more and more cases of breaches of data protection regulations, an erosion of trust into these regulations and those who forfeit them can be seen. The consequences of this are grim. Either we abolish surveillance technologies or the idea of "informational self-determination".
-
21:37
»
SecDocs
-
-
21:35
»
SecDocs
Authors:
Felix von Leitner Frank Rieger Tags:
culture Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: This year's apocalyptic Fnord-review will include the war in Georgia and the financial-crisis. We try to web the events into a kind of mega-conspiracy, so that only one group (or probably two or three) are guilty.
-
21:35
»
SecDocs
Tags:
fun Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: Join a glorious gala presentation with his Excellency and a battalion of members of the Soviet Unterzoegersdorf Military Enforcement Community. We will present the envious "First World" with the fruits of our techno-labor. Among other triumphs on display will be the second part of an ongoing series of so-called "Computer Games" or "Virtual Hyper-Rooms" glorifying the struggles of the Motherland, Soviet Unterzoegersdorf: Sector II. We promise not to mention the SALT II agreement.
-
21:35
»
SecDocs
Tags:
Wii Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: The Nintendo Wii game console has been one of the most popular of all time, selling almost as many units as all of its competitors combined. Despite being cheaper than the PS3 and Xbox360, it contains a sophisticated security architecture that withstood over a year of concerted effort to hack the device. The design itself is impressive; unfortunately, flaws in the implementation (both subtle and severe) render the device easily hacked, with little chance of recovery.
-
21:35
»
SecDocs
Authors:
Francesco Ongaro Tags:
penetration testing Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: A collection of engaging techniques, some unreleased and some perhaps forgotten, to make pentesting fun again. From layer 3 attacks that still work, to user interaction based exploits that aren't 'clickjacking', to local root privilege escalation without exploits and uncommon web application exploitation techniques.
-
-
21:54
»
SecDocs
Authors:
Thorsten Holz Tags:
malware bank Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: In the recent years, we observed a growing sophistication how credentials are stolen from compromised machines: the attackers use sophisticated keyloggers to control the victim's machine and use different techniques to steal the actual credentials. In this talk, we present an overview of this threat and empirical measurement results.
-
21:54
»
SecDocs
Tags:
music Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: Small devices like microcontrollers, coupled to a few buttons, knobs, encoders and LEDs, allow for a host of interesting and creative musical applications. Solder a few bits together, program a few lines, and you can build a deep device to support your musical exploration. This lecture will show you quickly how the hardware and code works, and then focus on a few interesting applications: controllers, sequencers, sound generators. The workshop will allow you to build your own crazy ideas.
-
21:54
»
SecDocs
Authors:
Jeff Gough Tags:
engineering robotics Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: The topic of swarm robotics will be introduced, including the current state of the art and some current research platforms. The problems of scalability in robot swarms will be discussed, particularly of programming and maintaining a large group of robots. The Formica platform represents a novel, very low cost approach to swarm robotics. Its design and implementation will be described, and the lecture will culminate in a live demonstration of a swarm of 25 robots cooperating on a task.
-
-
21:36
»
SecDocs
Authors:
Martin Ling Tags:
UAV Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: Birds, glider pilots, and recently UAVs can exploit a variety of weather effects in order to gain altitude, remain airborne and travel long distances all with no power input – effectively, hacking the atmosphere to fly for free. This talk will explain the aircraft, techniques, meteorology, hardware and software that we use to achieve this. In the process I will show why the sport of gliding may be of interest to hackers, and explain how you too can get involved in this highly rewarding and low-cost form of flying.
-
21:36
»
SecDocs
Authors:
Stefano Di Paola Tags:
Rich Internet Applications Flash Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: This presentation will examine the largely underresearched topic of rich internet applications (RIAs) security in the hopes of illustrating how the complex interactions with their executing environment, and general bad security practices, can lead to exploitable applications.
-
-
21:37
»
SecDocs
Authors:
Juergen Pabel Tags:
cryptography privacy Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: This is not a hacking presentation, no vulnerabilities are presented. It's a crash-course in full-disk-encryption ("FDE") concepts, products and implementation aspects. An overview of both commercial and open-source offerings for Windows, Linux, and MacOSX is given. A (programmer's) look at the open-source solutions concludes the presentation.
-
21:37
»
SecDocs
Tags:
hacking Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: 4 minutes for every speaker. Learn about the good, the bad, and the ugly - in software, hardware, projects, and more.
-
21:37
»
SecDocs
Authors:
Christian Heller Tags:
privacy Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: The breaking away of privacy in the digital world is often understood as something dangerous, and for good reasons. But could there be opportunities in it, too? Do the current cultural and technological trends only dissolve the protected area of privacy, or could they dissolve as well the pressures that privacy is supposed to liberate us from? What if we witness a transformation of civilization so profound that terms like "private" and "public" lose their meaning altogether? Maybe we won't need "privacy" at all in the future because we will value other, new liberties more strongly?
-
1:43
»
SecDocs
Tags:
science Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: We are in the midst of a major global warming, as witnessed not just by temperature measurements, but also for example by the record loss of Arctic sea ice in 2007 and 2008. This year, both the Northwest Passage and the Northeast Passage in the Arctic were open for ships to pass through for the first time in living memory.
-
1:05
»
SecDocs
Tags:
hacker jeopardy Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: The famous quiz – of course with topics you will never see in TV.
Skip to page:
1
2
3
...
5