«
Expand/Collapse
38 items tagged "collection"
Related tags:
hacks [+],
vulnerability [+],
chaos communication congress [+],
web [+],
unusual things [+],
tar gz [+],
tar [+],
tags [+],
sql [+],
random collection [+],
photo collection [+],
photo [+],
network scan [+],
netreconn [+],
malware [+],
ipdump [+],
extreme caution [+],
exploits [+],
execution [+],
united states [+],
toy [+],
robots [+],
identification [+],
hackaday [+],
dna databases [+],
dna [+],
diy [+],
conspiracy theorists [+],
audio [+],
workspace [+],
weapons [+],
video projector [+],
video [+],
uploadify [+],
unterschiedlichen [+],
und [+],
translation [+],
track [+],
tim [+],
stuff [+],
stream [+],
stockpile [+],
squeezebox [+],
simple machines [+],
shell [+],
scares [+],
sample [+],
roundup [+],
robot hands [+],
robot [+],
refute [+],
rare earth magnets [+],
radios [+],
projector [+],
projectiles [+],
portable [+],
organizing [+],
orangutan [+],
optical sensors [+],
official [+],
odds and ends [+],
oddities [+],
misc [+],
michigan police [+],
michigan [+],
marble machines [+],
marble machine [+],
marble [+],
machine [+],
little robots [+],
line following robot [+],
lego [+],
jump [+],
jan [+],
husbandry techniques [+],
howtos [+],
house [+],
holiday [+],
halloween [+],
hackedgadgets [+],
google [+],
giant [+],
gauss [+],
final builds site [+],
exploit [+],
exhibit [+],
exe packer [+],
exe [+],
electronic lock [+],
digital [+],
david williamson [+],
data [+],
coil gun [+],
classic [+],
claims [+],
chilly reception [+],
chilly [+],
browser [+],
book [+],
bill gets [+],
baby orangutan [+],
baby [+],
attacks [+],
arduino [+],
animal husbandry [+],
aclu [+],
Tutorials [+],
Ask [+]
-
-
9:19
»
Hack a Day
Jump scares are a lot of fun, but if you want to hold the attention of all those trick-or-treaters we’d suggest a creepy prop. One of the best choices in that category is a ghoulishly lifelike hand. You can draw some inspiration from this roundup of robot hands which Adafruit put together. We’ve chosen four [...]
-
-
9:26
»
Packet Storm Security Recent Files
This archive contains web malware recovered from honeypots and other places. It includes various backdoors, bots, exploits, and more. Please note that many of the files ARE backdoored so you should exercise extreme caution and analyze them before any execution.
-
9:26
»
Packet Storm Security Tools
This archive contains web malware recovered from honeypots and other places. It includes various backdoors, bots, exploits, and more. Please note that many of the files ARE backdoored so you should exercise extreme caution and analyze them before any execution.
-
9:26
»
Packet Storm Security Misc. Files
This archive contains web malware recovered from honeypots and other places. It includes various backdoors, bots, exploits, and more. Please note that many of the files ARE backdoored so you should exercise extreme caution and analyze them before any execution.
-
-
6:01
»
Hack a Day
If you like marble machines, or if you simply like alliteration, prepare to be amazed. [Denha] apparently has had a lot of time to spare over the years, as the marble machine collection he’s amassed is quite incredible. Dating back to 2009, the collection includes relatively simple machines, like the one pictured at the beginning, [...]
-
-
6:01
»
Hack a Day
DIY book safes are well and good, but if you give someone enough time to peruse your book collection, the 3-inch thick “Case study on Animal Husbandry Techniques during the 14th Century” is likely to stand out among your collection of hand-bound “Twilight” fan fiction. In an attempt to teach his friend a bit about [...]
-
-
21:47
»
SecDocs
Tags:
intelligence data mining Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: As governments increase their data collection capabilities software developers are stepping up to both utilize and augment surveillance capabilities. DNA databases, facial recognition, behavioral patterning, and geographic profiling are all in use today. Police are crowdsourcing identification of suspects and citizens are willingly participating. This talk will cover real technologies in place today as well as educated speculation of what is coming next. Conspiracy theorists have been questioning the degree to which anyone truly has privacy for quite some time. State ID & fingerprints have given way to electronic passports & DNA analysis. With the increasing number of DIY BIO groups it isn't outside the realm of speculation to see clandestine collection & generation of genomic information by a state actor. Police agencies are engaging in genomic data collection of suspects, witnesses, and victims with no guarantee of the information safety of those individuals. The current scope of laws in the United States limits "genetic discrimination" to "health insurance and employment decisions" with no limitations on the implication of guilt or agency in a crime at the federal level. Similarly companies are collecting photographs of individuals from online services and using them as the corpus for facial recognition techniques which are then leased to government actors. The goal of this talk is to: Address the current vectors for public identification Discuss potential countermeasures for identification dragnets Analyze the role of genomic screening Review case studies of individuals trying to avoid "the system" and crowdsourced attempts to identify the individuals Imagine one was "erased" from these databases. How can one re-establish positive identification (and would they want to)?
-
21:47
»
SecDocs
Tags:
intelligence data mining Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: As governments increase their data collection capabilities software developers are stepping up to both utilize and augment surveillance capabilities. DNA databases, facial recognition, behavioral patterning, and geographic profiling are all in use today. Police are crowdsourcing identification of suspects and citizens are willingly participating. This talk will cover real technologies in place today as well as educated speculation of what is coming next. Conspiracy theorists have been questioning the degree to which anyone truly has privacy for quite some time. State ID & fingerprints have given way to electronic passports & DNA analysis. With the increasing number of DIY BIO groups it isn't outside the realm of speculation to see clandestine collection & generation of genomic information by a state actor. Police agencies are engaging in genomic data collection of suspects, witnesses, and victims with no guarantee of the information safety of those individuals. The current scope of laws in the United States limits "genetic discrimination" to "health insurance and employment decisions" with no limitations on the implication of guilt or agency in a crime at the federal level. Similarly companies are collecting photographs of individuals from online services and using them as the corpus for facial recognition techniques which are then leased to government actors. The goal of this talk is to: Address the current vectors for public identification Discuss potential countermeasures for identification dragnets Analyze the role of genomic screening Review case studies of individuals trying to avoid "the system" and crowdsourced attempts to identify the individuals Imagine one was "erased" from these databases. How can one re-establish positive identification (and would they want to)?
-
-
9:01
»
Hack a Day
[Tim] wrote in, lamenting a problem that many of us can likely echo. Over the years, he has acquired all sorts of small electronic parts and components, along with tools and accessories – all of which are starting to crowd his workspace. He says that most of his stockpile is being stored in a tackle [...]
-
-
12:02
»
Hack a Day
This collection of gauss weapons use rare earth magnets to accelerate projectiles to damaging speeds. They work using the same concepts as a coil gun, but instead of just one projectile travelling along a length of guide track, there are many projectiles that work in a chain reaction. A series of magnets are placed at [...]
-
-
6:51
»
Hack a Day
[David Williamson] has put together some pretty amazing little robots from bits of stuff he laying around the house. What initially caught our attention was this drawing robot over at HackedGadgets. We were impressed by the construction, as it looks like almost all of it was scrap. Upon clicking through the link we found a [...]
-
-
11:00
»
Hack a Day
Here’s a nice collection of line-following robots (translated). They’re fast and they stay on track even through sharp turns. They center around a Baby Orangutan board which features an ATmega328 microcontroller and two motor driver channels. These drive the geared motors and use optical sensors to track a dark line on a light surface. There’s [...]
-
-
23:00
»
Packet Storm Security Tools
Netreconn is a collection of network scan/recon tools that are relatively small compared to their larger cousins. These include nstrobe, ipdump, and ndecode.
-
23:00
»
Packet Storm Security Recent Files
Netreconn is a collection of network scan/recon tools that are relatively small compared to their larger cousins. These include nstrobe, ipdump, and ndecode.
-
-
12:00
»
Hack a Day
Reader [Jan] came across a website all about building your own video projector. We’ve linked to five of the best projects for 2010 but there’s a ton more information if you dig a little deeper. Our favorite so far is the GohtanBox v3 and it’s giant LED panel that serves as the projection light.
[...]
-
-
6:00
»
Hack a Day
The Squeezbox media streaming systems are compact Linux WiFi enabled radios that let you stream your collection anywhere,so long as you have an AC or USB outlet nearby. But [Achim Sack] wanted to stream his collection from anywhere with no wires attached (translation). Some poking and prodding revealed a connector actually designed for a battery [...]
-
-
17:00
»
Packet Storm Security Tools
Netreconn is a collection of network scan/recon tools that are relatively small compared to their larger cousins. These include nstrobe, ipdump, and ndecode.
-
-
16:00
»
Hack a Day
Here’s a collection of little LEGO oddities. Some of them exhibit a purpose, such as this interesting take on a line-following robot. Others, like the four seen above, are just automatons built to bring a smile to your face through their motion. There are dozens to choose from, with several pictures and a video of [...]