«
Expand/Collapse
314 items tagged "control"
Related tags:
safer use [+],
s system [+],
control panel 1 [+],
access control system [+],
sql injection [+],
ntr [+],
insight [+],
audio [+],
remote control [+],
micro control [+],
forgery [+],
device [+],
bugtraq [+],
android [+],
hacks [+],
trend [+],
realtek [+],
proof of concept [+],
panel version [+],
micro [+],
center [+],
application control [+],
access control [+],
vulnerabilities [+],
version [+],
sophos [+],
playerpt [+],
netop [+],
microcontrollers [+],
memory corruption [+],
flexap [+],
entertainment [+],
cisco linksys [+],
chaos communication congress [+],
barracuda [+],
application [+],
whitepaper [+],
web [+],
trend micro [+],
system [+],
sr6 [+],
sap [+],
robots [+],
robot [+],
radio [+],
multiple [+],
misc [+],
manager [+],
lumension [+],
kinect [+],
hackaday [+],
exploits [+],
digital [+],
cross [+],
command execution [+],
cisco security advisory [+],
cisco security [+],
cisco secure [+],
bluetooth [+],
authentication [+],
attacker [+],
arbitrary code [+],
advisory [+],
zero day [+],
zero [+],
zdi [+],
xgo [+],
x stack [+],
x setsource [+],
webhmi [+],
web interfaces [+],
web control center [+],
web control [+],
war [+],
vulnerability note [+],
vpn client [+],
vpn [+],
voxsmart [+],
voxrecord [+],
voice control [+],
version 6 [+],
user [+],
united states [+],
traffic [+],
third party [+],
sunway [+],
stack overflow [+],
stack buffer [+],
sql [+],
session hijacking [+],
seh [+],
security [+],
script [+],
sap gui [+],
russia [+],
role based access control [+],
robotic arm [+],
project [+],
potential security vulnerability [+],
plesk [+],
phplist [+],
peripherals [+],
performance [+],
novell iprint [+],
novell [+],
north america [+],
microsoft [+],
memory address [+],
linux [+],
iprint [+],
input validation [+],
information leakage [+],
ileys [+],
iconics [+],
greenland [+],
genesis32 [+],
force [+],
exe component [+],
earth [+],
dvrobot [+],
dr. web [+],
denmark [+],
day [+],
control versions [+],
control scada [+],
control performance [+],
client [+],
cisco anyconnect [+],
cellphones [+],
car [+],
canada [+],
buffer overflows [+],
buffer [+],
based buffer overflow [+],
authentication methods [+],
attackers [+],
arctic [+],
arbitrary value [+],
arbitrary files [+],
application lifecycle management [+],
aiocp [+],
advance notification [+],
advance [+],
administrative web [+],
active x [+],
access control list [+],
ARM [+],
vulnerability [+],
xbee [+],
websphere [+],
webapps [+],
viscom [+],
user access control [+],
ulrich wiesner [+],
uac [+],
transparency [+],
toy [+],
tool [+],
tom [+],
split flap [+],
speech control [+],
speaker [+],
smartphone [+],
siemens [+],
servo control [+],
servo [+],
script injection [+],
sandbox [+],
remote control car [+],
receiver board [+],
receiver [+],
raspberry [+],
privilege escalation vulnerability [+],
packet format [+],
osrc [+],
node [+],
network access control [+],
motor [+],
mind [+],
metasploit [+],
manager caslogdirectinserthandler [+],
malware [+],
local privilege escalation [+],
links [+],
led [+],
joris [+],
jon [+],
j2ee [+],
insecure [+],
ibm websphere [+],
ibm [+],
hosting [+],
hand [+],
everything [+],
escalation [+],
eric [+],
engine [+],
election event [+],
election [+],
easy [+],
dslr [+],
drupal [+],
dr web [+],
control signals [+],
control scheme [+],
code [+],
cisco network [+],
cisco [+],
cameras [+],
camera [+],
buffer overflow vulnerability [+],
authoritarian regime [+],
aslr [+],
apple sandbox [+],
air traffic control [+],
air [+],
administrative authentication [+],
accelerometer [+],
Wireless [+],
Software [+],
Rasberry [+],
activex [+],
xylophones [+],
xbox game [+],
xbox controller [+],
xbox 360 [+],
xbox [+],
wiper [+],
wii nunchuck [+],
wii [+],
wifi [+],
white balance [+],
wei chen [+],
webmote [+],
web interface [+],
web based remote control [+],
web applications [+],
volume level [+],
volume [+],
voltage [+],
vladimir [+],
visual diff [+],
virtual [+],
vinod [+],
video stream [+],
video playlist [+],
vehicle [+],
use [+],
usb [+],
usa [+],
uri uninitialized [+],
universal web [+],
unit [+],
uninitialized pointer [+],
twitter [+],
tv remotes [+],
tv remote control [+],
tv b gone [+],
tutorial [+],
trial and error [+],
trevor [+],
trendmicro [+],
transportation [+],
transmitter and receiver [+],
transmitter [+],
translator james [+],
transistor control [+],
transistor [+],
trackball [+],
toy car [+],
touchscreen [+],
touchosc [+],
todd harrison [+],
toaster oven [+],
tiny circuit board [+],
tidigino [+],
thwarted [+],
thermistors [+],
theater [+],
temperature [+],
television power [+],
telemetry data [+],
telemetry [+],
technologie [+],
tank [+],
system flaws [+],
stuxnet [+],
strengths [+],
stock controller [+],
stereo receiver [+],
stereo amplifier [+],
stereo [+],
steerable [+],
station [+],
spindel [+],
sphero [+],
speed [+],
speaker control [+],
space station [+],
sound speakers [+],
sound [+],
slew [+],
skincrafter [+],
siri [+],
simulator [+],
simulations [+],
simple [+],
silvio cesare [+],
silvio [+],
shutter speed [+],
show [+],
shelf solution [+],
shawn [+],
setup [+],
servo motor [+],
server migration [+],
server [+],
sequencer [+],
sensor [+],
security vulnerabilities [+],
security system [+],
security holes [+],
security control [+],
sebastian [+],
scrap yard [+],
scott [+],
sanctuary [+],
safety features [+],
rohit [+],
rocket [+],
robotics projects [+],
robotics project [+],
robot platform [+],
robot arm [+],
robertson [+],
rikard lindstrm [+],
rickrolling [+],
rich [+],
rhapsody [+],
rgb leds [+],
rgb [+],
reverse engineering [+],
resistor [+],
reprap [+],
repository manager [+],
repository [+],
repair [+],
remote script [+],
remote control cars [+],
reflow [+],
rechargeable nimh [+],
receivers [+],
receiver module [+],
realplayer [+],
rational [+],
radius authentication [+],
radio signals [+],
radio dial [+],
quot [+],
quite some time [+],
quartzo [+],
quadcopter [+],
qr code [+],
python [+],
pua [+],
prototyping [+],
promotic [+],
privilege elevation [+],
printer [+],
prank [+],
power conversion [+],
power [+],
plcc socket [+],
playstation [+],
playlist [+],
play station 3 [+],
play station [+],
pins [+],
pickit [+],
phone button [+],
phone [+],
philips [+],
performance automobile [+],
pc. it [+],
pc. his [+],
pc speakers [+],
patrick [+],
patches [+],
party apps [+],
own computer [+],
owen [+],
overflow [+],
oven [+],
oscarcelma [+],
osc [+],
order of business [+],
oracle enterprise manager [+],
oracle [+],
optical drives [+],
open source hardware [+],
open [+],
one of those guys [+],
nunchuck [+],
number crunching [+],
notification [+],
nokia n900 [+],
nokia [+],
ngs [+],
new delhi [+],
network communication systems [+],
netgear [+],
nasa [+],
nac [+],
musical [+],
music player [+],
mouse [+],
motorized blinds [+],
motorized [+],
monitoring service [+],
modular platform [+],
model rocket [+],
mobile control [+],
mobile [+],
miro [+],
mindwave [+],
mind control [+],
mill [+],
mileage [+],
mike spindel [+],
mike rankin [+],
microsoft works 7 [+],
microcontroller programming [+],
microcontroller platform [+],
microcontroller [+],
martin [+],
marcus [+],
manchester encoding [+],
manchester [+],
manager casprocessor [+],
manager agent [+],
mains power [+],
machine management [+],
lord [+],
look [+],
local science [+],
livingroom [+],
little bug [+],
linux kernel [+],
linux box [+],
linksys [+],
lightweight directory access protocol [+],
lightbulb [+],
light bulbs [+],
liam [+],
lens [+],
leds [+],
led driver circuit [+],
led driver [+],
led bulb [+],
launchpad [+],
laser pointer [+],
laser light show [+],
laser cutter [+],
laser cut [+],
laser [+],
laptop [+],
lamp [+],
kunkel [+],
krasnow [+],
junk pile [+],
joshua [+],
jim [+],
jeep grand cherokee [+],
jammer [+],
james [+],
ir sensor [+],
ir repeaters [+],
ir remote control [+],
ir module [+],
ios [+],
ioio [+],
intro [+],
internet [+],
interface [+],
interapp [+],
integer overflow [+],
insecurity [+],
infrared light [+],
infrared leds [+],
information disclosure [+],
incoming signal [+],
ikea [+],
iguard [+],
hz hum [+],
hybrid control [+],
hue [+],
htc phone [+],
hp version [+],
howto guide [+],
house [+],
hone [+],
home theater setups [+],
holiday [+],
hitachi [+],
hirdb [+],
heisler [+],
heat sink [+],
hardware version [+],
hackers [+],
h. smeitink [+],
guru tegh bahadur [+],
guide [+],
gsm [+],
grinberg [+],
grid control [+],
great [+],
graphical interface [+],
grand cherokee [+],
gpio [+],
google [+],
gnu linux [+],
glare [+],
gijs [+],
gap [+],
gaming device [+],
gaming [+],
game control [+],
game [+],
galvanometers [+],
gag [+],
forescout [+],
fm radio receiver [+],
fly [+],
flow [+],
firestorm [+],
fingertips [+],
finally [+],
fiery death [+],
fiery [+],
feedback panel [+],
fbi [+],
fan [+],
expensive toys [+],
exercise [+],
evalbot [+],
ethernet [+],
eric schmiedl [+],
eric heisler [+],
eric gregori [+],
enterprise [+],
engineering project [+],
engineering [+],
engineer [+],
endpoint security [+],
endpoint [+],
electronic speed control [+],
electronic hobby [+],
electronic [+],
eberhard [+],
ebay [+],
drudgery [+],
dovecot [+],
door [+],
doodads [+],
donor vehicle [+],
doj [+],
dmitry [+],
dll [+],
diy [+],
digital volume control [+],
didn [+],
desktop antivirus [+],
denial of service dos [+],
denial of service [+],
demo board [+],
decode [+],
dc motors [+],
dc motor control [+],
database control [+],
darrell taylor [+],
danny bertner [+],
cypherbot [+],
curiosity [+],
csrf [+],
cs code [+],
crystal reports [+],
cruise control system [+],
cruise [+],
cpld [+],
cooling fan [+],
controller [+],
control voltage [+],
control transmitter [+],
control server [+],
control purposes [+],
control pad [+],
control interface [+],
control input [+],
control flow graphs [+],
control circuits [+],
control circuitry [+],
control 1 [+],
computer control [+],
computer [+],
communications protocol [+],
collision prevention [+],
collision avoidance [+],
collective brainpower [+],
code encryption [+],
cnc control [+],
cnc [+],
classmates [+],
cisco application [+],
circuitry [+],
christopher [+],
chris [+],
chet [+],
chen [+],
celma [+],
cellular phone network [+],
cellular [+],
canon eos lenses [+],
canon eos [+],
camera lenses [+],
button presses [+],
brushless dc motors [+],
browser [+],
bristlebot [+],
bremster [+],
brandon evans [+],
boris landoni [+],
boris [+],
bobbie [+],
bluetooth devices [+],
black hat [+],
bit [+],
biometric access control [+],
bill [+],
bezels [+],
ben krasnow [+],
beginner [+],
beefs [+],
basic stamp 2 [+],
automation project [+],
authentication software [+],
authentication protocol [+],
attitude control system [+],
attitude [+],
atmega8 [+],
apple ios [+],
anything [+],
animatronic head [+],
animatronic [+],
andrzej [+],
analog control [+],
amplifier [+],
allen [+],
admission control [+],
admission [+],
admin [+],
activex control buffer overflow [+],
acs [+],
access road [+],
access control systems [+],
acceptable resolution [+],
Release [+],
Hardware [+],
9v battery [+],
3d printer [+],
3d camera [+],
buffer overflow [+],
arduino [+],
access [+],
control panel [+],
panel [+],
activex control [+],
code execution [+],
remote [+],
home [+],
zac franken,
xosoft,
wireless headset,
winphone,
windows pcs,
wii remote,
whmcs,
whmcompletesolution,
web access,
warszawa,
want,
virtual machine,
video,
vegetable gardener,
vegetable,
ultra,
uc applications,
txt,
trident,
tabular,
surrender control,
string copy,
spent three,
source,
sophos endpoint security,
session initiation protocol,
servo motors,
service vulnerability,
service,
sccp,
robotic hand,
rear axel,
realtek hd audio control panel,
rc plane,
protocol,
print,
power plants,
power management,
playstation controller,
place,
pizza crust,
pizza,
pic 18f452,
physical security,
penetration,
parallel inputs,
own pizza,
office,
news,
network address translation,
nat skinny,
nat,
mountainboard,
motion control,
motion,
message control,
message,
mathieu,
manager. user,
malformed requests,
malaysia,
lsp,
lithium ion batteries,
lcd screen,
landi,
jad,
iron phosphate,
ir commands,
integrated circuits,
infrared remote control,
illinois campus,
hpediag,
homebrew,
heap,
hardware work,
hand assembly,
hack in the box,
guimaraes,
guido landi,
guido,
green,
graphic lcd,
glcd,
gfs,
gesture,
gardening,
flow data,
first,
february,
expanding,
electric,
early november,
dvbsexecall,
don bailey,
domino web,
dldrv,
digital to analog converter,
digital analog converter,
degree panoramas,
datev base,
cross application,
critical systems,
control replication,
control microsoft,
control feature,
computerized numerical control,
complete control,
clever folks,
classic,
cisco ios software,
cisco ios device,
cisco ios,
cisco bugs,
chopper,
chemviewx,
chair,
ca xosoft,
building,
bug,
board,
bill porter,
bdl,
barcode,
backup batteries,
babylon online dictionary,
attacking,
andres guzman,
analog voltage,
analog sticks,
ah battery,
adobe download manager,
ace application,
ace,
absolute path name
-
-
6:01
»
Hack a Day
After you’ve got your Reprap running smoothly with acceptable resolution and good quality prints, the next order of business for any 3D printer hobbyist is headless printing. While the greatest and newest 3D printers come with controls to allow jogging, homing, temperature control, and printing from an SD card, the home-built versions will require an [...]
-
-
13:06
»
Hack a Day
We’ve seen a lot of projects that let you control all of your devices from a smartphone. But this universal web-based remote control system looks like the most versatile we’ve seen yet. The project is called Webmote as the controls are served up as a web interface so that you’re not limited to say an [...]
-
-
8:25
»
Hack a Day
Wanting to control a split flap display that was not near a computer [Tom] looked to a common solution for communicating over distances not practical for I2C or SPI. He developed his own hardware and packet format using the RS-485 protocol. This is part of a larger project he has been working on to feed [...]
-
8:25
»
Hack a Day
Wanting to control a split flap display that was not near a computer [Tom] looked to a common solution for communicating over distances not practical for I2C or SPI. He developed his own hardware and packet format using the RS-485 protocol. This is part of a larger project he has been working on to feed [...]
-
-
16:00
»
SecuriTeam
Cisco Secure Access Control System (ACS) is prone to an authentication-bypass vulnerability because it fails to properly validate user-supplied password when TACACS+ is the authentication protocol and Cisco Secure ACS is configured with a Lightweight Directory Access Protocol (LDAP) external identity store.
-
-
10:01
»
Hack a Day
After getting his hands on the Philips Hue smart lightbulb [Brandon Evans] cracked open some of the hardware to see what is inside. He also spent time working out the software tricks necessary to use Siri to control light bulbs from iOS. If you haven’t heard of the Hue product before it’s an LED bulb [...]
-
-
16:00
»
SecuriTeam
Cisco Secure Access Control System is prone to a ACACS+ Authentication Bypass Vulnerability
-
-
8:01
»
Hack a Day
Just the other day we were reading a Reddit thread asking about how to control a television with a smartphone. The conversation started by talking about adding an IR LED to the phone. Then it was suggested that there should be standalone Bluetooth devices that convert commands to IR, and came around to the ideas [...]
-
-
6:01
»
Hack a Day
This hardware, which was built as a Computer Engineering project by [Bryon] and his classmates, gives you feedback and control of a car though a cellular phone network. It uses text messages to communicate with a control device. This can be pretty much any cellphone, but in the clip after the break they show off [...]
-
-
7:00
»
Hack a Day
[Chet] is showing off the Bluetooth controller upgrade for this RC car. The donor vehicle is a rather inexpensive Porche which he purchased to make sure he didn’t start hacking up his more expensive toys. He took a bit different route than the IOIO RC truck we saw earlier in the week, but the concept [...]
-
-
12:01
»
Hack a Day
This device is a prank or gag that [Eric Heisler] came up with. It will intercept IR remote control codes and play them back after a bit of a delay. The example he shows in the video (embedded after the break) catches the television power signal from a remote, then sends it again after about [...]
-
4:00
»
Hack a Day
After a year of development, the OSRC is ready to hit a manufacturing plant. This transmitter (and receiver) for remote control cars, airplanes, quadcopters, and semi-autonomous drones features modular everything and allows you to transmit video from the cockpit and display it on a screen in the palm of your hands. This isn’t the first time we’ve posted [...]
-
-
5:12
»
Packet Storm Security Exploits
Flexap.am Control Panel version 5.1 suffer from a remote blind SQL injection vulnerability. Note that this finding houses site-specific data.
-
-
6:30
»
Hack a Day
Inspired by the many autonomous rovers such as Curiosity and the self-driving Google car, [Rohit] decided to build his own by taking an off-the-shelf remote control car and adding his own electronics. Unfortunately, he couldn’t find the datasheet for the chip used to receive radio signals and drive the motors, so he ended up building his [...]
-
-
7:17
»
Packet Storm Security Advisories
Zero Day Initiative Advisory 12-170 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Application Lifecycle Management. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the XGO.ocx ActiveX control. The control exposed two vulnerable functions: 'SetShapeNodeType', which is vulnerable to a type confusion allowing user specified memory to be used as an object; and 'CopyToFile' which allows an attacker to create and overwrite files on the system of the user invoking the control. The attacker can utilize these vulnerabilities to execute remote code under the context of the process.
-
7:17
»
Packet Storm Security Recent Files
Zero Day Initiative Advisory 12-170 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Application Lifecycle Management. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the XGO.ocx ActiveX control. The control exposed two vulnerable functions: 'SetShapeNodeType', which is vulnerable to a type confusion allowing user specified memory to be used as an object; and 'CopyToFile' which allows an attacker to create and overwrite files on the system of the user invoking the control. The attacker can utilize these vulnerabilities to execute remote code under the context of the process.
-
7:17
»
Packet Storm Security Misc. Files
Zero Day Initiative Advisory 12-170 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Application Lifecycle Management. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the XGO.ocx ActiveX control. The control exposed two vulnerable functions: 'SetShapeNodeType', which is vulnerable to a type confusion allowing user specified memory to be used as an object; and 'CopyToFile' which allows an attacker to create and overwrite files on the system of the user invoking the control. The attacker can utilize these vulnerabilities to execute remote code under the context of the process.
-
5:01
»
Hack a Day
[Jon] wrote in to tell us about his programmable RC car, and the Howto guide that he’s made. According to him, this project can be constructed with $9 worth of parts plus an Arduino and a small toy car. So around $50 if you’re starting from scratch. At it’s core, this project is about using [...]
-
-
11:01
»
Hack a Day
This home automation project lets you flap your arms to turn things on and off. [Toon] and [Jiang] have been working on the concept as part of their Master’s thesis at University. It uses a 3D camera with some custom software to pick up your gestures. What we really like is the laser pointer which [...]
-
-
7:01
»
Hack a Day
Now instead of wrangling Python or PHP to do your bidding, [Eric] came up with a way to control the GPIO pins on his Raspberry Pi in a browser. [Eric] calls his project WebIOPi, and it’s the perfect tool if you’d just like to blink a LED or control a relay over the internet. Simply [...]
-
-
16:30
»
Hack a Day
As a learning experience [GeriBoss] put together an IR remote control receiver board for his PC. His want of volume control from across the room was reason enough to undertake the project, and he got to work with a 38 kHz receiver module and Manchester encoding in the process. The decoder portion of the project [...]
-
-
13:01
»
Hack a Day
[Jon] wanted his speakers to come on and off along with his TV. The speaker heats up if left on so he didn’t want to do that. But killing the power also resets the volume level (this is an old set of PC speakers and the remote is wired, not IR) so using one of [...]
-
-
9:01
»
Hack a Day
[Jim] has an old Android phone he’d like to use as a Robot brain. It’s got a lot of the things you’d want in a robot platform; WiFi, Bluetooth, a camera, an accelerometer, etc. But he needed some way to make the mobile, mobile. What he came up with is a chassis with servos that [...]
-
-
17:00
»
SecuriTeam
Hitachi HiRDB Control Manager Agent is prone to an unspecified remote command-execution vulnerability.
-
-
12:01
»
Hack a Day
[Chris] continues cranking out the tutorials, this time around he’s showing how to use a CPLD for simple motor control. The demo hardware is pretty basic, he built his own FPGA/CPLD demo board a few years back which used a PLCC socket for easy interfacing. You should be able to use just about any gear [...]
-
-
3:51
»
SecDocs
Authors:
Ulrich Wiesner Tags:
election Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: How the Ministry of the Interior turns fundamental election principals into their opposite, without even asking the parliament. Public control and transparency of elections, not trust, are well established principles to prevent electoral fraud in a democracy. With the introduction of voting computers or remote eVoting, this transparency is replaced by procedures which exclude both voters and the public from any control over the election process. Instead, trust in the administration is introduced as a new principle of electoral control. But what might be desirable for an authoritarian regime is inappropriate in a democracy. Using German eVoting regulations as an example, it is discussed how experts in the administration "hack" the electoral system by turning fundamental election principals into their opposite.
-
3:43
»
SecDocs
Authors:
Ulrich Wiesner Tags:
election Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: How the Ministry of the Interior turns fundamental election principals into their opposite, without even asking the parliament. Public control and transparency of elections, not trust, are well established principles to prevent electoral fraud in a democracy. With the introduction of voting computers or remote eVoting, this transparency is replaced by procedures which exclude both voters and the public from any control over the election process. Instead, trust in the administration is introduced as a new principle of electoral control. But what might be desirable for an authoritarian regime is inappropriate in a democracy. Using German eVoting regulations as an example, it is discussed how experts in the administration "hack" the electoral system by turning fundamental election principals into their opposite.
-
-
15:04
»
Hack a Day
Does your home have a security system but you don’t subscribe to the monitoring service to make it work? Rip that baby off of the wall and do something with it, or just build your own system around it. If you have a DSC PC1500RK control panel [CaitSith2] shows us how easy it is to control the [...]
-
-
5:00
»
Hack a Day
If you’ve ever needed a short-range remote control for a project, [firestorm] is here to help you out. He put up a great tutorial on using an IR remote to do just about anything with everyone’s favorite microcontroller platform. [firestorm] used the Arduino IRremote library to decode the button presses on his remote. After uploading the IR receive demo [...]
-
-
17:00
»
SecuriTeam
Cisco Linksys PlayerPT ActiveX Control is prone to a buffer-overflow vulnerability because the application fails to adequately check boundaries on user-supplied input.
-
-
7:01
»
Hack a Day
[Vinod's] latest project lets him use a TV remote control as a mouse. It may not sound like much, but he did it with a minimum of hardware and packed in the maximum when it comes to features. He’s using an ATmega8 to read the remote control signals and provide USB connectivity. With the V-USB [...]
-
-
14:36
»
Packet Storm Security Advisories
Secunia Research has discovered a vulnerability in Cisco Linksys PlayerPT ActiveX Control, which can be exploited by malicious people to compromise a user's system. Successful exploitation allows execution of arbitrary code. Cisco Linksys PlayerPT ActiveX Control version 1.0.0.15 is affected. Other versions may also be affected.
-
14:36
»
Packet Storm Security Recent Files
Secunia Research has discovered a vulnerability in Cisco Linksys PlayerPT ActiveX Control, which can be exploited by malicious people to compromise a user's system. Successful exploitation allows execution of arbitrary code. Cisco Linksys PlayerPT ActiveX Control version 1.0.0.15 is affected. Other versions may also be affected.
-
14:36
»
Packet Storm Security Misc. Files
Secunia Research has discovered a vulnerability in Cisco Linksys PlayerPT ActiveX Control, which can be exploited by malicious people to compromise a user's system. Successful exploitation allows execution of arbitrary code. Cisco Linksys PlayerPT ActiveX Control version 1.0.0.15 is affected. Other versions may also be affected.
-
-
13:36
»
SecDocs
Tags:
social Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Russia, Canada, the United States and Denmark are each pushing for more control and access to the resources of the Arctic. In the balance hangs the future of an entire ecosystem and our planet. In August of 2007, a Russian submarine planted a flag under water claiming more territory on the sea bed of the arctic for Russia. Back home they were welcomed as heros, like cosmonauts returning from the moon. In the boardrooms of the state owned oil company, executives were already salivating about the alleged oil and gas reserves that lay untapped below their chunk of the arctic. Meanwhile in North America, similar salivating is taking place, as both Canada and the United States send military and civilian ships to claim their piece of the alleged pie. In between there's Greenland, administered by the Danes, who also realize there's money to made and national pride at stake. But what about the people of the earth? The communities, the ecosystem, both in the arctic and throughout the globe... What will happen to them if the Arctic meltrush goes into full throttle? This talk is about the new cold war, where nations and corporations carve up one of the most important regions on earth and fight amongst themselves for control.. for money.. for power. And as the melt-rush goes forward, citizens of the world are left in the dark about just what plans their governments have and what is at stake for every living thing on earth.
-
13:34
»
SecDocs
Tags:
social Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Russia, Canada, the United States and Denmark are each pushing for more control and access to the resources of the Arctic. In the balance hangs the future of an entire ecosystem and our planet. In August of 2007, a Russian submarine planted a flag under water claiming more territory on the sea bed of the arctic for Russia. Back home they were welcomed as heros, like cosmonauts returning from the moon. In the boardrooms of the state owned oil company, executives were already salivating about the alleged oil and gas reserves that lay untapped below their chunk of the arctic. Meanwhile in North America, similar salivating is taking place, as both Canada and the United States send military and civilian ships to claim their piece of the alleged pie. In between there's Greenland, administered by the Danes, who also realize there's money to made and national pride at stake. But what about the people of the earth? The communities, the ecosystem, both in the arctic and throughout the globe... What will happen to them if the Arctic meltrush goes into full throttle? This talk is about the new cold war, where nations and corporations carve up one of the most important regions on earth and fight amongst themselves for control.. for money.. for power. And as the melt-rush goes forward, citizens of the world are left in the dark about just what plans their governments have and what is at stake for every living thing on earth.
-
13:33
»
SecDocs
Tags:
social Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Russia, Canada, the United States and Denmark are each pushing for more control and access to the resources of the Arctic. In the balance hangs the future of an entire ecosystem and our planet. In August of 2007, a Russian submarine planted a flag under water claiming more territory on the sea bed of the arctic for Russia. Back home they were welcomed as heros, like cosmonauts returning from the moon. In the boardrooms of the state owned oil company, executives were already salivating about the alleged oil and gas reserves that lay untapped below their chunk of the arctic. Meanwhile in North America, similar salivating is taking place, as both Canada and the United States send military and civilian ships to claim their piece of the alleged pie. In between there's Greenland, administered by the Danes, who also realize there's money to made and national pride at stake. But what about the people of the earth? The communities, the ecosystem, both in the arctic and throughout the globe... What will happen to them if the Arctic meltrush goes into full throttle? This talk is about the new cold war, where nations and corporations carve up one of the most important regions on earth and fight amongst themselves for control.. for money.. for power. And as the melt-rush goes forward, citizens of the world are left in the dark about just what plans their governments have and what is at stake for every living thing on earth.
-
-
9:02
»
Hack a Day
If you’ve been playing with electronics for long enough, eventually you’ll need a nice remote control transmitter to control your RC car, airplane, or any other robotics project you have lying around. With these robotics projects comes the problem remote control, and the XBee Handheld Controller may be just the ticket to remotely control any project [...]
-
-
13:01
»
Hack a Day
[Todd Harrison] took a look inside the business end of the cruise control system from his 1994 Jeep Grand Cherokee. We were a bit surprised at how the system operates. The parts seen in the image above make up the throttle control, using a trio of solenoids to vary the level of vacuum inside the device. We [...]
-
-
15:01
»
Hack a Day
Check out this control center which [Awesome0749] built for launching fireworks. From the looks of his stash he’s going to be doing quite a bit of celebrating. The control console is clean and offers some safety features, and he just upgraded to an interesting ignition technique. He’s using CAT5 cable to connect to the fireworks. [...]
-
-
12:01
»
Hack a Day
This remote control tank now takes its orders from a Raspberry Pi board. Well, actually it’s taking orders from commands pushed to the RPi board via SSH. The control scheme works out quite well. Using a low-profile WiFi dongle the RPi automatically connects to the wireless network when it is powered on. This makes it [...]
-
-
10:06
»
Hack a Day
Most of the quadcopter projects that we’ve seen use a joystick-based control system. This lets you fly the thing around like any RC vehicle. But [Saulius] is augmenting his control system by pulling and displaying telemetry data. It doesn’t really change the way the vehicle is controller, but it lets the craft roam much further [...]
-
-
12:01
»
Hack a Day
This wiring nightmare lets [H. Smeitink] map all the buttons from an Xbox 360 controller to his PC. It gives him the ability to push control input from his PC to the console. But it goes a step further than that because it actually acts as a pass-through device. He connected a wired controller to [...]
-
-
6:01
»
Hack a Day
A Remote Sphero-Control Trackball Sphero is a cool little ball that can roll around under the control of a smartphone. Although super-cool by itself, in this application it’s been hacked into a sort of trackball to drive a remote control car! Arduino Voice Control [Sebastian] Wrote in to tell us about this article about using [...]
-
-
17:25
»
Packet Storm Security Exploits
This Metasploit module exploits a stack-based buffer overflow in NetOp Remote Control 9.5. When opening a .dws file containing a specially crafted string longer then 520 characters will allow an attacker to execute arbitrary code.
-
-
10:01
»
Hack a Day
[Demetris] sent in a project he’s been working on over the last year. It’s called the Open Source Radio Control, and promises to be a modular platform for every imaginable remote control transmitter need. If you’d like to control a bipedal android or a 3D aerobatic model plane, the OSRC can do it while transmitting [...]
-
-
11:15
»
Hack a Day
This game of Space Invaders is played by tilting your iPhone to the left or right. It’s a demonstration of HTML5 used to link devices in-browser. The only setup that’s required is for the base device to load up a webpage, then the control device scans a QR code (or just types in a link) to [...]
-
-
12:01
»
Hack a Day
[Joris Laurenssen] has been hanging onto this robotic arm for about twenty years. His most recent project uses some familiar tools to add voice control for each of the arm’s joints. The arm has its own controller which connects via a DB-25 port. [Joris'] first task was to figure out what type of commands are [...]
-
12:01
»
Hack a Day
[Joris Laurenssen] has been hanging onto this robotic arm for about twenty years. His most recent project uses some familiar tools to add voice control for each of the arm’s joints. The arm has its own controller which connects via a DB-25 port. [Joris'] first task was to figure out what type of commands are [...]
-
-
2:02
»
Sophos product advisories
In the Sophos Control Center you see that a number of endpoint computers are reporting their 'up to date status' as Unknown.
-
-
13:21
»
Hack a Day
Controlling LEDs is really quite simple. As you know, they need to be current limited which is as easy as applying Ohm’s law to your given set of values. To make things even more even there’s a slew of constant current LED driver chips out there that can be had for a song. But do [...]
-
-
3:11
»
Packet Storm Security Tools
Access Road is an access control simulator written in Java. Out of the box simulations currently support GNU/Linux and MySQL server.
-
-
8:01
»
Hack a Day
Because his computer is gradually turning into an all-inclusive media display device, [Shawn] figured a remote to control the volume and a video playlist would be a reasonable addition. TV remotes for computers have been around for years, but [Shawn] decided to go the DIY route and build his own computer remote. For the build, [...]
-
-
11:01
»
Hack a Day
Here’s one way to get more control of your camera lenses. [Vladimir] built an Arduino-based pass-through ring (translated) which intercepts automatic lens controls. It’s meant for use with the Canon EOS lenses which have their own electronics allowing control of things like focus and zoom. It seems like part of the motivation here was to uses the [...]
-
-
22:12
»
Packet Storm Security Exploits
This Metasploit module exploits a vulnerability in the CmdProcessor.exe component of Trend Micro Control Manager up to version 5.5. The specific flaw exists within CmdProcessor.exe service running on TCP port 20101. The vulnerable function is the CGenericScheduler::AddTask function of cmdHandlerRedAlertController.dll. When processing a specially crafted IPC packet, controlled data is copied into a 256-byte stack buffer. This can be exploited to execute remote code under the context of the user.
-
22:12
»
Packet Storm Security Recent Files
This Metasploit module exploits a vulnerability in the CmdProcessor.exe component of Trend Micro Control Manager up to version 5.5. The specific flaw exists within CmdProcessor.exe service running on TCP port 20101. The vulnerable function is the CGenericScheduler::AddTask function of cmdHandlerRedAlertController.dll. When processing a specially crafted IPC packet, controlled data is copied into a 256-byte stack buffer. This can be exploited to execute remote code under the context of the user.
-
22:12
»
Packet Storm Security Misc. Files
This Metasploit module exploits a vulnerability in the CmdProcessor.exe component of Trend Micro Control Manager up to version 5.5. The specific flaw exists within CmdProcessor.exe service running on TCP port 20101. The vulnerable function is the CGenericScheduler::AddTask function of cmdHandlerRedAlertController.dll. When processing a specially crafted IPC packet, controlled data is copied into a 256-byte stack buffer. This can be exploited to execute remote code under the context of the user.
-
-
8:01
»
Hack a Day
Industrial control robot band Remember Animusic, a series of videos featuring computer-generated, highly implausible instruments? Intel made their own to demo their industrial control tech. From the looks of things, we’re putting money on a bunch of MIDI triggers bolted onto plastic panels; now it’s slightly less impressive and the reason we’re looking at xylophones on eBay right now. [...]
-
-
9:01
»
Hack a Day
Because switching apps to change a song is such a taxing ordeal, [Oscar Celma] and [Ching-Wei Chen] decided to use their collective brainpower to change Last.FM playlists with their minds. They call their project Buddhafy, and it works by taking off-the-shelf EEG hardware and tying it into music streaming APIs. For the build, the guys used [...]
-
-
8:14
»
Packet Storm Security Recent Files
DACS is a light-weight single sign-on and role-based access control system providing flexible, modular authentication methods and powerful, transparent rule-based authorization checking for Web services, CGI programs, or virtually any program.
-
8:14
»
Packet Storm Security Tools
DACS is a light-weight single sign-on and role-based access control system providing flexible, modular authentication methods and powerful, transparent rule-based authorization checking for Web services, CGI programs, or virtually any program.
-
8:14
»
Packet Storm Security Misc. Files
DACS is a light-weight single sign-on and role-based access control system providing flexible, modular authentication methods and powerful, transparent rule-based authorization checking for Web services, CGI programs, or virtually any program.
-
-
19:46
»
Packet Storm Security Advisories
Secunia Research has discovered a vulnerability in NTR ActiveX control, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by missing input validation in the handling of the "StopModule()" method and can be exploited via a specially crafted "lModule" parameter to reference an expected module structure at an arbitrary memory address. This can be exploited to dereference an arbitrary value in memory as a function pointer. Successful exploitation allows execution of arbitrary code. NTR ActiveX Control version 1.1.8 is affected.
-
19:46
»
Packet Storm Security Recent Files
Secunia Research has discovered a vulnerability in NTR ActiveX control, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by missing input validation in the handling of the "StopModule()" method and can be exploited via a specially crafted "lModule" parameter to reference an expected module structure at an arbitrary memory address. This can be exploited to dereference an arbitrary value in memory as a function pointer. Successful exploitation allows execution of arbitrary code. NTR ActiveX Control version 1.1.8 is affected.
-
19:46
»
Packet Storm Security Misc. Files
Secunia Research has discovered a vulnerability in NTR ActiveX control, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by missing input validation in the handling of the "StopModule()" method and can be exploited via a specially crafted "lModule" parameter to reference an expected module structure at an arbitrary memory address. This can be exploited to dereference an arbitrary value in memory as a function pointer. Successful exploitation allows execution of arbitrary code. NTR ActiveX Control version 1.1.8 is affected.
-
19:33
»
Packet Storm Security Advisories
Secunia Research has discovered four buffer overflows in the NTR ActiveX control, which can be exploited by malicious people to compromise a user's system. NTR ActiveX Control version 1.1.8 is affected.
-
19:33
»
Packet Storm Security Recent Files
Secunia Research has discovered four buffer overflows in the NTR ActiveX control, which can be exploited by malicious people to compromise a user's system. NTR ActiveX Control version 1.1.8 is affected.
-
19:33
»
Packet Storm Security Misc. Files
Secunia Research has discovered four buffer overflows in the NTR ActiveX control, which can be exploited by malicious people to compromise a user's system. NTR ActiveX Control version 1.1.8 is affected.
-
9:01
»
Hack a Day
If you’re looking to remotely control things around the house, but can’t do it over the Internet or via WiFi, the TiDiGino just might have what you’re looking for. [Boris Landoni] from Open Electronics sent some information on the TiDiGino our way, and it certainly looks like a useful device if you’re in need of [...]
-
-
6:28
»
Hack a Day
Servo control is good, but wireless control is even better. This hack by [PyroElectro Tutorials] shows you how to do this wirelessly using two Xbee modules. There’s also a great example in the video after the break of this “hacking platform” used to control an animatronic head’s eyes. (we’ve featured the eyes here before). In [...]
-
-
11:34
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Control Manager.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
11:34
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Control Manager.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
10:01
»
Hack a Day
[Owen] has a fairly big project in the works, where he’ll need to use infrared light to send data wirelessly between two nodes. The only problem with his grand plan is that he has never built anything of the sort. As a learning exercise, he decided to try his hand at building a wireless control [...]
-
-
8:01
»
Hack a Day
[Andrzej] loves his Nokia N900, noting that it makes a great portable gaming device. Since it supports a wide array of emulators, it’s perfect for indulging his gaming nostalgia on the go. He says that the one downside to the N900 is that its keyboard doesn’t make gaming easy, nor comfortable. To make gaming a [...]
-
-
11:59
»
Hack a Day
[Dmitry Grinberg] has to walk all the way across his bedroom to switch the lamp on and off. The drudgery of this finally became too much, so he built a remote control and added dimming for good measure. Above you can see the circuitry for the remote and the receiver, as well as the finished [...]
-
-
11:07
»
Hack a Day
[Eberhard] wanted his own reflow oven but didn’t really want to mess around with the internals that control the heating element. He put his microcontroller programming experience to work and came up with an add-on module that controls the oven by switching the mains power. The image above shows a board in the midst of the [...]
-
-
5:01
»
Hack a Day
[Eric Gregori] had an OWI535 toy robotic arm. Although cheap (coming it at around $30) the arm is only set up to be used via a wired control box. [Eric] knew he could do better by adding computer control via a TI Launchpad and motor driver peripheral. The arm has shoulder, elbow, and wrist joints, [...]
-
-
7:48
»
Packet Storm Security Advisories
Secunia Research has discovered a vulnerability in DVR Remote ActiveX Control version 2.1.0.39, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by the ActiveX control during instantiation automatically downloading and loading DVRobot.dll from the "manifest" folder of the web server invoking the ActiveX control. Successful exploitation allows execution of arbitrary code via a specially crafted web page and hosted DVRobot.dll file.
-
7:48
»
Packet Storm Security Recent Files
Secunia Research has discovered a vulnerability in DVR Remote ActiveX Control version 2.1.0.39, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by the ActiveX control during instantiation automatically downloading and loading DVRobot.dll from the "manifest" folder of the web server invoking the ActiveX control. Successful exploitation allows execution of arbitrary code via a specially crafted web page and hosted DVRobot.dll file.
-
7:48
»
Packet Storm Security Misc. Files
Secunia Research has discovered a vulnerability in DVR Remote ActiveX Control version 2.1.0.39, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by the ActiveX control during instantiation automatically downloading and loading DVRobot.dll from the "manifest" folder of the web server invoking the ActiveX control. Successful exploitation allows execution of arbitrary code via a specially crafted web page and hosted DVRobot.dll file.
-
7:41
»
Packet Storm Security Recent Files
This Metasploit module exploits a stack based buffer overflow in the Active control file ImageViewer2.OCX by passing a overly long argument to an insecure TifMergeMultiFiles() method. Exploitation results in code execution with the privileges of the user who browsed to the exploit page. The victim will first be required to trust the publisher Viscom Software. This Metasploit module has been designed to bypass DEP and ASLR under XP IE8, Vista and Win7 with Java support.
-
7:41
»
Packet Storm Security Misc. Files
This Metasploit module exploits a stack based buffer overflow in the Active control file ImageViewer2.OCX by passing a overly long argument to an insecure TifMergeMultiFiles() method. Exploitation results in code execution with the privileges of the user who browsed to the exploit page. The victim will first be required to trust the publisher Viscom Software. This Metasploit module has been designed to bypass DEP and ASLR under XP IE8, Vista and Win7 with Java support.
-
-
11:01
»
Hack a Day
[Christopher] found a way to get a bit more mileage out of his TV-B-Gone kit. The little device is intended to turn off every television in range with the push of a button. But at its core it’s really just a microcontroller connected to some infrared LEDs. Instead of sending codes to shut of televisions, [...]
-
-
11:01
»
Hack a Day
As the Open Source Hardware movement gathers steam, it has become clear that the tools to work collaboratively on hardware are in the dark ages when compared with slick frameworks like Git used to work on software projects. We’ve read a fair amount about this lately, but the idea of visual difference generation for PCB [...]
-
-
23:25
»
Sophos product advisories
You are not able to install Sophos Mobile Control (SMC) 1.1 on devices where the operating system was updated to iOS 5. The device displays the error 'Download failed. Safari cannot download this file.'
-
-
13:14
»
Packet Storm Security Exploits
Easy Hosting Control Panel suffers from an administrative authentication bypass vulnerability. Versions 0.29.10 through 0.29.13 are affected.
-
13:14
»
Packet Storm Security Misc. Files
Easy Hosting Control Panel suffers from an administrative authentication bypass vulnerability. Versions 0.29.10 through 0.29.13 are affected.
-
-
13:25
»
Hack a Day
If you ask us, there’s no substitute for learning by doing. But often the hardest part of acquiring new skills is coming up with the idea for a project that utilizes them. [Mike Rankin] wanted to develop a project using laser cut acrylic, and settled on building a control box for an RGB LED strip. [...]
-
-
12:04
»
Hack a Day
[James] is one of those guys on a quest to control everything with one device. His tool of choice is an Android phone, which can do quite a lot right out of the box. But he was never satisfied with its lack of IR remote control abilities. He fixed that feature-gap by building a Bluetooth [...]
-
-
15:01
»
Hack a Day
[gijs] sent in the control voltage sequencer he’s been working on that uses the TVout Arduino library to provide a graphical interface. The sequencer doesn’t produce any sound on its own. Instead, it outputs a Control Voltage so other synths can be sequenced with [gijs]‘ TVSCV. Before MIDI came around, CV was the standard to [...]
-
-
7:01
»
Hack a Day
[Old bit collector] is giving up control of his radio dial to the Internet. He combined a couple of Parallax products which now allow him to tune, adjust volume, and toggle the power for an FM radio receiver. The setup is pretty simple. An FM receiver module is mounted in the breadboard seen above which [...]
-
5:01
»
Hack a Day
[SpiralBrain] needed to figure out the coding scheme used by an IR remote control so that he could use it with his own project. He built an IR receiver board for the PICkit 2 and figured out how to use some of the Microchip software to measure the timing of the incoming signal. The hardware’s [...]
-
-
13:01
»
Hack a Day
While [Bremster] likes the view from his office window, he often needs to get up and adjust the blinds several times throughout the day in order to keep the glare from killing his eyes. Like any other enterprising hacker, he decided that constantly adjusting them was too repetitive, and that he could automate the process [...]
-
-
15:34
»
SecuriTeam
Potential security vulnerabilities have been identified in HP Insight Control performance management for Windows.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
15:01
»
Hack a Day
Looking at the size of this bristlebot the first thing we wondered is where’s the battery? All we know is that it’s a rechargeable NiMH and it must be hiding under that tiny circuit board. But [Naghi Sotoudeh] didn’t just build a mindless device that jiggles its way across a table. This vibrating robot is controllable [...]
-
-
4:05
»
Hack a Day
The Kinect is an interesting beast. On one hand, it’s fantastic for hacking – a purpose for which it was not designed. On the other hand, it’s “just OK” when it comes to gaming – its entire reason for being. One of the big complaints regarding the Kinect’s control scheme is that it’s no good [...]
-
-
8:01
»
Hack a Day
[Manishi] wrote in to share his latest project, a Bluetooth DSLR controller that works with Android. More than a mere Bluetooth shutter trigger, his device lets you control a wide array of other settings such as aperture, shutter speed, ISO, white balance, focus position and live view. His “YaNis” control system was built using an [...]
-
-
23:54
»
SecuriTeam
Remote unauthorized elevation of privilege, execution of arbitrary code, encryption downgrade, information disclosure and Denial of Service (DoS) vulnerabilities were identified in Insight Control for Linux.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
11:01
»
Hack a Day
Here’s an altered PCB that gives USB control to an Ikea Dioder. This is a $50 product that comes with four strips each containing nine RGB LEDs. The stock controller has a color selection wheel and a couple of buttons. [Rikard Lindström] wanted to use it to match ambient light to the colors of his [...]
-
-
13:01
»
Hack a Day
Here’s an Android headphone add-on so clean that most people won’t know you built it yourself. [Will Robertson] was unsatisfied with the stock headphones that came with his HTC phone, but didn’t want to lose the control interface when upgrading. He built this add-on that lets him control the Android music player. He was inspired [...]
-
-
14:01
»
Hack a Day
[Marklar] needed an IR receiver for a project he was working on, and his local electronics store was fresh out. He dug through his junk pile and found an old stereo receiver, so he decided to pull the IR module from it before tossing it out. Once he had it taken apart, he figured that [...]
-
-
16:36
»
Hack a Day
[PJ Allen] has been working on a little robot which he calls Cypherbot. The control circuitry is quite familiar; a Board of Education which features the Basic Stamp 2 microcontroller. This is an older and slower microprocessor, but it works quite well for this application since there’s no need for speed or heavy number crunching. [...]
-
-
13:01
»
Hack a Day
So your electronic hobby skills are coming along quite nicely but you’re not very comfortable doing more than blinking a few LEDs. Now’s a good time to try something new by driving a couple of DC motors. You probably know that you can’t just hook these up to the pins of your favorite uC and [...]
-
-
6:01
»
Hack a Day
[Patrick] wanted a remote control to control some of the robots he’s built. He also wanted to get some data back from his robots, so an inexpensive off-the-shelf solution wouldn’t be up to the task. Like all good geeks, [Patrick] decided to build what he needed. For analog control, [Patrick] decided to use a Wiimote nunchuck. [...]
-
-
10:09
»
Hack a Day
On many new cars, automatic wiper speed control can be had as an upgrade, though most cars do not offer front-end collision prevention at all. [Rishi Hora] and [Diwakar Labh], students at the Guru Tegh Bahadur Institute of Technology in New Delhi, developed their own version of these features, (PDF warning, skip to page 20) which [...]
-
-
9:03
»
Hack a Day
A regular Hack A Day reader sent in a tip about an LM386 stero amplifier with digital volume control. The resulting build is very professional and could easily be adapted into a slick iPod dock build. We’ve seen a few LM386-based amplifiers over the years including one that fits inside a 9V battery, but this [...]
-
-
4:19
»
Sophos product advisories
To make it easier to define an application control policy, Sophos is planning to split the existing category into six new categories.
-
-
8:38
»
Packet Storm Security Exploits
This Metasploit module exploits a vulnerability in the Cisco AnyConnect VPN client vpnweb.ocx ActiveX control. This control is typically used to install the VPN client. An attacker can set the 'url' property which is where the control tries to locate the files needed to install the client. The control tries to download two files from the site specified within the 'url' property. One of these files it will be stored in a temporary directory and executed.
-
8:38
»
Packet Storm Security Recent Files
This Metasploit module exploits a vulnerability in the Cisco AnyConnect VPN client vpnweb.ocx ActiveX control. This control is typically used to install the VPN client. An attacker can set the 'url' property which is where the control tries to locate the files needed to install the client. The control tries to download two files from the site specified within the 'url' property. One of these files it will be stored in a temporary directory and executed.
-
8:38
»
Packet Storm Security Misc. Files
This Metasploit module exploits a vulnerability in the Cisco AnyConnect VPN client vpnweb.ocx ActiveX control. This control is typically used to install the VPN client. An attacker can set the 'url' property which is where the control tries to locate the files needed to install the client. The control tries to download two files from the site specified within the 'url' property. One of these files it will be stored in a temporary directory and executed.
-
-
5:01
»
Hack a Day
Need to switch something on or off using a microcontroller? Using a transistor is one of the best ways to do this, but how exactly do you design properly for transistor switching? [Ben Krasnow] put together a tutorial in which he does an excellent job of explaining the ins and outs of designing transistor control [...]
-
-
14:01
»
Hack a Day
This setup will let you monitor Play Station 3 temperatures and throttle the cooling fan accordingly. [Killerbug666] based the project around an Arduino board, and the majority of the details about his setup are shared as comments in the sketch that he embedded in his post. He installed four thermistors in his PS3 on the CPU [...]
-
-
6:00
»
Hack a Day
[Darrell Taylor] wanted to add a CNC control pendant to his mill but didn’t want to foot the bill which can often run several hundred dollars. These pendants are basically a physical remote control that operates the CNC software that controls the machine. Since he was already using a Linux box running EMC2, it wasn’t [...]
-
-
23:09
»
SecuriTeam
Cisco Network Admission Control (NAC) Guest Server system software contains a vulnerability in the RADIUS authentication software.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
14:08
»
Hack a Day
Having the “can you believe somebody threw this away?” mentality has gotten us into some trouble through the years, but look what [Joshua] found at the scrap yard! It’s a door from a power conversion station and it contains fourteen indicator lights and a lot of other doodads. But since this is just the door, [...]
-
-
13:32
»
Hack a Day
[HuB's] set of 5.1 surround sound speakers was gobbling up a bunch of electricity when in standby as evidenced by the 50 Hz hum coming from the sub-woofer and the burning hot heat sink on the power supply. He wanted to add a way to automatically control the systems and offer the new feature of disconnecting the [...]
-
-
8:53
»
Packet Storm Security Exploits
ICONICS Genesis32 is a suite of OPC, SNMP, BACnet and Web-enabled HMI and SCADA applications. A stack overflow was found in an ActiveX control required by the WebHMI interface. This condition can be used to gain command execution. The affected control is 'GenVersion.dll' and has the ClassID of {CEFF5F48-BD2E-4D10-BAE5-AF729975E223}. This control is marked safe for scripting.
-
8:53
»
Packet Storm Security Recent Files
ICONICS Genesis32 is a suite of OPC, SNMP, BACnet and Web-enabled HMI and SCADA applications. A stack overflow was found in an ActiveX control required by the WebHMI interface. This condition can be used to gain command execution. The affected control is 'GenVersion.dll' and has the ClassID of {CEFF5F48-BD2E-4D10-BAE5-AF729975E223}. This control is marked safe for scripting.
-
8:53
»
Packet Storm Security Misc. Files
ICONICS Genesis32 is a suite of OPC, SNMP, BACnet and Web-enabled HMI and SCADA applications. A stack overflow was found in an ActiveX control required by the WebHMI interface. This condition can be used to gain command execution. The affected control is 'GenVersion.dll' and has the ClassID of {CEFF5F48-BD2E-4D10-BAE5-AF729975E223}. This control is marked safe for scripting.
-
-
4:05
»
Hack a Day
Here’s a setup to control a servo motor with your mind. [Danny Bertner] made this project happen by interfacing a MindWave headset with an Arduino. You might wonder what’s the big deal about that since we’ve covered quite a few mind control hacks that work this way? So far, the majority of those hacks used the [...]
-
-
4:01
»
Hack a Day
Looks like the FBI is starting to get pretty serious about fighting malware. Traditionally they have attacked the servers that activate and control botnets made up of infected computers. This time they’re going much further by taking control of and issuing commands to the botnets. In this instance it’s a nasty little bug called Coreflood, [...]
-
-
7:12
»
Hack a Day
Bring communications jamming technology into your TV viewing experience by building this infrared LED driver circuit. You’re probably familiar with the TV-B-Gone, which let’s you turn off any television at the touch of a button. But what if you actually want to watch the program that’s currently on the screen when the person with remote-in-hand [...]
-
-
5:03
»
Hack a Day
[Marcus] wrote a guide to using TouchOSC to control your projects. He sent a link to us after reading our feature about using Open Sound Control for Arduino without an Ethernet shield. He’s been using that method for quite some time now, but takes it one step further by using a smartphone as a control [...]
-
-
5:01
»
Hack a Day
[Easton] was looking to enter his local science fair and needed a project that would wow the judges. After considering it for a bit, he decided that an animatronic hand would be a sure winner. Many animatronic projects we have seen are connected to a computer for control purposes, but his is a bit different. [...]
-
-
8:00
»
Hack a Day
Open Sound Control (OSC) is a communications protocol that can be seen as a modern alternative to MIDI. It’s specifically designed to play nicely with network communication systems. The problem with using it along with Arduino-based gadgets is that you then need to use something like an Ethernet shield to provide the network connection. [Liam [...]
-
-
15:15
»
Hack a Day
[Rich] over at NothingLabs has put together a really cool laser light show that you really must see in an effort to win a laser cutter from Instructables. His walkthrough discusses the mechanics of laser light shows – specifically how galvanometers are typically used to precisely aim mirrors in order to draw images and write [...]
-
-
5:03
»
Hack a Day
Using IR repeaters for larger home theater setups is not uncommon, but they usually are quite simple. A series of IR receivers are placed throughout a home, all wired to repeat the signals in a central closet where all of the AV equipment is located. [Bill] constructed a solution that works much like a standard [...]
-
-
12:32
»
Packet Storm Security Exploits
This Metasploit module exploits a stack buffer overflow in Novell iPrint Client 5.52. When sending an overly long string to the GetDriverSettings() property of ienipp.ocx an attacker may be able to execute arbitrary code.
-
12:32
»
Packet Storm Security Recent Files
This Metasploit module exploits a stack buffer overflow in Novell iPrint Client 5.52. When sending an overly long string to the GetDriverSettings() property of ienipp.ocx an attacker may be able to execute arbitrary code.
-
12:32
»
Packet Storm Security Misc. Files
This Metasploit module exploits a stack buffer overflow in Novell iPrint Client 5.52. When sending an overly long string to the GetDriverSettings() property of ienipp.ocx an attacker may be able to execute arbitrary code.
-
-
17:40
»
SecuriTeam
SAP Crystal Reports Contains a vulnerability caused due to a boundary error in the "CrystalReports12.CrystalPrintControl.1" ActiveX control.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
4:56
»
Sophos product advisories
To make it easier to define an application control policy, Sophos is planning to split the existing category into six new categories.
-
-
11:19
»
Hack a Day
Hack-a-Day reader [Bobbie] sent us a hack that is an adaptation of the automatic cell phone button pushing machine we featured earlier this week. Inspired by that project, he challenged himself to construct a more efficient way to tackle the problem. He started out in much the same fashion, pointing a camera at the phone [...]
-
-
10:00
»
Hack a Day
[Mirko] is working on a library that will allow you to add RF control to just about any device. The only requirement is that the device be capable of running a Linux kernel, and that it have a few GPIO pins available. One example is fairly straight forward, a Netgear router. Many, if not most [...]
-
-
6:35
»
Sophos product advisories
A bug has been identified in a component of the application control data delivered in the 4.62 release, during week commencing 31 January 2011. This has now been fixed.
-
-
6:00
»
Hack a Day
[Martin] got his evalbot recently and wanted to try controlling it with his Wii nunchuck. After some trial and error, he finally got it working. He’s shown that controlling the bot with the nunchuck was actually pretty simple, but there are some other tips that could be pretty helpful in the process. One was the [...]
-
-
7:10
»
Hack a Day
Is there a place in the dashboard of your high performance automobile for this Engine Control Unit feedback panel? There’s several methods of showing information at work here. The row of LEDs at the top of the bezel provide RPM feedback. The two red LEDs with chrome bezels are alarm indicators. But that big OLED [...]
-
-
8:00
»
Hack a Day
[Chr] picked up a pack of remote control outlets in order to reverse engineer them and build control into his own projects. These can be plugged into outlets around your house and a relay inside each module will switch whatever device is plugged into it after receiving a command from the remote. Once he cracked [...]
-
-
10:59
»
Hack a Day
If this is meant for a model rocket it must be the biggest we’ve ever seen. [Scott] and [Trevor] took on the task of building a rocket attitude control system after reading about some research on the topic. But that researcher only tested the theories using simulations so they set out to build their own. [...]
-
-
21:25
»
SecDocs
Authors:
Silvio Cesare Tags:
malware malware analysis obfuscation Event:
Ruxcon 2010 Abstract: Silvio developed a signature based Malware detection system using control flow graphs as features for his Masters work. Two academic papers were published during this time. He continues the work on malware classification in his PhD. The work is distinguished from previous research by being able to approach the speed and efficiency of traditional Antivirus, yet with the significantly increased effectiveness of using control flow based signatures. Control flow is seen a more accurate identifier of malware variants and relies on fingerprinting program structure instead of the byte-level content. The system is designed to scale for potential applications including desktop Antivirus, E-Mail and Internet gateways.
-
-
7:30
»
Sophos product advisories
Sophos is planning to make changes to the existing Application Control categories. This change will take place with the Endpoint Security and Control v 9.5x update due for release in late March/early April 2011.
-
-
22:07
»
SecuriTeam
A potential security vulnerability has been identified in HP Insight Control for Linux.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
18:24
»
SecuriTeam
A potential security vulnerability has been identified in HP Version Control Repository Manager (VCRM) for Windows.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
16:13
»
Packet Storm Security Exploits
This Metasploit module allows remote attackers to place arbitrary files on a users file system by abusing the "Comp_Download" method in the SAP KWEdit ActiveX Control (kwedit.dll 6400.1.1.41).
-
16:13
»
Packet Storm Security Recent Files
This Metasploit module allows remote attackers to place arbitrary files on a users file system by abusing the "Comp_Download" method in the SAP KWEdit ActiveX Control (kwedit.dll 6400.1.1.41).
-
16:13
»
Packet Storm Security Misc. Files
This Metasploit module allows remote attackers to place arbitrary files on a users file system by abusing the "Comp_Download" method in the SAP KWEdit ActiveX Control (kwedit.dll 6400.1.1.41).
-
-
11:44
»
SecuriTeam
Potential security vulnerabilities have been identified in HP Insight Control Power Management for Windows.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
11:39
»
SecuriTeam
Cross Site Scripting, Privilege Escalation and Unauthorized Access vulnerabilities have been identified in HP Insight Control Server Migration for Windows.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
14:45
»
SecuriTeam
Cross Site Scripting, Privilege Escalation and Cross Site Request Forgery vulnerabilities have been identified in HP Insight Control performance management for Windows.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
14:45
»
SecuriTeam
A potential security vulnerability has been identified in HP Insight Control performance management for Windows.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
13:08
»
Hack a Day
You can salvage some nice motors out of optical drives but they can be tricky to control. That’s because brushless DC motors require carefully timed signals used in a process called Electronic Speed Control (ESC). [Fileark] built and ESC using an Arduino and has a couple of posts explaining the concept and demonstrating how it [...]
-
-
10:41
»
SecuriTeam
Cross Site Scripting, Denial of Service and Cross Site Request Forgery vulnerabilities have been identified in HP Insight Control Virtual Machine Management for Windows.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!