«
Expand/Collapse
244 items tagged "engine"
Related tags:
search engine [+],
ioquake [+],
rocket [+],
owl intranet engine [+],
owl [+],
intranet [+],
denial of service [+],
code execution [+],
template [+],
smarty template engine [+],
smarty [+],
cross [+],
sql injection [+],
sql [+],
shell [+],
rendering [+],
job search [+],
job [+],
heap [+],
google [+],
freetype [+],
engine position [+],
usa [+],
txt [+],
transportation [+],
hackaday [+],
hacks [+],
vulnerability [+],
vulnerability detection [+],
simple [+],
scripting [+],
open proxies [+],
nse experience [+],
nse [+],
nmap [+],
mp3 search engine [+],
motorcycle [+],
mobile mp3 [+],
mobile [+],
memory corruption [+],
manage [+],
javascript engine [+],
fyodor tags [+],
fyodor [+],
fabrica [+],
exchange [+],
engine exchange [+],
david fifield [+],
datalife [+],
brown rob ragan [+],
bing [+],
authors [+],
suricata [+],
security foundation [+],
network intrusion detection [+],
barnyard [+],
zoom [+],
zach hoffmann [+],
stirling engine [+],
stirling [+],
steam [+],
sql directory [+],
shop [+],
security [+],
search engine builder [+],
rocket engine [+],
roberto suggi [+],
refractor [+],
ragan [+],
quake [+],
proof of concept [+],
ppc [+],
oracle [+],
null pointer [+],
null [+],
network search engine [+],
network [+],
netvidade [+],
math [+],
lyrics [+],
layout engine [+],
jaydeonline [+],
internal combustion engine [+],
input validation [+],
inout [+],
information disclosure [+],
ham [+],
grid [+],
forgery [+],
execution [+],
engine versions [+],
directory engine [+],
directory [+],
control [+],
code [+],
cnc [+],
cms [+],
christian holler [+],
builder [+],
buffer overflows [+],
avatarus [+],
authentication [+],
app [+],
xss [+],
vulnerabilities [+],
version 6 [+],
value [+],
united kingdom [+],
theme [+],
service vulnerability [+],
server [+],
rtf document [+],
rtf [+],
remote buffer overflow vulnerability [+],
remote buffer overflow [+],
referer header [+],
radial [+],
pulse [+],
proxy logs [+],
pango [+],
nginx [+],
music plugin [+],
motorcycle engine [+],
misc [+],
liquid fuel rocket [+],
links [+],
jet engine [+],
jet [+],
intelligence [+],
idefense security advisory [+],
harfbuzz [+],
graphics engine [+],
graphics [+],
file upload [+],
day [+],
correlation [+],
corporate web server [+],
copenhagen [+],
cisco security [+],
chrome engine [+],
chrome [+],
chris kubecka [+],
chemistry [+],
chaos communication congress [+],
car [+],
bugtraq [+],
application control [+],
search [+],
zend engine [+],
zend [+],
yard tools [+],
x server [+],
world war ii [+],
work [+],
woodworking [+],
wooden [+],
winter [+],
web applications [+],
web [+],
vw beetle [+],
video [+],
united states [+],
unit [+],
two birds [+],
turbojet [+],
true engine [+],
trolling motor [+],
transmission fluid [+],
transmission [+],
tracking [+],
time [+],
tgz [+],
test [+],
tesla turbines [+],
tesla turbine [+],
tesla roadster [+],
tailgating [+],
tagline [+],
sweden [+],
sun powered [+],
suborbitals [+],
street legal [+],
stormy night [+],
store engine [+],
store [+],
steam power [+],
steam engine [+],
state [+],
spacecraft [+],
sophos [+],
solid rocket propellant [+],
solid propellant [+],
solid fuel [+],
snow blowing [+],
snow [+],
smoke stack [+],
slides [+],
service desk [+],
service [+],
serious business [+],
security issues [+],
search result [+],
search engine v3 [+],
search engine script [+],
search engine optimisation [+],
script sql [+],
script engine [+],
script [+],
scratch [+],
scanner [+],
sap [+],
sand [+],
safer use [+],
s rays [+],
royal enfield [+],
rockets and jets [+],
rocket propulsion [+],
rocket engines [+],
rocket engine test [+],
robots [+],
riquimbilis [+],
riding [+],
restraining orders [+],
reporter [+],
remapshader [+],
recycler [+],
read [+],
radial engine [+],
quake 3 [+],
pulse jets [+],
propulsion system [+],
propulsion [+],
project origin [+],
project [+],
porsche 911 [+],
porsche [+],
pong [+],
poc [+],
piston [+],
php zend [+],
php [+],
peter madsen [+],
performance automobile [+],
penetration test [+],
passwd [+],
parsedownload [+],
paris [+],
parameter [+],
parabolic mirror [+],
overstatement [+],
old beer cans [+],
nikola tesla [+],
next generation [+],
newton [+],
newfangled graphics [+],
newfangled [+],
new graphics [+],
new [+],
music [+],
mozilla firefox [+],
mozilla [+],
motorcycle enthusiasts [+],
motor [+],
moriya hot [+],
molten metal [+],
model rocket engines [+],
mlm [+],
missile [+],
miniature engines [+],
milling [+],
mike [+],
methane [+],
metal pipe [+],
metal fabricator [+],
merlin rocket [+],
melting [+],
magnetos [+],
mad scientist [+],
machining processes [+],
machining [+],
lvl [+],
louisville [+],
lou [+],
lord [+],
local buffer overflow [+],
little drummer boy [+],
lithtech engine [+],
lithtech [+],
liquid propellant rocket [+],
liquid oxygen [+],
lawnmower engine [+],
lawn equipment [+],
kurt [+],
kilo newton [+],
kawaskai [+],
kawasaki kz1300 [+],
kawasaki [+],
kai grundt [+],
junkyard parts [+],
junkyard [+],
john wayland [+],
jobsearch [+],
jeremy cook [+],
javascript [+],
intrusion detection prevention [+],
intrusion [+],
internal combustion engines [+],
injection [+],
ingots [+],
information intelligence [+],
information disclosure vulnerability [+],
information [+],
incredible [+],
ignition [+],
identity [+],
icbms [+],
hybrid rockets [+],
hybrid rocket engine [+],
hybrid rocket [+],
http [+],
horizontal [+],
honda superdream [+],
honda cb400 [+],
home [+],
high voltage equipment [+],
high voltage [+],
hexapod [+],
heap corruption [+],
hash collision [+],
hash [+],
hardware store [+],
hackers [+],
group [+],
green [+],
graham [+],
generator [+],
gasoline [+],
fuel [+],
fubar [+],
flying bomb [+],
fluidyne [+],
fluid [+],
firing [+],
firefox [+],
feedback panel [+],
fasteners [+],
fan [+],
f.e.a.r [+],
engine server [+],
engine models [+],
engine machinist [+],
engine designs [+],
engine database [+],
engine core [+],
empirical data [+],
embargo against cuba [+],
economic embargo [+],
drive shaft [+],
dragon space [+],
direction [+],
diesel [+],
detroit [+],
detection [+],
denial [+],
david nash [+],
david morrow [+],
datsun 1200 [+],
datsun [+],
date [+],
datalife engine [+],
darknet [+],
dan [+],
d14 [+],
cylinder engine [+],
cve [+],
custom [+],
cuba [+],
cruise missile [+],
cruise [+],
credentials [+],
crankcase [+],
coupling [+],
core [+],
combustion [+],
cold side [+],
coil ignition system [+],
cnc router [+],
cleverness [+],
classic chevy [+],
cisco security advisory [+],
cisco application [+],
cisco [+],
christmas tune [+],
chaos communication camp [+],
casts [+],
building [+],
bruce simpson [+],
brock [+],
bond theme [+],
bond [+],
blower [+],
black ops [+],
bezels [+],
berto [+],
ben krasnow [+],
beer [+],
babbage [+],
audio [+],
attentive reader [+],
artist [+],
application [+],
andreas georgeades [+],
analytical engine [+],
analytical [+],
amateur rocket [+],
aluminum cans [+],
allen millyard [+],
alex [+],
air [+],
advisory [+],
ace application [+],
Hardware [+],
Countermeasures [+],
tar gz [+],
multiple [+],
buffer overflow vulnerability [+],
social [+],
cross site scripting [+]
-
-
1:01
»
Hack a Day
Typically, we associate Vespas with Italians, riding their posh scooters midday under the heat of the Mediterranean sun. In one community, however, the riders and vehicles are pretty different – and by that we mean a whole lot different. Think Mad Max: Fury Road meets The Jungle Book.
The first Vespa arrived in Indonesia in the 1960s when the vehicles were rewarded to Indonesian peacekeepers returning from a mission in Africa. While many of the Vespas on the archipelago maintain the same classic style, some riders have modified theirs into entirely new conceptions.

Indonesian photographer [Muhammad Fadli] captures these riders on their Vespa sampah (“garbage Vespa”) and Vespa gembel (“Vespa drifter”), as they are known by locals. The unique design of the riders is partially attributed to their emergence in the early 2000s coinciding with the fall of the Soeharto authoritarian regime. The newfound freedom and self expression, as well as the relaxed law enforcement, contributed to the development of new types of modified vehicles on the road.
While the scooters are widespread, there isn’t any known count of extreme Vespas in the country. Most of the Vespas are not meant for riding, but rather to show off their physical form. While some are made from cheap steel frames and tires, others are adorned with road scraps and symbols. Anything from buffalo skeletons to machine gun rounds are used to accentuate the design of the scooters, many of which have a punk or metal vibe.
Within the community, there are annual extreme Vespa gatherings, which can draw thousands of riders from all over Indonesia. From frames made of bamboo to frames made of garbage, stalls that collect recyclables to add to their vehicles, and riders from all walks of life, there’s no apparent limit to the builders’ creativity.
[Thanks edmonkey for the tip!]
-
-
22:00
»
Hack a Day
A solenoid engine is a curiosity of the electrical world. By all measures, using electricity to rotate something can be done almost any other way with greater efficiency and less hassle. But there’s just something riveting about watching a solenoid engine work. If you want to build one of your own and see for yourself, [Emiel] aka [The Practical Engineer] has a great how-to.
For this build though he used a few tools that some of us may not have on hand, such as a lathe and a drill press. The lathe was used to make the plastic spool to hold the wire, and also to help wind the wire onto the spool itself rather than doing it by hand. He also milled the wood mounts and metal bearings as well, and the quality of the work really shows through in the final product. The final touch is the transistor which controls power flow to the engine.
If you don’t have all of the machine tools [Emiel] used it’s not impossible to find substitute parts if you want to build your own. It’s an impressive display piece, or possibly even functional if you want your build to have a certain steampunk aesthetic (without the steam). You can even add more pistons to your build if you need extra power.
-
-
7:01
»
Hack a Day
The first scramjet, an airbreathing jet engine capable of pushing an aircraft beyond Mach 5, was successfully flown in the early 1990s. But while pretty much any other technology you could imagine has progressed by leaps and bounds in the nearly 30 years that have passed, the state-of-the-art in hypersonic scramjets hasn’t moved much. We still don’t have practical hypersonic aircraft, military or otherwise, and any missiles that travel at those sort of speeds are rocket powered.

NASA’s X-43 hit Mach 9.6 in 2004
This is somewhat surprising since, at least on paper, the operating principle of the scramjet is simplicity itself. Air rushing into the engine is compressed by the geometry of the inlet, fuel is added, the mixture is ignited, and the resulting flow of expanded gases leaves the engine faster than it entered. There aren’t even any moving parts inside of a scramjet, it’s little more than a carefully shaped tube with fuel injectors and ignitors in it.
Unfortunately, pulling it off in practice is quite a bit harder. Part of the problem is that a scramjet doesn’t actually start working until the air entering the engine’s inlet is moving at around Mach 4, which makes testing them difficult and expensive. It’s possible to do it in a specially designed wind tunnel, but practically speaking, it ends up being easier to mount the engine to the front of a conventional rocket and get it up to speed that way. The downside is that such flights are one-way tickets, and end with the test article crashing into the ocean once it runs out of fuel.
But the bigger problem is that the core concept is deceptively simple. It’s easy to say you’ll just squirt some jet fuel into the stream of compressed air and light it up, but when that air is moving at thousands of miles per hour, keeping it burning is no small feat. Because of this, the operation of a scramjet has often been likened to trying to light a match in a hurricane; the challenge isn’t in the task, but in the environment you’re trying to perform it in.
Now, both Aerojet Rocketdyne and Northrop Grumman think they may have found the solution: additive manufacturing. By 3D printing their scramjet engines, they can not only iterate through design revisions faster, but produce them far cheaper than they’ve been able to in the past. Even more importantly, it enables complex internal engine geometries that would have been more difficult to produce via traditional manufacturing.
More Time to Burn
The term scramjet is short for “supersonic combustion ramjet”, which actually gives us a pretty good clue as to what’s going on inside of one. While scramjets work at hypersonic speeds beyond Mach 5, a ramjet operates from just below the speed of sound to about Mach 3. They function on essentially the same principle, but with one very important distinction: the air inside the ramjet is slowed down to subsonic velocity during the combustion stage, while in a scramjet it travels through the engine at supersonic speeds.
Not slowing the airflow inside the engine is key to the higher operational velocity of the scramjet, but it’s also the element that makes sustained combustion so difficult. Imagine a hypothetical scramjet engine with a combustion chamber that’s one meter long; at a velocity of Mach 5, air traveling in a straight line will only be inside the chamber for a fraction of a millisecond. That doesn’t give it a lot of time to mix with the fuel and ignite.
The best option for increasing the amount of time the engine has to burn the fuel and air mix, referred to as the “residence time”, is to complicate its internal geometry. Dotting the inside of the combustion chamber with small flameholder cavities gives the gasses somewhere to linger, and research has shown this greatly improves overall engine stability at hypersonic speeds.
There are a few competing ideas in regards to the shape of these cavities, but the most common approach uses indentations with a 90° leading edge and sloped back wall. According to the research paper Cavity Flame-Holders for Ignition and Flame Stabilization in Scramjets, when these indents are located aft of the fuel injection ports, the sudden drop at the front of the step creates a void in which gasses will recirculate. The angled back wall helps prevent the shockwaves which would otherwise be generated if the flow struck a flat surface after dipping down into the cavity.

In a traditionally manufactured scramjet, these indentations would be milled into the walls of the combustion chamber. But with additive manufacturing, they can be integrated at the time of manufacture. Not only will this save time and money during the production of the engine, but it also allows for the size and position of the cavities to be experimentally adjusted. Research so far indicates that the more cavities the better, and that a “wavy” surface on the inside of the combustion chamber may be ideal.
Faster and Smaller
For the production of only a few scramjet engines, say for a small fleet of hypersonic reconnaissance aircraft, then the cost and time savings of additive manufacturing probably wouldn’t be that big of a deal. When it comes to developing cutting-edge military aircraft, history tells us the United States government is more than willing to spend whatever money is required to maintain technological superiority. But at least in the near term, the most likely application for hypersonic scramjet engines isn’t a plane.

Boeing X-51 Waverider mounted to the wing of a B-52
Aerojet Rocketdyne and Northrop Grumman have partnered with Lockheed Martin and Raytheon respectively to develop entries for the Defense Advanced Research Projects Agency’s (DARPA) Hypersonic Air-breathing Weapon Concept (HAWC) program, which aims to develop an affordable air-launched hypersonic missile. The program is the logical progression of the research performed during the development of the Boeing X-51 Waverider, which in 2013 set the record for the world’s longest flight of a hypersonic scramjet.
While the Waverider was successful, it was built as a technical demonstrator and never designed to be operational weapon. DARPA and the US Air Force now want to take the knowledge gained during the X-51 program and apply it to a mass-produced missile. With that shift naturally comes the need to build the engines as quickly and as cheaply as possible. There’s also a desire to miniaturize the weapon; the Waverider had to be carried aloft by a B-52 bomber, but a hypersonic cruise missile small enough to be carried by a fighter jet would be faster and less costly to deploy.
To achieve that goal, both teams have announced they are utilizing 3D printed scramjet engines. According to Aviation Week, the scramjet engine developed by the Raytheon and Northrop Grumman team is less than half the mass of the one that was used in the Boeing X-51 Waverider.
Getting Up to Speed
As you might expect with an ongoing weapons development competition, there’s a lot we don’t know about the HAWC program and its competitors. But we do know that the 3D printed engines built by Aerojet Rocketdyne and Northrop Grumman are both very far along in their development. While the exact timetable of these tests are naturally classified, DARPA Director Steven Walker told reporters in May that flight testing of at least one of the HAWC entries would happen before the close of the calendar year.
With Russia and China developing arsenals of hypersonic weapons, the United States military is highly motivated to bring their own Mach 5+ missiles and aircraft up to operational status. Some analysts believe this may be a relatively rare instance where the US is lagging behind in weapons technology, but with programs like HAWC and innovative approaches to decade’s old problems, the race may be heating up soon.
-
-
7:01
»
Hack a Day
Spaceflight is inherently dangerous. It takes a certain type of person to willingly strap into what’s essentially a refined bomb and hope for the best. But what might not be so obvious is that the risks involved aren’t limited to those who are personally making the trip. The construction and testing of space-bound vehicles poses just as much danger to engineers here on the ground as it does to the astronauts in orbit. Arguably, more so. Far more individuals have given their lives developing rocket technology than have ever died in the cockpit of one of them.

Reddish brown exhaust of hydrazine thrusters
Ultimately, this is because of the enormous amount of energy stored in the propellants required to make a rocket fly. Ground support personnel need to exercise great care even when dealing with “safe” propellants, such as the classic combination of kerosene and liquid oxygen. On the other end of the spectrum you have chemicals that are so unstable and toxic that they can’t be handled without special training and equipment.
One of the most dangerous chemicals ever used in rocket propulsion is hydrazine; and yet from the Second World War to the present day, it’s been considered something of an occupational hazard of spaceflight. While American launch vehicles largely moved away from using it as a primary propellant, hydrazine is still commonly used for smaller thrusters on spacecraft.
When SpaceX’s Crew Dragon exploded in April during ground tests, the release of approximately one and a half tons of hydrazine and nitrogen tetroxide propellants required an environmental cleanup at the site.
But soon, that might change. NASA has been working on a project they call the Green Propellant Infusion Mission (GPIM) which is specifically designed to reduce modern spacecraft’s dependency on hydrazine. In collaboration with the Air Force Research Laboratory at California’s Edwards Air Force Base, the space agency has spearheaded the development of a new propellant that promises to not just replace hydrazine, but in some scenarios even outperform it.
So what’s so good about this new wonder fuel, called AF-M315E? To really understand why NASA is so eager to power future craft with something new, we first have to look at the situation we’re in currently.
Literal Nightmare Fuel
The term “Nightmare Fuel” is Internet-speak for something that’s so terrible that you’ll lose sleep just looking at it. In the case of hydrazine, that’s not very far off. If this high-level summary of the dangers of hydrazine by the United States Environmental Protection Agency isn’t enough to give you pause, you’re either very brave or very foolish:
Symptoms of acute (short-term) exposure to high levels of hydrazine may include irritation of the eyes, nose, and throat, dizziness, headache, nausea, pulmonary edema, seizures, and coma in humans. Acute exposure can also damage the liver, kidneys, and central nervous system in humans. The liquid is corrosive and may produce dermatitis from skin contact in humans and animals. Effects to the lungs, liver, spleen, and thyroid have been reported in animals chronically (long-term) exposed to hydrazine via inhalation. EPA has classified hydrazine as a Group B2, probable human carcinogen.
That’s a risk of central nervous system damage and coma from short term exposure. But of course, that’s just talking about what happens if it leaks or spills around humans. What happens if there’s an explosion, and the hydrazine fills the air? The situation goes from bad to far, far worse.
In October of 1960, a prototype R-16 intercontinental ballistic missile fueled by a derivative of hydrazine exploded on the launch pad at the Baikonur test range in the Soviet Union. Between the monstrous force of the explosion and the deadly fumes which engulfed anyone who survived the initial blast, 78 lives were lost. The incident, known as the “Nedelin Catastrophe“, helped earn the R-16’s specific blend of nitric acid and hydrazine the nickname Devil’s Venom.
So given how dangerous hydrazine is, why do we keep using it? The simple answer is, it’s an exceptionally versatile rocket fuel. Some formulations of it are used as a hypergolic propellant, which means it will ignite immediately when combined with an oxidizer such as dinitrogen tetroxide. It can also be used as a monopropellant, where it gets passed through a catalyst bed that instantly breaks it down into a large volume of hot gas. In either form it’s extremely reliable and stable enough to be stored indefinitely.
The Little Green Giant
To be clear, AF-M315E isn’t intended to replace hydrazine in hypergolic engines like those on the SpaceX Crew Dragon. Rather, it’s designed to replace hydrazine when used as a monopropellant. As that’s how it’s more commonly used on American vehicles, NASA doesn’t see that as a limitation. Monopropellant thrusters are generally used on spacecraft for maneuvering and performing orbit adjustments, though they are occasionally used in more exciting applications. For instance, hydrazine monopropellant was used in the “Sky Crane” that delivered the Curiosity rover to the Martian surface.

A prototype AF-M315E thruster
So how does AF-M315E compare with hydrazine as a monopropellant? At least on paper, very well. Testing has shown that it’s more efficient, offering a 12% higher specific impulse (ISP). It’s also 45% denser than hydrazine, which means you can either bring more of it in the same sized tanks, or simply load less of it onto your craft and enjoy the mass savings. As a practical example, Aerojet Rocketdyne estimated that using AF-M315E instead of hydrazine on Curiosity’s descent thrusters would have allowed adding an additional 58 kilograms of payload onto the rover; an increase of around 6%.
Based on the improved performance alone, AF-M315E would be worth looking into as an eventual replacement to hydrazine. But the biggest advantage is how much safer it is for the humans who have to work with it. While it’s not exactly inert, handling AF-M315E only requires the sort of equipment you might use when working with a strong acid: gloves and a face shield. Compared to the full-body hazmat suits required when working with hydrazine, being able to perform propellant loading in this so-called “shirt sleeve” environment would be a minor revolution in how we prepare spacecraft for flight.

A scientist handling AF-M315E in a standard beaker
If your spacecraft runs on hydrazine, it has to be transported with empty tanks and fueled prior to liftoff by a group of trained professionals in a secured location. This is not only a slow process, but an expensive one: filling even a small spacecraft’s tanks with hydrazine will easily add a six-figure line item to your budget.
But AF-M315E promises to change this paradigm completely. The propellant can be stored in plastic or glass bottles, and can be shipped through carriers such as FedEx. Any company, college, or even hackerspace, that has the technical ability to produce a CubeSat would also be able to safely load AF-M315E into their vehicle. The Department of Transportation is even looking at allowing craft filled with AF-M315E to be transported on public roads.
Not only would in-house fueling make building small spacecraft cheaper, but it would also reduce the workload for ground processing personnel at the launch site. Overall, this leads to less time on the ground and more time in space.
Real-World Testing
Luckily, we won’t have to wait too long before we know if this new propellant can deliver on its promises. On June 25th, a small satellite manufactured by Ball Aerospace and bristling with AF-M315E thrusters hitched a ride to space on SpaceX’s Falcon Heavy. It will spend a little more than a year in orbit, testing the performance of these thrusters and verifying everything works as expected.
As this is the first AF-M315E powered spacecraft in history, there’s plenty of unknowns to contend with. One of the main goals of the test is to see how the thrusters respond after sitting dormant for months on end. Since a spacecraft only fires its thrusters when necessary, it’s not uncommon to go months or perhaps even years between burns. Any propellant that hopes to dethrone hydrazine will need to be able to meet its ability to roar into action at a moment’s notice.
Even assuming everything goes well with this first GPIM mission, we won’t be rid of hydrazine overnight. As nasty as it is, manufacturers have decades of experience with it and have long since come to terms with the risks involved in handling it. The increased performance of AF-M315E will probably help convince aerospace manufacturers that it’s worth looking into converting their designs over to this new “green” propellent, but it may ultimately take pressure from the customer to get the ball rolling. Once the companies buying and operating these craft realize the time and money that can be saved by using a different fuel, you can be sure they’ll take it into account when shopping around for their next satellite.
-
-
8:00
»
Hack a Day
Jet engines are known to be highly demanding machines, requiring the utmost attention to tolerances, material specifications, and operating regimes. If any of these parameters are ignored, failures can be catastrophic and expensive. Despite these exacting requirements, it is possible to build a jet engine in the home workshop – …read more
-
-
16:00
»
Hack a Day
[Quasse] bought a 1978 Honda NC50 Express moped with the intention of fixing it up and riding it, only to find that the engine was beyond repair. So, they did what any self-respecting hacker would do: tear out the motor and replace it with an electric one. It’s still a work in progress, but they have got it up and running by replacing the engine with a Turnigy SK3 6374 motor, a 192KV motor that [Quasse] calculated should be able to drive the moped at just over 30 miles per hour. Given that this was the top speed that the …read more
-
-
7:00
»
Hack a Day
Amongst the more difficult machining tasks in the world are those involved in the production of internal combustion engines. Thanks to the Internet, it’s now possible to watch detailed videos of master craftsmen assembling tiny desktop V8 and V12 engines in home workshops with barely a CNC in sight. However, up until now, most of these builds have been left on the test stand to bark and wail away. No longer – [Keith] has decided that needs to change.
We’ve seen [Keith]’s work before – particularly, his 125cc V10 build, featuring fuel injection, dual overhead cams, and even a supercharger. …read more
-
-
13:00
»
Hack a Day
There are very few machines as complex to build as a turbojet engine. The turbine blades on a commercial airliner are grown from a single crystal of metal. The engineering tolerances are crazy, and everything spins really, really fast. All of these problems aren’t a concern for [Igor], who’s building what will probably end up being the world’s smallest turbojet engine. He’s doing it in his home shop, and a lot of the work is being done by hand. We don’t know the Russian translation for ‘hold my beer’, but [Igor] certainly does.
The design of this turbojet — as …read more
-
-
7:01
»
Hack a Day
On October 24th, 2003 the last Concorde touched down at Filton Airport in England, and since then commercial air travel has been stuck moving slower than the speed of sound. There were a number of reasons for retiring the Concorde, from the rising cost of fuel to bad publicity following a crash in 2000 which claimed the lives of all passengers and crew aboard. Flying on Concorde was also exceptionally expensive and only practical on certain routes, as concerns about sonic booms over land meant it had to remain subsonic unless it was flying over the ocean.
The failure of …read more
-
-
4:00
»
Hack a Day
We can certainly relate to an incomplete project sowing the seed for a better one, and that’s just what happened in [JohnnyQ90]’s latest video. He initially set out to create an air compressor powered by a nitro engine, and partially succeeded – air was compressed, but not nearly enough to be useful.
Instead, he changed tack and decided to use the 1 cc engine to make a small electric generator. [JohnnyQ90] is, of course, no stranger to the nitro engine, having previously brought us the micro chainsaw conversion, and nitro powered rotary tool. This time round, the build is a …read more
-
-
13:00
»
Hack a Day
Electric vehicles are fertile ground for innovation because the availability of suitable motors, controllers, and power sources makes experimentation accessible even to hobbyists. Even so, [John Dingley] has been working on such vehicles since about 2009, and his latest self-balancing electric unicycle really raises the bar by multiple notches. It sports a monstrous 3000 Watt brushless hub motor intended for an electric motorcycle, and [John] was able to add numerous touches such as voice feedback and 1950’s styling using surplus aircraft and motorcycle parts. To steer, the frame changes shape slightly with help of the handlebars to allow the driver’s …read more
-
-
14:30
»
Hack a Day
We realize the transmission fluid of an automobile’s automatic transmission is used to transfer the power from the engine to the drive shaft. But after watching this Department of Defense video from 1954 we now have a full understanding of the principles involved in fluid coupling. Like us, you probably have seen a diagram of a transmission [...]
-
-
4:25
»
Hack a Day
You can build a surprising amount of stuff from parts you can pick up at a hardware store. Sometimes, though, getting a project built from sections of pipe is very, very difficult. That’s the case with [Lou]‘s hardware store engine: despite an inordinate amount of cleverness, he just can’t seem to get an engine made [...]
-
-
18:32
»
Packet Storm Security Recent Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
18:32
»
Packet Storm Security Tools
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
18:32
»
Packet Storm Security Misc. Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
-
11:01
»
Hack a Day
[Graham] over at FUBAR labs took it upon himself to build a rocket engine. This isn’t a simple solid-fuel motor, though: [Graham] went all out and built a liquid-fueled engine that is ignited with a spark plug. The build started off with a very small ‘igniter’ engine meant to shoot sparks into a larger engine. [...]
-
-
21:27
»
Packet Storm Security Recent Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
21:27
»
Packet Storm Security Tools
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
21:27
»
Packet Storm Security Misc. Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
-
4:00
»
Hack a Day
[Kurt] wanted an electric car, and always wanted to drive a Porsche. Killing two birds with one stone, he decided to combine these wishes and convert a 2002 Porsche 911 into an electric vehicle. After removing the engine, fuel tank, exhaust, radiator, and all the other things that make an internal combustion engine work, [Kurt] installed [...]
-
-
20:49
»
Packet Storm Security Recent Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
20:49
»
Packet Storm Security Tools
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
20:49
»
Packet Storm Security Misc. Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
-
20:14
»
Packet Storm Security Recent Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
20:14
»
Packet Storm Security Tools
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
20:14
»
Packet Storm Security Misc. Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
15:01
»
Hack a Day
Most any rocket engine you’d find on a spacecraft – save for solid or hybrid rockets – use an engine system that’s fairly complex. Because of the intense heat, the fuel is circulated around the chamber before ignition giving a motor its regeneratively cooled nomenclature. This arrangement leads to a few complicated welding and machining processes, [...]
-
10:01
»
Hack a Day
We had no idea that what’s needed to convert an internal combustion engine to steam power is actually rather trivial. [David Nash] shows us how it’s done by performing the alterations on the engine of a string trimmer. These are the tools used to cut down vegetation around obstacles in your yard. The source of [...]
-
-
11:01
»
Hack a Day
We are fascinated by the hybrid rocket engine which [Ben Krasnow] built and tested in his shop. It is actually using a hollow cylinder of acrylic as the fuel, with gaseous oxygen as an oxidizer. We’re already quite familiar with solid rocket propellant, but this hybrid approach is much different. When a rocket motor using solid propellant [...]
-
-
12:01
»
Hack a Day
This all-mechanical hexapod (translated) was meticulously planned and beautifully constructed. It’s not craning its neck to see what’s ahead. That’s a smoke stack for the steam engine which propels the machine. Mechanically the legs were the hardest part. That’s only because the steam engine was not built from scratch. It’s a Wilesco D14 which is powered [...]
-
-
16:11
»
Packet Storm Security Recent Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
16:11
»
Packet Storm Security Tools
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
16:11
»
Packet Storm Security Misc. Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
-
10:01
»
Hack a Day
LVL1 has a new rocketeering group. This rocket engine testing platform is the first project to come out of the fledgling club. The purpose of the tool is to gather empirical data from model rocket engines. Having reliable numbers on thrust over time will allow the team to get their designs right before the physical build even [...]
-
-
6:01
»
Hack a Day
We’re very familiar with the Louisville Hackerspace LVL1 here at Hackaday. From their GLaDOS-inspired sentient overlord, an evil box to filter the Internet, and a friggin’ moat, LVL1 is the closest we’ve got to a mad scientist heard cackling from a wind-swept castle on a stormy night. It turns out they also have a rocketry program. [...]
-
-
8:55
»
Packet Storm Security Recent Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
8:55
»
Packet Storm Security Tools
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
8:55
»
Packet Storm Security Misc. Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
-
6:00
»
Hack a Day
Last April, we caught wind of a very impressive rocket engine being built by Copenhagen Suborbitals. That engine was on the test pad this weekend, and the video is incredible (skip to 20:30 for the actual test). The Copenhagen Suborbitals team pulled off a successful test firing of their 65 kilo Newton alcohol and liquid Oxygen-fueled [...]
-
-
11:01
»
Hack a Day
What do you do if you’ve got a fully equipped machine shop and you’re tired of taking old beer cans to the recycler? If you’re like [Brock], you’ll probably end up melting those cans down to build an engine. After gathering 50 pounds of beer cans and melting them down into ingots of various sizes, [...]
-
6:01
»
Hack a Day
Real motorcycle enthusiasts design and mill their own engines. Well, perhaps that’s an overstatement. Certainly it takes to more obsession than enthusiasm to go to these lengths. But this gentleman’s modifications started out simple enough, and managed to make it to the most extreme of hardware fabrications. The used bike came with a modified camshaft [...]
-
-
14:53
»
SecDocs
Tags:
science Event:
Chaos Communication Camp 2011 Abstract: We will discuss the basic principles of thermochemical engines and their application for rocket propulsion. The three main types of chemical rocket engines, i.e. solid, liquid, and hybrid, will be presented and compared. The main subsystem of every space flight system is the propulsion system also called the rocket engine. The present paradigm is the thermochemical engine that produces thrust by expanding hot gas produced by an exothermic reaction through a nozzle. Present rocket engine designs can be categorized in three classes dependent on the state of the propellant(s), i.e. solid, liquid or hybrid. We will sketch the underlying physical processes present in all engine designs necessary to get a basic understanding of the different approaches and compare their specific advantages and drawbacks.
-
-
13:01
»
Hack a Day
Check out this solar-powered Stirling engine (translated). The build is part of a high school class and they packed in some really nice features. The first is the parabolic mirror which focuses the sun’s rays on the chamber of the engine. The heat is what makes it go, and the video after the breaks shows it [...]
-
-
9:01
»
Hack a Day
If you want to see something awesome this afternoon, watch SpaceX’s live broadcast of an engine test today at 3:00 pm EDT/12:00 pm PDT/7:00 pm GMT. You’ll see nine Merlin rocket engines power up to full thrust during a test for the upcoming launch of a Dragon space capsule to the ISS. This is just a static [...]
-
-
10:01
»
Hack a Day
On the heels of a small stirling engine we featured, an astute Hackaday reader sent in a few awesome builds from HMEM, the home model engine machinist forum. First up is a fantastic looking stirling engine made entirely from scratch. The build is modeled on a Moriya Hot Air Fan, but instead of making a fan [...]
-
8:01
»
Hack a Day
Sand casting has been around since, well, since a really really long time ago. For thousands of years, people have been pouring molten metal into finely crafted sand casts, and there’s really no reason that someone can’t do the same thing in their garage or workshop today. This article covers the process of sand casting [...]
-
-
10:01
»
Hack a Day
Hopefully you’re not on a network that blocks YouTube, because we’re sharing videos that show off three different projects. Alas, they don’t give any details about the development process, but we think you’ll like seeing the end results just the same. First up is a Stirling engine. This one is pretty serious business, with machined [...]
-
-
8:01
»
Hack a Day
While we’re reluctant to say it for fear of being misinterpreted, the new liquid fuel rocket engine being built by Copenhagen Suborbitals is one of the most impressive, daring, and nearly the sexiest machine we’ve ever seen. Although the engine hasn’t been fired yet, [Peter Madsen], Chief launch vehicle designer at Copenhagen Suborbitals, gives an amazing 18-minute-long rundown of [...]
-
-
12:44
»
Hack a Day
An attentive reader tipped us off to the guys at Mobacken Racing (translation), a group of Swedes dedicated to the art and craft of putting jet and rocket engines on go karts and snowmobiles. One of the simpler builds is a pulse jet sled. Pulse jets are extremely simple devices – just a few stainless steel [...]
-
-
9:01
»
Hack a Day
[Alex] has been working on a diesel motorcycle project for a few months now, and the project is finally bearing fruit. It’s quite an accomplishment for something [Alex] describes as an industrial Chinese engine, a modded Honda Superdream, and a few Royal Enfield parts thrown in for good measure. [Alex] bought his Honda CB400 from someone [...]
-
-
13:29
»
SecDocs
Authors:
Chris Kubecka Tags:
log analysis Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: This brief session focuses on the visualization of actual security incidents, network forensics and counter surveillance of covert criminal communications utilizing large data sets from various security logs and a very brief introduction to correlation engine logic. Visually displaying security or network issues can express the risk or urgency in a way a set of dry logs or other methods might not be able to. Additionally, many organizations rely on a more singular approach and react to security events, many times from a high false positive rate source such as isolated intrusion prevention or firewall alerts, or relying only on anti-virus alerts. Utilizing a correlation engine (especially open source) or similar applications could offer a method of discovering or in some cases proactively detecting issues. The research discussed involves analysis and interrogation of firewall, intrusion detection and prevention systems, web proxy logs and available security research. What does a compromised server infected with spam malware look like or cyber warfare? A 20 minute presentation of data visualization and investigation scenarios of five actual issues discovered using various security logs and a correlation engine. The lecturer will take you on a visual journey from seemingly mundane entries in firewall logs through to detecting covert communications between a corporate web server and a cyber-criminal drop zone. Additional visualizations presented: a United Kingdom based portion of the South Korean DNS Distributed Denial of Service attacks of July/August 2008, what bypassing deep packet inspection using HTTPS/SSL/TLS looks like, detecting a rouge corporate email server, malicious DNS usage and more. Although the presenter used a commercial correlation engine, the presentation will conclude with the discussion of an open source correlation engine.
-
13:26
»
SecDocs
Authors:
Chris Kubecka Tags:
log analysis Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: This brief session focuses on the visualization of actual security incidents, network forensics and counter surveillance of covert criminal communications utilizing large data sets from various security logs and a very brief introduction to correlation engine logic. Visually displaying security or network issues can express the risk or urgency in a way a set of dry logs or other methods might not be able to. Additionally, many organizations rely on a more singular approach and react to security events, many times from a high false positive rate source such as isolated intrusion prevention or firewall alerts, or relying only on anti-virus alerts. Utilizing a correlation engine (especially open source) or similar applications could offer a method of discovering or in some cases proactively detecting issues. The research discussed involves analysis and interrogation of firewall, intrusion detection and prevention systems, web proxy logs and available security research. What does a compromised server infected with spam malware look like or cyber warfare? A 20 minute presentation of data visualization and investigation scenarios of five actual issues discovered using various security logs and a correlation engine. The lecturer will take you on a visual journey from seemingly mundane entries in firewall logs through to detecting covert communications between a corporate web server and a cyber-criminal drop zone. Additional visualizations presented: a United Kingdom based portion of the South Korean DNS Distributed Denial of Service attacks of July/August 2008, what bypassing deep packet inspection using HTTPS/SSL/TLS looks like, detecting a rouge corporate email server, malicious DNS usage and more. Although the presenter used a commercial correlation engine, the presentation will conclude with the discussion of an open source correlation engine.
-
-
12:01
»
Hack a Day
The difficulty of rolling a 16-cylinder engine into a motorcycle really boggles the mind. But that’s exactly what [Andreas Georgeades] is doing in his garage. It’s two straight-8 engines sandwiched on top of one another with a custom crankcase connecting them. And get this, those custom parts are being milled by hand, using time-tested techniques rather [...]
-
20:59
»
Packet Storm Security Recent Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
20:59
»
Packet Storm Security Tools
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
20:59
»
Packet Storm Security Misc. Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
-
15:52
»
Packet Storm Security Recent Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
15:52
»
Packet Storm Security Tools
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
15:52
»
Packet Storm Security Misc. Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
-
7:01
»
Hack a Day
The “Little Drummer Boy” On a Scanner and Drum: There’s little more information on this hack, however, it’s quite interesting seeing an automated drum and a scanner playing a familiar Christmas tune. Check out the video of the duet in action! A Radial Engine Model: Through the process of experimentation, two “radial engine models” were [...]
-
-
15:54
»
SecuriTeam
During a penetration test, RedTeam Pentesting discovered an Authentication Bypass vulnerability in the Owl Intranet Engine, which allows unauthenticated users administrative access to the affected systems.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
11:03
»
Hack a Day
You may have seen an air powered engine at some point, but most are made out of some sort of metal. This engine, however, is made entirely out of wood (and fasteners). One might wonder how a design like this was conceived, but this may be explained by [Woodgears.ca's] tagline: “An engineer’s approach to woodworking.” [...]
-
-
20:11
»
Packet Storm Security Recent Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
20:11
»
Packet Storm Security Tools
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
20:11
»
Packet Storm Security Misc. Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
-
17:07
»
Packet Storm Security Recent Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
17:07
»
Packet Storm Security Tools
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
17:07
»
Packet Storm Security Misc. Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
-
7:01
»
Hack a Day
An accidental radial engine Hack A Day’s very own [Jeremy Cook] was trying to figure out how to push four ‘arms’ out one at a time. What he came up with is a very nice model of a radial engine. Everything was cut on a CNC router and a motor from an air freshener provides [...]
-
-
12:03
»
SecDocs
Authors:
Francis Brown Rob Ragan Tags:
intelligence Event:
Black Hat USA 2010 Abstract: During World War II the CIA created a special information intelligence unit to exploit information gathered from openly available sources. One classic example of the team’s resourcefulness was the ability to determine whether Allied forces had successfully bombed bridges leading into Paris based on increasing orange prices. Since then OSINT sources have surged in number and diversity, but none can compare to the wealth of information provided by the Internet. Attackers have been clever enough in the past to take advantage of search engines to filter this information to identify vulnerabilities. However, current search hacking techniques have been stymied by search provider efforts to curb this type of behavior. Not anymore - our demonstration-heavy presentation picks up the subtle art of search engine hacking at the current state and discusses why these techniques fail. We will then reveal several new search engine hacking techniques that have resulted in remarkable breakthroughs against both Google and Bing. Come ready to engage with us as we release two new tools, GoogleDiggity and BingDiggity, which take full advantage of the new hacking techniques. We’ll also be releasing the first ever “live vulnerability feed”, which will quickly become the new standard on how to detect and protect yourself against these types of attacks. This presentation will change the way you've previously thought about search engine hacking, so put on your helmets. We don't want a mess when we blow your minds.
-
-
6:00
»
Hack a Day
All “methane generator” jokes aside, This one actually serves a useful purpose. Although not an engine hack per se, methane can be used to run an engine. As the traditional method of powering an internal combustion engine, gasoline, gets more and more expensive, alternatives will have to be found. If you happen to live on [...]
-
-
6:00
»
Hack a Day
Turbo chargers from cars are readily available and easily modified, so why not modify a turbo into a jet engine? While [Mike]‘s junkyard jet made the rounds on the Internet over a decade ago, the theory behind the homebrew turbojet is still sound. After pulling a turbo out of a 1983 Nissan Pulsar, [Mike] built [...]
-
0:32
»
SecDocs
Authors:
David Fifield Fyodor Tags:
vulnerability assessment scanning Event:
Black Hat USA 2010 Abstract: Most security practitioners can use Nmap for simple port scanning and OS detection, but the Nmap Scripting Engine (NSE) takes scanning to a whole new level. Nmap's high-speed networking engine can now spider web sites for SQL injection vulnerabilities, brute-force crack and query MSRPC services, find open proxies, and more. Nmap includes more than 125 NSE scripts for network discovery, vulnerability detection, exploitation, and authentication cracking. Rather than give a dry overview of NSE, Fyodor and Nmap co-maintainer David Fifield demonstrate practical solutions to common problems. They have scanned millions of hosts with NSE and will discuss vulnerabilities found on enterprise networks and how Nmap can be used to quickly detect those problems on your own systems. Then they demonstrate how easy it is to write custom NSE scripts to meet the needs of your network. Finally they take a quick look at recent Nmap developments and provide a preview of what is soon to come. This presentation does not require any NSE experience, but it wouldn't hurt to read nmap.org/book/nse.html.
-
0:23
»
SecDocs
Authors:
David Fifield Fyodor Tags:
vulnerability assessment scanning Event:
Black Hat USA 2010 Abstract: Most security practitioners can use Nmap for simple port scanning and OS detection, but the Nmap Scripting Engine (NSE) takes scanning to a whole new level. Nmap's high-speed networking engine can now spider web sites for SQL injection vulnerabilities, brute-force crack and query MSRPC services, find open proxies, and more. Nmap includes more than 125 NSE scripts for network discovery, vulnerability detection, exploitation, and authentication cracking. Rather than give a dry overview of NSE, Fyodor and Nmap co-maintainer David Fifield demonstrate practical solutions to common problems. They have scanned millions of hosts with NSE and will discuss vulnerabilities found on enterprise networks and how Nmap can be used to quickly detect those problems on your own systems. Then they demonstrate how easy it is to write custom NSE scripts to meet the needs of your network. Finally they take a quick look at recent Nmap developments and provide a preview of what is soon to come. This presentation does not require any NSE experience, but it wouldn't hurt to read nmap.org/book/nse.html.
-
0:22
»
SecDocs
Authors:
David Fifield Fyodor Tags:
vulnerability assessment scanning Event:
Black Hat USA 2010 Abstract: Most security practitioners can use Nmap for simple port scanning and OS detection, but the Nmap Scripting Engine (NSE) takes scanning to a whole new level. Nmap's high-speed networking engine can now spider web sites for SQL injection vulnerabilities, brute-force crack and query MSRPC services, find open proxies, and more. Nmap includes more than 125 NSE scripts for network discovery, vulnerability detection, exploitation, and authentication cracking. Rather than give a dry overview of NSE, Fyodor and Nmap co-maintainer David Fifield demonstrate practical solutions to common problems. They have scanned millions of hosts with NSE and will discuss vulnerabilities found on enterprise networks and how Nmap can be used to quickly detect those problems on your own systems. Then they demonstrate how easy it is to write custom NSE scripts to meet the needs of your network. Finally they take a quick look at recent Nmap developments and provide a preview of what is soon to come. This presentation does not require any NSE experience, but it wouldn't hurt to read nmap.org/book/nse.html.
-
0:21
»
SecDocs
Authors:
David Fifield Fyodor Tags:
vulnerability assessment scanning Event:
Black Hat USA 2010 Abstract: Most security practitioners can use Nmap for simple port scanning and OS detection, but the Nmap Scripting Engine (NSE) takes scanning to a whole new level. Nmap's high-speed networking engine can now spider web sites for SQL injection vulnerabilities, brute-force crack and query MSRPC services, find open proxies, and more. Nmap includes more than 125 NSE scripts for network discovery, vulnerability detection, exploitation, and authentication cracking. Rather than give a dry overview of NSE, Fyodor and Nmap co-maintainer David Fifield demonstrate practical solutions to common problems. They have scanned millions of hosts with NSE and will discuss vulnerabilities found on enterprise networks and how Nmap can be used to quickly detect those problems on your own systems. Then they demonstrate how easy it is to write custom NSE scripts to meet the needs of your network. Finally they take a quick look at recent Nmap developments and provide a preview of what is soon to come. This presentation does not require any NSE experience, but it wouldn't hurt to read nmap.org/book/nse.html.
-
-
6:00
»
Hack a Day
You probably weren’t expecting a project based on [Nikola Tesla's] work to show up during the Engine Hacks theme. Most people know of him because of his pioneering work with high voltage equipment. Never the less, [Tesla] designed a device that later became known as the Tesla Turbine. Tesla turbines are made out of a [...]
-
6:00
»
Hack a Day
After the United States enacted a near-total economic embargo against Cuba in 1962, American export of Detroit Iron came to a halt. Since then, some Cubans have been lucky enough to own a classic Chevy or Buick. Soviet imports of Volgas stopped in the 1990s. With a dearth of any sort of motorized transport (and [...]
-
-
6:00
»
Hack a Day
We knew our engine hacks theme would come down to an argument over the difference between “a motor” and “an engine” so after much deliberation, name calling, restraining orders, and a duel we’re happy to put up [Berto]‘s DIY trolling motor made out of an electric drill. The project is probably inspired by [Berto]‘s collapsible [...]
-
-
6:00
»
Hack a Day
Winter’s coming, and you don’t want to be outdone by your neighbor’s new snow blower. We think it’s pretty safe to say you’ll be the envy of gearheads throughout the neighborhood if you can build your own snow blower around a V8 engine. [Kai Grundt] is a metal fabricator by day and a horror movie [...]
-
-
6:00
»
Hack a Day
Imagine our surprise when we learned [Bruce Simpson], who made headlines in 2003 with his $5000 DIY cruise missile, is still alive, not illegally interned in a black ops prison, and still doing what he does best: building really awesome remote-control airplanes. The first successful mass-produced pulse jet aircraft was the German V-1 flying bomb. The [...]
-
-
6:00
»
Hack a Day
[Dan] wanted to learn a bit about solid state ignition in engines; to get started he needed a test subject, so he decided he would upgrade his old 12 horsepower lawnmower. Originally the lawnmower engine used a magneto coil ignition system, magnetos are simple and very common in lawnmowers. The magneto is designed to produce [...]
-
-
8:00
»
Hack a Day
Are you tired of doing things the efficient way when using your lawn equipment? Look no farther. Here are some engine hacks where regular internal combustion engines have been modified to work on steam or compressed air. Surprisingly, all it takes to do this is to remove the carburetor and replace it with a steam [...]
-
-
6:00
»
Hack a Day
Forget the Tesla Roadster, we want an electric car like [John Wayland’s] White Zombie! If it wasn’t plastered with sponsor stickers and the like, you would never realize that this otherwise unassuming ‘72 Datsun 1200 is an absolute beast of a car. The gas engine that used to provide a mere 69 horsepower was swapped [...]
-
-
6:00
»
Hack a Day
When the idea of an engine hacks theme was being kicked around at Hack a Day, the subject of rocket engines was one of the first to come up. There was a problem though; solid rocket motors are far too common to be interesting, and even hybrid rocket engines are becoming passé. We’ve never seen [...]
-
-
6:00
»
Hack a Day
Although a V-12 engine is always nice, cramming one into a motorcycle definitely qualifies as an engine hack! [Allen Millyard], wasn’t satisfied with the standard number of cylinders (6!) on his already gigantic Kawasaki KZ1300. Like any reasonable person, he decided to graft two of their powerplants together! In true engine hacker form, inspiration struck [...]
-
-
6:00
»
Hack a Day
We had some interesting High Voltage posts over the past couple of weeks. Today we are announcing the next theme: Engine Hacks. Each day for the next two weeks we will be doing a new post about some sort of interesting engine project. We’ll be showing projects where engines are built from scratch, engines are [...]
-
-
21:39
»
Packet Storm Security Recent Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
21:39
»
Packet Storm Security Misc. Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
-
1:08
»
Packet Storm Security Recent Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
1:08
»
Packet Storm Security Tools
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
1:08
»
Packet Storm Security Misc. Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
-
10:28
»
Packet Storm Security Recent Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
10:28
»
Packet Storm Security Tools
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
10:28
»
Packet Storm Security Misc. Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
-
12:01
»
Hack a Day
[Mirslav] built this fuidyne engine himself. This is a single piston model but you won’t find any precision milled cylinders here. That’s because fluidyne engines use columns of water as the pistons. In the rig shown above you can see one metal pipe which serves as the cold side of the loop. There’s another hot [...]
-
-
11:01
»
Packet Storm Security Advisories
Debian Linux Security Advisory 2180-1 - Several vulnerabilities have been found in the Iceape internet suite, an unbranded version of Seamonkey. Roberto Suggi Liverani discovered that the sanitizing performed by ParanoidFragmentSink was incomplete. Zach Hoffmann discovered that incorrect parsing of recursive eval() calls could lead to attackers forcing acceptance of a confirmation dialogue. Crashes in the layout engine may lead to the execution of arbitrary code. Christian Holler discovered buffer overflows in the Javascript engine, which could allow the execution of arbitrary code. Christian Holler discovered buffer overflows in the Javascript engine, which could allow the execution of arbitrary code. Various other issues have also been addressed.
-
11:01
»
Packet Storm Security Recent Files
Debian Linux Security Advisory 2180-1 - Several vulnerabilities have been found in the Iceape internet suite, an unbranded version of Seamonkey. Roberto Suggi Liverani discovered that the sanitizing performed by ParanoidFragmentSink was incomplete. Zach Hoffmann discovered that incorrect parsing of recursive eval() calls could lead to attackers forcing acceptance of a confirmation dialogue. Crashes in the layout engine may lead to the execution of arbitrary code. Christian Holler discovered buffer overflows in the Javascript engine, which could allow the execution of arbitrary code. Christian Holler discovered buffer overflows in the Javascript engine, which could allow the execution of arbitrary code. Various other issues have also been addressed.
-
11:01
»
Packet Storm Security Misc. Files
Debian Linux Security Advisory 2180-1 - Several vulnerabilities have been found in the Iceape internet suite, an unbranded version of Seamonkey. Roberto Suggi Liverani discovered that the sanitizing performed by ParanoidFragmentSink was incomplete. Zach Hoffmann discovered that incorrect parsing of recursive eval() calls could lead to attackers forcing acceptance of a confirmation dialogue. Crashes in the layout engine may lead to the execution of arbitrary code. Christian Holler discovered buffer overflows in the Javascript engine, which could allow the execution of arbitrary code. Christian Holler discovered buffer overflows in the Javascript engine, which could allow the execution of arbitrary code. Various other issues have also been addressed.
-
-
8:37
»
Packet Storm Security Exploits
The Refractor 2 engine versions 1.50 and below suffer from a NULL pointer dereference vulnerability. Games such as Battlefield 2 and Battlefield 2142 are affected. Proof of concept code included.
-
8:37
»
Packet Storm Security Recent Files
The Refractor 2 engine versions 1.50 and below suffer from a NULL pointer dereference vulnerability. Games such as Battlefield 2 and Battlefield 2142 are affected. Proof of concept code included.
-
8:37
»
Packet Storm Security Misc. Files
The Refractor 2 engine versions 1.50 and below suffer from a NULL pointer dereference vulnerability. Games such as Battlefield 2 and Battlefield 2142 are affected. Proof of concept code included.
-
-
7:10
»
Hack a Day
Is there a place in the dashboard of your high performance automobile for this Engine Control Unit feedback panel? There’s several methods of showing information at work here. The row of LEDs at the top of the bezel provide RPM feedback. The two red LEDs with chrome bezels are alarm indicators. But that big OLED [...]
-
-
22:02
»
Packet Storm Security Tools
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
22:02
»
Packet Storm Security Recent Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
-
17:00
»
Packet Storm Security Recent Files
iDefense Security Advisory 08.10.10 - Remote exploitation of an memory corruption vulnerability in Microsoft's Office RTF Parsing Engine could allow an attacker to execute arbitrary code with the privileges of the current user. During the processing of a RTF document containing certain control words, the RTF parsing engine may incorrectly read a value from the RTF file. This value may directly affect the control of execution flow within the RTF parsing engine.
-
17:00
»
Packet Storm Security Advisories
iDefense Security Advisory 08.10.10 - Remote exploitation of an memory corruption vulnerability in Microsoft's Office RTF Parsing Engine could allow an attacker to execute arbitrary code with the privileges of the current user. During the processing of a RTF document containing certain control words, the RTF parsing engine may incorrectly read a value from the RTF file. This value may directly affect the control of execution flow within the RTF parsing engine.
-
-
10:00
»
SecurityFocus Vulnerabilities
Cisco Security Advisory: Multiple Vulnerabilities in the Cisco ACE Application Control Engine Module and Cisco ACE 4710 Application Control Engine
-
-
0:01
»
Packet Storm Security Tools
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
-
13:00
»
Hack a Day
This hack seems simple enough: 1. Open hatchback 2. Insert jet engine 3. Profit Actually, the guy who added a jet engine to a VW Beetle has a PhD in Mechanical Engineering from Stanford. He claims this is street legal, and even has a snapshot of the police trying to figure out what to charge [...]
-
-
12:04
»
Packet Storm Security Tools
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
12:02
»
Packet Storm Security Recent Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
-
23:02
»
Packet Storm Security Tools
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
23:02
»
Packet Storm Security Recent Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
14:00
»
Hack a Day
Satisfy your need to view some quality machining by looking through this Stirling engine worklog. We’ve seen these engines used a few other times in creating electricity from solar energy, powering a car, and even built from aluminum cans. [David Morrow] built this rendition to push the limits of his machining skills. We’d say he [...]
-
-
23:01
»
Packet Storm Security Tools
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
23:01
»
Packet Storm Security Recent Files
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
-
19:41
»
Packet Storm Security Tools
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
-
-
17:00
»
Packet Storm Security Tools
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.