«
Expand/Collapse
47 items tagged "introduction"
Related tags:
pdf [+],
black hat [+],
whitepaper [+],
usa [+],
chaos communication congress [+],
video [+],
security [+],
joe grand [+],
hacks [+],
ARM [+],
video introduction [+],
south korea [+],
security authors [+],
protocol [+],
persian [+],
japan [+],
ipv6 protocol suite [+],
ipv4 addresses [+],
ipv [+],
europe [+],
authors [+],
audio introduction [+],
audio [+],
x event [+],
win32 [+],
win [+],
wimax [+],
virtual graffiti [+],
virgraff [+],
tool usage [+],
technology event [+],
system [+],
software vulnerabilities [+],
silicon micromachining [+],
satellite event [+],
satellite communication systems [+],
satellite [+],
pydbg [+],
presentation [+],
micro system technology [+],
meta [+],
mems [+],
macintosh security [+],
macintosh [+],
mac os x [+],
mac os [+],
linux [+],
jens kaufmann [+],
hacking [+],
graffiti tags [+],
forgery [+],
exploitation [+],
debugger [+],
cross application [+],
computer forensics [+],
communication [+],
chaos communication camp [+],
basics [+],
arm linux [+],
arduino [+],
arabic [+],
waldron [+],
virtual [+],
vector displays [+],
vector [+],
tyler [+],
timeless icon [+],
tim [+],
tempest [+],
summer [+],
stepper motors [+],
stepper [+],
spike [+],
space center [+],
sort [+],
slides [+],
single [+],
sequence [+],
security event [+],
screen [+],
schack [+],
s miles [+],
robert lupo [+],
pitchford [+],
pcs [+],
pcbs [+],
pc motherboards [+],
paper [+],
oomph [+],
old televisions [+],
nixie [+],
mobile device [+],
mobile [+],
man [+],
lupo [+],
jeff waldron [+],
jed haile [+],
jed [+],
intrusion detection systems [+],
intrusion [+],
improving your vocabulary [+],
huntsville alabama [+],
huntsville [+],
how to [+],
high voltage dc power supply [+],
haile [+],
hackerspace [+],
hack [+],
gregory s. miles travis schack [+],
global [+],
georgia [+],
gateway [+],
engineering [+],
emailed [+],
electron beam [+],
device [+],
dc power supply [+],
dave aitel [+],
daryl brach [+],
cryptography [+],
cray inspired [+],
cray 1 [+],
computer viruses [+],
computer [+],
cnc routers [+],
classic [+],
certification [+],
case [+],
boost converter [+],
andrew moser [+],
alabama [+],
accreditation [+],
Hackerspaces [+]
-
-
5:00
»
Hack a Day
Unlike the CRTs found in big old televisions, vector displays are a bit of a historical oddity. Instead of sweeping an electron beam across the screen from left to right and top to bottom, a vector display draws lines between two points on a screen. Once used in arcade games such as Asteroids, Tempest, and old FAA [...]
-
-
6:00
»
Hack a Day
After you’ve taken the plunge and decided to learn how to etch your own circuit boards, you’ll quickly find even the simplest boards are still out of your grasp. This is due mostly to the two-layer nature of most PCBs, and turn making a homemade Arduino board an exercise in frustration and improving your vocabulary [...]
-
-
21:40
»
SecDocs
Tags:
IPv6 Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: After a short introduction on the differences of IPv4 to IPv6, the weaknesses in IPv6 will be shown. Highlight of the talk is the presentation of the THC-IPV6 Attack Toolkit, which includes all IPv6 attacks as well as a low level packet library for easy crafting packets. IPv6 is arriving slowly in Europe, but an important topic in Japan and South Korea, as IPv4 addresses are scarce. IPv6 will change the issues of security and hacking by a large degree. This speech will give a short introduction on the protocol differences, then show the vulnerabilities in the protocols and finally present the THC-IPV6 Attack Toolkit which includes the tools for all vulnerabilities shown, as well as a very easy packet crafting library.
-
8:10
»
SecDocs
Tags:
IPv6 Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: After a short introduction on the differences of IPv4 to IPv6, the weaknesses in IPv6 will be shown. Highlight of the talk is the presentation of the THC-IPV6 Attack Toolkit, which includes all IPv6 attacks as well as a low level packet library for easy crafting packets. IPv6 is arriving slowly in Europe, but an important topic in Japan and South Korea, as IPv4 addresses are scarce. IPv6 will change the issues of security and hacking by a large degree. This speech will give a short introduction on the protocol differences, then show the vulnerabilities in the protocols and finally present the THC-IPV6 Attack Toolkit which includes the tools for all vulnerabilities shown, as well as a very easy packet crafting library.
-
8:10
»
SecDocs
Tags:
IPv6 Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: After a short introduction on the differences of IPv4 to IPv6, the weaknesses in IPv6 will be shown. Highlight of the talk is the presentation of the THC-IPV6 Attack Toolkit, which includes all IPv6 attacks as well as a low level packet library for easy crafting packets. IPv6 is arriving slowly in Europe, but an important topic in Japan and South Korea, as IPv4 addresses are scarce. IPv6 will change the issues of security and hacking by a large degree. This speech will give a short introduction on the protocol differences, then show the vulnerabilities in the protocols and finally present the THC-IPV6 Attack Toolkit which includes the tools for all vulnerabilities shown, as well as a very easy packet crafting library.
-
20:39
»
Packet Storm Security Misc. Files
This is a brief whitepaper that discusses ARM exploitation and is based on work the author performed against Windows Mobile. Written in Turkish.
-
-
14:19
»
Packet Storm Security Recent Files
Since its introduction in 2006, PyDbg has become an essential tool for security researchers and reverse engineers. It is mainly used to discover various software vulnerabilities and weaknesses, as well to analyze malware and perform computer forensics. The present publication is aimed to provide a reader with an introduction to the Python based debugger and deliver practical and real examples of this powerful security tool usage.
-
14:19
»
Packet Storm Security Misc. Files
Since its introduction in 2006, PyDbg has become an essential tool for security researchers and reverse engineers. It is mainly used to discover various software vulnerabilities and weaknesses, as well to analyze malware and perform computer forensics. The present publication is aimed to provide a reader with an introduction to the Python based debugger and deliver practical and real examples of this powerful security tool usage.
-
-
9:25
»
SecDocs
Authors:
Jens Kaufmann Tags:
medical Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: MicroElectroMechanical Systems or MEMS are as part of micro system technology, systems with electrical and mechanical subsystems at the micro scale. It is basically an introduction in the technology and in its potential for hardware hacks and potential ways of homebrew devices. Compared to a micro processor, a small sensor or actuator, which normally consists of just one function a micro system combines the data acquisition, processing, and forwarding in itself. If this micro system now contains mechanical part to interact with its environment it is considered to be a MEMS. With constantly increasing experience in MEMS manufacturing the prices per system dropped and the use of the highly sophisticated devices move from strictly automotive, R&D and military applications into consumer products. The wiimote and the iPhone are just two well known products which improve the user experience by the intelligent use of the smart systems. The delay of invention and market introduction of MEMS is mostly caused by the substantial investments to be done to produce this kind of device. The most technologies commonly used until now are transfered from the microchip manufacturing. The so called silicon micromachining uses silicon single crystal disks (Wafers) in combination with batch lithography and etch processing to form the today available systems. This limitation to very difficult and expensive processes restricts the potential manufacture to companies already in the semiconductor business or companies with huge financial backup. Further more the limitation to a very few materials slows down the whole development in the micro scale because of the laking design freedom for the system developer. This is the reason that researcher all over the world try to move from Si to alternative material and work out processes and combination out of those that allow further miniaturization, bigger material lineup, dramatically decrease in investment costs. This talk is giving you an overview of available MEMS, there processes and restriction as well as future developments and the possibility of start of your own MEMS farm.
-
9:25
»
SecDocs
Authors:
Jens Kaufmann Tags:
medical Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: MicroElectroMechanical Systems or MEMS are as part of micro system technology, systems with electrical and mechanical subsystems at the micro scale. It is basically an introduction in the technology and in its potential for hardware hacks and potential ways of homebrew devices. Compared to a micro processor, a small sensor or actuator, which normally consists of just one function a micro system combines the data acquisition, processing, and forwarding in itself. If this micro system now contains mechanical part to interact with its environment it is considered to be a MEMS. With constantly increasing experience in MEMS manufacturing the prices per system dropped and the use of the highly sophisticated devices move from strictly automotive, R&D and military applications into consumer products. The wiimote and the iPhone are just two well known products which improve the user experience by the intelligent use of the smart systems. The delay of invention and market introduction of MEMS is mostly caused by the substantial investments to be done to produce this kind of device. The most technologies commonly used until now are transfered from the microchip manufacturing. The so called silicon micromachining uses silicon single crystal disks (Wafers) in combination with batch lithography and etch processing to form the today available systems. This limitation to very difficult and expensive processes restricts the potential manufacture to companies already in the semiconductor business or companies with huge financial backup. Further more the limitation to a very few materials slows down the whole development in the micro scale because of the laking design freedom for the system developer. This is the reason that researcher all over the world try to move from Si to alternative material and work out processes and combination out of those that allow further miniaturization, bigger material lineup, dramatically decrease in investment costs. This talk is giving you an overview of available MEMS, there processes and restriction as well as future developments and the possibility of start of your own MEMS farm.
-
-
11:01
»
Hack a Day
When I announced I would be traveling through Alabama and Georgia this summer, [Tim] from Makers Local 256 emailed me pretty quickly and asked if I’d like to swing by for a visit. Since I was planning to take my kids to the space center in Huntsville anyway, I thought it would be a perfect [...]
-
-
14:42
»
SecDocs
Authors:
Irmi Meister Tags:
satellite Event:
Chaos Communication Camp 2011 Abstract: In this lecture, I'll cover some satellite communication basics like pros and cons of different orbits, the characteristics of a satellite communications link and the difficulties regarding noise and attenuation when handling high frequency satellite communication systems. After a brief introduction to the history and development of satellites in general, we'll talk about different orbits and their characteristics regarding space conditions. After that, we'll have a look at a typical satellite communications link including channel characteristics, communications equipment and frequency considerations, before moving on to access techniques. If there's still time, there might be a short part about satellite navigation, too. And yes, to meet our need for pretty pictures, thematically related postage stamps (partly from a private collection) will be used to illustrate the topic.
-
14:40
»
SecDocs
Authors:
Irmi Meister Tags:
satellite Event:
Chaos Communication Camp 2011 Abstract: In this lecture, I'll cover some satellite communication basics like pros and cons of different orbits, the characteristics of a satellite communications link and the difficulties regarding noise and attenuation when handling high frequency satellite communication systems. After a brief introduction to the history and development of satellites in general, we'll talk about different orbits and their characteristics regarding space conditions. After that, we'll have a look at a typical satellite communications link including channel characteristics, communications equipment and frequency considerations, before moving on to access techniques. If there's still time, there might be a short part about satellite navigation, too. And yes, to meet our need for pretty pictures, thematically related postage stamps (partly from a private collection) will be used to illustrate the topic.
-
7:01
»
Hack a Day
If you’ve been reading Hack a Day for long enough, you know about our infatuation with stepper motors. These precious little devices put the oomph into our CNC routers, 3D printers, robots, and other miscellaneous projects. Steppers aren’t your run-of-the-mill motors, though. [Steaky] posted a great introduction to stepper motors that lets you hit the [...]
-
-
6:06
»
Hack a Day
If you are planning on creating some sort of Nixie tube display, you will undoubtedly need to find yourself a high voltage DC power supply. If you don’t want to add a transformer to your project, you can always opt to build a boost converter instead. [Andrew Moser] shows us just how easy it is [...]
-
-
9:00
»
Hack a Day
35 years following its introduction, and despite fewer than 100 systems deployed, the Cray-1 remains one of the most recognizable computers in history; it is a timeless icon of pure supercomputer badassery. Custom case builder [Daryl Brach] pays homage to this classic with his third-scale model housing two modern PC motherboards. In an interesting reversal, the [...]