«
Expand/Collapse
156 items tagged "machine"
Related tags:
arduino [+],
hacks [+],
music animation machine [+],
music [+],
midi player [+],
cnc [+],
vulnerability [+],
pick and place machine [+],
animation [+],
Hardware [+],
voting [+],
technology [+],
pick [+],
news [+],
Newbie [+],
vending machine [+],
tool [+],
tom trumpbour [+],
smart card implementation [+],
risk [+],
pinball machine [+],
pinball [+],
paper ballots [+],
marc schiesser [+],
interra [+],
gunnar rtsch [+],
freebsd [+],
disk encryption [+],
digital [+],
detection intrusion [+],
detection [+],
cooking [+],
compromise program [+],
classic [+],
blog [+],
biological sequence analysis [+],
Area [+],
washing machine [+],
virtual [+],
turing [+],
toy [+],
timon schroeter [+],
support vector machines [+],
sql [+],
musical [+],
motivation [+],
microcontrollers [+],
machine component [+],
machine authors [+],
lego [+],
konrad rieck [+],
knitting machine [+],
joomla [+],
hackaday [+],
foam [+],
espresso machine [+],
espresso [+],
entertainment [+],
crash proof [+],
buffer overflow [+],
brain computer interface [+],
alan [+],
BackTrack [+],
washing [+],
vpn firewall [+],
virtual machine [+],
version [+],
transportation [+],
translation [+],
timer [+],
surprise [+],
statistical machine translation [+],
space labs [+],
source [+],
shell commands [+],
security event [+],
robots [+],
robot [+],
resistor [+],
repairing [+],
repair [+],
propeller [+],
project [+],
printing [+],
php script [+],
pcs [+],
party [+],
open source movement [+],
nick [+],
moses [+],
mame machine [+],
malaysia [+],
log [+],
lego pieces [+],
lathe [+],
jim [+],
java virtual machine [+],
java [+],
insecurity [+],
hack in the box [+],
fog machine [+],
fog [+],
foam machine [+],
edinburgh [+],
drum machine [+],
command [+],
coffee [+],
cnc machine [+],
clock [+],
christine corbett [+],
chris wysopal [+],
chris [+],
cellphones [+],
cameras [+],
bridge [+],
beer [+],
becky stern [+],
audio [+],
alex [+],
Hackerspaces [+],
HackIt [+],
year [+],
wyse [+],
wro [+],
wouldn [+],
world [+],
workshop [+],
words of wisdom [+],
wooden gears [+],
wooden [+],
wiskunde [+],
windows machine [+],
windows [+],
wind up spring [+],
wilson [+],
willy wonka [+],
weird reason [+],
web slots [+],
web [+],
wearable [+],
watt motor [+],
water droplets [+],
water [+],
washer [+],
wallace and gromit [+],
wallace [+],
wake [+],
voting machine [+],
voltage [+],
volt supply [+],
vmware workstation [+],
vmware [+],
vista [+],
visco fuse [+],
visco [+],
video [+],
vending machines [+],
vending [+],
vegas [+],
van halen [+],
valentin [+],
usa [+],
upgrade [+],
unruly beasts [+],
universal turing machine [+],
united states [+],
unified memory [+],
unified [+],
twittertape [+],
twitter enabled [+],
twitter [+],
tweet [+],
turning [+],
turing machine [+],
tripod [+],
travis goodspeed [+],
travis [+],
transistor [+],
touchpad [+],
touch sensors [+],
toronto [+],
tipped pen [+],
tip jar [+],
time saver [+],
ticker tape machine [+],
thrift store [+],
thousand dollars [+],
thirsty patrons [+],
thing [+],
the netherlands [+],
telling time [+],
teletype machine [+],
teletype [+],
target system [+],
system [+],
synchronized machine gun [+],
switch machine [+],
swarthmore college [+],
surface mount [+],
supercomputer [+],
style machines [+],
straight lines [+],
stock [+],
stereo microscopes [+],
stereo microscope [+],
stepper motor [+],
stephen martin [+],
stalkers [+],
stairs [+],
spray [+],
space [+],
sorting machine [+],
solar [+],
soft spot [+],
soda vending machine [+],
soda machine [+],
smd components [+],
skittles [+],
single shot [+],
single board computers [+],
simplicity [+],
simple machines [+],
signal [+],
show [+],
shot [+],
shop [+],
shawn of the dead movie [+],
shawn [+],
shameel arafin [+],
seven years [+],
serial bridge [+],
serial adapters [+],
security works [+],
security vulnerabilities [+],
security [+],
sean mcintyre [+],
scooter [+],
scion [+],
school [+],
schatt [+],
scale [+],
safety fuse [+],
ruler [+],
rube goldberg machines [+],
rube goldberg machine [+],
rube goldberg [+],
rube [+],
roundup [+],
romney [+],
roland cr [+],
roland cr [+],
robot machine [+],
robber barons [+],
rob [+],
roasting machine [+],
roaming charges [+],
rld [+],
risc [+],
ring [+],
rig [+],
rfid [+],
retro design [+],
renditions [+],
reid bingham [+],
reflow oven [+],
raspberry [+],
rare earth magnets [+],
rapid prototyping machine [+],
random question [+],
random book [+],
rainbow machine [+],
rainbow [+],
rager [+],
race cars [+],
pull string [+],
prototype [+],
protocol [+],
programming wiz [+],
program memory [+],
process [+],
problem scenarios [+],
privilege [+],
print [+],
pretty penny [+],
powerful graphics [+],
popcard [+],
poking [+],
poc [+],
plotter [+],
plastic pieces [+],
planes [+],
pixel [+],
pinball machines [+],
pin headers [+],
pin header [+],
pin [+],
pimp [+],
photograph [+],
phil [+],
perpetual energy [+],
pdf plans [+],
pcbs [+],
paul canello [+],
paul [+],
password [+],
passphrase [+],
paper [+],
pairs [+],
painting effects [+],
pachinko machine [+],
pachinko [+],
optical drives [+],
openpnp [+],
olympics [+],
olympic [+],
old style [+],
odd request [+],
o matic [+],
nyc [+],
nxt [+],
null space [+],
north street [+],
niklas roy [+],
nick johnson [+],
nicholas [+],
nguyen anh [+],
new tools [+],
networks [+],
network cards [+],
network [+],
neat project [+],
nat [+],
narration [+],
music from the 80s [+],
munich [+],
multiple [+],
movie [+],
mount leds [+],
motor [+],
motion [+],
moritz simon geist [+],
monitoring service [+],
monitoring [+],
mitch altman [+],
mismatch [+],
minimalistic [+],
mini [+],
milling machine [+],
milling [+],
mike rankin [+],
mike davey [+],
mike [+],
migration [+],
midi input [+],
midi [+],
microcontroller based system [+],
michael nilsson [+],
micha [+],
mexico [+],
metal lathe [+],
metal fabrication [+],
metal [+],
memory [+],
medal [+],
mechanical version [+],
mechanical switch [+],
mechanical simplicity [+],
mechanical computers [+],
mechanical [+],
matt [+],
marx generators [+],
marvels [+],
markus olsson [+],
mark gibson [+],
marble machines [+],
marble machine [+],
marble [+],
manual [+],
man against machine [+],
man [+],
mame [+],
malware [+],
magnificent machine [+],
magical land [+],
magic the gathering cards [+],
magic the gathering [+],
magic [+],
machine tools [+],
lot [+],
logo generator [+],
logic chips [+],
logic [+],
liquor [+],
linux kernel [+],
linux [+],
links [+],
lina fenequito [+],
lighting and sound [+],
light fixture [+],
light [+],
leveraging [+],
lego blocks [+],
leader [+],
laundry machine [+],
laundry [+],
laser tag [+],
laser cutter [+],
lan connected [+],
lan [+],
knitting [+],
kitchen [+],
keypad [+],
keynote [+],
keyboard input [+],
julian [+],
jon oberheide [+],
joe [+],
jeri ellsworth [+],
jawbone [+],
java bytecode [+],
jasper [+],
jacob [+],
iteration [+],
isn [+],
iphone [+],
intricate machine [+],
input side [+],
inexpensive [+],
ian stewart [+],
hour [+],
holiday [+],
hobbyist [+],
hobby projects [+],
hidden [+],
hello everyone [+],
heater element [+],
heat sensor [+],
header [+],
handwriting [+],
handshake [+],
hand cranked [+],
halloween [+],
hallow [+],
hackers [+],
hack [+],
gun [+],
gumball [+],
grenadier [+],
greg [+],
green [+],
gravelrash [+],
grand idea [+],
graffiti [+],
gpu [+],
google [+],
goodspeed [+],
good cup of coffee [+],
goldberg [+],
glen [+],
gleep [+],
ghost [+],
georg wicherski [+],
generator [+],
geiger counters [+],
gaming [+],
game pits [+],
game [+],
fuse [+],
functional unit [+],
function [+],
fun fix [+],
fraud [+],
fortune [+],
forn [+],
footprint [+],
fog control [+],
foam letter [+],
foam core [+],
floppy disk [+],
flintstones [+],
fixture style [+],
first glance [+],
finding friends [+],
film leader [+],
filesystems [+],
field communication [+],
falling objects [+],
factory [+],
facebook [+],
fabienne serriere [+],
fabienne [+],
exploiting [+],
exploitation techniques [+],
exploit [+],
eve [+],
erich schatt [+],
episode [+],
engraver [+],
endless fun [+],
elevator [+],
electronic circuits [+],
electromechanical timer [+],
electromechanical displays [+],
electromechanical computer [+],
electrical input [+],
electrical fuse [+],
electric bicycle [+],
ed nauman [+],
ebay [+],
earth [+],
dual boot [+],
drummer [+],
drum sounds [+],
drive [+],
doorbell [+],
don [+],
dispensary [+],
dimitri [+],
digit numbers [+],
digit [+],
dictionary word [+],
dice game [+],
development [+],
delight [+],
decode [+],
decent coffee [+],
dead ed [+],
dawn [+],
david byrne [+],
dave johnson [+],
dangerous equipment [+],
custom exhaust [+],
creating [+],
cray 1 [+],
crash space [+],
crash [+],
craigslist [+],
control hardware [+],
contraptions [+],
continuous rotation [+],
contests [+],
computer [+],
communications protocol [+],
combination [+],
collection [+],
coffee roaster [+],
coffee brewing [+],
cocktail [+],
cnc router [+],
cnc milling machine [+],
clothes washer [+],
clifford wolf [+],
clifford [+],
clever design [+],
clayton boyer [+],
clayton [+],
classic sandbox [+],
christian reed [+],
chomping at the bit [+],
china [+],
chemistry [+],
cheap advice [+],
charliex [+],
centennial [+],
cellphone [+],
case in point [+],
card [+],
carbon [+],
canon 850i [+],
candy machine [+],
candy [+],
canada [+],
californians [+],
caffeine [+],
buying a book [+],
button [+],
business cards [+],
business [+],
building [+],
buddha [+],
bubbler [+],
bubble gum [+],
bubble bath [+],
brown ones [+],
breakfast machine [+],
boston [+],
boot [+],
book [+],
bof [+],
black hat [+],
binary adder [+],
bill paxton [+],
bilbio mat [+],
berlin [+],
ben heck [+],
ben [+],
battling [+],
batteries [+],
bart [+],
barista [+],
barackobama [+],
bangs [+],
back of the envelope [+],
avrcam [+],
avr microcontrollers [+],
avr [+],
automated home [+],
automat [+],
authors [+],
audible alert [+],
attiny [+],
atmel avr [+],
atlantic city casinos [+],
atlantic city [+],
asylum [+],
asia [+],
artisans [+],
art degrees [+],
arm processors [+],
arm devices [+],
arafin [+],
aquarium [+],
antikythera mechanism [+],
annoyance [+],
andrew [+],
analog world [+],
alfa [+],
alan turing [+],
alabama [+],
air bubble [+],
age [+],
advice [+],
adding machine [+],
adam [+],
acorn risc machine [+],
acorn [+],
accurate clock [+],
accelerometer [+],
abode [+],
ability [+],
Support [+],
Software [+],
General [+],
808 drum machine [+],
555 timers [+],
chaos communication congress [+],
misc [+],
learning [+],
home [+]
-
-
19:00
»
Hack a Day
Training a machine learning model is not a task for mere mortals, as it takes a lot of time or computing power to do so. Fortunately there are pre-trained models out there that one can use, and [Max Bridgland] decided it would be a good idea to write a python module to find and view such models using the command line.
For the uninitiated, Modelzoo is a place where you can find open source deep learning code and pre-trained models. [Max] taps into the (undocumented) API and allows a user to find and view models directly. When you run a utility, it goes online and retrieves the categories and then details of the available models. From then on, the user can select a model and the application will simply open the corresponding GitHub repository. Sounds simple but it has a lot of value since the code is designed to be extendable so that users working on such projects may automate the downloading part as well.
We have seen projects with machine learning used to detect humans, and with AI trending community tools such as this one help beginners get started even faster.
-
-
19:00
»
Hack a Day
Thanks to the wonders of neural networks and machine learning algorithms, it’s now possible to do things that were once thought to be inordinately difficult to achieve with computers. It’s a combination of the right techniques and piles of computing power that make such feats doable, and [Robert Bond’s] ant zapping project is a great example.
The project is based around an NVIDIA Jetson TK1, a system that brings the processing power of a modern GPU to an embedded platform. It’s fitted with a USB camera, that is used to scan its field of view for ants. Once detected, thanks to a little OpenCV magic, the coordinates of the insect are passed to the laser system. Twin stepper motors are used to spin mirrors that direct the light from a 5 mW red laser, which is shined on the target. If you’re thinking of working on something like this we highly recommend using galvos to direct the laser.
Such a system could readily vaporize ants if fitted with a more powerful laser, but [Robert] decided to avoid this for safety reasons. Plus, the smell wouldn’t be great, and nobody wants charred insect residue all over the kitchen floor anyway. We’ve seen AIs do similar work, too – like detecting naughty cats for security reasons.
document.createElement('video');
https://hackaday.com/wp-content/uploads/2019/09/intro.mp4
-
-
4:00
»
Hack a Day
A question: if you’re controlling the classic video game Street Fighter with gestures, aren’t you just, you know, street fighting?
That’s a question [Charlie Gerard] is going to have to tackle should her AI gesture-recognition controller experiments take off. [Charlie] put together the game controller to learn more about the dark arts of machine learning in a fun and engaging way.
The controller consists of a battery-powered Arduino MKR1000 with WiFi and an MPU6050 accelerometer. Held in the hand, the controller streams accelerometer data to an external PC, capturing the characteristics of the motion. [Charlie] trained three different moves – a punch, an uppercut, and the dreaded Hadouken – and captured hundreds of examples of each. The raw data was massaged, converted to Tensors, and used to train a model for the three moves. Initial tests seem to work well. [Charlie] also made an online version that captures motion from your smartphone. The demo is explained in the video below; sadly, we couldn’t get more than three Hadoukens in before crashing it.
With most machine learning project seeming to concentrate on telling cats from dogs, this is a refreshing change. We’re seeing lots of offbeat machine learning projects these days, from cryptocurrency wallet attacks to a semi-creepy workout-monitoring gym camera.
-
-
16:00
»
Hack a Day
When starting a new job, learning coworkers names can be a daunting task. Getting this right is key to forming strong professional relationships. [Ahad] noted that [Marcos] was struggling with this, so built the Name Stone to help.
The Name Stone consists of some powerful hardware, wrapped up in a 3D printed case reminiscent of the Eye of Agamotto from Doctor Strange. Inside, there’s a Jetson Nano – an excellent platform for any project built around machine learning tasks. This is combined with a microphone and camera to collect data from the environment.
[Ahad] then went about training neural networks to help with basic identification tasks. Video was taken of the coworkers, then the frames used to train a convolutional neural network using PyTorch. Similarly, a series of audio clips were used to again train a network to identify individuals through the sound of their voice, using MFCC techniques. Upon activating the stone, the device will capture an image or a short sound clip, and process the data to identify the target coworker and remind [Marcos] of their name.
It’s a project that could be quite useful, given to new employees to help them transition into the new workplace. Of course, pervasive facial recognition technology does have some drawbacks. Video after the break.
-
-
16:00
»
Hack a Day
It isn’t often that the world of Hackaday intersects with the world of crafting, which is perhaps a shame because many of the skills and techniques of the two have significant overlap. Crochet for instance has rarely featured here, but that is about to change with [Janelle Shane]’s HAT3000 neural network trained to produce crochet hat patterns.
Taking the GPT-2 neural network trained on Internet text and further training it with a stack of crochet hat patterns, she was able to generate AI-designed hats which her friends on the Ravelry yarn forum set to crochet into real hats. It’s a follow-up to a previous knitting-based project, and instead of producing the hats you might expect it goes into flights of fancy. Some are visibly hat-like while others turn into avant-garde creations that defy any attempt to match them to real heads. A whole genre of hyperbolic progressions of crochet rows produce hats with organic folds that begin to resemble brains, and tax both the stamina of the person doing the crochet and their supply of yarn.
Perhaps most amusingly the neural network retains the ability to produce text, but when it does so it now inevitably steers the subject back to crochet hats. A Harry Potter sentence spawns a passage of something she aptly describes as “terrible crochet-themed erotica“, and such is the influence of the crochet patterns that this purple prose can even include enough crochet instructions to make them crochetable. It would be fascinating to see whether a similar model trained with G-code from Thingiverse would produce printable designs, what would an AI make with Benchy for example?
We’ve been entertained by [Janelle]’s AI work before, both naming tomato varieties, and creating pie recipes.
Thanks [Laura] for the tip.
-
-
4:00
»
Hack a Day
What’s in your crypto wallet? The simple answer should be fat stacks of Bitcoin or Ethereum and little more. But if you use a hardware cryptocurrency wallet, you may be carrying around a bit fat vulnerability, too.
At the 35C3 conference last year, [Thomas Roth], [Josh Datko], and [Dmitry Nedospasov] presented a side-channel attack on a hardware crypto wallet. The wallet in question is a Ledger Blue, a smartphone-sized device which seems to be discontinued by the manufacturer but is still available in the secondary market. The wallet sports a touch-screen interface for managing your crypto empire, and therein lies the weakness that these researchers exploited.
By using a HackRF SDR and a simple whip antenna, they found that the wallet radiated a distinctive and relatively strong signal at 169 MHz every time a virtual key was pressed to enter a PIN. Each burst started with a distinctive 11-bit data pattern; with the help of a logic analyzer, they determined that each packet contained the location of the key icon on the screen.
Next step: put together a training set. They rigged up a simple automatic button-masher using a servo and some 3D-printed parts, and captured signals from the SDR for 100 presses of each key. The raw data was massaged a bit to prepare it for TensorFlow, and the trained network proved accurate enough to give any hardware wallet user pause – especially since they captured the data from two meters away with relatively simple and concealable gear.
Every lock contains the information needed to defeat it, requiring only a motivated attacker with the right tools and knowledge. We’ve covered other side-channel attacks before; sadly, they’ll probably only get easier as technologies like SDR and machine learning rapidly advance.
[via RTL-SDR.com]
-
-
12:10
»
Hack a Day
Here’s the most useless machine we’ve seen so far. It comes from the workshop of [forn4x] and happily turns itself off whenever any one of its eight switches are flicked to the on position. The build began when [forn]‘s Canon 850i printer gave up the ghost because of a broken print head. All the other [...]
-
-
16:01
»
Hack a Day
Powerful graphics cards are pretty affordable these days. Even though we rarely do high-end gaming on our daily machine we still have a GeForce 9800 GT. That goes to waste on a machine used mainly to publish posts and write code for microcontrollers. But perhaps we can put the GPU to good use when it comes [...]
-
-
8:40
»
Hack a Day
When dealing with surface mount components, a manual pick-and-place machine is certainly a helpful device to have. Unfortunately, they can be quite expensive, so [Vassilis] came up with his own solution. While commercial setups can cost upwards of a thousand dollars, this setup was made for less than a tenth of this cost. This one [...]
-
-
14:01
»
Hack a Day
You’ll find this used book vending machine at The Monkey’s Paw in Toronto, Canada. For two Loonies you can buy a random book from the machine’s hopper. Silly? Absolutely. But as you can see from the video after the break, the act of buying a book this way is a lot of fun, and we [...]
-
-
8:01
»
Hack a Day
Anyone who has listened to any music from the 80s has heard the percussive effects of the infamous TR-808 drum machine. To the modern ear, it sounds like an antique. Being the most popular drum machine of all time means it must have some redeeming qualities, right? [Moritz Simon Geist] decided he wanted nothing to [...]
-
7:18
»
Hack a Day
In 1982, Van Halen had the biggest stage show around. Their rider – a document going over the requirements for the show – reflects this. In the middle of the requirements for the lighting and sound rigs, Van Halen placed a rather odd request; one (1) bowl of M&M, (ABSOLUTELY NO BROWN ONES). The theory being [...]
-
-
10:01
»
Hack a Day
The mechanical simplicity of this pull-string controlled most useless machine is delightful. You can see the metal gripper which is reaching up to tug on a light-fixture-style pull chain. This is how it turns itself off after you’ve pulled the string to power it up. The device is [Alex555's] entry in the 7400 Logic competition. [...]
-
-
7:14
»
Hack a Day
In what can probably be attributed to the pains of placing a lot of SMD components, [gravelrash] built his own home-made pick and place machine. Instead of being frustrated with tweezers, stereo microscopes, and having an inordinate amount of concentration, [gravelrash] built a pick and place machine from a Chinese CNC router. The build doesn’t [...]
-
-
7:00
»
Hack a Day
Our favorite holiday is just around the corner, so there’s no surprise in seeing a few builds to scare children turning up in the tip jar. [Greg] also loves Halloween and apparently puts on a good show – he always uses a fog machine on his porch on All Hallow’s Eve, but triggering it at [...]
-
-
13:01
»
Hack a Day
We suppose the only thing more useless than a most useless machine is giving it an emoticon face. But that’s exactly what has happened with this project. But you’ll want to seen the whole thing, as the presentation involves much more than an angry box that can shut itself off. This is the second iteration [...]
-
-
7:56
»
Hack a Day
[Niklas Roy] calls it his Perpetual Energy Wasting Machine, but we know it for what it truly is: a building-sized most useless machine. You’ll remember that a most useless machine is a bobble that uses clever design to turn itself off once you have turned it on. This does the same thing with the elevator of the WRO [...]
-
-
8:00
»
Hack a Day
[Dimitri] sent in a project he’s been working on that implements a Java Virtual Machine purely in C, and is easily portable between microcontrollers such as the AVRs and PICs we normally see, ARM devices, and even the lowly 386. Before going into the ‘how’, [Dimitri] first covers why he wanted to run Java bytecode [...]
-
-
21:32
»
SecDocs
Authors:
Tom Trumpbour Tags:
voting machine Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: The talk will be about voting machine technology, a short history, its vulnerabilities and overall reliability. There will be a concentration about the Diebold e-voting code and its limitations. The presentation will give a short history, vulnerabilities and overall reliability of the following voting technologies: Uniform paper ballots, mechanical lever machines, punch cards, optical scan, and direct recording electronic (DRE). The DRE technology by Diebold will then be the concentration of the talk. The proprietary code and how it became public, overall coding highlights, a design overview, and a close look at the vulnerabilities in both the architecture and code. Weaknesses in lack of encryption or defective encryption, faulty storage control, regressive database design, poor coding practices, and a mediocre smart card implementation will be discussed.
-
21:32
»
SecDocs
Authors:
Tom Trumpbour Tags:
voting machine Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: The talk will be about voting machine technology, a short history, its vulnerabilities and overall reliability. There will be a concentration about the Diebold e-voting code and its limitations. The presentation will give a short history, vulnerabilities and overall reliability of the following voting technologies: Uniform paper ballots, mechanical lever machines, punch cards, optical scan, and direct recording electronic (DRE). The DRE technology by Diebold will then be the concentration of the talk. The proprietary code and how it became public, overall coding highlights, a design overview, and a close look at the vulnerabilities in both the architecture and code. Weaknesses in lack of encryption or defective encryption, faulty storage control, regressive database design, poor coding practices, and a mediocre smart card implementation will be discussed.
-
21:32
»
SecDocs
Authors:
Tom Trumpbour Tags:
voting machine Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: The talk will be about voting machine technology, a short history, its vulnerabilities and overall reliability. There will be a concentration about the Diebold e-voting code and its limitations. The presentation will give a short history, vulnerabilities and overall reliability of the following voting technologies: Uniform paper ballots, mechanical lever machines, punch cards, optical scan, and direct recording electronic (DRE). The DRE technology by Diebold will then be the concentration of the talk. The proprietary code and how it became public, overall coding highlights, a design overview, and a close look at the vulnerabilities in both the architecture and code. Weaknesses in lack of encryption or defective encryption, faulty storage control, regressive database design, poor coding practices, and a mediocre smart card implementation will be discussed.
-
9:44
»
SecDocs
Authors:
Tom Trumpbour Tags:
voting machine Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: The talk will be about voting machine technology, a short history, its vulnerabilities and overall reliability. There will be a concentration about the Diebold e-voting code and its limitations. The presentation will give a short history, vulnerabilities and overall reliability of the following voting technologies: Uniform paper ballots, mechanical lever machines, punch cards, optical scan, and direct recording electronic (DRE). The DRE technology by Diebold will then be the concentration of the talk. The proprietary code and how it became public, overall coding highlights, a design overview, and a close look at the vulnerabilities in both the architecture and code. Weaknesses in lack of encryption or defective encryption, faulty storage control, regressive database design, poor coding practices, and a mediocre smart card implementation will be discussed.
-
-
9:01
»
SecDocs
Authors:
Gunnar Rätsch Tags:
AI Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: A broad overview about the current stage of research in Machine Learning starting with the general motivation and the setup of learning problems and discussion of state-of-the-art learning algorithms for novelty detection, classification and regression. Additionally, machine learning methods used for spam detection, intrusion detection, brain computer interace and biological sequence analysis are outlined.
-
9:01
»
SecDocs
Authors:
Gunnar Rätsch Tags:
AI Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: A broad overview about the current stage of research in Machine Learning starting with the general motivation and the setup of learning problems and discussion of state-of-the-art learning algorithms for novelty detection, classification and regression. Additionally, machine learning methods used for spam detection, intrusion detection, brain computer interace and biological sequence analysis are outlined.
-
9:01
»
SecDocs
Authors:
Gunnar Rätsch Tags:
AI Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: A broad overview about the current stage of research in Machine Learning starting with the general motivation and the setup of learning problems and discussion of state-of-the-art learning algorithms for novelty detection, classification and regression. Additionally, machine learning methods used for spam detection, intrusion detection, brain computer interace and biological sequence analysis are outlined.
-
-
21:37
»
SecDocs
Authors:
Gunnar Rätsch Tags:
AI Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: A broad overview about the current stage of research in Machine Learning starting with the general motivation and the setup of learning problems and discussion of state-of-the-art learning algorithms for novelty detection, classification and regression. Additionally, machine learning methods used for spam detection, intrusion detection, brain computer interace and biological sequence analysis are outlined.
-
-
13:01
»
Hack a Day
Your neighbors are going to love you if you start filling up the back yard with foam at your next party. It’s an easy enough build, but depending on your ability to source the major components it could cost a pretty penny to use it at your next rager. [Species287] used a big fan and [...]
-
-
4:01
»
Hack a Day
[Nick Johnson] recently wrote in, sharing a neat project he put together in his spare time. Our readers are most likely familiar with the ubiquitous “fortune” program that ships with many *nix distros, offering cheeky comments and quotes with the press of a button. [Nick] thought it would be cool to build a fortune telling [...]
-
-
13:01
»
Hack a Day
[Vending Mexico] plans to design, build, and sell their of vending machines. You’ve got to start somewhere so they’ve built this prototype. It offers a range of vending features but was built with parts we’re used to seeing in hobby projects. The one challenge they didn’t take on is the ability to identify coins and [...]
-
-
8:10
»
SecDocs
Authors:
Marc Schiesser Tags:
FreeBSD Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Most technologies and techniques intended for securing digital data focus on protection while the machine is turned on – mostly by defending against remote attacks. An attacker with physical access to the machine, however, can easily circumvent these defenses by reading out the contents of the storage medium on a different, fully accessible system or even compromise program code on it in order to leak encrypted information. Especially for mobile users, that threat is real. And for those carrying around sensitive data, the risk is most likely high. This talk will introduce a method of mitigating that particular risk by protecting not only the data through encryption, but also the applications and the operating system from being compromised while the machine is turned off.
-
8:10
»
SecDocs
Authors:
Marc Schiesser Tags:
FreeBSD Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Most technologies and techniques intended for securing digital data focus on protection while the machine is turned on – mostly by defending against remote attacks. An attacker with physical access to the machine, however, can easily circumvent these defenses by reading out the contents of the storage medium on a different, fully accessible system or even compromise program code on it in order to leak encrypted information. Especially for mobile users, that threat is real. And for those carrying around sensitive data, the risk is most likely high. This talk will introduce a method of mitigating that particular risk by protecting not only the data through encryption, but also the applications and the operating system from being compromised while the machine is turned off.
-
8:10
»
SecDocs
Authors:
Marc Schiesser Tags:
FreeBSD Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Most technologies and techniques intended for securing digital data focus on protection while the machine is turned on – mostly by defending against remote attacks. An attacker with physical access to the machine, however, can easily circumvent these defenses by reading out the contents of the storage medium on a different, fully accessible system or even compromise program code on it in order to leak encrypted information. Especially for mobile users, that threat is real. And for those carrying around sensitive data, the risk is most likely high. This talk will introduce a method of mitigating that particular risk by protecting not only the data through encryption, but also the applications and the operating system from being compromised while the machine is turned off.
-
-
21:46
»
SecDocs
Authors:
Marc Schiesser Tags:
FreeBSD Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Most technologies and techniques intended for securing digital data focus on protection while the machine is turned on – mostly by defending against remote attacks. An attacker with physical access to the machine, however, can easily circumvent these defenses by reading out the contents of the storage medium on a different, fully accessible system or even compromise program code on it in order to leak encrypted information. Especially for mobile users, that threat is real. And for those carrying around sensitive data, the risk is most likely high. This talk will introduce a method of mitigating that particular risk by protecting not only the data through encryption, but also the applications and the operating system from being compromised while the machine is turned off.
-
-
12:01
»
Hack a Day
If you really know your Magic the Gather and you’re a programming wiz you’ll appreciate this paper on building a functioning Turing Machine from Magic the Gathering cards. We’re sure you’re familiar with Turing Machines, which uses a rewritable strip to store and recall data. Most of the time we see these machines built as… [...]
-
-
21:47
»
SecDocs
Authors:
Konrad Rieck Sören Sonnenburg Timon Schroeter Tags:
alghoritm Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Overview of the current state of research in Machine Learning including the general motivation, setup of learning problems, state-of-the-art learning algorithms and applications like our brain computer interface. The talk is going to have three parts: (a) What is Machine Learning about? This includes the general motivation (spam detection as example) and the setup of supervised learning problems. (b) What are state-of-the-art learning techniques? With a minimal amount of theory, I'll describe some methods including a currently very successful and easily applicable method called Support Vector Machines. I'll provide references to packaged implementations of these algorithms. (c) I'll discuss a few applications in greater detail, to show how Machine Learning can be successfully applied in practice. These will include: Handwritten letter/digit recognition, drug discovery, file classification (e.g. on Linux and BSD sourcecode), gene finding and brain-computer interfacing. I present the material as self-contained as possible. Part b will contain some math, but this will be kept to a minimum: I mainly want to bring ideas across.
-
21:47
»
SecDocs
Authors:
Konrad Rieck Sören Sonnenburg Timon Schroeter Tags:
alghoritm Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Overview of the current state of research in Machine Learning including the general motivation, setup of learning problems, state-of-the-art learning algorithms and applications like our brain computer interface. The talk is going to have three parts: (a) What is Machine Learning about? This includes the general motivation (spam detection as example) and the setup of supervised learning problems. (b) What are state-of-the-art learning techniques? With a minimal amount of theory, I'll describe some methods including a currently very successful and easily applicable method called Support Vector Machines. I'll provide references to packaged implementations of these algorithms. (c) I'll discuss a few applications in greater detail, to show how Machine Learning can be successfully applied in practice. These will include: Handwritten letter/digit recognition, drug discovery, file classification (e.g. on Linux and BSD sourcecode), gene finding and brain-computer interfacing. I present the material as self-contained as possible. Part b will contain some math, but this will be kept to a minimum: I mainly want to bring ideas across.
-
5:23
»
SecDocs
Authors:
Konrad Rieck Sören Sonnenburg Timon Schroeter Tags:
alghoritm Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Overview of the current state of research in Machine Learning including the general motivation, setup of learning problems, state-of-the-art learning algorithms and applications like our brain computer interface. The talk is going to have three parts: (a) What is Machine Learning about? This includes the general motivation (spam detection as example) and the setup of supervised learning problems. (b) What are state-of-the-art learning techniques? With a minimal amount of theory, I'll describe some methods including a currently very successful and easily applicable method called Support Vector Machines. I'll provide references to packaged implementations of these algorithms. (c) I'll discuss a few applications in greater detail, to show how Machine Learning can be successfully applied in practice. These will include: Handwritten letter/digit recognition, drug discovery, file classification (e.g. on Linux and BSD sourcecode), gene finding and brain-computer interfacing. I present the material as self-contained as possible. Part b will contain some math, but this will be kept to a minimum: I mainly want to bring ideas across.
-
-
9:01
»
Hack a Day
This is a fuse making machine that operates nearly as well as a factory machine would. Have you figured out what exactly this is yet? It’s not an electrical fuse, it’s a Visco Fuse. Still not totally clear? Don’t worry, we had to look it up too. Visco Fuse is a high-quality safety fuse used [...]
-
-
9:00
»
Hack a Day
What better way to watch the Olympics than having a robot pour you a shot every time the United States wins a medal? The folks behind SmartThings did just that, by creating a machine that pours some liquor for each American Olympic win. From the behind the scenes video, we see the entire build is [...]
-
-
11:44
»
SecDocs
Authors:
Christine Corbett Moran Tags:
technology Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Today two revolutions are pushing the machine translation field forward: the open source movement, and the broader application of statistical methods. This talk is at the intersection of the two: centering around the applications and contributions to be made to Moses, a state of the art open source toolkit for statistical machine translation developed by researchers from MIT, Edinburgh, Cornell, and Aachen. Today two revolutions are pushing the machine translation field forward: the open source movement, and the broader application of statistical methods. This talk is at the intersection of the two: centering around the applications and contributions to be made to Moses, a state of the art open source toolkit for statistical machine translation developed by researchers from MIT, Edinburgh, Cornell, and Aachen. In the past, those who wanted quality machine translations were forced to rely on closed source, rule based engines such a SYSTRAN. Even most of Google's translation engine uses SYSTRAN software. But Google and others are moving towards flexible, trainable systems, based on computer generated statistics rather than PhD linguist generated rules. This means a machine translation is accessible to the average user. Next time, instead of getting angry or amused by a poor translation provided by Google Translate or BabelFish, use your own copy of the open source engine and you can hack away, helping to improve translation quality for yourself and users around the globe.
-
11:40
»
SecDocs
Authors:
Christine Corbett Moran Tags:
technology Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Today two revolutions are pushing the machine translation field forward: the open source movement, and the broader application of statistical methods. This talk is at the intersection of the two: centering around the applications and contributions to be made to Moses, a state of the art open source toolkit for statistical machine translation developed by researchers from MIT, Edinburgh, Cornell, and Aachen. Today two revolutions are pushing the machine translation field forward: the open source movement, and the broader application of statistical methods. This talk is at the intersection of the two: centering around the applications and contributions to be made to Moses, a state of the art open source toolkit for statistical machine translation developed by researchers from MIT, Edinburgh, Cornell, and Aachen. In the past, those who wanted quality machine translations were forced to rely on closed source, rule based engines such a SYSTRAN. Even most of Google's translation engine uses SYSTRAN software. But Google and others are moving towards flexible, trainable systems, based on computer generated statistics rather than PhD linguist generated rules. This means a machine translation is accessible to the average user. Next time, instead of getting angry or amused by a poor translation provided by Google Translate or BabelFish, use your own copy of the open source engine and you can hack away, helping to improve translation quality for yourself and users around the globe.
-
-
5:00
»
Hack a Day
Instead of rock-hard bubble gum that loses its flavor after 2 minutes, this gumball machine delivers apps and games directly to your smartphone. The communications protocol used by this app-delivering gumball machine isn’t bluetooth or WiFi but near field communication. This protocol allows for a point-to-point network between the app dispenser and a phone to deliver games, [...]
-
-
8:01
»
Hack a Day
[Viktor's] washing machine did a good job of cleaning his clothes, but it kept a bit too quiet about it. The machine doesn’t have an audible alert to let him know the cycle has finished. He decided to build his own alarm which can just be slapped on the side of the machine. You can [...]
-
-
9:01
»
Hack a Day
2012 is the 100-year anniversary of [Alan Turing]‘s birth, and to celebrate the centennial, [Jeroen] and [Davy] over at Centrum Wiskunde & Informatica in The Netherlands built a Turing machine out of LEGO. A Turing machine is an extremely simple device, but is still able to compute everything your desktop can. The machine is generally described [...]
-
-
15:01
»
Hack a Day
[Glen] built this shiny party machine out of a pretty sad-looking scooter. We’d bet you’re wondering why we think it’s a party machine when it looks so common? The only real giveaway in this photo is the custom exhaust, but hidden in the body of the beast is 720 Watts of party power plus a [...]
-
-
9:00
»
Hack a Day
A huge collection of pinball machines in your basement is one of the crowing achievements of a geek, but what if you could have a huge library of physical pinball machines at you fingertips? [veriix] shared an imgur gallery in a reddit post documenting his wee little pinball machine he built from scratch. Inside the pinball cabinet, [...]
-
-
10:01
»
Hack a Day
For his senior design project at Swarthmore College, [Julian] decided to build a metalworking equivalent to the RepRap. [Julian]‘s final project is a self-replicating milling machine, and hopefully giving some serious metalworking power to all the makers with CNC routers and RepRaps out there. At first glance, [Julian]‘s mill doesn’t look like something you would find [...]
-
-
13:01
»
Hack a Day
If you had a machine that could print complex mechanical parts in an hour or so, what would you do? [Chris] is doing the coolest thing we can imagine and is building an electromechanical computer from 3D printed parts. You may remember [Chris] from his efforts to getting his tiny, 1/10th scale Cray-1 supercomputer up and [...]
-
11:01
»
Hack a Day
This rig will take the letters you write on the touchpad using a stylus and turn them into digital characters. The system is very fast and displays near-perfect recognition. This is all thanks to a large data set that was gathered through machine learning. The ATmega644 that powers the system just doesn’t have the speed [...]
-
-
10:06
»
Hack a Day
Get ready to be swept off your feet by this Acorn Risc Machine promotional video from the Mid-1980′s (also embedded after the jump). We’re sure most have put it together by now, but for those slower readers, this is the introduction of ARM processors. The video has a bit of everything. There’s a deadpan narration [...]
-
-
11:01
»
Hack a Day
It seems that [Limpkin] was up to no good this weekend. He decided to snoop around inside a smart-card laundry machine. He posted about his larceny adventure and shared the details about how card security works with this machine. We’re shocked that the control hardware is not under lock and key. Two screws are all that secures [...]
-
-
6:01
»
Hack a Day
If you like marble machines, or if you simply like alliteration, prepare to be amazed. [Denha] apparently has had a lot of time to spare over the years, as the marble machine collection he’s amassed is quite incredible. Dating back to 2009, the collection includes relatively simple machines, like the one pictured at the beginning, [...]
-
-
7:29
»
Hack a Day
The guys over at North Street Labs were bored, so they figured why not go ahead and built a CNC machine just for kicks. While they haven’t put up build details on the CNC just yet, they do have some newly milled business cards to show off just how well the machine works. Part ruler, [...]
-
-
9:01
»
Hack a Day
The Raspberry Pi was launched nearly a month ago, but these wonderful cheap single-board computers are still on their way from China to the workbenches of hackers and builders around the globe. Although they haven’t shipped yet, plenty of people are chomping at the bit to do something useful with the Raspi. [Nicholas] figured he [...]
-
-
11:57
»
Hack a Day
During the gilded age, oil magnates, entrepreneurs, and robber barons would have a ticker tape machine in their study. This machine would print stock and commodity prices and chart these men’s assets climbing higher and higher. A lot has changed in 100 years, as now [Adam] can be kept apprised of what @KimKardashian, @BarackObama and @stephenfry ate [...]
-
-
8:01
»
Hack a Day
While having ambient music playing in the background can lead to a more relaxed state of mind, we can’t imagine the annoyance of having to replace the batteries constantly. Thankfully, [Phil] added solar charging to his Buddha Machine so he won’t have to worry about batteries anymore. If you’re not familiar, the Buddha Machine is a [...]
-
-
9:01
»
Hack a Day
We may be showing our age here, but we have no idea what a ‘poke’ on Facebook actually means. Whether it’s the passive-aggressive manifestations of online stalkers or an extension of the ‘like’ button, all we know is [Jasper] and [Bartholomäus] built a machine that translates virtual pokes into our analog world. The “Poking Machine” as [Jasper] and [Bart] [...]
-
-
9:01
»
Hack a Day
If you have ever produced your own PCBs at home, you know that it can be somewhat of a time consuming process. Spending 20 or so minutes manually agitating a board is a drag, and while aquarium bubbler setups improve the process, they are far from ideal. [Christian Reed] knew that if he really wanted [...]
-
-
11:01
»
Hack a Day
Most useless machine We love ‘em, and we hope you do too. Here’s [Phase2plus'] take on the most useless machine. Scratching like it’s 1989 [Nick] spent three bucks at the thrift store and ended up buying days worth of fun with this cassette player. He hacked it to scratch like vinyl. 3D printed jawbone This [...]
-
-
14:24
»
Hack a Day
Whether you take it as a single shot or a double, a great Barista want’s to know the details on what’s happening with the espresso machine. [Tobi] was happily generating the morning cup when he realized that the needle-thermometer on his machine wasn’t working any longer. Instead of shelling out a lot of money for [...]
-
-
14:25
»
Hack a Day
[Shameel Arafin, Sean McIntyre, and Reid Bingham] really dig rainbows. Going by the moniker the “RainBroz”, the trio built a portable display that can be used to add cool light painting effects to pictures. The group brings their Rainbow Machine all over the place, including parties, gatherings, and random spots on the street. Anyone is [...]
-
-
7:23
»
Packet Storm Security Tools
log2command is a PHP script that tracks IPs in log files and executes shell commands per each IP. log2command was created as a sort of reverse fail2ban or cheap VPN-firewall: a machine with a closed firewall can be told, by a foreign machine, to accept connections from a specific IP. log2command then keeps track of the webserver log file and watches for inactivity from the user's IP. After an amount of time another command is executed that can remove the user's IP from the firewall, closing down the machine again. The PHP script is a command-line program that can be run in the background.
-
7:23
»
Packet Storm Security Misc. Files
log2command is a PHP script that tracks IPs in log files and executes shell commands per each IP. log2command was created as a sort of reverse fail2ban or cheap VPN-firewall: a machine with a closed firewall can be told, by a foreign machine, to accept connections from a specific IP. log2command then keeps track of the webserver log file and watches for inactivity from the user's IP. After an amount of time another command is executed that can remove the user's IP from the firewall, closing down the machine again. The PHP script is a command-line program that can be run in the background.
-
-
15:43
»
Hack a Day
[Grenadier] built his very own x-ray machine. He’s no stranger to high voltage – we’ve seen his Jacob’s Ladders and Marx generators. Surely he can handle himself with high voltage and dangerous equipment. With this portable x-ray machine, [Grenadier] has begun overloading Geiger counters. We’re just happy he knows what he’s doing. The key component of [...]
-
-
11:14
»
Hack a Day
It looks like Null Space Labs has a new pick and place machine. This immense repair job began when [Charliex] and [Gleep] found a JukiPlacemat 360 pick and place machine. The idea of having their very own pick and place machine proved intoxicating, possibly too much so because the didn’t return the machine when they found out [...]
-
-
6:01
»
Hack a Day
[Michael Nilsson] and [Markus Olsson] were contemplating how to motivate members of their dev team when they came up with the idea of a candy machine that automatically dispenses treats when someone has earned it. They picked up a candy machine, a continuous rotation servo and a controller, then got busy automating the dispenser. The [...]
-
-
8:01
»
Hack a Day
If you happen to do a lot of SMD work, a pick and place machine is an incredible time saver. The problem is that most automated pick and place solutions are well outside of the “small outfit” price range, let alone the budget of a hobbyist. We have seen some great DIY pick and place [...]
-
-
10:01
»
Hack a Day
The heat sensor in [Cameron]‘s espresso machine doesn’t work very well. He sees some pretty crazy variations in temperature when pulling an espresso shot, and when the boiler is just sitting there the heater element will heat the water full-bore then shut off for a while. Since this is a pretty low bar from a [...]
-
-
13:00
»
Hack a Day
[monkeysinacan] wanted to add a fog machine to his Halloween display, but he says that the cheaper consumer-grade models are pretty unruly beasts. He cites short duty cycles and tricky fog control as his two biggest gripes with these sorts of foggers. He decided make the fogging process a little more manageable, and modified his [...]
-
-
10:01
»
Hack a Day
[Ameres Valentin] was looking for a less expensive way to get around after spending in excess of 100 Euros a month on public transportation in Munich. His solution is an electric bicycle powered by a washing machine motor. It’s a 300 Watt motor that runs on 24 Volts, capable of around 3000 RPM. We’re used [...]
-
-
10:01
»
Hack a Day
[74hc595] just finished his entry in the 7400 logic contest. It’s a drum machine built entirely from 7400-series logic chips. He hasn’t quite reached full completion of the project yet. The hardware works just fine, and he’s built a foam core face plate with many more controls than you see here but much of the [...]
-
-
11:01
»
Hack a Day
[Alex] wrote in to let us know he just completed a pretty major upgrade to his PopCARD RFID vending machine system. You may remember that earlier this year he added an Arduino based RFID reader to a soda machine so that thirsty patrons could pay with plastic instead of cold hard cash. That system worked, [...]
-
-
12:49
»
Hack a Day
For those of us that would like a good cup of coffee but don’t want to put up with the ‘burnt butt’ taste of Starbucks and don’t have a decent coffee shop nearby, we’ve had very few options. Most of us have been made to suffer with an el-cheapo espresso machine. [Joe] sent in a great [...]
-
-
11:01
»
Hack a Day
For those living in a magical land of candy, with orange-faced helpers to do their bidding, the ability to taste your words is nothing new. But for the rest of us, the ability to taste what you type in cocktail form is a novelty. [Morskoiboy] took some back-of-the-envelope ideas and made them into a real [...]
-
-
13:18
»
SecDocs
Authors:
Georg Wicherski Tags:
virtual machine malware malware analysis Event:
Black Hat USA 2010 Abstract: The increasing amount of new malware each day does not only put anti-virus companies up to new limits handling these samples for detection by creating new signatures. But also for network security providers and administrators, getting information on how samples affect the networks they try to protect is an increasing problem. Dynamic analysis of malware by execution in sandboxes has been an approach that has been successfully applied in both of these problem scenarios, however classic sandbox approaches clearly suffer from severe scalability problems. Most of these rely on setting up a real target system such as the Windows XP operating system as a virtual machine with additional software that does logging of performed actions. While these are easy to develop and set up, they require a separate virtual machine instance for each malware sample to be analyzed and therefore do not scale up with today's requirements in terms of malware growth. Anti-Virus vendors tried to circumvent performance issues for file analysis by developing custom emulators that can be deployed on a customer end-host for detection and do not require a whole operating system inside a virtual machine. These emulators however often are software interpreters for the x86 instruction set and run therefore into execution speed limitations on their own. Additionally, they suffer from detectability because they try to emulate every single Windows API but suffer from accuracy issues. dirtbox is an attempt to implement a highly scalable x86/Windows emulator that can be both used for simple malware detection and detailed behavior analysis reports. Instead of emulating every single x86 instruction in software, malware instructions are executed directly on the host CPU in a per basic block fashion. A disassembling run on each basic block ensures that no privileged or control flow subverting instructions are executed. The notion of virtual memory that is separated from the emulators memory is employed by special LDT segments and switching segment selectors before executing guest instructions. Since no instrumentation alike instruction rewriting is being done, disassembler results per basic block can be cached and all execution happens in the same process without context-switches, a high grade of performance is achieved. The operating system is emulated at the syscall layer. While this layer is mostly undocumented and implementing it in an accurate fashion is a challenging task on its own, the fact that no register changes are leaked from Ring 0 thwarts a lot of detection techniques. For usage of the high-level APIs, corresponding libraries are directly mapped into the virtual memory as well.
-
-
13:01
»
Hack a Day
[McKGyver] needed a few parts manufactured. Instead of going the normal route – finding friends with machine tools or paying a machine shop, he improvised a rudimentary metal lathe. As much as we love 3D printers, they’re not the be-all, end-all solution for everything. Sometimes, you need to get a little dirty and do it [...]
-
-
11:01
»
Hack a Day
[alanamon] had an old pinball machine in his basement, and thought it would be cool to rig it up to serve as a clock as well. He didn’t want it to be just any clock however, he wanted the pinball machine to be the most accurate clock in his house. Other than telling time using [...]
-
-
12:01
»
Hack a Day
The Swap-O-Matic is vending machine built for recycling, not consuming. Instead of feeding money into the machine, you can get an item out of the machine by swapping it for something you don’t need anymore. It’s a great concept with a great retro design, probably influenced by the age of the automat. [Lina Fenequito] and [...]
-
-
9:01
»
Hack a Day
Why build a pick and place machine from the ground up when you can start with a full featured, but non-functional unit, and bring it back to life. That’s exactly what [Charliex] is doing with this Juki 360 rebuild. A bit of background is in order here. [Charliex] is working alongside other hackers at Null [...]
-
-
7:01
»
Hack a Day
Professional-grade pick and place machines are quite pricey, so when the crew at Null Space Labs picked up an old Juki Placemat 360 for only $1,200, they were stoked. When they finally got it in-house however, they realized that the seller’s definition of “working” was a bit different than theirs. The machine’s compressor is busted, [...]
-
-
12:01
»
Hack a Day
[Clifford Wolf] wrote in to let us know about a project he recently completed called EmbedVM. It’s a virtual machine for AVR microcontrollers. The package has a relatively small overhead, taking up about 3kB of program memory. The VM can execute 74,000 instructions per second, and runs asynchronously from the microcontroller. As [Clifford] demonstrates in [...]
-
-
6:00
»
Hack a Day
In case you missed them, here are our most popular posts from this week: First up is [Bertho's] Pointless Switch machine. This machine is yet another take on the ‘most pointless machine’. It looks like his server couldn’t handle the load from his video so he moved it over to youtube. You can find it [...]
-
-
14:55
»
Hack a Day
There’s a soft spot in our hearts for pointless projects, as long as they’re well executed. [Bertho] really hit the mark with his take on the most useless machine. We’ve seen several renditions of this concept, most of them hinging on a box that will turn a mechanical switch off whenever you turn it on. [...]
-
-
13:35
»
Hack a Day
[Micha’s] washing machine is equipped with a rather inaccurate timer, so it is always difficult to estimate when the load will be finished. Since it is located in his basement, he hated having to check on the machine continually to know when his clothes were done. Instead of hauling up and down the stairs over [...]
-
-
14:38
»
Hack a Day
[Metalfusion], built himself a nice looking CNC machine and has been experimenting with some out of the box uses for his new tool. One novel use he is particularly fond of is creating pictures with his machine (Google Translation). While you might imagine that he is simply using the CNC as an engraver, literally drawing images [...]
-
13:38
»
Hack a Day
Behold the wooden machine (translated) that is used for… well it does… it was built because… Okay, this is a case where asking what it does or why it was built is the wrong question. [Erich Schatt] began building the piece that he calls “Wheels” back in 1995. It took just seven years to complete, and [...]
-
-
10:17
»
Hack a Day
Check out this floating foam letter machine that was shown off at last year’s IFA show in Berlin, the German equivalent of CES. The contraption is called Flogos, and comes from a company named SnowMasters based out of Alabama. The Flogos machine consists of a helium and compressed air bubble generator positioned below a custom [...]
-
-
14:01
»
Hack a Day
[Ed Nauman] runs a machine shop, which we imagine can be quite loud at times. Sick of never hearing the doorbell when he was busy working on things, he decided that the solution to his problem was a new doorbell…an incredibly loud doorbell. His Really Loud Doorbell (RLD for short) is actually a pretty simple [...]
-
-
16:01
»
Hack a Day
We usually avoid the prospect of buying new tools just for one project. In the long run we’re sure we’d use them again, but sometimes even with that outlook you can’t afford it. Case in point is our life-long-lust for a laser cutter; we just can’t justify the upfront cost but we sure would use [...]
-
15:01
»
Hack a Day
Pick and place machines are marvels of modern technology. They the can lift, orient, align and drop tiny electronic components onto a circuit board that is headed for the reflow oven. On an industrial scale they move so fast it’s a blur in front of your eyes, and they use imaging to ensure proper placement. [...]
-
-
13:01
»
Hack a Day
Although some may have heard of a machine like this, the CNC tripod remains an unknown machine to many in the engineering word. This particular machine is set up as a plotter, drawing incredibly straight lines, shapes, and letters. The machine appears to have 6 servo motors, 3 working as pairs. This would simplify control [...]
-
-
8:01
»
Hack a Day
When [Jim's] thirty year old Pachinko machine started to freeze up and shorted out his computer’s graphics card he decided it was time to replace the old electronics with an Arduino. Originally the Pachinko machine ran off a 48 volt supply and control was achieved using about 20 relays, the random numbers were generated using [...]
-
-
15:02
»
Hack a Day
It’s neat how a project from 2004 can still be relevant if it’s done really well. This is the case with AVRcam. It uses an Atmel AVR mega8 and can do some pretty impressive things, like track up to eight objects at 30fps. The hardware and software is also open source, so it should be [...]
-
-
11:01
»
Hack a Day
While some projects we feature are meant to perform a useful function or make life easier, others such as this art installation by [Pe Lang] are far less functional, but amazing nonetheless. Taking a cue from CNC-style machines, his creation is an experiment in falling objects and the properties of water. The machine methodically moves [...]
-
-
14:01
»
Hack a Day
After the electromechanical timer on [Paul Canello's] washing machine broke for the third time he decided he needed to stop repairing it and find a more permanent fix. He decided to build his own microcontroller-based system for washing his clothes (translated). Caution: The image links on [Paul's] page seem to be broken and will unleash a never-ending [...]
-
-
7:01
»
Hack a Day
How many 555 timers does it take to add up two 10 digit numbers? [Alan's] 555 Adding Machine does it with 102 of them, he designed the machine as an extreme entry to the 555 contest and the original plan was to make it even more complicated. This machine uses the 555′s to implement a [...]
-
-
6:07
»
Hack a Day
We can’t think of a single person who doesn’t enjoy playing with a handful of rare earth magnets now and again. We know that [Dave Johnson] certainly does. As a gift to his father in law, he constructed a magnificent machine that does little more than manipulate spherical rare earth magnets with hypnotizing grace. The [...]
-
-
8:10
»
Hack a Day
Long before drum machines played samples from an SD card or EPROM, drum sounds were analog – just filtered waveforms and noise. To the modern eye, these are very primitive machines, but for [Andrew], they’re the inspiration for this brilliant hack. [Andrew] took a Roland CR-68 drum machine from 1978 and added MIDI input with the [...]
-
-
6:02
»
Hack a Day
Rube Goldberg machines are always a fan favorite around here. They truly embody the concept of over-engineering, and are an entertaining departure from what we normally cover on Hackaday. Back in February, engineering students from two on-campus professional associations at Purdue University teamed up to construct a world record-setting Rube Goldberg machine. Their entry in [...]
-
-
9:01
»
Hack a Day
Smart people don’t put their toys away, they build machines to do it for them. Case and point: this NXT project which can sort LEGO pieces. Just dump a bucket of random blocks in a hopper on one end of the machine. One slice at a time, these plastic pieces will be lifted onto a conveyor [...]
-
-
12:00
»
Hack a Day
For several years, [Jim] has wanted to construct a fully-mechanical universal Turing machine. Without the help of any electronic circuits or electrical input, his goal was to build the machine using simple hand tools and scrap materials. If you are not familiar with the concept of a Turing machine, they are devices that manipulate symbols [...]
-
7:00
»
Hack a Day
While most dice games are based on luck and chance more than anything else, [Mike] decided he wanted to create a dice game that took a little more skill to play. He built a replica of a game found in Ian Stewart’s “The Cow Maze”, a book of mathematical stories and puzzles. The theory behind [...]
-
-
5:10
»
Hack a Day
When you are running emulators or virtual machines it may be sometimes handy to be able to connect a serial port from the guest machine to the host machine. [Aurimas] had that issue, and also had a fun fix for that using 2 USB <> Serial adapters, but as you can imagine that is not [...]
-
-
11:01
»
Hack a Day
[Mok Young Bacq] works on the weekends for mobile game monitoring service. He has three cellphones that he uses for work, and although you would think this means he could work from anywhere in the world, the roaming charges are a killer. His solution was to build an incredibly intricate machine that can use three [...]
-
-
11:00
»
Hack a Day
[Mark Gibson] sent us a load of details on his build, a WWVB atomic clock using a pinball machine marquee (PDF). This is the upright portion of an old machine that used electromechanical displays instead of digital electronics. It’s big, noisy, and seeing it running might make you a bit giddy. Luckily he included video [...]
-
-
7:39
»
Hack a Day
[Ammon Allgaier] built a tool that can break apart pin headers with a high level of precision. In the video after the break he demonstrates the built-in features. They include an adjustable stop to select the number of pins you’d like in each chopped segment. There’s also a small groove in the input side which [...]
-
-
12:39
»
Hack a Day
[Kyle Kroskey] just finished his first Arduino project, adding web control to a slot machine. He started with an IGT S+ model which were extremely popular in Vegas and Atlantic City casinos for years, but are now being replaced with more modern versions. His grand idea was to modify the machine so that it can [...]
-
-
7:59
»
Hack a Day
Wow, we knew it wouldn’t be too long before we would see a fully automated home built knitting machine show up. We recently posted a hack where people were emulating the keyboard input of a commercial knitting machine, and that was pretty awesome, but we knew we would be seeing some hacked together machines soon. [...]
-
-
19:54
»
Hack a Day
Hidden behind the white face plates of this machine are racks of gears that make up a replica of one of the oldest known mechanical computers. This is a working model of the Antikythera mechanism made from Lego pieces. In the video, which you absolutely can’t miss after the break, The machine is disassembled into [...]
-
-
11:27
»
Hack a Day
[Travis Goodspeed] and Hackaday alum [Fabienne Serriere] joined forces to develop an alternative interface for a knitting machine. They’re working with the Brother KH-930E machine. We saw [Becky Stern] use the same model by manipulating data on an emulated floppy drive for the device. [Travis] and [Fabienne] went a different route, and are emulating the keypad using an Arduino [...]
-
-
12:00
»
Hack a Day
It’s finally here, the last episode of Scion’s Take on the Machine with Mitch Altman. In this episode all the teams are given a recap over their success and failures, and the clear winner is placed on top. We’re not ones to spoil the surprise so you’ll just have to click the link and watch [...]
-
-
15:00
»
Hack a Day
[Matt] was looking for a challenge. Inspired by the machine gun setups on World War I planes he wanted to make a gun that can shoot between the blades of a spinning propeller. The original guns used an interrupter gear that synchronized machine gun firing with the engine mechanically. [Matt] set out to do this using [...]
-
6:11
»
Hack a Day
[Alan] acquired a stereo microscope from eBay, and decided to save some more money by designing, machining, and assembling his own arc reactor ring light to go along. After finding an LED driver board sitting around as well as ordering some surface mount LEDs, he set about using a lathe to cut away a block [...]
-
-
10:00
»
Hack a Day
[Mike Rankin] built a small CNC machine using some PC parts. He repurposed two optical drives and a floppy drive to create the plotter seen drawing the Hackaday logo above. The X and Y axes use the stepper motor controlled read heads from two optical drives. The Z axis is built using the read head [...]
-
6:14
»
Hack a Day
[Becky Stern] shows how to take an old electronic knitting machine and interface it with a computer. After seeing the Brother KH-930E knitting machine in the video after the break it looks like the controls function quite like a CNC milling machine. Patterns can be programmed in and stored on a floppy disk. Since we [...]
-
-
15:43
»
remote-exploit & backtrack
Hi, i can easily crack my WPA password which i set to a dictionary word recently.
However i now want to change the password to password123.
I have heard john the ripper can add 123 ...etc to each individual passphrase so I would like to do that.
After catching the handshake I notice that there are 4 packets called 'KEY'
Is this the 4 way handshake?
If so how to i get the 'hash' or password information from my handshake and transfer it manually to my windows machine to experiment with. Or what do i need to copy over?
Thanks
-
5:13
»
Hack a Day
It only took 4 hackerspaces, but we finally get to see a zombie movie inspired project; hackerspace The Transistor Takes on the Machine with a Dawn/Shawn of the Dead movie theme. Race cars disguised as zombies swarm toward the players, who then use laser tag like guns to “shoot” down the approaching undead. The whole [...]
-
-
6:16
»
Hack a Day
You’ll probably lose your appetite after watching part one and part two of Artisans Asylum as they Take on the Machine. Based around the Wallace and Gromit “automated” set of contraptions, the team from Boston set out to make their own breakfast machine. Of course, with only three weeks to work it didn’t exactly turn [...]
-
-
6:39
»
Hack a Day
It’s that time again, time to take on the machine with the Hackerspace, Crash Space (and part two)! The team of Californians set out and successfully turned the front of their building into a musical instrument, similar to [David Byrne's] Playing the Building. When a pedestrian walks by they set off distance sensors, which in [...]
-
-
9:00
»
Hack a Day
Here we are with Episodes two and three (aka, NYC Resistor part one and two) completing the Take on the Machine Hackerspace challenge we mentioned a while back. For the challenge NYC Resistor took an old style slot machine and converted it into a drink mixing deviant; even making the device post a Tweet for [...]
-
-
9:00
»
Hack a Day
There was a time when a drummer would grab some sticks and lay out a groove using the items around him as instruments. [Lsa Wilson] would rather not work quite that hard and has chosen to do the same thing by tapping on an iPhone screen. As you can see in the clip after the [...]
-
-
11:00
»
Hack a Day
[Clayton Boyer] took the electricity out of the useless machine, making one that runs like a clock. To this point, we’ve always seen these useless machine use electric motors. [Clayton's] clever design uses a wind-up spring and a series of wooden gears to bring the fun, making it a great companion for the binary adder [...]
-
-
0:29
»
remote-exploit & backtrack
Hello everyone. I just got my new ALFA Networks AWUS036H.
And I'd like to use it on usb, with backtrack 4 in a virtual machine.
Can someone please tel me how can I activate'it on the virtual machine and install the drivers ?
Do I need to deactivate the bridge with the physical machine ?
Thank you very much for your help and I hope I posted in the right place. :D
-
-
13:00
»
Hack a Day
Thanks to craigslist [Chris] got his hands on a soda vending machine circa 1977. It still worked just fine (because things were still built to last back then) but he wanted to add some super-secret upgrades to the beverage dispensary. Two capacitive touch sensors were added to override the need for coins for those who [...]
-
-
11:00
»
Hack a Day
It’s no surprise that we’re wild about 3D printing, especially [Devlin]. Now we’re absolutely out of our minds for this multi-material polyjet machine that is featured in the video above. Before we go any further it’s worth mentioning that this post is not advertising, we just think this machine is unbelievable. It is capable of [...]
-
-
9:00
»
Hack a Day
Spice up your next house party with this diy foam machine. [Stephen Martin] posted his PDF plans for version 1 and version 2 of the device. It seems the deciding factor on the machine is the type of fabric screen used to create the suds from a bubble bath liquid. This is the reason he’s [...]
-
-
10:13
»
Hack a Day
The folks from NYC Resistor got their hands on a teletype machine and hacked it to monitor Twitter. This eighty-year-old beast bangs out messages that it receives at 45.45 baud. This isn’t a project that turns something into a teletype, but rather finds a different way to feed the machine data. In this case, a [...]
-
-
1:43
»
remote-exploit & backtrack
hi, im little newbie , sorry for my english , well the doubt is about i can´t install any distribution of linux in that machine, i´ll like to install it BT4 but only appears me SQUASHFS error: Major/minor mismatch , older squashfs 3.1 filesystems are unsupported , with all the options i put when i load the disc.
i send the information with a extern optical driver in usb to the machine
i´ve hearded that if i downgrade the bios i can get install ubuntu 8.10 but i want backtrack , or something like that , or gentoo, please if somebody can tells me how to i´ll appreciate it. cheers.:confused:
-
-
8:10
»
Hack a Day
Everything about this Turing machine is absolutely brilliant. A Turing machine uses a strip of material to record, calculate, and change data. [Mike Davey] built this one using servo motors, a Parallax Propeller, felt-tipped pen, and 1000 feet of film leader. The machine writes characters to the leader, reads them using a grayscale camera, and [...]
-
-
11:38
»
Hack a Day
[Ben's] father was a metalworker and the combination of being around metal fabrication for most of his life and getting a couple of art degrees brought together a satisfying combination of hacking skills. Above you can see a Graffiti Machine that he built, which we’ll look at in-depth after the break.. This isn’t the first [...]
-
-
6:25
»
Hack a Day
No, your eyes do not deceive you, you are looking at a [Bill Paxton] pinball machine. [Ben Heck], commonly known for his portable gaming system modifications has finally finished his pinball machine build. We’ve had our eye on it ever since [Jeri Ellsworth] challenged him to see who got theirs done first. As you can see, he’s [...]
-
-
11:05
»
Hack a Day
The end goal of this giant rapid prototyping machine is to print buildings. We’re not holding our breath for a brand new Flintstones-esque abode, but their whimsical suggesting of printed buildings on the moon seems like science fiction with potential. The machine operates similar to a RepRap but instead of plastic parts, it prints stone [...]
-
-
6:58
»
remote-exploit & backtrack
Hello,
I've installed BT4 on a VMware Workstation.
But for some weird reason it can't see any of my network drives, I have both Ethernet and WiFi.
I tried to play with the VMware network setting for this machine, NAT and Bridge, nothing.
Also, I installed the machine as Ubuntu, I figured since both Ubuntu and BT4 are based on Debian it should be ok.
I tried to look through the forum but was unable to find anything related threads that can fix my problem.
Any advice?
Thank you.
-
-
14:34
»
remote-exploit & backtrack
Hello All,
I have an HP machine with a Dual Boot of Vista and BT4PF. I want to upgrade to BT4F, though. I'll probably install it in a virtual machine or on a USB drive...
Anyway, I am worried about ruining my windows partition. I have read posts online about formatting from the Windows OS and then changing the boot.ini file. WELL... That is all fine and dandy, and I will do that but I wanted to check with you all here to see if there are any suggestions or words of wisdom. Maybe I should go about this differently?
Also, random question: If I were to install the BT4F version on VirtualBox, could I save files and settings (persistent?) and still shutdown... without using this "snapshot" technique?
Thanks fellas
-
-
10:35
»
Hack a Day
For most people, making coffee entails taking a couple scoops out of a can of pre-ground coffee, adding water, and pressing “Go” on the drip machine. To others coffee brewing is an artform, and want as much control over the process as possible. For those without an overflowing bank account for a home roasting machine, [...]