«
Expand/Collapse
307 items tagged "paper"
Related tags:
windows [+],
security authors [+],
asia [+],
usa [+],
misc [+],
kernel [+],
david litchfield [+],
intrusion detection [+],
detection [+],
chemistry [+],
vulnerability [+],
vulnerabilities [+],
torsson [+],
rasmus fleischer [+],
pirate bay [+],
palle [+],
oracle [+],
javascript [+],
heap [+],
hacking [+],
forensics [+],
file shearing [+],
cesar cerrudo [+],
buffer overflow [+],
Software [+],
windows kernel [+],
web application [+],
way [+],
voip [+],
vista [+],
virtualization [+],
terrorism [+],
tea [+],
stack [+],
smashing [+],
security event [+],
secure design [+],
privacy event [+],
kay hamacher [+],
julian assange [+],
joe grand [+],
intrusion [+],
innocent bystanders [+],
information [+],
hardware hacking [+],
hacker [+],
exploiting [+],
cyberterrorism [+],
cop cars [+],
cop car [+],
cop [+],
conspiracy [+],
code execution [+],
car [+],
attack [+],
arduino [+],
application [+],
alfredo ortega [+],
Hardware [+],
workstation [+],
windows security [+],
warfare [+],
vulnerability assessment [+],
virtual machines [+],
virtual machine [+],
val smith [+],
unix signal [+],
understanding [+],
trash attack [+],
trash [+],
toilet [+],
timing [+],
technology authors [+],
technical audience [+],
tags [+],
synchronization [+],
symbian [+],
swiss army knife [+],
stuxnet [+],
steve christey [+],
steping stone [+],
stealth [+],
statistical properties [+],
sql [+],
sophos [+],
sophisticated attacker [+],
sophail [+],
software authors [+],
social engineering [+],
shawn moyer [+],
setiri [+],
server [+],
security implications [+],
securing [+],
secure [+],
scrap [+],
russian [+],
russia [+],
robert [+],
reverse engineer [+],
remote [+],
processors [+],
privacy [+],
printer [+],
phpids [+],
photo camera [+],
peripherals [+],
pc tools [+],
padding [+],
oren isacson [+],
oren [+],
old dogs [+],
new [+],
network [+],
net [+],
mobile [+],
mark vincent yason [+],
mark vincent [+],
linux [+],
legal [+],
kenneth geers [+],
jose nazario [+],
jose [+],
john q. newman [+],
john q newman [+],
james d. broesch [+],
internet [+],
installing [+],
injection [+],
incremental research [+],
import functions [+],
ian amit tags [+],
i2p [+],
hacker activity [+],
geers [+],
future [+],
forensic [+],
feng shui [+],
exposing [+],
exploitation [+],
engineer [+],
end result [+],
election systems [+],
dtrace [+],
digital cameras [+],
digital [+],
david weston tiller [+],
david weston [+],
david thiel [+],
cyber [+],
cryptographic hardware [+],
cryptographic devices [+],
computer threats [+],
computer [+],
cisco event [+],
chris wysopal [+],
bypassing [+],
brief summary [+],
billy rios [+],
billy hoffman [+],
barnum [+],
barnaby jack tags [+],
audio [+],
attacking [+],
arkin tags [+],
antivirus products [+],
analysis [+],
amit [+],
alexander sotirov [+],
advanced [+],
abu dhabi [+],
Wireless [+],
BackTrack [+],
authors [+],
zero [+],
zane lackey [+],
yuriy bulygin [+],
xss [+],
x event [+],
wsis [+],
wpa [+],
worth [+],
world authors [+],
workshop [+],
work [+],
wolfgang draxinger [+],
wiring connections [+],
wireless sniffer [+],
wireless event [+],
winter doldrums [+],
william finucane [+],
web worm [+],
web servers [+],
web scanner [+],
web graph [+],
web developers [+],
warfield [+],
walt haroon [+],
walking robot [+],
volts [+],
voltage dividers [+],
volatools [+],
volatile memory [+],
vlad [+],
virus authors [+],
virus [+],
virtual [+],
viral threats [+],
vipin kumar [+],
vinyl records [+],
vinyl [+],
video [+],
victor pereira [+],
vector [+],
variations [+],
variants [+],
van der walt [+],
valentin [+],
vacuum chamber [+],
uri use [+],
uri event [+],
unshredding [+],
unpacking [+],
unforgivable [+],
ulation [+],
type conversion [+],
type [+],
tyler [+],
tsyrklevich [+],
trusted [+],
tricks [+],
translation [+],
tracking tools [+],
toy [+],
touchpad [+],
tor network [+],
tor event [+],
tor [+],
token [+],
toilet paper roll [+],
toilet paper [+],
time authors [+],
thorsten holz [+],
thomas akin [+],
thermal label printer [+],
testing [+],
teredo [+],
technology of the future [+],
technology [+],
technique [+],
technical underpinnings [+],
tactical [+],
system [+],
swiss [+],
sucks [+],
string parameter [+],
string [+],
stopping [+],
still image [+],
stiff paper [+],
steve riley tags [+],
steve riley [+],
steve dunker [+],
stephen patton tags [+],
stender [+],
stefano zanero [+],
stefan frei [+],
stealth secrets [+],
static detection [+],
static analysis [+],
static [+],
standing on the shoulders [+],
stack overflows [+],
spinning top [+],
spider [+],
spectrophotometer [+],
specialist service provider [+],
spam [+],
space shuttle discovery [+],
south america [+],
sound samples [+],
something [+],
solar cell fabrication [+],
solar [+],
sohail ahmad [+],
software scene [+],
software architects [+],
social networks [+],
social [+],
smtp [+],
smoke [+],
sketchtools [+],
sivan toledo [+],
simple solutions [+],
simple [+],
similarity [+],
silver inks [+],
shulman [+],
shredder [+],
shredded paper [+],
shoot [+],
shoestring budget [+],
shelf solutions [+],
shatter proofing [+],
shah tags [+],
seth hardy [+],
server database [+],
security vulnerabilities [+],
security network [+],
security methodology [+],
security audit [+],
securing wireless networks [+],
secret paths [+],
second life [+],
second [+],
search [+],
sean barnum [+],
sctpscan [+],
scrap materials [+],
scott stender [+],
scientific instrument [+],
scenes [+],
saumil shah [+],
satellite navigation [+],
sassaman [+],
sap [+],
routers [+],
rootkits [+],
rootkit [+],
room 101 [+],
room [+],
role [+],
rohit dhamankar [+],
rohit [+],
roel [+],
robot [+],
robert guerra [+],
robert graham tags [+],
robert clark tags [+],
robert a. martin sean barnum [+],
robert a martin [+],
rob king [+],
rob carter tags [+],
rob carter [+],
rob [+],
ring 0 [+],
ring [+],
richard johnson tags [+],
richard johnson [+],
richard george tags [+],
rf based [+],
rewrite [+],
revolutionizing [+],
review [+],
reverse engineering [+],
revenge [+],
remote exploit [+],
receipt printers [+],
receipt printer [+],
receipt [+],
rds tmc [+],
ralf bendrath [+],
ralf [+],
raghav [+],
quynh [+],
quist [+],
pyemu [+],
psychology [+],
pseudorandom [+],
prototyping [+],
protocol [+],
project alternatives [+],
program semantics [+],
problems [+],
private entries [+],
private [+],
printing process [+],
printable [+],
previous design [+],
preview [+],
pretty pictures [+],
preparing [+],
premature [+],
practical [+],
poster board [+],
portnoy [+],
poor efficiency [+],
pointer [+],
poc [+],
player [+],
platform preview [+],
platform [+],
pisa [+],
pirates [+],
pierce tags [+],
piece of paper [+],
picture [+],
physical security [+],
physical interfaces [+],
phone [+],
philippe langlois [+],
philip hayton [+],
petroni [+],
petkov [+],
peter silberman [+],
person [+],
perl hacker [+],
perl [+],
pedram amini [+],
peap [+],
pdf [+],
paul vincent sabanal [+],
paul vincent [+],
paul knight [+],
patton [+],
patrick miller [+],
patch [+],
parts [+],
papercraft [+],
paper software [+],
paper medium [+],
paper feeder [+],
paper dolls [+],
paper craft [+],
paper airplane [+],
papathanasiou [+],
overflows [+],
overflow [+],
other [+],
ortega [+],
oracle sql [+],
oracle case [+],
operating [+],
openid [+],
openbsd [+],
ollie whitehouse [+],
number generation [+],
nuclear warheads [+],
nitin kumar vipin kumar tags [+],
nicolas falliere [+],
nick harbour [+],
nick breese [+],
nicholas j. percoco [+],
nguyen anh [+],
network sniffer [+],
network security [+],
network intrusion detection system [+],
network intrusion detection [+],
network drivers [+],
neil daswani [+],
neal krawetz [+],
nathan mcfeters [+],
nac [+],
musical [+],
music event [+],
munich [+],
multi purpose [+],
ms sql server [+],
moser [+],
mora tags [+],
moore tags [+],
monster project [+],
monster [+],
mobile phone [+],
miras [+],
mining [+],
mind [+],
mike shaver [+],
mike perry tags [+],
mike perry [+],
migration [+],
microscope [+],
michael thumann [+],
michael h. warfield [+],
metasploit framework [+],
metasploit [+],
messenger [+],
memory [+],
mccoy [+],
max moser [+],
matthew weeks [+],
matthew lewis tags [+],
matthew lewis [+],
matt cottam [+],
mass web [+],
mass [+],
martin vuagnoux [+],
martin herfurt [+],
markus beckedahl [+],
mario lukas [+],
mariano nunez [+],
mariano graziano [+],
marco slaviero [+],
marco bonetti [+],
marcel holtmann [+],
management event [+],
man [+],
malicious [+],
make [+],
mail [+],
magnetic ink [+],
magnet [+],
magic marker [+],
machine [+],
mac os x [+],
mac os [+],
luis miras [+],
lotus domino [+],
lotus [+],
lost in translation [+],
logic [+],
logging mechanisms [+],
local [+],
little [+],
litmus paper [+],
litmus [+],
lindner [+],
life [+],
liam o murchu [+],
lessard [+],
leopard [+],
len sassaman [+],
legal aspects [+],
ldap [+],
laws related [+],
laurent oudot [+],
laurent butti [+],
latin america [+],
lastest [+],
lasers [+],
laser cutter [+],
laser [+],
lackey [+],
l. patterson [+],
krishna [+],
kostya kortchinsky [+],
kidnapping [+],
kicking [+],
kernel level [+],
kendall [+],
keith jones rohyt [+],
justin ferguson tags [+],
justin ferguson [+],
julian grizzard [+],
jonathan lindsay [+],
jonathan afek [+],
jonathan [+],
jon oberheide [+],
jon mccoy [+],
johnny long [+],
john viega [+],
john terrill tags [+],
john terrill [+],
john perry barlow [+],
john heasman [+],
joel eriksson [+],
joe stewart tags [+],
joe stewart [+],
jim hoagland [+],
jeremiah grossman [+],
jeremiah [+],
jennifer granick [+],
jeff morin [+],
jeff lessard [+],
java virtual machine [+],
java [+],
jared demott [+],
jamie schwettmann [+],
jaco van [+],
itzhak avraham tags [+],
itzhak [+],
isabel drost [+],
iron chef [+],
iron [+],
iris [+],
ipv [+],
ipsec [+],
iphone [+],
investigation process [+],
invasion [+],
intrusion detection system [+],
introduction [+],
intranet [+],
internet worms [+],
internet visionaries [+],
internet authors [+],
intelligent search engines [+],
insider [+],
insecure [+],
ink [+],
injecting [+],
information attacks [+],
information assurance [+],
iis [+],
identity [+],
identification [+],
icmp [+],
hypervisor [+],
http [+],
html [+],
how to [+],
hostile networks [+],
honeypot [+],
historical [+],
himanshu dwivedi [+],
high school chemistry [+],
hide [+],
heffner [+],
hashing algorithms [+],
hash [+],
haroon [+],
handheld device [+],
handbook authors [+],
hackproofing [+],
hack [+],
h.d. moore val [+],
h 323 [+],
gyroscope [+],
gunter ollmann [+],
guide [+],
gsm [+],
grossman [+],
greg conti [+],
greetz [+],
green [+],
graziano [+],
graphing calculator [+],
graph paper [+],
graph [+],
graan [+],
google [+],
gif player [+],
gif [+],
germany [+],
german technology [+],
george whitesides [+],
generation [+],
gears [+],
gary c. kessler [+],
gary c kessler [+],
fuzzing [+],
future of internet [+],
fundamentals [+],
fundamental techniques [+],
full disclosure [+],
free [+],
freak out [+],
frank breedijk [+],
foss desktop [+],
foss [+],
forgery [+],
foam core [+],
foam board [+],
foam [+],
firmware [+],
finucane [+],
fingerprinting [+],
finding [+],
field [+],
feng xue [+],
felix [+],
feinstein [+],
fault tolerance techniques [+],
false identity [+],
fabrication practices [+],
ezequiel [+],
extrusion [+],
exploting [+],
exploits [+],
exploitation techniques [+],
exploit [+],
explicit [+],
examination [+],
evolutionary approach [+],
evolution [+],
evident seals [+],
evasion [+],
eugene [+],
esteban martnez [+],
eric michaud [+],
eric filiol [+],
eric chien [+],
entropy [+],
engineering [+],
enemies [+],
enclosure [+],
emulator [+],
emphasis [+],
emergent [+],
ellsworth [+],
electrostatic charge [+],
electronic sensor [+],
effective [+],
dynamic technique [+],
dynamic routing [+],
dynamic [+],
dunker [+],
dual mode [+],
droid [+],
drew miller [+],
draw [+],
dr. west [+],
dr west [+],
dozen [+],
dondi west [+],
domino event [+],
domino [+],
dollar man [+],
dns [+],
ditch [+],
discrete logic [+],
discontents [+],
direction [+],
di croce [+],
denial [+],
defense mechanisms [+],
debugging [+],
debug [+],
de barros [+],
day [+],
david hulton [+],
david coffey [+],
david byrne tags [+],
david byrne [+],
david blight [+],
databases [+],
database web [+],
database sql [+],
database engines [+],
database [+],
data transmission [+],
data mining [+],
danny quist [+],
daniel peck [+],
dangling pointer [+],
dangling [+],
dangerous waters [+],
danger [+],
damian saura tags [+],
d. gutesman [+],
d moore [+],
cyberspace [+],
cyber warfare [+],
cyber storm [+],
cyber crime [+],
custom [+],
crypt [+],
cross [+],
crime war [+],
crime [+],
craig heffner [+],
craig [+],
craft [+],
crackstation [+],
covert channel [+],
covert [+],
court [+],
course authors [+],
countering [+],
cottam [+],
corrugated cardboard [+],
conversion errors [+],
conversion [+],
continuous rolls [+],
continuous feed [+],
contests [+],
connection string [+],
connection [+],
computing [+],
computer security [+],
computer network defense [+],
computational theory [+],
compromising [+],
communication protocol [+],
cloud [+],
client side [+],
claw [+],
classification [+],
classic [+],
cisco router [+],
cisco ios [+],
circumvention [+],
chuck willis tags [+],
chuck willis [+],
christian papathanasiou [+],
christian grothoff [+],
chris eng [+],
chemistry experiments [+],
chef [+],
charlie miller [+],
challenging [+],
chad [+],
cell phone [+],
cell [+],
catarina mota [+],
cash and prizes [+],
call [+],
caffeinemonkey [+],
cabbage [+],
butti [+],
building [+],
buffer overflow vulnerabilities [+],
buffer [+],
bsd [+],
bryan sullivan [+],
bruno luiz tags [+],
bruce schneier [+],
browser [+],
brother [+],
brett moore [+],
botnets [+],
botnet [+],
board [+],
bluetooth [+],
blind [+],
biometric [+],
biologger [+],
bing tags [+],
bernard tellenbach [+],
ben feinstein [+],
belani [+],
beginner kits [+],
bed [+],
becoming [+],
backbones [+],
automatically [+],
autodaf [+],
authentication [+],
attacker [+],
attack patterns [+],
astounding [+],
assessment techniques [+],
assessment data [+],
assessment [+],
aspects [+],
aslr [+],
art [+],
architecture [+],
application asp [+],
aphrodite [+],
anti virus [+],
anti [+],
anonymous authentication [+],
anonymous [+],
anonymity [+],
anomaly based [+],
android [+],
andrew walenstein [+],
andrew lindell [+],
andrew daviel [+],
andrea cugliari [+],
andrea barisani [+],
anatomy [+],
analyzing [+],
amit klein [+],
alonso jose palazon [+],
alonso jos [+],
alonso [+],
ajax ulation [+],
ahmad tags [+],
afek [+],
adversarial environment [+],
advanced oracle [+],
adequacy [+],
adam laurie marcel holtmann [+],
adam laurie [+],
access points [+],
access [+],
accelerometers [+],
abuse [+],
abstract time [+],
abstract overview [+],
aaron walters nick petroni [+],
aaron portnoy [+],
aaron newman [+],
NON [+],
ARM [+],
hacks [+],
europe [+],
hat europe [+],
chaos communication congress [+],
malware [+],
black hat [+],
security [+],
web [+],
zfs,
yutaka,
xen,
wireless access points,
winning the race,
webappsec,
weaning,
virtual switchboard,
vidas,
verified,
upnp,
upgrade,
txt,
tuples,
travis goodspeed,
travis,
transfer,
trace,
tony flick tags,
toner transfer paper,
toner,
tin foil,
tim vidas,
threats,
technical details,
tcp,
storage pools,
steven j. murdoch ross anderson tags,
start ups,
squire,
solaris kernel,
sniff,
smart,
slow,
similarity analysis,
signatures,
side channel,
session cookies,
sequence prediction,
security threats,
security tags,
secret handshake,
secret,
scissors,
satellite event,
satellite environment,
satellite,
satan,
saito,
sai emrys tags,
runtime environments,
router,
ross anderson,
roger dingledine,
ristic,
ricky lawshae,
ricky,
rfis,
rafal wojtczuk,
race,
pwned,
protecting,
prosecution,
processor,
privacy office,
picking,
penetration tests,
paul royal,
paper shredder,
paper printing,
paper documents,
ofer shezaf,
ofer,
nice,
next generation,
new language,
neutrality,
net neutrality,
nathan hamiel,
mysql,
murdoch,
mobitex,
minds,
mike kershaw,
microcontroller,
michael brooks,
metaphish,
memory resident,
memory protection,
memory analysis,
medicine,
mechanical energy,
matthew sager,
matrix,
mastercard securecode,
martin mocko,
mark ryan del moral,
mark ryan,
mark dowd,
mario ceballos,
logarithm,
lockpicking,
list,
lineberry,
line leakage,
leonardo nve,
lawyers,
language creation,
language,
keystrokes,
kevin mahaffey,
kerb,
karmetasploit,
joseph menn,
jonathan squire,
john hering,
john benson,
john,
ivan ristic,
itunes for windows,
internet via satellite,
intelligent,
intelligence data,
input devices,
input,
initial installation,
ida pro,
how to impress girls,
hash functions,
hand,
goodspeed,
goatee beard,
fox in the hen house,
fox,
forensic tools,
flick,
fingerpinting,
file,
fatal system error,
extortion racket,
environment,
email,
electronic locks,
electronic discovery,
don bailey,
dingledine,
david weston tags,
david kerb,
david aslanian,
daniel raygoza,
dangerous minds,
cybercrime,
crossdomain,
corn starch,
consumer devices,
conlanging,
collaborative,
colin ames,
code,
christian kendi,
chris gates,
chris eagle,
ceballos,
business impact analysis,
bittorrent,
bit,
bill blunden,
bare metal,
bare,
avr microcontroller,
aslanian,
anthony lineberry,
alternative medicine,
alternative,
Programming,
Pentesting
-
-
20:41
»
Packet Storm Security Recent Files
By design, antivirus products introduce a vast attack surface to a hostile environment. The vendors of these products have a responsibility to uphold the highest secure development standards possible to minimize the potential for harm caused by their software. This second paper in a series on Sophos internals applies the results previously presented to assess the increased threat Sophos customers face. This paper is intended for a technical audience, and describes the process a sophisticated attacker would take when targeting Sophos users.
-
20:41
»
Packet Storm Security Misc. Files
By design, antivirus products introduce a vast attack surface to a hostile environment. The vendors of these products have a responsibility to uphold the highest secure development standards possible to minimize the potential for harm caused by their software. This second paper in a series on Sophos internals applies the results previously presented to assess the increased threat Sophos customers face. This paper is intended for a technical audience, and describes the process a sophisticated attacker would take when targeting Sophos users.
-
20:01
»
Packet Storm Security Recent Files
This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. The bulk of the information in this paper was based on data gathered from online forums and services used by Russian cybercriminals. The authors also relied on articles written by hackers on their activities, the computer threats they create, and the kind of information they post on forums’ shopping sites.
-
20:01
»
Packet Storm Security Misc. Files
This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. The bulk of the information in this paper was based on data gathered from online forums and services used by Russian cybercriminals. The authors also relied on articles written by hackers on their activities, the computer threats they create, and the kind of information they post on forums’ shopping sites.
-
-
14:01
»
Hack a Day
The Dyskograf lets you make music with a magic marker. The musical installation looks much like a turntable for playing vinyl records. But instead of a spiraling groove containing the sounds, this uses marks on a paper disk to play sound samples. You can see the light outline of several tracks on the paper [...]
-
-
12:43
»
SecDocs
Authors:
Matthew Weeks Tags:
vulnerability Event:
Black Hat DC 2011 Abstract: In hostile networks, most people hope their con kung-fu is good enough to avoid getting owned. But for everyone who has ever wanted to reverse the attack, not getting owned is not enough. We will see how it is often possible for the intended victim to not only confuse and frustrate the attacker, but actually trade places and own the attacker. This talk will detail vulnerabilities in security tools, how these vulnerabilities were discovered, factors increasing the number of vulnerable systems, how the exploits work, creating cross-platform payloads, and how to defend yourself whether attacking or counterattacking. The audience will be invited to participate as complete exploit code will be released and demonstrated against the Metasploit Framework itself.
-
-
21:55
»
SecDocs
Authors:
Matthieu Suiche Tags:
cloud computing Event:
Black Hat DC 2011 Abstract: LiveCloudKd makes possible to debug live Microsoft Hyper-V and VMWare Workstation virtual machines without having to enable the debug mode. With read+write access on the memory.
-
12:54
»
SecDocs
Authors:
Eric Michaud Jamie Schwettmann Tags:
hardware hacking Event:
Black Hat DC 2011 Abstract: We will present the common elements and basic mechanisms of modern tamper-evident seals, tags, and labels, with emphasis on attack and circumvention. Adhesive seals, crimp seals, wire wraps, fiber optic seals, electronic, chemical, biological, and make-shift seals will be dissected, examined, and explained, with emphasis on their shortcomings and circumvention techniques. We will also present an overview of typical applications for tags, seals, and labels, including covert traps and uses ranging from consumer goods to loss reduction to government secrets.
-
-
21:51
»
SecDocs
Authors:
Thorsten Holz Tags:
honeypot Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Current Honeypot-based tools have a huge disadvantage: Attackers can detect honeypots with simple techniques and are to some extent also able to circumvent and disable the logging mechanisms. On the basis of some examples, we will show methods for attackers to play with honeypots. Honeypots / Honeynets are one of the more recent toys in the white-hat arsenal. These tools are usually assumed to be hard to detect and attempts to detect or disable them can be unconditionally monitored. The talk sheds some light on how attackers usually behave when they want to defeat honeypots. We will encompass the process of identifying and circumventing current honeypot technology and demonstrate several ways to achieve this. The focus will be on Sebek-based honeypots, but we will also show some ways how to accomplish similar results on different honeypot-architectures. Upon completion of this lecture, the attendees will have some insight in the limitations of current honeypot technology. Individuals or organization that would like to setup or harden their own lines of deception-based defense with the help of honeypots will see some constraints on the reliability and stealthiness of honeypots. On the other side, people with more offensive mindsets will get several ideas on how to identify and exploit honeypots.
-
-
21:28
»
SecDocs
Authors:
Joi Ito Tags:
social Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Since I started my first web site 10 years ago, we've moved from a vision of cyber-utopia to the lust of the bubble, to bust and back to a cautious optimism. Two years after writing my somewhat optimistic paper on Emergent Democracy we've seen blogs challenge the mass media, Wikipedia challenge the authority of encyclopedias and an American election heavily influenced by the Internet. I will speak about the impact that blogging and other social software is having on politics and free speech, and will discuss the US elections in this context. At the dawn of the Internet, visionaries such as John Perry Barlow wrote about cyberspace challenging the sovereignty of the nation-state. We envisioned a kind of cyber-utopia which, to begin with, we thought we were making real. In a mad rush people flowed into the Internet, but the money they brought with them corrupted its open and collaborative nature. After the bubble burst, the money left and many people revisted the open, peer-to-peer nature of the Internet. (Indeed, some had never left.) Many of the original dreams of the Internet were naïve, but with the benefit of hindsight, the maturing of open standards and the increased penetration of the Internet, a new generation of social software such as wikis and blogs are creating the conversations and dialog that we had hoped for 10 years ago. On the other hand, as the Internet becomes an increasingly critical part of the economy, governments feel that they must become involved in its governance in order to protect the public interest. The age of mass media has crushed diversity and created a shallow culture. In particular, the focus of politics has been on voting, not deliberation or debate. As the Internet begins to provide people with a way to reach a wider community, it becomes increasingly clear that having a voice is more important than having a vote. People tend to over-estimate the short-term potential of new technologies and under-estimate the long-term potential. I will argue that although we are at risk of the Internet turning into yet another regulated channel, we have the ability to both prevent that and reverse the damage on culture and politics caused by monopolistic media.
-
-
9:41
»
SecDocs
Authors:
Josef Spillner Tags:
Linux Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Overview about the young and still developing Free Software scene in South and Latin America (mostly Brazil), ways to achieve independence of existing structures, and some specific projects. While in Germany people still talk about the ongoing partial migration in Munich, which is mostly in the hands of only few companies, other places have advanced some more already: where interested citizens are part of IT migrations in both companies and organizations. Not only is this a cultural difference, but also gives all hackers the possibility to block decisions heading the wrong way, and to integrate their own perspective.
-
-
10:01
»
Hack a Day
It would have been very hard to believe this is made from paper if we hadn’t seen all the parts being built. As a still image it looks neat, but the speed at which those paper gears turn in the video after the break will certainly leave you slack-jawed. It really is a walking robot [...]
-
-
9:20
»
SecDocs
-
-
10:30
»
SecDocs
Authors:
Martin Vuagnoux Tags:
fuzzing Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Automated vulnerability searching tools have led to a dramatic increase of the rate at which such flaws are discovered. One particular searching technique is fault injection – i.e. insertion of random data into input files, buffers or protocol packets, combined with a systematic monitoring of memory violations. Even if these tools allow to uncover a lot of vulnerabilities, they are still very primitive; despite their poor efficiency, they are useful because of the very high density of such vulnerabilities in modern software. This paper presents an innovative buffer overflow uncovering technique, which uses a more thorough and reliable approach. This technique, called "fuzzing by weighting attacks with markers", is a specialized kind of fault injection, which does not need source code or special compilation for the monitored program. As a proof of concept of the efficiency of this technique, a tool called Autodafé has been developed. It allows to detect automatically an impressive number of buffer overflow vulnerabilities.
-
-
21:38
»
SecDocs
Authors:
Isabel Drost Tags:
search engine Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: The presentation will give a short overview of the architecture of search engines and how machine learning can help improving search engines. In addition some projects you can take part in will be briefly introduced. Developers of search engines today do not only face technical problems such as designing an efficient crawler or distributing search requests among servers. Search has become a problem of identifying reliable information in an adversarial environment. Since the web is used for purposes as diverse as trade, communication, and advertisement search engines need to be able to distinguish different types of web pages. In this paper we describe some common properties of the WWW and social networks. We show one possibility of exploiting these properties for classifying web pages.
-
-
21:38
»
SecDocs
Authors:
Palle Torsson Rasmus Fleischer Tags:
law Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: We will have a paper ready until the first of December around the Nordic pirate projects and file shearing scene and its current development. Will we will describe the work of Piratbyran, The Pirate Bay, Piratgruppen and Artliberated. This will be done under the title The Grey Commons where we describe the special approach of temporal constructions that has been developing as a way to uphold the possibility of redistribution. The main issues and themes are talked about in the interview attached with Palle Torsson that will be published in the next issue of Mute. We will use this text as a base for our paper.
-
13:12
»
SecDocs
Authors:
Palle Torsson Rasmus Fleischer Tags:
law Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: We will have a paper ready until the first of December around the Nordic pirate projects and file shearing scene and its current development. Will we will describe the work of Piratbyran, The Pirate Bay, Piratgruppen and Artliberated. This will be done under the title The Grey Commons where we describe the special approach of temporal constructions that has been developing as a way to uphold the possibility of redistribution. The main issues and themes are talked about in the interview attached with Palle Torsson that will be published in the next issue of Mute. We will use this text as a base for our paper.
-
13:12
»
SecDocs
Authors:
Palle Torsson Rasmus Fleischer Tags:
law Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: We will have a paper ready until the first of December around the Nordic pirate projects and file shearing scene and its current development. Will we will describe the work of Piratbyran, The Pirate Bay, Piratgruppen and Artliberated. This will be done under the title The Grey Commons where we describe the special approach of temporal constructions that has been developing as a way to uphold the possibility of redistribution. The main issues and themes are talked about in the interview attached with Palle Torsson that will be published in the next issue of Mute. We will use this text as a base for our paper.
-
13:12
»
SecDocs
Authors:
Palle Torsson Rasmus Fleischer Tags:
law Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: We will have a paper ready until the first of December around the Nordic pirate projects and file shearing scene and its current development. Will we will describe the work of Piratbyran, The Pirate Bay, Piratgruppen and Artliberated. This will be done under the title The Grey Commons where we describe the special approach of temporal constructions that has been developing as a way to uphold the possibility of redistribution. The main issues and themes are talked about in the interview attached with Palle Torsson that will be published in the next issue of Mute. We will use this text as a base for our paper.
-
-
11:01
»
Hack a Day
Here [Catarina Mota] is showing off a ring of magnetic ink printed on a piece of paper. It’s strong enough to hold a disc magnet in place when the paper is raised vertically. This strength comes from mixing your own batch of ink. Magnetic ink has been around a long time and is most often [...]
-
-
11:01
»
Hack a Day
You can get your hands on a Brother thermal label printer for $65-75. But if you don’t want to buy the Brother branded continuous feed paper for it you’re out of luck. Unless you pull off this hack which lets you use any thermal paper you want with a Brother QL-500 printer. The printer is [...]
-
-
7:12
»
Packet Storm Security Recent Files
This paper demonstrates how to exploit the encrypted key import functions of a variety of different cryptographic devices to reveal the imported key. The attacks are padding oracle attacks, where error messages resulting from incorrectly padded plaintexts are used as a side channel. This is the paper that made headlines regarding RSA tokens being cracked in 13 minutes.
-
7:12
»
Packet Storm Security Misc. Files
This paper demonstrates how to exploit the encrypted key import functions of a variety of different cryptographic devices to reveal the imported key. The attacks are padding oracle attacks, where error messages resulting from incorrectly padded plaintexts are used as a side channel. This is the paper that made headlines regarding RSA tokens being cracked in 13 minutes.
-
-
17:14
»
Packet Storm Security Misc. Files
The purpose of this paper is to make the reader aware of various Hash Cracking Techniques ranging from Basic to Advanced. The intended audience for this paper is those who have a basic understanding of hash cracking and password hashing algorithms.
-
-
13:01
»
Hack a Day
[William Finucane] is making his own litmus paper by harnessing the power of cabbage. The process is much easier than the faux gunpowder he made, as it take just the one ingredient and a few kitchen tools. In case you’ve forgotten your High School chemistry, Litmus is a set of dyes that change color when [...]
-
-
21:41
»
SecDocs
Authors:
Wolfgang Draxinger Tags:
Linux Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: Time to take a look back and under the hood of the current state of FOSS based desktops: The Good, The Bad and The Ugly – Bloat, strange APIs, too much complexity. The first decade of the 21st century brought huge progress in the development of FOSS Desktop systems. Users can now choose from a broad range of environments, which all adhere to a coherent set of standards. Not to forget that FOSS did even pioneer some GUI technologies which were later adopted by other (read: non free) systems.
-
-
21:44
»
SecDocs
Authors:
Kay Hamacher Tags:
privacy Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: In his now (in)famous pamphlet "Conspiracy as Governance" Julian Assange (JA) argues about the need for leaking as an efficient way to destroy "unjust" groups as the neo-feudalistic ones - luring the conspiracy theory leaning hacker community into his belief system. Eventually, JA used a biologistic argument on the benefits and drawbacks that uncontrolled leaking might pose for "just" and "unjust" systems, arriving at the conclusion that "unjust" systems are hurt more and thus will be less viable, essentially being destroyed by more "just" systems. While an innovative proposal, the underlying assumptions on complexity, network theory, and especially the evolutionary perspectives were never critically assessed. Some blogs and media raised questions on details and potential threats to innocent bystanders. Still, fundamental problems with the philosophy were never addressed. This paper argues against the general validity of such theories. In particular, we will refute some of the biologistic arguments. Theoretical biology has long ago pointed out the hidden complexity in evolutionary processes and as such the envisioned "leaking revolution" might be a limited artifact: there might even arise situations where the leaking envisioned and encouraged by Wikileaks and the like can actually strengthen some "conspiracies". In this paper I will describe some research questions, that should be answered before given the “leaking philosophy” an unconditioned “thumbs-up”. Empirically, for example, a potential strengthening is illustrated by the rise of a 'neo-feudalistic economy', which is linked closely to the paradigm of "intellectual property" as it is to the security-financial-political complex. The players have effectively created a closed network or a "conspiracy" and might be resilient towards Wikileaks-like attacks. The paper concludes with an alternative to that proposal; in particular, a way to deal with the 'conspiracy' that might be coined the rise of the neo-feudalistic society (which in itself is a self-sustainable, self-amplifying feedback loop, not necessarily a conscious conspiracy).
-
21:44
»
SecDocs
Authors:
Kay Hamacher Tags:
privacy Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: In his now (in)famous pamphlet "Conspiracy as Governance" Julian Assange (JA) argues about the need for leaking as an efficient way to destroy "unjust" groups as the neo-feudalistic ones - luring the conspiracy theory leaning hacker community into his belief system. Eventually, JA used a biologistic argument on the benefits and drawbacks that uncontrolled leaking might pose for "just" and "unjust" systems, arriving at the conclusion that "unjust" systems are hurt more and thus will be less viable, essentially being destroyed by more "just" systems. While an innovative proposal, the underlying assumptions on complexity, network theory, and especially the evolutionary perspectives were never critically assessed. Some blogs and media raised questions on details and potential threats to innocent bystanders. Still, fundamental problems with the philosophy were never addressed. This paper argues against the general validity of such theories. In particular, we will refute some of the biologistic arguments. Theoretical biology has long ago pointed out the hidden complexity in evolutionary processes and as such the envisioned "leaking revolution" might be a limited artifact: there might even arise situations where the leaking envisioned and encouraged by Wikileaks and the like can actually strengthen some "conspiracies". In this paper I will describe some research questions, that should be answered before given the “leaking philosophy” an unconditioned “thumbs-up”. Empirically, for example, a potential strengthening is illustrated by the rise of a 'neo-feudalistic economy', which is linked closely to the paradigm of "intellectual property" as it is to the security-financial-political complex. The players have effectively created a closed network or a "conspiracy" and might be resilient towards Wikileaks-like attacks. The paper concludes with an alternative to that proposal; in particular, a way to deal with the 'conspiracy' that might be coined the rise of the neo-feudalistic society (which in itself is a self-sustainable, self-amplifying feedback loop, not necessarily a conscious conspiracy).
-
15:18
»
SecDocs
Authors:
Kay Hamacher Tags:
privacy Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: In his now (in)famous pamphlet "Conspiracy as Governance" Julian Assange (JA) argues about the need for leaking as an efficient way to destroy "unjust" groups as the neo-feudalistic ones - luring the conspiracy theory leaning hacker community into his belief system. Eventually, JA used a biologistic argument on the benefits and drawbacks that uncontrolled leaking might pose for "just" and "unjust" systems, arriving at the conclusion that "unjust" systems are hurt more and thus will be less viable, essentially being destroyed by more "just" systems. While an innovative proposal, the underlying assumptions on complexity, network theory, and especially the evolutionary perspectives were never critically assessed. Some blogs and media raised questions on details and potential threats to innocent bystanders. Still, fundamental problems with the philosophy were never addressed. This paper argues against the general validity of such theories. In particular, we will refute some of the biologistic arguments. Theoretical biology has long ago pointed out the hidden complexity in evolutionary processes and as such the envisioned "leaking revolution" might be a limited artifact: there might even arise situations where the leaking envisioned and encouraged by Wikileaks and the like can actually strengthen some "conspiracies". In this paper I will describe some research questions, that should be answered before given the “leaking philosophy” an unconditioned “thumbs-up”. Empirically, for example, a potential strengthening is illustrated by the rise of a 'neo-feudalistic economy', which is linked closely to the paradigm of "intellectual property" as it is to the security-financial-political complex. The players have effectively created a closed network or a "conspiracy" and might be resilient towards Wikileaks-like attacks. The paper concludes with an alternative to that proposal; in particular, a way to deal with the 'conspiracy' that might be coined the rise of the neo-feudalistic society (which in itself is a self-sustainable, self-amplifying feedback loop, not necessarily a conscious conspiracy).
-
-
21:33
»
SecDocs
-
-
21:46
»
SecDocs
-
-
21:40
»
SecDocs
-
21:40
»
SecDocs
-
-
21:49
»
SecDocs
-
-
21:44
»
SecDocs
-
21:44
»
SecDocs
-
-
21:49
»
SecDocs
-
-
21:41
»
SecDocs
-
21:41
»
SecDocs
-
-
21:51
»
SecDocs
-
21:51
»
SecDocs
-
6:41
»
SecDocs
-
-
21:52
»
SecDocs
-
21:52
»
SecDocs
-
21:52
»
SecDocs
-
13:43
»
SecDocs
-
-
21:49
»
SecDocs
-
21:49
»
SecDocs
-
21:49
»
SecDocs
-
13:49
»
SecDocs
-
13:41
»
SecDocs
-
12:56
»
SecDocs
-
-
21:50
»
SecDocs
-
21:50
»
SecDocs
-
21:50
»
SecDocs
-
12:23
»
SecDocs
-
12:20
»
SecDocs
-
12:12
»
SecDocs
-
-
21:45
»
SecDocs
-
-
21:58
»
SecDocs
-
-
21:49
»
SecDocs
-
-
21:31
»
SecDocs
-
-
21:49
»
SecDocs
-
-
15:27
»
Hack a Day
[Roel] had read that people won the DARPA shredder challenge, but that their technology was kept a secret, interested in this concept he also remembered an episode of the X-Files where they had reconstructed shredded paper using a computer system. Unlike most computer based TV show BS this did not seem to be too far [...]
-
8:30
»
Hack a Day
Who needs chemistry when a little bit of physics will do? Instead of brewing up a batch of weak adhesive to make his own post-it notes, [Valentin] built this handheld device to add an electrostatic charge to bits of paper. Just give them a couple of seconds to charge and they’ll stick to the wall [...]
-
10:03
»
Hack a Day
Here’s a photovoltaic cell that can be printed onto paper. The manufacturing technique is almost as simple as using an inkjet printer. The secret is in the ink itself. It takes five layers deposited on the paper in a vacuum chamber. But that’s a heck of a lot easier than current solar cell fabrication practices. [...]
-
-
10:01
»
Hack a Day
Ditch that fancy wide-format LCD monitor and go back to the days when animation was made up of moving frames played back by a specialized device. [Pieterjan Grandry] built this gif player which does just that. The frames of the animation are printed on a paper disk. When spun and viewed through a looking hole [...]
-
5:01
»
Hack a Day
Does a yo-yo work in zero-g? How about a paper airplane? These questions were answered in 1985 on the Space Shuttle Discovery, but reproduction of results is the cornerstone of the scientific method. [Rob] is about to reproduce some of the awesome zero-g pictures by riding on a vomit comet and taking a few pictures of [...]
-
-
8:23
»
Packet Storm Security Recent Files
This short paper describes the trash attack which is effective against the majority of fully- verifiable election systems. The paper then offers a simple but counter-intuitive mitigation which can be incorporated within many such schemes to substantially reduce the effectiveness of the attack. This mitigation also offers additional benefits as it significantly improves the statistical properties of existing verifiable systems.
-
8:23
»
Packet Storm Security Misc. Files
This short paper describes the trash attack which is effective against the majority of fully- verifiable election systems. The paper then offers a simple but counter-intuitive mitigation which can be incorporated within many such schemes to substantially reduce the effectiveness of the attack. This mitigation also offers additional benefits as it significantly improves the statistical properties of existing verifiable systems.
-
-
4:02
»
Hack a Day
Some of our favorite hacks are those made with scrap materials, so we were delighted to see a contest being held by the German technology magazine c’t which focuses on using salvaged components. “Mach flott den Schrott” is the name of the competition, which loosely translates to “Make fast the scrap”. German builder [Mario Lukas’] [...]
-
-
1:31
»
SecDocs
Authors:
Gunter Ollmann Tags:
malware cybercrime Event:
Black Hat USA 2010 Abstract: Starting a life of Internet crime is easy; in fact you’ve probably already doing it as far as the RIAA is concerned. Now that you’ve chosen to embark upon a new career, how are you going to get dirty, filthy, stinking rich? How do you become a millionaire? The tool of choice has got to be botnets. Building them is just the start. How do you monetize the tens or hundreds of thousands of machines under your control? Should you harvest confidential and personal information from the victims, or would it be more prudent to become a specialist service provider to other botnet operators? Which models work best, and how can you become a six-million-dollar man within a year?
-
-
1:53
»
SecDocs
Tags:
Windows hardening secure development Event:
Black Hat USA 2010 Abstract: Microsoft has implemented lots of useful functionality in Windows that they use in their own products. Many of these features can be used to enhance the security of third party applications, but not many developers or software architects know about them. This talk will detail some of the technical underpinnings of Windows features like UAC, IE protected mode and Terminal Serivces and show how they can be used to defend your own software from attack.
-
-
12:01
»
Hack a Day
Here’s another chance to ply your hacking skills for cash and prizes. Dangerous Prototypes has just announced the Open 7400 Logic Competition. First prize is $100 and a bunch of hacking goodies. But even better is that since it was announced, more sponsors have stepped up to increase the kitty, and the number of entries [...]
-
-
11:15
»
Packet Storm Security Recent Files
Using the attacks in this paper allows you to bypass all of PHPIDS's rule sets, which defeats all protection PHPIDS can provide. Furthermore, on a default install of PHPIDS the log file can be used to drop a PHP backdoor. This can use PHPIDS as a vital steping stone in turning an LFI vulnerability into remote code execution. The end result is that use of PHPIDS 0.6.5 can make you less secure. All of these issues have been fixed in version 0.7.
-
11:15
»
Packet Storm Security Misc. Files
Using the attacks in this paper allows you to bypass all of PHPIDS's rule sets, which defeats all protection PHPIDS can provide. Furthermore, on a default install of PHPIDS the log file can be used to drop a PHP backdoor. This can use PHPIDS as a vital steping stone in turning an LFI vulnerability into remote code execution. The end result is that use of PHPIDS 0.6.5 can make you less secure. All of these issues have been fixed in version 0.7.
-
-
16:01
»
Hack a Day
Grab some stiff paper and get to work building your own paper claw. [Dombeef] posted the instructions to recreate the claw above because he was unsatisfied with his previous design which was flimsy and unable to pick up just about anything. This version is a bit larger and it internalizes all of the parts. Being [...]
-
-
14:01
»
Hack a Day
It seems like receipt printers are pretty popular as hacking targets lately. Aside from the wasted paper, they cooler than plain old blinking LEDs and we’d image there’s a ton of them floating around out there as advances in technology have prompted retailers to trade in the bulky dinosaurs for slimmer thermal printers. [Philip Hayton] [...]
-
-
13:01
»
Hack a Day
This circuit illustration adds a scrolling paper feeder to the bed of a laser cutter. In the video after the break you can see that the actual assembly is put on the bed of the laser cutter. After the laser has cut out the specified pattern, the scroll is wound to move an un-cut portion [...]
-
7:15
»
Packet Storm Security Recent Files
This paper offers incremental research in the area of untrusted program input via synchronization handle manipulations. Unlike the Michal Zalewski paper on Delivering Signals for Fun and Profit, this paper focuses on the source of the Unix signal handlers. Tested were personal computers running Windows XP and Vista. The synchronization objects were mutexes and events, and the security software included products from AVG, Avast, Avira, BitDefender, BullGuard, CheckPoint, Eset, F-Prot, F-Secure, Kaspersky, McAfee, Microsoft (Security Essentials), Nor- man, Norton, Panda, PC Tools, Quick Heal, Symantec, and Trend Micro.
-
7:15
»
Packet Storm Security Misc. Files
This paper offers incremental research in the area of untrusted program input via synchronization handle manipulations. Unlike the Michal Zalewski paper on Delivering Signals for Fun and Profit, this paper focuses on the source of the Unix signal handlers. Tested were personal computers running Windows XP and Vista. The synchronization objects were mutexes and events, and the security software included products from AVG, Avast, Avira, BitDefender, BullGuard, CheckPoint, Eset, F-Prot, F-Secure, Kaspersky, McAfee, Microsoft (Security Essentials), Nor- man, Norton, Panda, PC Tools, Quick Heal, Symantec, and Trend Micro.
-
-
5:41
»
SecDocs
Authors:
Laurent Oudot Tags:
web application web server exploiting covert channel Event:
Black Hat Abu Dhabi 2010 Abstract: This technical talk will focus on web attackers and how they try to handle extrusion issues. Indeed, when intruders get an illegal access on a web resource, it might become complex for them to keep a stealth and remote control without being caught. They usually try to create easy channels that allow them to get the very best from their target. But sometimes, they need to improve those concepts, especially against a hardened or monitored network. Based on real technical examples, we will describe how web attackers can anonymously talk to web backdoors, either by playing with HTTP issues or by finding secret paths to bounce out of DMZ (cover channels, etc). For this presentation to be accurate, we will also propose solutions, so that the defenders might detect or contain those attacks on their sensitive networks.
-
2:23
»
SecDocs
Authors:
Lavakumar Kuppan Tags:
web application XSS HTML Event:
Black Hat Abu Dhabi 2010 Abstract: HTML5 is a set of powerful features aimed at moving the web applications closer to existing desktop applications in terms of user experience and features. HTML5 is no more just the technology of the future as many believe, it is available right now in almost all modern browsers. Though the widespread use of HTML5 by websites is still a few years away, the abuse of these features is already possible. Web developers and users assume that just because their site does not implement any HTML5 features they are unaffected. Also a large section of the internet community believes that HTML5 is only about stunning graphics and video streaming. This talk will show how these assumptions are completely contrary to reality. This presentation will show how existing 'HTML4' sites can be attacked using HTML5 features in a number of interesting ways. Then we look at how it is possible to use the browser to perform attacks that were once thought to require code execution outside the sandbox. Finally we look at an attack where the attacker is not interested in the victim's data or a shell on the machine but is instead after something that might perhaps even be legal to steal!
-
-
13:39
»
SecDocs
Authors:
Neil Daswani Tags:
malware Event:
Black Hat DC 2011 Abstract: The Web 2.0 transformation has in part involved many sites using third-party widgets. We present the "widgetized web graph" showing the structure of high traffic web sites from the standpoint of widgets, show how web-based malware and scareware is propagated via such widgets, and provide data on how a mass web-based malware attack can take place against the Quantcast 1000 web sites via widgets.
-
-
21:25
»
SecDocs
-
-
11:00
»
Hack a Day
Although spring keeps trying to break through the winter doldrums you might be looking for just one more weekend activity before the outdoor season begins. Grab the kids and give this paper gyroscope a try. It’s not an electronic sensor made of paper, but the modern equivalent of a spinning top. The frame remains stationary [...]
-
-
6:05
»
Hack a Day
This functioning mechanical irs is made from paper templates, foam core poster board, old credit / gift / etc cards, paper clips and masking tape. First, patterns are designed and multiples are printed and laid out to make the 10 parts needed. Two rings are cut out of foam board and a third ring is [...]
-
-
6:27
»
Hack a Day
Cheap paper accelerometers? Put us down for a dozen to start. They’re not quite ready for mass production yet but it looks like they’re on the way. [George Whitesides] led a team to develop the new technology that uses simple manufacturing methods to produce the sensor seen above. Graphite and silver inks were screen printed [...]
-
-
5:54
»
Hack a Day
[Sivan Toledo] needed a enclosure for a unique sized electronic project, not finding what he needed in off the shelf solutions, he went to the next best thing, … Papier Mâché! Using a mold made out of standard corrugated cardboard, he slowly built up layers made of magazine paper, and ordinary “white glue” diluted with [...]
-
10:35
»
Hack a Day
Remember how fun it was studying chemistry and physics in high school? Well we guess your recollection depends on the person who taught the class. Why not have another go at it by learning the A-to-Z of electronics from one of our favorite teachers, [Jeri Ellsworth]. You know, the person who whips up chemistry experiments [...]
-
-
13:07
»
Hack a Day
Teaching kids to solder using kits is a fun time, but most of these beginner kits are a bit mundane. Not this one, it’s a solar-powered monster project. The components and their wiring connections are printed on a sheet of paper along with a background for that particular monster. The base of the paper is [...]
-
-
11:05
»
Hack a Day
What can you make with a toilet paper roll, duct tape, and a graphing calculator? A stand for your homemade spectrometer. This is neither as pretty nor as accurate as a precision scientific instrument, but that doesn’t mean it’s useless. In fact, it works perfectly well for rudimentary observations. Light is shined through a sample [...]
-
-
12:00
»
SecurityFocus Vulnerabilities
New paper by Amit Klein (Trusteer): "Detecting virtualization over the web with IE9 (platform preview) and Semi-permanent computer fingerprinting and user tracking in IE9 (platform preview)"
-
-
11:00
»
Hack a Day
If you don’t mind getting your fingers a little dirty you can replace your mouse with a piece of paper. [Dr. West] made this touchpad himself, which measures signals at the corners of the paper using four voltage dividers. The paper has been completely covered with graphite from a pencil (which we see in hacks [...]