«
Expand/Collapse
57 items tagged "part"
Related tags:
linux [+],
exploit [+],
wordpress [+],
wellington new zealand [+],
wellington [+],
video [+],
time [+],
system [+],
real time software [+],
real time design [+],
printer [+],
new zealand [+],
malware [+],
jan czmok [+],
isps [+],
hacking [+],
felix erkinger [+],
erwin erkinger [+],
engineering [+],
development [+],
ddos [+],
current tools [+],
clickjacking [+],
black hat [+],
x prize [+],
win [+],
wiesmann [+],
web hacking [+],
web [+],
weather display [+],
weather [+],
uninvited guests [+],
toolchain [+],
time scientists [+],
tier ii [+],
texas [+],
team [+],
static analysis [+],
social engineering [+],
shah tags [+],
security 2001 [+],
security [+],
science event [+],
report [+],
presentation [+],
pdf [+],
parts [+],
networked equipment [+],
misc [+],
maker [+],
laugh [+],
hunting [+],
how things work [+],
future [+],
egg hunting [+],
egg hunt [+],
display [+],
digital [+],
demo [+],
ddos attacks [+],
craig [+],
cnc [+],
classic [+],
audio [+],
ascii [+],
armor [+],
apple ii [+],
adrian wiesmann [+],
wikipedia [+],
whitepaper [+],
wearable [+],
watch [+],
usa [+],
universe [+],
unauthorized files [+],
u.s. [+],
txt [+],
tutorial [+],
time chris [+],
thermal receipt printer [+],
temperatures [+],
tdss [+],
talk [+],
surface mount [+],
strauss [+],
stomp [+],
stephen colbert [+],
spoofer [+],
southwest tour [+],
slides [+],
server scripts [+],
sensors [+],
secret [+],
school games [+],
scheduler [+],
saga [+],
room [+],
reverse engineering [+],
research partners [+],
reprap [+],
repair [+],
remote control car [+],
receipt printers [+],
receipt [+],
reader [+],
read [+],
rants [+],
radar image [+],
project details [+],
printing [+],
power [+],
popular crowd [+],
poker [+],
pinball [+],
photo series [+],
peripherals [+],
pentiums [+],
pc [+],
news [+],
networking [+],
mike davenport [+],
mesa arizona [+],
mesa [+],
makerbot [+],
magnetic card [+],
lucas [+],
lua [+],
living room [+],
linux distro [+],
leds [+],
led [+],
last time [+],
laptops [+],
landon cox [+],
laces [+],
kevin mcpeake [+],
joypad [+],
janis jakaitis [+],
jamie [+],
james [+],
internet knowledge base [+],
internet [+],
installing linux [+],
human opponents [+],
how to [+],
hot glue gun [+],
home theater setup [+],
home [+],
heatsync [+],
hackers [+],
guitar [+],
fun [+],
forum posts [+],
fcrontab [+],
falling [+],
faire [+],
extruder [+],
exploits [+],
entertainment [+],
dominos [+],
domino event [+],
domino [+],
dollar question [+],
dollar [+],
document center [+],
dishwasher repair [+],
dishwasher [+],
dino a. dai zovi [+],
dimming [+],
digital calipers [+],
declassifies [+],
cybersecurity plan [+],
cyberattacks [+],
crowd favorites [+],
couch [+],
cooking [+],
contrary to popular belief [+],
computer [+],
commercial versions [+],
commercial projects [+],
coffeemaker [+],
coffee maker [+],
coffee [+],
close [+],
circuit boards [+],
circuit [+],
chris [+],
choice of words [+],
chaos communication camp [+],
card reader [+],
card [+],
car one [+],
cameras [+],
camera one [+],
camera [+],
cakes [+],
break time [+],
breadboard [+],
board [+],
blog [+],
blake bevin [+],
bevin [+],
best choice [+],
battling robots [+],
back to the future [+],
automate [+],
austin [+],
auction sites [+],
attacker [+],
arizona [+],
arduino [+],
arcade gaming [+],
arcade [+],
anonymous [+],
andy [+],
analog [+],
all terrain [+],
Hardware [+],
Hackerspaces [+],
Countermeasures [+],
3d printer [+],
versions [+],
hacks [+],
chaos communication congress [+]
-
-
12:01
»
Hack a Day
[Landon Cox] recently finished up a 3-part tutorial on designing project enclosures for 3D printing. The series is great if you have not yet tried your hand at this realm of the 3D printing universe, but there’s a lot to take away about design and modeling even if you don’t plan to print your creations. [...]
-
-
10:01
»
Hack a Day
As part of a complete home theater setup [Andy] wanted to be able to control the lights from his couch. He started thinking about the best way to do this when he realized that his TV remote has buttons on it which he never uses. Those controls are meant for other components made by the [...]
-
-
21:38
»
SecDocs
Authors:
Jan Czmok Tags:
DDoS Event:
Chaos Communication Congress 19th (19C3) 2002 Abstract: This workshop is divided in two parts. The first part presents current tools and measures to detect DDOS attacks, to block them and to do a post-mortem analysis. The second part will be an open discussion to find out ideas and capabilities of the community to improve countermeasures (e.g. distributed blocking or distributed monitoring). The results should be offered to interested ISPs and probably lead to development of tools to reduce - and probably prevent - DDOS attacks.
-
21:38
»
SecDocs
Authors:
Jan Czmok Tags:
DDoS Event:
Chaos Communication Congress 19th (19C3) 2002 Abstract: This workshop is divided in two parts. The first part presents current tools and measures to detect DDOS attacks, to block them and to do a post-mortem analysis. The second part will be an open discussion to find out ideas and capabilities of the community to improve countermeasures (e.g. distributed blocking or distributed monitoring). The results should be offered to interested ISPs and probably lead to development of tools to reduce - and probably prevent - DDOS attacks.
-
-
21:30
»
SecDocs
Authors:
Jan Czmok Tags:
DDoS Event:
Chaos Communication Congress 19th (19C3) 2002 Abstract: This workshop is divided in two parts. The first part presents current tools and measures to detect DDOS attacks, to block them and to do a post-mortem analysis. The second part will be an open discussion to find out ideas and capabilities of the community to improve countermeasures (e.g. distributed blocking or distributed monitoring). The results should be offered to interested ISPs and probably lead to development of tools to reduce - and probably prevent - DDOS attacks.
-
-
12:25
»
SecDocs
Authors:
Erwin Erkinger Felix Erkinger Tags:
technology Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: An overview on realtime software design, with explanations of commonly used terms and methods. What is the real-time thing - is my PC real-time - for what can I use it? These typical questions will be covered in this lecture. It is a basic introduction in the area of real-time design. The first part of the lecture is about - the introduction: In theory real-time is everything which reacts within a specified time on an external request. Sometimes Real-Time is used to distinguish between the "real" time and the virtual "model" time of a computer system. If this system can interact with the "real" time it is said to be real-time capable. So - every computer is a "real-time" system (as a non reaction on a request would often be called an error) - even the most popular PC operating system (we all know). But, as expected, real-time programming and real-time software is more than just this definition (since this would not give any benefit). Real-Time programming tries to get the maximum reactivity and reliability out of a computer system, because the typical application has to react on certain events reliable within a specified time. e.g. It would not make sense to assign a traffic ordance to a laggard, as he would not react within the needed time resulting (best case) in traffic jams. But maybe this laggard is fast enough to sort (real)-mail. As the previous example shows, real-time depends on the application: commonly it is distinguished between Soft-Real-Time, with un-guaranteed reaction and Hard-Real-Time with a guaranteed reaction. For some applications a normal windowed OS is good enough - for others it isn't. The lecture will give some examples on some typical real-time applications and the used operating system. The second part of the lecture is the practical part: An introduce the basic functions a real-time capable OS has to support (e.g. like semaphores or message boxes) will be given. Typical real-time vocabulary (like blocking or thread) will be covered. And finally within this part a simple real-time application will be shown to illustrate the function of the described elements (which lead to a short RTAI Real-Time linux program). The third part of the lecture will be about pit-falls and design limits. This is again a theoretic part, which shows how excellent real-time design can (and will) fail on certain occasions. Typical pit-falls like the hungry philosopher problems (deadlock), priority inversion, and event storms will be explained together with typical prevention mechanisms. Finally this part will address some promising design methods (like virtualisation and fixed time scheduling).
-
12:25
»
SecDocs
Authors:
Erwin Erkinger Felix Erkinger Tags:
technology Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: An overview on realtime software design, with explanations of commonly used terms and methods. What is the real-time thing - is my PC real-time - for what can I use it? These typical questions will be covered in this lecture. It is a basic introduction in the area of real-time design. The first part of the lecture is about - the introduction: In theory real-time is everything which reacts within a specified time on an external request. Sometimes Real-Time is used to distinguish between the "real" time and the virtual "model" time of a computer system. If this system can interact with the "real" time it is said to be real-time capable. So - every computer is a "real-time" system (as a non reaction on a request would often be called an error) - even the most popular PC operating system (we all know). But, as expected, real-time programming and real-time software is more than just this definition (since this would not give any benefit). Real-Time programming tries to get the maximum reactivity and reliability out of a computer system, because the typical application has to react on certain events reliable within a specified time. e.g. It would not make sense to assign a traffic ordance to a laggard, as he would not react within the needed time resulting (best case) in traffic jams. But maybe this laggard is fast enough to sort (real)-mail. As the previous example shows, real-time depends on the application: commonly it is distinguished between Soft-Real-Time, with un-guaranteed reaction and Hard-Real-Time with a guaranteed reaction. For some applications a normal windowed OS is good enough - for others it isn't. The lecture will give some examples on some typical real-time applications and the used operating system. The second part of the lecture is the practical part: An introduce the basic functions a real-time capable OS has to support (e.g. like semaphores or message boxes) will be given. Typical real-time vocabulary (like blocking or thread) will be covered. And finally within this part a simple real-time application will be shown to illustrate the function of the described elements (which lead to a short RTAI Real-Time linux program). The third part of the lecture will be about pit-falls and design limits. This is again a theoretic part, which shows how excellent real-time design can (and will) fail on certain occasions. Typical pit-falls like the hungry philosopher problems (deadlock), priority inversion, and event storms will be explained together with typical prevention mechanisms. Finally this part will address some promising design methods (like virtualisation and fixed time scheduling).
-
12:25
»
SecDocs
Authors:
Erwin Erkinger Felix Erkinger Tags:
technology Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: An overview on realtime software design, with explanations of commonly used terms and methods. What is the real-time thing - is my PC real-time - for what can I use it? These typical questions will be covered in this lecture. It is a basic introduction in the area of real-time design. The first part of the lecture is about - the introduction: In theory real-time is everything which reacts within a specified time on an external request. Sometimes Real-Time is used to distinguish between the "real" time and the virtual "model" time of a computer system. If this system can interact with the "real" time it is said to be real-time capable. So - every computer is a "real-time" system (as a non reaction on a request would often be called an error) - even the most popular PC operating system (we all know). But, as expected, real-time programming and real-time software is more than just this definition (since this would not give any benefit). Real-Time programming tries to get the maximum reactivity and reliability out of a computer system, because the typical application has to react on certain events reliable within a specified time. e.g. It would not make sense to assign a traffic ordance to a laggard, as he would not react within the needed time resulting (best case) in traffic jams. But maybe this laggard is fast enough to sort (real)-mail. As the previous example shows, real-time depends on the application: commonly it is distinguished between Soft-Real-Time, with un-guaranteed reaction and Hard-Real-Time with a guaranteed reaction. For some applications a normal windowed OS is good enough - for others it isn't. The lecture will give some examples on some typical real-time applications and the used operating system. The second part of the lecture is the practical part: An introduce the basic functions a real-time capable OS has to support (e.g. like semaphores or message boxes) will be given. Typical real-time vocabulary (like blocking or thread) will be covered. And finally within this part a simple real-time application will be shown to illustrate the function of the described elements (which lead to a short RTAI Real-Time linux program). The third part of the lecture will be about pit-falls and design limits. This is again a theoretic part, which shows how excellent real-time design can (and will) fail on certain occasions. Typical pit-falls like the hungry philosopher problems (deadlock), priority inversion, and event storms will be explained together with typical prevention mechanisms. Finally this part will address some promising design methods (like virtualisation and fixed time scheduling).
-
-
8:01
»
Hack a Day
With temperatures rising to around 117degrees, we arrived in Mesa Arizona to visit Heatsync Labs as part of our Southwest Tour. We have actually seen a tour of Heatsync in the past, and you should probably refer back to it for the quick run-through of the facility. When I was there, there was simply so much [...]
-
-
9:01
»
Hack a Day
If you’re building a 3D printer, the most complicated part is the extruder. This part uses a series of gears to pull plastic filament off of a spool, heats it up, and squirts it out in a manner precise enough to build objects one layer at a time. [Chris] made his own extruder out of [...]
-
-
21:47
»
SecDocs
Authors:
Torbjörn Lofterud Tags:
games Event:
Chaos Communication Camp 2011 Abstract: For a few years I was part of a team that developed and ran autonomous poker playing robots on commercial Internet poker sites; playing poker with real money against real people in real time. The project failed... At first glance, Texas hold'em poker does seem like a fairly simple game. Developing poker playing software can be done and has been done, and there are rumors on the Internet about poker playing robots winning millions online. There are even some commercial poker playing software available on the Internet. But building a functional poker bot have two major parts; firstly integration with the online poker site, and secondly developing software capable of winning against human opponents in Texas hold'em poker. Contrary to popular belief, the first part is easy and the second part is hard. Texas hold'em provides a programming challenge extraordinaire because its an imperfect information game paired with lots of randomness and psychology. Only small pieces of information is available at a given time, and the available information is biased and often deceptive. The complete game-tree Texas hold'em poker is so large that its infeasible to calculate even offline, and impossible to do in real-time, a feat necessary for online game-play.
-
-
15:35
»
Hack a Day
This is the 2nd and final part of this project. If you haven’t seen part 1 yet, jump back and check it out. Now that we have the controller box made and ready to go, we just have to build some simple stomp sensors. As I said before, I doubt this will hold anyones attention [...]
-
-
7:01
»
Hack a Day
Over the last year, [James] has been a part of a few commercial projects that used a thermal receipt printer as part of the build. Something must have cracked in his mind, because [James] spent a lot of time developing a way to print customized content on receipt printers, connecting these printers to the Internet, and sharing [...]
-
-
21:33
»
SecDocs
Tags:
social engineering Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: All the talks i saw about SE so far just showed which good SE's the speakers are. I try to do another approach, what if i get in and don't know what to do then. The talk is about the reconn. before the assessment, the different approaches of SE. Which techniques can one use, how to do a proper intel. and what is useful. How things work and more important why. Which skill set should one have before entering a engagement. And last but not least how do one counter a SE attack.
-
21:33
»
SecDocs
Tags:
social engineering Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: All the talks i saw about SE so far just showed which good SE's the speakers are. I try to do another approach, what if i get in and don't know what to do then. The talk is about the reconn. before the assessment, the different approaches of SE. Which techniques can one use, how to do a proper intel. and what is useful. How things work and more important why. Which skill set should one have before entering a engagement. And last but not least how do one counter a SE attack.
-
-
13:01
»
Hack a Day
Part of the fun with old computers is playing some old school games, and while you could play them with a keyboard it is much more fun with a joystick. You can get old joysticks all day long on auction sites, but you have to watch out. Some are digital, which wont work for many [...]
-
-
15:54
»
Packet Storm Security Recent Files
This malware report is part 1 of 2. This report is an effort to track, categorize, contain, understand root cause and infection vector of said user account/s, networked equipment or computer/s. This report pertains to all incidents reported by TIER II help desk, TIER III engineers, customer complaints or random IT Security audit/finding/pen test.
-
15:54
»
Packet Storm Security Misc. Files
This malware report is part 1 of 2. This report is an effort to track, categorize, contain, understand root cause and infection vector of said user account/s, networked equipment or computer/s. This report pertains to all incidents reported by TIER II help desk, TIER III engineers, customer complaints or random IT Security audit/finding/pen test.
-
-
12:13
»
Hack a Day
Some think that grinding the beans and filling the coffee maker is part of the coffee-drinking ritual, but [Jamie] isn’t one of them. Instead, he’s been working to make this coffeemaker a web-enabled device. He built it as part of a class project, and has implemented most of what you need to make a cup [...]
-
-
14:01
»
Hack a Day
This one must have been fun to come up with because it’s got it all. There’s hardware, firmware, networking, and server scripts all working together to create a filing, scanning document center for your business. The best part is that [Janis Jakaitis] was tasked to do this as part of his job (we’re sure there’s [...]
-
-
13:01
»
Hack a Day
Behold, another RepRap springs into existence! Well, springs might not be the best choice of words, it took a while and there were many bumps in the road. But [NBitWonder's] self-built RepRap is now finished and you can read his 14-part build log to see all that went into the process. We checked in on [...]
-
-
8:25
»
Packet Storm Security Exploits
WordPress versions 3.1.2 and below clickjacking exploit that was part of an OWASP presentation on September 20th, 2011 in Wellington, New Zealand.
-
8:25
»
Packet Storm Security Recent Files
WordPress versions 3.1.2 and below clickjacking exploit that was part of an OWASP presentation on September 20th, 2011 in Wellington, New Zealand.
-
8:25
»
Packet Storm Security Misc. Files
WordPress versions 3.1.2 and below clickjacking exploit that was part of an OWASP presentation on September 20th, 2011 in Wellington, New Zealand.
-
-
13:44
»
SecDocs
Authors:
Adrian Wiesmann Tags:
honeypot Event:
Hashdays 2010 Abstract: Everybody is doing honeypots nowadays. There are many different tools out there - even for the technologically illiterate. Honeypots help us detect uninvited guests and thanks to honeypots we know what happens when the pests feel a little bit too much at home on our systems. But have you ever looked over the shoulder of such an attacker? Do you know how quick they type, how many times they need to start over to write a simple 'ifconfig' and how long it takes them to understand why the command 'ifcongif' is not known by the rooted system? Hilarity is guaranteed to ensue. When you like a good laugh and know a good hack when you see one, this talk is the right one for you. The first (very quick) part is about the toolchain used. The second (and much longer) part is about what to expect when watching over the shoulders of 31337 h4x0r5.
-
13:44
»
SecDocs
Authors:
Adrian Wiesmann Tags:
honeypot Event:
Hashdays 2010 Abstract: Everybody is doing honeypots nowadays. There are many different tools out there - even for the technologically illiterate. Honeypots help us detect uninvited guests and thanks to honeypots we know what happens when the pests feel a little bit too much at home on our systems. But have you ever looked over the shoulder of such an attacker? Do you know how quick they type, how many times they need to start over to write a simple 'ifconfig' and how long it takes them to understand why the command 'ifcongif' is not known by the rooted system? Hilarity is guaranteed to ensue. When you like a good laugh and know a good hack when you see one, this talk is the right one for you. The first (very quick) part is about the toolchain used. The second (and much longer) part is about what to expect when watching over the shoulders of 31337 h4x0r5.
-
7:00
»
Hack a Day
This week we are starting in on a series of videos that are pretty different from the past few. Most hackers go through a phase where they etch their own circuit boards. This lasts for a few projects until they need to use a surface mount part, need many circuit boards to be made, or [...]
-
-
18:00
»
Hack a Day
In part one I showed you that you could install a linux distro on a new computer and transplant it into a 386 computer in a short amount of time and with little effort. Now it is time to move on to bigger and beefier machines like 486′s, Pentiums and better. I am going to [...]
-
-
6:08
»
Hack a Day
Be sure to check out Part 1 of the KC Maker Faire photo series. In this post, we explore some of the big hitters of the show, including crowd favorites ArcAttack, as well as battling robots. Read on to see the wonders! ArcAttack!: We have seen these guys from Austin, Texas in the past, and they [...]
-
-
14:30
»
Hack a Day
For those less experienced folks looking to move their Arduino projects to more permanent installations, this is just for you! [Martyn] Posted a three part series, VeroBoardUino, over at his blog about moving your Arduino project to a soldered breadboard. Part one kicks off with the appropriate breadboard requirements, modifications, and a simple 7805 power [...]
-
-
13:49
»
Hack a Day
A large part of science is making mistakes and learning from them in order to make each subsequent design that much better. When your experimentation involves hacking cakes, each failure is an exercise in deliciousness. [Craig] and his group of research partners often bake electronics-related cakes whenever part of the team departs in search of [...]
-
-
6:02
»
Hack a Day
In parts 1 and 2, I discussed the important parts of what is going on the PC side with lua. While not 110% detailed I hope it gave you an idea on how the data is processed so the Apple II computer could quickly digest it. Now its time to see what happens at the [...]
-
8:01
»
Hack a Day
In part one of the Apple II weather display I quickly went over how data is fetched and phrased. Now its time to do something with it in part 2. In the order of functions I do the text parts first, and though its very similar to the process that the radar image goes through, [...]
-
-
16:00
»
Packet Storm Security Recent Files
Whitepaper called Linux Exploit Development Part 2 (rev 2) - Real app demo. It demonstrates the techniques discussed in part two of the Linux Exploit Writing Tutorial Part 2.
-
16:00
»
Packet Storm Security Misc. Files
Whitepaper called Linux Exploit Development Part 2 (rev 2) - Real app demo. It demonstrates the techniques discussed in part two of the Linux Exploit Writing Tutorial Part 2.
-
-
14:03
»
Hack a Day
We asked for responses to our last Development Board post, and you all followed through. We got comments, forum posts, and emails filled with your opinions. Like last time, there is no way we could cover every board, so here are a few more that seemed to be popular crowd choices. Feel free to keep [...]
-
-
10:35
»
Hack a Day
[Dino A. Dai Zovi] gave a talk in the earlier part of 2010 where he shares his thoughts on the future of malicious exploits. You can watch it on Ustream and he’s also posted a set of slides (PDF) that goes along with it. We find the 48 minute video to be quite interested. Instead of [...]
-
-
7:00
»
Hack a Day
[Craig's] magnetic card spoofer is both simple and brilliant. There are two parts to spoofing these cards and he took care of both of them. The first part is getting the actual card data. He designed the spoofer board with a header that connects to a card reader for doing this. The second part is [...]
-
-
11:00
»
Hack a Day
[Daryll Strauss'] dishwasher had some problems that he traced to a worn out part on the upper spinning arm. The hackerspace he belongs to has a Makerbot and he though this would be the perfect opportunity to print his own replacement part. He picked up some inexpensive digital calipers and set to work mapping out the dimensions [...]
-
-
11:00
»
Hack a Day
Back to the Future Part 2 provided a glimpse of a future that included hover boards and holographic advertisements. But you don’t have to wait until 2015 to get your hands on at least some of the technology. [Blake Bevin] has produced a pair of shoes with power laces as seen in the film. Of course [...]
-
-
8:25
»
Hack a Day
One part inexpensive uC, one part touch-screen, one part Internet knowledge-base all come together to make up this Wikipedia reader. It functions in a very similar way to commercial versions by parsing XML dumps from the popular website to an SD card for use on the device. This is not limited to Wikipedia, but could [...]
-
-
4:33
»
Hack a Day
Finally a guitar that all of the arcade gaming geeks can jam with. [Mike Davenport] sent us his 8bit arcade based guitar for his senior project. Details are a little sparse if you intend to build you own at the moment, but he does mention the basics: such as it uses an FPGA for logic [...]
-
-
8:12
»
Hack a Day
One part remote control car, one part camera, and two parts flash make up this all-terrain camera. The folks at Burrard-Lucas photography put together this guerrilla device to capture images of some of the world’s more dangerous wildlife like elephants and tigers (oh my!). This project furthers our opinion that great photographers need to be [...]
-
-
14:00
»
Packet Storm Security Advisories
fcrontab, part of the fcron scheduler, is vulnerable to several race conditions that allow a local attacker to use symbolic links to read unauthorized files. Versions before 3.0.5 are affected.
-
-
21:04
»
SecDocs
Tags:
engineering science Event:
Chaos Communication Congress 26th (26C3) 2009 Abstract: We want to use the opportunity the 26C3 presents as a venue to introduce our team. The Part-Time-Scientists are the first German team participating in the Google Lunar X PRIZE. Our presentation would kick off with a quick explanation of what the X PRIZE is, the challenges and gains. The main part of the presentation will then focus on our progress. That includes a showcase of some hard- and software we're using. Additionally pictures and videos specifically created for the 26C3. And a brief overview of the GoogleLunarXPrize and it's overall progress. The main part of the presentation will then focus on our progress. That includes a showcase of some hard- and software we're using. Additionally pictures and videos specifically created for the 26C3. Some examples of interesting hardware appliance: Xilinx FPGA * Self designed Boardcomputer (Linux based) * Special HD CCMOS sensors * HiRel certified components * CAD/CAM designs The presentation will be held by 1-3 members of our team. So that we have someone from every area of expertise available for possible questions from the audience. The following Q&A part should prove to be very interesting.
-
21:04
»
SecDocs
Tags:
engineering science Event:
Chaos Communication Congress 26th (26C3) 2009 Abstract: We want to use the opportunity the 26C3 presents as a venue to introduce our team. The Part-Time-Scientists are the first German team participating in the Google Lunar X PRIZE. Our presentation would kick off with a quick explanation of what the X PRIZE is, the challenges and gains. The main part of the presentation will then focus on our progress. That includes a showcase of some hard- and software we're using. Additionally pictures and videos specifically created for the 26C3. And a brief overview of the GoogleLunarXPrize and it's overall progress. The main part of the presentation will then focus on our progress. That includes a showcase of some hard- and software we're using. Additionally pictures and videos specifically created for the 26C3. Some examples of interesting hardware appliance: Xilinx FPGA * Self designed Boardcomputer (Linux based) * Special HD CCMOS sensors * HiRel certified components * CAD/CAM designs The presentation will be held by 1-3 members of our team. So that we have someone from every area of expertise available for possible questions from the audience. The following Q&A part should prove to be very interesting.