«
Expand/Collapse
196 items tagged "power"
Related tags:
green [+],
classic [+],
buffer [+],
misc [+],
authentication [+],
hacks [+],
raspberry [+],
hp power [+],
buffer overflow [+],
audio [+],
arduino [+],
security [+],
safer use [+],
power strip [+],
manager [+],
energy [+],
electricity [+],
bypass [+],
bench [+],
Hardware [+],
toy [+],
strip [+],
stack buffer [+],
smart [+],
service vulnerability [+],
power supply [+],
power consumption [+],
microcontrollers [+],
mains power [+],
hackaday [+],
exploits [+],
digital [+],
cyberlink [+],
cameras [+],
wyse [+],
wind [+],
wifi [+],
wheels [+],
txt power [+],
txt [+],
service [+],
scale solar system [+],
scada systems [+],
scada [+],
protocol application [+],
power wheels [+],
power meter [+],
power board [+],
power adapter [+],
php code [+],
php [+],
pcs [+],
overflow [+],
optional storage [+],
meter [+],
led [+],
jonathan pollet [+],
inclusion [+],
how to [+],
gunnar thle [+],
field [+],
exception handler [+],
eleanor saitta [+],
editor [+],
city [+],
bulletin board [+],
bulletin [+],
breadboard [+],
best architecture [+],
based buffer overflow [+],
architecture [+],
adapter [+],
abstract architecture [+],
invision [+],
wireless power transmission [+],
wind power [+],
watts [+],
wall [+],
volts [+],
video [+],
usb [+],
transportation [+],
tiny power [+],
tesla magnifier [+],
switch mode power [+],
simple [+],
server [+],
security vulnerability [+],
scott [+],
quinn dunki [+],
power leds [+],
power grid [+],
power consumtion [+],
potential security vulnerability [+],
pi power [+],
personal ftp server [+],
personal [+],
nikola tesla [+],
motor [+],
monitor [+],
mode power supply [+],
mike worth [+],
mike [+],
map [+],
links [+],
linear voltage [+],
laptop power [+],
kristofer erickson [+],
jon oberheide [+],
joe cummins [+],
job [+],
jacob appelbaum [+],
insight [+],
hackers [+],
erickson [+],
driver [+],
dpa [+],
differential power analysis [+],
day [+],
cybersecurity [+],
currency [+],
controlling [+],
control [+],
consumption [+],
chemistry [+],
atx power supply [+],
anthony lai [+],
antenna [+],
advanced [+],
abu dhabi [+],
aa batteries [+],
board [+],
invision power board [+],
zombies [+],
year [+],
work bench [+],
wire [+],
wind turbine generator [+],
whilst [+],
while [+],
welding torch [+],
web applications [+],
web [+],
wearable [+],
way [+],
wave shield [+],
warszawa [+],
warez [+],
wall sockets [+],
wake on lan [+],
w. examples [+],
vxl [+],
voltage regulator [+],
voltage divider [+],
voltage and amperage [+],
voltage [+],
vijay [+],
variable output [+],
variable frequency drive [+],
validation [+],
using sms [+],
usb hub [+],
usa [+],
ups [+],
uninterruptible power supply [+],
umbrella based [+],
types of memory [+],
tv remotes [+],
tutorial [+],
trims [+],
tractor [+],
trackpad [+],
toshiba satellite laptop computers [+],
toshiba satellite laptop [+],
torch flame [+],
tool battery [+],
tom [+],
titans [+],
time lapse photography [+],
time hardware [+],
time [+],
thyne [+],
thomas [+],
thin clients [+],
thin client [+],
thick metal [+],
thermal fuse [+],
theory [+],
tesla coils [+],
temporal lobe [+],
television [+],
tech [+],
tag [+],
tablet [+],
tab editor [+],
system [+],
switch mode power supply [+],
swapping coins [+],
surveillance system [+],
supercaps [+],
supercap [+],
study [+],
steven levy revisits [+],
steven levy [+],
stefan [+],
stationary base [+],
squeezing [+],
sql injection [+],
source [+],
sorensoft [+],
solder [+],
solarpump [+],
solar panels charge [+],
solar [+],
smart power [+],
slides [+],
sleep mode [+],
sky [+],
sip [+],
shutter [+],
shelf solution [+],
setup [+],
server system [+],
sensor [+],
security vulnerabilities [+],
security experts [+],
security authors [+],
sebastian [+],
schematics [+],
sata [+],
sander [+],
sand paper [+],
rover project [+],
routine activities [+],
rotta [+],
rocket launcher [+],
robots [+],
robot design [+],
rob simon [+],
riley porter [+],
rfid tag [+],
rfid [+],
resistors [+],
resistor [+],
repurposing [+],
reprap [+],
replacement batteries [+],
replace [+],
repair [+],
remote control [+],
remarkable job [+],
regulator [+],
real time clock [+],
rc vehicles [+],
rc batteries [+],
razor scooter [+],
ray [+],
rasmus [+],
ram [+],
radios [+],
radio [+],
rack mounted server [+],
quite some time [+],
quip [+],
quality driver [+],
quadcopter [+],
pwn [+],
psu [+],
prototypes [+],
protection circuits [+],
protection [+],
proliant [+],
project [+],
programmable power supply [+],
processing power [+],
privilege escalation vulnerability [+],
privacy [+],
president [+],
predecessor [+],
powermeter [+],
powering [+],
power wheel [+],
power web [+],
power warez [+],
power usage [+],
power tools [+],
power tab editor [+],
power supply repair [+],
power sockets [+],
power regulator [+],
power ratios [+],
power plants [+],
power monitoring [+],
power management [+],
power cross [+],
power company [+],
power bus [+],
power brick [+],
portable [+],
polymer [+],
poc [+],
plywood [+],
plate [+],
plasma [+],
plants [+],
pitch forks [+],
pinball machines [+],
pin microcontroller [+],
pin chip [+],
pic [+],
pi foundation [+],
photovoltaic cells [+],
photography [+],
phone didn [+],
phil [+],
phase induction motor [+],
pet toys [+],
personat [+],
persistence of vision [+],
period of time [+],
penetration [+],
pcbs [+],
pc mac [+],
paul [+],
password [+],
parts [+],
part [+],
panel [+],
palatial estate [+],
packard [+],
outlet [+],
other [+],
opto interrupter [+],
optical encoders [+],
optical character recognition [+],
open source hardware [+],
ohm resistor [+],
ocr [+],
observation device [+],
nuclear containment [+],
non volatile memory [+],
non invasive [+],
noise [+],
niklas roy [+],
nick depetrillo [+],
news [+],
network [+],
mux [+],
multiple [+],
msp430 [+],
msp [+],
motions [+],
moritz von buttlar [+],
modem [+],
mode [+],
mod [+],
milling machine [+],
microsoft power point [+],
microsoft [+],
microcontroller projects [+],
microcontroller [+],
mettle [+],
metal [+],
memory hardware [+],
memory [+],
media 6 [+],
mechanical relays [+],
measure wind speed [+],
maximilian gntner [+],
maximilian [+],
matt [+],
mark bog [+],
mark [+],
marc [+],
manager administration [+],
makerfaire [+],
magnetic sensors [+],
macs [+],
locomotive [+],
local privilege escalation [+],
lm317 [+],
lithium polymer batteries [+],
lithium [+],
linux crowd [+],
linux [+],
linear regulators [+],
lighting controllers [+],
lighting [+],
lightening the load [+],
license [+],
leds [+],
led flashlight [+],
launchpad [+],
launcher [+],
laser power [+],
laser [+],
laptops [+],
laptop [+],
lan [+],
ladyada [+],
laces [+],
knowledge [+],
killswitch [+],
kenneth finnegan [+],
kenneth [+],
ken [+],
k.c [+],
junction [+],
jumper cables [+],
julian [+],
juice [+],
jon [+],
jim [+],
jeri [+],
jeremy [+],
jack [+],
itona [+],
iphone [+],
internet connection [+],
integrated circuits [+],
instructable [+],
infrastructure [+],
hybrid power [+],
hungry [+],
hub motor [+],
hub [+],
hppm [+],
hp proliant [+],
homebrew [+],
home server [+],
home automation systems [+],
home automation [+],
home appliances [+],
hobby rockets [+],
high efficiency [+],
high altitude [+],
heliostat [+],
hdd [+],
harnessing [+],
happy as a clam [+],
hand [+],
hamster [+],
hacking [+],
hack [+],
guido socher [+],
ground pins [+],
grief [+],
grid [+],
graphics processing unit [+],
graham auld [+],
gpu [+],
google [+],
goodhart [+],
germanium diode [+],
geek [+],
future [+],
full power [+],
full featured desktop [+],
ftp [+],
frits [+],
frame motors [+],
foundation [+],
forum member [+],
flashlight [+],
flash [+],
finnegan [+],
felipe la [+],
favorite [+],
eye [+],
experience [+],
evanescent [+],
evalbot [+],
erich [+],
entertainment [+],
emerson network power [+],
emerson [+],
electroluminescent wire [+],
electricity consumption [+],
electrical energy [+],
electric toy [+],
electric appliances [+],
effect [+],
eeepc [+],
editor v1 [+],
earpiece [+],
dummy load [+],
dual core [+],
drive [+],
dorey [+],
dongle [+],
don [+],
docking stations [+],
dll [+],
diy [+],
distribution of electric power [+],
disposable cells [+],
disaster [+],
dirigibles [+],
digital calipers [+],
digilent [+],
desktop [+],
design flaw [+],
department of homeland security [+],
deb [+],
dead batteries [+],
dc voltages [+],
dc power adapter [+],
dc dc converter [+],
dc dc [+],
dc currents [+],
davis [+],
david cook [+],
dave [+],
data loggers [+],
dangerous thing [+],
d. the [+],
cyberlink power2go [+],
cues [+],
csrf [+],
crossover cable [+],
crossover [+],
cross site scripting [+],
creature comforts [+],
creation [+],
cracking passwords [+],
correct password [+],
core computer [+],
copper clad board [+],
controlled power [+],
containment chamber [+],
cons [+],
confidence [+],
company [+],
community knowledge [+],
command dos [+],
com [+],
code [+],
cnc [+],
cmos [+],
clock rate [+],
clamp [+],
clam [+],
circuit [+],
chris [+],
chipkit [+],
chinese security [+],
charging station [+],
charger repair [+],
charger [+],
chaos communication camp [+],
casemod [+],
car [+],
capacitors [+],
capacitor [+],
camera [+],
calibration [+],
cable [+],
button events [+],
button [+],
bus [+],
build [+],
buffer overflow vulnerabilities [+],
brilliance [+],
bridge [+],
brian dorey [+],
bot [+],
body [+],
boat [+],
board ships [+],
board search [+],
bluetooth [+],
blue smoke [+],
blake bevin [+],
black hat [+],
bit [+],
bill trims [+],
bill porter [+],
bidding [+],
bevin [+],
benefit of the doubt [+],
benchtop [+],
bench tools [+],
bench sander [+],
beagle [+],
bay area [+],
battery pack [+],
battery life [+],
based [+],
bamf [+],
ball [+],
back to the future [+],
awaits [+],
automation tool [+],
automation [+],
auto power [+],
auto [+],
authors [+],
audio sync [+],
atten [+],
attackers [+],
arcade machine [+],
arbitrary code [+],
apple power [+],
antoine [+],
anemometer [+],
analog digital converter [+],
ammeter [+],
ambilight [+],
amateur radio [+],
alkaline batteries [+],
alan yates [+],
africa [+],
aerospace industry [+],
advanced power [+],
adding power [+],
acpid [+],
ac power adapter [+],
Wireless [+],
Rasberry [+],
Newbie [+],
Area [+],
8 bits [+],
3d printer [+],
vulnerability [+],
tool [+],
supply [+],
denial of service [+],
code execution [+],
home [+],
chaos communication congress [+]
-
-
12:01
»
Hack a Day
[Chris] tried his hand at using Optical Character Recognition in his server power monitoring rig. The image above is what the IP camera used in the setup sees. He’s included a bright light to ensure that the contrast is as great as possible. After applying a threshold filter to the captured still, he is able [...]
-
-
13:31
»
Hack a Day
So the Raspberry Pi sometimes doesn’t have the juice needed to run power-hungry USB dongles. The most common issue is with WiFi adapters. The solution has long been to use a powered USB hub, but [Mike Worth] didn’t want to take up that much extra space. The solution he worked out injects power directly into [...]
-
-
16:00
»
SecuriTeam
Invision Power Board is prone to a vulnerability that lets remote attackers execute arbitrary code.
-
-
16:00
»
SecuriTeam
HP ProLiant SL Advanced Power Manager is prone to a Remote User Validation Failure vulnerability.
-
-
13:01
»
Hack a Day
The Raspberry Pi foundation is in a somewhat unique position. They always test the units that get returned to them in hopes that they can improve the design. They often request that the power supply also be sent back with the RPi unit, as we know the board will not work well if the PSU [...]
-
6:00
»
Hack a Day
For the longest time, hardware tinkerers have only been able to play around with two types of memory. RAM, including Static RAM and Dynamic RAM, can be exceedingly fast but is volatile and loses its data when power is removed. Non-volatile memory such as EPROMS, EEPROMS, and Flash memory retains its state after power is removed, but [...]
-
-
13:01
»
Hack a Day
What you see here is a Raspberry Pi shoehorned into a power strip. The idea is to leverage the power and low-cost of this board into a stealthy network observation device. It packs a similar punch as the Power Pwn but should cost at least $1100 less! The fact that when you plug your Ethernet [...]
-
-
4:00
»
Hack a Day
For a power hungry project the supply is sometimes a pretty big unknown. Whether stapling together a few different power supplies to meet a current requirement, or designing a system from the ground up: a big power supply can be quite a dangerous thing. It helps to have some kind of a dummy load to [...]
-
-
9:01
»
Hack a Day
We think this hand cranked robot design is nothing short of absolute brilliance. The toy is remote-controlled through a short section of wire. It can drive forward and turn, but not at the same time. Still that’s impressive considering it uses no battery or power supply and, of the two servo motors, only one is [...]
-
-
9:02
»
Hack a Day
Drone technology is driving the aerospace industry as companies trip over each other trying to develop the next big thing. Here’s a good example of what we’re talking about. Lasers can no be used to keep a UAV in the air indefinitely. The trick is to add an array of photovoltaic cells specifically tuned to [...]
-
-
5:01
»
Hack a Day
[Maximilian Güntner] dropped us a comment in last week’s globe writeup linking to his own project, which involves a similar high power LED driver mod. This looks like the exact same mod we came up with, and [Güntner] even used the mod to connect a bunch of high power LEDs to a PCA9685 LED driver [...]
-
-
11:01
»
Hack a Day
When working on flying vehicles weight is always a consideration. [Brendin] found a way to get rid of a wiring harness on his quadcopter, simplifying the assembly while lightening the load. He did it by incorporating the power bus into the frame of the vehicle. He started with some copper clad board. Because the substrate [...]
-
-
5:01
»
Hack a Day
For a few years now, [mux] has been playing around with extremely efficient computation. In 2010, he built a fully featured MiniITX / Core 2 duo computer that only consumed 20 watts. Last year, [mux] managed to build an Intel i3-powered desktop that was able to sip a mere 8.3 watts at idle. He’s back [...]
-
-
5:30
»
Hack a Day
A few years ago, the highest power LEDs you could buy capped out around three watts. Now, LED manufacturers are taking things to ridiculous power ratings with 30, 40, and even 90 watt LEDs. Getting these high-power LEDs are no longer a problem, but powering them certainly is. [Thomas] built a LED driver capable of powering these gigantic LEDs and [...]
-
-
10:01
»
Hack a Day
[Niklas Roy] is at it again. He’s applying wind power to his projects by using umbrellas. He was inspired by the shape of an anemometer, and umbrellas turned out to be a great choice because they’re cheap and easy to find. Anemometers measure wind speed by capturing it with egg-shaped sails (in fact, we’ve seen them [...]
-
-
15:01
»
Hack a Day
License plate tablet rack [Hunter Davis] used an old license plate as a tablet stand. It loops around the leg of his laptop table and has a cutout for the power cord of the tablet. More power power wheels It may look stock, but this power wheels is hiding a new frame, motors, and tires. [...]
-
-
17:00
»
SecuriTeam
Invision Power Board is prone to a cross-site scripting vulnerability because it fails to sanitize user-supplied input.
-
-
4:01
»
Hack a Day
[Brian Dorey] has been adding green power solutions to his home for some time now, and as things have progressed, he has experimented with several different iterations of data loggers. The latest system watching over his solar power setup is a Raspberry Pi armed with a custom-built I2C analog/digital converter. The Rasp Pi is responsible [...]
-
-
13:01
»
Hack a Day
This rather normal-looking power strip hides a secret inside. It’s called the Power Pwn, and it conceals hardware which facilitates remote penetration testing of a network. It really is the ultimate in drop hardware as you can quickly swap it with existing power strip. Who’s going to question it? It’s got almost all the bells [...]
-
12:01
»
Hack a Day
This system of hybridizing your home’s electric appliances is an interesting take on solar energy. It focuses on seamlessly switching appliances from the grid to stored solar energy as frequently as possible. There’s a promo video after the break that explains the setup, but here’s the gist of it. Follow along on the pictograph above. [...]
-
-
13:01
»
Hack a Day
That grey box at the top of the photo is a modular power supply unit for a rack-mounted server system. [Sebastian] decided to repurpose it as a charging source for his RC batteries. He chose this HP DPS-600PB because of its power rating, efficiency, and you can get them at a reasonable price. This is an [...]
-
-
9:01
»
Hack a Day
This section of the MakerFaire almost deserves an entire event of its own. I know I would happily attend a monthly match of the power racing series in my home town. To compete, you must have a modded Power Wheel. Yes, those electric kids vehicles that go really slowly across your lawn, those power wheels. [...]
-
-
8:01
»
Hack a Day
If you want to run your Raspberry Pi from something other than a mains power converter, and you’ve got some courage to spare, this hack is right up your alley. [Tom] wrote in with a switch mode power replacement for the RPi’s stock linear regulator. This is the first hack we’ve seen where the RPi’s [...]
-
-
15:01
»
Hack a Day
Back in his college days [Print_Screen] grew tired of always building a power supply on his breadboard. To make prototyping quicker he came up with the bench supply that is build into a power strip. This one is using linear regulators for power, and create much less noise on the lines than a supply made [...]
-
-
10:01
»
Hack a Day
[Teknynja] was looking for a way to control several discrete AC-powered devices using a microcontroller, and while he did consider the Powerswitch tail 2 from Adafruit, handling 5 devices would get pretty expensive. Rather than buying a complete off the shelf solution, he decided to build his own 5-way switched outlet. He picked up a [...]
-
6:01
»
Hack a Day
Of course putting a microcontroller into sleep mode or changing the clock rate has an effect on the power consumption of the chip, but what about different bits of code? Is multiplying two numbers more efficient than adding them, and does ORing two values consume more power than NOPping? [jcw] wanted to compare the power [...]
-
-
15:01
»
Hack a Day
If you’re expecting the serfs to hop the fence with pitch forks and torches you may want to employ a surveillance system. WiFi cameras are a cheap way of doing this, but you’ll need power. [CheapGuitar] decided not to run extension cords, and instead added solar power to his wireless camera. The solar panels are easy to [...]
-
-
5:01
»
Hack a Day
[Mike Worth] wanted to use his camera for some time-lapse photography. Since it’s used to take many pictures over a long period of time, he doesn’t want to deal with batteries running low. But there’s no standard power jack on the side; instead the official charger consists of an adapter that is inserted in place [...]
-
-
21:47
»
SecDocs
Authors:
Moritz von Buttlar Tags:
science Event:
Chaos Communication Camp 2011 Abstract: Opensource-solar.org is working on open hardware power supplies for off-grid applications. The systems consist of self-build solar panels, charge controllers with microcontroller, and LiFePo4 rechargeable batteries. Green energy for your gadgets ! A photovoltaic based power supply for small devices is especially useful if an electricity grid is unavailable, if cabling is inconvenient, and in emergency situations. Opensource-solar.org designs modular open hardware photovoltaic power systems which can be incorporated in other projects. The focus is on micro-energy systems with less then 16 W. Examples for usage include LED lighting systems, cell-phone charging and power for wireless networks. The goal is to make a very high quality system at a fraction of the cost of current systems. Currently it consists of a self-made solar panel build from solar cells, a MSP430 based charging and control module, and a rechargeable LiFePo4 battery. The open hardware approach allows collaborative development, support and building instructions for users worldwide. This could be especially interesting for makers in Africa and other parts of the world without grid connectivity in rural areas. Success of photovoltaic based systems is slowed down by a scarcity of skilled people and high costs. Open source hardware and internet comunities can provide essential information for self-learning the required skills to assemble, develop and install such systems.
-
10:02
»
Hack a Day
A while back, [Stefan] bought a pedal-powered tractor for his son. It was a fun toy, but what it really needed was an electric motor. After a fair bit of tinkering, [Stefan] turned a pedal-powered tractor into a battery-powered Power Wheels. Before turning his son’s pedal tractor into a battery-powered ride, [Stefan] ordered a 250 [...]
-
-
13:01
»
Hack a Day
[Mike] dropped us a tip to show off a system he has built to control some power sockets based on his proximity. Initially the project started as a parallel port controlled box to switch the mains power. Then he got the idea of turning this into a little more interactive of an automation tool. He [...]
-
-
15:01
»
Hack a Day
Yes, that is a clam. Yes researchers are using them as batteries. Yes, that quip about the matrix and clam-Neo that is bubbling up into your temporal lobe is appropriate. While keeping a clam as “happy as a clam” might not necessitate a virtual world, they don’t really produce much electricity either. Researchers were able [...]
-
12:39
»
Packet Storm Security Exploits
This Metasploit module exploits a stack buffer overflow in CyberLink Power2Go version 8.x. The vulnerability is triggered when opening a malformed p2g file containing an overly long string in the 'name' attribute of the file element. This results in overwriting a structured exception handler record.
-
12:39
»
Packet Storm Security Recent Files
This Metasploit module exploits a stack buffer overflow in CyberLink Power2Go version 8.x. The vulnerability is triggered when opening a malformed p2g file containing an overly long string in the 'name' attribute of the file element. This results in overwriting a structured exception handler record.
-
12:39
»
Packet Storm Security Misc. Files
This Metasploit module exploits a stack buffer overflow in CyberLink Power2Go version 8.x. The vulnerability is triggered when opening a malformed p2g file containing an overly long string in the 'name' attribute of the file element. This results in overwriting a structured exception handler record.
-
-
13:01
»
Hack a Day
[Woodporterhouse] must deal with regular power black outs in his area. He recently converted a rack-mount uninterruptible power supply to feed a portion of his mains wiring. This one is not to be missed, since he did such a great job on the project, and an equally remarkable job of documenting it. It’s one of the best [...]
-
-
13:01
»
Hack a Day
We wonder if a floating wind turbine generator (translated) like this one would alleviate some of the complaints we hear about ground-based turbines. This huge helium-filled structure is designed to generate electricity at high altitude, where winds are stronger and blow much more consistently than near ground level. We’ve read complaints at the unsightliness of wind farms, [...]
-
-
14:01
»
Hack a Day
[Mike] just purchased this Atten APS3005S bench power supply for around $80. It does the job, but boy is it noisy! We were pretty surprised to hear it fire up in the video after the break. To make matters worse, the noise is persistent since the fan never shuts off. Having worked with other bench [...]
-
-
22:56
»
SecDocs
Authors:
Gunnar Thöle Jörg Dürre Tags:
science Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: This talk, consisting of five distinct parts, is intended to show the audience how to get electricity without needing a grid connection. It will give information on Which energy sources to use What to power with them What equipment to get How to wire it up And some wishful thinking Participants should be able to assemble their own small-scale energy-generating systems after listening. Renewable energy isn't for wealthy investors only. You can have it, too. In this talk we'll show you how to power your own stuff from the sun, wind and other sources of energy. The talk is divided into 5 different parts: A really short introduction into the available power sources like sun, wind etc. We'll show some pipe-dreams where more hacking is needed to make it work like salt-gradient energy or damming the mediterranean sea. We'll show you how much power you can expect from which source. We'll also show you what affects power output for various technologies (example: Sun needs to be shining for solar power. We'll show you how much sunshine you can expect at your place.) As a follow-up to part 2 we'll show you the amount of power various things need. You can do the math yourself afterwards to see what you can power from your balcony. Building the system, the easy and fully-legal way: Build your own independent grid with optional storage. We'll show what you need for a small-scale solar system independent of the power network. Works well for caravans, camping, gardens and allotments. There will be real solar panels on stage. You will see schematics, parts lists and instructions. We'll give some hints where to aquire the necessary stuff without paying too much. The difficult way: Put your own power into the public grid. We'll show you what you need to do this. This can either make your purse fill up automatically (big installations earning feed-in tariffs) or it can (in theory) make your electricity meter go backwards - but that's not actually allowed. Once the electrical company recognizes what you are doing (and German law requires you to tell them) unfortunately they will install a digial meter. Digital meters will not count backwards like the Ferraris counters do now... The speakers have built and are operating various small-scale power systems and come from an engineering and commercial background.
-
22:56
»
SecDocs
Authors:
Gunnar Thöle Jörg Dürre Tags:
science Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: This talk, consisting of five distinct parts, is intended to show the audience how to get electricity without needing a grid connection. It will give information on Which energy sources to use What to power with them What equipment to get How to wire it up And some wishful thinking Participants should be able to assemble their own small-scale energy-generating systems after listening. Renewable energy isn't for wealthy investors only. You can have it, too. In this talk we'll show you how to power your own stuff from the sun, wind and other sources of energy. The talk is divided into 5 different parts: A really short introduction into the available power sources like sun, wind etc. We'll show some pipe-dreams where more hacking is needed to make it work like salt-gradient energy or damming the mediterranean sea. We'll show you how much power you can expect from which source. We'll also show you what affects power output for various technologies (example: Sun needs to be shining for solar power. We'll show you how much sunshine you can expect at your place.) As a follow-up to part 2 we'll show you the amount of power various things need. You can do the math yourself afterwards to see what you can power from your balcony. Building the system, the easy and fully-legal way: Build your own independent grid with optional storage. We'll show what you need for a small-scale solar system independent of the power network. Works well for caravans, camping, gardens and allotments. There will be real solar panels on stage. You will see schematics, parts lists and instructions. We'll give some hints where to aquire the necessary stuff without paying too much. The difficult way: Put your own power into the public grid. We'll show you what you need to do this. This can either make your purse fill up automatically (big installations earning feed-in tariffs) or it can (in theory) make your electricity meter go backwards - but that's not actually allowed. Once the electrical company recognizes what you are doing (and German law requires you to tell them) unfortunately they will install a digial meter. Digital meters will not count backwards like the Ferraris counters do now... The speakers have built and are operating various small-scale power systems and come from an engineering and commercial background.
-
-
22:38
»
SecDocs
Authors:
Gunnar Thöle Jörg Dürre Tags:
science Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: This talk, consisting of five distinct parts, is intended to show the audience how to get electricity without needing a grid connection. It will give information on Which energy sources to use What to power with them What equipment to get How to wire it up And some wishful thinking Participants should be able to assemble their own small-scale energy-generating systems after listening. Renewable energy isn't for wealthy investors only. You can have it, too. In this talk we'll show you how to power your own stuff from the sun, wind and other sources of energy. The talk is divided into 5 different parts: A really short introduction into the available power sources like sun, wind etc. We'll show some pipe-dreams where more hacking is needed to make it work like salt-gradient energy or damming the mediterranean sea. We'll show you how much power you can expect from which source. We'll also show you what affects power output for various technologies (example: Sun needs to be shining for solar power. We'll show you how much sunshine you can expect at your place.) As a follow-up to part 2 we'll show you the amount of power various things need. You can do the math yourself afterwards to see what you can power from your balcony. Building the system, the easy and fully-legal way: Build your own independent grid with optional storage. We'll show what you need for a small-scale solar system independent of the power network. Works well for caravans, camping, gardens and allotments. There will be real solar panels on stage. You will see schematics, parts lists and instructions. We'll give some hints where to aquire the necessary stuff without paying too much. The difficult way: Put your own power into the public grid. We'll show you what you need to do this. This can either make your purse fill up automatically (big installations earning feed-in tariffs) or it can (in theory) make your electricity meter go backwards - but that's not actually allowed. Once the electrical company recognizes what you are doing (and German law requires you to tell them) unfortunately they will install a digial meter. Digital meters will not count backwards like the Ferraris counters do now... The speakers have built and are operating various small-scale power systems and come from an engineering and commercial background.
-
-
12:18
»
Hack a Day
Some of the pinball machines which [Jeri Ellsworth] has restored have ended up in the break room at her work. We’re sure her coworkers are thankful for this, but sometimes they forget to turn off the power to the machines, and letting them run constantly means more frequent servicing will be necessary. She set out [...]
-
-
15:01
»
Hack a Day
[Ray's] breadboard power supply lets you drain the last traces of power from ‘dead’ AA batteries. Electronics that are powered off of disposable alkaline batteries have a cutoff voltage that usually leaves a fair amount of potential within. Since many municipal recycling programs don’t take the disposables (you’re just supposed to throw them in the [...]
-
-
11:01
»
Hack a Day
You won’t find [Antoine] stumbling around in the dark. He just finished working on this LED flashlight which draws power from a super-capacitor (translated). He realized that lighting a high-efficiency LED takes so little power that there are many benefits in play when deciding to move away from batteries. When compared to a super capacitor, batteries [...]
-
-
5:01
»
Hack a Day
Here are the power and driver boards that [Miceuz] designed to control a three-phase induction motor. This is his first time building such a setup and he learned a lot along the way. He admits it’s not an industrial quality driver, but it will work for motors that need 200 watts or less of power. [...]
-
-
14:32
»
Hack a Day
[Will] from RevoltLab wrote in to share part one of a cool project he is working on right now, a remote-controlled mobile rocket launcher. Before you run off and call the Department of Homeland Security, he says that the launcher will be used for personal hobby rockets, which are typically considered mostly harmless. The first [...]
-
-
11:01
»
Hack a Day
Building your first circuit is empowering, but make sure it’s not too empowering. [Jon] sent in a great tutorial of power protection circuits to make sure you don’t release the mystical blue smoke that make electronics work. There’s an in-depth tutorial of the classic series diode that’s the simplest of all power protection circuits. There’s not much to [...]
-
-
14:59
»
Hack a Day
[HammyDude] was tired of buying replacement batteries for his power tools. He had some Lithium Polymer batteries on hand and decided to take one of his dead drills and swap out the dead power pack. The orange battery pack you see above has a deans connector on it for use with RC vehicles. By opening [...]
-
-
14:01
»
Hack a Day
It seems that there’s a whole range of Toshiba Satellite laptop computers that suffer from a power jack design that is prone to breaking. We see some good and some bad in this. The jack is not mounted to the circuit board, so if it gets jammed into the body like the one above it [...]
-
-
11:01
»
Hack a Day
For years, [Rasmus] has left his computer connected directly to the mains power so that he can turn it on via Wake on Lan. While powered down, it would still continuously consume about 6W of electricity, but now that he didn’t need it to be on standby so often, he wanted to make it more [...]
-
-
7:01
»
Hack a Day
Instructables user [txoof] was unhappy with the fact that Olympus didn’t manufacture a wall power adapter for the E-510 camera and decided to do something about it. The resulting new power adapter is described in this article. What it amounts to is a fake battery pack made out of plywood. A 2.5mm DC power adapter [...]
-
-
16:24
»
Packet Storm Security Exploits
This Metasploit module exploits a buffer overflow in HP Power Manager's 'formExportDataLogs'. By creating a malformed request specifically for the fileName parameter, a stack-based buffer overflow occurs due to a long error message (which contains the fileName), which may result in arbitrary remote code execution under the context of 'SYSTEM'.
-
16:24
»
Packet Storm Security Recent Files
This Metasploit module exploits a buffer overflow in HP Power Manager's 'formExportDataLogs'. By creating a malformed request specifically for the fileName parameter, a stack-based buffer overflow occurs due to a long error message (which contains the fileName), which may result in arbitrary remote code execution under the context of 'SYSTEM'.
-
16:24
»
Packet Storm Security Misc. Files
This Metasploit module exploits a buffer overflow in HP Power Manager's 'formExportDataLogs'. By creating a malformed request specifically for the fileName parameter, a stack-based buffer overflow occurs due to a long error message (which contains the fileName), which may result in arbitrary remote code execution under the context of 'SYSTEM'.
-
-
8:01
»
Hack a Day
We often look at battery-operated hardware and shake our heads at the wastefulness of throwing away disposable batteries. There are some devices that minimize the waste, like those TV remotes that seem to never need new cells. But the C cells that [Quinn Dunki] kept replacing in her elliptical trainer were only lasting about three months at [...]
-
-
15:01
»
Hack a Day
Finally, the USB port on the back of your television can be tapped for something useful. [Don] is using this add-on device to automatically cut the power to his Ambilight clone. Initially, he got tired of unplugging the power adapter each time he shut off the television, so he added a switch. But laziness overcame [...]
-
-
12:01
»
Hack a Day
An inductor and 8-pin microcontroller are all that make up this barebones RFID tag. You might have done a double-take when first seeing the image above. After all, there’s nothing hooked up to the power and ground pins on the chip. As [Ramero Pareja] explains in his post, the power is actually supplied via the [...]
-
-
11:19
»
SecDocs
Authors:
Jonathan Pollet Tags:
SCADA Event:
Black Hat USA 2010 Abstract: SCADA Systems control the generation, transmission, and distribution of electric power, and Smart Meters are now being installed to measure and report on the usage of power. While these systems have in the past been mostly isolated systems, with little if no connectivity to external networks, there are many business and consumer issuing driving both of these technologies to being opened to external networks and the Internet. Over the past 10 years, we have performed over 100 security assessments on SCADA, EMS, DCS, AMI, and Smart Grid systems. We have compiled very interesting statistics regarding where the vulnerabilities in these systems are typically found, and how these vulnerabilities can be exploited. Of course, we can not disclose any specific exploits that will allow you to steal power from your neighbors, but we can give away enough meat in this session to expose common vulnerabilities at the device, protocol, application, host, and network layers.
-
-
11:01
»
Hack a Day
[Mark] wrote in to share a little creation that he is calling the first solar-powered 3D printer in existence. While we can’t say that we totally agree with him on that title, we will give him the benefit of the doubt that this is the first solar-powered RepRap we have seen thus far. You might [...]
-
-
8:04
»
Hack a Day
[Julian] wanted a way to remotely control various appliances and lights around his house without spending an arm and a leg on home automation. He also desired the ability to easily switch what items he was controlling without a ton of hassle. Since he couldn’t find anything reasonably priced to do what he desired, he [...]
-
-
6:09
»
Hack a Day
The LM317 is a favorite for many people who want quick, cheap, reliable and ajustable power. It only takes a few parts to set up and it does its job rather well. Sometimes though, you just need a power supply.While there are a million tutorials out there, not many go as in depth as [Phil] [...]
-
-
14:00
»
Hack a Day
[Quinn Dunki] got tired of messing around with wires when connecting things to her benchtop power supply, so she built herself useful little power bridge that plugs directly into any standard breadboard. The board is small and simple, but quite useful all the same. It was built to power both sides of the breadboard, and [...]
-
-
4:05
»
Hack a Day
As home automation becomes more and more popular, hackers and security experts alike are turning their attention to these systems, to see just how (in)secure they are. This week at DefCon, a pair of researchers demonstrated just how vulnerable home automation systems can be. Carrying out their research independently, [Kennedy] and [Rob Simon] came to [...]
-
-
11:38
»
Hack a Day
Here’s a rover project that has plenty of power (translated) to go places. This is true not only of its locomotive capability, but processing power as well. The RC car used here (translated) is not overly expensive, but offers a lot of versatility. It’s got front and rear steering via two servo motors, as well as independent [...]
-
-
10:22
»
Hack a Day
[Scott] found the iCufflinks from Adafruit Industries pretty interesting, but he thought that the stated run time of 24 hours was a bit short. He figured he could improve the product’s power consumption at least a little bit, to improve the overall battery life. From their schematics, he placed an order for parts and built [...]
-
-
15:30
»
Hack a Day
For a while now I have been battling a dying 2.6Ghz dual core computer, but due to laziness and budget I just let it ride. At first it would occasionally crash in games, then it got to where it would crash during routine activities. After a year of this it would nail 105 degrees C [...]
-
12:30
»
Hack a Day
Plasma speakers Apparently if you run AC and DC currents through a welding torch flame you can use the resulting plasma as a loudspeaker. [Thanks Cody] Power metering The Google Power Meter API is no longer in development but that didn’t stop [Pyrofer] from finishing his metering hardware. It uses a reflectance sensor to read [...]
-
-
15:01
»
Hack a Day
[Webby] inherited a cordless drill from his dad and when he finally got around to using it, found that the charger was dead in the water. He disassembled it and narrowed the issue down to the charger’s primary transformer, but didn’t know where to go from there. A friend suggested that the coil’s thermal fuse [...]
-
-
7:03
»
Hack a Day
[Frits] has been working on an solar panel heliostat (in Dutch, check out the translated page here). The heliostat uses a small PICAXE to control the motor, along with an DS1307 real-time clock to make sure the motors start at dawn. Instead of using optical encoders or magnetic sensors, the angle of the heliostat is [...]
-
-
8:01
»
Hack a Day
[Guido Socher] built himself a great little bench power supply that’s able to put out 30 Volts at 2 Amps. Instead of taking the easy way out by putting a few taps on an ATX power supply, this project was built around a generic 24 Volt laptop power brick. An ATmega8 generates a PWM signal [...]
-
-
10:01
»
Hack a Day
The power that a Graphics Processing Unit presents can be harnessed to do some dirty work when trying to crack passwords. [Vijay] took a look at some of the options out there for cracking passwords and found that utilizing the GPU produces the correct password in a fraction of the time. On a Windows machine [...]
-
-
4:19
»
Hack a Day
When dealing with electronics you need 1 key thing, electricity. For quite a while now if I needed 5 volts I would just grab my homebrew arduino, but that is not always handy and its tethered to the pc and it does not have 3v. If I wanted 3 volts, now I am digging around [...]
-
-
15:00
»
Hack a Day
If you’ve been hungry for more power for your microcontroller projects, but reluctant to dump your investment in Arduino shields or the libraries and community knowledge that go with them all, Digilent has you covered. Their new chipKIT boards are built around the Microchip PIC32 MCU…a powerful 32-bit chip that until recently was left out [...]
-
-
4:09
»
Hack a Day
[Paul] was pretty sure that he and his family used a lot of electricity throughout the day. Admittedly, he enjoys his creature comforts, but was wiling to try living a little greener. The problem was, he had no idea how much electricity he was using at a given time. While some power companies offer devices [...]
-
-
11:44
»
Hack a Day
[Matt's] boat had a trim plate that could be adjusted by hand. The problem with this setup is that the trim angle of a boat changes as you speed up or slow down. Last year he never really went over 35 MPH because of this issue, but he set out to correct that by adding [...]
-
-
21:25
»
SecDocs
Authors:
Joe Cummins Jonathan Pollet Tags:
SCADA Event:
Black Hat Abu Dhabi 2010 Abstract: SCADA Systems control the generation, transmission, and distribution of electric power, and Smart Meters are now being installed to measure and report on the usage of power. While these systems have in the past been mostly isolated systems, with little if no connectivity to external networks, there are many business and consumer issuing driving both of these technologies to being opened to external networks and the Internet. Over the past 10 years, we have performed over 100 security assessments on SCADA, EMS, DCS, AMI, and Smart Grid systems. We have compiled very interesting statistics regarding where the vulnerabilities in these systems are typically found, and how these vulnerabilities can be exploited. Of course, we can not disclose any specific exploits that will allow you to steal power from your neighbors, but we can give away enough meat in this session to expose common vulnerabilities at the device, protocol, application, host, and network layers.
-
21:25
»
SecDocs
Authors:
Joe Cummins Jonathan Pollet Tags:
SCADA Event:
Black Hat Abu Dhabi 2010 Abstract: SCADA Systems control the generation, transmission, and distribution of electric power, and Smart Meters are now being installed to measure and report on the usage of power. While these systems have in the past been mostly isolated systems, with little if no connectivity to external networks, there are many business and consumer issuing driving both of these technologies to being opened to external networks and the Internet. Over the past 10 years, we have performed over 100 security assessments on SCADA, EMS, DCS, AMI, and Smart Grid systems. We have compiled very interesting statistics regarding where the vulnerabilities in these systems are typically found, and how these vulnerabilities can be exploited. Of course, we can not disclose any specific exploits that will allow you to steal power from your neighbors, but we can give away enough meat in this session to expose common vulnerabilities at the device, protocol, application, host, and network layers.
-
-
10:24
»
Hack a Day
Hackaday forum member [machinelou] says he’s been fascinated with remote controlled hamster balls for quite some time. Inspired by a ball bot he saw on a BBC show, he finally picked up a 12″ plastic ball and got to work. He used a small drill to provide the power required to roll the ball, and [...]
-
-
6:01
»
Hack a Day
So let’s say you have a submarine, or a nuclear containment chamber which has walls made of thick metal. Now let’s say you want to transmit power or data through this wall. Obviously you’re not going to want to drill a hole since this wall is either keeping seawater out, or potential contamination in, but [...]
-
-
11:00
»
Hack a Day
Concerned with your project’s power consumption but don’t want to constantly leave an ammeter wired in series with your power supply? [Rajendra] feels your pain and has recently documented his solution to the problem: a variable-output bench top power supply that clearly displays load current consumption among other things! Everything is wired up in a [...]
-
-
11:30
»
Hack a Day
[Viktor] decided to replace his old power hungry home server with a model that is much easier on the old electric bill. The new motherboard uses an Intel Atom chip and consumes far less power than its predecessor. He figured there was no reason to use a bulky ATX power supply when all he needed [...]
-
-
4:02
»
Hack a Day
[Marc] is pretty unsatisfied with hard drive docking stations as a whole. He says they are typically slow and unreliable, causing him all sorts of grief while he is troubleshooting a questionable hard drive. He decided to take some of the mystery out of the troubleshooting equation and built a standalone SATA power module. Aware [...]
-
-
23:40
»
SecuriTeam
A potential security vulnerability has been identified with HP Power Manager (HPPM) running on Linux and Windows.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
14:02
»
Hack a Day
[Will] had a cheap power supply sitting around, and decided to turn it into a full-featured benchtop PSU. Inspired by some of the other benchtop supplies we have featured in the past, he decided that he wanted his PSU to be more than just a simple-looking box sitting on his work bench. Taking some cues [...]
-
19:45
»
SecuriTeam
A potential security vulnerability has been identified with HP Power Manager (HPPM) running on Linux and Windows.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
20:15
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Power Manager.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
10:50
»
Hack a Day
[Erich] spotted a broken DVD recorder at a local amateur radio meeting and decided to see if he could restore it to working order. While he was fortunate enough that someone labeled it as having a bad power supply, things aren’t always that easy. He gives a broad explanation as to how switched mode power [...]
-
-
9:00
»
Hack a Day
[Goodhart] is sharing his process for building a couple different AM radios. It’s surprising how few components he’s using; the first build is just a germanium diode, some wire, and a piezo earpiece. But it strikes us that both of the radios he gives build instructions for have no power source. We’re also amused by [...]
-
-
8:56
»
Hack a Day
It is easy to rely on the ratings marked on different tools, whether it is a power supply, scale, or speedometer. However calibration is essential for any part that is relied upon either professionally or for a hobby. [Jeremy] wanted to see if his Lomography camera shutter really was only open for 1/100ths of a second when [...]
-
-
9:15
»
Hack a Day
[Alan Yates] is building a persistence of vision display and needs a way to transfer power from the stationary base to the spinning circuitry. He’s decided to go with wireless energy transfer and he’s sharing all of his research and experiment data from the development process. It comes in two forms, the written version we [...]
-
-
8:00
»
Hack a Day
It’s been a while since there was any advances made in the field if celebratory high-five-ing. [Eli Skipp] just finished her contribution, moving the art forward by adding the sound of explosions to her high-fives. Ignore the audio sync problems in the video after the break to see her Arduino and Wave Shield based offering. [...]
-
-
12:04
»
Hack a Day
[Bill Porter] has joined in the pursuit of an inexpensive yet effective way to monitor his power usage. He calls his project the Not So Tiny Power Meter, and shared both his successes and follies involved in seeing it through to implementation. There are problems; sizing issues with enclosures and his PCB, issues with noise [...]
-
-
7:30
»
Hack a Day
We know that you can transform the mechanical motions of your body into electrical energy, like when you turn the crank or shake a mechanically-powered flashlight. These types of mechanical motions are quite large compared to many of the day-to-day (and minute-to-minute) actions you perform–for example walking, breathing, and thumb wrestling. What if we could [...]
-
-
11:44
»
SecuriTeam
Potential security vulnerabilities have been identified in HP Insight Control Power Management for Windows.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
6:18
»
Hack a Day
Powering your gadgets generally seems like a necessary evil. To help with this [Felipe La Rotta] made a really nice bench power supply using a PC power supply and a LM317 adjustable voltage regulator. PC power supplies are an example of a switched power supply(more on that later). The LM317 is a type of linear voltage regulator [...]
-
12:30
»
Hack a Day
If you’ve ever wanted to dive in and take a look at how memory hardware is implemented here is a good example of how to implement some latching circuits with ether BJT or CMOS transistors. BJTs require biasing resistors which increases the complexity and power consumption when compared to CMOS. If power consumption isn’t an issue you [...]
-
-
8:41
»
Hack a Day
[Riley Porter] posted a picture of his EvalBot USB power hack. In the photo above we’ve put a box around D6 and D7. The development board ships with a 0 Ohm resistor in the D7 location, patching in power from the USB-B connector labeled USB DEVICE. He found that by moving that resistor to D6 [...]
-
-
13:00
»
Hack a Day
[Ladyada] is working on a tutorial series covering power supplies. If you’ve ever built an electronic project you’ve used some type of power supply but we think that most people have no idea how you get from mains power to the DC voltages that most small projects use. So if you want to learn, get [...]
-
-
7:18
»
Hack a Day
This is a bench power supply with adjustable voltage and current limiting. [Sylvain's] creation can regulate 0-25 volts while sourcing 0-5 amps. Current limiting is a nice feature as it will allow you to test your prototypes to ensure the power regulator you choose will not be over or underpowered. This supply is really a [...]
-
-
8:58
»
Hack a Day
This programmable power supply is the perfect addition to your bench tools. [Debraj Deb], who previously built a whole house power monitor, designed this build around a PIC 18F4520 microcontroller. The desired voltage is set with an attached keypad, resulting in a digital output on the 8-bits of port D. The port connects to another [...]
-
-
15:00
»
Hack a Day
We’ve all known the MSP430s under the Launchpad are designed to be low power, but who wants to bet how long the chip can last on only 20F worth of capacitors? A couple of hours? A day at max? [Kenneth Finnegan] setup a MSP430 with supercaps to find out. To make sure the chip is [...]
-
-
14:00
»
Hack a Day
[Graham Auld] got his hands on an energy monitor for free from his utility company. The device seen in the insert provides a nice LCD display but he wanted a way to graph the data over time. There was an included cable and a method of using Google PowerMeter but only for Windows computers. He [...]
-
-
8:00
»
Hack a Day
The EEVblog is on a roll with interesting topics lately. In the latest episode [Dave] takes us through the nitty-gritty of switch mode power supply design. Using DC-DC converter IC’s in not especially hard. The datasheets tend to have fairly good usage schematics but there’s always a bit of heartache that goes into figuring out [...]
-
-
6:50
»
Hack a Day
For those who do fancy photography, setting up the lighting ends up being one of the larger tasks of each session. There are flashes out there that can be controlled via a remote control to help ease the process, but they can cost a considerable amount more. [Dsvilko] shares with us a fairly simple circuit [...]
-
-
12:00
»
Hack a Day
[Ken] needed to supply 3.3 volts of regulated power. He started by using a linear voltage regulator but after a few calculations he discovered that 72% of what he put in was lost to heat. The solution to this is a switched-mode power supply. Rather than burn off energy through a voltage divider, an SMPS turns [...]
-
-
7:59
»
Hack a Day
[Jeri's] back with a series of videos that outlines the step-by-step electroluminescent wire manufacturing, making EL panels from PCBs, and assembling power supplies for EL hardware. These concepts are actually quite approachable, something we don’t expect from someone who makes their own integrated circuits at home. The concept here is that an alternating current traveling [...]
-
-
13:03
»
Hack a Day
[Mark Bog] thought it was a waste to use batteries for his desktop touch pad. Quite frankly we agree that if you can avoid using disposable cells you should. He ditched the dual AA batteries inside of his Magic Trackpad and built a battery-sized adapter to feed it some juice. It consists of a dowel [...]
-
-
7:00
»
Hack a Day
[Jim] was the happy recipient of 11 non working Itona VXL thin clients. The units he received were 800Mhz CPUs with 256 MB of Ram and 256MB of storage. None would power up. Upon internal inspection, he found a common theme. Leaky bulging capacitors in the power supplies. Since these came with custom 50W power [...]
-
-
20:08
»
SecuriTeam
Vulnerabilities were discovered affecting HP Insight Control Power Management for Windows.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
11:00
»
Hack a Day
Back to the Future Part 2 provided a glimpse of a future that included hover boards and holographic advertisements. But you don’t have to wait until 2015 to get your hands on at least some of the technology. [Blake Bevin] has produced a pair of shoes with power laces as seen in the film. Of course [...]
-
-
13:00
»
Hack a Day
[Gigawatts] struggled against a shoddy Internet connection for quite some time. Changing modems, having the line serviced, and spending far too much time on the phone didn’t do any good. In fact, the only thing that fixed the problem was power cycling the modem once it stopped responding. His solution was to automate the power [...]
-
-
11:39
»
Hack a Day
Amidst the noise of a bazillion robots and Tesla coils at the 2010 Bay Area Maker Faire, we located a bubble of usable WiFi, and got a nearby power charge to boot. If nothing else here, we want this: The SolarPump Charging Station is a self-contained oasis of free power for laptops, cel phones and [...]
-
-
8:00
»
Hack a Day
[Scott] over at curiousinventor.com has posted an instructable detailing how to use an Arduino and a power drill to spool solder. The Arduino senses the speed that the drill is going via an opto interrupter and a laser and adjusts with a servo hooked to the trigger. While we don’t think many people will be [...]
-
-
9:59
»
Hack a Day
Hackaday’s own [Devlin Thyne] has been working with Adafruit to come up with a way to use the Tweet-a-Watt along with Google Power Meter. Back in March we put out the word that Google had unveiled the API for Power Meter and [Devlin] is the first we’ve heard of to come up with a way [...]
-
-
12:12
»
Hack a Day
At first we thought this looked hastily thrown together and quite possible useless. Then we watched the video, embedded after the break, and realized it is quite a handy bench sander. [Mhkabir] opened up an older hard drive, removed the read head, and added a piece of carefully cut sand paper. When you hook it [...]
-
-
8:00
»
Hack a Day
Update: This How-To was written for April Fools’ Day. It is not advised you attempt to make or even use this cable. The comments have made it very clear how dangerous to you and others using this cable can be. The image above is not of a full male-to-male cable, only the ground is connected, [...]
-
-
10:00
»
Hack a Day
Here’s an interesting idea: replace a disposable coin cell battery with a capacitor in order to filter the noise from an external power supply. [David Cook] is taking advantage of the falling costs of digital calipers. He’s mounted one on his milling machine but noticed that with an external power supply the readings would sometimes [...]
-
8:00
»
Hack a Day
Hub motors put the power inside of the wheel. [Teamtestbot] goes deep into the hows and whys of building these motors, from parts, to windings, to the math behind the power ratios. The working example puts an electric motor inside the rear wheel of a Razor scooter. Past projects used belts to transfer the work [...]
-
-
21:13
»
SecDocs
Tags:
cryptography hardware hacking power analysis Event:
Chaos Communication Congress 26th (26C3) 2009 Abstract: The power consumtion of a microcontroller depends on the actual data being processed. This renders current-based side channel attacks possible: By recording and analyzing the current consumption of a microcontroller, one can recover secret keys. This can be done using Differential Power Analysis (DPA). While smartcards and other tamper resistant devices usually implement countermeasures to complicate this kind of attack, most consumer hardware isn't DPA-safe. DPA will be explained by example in this talk: A non-hardened, but conventional AES implementation running on a popular AVR microcontroller will be attacked. Real-world power data will be used for analysis. After explaining the basic idea and the way DPA works, the workflow will be described in detail along with hardware/software requirements and the measurement setup. The measurement process will be explained as well. Prior to analyzing the recorded data, necessary theoretical foundations will be shown without going too much into mathematical details. Common challenges one might encounter while mounting a DPA-attack will be presented as well as suitable approaches to cope with them. It's the intention of this talk to show that all one needs to conduct a DPA is a half-decent digital storage oscilloscope (DSO) and a bit of electronics & software knowledge.
-
21:13
»
SecDocs
Tags:
cryptography hardware hacking power analysis Event:
Chaos Communication Congress 26th (26C3) 2009 Abstract: The power consumtion of a microcontroller depends on the actual data being processed. This renders current-based side channel attacks possible: By recording and analyzing the current consumption of a microcontroller, one can recover secret keys. This can be done using Differential Power Analysis (DPA). While smartcards and other tamper resistant devices usually implement countermeasures to complicate this kind of attack, most consumer hardware isn't DPA-safe. DPA will be explained by example in this talk: A non-hardened, but conventional AES implementation running on a popular AVR microcontroller will be attacked. Real-world power data will be used for analysis. After explaining the basic idea and the way DPA works, the workflow will be described in detail along with hardware/software requirements and the measurement setup. The measurement process will be explained as well. Prior to analyzing the recorded data, necessary theoretical foundations will be shown without going too much into mathematical details. Common challenges one might encounter while mounting a DPA-attack will be presented as well as suitable approaches to cope with them. It's the intention of this talk to show that all one needs to conduct a DPA is a half-decent digital storage oscilloscope (DSO) and a bit of electronics & software knowledge.
-
-
4:17
»
Hack a Day
[Manekinen] built a power supply monitor based around an AVR ATtiny13. Voltage and amperage are displayed on a 16×2 LCD character display (we’re not sure what the third number is… samples per second?). This is no small feat considering that the tiny13 is an 8-pin chip. He makes it happen by using the pins for [...]
-
-
21:03
»
SecDocs
Authors:
Eleanor Saitta Tags:
culture Event:
Chaos Communication Congress 26th (26C3) 2009 Abstract: Architecture and urban planning play a huge role in our lives, to a degree not always obvious. The city, however, can be seen as just another system—like any other, it can be hacked, illuminating and subverting existing power structures and creating spaces that allow us to be more human and to live richer lives. In this talk, we'll see a bunch of the challenges of the modern city and look at possible responses. Architecture and urban planning define much of the world we interact with. This has a wide variety of deep and not always immediately obvious effects—everything from the kinds of things we can do in public spaces to the kinds of families we can live with. While the transparency and responsiveness to actual community need varies, even the best architecture is a usually conservative. The cities we end up with rarely allow us the kind of flexibility and humanity that we want. Cities, buildings, infrastructure, all of these things are systems. They are heavily politicized with embodied power structures on a number of different levels—structural, functional, aesthetic, economic, political, and social. At each level, we can intervene, alter those power structures, and create the spaces we need and want. Architecture is generally the domain of the rich and powerful, but it doesn't have to be—we can intervene and hack the city. During this talk, I'll spend a bit of time exploring the power structures of the modern city at the level of architecture and urban planning. Then, for the bulk of the talk, I'll look at a bunch of different techniques—prototypes for ways we as individuals can subvert the city. Let's get outside the design-culture consumer conversation around architecture and urban futurism, and actually change our cities, one brick at a time!
-
21:03
»
SecDocs
Authors:
Eleanor Saitta Tags:
culture Event:
Chaos Communication Congress 26th (26C3) 2009 Abstract: Architecture and urban planning play a huge role in our lives, to a degree not always obvious. The city, however, can be seen as just another system—like any other, it can be hacked, illuminating and subverting existing power structures and creating spaces that allow us to be more human and to live richer lives. In this talk, we'll see a bunch of the challenges of the modern city and look at possible responses. Architecture and urban planning define much of the world we interact with. This has a wide variety of deep and not always immediately obvious effects—everything from the kinds of things we can do in public spaces to the kinds of families we can live with. While the transparency and responsiveness to actual community need varies, even the best architecture is a usually conservative. The cities we end up with rarely allow us the kind of flexibility and humanity that we want. Cities, buildings, infrastructure, all of these things are systems. They are heavily politicized with embodied power structures on a number of different levels—structural, functional, aesthetic, economic, political, and social. At each level, we can intervene, alter those power structures, and create the spaces we need and want. Architecture is generally the domain of the rich and powerful, but it doesn't have to be—we can intervene and hack the city. During this talk, I'll spend a bit of time exploring the power structures of the modern city at the level of architecture and urban planning. Then, for the bulk of the talk, I'll look at a bunch of different techniques—prototypes for ways we as individuals can subvert the city. Let's get outside the design-culture consumer conversation around architecture and urban futurism, and actually change our cities, one brick at a time!
-
21:03
»
SecDocs
Authors:
Eleanor Saitta Tags:
culture Event:
Chaos Communication Congress 26th (26C3) 2009 Abstract: Architecture and urban planning play a huge role in our lives, to a degree not always obvious. The city, however, can be seen as just another system—like any other, it can be hacked, illuminating and subverting existing power structures and creating spaces that allow us to be more human and to live richer lives. In this talk, we'll see a bunch of the challenges of the modern city and look at possible responses. Architecture and urban planning define much of the world we interact with. This has a wide variety of deep and not always immediately obvious effects—everything from the kinds of things we can do in public spaces to the kinds of families we can live with. While the transparency and responsiveness to actual community need varies, even the best architecture is a usually conservative. The cities we end up with rarely allow us the kind of flexibility and humanity that we want. Cities, buildings, infrastructure, all of these things are systems. They are heavily politicized with embodied power structures on a number of different levels—structural, functional, aesthetic, economic, political, and social. At each level, we can intervene, alter those power structures, and create the spaces we need and want. Architecture is generally the domain of the rich and powerful, but it doesn't have to be—we can intervene and hack the city. During this talk, I'll spend a bit of time exploring the power structures of the modern city at the level of architecture and urban planning. Then, for the bulk of the talk, I'll look at a bunch of different techniques—prototypes for ways we as individuals can subvert the city. Let's get outside the design-culture consumer conversation around architecture and urban futurism, and actually change our cities, one brick at a time!
-
-
12:00
»
Hack a Day
[Kenneth] built a 5v controlled power outlet inside of a junction box. We’ve seen plenty of projects that can switch 120v outlets using 5v logic for refrigerator controllers, lighting controllers, or grow systems, but they almost always use solid state relays to facilitate the switching. This iteration uses mechanical relays along with the necessary protection [...]
-
-
21:02
»
SecDocs
Authors:
Davor Emard Tags:
wireless engineering Event:
Chaos Communication Congress 26th (26C3) 2009 Abstract: Wireless power is a most wanted technology. It has already been invented by Nikola Tesla in 1888. The speaker read the papers, reproduced the theoretical and practical results. The theoretical idea to get highly efficient wireless power transmission is to separate the electric from the magnetic field, because magnetic field lines are closed curves near the device, while the electric field lines reach to infinity and receiver only needs common ground (the earth). This is done by special requirements to the sender and receiver antennas (form of the coil). The antenna form has been modeled in the software nec2 (variant xnec2c on debian). A lowcost PET bottle serves as the hull of the coil. Around 200 windings of insulated copper wire are manually applied to the bottle. A transmission in the range of 10 meters was reached, the power used is 100mW, from signal generator amplitude 10V and 1 MHz frequency. This will be shown. Tesla Long Distance High-Power and High-Efficiency Wireless Energy Transmission is still a mystery to our technology. To better understand his claims that power can be transmitted to any distance on Earth with insignificant losses, and to see what challenges does this pose to the current technology, two simple prototypes of Tesla Magnifier have been built. Understanding of the working principle was needed to build the prototypes with modern materials. All data was readily available on Internet: original Tesla's patents and articles from 1891-1919 related to wireless energy tramission. Information have led to optimal calculation of geometry for a Tesla Magnifier, a kind of resonant antenna used to transmit and/or receiver power. In replicated prototype the oscillatory mode has been determined by measuring phase and magnitude of current and voltage at magnifier's feed line. Some unexpected electrical conditions have been observed which were accurately reproduced using computer models in SPICE (electronic circuit simulation) and NEC2 (antenna simulation and electomagnetic field visualization). Simulation has revealed geometry of the field around the Tesla Magnifier and it differs from the field around ordinary radio antenna (which radiates transversal electromagnetic wave) and could be a clue for faster-than-light energy transfer on planetary scale which Tesla claimed in his patents and articles.
-
21:02
»
SecDocs
Authors:
Davor Emard Tags:
wireless engineering Event:
Chaos Communication Congress 26th (26C3) 2009 Abstract: Wireless power is a most wanted technology. It has already been invented by Nikola Tesla in 1888. The speaker read the papers, reproduced the theoretical and practical results. The theoretical idea to get highly efficient wireless power transmission is to separate the electric from the magnetic field, because magnetic field lines are closed curves near the device, while the electric field lines reach to infinity and receiver only needs common ground (the earth). This is done by special requirements to the sender and receiver antennas (form of the coil). The antenna form has been modeled in the software nec2 (variant xnec2c on debian). A lowcost PET bottle serves as the hull of the coil. Around 200 windings of insulated copper wire are manually applied to the bottle. A transmission in the range of 10 meters was reached, the power used is 100mW, from signal generator amplitude 10V and 1 MHz frequency. This will be shown. Tesla Long Distance High-Power and High-Efficiency Wireless Energy Transmission is still a mystery to our technology. To better understand his claims that power can be transmitted to any distance on Earth with insignificant losses, and to see what challenges does this pose to the current technology, two simple prototypes of Tesla Magnifier have been built. Understanding of the working principle was needed to build the prototypes with modern materials. All data was readily available on Internet: original Tesla's patents and articles from 1891-1919 related to wireless energy tramission. Information have led to optimal calculation of geometry for a Tesla Magnifier, a kind of resonant antenna used to transmit and/or receiver power. In replicated prototype the oscillatory mode has been determined by measuring phase and magnitude of current and voltage at magnifier's feed line. Some unexpected electrical conditions have been observed which were accurately reproduced using computer models in SPICE (electronic circuit simulation) and NEC2 (antenna simulation and electomagnetic field visualization). Simulation has revealed geometry of the field around the Tesla Magnifier and it differs from the field around ordinary radio antenna (which radiates transversal electromagnetic wave) and could be a clue for faster-than-light energy transfer on planetary scale which Tesla claimed in his patents and articles.
-
-
10:48
»
remote-exploit & backtrack
Whilst running my eeepc 701sd on battery am I getting the full 500mw from my awus036h when
It is connected using a single usb lead or do I need to use the double headed lead that
Came with it. Please advise