«
Expand/Collapse
33 items tagged "processing"
Related tags:
hacks [+],
overflow [+],
based buffer overflow [+],
xpdf [+],
security vulnerabilities [+],
jbig [+],
service vulnerability [+],
denial of service [+],
sun raster [+],
ras [+],
proof of concept [+],
flashpix images [+],
flashpix [+],
dll module [+],
video [+],
security [+],
radio spectrum [+],
high bandwidth [+],
gsm [+],
file [+],
encryption [+],
chaos communication congress [+],
buffer overflow vulnerability [+],
arduino [+],
android [+],
zoetrope [+],
xnview [+],
wpu [+],
working [+],
weird [+],
video streams [+],
video game industry [+],
unit [+],
u file [+],
two colors [+],
strange hobby [+],
snmp [+],
sketch [+],
safer use [+],
research students [+],
remote buffer overflow [+],
regular expression [+],
project strings [+],
processsing [+],
privilege escalation vulnerability [+],
port expanders [+],
port expander [+],
port [+],
png [+],
perl [+],
password [+],
party lighting [+],
party [+],
parameter [+],
overflow vulnerability [+],
oscar [+],
operating system [+],
mp3 cutter [+],
misc [+],
microcontrollers [+],
michael [+],
message [+],
mbm [+],
local privilege escalation [+],
limiting factor [+],
libsndfile [+],
led [+],
laser cutter [+],
knowledge [+],
kinect [+],
jetaudio [+],
jer [+],
integer overflow [+],
heap [+],
graphics processing unit [+],
gpus [+],
gpu [+],
google [+],
gnu ed [+],
gnu [+],
glpng [+],
git [+],
georgia tech [+],
fun project [+],
force [+],
file processing [+],
extent [+],
expression [+],
economic sense [+],
dithering [+],
cutter [+],
cowon america [+],
cowon [+],
computational theory [+],
cisco ios [+],
celery [+],
caf [+],
brevet [+],
bluetooth devices [+],
bluetooth communications [+],
bluetooth [+],
audio [+],
argument [+],
animated image [+],
analyzing [+],
america [+],
Hardware [+]
-
-
13:01
»
Hack a Day
To be honest, we’ve heard of dithering but that’s the extent of our knowledge on the topic. After looking through [Windell's] post about using Dithering in Processing we can now say we’ve got a base of knowledge on the topic. Dithering is used to produce an image out of two colors that our eyes can [...]
-
10:01
»
Hack a Day
It’s our understanding that the video game industry has long been a driving force in new and better graphics processing hardware. But they’re not the only benefactors to these advances. As we’ve heard before, a graphics processing unit is uniquely qualified to process encryption hashes quickly (we’ve seen this with bitcoin mining). This project strings [...]
-
-
7:01
»
Hack a Day
[Tomáš], a.k.a. [Frooxius] is playing around with computational theory and processor architectures – a strange hobby in itself, we know – and has created the strangest CPU we’ve ever seen described. The Weird Processing Unit, or WPU, isn’t designed like the Intel or ARM CPU in your laptop or phone. No, the WPU is a [...]
-
-
9:47
»
Packet Storm Security Exploits
A boundary error in the Xfpx.dll module when processing FlashPix images can be exploited to cause a heap-based buffer overflow via a specially crafted FPX file. Proof of concept included.
-
9:47
»
Packet Storm Security Recent Files
A boundary error in the Xfpx.dll module when processing FlashPix images can be exploited to cause a heap-based buffer overflow via a specially crafted FPX file. Proof of concept included.
-
9:47
»
Packet Storm Security Misc. Files
A boundary error in the Xfpx.dll module when processing FlashPix images can be exploited to cause a heap-based buffer overflow via a specially crafted FPX file. Proof of concept included.
-
9:44
»
Packet Storm Security Exploits
An integer truncation error when processing Sun Raster images can be exploited to cause a heap-based buffer overflow via a specially crafted "Depth" value in a RAS file. Proof of concept included.
-
9:44
»
Packet Storm Security Recent Files
An integer truncation error when processing Sun Raster images can be exploited to cause a heap-based buffer overflow via a specially crafted "Depth" value in a RAS file. Proof of concept included.
-
9:44
»
Packet Storm Security Misc. Files
An integer truncation error when processing Sun Raster images can be exploited to cause a heap-based buffer overflow via a specially crafted "Depth" value in a RAS file. Proof of concept included.
-
-
21:50
»
SecDocs
Authors:
Karsten Nohl Sylvain Munaut Tags:
GSM sniffer Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: GSM is still the most widely used security technology in the world with a user base of 5 billion and a quickly growing number of critical applications. 26C3's rainbow table attack on GSM's A5/1 encryption convinced many users that GSM calls should be considered unprotected. The network operators, however, have not woken up to the threat yet. Perhaps the new capabilities to be unleashed this year – like wide-band sniffing and real-time signal processing – will wake them up. Now that GSM A5/1 encryption can be cracked in seconds, the complexity of wireless phone snooping moved to signal processing. Since GSM hops over a multitude of channels, a large chunk of radio spectrum needs to be analyzed, for example with USRPs, and decoded before storage or decoding. We demonstrate how this high bandwidth task can be achieved with cheap programmable phones.
-
-
21:29
»
SecDocs
Authors:
Karsten Nohl Sylvain Munaut Tags:
GSM sniffer Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: GSM is still the most widely used security technology in the world with a user base of 5 billion and a quickly growing number of critical applications. 26C3's rainbow table attack on GSM's A5/1 encryption convinced many users that GSM calls should be considered unprotected. The network operators, however, have not woken up to the threat yet. Perhaps the new capabilities to be unleashed this year – like wide-band sniffing and real-time signal processing – will wake them up. Now that GSM A5/1 encryption can be cracked in seconds, the complexity of wireless phone snooping moved to signal processing. Since GSM hops over a multitude of channels, a large chunk of radio spectrum needs to be analyzed, for example with USRPs, and decoded before storage or decoding. We demonstrate how this high bandwidth task can be achieved with cheap programmable phones.
-
-
14:01
»
Hack a Day
[Oscar] shows us how to use a Processing sketch for Android to communicate with Bluetooth devices (translated). It turns out this is easier than you might think. Processing and Android are both closely related to Java, and you can just import the Android libraries that deal with Bluetooth within the Processing sketch. That makes it easy to enable [...]
-
-
7:08
»
Hack a Day
[Michael] from Nootropic Design wrote in to share an interesting and fun project he put together using one of the products his company sells. The gadget in question is their “Video Experimenter” shield which was designed for the Arduino. It is typically used to allow the manipulation of composite video streams via overlays and the [...]
-
-
7:08
»
Hack a Day
There are times when you don’t need much processing power for your project but you do need a lot of I/O pins. It often doesn’t make economic sense to choose a larger microcontroller just to get extra pins so the answer is to use a port expander chip. [Raendra] posted a guide for using one [...]
-
-
6:37
»
Hack a Day
A zoetrope is a device that contains a disk full with a series of images that make up and animation. A couple of different methods can be used to trick the eye into seeing a single animated image. In the past this was done by placing the images inside of a cylinder with slits at [...]
-
-
11:00
»
Hack a Day
[Thibault Brevet] wanted his own party lighting that pulsed and faded along with the tunes. He ended up building a system based on an Arduino and a PC running Processing. The output from a mixing board is fed into a PC and measured by the Processing script. From there, the calculated light levels are sent [...]
-
-
22:15
»
SecuriTeam
Two vulnerabilities were discoverd in glpng, which can be exploited by malicious people to compromise an application using the library.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
8:29
»
Hack a Day
Processsing has come to Android. [Jer] posted a guide to setting up the software and coding your first Processing app for Android. The module which supports Google’s mobile operating system is not yet part of the stable Processing release but it works and is available to download and use. It provides support for Android version [...]
-
-
13:07
»
Hack a Day
Recently, research students at Georgia Tech released a report outlining the dangers that GPUs pose to the current state of password security. There are a number of ways to crack a password, all with their different pros and cons, but when it comes down to it, the limiting factor in all of these methods is [...]