«
Expand/Collapse
353 items tagged "project"
Related tags:
service vulnerability [+],
robots [+],
linux [+],
denial of service [+],
open [+],
digital [+],
stack buffer [+],
musical [+],
malformed request [+],
led [+],
development [+],
buffer overflow [+],
audio [+],
attacker [+],
Software [+],
wikipedia [+],
transportation [+],
tor [+],
project authors [+],
nfs [+],
news [+],
microcontroller [+],
google [+],
cnc [+],
android [+],
agora [+],
Hardware [+],
tonnerre [+],
the rise [+],
sql [+],
peripherals [+],
opensource project [+],
opensource [+],
misc [+],
mark [+],
mail readers [+],
lot [+],
fpga [+],
foss [+],
cross site scripting [+],
compute [+],
clock [+],
classic [+],
asterisk [+],
project security [+],
window of time [+],
whiteit [+],
web [+],
voicemail account [+],
usa [+],
union [+],
tor event [+],
tool [+],
talk [+],
state of lower saxony [+],
squeak [+],
slides [+],
sip [+],
shell commands [+],
segmentation fault [+],
security tradeoffs [+],
saudi arabia [+],
rport [+],
roger dingledine [+],
roger [+],
project version [+],
professional developers [+],
pier [+],
open source intelligence [+],
number [+],
null pointer [+],
nat force [+],
nat [+],
music class [+],
mr schnemann [+],
meter [+],
medical [+],
matrix [+],
marcus denker [+],
manager interface [+],
malicious user [+],
lower [+],
logic chips [+],
lecture reports [+],
joe geek [+],
jimmy wales [+],
home [+],
holger krekel [+],
hacking [+],
hackaday [+],
fpga technology [+],
fink [+],
file [+],
felix domke [+],
european [+],
europe [+],
environment [+],
encyclopedia project [+],
day [+],
controller [+],
control [+],
code execution [+],
code [+],
client implementation [+],
christian bahls [+],
china [+],
buffer [+],
box [+],
black hat [+],
authors [+],
arbitrary rule [+],
ara [+],
apache servers [+],
anonymity [+],
adas [+],
Community [+],
21c3 [+],
security [+],
security advisory [+],
year [+],
wikipedia encyclopedia [+],
wearable [+],
way [+],
veronica [+],
unicode normalization [+],
tutorial [+],
tim starling tags [+],
technology [+],
supply [+],
sputnik [+],
source [+],
selinux [+],
radio [+],
quinn dunki [+],
project boxes [+],
project authority [+],
project 2 [+],
playstation [+],
pcs [+],
module [+],
midi [+],
mediawiki [+],
machine [+],
logic [+],
leds [+],
led matrix [+],
laser cutter [+],
kinect [+],
keyboard [+],
inexpensive technology [+],
how to [+],
hook [+],
honeynet project [+],
honeynet [+],
homebrew [+],
hardware schematics [+],
harald welte [+],
green [+],
fun project [+],
freeware project [+],
file upload [+],
event [+],
efficiency [+],
diy [+],
display [+],
dino [+],
critical gaps [+],
crash analysis [+],
cool project [+],
computer [+],
cellphones [+],
cart [+],
bluetooth [+],
bit [+],
authority [+],
athens [+],
application crash [+],
android project [+],
analyser [+],
alexa [+],
alex [+],
adk [+],
ARM [+],
chaos communication congress [+],
zork [+],
zigbee [+],
zero day [+],
yellow flag [+],
yamaha dd35 [+],
yamaha [+],
y combinator [+],
wristwatch [+],
workshop [+],
wipeout [+],
william [+],
white walls [+],
welts [+],
webpage [+],
wavsep [+],
water droplets [+],
water [+],
warns [+],
wall [+],
vulnerability scanner [+],
vulnerability assessment [+],
vulnerabilities [+],
vram [+],
vitor [+],
visualizing [+],
vision [+],
videographer [+],
vga output [+],
vga monitor [+],
vga [+],
vector graphics [+],
use [+],
usb connection [+],
usb [+],
upverter [+],
upload [+],
update [+],
ulysses [+],
ultimate [+],
ubertooth [+],
two versions [+],
tweets [+],
turret [+],
turntables [+],
tuitwall [+],
ttl [+],
tricorder [+],
tricoder [+],
travis goodspeed [+],
toy tank [+],
toy car [+],
touched [+],
toaster oven [+],
toaster [+],
tiny [+],
tindie [+],
timer [+],
time [+],
three quarters [+],
thesis project [+],
thatcher [+],
test project [+],
temperature display [+],
tdd [+],
taser [+],
target hardware [+],
tank [+],
tandem bicycle [+],
tags [+],
t cross [+],
sweet tunes [+],
swarthmore college [+],
surface [+],
subtitle [+],
student design competition [+],
student [+],
stroboscope [+],
store [+],
steven [+],
steve lee [+],
step project [+],
staple [+],
square blocks [+],
speaker project [+],
spanish translation [+],
space nasa [+],
space [+],
sous vide [+],
sound o [+],
sorts [+],
solver [+],
solidoodle [+],
software portion [+],
software interface [+],
software developers [+],
socher [+],
snake robot [+],
snake game [+],
snake [+],
smart tweezers [+],
sleep research [+],
skipp [+],
sketch [+],
single board [+],
singapore [+],
siamese twins [+],
siamese [+],
sheraz [+],
shell [+],
shay chen [+],
shawn mccombs [+],
servers [+],
serial port [+],
serial interface [+],
seneca college [+],
segway [+],
security vulnerabilities [+],
sebastian thrun [+],
sebastian [+],
screen [+],
scratch [+],
scott [+],
scope [+],
science fair project [+],
science [+],
school teachers [+],
school [+],
scarf [+],
scanner evaluation [+],
scale [+],
santiago [+],
samuel cervantes [+],
sam [+],
ryan [+],
russell [+],
royal enfield [+],
roy [+],
round [+],
rocco [+],
robotic arm control [+],
robotic arm [+],
robot arm [+],
robot [+],
risk project [+],
rhys [+],
rgb leds [+],
rgb [+],
resistors [+],
resin [+],
researchers [+],
research time [+],
reprap [+],
replicas [+],
renaud deraison [+],
remove [+],
remote shell [+],
reflow [+],
recreating [+],
reconstructme [+],
receiver board [+],
receiver [+],
rebecca strauss [+],
real world [+],
real time clock [+],
real [+],
read [+],
rapid eye movements [+],
raphael schwartz [+],
rainbow [+],
quinn [+],
quick [+],
quadcopter [+],
pymcu [+],
pvc elbow [+],
ps2 keyboard [+],
ps 2 [+],
proxy [+],
proximity sensors [+],
protoboard [+],
proof of concept [+],
projector [+],
projection screen [+],
projection [+],
project octopus [+],
project hosts [+],
project controller [+],
privacy workshop [+],
privacy event [+],
privacy [+],
printer [+],
preamp [+],
power symbol [+],
power supply [+],
power [+],
poster child [+],
portal [+],
polyester resin [+],
pnp transistor [+],
pleasing results [+],
playstation 3 [+],
playing chess [+],
player [+],
playback [+],
plastic recorders [+],
plastic boxes [+],
pixar style [+],
pipe [+],
ping pong balls [+],
pile [+],
piano keyboard [+],
piano [+],
photocell [+],
phono preamp [+],
phono [+],
phone [+],
phobia [+],
phillip torrone [+],
philco radio [+],
philco model [+],
peter brinkman [+],
personality [+],
personal web pages [+],
perfect project [+],
pendants [+],
pen plotter [+],
pedal to the metal [+],
pcbs [+],
pcb [+],
pc. his [+],
pc [+],
paul [+],
party [+],
paraegis [+],
output [+],
oscilloscopes [+],
oscilloscope project [+],
oscilloscope [+],
oscillator [+],
original project [+],
oral histories [+],
optical tomography [+],
optical sensor [+],
open source software [+],
open source project [+],
open source hardware [+],
open source [+],
open hardware [+],
on dash [+],
old technology [+],
old school [+],
octopus [+],
notifier [+],
non existant [+],
nokia 6110 [+],
nischal [+],
new zealand [+],
networks project [+],
nessus project [+],
nessus [+],
nerdkits [+],
neat project [+],
nav [+],
nathan brodell [+],
music service [+],
music generation [+],
music [+],
multiple [+],
msp [+],
mp3 decoder [+],
motorcycle [+],
motor cortex [+],
motor [+],
motive force [+],
mobile phone [+],
mitchel [+],
minimum investment [+],
minesweeper [+],
minecraft [+],
mimicing [+],
milling machine [+],
milling [+],
mill [+],
mike rankin [+],
mike mitchel [+],
mike doell [+],
mike [+],
midi keyboard [+],
midi controller [+],
microsoft surface [+],
microsd card [+],
microprocessor [+],
michelle annett [+],
michelle [+],
michael ossmann [+],
michael abed [+],
michael [+],
mice [+],
mettle [+],
medusa [+],
mechanical fingers [+],
mcus [+],
mcafee [+],
mbedconsole [+],
mavili [+],
matt turner [+],
matt oehrlein [+],
matt hanson [+],
matt [+],
matrix project [+],
mark wronkiewicz [+],
manchester encoding [+],
manchester [+],
man operation [+],
maiden voyage [+],
mac [+],
luxo jr [+],
luis de matos [+],
lucid dreams [+],
lucid [+],
low gravity [+],
louisville [+],
lou [+],
lockpicking [+],
living room [+],
lithium based [+],
linux box [+],
line of sight [+],
limor fried [+],
limor [+],
levers pulleys [+],
led lamp [+],
leaps and bounds [+],
laying on of hands [+],
law [+],
last christmas [+],
laser cut [+],
land mines [+],
lance spitzner [+],
lamp project [+],
lamp [+],
labyrinth game [+],
labyrinth [+],
kurt [+],
knowledge bowl [+],
knock off [+],
knock [+],
kit [+],
kinetic sculpture [+],
kinect driven [+],
kickstarter [+],
keygen [+],
kehribar [+],
karl [+],
kai [+],
justin dailey [+],
junk box [+],
julian [+],
jordan [+],
jonathan squire [+],
jon [+],
johns hopkins university center [+],
johns hopkins university [+],
job [+],
jessica zhang [+],
jeremy cook [+],
jeremy blum [+],
jeff ledger [+],
java virtual machine [+],
java bytecode [+],
java [+],
jason wright [+],
japanese drums [+],
japanese [+],
james [+],
jair [+],
isp connection [+],
ir remote control [+],
iphone [+],
ipad [+],
internet explorer [+],
internet [+],
interface midi [+],
intel 8080 [+],
instructable [+],
inefficient code [+],
inductors [+],
impressive collection [+],
im me [+],
ihsan kehribar [+],
idea [+],
humberto [+],
huge project [+],
howto guide [+],
honeybot [+],
hone [+],
honda superdream [+],
honda cb400 [+],
home stretch [+],
home brewer [+],
home automation [+],
holiday season [+],
high schoolers [+],
hexapod [+],
hero [+],
heliowatcher [+],
heat source [+],
heartbeat [+],
head mounted displays [+],
havey [+],
hardware store [+],
handlebars [+],
handhelds [+],
hackers [+],
hacker [+],
hacked [+],
hack [+],
guts [+],
guido socher [+],
guestbook [+],
greg friedland [+],
greek mythology [+],
gravity experiments [+],
gravitation force [+],
graffiti art [+],
goodspeed [+],
golf cart [+],
go project [+],
globars [+],
glasses [+],
glass [+],
giant fireball [+],
giant [+],
germany [+],
george [+],
gathering information [+],
game [+],
future project [+],
fun time [+],
fun [+],
fruit [+],
friedland [+],
freebsd [+],
free time [+],
free pair [+],
free laser [+],
frank [+],
foe [+],
florida atlantic university [+],
flawed [+],
flame project [+],
flame bait [+],
flame [+],
flair [+],
first personal computer [+],
first glance [+],
finished project [+],
finish line [+],
finger [+],
fermentation [+],
facebook [+],
eyeglasses [+],
eye candy [+],
exterior grade [+],
excitement [+],
etsy [+],
etch [+],
erik [+],
eric [+],
epic time [+],
entertainment [+],
enjoyment [+],
engineering student [+],
engineering [+],
engine [+],
encryption algorithm [+],
encryption [+],
elements [+],
elegant package [+],
electronics project [+],
electronic real estate [+],
electronic project [+],
electrical pathways [+],
elderwood [+],
eeg sensors [+],
ed platt [+],
east baltimore [+],
dummy load [+],
drumming [+],
drum kit [+],
driving cars [+],
driven cart [+],
drive [+],
dotnet [+],
dossierup [+],
dora the explorer [+],
dora [+],
dollar project [+],
diy speakers [+],
diy projects [+],
discrete transistors [+],
dimitri [+],
digital radios [+],
digital logic design [+],
diesel [+],
development tool [+],
development hardware [+],
detroit [+],
demonstration [+],
decoder chips [+],
dc jack [+],
dashboard [+],
darknet [+],
daniel [+],
dangerous thing [+],
dan [+],
custom pcb [+],
ct scanner [+],
crime fighter [+],
crew member [+],
craftwork [+],
cowbird [+],
cornell university [+],
cornell students [+],
cores [+],
copper clad board [+],
cooking [+],
contronl [+],
controller data [+],
contests [+],
computer vision course [+],
computer project [+],
computer cowboy [+],
complexity [+],
compatible keyboard [+],
communicating [+],
commercial entities [+],
color sampling [+],
color [+],
cnc mill [+],
cloning [+],
claudio [+],
classroom [+],
classmates [+],
chumby [+],
christoph brning [+],
chris [+],
chess [+],
cheerlights [+],
charles holmes [+],
channel controller [+],
channel [+],
champion [+],
challenge [+],
cephalopods [+],
case [+],
carlos [+],
cardiac nurse [+],
car [+],
candlestick phone [+],
cameras [+],
camera [+],
buzzer project [+],
buzzer [+],
burlison [+],
bunny [+],
bunnie [+],
building a computer [+],
building [+],
bruce [+],
breakout [+],
breadboard [+],
brain activity [+],
brain [+],
boxie [+],
botnets [+],
boris [+],
boot logo [+],
board [+],
bluetooth adapter [+],
blood flow [+],
bit by bit [+],
biofuel [+],
bill of materials [+],
bicycle [+],
beta testing [+],
benjamin havey [+],
bench [+],
beginner project [+],
beginner [+],
becky [+],
bay area [+],
battery packs [+],
battery pack [+],
battery [+],
bad idea [+],
axel [+],
awesome idea [+],
autonomous vehicle [+],
autonomous [+],
automation project [+],
automation [+],
automated [+],
author [+],
audio input [+],
attiny [+],
attackers [+],
artificial grass [+],
arthur benemann [+],
arthur [+],
art installation [+],
array [+],
arm devices [+],
ardunio [+],
apco 25 [+],
apartment in singapore [+],
anything [+],
anthony clay [+],
anthony [+],
annett [+],
altair 8800 [+],
altair [+],
allen [+],
alkaline cells [+],
algorithms [+],
alcove [+],
alarm clock [+],
alan burlison [+],
alan [+],
afterthought [+],
added hardware [+],
adam [+],
activity meter [+],
accelerometer [+],
ac outlet [+],
aaron [+],
Ask [+],
555 timers [+],
3d scanner [+],
3d printer [+],
3d camera [+],
vulnerability [+],
arduino [+],
microcontrollers [+],
cross [+],
hacks [+],
zage,
xxxy,
writeup,
wolf,
winmerge,
when,
wes,
wayne zage,
video project,
video object,
video,
vespa scooter,
vespa,
usb to rs232 cable,
usagi project,
usagi,
underwater microphone,
txt,
twelve hours,
ttl levels,
travelling light,
toy,
tins,
time radio,
tgz,
terabyte,
television,
tar,
tabs,
system,
switch,
superman,
sudoku,
strongswan,
strong authentication,
stock,
steve shares,
steve,
stephen eaton,
standalone webserver,
stack overflow,
sql injection,
sponges,
sponge,
spiral pattern,
speech recognition,
speech,
specific project,
smart project,
smart,
sketches,
simulate,
sided pcb,
sharing knowledge,
seminal idea,
semester project,
segment,
scooter fans,
scooter,
schematics,
scan lines,
robotseverywhere,
robostool,
rfid reader,
revival,
resistor,
rensselaer polytechnic institute,
remote buffer overflow vulnerability,
remote buffer overflow,
recognition,
raphael abrams,
rap project,
rap,
radio controlled,
radasm,
question,
puzzle,
puppet,
public safety radio systems,
public safety radio,
proposal,
promising project,
project versions,
project requests,
project reporter,
project proposal,
project man,
project ideas,
project idea,
project 1,
precision rods,
precision models,
power and precision,
pov,
portal project,
polaroid instant film,
polaroid camera,
polaroid,
poc,
pkcs 11,
pinky finger,
piezo sensors,
piezo elements,
pick,
php shell,
php,
persistence of vision,
pedantic mode,
pcb layouts,
parts,
overflow vulnerability,
option,
openssl apache,
openservo,
openldap openssl,
openca,
openamd,
open source projects,
ongoing project,
olpc,
oled displays,
oled display,
oled,
odd project,
nkill,
nixie tubes,
nixie tube,
nixie,
nimbus,
new project,
new hack,
new,
network security,
need,
name,
musical interface,
mp3 player,
mozilla project,
mipv,
minimanager,
mild steel,
microsimon,
metal balls,
mechanical,
max7219,
matt robert stephen glass,
markup language,
manager users,
man versions,
man,
magnetic mixer,
mac mini,
list,
links,
linear actuators,
light switch,
life,
legs,
lcd screens,
laptop project,
laptop,
laminating wood,
knowledgebase,
kinetic,
kernel,
junkyard,
jumbotron,
jug,
john sarik,
john,
johannes,
jerome demers,
jerome,
j.a.r.v.i.s.,
j.a.r.v.i.s,
iteration,
iron man,
internal oscillator,
interface implementation,
instructibles,
instructabliss,
instructables,
ingenuity,
illicit actions,
iexploder,
hot glue,
hobbyists,
hobbyist,
heart,
hacker conference,
hack in the box,
great interactive,
graffiti,
good answer,
gml,
glue,
glip,
gift card,
gift,
game play,
free software project,
fragrance oils,
forum,
force,
foot stool,
flashlight,
film,
fan,
experimenters,
enclosure,
electronic dice,
electronic,
eckhard etzold,
eckhard,
eaton,
earth project,
earth,
duo,
dubai,
dolores zage,
diy project,
ditches,
distinction,
directory traversal vulnerability,
design,
death,
current project,
crenshaw,
couple options,
cornell,
cool stuff,
conference badge,
conference,
college art,
cnc machine,
circus,
circuits,
cheap cable,
chair,
ccc camp,
cardboard frame,
cable,
build,
buffer overflow vulnerability,
browser crashes,
boost,
book of revelations,
bluewraith,
bible box,
bible,
batman,
based buffer overflow,
authentication mechanisms,
australia,
attempt,
atmel,
assistant,
aspsiteware,
arrays,
anthony zboralski,
animatronic puppets,
andy,
analysis,
amount of time,
altoids,
alan sawula,
aesthetics,
adrian crenshaw,
addition project,
addition,
accelerometers,
abtp,
aa battery,
Wireless,
Hackerspaces,
HackIt,
General,
Discussion,
BackTrack,
9v batteries,
7 segment displays,
20 sided dice,
120v ac
-
-
5:01
»
Hack a Day
Any home brewer will recognize the setup pictured above as a temperature controlled fermentation chamber. They wouldn’t be wrong either. But you’re not going to drink what results. This project is aimed at providing a temperature controlled environment for fermenting biofuel. [Benjamin Havey] and [Michael Abed] built the controller as their final project in his microprocessor class. [...]
-
-
5:00
»
Hack a Day
A few weeks ago, we caught wind of a DIY version of ‘smart tweezers’ from [Kai]‘s workbench that are able to measure SMD resistors, caps, and inductors. At that time, [Kai] hadn’t quite finished the software portion of his build, leaving him with a pile of parts and non-working PCBs. The code is finished now, meaning [...]
-
-
8:39
»
Packet Storm Security Recent Files
Hook Analyser is a freeware project, started in 2011, to analyse an application during the run-time. The project can be potentially useful in analysing malwares (static and run time), and for performing application crash analysis. This paper breaks down the features and functionality of the tools and provides guidance on usage.
-
8:39
»
Packet Storm Security Misc. Files
Hook Analyser is a freeware project, started in 2011, to analyse an application during the run-time. The project can be potentially useful in analysing malwares (static and run time), and for performing application crash analysis. This paper breaks down the features and functionality of the tools and provides guidance on usage.
-
-
13:01
»
Hack a Day
We think we have found project that will take over our holiday free time. [Bai Li] just published an excellent article about writing a program that can automatically solve the game of Minesweeper. For those of you who are unfamiliar, Minesweeper gives you a grid in which land mines have been randomly placed. As you click [...]
-
-
9:10
»
Hack a Day
Hackaday’s own [Jeremy Cook] has been testing out the pyMCU board and managed to put together an animated block head that looks like it could be a foe in Minecraft. That’s thanks mostly to the block of foam he’s using as a diffuser. The face of the project is a set of LEDs. These, along [...]
-
-
12:01
»
Hack a Day
The folks at Open Compute Project are running their annual summit in January, but this year they’ll be adding a hardware hackathon to the program. The hackathon’s goal is to build open source hardware that can be applied to data centers to increase efficiency and reduce costs. The Open Compute Project (OCP) is a foundation that develops open hardware for [...]
-
-
15:01
»
Hack a Day
If you’re looking to learn the art of playing Japanese drums, or Taiko, this hack, done as a school project by [Cornell] students, could be a really helpful aid. The project write-up is very impressive and includes a detailed explanation of their work, the source code, and a bill of materials if you’d like to [...]
-
-
5:01
»
Hack a Day
Even with the added hardware that lamp still looks relatively normal. But its behavior is more than remarkable. The lamp interacts with people in an incredibly lifelike way. This is of course inspired by the lamp from Pixar’s Luxo Jr. short film. But there’s a little bit of most useless machine added just for fun. [...]
-
-
10:01
»
Hack a Day
This crew of high schoolers built a sorting robot for the Smart Young Mindz challenge. We got pretty excited when hearing that it sorts plastic by its recycling code, but unfortunately this isn’t quite what it’s made out to be. The device uses an RFID code on each product to figure out where it goes. Their [...]
-
-
14:01
»
Hack a Day
That’s a sexy way to use parts from an old oscilloscope. [Aaron] took his inspiration from another project that was using CRTs from old oscilloscopes. Now he’s giving back with a site dedicated to sharing information about the Scope Clock. This project is along the same lines as the one we saw a few days [...]
-
-
10:11
»
Hack a Day
I’ve seen the concept art for “real world eyedroppers” several times. I haven’t noticed any of the products come to market though. It isn’t the technology stoping them, color sampling can be done a million ways. I picked one of the easiest ways and tossed something together pretty quickly. The method I chose is outlined [...]
-
-
9:43
»
Hack a Day
Nearly everyone’s first electronic project is something that blinks a LED. There are a million ways to go about this ‘Hello World’ project of electronic design; 555 timers, microcontrollers, or maybe even discrete components if you’re really cool. When [miceuz] was asked by a friend to help with his first electronic project he eschewed the [...]
-
-
16:01
»
Hack a Day
[Viktor] just pulled out another one of his decades-old projects. This time around it’s a timer he built using 7400 logic chips. It was a great way for him to learn about electronics, and ended up serving as his alarm clock every morning. Two pieces of copper clad board were cut to the same size. [...]
-
-
12:01
»
Hack a Day
Here’s a project that is striving to develop a set of open source finger prosthesis. They are aimed at patients who have partial amputations. This means that part of the digit remains and can be used as the motive force behind a well designed mechanical prosthesis like you see above. This uses levers, pulleys, and [...]
-
-
10:19
»
Hack a Day
[Nakul], [Nikilesh], and [Nischal] just finished posting about their entry in the 2012 Open 7400 Logic competition. It’s an encryption system based entirely on 7400 logic chips. The device operates on 8-bit binary numbers, which limits its real-world applications. But we bet they learned a lot during the development process. The encryption algorithm is based on a [...]
-
8:00
»
Hack a Day
[Dimitri] sent in a project he’s been working on that implements a Java Virtual Machine purely in C, and is easily portable between microcontrollers such as the AVRs and PICs we normally see, ARM devices, and even the lowly 386. Before going into the ‘how’, [Dimitri] first covers why he wanted to run Java bytecode [...]
-
-
17:00
»
SecuriTeam
This allows remote attackers to read the database via a direct request.
-
7:01
»
Hack a Day
If you want to mess around with some microcontrollers but don’t really have a purpose in mind this project is perfect for you. It’s cheap, easy to assemble, and there’s blinking LEDs! [TigerUp] shows us how he put together some LED matrix pendants using just five components. He calls the project Tiny Matrix, which is [...]
-
-
23:33
»
Packet Storm Security Exploits
This Metasploit module exploits a vulnerability found in Project Pier. The application's uploading tool does not require any authentication, which allows a malicious user to upload an arbitrary file onto the web server, and then cause remote code execution by simply requesting it. This Metasploit module is known to work against Apache servers due to the way it handles an extension name, but the vulnerability may not be exploitable on others.
-
23:33
»
Packet Storm Security Recent Files
This Metasploit module exploits a vulnerability found in Project Pier. The application's uploading tool does not require any authentication, which allows a malicious user to upload an arbitrary file onto the web server, and then cause remote code execution by simply requesting it. This Metasploit module is known to work against Apache servers due to the way it handles an extension name, but the vulnerability may not be exploitable on others.
-
23:33
»
Packet Storm Security Misc. Files
This Metasploit module exploits a vulnerability found in Project Pier. The application's uploading tool does not require any authentication, which allows a malicious user to upload an arbitrary file onto the web server, and then cause remote code execution by simply requesting it. This Metasploit module is known to work against Apache servers due to the way it handles an extension name, but the vulnerability may not be exploitable on others.
-
-
21:51
»
SecDocs
Authors:
Marcus Denker Tags:
technology Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Squeak allows kids of all ages to be creative with their computer. The goal of the Squeak Project is to build a system without constraints: It is used at schools,universities and in industry. Squeak is an open system: It is implemented in Squeak itself, all parts are open for learning and hacking. The whole source code is available and can be changed while the system is running. The Croquet project ist building a revolutionary collaborative environment based on Squeak. It provides a scalable, peer-to-peer multiuser 3D environment that is as open and fun as Squeak itself. Squeak is available on the internet under a free license, it is highly portable and currently used on over 20 different platforms. This talk will give an overview over the Squeak Project: From the eToy kids programming environment up to the Seaside system for professional web development. The eToys make programming fun for children from around age 8. The talk will show how to build simple eToy programs and how Squeak is used at school. But even professional developers are using Squeak; The Seaside framework shows how the openness of Squeak can help to make developers more productive. The last part of the talk will give a glimpse into the future: OpenCroquet. The Croquet project is building a revolutionary collaborative environment based on Squeak. It provides a scalable, peer-to-peer multiuser 3D environment that is completely open for exploration and makes novel ways for communication and interaction possible.
-
21:51
»
SecDocs
Authors:
Marcus Denker Tags:
technology Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Squeak allows kids of all ages to be creative with their computer. The goal of the Squeak Project is to build a system without constraints: It is used at schools,universities and in industry. Squeak is an open system: It is implemented in Squeak itself, all parts are open for learning and hacking. The whole source code is available and can be changed while the system is running. The Croquet project ist building a revolutionary collaborative environment based on Squeak. It provides a scalable, peer-to-peer multiuser 3D environment that is as open and fun as Squeak itself. Squeak is available on the internet under a free license, it is highly portable and currently used on over 20 different platforms. This talk will give an overview over the Squeak Project: From the eToy kids programming environment up to the Seaside system for professional web development. The eToys make programming fun for children from around age 8. The talk will show how to build simple eToy programs and how Squeak is used at school. But even professional developers are using Squeak; The Seaside framework shows how the openness of Squeak can help to make developers more productive. The last part of the talk will give a glimpse into the future: OpenCroquet. The Croquet project is building a revolutionary collaborative environment based on Squeak. It provides a scalable, peer-to-peer multiuser 3D environment that is completely open for exploration and makes novel ways for communication and interaction possible.
-
21:51
»
SecDocs
Authors:
Marcus Denker Tags:
technology Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Squeak allows kids of all ages to be creative with their computer. The goal of the Squeak Project is to build a system without constraints: It is used at schools,universities and in industry. Squeak is an open system: It is implemented in Squeak itself, all parts are open for learning and hacking. The whole source code is available and can be changed while the system is running. The Croquet project ist building a revolutionary collaborative environment based on Squeak. It provides a scalable, peer-to-peer multiuser 3D environment that is as open and fun as Squeak itself. Squeak is available on the internet under a free license, it is highly portable and currently used on over 20 different platforms. This talk will give an overview over the Squeak Project: From the eToy kids programming environment up to the Seaside system for professional web development. The eToys make programming fun for children from around age 8. The talk will show how to build simple eToy programs and how Squeak is used at school. But even professional developers are using Squeak; The Seaside framework shows how the openness of Squeak can help to make developers more productive. The last part of the talk will give a glimpse into the future: OpenCroquet. The Croquet project is building a revolutionary collaborative environment based on Squeak. It provides a scalable, peer-to-peer multiuser 3D environment that is completely open for exploration and makes novel ways for communication and interaction possible.
-
8:00
»
Hack a Day
Touched is a project by [Rebecca Strauss] that integrates servos, strings, and felt into a horrifying kinetic sculpture made up of a dozen mechanical fingers straight from a Boschian nightmare. The fingers are made up of segments of wood articulated with the help of a small string. Each pair of fingers is controlled by a [...]
-
-
4:00
»
Hack a Day
For a power hungry project the supply is sometimes a pretty big unknown. Whether stapling together a few different power supplies to meet a current requirement, or designing a system from the ground up: a big power supply can be quite a dangerous thing. It helps to have some kind of a dummy load to [...]
-
-
21:52
»
SecDocs
Authors:
Brion Vibber Tim Starling Tags:
web application Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Wikipedia developers chronicle the evolution of the MediaWiki software and server farm to manage the popular and ever-growing editable encyclopedia. Planned scalability improvements are outlined, plus developers' conference and hacking session. Since 2001, the Wikipedia encyclopedia project has jumped from a scratchpad side project to one of the top 500 sites on the web (Alexa stats), bringing community and media attention to both wikis and open-licensed content. While some dispute its quality, Wikipedia's quantity is undeniable: at over one million pages in dozens of languages Wikipedia is the largest, most populous Wiki Wiki site on the net. Where traditional wikis have tended to be relatively small communities based on some topical interest, Wikipedia actively seeks attention, visitors, and editors with an open-ended mission to document virtually any topic, from the philosophers of Athens to Slashdot trolling fads. Phenomenal growth in the editing community, non-editing visitors, and the number of topics covered has thus put continual social and technical pressure on the scalability of the system. The wiki engine MediaWiki has grown up along with the project, following the sometimes-conflicting paths of being both easy to install and use and performing reasonably well in a multimillion hit per day environment. Built in the scripting language PHP, MediaWiki attempts to boost performance with "alternate hard and soft layers" of code: most hits to Wikipedia are actually handled by a Squid reverse proxy cache which is faster than any PHP script could be. Pre-parsed page chunks and dynamically editable user interface data are optionally cached using Livejournal's distributed memory object cache memcached or the compatible disk-backed tugelacache. Ongoing work is being put into accelerated native-code diff, parsing, and Unicode normalization modules, while still retaining compatibility with "pure" PHP code for use in more restricted environments. Additionally a MediaWiki developers' conference is planned, for discussion and work on the next major version of the software which will carry sites like Wikipedia through 2005 and beyond: developers will give a peek at upcoming storage back-end improvements to handle an ever-growing text corpus.
-
21:52
»
SecDocs
Authors:
Brion Vibber Tim Starling Tags:
web application Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Wikipedia developers chronicle the evolution of the MediaWiki software and server farm to manage the popular and ever-growing editable encyclopedia. Planned scalability improvements are outlined, plus developers' conference and hacking session. Since 2001, the Wikipedia encyclopedia project has jumped from a scratchpad side project to one of the top 500 sites on the web (Alexa stats), bringing community and media attention to both wikis and open-licensed content. While some dispute its quality, Wikipedia's quantity is undeniable: at over one million pages in dozens of languages Wikipedia is the largest, most populous Wiki Wiki site on the net. Where traditional wikis have tended to be relatively small communities based on some topical interest, Wikipedia actively seeks attention, visitors, and editors with an open-ended mission to document virtually any topic, from the philosophers of Athens to Slashdot trolling fads. Phenomenal growth in the editing community, non-editing visitors, and the number of topics covered has thus put continual social and technical pressure on the scalability of the system. The wiki engine MediaWiki has grown up along with the project, following the sometimes-conflicting paths of being both easy to install and use and performing reasonably well in a multimillion hit per day environment. Built in the scripting language PHP, MediaWiki attempts to boost performance with "alternate hard and soft layers" of code: most hits to Wikipedia are actually handled by a Squid reverse proxy cache which is faster than any PHP script could be. Pre-parsed page chunks and dynamically editable user interface data are optionally cached using Livejournal's distributed memory object cache memcached or the compatible disk-backed tugelacache. Ongoing work is being put into accelerated native-code diff, parsing, and Unicode normalization modules, while still retaining compatibility with "pure" PHP code for use in more restricted environments. Additionally a MediaWiki developers' conference is planned, for discussion and work on the next major version of the software which will carry sites like Wikipedia through 2005 and beyond: developers will give a peek at upcoming storage back-end improvements to handle an ever-growing text corpus.
-
14:44
»
Hack a Day
[Jordan] writes in to show us a project he has been working on called MbedConsole. Living up its name [Jordan] has managed to run a 640×480 VGA output, PS/2 port and console all from the mbed itself. We really mean from an mbed only; no extra hardware is required aside from a few resistors and [...]
-
-
21:37
»
SecDocs
Authors:
Jimmy Wales Tags:
social Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: The lecture reports on social dynamics of the Wikipedia project and presents a bunch of statistics and results of research exploring the inner workings of the project. The general media normally describes Wikipedia as an encyclopedia project in which anyone can edit any page at any time. This is true, but does not give an understanding of how the community actually functions. The community has a complex web of relationships and beliefs. My research into statistical measures of those relationships, when compared with community self-descriptions, suggests that not only does the media not understand wikipedia, we actually may not understand ourselves. Jimmy Wales has done research into clustering wikipedia users into various 'types' based on their editing and relationship patterns. Since most wikipedians tend to run into their own type, the results are somewhat surprising to almost everyone, because we don't normally see the community from a distance, since we are in it. He'll present graphs and charts, and hopefully some visualizations that make these things conceptually clear, if he can find someone to help him with the visualization software. :-)
-
21:37
»
SecDocs
Authors:
Jimmy Wales Tags:
social Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: The lecture reports on social dynamics of the Wikipedia project and presents a bunch of statistics and results of research exploring the inner workings of the project. The general media normally describes Wikipedia as an encyclopedia project in which anyone can edit any page at any time. This is true, but does not give an understanding of how the community actually functions. The community has a complex web of relationships and beliefs. My research into statistical measures of those relationships, when compared with community self-descriptions, suggests that not only does the media not understand wikipedia, we actually may not understand ourselves. Jimmy Wales has done research into clustering wikipedia users into various 'types' based on their editing and relationship patterns. Since most wikipedians tend to run into their own type, the results are somewhat surprising to almost everyone, because we don't normally see the community from a distance, since we are in it. He'll present graphs and charts, and hopefully some visualizations that make these things conceptually clear, if he can find someone to help him with the visualization software. :-)
-
21:37
»
SecDocs
Authors:
Jimmy Wales Tags:
social Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: The lecture reports on social dynamics of the Wikipedia project and presents a bunch of statistics and results of research exploring the inner workings of the project. The general media normally describes Wikipedia as an encyclopedia project in which anyone can edit any page at any time. This is true, but does not give an understanding of how the community actually functions. The community has a complex web of relationships and beliefs. My research into statistical measures of those relationships, when compared with community self-descriptions, suggests that not only does the media not understand wikipedia, we actually may not understand ourselves. Jimmy Wales has done research into clustering wikipedia users into various 'types' based on their editing and relationship patterns. Since most wikipedians tend to run into their own type, the results are somewhat surprising to almost everyone, because we don't normally see the community from a distance, since we are in it. He'll present graphs and charts, and hopefully some visualizations that make these things conceptually clear, if he can find someone to help him with the visualization software. :-)
-
15:29
»
SecDocs
Authors:
Holger Krekel Tags:
technology Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: FOSS culture hacks^h^h^h^h meets the EU buerocracy. It is not easy for FOSS projects to get $$$ funding by the European Union. We'll look and discuss how it played out for the PyPy project, a language project targetting itself with a "Münchhausen" approach. We'll try to see why it took the project - tackling deeply technical issues - one year to communicate "correctly" with the European Union. Programmers deal with rule systems and their execution. On the other hand, the European Union issues a lot of rules which are executed by the "commission" and its employees. Within the 6th research framework programme 20.000.000.000 $ will be distributed towards research projects across Europe between 2002-2006. No surprise, the formal rules a project has to live by just for the application is somewhat amazing. FOSS hackers, on the other hand, are used to communicate and adapt to a multitude of programs and systems. Looking from the right angle, it can be interesting to understand how an EU funded project is supposed to work. Even if you don't usually find arbitrary rule systems and their execution interesting you may learn some interesting bits and pieces about how (not) to interact with the EU - should you decide that your project is ready or desparate enough to go that way. Some of these "bits and pieces" can take weeks to research and be summarized in 3 minutes.
-
10:34
»
SecDocs
Authors:
Holger Krekel Tags:
technology Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: FOSS culture hacks^h^h^h^h meets the EU buerocracy. It is not easy for FOSS projects to get $$$ funding by the European Union. We'll look and discuss how it played out for the PyPy project, a language project targetting itself with a "Münchhausen" approach. We'll try to see why it took the project - tackling deeply technical issues - one year to communicate "correctly" with the European Union. Programmers deal with rule systems and their execution. On the other hand, the European Union issues a lot of rules which are executed by the "commission" and its employees. Within the 6th research framework programme 20.000.000.000 $ will be distributed towards research projects across Europe between 2002-2006. No surprise, the formal rules a project has to live by just for the application is somewhat amazing. FOSS hackers, on the other hand, are used to communicate and adapt to a multitude of programs and systems. Looking from the right angle, it can be interesting to understand how an EU funded project is supposed to work. Even if you don't usually find arbitrary rule systems and their execution interesting you may learn some interesting bits and pieces about how (not) to interact with the EU - should you decide that your project is ready or desparate enough to go that way. Some of these "bits and pieces" can take weeks to research and be summarized in 3 minutes.
-
10:34
»
SecDocs
Authors:
Holger Krekel Tags:
technology Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: FOSS culture hacks^h^h^h^h meets the EU buerocracy. It is not easy for FOSS projects to get $$$ funding by the European Union. We'll look and discuss how it played out for the PyPy project, a language project targetting itself with a "Münchhausen" approach. We'll try to see why it took the project - tackling deeply technical issues - one year to communicate "correctly" with the European Union. Programmers deal with rule systems and their execution. On the other hand, the European Union issues a lot of rules which are executed by the "commission" and its employees. Within the 6th research framework programme 20.000.000.000 $ will be distributed towards research projects across Europe between 2002-2006. No surprise, the formal rules a project has to live by just for the application is somewhat amazing. FOSS hackers, on the other hand, are used to communicate and adapt to a multitude of programs and systems. Looking from the right angle, it can be interesting to understand how an EU funded project is supposed to work. Even if you don't usually find arbitrary rule systems and their execution interesting you may learn some interesting bits and pieces about how (not) to interact with the EU - should you decide that your project is ready or desparate enough to go that way. Some of these "bits and pieces" can take weeks to research and be summarized in 3 minutes.
-
-
12:01
»
Hack a Day
The scale of this project is daunting. Each of the three white walls seen in the image above is made up of thousands of oblong square blocks. The blocks move independently and turn the room into an undulating 3D display. If it had only been the demonstration video we might have run this as a [...]
-
10:01
»
Hack a Day
[Santiago] recently completed this project which he calls Tuitwall. It will display your Twitter feed on an LED matrix. The method he used to put it together will come in handy for any project where you need to scrape information from the Internet. The project does require a server in addition to the Arduino hardware [...]
-
-
9:01
»
Hack a Day
[V0R73X], who is 17 has been working on a project, to build A robotic arm. This project started out as a challenge put forward from one of his school teachers to build a robotic arm for $200. [VoR73X] accepted, and the challenge began. He came up with a robotic arm that can be controlled from his mobile phone and [...]
-
-
8:01
»
Hack a Day
[Lou] wrote in to share the fifty-dollar projection screen he built in his home. We’ve seen several of these projects lately. Unlike the one used at a lake cabin, or the other that fills an awkward alcove, this version doesn’t use fabric for the screen. He actually painted it right on the wall. The key [...]
-
-
14:49
»
Packet Storm Security Advisories
Asterisk Project Security Advisory - When an IAX2 call is made using the credentials of a peer defined in a dynamic Asterisk Realtime Architecture (ARA) backend, the ACL rules for that peer are not applied to the call attempt. This allows for a remote attacker who is aware of a peer's credentials to bypass the ACL rules set for that peer.
-
14:49
»
Packet Storm Security Recent Files
Asterisk Project Security Advisory - When an IAX2 call is made using the credentials of a peer defined in a dynamic Asterisk Realtime Architecture (ARA) backend, the ACL rules for that peer are not applied to the call attempt. This allows for a remote attacker who is aware of a peer's credentials to bypass the ACL rules set for that peer.
-
14:49
»
Packet Storm Security Misc. Files
Asterisk Project Security Advisory - When an IAX2 call is made using the credentials of a peer defined in a dynamic Asterisk Realtime Architecture (ARA) backend, the ACL rules for that peer are not applied to the call attempt. This allows for a remote attacker who is aware of a peer's credentials to bypass the ACL rules set for that peer.
-
14:46
»
Packet Storm Security Advisories
Asterisk Project Security Advisory - The AMI Originate action can allow a remote user to specify information that can be used to execute shell commands on the system hosting Asterisk. This can result in an unwanted escalation of permissions, as the Originate action, which requires the "originate" class authorization, can be used to perform actions that would typically require the "system" class authorization.
-
14:46
»
Packet Storm Security Recent Files
Asterisk Project Security Advisory - The AMI Originate action can allow a remote user to specify information that can be used to execute shell commands on the system hosting Asterisk. This can result in an unwanted escalation of permissions, as the Originate action, which requires the "originate" class authorization, can be used to perform actions that would typically require the "system" class authorization.
-
14:46
»
Packet Storm Security Misc. Files
Asterisk Project Security Advisory - The AMI Originate action can allow a remote user to specify information that can be used to execute shell commands on the system hosting Asterisk. This can result in an unwanted escalation of permissions, as the Originate action, which requires the "originate" class authorization, can be used to perform actions that would typically require the "system" class authorization.
-
-
5:01
»
Hack a Day
[Jon] wrote in to tell us about his programmable RC car, and the Howto guide that he’s made. According to him, this project can be constructed with $9 worth of parts plus an Arduino and a small toy car. So around $50 if you’re starting from scratch. At it’s core, this project is about using [...]
-
-
11:08
»
Hack a Day
Since his nerves were wracked by presenting his project to an absurdly large crowd at this year’s SIGGRAPH, [James] is finally ready to share his method of mixing fluids via optical tomography with a much larger audience: the readership of Hackaday. [James]‘ project focuses on the problem of modeling mixing liquids from a multi-camera setup. The [...]
-
-
10:18
»
Hack a Day
A few weeks ago, we featured this water-based LED graffiti art installation that allows anyone to paint in light using only a bottle of water. When one of [Chris]‘ friends saw the video of this build, he immediately asked him how it worked. One thing led to another, and now [Chris] and a few other members at the [...]
-
-
16:30
»
Hack a Day
As a learning experience [GeriBoss] put together an IR remote control receiver board for his PC. His want of volume control from across the room was reason enough to undertake the project, and he got to work with a 38 kHz receiver module and Manchester encoding in the process. The decoder portion of the project [...]
-
-
8:00
»
Hack a Day
Let’s say you need a way to make a project wireless, but don’t have the scratch for a ZigBee or its ilk. You could use IR, but that has a limited range and can only work within a line of sight of the receiver. [Camilo] sent in a project (Spanish, translation) to connect two devices via [...]
-
-
12:04
»
Hack a Day
This is a great project for a slow afternoon, or a beginners introduction to DIY. [William] shows off a really simple speaker project that results in a light show as well as a decent enclosure. He’s using a PVC elbow to mount the speakers. They’re just glued in place. Below that, a section of clear [...]
-
-
4:01
»
Hack a Day
[Matt Oehrlein] and [Ed Platt] from the i3 Detroit hackerspace created the Mind Flame project. The project uses Electroencephalography (EEG) sensors from NeuroSky to measure the user’s concentration level. When you’re concentrating hard enough, the Mind Flame launches a giant fireball, which probably breaks your concentration pretty quickly. Propane is accumulated in tanks, and then released past [...]
-
-
14:29
»
SecDocs
Authors:
Tonnerre Lombard Tags:
social Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: This lecture outlines a possible future retrospective on OpenSource built from a simple continuation of current trends. It's now been quite a while that OpenSource projects started to die out due to lack of developers, while on the other hand the number of similar projects in the same area is astonishing. 2006 then turned out to be the year when the first major OpenSource projects started to run into a similar crisis. In almost every area of computer science, there is an awful lot of similar projects which basically have the same goal but try to achieve it in only slightly different ways. There are, for example, gazillions of different Wiki projects, web fora, mail readers, editors, Linux distributions or window managers. This diversity does of course have a lot of advantages, but the amount of people working in the area of OpenSource in their free time is limited. Also, the amount of people who work in the area and are able to contribute quality code is quite low. The usual life cycle of an OpenSource project nowadays starts with its creation, of course. Then, it is usually maintained to the point where it is about half finished in terms of features. Then, there is usually a clash over some subject (Specific features that go/don't go in, the use of specific version control systems, the attitude of the maintainer), followed by a fork. Usually, this fork results in 3 or more different projects. The parent project usually dies off due to a lack of resources, which have been drained to the child projects. Normally, most of the child projects also lack a security practitioner, which usually leads to vulnerabilities, and consequently to a high load of security incidents which slow down the progress of the child project even further. Also, a lot of people think that in a fork project, they can now finally get rid of the scourge of good coding habits. This usually leads to the project wasting away due to a load of bugs that nobody can manage. There are various reasons for this. Of course, a prime reason lies in the evangelism that a lot of OpenSource developers just bear inside them. Projects get forked because they don't use the Only Beatific Technology, but some Inferior Technology from The Past. The original maintainer usually refuses to adapt to the new technology because he prefers to have a stable and well-known base to build on. Another big reason for this is the ego of some developers. A lot of people can't stand it if somebody tells them to bugger off with their patch because it doesn't meet the quality standards of the project. They fprk off a new project with the old code plus their patch, and either a number of developers from the original project fork off as well, or the child project quickly falls behind. Of course, there is also a problem on the maintainer side. A lot of maintainers don't like the fact at all that there are people who write better code or adapt new features that really are required for the project. This usually leads to one successful child project forking off while the parent project continues to float into space for a while with barely any maintainers left. This is of course one of the better ways to fork, but it still means a significant resource drain. Also, today's source control systems make it incredibly easy to fork off a project. It usually only requires a fork of the current repository, which is an usually action because today's source control systems just use project forks and push/pull technologies for concurrent development. Also, there are usually tools which convert an entire repository from source control system A to source control system B without even losing the metadata. This means that there is less hassle involved in forking off a project than there used to be, so it's easier to overcome one's inhibitions because the technical bar is lower. Another drain of resources isn't specific to an OpenSource project. An inherent problem of OpenSource resources lies in the fact that nowadays there is a new technology of the day out every other month, which means that most of the developers just try to learn a new Latest Thing (and start off projects with it, trying to solve problems that have been solved years before). This means that a lot of precious time is spent on learning Your Favorite Programming Language on Rails rather than writing code. On the other hand, the new technologies usually introduce new security problems that were previously unheard of, and that have to be taken into account as well. The .NET hype for example totally forgot to address that buffer overflow vulnerabilities aren't the only security problems in the world, and that .NET itself may also be a security problem. Finally, there will also be some positivism and a couple of suggestions (or maybe even guidelines) on how to get along a lot better in our projects than we used to.
-
14:25
»
SecDocs
Authors:
Tonnerre Lombard Tags:
social Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: This lecture outlines a possible future retrospective on OpenSource built from a simple continuation of current trends. It's now been quite a while that OpenSource projects started to die out due to lack of developers, while on the other hand the number of similar projects in the same area is astonishing. 2006 then turned out to be the year when the first major OpenSource projects started to run into a similar crisis. In almost every area of computer science, there is an awful lot of similar projects which basically have the same goal but try to achieve it in only slightly different ways. There are, for example, gazillions of different Wiki projects, web fora, mail readers, editors, Linux distributions or window managers. This diversity does of course have a lot of advantages, but the amount of people working in the area of OpenSource in their free time is limited. Also, the amount of people who work in the area and are able to contribute quality code is quite low. The usual life cycle of an OpenSource project nowadays starts with its creation, of course. Then, it is usually maintained to the point where it is about half finished in terms of features. Then, there is usually a clash over some subject (Specific features that go/don't go in, the use of specific version control systems, the attitude of the maintainer), followed by a fork. Usually, this fork results in 3 or more different projects. The parent project usually dies off due to a lack of resources, which have been drained to the child projects. Normally, most of the child projects also lack a security practitioner, which usually leads to vulnerabilities, and consequently to a high load of security incidents which slow down the progress of the child project even further. Also, a lot of people think that in a fork project, they can now finally get rid of the scourge of good coding habits. This usually leads to the project wasting away due to a load of bugs that nobody can manage. There are various reasons for this. Of course, a prime reason lies in the evangelism that a lot of OpenSource developers just bear inside them. Projects get forked because they don't use the Only Beatific Technology, but some Inferior Technology from The Past. The original maintainer usually refuses to adapt to the new technology because he prefers to have a stable and well-known base to build on. Another big reason for this is the ego of some developers. A lot of people can't stand it if somebody tells them to bugger off with their patch because it doesn't meet the quality standards of the project. They fprk off a new project with the old code plus their patch, and either a number of developers from the original project fork off as well, or the child project quickly falls behind. Of course, there is also a problem on the maintainer side. A lot of maintainers don't like the fact at all that there are people who write better code or adapt new features that really are required for the project. This usually leads to one successful child project forking off while the parent project continues to float into space for a while with barely any maintainers left. This is of course one of the better ways to fork, but it still means a significant resource drain. Also, today's source control systems make it incredibly easy to fork off a project. It usually only requires a fork of the current repository, which is an usually action because today's source control systems just use project forks and push/pull technologies for concurrent development. Also, there are usually tools which convert an entire repository from source control system A to source control system B without even losing the metadata. This means that there is less hassle involved in forking off a project than there used to be, so it's easier to overcome one's inhibitions because the technical bar is lower. Another drain of resources isn't specific to an OpenSource project. An inherent problem of OpenSource resources lies in the fact that nowadays there is a new technology of the day out every other month, which means that most of the developers just try to learn a new Latest Thing (and start off projects with it, trying to solve problems that have been solved years before). This means that a lot of precious time is spent on learning Your Favorite Programming Language on Rails rather than writing code. On the other hand, the new technologies usually introduce new security problems that were previously unheard of, and that have to be taken into account as well. The .NET hype for example totally forgot to address that buffer overflow vulnerabilities aren't the only security problems in the world, and that .NET itself may also be a security problem. Finally, there will also be some positivism and a couple of suggestions (or maybe even guidelines) on how to get along a lot better in our projects than we used to.
-
14:25
»
SecDocs
Authors:
Tonnerre Lombard Tags:
social Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: This lecture outlines a possible future retrospective on OpenSource built from a simple continuation of current trends. It's now been quite a while that OpenSource projects started to die out due to lack of developers, while on the other hand the number of similar projects in the same area is astonishing. 2006 then turned out to be the year when the first major OpenSource projects started to run into a similar crisis. In almost every area of computer science, there is an awful lot of similar projects which basically have the same goal but try to achieve it in only slightly different ways. There are, for example, gazillions of different Wiki projects, web fora, mail readers, editors, Linux distributions or window managers. This diversity does of course have a lot of advantages, but the amount of people working in the area of OpenSource in their free time is limited. Also, the amount of people who work in the area and are able to contribute quality code is quite low. The usual life cycle of an OpenSource project nowadays starts with its creation, of course. Then, it is usually maintained to the point where it is about half finished in terms of features. Then, there is usually a clash over some subject (Specific features that go/don't go in, the use of specific version control systems, the attitude of the maintainer), followed by a fork. Usually, this fork results in 3 or more different projects. The parent project usually dies off due to a lack of resources, which have been drained to the child projects. Normally, most of the child projects also lack a security practitioner, which usually leads to vulnerabilities, and consequently to a high load of security incidents which slow down the progress of the child project even further. Also, a lot of people think that in a fork project, they can now finally get rid of the scourge of good coding habits. This usually leads to the project wasting away due to a load of bugs that nobody can manage. There are various reasons for this. Of course, a prime reason lies in the evangelism that a lot of OpenSource developers just bear inside them. Projects get forked because they don't use the Only Beatific Technology, but some Inferior Technology from The Past. The original maintainer usually refuses to adapt to the new technology because he prefers to have a stable and well-known base to build on. Another big reason for this is the ego of some developers. A lot of people can't stand it if somebody tells them to bugger off with their patch because it doesn't meet the quality standards of the project. They fprk off a new project with the old code plus their patch, and either a number of developers from the original project fork off as well, or the child project quickly falls behind. Of course, there is also a problem on the maintainer side. A lot of maintainers don't like the fact at all that there are people who write better code or adapt new features that really are required for the project. This usually leads to one successful child project forking off while the parent project continues to float into space for a while with barely any maintainers left. This is of course one of the better ways to fork, but it still means a significant resource drain. Also, today's source control systems make it incredibly easy to fork off a project. It usually only requires a fork of the current repository, which is an usually action because today's source control systems just use project forks and push/pull technologies for concurrent development. Also, there are usually tools which convert an entire repository from source control system A to source control system B without even losing the metadata. This means that there is less hassle involved in forking off a project than there used to be, so it's easier to overcome one's inhibitions because the technical bar is lower. Another drain of resources isn't specific to an OpenSource project. An inherent problem of OpenSource resources lies in the fact that nowadays there is a new technology of the day out every other month, which means that most of the developers just try to learn a new Latest Thing (and start off projects with it, trying to solve problems that have been solved years before). This means that a lot of precious time is spent on learning Your Favorite Programming Language on Rails rather than writing code. On the other hand, the new technologies usually introduce new security problems that were previously unheard of, and that have to be taken into account as well. The .NET hype for example totally forgot to address that buffer overflow vulnerabilities aren't the only security problems in the world, and that .NET itself may also be a security problem. Finally, there will also be some positivism and a couple of suggestions (or maybe even guidelines) on how to get along a lot better in our projects than we used to.
-
14:21
»
SecDocs
Authors:
Tonnerre Lombard Tags:
social Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: This lecture outlines a possible future retrospective on OpenSource built from a simple continuation of current trends. It's now been quite a while that OpenSource projects started to die out due to lack of developers, while on the other hand the number of similar projects in the same area is astonishing. 2006 then turned out to be the year when the first major OpenSource projects started to run into a similar crisis. In almost every area of computer science, there is an awful lot of similar projects which basically have the same goal but try to achieve it in only slightly different ways. There are, for example, gazillions of different Wiki projects, web fora, mail readers, editors, Linux distributions or window managers. This diversity does of course have a lot of advantages, but the amount of people working in the area of OpenSource in their free time is limited. Also, the amount of people who work in the area and are able to contribute quality code is quite low. The usual life cycle of an OpenSource project nowadays starts with its creation, of course. Then, it is usually maintained to the point where it is about half finished in terms of features. Then, there is usually a clash over some subject (Specific features that go/don't go in, the use of specific version control systems, the attitude of the maintainer), followed by a fork. Usually, this fork results in 3 or more different projects. The parent project usually dies off due to a lack of resources, which have been drained to the child projects. Normally, most of the child projects also lack a security practitioner, which usually leads to vulnerabilities, and consequently to a high load of security incidents which slow down the progress of the child project even further. Also, a lot of people think that in a fork project, they can now finally get rid of the scourge of good coding habits. This usually leads to the project wasting away due to a load of bugs that nobody can manage. There are various reasons for this. Of course, a prime reason lies in the evangelism that a lot of OpenSource developers just bear inside them. Projects get forked because they don't use the Only Beatific Technology, but some Inferior Technology from The Past. The original maintainer usually refuses to adapt to the new technology because he prefers to have a stable and well-known base to build on. Another big reason for this is the ego of some developers. A lot of people can't stand it if somebody tells them to bugger off with their patch because it doesn't meet the quality standards of the project. They fprk off a new project with the old code plus their patch, and either a number of developers from the original project fork off as well, or the child project quickly falls behind. Of course, there is also a problem on the maintainer side. A lot of maintainers don't like the fact at all that there are people who write better code or adapt new features that really are required for the project. This usually leads to one successful child project forking off while the parent project continues to float into space for a while with barely any maintainers left. This is of course one of the better ways to fork, but it still means a significant resource drain. Also, today's source control systems make it incredibly easy to fork off a project. It usually only requires a fork of the current repository, which is an usually action because today's source control systems just use project forks and push/pull technologies for concurrent development. Also, there are usually tools which convert an entire repository from source control system A to source control system B without even losing the metadata. This means that there is less hassle involved in forking off a project than there used to be, so it's easier to overcome one's inhibitions because the technical bar is lower. Another drain of resources isn't specific to an OpenSource project. An inherent problem of OpenSource resources lies in the fact that nowadays there is a new technology of the day out every other month, which means that most of the developers just try to learn a new Latest Thing (and start off projects with it, trying to solve problems that have been solved years before). This means that a lot of precious time is spent on learning Your Favorite Programming Language on Rails rather than writing code. On the other hand, the new technologies usually introduce new security problems that were previously unheard of, and that have to be taken into account as well. The .NET hype for example totally forgot to address that buffer overflow vulnerabilities aren't the only security problems in the world, and that .NET itself may also be a security problem. Finally, there will also be some positivism and a couple of suggestions (or maybe even guidelines) on how to get along a lot better in our projects than we used to.
-
-
21:42
»
SecDocs
Authors:
Harald Welte Milosch Meriac Tags:
wireless embedded Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Project Sputnik is the real-time in-building location tracking system present at the 23C3. The Sputnik is a small active 2.4GHz RF Beacon, whose signal is picked up by one or multiple of the 20+ Sputnik base stations installed in the event venue (bcc). Attendees of the 23C3 are able to voluntarily participate in this system by purchasing an inexpensive Sputnik transponder which they can carry with them during the whole event. In order to make this project attractive to hackers, the Sputnik hardware schematics and firmware source code will be published on the first day of the event, enabling hackers to enhance/replace the exiting firmware, and to add new applications such as peer-to-peer communication between multiple Sputniki. The location data (both raw and processed) will be available to the public via the congress network. This means that everyone has access to all data. The intention of the project is mainly to demonstrate what kind of surveillance is possible using off-the-shelf inexpensive technology, and to make hackers interested into exploring potential positive use cases for it.
-
-
21:38
»
SecDocs
Authors:
Harald Welte Milosch Meriac Tags:
wireless embedded Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Project Sputnik is the real-time in-building location tracking system present at the 23C3. The Sputnik is a small active 2.4GHz RF Beacon, whose signal is picked up by one or multiple of the 20+ Sputnik base stations installed in the event venue (bcc). Attendees of the 23C3 are able to voluntarily participate in this system by purchasing an inexpensive Sputnik transponder which they can carry with them during the whole event. In order to make this project attractive to hackers, the Sputnik hardware schematics and firmware source code will be published on the first day of the event, enabling hackers to enhance/replace the exiting firmware, and to add new applications such as peer-to-peer communication between multiple Sputniki. The location data (both raw and processed) will be available to the public via the congress network. This means that everyone has access to all data. The intention of the project is mainly to demonstrate what kind of surveillance is possible using off-the-shelf inexpensive technology, and to make hackers interested into exploring potential positive use cases for it.
-
8:01
»
Hack a Day
[Dino] is about three-quarters of the way through his talking box project. He’s completed one of the two boxes, and is showing off the technique he uses to marry motion with sound in order to mimic flapping lips with the box top. You may remember [Dino's] first look at the EMIC2. It’s a single-board text [...]
-
-
8:02
»
Hack a Day
Earlier this year, [Anthony Clay] wanted to test the waters of Kickstarter with a low-risk project. The idea he came up with was a series of EE reference posters we featured in a Hackaday links post. Now that [Anthony]‘s project is over, he decided to write about the whole ordeal of putting together a Kickstarter, [...]
-
6:00
»
Hack a Day
[Will Powell] sent in his real-time subtitle glasses project. Inspired by the ever cool Google Project Glass, he decided he would experiment with his own version. He used two Raspberry Pi’s running Debian squeeze, vuzix glasses, microphones, a tv, ipad, and iphone as the hardware components. The flow of data is kind of strange in this project. [...]
-
-
6:01
»
Hack a Day
Inspired by a non-existant yet still cool illuminated bicycle handlebar project, [Becky] over at Adafruit came up with her own version of light up handlebars. Not only is her project actually real, they’re also a pretty cool build that brings a little lightcycle ambiance to twilight bicycling. [Becky]‘s light up handlebars are inspired by the GLOBARS [...]
-
-
7:08
»
Hack a Day
[Vitor Pamplona] sent in a project presented at this years SIGGRAPH. It’s a piece of hardware that corrects vision without the need for lenses. Yep. software-defined eyeglasses now exist, even if the project is a bit bulky for daily wear. [Vitor] et al came up with two versions of hardware for this project. The first [...]
-
-
10:01
»
Hack a Day
[Alan Burlison] is working on an Arduino project with an accelerometer and a few LEDs. Having the LEDs light up as his board is tilted to one side or another is an easy enough project a computer cowboy could whip out in an hour, but [Alan] – ever the perfectionist – decided to optimize his [...]
-
-
21:44
»
SecDocs
Authors:
Roger Dingledine Tags:
Tor Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Come talk with Roger Dingledine, Tor project leader, about some of the challenges in the anonymity world. How do we get enough users? How do we get enough servers? How does public perception impact the level of anonymity a system can provide? How should we be interacting with law enforcement? How can we patch Wikipedia so it no longer needs to fear anonymous users -- or can we do it without changing Wikipedia at all? Can we protect Tor users who want to keep running their active content plugins? When are we going to see well-documented and well-analyzed LiveCD, USB, virtual machine, and wireless router images for easier and safer deployment? Should Tor switch to transporting IP packets, or should it continue to work at the TCP layer? How do we scale the directory system while handling heterogeneous and unreliable nodes, and without sacrificing security? Are three-hop paths really still better than two hops? What are the performance/legal/security tradeoffs of caching content at the exit nodes? Are padding and traffic shaping still bad ideas? Why aren't more people using hidden services and censorship-resistant publishing? Is everybody comfortable with having corporate and government users on the same network? How's it going with China and Saudi Arabia? What development projects does The Tor Project need your help with? Roger will give you his best answers for some of these topics and more, but you are encouraged to bring your own questions too.
-
21:44
»
SecDocs
Authors:
Roger Dingledine Tags:
Tor Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Come talk with Roger Dingledine, Tor project leader, about some of the challenges in the anonymity world. How do we get enough users? How do we get enough servers? How does public perception impact the level of anonymity a system can provide? How should we be interacting with law enforcement? How can we patch Wikipedia so it no longer needs to fear anonymous users -- or can we do it without changing Wikipedia at all? Can we protect Tor users who want to keep running their active content plugins? When are we going to see well-documented and well-analyzed LiveCD, USB, virtual machine, and wireless router images for easier and safer deployment? Should Tor switch to transporting IP packets, or should it continue to work at the TCP layer? How do we scale the directory system while handling heterogeneous and unreliable nodes, and without sacrificing security? Are three-hop paths really still better than two hops? What are the performance/legal/security tradeoffs of caching content at the exit nodes? Are padding and traffic shaping still bad ideas? Why aren't more people using hidden services and censorship-resistant publishing? Is everybody comfortable with having corporate and government users on the same network? How's it going with China and Saudi Arabia? What development projects does The Tor Project need your help with? Roger will give you his best answers for some of these topics and more, but you are encouraged to bring your own questions too.
-
21:44
»
SecDocs
Authors:
Roger Dingledine Tags:
Tor Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Come talk with Roger Dingledine, Tor project leader, about some of the challenges in the anonymity world. How do we get enough users? How do we get enough servers? How does public perception impact the level of anonymity a system can provide? How should we be interacting with law enforcement? How can we patch Wikipedia so it no longer needs to fear anonymous users -- or can we do it without changing Wikipedia at all? Can we protect Tor users who want to keep running their active content plugins? When are we going to see well-documented and well-analyzed LiveCD, USB, virtual machine, and wireless router images for easier and safer deployment? Should Tor switch to transporting IP packets, or should it continue to work at the TCP layer? How do we scale the directory system while handling heterogeneous and unreliable nodes, and without sacrificing security? Are three-hop paths really still better than two hops? What are the performance/legal/security tradeoffs of caching content at the exit nodes? Are padding and traffic shaping still bad ideas? Why aren't more people using hidden services and censorship-resistant publishing? Is everybody comfortable with having corporate and government users on the same network? How's it going with China and Saudi Arabia? What development projects does The Tor Project need your help with? Roger will give you his best answers for some of these topics and more, but you are encouraged to bring your own questions too.
-
-
21:30
»
Packet Storm Security Advisories
Asterisk Project Security Advisory - If a single voicemail account is manipulated by two parties simultaneously, a condition can occur where memory is freed twice causing a crash.
-
21:30
»
Packet Storm Security Recent Files
Asterisk Project Security Advisory - If a single voicemail account is manipulated by two parties simultaneously, a condition can occur where memory is freed twice causing a crash.
-
21:30
»
Packet Storm Security Misc. Files
Asterisk Project Security Advisory - If a single voicemail account is manipulated by two parties simultaneously, a condition can occur where memory is freed twice causing a crash.
-
21:27
»
Packet Storm Security Advisories
Asterisk Project Security Advisory - If Asterisk sends a re-invite and an endpoint responds to the re-invite with a provisional response but never sends a final response, then the SIP dialog structure is never freed and the RTP ports for the call are never released. If an attacker has the ability to place a call, they could create a denial of service by using all available RTP ports.
-
21:27
»
Packet Storm Security Recent Files
Asterisk Project Security Advisory - If Asterisk sends a re-invite and an endpoint responds to the re-invite with a provisional response but never sends a final response, then the SIP dialog structure is never freed and the RTP ports for the call are never released. If an attacker has the ability to place a call, they could create a denial of service by using all available RTP ports.
-
21:27
»
Packet Storm Security Misc. Files
Asterisk Project Security Advisory - If Asterisk sends a re-invite and an endpoint responds to the re-invite with a provisional response but never sends a final response, then the SIP dialog structure is never freed and the RTP ports for the call are never released. If an attacker has the ability to place a call, they could create a denial of service by using all available RTP ports.
-
-
17:00
»
SecuriTeam
Agora-Project is prone to multiple cross-site scripting and SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data.
-
14:01
»
Hack a Day
If you’re able to make a project look this good it shouldn’t be hard to convince that significant other to let you install it in a prominent place in the house. We think [Greg Friedland] pulled this off perfectly by building a 4′x8′ tablet controlled LED matrix. First of all, everything looks better in a [...]
-
-
14:01
»
Hack a Day
Over the last few years, [Michael] has been working on the Lucid Scribe project, an online sleep research database to document lucid dreams. This project uses a combination of hardware and software to record rapid eye movements while sleeping. Not only is [Michael] able to get his computer to play music when he starts dreaming (thus [...]
-
-
14:01
»
Hack a Day
This project may take the cake on high-end reflow retrofits. It’s a HUGE project which uses a toaster oven to reflow surface mount circuit boards. And the fact that it bursts with features makes us giddy. So what parts have we come to expect on these devices? Obviously a heat source which usually comes from [...]
-
-
17:00
»
SecuriTeam
Agora-Project is prone to an arbitrary file-upload vulnerability because the application fails to adequately sanitize user-supplied input.
-
-
10:01
»
Hack a Day
First off, if you’re looking at that title and thinking it’s flame-bait, please hold off. What [Ihsan Kehribar] is working with is another way to get some feedback for what’s going on with your Arduino project. Or really any AVR project that uses an ISP connection. He’s added text output for AVR programs similar to [...]
-
-
8:01
»
Hack a Day
[Sebastian] wrote in to update us about the optical sensor project he started a couple of years ago. You’ll find his most recent update here, but there are four different post links after the break that document various parts of his progress. You may not recall the original project, but he was looking to add [...]
-
-
21:37
»
SecDocs
Authors:
Christoph Brüning Kai Schubert Tags:
privacy Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: The lecture intends to give an overview of the Privacy Workshop project started in Siegen (NRW, Germany) and to animate listeners to participate in the project. Update 2008-12-30: we finally put the slides online, but there are still some cc-license tags that need to be fixed for the last pictures. The flickr-links are ok though, so please don't moan and stay tuned.
-
-
16:35
»
Packet Storm Security Advisories
Asterisk Project Security Advisory - A remotely exploitable crash vulnerability exists in the IAX2 channel driver if an established call is placed on hold without a suggested music class.
-
16:35
»
Packet Storm Security Recent Files
Asterisk Project Security Advisory - A remotely exploitable crash vulnerability exists in the IAX2 channel driver if an established call is placed on hold without a suggested music class.
-
16:35
»
Packet Storm Security Misc. Files
Asterisk Project Security Advisory - A remotely exploitable crash vulnerability exists in the IAX2 channel driver if an established call is placed on hold without a suggested music class.
-
-
17:01
»
Hack a Day
[Jason Wright] and [Jeremy Blum] are showing off the project they developed for their Designing with Microcontrollers course at Cornell University. They call it the Heliowatcher, and if you know your Greek mythology we’d be you figured out this watches the movement of the sun and adjust a solar panel to follow it. Their design is simple [...]
-
-
17:01
»
Hack a Day
3D printers are very popular right now. We’ve seen them go from an interesting project to multiple commercial entities. Makerbot seems to be the poster child for the commercial side of things, at least they were. Their former COO [Samuel Cervantes] is now in charge of a new company called Solidoodle. Their main product is [...]
-
14:01
»
Hack a Day
Here are the contronl modules for a sous-vide project over at Nerdkits. [Humberto] and crew continue doing a great job of focusing a project on one goal, then explaining the steps needed to get there. In this case they wanted to build their own sous-vide appliance that was cheap, and didn’t really require the user [...]
-
-
15:01
»
Hack a Day
So you’ve got a really cool project that requires a wireless controller and a ton of different channels. What are you going to do? Are you going to go pick up an expensive RC controller? Nah, you’re going to build your own. This project makes a generic 20 channel controller for your projects by stuffing [...]
-
-
10:01
»
Hack a Day
For his senior design project at Swarthmore College, [Julian] decided to build a metalworking equivalent to the RepRap. [Julian]‘s final project is a self-replicating milling machine, and hopefully giving some serious metalworking power to all the makers with CNC routers and RepRaps out there. At first glance, [Julian]‘s mill doesn’t look like something you would find [...]
-
7:01
»
Hack a Day
[Bruce] sent us another fantastic final project from the ECE4760 class at Cornell. What you see above is an array of 36 near infra red LEDs shining into this young man’s brain for the purpose of spectroscopy. Light bounces back differently based on brain activity (blood flow). For this project, they are mapping their motor [...]
-
-
8:01
»
Hack a Day
Here’s an oldie but a goodie: [Eiki], [Mark], and [Sheraz] built a pipe crawling robot for their senior engineering project at Florida Atlantic University way back in 2004. Despite being a rather old build, its aged well and still demonstrates the clever ways the guys overcame some engineering obstacles. The original plan for the pipe [...]
-
-
13:01
»
Hack a Day
[Roy] is getting to the end of his second CNC mill project and finally seeing some results. Here you can see a bear he milled in some floural foam. The project started out as an Arduino-based pen plotter. It move the pen along one axis, and the drawing surface along another, with the third axis [...]
-
-
16:01
»
Hack a Day
You know who thinks building a robotic octopus is an awesome idea? EVERYONE. Apparently the idea is a solid enough idea that the European Commision has funded this project. The goal is to mimic the capabilities of the squishiest of the cephalopods in order to advance soft robotics. Or possibly to take over the world. [...]
-
-
14:01
»
Hack a Day
If you have a finished project you’re now bored with, here’s Tindie. It’s a one-man operation headed b [emile] that hopes to connect makers with people who think DIY projects are really cool and have money. There are already a few websites that cater to the builder who wants to sell projects: Kickstarter for one, [...]
-
-
16:07
»
Packet Storm Security Advisories
Asterisk Project Security Advisory - A remotely exploitable crash vulnerability exists in the SIP channel driver if a SIP UPDATE request is processed within a particular window of time.
-
16:07
»
Packet Storm Security Recent Files
Asterisk Project Security Advisory - A remotely exploitable crash vulnerability exists in the SIP channel driver if a SIP UPDATE request is processed within a particular window of time.
-
16:07
»
Packet Storm Security Misc. Files
Asterisk Project Security Advisory - A remotely exploitable crash vulnerability exists in the SIP channel driver if a SIP UPDATE request is processed within a particular window of time.
-
16:06
»
Packet Storm Security Advisories
Asterisk Project Security Advisory - In the Skinny channel driver, KEYPAD_BUTTON_MESSAGE events are queued for processing in a buffer allocated on the heap, where each DTMF value that is received is placed on the end of the buffer. Since the length of the buffer is never checked, an attacker could send sufficient KEYPAD_BUTTON_MESSAGE events such that the buffer is overrun.
-
16:06
»
Packet Storm Security Recent Files
Asterisk Project Security Advisory - In the Skinny channel driver, KEYPAD_BUTTON_MESSAGE events are queued for processing in a buffer allocated on the heap, where each DTMF value that is received is placed on the end of the buffer. Since the length of the buffer is never checked, an attacker could send sufficient KEYPAD_BUTTON_MESSAGE events such that the buffer is overrun.
-
16:06
»
Packet Storm Security Misc. Files
Asterisk Project Security Advisory - In the Skinny channel driver, KEYPAD_BUTTON_MESSAGE events are queued for processing in a buffer allocated on the heap, where each DTMF value that is received is placed on the end of the buffer. Since the length of the buffer is never checked, an attacker could send sufficient KEYPAD_BUTTON_MESSAGE events such that the buffer is overrun.
-
-
21:40
»
SecDocs
Authors:
Felix Domke Tags:
cracking FPGA Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: In 1998, the EFF built "Deep Crack", a machine designed to perform a walk over DES's 56-bit keyspace in nine days, for $250.000. With today's FPGA technology, a cost decrease of 25x can be achieved, as the copacobana project has shown. If that's still too much, two approaches should be considered: Recycling hardware and distributed computing. This talk will be about combining both approaches for the greater good. A number of projects (Copacobana, Picocomputing) have shown that with today's technology enough brute force computing power to break limited keylength ciphers (like DES) is affordable even for small companies. But what about Joe Geek at home? Recycling FPGAs is one option (nsa@home), distributed computing another (distributed.net, ...). This project combines both approaches, developing a toolchain that can be used to prototype a project on a low-end FPGA (or even in a free simulator), and then scaling up the effort across different implementations onto a large number of devices. An example client implementation uses an FPGA in a widely available consumer device to provide computing power when the device is in standby. Another approach that will be discussed in detail is how to obtain decommissioned high-end FPGA-based hardware. We will have hardware to show with a live demo!
-
21:40
»
SecDocs
Authors:
Felix Domke Tags:
cracking FPGA Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: In 1998, the EFF built "Deep Crack", a machine designed to perform a walk over DES's 56-bit keyspace in nine days, for $250.000. With today's FPGA technology, a cost decrease of 25x can be achieved, as the copacobana project has shown. If that's still too much, two approaches should be considered: Recycling hardware and distributed computing. This talk will be about combining both approaches for the greater good. A number of projects (Copacobana, Picocomputing) have shown that with today's technology enough brute force computing power to break limited keylength ciphers (like DES) is affordable even for small companies. But what about Joe Geek at home? Recycling FPGAs is one option (nsa@home), distributed computing another (distributed.net, ...). This project combines both approaches, developing a toolchain that can be used to prototype a project on a low-end FPGA (or even in a free simulator), and then scaling up the effort across different implementations onto a large number of devices. An example client implementation uses an FPGA in a widely available consumer device to provide computing power when the device is in standby. Another approach that will be discussed in detail is how to obtain decommissioned high-end FPGA-based hardware. We will have hardware to show with a live demo!
-
21:40
»
SecDocs
Authors:
Felix Domke Tags:
cracking FPGA Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: In 1998, the EFF built "Deep Crack", a machine designed to perform a walk over DES's 56-bit keyspace in nine days, for $250.000. With today's FPGA technology, a cost decrease of 25x can be achieved, as the copacobana project has shown. If that's still too much, two approaches should be considered: Recycling hardware and distributed computing. This talk will be about combining both approaches for the greater good. A number of projects (Copacobana, Picocomputing) have shown that with today's technology enough brute force computing power to break limited keylength ciphers (like DES) is affordable even for small companies. But what about Joe Geek at home? Recycling FPGAs is one option (nsa@home), distributed computing another (distributed.net, ...). This project combines both approaches, developing a toolchain that can be used to prototype a project on a low-end FPGA (or even in a free simulator), and then scaling up the effort across different implementations onto a large number of devices. An example client implementation uses an FPGA in a widely available consumer device to provide computing power when the device is in standby. Another approach that will be discussed in detail is how to obtain decommissioned high-end FPGA-based hardware. We will have hardware to show with a live demo!
-
11:01
»
Hack a Day
You’re going to want to do some stretching before undertaking a soldering project like this one. We’re betting that the physical toll of assembling this 4-bit discrete processor project is starting to drive [SV3ORA] just a bit crazy. This small piece of electronic real estate is playing host to 62 transistors so far, and he’s not [...]
-
-
15:01
»
Hack a Day
[Quinn Dunki] just reported in on the latest iteration in her computer project which is called Veronica. This time she added RAM to increase the VGA performance of her build. Like just about every other part of the project, [Quinn] knew what she wanted to do, but had to overcome a lot of issues along [...]
-
-
13:01
»
Hack a Day
In case you’ve been living under a rock for the past week, Google announced Project Glass, a real life head-mounted computer that’s actually useful. Glass is one of the projects being developed by Google X, the super-cool R&D department inside Google. On board are [Babak Parviz], [Steve Lee] and [Sebastian Thrun] (a.k.a. the guy you learned AI from [...]
-
-
8:01
»
Hack a Day
If you just got your hands on a shiny new Android phone and are looking for a fun project to try out, you might want to check out this simple Arduino exercise that [Mike Mitchel] put together. Everyone needs a starting off point for hacking, and [Mike] thought that combining and Arduino and Android handset [...]
-
-
11:41
»
Hack a Day
Dig out an old cell phone, hit the dollar store for some plastic recorders, and build this sound controlled snake game for your next party. The project will be a snap for those comfortable working with microcontrollers, and a great learning experience if you’re looking to try your first Arduino project. [László] and his friend [...]
-
-
9:02
»
Hack a Day
Whether or not you love Star Trek we’d bet you know what a Tricorder is. The handheld device capable of gathering information about the environment around you, or taking health diagnostics about an injured crew member, seemed like unfathomably advanced technology when first seen on the original television series. But our technology has advance so [...]
-
-
9:01
»
Hack a Day
[Alex] has been working on a diesel motorcycle project for a few months now, and the project is finally bearing fruit. It’s quite an accomplishment for something [Alex] describes as an industrial Chinese engine, a modded Honda Superdream, and a few Royal Enfield parts thrown in for good measure. [Alex] bought his Honda CB400 from someone [...]
-
-
14:01
»
Hack a Day
[Mark] from SpikenzieLabs was wrapping up a project using an Arduino the other day and found himself in need of a few more I/O pins. He could have added extra circuitry to the project, but he decided to see if he could gain a few pins by removing a few components instead. He put together [...]
-
-
12:35
»
Hack a Day
[Matt Turner] tipped us off back in January about his homemade Segway project. Unfortunately that message slipped through the cracks but we’re glad he sent in a reminder after reading Friday’s feature an a different 2-wheeled balancer. We like it that he refers to this project as being on the budget of a graduate student [...]
-
7:01
»
Hack a Day
[nikescar] sent in a link to a huge isomorphic MIDI keyboard. We might have missed it the first time around, but that doesn’t diminish such a great looking project. According to the project page, this humongous keyboard is the work people at Louisville Soundbuilders’ efforts to clone the AXiS-64 MIDI controller. Instead of looking like a [...]
-
-
20:07
»
Packet Storm Security Advisories
Asterisk Project Security Advisory - An attacker attempting to connect to an HTTP session of the Asterisk Manager Interface can send an arbitrarily long string value for HTTP Digest Authentication. This causes a stack buffer overflow, with the possibility of remote code injection.
-
20:07
»
Packet Storm Security Recent Files
Asterisk Project Security Advisory - An attacker attempting to connect to an HTTP session of the Asterisk Manager Interface can send an arbitrarily long string value for HTTP Digest Authentication. This causes a stack buffer overflow, with the possibility of remote code injection.
-
20:07
»
Packet Storm Security Misc. Files
Asterisk Project Security Advisory - An attacker attempting to connect to an HTTP session of the Asterisk Manager Interface can send an arbitrarily long string value for HTTP Digest Authentication. This causes a stack buffer overflow, with the possibility of remote code injection.
-
-
12:01
»
Hack a Day
Building an audio player is a fun project. It used to be quite a task to do so, but these days the MP3 decoder chips are full-featured which means that if you know how to talk to other chips with a microcontroller you’ve got all the skills needed to pull off the project. But that [...]
-
-
7:01
»
Hack a Day
A while back, [Matt] bought a few 8051 MCUs and tucked them away for a future project. He just found these fabulous little chips in a component drawer and decided it was time to figure these guys out. Eventually, [Matt] stumbled across this awesome resource for 8051 programming. The 8051 featured a still reasonably respectable 4k of [...]
-
-
8:01
»
Hack a Day
The Seneca College Linux Club figured out a fantastic way to help promote Linux to a wider audience. They took some surplus hardware and made an Open Source software vending machine. That is and isn’t a play on words. The project itself is an open source project, and the goal is to dispense other open [...]
-
-
16:24
»
Hack a Day
We’ve enjoyed seeing the development progress of Veronica, [Quinn Dunki's] 8-bit computer project. It started out on a breadboard, then moved to edge-connected PCBs, and now [Quinn] has given Veronica a body of her own. The donor is a Philco Model 42-327T and was produced in 1942. It was chosen because it is non-functional and [...]
-
-
3:43
»
SecDocs
Authors:
Christian Bahls Tags:
law Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: This talk will be about the WhiteIT project, initiated by Mr Schünemann, German Minister of Interior in the state of Lower Saxony. The WhiteIT project is concerned with combating the online-distribution of child abuse material. WhiteIT tries to develop tools and processes to cooperatively suppress the disemination and (re-)distribution of said material. During the Talk the lecturer will try to encourage some open source intelligence. So please consider bringing a laptop, netbook or tablet with you to help gather and collect certain informations right away. Being involved with the WhiteIT project, the lecturer will use this opportunity to speak freely about his concerns regarding certain aspects of the endeavour. The talk will try to explain some of the projects aims as well as technical tools and processes developed and why he thinks this also concerns you as well. Although the talk will mainly be concerned with WhiteIT and its members, it will also be of concern for other nationals as there are some global players involved. The Talk will be somewhat interactive asking you to crowdsource certain information that the lecturer could not get hold off, so please bring a laptop, netbook or tablet with you to be able access a wiki/etherpad.
-
3:42
»
SecDocs
Authors:
Christian Bahls Tags:
law Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: This talk will be about the WhiteIT project, initiated by Mr Schünemann, German Minister of Interior in the state of Lower Saxony. The WhiteIT project is concerned with combating the online-distribution of child abuse material. WhiteIT tries to develop tools and processes to cooperatively suppress the disemination and (re-)distribution of said material. During the Talk the lecturer will try to encourage some open source intelligence. So please consider bringing a laptop, netbook or tablet with you to help gather and collect certain informations right away. Being involved with the WhiteIT project, the lecturer will use this opportunity to speak freely about his concerns regarding certain aspects of the endeavour. The talk will try to explain some of the projects aims as well as technical tools and processes developed and why he thinks this also concerns you as well. Although the talk will mainly be concerned with WhiteIT and its members, it will also be of concern for other nationals as there are some global players involved. The Talk will be somewhat interactive asking you to crowdsource certain information that the lecturer could not get hold off, so please bring a laptop, netbook or tablet with you to be able access a wiki/etherpad.
-
3:41
»
SecDocs
Authors:
Christian Bahls Tags:
law Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: This talk will be about the WhiteIT project, initiated by Mr Schünemann, German Minister of Interior in the state of Lower Saxony. The WhiteIT project is concerned with combating the online-distribution of child abuse material. WhiteIT tries to develop tools and processes to cooperatively suppress the disemination and (re-)distribution of said material. During the Talk the lecturer will try to encourage some open source intelligence. So please consider bringing a laptop, netbook or tablet with you to help gather and collect certain informations right away. Being involved with the WhiteIT project, the lecturer will use this opportunity to speak freely about his concerns regarding certain aspects of the endeavour. The talk will try to explain some of the projects aims as well as technical tools and processes developed and why he thinks this also concerns you as well. Although the talk will mainly be concerned with WhiteIT and its members, it will also be of concern for other nationals as there are some global players involved. The Talk will be somewhat interactive asking you to crowdsource certain information that the lecturer could not get hold off, so please bring a laptop, netbook or tablet with you to be able access a wiki/etherpad.
-
-
10:22
»
Hack a Day
[Maxzillian] sent in a pretty amazing project he’s been beta testing called ReconstructMe. Even though this project is just the result of software developers getting bored at their job, there’s a lot of potential in the 3D scanning abilities of ReconstructMe. ReconstructMe is a software interface that allows anyone with a Kinect (or other 3D [...]
-
8:22
»
Hack a Day
[Steven] needed to come up with a project for the Computer Vision course he was taking, so he decided to try building a portable 3D camera. His goal was to build a Kinect-like 3D scanner, though his solution is better suited for very detailed still scenes, while the Kinect performs shallow, less detailed scans of [...]
-
-
14:01
»
Hack a Day
It’s difficult to contain our excitement for this tiny quadcopter project called the Picopter. [Frank] managed to pull together an impressive collection of features when developing the project. First off, the quadcopter itself uses all-PCB construction. Even the supports for the motors are PCBs with keyed slots to mate perpendicular to the main control board, [...]
-
-
11:36
»
Hack a Day
[Karl] needed a programmable real-time clock for one of his projects. He considered adding an RTC chip, LCD screen, and some buttons for use with a microcontroller. That’s not necessarily hard, but it takes time and can be considered a project in itself. Instead, he headed to the hardware store to look for a cheap [...]
-
-
12:45
»
Hack a Day
So let’s say your using an Arduino in your project. You already have the hardware-based serial interface working with one portion of the project and need a second serial port for unrelated hardware. The obvious solution is to write one in software. But this is a place where working in the Arduino environment gets really [...]
-
-
14:39
»
Hack a Day
[Claudio] was working on a homebrew oscilloscope project when he started thinking about how unsuitable a standard breadboard is for a large-scale project. Rather than adding components on top of components until they became what he lovingly calls a “fragile, unforgiving crapstack”, he decided to build himself the Ultimate Breadboard. He packed so much into [...]
-
-
9:58
»
Hack a Day
This temperature display may not knock your socks off, but it’s a simple demonstration of how you can used vector graphics as a web readout for data (translated). [Luca] wrote this four page tutorial to help others, he makes it look really easy, and the sky’s the limit on eye candy once you get he basics [...]
-
-
8:06
»
Packet Storm Security Recent Files
Security Enhanced (SE) Android is a project to identify and address critical gaps in the security of Android. Initially, the SE Android project is enabling the use of SELinux in Android in order to limit the damage that can be done by flawed or malicious apps and in order to enforce separation guarantees between apps. However, the scope of the SE Android project is not limited to SELinux.
-
8:06
»
Packet Storm Security Misc. Files
Security Enhanced (SE) Android is a project to identify and address critical gaps in the security of Android. Initially, the SE Android project is enabling the use of SELinux in Android in order to limit the damage that can be done by flawed or malicious apps and in order to enforce separation guarantees between apps. However, the scope of the SE Android project is not limited to SELinux.
-
-
11:36
»
Hack a Day
It’s a fun time to design your own MP3 player, lovingly adding in features to a meticulously crafted user interface. But sometimes you just want a quick and cheap way to add music to a project. [Jeff Ledger] will show you how to do just that using some knock-off hardware from overseas. Instead of a [...]
-
-
14:56
»
Hack a Day
Meet Boxie. He’s a robot videographer with levels of interaction we haven’t seen outside an episode of Dora the Explorer. The project was conceived by [Alex] as his MIT thesis project to see if robots can use humans to make themselves more useful. All we know is Boxie is freaking adorable, as evidenced by this video. The [...]
-
-
9:01
»
Hack a Day
No matter how good the intentions or how strong your hack-fu may be, sometimes you just can’t cross the finish line with every project. Here’s one that we hate to see go unfinished, but it’s obvious that a ton of work already went into reclaiming these smart white-board projectors and it’s time to cut the [...]
-
-
6:00
»
Hack a Day
[George] just finished his first project: an 8×8 matrix “Board of Many Ping-Pong Balls” with 64 RGB LEDs. He started this project when he was 14 years old and finished the build over this last Christmas break. We won’t make any presumptions about [George]‘s age, but we couldn’t think of a better project to start [...]
-
-
7:01
»
Hack a Day
This project really puts an end to arguing over who has to ride in the back of the tandem bicycle. We challenge you not to smile while viewing the maiden voyage that [Carlos] and his daughter take on this side-by-side bicycle. The video can be found after the break. It certainly makes a bit more [...]
-
-
5:01
»
Hack a Day
[Axel] wanted to participate in the CheerLights project this holiday season, but not one to always follow the rules he decided to make his display a bit different than most others out there. While the lights at his house are synchronized with the CheerLights project, he programmed his Cheeriobot with a little added personality. Normally, [...]
-
-
18:03
»
Packet Storm Security Recent Files
Whitepaper called The Tor Project: Authority "No Check" Weakness. It discusses the fact that exit nodes can be leveraged easily to commit man-in-the-middle attacks.
-
18:03
»
Packet Storm Security Misc. Files
Whitepaper called The Tor Project: Authority "No Check" Weakness. It discusses the fact that exit nodes can be leveraged easily to commit man-in-the-middle attacks.
-
-
9:22
»
Packet Storm Security Advisories
Asterisk Project Security Advisory - It is possible to enumerate SIP usernames when the general and user/peer NAT settings differ in whether to respond to the port a request is sent from or the port listed for responses in the Via header. In 1.4 and 1.6.2, this would mean if one setting was nat=yes or nat=route and the other was either nat=no or nat=never. In 1.8 and 10, this would mean when one was nat=force_rport or nat=yes and the other was nat=no or nat=comedia.
-
9:22
»
Packet Storm Security Recent Files
Asterisk Project Security Advisory - It is possible to enumerate SIP usernames when the general and user/peer NAT settings differ in whether to respond to the port a request is sent from or the port listed for responses in the Via header. In 1.4 and 1.6.2, this would mean if one setting was nat=yes or nat=route and the other was either nat=no or nat=never. In 1.8 and 10, this would mean when one was nat=force_rport or nat=yes and the other was nat=no or nat=comedia.
-
9:22
»
Packet Storm Security Misc. Files
Asterisk Project Security Advisory - It is possible to enumerate SIP usernames when the general and user/peer NAT settings differ in whether to respond to the port a request is sent from or the port listed for responses in the Via header. In 1.4 and 1.6.2, this would mean if one setting was nat=yes or nat=route and the other was either nat=no or nat=never. In 1.8 and 10, this would mean when one was nat=force_rport or nat=yes and the other was nat=no or nat=comedia.
-
9:01
»
Hack a Day
Want to host a Jeopardy tournament with your friends? Looking to add a bit more fairness to your school’s knowledge bowl? Perhaps you should build some buzz-in hardware of your own. Here you can see [Matt Hanson's] take on this idea. He used one Arduino to gather not just buzzer info, but also keypad data [...]
-
-
16:11
»
Packet Storm Security Advisories
Asterisk Project Security Advisory - Asterisk suffers from a denial of service vulnerability. When the "automon" feature is enabled in features.conf, it is possible to send a sequence of SIP requests that cause Asterisk to dereference a NULL pointer and crash.
-
16:11
»
Packet Storm Security Recent Files
Asterisk Project Security Advisory - Asterisk suffers from a denial of service vulnerability. When the "automon" feature is enabled in features.conf, it is possible to send a sequence of SIP requests that cause Asterisk to dereference a NULL pointer and crash.
-
16:11
»
Packet Storm Security Misc. Files
Asterisk Project Security Advisory - Asterisk suffers from a denial of service vulnerability. When the "automon" feature is enabled in features.conf, it is possible to send a sequence of SIP requests that cause Asterisk to dereference a NULL pointer and crash.
-
-
14:30
»
Hack a Day
The quest for a project box is always a balance between cost, complexity, and style. We think [Pcmofo] really finds the mark with his exterior electrical box enclosures. He took the time to document his fabrication process for those that want to replicate his look. These grey plastic boxes are meant to keep the elements [...]
-
-
7:01
»
Hack a Day
In the quest for a diy laser cutter made from DVD burner parts (that hack’s still in the works) this guy ended up with a junk box full of optical-drive leftovers. He put some of that surplus to good use by building this stroboscope. As the media spins, the white LED just out of focus [...]
-
15:01
»
Hack a Day
If you set a cardiac nurse loose on a Propeller microcontroller and some parts you might not know what to expect. But we’re intrigued by the outcome of this project which looks to mimic a heartbeat’s audible and electrical traits. The post about the project is in four parts which are not linked to each [...]
-
-
10:01
»
Hack a Day
[Ryan] sent in a little project he’s been working on. After he got his hands on a pair of DJ Hero controllers, he figured he needed to pull controller data off them. After plugging in his two DJ Hero controllers to a breakout board, [Ryan] discovered the turntables communicate on an I2C bus. A Teensy [...]
-
-
6:01
»
Hack a Day
[Erik] has been keeping extremely busy with his latest project, a flexible RGB LED matrix that he calls “Project Light Bright”. The folks at BuildLounge tell us that this is the first entry they have received so far in their “Light Contest”, in which they are giving away a free laser cutter to the best [...]
-
-
9:01
»
Hack a Day
There have been many self-driving cars made with different levels of success, but probably the most well-known project is the Google car. What you may not have heard of, though is the autonomous Google cart, or golf cart to be exact. The first video after the break explains the motivation behind the cart and the [...]
-
8:01
»
Hack a Day
Finally [Michelle Annett] can talk about her super secret project she did at Autodesk Research. Medusa, as [Michelle]‘s project is called, is a Microsoft Surface that has been fitted with 138 proximity sensors. This allows the Surface to sense users walking up to it, and detect users hands and arms above the table top. Multiple [...]
-
-
16:35
»
Hack a Day
In a project that you’re sure to read about in police blotter someday, [Jair2k4] built a pair of Taser gloves that will shock your victim with they laying-on of hands. Not surprisingly, this project was spawned from a conversation at work about what tech would best suit a vigilante crime fighter. [Jair2k4] suggested taser gloves, which drew [...]
-
-
8:01
»
Hack a Day
If your next project needs the ability to play MP3s but you don’t have a lot of room to spare in your enclosure, [Boris] has just the thing you need. His tiny embedded MP3 module supports playback of up to 65,536 songs or as many as you can fit on a 16GB microSD card, which [...]
-
-
14:47
»
Packet Storm Security Advisories
Asterisk Project Security Advisory - The SIP channel driver allows a remote authenticated user that ability to cause a crash with a malformed request due to an uninitialized variable.
-
14:47
»
Packet Storm Security Advisories
Asterisk Project Security Advisory - The SIP channel driver allows a remote authenticated user that ability to cause a crash with a malformed request due to an uninitialized variable.
-
14:47
»
Packet Storm Security Recent Files
Asterisk Project Security Advisory - The SIP channel driver allows a remote authenticated user that ability to cause a crash with a malformed request due to an uninitialized variable.
-
14:47
»
Packet Storm Security Recent Files
Asterisk Project Security Advisory - The SIP channel driver allows a remote authenticated user that ability to cause a crash with a malformed request due to an uninitialized variable.
-
14:47
»
Packet Storm Security Misc. Files
Asterisk Project Security Advisory - The SIP channel driver allows a remote authenticated user that ability to cause a crash with a malformed request due to an uninitialized variable.
-
14:47
»
Packet Storm Security Misc. Files
Asterisk Project Security Advisory - The SIP channel driver allows a remote authenticated user that ability to cause a crash with a malformed request due to an uninitialized variable.
-
-
7:01
»
Hack a Day
If you’re between the ages of 14 and 18, or have a child who is, here’s a chance to put a project into space. NASA is partnering with YouTube, Lenovo, and a few other entities for a contest that challenges participants to dream up low-gravity experiments. You can enter as an individual or in teams [...]
-
-
14:25
»
Hack a Day
If there were a contest for the most thorough step-by-step project log [Kurt] would the champion. He recently a posted 150 step build log for his fleece-covered Portal turret project. If you can get over the need to click-through 30 pages of steps, there’s a lot to like about this project. First, what it doesn’t [...]
-
13:25
»
Hack a Day
If you ask us, there’s no substitute for learning by doing. But often the hardest part of acquiring new skills is coming up with the idea for a project that utilizes them. [Mike Rankin] wanted to develop a project using laser cut acrylic, and settled on building a control box for an RGB LED strip. [...]
-
12:25
»
Hack a Day
[Mark] had seen a few examples of algorithmic music generation that takes some simple code and produces complex-sounding results. Apparently it’s possible to pipe the output of code like this directly to audio devices on a Linux box, but [Mark] decided to go a different direction. His project lets you play simple algorithms as audio using [...]
-
-
10:01
»
Hack a Day
If you’re looking for a simple Ardunio project, why not replicate the first personal computer? After discovering the Arduino, [Mark] realized recreating really old computers would be a fun project. An Altair 8800 was on the table, but the sheer number of blinkenlights, switches and the Intel 8080 CPU made that a fairly difficult project. [...]
-
-
16:01
»
Hack a Day
[Nav] is working on a scratch-built wristwatch. Although it is based on an MSP430 microcontroller, it’s not the ready-to-hack ezCronos that you might be thinking of. Instead, [Nav] started with a different TI development tool that we’ve looked at before, the ez430-F2013. The breakout board for the F2013 is small enough to meet his needs, but [...]
-
4:04
»
Hack a Day
If there’s one thing we’ve noticed about hardware hackery and electronics project, it’s that all the resources to build a project are scattered about the Internet on forums, blogs (heh), and personal web pages. Enter Upverter. The fellows who started Upverter had the same observation, and after some Y Combinator funding, launched what they hope [...]
-
-
6:00
»
Hack a Day
Yup. We have all been there. You throw together a really elaborate Arduino project that only really needs a couple pins, far fewer than the Arduino’s native microcontrollers have to offer. Well fear not, [Thatcher] has solved just this problem by adding some ATTtiny cores to the Arduino IDE. His blog details the process from [...]
-
-
10:01
»
Hack a Day
[Adam Ben-Dror] recently tipped us off to a project that he worked on recently. In this build he gutted an old candlestick-style phone and added modern technology to make it work as a cordless phone. We really liked this project because he married together new and old technology into an elegant package. There are a [...]
-
-
14:01
»
Hack a Day
[Eric] needed a project for his digital logic design class, and decided on a lock that open in response to a specific pattern of knocks. This is a fairly common project that we’ve seen a few builds with ‘knock locks,’ but this one doesn’t use a microcontroller. Instead, it uses individual logic chips. The lock [...]
-
-
14:08
»
Hack a Day
[Russell] sent in a neat home automation project he’s been working on. Even though the project only has two devices so far, we can already see the potential of his project. Instead of the X10 standard that has been a staple of home automation for more than 30 years, [Russell] went with ZigBee modules. Aside [...]
-
-
9:01
»
Hack a Day
If you want an easy project to spice up your next party, chances are you already have parts on hand to throw together [Mikerbot's] quick and dirty VU-meter lights. The circuit he designed uses the audio input to trigger the base of a PNP transistor, toggling power through a string of LEDs. He’s using four [...]
-
8:01
»
Hack a Day
When [Bunny] moved into his apartment in Singapore he was surprised to find that a huge building project was just getting started on the other side of the block. Being the curious sort, he was always interested in what was going on, but just looking in on the project occasionally wasn’t enough. Instead, he set up a [...]
-
15:01
»
Hack a Day
Would you believe you can track, and even jam law enforcement radio communications using a pretty pink pager? It turns out the digital radios using the APCO-25 protocol can be jammed using the IM-ME hardware. We’ve seen this ‘toy’ so many times… yet it keeps on surprising us. Or rather, [Travis Goodspeed's] ability to do amazing [...]
-
-
10:31
»
Hack a Day
[Shawn McCombs] is up to no good with his first Teensy project. The board you see above takes the input from a PS2 keyboard and converts it to a USB connection. Oh, and did we mention that it also keeps track of everything you type as well? From the beginning the project was intended to be a [...]
-
4:01
»
Hack a Day
[Dan] wrote in to share a project he recently finished up, an autonomous Airsoft tank. The toy tank makes use of a wide array of technologies to get the job done, and will stop at nothing to hunt you down (provided you are wearing an IR beacon). An Arduino board is used to control the [...]
-
-
15:01
»
Hack a Day
One thing that really makes a project complete is the way in which you package your final product. Some people are fine with a piece of protoboard with wires sticking out in every direction, and truth be told, so are we – depending on the application. [Daniel] over at archive.org was seeking out enclosures to [...]
-
-
12:01
»
Hack a Day
Here’s a fantastic project that lets to drive a hexapod around the room using an RC controller. [YT2095] built the bot after replacing the servo motors on his robot arm during an upgrade. The three cheapies he had left over were just begging for a new project, and he says he got the first proof-of-concept [...]
-
-
9:02
»
Hack a Day
[Peter Brinkman] is working on a circuit that makes it easy to interface MIDI and Bluetooth devices. His target hardware has been a MIDI compatible keyboard and an Android phone. He was inspired to tip us off about the project after reading about yesterday’s Bluescripts project. We’ve embedded two demo videos after the break. They [...]
-
-
11:20
»
Hack a Day
[PJ Allen] built a meter to display gravitation force in an easy to read way. Good thing it’s easy to read, because he’s added it to the dashboard of his car. That way he gets instant feedback when he puts the pedal to the metal. We’re hoping this encourages safe driving practices. But since it [...]
-
6:02
»
Hack a Day
[Eli Skipp] wrote in to share a project she has been working on bit by bit, for over a year – an LED VU meter scarf. The project was originally going to be built using a custom PCB, but no matter how long she spent troubleshooting the piece, it just wouldn’t work right. She eventually [...]
-
-
14:01
»
Hack a Day
[Arthur Benemann] started a little project for his electrical engineering program, and suffered the worst case of feature creep we’ve ever seen. He just posted an instructable of his picChess project that is able to play chess on a VGA monitor with a keyboard, with sound, a clock, temperature sensor. Apparently, [Arthur] was bored one [...]
-
-
19:00
»
Packet Storm Security Advisories
Asterisk Project Security Advisory - Asterisk may respond differently to SIP requests from an invalid SIP user than it does to a user configured on the system, even when the alwaysauthreject option is set in the configuration. This can leak information about what SIP users are valid on the Asterisk system.
-
19:00
»
Packet Storm Security Recent Files
Asterisk Project Security Advisory - Asterisk may respond differently to SIP requests from an invalid SIP user than it does to a user configured on the system, even when the alwaysauthreject option is set in the configuration. This can leak information about what SIP users are valid on the Asterisk system.
-
19:00
»
Packet Storm Security Misc. Files
Asterisk Project Security Advisory - Asterisk may respond differently to SIP requests from an invalid SIP user than it does to a user configured on the system, even when the alwaysauthreject option is set in the configuration. This can leak information about what SIP users are valid on the Asterisk system.
-
-
11:01
»
Hack a Day
The Gado project is part of the Johns Hopkins University Center for African Studies. It has been tasked with archiving documents having to do with the East Baltimore Oral Histories Project. In short, they’ve got a pile of old pictures and documents that they want digitized but are not easily run through a page-fed scanner [...]
-
-
6:06
»
Hack a Day
[Phillip Torrone] gave us a heads up about a project he and [Limor Fried] along with [Mike Doell] have just wrapped up. Their aptly-named “iCufflinks” softly pulsate with light the same way in which you see many Mac products do. The cufflinks are made from machined aluminum and have the ubiquitous “power symbol” milled into [...]
-
-
15:01
»
Hack a Day
[Scott's] been digging around the back issues of the Internet to find this project. He blew the dust off and sent us a link to an article that traverses the design and build process of a bench power supply. [Guido Socher] does an excellent job of presenting his bench supply project. So many others show [...]
-
10:01
»
Hack a Day
[Pcdevltd] pulled an all-nighter to get his first Android Developer Kit project up and running. Basing the project off of the example that Google used when unveiling the new accessory development hardware, he set to work controlling a marble labyrinth game using his smart phone. What began at 7pm was wrapped up by 5am to [...]
-
-
7:08
»
Hack a Day
[Luis de Matos] is working on a neat Kinect project called Wi-GO that aims, as many do, to enhance the lives of individuals with disabilities. While the Wi-GO project is geared towards disabled persons, it can be quite helpful to the elderly and pregnant women as well. Wi-GO is a motorized shopping cart with a [...]
-
-
21:39
»
Packet Storm Security Advisories
Asterisk Project Security Advisory - If a remote user initiates a SIP call and the recipient picks up, the remote user can reply with a malformed Contact header that Asterisk will improperly handle and cause a crash due to a segmentation fault.
-
21:39
»
Packet Storm Security Recent Files
Asterisk Project Security Advisory - If a remote user initiates a SIP call and the recipient picks up, the remote user can reply with a malformed Contact header that Asterisk will improperly handle and cause a crash due to a segmentation fault.
-
21:39
»
Packet Storm Security Misc. Files
Asterisk Project Security Advisory - If a remote user initiates a SIP call and the recipient picks up, the remote user can reply with a malformed Contact header that Asterisk will improperly handle and cause a crash due to a segmentation fault.
-
-
16:01
»
Hack a Day
[Nirav] found that he rarely printed anything useful with his RepRap, so to shake things up, he decided he needed to work on a project that didn’t involve printing yet more RepRap parts. The goal of his project was to create working replicas of house keys by simply using the code imprinted at the factory. [...]
-
-
13:30
»
Hack a Day
Development has been progessing quite nicely on [Matlo's] PlayStation 3 controller spoofing project. This is a package that allows you to identify a PC as a PS3 controller. We know what you’re thinking: why would you want to do that? When we originally looked in on the project about a year ago we mentioned that [...]
-
10:38
»
Hack a Day
So, you’ve got your awesome project built and are ready to take it on the go, but how are you going to power it? You could use a couple alkaline cells or perhaps swipe a Litihium battery pack from some infrequently used portable device – however before you do that, why not check out what [...]
-
8:10
»
Hack a Day
A few months ago, [Ulysses] had a project in mind that would run Zork on a TDD. Although it was a bit of a struggle getting the project ready in time for the Bay Area Maker’s Faire, the accompanying build blog tells us it was more than worth the effort. After hooking up the guts [...]
-
-
8:30
»
Hack a Day
This weekend project will tell you when you’ve got something new to look at on your Facebook page (translated). The yellow flag on the side of the mini-mailbox automatically goes up, alerting you to your recent online popularity. [Rocco's] craftwork on this project is fantastic. We love the scale, the colors, and especially the artificial grass [...]
-
-
14:28
»
Hack a Day
[Dino] is staying true to his goal of hacking one project every week. This time around, he’s working on a toy that will amuse and delight his cats. The project centers around a mouse house that has two holes where mice can stick their heads out. When they do, a little LED lamp illuminates their [...]
-
-
13:01
»
Hack a Day
[Ginge] sent in this fun little project. He gave himself 3 hours to complete a hack (not including research time) and managed to come up with this cool activity meter. He handles the entire project like it is some kind of contest. Ground rules are laid out, requiring practicality of the final product, minimum investment, [...]
-
-
11:01
»
Hack a Day
Quite often, we see project boxes that seem to be constructed more as an afterthought than anything else. That’s not to say there is anything wrong with stuffing your latest creation into a nondescript black box, or even cardboard if it happens to fit your needs. Sometimes however, an enclosure embodies the spirit of a [...]
-
6:06
»
Hack a Day
[yergacheffe] was able to get his hands on a shiny new Google ADK board about a week before it was announced at I/O, and got busy putting together a neat project to show off some of the ADK’s features. His idea was to meld together the ADK and Google’s new music service, two items he [...]
-
-
12:52
»
Hack a Day
For some projects, it’s okay to have a microcontroller twiddling it’s thumbs most of the time. When a project requires the cpu to do just one thing over and over, there’s no loss with inefficient code – it either works or it doesn’t. However, if a project requires a microcontroller to do several things at [...]
-
-
5:00
»
Hack a Day
Last year, [Justin Dailey] was coming down the home stretch of his senior year as a Computer Engineering student and needed to build a final design project. He always wanted to construct a robotic arm, and figured that there was no better way to legitimize such a project, than to claim that it was “homework”. [...]
-
-
10:01
»
Hack a Day
[Sam Fok], an engineering student at the Washington University School of Engineering wrote in to share a project he and his classmates [Raphael Schwartz, Mark Wronkiewicz, Charles Holmes, Jessica Zhang, Nathan Brodell, and Thane Somers] have been working on as their entry in the 2011 RESNA Student Design Competition. Their project, IpsiHand, is designed to [...]
-
-
10:51
»
Hack a Day
[Rhys] wrote in to share a custom project box he built from scratch using polyester resin. He states that in New Zealand, he tends to have problems finding the perfect project box. They are typically too big or small to get the job done, so he figured he might as well just build his own [...]
-
-
10:30
»
Hack a Day
[Paul] Wrote in to tell us about a quick project that might be useful to others out there. He was having some problems with the DC jack on his Yamaha DD35 portable drum kit. Naturally, he did what most of us would do and just broke out the soldering iron and prepared to solder it back in [...]