«
Expand/Collapse
18 items tagged "surface"
Related tags:
hacks [+],
tool [+],
surface mount [+],
talk [+],
sidenote [+],
microsoft surface [+],
irda [+],
evil server [+],
chaos communication congress [+],
breakout [+],
board [+],
Hardware [+],
windows [+],
web cam [+],
way [+],
water [+],
vulnerability [+],
visual persistence [+],
video [+],
vacuum tweezers [+],
vacuum [+],
university of munich [+],
tour [+],
tip [+],
tiny components [+],
thumbnail [+],
tail [+],
surface unit [+],
surface of the water [+],
space program [+],
soic [+],
software vulnerabilities [+],
soap film [+],
soap [+],
slabs [+],
sharp knife [+],
several times [+],
security science [+],
security patch [+],
rtc [+],
red bull [+],
read [+],
proximity sensors [+],
project [+],
poppler [+],
playback module [+],
pin soic package [+],
personal project [+],
multitouch [+],
monochromatic images [+],
mockup [+],
misc [+],
microsoft [+],
michelle annett [+],
michelle [+],
message [+],
memory corruption [+],
medusa [+],
marseilles france [+],
mapping [+],
linux [+],
laser [+],
ken [+],
inventory [+],
integer overflow [+],
inoue [+],
image [+],
idea [+],
hole components [+],
gps [+],
glow in the dark paint [+],
fun and games [+],
france [+],
florian echtler [+],
film screen [+],
diy [+],
dark message board [+],
critical security [+],
copper tape [+],
contests [+],
cnc [+],
catalogue changes [+],
caleb [+],
building [+],
bubbler [+],
board artwork [+],
blue marble [+],
ballpoint pen [+],
attack [+],
arduino [+],
aquarium pump [+],
annett [+],
analyzer [+],
HackIt [+],
Countermeasures [+]
-
-
7:53
»
Hack a Day
Once you’ve been tinkering around with electronics for a while, you’ll realize the through-hole components that make breadboarding a circuit so easy won’t cut it anymore. Surface mount parts are the future, and make it incredibly easy to build a semi-professional mockup at home. The question arises, though: how do you store thousands of surface [...]
-
-
11:01
»
Hack a Day
The image you see above isn’t a simple photograph of our blue marble from thousands of miles above. No, that image is much cooler than a satellite because it’s a projection of the Earth onto a soap film screen. Yes, we can now display images on the surface of bubbles. Instead of a the soap [...]
-
-
14:01
»
Hack a Day
This entry in the Red Bull Creation contest uses a laser to charge up a glow-in-the-dark message board. The concept is something we’ve seen several times before. Since light can excite a phosphorescent surface, moving pixels of light over that surface leaves a fading trail. Most recently we saw a spinning ring message board. This [...]
-
-
13:01
»
Hack a Day
We’ve all had that sinking feeling as a piece of hardware stops responding and the nasty thought of “did I just brick this thing?” rockets to the front of our minds. [Florian Echtler] recently experienced this in extremis as his hacking on the University of Munich’s Microsoft Surface 2.0 left it unresponsive. He says this is [...]
-
-
17:01
»
Hack a Day
Writing for Hackaday isn’t all fun and games; occasionally I need to actually write posts and reply to emails from builders around the globe. Usually, though, I’m knee-deep in a personal project, or just hanging out playing a few video games. Recently I’ve gone off the deep end with Kerbal Space Program, an awesome little [...]
-
-
21:41
»
SecDocs
Authors:
Ilja van Sprundel Tags:
phone Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: There's been a fair bit written and presented about smartphone's, and yet, when it comes to the attack surface of the operating systems running on them, and the applications running on top of those, much still has to be explorer. This talk will dive a bit deeper into that attack surface. This talk will take a look at the smart phone attack surface, only from and end-to-end point of view. the baseband type stuff and things owned by the telco's will not be covered. Basically, it'll cover 5 major areas: identifying operating systems (through for example the user-agent with mms) identifying entrypoints identifying trust boundaries identifying bugs exploiting bugs There has been a fair amount of cellphone and smartphone reseach done in the past, and yet, when it comes to attack surface, we've barely scratched the surface. SMS alone allows for a dozen or so different types of messages, there's mms, all sorts of media codecs are build into smart phones. The entrypoints can be roughly categorized as: primary entypoints: - zero-click remote attacks over default communication network (sms, mms, ...) secondary entrypoints: - zero-click remote attacks over non-default communication network (email, ...) tertiary entrypoints: - proximity attacks (wifi, bluetooth, irda, mitm wifi connection, ...) - not-zero click remote attacks (e.g. start application XYZ and connect to my evil server) The main focus in this talk will be on the primary entrypoints, however some of the secondary and tertiary entrypoints will be talked about aswell, in particular irda, since unlike bluetooth and wifi, very little security research has ever been done with irda, which on itself is weird, since after less than a day of poking around it became quite clear most irda stacks are pretty weak (as a hilarious irda sidenote which got me started to look at idra, one should read the following microsoft bulletin http://www.microsoft.com/technet/security/bulletin/ms01-046.mspx). once's the interesting entrypoints for various smartphones are explored the talk will dive into some of the trust boundaries on different smartphones, things their sandboxes allow, things they don't, wether or not it's documented and wether or not the documentation is actually accurate. in the spirit of keeping the best for last, some of the bugs discovered during the smartphone research will be discussed, both the details of them, as well as the pains the speaker had to go through to make exploits for them.
-
21:41
»
SecDocs
Authors:
Ilja van Sprundel Tags:
phone Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: There's been a fair bit written and presented about smartphone's, and yet, when it comes to the attack surface of the operating systems running on them, and the applications running on top of those, much still has to be explorer. This talk will dive a bit deeper into that attack surface. This talk will take a look at the smart phone attack surface, only from and end-to-end point of view. the baseband type stuff and things owned by the telco's will not be covered. Basically, it'll cover 5 major areas: identifying operating systems (through for example the user-agent with mms) identifying entrypoints identifying trust boundaries identifying bugs exploiting bugs There has been a fair amount of cellphone and smartphone reseach done in the past, and yet, when it comes to attack surface, we've barely scratched the surface. SMS alone allows for a dozen or so different types of messages, there's mms, all sorts of media codecs are build into smart phones. The entrypoints can be roughly categorized as: primary entypoints: - zero-click remote attacks over default communication network (sms, mms, ...) secondary entrypoints: - zero-click remote attacks over non-default communication network (email, ...) tertiary entrypoints: - proximity attacks (wifi, bluetooth, irda, mitm wifi connection, ...) - not-zero click remote attacks (e.g. start application XYZ and connect to my evil server) The main focus in this talk will be on the primary entrypoints, however some of the secondary and tertiary entrypoints will be talked about aswell, in particular irda, since unlike bluetooth and wifi, very little security research has ever been done with irda, which on itself is weird, since after less than a day of poking around it became quite clear most irda stacks are pretty weak (as a hilarious irda sidenote which got me started to look at idra, one should read the following microsoft bulletin http://www.microsoft.com/technet/security/bulletin/ms01-046.mspx). once's the interesting entrypoints for various smartphones are explored the talk will dive into some of the trust boundaries on different smartphones, things their sandboxes allow, things they don't, wether or not it's documented and wether or not the documentation is actually accurate. in the spirit of keeping the best for last, some of the bugs discovered during the smartphone research will be discussed, both the details of them, as well as the pains the speaker had to go through to make exploits for them.
-
-
8:01
»
Hack a Day
Finally [Michelle Annett] can talk about her super secret project she did at Autodesk Research. Medusa, as [Michelle]‘s project is called, is a Microsoft Surface that has been fitted with 138 proximity sensors. This allows the Surface to sense users walking up to it, and detect users hands and arms above the table top. Multiple [...]
-
-
14:28
»
Hack a Day
The team at Eschelle Inconnue wanted to “trace a sound cartography of Islam” in Marseilles, France, so they came up with a clever little GPS walking tour powered by an Arduino, MP3 playback module, and a surface transducer speaker. The team used a Processing app to define geographic areas where each MP3 file would play. [...]
-
-
9:00
»
Hack a Day
[Caleb] needed to use some surface mount components when prototyping. Instead of buy a breakout board he made one himself without doing any etching. The process he shows off in the video after the break uses copper tape to layout the traces for the board. It’s quite an interesting method which requires a sharp knife [...]
-
-
8:09
»
Hack a Day
Here’s a simple and interesting idea that increases the visual persistence of a laser scanner image. Using glow-in-the-dark paint, [Daito Manabe] prepares a surface so that the intense light of a laser leaves a trace that fades slowly over time. He’s using the idea to print monochromatic images onto the treated surface, starting with the [...]
-
-
9:47
»
Hack a Day
Hackaday writer [Gerrit Coetzee] built a simple clamp to aid in surface mount component soldering. This cheap, easily made device uses gravity to hold tiny components in place. The tip of the bolt is pointed, but gently like a ballpoint pen so as not to harm the components with a sharp tip. Roughly position your [...]
-
-
12:12
»
Hack a Day
[Ken] found that using traditional tweezers is a good way to lose tiny surface mount parts and so set out to make his own vacuum tweezers (PDF). He already had a small aquarium pump that he used as a bubbler for etching circuit boards. After opening up the case he found it was possible to [...]
-
-
4:55
»
Hack a Day
[Taichi Inoue] is back again, this time with a multitouch system that uses water as the touch surface. The setup consists of a tank of water placed atop an LCD, a lamp, and a web cam. The web cam pics up the light that is reflected when something breaks the surface of the water. It [...]
-
-
9:00
»
Hack a Day
We got a hold of some DS3232 RTC chips in a 20-pin SOIC package. We’d like to have one that is breadboard compatible for easy prototyping but when we searched for SOIC20W breakout board artwork we found none. We used Eagle to design our own and you can see the finished product above which we [...]