«
Expand/Collapse
58 items tagged "table"
Related tags:
home [+],
vulnerability [+],
myisam [+],
mandriva linux [+],
coffee table [+],
mysql [+],
led [+],
coffee [+],
arduino [+],
xss [+],
xml entity [+],
tool [+],
third party [+],
table overview [+],
table of contents [+],
symbolic link [+],
rainbow [+],
privilege escalation vulnerability [+],
local privilege escalation [+],
linux security [+],
leds [+],
hash table [+],
hash functions [+],
hash [+],
drupal [+],
database [+],
contents [+],
brute force [+],
bit [+],
variable assignment [+],
value functions [+],
table surfaces [+],
server [+],
rig [+],
privileges [+],
pong [+],
packet [+],
name [+],
multitouch [+],
misc [+],
maple [+],
logical expression [+],
expression [+],
dillon [+],
butcher block [+],
buffer overflow attack [+],
bowling lane [+],
bowling [+],
Newbie [+],
Area [+],
hacks [+],
zero day [+],
zdi [+],
yacht [+],
x86 [+],
written patterns [+],
wpa psk [+],
wpa [+],
wordlist [+],
weapons [+],
wavetable oscillator [+],
wave table [+],
wave [+],
warp zone [+],
warp [+],
video [+],
vacuum table [+],
vacuum [+],
user [+],
usa [+],
unusualtravis [+],
toy [+],
tobias [+],
tl074 [+],
time [+],
thomas pototschnig [+],
technology zurich [+],
target [+],
tablet computers [+],
table topper [+],
table features [+],
table column [+],
table chess [+],
swiss federal institute of technology [+],
swiss federal institute [+],
swearing [+],
street usa [+],
ssid [+],
sparkfun [+],
smoked glass [+],
slave mode [+],
shiftbrite [+],
shellcode [+],
setup [+],
seth sandler [+],
seth [+],
servos [+],
self replicating robots [+],
seating [+],
sailor blush [+],
router table [+],
router [+],
room [+],
rohit sharma [+],
robots [+],
robin [+],
robert olszewski [+],
rfid [+],
raleigh [+],
punk [+],
project ideas [+],
pong table [+],
polymorphic [+],
pls [+],
ping pong table [+],
personal site [+],
periodic [+],
pain in the butt [+],
oscillator [+],
musical [+],
move [+],
mouse button [+],
modern toss [+],
mini light [+],
mini [+],
mike [+],
member mike [+],
mdvsa [+],
mdf [+],
matrix table [+],
mario mauerer [+],
maker [+],
make [+],
maintenance program [+],
main street electrical parade [+],
main street [+],
magic table [+],
magic music [+],
magic [+],
lou [+],
logiciel [+],
linux x86 [+],
linux [+],
length [+],
led matrix [+],
lassy [+],
lance 4 [+],
l instant [+],
joe [+],
jig [+],
james [+],
ipod [+],
internet opponent [+],
internet explorer user [+],
internet [+],
interactive table [+],
helpp [+],
height [+],
heating coils [+],
hackerspace [+],
grid [+],
goodness [+],
golf [+],
glass cleaner [+],
glass [+],
gig [+],
genpmk [+],
garage door opener [+],
gaming table [+],
gaming [+],
game [+],
furniture [+],
fun [+],
form [+],
font [+],
finished product [+],
fichier [+],
faire [+],
exhibitor [+],
entertainment [+],
enclosure houses [+],
electronic table [+],
electric frying pans [+],
dustin evans [+],
drawback [+],
diy [+],
digital gaming [+],
digital [+],
denial of service [+],
denial [+],
delightful game [+],
debutant [+],
daft punk [+],
daft [+],
css [+],
control scheme [+],
cons [+],
concrete sides [+],
concrete base [+],
code execution [+],
cnc [+],
christian enchelmaier [+],
christian [+],
child [+],
chess table [+],
chess [+],
chair [+],
ceiling mounted projector [+],
cavity [+],
caleb [+],
bytes [+],
building [+],
brad [+],
box joint jig [+],
bonjours [+],
bones [+],
blinky [+],
apple quicktime [+],
anything [+],
alex george [+],
alex [+],
adam lassy [+],
Support [+],
Hackerspaces [+],
Espace [+]
-
-
11:01
»
Hack a Day
Members of the Warp Zone hackerspace wanted a coffee table that was beyond ordinary. They ended up pouring a concrete base for the glass top (translated). There were several things to address during the design. First off, they wanted to integrate LEDs in the concrete sides. Some consideration had to be made for portability as [...]
-
-
13:01
»
Hack a Day
This could be the dawning of a new hackerspace sport. [Antoni Kaniowski] and [Rohit Sharma] came up with a delightful game of desktop golf. But the control scheme has a decidedly geeky flair. They’re using salvaged parts from an audio device and a hard drive to control the swing of the mechanical golfer just out of [...]
-
5:01
»
Hack a Day
For a workbench, desk, or even a dining room table, there’s nothing quite like a massive piece of laminated maple put to use as the surface of a table. Whether in the form of butcher block, a shop class table, or in [Dillon]‘s case, a reclaimed bowling lane, laminated maple provides one of the best possible table surfaces. [...]
-
5:01
»
Hack a Day
For a workbench, desk, or even a dining room table, there’s nothing quite like a massive piece of laminated maple put to use as the surface of a table. Whether in the form of butcher block, a shop class table, or in [Dillon]‘s case, a reclaimed bowling lane, laminated maple provides one of the best possible table surfaces. [...]
-
-
10:01
»
Hack a Day
[Lou] is at it again, and this time he wrote in to let us know about his automated ping pong table topper. With no good spot to stash an entire extra table [Lou] decided to take a two in one game table approach and fit the top of the ping pong table to his pool [...]
-
-
6:01
»
Hack a Day
[Woodgears.ca] seems to be a wealth of clever hacks, and this CNC box joint jig is no exception. Although one has to manually move the jig to make the actual cut, it still gives the user a lot of extra functionality. One only has to click the mouse button to advance the workpiece. One drawback [...]
-
-
10:01
»
Hack a Day
As [Caleb] mentioned earlier, I attended the Raleigh Maker Faire this year as an exhibitor. Although the table was for my personal site, some of you might have noticed that I was wearing a sweet [HAD] shirt and dispensing our stickers (which seemed to fly off the table). The event was extremely fun from the “other [...]
-
-
9:01
»
Hack a Day
[Alex George] has been collecting miniatures of Main Street, USA in Disney Land hand crafted by artist [Robert Olszewski]. These models are incredibly accurate, but sadly static. [Alex] has some of the floats from the Main Street Electrical Parade that light up with the help of a few LEDs. One day, [Alex] found himself wishing he could watch [...]
-
-
16:01
»
Hack a Day
[Unusualtravis] came up with this fairly slick electronic catapult. This easy to construct and moderately cheap rig has an arduino as the brains and controls for 3 servos. One is the release, another controls tension, and the third controls the angle. Both the circuit and the construction are very simple making this a perfect weekend [...]
-
-
5:00
»
Hack a Day
[DanNixon] has put together this unique interactive table concept. Usually, when we see the term interactive table, we think of an LED grid. That just happens to be what we see the most of. While this table does, in fact, have an LED grid in the table top, it also has several other features and [...]
-
-
6:01
»
Hack a Day
Along with quadrotors, and portable game consoles, one of the hacks we never get tired of seeing is an LED matrix table. [Christian Enchelmaier] wrote in to share his take on the ever popular pixelated furniture, which we think came out pretty well (Translation). Instead of going for a full-sized coffee table, [Christian] decided to [...]
-
-
14:30
»
Hack a Day
The concept of having a digital gaming table got stuck in [RobotGuy's] mind over the weekend and he managed to whip this up in no time using materials on hand. He already had a ceiling-mounted projector which just happens to reside immediately above the space occupied by his coffee table. By swapping that piece of [...]
-
-
12:25
»
Hack a Day
This coffee table is a real show-piece. It’s got a smoky glass surface that is hiding the LCD screen within. But what fun would it be if it could only play video? The rest of the enclosure houses all the parts necessary to make this living room centerpiece into a computer. After the break you [...]
-
-
9:44
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2011-198 - Multiple vulnerabilities has been found and corrected in phpmyadmin. Importing a specially-crafted XML file which contains an XML entity injection permits to retrieve a local file (limited by the privileges of the user running the web server). Using crafted database names, it was possible to produce XSS in the Database Synchronize and Database rename panels. Using an invalid and crafted SQL query, it was possible to produce XSS when editing a query on a table overview panel or when using the view creation dialog. Using a crafted column type, it was possible to produce XSS in the table search and create index dialogs. Crafted values entered in the setup interface can produce XSS; also, if the config directory exists and is writeable, the XSS payload can be saved to this directory. Using crafted url parameters, it was possible to produce XSS on the export panels in the server, database and table sections. This upgrade provides the latest phpmyadmin version to address these vulnerabilities.
-
9:44
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2011-198 - Multiple vulnerabilities has been found and corrected in phpmyadmin. Importing a specially-crafted XML file which contains an XML entity injection permits to retrieve a local file (limited by the privileges of the user running the web server). Using crafted database names, it was possible to produce XSS in the Database Synchronize and Database rename panels. Using an invalid and crafted SQL query, it was possible to produce XSS when editing a query on a table overview panel or when using the view creation dialog. Using a crafted column type, it was possible to produce XSS in the table search and create index dialogs. Crafted values entered in the setup interface can produce XSS; also, if the config directory exists and is writeable, the XSS payload can be saved to this directory. Using crafted url parameters, it was possible to produce XSS on the export panels in the server, database and table sections. This upgrade provides the latest phpmyadmin version to address these vulnerabilities.
-
9:44
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2011-198 - Multiple vulnerabilities has been found and corrected in phpmyadmin. Importing a specially-crafted XML file which contains an XML entity injection permits to retrieve a local file (limited by the privileges of the user running the web server). Using crafted database names, it was possible to produce XSS in the Database Synchronize and Database rename panels. Using an invalid and crafted SQL query, it was possible to produce XSS when editing a query on a table overview panel or when using the view creation dialog. Using a crafted column type, it was possible to produce XSS in the table search and create index dialogs. Crafted values entered in the setup interface can produce XSS; also, if the config directory exists and is writeable, the XSS payload can be saved to this directory. Using crafted url parameters, it was possible to produce XSS on the export panels in the server, database and table sections. This upgrade provides the latest phpmyadmin version to address these vulnerabilities.
-
-
9:49
»
Packet Storm Security Advisories
Most hash functions used in hash table implementations can be broken faster than by using brute-force techniques (which is feasible for hash functions with 32 bit output, but very expensive for 64 bit functions) by using one of two "tricks": equivalent substrings or a meet-in-the-middle attack.
-
9:49
»
Packet Storm Security Recent Files
Most hash functions used in hash table implementations can be broken faster than by using brute-force techniques (which is feasible for hash functions with 32 bit output, but very expensive for 64 bit functions) by using one of two "tricks": equivalent substrings or a meet-in-the-middle attack.
-
9:49
»
Packet Storm Security Misc. Files
Most hash functions used in hash table implementations can be broken faster than by using brute-force techniques (which is feasible for hash functions with 32 bit output, but very expensive for 64 bit functions) by using one of two "tricks": equivalent substrings or a meet-in-the-middle attack.
-
-
11:01
»
Hack a Day
If you often find yourself at a loss for words in the heat of an argument, perhaps this Periodic Table of Swearing is something you might be interested in. Built as a marketing tool for the British comic “Modern Toss”, the table features over 100 fruit machine (slot machine) buttons, each of which triggers an [...]
-
-
10:01
»
Hack a Day
Instructables user [XenonJohn] recently put together a fantastic tutorial detailing how he made an RFID-controlled jukebox. The Magic Music Table was created for a disabled child, who is unable to use a CD payer, nor navigate small buttons and menus on MP3 players. He originally though about making the buttons more accessible a la the Frankenkindle, [...]
-
-
14:01
»
Hack a Day
[James] builds all sorts of robots and superhero costume replicas at home, so he is always searching for a better way to get consistent results when using his vacuum table. A lot of people use their oven or exposed heating coils from electric frying pans to warm the plastic sheets, but [James] wasn’t really interested in going [...]
-
-
15:10
»
Hack a Day
Students in the BASTLI lab at the Swiss Federal Institute of Technology Zurich had been stuck using underpowered and unreliable saws for quite some time. The saws often got stuck while cutting through PCBs and were generally a drag to use. When group member [Mario Mauerer] came across a big and powerful brushless motor in [...]
-
-
15:30
»
Hack a Day
Hackaday forum member [Mike] was looking for project ideas when his girlfriend, an art major, suggested that he build her a light table to help with her various assignments. Having seen a few of these projects pop up from time to time, he figured he was up to the task. He started hunting around at [...]
-
-
12:01
»
Hack a Day
Adjusting the bit height on a router table can be a pain in the butt. Traditionally you needed to get into the cavity under the table top in order to make these adjustments, and it’s hard to make the adjustment and measure the height at the same time. Modern routers now offer the option to [...]
-
-
12:25
»
Hack a Day
Here is a bare-bones multitouch table setup. We looked in on [Seth Sandler's] multitouch work a few years ago when he completed the MTmini build. He’s scaling up the size a bit with the MTbiggie, and showing you how easy it is to put together. The demo rig seen above is just a couple of [...]
-
-
8:53
»
Hack a Day
While Pong has traditionally been a game played between two individuals, Instructables user [Brad] has put together a variation that doubles the fun. His Pong coffee table has the ability to support up to four users at once, and makes for quite the living room centerpiece. The table is made from sheets of MDF and [...]
-
-
5:05
»
Hack a Day
The tabulaRasa is a digital wave table oscillator, and features control of frequency, wave table selection, and interpolation. The device is split up into 2 parts. One is a pcb with a healthy amount of resistors, 3 potentiometers, ST TL074 JFET op amp, atmega328 and a SD socket. The second part is software for your [...]
-
-
22:02
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2010-223 - Multiple vulnerabilities were discovered and corrected in mysql. During evaluation of arguments to extreme-value functions (such as LEAST() and GREATEST()), type errors did not propagate properly, causing the server to crash. The server could crash after materializing a derived table that required a temporary table for grouping. A user-variable assignment expression that is evaluated in a logical expression context can be precalculated in a temporary table for GROUP BY. However, when the expression value is used after creation of the temporary table, it was re-evaluated, not read from the table and a server crash resulted. Pre-evaluation of LIKE predicates during view preparation could cause a server crash. Various other issues were addressed as well.
-
22:01
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2010-223 - Multiple vulnerabilities were discovered and corrected in mysql. During evaluation of arguments to extreme-value functions (such as LEAST() and GREATEST()), type errors did not propagate properly, causing the server to crash. The server could crash after materializing a derived table that required a temporary table for grouping. A user-variable assignment expression that is evaluated in a logical expression context can be precalculated in a temporary table for GROUP BY. However, when the expression value is used after creation of the temporary table, it was re-evaluated, not read from the table and a server crash resulted. Pre-evaluation of LIKE predicates during view preparation could cause a server crash. Various other issues were addressed as well.
-
-
12:30
»
Hack a Day
This beautifully crafted Daft Punk table with iPod dock was built by [Dustin Evans]. The table itself was built with the help of a friend in one day with electronics added a bit later. It features an 8×8 grid of boxes with red LEDs mounted inside. The picture above is not quite the finished product, [...]
-
-
17:27
»
Hack a Day
Wanting to get back to playing with actual pieces, [Thomas Pototschnig] built a chess table that interfaces with the Internet. The table uses an custom setup to project the board on the frosted surface of the table. Chess moves from your internet opponent are displayed as arrows on the board so you can move the [...]
-
-
13:00
»
Hack a Day
This mechanized table automatically expands from seating for six to seating for twelve. We tried to capture the action with the three images above but don’t miss the transforming goodness in the video after the break. Alas, we’ll never see something like this in real life because it resides on a yacht worthy of Robin [...]
-
12:00
»
Hack a Day
A table and chair that can move around by themselves? What’s next, suicide booths, self-replicating robots, and Star Trek styled tablet computers? It seems that [Adam Lassy] is moving in that direction. He took this furniture from Ikea and made some neat modifications to give it mobility. Each of the four legs has wheels on them [...]
-
-
23:00
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2010-107 - The server failed to check the table name argument of a COM_FIELD_LIST command packet for validity and compliance to acceptable table name standards. This could be exploited to bypass almost all forms of checks for privileges and table-level grants by providing a specially crafted table name argument to COM_FIELD_LIST. The server could be tricked into reading packets indefinitely if it received a packet larger than the maximum size of one packet. The server was susceptible to a buffer-overflow attack due to a failure to perform bounds checking on the table name argument of a COM_FIELD_LIST command packet. By sending long data for the table name, a buffer is overflown, which could be exploited by an authenticated user to inject malicious code. Packages for 2008.0 and 2009.0 are provided as of the Extended Maintenance Program. The updated packages have been patched to correct these issues.
-
23:00
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2010-107 - The server failed to check the table name argument of a COM_FIELD_LIST command packet for validity and compliance to acceptable table name standards. This could be exploited to bypass almost all forms of checks for privileges and table-level grants by providing a specially crafted table name argument to COM_FIELD_LIST. The server could be tricked into reading packets indefinitely if it received a packet larger than the maximum size of one packet. The server was susceptible to a buffer-overflow attack due to a failure to perform bounds checking on the table name argument of a COM_FIELD_LIST command packet. By sending long data for the table name, a buffer is overflown, which could be exploited by an authenticated user to inject malicious code. Packages for 2008.0 and 2009.0 are provided as of the Extended Maintenance Program. The updated packages have been patched to correct these issues.
-
-
21:00
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2010-101 - It was possible for DROP TABLE of one MyISAM table to remove the data and index files of a different MyISAM table. Packages for 2008.0 and 2009.0 are provided due to the Extended Maintenance Program for those products. The updated packages have been patched to correct this issue.
-
-
7:11
»
remote-exploit & backtrack
hi dears ,
Would you please help me how can i make my Own Rainbow Table like xxx.wpa file ?
i created my own wordlist now i want make my own rainbow table ....
Regards ~
-
-
13:44
»
Hack a Day
That’s a lot of LEDs, and a little bit of glass cleaner. [Tobias] spiced up his IKEA coffee table by adding 6144 LEDs. This is a larger realization of SparkFun’s LED coffee table which used 64 8×8 modules. [Tobias] sourced three display boards from Sure Electronics for a total of 96 8×8 modules. These boards [...]
-
-
6:04
»
remote-exploit & backtrack
Bonjours à tous,
J'utilise de plus en plus cowpatty pour les rainbow tables sur du wpa. Le seul truc c'est que c'est long à générer une table (mieux vaut télécharger pour les SSID communs). Mais faut bien que j'en génère quelques unes aussi.
Seulement genpmk ne gère pas le multi curs et je me demandait : si je lance 4 commandes genpmk en même temps sur une même table, pour le même ssid, en ayant splité ma wordlist est-ce que cela ne va pas créer des problèmes d'intégrité dans ma table ?
Car avec 4 processus mes 4 curs sont exploités.
Pour l'instant j'ai lancé les 4 genpmk et ça à l'air de fonctionner mais la table serat-elle exploitable après ?
Merci
-
-
14:27
»
Hack a Day
[Joe] tipped us off about his 112 LED coffee table. This 12-ups the LED matrix from Friday and 31-ups the Shiftbrite table. Driving this grid is an ATmega328 in i2c slave mode. It listens for display data from a second ATmega328 and uses that to set the array of TLC5940 driven LEDs appropriately. Separating the [...]
-
-
6:57
»
Hack a Day
Here’s a project we’ve been wanting to do for a while. Over at macetech.com they’ve posted an LED coffee table that uses a 9×9 RGB LED grid. For the LEDs, they used the shiftbrite modules we’ve seen before. The table is capable of displaying pre written patterns as well as accepting patterns from a computer [...]
-
-
8:46
»
remote-exploit & backtrack
Bonjour à tous,
J'ai téléchargé un fichier de 39 mb qui contient les tables de mon provider et ma question est la suivante:
est-ce que ce fichier représente le dico pour l'attaque? suffit-il d'indiquer le chemin de ce fichier pour utiliser par exemple cowpatty?
Merci
-
-
4:53
»
remote-exploit & backtrack
I download wpa table 33gig,and how I can use it?
-
-
1:00
»
Packet Storm Security Advisories
Zero Day Initiative Advisory 10-011 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists when a Col element is used within an HTML table container. If this element is removed while the table is in use a cache that exists of the table's cells will be used after one of it's elements has been invalidated. This can lead to code execution under the context of the currently logged in user.