«
Expand/Collapse
22 items tagged "tyler"
Related tags:
ubuntu [+],
tyler hicks [+],
shugo maeda [+],
security notice [+],
security [+],
ruby [+],
notice [+],
hacks [+],
video [+],
seizure [+],
search and seizure [+],
search [+],
privacy event [+],
pitchford [+],
peter bex [+],
jboss [+],
boss [+],
windows [+],
usa [+],
tesla [+],
slides [+],
shatter proofing [+],
black hat [+],
audio [+],
voip [+],
vodka bottle [+],
vodka [+],
video introduction [+],
tesla coils [+],
telemetry [+],
target [+],
spyware [+],
spectacular fashion [+],
speaker setup [+],
spark project [+],
singing tesla coil [+],
security mechanisms [+],
rotary phone [+],
ros [+],
robots [+],
robot [+],
pr2 [+],
paper [+],
musical [+],
misc [+],
medea [+],
matrix display [+],
magnetic flux [+],
led [+],
last time [+],
kinect [+],
introduction [+],
induction generator [+],
induction [+],
horsepower [+],
honda motor [+],
home [+],
hat [+],
hacking [+],
genius [+],
generator [+],
functional reference [+],
fear [+],
explained [+],
event [+],
engineering [+],
concert [+],
coil [+],
code [+],
classic [+],
bottle [+],
boston [+],
body [+],
blackberry [+],
authors [+],
audio search [+],
attacking [+],
analog phones [+],
analog [+]
-
-
20:24
»
Packet Storm Security Advisories
Ubuntu Security Notice 1614-1 - Tyler Hicks and Shugo Maeda discovered that Ruby incorrectly allowed untainted strings to be modified in protective safe levels. An attacker could use this flaw to bypass intended access restrictions. USN-1602-1 fixed these vulnerabilities in other Ubuntu releases. This update provides the corresponding updates for Ubuntu 12.10. Peter Bex discovered that Ruby incorrectly handled file path strings when opening files. An attacker could use this flaw to open or create unexpected files. Various other issues were also addressed.
-
20:24
»
Packet Storm Security Recent Files
Ubuntu Security Notice 1614-1 - Tyler Hicks and Shugo Maeda discovered that Ruby incorrectly allowed untainted strings to be modified in protective safe levels. An attacker could use this flaw to bypass intended access restrictions. USN-1602-1 fixed these vulnerabilities in other Ubuntu releases. This update provides the corresponding updates for Ubuntu 12.10. Peter Bex discovered that Ruby incorrectly handled file path strings when opening files. An attacker could use this flaw to open or create unexpected files. Various other issues were also addressed.
-
20:24
»
Packet Storm Security Misc. Files
Ubuntu Security Notice 1614-1 - Tyler Hicks and Shugo Maeda discovered that Ruby incorrectly allowed untainted strings to be modified in protective safe levels. An attacker could use this flaw to bypass intended access restrictions. USN-1602-1 fixed these vulnerabilities in other Ubuntu releases. This update provides the corresponding updates for Ubuntu 12.10. Peter Bex discovered that Ruby incorrectly handled file path strings when opening files. An attacker could use this flaw to open or create unexpected files. Various other issues were also addressed.
-
-
23:34
»
Packet Storm Security Advisories
Ubuntu Security Notice 1602-1 - Tyler Hicks and Shugo Maeda discovered that Ruby incorrectly allowed untainted strings to be modified in protective safe levels. An attacker could use this flaw to bypass intended access restrictions.
-
23:34
»
Packet Storm Security Recent Files
Ubuntu Security Notice 1602-1 - Tyler Hicks and Shugo Maeda discovered that Ruby incorrectly allowed untainted strings to be modified in protective safe levels. An attacker could use this flaw to bypass intended access restrictions.
-
23:34
»
Packet Storm Security Misc. Files
Ubuntu Security Notice 1602-1 - Tyler Hicks and Shugo Maeda discovered that Ruby incorrectly allowed untainted strings to be modified in protective safe levels. An attacker could use this flaw to bypass intended access restrictions.
-
-
6:01
»
Hack a Day
We can hear the commercial now… “Reeeeeeal men of geniuuuuuuus! Here’s to you Mr. no-fear, singing Tesla coil on your hat wearing guy…” Call him a genius or call him crazy – all we know is that [Tyler’s] Tesla coil hat is awesome! Even though it’s the middle of November, we couldn’t pass up this [...]
-
-
12:48
»
Hack a Day
[Tyler] has been using Google Voice extensively for some time now, but he hasn’t quite found a microphone/speaker setup he is happy with. He tried a headset, but that just didn’t do it for him. While browsing around at his local thrift store, he came across an old Model 500 rotary phone for just a [...]
-
-
14:08
»
Hack a Day
Hackaday reader [Tyler Laseter] wrote in to tell us about an event that he and his fellow Tesla Orchestra team members are hosting next month. The “Open Spark Project” is a concert event taking place on May 14th, which melds together electricity and music in spectacular fashion. The event features two large Tesla coils which [...]
-
-
4:01
»
Hack a Day
When [Tyler] heard about the LED matrix display that Medea Vodka was building into their bottles, he immediately wanted to get his hands on one. Who could blame him? Someone had finally combined two things we love dearly: booze and LEDs. He struggled to find a bottle at any of his local stores for the [...]
-
-
5:14
»
Hack a Day
[Taylor Veldrop] has been playing with an NAO robot and ROS, mixed with a Kinect to get some pretty amazing results. The last time we saw any work done with ROS and the Kinect, it was allowing some basic telemetry using the PR2. [Tyler] has taken this a step further allowing for full body control [...]
-
-
10:32
»
Hack a Day
[Tyler LaVite] tipped us off about the generator he built. He combined a 5.5 horsepower Honda motor with a 10 horsepower electric bandsaw motor. To get an induction generator to produce alternating current you must feed electricity into the system to start the magnetic flux. [Tyler's] solution was to include a bank of capacitors totaling [...]
-
-
21:03
»
SecDocs
Authors:
Tyler Shields Tags:
BlackBerry phone Event:
Source Conference Boston 2010 Abstract: Spyware has become a primary tool used in the capture of personal and private data. Surreptitiously installed on the computing system of a target victim, spyware can capture, log, monitor, and exfiltrate any data that the spyware owner desires. Your phone holds all of the same personal information as your computer, only in a smaller form factor. While a number of "vendors" sell Blackberry spyware, until now only a limited number of public code examples exist. Real time capture of SMS messages, Emails, and phone call logs are a fraction of the features to be presented. Full source code to the spyware will be released. Definition of the potential risk and threat involved in mobile related spyware is a requirement to implementation of security mechanisms. Finally, functional reference code has been presented and released that can be used in a positive manner. Until then only shady web sites selling compiled versions of the code for $100 - $400 annually existed. This is a future looking presentation that will help others learn about the security of their personal data in the time of mobile devices.
-
-
0:41
»
SecDocs
-
0:41
»
SecDocs
-
0:41
»
SecDocs