«
Expand/Collapse
1162 items tagged "video"
Related tags:
video converter [+],
event [+],
anvsoft [+],
chaos communication congress [+],
tim pritlove [+],
polycom [+],
hdx [+],
day [+],
converter [+],
closing [+],
hacks [+],
web management [+],
web [+],
video gallery [+],
total [+],
tags [+],
stack overflow [+],
information [+],
gallery [+],
video player [+],
vga [+],
talk [+],
security [+],
remote shell [+],
privacy event [+],
player [+],
network [+],
microcontrollers [+],
management interface [+],
linux [+],
lightning talks [+],
lightning [+],
kernel [+],
hacking [+],
game [+],
free [+],
form [+],
clipster [+],
buffer overflow exploit [+],
authors [+],
vulnerability note [+],
videowhisper [+],
video media [+],
unicode [+],
system [+],
script sql [+],
program [+],
privacy [+],
portable [+],
player v1 [+],
netbsd operating system [+],
netbsd [+],
misc [+],
minoto [+],
mediaxxx [+],
mac os [+],
joomla [+],
internet [+],
inclusion [+],
hubert feyrer [+],
hackaday [+],
frank rieger [+],
exploits [+],
dan kaminsky [+],
cross site scripting [+],
cross [+],
communication [+],
cnc [+],
cms [+],
adult video [+],
adult [+],
21c3 [+],
wlans [+],
video signals [+],
video signal [+],
video presentation [+],
video devices [+],
video camp [+],
vga converter [+],
tool [+],
tip line [+],
technology event [+],
technology [+],
tcp [+],
spam [+],
space event [+],
scart connector [+],
scart [+],
recording [+],
radio [+],
protocol [+],
private investigations [+],
playing video games [+],
phone [+],
paul bhm [+],
overflow vulnerability [+],
microcontroller [+],
michael hess [+],
mac os x [+],
links [+],
john [+],
jan michael hess [+],
jan michael [+],
intro [+],
input [+],
history [+],
hackers [+],
google [+],
gaming system [+],
gaming [+],
future [+],
fpga [+],
felix von leitner [+],
exception handling [+],
europe [+],
entropyd [+],
display [+],
digital [+],
crt [+],
congress [+],
code authors [+],
camera [+],
buffer overflow vulnerability [+],
ben [+],
attack [+],
arduino [+],
Hardware [+],
Hackerspaces [+],
23th [+],
21th [+],
zero [+],
york [+],
xss [+],
xbmc [+],
x ray [+],
x google [+],
x event [+],
wsis [+],
wouters [+],
world domination [+],
wolfgang draxinger [+],
wikipedia [+],
western democracies [+],
wes faler [+],
weis [+],
week [+],
webcam [+],
webapps [+],
web programming languages [+],
web bugs [+],
web apps [+],
web applications [+],
web application servers [+],
wearable [+],
way [+],
warfare [+],
war [+],
wall [+],
wadlow [+],
voting machine [+],
voting [+],
von neumann [+],
voip [+],
vocal chords [+],
visualist [+],
viruses [+],
virus [+],
vijay kumar [+],
videophone [+],
video transmitters [+],
video recording [+],
video playback [+],
video output [+],
video module [+],
video mixer [+],
video manager [+],
video lessons [+],
video introduction [+],
video images [+],
video glasses [+],
video game sprites [+],
video game skills [+],
video game machine [+],
video cult [+],
video conference [+],
video cameras [+],
video camera [+],
vibrant history [+],
vga output [+],
verizon [+],
vendor [+],
vehicle [+],
vector displays [+],
van horenbeeck [+],
vacuum tubes [+],
vacuum [+],
v synch [+],
user interfaces [+],
use [+],
usb [+],
url [+],
urban environment [+],
unusual things [+],
unusual [+],
unleashing the beast [+],
unix [+],
united states [+],
unexpected corners [+],
ulrich von zadow [+],
two colors [+],
tvs [+],
turning [+],
trojan [+],
trends [+],
travis rhodes [+],
transistors [+],
toy [+],
touchpad [+],
tor event [+],
tor [+],
tony hoang [+],
tiny components [+],
tin [+],
time scientists [+],
time [+],
tim [+],
ti99 [+],
throwie [+],
thrift store [+],
thorsten holz [+],
textfiles [+],
tetris game [+],
tetris [+],
televisions [+],
television [+],
telemetry [+],
technology authors [+],
technical vulnerability [+],
technical context [+],
tcpa [+],
target [+],
tank wars [+],
tank [+],
table [+],
system deployment [+],
synthesizer [+],
sylvia johnigk [+],
sustainability [+],
surveillance issues [+],
surveillance camera players [+],
surveillance [+],
surface [+],
supervisory control and data acquisition [+],
suite [+],
stuxnet [+],
string telephone [+],
stream [+],
strange game [+],
story [+],
steven alexander tags [+],
steven alexander [+],
steve mann [+],
stephen wadlow [+],
stefan sels [+],
static analysis [+],
state computer systems [+],
state authorities [+],
state [+],
squadron [+],
sql query [+],
sql injection [+],
speeders [+],
speaking [+],
spam prevention [+],
space shuttle challenger [+],
space program [+],
south america [+],
source [+],
sore thumbs [+],
solaris kernel [+],
software vga [+],
software scene [+],
society [+],
social engineering [+],
smd components [+],
smd [+],
sip [+],
simulating [+],
shutter [+],
sha [+],
session initiation protocol [+],
service vulnerability [+],
sels [+],
security related research [+],
security problems [+],
sceptre [+],
scan lines [+],
scale [+],
scada [+],
satellite event [+],
sarah gordon tags [+],
sarah gordon [+],
rpi [+],
rose white [+],
romney [+],
rojas [+],
roger dingledine [+],
rocket [+],
robots [+],
robotic arm [+],
robin upton [+],
roberto preatoni [+],
robert guerra [+],
rich lundeen [+],
rgine dbatty [+],
rfid [+],
review [+],
retrotechtacular [+],
retina [+],
resurrection [+],
resistance [+],
relays [+],
reed switches [+],
recovery [+],
rebinding [+],
realistic emulation [+],
rca [+],
ray photography [+],
raoul chiesa [+],
random collection [+],
ralf bendrath [+],
ralf [+],
ral [+],
rain [+],
radar systems engineer [+],
r dac [+],
quinn dunki [+],
quantum information science [+],
quantum cryptography [+],
quantum [+],
quadrotor [+],
python [+],
pygame [+],
ptz [+],
pseudonymously [+],
protesting [+],
proof of concept [+],
proof [+],
projectile [+],
processing [+],
process [+],
presentation [+],
presenation [+],
pov [+],
pots [+],
portal [+],
port projects [+],
pong [+],
police [+],
pole [+],
polar bear [+],
poc [+],
plugin version [+],
playing footsie [+],
player 1 [+],
play ball [+],
plasma screen [+],
plasma [+],
pixel [+],
picking [+],
phreaking [+],
photo [+],
phishing [+],
peter shipley [+],
peter panter [+],
peter franck [+],
peter ferrie [+],
personality types [+],
personal project [+],
personal privacy [+],
personal [+],
perfect code [+],
pennsylvania grasp lab [+],
pdf specification [+],
pdf [+],
pbx [+],
paul wouters [+],
part [+],
pal [+],
own software [+],
overload [+],
output [+],
oscilloscope [+],
oracle security [+],
oracle databases [+],
oracle [+],
optimizations [+],
openleaks [+],
opening [+],
open spaces [+],
open source tool [+],
open source initiative [+],
open [+],
one upmanship [+],
omg wtf [+],
omg [+],
offloading [+],
office [+],
null pointer [+],
ntsc [+],
nothing [+],
nokia phones [+],
nokia pc suite [+],
nokia [+],
noise regulations [+],
nohl [+],
noc [+],
nirav [+],
nintendo [+],
nils magnus tags [+],
nexus [+],
news [+],
new york [+],
new orleans [+],
net neutrality [+],
nes [+],
neighborhood [+],
national governments [+],
narrow bandwidth [+],
myths [+],
musical [+],
munich [+],
multiple buffer overflow [+],
move objects [+],
money system [+],
money [+],
mmorpgs [+],
mixing [+],
mit [+],
mini lathe [+],
mini [+],
millenium [+],
miles [+],
mike [+],
mifare [+],
middle east [+],
microcontroller projects [+],
microcontroller project [+],
medical [+],
mechanical television [+],
mckinnon [+],
mcafee [+],
matt [+],
master of puppets [+],
massachusetts institute of technology [+],
marvin mauersberger [+],
markus beckedahl [+],
marker [+],
marco gercke [+],
mapping [+],
management event [+],
malware [+],
mainstream press [+],
macintosh security [+],
macintosh [+],
machine [+],
mac [+],
luis miras [+],
low power electronics [+],
lot [+],
look [+],
logging mechanisms [+],
lock [+],
local buffer overflow [+],
listeners [+],
linux systems [+],
linux machine [+],
lessons [+],
led [+],
lcd screens [+],
lcd modules [+],
lcd displays [+],
lcd [+],
laws [+],
lawrence lessig [+],
launching rockets [+],
launching [+],
latin america [+],
lathe [+],
lasers [+],
laptop [+],
laboratory researcher [+],
l. r. pennasilico [+],
knowledge [+],
knitting projects [+],
keynote speech [+],
julian wa [+],
julia wolf tags [+],
jrmie [+],
jozef [+],
joshua ellis tags [+],
joshua ellis [+],
jon [+],
joi [+],
john von neumann [+],
john tsiombikas [+],
john q. newman [+],
john q newman [+],
joe [+],
jesse ou [+],
jason scott tags [+],
jason scott [+],
james bond theme [+],
james bond [+],
jahresrckblick [+],
ito [+],
iraq [+],
ira winkler [+],
ipv [+],
ipad [+],
inventor [+],
introductions [+],
introduction [+],
intrinsic complexity [+],
internet video camera [+],
internet corporation for assigned names and numbers [+],
internet authors [+],
intelligent information system [+],
intelligence [+],
integrity protection [+],
inspiration [+],
innovation [+],
information superiority [+],
information overload [+],
information overflow [+],
information operation [+],
industrial civilisation [+],
indiana jones 4 [+],
indiana [+],
indect [+],
implosion [+],
implementation problems [+],
image manipulation [+],
image [+],
identity [+],
ict [+],
icann [+],
ian goldberg [+],
hybrid rocket [+],
hybrid [+],
how to make cool things [+],
how to [+],
how things work [+],
honeypot [+],
honey pots [+],
honey [+],
homebrew computer [+],
homebrew [+],
home [+],
hola [+],
hoang [+],
high voltage [+],
hendrik scholz [+],
hdmi [+],
hash function [+],
hash [+],
hardened [+],
hand [+],
halleck [+],
hackerspace [+],
hacker [+],
guild [+],
greece [+],
gps trackers [+],
gps [+],
government level [+],
gom [+],
goldberg [+],
gmr [+],
ghz [+],
germany [+],
gentoo [+],
genezap [+],
gaming table [+],
gaming session [+],
game activities [+],
g ptz [+],
g philes [+],
g investigations [+],
function [+],
fun and games [+],
full color [+],
frequent flyer miles [+],
fraud [+],
framebuffer [+],
fossil fuel production [+],
foss desktop [+],
foss [+],
forgery [+],
footsie [+],
foot controller [+],
followup [+],
fnord [+],
flip dot [+],
flip [+],
flight path [+],
firewalls [+],
firewall gateway [+],
firewall [+],
filter implementations [+],
film excerpts [+],
felix [+],
face recognition software [+],
fabio ghioni [+],
extraordinary rendition [+],
extradition [+],
extent [+],
exploitation techniques [+],
everybody [+],
european citizens [+],
europe europe [+],
europan union [+],
ethical obligation [+],
estonians [+],
estonia [+],
eric rogers [+],
entertainment [+],
engineering [+],
engineerguy [+],
emmanuel goldstein [+],
electronic money [+],
electronic disk [+],
electronic components [+],
electronic [+],
electromagnetic waves [+],
edge techniques [+],
edge cases [+],
economic history [+],
dvi d [+],
drupal [+],
driven futures [+],
dr. john von neumann [+],
dr john von neumann [+],
dns [+],
dll file [+],
diy [+],
dithering [+],
disk [+],
dishonor [+],
discusses [+],
dingledine [+],
digital playground [+],
digital gaming [+],
development environments [+],
development [+],
derivative works [+],
denial of service exploit [+],
demystifying [+],
delorean [+],
del vecchio [+],
default passwords [+],
dead [+],
data [+],
daniel mellinger [+],
daniel kirstenpfad [+],
daniel domscheit [+],
dangerous technologies [+],
cyber war [+],
cyber crime [+],
currency systems [+],
currency [+],
culture event [+],
culture [+],
cult of the dead cow [+],
cult [+],
crystal oscillators [+],
cryptography [+],
cryptographic primitives [+],
cryptographic authentication [+],
criminal investigations [+],
credit [+],
crash proof [+],
craig h. rowland tags [+],
craig [+],
course authors [+],
counterlobbying [+],
counter [+],
corporal punishment [+],
corp [+],
coprocessor chips [+],
coprocessor [+],
controller [+],
control mechanisms [+],
consumption [+],
computer science department [+],
computer authors [+],
computer [+],
composite video adapter [+],
compiler [+],
communication protocols [+],
collection [+],
coin cell [+],
cocktail version [+],
cocktail [+],
closing ceremony [+],
clock [+],
client platforms [+],
client [+],
classic pong [+],
classic [+],
cisco wireless [+],
christian rechberger [+],
christian carstensen [+],
christian bahls [+],
christian [+],
china [+],
ceremony [+],
cell phone users [+],
cell battery [+],
ceiling mounted projector [+],
cdn [+],
cctv [+],
ccd works [+],
ccd [+],
catch [+],
caspar bowden [+],
carstensen [+],
capitalist economy [+],
capacitive [+],
capabilities of the computer [+],
camp opening [+],
camp closing [+],
cameras [+],
camcorder [+],
c api [+],
burning [+],
building [+],
bug [+],
buffer overflow vulnerabilities [+],
buffer overflow [+],
buck bunny [+],
bsd [+],
bruce dang [+],
brief [+],
breathtaking beauty [+],
brain [+],
bookmark [+],
board camera [+],
block [+],
black ops [+],
black [+],
biu [+],
bit [+],
bionic man [+],
bin [+],
bill [+],
bet [+],
benjamin [+],
beauty [+],
beaglebone [+],
battle strategies [+],
bahls [+],
bacteria [+],
back to the future [+],
aware [+],
avc [+],
autonomous vehicle [+],
automated [+],
aussie [+],
attiny [+],
athens greece [+],
athens [+],
associated [+],
art dragon [+],
arm9 processor [+],
arcade cabinet [+],
approach path [+],
application [+],
apple [+],
annie machon [+],
android [+],
andreas bogk [+],
anatomy [+],
analog [+],
america [+],
alexander kornbrust [+],
alexander klink [+],
alexander [+],
alex kushleyev [+],
alex [+],
alessandro [+],
air interface [+],
advertising [+],
adobe premier [+],
admits [+],
adapter [+],
adafruit [+],
accessibility [+],
abstract time [+],
abstract overview [+],
abstract data [+],
Software [+],
Rasberry [+],
Philes [+],
IPv6 [+],
ARM [+],
8mm movie camera [+],
720p [+],
3d shutter glasses [+],
3d objects [+],
vulnerability [+],
chaos communication camp [+],
wordpress [+],
zusman,
zoneminder,
zombies,
zombie apocalypse,
zoetrope,
zephyr,
zane lackey,
zage,
zach lanier,
zac franken,
youtube video,
youtube,
yourself,
you,
year in review,
year,
xula,
xilisoft video converter,
xilisoft,
xen hypervisor,
xen,
xbox 360,
x linux,
x kernel,
x appletv,
x 509,
wxf,
writeup,
wrap,
wpa wpa2,
wpa,
worm,
world today,
world of warcraft,
world authors,
world,
workstation version,
workstation,
workshop authors,
workshop,
works,
working,
workgroups,
workforce environment,
work,
wooden frame,
wong,
won,
women,
wolf,
wojciech bojdol,
wlan,
wizard version,
with,
wireshark,
wireless sensors,
wireless security,
wireless radio,
wireless gsm,
wire frame,
wire,
winning the race,
wing,
windows kernel,
windows,
winamp,
win,
wimax,
william kimball,
will,
wilderness,
wild planet,
wikileaks,
wii,
wifi,
wiesmann,
wi fi,
who wants to be a millionaire,
when,
wes brown tags,
wes brown,
wells,
weird problem,
weir,
weekend,
weeds,
websphere,
webgoat,
web web,
web service,
web server,
web hackers,
web event,
web authors,
web attacks,
web application,
weaponry,
weaponizing,
weapon of mass destruction,
weakest link,
weakest,
ways,
wayne zage,
wayne huang,
wayne,
wav file,
wav,
water infrastructure,
watchman,
watai,
wargamez,
wardriving,
walsh tags,
walk down memory lane,
wal mart,
waf,
wade polk,
vulnerable,
vulnerability disclosure,
vulnerability assessment,
vulnerability analysis,
vulnerabilities,
vpls,
volts,
volatile memory,
volatile,
voice quality enhancement,
voice commands,
voice,
vnc,
visualizing,
visual,
vista,
virtualization,
virtual security,
virtual machines,
virtual machine,
virtual graffiti,
virtual,
virgraff,
viral infections,
viral,
violins,
vinyl cutter,
video world,
video workstation,
video windows,
video web,
video wall,
video vista,
video version,
video usb,
video technology,
video sync,
video surveillance systems,
video surveillance cameras,
video streams,
video slides,
video site,
video side,
video session,
video series,
video security,
video search,
video script,
video screens,
video screen,
video router,
video return,
video protocols,
video projectors,
video projector,
video project,
video policy,
video poker,
video pointers,
video plugins,
video platforms,
video photography,
video phone,
video overview,
video object,
video monitor,
video mark,
video manipulation,
video library,
video kiosk,
video kim,
video joiner,
video intro,
video interrupts,
video host,
video highway,
video hardware,
video hacks,
video hacker,
video girls,
video gaming,
video games,
video game classics,
video game,
video function,
video flex,
video encoder,
video emulation,
video effect,
video economics,
video digital,
video development,
video decoding,
video death,
video deals,
video culture,
video credit,
video creator,
video content,
video connection,
video conferencing systems,
video computer system,
video computer,
video compression technology,
video competition,
video community,
video communication,
video codec,
video client,
video case study,
video card,
video capture,
video block,
video bios,
video big brother,
video awards,
video auto,
video application,
video analysis,
video analog,
video advice,
video 8,
vidas,
victor,
vicky devine facing,
vibrations,
vhs cassette,
vga interface,
vendor patches,
veil,
vega tags,
vega,
vault,
vaughn tags,
van beek,
value,
val smith,
vaaseline,
using proxy servers,
using electricity,
usb devices,
usa,
upnp,
upgrade,
updates,
unpacking,
unmasking,
unmanned aerial vehicle,
universe,
unit,
unique,
uninvited guests,
unidirectional,
unicornscan,
unfair,
undiscovered territory,
understanding,
unclassified,
ufos,
ufology,
ufo event,
uefi,
uav,
u.s.,
types,
tyler,
ty miller,
txt,
tv video converter,
tv hacking,
tv 2,
turntable,
tunnels,
tundergun,
trust,
true random number,
trombone,
trolls,
tripod,
tricks,
trey ford,
treasure trove,
travis goodspeed,
travis,
travel authors,
transmission rates,
translation,
transformer,
trakr,
training,
traffic,
trade deficit,
tracy ann kosa,
track,
tracing,
traces,
trace,
tour,
touch sensors,
touch sensor,
touch,
tor network,
toolsmithing,
toolchain,
toolbar,
tony howlett,
tony flick tags,
tom stracener,
tom,
tokyo,
todd harrison,
todd,
today,
tobias matt fiddler,
tobias bluzmanis,
tobias,
tmi,
tire pressure,
tire,
tip,
tiny size,
tiny package,
times square,
time player,
tim wyatt,
tim vidas,
tiffany strauchs,
tiffany rad,
tiffany,
tides of war,
thrift shops,
three pieces,
threats,
threat modeling,
threat intelligence,
threat,
thread,
thrashbarg,
thousand,
thoughts,
thompson mathew monroe tags,
thomas wilhelm tags,
thomas wilhelm,
thomas proll,
thomas j. holt tags,
thomas j. holt max kilger,
things that go bump in the night,
thierry legault,
there,
theft prevention,
thanksgiving holiday,
than a day,
thad,
tft screen,
tft,
textbook authors,
textbook,
testing management,
testing,
test flights,
terrence,
terminator 3,
temporal,
television set,
television center,
telephone company,
telephone,
technical details,
teardown,
team,
teaching children,
teaching,
tcpdump,
tavis ormandy,
target host,
tandy color computer,
tandy,
tandberg,
tales,
take,
tags hardware,
tag team,
tactical,
t. d,
system management mode,
system compromise,
synkie,
sync separator,
symlink,
sven oliver moll,
sushi,
survival preparedness,
survival,
surgery thanks,
surgery,
surface mount,
summer breeze,
suitcase,
sudhir aggarwal,
suck,
subverting,
submission,
stupid,
studio versions,
studio,
strom carlson,
strom,
string parameter,
string,
strategic initiatives,
storm,
stopping,
stinkin badges,
stinkin,
steve pate,
steve dunker,
steve adegbite,
stender,
steam powered,
stealth,
stealing,
steadicam,
status,
static files,
startup,
stan brooks,
stack buffer,
sslstrip,
ssliverse,
ssl,
srtp,
squire,
sqlinjection,
sql server,
sql,
spy stuff,
spy,
sprite,
sports participants,
spiral pattern,
spill,
spied,
spent,
speculations,
speculation,
speaker max kelly,
spatial awareness,
sparkfun,
space,
source mac,
source code,
sound reproduction,
sothink,
sorenson video 3,
sorenson,
sony tvs,
sony,
somthing,
something,
someone,
solveable,
soldering,
solar light,
sohail ahmad,
software vulnerabilities,
software radio,
socusoft,
socially,
social networks,
social networking,
social,
snort,
sniff,
snake the,
snake oil,
snake,
smutware,
sms,
smells,
smashing,
smartlcd,
smartcard,
smart project,
smart phones,
smart phone,
smart card authentication,
smart card,
smart,
small tv,
slow,
sleep lab,
sle,
slap,
skool,
site,
siren,
sinclair,
simple game,
simple,
similarity analysis,
silberman,
signatures,
signal,
sight and sound,
sie,
sidejacking,
side channel,
side,
siddharth tags,
shoecon,
shodan,
shocking,
shift,
shields,
shield,
sherri sparks,
sherri davidoff,
sherri,
shellcoding,
shellcodes,
shellcode,
shawn moyer,
shawn merdinger,
shawn embleton,
shark,
sharingan,
sharepoint,
share,
shahriar,
shadows,
shading,
seth law,
seth,
set,
session,
service,
servers,
server,
series,
serial connection,
serial,
sequence prediction,
sensors,
sensor suite,
senioritis,
senator al franken,
semi,
selectable,
seizure,
sega master system,
security vulnerability,
security vulnerabilities,
security tools,
security toolbox,
security tags,
security strategy,
security risks,
security professional,
security phone,
security operations,
security network,
security law,
security infrastructure,
security guide,
security experts,
security event,
security career,
security breach,
security authors,
security assessments,
security applications,
securing,
secure,
second hand hardware,
sebastian fernandez,
seattle wireless,
seattle,
searle,
searching,
search engines,
search and seizure,
search,
sean taylor,
sean m. bodmer,
sean barnum,
sdl,
sculpture class,
script version,
script asp,
script,
screen scraper,
screen,
scott wolchok,
scott stender,
scott moulton,
scott dunlop,
scott,
score,
science event,
schuyler towne,
schuyler,
school,
schoenefeld,
schober,
schlesinger,
schematic editor,
schaller,
scanning,
scam,
scalable,
scada systems,
satan,
sapiro,
sandy clark tags,
sandy clark,
sandberg,
san,
samuel petreski,
sampler,
salvatore,
sai emrys tags,
safety,
safer use,
safecracking,
s system,
ryan upton,
ryan sherstobitoff,
ryan pentney,
ryan linn tags,
ryan c. barnett,
ryan anguiano,
ryan anderson tags,
ryan anderson,
russian hacker,
russia,
russ mcree,
runtime environments,
rucci,
rube goldberg machine,
rube goldberg,
rube,
routing,
routers,
router,
rosenfeld,
rootkits,
rootkit,
root account,
root,
roommate,
rook,
roman candle,
rodney thayer,
rodney mcgee,
rod beckstrom,
rocketry,
rock your,
robot eyes,
robot eye,
robot,
roberto suggi,
robert smith,
robert lentz,
robert jason,
robert imhoff ,
robert edmonds,
robert e lee,
robert clark tags,
robert,
robb,
rob rehrig,
rob dixon tags,
rob dixon,
rob degulielmo,
rob carter tags,
rob carter,
rob,
roaring,
rng,
ritewing,
ristic,
risk management,
risk,
ripping,
rip index,
ring0,
ring oscillators,
riley repko,
riding,
ricky lawshae,
ricky,
rickrolling,
rickroll,
rick wesson,
rick hayes,
rick astley,
rick,
richard theime,
rich smith,
rich internet,
ria world,
rgbg,
rgb leds,
rfidiots,
reviews,
reverse engineering,
reverse dns,
revelli,
reusable spacecraft,
return,
retrofitting,
retrode,
retro game,
retro,
retri,
rest,
response system,
response,
resilient,
residential gateways,
residential,
reproduction capabilities,
repository,
repko,
repetitive events,
rentals,
rendering,
renda,
remote viewing,
remote monitoring,
remote,
remediation rates,
reloaded,
release 1,
rehrig,
regs,
regional vice president,
redux,
record player,
reconstructing,
recognition,
recent windows,
recaptcha,
rear admiral grace hopper,
realize,
reality system,
reality game,
reality,
real world,
real time,
real,
read,
ray,
ratchet,
rapid,
rant,
randy robbins,
random sayings,
random number generator,
random junk,
randal,
raid recovery,
raid,
ragan,
rafal wojtczuk,
rafal los,
rafael dominguez,
radio shack,
race,
raber,
rabbit hole,
rabbit,
r c tank,
quynh,
quist,
quietriatt,
quicktime,
quality,
quad copter,
quad cities,
pwned,
pwnage,
pwn,
pwm,
punch,
puerto 445,
psychology,
proxy,
proximity card,
proximity,
prototype case,
prototype,
protecting,
proprietary protocols,
proprietary,
proposal,
pronged approach,
promising addition,
projector,
project proposal,
project progress,
project,
programmable gate array,
program authors,
professional music,
professional film,
pro dj,
privilege escalation vulnerability,
privacy threat,
privacy office,
printing process,
printing,
pridgen,
pressure,
presidential election,
presidential,
preserving,
presence,
preparing,
predictable,
pratap,
prank o,
practical,
prabhu,
power,
postal inspectors,
postal,
post,
portal script,
poor,
polymorphic,
pololu,
policy,
poker,
point of view,
point,
plugin,
player piano,
playchoice,
play,
plausible deniability,
plausible,
platinum,
platform,
plastic packaging,
plastic,
planet,
pla,
pki,
pitchford,
pirate ship,
pirate,
piracy,
piotr oleszkiewicz,
pic development,
physical security,
physical,
phreaknic,
php,
photography,
photographing,
phosphor layer,
phishers,
philippe oechslin,
philco television,
phil,
petkov,
peter silberman,
peter gutmann,
peter gunn,
peter eckersley,
peter,
pete herzog,
pete dokter,
pete,
perspectives,
perspective,
personal survival,
personal account,
persistent web,
permissions,
peripherals,
peripheral vision,
perfect score,
perfect,
perch,
people tracking,
pentile,
pentest,
penetration testers,
penetration,
pending,
penchant,
pedro joaquin tags,
pcs,
payload,
paul vixie,
paul royal,
paul malkewicz,
paul judge,
paul haas,
paul graham tags,
paul f. renda,
pattern,
patryk,
patrick thomas tags,
patrick thomas,
patrick mullen,
patrick mcgregor,
patient,
passwords,
party,
parallel cable,
papilio,
paper medium,
paper,
papathanasiou,
panel,
pandora console,
pandora,
paik,
pahl,
page,
packing,
packet radios,
pachulski,
p2p networks,
p networks,
p event,
ozer,
owner,
owned,
own mail,
owen,
owasp,
overflow,
overdue,
other,
osx,
ostrom,
oskar,
os 4,
oriented programming,
oriented,
organic light emitting diodes,
orb,
oracle database server,
oracle database,
optional,
opsahl,
ops 2005,
ops,
operating,
openssl,
opening ceremony,
open source system,
open source software packages,
open source software,
open source revolution,
open source implementation,
open source framework,
open pandora,
online,
omg wtf pdf,
ollybone,
oliver kreylos,
oliver friedrichs,
olga smirnova,
oleds,
oled displays,
old skool,
old,
ogg,
officer,
office documents,
ofer shezaf,
ofer,
odb ii,
octf,
observatory,
obfuscation,
o fly,
nullsoft winamp,
nullsoft,
nuclear fusion,
nuclear,
ntfs filesystem,
nsa,
not,
nosql,
nooks,
nodal analysis,
no way,
nmap,
nintendo game boy,
ninja art,
ninja,
niklas roy,
nicole ozer,
nico leidecker,
nick harbour,
nick freeman,
nicholas j. percoco,
nicholas arvanitis,
nguyen anh,
next generation,
next,
new language,
new breed,
new approach,
new,
neutrality,
network traffic,
network spam,
network privacy,
network flow analysis,
network cameras,
net,
nessus,
nesbot,
nesbit,
neoteric,
neighborhood cats,
needle in a haystack,
nbsp nbsp nbsp nbsp nbsp,
nbsp,
naturpic,
national drinking water,
national collegiate,
national,
nathan mcfeters,
nathan keltner,
nathan hamiel,
nate lawson tags,
nashville tn,
nashville,
nanosecond,
nano,
name,
mythbusting,
mysql,
myriad,
music,
multiplayer,
multidimensional,
multi boot,
msp,
mr. oizo,
mpls,
moyer,
moxie,
movie projector,
movie,
motion sickness,
motion analysis laboratory,
mother,
mosquito,
morehouse,
moore production,
mooney,
moon bouncer,
monta elkins,
monocrome,
monitoring systems,
monitor,
momentary,
mohammad akif,
modern,
modem,
modeling,
model rocketry,
model,
mobitex network,
mobitex,
mobile videoconferencing,
mobile phone,
mobile operating systems,
mobile market,
mobile application,
mobile,
miras,
miraculous piece,
mining,
minds,
millionaire,
millier,
milkymist,
mike zusman,
mike rothman,
mike reavey,
mike murray lee kushner,
mike murray,
mike metzger,
mike kershaw,
mike cooper tags,
mike cooper,
mike benson,
mike bailey,
migrating,
middler,
microsoft,
microphone,
micro,
michael weiss,
michael weigand,
michael sutton,
michael smith,
michael schrenk,
michael schearer,
michael ossmann,
michael ligh,
michael l. davis tags,
michael kemp,
michael d. glasser,
michael brooks,
michael anderson,
michael,
miami,
method,
meter maids,
meter,
metasploit,
metapost exploitation,
metapost,
metaphish,
metamorphic,
metacart,
met,
messaging,
merrill,
mentor,
memory protection,
memory corruption,
memory allocation,
memory,
meme,
meet,
medicine,
media,
mechanical energy,
mechanical device,
mechanical,
mckenney,
mccray,
mccoy,
maynor,
maximiliano,
max kilger,
max kelly,
max headroom,
matthias,
matthew wollenweber,
matthew richard tags,
matthew richard,
matthew flick tags,
matt zimmerman,
matt weir,
matt ryanczak,
matt richardson,
matt richard steven adair tags,
matt krick,
matt flick tags,
matt collier,
mathew,
mateusz jurczyk,
mateusz,
mastering,
master key,
massexploitation,
martin mocko,
martin bos,
marquis,
marpet,
marlinspike,
mark zuckerberg,
mark townsend,
mark steward tags,
mark steward,
mark stamp,
mark shelhart,
mark ryan del moral,
mark ryan,
mark dowd,
mark bristow,
marisa fagan,
mario heiderich,
mario ceballos,
mario ballano,
mario,
marco slaviero,
marco bonetti,
marcia hofmann,
marc weber tobias matt,
marc weber tobias,
marc weber,
marc schoenefeld,
map,
many moons,
manky,
manipulations,
manipulation,
man in the middle attack,
man,
malicious content,
malicious,
malaysia,
making money on the web,
making a sandbox,
maker,
mail,
maid,
machined,
mach,
mac pro,
mac osx,
mabel,
m.c. escher,
m c escher,
luiz eduardo tags,
luedke,
luciano bello maximiliano bertacchini,
low,
louis robert,
lost in translation,
looks,
long range,
logic cores,
logan,
locks,
lockpicking,
lock picking,
locating,
local,
lm324,
live feed,
live,
little,
liters,
list,
lior frenkel,
linux kernel,
linus akesson,
linton wells,
linn,
link,
linguistic,
lineberry,
line leakage,
line,
lindner,
lindell,
light emitting diodes,
ligh,
life size replica,
life,
lie detector,
lie,
license plate recognition,
library version,
library,
lg televisions,
leveraging,
let,
leor,
leonard gallion,
leigh honeywell,
lego technic,
lego,
legal,
leds,
led backlit lcd,
learning,
leaps and bounds,
lcd tvs,
lcd tv,
lcd monitors,
layout,
lawyers,
laws related,
lawnmower,
law,
laugh,
last friday,
lars,
larry aiello,
language creation,
language,
landscape,
lady gaga,
lady,
lackey,
l. gavas,
kushner,
kurtz,
kurt opsahl,
kunkel,
kung fu,
kung,
kristofer erickson,
kristie dunker,
krick,
krakow,
kosa,
kongs,
kocher,
knowledge network,
kludge,
kirschbaum,
kiosk,
kinect,
kindles,
kind,
kim tags,
kim jong il,
kids,
kibler,
keystrokes,
keystroke,
keynote speaker,
keynote,
keyboard emulation,
key tags,
key,
kevin stadmeyer,
kevin mahaffey,
kevin johnson tom eston,
kevin johnson frank dimaggio,
kevin estis,
kevin bankston,
kevin archer tags,
kevin archer,
kershaw,
kernel level,
kerb,
kenneth scott tags,
kenneth scott,
kenneth geers,
ken johnson,
ken caruso,
keltner,
kelly walsh,
keith biddulph,
katie moussouris,
katana,
kartograph,
karaoke,
kaminsky,
k.c. budd,
justine osborne tags,
justin searle,
justin morehouse,
justin,
junk stores,
julie watai,
julian grizzard,
jtag debugger,
jsp engine,
journey,
journalists,
joshua wise,
joshua perrymon,
joshua marpet,
joshua bienfang,
joshua,
josh pyorre,
josh marks,
joseph mccray,
jong il,
jonathan squire,
jonathan rom,
jonathan post,
jonathan levin,
jonathan lee neil pahl,
jonathan lee,
jonathan,
jon rose tags,
jon r. kibler,
jon oberheide,
jon mccoy,
jolt cola,
jokes,
joiner,
johnny long,
johnny cache,
john w. pirc,
john w. linville,
john mcnabb,
john hering,
john heasman,
john curran,
john benson tags,
john benson,
john andreadis,
joey calca,
joe stewart tags,
joe stewart,
joe mccray,
joe klein,
joe grand,
joe damato,
joe cicero tags,
jocelyn lagarenne,
jocelyn,
joanna rutkowska,
jinx,
jimi fiekert,
jim rennie,
jim christy tags,
jim christy,
jim,
jibran,
jesse daguanno,
jesse burns,
jeri ellsworth,
jeremy chiu,
jeremy brown tags,
jeremy brown,
jeremiah grossman,
jennifer granick,
jeff yestrumskas,
jeff bryner,
jboss,
jay beale,
javascript,
java event,
java,
jason schlesinger,
jason raber,
jason ostrom,
jason lee tags,
jason lee,
jason kendall,
jaroslav novak,
jargon,
james luedke,
james lee tags,
james awad,
james arlen,
jam iii,
jailbroken,
jailbreaking,
jailbreak,
jacob carlson,
jacob appelbaum,
jackpotting,
jack daniel tags,
jack daniel,
jack c. louis robert e. lee tags,
jack c,
jack,
jabra,
j. stolfo,
ivan ristic,
ivan buetler,
itexpo,
isolation transformers,
isolation transformer,
isolation,
isc,
irk,
ips,
ipod touch,
ipod nano,
ipod,
iphone,
ip multicast,
ip assignments,
ip assets,
invented,
intx,
intrusion detection solutions,
intrusion detection,
intrusion,
interrupts,
internet surveillance systems,
internet safety,
internet applications,
interesting solutions,
interception,
inter,
intense light,
intelligence data,
instrumented,
insiders,
insider threat,
insider,
insecurity,
insecurities,
insecure,
input validation vulnerabilities,
injection,
injecting,
injectable,
initial view,
infrastructure,
infosec,
information warfare,
information security industry,
information panel,
information gathering,
information attacks,
infections,
infection rate,
inexpensive solution,
inequality,
industry authors,
industry,
industrial,
inducing,
incident response,
incident,
inch tft,
import address table,
import,
implementing,
implantable,
immerman,
imhoff,
image analysis system,
ilyas,
iis,
igor,
identifying,
idempotent,
ida pro,
ida bridge,
ics,
ice,
ian o. angell,
ian clarke oskar sandberg,
ian amit tags,
hypervisors,
hypervisor,
hype,
hunting,
hunt,
hump day,
human tetris,
human brain,
howlett,
how to rule the world,
how to impress girls,
hostname,
host keys,
hose,
horsepower,
horsemen,
hope,
hooking,
homeland security,
homeland,
home theater projectors,
home cockpit,
holyfield,
holt,
holiday weekend,
hofmann,
hoax,
hit,
hijacking,
highway to hell,
highway,
high speed data services,
high speed data,
high security locks,
high school transcript,
high,
hideout,
hibernation,
heyoka,
herzog,
hering,
here,
helmet mounted camera,
helmet,
hell,
heffner,
hearts,
heart,
heap,
head,
hd camera,
haste,
hashes,
hashdays,
harmony,
hardware modification,
hardware hacking,
hardware hackers,
hardening,
hansen,
hanna tags,
handles,
handhelds,
handcuffs,
hamster,
hammack,
hadoop,
hacking web,
hacking games,
hacker scene,
hack in the box,
hack,
h.d. moore tags,
h. wong tags,
guy,
gustibus,
gustav rydstedt,
gustav,
gupta,
guillaume,
guided missiles,
guide,
gsm,
groupies,
grenadier,
gregory fleischer,
greg white,
greg hoglund,
greg conti,
green,
grammys,
grammy awards,
graffiti tags,
grace hopper,
gourdin,
got,
gorman,
google toolbar,
google search,
google hacking,
goodspeed,
good,
golan levin,
golan,
gogago,
gnu,
global security,
global cyber,
global,
glitched,
glasser,
glass block wall,
glass,
girls,
girlfriend,
gimbal,
gif player,
gif,
ghostly images,
ghostly,
get,
gerald kane tags,
georgia tech center,
geoip,
generation,
gender differences,
geers,
geeks,
geekery,
gavas,
gautam tags,
gates,
gate,
garry pejski,
garden gnome,
games,
gameboy,
game system,
game servers,
game maker,
game interface,
game data,
game controller,
game board,
game authors,
gallion,
gallery 1,
gadgets,
g. mark hardy,
fyodor tags,
fyodor,
fuzzing,
fusion,
furby,
fundamental defense,
fun project,
fun,
fsck,
friends and neighbors,
friendly skies,
friendly,
friend,
free sony,
free software updates,
free open source software,
fred von lohmann,
freakshow,
freak show,
freak,
frank breedijk,
francois,
francisco amato,
framework,
fragging,
fps,
fpga boards,
fox in the hen house,
fox,
four horsemen,
forwards,
forum,
format string attacks,
format,
forensics,
forensic investigation,
forensic data,
forensic analysis,
forensic,
foreign language,
foreign,
force posture,
for,
foot range,
fog screen,
fog,
foe,
foca,
foam wing,
flick,
flex sensors,
flex boards,
flex,
fleischer,
flatscreens,
fixed,
five minutes,
fishnet security,
fish finder,
fish,
first impressions,
first glance,
firefox addons,
firefox add ons,
firefox,
firearms,
fire exercise,
fire,
finished product,
finished,
fingers,
fingerprinting,
finding,
film crew,
file processing,
file,
fifield,
field programmable gate array,
fiddler,
fiber optics,
fiber optic cabling,
fiber,
ffmpeg,
ffdshow,
fernando,
ferdinand schober,
feinstein,
feet,
feeding,
feed samples,
feed,
feds,
fed,
feature,
feathers,
fbi,
favorite things,
fasttrack,
famicom,
faking,
fake,
faire,
failure,
fagan,
facts fiction,
facial,
facebook way,
facebook,
face charges,
face,
fabrice jaubert,
fabian,
eyelids,
eyelid,
eyeball,
eye tracker,
eye of a needle,
eye,
extreme sports,
extreme range,
extmedia,
external microphone,
express tags,
explotando,
exploring,
exploitspotting,
exploiting,
exploitation,
exploit,
explain,
experimenter,
experience thanks,
exercise,
executables,
exciting,
examination,
evolutionary,
evolution of computer,
evilgrade,
evil forces,
evidence,
everything,
ev certificates,
eston,
esteban martnez,
erik lagerway,
erik dean tags,
erik berls,
erickson,
eric rachner,
eric d. laspe,
eric,
epassports,
enterprise environments,
enterprise,
enough,
enno rey tags,
enhancement algorithms,
engineering workshop,
engineering tools,
engineer,
engine,
endless circle,
encryption scheme,
encryption keys,
encryption,
encoder,
enabler,
emulation based,
emerging,
electronics hackers,
electronic voting machines,
electronic locks,
electronic arts,
electronic access control,
electromechanical devices,
electromagnetic pulses,
electromagnetic,
electrodes,
electricity,
eldon sprickerhoff,
eldon,
efpga,
effective,
eff,
edmonds,
eddie schwartz,
ed schaller,
economy,
economics,
eckhard etzold,
eckhard,
eckersley,
ebay,
earl zmijewski,
eagle cad,
eagle,
e.m. total,
e. street,
dynamic gaits,
dunlop,
dunker,
duct,
duc nguyen,
dual core,
dual boot with windows,
dsb,
drunken,
drug testing,
drug event,
drug,
drool,
droid,
drivesploit,
drive bys,
drive,
drehkino,
dradis,
download,
douglas c. merrill,
douglas c,
doug wilson,
doug mohney,
doug cohen,
douchebag,
double slide,
double feature,
door,
dondi west,
donation,
don bailey,
don ankney,
don,
dominic spill,
dominic,
dolores zage,
doesn,
dodge ball,
dod,
doctor who,
docsis,
dockstar,
dnssec,
dnock,
dna,
dll,
ditch,
distress call,
dissecting,
discrete components,
disclosure,
disc changer,
disc,
disaster survival,
directory traversal,
director of engineering,
dimaggio,
digital postage meters,
digital micromirror device,
digital background,
digital assets,
didn,
didj,
didgeridoo,
diane barrett,
dhts,
development timeline,
development lifecycle,
deterrence,
detector,
destination buffer,
destin,
desktop security,
desktop,
derek manky,
depth,
deploying,
deobfuscator,
dennis brown tags,
dennis brown,
dennis boas,
denial of service,
denial,
deniability,
demo,
delfly,
degree images,
degree angle,
degree,
definitions,
defense,
defcon,
def,
decrypt,
decompilers,
decoding,
deceiving,
decade,
debugger,
deblaze,
death of a thousand cuts,
death,
de gustibus,
ddos attacks,
ddos,
dd wrt,
dcflux,
dc motors,
dc motor,
daybiz,
david weston tags,
david weston,
david rook,
david richardson tim wyatt tags,
david richardson,
david mortman,
david litchfield,
david kerb,
david hulton,
david forbes,
david fifield,
david dagon,
david cowan,
david c. smith,
david c smith,
david byrne tags,
david byrne,
david bryan michael anderson tags,
david bryan luiz eduardo tags,
david bryan,
david aslanian,
david anders,
dave millier,
dave maynor,
dave king,
data recovery,
data mining,
data encryption standard,
darlington pair,
darknets,
dark,
danny quist,
daniel raygoza,
daniel paluska,
daniel burroughs,
dangerous waters,
dangerous minds,
dang,
dan sinclair tags,
dan rosenfeld,
dan boneh,
dalvik,
dagon,
daft punk,
d moore,
d dslr,
cyberterrorism,
cybercrime,
cyber warfare,
cyber security,
cyber defense,
cyber army,
cyber,
cve,
current state,
current,
culture shift,
cube,
csrf,
crystal,
crypto,
crm,
critical infrastructure,
criminal charges,
criminal,
crime war,
crime,
crenshaw,
credit cards,
creator,
creative treatment,
crawling,
crash,
craig turner,
craig heffner,
crafting,
covert channel,
covert camera,
covert,
countering,
costume,
costly equipment,
cost,
corydon,
corrosion,
corporate,
core performance,
core,
cooperative game,
cool gear,
controversial,
control,
contos,
content originator,
content authors,
consumer credit reporting agencies,
consultation,
consciousness,
cons,
connection string,
connection,
conlanging,
confidence game,
confidence,
concurrency,
concept animations,
con kung ,
con,
computing,
computer security,
computer organization,
computer display,
computer crime cases,
computation,
compromise,
composite video signal,
composite video output,
composite tv,
complete system,
company,
community portal,
communication server,
communication channels,
commodore c 64,
commodore c,
commodity hardware,
commandeering,
command,
combine,
color,
collimated,
collegiate,
college,
collaborative,
collaboration engine,
colin ames,
coldplay,
cold boot,
cold,
coin,
codec,
code obfuscation,
code memory,
code execution,
code,
coco3,
coat,
cloudinomicon,
cloud,
clothing,
closed caption,
clobbering,
client side,
classic video gaming,
class,
city,
citrix,
ciso,
cisco telepresence video,
cisco telepresence,
cisco small,
cisco security advisory,
cisco security,
cisco ip,
cisco ios,
cisco event,
cisco devices,
cisco,
circumventing,
circuit boards,
circuit,
circle,
christopher tarnovsky,
christopher soghoian,
christopher mooney,
christoph weber,
christian papathanasiou,
christian grothoff,
chris tarnovsky,
chris palmer,
chris paget,
chris nickerson,
chris mckenney,
chris hoff,
chris harrison,
chris gates,
chris eagle,
chris conley,
chris,
chon,
chipophone,
chipmunk,
chip,
chinese security,
chief security officer,
chief security,
chet hosmer,
chemistry,
cheap sd card,
cheap digital camera,
chat script,
charlie vedaa,
charlie shields,
charlie miller,
charles edge,
charity event,
charity,
charge,
chaosvpn,
chan ahn,
chain,
chad,
cesar cerrudo,
centric world,
central idea,
cellphones,
cellphone,
cell,
celebrity gossip,
ceballos,
cassette case,
case study,
case studies,
case,
caruso,
cartoons,
carlos perez,
carlos agell,
carlos,
cares,
cards,
card,
carbon copy,
car,
capturing,
capture,
captchas,
capacitors,
capability,
canon dslr,
canon,
cannon balls,
camera flash,
camera films,
camera devices,
camel through the eye of a needle,
camel,
cam program,
cam processor,
cam,
calca,
cad layout,
c. the,
bytes,
bypassing,
button presses,
busting,
business authors,
business,
burroughs,
burns,
bump,
bullets,
build,
bugtraq,
buffer,
buetler,
budd,
buckminster fuller,
bsod,
bryan sullivan,
bruce schneier,
bruce potter,
browser,
brown rob ragan,
brother,
broadcast monitors,
brief history,
bridge,
brian wilson tags,
brian wilson ryan linn tags,
brian wilson,
brian mccarthy,
brian martin keith pachulski,
brian krumheuer,
brian holyfield,
brian contos,
brian blankership,
brent baldwin robert jason tags,
brendan robert,
breakout clone,
breaking,
break,
brazil,
braving,
brandon nesbit,
brandon dixon tags,
brandon dixon,
brains,
brad smith,
boy,
box,
bowne,
bourbon street,
bottle rocket,
bottle,
botnet,
boston dynamics,
boston,
boss,
bos,
bored,
boot security,
boot ini,
boas,
board,
blurring,
bluetooth adapters,
bluetooth,
blowing,
blog,
blocking,
block puzzles,
blitzableiter,
blip tv,
blackwood,
blackjacking,
blackberry,
black hat,
biz,
bittorrent,
bitton,
bits,
biscuit,
bipedal robot,
bipedal,
bios,
biohacking,
bing,
binary,
binaries,
billy rios,
billy hoffman,
billion dollars,
bill hammack,
bigdog,
big picture,
big,
bienfang,
biddulph,
bgp,
beta group,
ben sapiro,
ben leperchey,
ben kurtz,
ben heck,
ben hawkes,
ben gilstad,
ben feinstein,
ben cohen,
belong,
belkin router,
behavior,
beau woods,
beast,
bay area,
battle,
bastille,
basics,
based intrusion detection,
barnum,
barnaby jack tags,
bare metal,
bare,
barcode,
baptiste gourdin,
banner image,
banking,
baltic,
baldwin,
balancing,
bakeca,
bag,
badges,
badge,
bad memories,
bad,
backdoors,
baby,
axford,
awesome,
awards,
award,
avr microcontroller,
avi,
available resources,
ava latrope,
ava,
automation,
automatically,
automatic browser,
automatic,
automated teller machines,
auto adapting,
authentication,
austrian alps,
australia,
aurora,
augmented,
audio,
attribution,
attacks,
attacking,
attackers,
attacker,
atmega8,
atmega,
atari,
asymmetric,
asterisk,
assessments,
assessment tool,
assessment data,
assessment,
asp,
aslanian,
arturo castro,
arturo,
artificial intelligence,
art,
arrested,
array implementation,
arpspoof,
arp requests,
arkin tags,
arjun,
ariel,
aren,
arcade style,
arbitrary code execution,
arbitrary code,
appsec,
apps,
approach,
application web,
application server,
application layer,
application asp,
apple tv,
apple quicktime,
app,
apdu,
anyma,
antonio rucci,
antoine gademer,
antique,
anthony lineberry,
anthony lai,
antennas,
anonymous,
anonymos,
anonymity privacy,
anonymity,
ankney,
anguiano,
andy singleton,
andrs pablo riancho,
andrew whitaker,
andrew lindell,
andrew kongs,
andrew immerman,
andrew,
andreadis,
andrea lelli,
andrea barisani,
analyzing,
analysis,
analog to digital converter,
analog to digital conversion,
analog telephone,
analog electronics,
analog camera,
amy winehouse,
amplification,
amp,
amit,
amir zmora,
amf,
alternative medicine,
alternative,
alstrasoft,
alps,
alonso jose palazon,
alonso,
allowed,
allomani,
algorithms,
alexander tereshkin,
alexander sotirov,
alexander muentz,
alex stamos,
alex ionescu,
alessio,
alek amrani,
alberto revelli,
al franken,
akihabara station,
ajax,
airodump,
air traffic control,
air,
ahn,
ahmad tags,
afterdark,
advisory,
advice,
advanced,
adrian wiesmann,
adrian crenshaw,
adobe flash,
adobe,
admiral grace hopper,
adequacy,
adam shostack,
adam savage,
adam pridgen,
adam papamarcos,
adam meyers,
adam laurie tags,
adam laurie,
adair,
activex controls,
activex,
action,
ace video workshop,
ace,
accurate assessment,
access control,
access,
abusing,
abuse,
abraham tags,
about,
aaron newman,
aapl,
a.,
Wireless,
Videos,
Release,
Public,
Programming,
Newbie,
NON,
Howto,
HackIt,
General,
Community,
BackTrack,
Ask,
Area,
5 years,
3pi,
3d space,
3d printer,
3d environments,
3d environment,
36 stratagems,
30k
Skip to page:
1
2
3
...
5
-
-
13:00
»
Hack a Day
If you were tasked with designing a color video monitor, it’s pretty clear how you’d go about it. But what if you’d been asked to do so 20 years ago? Would it have been a cut and dried from an engineering standpoint? Apparently not, as this hybrid LCD-CRT video monitor demonstrates.
We’d honestly never heard of this particular design, dubbed “LCCS”, or liquid crystal color shutter, until [Technology Connections]’ partial teardown of the JVC monitor and explanation of its operation. The idea is simple and hearkens back to the earliest days of color TV in the United States, when broadcasters were busy trying to bring color to a monochrome world in a way that would maximize profits. One scheme involved rotating a color wheel in front of the black-and-white CRT and synchronizing the two, which is essentially what’s happening in the LCCS system. The liquid crystal panel cycles between red, blue, and green tints in time with the CRT’s images behind it, creating a full-color picture. “But wait!” you cry. “Surely there were small color CRTs back in the year 2000!” Of course there were, but they kind of sucked. Just look at the comparison of a color CRT and the LCCS in the video below and you’ll see why this system carved out a niche in the pro video market, especially for video assist monitors in the days before digital cinematography. A similar system was used by Tektronix for color oscilloscopes, too.
As usual, [Technology Connections] has managed to dig up an interesting bit of the technological fossil record and present it in a fascinating way. From video on vinyl to 1980s copy protection to the innards of a toaster, we enjoy the look under the hood of forgotten tech.
-
-
7:00
»
Hack a Day
It is easy to find technology success stories: the PC, DVD, and cell phone are all well-documented tales. However, it is a little harder to find the stories behind the things that didn’t quite take off as planned. As the old saying goes, “success has many parents but failure is an orphan.” [Technology Connections] has a great video about RCA’s ill-fated SelectaVision video disc systems. You can see part one of the video below.
RCA started working on the system in the 1960s and had they brought it to market a bit earlier, it might have been a big win. After all, until the VCR most of us watched what was on TV when it was on and had no other options. You couldn’t record things or stream things and f you didn’t make it home in time for Star Trek, you simply missed that episode and hoped you’d get luckier when and if they reran it during the summer. That seems hard to imagine today, but a product like the SelectaVision when it was the only option could have really caught on. The problem was of course, that they waited too late to bring it to market. The video also makes the point that the system contained a few too many technical compromises.
There’s a lot of history about RCA and its roots with the radio alternator. You can power through that section and then you get into a lesson about how phonograph records work. After all, RCA’s concept was to create a record player for video. The technical challenge, of course, is that an audio record only needs about 20 kHz of bandwidth. A video record has to hold hundreds of times that amount of data. The SelectaVision system held about 60 minutes of 3 MHz video on each side of the large platters.
Starting in 1964, by 1972 they realized they couldn’t use a standard vinyl record and even with the fragile metallized discs they were only holding about 10 minutes of video. By 1981, they had holders for the discs that could hold an hour per side. You had to shell out $500 for the player — about $1,500 in today’s money. Steep, but many readers will have paid that much for a tech gadget. The discs were about $20.
The problem of course is that the VCR — while more expensive — had four-hour tapes and had been available since the late 1970s. RCA even had its own line of VCRs called — unsurprisingly — SelectaVision. People were able to record on the VCR which made more sense, especially since there weren’t always prerecorded options for everything.
If you want to jump right to the teardown, slide over to around the 15 minute mark. The player wasn’t very complex. It is little more than a 450 RPM record player with a special pickup. That pickup used a titanium electrode that measured changes in the capacitance between the conductive disc and the pickup electrode. The discs were PVC made conductive with carbon. The depth of the groove controlled the capacitance and the player used that to generate the video signal.
If you remember records, they were prone to getting stuck, requiring a good swift kick. The player could actually kick itself using an electromagnet because it did happen pretty often. Many of the discs haven’t aged well.
We are looking forward to part two which is due out any day now. Now if you don’t mind having very short videos, you have other options. If you think the road to videotape in the home was easy, think again.
-
-
10:00
»
Hack a Day
When running a hacker camp or other event, one of the many challenges faced by the organisers concerns the production and distribution of event videos. As the talks are recorded they must be put online, and with a load of talks to be processed it quickly becomes impractical to upload them one by one through a web interface such as that provided by YouTube. At the BornHack 2019 hacker camp in Denmark they were using a particularly well-integrated unit to do the video uploading in real time, and its creator [Mikkel Mikjær Christensen] was good enough to share the video we’ve put below the break, a talk he gave about it at The Camp 2017, a Danish open source software camp.
It takes the viewer through the evolution over several years, from simple camcorders with integrated microphones and post-event processing, through a first-generation system with a laptop and rack-mount monitors, and into a final system in a rugged portable case with a significantly powerful laptop running OBS with a hardware MPEG encoder. Careful choice of power supplies and the use of good quality wireless microphones now give instantaneous video streaming to events such as BornHack without the need for extensive infrastructure.
If you were wondering where you might have heard that name before, [Mikkel] is the [Mike] from the Retrocomputing with Mike YouTube channel. It’s being honest to say that more of our conversation was about retrocomputers than the video box.
-
-
16:00
»
Hack a Day
Plenty of hackers and makers are passionate about content creation. In the dog-eat-ice-bucket-challenge world of online video, production value is everything. If you want to improve your audio quality then cutting down on echoes is a must, and these acoustic panels will help you to do just that.
The build starts with aluminium L-channel, affixed together into an equilateral triangle with the help of some 3D printed brackets. Two of the triangular frames are then fitted together via a series of hexagonal standoffs. Foam or housing insulation is then added to act as the primary sound absorbing material. To give an attractive finish, the panels are covered in fabric. The panels are then placed on to drywall using nails glued into the standoffs.
While the panels are likely more expensive to build than off-the-shelf foam alternatives, they have an attractive look which is key in video studio environments. If you’re wondering where to position them for the best results, there’s a simple and easy approach to figure it out. Video after the break.
-
-
22:00
»
Hack a Day
How do you hack your motivation? Do you put red marker Xs on a paper calendar every day you exercise? Do you use an egg timer to sprint through dozens of emails? Do you lock all the doors and shut off your data to write some bulletproof code? If you are [Hulk], you build a YouTube Desktop Notifier showing his YouTube subscribers and views. This is his ticket to getting off the couch to make a video about just such a device. There is something poetic about building a mechanism to monitor its own success making a feedback loop of sorts. The Hackaday.io page follows the video, so anyone who wants to build their own doesn’t have to scribble notes while pausing the video which is also posted below the break.
The hardware list is logical, starting with a NodeMCU module programmed through the Arduino IDE. Addressable 7-segment displays show the statistics in red, but you can sub in your preferred color with the back-lighting LEDs. It should be possible to share the CLK pins on the displays if you are important enough to need more digits. [Hulk] already outlined a list of improvements including switching to addressable backlights and adding daily and monthly tracking.
Monitoring online values without a computer monitor is satisfying on a level because it shows what motivates us, whether that is Bitcoin or the weather.
-
-
4:00
»
Hack a Day
For whatever reason, the Video Graphics Array standard seems to attract a lot of hardware hacks. Most of them tend to center around tricking a microcontroller into generating the signals needed to send images to a VGA monitor. We love those hacks, but this one takes a different tack – a microcontroller-free VGA display that uses only simple logic chips and EEPROMs.
When we first spied this project, [PH4Nz] had not yet shared his schematics and code, but has since posted everything on GitHub. His original description was enough to whet our appetite, though. He starts with a 27.175-MHz clock and divides that by 4 with a 74HCT163, which has the effect of expanding the 160×240 pixels image stored in one of the EEPROMs to 640×480. Two 8-bit counters keep track of horizontal and vertical positions, while the other EEPROM takes care of generating the Hsync and Vsync signals. It’s all quite hackish, but it works. [PH4Nz] tells us that the whole thing is in support of a larger project: an 8-bit computer made from logic chips. We’re looking forward to seeing that one too.
This isn’t the first microcontroller-less VGA project we’ve seen, of course. Here’s a similar one also based on EEPROMs, and one with TTL logic chips. And we still love VGA on a microcontroller such as the ESP32; after all, there’s more than one way to hack.
Thanks to [John U] for the tip.
-
-
8:30
»
Hack a Day
Analogue TV signals are a beautiful exercise in order and synchronisation, in that as the white dot on your old CRT TV back in the day traced its way across the glass it would have been doing so in faithful obedience to the corresponding electron beam in the camera at the studio. But a camera with a lens and light-sensitive scanning camera tube wouldn’t have been the only way of generating a picture. The flying-spot scanner drew a raster over its subject — usually celluloid film — with a white dot of light and recorded the result with a single photocell to produce a video signal. The ever resourceful [Niklas Roy] has built one using a video projector.
In this scanner the “dot” is a square of white pixels that is moved around the scene, while the sensor is a photoresistor that is read by an Arduino which passes the data to a PC. The whole is mounted in a booth that the subject positions themselves in front of, and covers their head with a cloth. It’s a slow process because the photoresistor is hardly the best sensor, in fact a portrait takes 83 seconds.
The result is hardly superlative quality, but of course this is an artwork in itself rather than a particularly good camera. It is however an impressive piece of work, and we know we’d give it a go if we had the chance.
[Niklas] is a frequent feature on these pages, having produces some pretty impressive work over the years. Some of our favourites are his container-sized music construction machine, and his tiny cardboard plotter.
-
-
22:00
»
Hack a Day
If there’s one thing tiny Linux Systems on a Chip are good for, it’s emulation. There’s nothing like pulling out an emulation console on the bus for a quick game of old-school NES Tetris, or beating the next level in Super Mario World. This is the smallest emulation console ever. It’ll fit in your pocket, and it has a bright, vibrant screen. It doesn’t get better than this.
This project is an improvement on two projects, both of which are some of the top projects on hackaday.io, the best place on the Internet for hacks and builds. The Keymu is (or was, at the time) the smallest emulation console ever, built as a miniaturized version of the Game Boy Advance SP in a 3D printed case and powered by the Intel Edison. The Edison doesn’t exist anymore, so after that development moved over to the Funkey Zero, a tiny console built around the AllWinner V3s chip and a 240×240 display. Both of these are tiny, tiny consoles, but as silicon gets better there’s always better options, so it’s back to the drawing board.
The design of the Funkey Project is again built on the AllWinner V3S SoC with 64MB of DDR2 DRAM. There’s a 1.5″ display with 240×240 resolution, and of course this retro emulation console retains the classic and very useful clamshell form factor of the famous Game Boy Advance SP.
Already, this project is in the works and it’s shaping up to be one of the most popular projects on hackaday.io ever. Everyone wants an emulation console, and this is the smallest and tiniest one yet. Whether or not this project can carry through to production is another matter entirely, but we’re eager to find out.
-
-
16:00
»
Hack a Day
The lack of HDMI inputs on almost all laptops is a huge drawback for anyone who wants to easily play a video game on the road, for example. As to why no manufacturers offer this piece of convenience when we all have easy access to a working screen of this …read more
-
-
7:00
»
Hack a Day
Looking for a cheap way to keep an eye on something? [Kevin Hester] pointed us to a way to make a WiFi webcam for under $10. This uses one of the many cheap ESP32 dev boards available, along with the Internet of Things platform PlatformIO and a bit of code that creates an RTSP server. This can be accessed by any software that supports this streaming protocol, and a bit of smart routing could put it on the interwebs. [Kevin] claims that the ESP32 camera dev boards he uses can be found for less than $10, but we found that …read more
-
-
13:00
»
Hack a Day
Before the GoPro, shooting video of messy, fast-paced, or dangerous things was very different. There were commercial sports camera rigs and various industrial solutions, but the GoPro, with its waterproof housings and diminutive size, was the revolutionary, stick-it-anywhere camera. Despite this, the team at [tarkka] were having issues with the lens getting covered in coolant while shooting videos of their CNC machining projects. To solve this, they created an air knife to clean the lens.
The air knife consists of a wide, flat nozzle that is designed to blow fluid off of the lens. It’s a tidy 3D printed design, …read more
-
-
1:00
»
Hack a Day
I hate gratuitous destruction videos. You know, the ones that ask “what happens if we drop a red-hot ball of Plutonium onto a bag of Cheetos?” There’s a lot of smoke, flames and a big pile of ad revenue for the idiots behind it.
This destruction video is a little different, though. [Tesla 500] wanted to mount his high-speed camera onto a rotating blade, but without destroying the camera. In this video, he documents the somewhat nerve-wracking process of building a rig that spins a $3000 camera at several thousand revolutions per second minute. It’s all about the balance, about …read more
-
-
22:00
»
Hack a Day
Digital video is cool and all, but it can’t compete with analog in terms of smooth, creamy glitches and distortion. [gieskes] has developed an analog audio-visual synthesizer that is a great example of the old-school retro visuals you can create with a handful of simple components.
Known as the 3TrinsRGB+1c, it’s available both assembled and in kit form. It’s probably best to start with the manual. Synthesis is achieved through the use of a HEF40106 hex inverting buffer – a cheap and readily available part that nonetheless provides for excellent results. Video can be switched between RGB oscillators and a …read more
-
-
22:00
»
Hack a Day
If you haven’t noticed, CRTs are getting hard to find. You can’t get them in Goodwill, because thrift stores don’t take giant tube TVs anymore. You can’t find them on the curb set out for the trash man, because they won’t pick them up. It’s hard to find them on eBay, because no one wants to ship them. That’s a shame, because the best way to enjoy old retrocomputers and game systems is with a CRT with RGB input. If you don’t already have one, the best you can hope for is an old CRT with a composite input.
But …read more
-
-
22:00
»
Hack a Day
It’s often said that the music etched into a vinyl record takes on a transcendent quality that you simply can’t find in a digital recording, but does that still apply when you add motion picture? The collaboration of [Sengmüller and Diamant] sure think so, because they are offering a new experience for the turntable with the introduction of their VinylVideo pre-amplifier. No tape reels here, this project shows the extend of what is possible through analog video.
While all record players capable of playing back 7 in. 45 RPM are compatible with the system, the VinylVideo records themselves specially cut …read more
-
-
22:00
»
Hack a Day
A high-resolution LCD or OLED screen is a commodity component that we can buy on a little breakout board and plug into our microcontrollers without spending more than a dollar or two. We can buy them in sizes ranging from sub-postage-stamp to desktop TV if our budgets stretch that far, and they are easy to drive in every sense of the word. It is not so long ago though that a high-resolution LCD, even a small one, was a seriously expensive component. In consumer electronic devices such as camcorders engineers went to great lengths to avoid those costs, and [12voltvids] …read more
-
-
4:01
»
Hack a Day
3D printers have long since made it easy for anyone to make 3-dimensional zoetropes but did you know you can take advantage of a 4th dimension by stretching time? Previously the duration of a zoetrope animation would be however long it took for the platform to rotate once. To make it more interesting to watch for longer, you filled out the scene by creating concentric rings of animations. [Kevin Holmes], [Charlie Round-Turner], and [Johnathan Scoon] have instead come up with a way to make their animations last for multiple rotations, longer than three in one example. If you’re not at …read more
-
-
19:00
»
Hack a Day
Getting computers to recognize objects has been a historically difficult problem in computer science, but with the rise of machine learning it is becoming easier to solve. One of the tools that can be put to work in object recognition is an open source library called TensorFlow, which [Evan] aka [Edje Electronics] has put to work for exactly this purpose.
His object recognition software runs on a Raspberry Pi equipped with a webcam, and also makes use of Open CV. [Evan] notes that this opens up a lot of creative low-cost detection applications for the Pi, such as setting up …read more
-
-
19:00
»
Hack a Day
[Dan Mace] decided to try vlogging 1980s style. To do this, he built Pram Cam — a one-man mobile video recording setup using vintage gear. [Dan] is a YouTuber from Cape Town, South Africa. His goal for this project was to motivate people to get out there and make videos. Smartphones, action cams, and modern video equipment all have made it incredibly easy to create content.
[Dan] reminds us of this by grabbing a vintage 1984 video camera – a Grundig vs150 VHS recorder. He couples the camera with a sturdy video tripod, blimp microphone, CRT TV as a monitor, …read more
-
-
13:00
»
Hack a Day
We’ve all had the heartbreak of ordering something online, only to have it arrive in less than mint condition. Such are the risks of plying the global marketplace, only more so for used gear, which seems to be a special target for the wrath of sadistic custom agents and package handlers all along the supply chain.
This cruel fate befell a vintage Vectrex game console ordered by [Senile Data Systems]; the case was cracked and the CRT was an imploded mass of shards. Disappointing, to say the least, but not fatal, as he was able to make a working console …read more
-
-
13:01
»
Hack a Day
What if Google Glass didn’t have a battery? That’s not too far fetched. This battery-free HD video streaming camera could be built into a pair of eyeglass frames to stream HD video to a nearby phone or other receiver using no bulky batteries or external power source. Researchers at the University of Washington are using backscatter to pull this off.
The problem is that a camera which streams HD video wirelessly to a receiver consumes over 1 watt due to the need for a digital processor and transmitter. The researchers have separated the processing hardware into the receiving unit. They …read more
-
-
22:00
»
Hack a Day
We’re all used to posing for a picture — or a selfie — but there’s something about photo booths that make getting your photo taken an exciting and urgent affair. To make this experience a bit easier to tote about, Redditor [pedro_g_s] has laboriously built, from the ground up, a mobile photo booth named Buzz.
He needed a touchscreen, a Raspberry Pi, almost definitely a webcam, and a 3D printer to make a case — although any medium you choose will do — to build this ‘booth.’ That said, he’s built the app in a way that a touchscreen isn’t …read more
-
-
16:00
»
Hack a Day
It’s easy to dismiss decades old electronics as effectively e-waste. With the rapid advancements and plummeting prices of modern technology, most old hardware is little more than a historical curiosity at this point. For example, why would anyone purchase something as esoteric as 1980-era video production equipment in 2018? A cheap burner phone could take better images, and if you’re looking to get video in your projects you’d be better off getting a webcam or a Raspberry Pi camera module.
But occasionally the old ways of doing things offer possibilities that modern methods don’t. This fascinating white paper from [David …read more
-
-
16:00
»
Hack a Day
If you want to take good photographs, you need good light. Luckily for us, you can get reels and reels of LEDs from China for pennies, power supplies are ubiquitous, and anyone can solder up a few LED strips. The missing piece of the puzzle is a good enclosure for all these LEDs, and a light diffuser.
[Eric Strebel] recently needed a softbox for some product shots, and came up with this very cheap, very good lighting solution. It’s made from aluminum so it should handle the rigors of photography, and it’s absolutely loaded with LEDs to get all that …read more
-
-
16:00
»
SecuriTeam
A Vulnerability Laboratory Researcher discovered a Local Buffer Overflow vulnerability on Socusofts Photo to Video Converter Free and Professional v8.05.
-
15:03
»
SecDocs
Tags:
rootkit Event:
DEFCON 7 Abstract: What will we be doing? R0xiN the HAU-aus, BIzaTch!!!@@!2121lf... But that goes with out saying. In addition to the rocking of the aforementioned house, we will also be releasing BO2k. We won't reveal our sekrets of BO-Fu, but trust me when we tell you that it will make BackOrifice v1.0 look like LOGO for the TI99/4a.
-
13:00
»
Hack a Day
Lasik eye surgery is pretty common these days, but there are of course easier and cheaper ways to solder SMD components. [techpawpanda] wanted a video camera to see what was going on when he placed and soldered very tiny components on his board, but commercial SMD video cameras were terribly expensive. He wound up using [...]
-
-
5:01
»
Hack a Day
[John Floren] really sells us on a pair of MyVu 301 Video Glasses. He lists the features as being bulky, ugly, and uncomfortable. That’s the reason why he’s showing you how to crack open the glasses in order to steal the tiny LCD modules. The LCD screen for each eye is mounted inside of the [...]
-
-
16:00
»
SecuriTeam
The Video Lead Form Plugin in Wordpress http://wordpress.org/extend/plugins/video-lead-form/ has a Reflective XSS vulnerability in the browser URL which affects Wordpress 3.4.2 (Platform Used).
-
-
4:00
»
Hack a Day
For playing around with video signals and trying to create a an interesting microcontroller project, you can’t do better than the classic Pong. We’ve seen our share of microcontroller-based pong builds, but rarely have we seen an 8-pin microcontroller recreate every part of the first video game. [Tim] started his PIC12F1840-based Pong build with just [...]
-
-
11:01
»
Hack a Day
Scaled down it’s not as obvious that this image isn’t a crystal clear rendering of Mortal Kombat gameplay. But we’ve linked it to the full size version (just click on the image) so that you can get a better look. Notice the scan lines? This is the result of an effort to more accurately mimic [...]
-
-
13:01
»
Hack a Day
To be honest, we’ve heard of dithering but that’s the extent of our knowledge on the topic. After looking through [Windell's] post about using Dithering in Processing we can now say we’ve got a base of knowledge on the topic. Dithering is used to produce an image out of two colors that our eyes can [...]
-
9:01
»
Hack a Day
This video game gives your thumbs a rest while stretching those vocal chords. The pair of microphones seen above control the video game on the LCD display. Saying “Biu” will launch a projectile while “ahh” adjusts the flight path. The system was developed by [Tian Gao] as a final project for his ECE 4760 course [...]
-
-
16:00
»
SecuriTeam
The All Video Gallery plugin for WordPress is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
-
-
3:01
»
Hack a Day
[Acorv] wrote in to tell us about his latest hack, a robotic arm that writes with a marker. In the video after the break, the arm is set to copy whatever someone writes in a touchpad. As you might guess from this video, the hack is written up in Spanish, but it’s nothing your favorite [...]
-
-
6:01
»
Hack a Day
If you’re working with a CGA, EGA, or RGB gaming system this inexpensive board does a great job of converting the signal to VGA so that you can play using a modern display. But what if you have a SCART connector as an output? That’s the situation in which [EverestX] found himself so he hacked [...]
-
6:01
»
Hack a Day
If you’re working with a CGA, EGA, or RGB gaming system this inexpensive board does a great job of converting the signal to VGA so that you can play using a modern display. But what if you have a SCART connector as an output? That’s the situation in which [EverestX] found himself so he hacked [...]
-
-
13:13
»
Hack a Day
Every smartphone (and most dumb phones) has a video camera built into it these days. Some of them are even capable of recording respectable HD video. So we’d bet that the decades old camcorder you’ve got kicking around isn’t getting any use at all anymore. [John] wants to encourage you to hack that hardware. He [...]
-
-
13:00
»
Hack a Day
A few months ago, [Ben] saw a video of the world’s largest NES controller. “I bet I could make the smallest,” he thought in a strange game of one-upmanship. Now [Ben] has the smallest fully functional NES compatible controller, a feat of engineering that can only end in very, very sore thumbs. The old NES controller is a [...]
-
-
8:31
»
Hack a Day
So IT has your computer locked down, but if you’re lucky enough to have this model of telephone you can still play video games while at work. [AUTUIN] was at the thrift store and for just $8 he picked up an ACN videophone on which he’s now playing video games. We don’t know what magical [...]
-
-
13:01
»
Hack a Day
We love to see derivative works that take a great hack and make it even better. This LCD Laptop resurrection project is an excellent example. [Alex] took the work seen on this other FPGA LCD driver and delivered a leap forward on the final hardware packaging. The link at the top drops you into the second page of [Alex's] [...]
-
-
21:47
»
SecDocs
Authors:
Nils Magnus Tags:
penetration testing Event:
Chaos Communication Congress 19th (19C3) 2002 Abstract: Hacking used to be an art; one may get the impression that this turned recently in other questions of, say how many toolz you have and which systems you own. Within our presentation we will demonstrate hacking approaches with little or even no tools at all. Given a reasonable number of standard operating system utilities, much information about a network can be obtained and several hacks deem possible. This is no presenation of cutting-edge techniques, most of the approaches have been possible since many years/for a long time. However, we will not explain what TCP/IP means or how to calculate a netmask. Targetetd to an audience that knows what networking is all about but wishes to see more obfruscated means of using well-known utilities. During the hands-on session we will explain and demonstrate how we can draw maps of segments with traceroute, how to identify filtered hosts with ping and arp, how to do IP spoofing and segment invasion with ifconfig or how to get some more reliable information about a webserver. We conclude with a discussion of the feasibility of this approach, identify useful tools that can be of effective help and name those which mainly keep you stupid whilst they do not do any better.
-
-
21:55
»
SecDocs
Authors:
Stefan Sels Tags:
spam Event:
Chaos Communication Congress 19th (19C3) 2002 Abstract: SPAM is a growing problem that is hard to fight. On the one hand you want to communicate with everybody, on the other hand you don´t want to be filled up with SPAM. To fight spam effectifly there are some server and clientside solutions which help and put some mails into the trash by their own.
-
10:18
»
SecDocs
Authors:
Hubert Feyrer Tags:
UNIX Event:
Chaos Communication Congress 19th (19C3) 2002 Abstract: Last year's Regensburg city marathon was filmed, digitized and rendered so each of the 5.500 participants was able to retrieve his personal video of them reaching the goal. The rendering was done on a 45-machine cluster running the NetBSD operating system. An overview of the project will be given, including computational steps performed in the cluster, details on the technical setup and experiences gained in the project.
-
10:13
»
SecDocs
Authors:
Hubert Feyrer Tags:
UNIX Event:
Chaos Communication Congress 19th (19C3) 2002 Abstract: Last year's Regensburg city marathon was filmed, digitized and rendered so each of the 5.500 participants was able to retrieve his personal video of them reaching the goal. The rendering was done on a 45-machine cluster running the NetBSD operating system. An overview of the project will be given, including computational steps performed in the cluster, details on the technical setup and experiences gained in the project.
-
10:06
»
SecDocs
Authors:
Hubert Feyrer Tags:
UNIX Event:
Chaos Communication Congress 19th (19C3) 2002 Abstract: Last year's Regensburg city marathon was filmed, digitized and rendered so each of the 5.500 participants was able to retrieve his personal video of them reaching the goal. The rendering was done on a 45-machine cluster running the NetBSD operating system. An overview of the project will be given, including computational steps performed in the cluster, details on the technical setup and experiences gained in the project.
-
-
16:00
»
Hack a Day
Adafruit has a new tutorial on creating video with an RPi and pygame. The goal is to create custom user interfaces on low cost hardware, powered by the easy to use pygame library. The tutorial walks through getting your RPi set up to run pygame, creating a basic pygame script that controls the framebuffer, and drawing [...]
-
-
4:51
»
SecDocs
Authors:
Emmanuel Goldstein Tags:
social Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Emmanuel Goldstein describes the changing times in the United States. While hackers were always looked upon with suspicion, they are now seen as a very definite threat on the order of terrorists. Add activism into the mix and there's no end to the potential for trouble. Hackers and activists have always been an inconvenience to the authorities for different reasons. In the past, hackers in America tended to only want to know how to figure something out whereas activists focused on more idealistic goals. Today, both necessity and progress have merged these two communities in a number of ways. Emmanuel Goldstein, editor of 2600 Magazine and host of the hacker radio show "Off The Hook," will discuss some of what has changed over the past couple of decades and how alliances have been formed in the fight to maintain privacy, speak openly, and assemble freely. Examples of some of the abuses that have been taking place will also be highlighted. In addition, Goldstein will focus on the events surrounding his arrest at the Republican National Convention in New York and how independent media and technology were used to fight back in his and more than 1000 other cases. Film excerpts will be shown.
-
-
21:51
»
SecDocs
Authors:
Thorsten Holz Tags:
honeypot Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Current Honeypot-based tools have a huge disadvantage: Attackers can detect honeypots with simple techniques and are to some extent also able to circumvent and disable the logging mechanisms. On the basis of some examples, we will show methods for attackers to play with honeypots. Honeypots / Honeynets are one of the more recent toys in the white-hat arsenal. These tools are usually assumed to be hard to detect and attempts to detect or disable them can be unconditionally monitored. The talk sheds some light on how attackers usually behave when they want to defeat honeypots. We will encompass the process of identifying and circumventing current honeypot technology and demonstrate several ways to achieve this. The focus will be on Sebek-based honeypots, but we will also show some ways how to accomplish similar results on different honeypot-architectures. Upon completion of this lecture, the attendees will have some insight in the limitations of current honeypot technology. Individuals or organization that would like to setup or harden their own lines of deception-based defense with the help of honeypots will see some constraints on the reliability and stealthiness of honeypots. On the other side, people with more offensive mindsets will get several ideas on how to identify and exploit honeypots.
-
-
3:32
»
SecDocs
Tags:
hardening Linux Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: An introduction to the hardened toolchain used at the Hardened Gentoo project, which, combined with the PaX kernel, strong DAC/MAC control mechanisms and a thorough low-entry oriented user documentation provides "full scale" protection for a wide range from home users to enterprise businesses.
-
-
9:41
»
SecDocs
Authors:
Josef Spillner Tags:
Linux Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Overview about the young and still developing Free Software scene in South and Latin America (mostly Brazil), ways to achieve independence of existing structures, and some specific projects. While in Germany people still talk about the ongoing partial migration in Munich, which is mostly in the hands of only few companies, other places have advanced some more already: where interested citizens are part of IT migrations in both companies and organizations. Not only is this a cultural difference, but also gives all hackers the possibility to block decisions heading the wrong way, and to integrate their own perspective.
-
-
21:54
»
SecDocs
Authors:
Raúl Rojas Tags:
robotics Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Raúl Rojas and his team have implemented a centrally controlled team of football playing robots. They will present this project (including a video) and show us their robots
-
16:07
»
SecDocs
Authors:
Peter Panter Tags:
phishing Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Phishing became a serious problem in 2004 with media coverage even in non-technical context. The lecture will gather the incidents, shows common attacks-techniques and tries to give a prognosis for the near future.
-
-
8:41
»
SecDocs
Authors:
Tim Pritlove Tags:
social Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Please join us as we look back to what happened and look forward to what's next on our agenda.
-
-
21:52
»
SecDocs
Authors:
Paul Böhm Tags:
secure development Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: This talk will introduce new strategies for dealing with entire bug classes, and removing bug attractors from development environments.
-
-
9:20
»
SecDocs
-
-
2:56
»
SecDocs
Authors:
Dan Kaminsky Tags:
hacking Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: In the near future, hackers are facing new challenges that can't easily be compared to the ones in the recent years. Operating systems have been hardened and the task of taking advantage of bugs and flaws is getting more complicated every day
-
-
4:00
»
Hack a Day
Anyone who has played Minecraftfor a good amount of time should have a good grasp on making 3D objects by placing voxels block by block. A giant voxel art dragon behind your base is cool, but what about the math behind your block based artwork? [mikolalysenko] put together a tutorial for making 3D objects out of video [...]
-
-
14:01
»
Hack a Day
[Berto] wrote in to tell us about the visual effects synthesizer he built. It works as a pass-through for a video signal, rendering crisp clean images into a more psychedelic flavor like the one seen above. On the one hand this does a dishonor to the high-quality video devices we carry around in our pockets these days. On the [...]
-
-
21:36
»
SecDocs
Authors:
Dan Kaminsky Tags:
TCP/IP Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: I will discuss new experiences and potential directions involving scanning massive networks, such as the entire world's DNS infrastructure. Our networks are growing. Is our understanding of them? This talk will focus on the monitoring and defense of very large scale networks, describing mechanisms for actively probing them and systems that may evade our most detailed probes. We will analyze these techniques in the context of how IPv6 affects, or fails to affect them.
-
11:01
»
Hack a Day
Watching Big Buck Bunny on a spinning POV display is pretty impressive. Sure, the circular display area cuts off some of the picture, but otherwise it looks fantastic. This POV display is based on a Gumstix board. It runs embedded Linux which makes video playback rather easy. But translating each frame to the round display [...]
-
6:00
»
Hack a Day
As released, the Nexus 7 tablet includes a 1.2 Megapixel front-facing camera. Even though the camera supports taking pictures at a resolution of 1280 x 960, recording video is limited to a paltry 480p resolution. It turns out the inability to record HD 720p video isn’t a hardware limitation; engineers at either Google or Asus simply didn’t [...]
-
-
21:37
»
SecDocs
Authors:
Achim Friedland Daniel Kirstenpfad Tags:
network GSM phone Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: We are giving an overview of ip networks used for >=2.5G technologies. Our main focus is on scanning the overlaying ip network, on different Voice-over-IP filter implementations and the possibilities to circumvent them. We want to explain the ip networks used in GPRS and UMTS cellular networks from the enduser point of view. How do they work today and what has to be done to get a normal webpage, voice-over-ip or even a video stream onto your PDA or SmartPhone. For your private investigations inside your providers ip network we want to demonstrate you a tcp/udp port and round-trip-time based traceroute program based on the .NET compact framework. With the help of this program we want to analyse the anti voice-over-ip filters implemented by different cellular providers and show you some possibilities how to circumvent them _efficently_. So we don't just tunnel all the traffic through a VPN. But even when these filters become more sophisticated in the future we want to present some ideas how to defeat your right to talk via voice-over-ip whereever and whenever you want to.
-
-
5:23
»
SecDocs
Authors:
André Rebentisch Tags:
social Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Information overflow is a general problem of today's open information infrastructures. Everything can be found on the web but unfortunately not by everyone. Getting informed about the European Union and its projects is a task which you cannot leave to the Commission's public relations department. You should better start your own investigation. European decisions effect your interests and your business. Community building, interest representation through communication and influencing public opinion is not sufficient for effective lobbying. Information superiority by better access, knowledge retrieval and social engineering techniques gives you an advantage.
-
12:47
»
SecDocs
Authors:
Hendrik Scholz Tags:
VoIP Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Within the last year VoIP devices and applications flooded the market. SIP (Session Initiation Protocol) became the industry standard although it's still under constant development. VoIP networks converge with the PSTN and thus offer ways and means for new (and old) attacks. The talk gives a brief introduction on how various components in the VoIP universe interact. The main part deals with implementation problems within SIP in both end user as well as ISP site devices and applications.
-
9:01
»
Hack a Day
For all the high production values Final Cut Pro and Adobe Premier have released upon the world, there’s still a cinematographic aesthetic only possible with analog video, linear editing, and video feedback. [gijs] just sent in a video mixer he’s been working on to allow crossfading between two video signals and introducing some very cool analog video distortion [...]
-
-
21:28
»
SecDocs
Authors:
Ulrich von Zadow Tags:
technology Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Using Python, a large variety of media-oriented systems can be scripted with very little effort. The talk will explore the available libraries for 2d and 3d graphics, video and sound and describe real-world experiences in deploying these systems. Multimedia on linux has made great progress. A few years ago, video support was very limited, low-latency-audio was impossible, getting jitter-free performance was a nightmare and fonts were rendered with a quality that made any designer cringe. This has changed. One language that has been used successfully in many multimedia systems is python. The talk will look at what is required to set up a multimedia system with python. While the focus will be on installations in public or semi-public areas (museums, showrooms, the c-base), many of the techniques can be used in other areas as well. Most of the talk will cover Linux-based systems, with some references to the possibilities of Mac OS X systems.
-
13:12
»
SecDocs
Authors:
Joi Ito Tim Pritlove Tags:
culture Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Introductory opening session by Tim Pritlove and keynote speech on the 22C3 topic "Private Investigations" by Joi Ito.
-
-
21:46
»
SecDocs
-
21:46
»
SecDocs
Authors:
Paul Böhm Tags:
social Event:
Chaos Communication Camp 2007 Abstract: Great things rarely happen just because of good people or great ideas. For something interesting to happen opportunity, vision, and the ability to execute must come together. Why are there so few European ICT startups? If you've been following EU Reports on Innovation, you can see how bad the situation is already. In the words of the former Finnish Prime Minister, Mr. Esko Aho, in what is the Europan Union's prime document outlining a strategy for creating an innovative Europe: "Europe and its citizens should realize that their way of life is under threat[...] This society, averse to risk and reluctant to change, is in itself alarming but it is also unsustainable in the face of rising competition from other parts of the world." This talk explores Europe's seeming inability to innovate in ICT, looks for explanations from the perspective of founders, and tries to offer solutions to Europe's Innovation Dilemma.
-
10:19
»
SecDocs
Tags:
engineering Event:
Chaos Communication Camp 2007 Abstract: John von Neumann is considered one of the greatest and most influential mathematicians of the 20th century, one of the men who invented computers. This audio feature captures his life in a live spoken-word visual performance. Dr. John von Neumann, a witty, plump Hungarian, was a brilliant mathematician, a computer pioneer, and the founder of game theory whom nobody hesitated to call a genius. He was known as great fun at parties, once drank fifteen vodka martinis in a single evening as a kind of experiment. But he also brought the first computers to Los Alamos, and his machines were promptly put to work on calculations of implosion. Von Neumann made important contributions to the development of the atomic and hydrogen bomb, calculated that implosion was indeed feasible. The legendary scientist became a consultant, served on the Atomic Energy Commission from 1954 to his death 1957.
-
-
13:24
»
SecDocs
Authors:
Gadi Evron Tags:
warfare Event:
Chaos Communication Camp 2007 Abstract: Estonia is one of the most advanced countries in the world, and just now survived what has been referred to as "the first 'real' cyber conflict". What really happened there, and what does it mean to us? What can we learn from these attacks and the battle strategies used? In this talk we will go over an outline of the attacks and the defense the Estonians mounted, and proceed to discuss the impact and what actually happened during these attacks. We will then discuss military strategy for use in information warfare as it can be learned from test cases observed during this incidents.
-
13:24
»
SecDocs
Authors:
Gadi Evron Tags:
hacking Event:
Chaos Communication Camp 2007 Abstract: In this lecture we will discuss how security issues may impact the future, which may be confused with science fiction. Already today we find cyber-implants of different kinds embedded within the human machine. As security professionals we know there is no such things as perfect code, and security solutions are far from perfect. What will we be facing in 2040, and how might we defend ourselves - if at all.
-
-
21:32
»
SecDocs
-
-
2:53
»
SecDocs
Authors:
Felix von Leitner Tags:
secure development Event:
Chaos Communication Camp 2007 Abstract: Programmers often attempt to make their code faster but end up only making it less readable. This talk attempts to show what kind of optimizations you can (and should) leave to your compiler.
-
-
13:01
»
Hack a Day
[Jozef] has been playing around with X-rays. Specifically, he’s been using his own setup to make fluoroscopic images, a type of x-ray photography that allows for video images to be made. If you’ve ever seen those x-ray movies of someone swallowing, that’s fluoroscopy (we’re fans of the other oddities like this video of a skeleton playing [...]
-
-
21:46
»
SecDocs
Tags:
vulnerability Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: In this presentation I'll present a series of unusual security bugs. Things that I've ran into at some point and went "There's gotta be some security consequence here". None of these are really a secret, and most of them are even documented somewhere. But apparently most people don't seem to know about them. What you'll see in this presentation is a list of bugs and then some explanation of how these could be exploited somehow. Some of the things I'll be talking about are (recursive) stack overflow, NULL pointer dereferences, regular expressions and more.
-
-
15:30
»
Hack a Day
We can’t say we ever really thought that the problem with the early 1980′s was too much information in the hands of the people. But this promotional video for the Sceptre Videotex Terminal claims that it is the solution to the information overload of the time. The entire video is embedded after the break. You use [...]
-
-
21:33
»
SecDocs
Authors:
Sandro Gaycken Tags:
social Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Civil disobedience is a fundamental human right in all democracies, and it has to be accessible for everyone. This includes the accessibility of politically laden technologies which have to be understandable and destructible. Many current technologies however refuse accessibility to lay people. Thus it becomes the ethical obligation of the technical expert to provide understanding and accessible means for the destruction of potentially dangerous technologies.
-
14:30
»
Hack a Day
When you’re building something that hasn’t been done before, sometimes the parts you need just don’t exist. [Bacteria] over on the Made by Bacteria forum is building a huge all-in-one video game machine, combining hardware from 16 different consoles released through the years. This build requires a way to switch the video output between consoles, [...]
-
-
17:00
»
SecuriTeam
The CDN2 Video module for Drupal is prone to a cross-site request-forgery vulnerability and a cross-site scripting vulnerability.
-
-
21:45
»
SecDocs
Authors:
Christian Rechberger Tags:
cryptography Event:
Chaos Communication Camp 2007 Abstract: It is now already two years since the first theoretical attacks on the popular hash function SHA-1 have been announced. However so far nobody could show a collision for SHA-1. This talk surveys recent progress in the analysis of this hash function. How to contribute? Find out.
-
5:50
»
SecDocs
Authors:
Luis Miras Tags:
reverse engineering Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: In this talk, we will introduce the audience to the concepts involved in static analysis, and different implementations of those concepts with advantages and disadvantages of each. We will show how the open source tool bugreport (http://bugreport.sf.net) implements these concepts and will demonstrate the tool finding exploitable bugs in real-world binaries.
-
-
21:56
»
SecDocs
Authors:
Marvin Mauersberger Tags:
GPS Event:
Chaos Communication Camp 2007 Abstract: This talk gives a detailed overview on the state of the art of GPS tracking system (aka. location bugs), how they work and how to find and defeat them. GPS based tracking of peoples, cars and things is quickly becoming a real threat to personal privacy. Trackers are now cheap and easy to build and deliver high position accuracy and real-time transmission if desired. Low-power electronics and modern battery technology combined result in tracking systems that can live for weeks and months hidden in your car, motorbike or even backpack, transmitting your moves and whereabouts unknown to you to unfriendly people. The talk describes how GPS trackers work, how and where they are usually hidden, how you can find them (by physical search and other means) and what you can do against them. We will also briefly cover GPS chips in mobile phones and tracking by mobile phones in general.
-
12:42
»
SecDocs
-
-
21:39
»
SecDocs
Tags:
hacking Event:
Chaos Communication Camp 2007 Abstract: A welcome to the Camp. Explanation of facilities, organizational hints and and an introduction to the upcoming conference schedule.
-
-
15:07
»
SecDocs
Authors:
Régine Débatty Tags:
privacy Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: In 1996, The Surveillance Camera Players started manifesting their opposition to the culture of surveillance by performing silent, specially adapted plays directly in front of CCTV cameras. 10 years after, their work is more relevant than ever. This talk will take you through artists' strategies to raise the debate on privacy, the society of the spectacle, the aftermath of September 11th, face recognition software, panopticism, electronic tagging, etc.
-
-
15:15
»
SecDocs
Tags:
hacking Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Hackerspaces are community-run places where you can meet, work on projects, organize events and workshops, or just generally hang out with other hackers. More and more of those open spaces are being created all the time. Some of them are more than a decade old already, some just started out recently, and yet others might become a reality soon. Building and running a Hacker Lab is a tough thing. This is a talk about problems encountered, and lessons learnt. In this talk you'll see pictures and hear stories from Hacklabs around the world. Some of them old, some of them new, some big, some small, some squatted, and some of them even government funded, and what problems they've encountered, and how they've dealt with them. These stories are meant to inspire, and convey the mindset and organizational structure some of those hackerspaces have learned, to build and foster their community.
-
15:14
»
SecDocs
Authors:
Roger Dingledine Tags:
Tor Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Websites like Wikipedia and Blogspot are increasingly being blocked by government-level firewalls around the world. Although many people use the Tor anonymity network to get around this censorship, the current Tor network is not designed to withstand a government-level censor. In this talk we describe a design for providing access to the Tor network that is harder to block.
-
-
12:01
»
Hack a Day
Confronted with a monitor that would display neither HDMI signal, nor composite video, [Joonas Pihlajamaa] took on a rather unorthodox task of getting his oscilloscope to work as a composite video adapter. He’s using a PicoScope 2204 but any hardware that connects to a computer and has a C API should work. The trick is [...]
-
8:01
»
Hack a Day
It’s fairly easy to create VGA with an FPGA using a simple R/2R DAC. As [Mike] points out, this requires a lot of IO pins, and many development boards only support 8 bit VGA. Analog VGA is being replaced with DVI-D and HDMI on many devices nowadays, so it would be nice to port projects from [...]
-
-
14:47
»
SecDocs
Authors:
Joi Ito Tags:
games Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: This talk will focus on World of Warcraft, the most popular MMORPG. There will be a brief overview of the game, guilds and guild management, tools and social issues. Other technologies and the possible future of MMORPGs and their impact will be discussed. Video, images and examples will be used to describe why World of Warcraft is so compelling. First hand experience and comparisons with experiences and theory from other types of organizations will be used to describe the dynamics of a guild and what we can learn from guild and guild management. Socialization, ranks, personality types, rewards, rules, governance, promotion, recruiting, evolution and out-of-game activities will be discussed among other attributes. The current technology, supporting technology and possible future technologies will be explored to try to map the future of MMORPGs.
-
7:01
»
Hack a Day
As if getting your ass handed to you while playing video games wasn’t annoying enough, [furrtek] decided that the best way to help improve his skills was by inflicting physical pain each time his on-screen character died. While perusing the Internet looking for something to break through the doldrums of the day, he came upon [...]
-
-
21:39
»
SecDocs
Authors:
Caspar Bowden Tags:
privacy Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Microsoft has proposed architectural principles ("7 Laws of Identity") to support convergence towards an inter-operable, secure, and privacy-enhancing plurality of identity systems - an "Identity Metasystem". This new concept presupposes that a single monolithic identity system for the Internet is neither practicable nor desirable.
-
-
13:01
»
Hack a Day
[Autuin] created the most offensive video game ever. Inside a small cocktail arcade cabinet, he installed his own video game that recreates the experiences of the Space Shuttle Challenger and her crew on their last flight. The build started off by picking up an old cocktail version of Space Zap from The Hackery, a neat little recycling place [...]
-
-
15:44
»
SecDocs
Authors:
Joshua Ellis Tags:
technology Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Most modern futurism describes technology-driven futures: the nanotech future, the biotech future, etc. But there's also another future, just as or more possible: the future where technology is marginalized by social and cultural forces (such as the rise of fundamentalism as a political force in the US and Middle East). This lecture talks about how technology and design can help humanity avoid a grim future.
-
-
23:06
»
Hack a Day
If you’ve ever wondered why NTSC video is 30 frames and 60 fields a second, it’s because the earliest televisions didn’t have fancy crystal oscillators. The refresh rate of these TVs was controlled by the frequency of the power coming out of the wall. This is the same reason the PAL video standard exists for [...]
-
21:38
»
SecDocs
Authors:
Marco Gercke Tags:
social Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: The balance between effective criminal investigations and the protection of human rights is currently intensively discussed. A number of approaches demonstrate a tendency that state authorities gain for more access to sensitive data. But do these information really help to prevent crimes (e.g. terrorist attacks) and how save are these information in the hands of state authorities'?
-
13:47
»
Hack a Day
We’d bet that most readers stream video as the lion’s share of their entertainment consumption. It’s getting easier and easier thanks to great platforms like XBMC, but not everything is available in one place, which can be a bit off-putting. [Tony Hoang] is trying to simplify his viewing experience by creating one remote to rule [...]
-
-
14:32
»
SecDocs
-
-
21:47
»
SecDocs
Tags:
web application vulnerability Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: While many issues in web apps have been documented, and are fairly well known, I would like to shine some light on mostly unknown issues, and present some new techniques for exploiting previously unexploitable bugs. This lecture will not be an introduction to webappsec as many lectures are, so I will assume that everyone knows about common web vulnerabilities/exploits and why they are bad, and I will present a bunch of esoteric and previously unknown knowledge about how to exploit webapps, primarily those written in PHP, but some techniques are applicable to other languages, etc.
-
21:47
»
SecDocs
-
12:01
»
Hack a Day
2.4 GHz video transmitters are everywhere these days, in many, many products ranging from baby monitors to CCTV setups. Surprisingly, most owners of these video devices don’t realize they’re transmitting an unencrypted video signal, a belief [Benjamin] hopes to rectify. [Ben]‘s project started with him driving around cities recording unencrypted 2.4GHz video feeds. His idea [...]
-
9:01
»
Hack a Day
We take our digital life for granted these days, but back in 1943 it was vacuum tubes, not transistors, which made it all possible. This video on the types and industrial uses of vacuum tubes was sent into the tips line by [Polar Bear]. The nearly 70-year-old video is part of a collection preserved by [...]
-
-
21:26
»
SecDocs
Authors:
Alexander Kornbrust Tags:
Oracle Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Oracle databases are the leading databases in companies and organizations. In the last 3 years Oracle invested a lot of time and engery to make the databases more secure, adding new features ... but even 2007 most databases are easy to hack. This talk will describe the current status, the typical problems in customer installations and the trends for the future for Oracle Security. I will show some scenarios how to attack (and prevent) databases, abuse Oracle security features (like Oracle Transparent Database Encryption (TDE)) and the latest trends in SQL Injection (e.g. why a table "!rm -rF /" sometimes executes code).
-
11:01
»
Hack a Day
This huge and mesmerizing interactive display is just a big piece of advertising. It is a flip-dot display. Each pixel is a mechanical disk, white on one side and black on the other. The team over at BreakfastNY hacked the display modules and wrote their own software so that it can be refreshed with lighting [...]
-
-
12:03
»
Hack a Day
Since we put out a call for model and amateur rocketry hacks, we’ve been getting a lot of submissions on our tip line. Here’s two that found their way to us yesterday: Upgrading an original Back in the early 70s, Estes released a rocket with an 8mm movie camera attached to the nose of the [...]
-
-
5:01
»
Hack a Day
[Jon] will be tapping away with his toes during gaming session thanks to this foot controller which is packed with buttons and sensors. It’s the second iteration of the build. The original had some solder joints break and the USB stopped working. He had also been experiencing some erratic behavior and so he decided to [...]
-
-
21:47
»
SecDocs
Tags:
hacking Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: It is thought by many that the world may be facing Peaks in fossil fuel production and catastrophic climate change. These huge problems put into question the Industrial Civilisation and call for, at the very least, massive changes to society if humanity is to survive. Do hackers have a role to play in a post transition society? What sort of things should hackers know and prepare for in such a future?
-
-
21:44
»
SecDocs
Tags:
kernel exploiting Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: The process of exploiting kernel based vulnerabilities is one of the topics which have received more attention (and kindled more interest) among security researchers, coders and addicted. Due to the intrinsic complexity of the kernel, each exploit has been mostly a story on itself, and very little work has been done into finding a general modelization and presenting general exploiting approaches for at least some common categories of bugs. Moreover, the main target has usually been the Linux operating system on the x86 architecture. This talk reprises and continues the attempt done in this direction with the Phrack64 paper “Attacking the Core: Kernel Explotation Notes” that we released six months ago. A more in-depth discussion of some Solaris kernel issue (both on x86 and SPARC) and a more detailed analysis of Race Conditions will be presented.
-
-
21:35
»
SecDocs
Authors:
Rose White Tags:
social Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: "Guerrilla knitting" has a couple of meanings in the knitting community - to some, it merely means knitting in public, while to others, it means creating public art by knitted means. Contemporary knitters feel very clever for coming up with edgy language to describe their knitting, but the truth is that for decades there have been knitters and other textile artists who are at least as punk rock as today's needle-wielders. This talk will cover the vibrant history of contemporary knitting, with a focus on projects that will make you say, "Wow, that's knitted?" Feel free to bring knitting projects to the talk - let's get some public knitting going on at the conference!
-
-
21:56
»
SecDocs
Tags:
hacking Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: The Open Source initiative re-interpreted Free Software to include it into the neo-liberal ideology and the capitalist economy - whose aims are contrary to the FS starting axioms/freedoms. This platform will focus on ideological and political aspects of this. It will also suggest FS recovery strategies.
-
-
15:09
»
SecDocs
Authors:
Annie Machon Tags:
intelligence Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: A presentation about the role of intelligence agencies in the current era of the unending “war on terror”, how they monitor us, the implications for our democracies, and what we can do to fight back. In the name of protecting national security, spy agencies are being given sweeping new powers and resources. Their intelligence has been politicised to build a case for the disastrous war in Iraq, they are failing to stop terrorist attacks, and they continue to collude in illegal acts of internment and torture, euphemistically called “extraordinary rendition”. Most western democracies have already given so many new powers to the spies that we are effectively living in police states. As an informed community, what can we do about this?
-
14:59
»
SecDocs
Authors:
Henryk Plötz Karsten Nohl Tags:
RFID Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Mifare are the most widely deployed brand of secure RFID chips, but their security relies on proprietary and secret cryptographic primitives. We analyzed the hardware of the Mifare tags and found weaknesses in several parts of the cipher.
-
-
10:01
»
Hack a Day
A tin can and string telephone just doesn’t impress the kids anymore. Luckily, now you can turn that tin can telephone into a television, as [aussie_bloke] over on the Narrow-Bandwidth Television forum showed us. [aussie_bloke]‘s tin can TV is a mechanical television, a TV where the scanning lines of a CRT is replaced with a [...]
-
-
21:57
»
SecDocs
Authors:
Alessio L. R. Pennasilico Raoul Chiesa Tags:
SCADA Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: SCADA acronym stand for “Supervisory Control And Data Acquisition”, and it's related to industrial automation inside critical infrastructures. This talk will introduce the audience to SCADA environments and its totally different security approaches, outlining the main key differences with typical IT Security best practices. We will analyze a real world case study related to industry. We will describe the most common security mistakes and some of the direct consequences of such mistakes to a production environment. In addition, attendees will be shown a video of real SCADA machines reacting to these attacks in the most “interesting” of ways! :)
-
-
21:31
»
SecDocs
Tags:
quantum cryptography Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Quantum cryptography is the oldest and best developed application of the field of quantum information science. Although it is frequently perceived as an encryption method, it is really a scheme to securely distribute correlated random numbers between the communicating parties and thus better described as quantum key distribution (QKD). Any attempt at eavesdropping from a third party is guarantied to be detected by the laws of physics (quantum mechanics) and shows up as an increased error rate in the transmission (the QBER).
-
5:01
»
Hack a Day
[Alessandro] sent us a link to his post about a PRU software VGA rasterizer. It’s not the easiest read, but we think it’s worth your time. The gist of his background information is that back when his company was developing for an ARM9 processor he wanted to test his mettle with the coprocessor chips. The first [...]
-
4:01
»
Hack a Day
[FlorianH] wanted to get video out working with his BeagleBone but he just couldn’t figure out how to make the kernel play ball. Then a bit of inspiration struck. He knew that if you plug in the official DVI cape (that’s the BeagleBone word for what you may know as a shield) the kernel automatically [...]
-
-
8:01
»
Hack a Day
The LCD displays for Nokia phones have seen a ton of use as easily interfaced displays for Arduino or other microcontroller projects. Usually, these LCDs are only used for displaying a few lines of text, or if someone is feeling really fancy, a small graph. Shame, then that we don’t see more complicated and computationally [...]
-
-
21:27
»
SecDocs
Tags:
network management Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: The Internet Corporation for Assigned Names and Numbers (ICANN) needs to include users in its policy making: We propose and discuss tactics to hack the individual into the system.
-
21:27
»
SecDocs
Tags:
malware virus Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: The listeners will be introduced in the world of virus coding. They will understand how this can be seen as a way of expressing yourself and why it is a way of hacking. Furthermore they will get to know, which important groups, authors and viruses have been there in the last years and which are still active nowadays. Important technical terms will be explained as well as trends of the last years and the future. And more.
-
-
21:47
»
SecDocs
Authors:
Dan Kaminsky Tags:
DNS Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: DNS Rebinding has proved itself to be an effective mechanism for turning standard web browsers into proxy servers. This talk will go into further depth regarding mechanisms for hijacking browser connectivity, and will illustrate some new tricks for measuring network neutrality. Having already shown some basic aspects of this attack at previous conferences, we'll be expanding DNS rebinding to show demos not dependent on Flash - specifically, we'll be going after home routers that really, really need to stop having default passwords.
-
21:47
»
SecDocs
Authors:
Meike Richter Tags:
corporate management Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Happy digital world: Everything is information, and it grows by sharing. Scarcity seems to be a problem of the "meatspace". On the internet, there is space for everybody, for every activity and for every opinion. Really? This lectures explores the power of intellectual property rights, the principle of net neutrality and surveillance issues and explains their impact on everyday (digital) life. The net as we know it is in danger. What is needed to make it stay a resource which is valuable, open and free for everybody? How could a concept of digital sustainability look like?
-
-
21:34
»
SecDocs
Authors:
Maarten Van Horenbeeck Tags:
trojan Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Targeted trojan attacks first attracted attention in early 2005, when the UK NISCC warned of their wide spread use in attacks on UK national infrastructure. Incidents such as "Titan Rain" and the compromise of US Department of State computer systems have increased their profile in the last two years. This presentation will consist of hard, technical information on attacks in the form of a case study of an actual attack ongoing since 2005. It covers exploitation techniques, draws general conclusions on attack methodologies and focuses on how to defend against the dark arts.
-
-
21:48
»
SecDocs
Tags:
hacking brain microcontroller Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Learn how to make cool things with microcontrollers by actually making fun projects at the Congress -- blink lights, hack your brain, move objects, turn off TVs in public places -- microcontrollers can do it all. Ongoing workshops each day of the Congress.
-
10:50
»
Hack a Day
Team 0×27 was the winner of this year’s AVC, the Autonomous Vehicle Contest put on by SparkFun Electronics. You’ll find video of the two runs from this entry (the third run did not finish). We love it that there’s an on-board camera recording both video and sound of the race from the vehicle’s point of [...]
-
-
13:01
»
Hack a Day
Portal gag-video These guys make your own video editing chops look just plain sad. They put together a video demonstrating the portal gun in real life. Unleashing the beast We have this problem all the time. The noise regulations were preventing [Massimiliano Rivetti] from letting the true voice of his Ferrari be heard. He hacked into the [...]
-
-
16:01
»
Hack a Day
[John] is keeping the neighborhood safe by keeping an eye out for speeders. Well, he’s really keeping a webcam out for speeders. His technique doesn’t use radar or lasers. He’s processing webcam frames in Python to calculate speed. It comes down to some basic image manipulation. He firsts gathers the images necessary to make the [...]
-
-
8:01
»
Hack a Day
While browsing on one of our regularly visited sites, RobotsDreams, we found this interesting little video. Here, [Sublime] is showing off his 3d printed mini lathe. In the video he mentions that all the files are available for download so you could make one for yourself, but there were unfortunately no links. A quick bit [...]
-
-
10:01
»
Hack a Day
[Bill] is back with another fantastic video explaining a piece of intriguing hardware. This time, he’s explaining how a CCD works. For many of us, these things are part of our daily life, but aside from the fact that they capture an image, we don’t put much thought into them. [Bill] breaks things down in [...]
-
-
17:01
»
Hack a Day
Writing for Hackaday isn’t all fun and games; occasionally I need to actually write posts and reply to emails from builders around the globe. Usually, though, I’m knee-deep in a personal project, or just hanging out playing a few video games. Recently I’ve gone off the deep end with Kerbal Space Program, an awesome little [...]
-
-
21:36
»
SecDocs
Authors:
Julia Wolf Tags:
PDF Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: Ambiguities in the PDF specification means that no two PDF parsers will see a file in the same way. This leads to many opportunities for exploit obfuscation. PDFs are currently the greatest vector for drive-by (malware installing) attacks and targeted attacks on business and government. A/V technology is extraordinarily poor at detecting these. The PDF format itself is so diverse and vague, that an A/V would need to be 100% bug-compatible with the parser in the vulnerable PDF reader. You can also do cool tricks like make a single PDF file that displays completely differently in several different readers.
-
-
21:42
»
SecDocs
-
-
21:40
»
SecDocs
Authors:
Sylvia Johnigk Tags:
intelligence Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: The acronym stands for Intelligent Information System Supporting Observation, Searching and Detection for Security of Citizens in Urban Environment. A total of 17 partners in nine member states are developing an infrastructure for linking existing surveillance technologies to form one mighty instrument for controlling the people. They are laying the foundation of a European police state, since INDECT's results serve to increase the effectiveness of police operation on the national and European level. INDECT is funded under the European Commission's Seventh Framework Programme (FP7), the security-related research of which provides € 1.4 billion Euro for more than 60 partly interlaced projects. This Is What the Police Will Work with in the Future: ·Unmanned aerial vehicles/drones with surveillance camera and sensors ·Software (for cameras etc.) to identify supposedly suspicious behavior or hostile intent ·Auto-tracking of mobile objects ·Software (autonomous agents) to monitor virtual spaces such as discussion forums in the Internet or social networks ·Trojan horses which record users’ private computer activity ·Safeguards, such as watermarking, to allow sophisticated controls on recorded images for evidence, and to index, analyse and administer multimedia content (such as video) ·A search engine combining direct search of data from the real and the virtual world
-
11:01
»
Hack a Day
[G. Eric Rogers] is a radar-systems engineer who just happens to live within sight of the aircraft approach path for the local airport. We wonder if that was one of the criteria when looking for a home? Naturally, he wanted his own home-based system for tracking the airplanes. He ended up repurposing a motorized telescope [...]
-
-
5:01
»
Hack a Day
Although not a hack in the sense that it was made by a large corporation, check out this capacitive electronic disk that [danielbpm] wrote in about. Here’s a Wikipedia article about it, as well as a video (which didn’t embed correctly) about how it was made. The disks look like a typical audio record, and [...]
-
-
6:31
»
Hack a Day
This is a fitting video to be the first of our Hackerspace introductions. After our call for hackerspace tours yesterday, [Nikos] emailed us to let us know that their hackerspace already had a video ready. While this is more of a general video, explaining the idea behind hackerspaces, we do get to see a little [...]
-
-
12:01
»
Hack a Day
Careful, this hack might foster doubts about the level of fun you’re having at you own Computer Science department. Last weekend a group of students at MIT pulled off a hack of great scale by turning a building into a Tetris game board. The structure in question is the Green Building on the Massachusetts Institute of Technology [...]
-
10:01
»
Hack a Day
[Joe] sent us an email to show off his latest build. Tank Wars is the beginning of a video game/robot hybrid. You control the tank via an iPad, telling it where to go and how to fire. You have real life targets, in this case another robot. When you hit your target, the interface is [...]
-
-
21:27
»
SecDocs
Authors:
Bruce Dang Peter Ferrie Tags:
malware malware analysis Stuxnet Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: There has been many publications on the topic of Stuxnet and its "sophistication" in the mainstream press. However, there is not a complete publication which explains all of the technical vulnerability details and how they were discovered. In this talk, you will get a first-hand account of the entire story. We will discuss various techniques used in analyzing Stuxnet. First, we will share several tricks that were used to quickly identify the vulnerabilities. Second, we describe the thought processes that went into debugging and triaging the vulnerabilities themselves. Finally, we show some tips that you can use if you feel like decompiling stuff for fun :).
-
-
21:41
»
SecDocs
Authors:
Wolfgang Draxinger Tags:
Linux Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: Time to take a look back and under the hood of the current state of FOSS based desktops: The Good, The Bad and The Ugly – Bloat, strange APIs, too much complexity. The first decade of the 21st century brought huge progress in the development of FOSS Desktop systems. Users can now choose from a broad range of environments, which all adhere to a coherent set of standards. Not to forget that FOSS did even pioneer some GUI technologies which were later adopted by other (read: non free) systems.
-
-
15:01
»
Hack a Day
When [Matt] came across a small video camera made to fit onto a keychain, the first thing that came to mind is a time-lapse video throwie. Like the LED + coin cell battery + magnet we’ve seen we’ve seen before (and deployed…), [Matt]‘s video throwie would be deployed in interesting spots for a few days [...]
-
-
21:31
»
SecDocs
-
12:00
»
SecDocs
Authors:
Wes Faler Tags:
network Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: Even after years of committee review, communication protocols can certainly be hacked, sometimes highly entertainingly. What about creating a protocol the opposite way? Start with all the hacks that can be done and search for a protocol that gets around them all. Is it even possible? Part Time Scientists has used a GPU to help design our moon mission protocols and we'll show you the what and how. Danger: Real code will be shown!
-
-
6:01
»
Hack a Day
With the head-mountable, augmented reality Google Glass capturing tons of attention in the press, it was only a matter of time before we saw a DIY retina projector. This isn’t a new build; [Nirav] has been working on it for a few months, but it might just be time for this information to be useful [...]
-
-
21:33
»
SecDocs
Tags:
social engineering Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: All the talks i saw about SE so far just showed which good SE's the speakers are. I try to do another approach, what if i get in and don't know what to do then. The talk is about the reconn. before the assessment, the different approaches of SE. Which techniques can one use, how to do a proper intel. and what is useful. How things work and more important why. Which skill set should one have before entering a engagement. And last but not least how do one counter a SE attack.
-
21:33
»
SecDocs
-
-
21:29
»
SecDocs
Authors:
Jesse Ou Rich Lundeen Travis Rhodes Tags:
web application XSS Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: Writing secure code is hard. Even when people do it basically right there are sometimes edge cases that can be exploited. Most the time writing code that works isn’t even the hard part, it’s keeping up with the changing attack techniques while still keeping an eye on all the old issues that can come back to bite you, straddling the ancient world of the 90’s RFCs and 2010’s HTML5 compatible browsers. A lot like how Indiana Jones bridges the ancient and the modern... Except for Indiana Jones 4. Let’s never talk about that again. Ever. Take Facebook, Office 365, Wordpress, Exchange, and Live. These are applications that had decent mitigations to standard threats, but they all had edge cases. Using a mix of old and new ingredients, we’ll provide a sampler plate of clickjacking protection bypasses, CSRF mitigation bypasses, "non-exploitable" XSS attacks that are suddenly exploitable and XML attacks where you can actually get a shell; and we'll talk about how to defend against these attacks. The best description is probably via the slides linked below. We've put a lot of effort into these, and they have video clips making the slide deck pretty big (why we're linking to it and not attaching it).
-
-
21:44
»
SecDocs
Authors:
Sylvain Munaut Tags:
GSM phone satellite Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: The latest member of the Osmocom-family projects, osmo-gmr focuses on the GMR-1 (GEO Mobile Radio) air interface used in some satellite Phones. This talk will shortly present the GMR protocol, the Thuraya network that uses this protocol in the Eurasian/African and Australian continents and finally details how you can capture samples and process them for analysis using osmo-gmr.
-
-
15:01
»
Hack a Day
This circuit is how [John Tsiombikas] makes his cheap 3D shutter glasses work with a Linux machine. It’s not that they were incompatible with Linux. The issue is that only certain video cards have the stereo port necessary to drive the head-mounted hardware. Shutter glasses block light from one eye at a time, so that [...]
-
-
14:30
»
Hack a Day
The concept of having a digital gaming table got stuck in [RobotGuy's] mind over the weekend and he managed to whip this up in no time using materials on hand. He already had a ceiling-mounted projector which just happens to reside immediately above the space occupied by his coffee table. By swapping that piece of [...]
-
7:01
»
Hack a Day
At some point you’ve got to resign yourself to the fact that the TV you’ve been trying to resurrect is just not salvageable. But if you’re knowlegable about working safely with high voltage, you might get quite a show out of it yet. Here [Aussie50] finds beauty in destruction when he fries a large plasma [...]
-
-
22:38
»
SecDocs
Tags:
social Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: In 2004 I started a weekly podcast on international under-reported news based on a feeling that this was something I enjoy doing and I could be good at. More than 7 years and 400 episodes later, with the help of listeners and friends, I have travelled almost nonstop to some of the most interesting and unexpected corners of the world. These travels have led me to some unconventional guests, topics, and life choices. Through it all, week after week, I have kept the program going. The lessons I've learned and continue to learn going forward, tell a story that answers alot of today's most popular questions about the future of the internet and independent journalism. From crowd source funding to the streets of New Orleans, from itunes politics to the mountains of Afghanistan, I will share these stories and whatever wisdom they have brought me.
-
12:01
»
Hack a Day
[Quinn Dunki's] homebrew computer project is moving up another evolutionary rung. She needs a more versatile user interface and this starts with the data output. Up to this point a set of 7-segment digits has served as a way to display register values. But her current work is aimed at adding VGA output to the [...]
-
-
22:36
»
SecDocs
Authors:
Felix 'FX' Lindner Tags:
Mac OS X Google iPhone Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: We will discuss the two different approaches Apple and Google take for the client platforms iPad and Chromebook, how they are similar and how they are not. From the security architecture and integrity protection details to your account and identity that links you firmly back to the respective vendor, we will provide the big picture with occasional close-up shots. Here is what powers the vendor has over you, or what powers he gives to arbitrary unwashed attackers at conferences through fails in logic, binary or HTML.
-
-
22:40
»
SecDocs
Authors:
Christian Bahls Jérémie Zimmermann Tags:
social Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: Return of experience about opposing #censorship #ACTA #censilia #copywrong and promoting #openness and #netneutrality to the EU institutions. Strategic and tactical perspectives by two old and tired activists. The talk will be about how European citizens can empower themselves to change the course of Internet Policy Making Using recent political discussions as an example, Jérémie and Christian will try to explain how to involve yourself with hacking the democratic process on a European level.
-
-
22:38
»
SecDocs
Authors:
Robin Upton Tags:
social Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: This whistlestop re-telling of world economic history squeezes 12,000 years of history into 18 slides. Its focus is the changing nature of money and the rise of the monied class in US and Europe. It outlines how the modern system of banking was instituted, how international organising allowed the power of the rich to gradually eclipse that of national governments, how war was managed for profit, and how the super-rich set about using the organs of the state in an effort to secure their position of control.
-
12:01
»
Hack a Day
[York] wrote in to share a video he stumbled across while researching reed switches and relays, which documents the tightly controlled process through which they are produced. Like many other electronic components out there, we usually don’t give a lot of thought to how they are made, especially when the final cost is relatively small. [...]
-
-
22:52
»
SecDocs
Authors:
Alexander Klink Julian Wälde Tags:
web application DoS Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: This talk will show how a common flaw in the implementation of most of the popular web programming languages and platforms (including PHP, ASP.NET, Java, etc.) can be (ab)used to force web application servers to use 99% of CPU for several minutes to hours for a single HTTP request. This attack is mostly independent of the underlying web application and just relies on a common fact of how web application servers typically work.
-
-
22:36
»
SecDocs
-
-
12:01
»
Hack a Day
We’re throwing money at our monitor and nothing’s happening! Sometimes we get hacks sent into our tip line that are outrageously awesome, but apart from a YouTube video we’ve got nothing else to write about. So begins the story of the flying Back to the Future DeLorean quadrocopter. Sadly, the story ends with the video as well. [...]
-
-
21:47
»
SecDocs
Authors:
Karsten Nohl Luca Melette Tags:
GSM phone Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: Cell phone users face an increasing frequency and depth of privacy intruding attacks. Defense knowledge has not scaled at the same speed as attack capabilities. This talk intends to revert this imbalance. Most severe attack vectors on mobile phones are due to an outdated technology base that lacks strong cryptographic authentication or confidentiality. Given this discrepancy between protection need and reality, a number of countermeasures were developed for networks and phones to better protect their users. We explain the most important measures and track their deployment. Furthermore, we will release tools to measure the level of vulnerability of networks. Sharing the results of these measurements will hopefully create problem awareness and demand for more security by phone users around the world.
-
-
7:07
»
Hack a Day
If you weren’t already a big fan of quadrotors by this point, we’re pretty sure the video below will get you on the bandwagon in no time flat. The video was debuted this past week at the TED2012 conference, giving [Daniel Mellinger, Alex Kushleyev, and Vijay Kumar] from the University of Pennsylvania GRASP Lab, a chance [...]
Skip to page:
1
2
3
...
5