«
Expand/Collapse
129 items tagged "virtual"
Related tags:
technician [+],
tienda [+],
information disclosure vulnerability [+],
code execution [+],
java virtual machine [+],
java [+],
safer use [+],
mystore [+],
exploits [+],
command execution [+],
black hat [+],
virtual machine [+],
virtual dj [+],
txt [+],
sql injection [+],
security [+],
san [+],
oracle java [+],
hacks [+],
desktop infrastructure [+],
desktop [+],
storageworks [+],
server [+],
microsoft virtual pc [+],
hp storageworks [+],
cve [+],
webgoat [+],
waf [+],
vmware [+],
virtual version [+],
virtual network [+],
virtual group [+],
virtual consultant [+],
sql [+],
ryan c. barnett [+],
potential security vulnerability [+],
ping request [+],
network stack [+],
moinmoin [+],
microsoft [+],
mail security [+],
machine management [+],
machine [+],
insight [+],
hosted [+],
group [+],
getobject function [+],
e mail [+],
day [+],
control [+],
consultant [+],
buffer overflow [+],
active x control [+],
xss [+],
web interface [+],
vlans [+],
virtualized [+],
virtual vertex muster [+],
virtual store [+],
virtual server [+],
virtual security [+],
virtual lan [+],
virtual keyboard [+],
virtual box [+],
virtual art [+],
video [+],
vertex [+],
usa [+],
trial [+],
traces [+],
store [+],
squirrelmail [+],
server agent [+],
security vulnerability [+],
security vulnerabilities [+],
research [+],
remote [+],
privilege escalation vulnerability [+],
pdf [+],
pc hypervisor [+],
muster [+],
memory protection [+],
memory [+],
local security [+],
lan [+],
kinect [+],
keyboard plugin [+],
hypervisor [+],
hack [+],
forensic research [+],
exploitation techniques [+],
environment [+],
enterprise manager [+],
enterprise [+],
directory traversal vulnerability [+],
diane barrett [+],
denial of service [+],
crash proof [+],
connect [+],
buffer overflow vulnerability [+],
box [+],
barnett [+],
asia [+],
art [+],
vulnerability [+],
wiper [+],
winscape [+],
wave of the future [+],
wave [+],
war v1 [+],
war [+],
wait [+],
vulnerabilities [+],
virtualization [+],
virtual war [+],
virtual real estate [+],
virtual pc [+],
virtual graffiti [+],
virtual currency [+],
virgraff [+],
viewer [+],
vfx [+],
usb socket [+],
unauthorized data [+],
trail [+],
track [+],
timmi [+],
thief [+],
technology event [+],
syv [+],
system [+],
steve pate [+],
stack buffer [+],
sports performance [+],
solution [+],
slides [+],
simulator [+],
simulacrum [+],
service vulnerability [+],
server environment [+],
serial bridge [+],
serial adapters [+],
sensei [+],
seh [+],
security event [+],
security 2001 [+],
rift [+],
research llc [+],
remote buffer overflow vulnerability [+],
remote buffer overflow [+],
real estate manager [+],
real [+],
protection [+],
program memory [+],
problems [+],
problem [+],
privilege elevation vulnerability [+],
private problems [+],
private [+],
plasma screen televisions [+],
pico projector [+],
peripherals [+],
peoples minds [+],
patching [+],
paper [+],
packard [+],
nintendo wii [+],
niels provos [+],
mvt [+],
motor motion [+],
motion simulator [+],
motion capture [+],
motion [+],
modern computers [+],
misc [+],
mints [+],
microcontrollers [+],
memory pages [+],
mellott [+],
manager v [+],
malware [+],
machin [+],
kickstarter [+],
kevin mellott [+],
kernel [+],
investigators [+],
introduction [+],
internet authors [+],
insecure method [+],
innovative solution [+],
injection [+],
honeypots [+],
home [+],
hijacking [+],
hijack [+],
hidden content [+],
hidden [+],
headset [+],
hackers [+],
graffiti tags [+],
gpu [+],
fun fix [+],
fps games [+],
forum user [+],
forensics [+],
file [+],
facebook [+],
eye tracking [+],
estate [+],
driving simulation [+],
dll [+],
diy [+],
dexosoft [+],
developer kit [+],
crash [+],
clifford wolf [+],
clifford [+],
classic [+],
cisco css [+],
checks [+],
bt4 [+],
bridge [+],
avr microcontrollers [+],
avr [+],
authors [+],
audio [+],
appliance [+],
android [+],
alessandro timmi [+],
Newbie [+],
Area [+],
reality [+],
oracle [+],
virtual private network [+],
tinc [+],
secure private network [+],
private network [+],
network daemon [+],
daemon [+],
virtual technician [+],
mcafee [+]
-
-
16:00
»
Hack a Day
Our hands are rich forms of gestural expression, but capturing these expressions without hindering the hand itself is no easy task–even in today’s world of virtual reality hardware. Fret not, though, as researchers at the Interactive Geometry Lab have recently developed a glove that’s both comfortable and straightforward to fabricate while capturing not simply gestures but entire hand poses.
Like many hand-recognition gloves, this “stretch-sensing soft glove” mounts the sensors directly into the glove such that movements can be captured while hands are out of plain sight. However, unlike other gloves, sensors are custom-made from two stretchable conductive layers sandwiched between a plain layer of silicone. The result is a grid of 44 capacitive stretch sensors. The team feeds this datastream into a neural network for gesture processing, and the result is a system capable of reconstructing hand poses at 60Hz refresh rates.
In their paper [PDF], the research team details a process of making the glove with a conventional CO2 laser cutter. They first cast a conductive silicone layer onto a conventional sheet of silicone. Then, with two samples, they selectively etch away the conductive layer with the unique capacitive grid images. Finally, they sandwich these layers together with an additional insulating and glue it into a hand-shaped textile pattern. The resulting process is a classy use of the laser cutter for the design of flexible capacitive circuits without any further specialized hardware processes.
While we’re no stranger to retrofitting gloves with sensors or etching unconventional materials, the fidelity of this research project is in a class of its own. We can’t wait to see folks extend this technique into other wearable stretch sensors. For a deeper dive into the glove’s capabilities, have a look at the video after the break.
-
-
19:00
»
Hack a Day
VR headsets have been seeing new life for a few years now, and when it comes to head-mounted displays, the field of view (FOV) is one of the specs everyone’s keen to discover. Valve Software have published a highly technical yet accessibly-presented document that explains why Field of View (FOV) is a complex thing when it pertains to head-mounted displays. FOV is relatively simple when it comes to things such as cameras, but it gets much more complicated and hard to define or measure easily when it comes to using lenses to put images right up next to eyeballs.
Simulation of how FOV can be affected by eye relief [Source: Valve Software]The document goes into some useful detail about head-mounted displays in general, the design trade-offs, and naturally talks about the brand-new Valve Index VR headset in particular. The Index uses proprietary lenses combined with a slight outward cant to each eye’s display, and they explain precisely what benefits are gained from each design point. Eye relief (distance from eye to lens), lens shape and mounting (limiting how close the eye can physically get), and adjustability (because faces and eyes come in different configurations) all have a role to play. It’s a situation where every millimeter matters.
If there’s one main point Valve is trying to make with this document, it’s summed up as “it’s really hard to use a single number to effectively describe the field of view of an HMD.” They plan to publish additional information on the topics of modding as well as optics, so keep an eye out on their Valve Index Deep Dive publication list.
Valve’s VR efforts remain interesting from a hacking perspective, and as an organization they seem mindful of keen interest in being able to modify and extend their products. The Vive Tracker was self-contained and had an accessible hardware pinout for the express purpose of making hacking easier. We also took a look at Valve’s AR and VR prototypes, which give some insight into how and why they chose the directions they did.
-
-
1:00
»
Hack a Day
Consider the complexity of the appendages sitting at the end of your arms. The human hands contain over a quarter of the entire complement of bones in the body, use dozens of muscles both in the hand itself and extending up the forearm, and are capable of almost infinite variance …read more
-
-
10:01
»
Hack a Day
It’s been more than a year since we first heard about Leap Motion’s new, Open Source augmented reality headset. The first time around, we were surprised: the headset featured dual 1600×1440 LCDs, 120 Hz refresh rate, 100 degree FOV, and the entire thing would cost under $100 (in volume), with everything, from firmware to mechanical design released under Open licenses. Needless to say, that’s easier said than done. Now it seems Leap Motion is releasing files for various components and a full-scale release might be coming sooner than we think.
Leap Motion first made a name for themselves with the …read more
-
-
16:00
»
Hack a Day
Virtual reality systems have been at the forefront of development for several decades. While there are commercial offerings now, it’s interesting to go back in time to when the systems were much more limited. [Colin Ord] recently completed his own VR system, modeled on available systems from 20-30 years ago, which gives us a look inside what those systems would have been like, as well as being built for a very low cost using today’s technology.
The core of this project is a head tracker, which uses two BBC Microbits as they have both the accelerometer and compass needed to …read more
-
-
1:01
»
Hack a Day
You may remember that earlier this year Leap Motion revealed Project North Star, a kind of open-source reference design for an Augmented Reality (AR) headset. While it’s not destined to make high scores in the fashion department, it aims to be hacker-friendly and boasts a large field of view. There’s also an attractive element of “what you see is what you get” when it comes to the displays and optical design, which is a good thing for hackability. Instead of everything residing in a black box, the system uses two forward-facing displays (one for each eye) whose images are …read more
-
-
4:00
»
Hack a Day
Virtual Reality (VR) and actual reality often don’t mix: watch someone play a VR game without seeing what they see and you see a lot of pointless-looking flailing around. [Nerdaxic] may have found a balance that works in this flight sim setup that mixes VR and AR, though. He did this by combining the virtual cockpit controls of his fight simulator with real buttons, knobs, and dials. He uses an HTC Vive headset and a beefy PC to create the virtual side, which is mirrored with a real-world version. So, the virtual yoke is matched with a real one. The …read more
-
-
10:00
»
Hack a Day
A big challenge in the VR world is getting haptic feedback no matter where you are. That’s not so much of a problem when you’re sitting in a chair, the hardware can be attached to the chair or to something near you, what’s referred to as grounded force-feedback. But with VR, we’ve gotten used to at least moving around a room. How then do you feel the recoil of a gun, the pressure against a shield, the inertia of a sword slicing through the air, or the pulsations of magic sword emitting lightning?
A team of researchers at the [MAKinteract …read more
-
-
1:00
»
Hack a Day
Looking for ideas for your haptics projects? [Destin] of the Smarter Every Day YouTube channel got a tour from the engineers at HaptX of their full-featured VR glove with amazing haptic feedback both with a very fine, 120-point sense of touch, force feedback for each finger, temperature, and motion tracking.
In hacks, we usually stimulate the sense of touch by vibrating something against the skin. With this glove, they use pneumatics to press against the skin. A single fingertip has multiple roughly 1/8 inch air bladders in contact with it. Each bladder is separately pneumatically controlled by pushing air into …read more
-
-
1:00
»
Hack a Day
Light Field technology is a fascinating area of Virtual Reality research that emulates the way that light behaves to make a virtual scene look more realistic. By emulating light coming from multiple angles entering the eye, the scenes look more realistic because they look closer to reality. It is rumored to be part of the technology included in the forthcoming Magic Leap headset, but it looks like Google is trying to steal some of their thunder. The VR research arm of the search giant has released a VR app called Welcome to Light Fields that uses a similar technique on …read more
-
-
17:00
»
SecuriTeam
Oracle Virtual Desktop Infrastructure (VDI) is prone to a remote vulnerability.
-
-
17:00
»
SecuriTeam
Oracle Oracle VM Virtual Box is prone to a local security vulnerability.
-
-
9:01
»
Hack a Day
[DERIY] set out to create a two degrees of freedom motion simulator for driving simulation. After four months, he’s completed this impressive simulator for about $400. The simulator receives driving data from the game and actuates the seat to provide tactile feedback to the driver. To keep the costs low, he decided to use wiper [...]
-
-
9:01
»
Hack a Day
[Kevin Mellott's] take on the VFX1 was to update it so it can be used with modern computers requiring just a USB socket and VGA feed. The VFX1 is a Virtual Reality Headset that hit the market in the first half of the 90′s. The headset was the first of its kind to hit the home market and was [...]
-
-
7:03
»
Hack a Day
For those that absolultely can’t wait to get to experience the Oculus Rift, you can follow these plans to build your own. MTBS3D forum user [Rfurlan] pledged in the oculus rift kickstarter (which concluded last night), but simply couldn’t wait till November/December to get his developer kit. That, and he’s probably only getting one, and [...]
-
-
6:30
»
Hack a Day
If you’ve been following along with immersive gaming, even casually, you’ve probably considered the difficulty in trying to do a comfortable and believable “walk” in a game. The first thing that usually pops into peoples minds are Omni Directional Treadmills, or ODTs. There are many problems with these, one of the biggest simply being cost. [...]
-
-
18:23
»
Packet Storm Security Recent Files
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.
-
18:23
»
Packet Storm Security Tools
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.
-
18:23
»
Packet Storm Security Misc. Files
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.
-
-
18:38
»
Packet Storm Security Exploits
This Metasploit module exploits a vulnerability found in HP's StorageWorks P4000 VSA on versions prior to 9.5. By using a default account credential, it is possible to inject arbitrary commands as part of a ping request via port 13838.
-
18:38
»
Packet Storm Security Recent Files
This Metasploit module exploits a vulnerability found in HP's StorageWorks P4000 VSA on versions prior to 9.5. By using a default account credential, it is possible to inject arbitrary commands as part of a ping request via port 13838.
-
18:38
»
Packet Storm Security Misc. Files
This Metasploit module exploits a vulnerability found in HP's StorageWorks P4000 VSA on versions prior to 9.5. By using a default account credential, it is possible to inject arbitrary commands as part of a ping request via port 13838.
-
-
15:45
»
Packet Storm Security Exploits
This Metasploit modules exploits a vulnerability found in McAfee Virtual Technician's MVTControl. This ActiveX control can be abused by using the GetObject() function to load additional unsafe classes such as WScript.Shell, therefore allowing remote code execution under the context of the user.
-
15:45
»
Packet Storm Security Recent Files
This Metasploit modules exploits a vulnerability found in McAfee Virtual Technician's MVTControl. This ActiveX control can be abused by using the GetObject() function to load additional unsafe classes such as WScript.Shell, therefore allowing remote code execution under the context of the user.
-
15:45
»
Packet Storm Security Misc. Files
This Metasploit modules exploits a vulnerability found in McAfee Virtual Technician's MVTControl. This ActiveX control can be abused by using the GetObject() function to load additional unsafe classes such as WScript.Shell, therefore allowing remote code execution under the context of the user.
-
12:00
»
SecurityFocus Vulnerabilities
McAfee Virtual Technician 6.3.0.1911 MVT.MVTControl.6300 ActiveX Control GetObject() Security Bypass Remote Code Execution Vulnerability
-
7:32
»
Packet Storm Security Exploits
McAfee Virtual Technician version 6.3.0.1911 suffers from a MVT.MVTControl.6300 GetObject() active-x control security bypass remote code execution vulnerability.
-
7:32
»
Packet Storm Security Recent Files
McAfee Virtual Technician version 6.3.0.1911 suffers from a MVT.MVTControl.6300 GetObject() active-x control security bypass remote code execution vulnerability.
-
7:32
»
Packet Storm Security Misc. Files
McAfee Virtual Technician version 6.3.0.1911 suffers from a MVT.MVTControl.6300 GetObject() active-x control security bypass remote code execution vulnerability.
-
-
7:44
»
Packet Storm Security Recent Files
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.
-
7:44
»
Packet Storm Security Misc. Files
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.
-
-
12:22
»
Packet Storm Security Recent Files
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.
-
12:22
»
Packet Storm Security Misc. Files
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.
-
-
10:01
»
Hack a Day
As a recent Mech E grad, [Alessandro Timmi] knows a lot about moving bodies. His thesis, Virtual Sensei, aims to quantify those movements for better coaching and training in martial arts. Virtual Sensei uses a Kinect for motion capture during training. From there, the skeleton recorded by the Kinect has a little bit of processing [...]
-
-
15:34
»
SecuriTeam
A potential security vulnerability has been identified in HP Virtual Server Environment for Windows.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
10:42
»
SecDocs
Authors:
Christiaan Beek Tags:
virtualization virtual machine forensic Event:
Black Hat USA 2010 Abstract: This presentation will be about the problems we are facing when forensic research has to be done on environments which are virtualized. What are the differences between 'tradional' system forensics, what techniques & tools can be used. Which files are important when performing forensic research on Citrix & VMWare environments? What about VHD file format with Windows 7 and what do we need for future research?
-
-
12:01
»
Hack a Day
[Clifford Wolf] wrote in to let us know about a project he recently completed called EmbedVM. It’s a virtual machine for AVR microcontrollers. The package has a relatively small overhead, taking up about 3kB of program memory. The VM can execute 74,000 instructions per second, and runs asynchronously from the microcontroller. As [Clifford] demonstrates in [...]
-
-
21:44
»
Packet Storm Security Recent Files
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.
-
21:44
»
Packet Storm Security Misc. Files
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.
-
-
0:37
»
Packet Storm Security Recent Files
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.
-
0:37
»
Packet Storm Security Misc. Files
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.
-
-
7:00
»
Hack a Day
Although virtual reality was the wave of the future in the early 90′s, it hasn’t really taken off the way we would have liked. Sometimes a great idea just takes time for the technology to catch up to it (Aeolipile anyone?). Now that tiny projectors, realistic FPS games, and eye tracking systems have come down [...]
-
-
21:05
»
Packet Storm Security Recent Files
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.
-
21:05
»
Packet Storm Security Misc. Files
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.
-
-
5:10
»
Hack a Day
When you are running emulators or virtual machines it may be sometimes handy to be able to connect a serial port from the guest machine to the host machine. [Aurimas] had that issue, and also had a fun fix for that using 2 USB <> Serial adapters, but as you can imagine that is not [...]
-
-
12:40
»
SecuriTeam
A potential security vulnerability has been identified in HP Virtual Connect Enterprise Manager (VCEM) for Windows.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
10:46
»
SecuriTeam
A potential security vulnerability has been identified in HP Virtual Server Environment for Windows.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
10:41
»
SecuriTeam
Cross Site Scripting, Denial of Service and Cross Site Request Forgery vulnerabilities have been identified in HP Insight Control Virtual Machine Management for Windows.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
10:36
»
SecuriTeam
Injection flaws, such as SQL, OS, and LDAP injection, occur in Oracle Virtual Server Agent when untrusted data is sent to an interpreter as part of a command or query. The attacker s hostile data can trick the interpreter into executing unintended commands or accessing unauthorized data.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
9:55
»
remote-exploit & backtrack
hi,i have simple question.plz if anyone do something like this tell me.
i want to use one virtual machin on BT4(ubuntu8.10).i want to instal win xp on it.i try VirtualBOX ose,not working .i try Vmware ,not working.i Try Qemu.when i click on Lunch Button Nothing Happen.
i Really tired of contact by Error.every app i said,have problem with Kernel.
i hope some one can tell me how can i solve my problem.:confused:
-
-
14:02
»
SecuriTeam
A Cross site scripting vulnerability was identified on HP Virtual Connect Enterprise Manager.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
12:02
»
Packet Storm Security Exploits
Virtual Security Research, LLC. Security Advisory - VSR identified multiple weaknesses in the Cisco CSS 11500's handling of HTTP header interpretation and client-side SSL certificates.
-
0:47
»
SecDocs
Authors:
Christiaan Beek Tags:
forensic cloud computing Event:
Black Hat EU 2010 Abstract: This presentation will be about the problems we are facing when forensic research has to be done on environments which are virtualized. What are the differences between 'traditional' system forensics, what techniques & tools can be used? Which files are important when performing forensic research on Citrix and VMWare environments? What about the VMDK file system and what do we need for future research?
-
-
11:00
»
Hack a Day
Winscape will let you replace that garbage-strewn ally view with just about anything you want. The two windows above are actually plasma screen televisions. In between them you can spot a Nintendo Wii Remote that is used to track an IR badge worn by the person in the room. As they move, the images on [...]
-
-
13:24
»
SecuriTeam
A vulnerability found in the memory management of the Virtual Machine Monitor makes memory pages mapped above the 2GB available with read or read/write access to user-space programs running in a Guest operating system.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!