«
Expand/Collapse
116 items tagged "world"
Related tags:
world of warcraft [+],
vulnerability [+],
warcraft [+],
development [+],
world authors [+],
sql injection [+],
digital [+],
stack overflow [+],
sql [+],
max kilger [+],
mart [+],
identity [+],
hacker [+],
e mart [+],
demarcation line [+],
world writeable [+],
world cup [+],
virtual realities [+],
tv b gone [+],
subverting [+],
soccer world cup [+],
slides [+],
second [+],
sea [+],
samsung [+],
root compromise [+],
robot [+],
rfid [+],
remarkable successes [+],
physical simulation [+],
openstreetmap [+],
news of the world [+],
news [+],
mooney [+],
media whore [+],
mart sql [+],
map [+],
luedke [+],
life [+],
james luedke [+],
interactive world [+],
interactive [+],
injection [+],
information disclosure [+],
hackers [+],
hacker scene [+],
god [+],
galaxy [+],
g touch [+],
fuzzing [+],
fun [+],
fifa soccer world [+],
fifa [+],
disease [+],
denial of service [+],
denial [+],
cup [+],
cross site scripting [+],
cool inventions [+],
commodity computers [+],
christopher mooney [+],
blood [+],
blizzard entertainment [+],
big guns [+],
chaos communication congress [+],
world record [+],
world graphics [+],
virtual world [+],
video [+],
u.s. [+],
txt [+],
sebastian wolfgarten [+],
robots [+],
robert helling [+],
real world [+],
quantum information theory [+],
quantum cryptography [+],
quantum [+],
open sea [+],
misc [+],
lfi [+],
kinect [+],
joomla [+],
intrusion prevention [+],
intrusion [+],
inclusion [+],
honeypot [+],
hacking [+],
hackaday [+],
graphics [+],
global positioning system [+],
forgotten [+],
forensic examinations [+],
enterprise business applications [+],
day [+],
cryptography [+],
corporate business [+],
computer [+],
clock [+],
china [+],
chart [+],
chaos communication camp [+],
case [+],
business application systems [+],
business [+],
bernhard fischer [+],
audio [+],
android [+],
Software [+],
world today [+],
world of your dreams [+],
world computer [+],
world clock [+],
world applications [+],
workbenches [+],
wordlist [+],
wopr [+],
wooden bike [+],
wooden [+],
windows [+],
william dixon tags [+],
william dixon [+],
webapps [+],
web [+],
watchful eye [+],
watch [+],
washing machines [+],
washing machine [+],
washing [+],
walking canes [+],
waiting rooms [+],
visual studio [+],
visual [+],
virtual data [+],
video world [+],
version [+],
usa [+],
update [+],
university of new hampshire [+],
united states [+],
unc chapel hill [+],
two legs [+],
tv sitcom [+],
transportation [+],
tour [+],
toshiba [+],
top spammer [+],
top marketing [+],
top [+],
time lapse photography [+],
time authors [+],
time [+],
threaten [+],
thing [+],
themed [+],
the netherlands [+],
telepresence [+],
teaching computing [+],
system [+],
studio [+],
strength security [+],
strategy tactics [+],
stock tags [+],
stickers [+],
status [+],
spammer [+],
spam [+],
sophos [+],
sitcom [+],
simple hello [+],
simon [+],
sick [+],
shah tags [+],
shadow world [+],
shadow [+],
several thousand dollars [+],
sets [+],
seeing eye dogs [+],
security event [+],
security 2001 [+],
security [+],
securing web applications [+],
sea world killer whale attack [+],
sea world killer whale [+],
scoped [+],
sci fi [+],
scanner [+],
scandal [+],
russian hackers [+],
rugby [+],
rose white [+],
rootkits [+],
romania [+],
role [+],
robot world cup [+],
robot arm [+],
roaming charges [+],
rg 58 [+],
report [+],
reality [+],
real [+],
programming environment [+],
prison inmates [+],
prison [+],
prefix [+],
post [+],
porridge [+],
poc [+],
playstation [+],
picture [+],
phone [+],
phaos [+],
personality types [+],
personal data [+],
penetration [+],
pelican case [+],
paul simmonds [+],
pad [+],
oracle [+],
opens [+],
open source driver [+],
open hardware [+],
ohms [+],
nothing but time [+],
night [+],
nick klein [+],
nick farr [+],
news event [+],
new york [+],
navy [+],
muslim [+],
most [+],
monitoring service [+],
monitoring [+],
mmorpgs [+],
minecraft [+],
mine [+],
milton keynes [+],
michael winston dales [+],
michael thompson [+],
mark [+],
malaysia [+],
makerfaire [+],
maker [+],
machine [+],
mac [+],
lucid dreaming [+],
lord vetinari [+],
london [+],
list [+],
liberalization [+],
levels [+],
kinect based [+],
killer whale attack [+],
keylogger [+],
kenneth geers [+],
justin [+],
just [+],
jerry [+],
jericho [+],
java [+],
james bond [+],
irregular intervals [+],
iran [+],
ipv [+],
ipsec [+],
intricate machine [+],
interesting things [+],
intelligence report [+],
intelligence [+],
insurrection [+],
infrastructure [+],
india world [+],
india [+],
impedance [+],
impale [+],
husband wife [+],
humanoid robot [+],
humanoid [+],
humanitarian project [+],
home [+],
high definition television [+],
henry fuchs [+],
help [+],
hello world [+],
haptic [+],
hacked [+],
hack in the box [+],
hack [+],
guild [+],
gps [+],
governmental networks [+],
google [+],
good measure [+],
geochron clock [+],
geocaching [+],
generator [+],
geers [+],
game activities [+],
gadget world [+],
free anti virus [+],
free [+],
forensics [+],
faire [+],
expansion [+],
essential minerals [+],
entire world [+],
electricity [+],
eleanor saitta [+],
dns status [+],
diy [+],
digital computer [+],
diamond plate [+],
device [+],
deviants [+],
desktop [+],
dan kurc [+],
cyber thief [+],
cuts [+],
culprit [+],
court [+],
controlling [+],
continues [+],
congo [+],
computing [+],
computer forensics [+],
commercialized [+],
college of engineering [+],
close [+],
clean clothes [+],
china world [+],
chapel hill student [+],
chapel hill [+],
chaos [+],
cellphones [+],
cellphone [+],
catching [+],
capital [+],
cameras [+],
camera hardware [+],
caleb kraft [+],
caleb [+],
cable tv [+],
business strength [+],
bringing [+],
brian benchoff [+],
brazil [+],
blizzard [+],
black hat [+],
bit microcontrollers [+],
bike [+],
bicep [+],
baltimore [+],
authors [+],
attiny [+],
asia [+],
arduino [+],
architectural [+],
application web [+],
anything [+],
anti [+],
announcing [+],
andrew van der [+],
andrew maimone [+],
alternate reality games [+],
alexander eisen [+],
Support [+],
General [+],
BackTrack [+],
Ask [+],
ARM [+],
360 degree view [+],
hacks [+]
-
-
16:00
»
SecuriTeam
World of Phaos is prone to an SQL-injection vulnerability and a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.
-
-
12:01
»
Hack a Day
This is the WHICH, the Wolverhampton Instrument for Teaching Computing from Harwell. It is the oldest functioning digital computer and thanks to a lengthy restoration process you can go and see it in person at The National Museum of Computing in Milton Keynes (Northwest of London in the UK). The system was first put into [...]
-
-
21:51
»
SecDocs
Authors:
Krisztian Piller Sebastian Wolfgarten Tags:
forensic honeypot Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: In the world of intrusion detection, intrusion prevention and hacker research honeypots are a quite a new and interesting technology. But only few know there is more to achieve with honeypots than just catch an intruders attention. Honeypots could reward you with versatile results and this presentation will be interesting to you even if you are familiar with deploying IDS/IPS/Honeypot systems. We will give an overview of the existing tools and provide you with a methodology to start your own forensic examinations. In the world of intrusion detection, intrusion prevention and hacker research honeypots are a quite a new and interesting technology. But only few know there is more to achieve with honeypots than just catch an intruders attention. Honeypots could reward you with versatile results and this presentation will be interesting to you even if you are familiar with deploying IDS/IPS/Honeypot systems. We will give an overview of the existing tools and provide you with a methodology to start your own forensic examinations. After an introduction to the world of honeypots, you will learn about existing tools for setting up and analyzing honeypots, common errors to avoid during the installation and maintenance process as well as typical results of a honeypot operation.
-
21:51
»
SecDocs
Authors:
Krisztian Piller Sebastian Wolfgarten Tags:
forensic honeypot Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: In the world of intrusion detection, intrusion prevention and hacker research honeypots are a quite a new and interesting technology. But only few know there is more to achieve with honeypots than just catch an intruders attention. Honeypots could reward you with versatile results and this presentation will be interesting to you even if you are familiar with deploying IDS/IPS/Honeypot systems. We will give an overview of the existing tools and provide you with a methodology to start your own forensic examinations. In the world of intrusion detection, intrusion prevention and hacker research honeypots are a quite a new and interesting technology. But only few know there is more to achieve with honeypots than just catch an intruders attention. Honeypots could reward you with versatile results and this presentation will be interesting to you even if you are familiar with deploying IDS/IPS/Honeypot systems. We will give an overview of the existing tools and provide you with a methodology to start your own forensic examinations. After an introduction to the world of honeypots, you will learn about existing tools for setting up and analyzing honeypots, common errors to avoid during the installation and maintenance process as well as typical results of a honeypot operation.
-
-
7:01
»
Hack a Day
C is a beautiful language perfectly suited for development on low-power devices such as the 8-bit microcontrollers. With newer, more powerful ARM microcontrollers making their way onto the market and workbenches around the world, it was only fitting that Oracle got in on the action. They released a version of Java targeted at these newer, more powerful [...]
-
-
4:46
»
Hack a Day
For the next two days, [Caleb Kraft] and [Brian Benchoff] will be wandering around the World MakerFaire in NY. Primarily stationed at the booth meant to show off our winning entry into the Redbull Creation contest, we hope to find some interesting things for you to read about. We’ve already scoped out the MakerFaire and [...]
-
-
5:30
»
SecDocs
Authors:
Cory Ondrejka Tags:
Second Life Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: The 3D digital world of Second Life has been completely built by its residents. Running on a growing grid of computers, SL's real-time collaborative-creation tools and physical simulation allow for creativity of stunning depth and breadth. Second Life is unique virtual world, completely created by its residents. Hosted on a grid of over 1000 computers, Second Life is the home to over 60,000 residents from all over the world. By leveraging the powerful built-in tools for collaborative creation, virtual pioneers are building, exploring, learning, loving and fighting. Not content to remain behind the magic circle, wealth, ideas, games, and fashion are flowing back and forth between the real and the virtual worlds. Uniquely, the residents of Second Life retain their intellectual property rights in these creations. The session will begin with an overview of the technology and history of Second Life. Based on a distributed grid, Second Life was created to allow both discrete and physical simulation across a large number of commodity computers. By combining this simulation space with compression, a highly complex and dynamic scene is streamed to client computers via a broadband connection. This ability to support a completely dynamic scene enables real-time, collaborative creation which in turn allows residents to succeed in creating 3D and scripted content, two areas traditionally considered too difficult to be generally accessible. The body of the session will be a discussion of what residents have accomplished within Second Life in the 30 months since launch. By leveraging user-creation, residents have built everything from real-estate empires, games, and fashion houses to schizophrenia simulations, real-work jobs, and university education. The freedom to explore a virtually limitless design space without having to ask permission has resulted in an explosion of innovation that continues to accelerate. Finally, the session will conclude with a look to the next several years. What happens as the increasingly interactive "web as platform" collides with the accelerating connectivity of Second Life? What new forms of business, research and activism appear as international groups collaborate within simulated places? As the false dichotomy of "play" versus "work" breaks down, how will society and culture adapt to a technically adept, international, online workforce that relies on technology generally identified as "a game"?
-
-
21:51
»
SecDocs
Authors:
Cory Ondrejka Tags:
Second Life Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: The 3D digital world of Second Life has been completely built by its residents. Running on a growing grid of computers, SL's real-time collaborative-creation tools and physical simulation allow for creativity of stunning depth and breadth. Second Life is unique virtual world, completely created by its residents. Hosted on a grid of over 1000 computers, Second Life is the home to over 60,000 residents from all over the world. By leveraging the powerful built-in tools for collaborative creation, virtual pioneers are building, exploring, learning, loving and fighting. Not content to remain behind the magic circle, wealth, ideas, games, and fashion are flowing back and forth between the real and the virtual worlds. Uniquely, the residents of Second Life retain their intellectual property rights in these creations. The session will begin with an overview of the technology and history of Second Life. Based on a distributed grid, Second Life was created to allow both discrete and physical simulation across a large number of commodity computers. By combining this simulation space with compression, a highly complex and dynamic scene is streamed to client computers via a broadband connection. This ability to support a completely dynamic scene enables real-time, collaborative creation which in turn allows residents to succeed in creating 3D and scripted content, two areas traditionally considered too difficult to be generally accessible. The body of the session will be a discussion of what residents have accomplished within Second Life in the 30 months since launch. By leveraging user-creation, residents have built everything from real-estate empires, games, and fashion houses to schizophrenia simulations, real-work jobs, and university education. The freedom to explore a virtually limitless design space without having to ask permission has resulted in an explosion of innovation that continues to accelerate. Finally, the session will conclude with a look to the next several years. What happens as the increasingly interactive "web as platform" collides with the accelerating connectivity of Second Life? What new forms of business, research and activism appear as international groups collaborate within simulated places? As the false dichotomy of "play" versus "work" breaks down, how will society and culture adapt to a technically adept, international, online workforce that relies on technology generally identified as "a game"?
-
21:51
»
SecDocs
Authors:
Cory Ondrejka Tags:
Second Life Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: The 3D digital world of Second Life has been completely built by its residents. Running on a growing grid of computers, SL's real-time collaborative-creation tools and physical simulation allow for creativity of stunning depth and breadth. Second Life is unique virtual world, completely created by its residents. Hosted on a grid of over 1000 computers, Second Life is the home to over 60,000 residents from all over the world. By leveraging the powerful built-in tools for collaborative creation, virtual pioneers are building, exploring, learning, loving and fighting. Not content to remain behind the magic circle, wealth, ideas, games, and fashion are flowing back and forth between the real and the virtual worlds. Uniquely, the residents of Second Life retain their intellectual property rights in these creations. The session will begin with an overview of the technology and history of Second Life. Based on a distributed grid, Second Life was created to allow both discrete and physical simulation across a large number of commodity computers. By combining this simulation space with compression, a highly complex and dynamic scene is streamed to client computers via a broadband connection. This ability to support a completely dynamic scene enables real-time, collaborative creation which in turn allows residents to succeed in creating 3D and scripted content, two areas traditionally considered too difficult to be generally accessible. The body of the session will be a discussion of what residents have accomplished within Second Life in the 30 months since launch. By leveraging user-creation, residents have built everything from real-estate empires, games, and fashion houses to schizophrenia simulations, real-work jobs, and university education. The freedom to explore a virtually limitless design space without having to ask permission has resulted in an explosion of innovation that continues to accelerate. Finally, the session will conclude with a look to the next several years. What happens as the increasingly interactive "web as platform" collides with the accelerating connectivity of Second Life? What new forms of business, research and activism appear as international groups collaborate within simulated places? As the false dichotomy of "play" versus "work" breaks down, how will society and culture adapt to a technically adept, international, online workforce that relies on technology generally identified as "a game"?
-
-
21:45
»
SecDocs
Authors:
Max Kilger Tags:
identity management Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: The demarcation line that used to separate your digital identity from your real world physical identity is rapidly disappearing. More seriously, it is permanently changing the way in which the world sees you and you see yourself. Social identity lies at the very core of our existence as human beings. Without identity we are lost both in the physical and virtual world. Before the coming of the digital revolution, most people struggled to create a single, permanent identity that stayed with them for the remainder of their lives. Digital technology has changed that way of life forever. People are now given digital identities by governmental, business and military organizations, sometimes with their knowledge but often without them knowing. People have also begun to weave multiple digital identities for themselves - using digital technology they can now create their own alternative identities that they can wear and shed like skins for their own personal purposes. In this lecture I will discuss how the digital identities that we create for ourselves and those that others create or us affect both our image of ourselves, our own psychological makeup and well-being as well as how it affects how others see and deal with us.
-
21:45
»
SecDocs
Authors:
Max Kilger Tags:
identity management Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: The demarcation line that used to separate your digital identity from your real world physical identity is rapidly disappearing. More seriously, it is permanently changing the way in which the world sees you and you see yourself. Social identity lies at the very core of our existence as human beings. Without identity we are lost both in the physical and virtual world. Before the coming of the digital revolution, most people struggled to create a single, permanent identity that stayed with them for the remainder of their lives. Digital technology has changed that way of life forever. People are now given digital identities by governmental, business and military organizations, sometimes with their knowledge but often without them knowing. People have also begun to weave multiple digital identities for themselves - using digital technology they can now create their own alternative identities that they can wear and shed like skins for their own personal purposes. In this lecture I will discuss how the digital identities that we create for ourselves and those that others create or us affect both our image of ourselves, our own psychological makeup and well-being as well as how it affects how others see and deal with us.
-
15:24
»
SecDocs
Authors:
Max Kilger Tags:
identity management Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: The demarcation line that used to separate your digital identity from your real world physical identity is rapidly disappearing. More seriously, it is permanently changing the way in which the world sees you and you see yourself. Social identity lies at the very core of our existence as human beings. Without identity we are lost both in the physical and virtual world. Before the coming of the digital revolution, most people struggled to create a single, permanent identity that stayed with them for the remainder of their lives. Digital technology has changed that way of life forever. People are now given digital identities by governmental, business and military organizations, sometimes with their knowledge but often without them knowing. People have also begun to weave multiple digital identities for themselves - using digital technology they can now create their own alternative identities that they can wear and shed like skins for their own personal purposes. In this lecture I will discuss how the digital identities that we create for ourselves and those that others create or us affect both our image of ourselves, our own psychological makeup and well-being as well as how it affects how others see and deal with us.
-
15:24
»
SecDocs
Authors:
Max Kilger Tags:
identity management Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: The demarcation line that used to separate your digital identity from your real world physical identity is rapidly disappearing. More seriously, it is permanently changing the way in which the world sees you and you see yourself. Social identity lies at the very core of our existence as human beings. Without identity we are lost both in the physical and virtual world. Before the coming of the digital revolution, most people struggled to create a single, permanent identity that stayed with them for the remainder of their lives. Digital technology has changed that way of life forever. People are now given digital identities by governmental, business and military organizations, sometimes with their knowledge but often without them knowing. People have also begun to weave multiple digital identities for themselves - using digital technology they can now create their own alternative identities that they can wear and shed like skins for their own personal purposes. In this lecture I will discuss how the digital identities that we create for ourselves and those that others create or us affect both our image of ourselves, our own psychological makeup and well-being as well as how it affects how others see and deal with us.
-
-
21:32
»
SecDocs
Tags:
TV Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: It is possible and desirable and fun to invent and create technologies that help our world. Have you ever wanted to shut off a TV that was annoying you in a public place? My extraordinarily popular invention, TV-B-Gone has made it fun to turn off TVs in restaurants, pubs, airports... Using my invention TV-B-Gone as a demonstration, I'll talk about the following interrelated topics: the inventing process, technical details about how TV-B-Gone works, how to have fun changing the world, using cool inventions as a fabulous way to be an effective media-whore, as well as some possibilities for living a fulfilling existence on our modern world. And I'll have plenty of TV-B-Gone remotes with me.
-
-
21:48
»
SecDocs
Tags:
TV Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: It is possible and desirable and fun to invent and create technologies that help our world. Have you ever wanted to shut off a TV that was annoying you in a public place? My extraordinarily popular invention, TV-B-Gone has made it fun to turn off TVs in restaurants, pubs, airports... Using my invention TV-B-Gone as a demonstration, I'll talk about the following interrelated topics: the inventing process, technical details about how TV-B-Gone works, how to have fun changing the world, using cool inventions as a fabulous way to be an effective media-whore, as well as some possibilities for living a fulfilling existence on our modern world. And I'll have plenty of TV-B-Gone remotes with me.
-
21:48
»
SecDocs
Tags:
TV Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: It is possible and desirable and fun to invent and create technologies that help our world. Have you ever wanted to shut off a TV that was annoying you in a public place? My extraordinarily popular invention, TV-B-Gone has made it fun to turn off TVs in restaurants, pubs, airports... Using my invention TV-B-Gone as a demonstration, I'll talk about the following interrelated topics: the inventing process, technical details about how TV-B-Gone works, how to have fun changing the world, using cool inventions as a fabulous way to be an effective media-whore, as well as some possibilities for living a fulfilling existence on our modern world. And I'll have plenty of TV-B-Gone remotes with me.
-
-
19:38
»
Packet Storm Security Exploits
Some system directories on the Samsung Galaxy S2 for Sprint-US (Epic 4G Touch) are world-writable and allow for information disclosure, modification, and may lead to local root compromise of the device.
-
19:38
»
Packet Storm Security Recent Files
Some system directories on the Samsung Galaxy S2 for Sprint-US (Epic 4G Touch) are world-writable and allow for information disclosure, modification, and may lead to local root compromise of the device.
-
19:38
»
Packet Storm Security Misc. Files
Some system directories on the Samsung Galaxy S2 for Sprint-US (Epic 4G Touch) are world-writable and allow for information disclosure, modification, and may lead to local root compromise of the device.
-
15:01
»
Hack a Day
Those of us living in the first world take clean clothes for granted. Throw them in the washing machine, transfer to the dryer after 45 minutes, and you won’t smell for another two weeks or so. But for people living in areas without electricity, clean clothes are a huge amount of work. Hand washing a [...]
-
-
21:43
»
SecDocs
Authors:
Gadi Evron Tags:
fuzzing Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: We will discuss fuzzing uses by software vendors and in the corporate world, for security auditing ("fuzzing before release") and third party testing ("fuzzing before purchase"). We will look at what contributed to this change in the use of fuzzing tools from home-grown hacking tools to commercial products, as well as how these organizations implement fuzzing into their development cycle. Fuzzing has been used for a long time in the hacker scene. Mostly, these tools have been home-grown. In the recent year, several commercial fuzzing tools appeared. These in turn are now utilized by organizations in the development cycle under the moto of "fuzzing before release", or "find the vulnerability before hackers do". Another interesting and somewhat unexpected development in the field is that end-clients are the largest consumers of advanced fuzzing technology, performing tests on software before purchase. Further, some large telcos and financial institutions now demand for products to be certified (even if not by an official seal) by fuzzing products which they authorize. Is fuzzing finally a solution to reduce vulnerabilities in products rather than just later discover them? How is it used by these corporations and third-party organizations? Some methodologies as well as examples will be presented, and we will also try to look into what the future holds.
-
21:43
»
SecDocs
Authors:
Gadi Evron Tags:
fuzzing Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: We will discuss fuzzing uses by software vendors and in the corporate world, for security auditing ("fuzzing before release") and third party testing ("fuzzing before purchase"). We will look at what contributed to this change in the use of fuzzing tools from home-grown hacking tools to commercial products, as well as how these organizations implement fuzzing into their development cycle. Fuzzing has been used for a long time in the hacker scene. Mostly, these tools have been home-grown. In the recent year, several commercial fuzzing tools appeared. These in turn are now utilized by organizations in the development cycle under the moto of "fuzzing before release", or "find the vulnerability before hackers do". Another interesting and somewhat unexpected development in the field is that end-clients are the largest consumers of advanced fuzzing technology, performing tests on software before purchase. Further, some large telcos and financial institutions now demand for products to be certified (even if not by an official seal) by fuzzing products which they authorize. Is fuzzing finally a solution to reduce vulnerabilities in products rather than just later discover them? How is it used by these corporations and third-party organizations? Some methodologies as well as examples will be presented, and we will also try to look into what the future holds.
-
-
21:33
»
SecDocs
Authors:
Gadi Evron Tags:
fuzzing Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: We will discuss fuzzing uses by software vendors and in the corporate world, for security auditing ("fuzzing before release") and third party testing ("fuzzing before purchase"). We will look at what contributed to this change in the use of fuzzing tools from home-grown hacking tools to commercial products, as well as how these organizations implement fuzzing into their development cycle. Fuzzing has been used for a long time in the hacker scene. Mostly, these tools have been home-grown. In the recent year, several commercial fuzzing tools appeared. These in turn are now utilized by organizations in the development cycle under the moto of "fuzzing before release", or "find the vulnerability before hackers do". Another interesting and somewhat unexpected development in the field is that end-clients are the largest consumers of advanced fuzzing technology, performing tests on software before purchase. Further, some large telcos and financial institutions now demand for products to be certified (even if not by an official seal) by fuzzing products which they authorize. Is fuzzing finally a solution to reduce vulnerabilities in products rather than just later discover them? How is it used by these corporations and third-party organizations? Some methodologies as well as examples will be presented, and we will also try to look into what the future holds.
-
-
21:56
»
SecDocs
Authors:
Nick Farr Tags:
games Event:
Chaos Communication Camp 2007 Abstract: Geocaching and Alternative Reality Games are the first wave of "global gaming", involving players who use the GPS and internet technologies to create and solve challenges in physical space. This talk will highlight how these global games are helping illustrate the problems of the future and training players how to use their technology, wits and available resources to solve them. Geocaching and Alternative Reality Games are the first steps into true, physical world "global gaming". Players use digital technologies like GPS, geospatial imaging and online communication tools to create and solve challenges in the physical world. While these games attract adventure seekers of all levels from all walks of life, the players acquire the skills necessary to address global challenges beyond the capabilities of traditional institutions. These games are creating a new class of informed, networked global citizens who will shape the solution to tomorrow's problems. This first part of this talk will describe what Geocaching and Alternative Reality Games are. The intersection between the two is not readily apparent. Those participating in Geocaching use GPS devices and clever placement of "caches" in the real world to create a challenging pastime that encourages players to think critically about their world. Those who take part in ARGs mix issues, events and physical spaces in the real world to create situations that encourage players to, as in Geocaching, think critically about their world. The two pastimes are starting to intersect in ways that few non-participants could imagine. While these pastimes seem simple on the surface, players are creating and solving new challenges for each other that require a perfect intersection of digital and physical-world knowledge and skills. Few games in the past have called for skills ranging from scuba diving and rope climbing to cryptanalysis and social engineering. These games present no simple solutions, and require players to think on their feet. The second part of this talk will discuss three major challenges that have required players to acquire and use a mix of physical and mental skills. The final part of this talk will illustrate how players from many different cultures, backgrounds and classes are connecting with each other to not only play the game but advance in the hierarchy of gameplay by pooling knowledge and resources. These interactions among players are helping create relationships and skillsets that are showing us what the problems of tomorrow will be and how "everyday people" will unite to solve them.
-
-
14:59
»
SecDocs
Authors:
Henryk Plötz Karsten Nohl Tags:
RFID Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: This talk will elaborate on the security and social aspects of RFID technology. We will talk about our projects of the past year, including the FIFA World Cup tickets. This talk will be about some of the hacking related things (technological and social) that you can do with RFID technology. Topics will include: + electronic passports + Mifare cryptography (maybe even some reverse engineering results) + tickets for the FIFA World Cup (ca. 15 min) In this part of the talk, we will show the first real world mass application of RFID-technology at the 2006 FIFA soccer world cup. Some valid tickets are shown, including their data and a look at the payload. After that, we will report a simple and unsuccessful hacking-attempt, where one valid ticket was copied. The lecture is accompanied by pictures of some stadium-entrances to examine FIFA security and ticket manipulation.
-
14:54
»
SecDocs
Authors:
Henryk Plötz Karsten Nohl Tags:
RFID Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: This talk will elaborate on the security and social aspects of RFID technology. We will talk about our projects of the past year, including the FIFA World Cup tickets. This talk will be about some of the hacking related things (technological and social) that you can do with RFID technology. Topics will include: + electronic passports + Mifare cryptography (maybe even some reverse engineering results) + tickets for the FIFA World Cup (ca. 15 min) In this part of the talk, we will show the first real world mass application of RFID-technology at the 2006 FIFA soccer world cup. Some valid tickets are shown, including their data and a look at the payload. After that, we will report a simple and unsuccessful hacking-attempt, where one valid ticket was copied. The lecture is accompanied by pictures of some stadium-entrances to examine FIFA security and ticket manipulation.
-
14:51
»
SecDocs
Authors:
Henryk Plötz Karsten Nohl Tags:
RFID Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: This talk will elaborate on the security and social aspects of RFID technology. We will talk about our projects of the past year, including the FIFA World Cup tickets. This talk will be about some of the hacking related things (technological and social) that you can do with RFID technology. Topics will include: + electronic passports + Mifare cryptography (maybe even some reverse engineering results) + tickets for the FIFA World Cup (ca. 15 min) In this part of the talk, we will show the first real world mass application of RFID-technology at the 2006 FIFA soccer world cup. Some valid tickets are shown, including their data and a look at the payload. After that, we will report a simple and unsuccessful hacking-attempt, where one valid ticket was copied. The lecture is accompanied by pictures of some stadium-entrances to examine FIFA security and ticket manipulation.
-
-
14:31
»
SecDocs
Authors:
Joi Ito Tags:
games Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: This talk will focus on World of Warcraft, the most popular MMORPG. There will be a brief overview of the game, guilds and guild management, tools and social issues. Other technologies and the possible future of MMORPGs and their impact will be discussed. Video, images and examples will be used to describe why World of Warcraft is so compelling. First hand experience and comparisons with experiences and theory from other types of organizations will be used to describe the dynamics of a guild and what we can learn from guild and guild management. Socialization, ranks, personality types, rewards, rules, governance, promotion, recruiting, evolution and out-of-game activities will be discussed among other attributes. The current technology, supporting technology and possible future technologies will be explored to try to map the future of MMORPGs.
-
-
21:37
»
SecDocs
Authors:
Frederic Raynal Tags:
GIS Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: The OpenStreetMap project has achieved remarkable successes in creating a free world map, and is growing fast. This talk gives an overview of what we do, why we do it, and what our data can be used for. The year 2007 has seen a lot of money thrown around for the acquisition of the world's two largest Geodata providers: TeleAtlas have been bought by TomTom for EUR 1.8 billion, and NavTeq by Nokia for EUR 5.7 billion. These transactions have revived the fear that the world may end up with a digital map monopoly, with users migrating to the provider with the most comprehensive data and then further strengthening its position by adding their own information. OpenStreetMap is the free and open alternative to commercial providers - where users collect GPS tracks and additional information and make that into a high-quality map. The Economist concluded an article about the aforementioned geodata big guns saying: "In time, such [OpenStreetMap] contributions could create a detailed, free map of the world. If so, TomTom's and Nokia's acquisitions would look very overpriced." This talk intends to give an overview about the technology, the methods and the community behind OpenStreetMap, explain what we've achieved so far, and of course why OpenStreetMap is twice as cool as anything you can buy for money. In true hacking spirit we will also demonstrate a few rather unconventional uses of our data.
-
21:37
»
SecDocs
Authors:
Frederic Raynal Tags:
GIS Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: The OpenStreetMap project has achieved remarkable successes in creating a free world map, and is growing fast. This talk gives an overview of what we do, why we do it, and what our data can be used for. The year 2007 has seen a lot of money thrown around for the acquisition of the world's two largest Geodata providers: TeleAtlas have been bought by TomTom for EUR 1.8 billion, and NavTeq by Nokia for EUR 5.7 billion. These transactions have revived the fear that the world may end up with a digital map monopoly, with users migrating to the provider with the most comprehensive data and then further strengthening its position by adding their own information. OpenStreetMap is the free and open alternative to commercial providers - where users collect GPS tracks and additional information and make that into a high-quality map. The Economist concluded an article about the aforementioned geodata big guns saying: "In time, such [OpenStreetMap] contributions could create a detailed, free map of the world. If so, TomTom's and Nokia's acquisitions would look very overpriced." This talk intends to give an overview about the technology, the methods and the community behind OpenStreetMap, explain what we've achieved so far, and of course why OpenStreetMap is twice as cool as anything you can buy for money. In true hacking spirit we will also demonstrate a few rather unconventional uses of our data.
-
-
21:53
»
SecDocs
Tags:
GIS Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: The OpenStreetMap project has achieved remarkable successes in creating a free world map, and is growing fast. This talk gives an overview of what we do, why we do it, and what our data can be used for. The year 2007 has seen a lot of money thrown around for the acquisition of the world's two largest Geodata providers: TeleAtlas have been bought by TomTom for EUR 1.8 billion, and NavTeq by Nokia for EUR 5.7 billion. These transactions have revived the fear that the world may end up with a digital map monopoly, with users migrating to the provider with the most comprehensive data and then further strengthening its position by adding their own information. OpenStreetMap is the free and open alternative to commercial providers - where users collect GPS tracks and additional information and make that into a high-quality map. The Economist concluded an article about the aforementioned geodata big guns saying: "In time, such [OpenStreetMap] contributions could create a detailed, free map of the world. If so, TomTom's and Nokia's acquisitions would look very overpriced." This talk intends to give an overview about the technology, the methods and the community behind OpenStreetMap, explain what we've achieved so far, and of course why OpenStreetMap is twice as cool as anything you can buy for money. In true hacking spirit we will also demonstrate a few rather unconventional uses of our data.
-
-
21:34
»
SecDocs
Tags:
virus games Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: World of Warcraft is currently one of the most successful and complex virtual realities. Apart from gaming, it simulates personality types, social structures and a whole range of group dynamics. In 2005, courtesy of its creators at Blizzard Entertainment, the ancient Blood God "Hakkar the Soulflayer" unleashed a devastating plague, "corrupted blood", upon a totally unprepared population of avatars. Unintentionally, the digital "black death" spread to cities and depopulated whole areas. The epidemic could only be controlled by shutting down and restarting the game world, a measure unfortunately not available in the "real" world. However, other measures such as quarantine or improved treatment are available in the real world and can be simulated by disease modelling. Disease modelling is essentially a virtualisation of reality that tries to gain insights into hitherto unknown inderdependencies and to simulate intervention scenarios. I will give a brief overview of the use of infectious disease modelling in a population and explain the disease dynamics of the "corrupted blood" epidemic in WoW. I will focus on cross references to the "real world" and illustrate why Blizzard, in effect, had created sexually transmitted measles for online denizens.
-
21:34
»
SecDocs
Tags:
virus games Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: World of Warcraft is currently one of the most successful and complex virtual realities. Apart from gaming, it simulates personality types, social structures and a whole range of group dynamics. In 2005, courtesy of its creators at Blizzard Entertainment, the ancient Blood God "Hakkar the Soulflayer" unleashed a devastating plague, "corrupted blood", upon a totally unprepared population of avatars. Unintentionally, the digital "black death" spread to cities and depopulated whole areas. The epidemic could only be controlled by shutting down and restarting the game world, a measure unfortunately not available in the "real" world. However, other measures such as quarantine or improved treatment are available in the real world and can be simulated by disease modelling. Disease modelling is essentially a virtualisation of reality that tries to gain insights into hitherto unknown inderdependencies and to simulate intervention scenarios. I will give a brief overview of the use of infectious disease modelling in a population and explain the disease dynamics of the "corrupted blood" epidemic in WoW. I will focus on cross references to the "real world" and illustrate why Blizzard, in effect, had created sexually transmitted measles for online denizens.
-
15:14
»
SecDocs
Tags:
virus games Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: World of Warcraft is currently one of the most successful and complex virtual realities. Apart from gaming, it simulates personality types, social structures and a whole range of group dynamics. In 2005, courtesy of its creators at Blizzard Entertainment, the ancient Blood God "Hakkar the Soulflayer" unleashed a devastating plague, "corrupted blood", upon a totally unprepared population of avatars. Unintentionally, the digital "black death" spread to cities and depopulated whole areas. The epidemic could only be controlled by shutting down and restarting the game world, a measure unfortunately not available in the "real" world. However, other measures such as quarantine or improved treatment are available in the real world and can be simulated by disease modelling. Disease modelling is essentially a virtualisation of reality that tries to gain insights into hitherto unknown inderdependencies and to simulate intervention scenarios. I will give a brief overview of the use of infectious disease modelling in a population and explain the disease dynamics of the "corrupted blood" epidemic in WoW. I will focus on cross references to the "real world" and illustrate why Blizzard, in effect, had created sexually transmitted measles for online denizens.
-
-
21:35
»
SecDocs
Authors:
Rose White Tags:
social Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: I'm planning to look at how hackers and other "folks like us" get the "real world" to let us be crazy deviants, and continue to pay us anyway. Clearly not everyone is able to do this - hence the sort of person who says, "I'd love to [go to Burning Man] [blow things up] [dress eccentrically]" but never does any of it. But some of us are able to get the world to play along, and I am looking at that from a sociological point of view.
-
-
13:01
»
Hack a Day
In the world of electronics we have impedance; the combination of all forces which oppose the flow of electric current. Often times we have circuits with different impedances, 50 ohms for RF, or 75 for cable TV. It’s pretty important to use the right coax in these circuits, else you’ll be wondering why your RG-58 [...]
-
-
15:22
»
SecDocs
Tags:
phone Event:
Chaos Communication Camp 2011 Abstract: The most ubiquitous device on the planet is arguably the mobile phone. Tragically, it is also a device built under some of the worst living and working conditions in the world. This is the story of a mission - To build the world's first ethical phone. The most ubiquitous device on the planet is arguably the mobile phone. We use them, we need them, we get new ones every few years. Our old phones are either in a drawer, a landfill, or in the hands of those people in places like China and Brazil where old electronics are broken down or repurposed. Meanwhile in many parts of one of the most troubled nations in the world, the minerals that make are new phones are being mined under some very questionable circumstances. From some of the worst labor conditions in the world comes the cobalt and other essential minerals that will one day be your iphone. -- Is this how it simply has to be? -- A group in the Netherlands has embarked on an ambitious, risky, and little known quest - To build the world's first ethical phone. Are where did they start? In the Congo of course...
-
-
21:37
»
SecDocs
Authors:
Bernhard Fischer Tags:
GPS Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: In maritime shipping accurate positioning is vital to preserve damage to life, ship, and goods. Today, we might tend to think that this problem is sufficiently solved yet because of the existence of electronic positioning systems like, most notably, the Global Positioning System (GPS) or the Russian counterpart GLONASS. This is wrong. Positions in terms of latitude and longitude just make sense together with an accurate sea chart (and of course, together with a navigator that is able to translate charting data into reality). Sea charts are available of national geospatial agencies and business companies as hard-copy or as digital maps and dependent on costs one might spend they are more or less accurate. In today's open world the idea of making an open sea chart is obvious. Several projects now started to apply the rules used for the OpenStreetMap, "...a free editable map of the whole world." (http://www.openstreetmap.org/), to create a free editable sea chart of the whole world and it turns out to be much more difficult because of potential serious consequences in case of charting errors. A sea chart contains a lot of vital information to a navigator. It has to be accurate, up to date, and confidential. Since we (the open sea chart community) cannot just chart every navigational important item on the world we are dependent on information that was already charted before or on third-party information. The latter could be for example measurements or GPS tracks of people that are somehow involved into maritime shipping but not necessarily into details of marine mapping. Thus, data accuracy may be questionable but still valuable. The fact that unauthenticated people are editing data in an open database is a big challenge for an open community since safety and security of life heavily depends on it. This talk covers the basic principles of sea charts and marine mapping. It emphasizes the problems of an open sea chart in general and its distinction to an open street map since requirements to ensure safety at sea are very different. Data preparation and import of other sources are discussed in detail, mainly focused on lights and depths. The lecture will connect real world shortcomings to a pedantic definite IT world for an IT-oriented audience and approaches IT security from a different angle.
-
-
21:52
»
SecDocs
Authors:
Bernhard Fischer Tags:
GPS Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: In maritime shipping accurate positioning is vital to preserve damage to life, ship, and goods. Today, we might tend to think that this problem is sufficiently solved yet because of the existence of electronic positioning systems like, most notably, the Global Positioning System (GPS) or the Russian counterpart GLONASS. This is wrong. Positions in terms of latitude and longitude just make sense together with an accurate sea chart (and of course, together with a navigator that is able to translate charting data into reality). Sea charts are available of national geospatial agencies and business companies as hard-copy or as digital maps and dependent on costs one might spend they are more or less accurate. In today's open world the idea of making an open sea chart is obvious. Several projects now started to apply the rules used for the OpenStreetMap, "...a free editable map of the whole world." (http://www.openstreetmap.org/), to create a free editable sea chart of the whole world and it turns out to be much more difficult because of potential serious consequences in case of charting errors. A sea chart contains a lot of vital information to a navigator. It has to be accurate, up to date, and confidential. Since we (the open sea chart community) cannot just chart every navigational important item on the world we are dependent on information that was already charted before or on third-party information. The latter could be for example measurements or GPS tracks of people that are somehow involved into maritime shipping but not necessarily into details of marine mapping. Thus, data accuracy may be questionable but still valuable. The fact that unauthenticated people are editing data in an open database is a big challenge for an open community since safety and security of life heavily depends on it. This talk covers the basic principles of sea charts and marine mapping. It emphasizes the problems of an open sea chart in general and its distinction to an open street map since requirements to ensure safety at sea are very different. Data preparation and import of other sources are discussed in detail, mainly focused on lights and depths. The lecture will connect real world shortcomings to a pedantic definite IT world for an IT-oriented audience and approaches IT security from a different angle.
-
-
21:36
»
SecDocs
Authors:
Eleanor Saitta Tags:
security Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: The past century our infrastructure has seen both massive expansion and heavy centralization. When it fails, it fails big -- this is the reality of our modern interconnectedness. We live in a world of crumbling bridges and bankrupt states, and our infrastructure will kill us. The people we’re relying on to keep us safe are trying to accomplish long-term risk management with short-term thinking. So, what now? We can't opt out, but we can become more resilient, and we can start thinking about risk differently. In this talk, we'll look at threat modeling in the real world, six ways to die, failing states, that big party in the desert, the failure of the humanitarian project, algae and the U.S. military, large-scale natural disasters, the power grid, and many other things. The problems we face are big in every sense of the word -- they involve some of the biggest things we've ever built -- but the solutions may not be. Can non-governmental networks step up when governments fail to provide basic services? Can we avoid a further expansion of neoliberalism in a post-infrastructural state? Are the power structures embedded in our infrastructure cultural destiny? What happens when maker culture grows up?
-
-
13:01
»
Hack a Day
In the world of your dreams, you can build an entire world, an entire universe, an entire society governed by your every whim. While lucid dreaming you are a god in your own mind, free to create or destroy at will. You can train yourself to recognize when you are dreaming, but sometimes a little technological help can [...]
-
-
21:46
»
SecDocs
Authors:
Robert Helling Tags:
science quantum cryptography Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: Quantum systems can have very different properties from their classical analogues which allows them to have states that are not only correlated but entangled. This allows for quantum computers running algorithms more powerful than those on classical computers (represented by Turing machines) and for quantum cryptography whose safety is (in principle) guaranteed by the laws of nature. I will explain key facts of quantum information theory from a physics perspective. In particular, I will focus on the fundamental difference between the quantum world and the classical world of everyday experience that in particular makes it provable impossible to simulate a quantum world by a classical world. This will then be applied to information processing tasks like quantum computing, quantum cryptography and possibly the human brain. No background in theoretical physics is necessary but some familiarity with basic complexity theory and linear algebra (what is a vector? what is a matrix?) could be helpful.
-
-
21:49
»
SecDocs
Authors:
Robert Helling Tags:
science quantum cryptography Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: Quantum systems can have very different properties from their classical analogues which allows them to have states that are not only correlated but entangled. This allows for quantum computers running algorithms more powerful than those on classical computers (represented by Turing machines) and for quantum cryptography whose safety is (in principle) guaranteed by the laws of nature. I will explain key facts of quantum information theory from a physics perspective. In particular, I will focus on the fundamental difference between the quantum world and the classical world of everyday experience that in particular makes it provable impossible to simulate a quantum world by a classical world. This will then be applied to information processing tasks like quantum computing, quantum cryptography and possibly the human brain. No background in theoretical physics is necessary but some familiarity with basic complexity theory and linear algebra (what is a vector? what is a matrix?) could be helpful.
-
-
10:01
»
Hack a Day
Over the last two years, [Mark] at the Harford (and Baltimore) Hackerspace has been building 401k, a humanoid robot that will soon be able to walk on two legs, detect objects, and fight along with its comrades in the robot insurrection that leads to the extinction of man. To get an idea of how complicated a [...]
-
-
6:01
»
Hack a Day
The “Picture Post”, a tool for a program going on through the University of New Hampshire, is a method of taking what amounts to extreme time-lapse photography. The purpose of this project is to observe the world around you with a 360 degree view taken at a regular interval. The setup is quite simple consisting [...]
-
-
11:01
»
Hack a Day
[Simon] came up with an improved version of Lord Vetinari’s clock that begs to be installed in waiting rooms around the world. Last week, we were introduced to a real-life Vetinari Clock that keeps regular time but ticks at irregular intervals. It’s a great way to turn someone’s mind into porridge, but the original build [...]
-
-
8:05
»
Hack a Day
[Justin] always wanted a GeoChron clock, but since they run in the range of several thousand dollars apiece, he was pretty certain he would never have the chance to own one. Undaunted, he figured out a way to build a small version of the clock for himself, and he wrote in to share how it [...]
-
-
13:01
»
Hack a Day
We know that the appearance of the Kinect 3D camera hardware, and subsequent open source driver hacking conquest, is a game-changer that brings the real world into much closer contact with the virtual world. But it still amazes us when we see a concept like this turntable-based 3D object scanner that works so incredibly well. [...]
-
-
11:01
»
Hack a Day
One thing that always amazes us is the ingenuity displayed by prison inmates, as demonstrated in the tools and weapons they create while under the watchful eye of the law. Unlike most people however, these individuals have nothing but time on their side, which lends to the wide range of implements they inevitably dream up. [...]
-
-
10:00
»
Hack a Day
Nothing says Cold War like a map of the work with LEDs embedded in it. Throw in some analog dials for good measure and you’ve got a piece that would be comfortable mounted next the WOPR in everyone’s favorite ’80s-computers-run-amok movie. We think [Dima] really hit the mark when building this status panel for OpenDNS [...]
-
-
7:10
»
Hack a Day
It looks like the world of Kinect hacks is about to get a bit more interesting. While many of the Kinect-based projects we see use one or two units, this 3D telepresence system developed by UNC Chapel Hill student [Andrew Maimone] under the guidance of [Henry Fuchs] has them all beat. The setup uses up [...]
-
-
11:43
»
Hack a Day
[Michael Thompson] has been hard at work for well over six months building a bicycle made entirely of wood. The project started as a bet between two friends, and has become much more over the last few months. The SplinterBike, as it is being called, has been constructed solely from wooden parts, as well as [...]
-
-
14:01
»
Hack a Day
The world can be a pretty difficult place to navigate when you lack the ability to see it. There are many visually impaired people across the globe, with some figures claiming up to 40 million individuals affected. While walking canes and seeing-eye dogs can be a huge help, [Anirudh] of Multimodal Interactions Group, HP Labs [...]
-
-
13:02
»
Hack a Day
Do you need to keep tabs on the kids while they browse the Internet? How about your husband/wife – do you suspect they are dabbling in extra-curriculars on the side? Hey, you’ve got your insecurities reasons, we won’t judge. We will however, show you what [Jerry] over at Keelog has been working on lately. While [...]
-
-
11:01
»
Hack a Day
[Mok Young Bacq] works on the weekends for mobile game monitoring service. He has three cellphones that he uses for work, and although you would think this means he could work from anywhere in the world, the roaming charges are a killer. His solution was to build an incredibly intricate machine that can use three [...]
-
-
9:37
»
Packet Storm Security Recent Files
Whitepaper called Forgotten World - Corporate Business Application Systems. This paper will describe some basic and advanced threats and attacks on Enterprise Business Applications – the core of many companies. Both the paper and Blackhat DC presentation are included in this archive.
-
9:37
»
Packet Storm Security Misc. Files
Whitepaper called Forgotten World - Corporate Business Application Systems. This paper will describe some basic and advanced threats and attacks on Enterprise Business Applications – the core of many companies. Both the paper and Blackhat DC presentation are included in this archive.
-
-
10:00
»
Hack a Day
[Lossfresnos65] must be planning to do a lot of travelling because he’s entombed his PlayStation 3 in a Pelican case. Inside you’ll find some diamond-plate bezel to cover the console itself and used to surround the 19-inch high-definition television that is mounted to the lid of the case. In the picture above you see the door that [...]
-
-
12:51
»
Hack a Day
Most augmented reality takes images of the real world and superimposes virtual data on top of them. [Michael Winston Dales] went a different direction, using the virtual world of Minecraft to control objects in the physical world. In the video after the break you can see him use switches that he built inside the game [...]
-
-
13:00
»
Hack a Day
So this is the world’s strongest robot arm. Great… no really, that’s wonderful. We think lifting a 1000 kilogram dumbbell is a good way to show it off to the public. But with great power came the world’s most over-the top marketing. Well, maybe not as bad as the shake weight but it’s getting there. In the [...]
-
-
14:00
»
Hack a Day
In this tutorial we are going to get up close with the Visual Studio 2010 environment. We will learn how to make a console application as well as a form to display our hello world applications. This will give us an opportunity to view 2 types of solutions of the many available in Visual Studio. [...]
-
-
6:33
»
Hack a Day
A quick heads-up to those of you that will be at the New York Maker Faire and the Open Hardware Summit.One of our writers, [Devlin Thyne], will be there checking ...
-
-
12:00
»
Hack a Day
This article will focus on developing a simple hello world program for android using Java. Google has recently released a “cute and fuzzy” programming environment for beginners to get into but I haven’t had the chance to try it, so we will be focusing on the Eclipse IDE here, which you should have set up [...]
-
-
5:51
»
remote-exploit & backtrack
i want a wordlist as we call it for a list of number from 1000000 to 9999999
but with a 101-prefix to the list generated, i.e 1011000000, 10110000001,...
1019999999 like that.
i searched and found many but with none i'm able to get to generate a list like this. someone can guide me, then it would be great. i want any program name and the correct argument to pass to get this sort of list printed.