×
Input Devices

Microsoft Hardware Demos Pressure-Sensitive Keyboard 212

Krystalo writes to tell us that Microsoft hardware has an interesting demo of a pressure-sensitive keyboard they have designed. While there are no currently announced plans to turn this into a shipping product, there are many cool uses that one could imagine a device like this providing. "The device will be put to use in the first annual Student Innovation Contest in Victoria, Canada, where contestants will be supplied with a keyboard prototype and challenged with developing new interactions for it. Contestants will demo their creations and attendees will vote for their favorite at the conference on October 5. $2,000 prizes will be given to the authors of programs deemed as the most useful, the best implementation, and the most innovative."
Hardware Hacking

Apple Working On Tech To Detect Purchasers' "Abuse" 539

Toe, The writes "Apple has submitted a patent application for technologies which would detect device-abuse by consumers. The intent presumably being to aid in determining the validity of warranty claims. 'Consumer abuse events' would be recorded by liquid and thermal sensors detecting extreme environmental exposures, a shock sensor detecting drops or other impacts, and a continuity sensor to detect jailbreaking or other tampering. The article also notes that liquid submersion detectors are already deployed in MacBook Pros, iPhones and iPods. It does seem reasonable that a corporation would wish to protect itself from fraudulent warranty claims; however the idea of sensors inside your portable devices detecting what you do with them might raise eyebrows even beyond the tinfoil-hat community."
Hardware Hacking

DIY CPU Thermal Grease, Using Diamond Dust 210

tygerstripes writes "The dysfunctor has spotted an impressive project over on InventGeek.com; an innovative chap has developed his own thermal compound for improved CPU cooling, using diamond dust — the best available material for thermal conduction — as the key ingredient. In spite of the quick-&-dirty DIY nature of the project, the gains in cooling performance are remarkable, especially considering the material cost was only $33. Given the price many enthusiasts will pay for a top-end cooler, it's easy to imagine this product coming to market quite soon."
Hardware Hacking

California Student Arrested For Console Hacking 1016

jhoger writes "Matthew Crippen was arrested yesterday for hacking game consoles (for profit) in violation of the Digital Millennium Copyright Act. He was released on a $5,000 bond, but faces up to 10 years in prison. This is terribly disturbing to me; a man could lose 10 years of his freedom for providing the service of altering hardware. He could well lose much of his freedom for providing a modicum of it to others. There is no piracy going on, necessarily — the games a modified console could run may simply not be signed by the vendor. It's much like jailbreaking an iPhone. But it seems because he is disabling a 'circumvention device' it is a criminal issue. Guess it's time to kick a few dollars over to the EFF."
Hardware Hacking

Wearable Computer With Lightweight HUD 150

zeazzz writes to mention that the folks over at UMPC have a very cool little writeup and pictorial of a user's latest wearable PC. With the surge in smart phone adoption it seems that enthusiasm for wearable computers has dropped off a bit, which is too bad. I certainly look forward to my augmented reality HUD instead of depending on my iPhone for everything. "Essentially he took the MyVu headset, removed one of the eye pieces, and mounted the other to his glasses to that he could see his surroundings and the UX's screen at the same time. The MyVu is attached to the UX through the A/V output port on the UX's port replicator dongle. With some additional addons he provided his UX with extra battery life via an external battery, and several input methods to communicate with the UX while the rest of the kit resides within the backpack."
Hardware Hacking

Three Arrested For Conspiring To Violate the DMCA 335

jtcm writes "Three men have been charged with conspiring to violate the Digital Millennium Copyright Act after federal investigators found that they allegedly offered a cracker more than $250,000 to assist with breaking Dish Network's satellite TV encryption scheme: '[Jung] Kwak had two co-conspirators secure the services of a cracker and allegedly reimbursed the unidentified person about $8,500 to buy a specialized and expensive microscope used for reverse engineering smart cards. He also allegedly offered the cracker more than $250,000 if he successfully secured a Nagra card's EPROM (eraseable programmable read-only memory), the guts of the chip that is needed to reverse-engineer Dish Network's encryption.' Kwak owns a company known as Viewtech, which imports and sells Viewsat satellite receiver boxes. Dish Network's latest encryption scheme, dubbed Nagra 3, has not yet been cracked by satellite TV pirates."
Supercomputing

BOINC Exceeds 2 Petaflop/s Barrier 114

Myrrh writes "Though an official announcement has not yet been made, it would appear that the BOINC project as a whole has exceeded two petaflop/s performance. The top page features this legend: '24-hour average: 2,793.53 TeraFLOPS.' According to last month's Top500 list of supercomputers, BOINC's performance is now beating that of the fastest supercomputer, RoadRunner, by more than a factor of two (with the caveat that BOINC has not been benchmarked on Linpack)."
Security

UK, Not North Korea, Is Source of DDoS Attacks 175

angry tapir writes "The UK was the likely source of a series of attacks last week that took down popular Web sites in the US and South Korea, according to an analysis performed by a Vietnamese computer security researcher. The results contradict assertions made by some in the US and South Korean governments that North Korea was behind the attack. Security analysts had been skeptical of the claims, which were reportedly made in off-the-record briefings and for which proof was never delivered." The Vietnamese security site's blog is linked from the article, but it is very slow even before Slashdotting. The researchers observed 166,908 zombies participating in the attacks — a number far larger than most earlier estimates.
Update: 07/14 21:24 GMT by KD : Wired is reporting that the UK owner of the IP address in question is pointing a finger at a server in Florida, which it says opened a VPN to the UK machine for the attacks. Once again, the attacker could be anywhere.
Hardware Hacking

Suggestions For Learning FPGA Development At Home? 185

Doug writes "I've recently been inspired to take up amateur electronics, specifically with FPGAs. I have an understanding of the basics, plus a solid programming background. From my research so far I've concluded that I should start with a simple FPGA development board and a couple of books on Verilog and/or VHDL and go from there. I found this Ask Slashdot discussion on Verilog vs VHDL very useful, but it focuses more on the development language rather than hardware. I'd be very interested in hearing peoples' recommendations for an entry-level kit that is simple, flexible, and affordable (sub-£200), and preferably Linux-friendly, and indeed any other wise words that experienced FPGA developers (professional or amateur) might have for a novice just starting out in the world of circuit design."
Security

Stealing Data Via Electrical Outlet 208

Ponca City, We love you writes "NetworkWorld reports that security consultants Andrea Barisani and Daniele Bianco are preparing to unveil their methodology at the Black Hat USA conference for stealing information typed on a computer keyboard using nothing more than the power outlet to which the computer is connected. When you type on a standard computer keyboard, electrical signals run through the cable to the PC. Those cables aren't shielded, so the signal leaks via the ground wire in the cable and into the ground wire on the computer's power supply. The attacker connects a probe to a nearby power socket, detects the ground leakage, and converts the signal back into alphanumeric characters. So far, the attack has proven successful using outlets up to about 15 meters away. The cost of the equipment to carry out the power-line attack could be as little as $500 and while the researchers admit their hacking tools are rudimentary, they believe they could be improved upon with a little time, effort and backing. 'If our small research was able to accomplish acceptable results in a brief development time (approximately a week of work) and with cheap hardware,' they say, 'Consider what a dedicated team or government agency can accomplish with more expensive equipment and effort.'"
Hardware Hacking

Getting a Classic PC Working After 25 Years? 533

tunersedge writes "Yesterday I dug out of my parents' basement a PC they had bought brand new in 1984: Epson Equity I personal computer; 512K RAM; 82-key keyboard; 2 (count 'em!, 2) 5.25" floppy disk drives; 13' RGB monitor (with contrast/brightness knobs); handy on/off switch; healthy 25-year-old yellowed plastic; absolutely no software. (My mom ran a pre-school, and they used it to keep records and payroll. I cut my programming teeth on this thing. GW-Basic was my friend. Kings Quest screens took 2 minutes to load when you walked into a new one.) When I resurrected this machine I pulled the case off, dusted out a little, and plugged it in. It actually fired up! I'm stoked, except the disks we had are missing. What I'm looking to do is either buy some old working disks with whatever I can find (MS-DOS 3.22, GW-Basic, whatever), or try and recreate some using a USB-based floppy drive and some modern software. Has anyone tried to resurrect a PC this old before?"
Technology (Apple)

iPhone 3GS Finally Hacked 376

Well, the inevitable hacking of Apple's latest flavor of iPhone has happened. Named "purplera1n," the tool will only allow installation of unauthorized applications instead of a full unlock. "The purplera1n jailbreak will free your iPhone from the limitations imposed on it by AT&T and Apple. After jailbreaking, a user will be able to customize the iPhone with home-screen wallpapers and third-party ringtones. But the biggest advantage of jailbreaking is the support of unapproved apps such as iBlackList (blacklists and whitelists for contacts) and many others."
Hardware Hacking

Hackable In-Car GPS Unit? 208

gigne writes "I'm in the market for a new, in-car GPS/sat nav. I am preferably looking for one that has live, up-to-date traffic information and route planning that doesn't make you want to cry. I'm not quite dumb enough to drive off a cliff, but something that doesn't even try and lead me to watery doom is preferable. The only thing I absolutely must have is the ability to hack it. It would be preferable if it ran GNU/Linux, but given a convincing argument, I would be swayed to another OS. Without wanting the Moon on a stick, what is the best device that would offer a decent modding community and a good feature set?"
Hardware Hacking

GPL Firmware For Canon 5D Mk II Adds Features For Filmmakers 117

tramm writes "I've released an extension for the Canon 5D Mark II DSLR's video mode to enable functions that are useful for independent film makers. While the camera produces a great movie out of the box, the audio is a severely limited. My code adds features that should have been in the software, like on-screen stereo audio meters, live audio monitoring, reduced audio noise and crop marks for different formats. An introductory video shows the new features in use and an audio evaluation compares it to the stock firmware with very good results. It's similar to the incredibly flexible CHDK software for Canon's point-and-shoot cameras, but targeted at the film makers using the 5D. The Magic Lantern firmware is GPLed and new features will be written to make the camera even more useful on set. There is a wiki for documentation and development."
Hardware Hacking

A Wiki For Cable and Connector Pin-Outs 107

Nicola Asuni writes to let us know about a new resource for hardware hackers: a wiki about pinouts — hardware interfaces of modern and obsolete hardware. "Created with the same MediaWiki software that was developed for the Wikipedia project, AllPinouts.org is a wiki that allows users to get and share information about hardware interfaces, including pinouts of ports, expansion slots, and other connectors of computers and different electronic devices (i.e. cellular phones, GPS, PDA, game consoles, etc.). All text is available under the GNU Free Documentation License and may be distributed or linked accordingly. The 'pinout' (or 'pin-out') of a connector identifies each individual pin, which is critical when creating, repairing or hacking cable assemblies and adapters."
Hardware Hacking

A Twitter Client For the Commodore 64 177

An anonymous reader writes "Johan Van den Brande has developed a Twitter client for the Commodore 64, allowing 140-character messages to be posted directly from this TV-connected 1982 home computer. This YouTube video shows how the Twitter client is — slowly! — loaded from a 5.25" floppy disk, how the latest Twitter messages are downloaded and shown on the TV screen, and how this tweet is posted. All that is needed is a C64, a TV, and a C64 Ethernet card. The Twitter client is implemented with the Contiki operating system, which otherwise is used for connecting tiny embedded systems to the Internet."
Image

Swedish Anti-Piracy Lawyer Gets New Name 'Pirate' Screenshot-sm 178

An anonymous reader writes "Swedish newspaper Aftonbladet (in Swedish) reports that Henrik Pontén, a lawyer of Antipiratbyrån, a Swedish organization against file sharing, has received a notification from officials that an application for change of his name has been approved and a new first name 'Pirate' has been added to his name. Authorities do not check the identity of persons applying for name changes. Pirate Pontén now has to apply for another change in order to revert the change."
Hardware Hacking

Hydraulic Analog Computer From 1949 184

mbone writes "In the New York Times, there is an interesting story about a hydraulic analog computer from 1949 used to model the feedback loops in the economy. According to the article, 'copies of the 'Moniac,' as it became known in the United States, were built and sold to Harvard, Cambridge, Oxford, Ford Motor Company and the Central Bank of Guatemala, among others.' There is a cool video of the computer in operation at Cambridge University. I remember that the Instrumentation Lab at MIT still had an analog computer in its computer center in the mid-1970s. Even then, it seemed archaic, and now this form of computation is largely forgotten. With 14 machines built, it must have been one of the more successful analog computers — a supercomputer of its day. Of course, you have to wonder if it could have been used to predict our current economic difficulties."
Hardware Hacking

Making a Child Locating System 1092

celtic_hackr writes "Well, I never thought I'd be an advocate for placing GPS devices on people. However, since it took less than three days for my local school district to misplace my daughter, I have decided that something needs to be done. By the school district's own admission it has a recurring problem of placing children on the wrong buses. Fortunately, my daughter was located, with no thanks to the local school district. Therefore, I would like input on a way to be able to keep track of my child. I know there are personal tracking devices out there. I have nothing against these systems. But I want more than this. My specification are: 1) a small unobtrusive device I can place on my daughter, 2) an application to pull up on any computer, a map with a dot indicating the real-time position of my child, 3) a handheld device with the equivalent information, 4) [optional] a secure web application/plug-in I can install on my own domain allowing me to track her from anyplace in the world, 5) a means of turning it all off, 6) a Linux based solution of the above. I believe all the pieces for making such a system are out there. Has anyone built anything like this? Is there an open source solution? How would I go about building my own? Has anyone hacked any of these personal trackers before, to serve their own purposes? How does a tinfoil hat wearer engineer such a device to make sure Big-Brother isn't watching too? Can these devices be locked down so only certain devices can pick up the GPS location of an individual locator? What other recommendations do you have?"
Hardware Hacking

Developer Creates DIY 8-Bit CPU 187

MaizeMan writes "Not for the easily distracted: a Belmont software developer's hand-built CPU was featured in Wired recently. Starting with a $50 wire wrap board, Steve Chamberlin built his CPU with 1253 pieces of wire, each wire wrapped by hand at both ends. Chamberlin salvaged parts from '70s and '80s era computers, and the final result is an 8-bit processor with keyboard input, a USB connection, and VGA graphical output. More details are available on the developer's blog."

Slashdot Top Deals