×
Communications

NJ Museum Revives TIROS Satellite Dish After 40 Years 28

evanak writes TIROS was NASA's Television Infrared Observation Satellite. It launched in April 1960. One of the ground tracking stations was located at the U.S. Army's secret "Camps Evans" Signals Corps electronics R&D laboratory. That laboratory (originally a Marconi wireless telegraph lab) became the InfoAge Science Center in the 2000s. [Monday], after many years of restoration, InfoAge volunteers (led by Princeton U. professor Dan Marlowe) successfully received data from space. The dish is now operating for the first time in 40 years! The received data are in very raw form, but there is a clear peak riding on top of the noise background at 0.4 MHz (actually 1420.4 MHz), which is the well-known 21 cm radiation from the Milky Way. The dish was pointing south at an elevation of 45 degrees above the horizon.
Hardware Hacking

Insurance Company Dongles Don't Offer Much Assurance Against Hacking 199

According to a story at Forbes, Digital Bond Labs hacker Corey Thuen has some news that should make you think twice about saving a few bucks on insurance by adding a company-supplied car-tracking OBD2 dongle: It’s long been theorised that [Progressive Insurance's Snapshot and other] such usage-based insurance dongles, which are permeating the market apace, would be a viable attack vector. Thuen says he’s now proven those hypotheses; previous attacks via dongles either didn’t name the OBD2 devices or focused on another kind of technology, namely Zubie, which tracks the performance of vehicles for maintenance and safety purposes. ... He started by extracting the firmware from the dongle, reverse engineering it and determining how to exploit it. It emerged the Snapshot technology, manufactured by Xirgo Technologies, was completely lacking in the security department, Thuen said. “The firmware running on the dongle is minimal and insecure. It does no validation or signing of firmware updates, no secure boot, no cellular authentication, no secure communications or encryption, no data execution prevention or attack mitigation technologies basically it uses no security technologies whatsoever.”
Input Devices

Nintendo Power Glove Used To Create 'Robot Chicken' 40

dotarray (1747900) writes "Despite its glorious introduction in The Wizard, the Nintendo Power Glove was, from all accounts, a bit of a failure. However, Dillon Markey has given the doomed peripheral a new lease of life — it's a crucial part of making stop-motion animation for Robot Chicken." The linked article doesn't have many more words, but the video it features is worthwhile to see how Markey has modified the glove to make the tedious work of stop-motion a little bit less tedious.
Hardware Hacking

Engineer Combines Xbox One, PS4 Into Epic 'PlayBox' Laptop 78

MojoKid writes We can finally stop arguing over which is the superior game console, the PlayStation 4 or Xbox One. Quite frankly, it's a pointless debate, and it took a self-taught engineer to put the argument to rest, which he did by combining both game systems into a 22-inch laptop. Meet the "PlayBox," a gaming laptop that's equal parts Xbox One and PS4 rolled into one. The PlayBox wins the argument because it allows you to play games on either system, and when it comes down to it, the ability to play games is all that matters. Built for a "specific customer," the owner of this prototype system needn't worry about exclusives since he now has a system that can play them all, and do it while taking up no more space than a single console.
Security

Wireless Keylogger Masquerades as USB Phone Charger 150

msm1267 writes: Hardware hacker and security researcher Samy Kamkar has released a slick new device that masquerades as a typical USB wall charger but in fact houses a keylogger capable of recording keystrokes from nearby wireless keyboards. The device is known as KeySweeper, and Kamkar has released the source code and instructions for building one of your own. The components are inexpensive and easily available, and include an Arduino microcontroller, the charger itself, and a handful of other bits. When it's plugged into a wall socket, the KeySweeper will connect to a nearby Microsoft wireless keyboard and passively sniff, decrypt and record all of the keystrokes and send them back to the operator over the Web.
Hardware Hacking

Ask Slashdot: Options For Cheap Home Automation? 189

New submitter goose-incarnated writes I'm looking at cheap and simple home automation. Unfortunately I'm not too clued up on what my options are. There are such a wide array of choices, none of which seem (to me) to be either cheap or simple. I'd like to: Turn switches on/off (lights, wall sockets, general relays, etc); Read the status of on/off switches; Read analog samples (for example, temperature sensors); 'Program' switches based on analog samples/existing switches (for example, program a relay to come on at 30C and go off at 25C, thereby controlling the temperature); Similarly, program switches to go on/off at certain times; Record the samples of analog or digital inputs for a given time . I'd like to do the above using smartphone+bluetooth (for when I'm in the vicinity of the room), or smartdevice+WiFi (for when I'm in the house, somewhere), or even in a pinch, using HTTP to access a server at home from 600km away (which is what I'm willing to do). I'm definitely not willing to stream all my requests/data/responses through a third-party so third party cloud subscription solutions, even if free, are out of the question. Finally (because I know the Slashdot crowd likes a challenge :-)), I'd like something that is easily reprogrammable without having to compile code, then reflash a device, etc. What languages for embedded devices exist for home automation programming, if any. A quick google search reveals nothing specially made for end-users to reprogram their devices, but, like I said above, I'm clueless about options.
Hardware Hacking

Hackers Leak Xbox One SDK Claiming Advancement In Openness and Homebrew 86

MojoKid writes Microsoft, it seems, just can't catch a break. Days after a major hack took its servers offline on Christmas day, and after being lambasted in multiple stories for shipping games like Halo: The Master Chief Collection in nigh-unplayable condition, the company's Xbox One SDK has been leaked to the public by a group calling itself H4LT. H4LT, which apparently objects to being called a hacker group, offered this explanation when asked why it was distributing the SDK. The group claims that "the SDK will basically allow the community to reverse and open doors towards homebrew applications being present on the Xbox One." To be clear, what H4LT has done is a far cry from groups like Lizard Squad. The SDK for any given product is typically available behind some degree of registration, but they don't necessarily cost anything. The SDK is one small component of creating the ecosystem that would be necessary to get homebrew up and running on the platform. Whether or not users will ever pull it off is another question.
Portables (Apple)

Putting a MacBook Pro In the Oven To Fix It 304

An anonymous reader writes: A post at iFixit explains how one user with a failing MacBook Pro fixed it by baking it in the oven. The device had overheating issues for months, reaching temperatures over 100 C. When it finally died, some research suggested the extreme heat caused the logic board to flex and break the solder connections. The solution was to simply reflow the solder, but that's hard to do with a MBP. "Instead, I cracked open the back of my laptop, disconnected all eleven connectors and three heat sinks from the logic board, and turned the oven up to 340 F. I put my $900 part on a cookie sheet and baked it for seven nerve-wracking minutes. After it cooled, I reapplied thermal paste, put it all back together, and cheered when it booted. It ran great for the next eight months." The laptop failed again, and another brief vacation into the oven got it running once more.
Hardware Hacking

Glowing Hobbit Sword Helps You Find Unsecured Wi-Fi 67

Molly McHugh writes By disassembling your plastic Sting and incorporating the Spark Core, a tiny Wi-Fi development kit, you can hack the toy's light and enlist it to show you when you are near an unsecure network. The best part about this hack? It only requires two things: a Spark Core and a replica Sting with lights and sound, like this one."
Graphics

Quake On an Oscilloscope 71

An anonymous reader writes: Developer Pekka Väänänen has posted a fascinating report on how he got Quake running on an oscilloscope (video link). Obviously, the graphic details gets stripped down to basic lines, but even then, you need to cull any useless or unseen geometry to make things run smoothly. He says, "To cull the duplicates a std::unordered_set of the C++ standard library is used. The indices of the triangle edges are saved in pairs, packed in a single uint64_t, the lower index being first. The set is cleared between each object, so the same line could still be drawn twice or more if the same vertices are stored in different meshes. Before saving a line for end-of-the-frame-submit, its indices in the mesh are checked against the set, and discarded if already saved this frame. At the end of each frame all saved lines are checked against the depth buffer of the rendered scene. If a line lies completely behind the depth buffer, it can be safely discarded because it shouldn't be visible."
Christmas Cheer

Ask Slashdot: Best Wireless LED Light Setup for 2015? 68

An anonymous reader writes I want to get a jump-start on next year's Christmas by wiring up my mother's gnome garden for a Christmas light show. I need a setup that can use wireless LED lights and speakers, the lights using a custom sequence set to music, that can be controlled remotely indoors to go off on a schedule, say every hour. Do you know of an off-the-shelf setup that is cheap and works seamlessly, especially for someone with little to no coding or custom building experience?
DRM

How Laws Restricting Tech Actually Expose Us To Greater Harm 116

An anonymous reader writes: Cory Doctorow has an article in Wired explaining why crafting laws to restrict software is going to hurt us in the long run. The reason? Because we're on an irreversible trajectory toward integrating technology with our cars and houses, bodies and brains. If we don't control the software, then at some point, we won't control parts of our homes and our selves. Doctorow writes, "Any law or regulation that undermines computers' utility or security also ripples through all the systems that have been colonized by the general-purpose computer. And therein lies the potential for untold trouble and mischief.

Code always has flaws, and those flaws are easy for bad guys to find. But if your computer has deliberately been designed with a blind spot, the bad guys will use it to evade detection by you and your antivirus software. That's why a 3-D printer with anti-gun-printing code isn't a 3-D printer that won't print guns—the bad guys will quickly find a way around that. It's a 3-D printer that is vulnerable to hacking by malware creeps who can use your printer's 'security' against you: from bricking your printer to screwing up your prints to introducing subtle structural flaws to simply hijacking the operating system and using it to stage attacks on your whole network."
Hardware Hacking

Many DDR3 Modules Vulnerable To Bit Rot By a Simple Program 138

New submitter Pelam writes: Researchers from Carnegie Mellon and Intel report that a large percentage of tested regular DDR3 modules flip bits in adjacent rows (PDF) when a voltage in a certain control line is forced to fluctuate. The program that triggers this is dead simple — just two memory reads with special relative offset and some cache control instructions in a tight loop. The researchers don't delve deeply into applications of this, but hint at possible security exploits. For example a rather theoretical attack on JVM sandbox using random bit flips (PDF) has been demonstrated before.
Hardware Hacking

Extracting Data From the Microsoft Band 51

An anonymous reader writes The Microsoft Band, introduced last month, hosts a slew of amazing sensors, but like so many wearable computing devices, users are unable to access their own data. A Brown University professor decompiles the app, finds that the data is transmitted to the Microsoft "cloud", and explains how to intercept the traffic to retrieve the raw minute-by-minute data captured by the Band.
Hardware Hacking

The Personal Computer Revolution Behind the Iron Curtain 115

szczys writes Obviously the personal computer revolution was world-wide, but the Eastern Bloc countries had a story of PC evolution all their own. Martin Malý tells first hand of his experiences seeing black market imports, locally built clones of popular western machines, and all kinds of home-built equipment. From the article: "The biggest problem was a lack of modern technologies. There were a lot of skilled and clever people in eastern countries, but they had a lot of problems with the elementary technical things. Manufacturing of electronics parts was divided into diverse countries of Comecon – The Council for Mutual Economic Assistance. In reality, it led to an absurd situation: You could buy the eastern copy of Z80 (made in Eastern Germany as U880D), but you couldn’t buy 74LS00 at the same time. Yes, a lot of manufacturers made it, but 'it is out of stock now; try to ask next year.' So 'make a computer' meant 50 percent of electronics skills and 50 percent of unofficial social network and knowledge like 'I know a guy who knows a guy and his neighbor works in a factory, where they maybe have a material for PCBs' at those times."
Build

Linux On a Motorola 68000 Solder-less Breadboard 147

New submitter lars_stefan_axelsson writes: When I was an undergrad in the eighties, "building" a computer meant that you got a bunch of chips and a soldering iron and went to work. The art is still alive today, but instead of a running BASIC interpreter as the ultimate proof of success, today the crowning achievement is getting Linux to run: "What does it take to build a little 68000-based protoboard computer, and get it running Linux? In my case, about three weeks of spare time, plenty of coffee, and a strong dose of stubbornness. After banging my head against the wall with problems ranging from the inductance of pushbutton switches to memory leaks in the C standard library, it finally works! (video)"
Hardware Hacking

Ask Slashdot: What's the Most Hackable Car? 195

An anonymous reader writes: When looking for a new (or used) car, I have readily available information regarding features, maintenance history, and potential issues for that specific model or generation. What I would really like is a car that is readily hackable on the convenience-feature level. For example, if I want to install a remote starter, or hack the power windows so holding 'up' automatically rolls it up, or install a readout on the rear of the car showing engine RPMs, what make/model/year is the best pick? Have any of you done something similar with your vehicle? Have you found certain models to be ideal or terrible for feature hacking?
Build

Ask Slashdot: How Do I Make a High-Spec PC Waterproof? 202

jimwormold writes: I need to build a system for outdoor use, capable of withstanding a high pressure water jet! "Embedded PC," I hear you cry. Well, ideally yes. However, the system does a fair bit of number crunching on a GPU (GTX970) and there don't appear to be any such embedded systems available. The perfect solution will be as small as possible (ideally about 1.5x the size of a motherboard, and the height will be limited to accommodate the graphics card). I'm U.K.- based, so the ambient temperature will range from -5C to 30C, so I presume some sort of active temperature control would be useful.

I found this helpful discussion, but it's 14 years old. Thus, I thought I'd post my question here. Do any of you enlightened Slashdotters have insights to this problem, or know of any products that will help me achieve my goals?
Displays

Raspberry Pi Founder Demos Touchscreen Display For DIY Kits 81

An anonymous reader writes: Over 4 million Raspberry Pis have been sold so far, and now founder Eben Upton has shown off a touchscreen display panel that's designed to work with it. It's a 7" panel, roughly tablet sized, but slightly thicker. "With the incoming touchscreen panel The Pi Foundation is clearly hoping to keep stoking the creative fires that have helped drive sales of the Pi by slotting another piece of DIY hardware into the mix." Upton also discussed the Model A+ Raspberry Pi board — an updated version they'll be announcing soon.
Medicine

Cell Transplant Allows Paralyzed Man To Walk 161

New submitter tiberus sends word of a breakthrough medical treatment that has restored the ability to walk to a man who was paralyzed from the chest down after his spinal cord was severed in a knife attack. A research team from the UK, led by Professor Geoff Raisman, transplanted cells from the patient's nose, along with strips of nerve tissue from his ankle, to the place where the spine was severed. This allowed the fibers in the spinal cord to gradually reconnect. The treatment used olfactory ensheathing cells (OECs) - specialist cells that form part of the sense of smell. ... In the first of two operations, surgeons removed one of the patient's olfactory bulbs and grew the cells in culture. Two weeks later they transplanted the OECs into the spinal cord, which had been cut through in the knife attack apart from a thin strip of scar tissue on the right. They had just a drop of material to work with - about 500,000 cells. About 100 micro-injections of OECs were made above and below the injury. Four thin strips of nerve tissue were taken from the patient's ankle and placed across an 8mm (0.3in) gap on the left side of the cord. ... Two years after the treatment, he can now walk outside the rehabilitation center using a frame.

Slashdot Top Deals