Last Build Date: Fri, 28 Oct 2016 12:46:52 +0000
Fri, 28 Oct 2016 11:01:54 +0000
One morning, a balaclava-wearing hacker walks into your office. You assume it’s a coworker, because he’s wearing a balaclava. The hacker sticks a USB drive into a computer in the cube next door. Strange command line tools show up on the screen. Minutes later, your entire company is compromised. The rogue makes a quick retreat carrying a thumb drive in hand.
This is the scenario imagined by purveyors of balaclavas and USB Rubber Duckys, tiny USB devices able to inject code, run programs, and extract data from any system. The best way — and the most common — to prevent …read more(image)
Fri, 28 Oct 2016 08:01:22 +0000
Everyone has an episode somewhere in their youth involving the use of an aerosol spray as an impromptu flamethrower. Take some mildly inebriated teenagers, given them a deodorant can and a box of matches, and sooner or later one or two of them are going to lose their eyebrows.
For most of us an amusing teenage episode is how the aerosol flamethrower remains. Not for [Mike Waddick] though, when last week’s DDoS attack on DNS infrastructure took away his ability to work his, attention turned to a Halloween project. He created a carved pumpkin that spits fire as a notification …read more(image)
Fri, 28 Oct 2016 05:00:01 +0000
In 1987, an American psychologist found voluntary eye movements reduced the intensity of negative thoughts. This is the basis of EMDR, or Eye Movement and Reprocessing Desensibilization, and if it sounds too oogie-boogie to be real, I assure you there are even oogier and boogier techniques in psychology that actually work.
[David]’s entry to the Hackaday Prize is a device that helps psychologists apply EMDR for the treatment of post-traumatic stress disorders. To do this, the psychologist asks the patient to describe a traumatic incident while the patient makes eye movement. According to the literature, this facilitates the connection between …read more(image)
Fri, 28 Oct 2016 02:00:11 +0000
The fatal combination of not being a early riser and commuting to work using public transit can easily result in missed buses or trains. Frustrated with missing train after train while fumbling with a complicated transit schedule app, [Fergal Carroll] created a Train Time Ticker to help his morning routine run right on time.
A Particle Photon hooked up to a 2.2″ TFT screen — both mounted on a breadboard with a button — fit the purpose tidily. Weekday mornings, the Ticker pulls — from a server he set up — the departure times for the specific station and platform …read more(image)
Thu, 27 Oct 2016 23:00:00 +0000
[makendo] needed a portable fog machine for an upcoming project. It seemed like the kind of a thing a liberal application of money on the Internet could fix in no time. But quality fog machines are too expensive, and the cheap machines are just, well, cheap. Stuck between $800 and quickly broken crap, he decided instead to fashion his own.
Fortunately for him, a recent fad has made it so that a certain segment of the populace absolutely require dramatic clouds of scented drug fog or they get cranky. The market saw an opportunity, cost optimized, and now there are …read more(image)
Thu, 27 Oct 2016 20:00:00 +0000
Sure, you could animate some Halloween lights using a microcontroller, some random number generation and some LEDs, and if the decorations are powered by AC, you could use some relays with your microcontroller. What if you don’t have that kind of time? [Gadget Addict] had some AC powered decorations that he’d previously animated with an Arduino and some relays, but this year wanted to do something quicker and simpler.
In another video, he goes over the wiring of a fluorescent starter to create a flickering effect with an incandescent light bulb. A fluorescent starter works because the current heats up …read more(image)
Thu, 27 Oct 2016 18:31:05 +0000
The PacTec Security Conference in Tokyo had something interesting show up. A countermeasure against drones that allows you to take control of any craft using the popular DSMx protocol. According to Ars Technica, DSMx transmitters and receivers exchange a key to prevent interference between adjacent systems. The key isn’t protected very well so by observing traffic and applying a little brute force, you can recover the key (which is set when the transmitter binds to the aircraft).
What’s more is a timing vulnerability allows the rogue transmitter to lock out the legitimate one. You can see a demonstration of the …read more(image)