High School Students End The Scourge Of Watery Ketchup With 3D Printing

Screen Shot 2014-04-22 at 12.00.02 PM Kids these days! If they’re not wilding and smoking doobies, they’re using CAD/CAM software and a lot of engineering insight to build a ketchup bottle cap that ensures that you will never have to deal with the messy separated liquid that squirts out before the actual ketchup does. Read More

Turn Your Raspberry Pi Into A Computer From The 80s Using Commodore Pi

Screen Shot 2014-04-11 at 4.38.48 PM As a former user of the Atari 800XL, I find the Commodore line to be piffle at best but I’ll become a bit more catholic in my support of decades-old hardware and tell you a bit about the Commodore Pi, a wacky emulator that turns your Raspberry Pi into a real, multi-tasking Commodore. Read More

How To Play Quake (Again) On Your Raspberry Pi

A month ago, the folks at Raspberry Pi announced that they now had access, thanks to Broadcomm, to an open driver for the BCM21553 cellphone processor chip. This meant that DIYers now had complete access to the board and would be able to access the onboard Raspberry BCM2835 chip (a similar chip to the BCM21553) with an open source driver – as long as someone ported it over from the BCM21553. Read More

Watch a Mad Scientist Build and Ride a 128-Degree Heated Snowboard

It’s easy to forget on the slopes, but your speed depends on the thin film of water created by your snowboard (or skis). So it follows that more heat below your feet would mean more speed, right? Signal Snowboards’s Dave Lee just built a heated snow board to find out.

Read more…


    



This Handy Hack Makes Any Receipt Printer Spit Out the Constitution

This Handy Hack Makes Any Receipt Printer Spit Out the Constitution

Ever have that sense of panic when you’re standing in line at the grocery store and can’t remember your constitutional rights? Well, then you need the CONSTI2GO, a clever little device that lets you print out a full copy of the U.S. Constitution in receipt form.

Read more…


    



In 2 Minutes You Can…

This article was written on March 28, 2008 by CyberNet.

macbook hacked …brush your teeth, grab a cup of coffee, email a friend, or hack a MacBook Air. Just like last year the CanSecWest conference is currently going on, and tons of hackers cram in to see who can be the first to hack one of the laptops that are provided. The first nerd person to forcefully gain control of one out of the three laptops not only takes home that laptop, but also receives a worthwhile $10,000 cash prize.

The three laptops that were being attacked were a VAIO VGN-TZ37CN running Ubuntu 7.10, Fujitsu U810 running Vista Ultimate SP1, and a MacBook Air running OSX 10.5.2. On the first day of the contest the rules were kind of strict, and the hackers could only go after the computers over the network. There was a strong stench of failure in the air that day.

Then yesterday they decided to let go a bit and let the hackers direct the contest organizers to a website that they created to run malicious code. Charlie Miller, the first one to hack the iPhone last year, was all over it and almost immediately gained access to the MacBook Air. It took him a whopping 2 minutes to get into the system, but no one knows exactly how he did it because he was forced to sign a nondisclosure agreement. Many expect that the vulnerability lies in Apple’s Safari browser.

In case you’re wondering, contestants like Charlie had to follow these guidelines for their attack:

  • You can’t use the same vulnerability to claim more than one box, if it is a cross-platform issue.
  • Thirty minute attack slots given to contestants at each box.
  • Attacks are done via crossover cable. (attacker controls default route)
  • No physical access to the machines.
  • Major web browsers (IE, Safari, Konqueror, Firefox), widely used and deployed plugin frameworks (AIR, Silverlight), IM clients (MSN, Adium, Skype, Pigdin, AOL, Yahoo), Mail readers (Outlook, Mail.app, Thunderbird, kmail) are all in scope.

So congrats to Charlie. Apple… get to work! 😉

CanSecWest [via PC World]
Thanks to CoryC for the tip!
Part of the image via bid burglar!

Copyright © 2014 CyberNetNews.com

A Mario Coin Doorbell Grants Infinite Annoyance

How do you spice up your apartment’s doorbell without resorting to some over-obnoxious chime? If you happen to be programmer and Super Mario fan Joseph Thai, you hack the button outside your door to let visitors collect coins every time they push the button, triggering authentic sound effects from the game.

Read more…


    



If You Watch One Video Of A Robot Playing Air Hockey Today, Make It This One

mesa

As a fan of robots, videos, and pucks, I was mesmerized by this project. It’s a a cool 3D printer hack that allows you to play a robot in a rousing game of air hockey. The system uses a computer vision component to see where the pucks is, send it back to the opponent, and even set up shots when it loses.

The creator Jose Julio wrote that his daughter loved air hockey and wanted someone to play with. Instead of helping her make friends, he used parts of a 3D printer and a PS3 Eye connected to a PC to handle video capture and analysis.

You can even make your own with Jose’s build manual.

via
3Ders

Hack a 3D Printer Into a Surprisingly Skilled Air Hockey Robot

Hack a 3D Printer Into a Surprisingly Skilled Air Hockey Robot

Good news for anyone who dropped a small fortune on a 3D printer and found themselves bored of creating novelty keychains and meme-based figurines. Jose Julio successfully turned the parts needed to build a RepRap 3D printer into an air hockey-playing robot that looks pretty tough to beat.

Read more…


    



Great, Hackers Can Use Snapchat to DoS Attack Your Phone

Great, Hackers Can Use Snapchat to DoS Attack Your Phone

When it comes to security, this hasn’t been Snapchat’s year. First hackers leaked a massive amount of private user data; then we discovered how dumb easy it is to circumvent Snapchat’s anti-robot feature. Now, cyber security researchers have shown that Snapchat can be used to launch a denial-of-service attack that freezes your smartphone, according to the L.A. Times.

Read more…