×

Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

  • Researchers Moot "Teleportation" Via Destructive 3D Printing

    ErnieKey writes Researchers from German-based Hasso Plattner Institute have come up with a process that may make teleportation a reality — at least in some respects. Their 'Scotty' device utilizes destructive scanning, encryption, and 3D printing to destroy the original object so that only the received, new object exists in that form, pretty much 'teleporting' the object from point A to point B. Scotty is based on an off-the-shelf 3D printer modified with a 3-axis milling machine, camera, and microcontroller for encryption, using Raspberry Pi and Arduino technologies." This sounds like an interesting idea, but mostly as an art project illustrating the dangers of DRM. Can you think of an instance where you would actually want the capabilities this machine claims to offer?

    162 comments | 4 days ago

  • Librem: a Laptop Custom-Made For Free/Libre Software

    Bunnie Huang's Novena laptop re-invents the laptop with open source (and Free software) in mind, but the hackability that it's built for requires a fair amount of tolerance on a user's part for funky design and visible guts. New submitter dopeghost writes with word of the nearly-funded (via Crowd Supply) Librem laptop, a different kind of Free-software machine using components "specifically selected so that no binary blobs are needed in the Linux kernel that ships with the laptop." Made from high quality components and featuring a MacBook-like design including a choice of HiDPI screen, the Librem might just be the first laptop to ship with a modern Intel CPU that is not locked down to require proprietary firmware.

    Richard M. Stallman, president of the FSF, said, "Getting rid of the signature checking is an important step. While it doesn't give us free code for the firmware, it means that users will really have control of the firmware once we get free code for it."
    Unlike some crowdfunding projects, this one is far from pie-in-the-sky, relying mostly on off-the-shelf components, with a planned shipping date in Spring of this year: "Purism is manufacturing the motherboard, and screen printing the keyboard. Purism is sourcing the case, daughter cards, memory, drives, battery, camera, and screen."

    227 comments | about a week ago

  • NJ Museum Revives TIROS Satellite Dish After 40 Years

    evanak writes TIROS was NASA's Television Infrared Observation Satellite. It launched in April 1960. One of the ground tracking stations was located at the U.S. Army's secret "Camps Evans" Signals Corps electronics R&D laboratory. That laboratory (originally a Marconi wireless telegraph lab) became the InfoAge Science Center in the 2000s. [Monday], after many years of restoration, InfoAge volunteers (led by Princeton U. professor Dan Marlowe) successfully received data from space. The dish is now operating for the first time in 40 years! The received data are in very raw form, but there is a clear peak riding on top of the noise background at 0.4 MHz (actually 1420.4 MHz), which is the well-known 21 cm radiation from the Milky Way. The dish was pointing south at an elevation of 45 degrees above the horizon.

    28 comments | about a week ago

  • Insurance Company Dongles Don't Offer Much Assurance Against Hacking

    According to a story at Forbes, Digital Bond Labs hacker Corey Thuen has some news that should make you think twice about saving a few bucks on insurance by adding a company-supplied car-tracking OBD2 dongle: It’s long been theorised that [Progressive Insurance's Snapshot and other] such usage-based insurance dongles, which are permeating the market apace, would be a viable attack vector. Thuen says he’s now proven those hypotheses; previous attacks via dongles either didn’t name the OBD2 devices or focused on another kind of technology, namely Zubie, which tracks the performance of vehicles for maintenance and safety purposes. ... He started by extracting the firmware from the dongle, reverse engineering it and determining how to exploit it. It emerged the Snapshot technology, manufactured by Xirgo Technologies, was completely lacking in the security department, Thuen said. “The firmware running on the dongle is minimal and insecure. It does no validation or signing of firmware updates, no secure boot, no cellular authentication, no secure communications or encryption, no data execution prevention or attack mitigation technologies basically it uses no security technologies whatsoever.”

    199 comments | about a week ago

  • Nintendo Power Glove Used To Create 'Robot Chicken'

    dotarray (1747900) writes "Despite its glorious introduction in The Wizard, the Nintendo Power Glove was, from all accounts, a bit of a failure. However, Dillon Markey has given the doomed peripheral a new lease of life — it's a crucial part of making stop-motion animation for Robot Chicken." The linked article doesn't have many more words, but the video it features is worthwhile to see how Markey has modified the glove to make the tedious work of stop-motion a little bit less tedious.

    40 comments | about a week ago

  • Engineer Combines Xbox One, PS4 Into Epic 'PlayBox' Laptop

    MojoKid writes We can finally stop arguing over which is the superior game console, the PlayStation 4 or Xbox One. Quite frankly, it's a pointless debate, and it took a self-taught engineer to put the argument to rest, which he did by combining both game systems into a 22-inch laptop. Meet the "PlayBox," a gaming laptop that's equal parts Xbox One and PS4 rolled into one. The PlayBox wins the argument because it allows you to play games on either system, and when it comes down to it, the ability to play games is all that matters. Built for a "specific customer," the owner of this prototype system needn't worry about exclusives since he now has a system that can play them all, and do it while taking up no more space than a single console.

    78 comments | about two weeks ago

  • Wireless Keylogger Masquerades as USB Phone Charger

    msm1267 writes: Hardware hacker and security researcher Samy Kamkar has released a slick new device that masquerades as a typical USB wall charger but in fact houses a keylogger capable of recording keystrokes from nearby wireless keyboards. The device is known as KeySweeper, and Kamkar has released the source code and instructions for building one of your own. The components are inexpensive and easily available, and include an Arduino microcontroller, the charger itself, and a handful of other bits. When it's plugged into a wall socket, the KeySweeper will connect to a nearby Microsoft wireless keyboard and passively sniff, decrypt and record all of the keystrokes and send them back to the operator over the Web.

    150 comments | about two weeks ago

  • Ask Slashdot: Options For Cheap Home Automation?

    New submitter goose-incarnated writes I'm looking at cheap and simple home automation. Unfortunately I'm not too clued up on what my options are. There are such a wide array of choices, none of which seem (to me) to be either cheap or simple. I'd like to: Turn switches on/off (lights, wall sockets, general relays, etc); Read the status of on/off switches; Read analog samples (for example, temperature sensors); 'Program' switches based on analog samples/existing switches (for example, program a relay to come on at 30C and go off at 25C, thereby controlling the temperature); Similarly, program switches to go on/off at certain times; Record the samples of analog or digital inputs for a given time . I'd like to do the above using smartphone+bluetooth (for when I'm in the vicinity of the room), or smartdevice+WiFi (for when I'm in the house, somewhere), or even in a pinch, using HTTP to access a server at home from 600km away (which is what I'm willing to do). I'm definitely not willing to stream all my requests/data/responses through a third-party so third party cloud subscription solutions, even if free, are out of the question. Finally (because I know the Slashdot crowd likes a challenge :-)), I'd like something that is easily reprogrammable without having to compile code, then reflash a device, etc. What languages for embedded devices exist for home automation programming, if any. A quick google search reveals nothing specially made for end-users to reprogram their devices, but, like I said above, I'm clueless about options.

    189 comments | about two weeks ago

  • Hackers Leak Xbox One SDK Claiming Advancement In Openness and Homebrew

    MojoKid writes Microsoft, it seems, just can't catch a break. Days after a major hack took its servers offline on Christmas day, and after being lambasted in multiple stories for shipping games like Halo: The Master Chief Collection in nigh-unplayable condition, the company's Xbox One SDK has been leaked to the public by a group calling itself H4LT. H4LT, which apparently objects to being called a hacker group, offered this explanation when asked why it was distributing the SDK. The group claims that "the SDK will basically allow the community to reverse and open doors towards homebrew applications being present on the Xbox One." To be clear, what H4LT has done is a far cry from groups like Lizard Squad. The SDK for any given product is typically available behind some degree of registration, but they don't necessarily cost anything. The SDK is one small component of creating the ecosystem that would be necessary to get homebrew up and running on the platform. Whether or not users will ever pull it off is another question.

    86 comments | about three weeks ago

  • Putting a MacBook Pro In the Oven To Fix It

    An anonymous reader writes: A post at iFixit explains how one user with a failing MacBook Pro fixed it by baking it in the oven. The device had overheating issues for months, reaching temperatures over 100 C. When it finally died, some research suggested the extreme heat caused the logic board to flex and break the solder connections. The solution was to simply reflow the solder, but that's hard to do with a MBP. "Instead, I cracked open the back of my laptop, disconnected all eleven connectors and three heat sinks from the logic board, and turned the oven up to 340 F. I put my $900 part on a cookie sheet and baked it for seven nerve-wracking minutes. After it cooled, I reapplied thermal paste, put it all back together, and cheered when it booted. It ran great for the next eight months." The laptop failed again, and another brief vacation into the oven got it running once more.

    304 comments | about a month ago

  • Glowing Hobbit Sword Helps You Find Unsecured Wi-Fi

    Molly McHugh writes By disassembling your plastic Sting and incorporating the Spark Core, a tiny Wi-Fi development kit, you can hack the toy's light and enlist it to show you when you are near an unsecure network. The best part about this hack? It only requires two things: a Spark Core and a replica Sting with lights and sound, like this one."

    67 comments | about a month ago

  • Quake On an Oscilloscope

    An anonymous reader writes: Developer Pekka Väänänen has posted a fascinating report on how he got Quake running on an oscilloscope (video link). Obviously, the graphic details gets stripped down to basic lines, but even then, you need to cull any useless or unseen geometry to make things run smoothly. He says, "To cull the duplicates a std::unordered_set of the C++ standard library is used. The indices of the triangle edges are saved in pairs, packed in a single uint64_t, the lower index being first. The set is cleared between each object, so the same line could still be drawn twice or more if the same vertices are stored in different meshes. Before saving a line for end-of-the-frame-submit, its indices in the mesh are checked against the set, and discarded if already saved this frame. At the end of each frame all saved lines are checked against the depth buffer of the rendered scene. If a line lies completely behind the depth buffer, it can be safely discarded because it shouldn't be visible."

    71 comments | about a month ago

  • Ask Slashdot: Best Wireless LED Light Setup for 2015?

    An anonymous reader writes I want to get a jump-start on next year's Christmas by wiring up my mother's gnome garden for a Christmas light show. I need a setup that can use wireless LED lights and speakers, the lights using a custom sequence set to music, that can be controlled remotely indoors to go off on a schedule, say every hour. Do you know of an off-the-shelf setup that is cheap and works seamlessly, especially for someone with little to no coding or custom building experience?

    68 comments | about a month ago

  • How Laws Restricting Tech Actually Expose Us To Greater Harm

    An anonymous reader writes: Cory Doctorow has an article in Wired explaining why crafting laws to restrict software is going to hurt us in the long run. The reason? Because we're on an irreversible trajectory toward integrating technology with our cars and houses, bodies and brains. If we don't control the software, then at some point, we won't control parts of our homes and our selves. Doctorow writes, "Any law or regulation that undermines computers' utility or security also ripples through all the systems that have been colonized by the general-purpose computer. And therein lies the potential for untold trouble and mischief.

    Code always has flaws, and those flaws are easy for bad guys to find. But if your computer has deliberately been designed with a blind spot, the bad guys will use it to evade detection by you and your antivirus software. That's why a 3-D printer with anti-gun-printing code isn't a 3-D printer that won't print guns—the bad guys will quickly find a way around that. It's a 3-D printer that is vulnerable to hacking by malware creeps who can use your printer's 'security' against you: from bricking your printer to screwing up your prints to introducing subtle structural flaws to simply hijacking the operating system and using it to stage attacks on your whole network."

    116 comments | about a month ago

  • Many DDR3 Modules Vulnerable To Bit Rot By a Simple Program

    New submitter Pelam writes: Researchers from Carnegie Mellon and Intel report that a large percentage of tested regular DDR3 modules flip bits in adjacent rows (PDF) when a voltage in a certain control line is forced to fluctuate. The program that triggers this is dead simple — just two memory reads with special relative offset and some cache control instructions in a tight loop. The researchers don't delve deeply into applications of this, but hint at possible security exploits. For example a rather theoretical attack on JVM sandbox using random bit flips (PDF) has been demonstrated before.

    138 comments | about a month ago

  • Extracting Data From the Microsoft Band

    An anonymous reader writes The Microsoft Band, introduced last month, hosts a slew of amazing sensors, but like so many wearable computing devices, users are unable to access their own data. A Brown University professor decompiles the app, finds that the data is transmitted to the Microsoft "cloud", and explains how to intercept the traffic to retrieve the raw minute-by-minute data captured by the Band.

    51 comments | about a month ago

  • The Personal Computer Revolution Behind the Iron Curtain

    szczys writes Obviously the personal computer revolution was world-wide, but the Eastern Bloc countries had a story of PC evolution all their own. Martin Malý tells first hand of his experiences seeing black market imports, locally built clones of popular western machines, and all kinds of home-built equipment. From the article: "The biggest problem was a lack of modern technologies. There were a lot of skilled and clever people in eastern countries, but they had a lot of problems with the elementary technical things. Manufacturing of electronics parts was divided into diverse countries of Comecon – The Council for Mutual Economic Assistance. In reality, it led to an absurd situation: You could buy the eastern copy of Z80 (made in Eastern Germany as U880D), but you couldn’t buy 74LS00 at the same time. Yes, a lot of manufacturers made it, but 'it is out of stock now; try to ask next year.' So 'make a computer' meant 50 percent of electronics skills and 50 percent of unofficial social network and knowledge like 'I know a guy who knows a guy and his neighbor works in a factory, where they maybe have a material for PCBs' at those times."

    115 comments | about a month and a half ago

  • Linux On a Motorola 68000 Solder-less Breadboard

    New submitter lars_stefan_axelsson writes: When I was an undergrad in the eighties, "building" a computer meant that you got a bunch of chips and a soldering iron and went to work. The art is still alive today, but instead of a running BASIC interpreter as the ultimate proof of success, today the crowning achievement is getting Linux to run: "What does it take to build a little 68000-based protoboard computer, and get it running Linux? In my case, about three weeks of spare time, plenty of coffee, and a strong dose of stubbornness. After banging my head against the wall with problems ranging from the inductance of pushbutton switches to memory leaks in the C standard library, it finally works! (video)"

    147 comments | about 2 months ago

  • Ask Slashdot: What's the Most Hackable Car?

    An anonymous reader writes: When looking for a new (or used) car, I have readily available information regarding features, maintenance history, and potential issues for that specific model or generation. What I would really like is a car that is readily hackable on the convenience-feature level. For example, if I want to install a remote starter, or hack the power windows so holding 'up' automatically rolls it up, or install a readout on the rear of the car showing engine RPMs, what make/model/year is the best pick? Have any of you done something similar with your vehicle? Have you found certain models to be ideal or terrible for feature hacking?

    195 comments | about 2 months ago

  • Ask Slashdot: How Do I Make a High-Spec PC Waterproof?

    jimwormold writes: I need to build a system for outdoor use, capable of withstanding a high pressure water jet! "Embedded PC," I hear you cry. Well, ideally yes. However, the system does a fair bit of number crunching on a GPU (GTX970) and there don't appear to be any such embedded systems available. The perfect solution will be as small as possible (ideally about 1.5x the size of a motherboard, and the height will be limited to accommodate the graphics card). I'm U.K.- based, so the ambient temperature will range from -5C to 30C, so I presume some sort of active temperature control would be useful.

    I found this helpful discussion, but it's 14 years old. Thus, I thought I'd post my question here. Do any of you enlightened Slashdotters have insights to this problem, or know of any products that will help me achieve my goals?

    202 comments | about 3 months ago

Slashdot Login

Need an Account?

Forgot your password?