- December 2018
- November 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
Category Archives: computer hacks
The greatest hardware hacks of all time were simply the result of finding software keys in memory. The AACS encryption debacle — the 09 F9 key that allowed us to decrypt HD DVDs — was the result of encryption keys just sitting in main memory, where it could be read by any other program. DeCSS, the hack that gave us all access to DVDs was again the result of encryption keys sitting out in the open.
Because encryption doesn’t work if your keys are just sitting out in the open, system designers have come up with ingenious solutions to prevent …read more
[Frank Adams] liked the keyboard on his Lenovo ThinkPad T61 so much that he decided to design an adapter so he could use it over USB with the Teensy microcontroller. He got the Trackpoint working, and along the way managed to add support for a number of other laptop boards as well. Before you know it, he had a full-blown open source project on his hands. Those projects can sneak up on you when you least expect it…
The first step of the process is getting your laptop keyboard of choice connected up to the Teensy, but as you might …read more
One of the first things we learn about computers is the concept of binary ones and zeroes. When we dig into implementation of digital logic, we start to learn about voltages, and currents, and other realities of our analog world. It is common for textbooks to use flow of water as an analogy to explain flow of electrons, and [Glen Anderson] turned that conceptual illustration into reality. He brought his water computer to the downtown Los Angeles Mini Maker Faire this past weekend to show people the analog realities behind their digital devices.
[Glen]’s demonstration is a translation of another …read more
For hackers, cheap (and arguably disposable) consumer hardware makes for a ready supply of free or low-cost components. When you can walk into a big box store and pick up a new low-end laptop for $150, how many are going to spend the money to repair or upgrade the one they have now? So the old ones go to the bin, or get sold online for parts. From an ecological standpoint our disposable society is terrible, but at least we get some tech bargains out of the deal.
Case in point, the dirt cheap 32 GB eMMC SSDs [Jason Gin] …read more
We’re no strangers to 3D printed enclosures here at Hackaday. From the plethora of printed Raspberry Pi cases out there to custom enclosures for electronic projects, small plastic boxes turn out to be an excellent application for desktop 3D printing. But as printers get bigger and filament gets cheaper, those little boxes don’t always need to be so little. We aren’t talking about running off boxes for your sneaker collection either, if you’ve got the time and the print volume, you could whip up an enclosure for your PC.
[Nirav Patel] writes in to share his impressive 3D printed Mini-ITX …read more
Another day, another vulnerability. Discovered by [Kevin Backhouse], CVE-2018-4407 is a particularly serious problem because it is present all throughout Apple’s product line, from the Macbook to the Apple Watch. The flaw is in the XNU kernel shared by all of these products.
This is a buffer overflow issue in the error handling for network packets. The kernel is expecting a fixed length of those packets but doesn’t check to prevent writing past the end of the buffer. The fact Apple’s XNU kernel powers all their products is remarkable, but issues like this are a reminder of the potential downside …read more
We often lament that the days of repairable electronics are long gone. It used to be you’d get schematics for a piece of gear, and you could just as easily crack it open and fix something as the local repairman — assuming you had the knowledge and tools. But today, everything is built to be thrown away when something goes wrong, and you might as well check at the end of a rainbow if you’re searching for a circuit diagram for a new piece of consumer electronics.
But [Robson] writes in with an interesting story that gives us hope that …read more
Even if you aren’t a vintage computer aficionado, you’re probably aware that older computer hard drives were massive and didn’t hold much data. Imagine a drive that weighs several pounds, and only holds 1/1000th of what today’s cheapest USB flash drives can. But what you might not realize is that if you go back long enough, the drives didn’t just have lower capacity, they utilized fundamentally different technology and relied on protocols which are today little more than historical footnotes.
A case in point is the circa 1984 Modified Frequency Modulation (MFM) drive which [Michał Słomkowski] was tasked with recovering …read more
It’s not Apple IIs, and it’s not Raspberry Pis. The most important computing platform for teaching kids programming is the Texas Instruments graphing calculator. These things have been around in one form or another for almost three decades, and for a lot of budding hackers out there, this was the first computer they owned and had complete access to.
As hacking graphing calculators is a favorite for Maker Faires, we were pleased to see Cemetech make it out to this year’s World Maker Faire in New York last weekend. They’re the main driving force behind turning these pocket computers with …read more
The IBM 1401 is a classic computer which IBM marketed throughout the 1960s, late enough for it to have used transistors rather than vacuum tubes, which is probably a good thing for this story. For small businesses, it was often used as their main data processing machine along with the 1403 printer. For larger businesses with mainframes, the 1401 was used to handle the slower peripherals such as that 1403 printer as well as card readers.
The Computer History Museum in Mountain View, CA has two working 1401s as well as at least one 1403 printer, and recently whenever the …read more