Category Archives: computer hacks

The Legacy Of The Floppy Still Looms Over Windows

We no longer use floppy disks on the vast majority of computers, but a recent Old New Thing blog post from Microsoft sheds light on one of their possible unexpected legacies. It seems Windows disk cache items expire after two seconds, and as the post explains this has its origin …read more

Continue reading

Posted in computer hacks, dos, floppy disk, microsoft, windows | Leave a comment

Dual Screen Laptop Is A Slick DIY Build

Laptops are great for portable productivity, but ergonomically they can leave something to be desired. They tend to force the user to look down, creating neck strain over extended periods. Rather than invest in expensive massages, [DIY Perks] decided what he really wanted was a dual screen laptop. So he …read more

Continue reading

Posted in computer hacks, dual monitor, dual screen, laptop | Leave a comment

An Arduino Enhances This 7400 CPU

How quickly could you make an entire computer from 74 series logic, from scratch? [Richard Grafton had only 30 days until the UK’s Retro Computer Festival and set out to design and build his Cambridge-1 computer in that time. The result is a machine spread across several breadboards, with neatly …read more

Continue reading

Posted in 4-bit, 74 logic, computer hacks, cpu | Leave a comment

Atomic Pi Gets A 3D-Printed Mac Makeover

The Atomic Pi is a pretty impressive piece of kit for the price, but it’s not exactly a turn-key kind of product. Even to a greater extent than what you might normally expect with a “dev” board like this, the user is responsible for putting together the rest of the …read more

Continue reading

Posted in 3D printed enclosure, Atomic Pi, Cheese Grater, computer hacks, mac pro, parts, power supply | Leave a comment

Cheese Grater Now Grates Cheese

If you’ve been using Apple products since before they were cool, you might remember the Power Mac G5. This was a time before Apple was using Intel processors, so compatibility issues were high and Apple’s number of users was pretty low. They were still popular in some areas but didn’t …read more

Continue reading

Posted in 3d printed, apple, cheese, computer hacks, g5, grater, mac, power mac, Raspberry Pi | Leave a comment

This week in Security: Mass iPhone Compromise, More VPN Vulns, Telegram Leaking Data, and the Hack of @Jack

In a very mobile-centric installment, we’re starting with the story of a long-running iPhone exploitation campaign. It’s being reported that this campaign was being run by the Chinese government. Attack attribution is decidedly non-trivial, so let’s be cautious and say that these attacks were probably Chinese operations.

In any case, …read more

Continue reading

Posted in 0-day, computer hacks, Hackaday Columns, ios, security hacks, This Week in Security, twitter | Leave a comment

Another World On The Apple II

What’s more fun than porting an old game released for an old system such as the Apple IIgs to its 10-year-older predecessor, the Apple II from 1977? Cue [Deater]’s port of the classic video game ‘Another World‘ to the original Apple II. As was fairly obvious from the onset, the …read more

Continue reading

Posted in apple II, Apple IIGS, classic hacks, computer hacks, Games, retrocomputing, retrogaming | Leave a comment

This Week in Security: KNOB, Old Scams Are New Again, 0-days, Backdoors, and More

Bluetooth is a great protocol. You can listen to music, transfer files, get on the internet, and more. A side effect of those many uses is that the specification is complicated and intended to cover many use cases. A team of researchers took a look at the Bluetooth specification, and …read more

Continue reading

Posted in 0-day, bluetooth, computer hacks, Hackaday Columns, knob, security hacks, siri | Leave a comment

Sushi Roll Helps Inspect Your CPU Internals

[Gamozolabs’] post about Sushi Roll — a research kernel for monitoring Intel CPU internals — is pretty long. While we were disappointed at the end that the kernel’s source is not exactly available due to “sensitive features”, we were so impressed with the description of the modern x86 architecture and …read more

Continue reading

Posted in cache, computer hacks, CPU architecture, intel, pentium, speculative execution | Leave a comment

This Week in Security: Black Hat, DEF CON, and Patch Tuesday

Blackhat and DEF CON both just wrapped, and Patch Tuesday was this week. We have a bunch of stories to cover today.

First some light-hearted shenanigans. Obviously inspired by Little Bobby Tables, Droogie applied for the vanity plate “NULL”. A year went by without any problems, but soon enough it …read more

Continue reading

Posted in blackhat, computer hacks, DEF CON, Hackaday Columns, news, security hacks, This Week in Security | Leave a comment