background preloader

Geeky

Facebook Twitter

Newstweek. This HOWTO has instructions to build your own Newstweek device, a small innocuous wallplug allowing you to remotely manipulate news read by other people on wireless networks. If you want to learn more about Newstweek, click here. The version you'll be building uses low-cost (and low-power) hardware, capable of fitting into a small plastic enclosure; power transformer and all. This version is not suitable for modifying data on large LANs, rather small LANs with moderate traffic of up to 5 client machines (including tablets and smartphones). This initial version doesn't support APs with HTTP authentication or encryption. It's intended for experimentation on open, unencrypted ('public') APs. Consider it a starting point intended to get you going with the hardware and building your own filters. Rather than using IRC as a control interface (as seen in the project video) we've implemented phone-friendly browser interfaces for local and remote control of the device.

Hardware Source (Deutschland) TLD | Zdenek Kalal. Online | Collin’s Lab: Homebrew Piezo. BoxCar2D. 10 µm Scanning electron microscope from Vidicon tube. Hiding your data in plain sight – USB hardware hiding. —> The PDF version of this article can be found here. This article will describe the possibility of hiding data in any kind of USB hardware. Even though USB data carriers come in various sizes and forms, which already sometimes makes them hard to recognize, this approach could even make it worse.

Any USB device could be a data carrier and thus from a forensics point of view, any USB device should be taken into account when investigating a computer. Or, for example, from a company protection point of view, any USB device could be used to transport data out of the company. The reason for writing this article is that the approach described in it has already been developed by me around 2007, while I was still working for the company Fox-IT. Any brands shown on the pictures in this paper are chosen because they were fairly cheap and available during the research.

Theory The theory behind the hiding of the data is pretty simple. Theory in action Project variations Conclusion. Johnny Chung Lee - Projects - Wii. As of June 2008, Nintendo has sold nearly 30 million Wii game consoles. This significantly exceeds the number of Tablet PCs in use today according to even the most generous estimates of Tablet PC sales.

This makes the Wii Remote one of the most common computer input devices in the world. It also happens to be one of the most sophisticated. It contains a 1024x768 infrared camera with built-in hardware blob tracking of up to 4 points at 100Hz. This significantly out performs any PC "webcam" available today. It also contains a +/-3g 8-bit 3-axis accelerometer also operating at 100Hz and an expandsion port for even more capability. These projects are an effort to explore and demonstrate applications that the millions of Wii Remotes in world readily support.

Any software on this page is primarily meant for developers and may not run without proper the development tools installed. NOTE: For most of these projects, you don't need the Nintendo Wii console. Head Tracking for Desktop VR Displays using the WiiRemote. Daizi Zheng.