"Now we get to the part that moves from jokes and silliness to serious, which is: This is not just now a case study in how not to react to cyber threats and a case study in how to not defend your networks, it's now also a case study in how not to respond to terrorism threats." Cybersecurity expert Peter W. Singer discusses the Sony's reaction to the "Guardians of Peace" hack. [more inside]
How to make a hacked LED Pez Menorah "I've been making these for a few years now, and since people occasionally ask me how to make them I decided to document the process..." [via mefi projects]
How does a Dell laptop know what kind of power adapter is connected? The adapter tells it. Reverse-engineering: Hacking the Dell laptop power adapter 1, 2, 3, 4.
Two 14 Year Olds Hack Winnipeg ATM. "Matthew Hewlett and Caleb Turon, both Grade 9 students, found an old ATM operators manual online that showed how to get into the machine's operator mode.... Hewlett and Turon were even more shocked when their first random guess at the six-digit password worked. They used a common default password." [more inside]
21 [Entirely Totally Completely Seriously True] Simple Hacks That Will Significantly Improve Your Life [slBuzzfeed]
In Super Mario World, if you make the right series of moves with the right game objects, you can cause the game to execute arbitrary code. A particularly delightful use of this feature was recently shown by Masterjun, a tool-assisted speedrun enthusiast. He unveiled the speedrun to the world using an unmodified game cartridge and a Super Nintendo Entertainment System with eight controllers connected through a multitap system at the Awesome Games Done Quick 2014 event. Hack A Day explains the technique. Masterjun explains it in more detail.
For your Sunday reading, a couple of stories of ye olden computing days: Why MacPaint's Original Canvas was 416 Pixels Wide and A Great Old Timey Game Programming Hack.
Vice magazine attempts to get to the bottom of the mystery of the creepiest television hack (moderately NSFW). Previously.
The Langner Group, based in Germany, has published the most detailed report yet on the Stuxnet malware that was used to sabotage Iran's uranium enrichment efforts. [more inside]
What's in the database? Roughly 1,000 records of documents related to phone phreaking history. It includes newspaper and magazine articles, letters, memos, FBI memos, audio recordings, you name it.. Extra Goodies! [more inside]
MOOOOOOM, WE'RE BOOOORED Didn't I buy you that Mario Kart game for your Wii, like, two years ago? Five? YEAH, BUT WE'RE BOOOOOORED But kids, didn't it include something like thirty tracks? YEAH, BUT WE'RE TIIIIIRED OF THOOOOOSE Well, I didn't want to do this so early in the year, but I've got a Christmas present for you that I've been holding on to. You know how you've been saying how you wanted 184 new tracks for Mario Kart Wii? YEAH! WE WERE REALLY SPECIFIC ABOUT THAT NUMBER Well, bust out that Mario Kart Wii disc and an SD card, because Merry Christmas, kids!
The Onion's Twitter feed was apparently hacked by Syrian Electronic Army, the group that recently hacked the White House Twitter account and sent the stock market on a short-lived dive. The Onion has responded to the hack, darkly.
Nothing to see here, but could you _all_ change your passwords? Yup, if you're using Evernote you should really reset your password. Says who? Why, Evernote itself. It looks like they've had a tiny security issue...They say that there is "no evidence that any of the content you store in Evernote was accessed, changed or lost and [...] no evidence that any payment information [..] was accessed". But just to be on the safe side...50 millions users should reset their passwords.
"When I visited China in 1998, Mbantu, the cabbie who drove me from the airport, couldn't stop telling me about how he had to take a fourth job because of the high cost of transportation. I caught up with Mbantu in Shanghai last year. Thanks to China's reformed approach toward transportation, Mbantu has enough money in his pocket to finally be able to afford a playground for his kids."--Thomas Friedman column generator
"During his civil lawsuit against the People's Republic of China, Brian Milburn says he never once saw one of the country's lawyers. He read no court documents from China's attorneys because they filed none. The voluminous case record at the U.S. District courthouse in Santa Ana contains a single communication from China: a curt letter to the U.S. State Department, urging that the suit be dismissed. That doesn't mean Milburn's adversary had no contact with him." [China Mafia-Style Hack Attack Drives California Firm to Brink]
Until last week, the Nook Simple Touch e-reader lacked an indispensable feature: a functional PlayStation emulator.
Get More Out Of Google — in a recent study on student research skills, 3 out of 4 students couldn't perform a "well executed search" on Google. When the success of your term paper hangs in the balance, using Google effectively is crucial, but most students surprisingly just don't know how. Get that and more at Hack College, where you'll get 10 Tips from a Senior to an Incoming Freshman.
Single-serving website to see if your credentials were compromised in the recent posting online of "usernames and passwords for what appeared to be 453,492 accounts belonging to Yahoo, but also Gmail, AOL, Hotmail, Comcast, MSN, SBC Global, Verizon, BellSouth and Live.com users." [via mefi projects]
Guerrilla art group hacks dozens of Astral info pillars. The city's new, redesigned info pillars that have been rapidly popping up around Toronto have made plenty of enemies: road users claim the large, flat sides block sight lines, pedestrians say their positioning blocks sidewalks, and many others are concerned about the large amount of space given over to advertisers. A team of artists, cARTographyTO, hacked into roughly 35 of the signs' ad spaces over the weekend and installed maps, artwork and other visual displays.
A series circuit of 1 battery, 1 resistor, 3 switches, and 3 LEDs. What happens when you turn on each switch? [more inside]
"Ron Paul has regularly met with many A3P members, even engaging in conference calls with their board of directors."
Hacker group Anonymous has discovered that Ron Paul is working directly with the neo-Nazi group American Third Position Party, whose members occupy key posts in Paul's campaign and whose directors have had conference calls with the Congressman and Presidential candidate. The full information release can be viewed at pirasec.org, though the interface is fairly clunky.
The 808 Car Keys Micro Camera is a cheap, poorly made, difficult to use miniature DV camera that is nevertheless embraced by model RC pilots, experimenters, hobbyists, and adventurers. If you want to hack or mod your own, start with Chuck Lohr's vast 808 Car Keys Micro Camera Review page.
How a Security Researcher Discovered the Apple Battery ‘Hack’ - How to destroy Hardware with Software.
ROM hacking, the act of modifying the "cartridge" data for a video game played in an emulator, has been covered before (and before). What you may not know is that intrepid hackers have been at work on more modern systems, producing a wide array of new takes on old classics. New worlds for Mario to explore (also, also, also). A new adventure for Link. Goldeneye levels that are a bit... different. A whole new universe of classes and challenges in Final Fantasy Tactics (gameplay). And HD texture packs for games that haven't aged as well as others. [more inside]
Newstweek: fixing the facts. Newstweek is a device that injects fake news into unsecured wireless connections. More info at hackaday.
Backyard Brains, the people who showed you how to stimulate neurons in a cockroach leg using your iPhone, now bring you the remote controlled roach. [more inside]
Silverpop Systems Inc, an email marketing firm with 105 customers has had its database systems hacked last week. [more inside]
When the Xbox Kinect (previously) was released a month ago, it promised a new era of controller-less gaming. The system is certainly selling well heading into the holidays, but reviews so far are mixed. The minor injuries are expected, but with some less than impressive early game releases, some think that the system is only partially living up to its pre-release hype. But what happens when open source software fanatics get their hands on this new technology? [more inside]
Salon.com's War Room is listing the worst columnists and cable news commentators America has to offer. The Hack 30 presents thirty of the most predictable, dishonest and just plain stupid pundits in the American media. Notables so far include: David Brooks Tucker Carlson Howard Kurtz and Bill Kristol.
12 Fun Hacks for Getting More Out of YouTube Via Mashable All Your Youtube-Hack Needs in 1 Easy Location! 1. TubeReplay. 2. Dragontape. 3. YouTube Doubler. 4. SynchTube. 5. infiniTube. 6. Splicd. 7. TubeChop. 8. YouCube. 9. MixTube. 10. YouFlow. 11. QuieTube. 12. YouTube TestTube. Some tubes have been listed previously.
Gijs Gieskes is an astonishing inventor/hacker/bender/maker of electro/mechanical/audio/artistic devices.
Can you write a hack in 140 characters? Someone figured out how, and now Twitter is infested with them. They say they'll have a fix today. In the mean time, the twitter page belonging to the wife of the British PM has been hacked, making it redirect to a Japanese porn site.
"We could have reprogrammed it to steal votes, but that's been done before, and Pac-Man is more fun!"
This isn't your grandpa's PEEK and POKE. Real-time graphical hacking of the Commodore 64 system.
CGI-brows (link goes to video on Vimeo which contains a naughty word but is otherwise SFW.) A short mockumentary about extreme emoting through SFX by RocketSausage (Dir. Andrew Gaynord) which has won the Virgin Media Shorts People's Choice Award for 2009.
Jan Chipchase is employeed by Nokia in the "corporate anthropology" field, but he considers it "design research," as he's not an anthropologist by training. His work covers researching how people modify their phones in China, India, Ghana, and elsewhere, adding features or extending battery life. He also tracks how cellphones are associated with personal identity and how they are playing roles far from urban and suburban centers. In some locations, cell phone numbers are written above doorways for identification, when there is no official map or organization for streets. He also blogs about his experiences, and his most recent post, he covers the rise of "Super Fakes." [more inside]
TechCrunch claims it has been sent hundreds of internal Twitter documents from passcodes to meeting notes. Today the site released several of the documents, including financial projections. The documents were provided by "Hacker Croll" and were accessed in May. [more inside]
The Happy Hacker offers you the secrets and tools to become an Überhacker and Cyberwarrior, and even how to build a railgun. But who is this Happy Hacker? Though other folks are now involved with the website, Carolyn P. Meinel is the primary face of The Happy Hacker. She is a long-time computer hacker, going back to getting unapproved access to the PLATO system (previously). She started Happy Hacker because "all sorts of guys were begging me, 'teach me how to hack'." Her webpage gained attention, getting mentioned in The Happy Mutant Handbook, and being invited to speak at Defcon. But there are people who doubt her credentials, and others who are a lot more harsh. Regardless of the backlash, and the appearance that the peak of The Happy Hacker has passed, her articles are still being published.