The public's opinion
of the field of climatology has been shaken by the leaked
CRU emails. While it's arguable
that the messages show any wrongdoing
, many pundits
have now reached the conclusion that global warming is a hoax, coverup and conspiracy, years in the making with millions of faked datapoints. Sarah Palin has written an editorial
saying Obama should boycott the Copenhagen COP15
posted by mccarty.tim
on Dec 9, 2009 -
is a Baltimore phenomenon that allows citizens to get cheap "illegal" rides across town. A hack indicates they want a ride by motioning their pointer finger towards the ground as they walk along the street. Inevitably a driver will stop, the two parties will negotiate a price and a ride will be given. It is both a dangerous
part of the blighted Baltimore economy.
posted by cloeburner
on Nov 9, 2009 -
Neurosecurity: security and privacy for neural devices.
"An increasing number of neural implantable devices will become available in the near future due to advances in neural engineering. This discipline holds the potential to improve many patients' lives dramatically by offering improved—and in some cases entirely new—forms of rehabilitation for conditions ranging from missing limbs to degenerative cognitive diseases. The use of standard engineering practices, medical trials, and neuroethical evaluations during the design process can create systems that are safe and that follow ethical guidelines; unfortunately, none of these disciplines currently ensure that neural devices are robust against adversarial entities trying to exploit these devices to alter, block, or eavesdrop on neural signals. The authors define 'neurosecurity'—a version of computer science security principles and methods applied to neural engineering—and discuss why neurosecurity should be a critical consideration in the design of future neural devices." [Via Mind Hacks]
posted by homunculus
on Jul 8, 2009 -
is an automated Twitter feed providing helpful links to news items from the past 14 years that might be relevant to current events. For example, when masses of people started googling medical information
after a news item about 200,000 patients' medical histories being accidentally exposed, NPRbackstory linked to an April 2008 analysis of the advantages and disadvantages of storing patient records online. [more inside]
posted by ardgedee
on May 14, 2009 -
Serious as a heart attack:
A collaboration of various medical researchers in the academic field has led to proof that pacemakers can be remotely hacked
with simple and accessible equipment. This is a proof of concept, but the real question is: How many other pacemakers and medical devices are similarly vulnerable? (Writers may note a new twist available for the assassination of characters in their novels and screenplays.)
posted by spock
on Aug 13, 2008 -
isn't quite a roguelike about hacking in the world of Shadowrun
with Windows 3.1-era graphics, but it's as close as you're ever gonna come.
posted by Pope Guilty
on Apr 26, 2008 -
Ever admired those hard-working hackers, toiling away to get you the programs you've always loathed to have? Have you ever dreamt of exploring the innards of someone else's computer but have held back due to those pesky legalities? If you said yes to either of the above questions or just want to play an online hacking simulation, then SlaveHack
is the website for you. [more inside]
posted by flatluigi
on Dec 23, 2007 -
This is an ironic tale of the consequences of inept application of cryptographic tools. Or is it?
Dan Egerstad, a Swedish hacker, gained access to hundreds of computer network accounts around the world, belonging to various embassies, corporations and other organizations. How did he do it? Very easily:
by sniffing exit traffic on his Tor
nodes. [more inside]
posted by Anything
on Dec 4, 2007 -
Compromise any Windows XP machine
(that you have physical access to) with one single line of code. Even if you're logged on as guest, this cmd line text will upgrade your account to root level on the fly, after which time you can do anything you wish to the machine, (even reformat the drive & install linux!). ACHTUNG: Link goes to video that, for inexplicable reasons, has Limp Bizkit for the soundtrack.
posted by jonson
on Aug 1, 2006 -
I am computer literate!
I have 22 years in computer systems engineering and operation. Now, can you tell me how to remove "your software" that you acknowledge you provided free of charge? I consider this "hacking". I have no fear of the media, in fact I welcome this publicity.
posted by rxrfrx
on Mar 25, 2006 -
"To tell the truth ... I'm sorta surprised they haven't caught me yet,"
The Washington Post ran an interesting interview with a botmaster, a young man who made serveral thousands of dollars a month installing XXX spyware on machines that he controlled. He installed the software on the machines of people he did not know by hacking into them remotely. The lenghty article included a partial photo of the botmaster along with vauge descriptions of the small midwestern town where the man lives, and was published with the understanding that the man's identity would be kept secret.
Someone should have told that to the person that manages photos at the Washington Post. An estute reader over at Slashdot was able to locate some extra information stored in the picture's metadata
including the photographer and the location the picture was taken, Roland, Oklahoma, a town of less than 3000 people. Whoops.
posted by daHIFI
on Feb 21, 2006 -
Judge: Stealing a password does not constitute hacking.
David Egilman is a highly-regarded expert in occupational medicine; he was the plaintiff's witness in a recent $253-million verdict in Texas against Vioxx. After two opposing law firms stole a password to his private website containing confidential information for his clients and students, he sued them under the DMCA. He lost
posted by docgonzo
on Dec 14, 2005 -
In some ways, Gary McKinnon is indeed a complete idiot. Well, he is a likable and intelligent geeky man who did many, many idiotic things. What he is not, his friends and supporters reckon, is someone who deserves extradition and 70 years in an American jail.
posted by Grangousier
on Jul 9, 2005 -
Covert Call allows you to alter the caller id that is sent to the phone you are calling. It can operate just like a calling card, all for the price of a normal long distance call.
Caller-ID spoofing for 5¢ a minute, for all your prankster/paranoid/social engineering needs.
posted by crunchland
on Feb 10, 2005 -
GMail not-so-safe Mail.
So apparentley GMail has a major exploit that's been discovered by an Israeli hacker. "Using a hex-encoded XSS link, the victim's cookie file can be stolen by a hacker, who can later use it to identify himself to Gmail as the original owner of an email account, regardless of whether or not the password is subsequently changed."
And so the fun with GMail begins..
posted by mrplab
on Oct 29, 2004 -
Do you have an ATI Radeon video card?
If so, Adrian's Rojak Pot has a story up that shows you how to convert your Radeon based video card into a Fire GL card, with no physical modification through a process which modifies the video BIOS. The difference primarily between a normal Radeon video
card and a Fire GL card
is (drum roll.....) $120+ dollars, and enhancements designed for CAD and rendering programs. (entire list of certified programs that take advantage of Fire GL are in this PDF
, including Adobe Premier) Video BIOS images are available here
. Of course, modding your video card is certainly nothing new
, as hacking ones BIOS
can be an easy (if not somewhat dangerous) way to get more power from your investment. (Note: Although you can save a bad flash
, the process is somewhat difficult. Attempt mod at your own risk.)
posted by Keyser Soze
on Jun 17, 2004 -
News 14 in North Carolina had an online system where people could post school closings, etc that would scroll on the screen. The postings all got reviewed before they went live, but after they’d been reviewed/approved, the system was open for the original poster to go back and change the copy
, so you could essentially submit something benign, then go back and monkey with it. Screen shots of the results
posted by jonson
on Mar 9, 2004 -