By Lucas Pollock
Posted 07.30.2011 at 2:04 pm
When Jacob Appelbaum spoke at a workshop for Arab bloggers in Beirut in 2009, he knew his audience would pay special attention. The 26-year-old American programmer had spent the previous year in Egypt, Jordan, Syria, Tunisia and Hong Kong training communities and activists how to use an increasingly popular program called Tor to evade government attempts to track their movements online.
read more about > governments,
hack,
hackers,
headlines,
Internet,
Middle East,
pentagon,
revolutions,
september 2011,
software,
tor,
wikileaks
Electronics geeks hacking oscilloscopes fall, for me, into the same category as support truck racing at Dakar: Technicians having fun with their tools. Following in the proud tradition of Oscilloscope Tennis, Oscilloscope Pong, and Oscilloscope Clocks, Matthew Sarnoff has built a VT100 serial terminal - from an oscilloscope.
Well, that didn't take long. Only two weeks after Barnes and Noble's Nook e-Book reader hit the shelves, hackers have already posted instructions for converting the machine into an Android tablet PC with a free cellular Internet connection. And while no applications currently exist for the reset reader, that's sure to change.
While tech pundits chronicle the saga of Open Computer, you could be making one
By Megan Miller
Posted 04.16.2008 at 4:50 pm
The Web has been abuzz this week with speculation about the company Psystar, which recently appeared out of nowhere offering (for just $399) a PC called the Open Computer that runs OS X Leopard.
Scarier than identity theft: the prospect of a stranger controlling your heart
By Matt Ransford
Posted 03.13.2008 at 3:53 pm
Personal information in the digital realm is always susceptible to malicious activity. Passwords can be stolen from a database, credit card numbers swiped at the point of sale; even the new American passports contain RFID chips which critics claim can be surreptitiously read. Now, even a pacemaker can be hacked from the outside.
The ultra-high-tech code-cracking weapon? A can of spray duster
By Seth Fletcher
Posted 02.22.2008 at 6:08 pm
Researchers at Princeton have discovered that with a can of duster and a laptop, it takes only matter of minutes to crack most encryption software, including BitLocker, FileVault, dm-crypt and TrueCrypt. The weak link that makes this ridiculously simple hack possible is the DRAM chip. Heres why: Any time your computer is on, that chip contains the key used to access encrypted data on your hard drive. Once that chip loses power, the bits stored on it are supposed to disappear immediately. But thats not really what happens.
Unlock your Canon digital camera's hidden features by replacing its firmware with a hacked version
By John Mahoney
Posted 02.05.2008 at 11:48 am

CHDK Firmware: Displaying the alternate main menu. Luis Bruno
Camera makers love the incremental update: selling a new model with just enough enhancements that you'll be tempted to trade up. But if you own one of several Canon point-and-shoots, you can get new features, such as shooting in high-quality RAW format, measuring accurate exposures via a live histogram, and even running simple applications like games or a calendar, without having to pay for an upgrade. All you need to do is replace your firmware, the computer code embedded in the camera's memory that serves as its operating system.
With a small radio tag in your glove, you can control your music on the slopes with a simple swipe of your hand
By Dave Prochnow
Posted 12.11.2006 at 2:00 am
When you´re tearing downhill on your snowboard, it´s a little distracting to take off your glove and dig out your iPod just to, say, hit pause. Instead, build this simple radio-frequency ID system and control your iPod by waving your hand in front of your coat.
A tag sewn into your glove sends instructions to a reader stashed in your pocket.
Unwire Your iPodCost: $161Time: 6
HoursEasy | | | | |
Hard
read more about > b h photo video,
carrier board,
DIY,
frequency,
hack,
ipod,
project,
radio,
radio frequency id,
reed relay,
RFID,
volt battery,
wireless
Make the open-source Nokia 770 Internet tablet do anything
By Joe Brown and John Mahoney
Posted 11.13.2006 at 2:00 am
Imagine a gadget that fits in your back pocket and lets you surf the Web anywhere, write documents, make VoIP calls, watch movies, and listen to your entire music library. That´s not exactly what Nokia had in mind when it released the 770 ($360; nokia.com), a PDA-size Internet tablet with Wi-Fi and Bluetooth. But because the device has an open-source operating system, anyone can build new programs for it, endowing it with nearly endless functions (we´ve nicknamed it the HackBerry).
read more about > 770,
future lounge,
hack,
hackberry,
Internet,
maemo,
nokia,
nokia 770,
open,
open source operating system,
popsci,
source,
tablet
The best-selling Robosapien toy robots are made to be hacked, so we asked the guy who wrote the book on modding them to create a flame-throwing Robozilla
By Dave Prochnow
Posted 10.01.2006 at 1:00 am
Let's face ituntil they're cooking us breakfast and doing our laundry, the most fun you can have with store-bought robots is the fun you make yourself. Sure, robots like WowWee's Roboraptor (and its companions, Robopet and Robosapien) are surprisingly capable for $60-to-$200 toys, with wide ranges of motion, touch sensors and powerful software. But it's those same out-of-the-box skills that make the 'bots such prime fodder for hackers.
read more about > build,
butane fuel,
crazy voices,
DIY,
hack,
it,
mark tilden,
philips screwdriver,
robo,
robosapien,
robot,
sapien,
touch sensors
Motion-triggered monster heads, a witches´ brew of liquid nitrogen, a projector rigged for fright, and more. Here, our favorite high-tech haunting tricks made easy
By Theodore Gray and Paul Wallich
Posted 09.26.2006 at 1:00 am
The Bubbling Cauldron
Want a real witches´ brew? Mix soap-bubble solution with dry ice, or use liquid nitrogen for bubbles that release fog when they pop. In the following video, PopSci´s contributing mad scientist, Theodore Gray, uses the help of a few young assistants to create cauldrons of toil and trouble.
Here´s how it´s done:
Been inspired by our How 2.0 projects? Send us pictures of the stuff you're making-or breaking
Posted 08.01.2006 at 1:00 am
If you're anything like us, you were the type of kid who took apart dad's
new radio just to see what was inside. That kind of curiosity never dies,
which is why How 2.0, PopSci's award-winning home for the coolest
tips, tricks, hacks and do-it-yourself projects, wants to see what today's
tech tinkerers are up to.
Have you built something amazing you'd like to
show off? Tried a How 2.0 project and failed miserably? Blown something up
with the kids' chemistry set? If you've invented it, tweaked it, hacked it,
read more about > curiosity,
digital photos,
DIY,
do,
exploits,
hack,
hacks,
How 2.0,
it,
make,
new radio,
photo,
Photos,
pictures,
popsci,
project,
submissions,
submit,
sumbmission,
yourself
Dust off that old Xbox, add a little free software, and get your movies and songs into the living room where they belong
By Mike Haney
Posted 08.01.2006 at 1:00 am
Reinvent Your XboxCost: $35Time: 1
HourEasy | | | | |
Hard
Although the sleek new Xbox 360 is all the rage with gaming geeks these days, that chunky old first-gen Xbox has something the 360 doesn´t: a legacy of hacks that give it a life beyond gaming, including the ability to take that episode of The Office you just downloaded and stream it to the flat-screen in front of your sofa.
read more about > 360,
action replay,
alternative operating system,
brew,
center,
DIY,
hack,
hacks,
hidden talents,
home,
homebrew,
mc,
media,
mod,
new xbox 360,
photos weather,
xbox,
xboxmc
Make your iPod play games and more by giving it a second personality with iPodLinux
By John Mahoney
Posted 07.01.2006 at 1:00 am
Out of the box, the iPod is basically a one-trick pony. The games and applications found under the â€Extras†menu get old faster than Britney. But thanks to four years of work by a crafty group of programmers, you can now use your iPod´s processing power and scroll-wheel interface to play dozens of games, record voice memos, or browse Wikipedia, all without messing up the existing software or your music.
The secret is iPodLinux, an alternative operating system you can install free alongside the existing one on any iPod model.
read more about > alternative operating system,
color screens,
first person shooter,
hack,
hacks,
i,
ipl,
ipod,
ipodlinux,
linux,
linux option,
nintendo game boy,
pod,
pod programs,
trick,
tricks,
voice memos
Learn to power small networked devices (like security cameras) with an Ethernet cable
By Paul Wallich
Posted 03.10.2006 at 2:00 am
Quick, how many cables go into the back of a wireless (a.k.a. Wi-Fi or 802.11) netcam? That would be one: a power cord.
How many cables go into the back of a wired netcam, which hooks directly into your ethernet? Also one, if you´re using PoE (power over ethernet). PoE takes advantage of the fact that only two of the four twisted pairs of wire (connected to pins 1/2 and 3/6) in a standard Cat5 ethernet cable carry signals. The other four wires are available to deliver power to your camera or whatever other AC-powered device you have on the network.
read more about > cameras,
DIY,
ethernet,
hack,
networked cameras,
over,
PoE,
power,
power over ethernet,
security,
soldering