Hackaday Links

Links

pardon the links being later in the day, but i was up till 5:30am brainstorming with jason over ideas and working on the next podcast (you’ll love it). tomorrow on lazy afternoons i’ll be posting about the next podcast, how you can get involved, etc.

Also, wanna leave us a voicemail? Maybe get it on the air? Got a question or comment?
Call us! 206-888-HACK

Also: Stop sending e-mails saying “not a hack, but this is really funny!” etc. the only thing you’re doing aside from wasting our time is giving us fodder for the podcast. you will be targeted. you will be subject to jokes….don’t say we didn’t warn you. we don’t mind things related to technology or hacking! go ahead and send those in…i just don’t need to know that costco is selling caskets on the cheap

Now onto those fresh links I always seem to have!

parallel port controller goodness [carpespasm]
some of you wanted to know how you can whip up a ddr pad to a pc to use for a controller? simple. just buy this attatchment. my friend has it and it works perfectly in both os x and windows.
the $1 laser light show! wicked! [ahanda]
people at microsoft think we should write down our passwords
netcraft now has a firefox toolbar. netcraft = must for hacking

and last and certainly not the least (this will leave you speechless):
the talking cybernetic sausage
(my hero)

Continue reading “Hackaday Links”

The Onion Router

onion router

Tor is an overlay network that lets you browse and use other TCP based services anonymously. Normally if you use a secure tunnel an observer can still see the destination and origin ip addresses; They may not be able to tell what the payload is, but they will be able to tell who is talking. Onion routing uses a series of encrypted hops to hide this information. The Tor client creates unique routes through a network of Tor nodes. First the client contacts a node and negotiates an encryption key with it. Once that link has been established the client instructs that node to contact another and get the next key. Once all of these keys have been collected the client can begin encrypting its information. The payload is encrypted by each key in route order. When the first node decrypts the payload it determines where to send it next. The encryption is removed one layer at a time as it travels along the route arriving at its destination fully decrypted.

Tor recently reached 100 verified nodes. If you’ve got some spare bandwidth why don’t you set up a node of your own. You can even use Tor to provide anonymous web services. Of course using Tor will make it more difficult for sites to show you “singles in your area”, so make sure you consider the consequences.

Continue reading “The Onion Router”

Hackaday Links

Links

finding someone who copies 100% from your site makes you frustrated sometimes. hopefully that crap will be taken care of by this week. also, yesterday I got an interview done via Skype for the next podcast. should be fun. now let’s not forget these delicious links we have here!

more help with power over ethernet [barbobot]
get yourself pspwned [ash]
very useful for debauchery! DIY portable pa system [syfenx]
mmmm cute. portable photoshop
oh god. control a robot with a cockroach. [wetsmellydog]
make your own RJ-45 tester [joelanders]

hacker hunters…psh, whatever.
particle acceleration lets you read all kinds of stuff

Continue reading “Hackaday Links”

Hackaday Links

Links

ahh, a beautiful saturday, a beautiful delivery of links for you readers. the next podcast is being worked on and is going well by the way. quality will be the #1 concern from now on in!

someone is good with a tree and a jigsaw! [nick]
hey, kids need hacks too right? [sam]
our man with the spinning cap is selling it [adam]
usb ghost detection fool [superlevel]
hack biometrics with gummi bears! [inh]

if you’re into the hellghast from killzone and have mustard gas laying around, build a gas mask

kicking it oldschool with lockpicking (nice t-shirt) [lobo]
microsoft patch triggers virus attack….what’s that sound? oh it’s me laughing.

Continue reading “Hackaday Links”

Power Over Ethernet

Power Over Ethernet

Power over ethernet lets you add a DC voltage source to the unused pairs in your ethernet cable. This power can be used to power devices that are poe compatible by just plugging the cable into them. Other devices can be powered by using a “tap” to break the DC pairs back out of the cable. POE is a good choice for powering devices in remote locations. A router can be placed on a roof right next to its high-gain antenna, reducing signal loss, without having to run a separate AC line. Plugging the DC “injector” into a UPS will keep dedicated VOIP phones functioning during a power outage. Terry Schmidt has written a nice guide covering the theory behind scratch building poe injectors and taps. It also has photos and descriptions of other peoples projects along with tips on how to keep from turning your router into a pile of plastic goo.

Continue reading “Power Over Ethernet”