The team at oomlout has continued to post all the methods they use in their manufacturing process. This time around it’s the kitting process: how they actually packaged 30 identical SERB kits in an efficient fashion. We covered their wire cutting bot before, but they’ve got other dedicated machines like a sticker cutter. The stickers are used to remove all the cut acrylic pieces from the laser cutter as one unit. They’ve got some other tricks like using a scale to count bolt quantities, and an egg timer to keep track of the laser cutting. All of their envelopes are printed using a parallel port inkjet that has been modified to work with any thickness paper.
We love when hackers bother to post this much detail about their process. One of our favorites is [ladyada]‘s full rundown of how the Minty Boost was created.
Kenshoto, organizer of the official Defcon Capture the Flag contest for the last four years, has stepped down from the position, and thus Defcon is looking for a new organizer for the event. If you’re highly competent, and maybe a little crazy, this might be your chance to step in and run one of the most well-known and prestigious hacking contests in the world. Please understand that the staff is looking for someone who wants to take ownership of the contest and make something new, unique, and challenging, and that Kenshoto has left extremely huge shoes to fill. Merely offering to replicate the existing contest and keep things mostly unchanged isn’t going to cut it.
If you’re up to the challenge, check out Dark Tangent’s post on the Defcon forums (which, for some odd reason, sounds strikingly like his 2005 post calling for a CTF organizer), where he comprehensively lays out what the staff is looking for in a new event organizer. If it jives well with you, get in touch with the Defcon staff, and maybe we’ll be covering your contest later this year.
Have you ever wondered how they inspect high voltage cables without taking them out of service? Check out this video which offers a glimpse into the life of a professional high voltage cable inspector. There are parts of the job you’d expect—namely perching on the cable like a bird, trying to not fall off—but the part of the job you wouldn’t expect is the suit. This suit is made of 75% Nomex, to prevent it from catching fire, and 25% stainless steel thread, turning the suit into a wearable Faraday cage. Of course, because he’s got a Faraday cage mere millimeters from his skin, the cable inspector spends his workday surrounded by half a million volts. To avoid electric shock, he equalizes the voltage potential between himself and the line before touching the cable.
Depending on your specific phobias, this video might make your job seem really dull… or really really safe.
Philosecurity has an interview with [Matt Knox], a former coder for Direct Revenue, an adware company which was sued in 2006 by New York governor Eliot Spitzer. The interview contains some interesting details of how the adware code worked internally: it created a Browser Helper Object, then ensured that the Browser Helper Object stayed up by creating a poller to check every ten seconds and regenerate the Browser Helper Object if it had stopped running. The poller ingeniously masked itself partly by exploiting Windows’ Create Remote Thread function to run itself as a series of threads instead of as an executable.
The truly fascinating bit of the interview is how [Knox] defies your initial suspicion that he’s a complete scumbag; he started off writing spam filtering software, was hired by Direct Revenue to do traffic analysis, started writing tiny bits of code to improve the adware, and eventually wound up knee-deep in the code. [Knox] notes that you can get ordinary people to do incredibly distasteful things if you break those things into small enough chunks and introduce them gradually.
Wired Gadget Lab has taken down a video made by [Brian X. Chen] in which he gives a brief overview and demonstration of how to install OSX on an MSI Wind netbook. This apparently didn’t sit well with Apple, who contacted Wired and complained; Wired agreed and removed the video. Frankly, we’re disappointed with Wired’s response. While they were technically posting content which is questionable at best—in the video, Brian mentions that this is illegal and that it would be a good idea to have a retail copy of OSX on hand, but then goes on to point out that you can also download the hacked operating system off The Pirate Bay, Isohunt, etc—the video in and of itself wasn’t illegal, and thus Wired comes off as susceptible to what amounts to bullying by Apple. We’re all about creativity and innovation, and stifling that innovative spirit has never worked well in the long run.
Fortunately, if you’re feeling like you’ve missed out on the video, don’t despair: Gizmodo has posted the video on their website for you to view and enjoy.
[photo: Brian X. Chen]
[nepheron] shows us how he hacked his walkie talkie to broadcast music. While using this to broadcast music is possibly illegal, it could be used to make actual upgrades to your system as well. He has replaced the microphone input with a headphone cable and extended the antenna. It is only mono, and he states it will only run for a minute before shutting off, so there is definitely room for improvement.
[thecapacity] sent us his iobridge project where he controls a coil gun with a Wiimote. To make the coil gun, he took apart an office golf putter that had a ball return. The mechanism to return the ball is a metal cylinder that is moved magnetically. He simply replaced the cylinder with a smaller diameter piece of metal to create the gun. His computer monitors the Wiimote axis changes and sends them to the ioBridge. The unit could be located anywhere, but without a camera on it, he’ll have a hard time aiming. There’s a video of it working after the break.
Continue reading “Wiimote controlled coil gun”