The video you see above is the on board footage of the DelFly2 autonomous ornithopoter robot. Weighing 16 grams, it carries a small camera and can provide a live feed. If you’re amazed at the tiny size and weight of the DelFly2, check out the DelFly micro, video after the break, that weighs 3 grams. Remember when we thought 17 grams was small for an ornithopter?
All processing for the DelFly2 is done at a base station and transmitted to the flying bot to keep the weight down. The team also had to create their own brushless motor that runs at 60% efficiency and weighs only 1.6 grams. The 130mAh battery can sustain 15 minutes of horizontal flight or 8 minutes of hovering.
Continue reading “DelFly2 and DelFly micro”
It seems like every piece of hardware has to earn its respect by going through some standard paces. One of which is having Quake ported to it. Much like an angel earning their wings, Bug Labs, with the help of community [CMW], has ported Quake to the BUG. Right now, the only add on needed is the BugView module. Controls are done through the base unit.
Bug Labs, the company that makes modular electronics that allow you to build your own tech doohickeys quickly and easily, has announced five new modules: BUGprojector, a mini DLP projector developed in conjunction with Texas Instruments, which sounds very much like the tiny DLP projector we posted about last week; BUGsound, an audio processing module with four stereo input/output jacks, a microphone, a speaker, and builtin hardware codecs; BUGbee (802.15.4) and BUGwifi (802.11 and Bluetooth 2.0+EDR), which will let you connect wirelessly with your PAN and WLAN, respectively; and BUG3g GSM, for connecting to (you guessed it) 3G GSM networks. In conjunction with Bug Labs’ existing series of modules, especially the highly versatile BUGvonHippel universal module, you’ll be able to create some pretty kickass gadgets. No word yet on pricing, although Bug Labs expects to ship by the end of Q1 2009.
Bug Labs makes hardware modules that can be combined to create your own custom gadgets. They’ve just released what we consider the most useful module: BUGvonHippel. Unlike the previous single purpose modules, the BUGvoHippel is a universal interface. The bus features USB, power/ground, DAC/ADC, I2C, GPIO, SPI, serial, and more. BUG applications are written in Java using a custom IDE.
The $79 module is named after MIT professor Eric von Hippel, who wrote Democratizing Innovation. You can find an interview with him below.
Continue reading “Bug Labs releases BUGvonHippel universal module”
With today’s release of Security Update 2008-006 Apple has finally addressed this summer’s DNS bug. In their previous update they fixed BIND, but that only affects people running servers. Now, they’ve updated mDNSResponder. Clients are no longer susceptible to DNS cache poisoning attacks thanks to the inclusion of source port randomization.
The Security Update addresses some other interesting bugs. Time Machine was saving sensitive logs without using the proper permissions, so any user could view them.
No matter who you suspect is plotting your doom, you’ll need need to know the way wiretapping works in order to learn their plans and shield yourself from their surveillance. Luckily, ITSecurity has posted a comprehensive
article about wiretapping, including information on how to wiretap and how to find out if someone is wiretapping you.
One of the more intriguing methods of wiretapping the articles discusses is a service by a company called FlexiSPY. It works by covertly installing a program onto the target’s cellphone. Once installed, the spying party can listen to anything going on in the room the target is in by calling the phone. It won’t ring, vibrate, or give any indication that it is transmitting audio data.
Some of the more hack-oriented methods involve tapping into a landline, using special software to record VoIP calls, or buying a wiretapping kit. Of course, countermeasures, are also discussed, but some of the links they provide are a little more informative on the topic of defense against wiretapping.
[Rich] over at Securosis takes us through some of his browser paranoia exercises. He uses different browser profiles for different types of web activities. Based on potential risk, various tasks are separated to protect from CSRF attacks and more. Everyday browsing with low risk passwords is done in one. RSS reading with no passwords is done in another. He runs his personal blog in a browser dedicated just to that.
For high risk research, he uses virtual machines to further minimize any potential nasty code getting through. Very high risk sites are browsed through a non-persistent read-only Linux virtual machine. While these techniques can be less effective if the entire OS is comprised, they can still provide a few layers of additional security.
Fellow browser paranoia sufferers may want to consider Firefox plug-ins like NoScript and memory protection from Diehard.