Here’s a 2-channel Oscilloscope for your Android phone. It uses a base module driven by a dsPIC for signal processing. From there, an LMX9838 Bluetooth module broadcasts the data to the phone so that the waveform can be displayed. [Yus] ported some Python code he had been using over to a set of Java and XML files in order to get it working on Android. This was actually the first time he worked with the SDK… we’d say he’s a quick learner. See it in action after the break.
Continue reading “Android oscilloscope”
Processsing has come to Android. [Jer] posted a guide to setting up the software and coding your first Processing app for Android. The module which supports Google’s mobile operating system is not yet part of the stable Processing release but it works and is available to download and use. It provides support for Android version 2.1 and newer, playing nicely with the SDK to emulate your sketches during development. The Hello World app seen above uses just a few lines of code to draw a white box on an orange background. After you’ve installed and tested the tools you’ll be developing in no time.
This makes a great addition to your Android development tool bag.
[Thanks Tech B]
Recently, research students at Georgia Tech released a report outlining the dangers that GPUs pose to the current state of password security. There are a number of ways to crack a password, all with their different pros and cons, but when it comes down to it, the limiting factor in all of these methods is processing complexity. The more operations that need to be run, the longer it takes, and the less useful each tool is for cracking passwords. In the past, most recommendations for password security revolved around making sure your password wasn’t something predictable, such as “password” or your birthday. With today’s (and tomorrows) GPUs, this may no longer be enough.
Continue reading “GPU Processing and Password Cracking”
Here’s the latest in rooted consumer devices, nookdevs.com has rooted the Barnes & Noble Nook eBook reader. The process is extremely easy, as the operating system is stored on a 2GB SD card inside the device. In fact, once you have the case open the hard part is over. From there, the card should be backed up for safe keeping. Now mount the card, enable the Android Debug Bridge and reassemble. The Android SDK can then be used to log into a shell on the Nook wirelessly.
We’re not sure there’s much that can be done past this point yet. It’s up to you to get Doom running!
Pre Insiders has reported that the Pre’s Mojo SDK has been leaked to the internet. Palm was planning an early access program, eventually releasing the SDK by the end of the summer, but this leak has accelerated the process. They are posting several download links, including torrents, but they warn developers to use the tools wisely.
Related: Palm Pre teardown