Everybody hates it when they have to rename a fileset to fit a new naming scheme. Instead of doing it the hard way and writing a one-time script to go through and rename everything, check out Bulk Rename Utility from [Jim Willsher]. It provides you with a multitude of methods to take care of business and allows you do pick your favorite method, be it regular expressions, simple finding and replacing, prefix/suffix modification, or a combination of many more.
However, if the sheer amount of options available overwhelms you or if you just want an easier way to do things, check out A.F.5 from [Alex Fauland]. A.F.5 offers features like adding a counter to your filenames, change file attributes, and save your rename settings out to a file for repeat use.
[Kyle McDonald] sent in his latest project, a software keylogger that twitters what you type. He wrote it using C++ and OpenFrameworks. It logs each keystroke, then it posts to twitter 140 characters at a time. To protect himself, he set up a whitelist of private strings like passwords and credit card numbers that would be stripped before posting. If the twypewriter followed him, his keystrokes could be recreated.
Firmware v0g for all Bus Pirate revisions is now available. Updates in this release include a bootloader, frequency generator/pulse-width modulator, SPI bus sniffer, MIDI library, configuration reports, improved user interface, and bug fixes. v0g is also the first firmware to fully support the v2 hardware branch.
We’re really proud of this release as it brings a much more consistent structure to the internal operation of the Bus Pirate. It lays the foundation for future CAN, LIN, and OBDII libraries, and it supports localization and translations. Install and upgrade instructions are included with the firmware. Report bugs on the project issue tracker.
We document the new features after the break.
Continue reading “Bus Pirate firmware update v0g”
[Alex Papadimoulis] wrote about ingenuity and hacking in high school. Immediately after the teacher’s installed a new electronic note taking and test giving software, the students began hacking. They managed to find several ways to ace their tests, none of which involved studying hard the night before. Ultimately, the teachers went back to the old system to prevent such shenanigans.
A first look from Ars Technica at the newly released Neo FreeRunner phone by OpenMoko reveals some interesting information. There are three different software stacks available to use; the Neo FreeRunner will ship with the GTK-based stack, referred to as om2007.2. It offers conventional smartphone applications, but most importantly, it includes “full root access to a Busybox shell with all of the standard scripting tools like sed and awk”. The ASU stack is what OpenMoko developers are currently working on; there are promises of a more user-friendly experience. The FSO stack, also currently in development, aims to resolve the issues brought up by having different software stacks for the same phone. Since none of the stacks are considered “fully functional”, OpenMoko may have a difficult time attracting a mainstream audience. Hackers may be hampered by the lack of available documentation, although there are resources for OpenMoko enthusiasts, if you just search hard enough. The final conclusion? While OpenMoko may be difficult to use, it compares favorably to competitors such as Google’s Android platform, which is less flexible.
Our friend [Rich Mogull] has been flipping the switches on Leopard’s new firewall and scanning it to see what’s actually going on. There is some good and some bad. The new application signing is a mixed bag. It breaks Skype and a commenter pointed out that automatically trusting Apple installed apps like NetCat isn’t a good idea either. You can roll your own firewall using user friendly tools like WaterRoof since ipfw is still included.
[qDot] sent in his efforts to hack the oddest USB interface I’ve seen. The game is played by relaxing, so the controller senses biometrics. His notes on his adventure in hacking a driver are a bit entertaining, and definitely interesting if you’ve considered doing a little USB driver hacking of your own. If there’s enough interest, maybe he’ll post some more code to get things rolling.