Installing OpenSSH on the HP TouchPad

hptouchpad_openssh

[Russ] was lucky enough to get his hands on a deeply discounted HP TouchPad, and after hearing about the huge bounty being offered for getting Android up and running on the device, he decided to poke around and see if he could make some headway.

He started off by making a full backup copy of his file system using a tool HP has on their WebOS site, just in case anything unfortunate happened to his device in the process. He grabbed a copy of the ARM cross-compiler and set off to build a copy of OpenSSH for the TouchPad. Once he had the binaries in hand, he started what he thought would be the arduous process of getting SSH onto the TouchPad, but it turned out that it was a simple drag and drop operation.

After remounting the file system to allow write operations, he fired up the SSH daemon and hoped for the best. It worked like a charm, and while it’s a relatively small part of getting Android running on the TouchPad, every bit helps.

A hacker’s marginal security helps return stolen computer

Gather round and hear the story of how a hacker outsmarts a criminal. [Zoz] was robbed and they got his desktop computer. Gone, right? Nope. Because of a peculiar combination of his computer’s configuration, and the stupidity of the criminal, he got it back. He shares the tale during his Defcon 18 talk (PDF), the video is embedded after the break.

[Zoz’s] first bit of luck came because he had set up the machine to use a dynamic DNS service, updated via a script. Since the criminal didn’t wipe the hard drive he was able to find the machine online. From there he discovered that he could SSH into it, and even use VNC to eavesdrop on the new owner. This, along with a keylogger he installed, got him all the information he needed; the guy’s name, birth date, login and password information for websites, and most importantly his street address. He passed along this juicy data to police and they managed to recover the system.

Continue reading “A hacker’s marginal security helps return stolen computer”

OpenWRT on a Seagate FreeAgent Dockstar

The Seagate FreeAgent Dockstar aims to make all of your stuff available online. It serves that purpose but sometimes you just want more options for controlling your hardware and running some scripts. [Eric Cooper] put together a guide for installing OpenWRT on the Dockstar by building your own kernel and loading it onto the internal storage. Once you have a kernel that will play nicely with the hardware, you can install it by tunneling in through SSH; the same method you would use if you wanted to run Linux on this hardware. If you have problems along the way, [Eric’s] also included a guide for cracking the Dockstar open and connecting a serial cable.

Doom on a picture key chain

Alright, so Doom isn’t actually running on the key chain itself, but rather a BifferBoard: a small 150MHz x86 containing ethernet, serial, and even USB with only one watt of power consumption! The project is to show how easy it is to program the BifferBoard and getting it talking to other hackable items – such as the picture key chain for a display. Doom does appear a bit slow, but [Biff] figures its do to how haphazardly it grabs keyboard input over SSH.

Apple TV with Boxee and more update

atvusb-creator

In November, we covered installing Boxee on AppleTV using atv-usb-creator. [Danny] has written a tutorial on installing Boxee, XBMC, NitoTV, SSH access, and external USB hard drive support. His method installs most of the software via the USB patch stick, then uses the SSH support to enable the external drive and install NitoTV. The tutorial lists a Mac running OSX 10.4 or newer as a prerequisite but there is now a Windows version of atv-usb-creator. According to their Google Code page Linux support for this package is on the way.

[via AppleTV Hacks]

Using Bittorrent on Amazon EC2

Bittorrent is a great distribution method for large files, but its heavy bandwidth usage can be disruptive to both work and home networks. [Brett O’Connor] has decided to push all of his torrenting activity into the cloud. Amazon’s EC2 service lets you run any number of Amazon Machine Images (AMI, virtual machines) on top of their hardware. You pay for processing time and data transferred. [Brett] put together a guide for building your own seedbox on the service. First, you set up the Security Group, the firewall for the machine. Next, you specify what AMI you want to use. In this example, it’s a community build of Ubuntu. Once you have your SSH keypair, you can start the instance and install Apache, PHP, and MySQL. TorrentFlux is the web frontend for bittorrent in this case. It manages all the torrents and you just need to click download when you want to grab the completed file.

Even if you don’t plan on setting up a seedbox, the post is a straightforward example of how-to get started with EC2. He’s not sure what the cost will be; the current estimate is ~$30/mo.

[via Waxy]

[photo: nrkbeta]

Hackit: What did you get?

adp1

It’s the season of gift giving. Did you get anything interesting/hackable? What will you work on next?

We gave ourselves an Android Dev Phone 1 (ADP1). We hadn’t really considered getting a G1 until the ADP1 was announced… It’s actually a lot of fun to use as our primary phone. Our favorite app so far is connectbot, the SSH client. The interface is really smart, way better than all of the iPhone clients.

What did you get?