[Simon Inns] is still hard at work making USB connectivity for PIC microcontrollers easier for the hobbiest. He’s released a framework for PIC based USB devices under Windows. It includes the firmware needed for USB compatible 18F PIC chips as well as a C# class library and example programs for the Windows side of things. This goes quite a bit further than his PIC-USB tutorial but with little added effort on your end of things.
We do our USB prototyping on a breadboard just like [Simon] did in this example. He’s got a nice little USB-B connector breakout that is easy to plug into the breadboard. If you prefer to have a more stable development area, check out the one he designed. It’s a single-sided PCB made for through-hole components with just a handful of jumper wires.
The folks over at Engadget have posted some pictures of the ExoPC’s insides. With the recent return of the tablet craze (remember xp tablet edition?) we’re seeing tablets everywhere. This one has some promise on the hardware side, sporting a 1.6GHz processor and 2GB of RAM. Unfortunately we’ve heard using solely a tablet interface with windows7 is somewhat cumbersome even with the built in improvements. We’re not too worried though, a customized appliance style linux interface probably won’t be too far off.
The last couple times we mentioned tablet style computing, people have emailed us about the Touchbook. It also seems pretty cool, but seems like switching applications is visibly laggy in the demo video. Then again, a slimmed down interface might reduce some of that drag.
We’ve seen the Arduino board in charge of some pretty unique tasks in the past. Harvesting locally grown soybeans was not one of them.
[Lance] rigged this beast up in order to automate the monotonous task of driving up and down the vast soybean fields of Iowa. The 15 ton farm combine’s hydraulic steering pump is at the mercy of a team of gadgets, including a GPS, Windows 7 PC, and the omnipresent Duemilanove (which acts as the output card, connecting the PC to the pump). So far, it is reported to be doing a great job, straying only about an inch and a half from its desired, GPS-programmed, path. Even if the Arduino decides to go totally berserk and drive the combine off course, speeding around at 5mph makes it pretty avoidable. A supervisor is also in the cabin at all times, looking out for errors. [Lance] eventually hopes to offload all steering-related calculations to the ATmega328P onboard.
Commenters are welcome to share heavier-duty uses for the Arduino (if they exist).
A new operating system, code named Barrelfish is being developed by Microsoft research labs and ETH Zurich in Switzerland. This operating system is being built with multi core operations foremost in priority. It is supposed to be extremely scalable and able to function on a very wide range of hardware. You can download the current snapshot of it on their site and dig into the source code, released under a 3-clause BSD style license. If you would like to learn the primary differences between this OS and Windows or Linux, you can read this PDF.
An Android App for “testing” the Windows SMB2 vulnerability we covered last week has been released. For testing? Yeah right! The availability of this kind of software makes it ridiculously easy for anybody to go out and cause some havoc. Go right now and double check that your machines that run Windows Vista or Windows Server 2008 are protected (see the “workarounds” section.)
As far as password recovery utilities go, Cain & Abel is by far one of the best out there. It’s designed to run on Microsoft Windows 2000/XP/Vista but has methods to recover passwords for other systems. It is able to find passwords in the local cache, decode scrambled passwords, find wireless network keys or use brute-force and dictionary attacks. For recovering passwords on other systems Cain & Abel has the ability to sniff the local network for passwords transmitted via HTTP/HTTPS, POP3, IMAP, SMTP and much more. We think it is quite possibly one of the best utilities to have as a system administrator, and definitely a must have for your toolbox.
[Laurent Gaffié] has discovered an exploit that affects Windows Vista, Windows 7, and possibly Windows Server 2008 (unconfirmed). This method attacks via the NEGOTIATE PROTOCOL REQUEST which is the first SMB query sent. The vulnerability is present only on Windows versions that include Server Message Block 2.0 and have the protocol enabled. A successful attack requires no local access to the machine and results in a Blue Screen of Death.
[Laurent] has a proof of concept available with his writeup in the form of a python script (please, white hat use only). There is no patch for this vulnerability but disabling the SMB protocol will protect your system until one is available.
Update: According to the Microsoft advisory this vulnerability could lead to code execution, making it a bit worse than we thought. On the bright side, they claim that the final version of Windows 7 is not open to this attack, only Windows Vista and Windows Server 2008.
[via Full Disclosure]