Interview With An Adware Author

toolbars2

Philosecurity has an interview with [Matt Knox], a former coder for Direct Revenue, an adware company which was sued in 2006 by New York governor Eliot Spitzer. The interview contains some interesting details of how the adware code worked internally: it created a Browser Helper Object, then ensured that the Browser Helper Object stayed up by creating a poller to check every ten seconds and regenerate the Browser Helper Object if it had stopped running. The poller ingeniously masked itself partly by exploiting Windows’ Create Remote Thread function to run itself as a series of threads instead of as an executable.

The truly fascinating bit of the interview is how [Knox] defies your initial suspicion that he’s a complete scumbag; he started off writing spam filtering software, was hired by Direct Revenue to do traffic analysis, started writing tiny bits of code to improve the adware, and eventually wound up knee-deep in the code.  [Knox] notes that you can get ordinary people to do incredibly distasteful things if you break those things into small enough chunks and introduce them gradually.

[via Waxy]

[photo: xcaballe]

Apple Forces Wired To Take Down Netbook OSx86 Video

bswind2

Wired Gadget Lab has taken down a video made by [Brian X. Chen] in which he gives a brief overview and demonstration of how to install OSX on an MSI Wind netbook. This apparently didn’t sit well with Apple, who contacted Wired and complained; Wired agreed and removed the video. Frankly, we’re disappointed with Wired’s response. While they were technically posting content which is questionable at best—in the video, Brian mentions that this is illegal and that it would be a good idea to have a retail copy of OSX on hand, but then goes on to point out that you can also download the hacked operating system off The Pirate Bay, Isohunt, etc—the video in and of itself wasn’t illegal, and thus Wired comes off as susceptible to what amounts to bullying by Apple. We’re all about creativity and innovation, and stifling that innovative spirit has never worked well in the long run.

Fortunately, if you’re feeling like you’ve missed out on the video, don’t despair: Gizmodo has posted the video on their website for you to view and enjoy.

[photo: Brian X. Chen]

Hack A Walkie Talkie For Music

radio1

[nepheron] shows us how he hacked his walkie talkie to broadcast music. While using this to broadcast music is possibly illegal, it could be used to make actual upgrades to your system as well. He has replaced the microphone input with a headphone cable and extended the antenna. It is only mono, and he states it will only run for a minute before shutting off, so there is definitely room for improvement.

Wiimote Controlled Coil Gun

iocoil1

[thecapacity] sent us his iobridge project where he controls a coil gun with a Wiimote. To make the coil gun, he took apart an office golf putter that had a ball return.  The mechanism to return the ball is a metal cylinder that is moved magnetically. He simply replaced the cylinder with a smaller diameter piece of metal to create the gun.   His computer monitors the Wiimote axis changes and sends them to the ioBridge. The unit could be located anywhere, but without a camera on it, he’ll have a hard time aiming. There’s a video of it working after the break.

Continue reading “Wiimote Controlled Coil Gun”

Multitouch Patched Into Android

g11

[Luke Hutchison] has come up with a rather clever hack to get multitouch support on the G1. He wrote a patch against the Synaptics touchscreen driver. When two fingers are placed, the driver reports the x/y of the midpoint and a radius for the size field. If only one finger is used, the size is reported as zero. The nice thing about this approach is that it’s backwards compatible; the extra data will be ignored by current apps. Unfortunately, Google’s Android team says that if multitouch is ever added, it would identify individual fingers and definitely not using this method.

[via ABN]

[photo: tnkgrl]

Automated Protocol Analysis

wireshark

[I)ruid] from BreakingPoint Labs has been doing quite a bit of protocol reverse engineering as part of his work. He put together a post covering some of the tools that have been useful for this task. Text-based protocols have a lot of human readable characters that can help you identify fields. Binary protocols don’t have this luxury though. He recommends the Protocol Informatics Project for tackling these situations. It applies bioinformatics algorithms to network traffic. You give it a packet dump of the protocol and it compares them to find similarities the same way genetic sequences are compared. It can be confused by protocols that waste a lot of space, but it’s still a very clever approach to reversing.

[photo: slashcrisis]

Rickshaw Pulling Robot

rickshaw

[Wu Yulu] is a Chinese farmer with no formal mechanical training. He’s been building various contraptions over the years and even accidentally burned down his house at one point. Pictured above is a walking, talking rickshaw pulling robot he built to haul himself around town. You can see a video of the mechanical man on Reuters.

The design reminds us of [Bob Schneeveis]’ Schwarzenegger towed solar chariot we saw at Maker Faire.

[via DVICE thanks cnelson]