Being a cop’s kid leaves you with a lot of vivid memories. My dad was a Connecticut State Trooper for over twenty years, and because of the small size of the state, he was essentially on duty at all times. His cruiser was very much the family vehicle, and like all police vehicles, it was loaded with the tools of the trade. Chief among them was the VHF two-way radio, which I’d listen to during long car rides, hearing troopers dispatched to this accident or calling in that traffic stop.
One very common call was the blood relay — Greenwich Hospital might have had an urgent need for Type B+ blood, but the nearest supply was perhaps at Yale-New Haven Hospital. The State Police would be called, a trooper would pick up the blood in a cooler, drive like hell down I-95, and hand deliver the blood to waiting OR personnel. On a good day, a sufficiently motivated and skilled trooper could cover that 45-mile stretch in about half an hour. On a bad day, the trooper might end up in an accident and in need of blood himself.
Continue reading “Automate The Freight: Medical Deliveries By Drone”
Keyloggers are nasty little things that have the potential to steal the credit card numbers of you and everyone you care about. Usernames and passwords can be easily stolen this way, so they’re a useful tool for the black hats out there. One would generally expect to find a keylogger in a dodgy movie torrent or perhaps a keygen for pirated software, but this week a keylogger was found in an audio driver for an HP laptop.
The logger was found by Swiss security researchers modzero. The Conexant HD Audio Driver Package version 220.127.116.11 and earlier apparently logs keystrokes in order to monitor things like the laptop’s volume up and down keys. The real killer here is that it feels the need to log all keystrokes detected to a readily accessible file, for reasons we can’t possibly fathom. It’s a huge security risk, but it doesn’t stop there – the driver also exposes the keystrokes through an API as well, creating an even wider attack surface for malicious actors. One can in principle access the keystroke log remotely.
There’s no word from the company yet, but we really want to know – why save the keystrokes to a file at all? Code left over from debugging, perhaps? Speculate in the comments.
We think of helping hands as those little alligator clips on a metal stand. They are cheap and fall over, so we tend to buy them and don’t use them. However, if you are willing to put $35 or $40 into it, you can get the newer kind that have–well–tentacles–on a heavy base. [Archie_slap] didn’t want that kind of investment, so he made his own for about $10. We think that’s Australian dollars, so that’s even less in the United States.
What’s better is he documented every step in meticulous detail and with great pictures. You probably won’t directly duplicate his project because you will probably pick up a slightly different base, but that’s not hard to figure out. The arms are actually coolant hose, [Archie_slap] picked up almost everything but the base plate on eBay.
It’s obvious [Archie] is a frugal guy, based on his drill press. It gets the job done, though. The build is attractive and looks like a much more expensive commercial product. Some of us around the Hackaday lab are old enough to wish there was a magnifying glass attached, but maybe that’s version two.
We’ve looked at a lot of different helpers recently. We couldn’t help but think about a somewhat similar Gorillapod holder we covered last year.