A Video Game Odyssey: How Magnavox Launched The Console Industry

What was the first video game console? If you said the Atari 2600, you would be wrong, but we’d forgive you. After all, the Atari was early and widely sold. It also had the major features you expect from a video game. However, there was an earlier console available. the Magnavox Odyssey.

This system was black and white, had two wired controllers, and while it didn’t quite have cartridges, you could select from one of several games. The system seems inexpensive today at $100 (not including the optional light gun). However, adjusting for 1972 currency value, that’s equivalent to about $600 today.

It was not an impulse buy, and the differentiation between games was mostly an exercise in imagination. But the the Magnavox Odyssey nevertheless brought computer technology into the home and that was exciting. It proved a market existed for home video gaming, and served no small part in the success of Atari.

Continue reading “A Video Game Odyssey: How Magnavox Launched The Console Industry”

Bluetooth Vulnerability Affects All Major OS

Security researchers from Armis Labs recently published a whitepaper unveiling eight critical 0-day Bluetooth-related vulnerabilities, affecting Linux, Windows, Android and iOS operating systems. These vulnerabilities alone or combined can lead to privileged code execution on a target device. The only requirement is: Bluetooth turned on. No user interaction is necessary to successfully exploit the flaws, the attacker does not need to pair with a target device nor the target device must be paired with some other device.

The research paper, dubbed BlueBorne (what’s a vulnerability, or a bunch, without a cool name nowadays?), details each vulnerability and how it was exploited. BlueBorne is estimated to affect over five billion devices. Some vendors, like Microsoft, have already issued a patch while others, like Samsung, remain silent. Despite the patches, some devices will never receive a BlueBorne patch since they are outside of their support window. Armis estimates this accounts for around 40% of all Bluetooth enabled devices.

A self-replicating worm that would spread and hop from a device to other nearby devices with Bluetooth turned on was mentioned by the researchers as something that could be done with some more work. That immediately reminds us of the BroadPwn vulnerability, in which the researchers implemented what is most likely the first WiFi only worm. Although it is definitely a fun security exercise to code such worm, it’s really a bad, bad idea… Right?…

So who’s affected?

Continue reading “Bluetooth Vulnerability Affects All Major OS”

Mini-Banners For Small Occasions

Do you often find yourself needing to make small signs? Perhaps you’re trying to put a notice on the office fridge, but you’re just not in the mood for the usual Comic Sans-on-A4 staple today. A banner of some sort would do the trick, but… a small one, right? [Mike Ingle] has the answer – making mini-banners on old receipt printers.

[Mike] was a fan of Paint Shop in the 1980s, which among other things, enabled the printing of long banners on the popular dot matrix printers of the era. Realising that receipt printers have a similar ability to print on a long continuous strip of paper, he decided to see if it was possible to create small banners using the hardware.

The hack is simple – ImageMagick is used to generate a one-bit black & white bitmap that is then processed with some custom C code to generate something the printer can understand. It’s then a simple matter of hacking up the original RS-232 cable to fit a DB-9 (aka DE-9) connector, and spitting out the instructions over serial.

The mini-banners are cool, and we could imagine having some fun with such a project, using it to print out tweets or putting it into service as a stock ticker. It’s a great example of cleanly interfacing with existing hardware to create something outside of the original design intentions. Such printers are fertile ground for hacks – like this printer that can spit out the US Constitution in 6 seconds flat.