A Single SSD’s Journey From System 7 To High Sierra

With some time to kill and an array of old Apple computers on hand, [Pierre Dandumont] wondered if he could continuously upgrade a single OS drive from the oldest system he had, System 7.1 on a Performa 630, to the latest version of MacOS on a MacBook Air. He recalled watching an old video which demonstrated a continuous upgrade from DOS to Windows 10 (we think this video from 2016 may be the one), which gave him the inspiration for this journey. [Pierre] documents his efforts on his blog (in French; English translated link is here).

Along the way, he installed 24 different operating systems

  • System 7.1.2, 7.5
  • Mac OS 7.6
  • Mac OS 8.0, 8.1, 8.5, 8.6
  • Mac OS 9.0, 9.1, 9.2
  • Mac OS X 10.0 – 10.11
  • macOS 10.12, 10.13

on seven Mac computers

  • Performa 630 (ca. 1994, Motorola 68040)
  • Power Mac G3 Beige (ca. 1997, Motorola PowerPC 730)
  • Power Mac G3 Blue (ca. 1999, Motorola PowerPC 730)
  • Power Mac G4 Digital Audio (ca. 2001, Motorola PowerPC 7400)
  • Mac mini G4 (ca. 2005, Motorola PowerPC 7447)
  • Mac mini 2009 (Intel Core 2 Duo Penryn)
  • MacBook Air 2012 (Intel Core i5/i7)

across three of the four processor families spanned by the Macintosh line of computers since their introduction in 1984. You can see in the lead photo the success, where the Mac OS 8 search tool Sherlock is shown in the dock of a MacBook Air running High Sierra.

Continue reading “A Single SSD’s Journey From System 7 To High Sierra”

Kathleen Lonsdale Saw Through The Structure Of Benzene

The unspoken promise of new technologies is that they will advance and enhance our picture of the world — that goes double for the ones that are specifically designed to let us look closer at the physical world than we’ve ever been able to before. One such advancement was the invention of X-ray crystallography that let scientists peer into the spatial arrangements of atoms within a molecule. Kathleen Lonsdale got in on the ground floor of X-ray crystallography soon after its discovery in the early 20th century, and used it to prove conclusively that the benzene molecule is a flat hexagon of six carbon atoms, ending a decades-long scientific dispute once and for all.

Benzene is an organic chemical compound in the form of a colorless, flammable liquid. It has many uses as an additive in gasoline, and it is used to make plastics and synthetic rubber. It’s also a good solvent. Although the formula for benzene had been known for a long time, the dimensions and atomic structure remained a mystery for more than sixty years.

Kathleen Lonsdale was a crystallography pioneer and developed several techniques to study crystal structures using X-rays. She was brilliant, but she was also humble, hard-working, and adaptable, particularly as she managed three young children and a budding chemistry career. At the outbreak of World War II, she spent a month in jail for reasons related to her staunch pacifism, and later worked toward prison reform, visiting women’s prisons habitually.

After the war, Kathleen traveled the world to support movements that promote peace and was often asked to speak on science, religion, and the role of women in science. She received many honors in her lifetime, and became a Dame of the British Empire in 1956. Before all of that, she honored organic chemistry with her contributions.

Continue reading “Kathleen Lonsdale Saw Through The Structure Of Benzene”

This Week In Security: Ransomware, WeLock, And Amazon Arbitration

Another week of ransomware, and this time it’s the beef market that’s been shut down, due to a crippling infrastructure attack out of Russia — but hold up, it’s not that simple. Let’s cover the facts. Some time on Sunday, May 30, JBS USA discovered a ransomware attack against their systems. It seems that their response team did exceptionally well, pulling the plug on affected machines, and starting recovery right away. By Wednesday, it was reported that most of their operations were back in action.
Continue reading “This Week In Security: Ransomware, WeLock, And Amazon Arbitration”

Retro Useless Clock Eventually Shows You The Time

It’s true; hackers like clocks. And hackers like useless machines. But would they like an intersection of the two? We’re thinking yes, probably, though we would argue that this QR clock was at no point fully useless. Yes, a QR clock as in, whip out your phone and, ignoring the conveniently-available phone time, open the bar code reader so you can check the time on this thing. So, it’s semi-useless. But at least it doesn’t detect cameras and then hide the QR code. That would be evil.

This project started life as a display piece for the hex wall down at [megardi]’s hackerspace, but, state of the world being what it is, [megardi] hasn’t made it down there yet. And meanwhile this little guy was looking cuter and cuter, so [megardi] decided to make him more useful and freestanding. The ESP32 inside gets the official time from NIST and displays it on the 1.5″ OLED screen. It also has a single alarm now, along with some other non-QR code clock faces that display the time in various ways.

We really like the look of this clock. Honestly, with those uniform tics around the edge, it sort of reminds us of the doomsday clock — you know, the ‘minutes to midnight’ quarter clock face that shows the current perceived threat level of how close we are to destroying the world with the technologies we’ve created. That clock is kind of cute, too, which is a little bit weird considering what it represents.

Speaking of our delicate planet, here’s a gorgeous little Earth clock that casts a shadow on whatever slice of the planet is currently shrouded in darkness.

Bring A Hack Is Back This Thursday!

As the pandemic edges further into its second year, the tedium of life under lockdown is taking its toll. We may be fighting the spread of infection by staying home and having our meetings over video conferencing software, but it’s hellishly boring! What we wouldn’t do for our hackerspaces to be open, and for the chance to hang out and chew the fat about our lockdown projects!

Here at Hackaday we can bring some needed relief in the form of the Hackaday Remote: Bring-A-Hack held via Zoom on Thursday, April 8th, at 1pm Pacific time. We know you’ve been working hard over the last year, and since you’ve been denied the chance to share those projects in person, we know you just can’t wait to sign up. Last year’s Remoticon showed us the value of community get-togethers online, with both the team soldering challenge rounds and the bring-a-hack being particular event highlights, so it’s time for a fresh dose to keep up our spirits.

It doesn’t matter how large or small your project is, if it interests you other readers will also want to see it. Be prepared to tell the world how you made it, what problems you solved, and a bit about yourself, and then step back, take a bow, and be showered with virtual roses from the adoring masses. There’s a sign-up link if you have a project to show off Looks like we’re full up for planned presenations, but still come and bring your hacks for showing in conversation groups. Don’t hold back if you’re worried it’s not impressive enough, a certain Hackaday scribe has submitted an OpenSCAD library she’s working on.

This Week In Security: ISNs, Patch Tuesday, And Clubhouse

Let’s talk TCP. Specifically, how do the different TCP connections stay distinct, and how is a third party kept from interrupting a connection? One of the mechanisms that help accomplish this feat is the TCP sequence number. Each of the two endpoints of a TCP connection tracks an incrementing 32-bit number, corresponding to the bytes sent in the connection. It’s handy, because each side can use that value to track what parts of the data stream they have received. On missing packets, a message can be sent requesting bytes 7-15 to be resent, for instance.

Each side of the connection sets their own Initial Sequence Number (ISN), and it’s important that this number is unique, as collisions can cause stream confusion. That statement should make your security spidey sense tingle. If a collision can cause problems when it happens by chance, what can a hacker do with it intentionally? Potentially quite a bit. Knowing the current sequence number, as well as a couple other pieces of information, a third party can close a TCP stream or even inject data. The attack has been around for years, originally known as the Mitnick Attack. It was originally possible because TCP implementations used a simple counter to set the ISN. Once the security ramifications of this approach were understood, the major implementations moved to a random number generation for their ISNs.

Now to this week’s story: researchers at Forescout took the time to check 11 TCP/IP stacks for vulnerability to the old Mitnick Attack (PDF Whitepaper). Of the eleven embedded stacks texted, nine have serious weaknesses in their ISN generation. Most of the vulnerable implementations use a system time value as their ISN, while several use a predictable pseudorandom algorithm that can be easily reversed.

CVEs have been assigned, and vendors notified of “NUMBER:JACK”, Forescout’s name for the research. Most of the vulnerable software already has patches available. The problem with embedded systems is that they often never get security updates. The vulnerable network stacks are in devices like IP cameras, printers, and other “invisible” software. Time will tell if this attack shows up as part of a future IoT botnet.
Continue reading “This Week In Security: ISNs, Patch Tuesday, And Clubhouse”

Big Time Character LCD Clock

While the SSD1306 OLED has somewhat become the go-to display for up-to-date projects, the good old character displays with their Hitachi HD44780 controller don’t seem to be disappearing just yet either. And why would they, especially if you want to show just text, having a built-in font has certainly its perk compared to worrying about integrating your own characters — which you can still do on top as well. Or perhaps you can combine both worlds, which is what [oldmaninSC] did with his digital clock that takes an entire 16×2 LCD to show each single digit.

The whole clock uses 16 individual, upright rotated 16×2 LCDs that are arranged in two rows of eight LCDs each, turning the entire construct sort of into a giant 8×2 display itself. For some additional information such as the date, there’s also a smaller font available that uses only half the height, allowing up to four total rows of information. To communicate with each LCD via I2C, two TCA9548A I2C multiplexers are connected to an Arduino, along with an RTC to keep track of the time and date itself.

As the TCA9548A has three pins dedicated to define its own address, the entire clock could be scaled up to a total of 64 LCDs — so how about a 16×4 display made out of 16×4 displays? Sure, adding smooth scrolling might become a bit tricky at some point, but imagine playing Tetris on that one!