Grizzly Suit Up For Auction

Do you have a burning desire to fight grizzly bears? If you do, We can’t guarantee that the first bear you face will win, but we really can’t imagine another outcome unless you use [Troy Hurtubise]’s Mk IV suit, which is currently up for auction. We have discussed the suit before along with several other high-tech power suits, but this is the only one with bear-resistance in mind. The suit features several safety features, including layers of chainmail and titanium.The suit was also featured in the film “Project Grizzly.” [Hurtubise] is hoping to sell the suit for $40,000 or more to offset his personal costs, and judging by the current price, he may well make it.

[via Engadget]

Black Hat Hackers Face Off In Iron Chef Style Competition


Which is a better method for finding vulnerabilities, fuzzing or static-code analysis? The question will be put to the test at next month’s Black Hat USA conference, where two experienced hackers security researchers will be given a piece of mystery code and one hour to find all the vulnerabilities they can using one of the two methods. [Charlie Miller] from Independent Security Evaluators will use fuzzing and [Sean Fay] from Fortify Software will use static-code analysis to detect the vulnerabilities in the code. We reported on [Miller]’s fuzzing talk while at Toorcon 9.

The pair will be allowed to use their own equipment, but they won’t see the code until the moment the showdown begins. For an added bit of fun, conference attendees are welcome to join in the contest. The audience member who finds the most exploits within the hour wins a free dinner at a new Las Vegas restaurant. But you don’t have to wait until then to weigh in; go ahead and post your thoughts on fuzzing vs. static-code analysis in the comments, just be ready to back up your claims.

Hack A Day Is Still Hiring


We’ve added a handful of contributors in the last couple months, which you can see in our new How-Tos. We’re still looking for people to contribute daily posts and help expand the site though.

This is a paid, freelancing position that requires professionalism, consistency, and reliability. We want to hear from people that are passionate about software/hardware hacking and growing Hack a Day. To apply, send the following to jobs@hackaday.com

  • A short bio about yourself
  • 3 example daily posts written in the style of Hack a Day
  • 3 software or hardware how-tos you’d like to see. For examples of work we’ve done in the past, look here, here, here, and here.
  • A couple sentences on how you would improve the site either through features or content
  • Any additional reasons why you would make a good fit for Hack a Day

Do not send any attachments. Having your own blog you can show off is a definite plus.

[photo:fbz]

Top 10 TEDTalks


The Technology Entertainment Design Conference has been a great source for interesting presentations and in 2006 they started publishing their talks online. This week they published a list of the top 10 most popular talks. There are quite a few tech related ones and we’ve covered some of this work before: [Jeff Han]’s multitouch demos, [Johnny Lee]’s Wiimote hacking, [Blaise Aguera y Arcas] demoing a zoomable interface, and finally for a bit of fun [Arthur Benjamin]’s Mathemagic.

[via Waxy]

Recon 2008 Recap

[Tiller Beauchamp] gave a presentation on applied reverse engineering in OS X at this year’s REcon, but he also attended many of the other talks and gives his take on the highlights of REcon 2008 in a guest post on the ZDNet blog, Zero Day.

One of the highlights for him was Neohapsis’s [Chris Smith] discussing virtual machines implementing code obfuscation. The method uses custom instructions and runtime interpreter, which can help make the task of reverse engineering markedly more difficult if implemented properly.

On the opposite end of the spectrum, [Beauchamp] noted [Gerardo Richarte]’s software reverse engineering tools that decompile and recompile software in iterative portions. This allows the recompiled software to be tested piece by piece. Be sure to read his post and see what you missed.

SSD Hard Drives Tank Laptop Battery Life


Tom’s Hardware has been running some tests to challenge the common assumption that SSD hard drives use power more efficiently than magnetic plate drives. Their results were quite definitive: not only are they not as energy efficient, SSDs actually use more power than conventional hard drives.

What they found is that most plate drives are at peak consumption (up to 4W) when accessing files fragmented across the media, which causes the actuator to move back and forth across the media several times. However, this is almost never sustained for extended periods of time; the actuator usually doesn’t move much when reading unfragmented data, and most plate drives are also capable of going idle when they are not in use.

Most SSDs on the other hand, only have two states: on and off. This means that when they are on, they are always at peak energy consumption. Though this number hovers around 2W for most of the SSDs they tested, over prolonged periods this can mean a great deal more power consumption than is immediately apparent, which can have short and long term effects on the battery life of a laptop. See the Tom’s Hardware article for benchmarks of specific products and more in-depth data.

Time Magazine’s Favorite Robots


Time Magazine recently posted a photo essay of some of their favorite robots. The article was composed in response to the recent release of the Pixar film Wall-E, and features some of the cutest, most cuddly automatons in the world. We were more interested in the most functional ones, huggability notwithstanding. See some of these Hack a Day veterans after the break.

Continue reading “Time Magazine’s Favorite Robots”