Passwords On Floppy Disk

floppy_password

[Wehrdo] has posted a guide with an extremely low-tech solution to password management. He literally put the passwords on a floppy disk in the form of paper glued to the magnetic film. For those that still have some floppy disks around, this is a zero cost hack. We wouldn’t recommend this for state secrets, but for those prolific forum registrations it’s a great idea.

A Linux Server That Tweets Power Changes

apcupsd_twitter

Twitter has been used for lots of experiments, both useful and just for fun. [FIRESTORM_v1] sent in his project that falls under the useful category. When he wanted a way to monitor his server’s power statistics, Twitter was a logical choice. Similar to the Tweet-a-Watt, he wrote a script that posts messages from APCUPSd to a Twitter account that he follows, and gets the updates on his phone. [FIRESTORM_v1] documents all of the scripts he used and the steps to get your server up and tweeting.

Tunneling IP Traffic Over ICMP

icmptx

We all hate it when we find an unencrypted WiFi network at our favorite coffee shop, restaurant, airport, or other venue, only to discover that there are traffic restrictions. Most limited networks allow HTTP and HTTPS traffic only, or so is the common misconception. In the majority of cases, ICMP traffic is also allowed, permitting the users to ping websites and IP addresses. You may be asking, “Ok, so why does that matter?” Well, all of your IP traffic can be piped through an ICMP tunnel, disguising all your surfing as simple ping packets. [Thomer] has a detailed guide on how to create and utilize such a tunnel using ICMPTX. So the next time you are at the local cafe and want to fire up VLC to watch TV shows from your home PC, give this guide a quick read.

Quick And Dirty Magnetic Card Reader

card

[nevdull] found himself in possession of a magnetic card reader. What else was he to do but show us all how to read from it using an AVR? He goes through the basics of how the card reader works, as well as how to detect the different card states such as entering, reading, leaving. There is source code to download to try for yourself, but unless you have the same reader, you’ll have to do some modifications. While this doesn’t get you all the way to reading the complete content off of the card, its a great start. Maybe you guys can help him finish up the last bits.

Streamfile Encrypted File Drop

streamfile

There are myriad file transfer services on the web. Streamfile tries to set itself apart by providing a unique secure service. Their file upload system is all JavaScript and doesn’t rely on Flash. It uses SSL to secure the file transport. As soon as you start uploading the file, you can hand the link off to your recipient and they can start downloading without waiting for the upload to complete. The free limit is 150MB, but their PRO service allows 2GB files.

[via Download Squad]

Tatjana Van Vark

scanplatfs1

Go to this site and you’ll be greeted by a crazy looking woman wielding a giant egg and a blunt object that looks like Jupiter with mischief in her eyes. This is Tatjana van Vark.  Her library of projects ranges from the mundane such as a couple of incandescent lamps, to a fully functional Antikythera mechanism. As you browse around at things like her one of a kind cipher based on the enigma machine and her inertial navigator platform shown above, you’ll find the quality of her work astounding. Randomly peppered haikus give us a brief glimpse into her mind as we look at, literally decades, of amazing work. We’re sure many of you are drooling at the thought of some build details, but you’ll have to work for it. Decipher the haiku on the coding machine’s page for the build details… if you can.

[thanks Verimius]

Malicious ATM Found At Defcon 17

atm

A fake ATM machine, set to capture ATM information was found at Defcon 17 in vegas this year.  Its design has a tinted plastic window at the top which attendees noticed had a computer in it. It was quickly removed by the police. Is this an amazing coincidence? We doubt it. Someone probably knew exactly who was going to be there and either wanted to scam some hackers or just wanted to have some fun.