Third-party router software has been around for a while, but we can’t help but keep recommending it to users who want to add undocumented features to their home network. Our favorite router firmware package is still Tomato, which we favor for its compatibility with a wide range of router brands and models, user-friendly interface, and powerful feature set. We’ll show you how to upgrade your router’s firmware to the newest version of Tomato and then configure the Quality of Service settings to manage your network traffic.
Filed under the “just because” file, some gents with the iSoft team have successfully installed Windows 95 onto an iPhone.
Their hack works by running a basic Windows 95 image and the Bochs emulator. However, there are some very noticeable performance issues in the use of the OS. Still though, what matters is that they got it running!
Now they’re working on Windows XP. But, until then you can see the Windows 95 powered iPhone in action here.
According to a recent article by Network World, hackers have figured out a new technique to log your keys that involves either cheap lasers or power outlets.
The power outlet method works by keylogging the electrical impulses created with each keystroke, allowing would-be hackers to see everything you type, simply because you’ve decided to juice up your machine. However, you’re safe should you be running on battery power – and this is where the lasers come in.
The second method works by pointing a cheap laser, one that’s slightly better than a laser pointer, at a shiny part of a laptop. A receiver is then aligned to capture the reflected light beam, and record the vibrations that are caused by striking each key. The vibrations are then fed into a sound card, where “the vibration patterns received by the device clearly show the separate keystrokes.”
While I’m a bit skeptical of the second method (with all the different variations in keyboards, builds, sizes, and shapes of laptops, it’s got to be difficult to hammer out a foolproof system), they’re both something to look out for. In order to cover your back, it’s suggested that you “make sure there is no line of sight to the laptop, move position frequently while typing and pollute the signal by striking random keys and later deleting them with the backspace key.”
The ransom message (which can be found here, in a cached form) read, “I have your s**t! In *my* possession, right now, are 8,257,378 patient records and a total of 35,548,087 prescriptions. Also, I made an encrypted backup and deleted the original. Unfortunately for Virginia, their backups seem to have gone missing, too. Uhoh :(For $10 million, I will gladly send along the password.”
No word yet on what the Virginian authorities plan to do about this one, but given the nature of this crime we doubt we’ll hear anything about its resolution.
According to mobile security firm Trust Digital, you're at a real risk of falling prey to an SMS attack while you sleep. Dubbed the "Midnight Raid Attack," because it's mostly run at night, a hacker who has the right toolkits and know-how could send a malicious text message to your phone capable of firing up the web browser and navigating to a harmful website. Once there, the site downloads a dirty executable to your phone intended to steal your private data, said Trust Digital.
"This is a completely real threat," said Phillippe Winthrop, a director in the global wireless practice at Strategy Analytics. "We will see these attacks. It's a matter of time."
Another type of attack has a hacker sending a malicious SMS 'control message' over the GSM network to a victim's phone using a WiFi network, like you might be using at a coffee shop. The attack turns off SSL on the victim's phone, allowing the hacker to sniff your exposed traffic and steal your email credentials.
Trust Digital posted a pair of YouTube videos demonstrating the above attacks, which you can view here and here.
A few weeks after Jesse Vincent, an inveterate hacker, yielded to his strong urge to hack another popular gadget, Savory was born. Savory is a Kindle 2 app that converts .pdf and .epub files into the .mobi format supported by the ebook reader. Though similar solutions have been available on the internet for quite sometime, Savory is unique as it executes the conversion on Amazon’s ebook reader itself. But like all great things, Savory has its limitations. It doesn’t support Kindle 1 and won’t convert ebooks protected by DRM. Please note that running unsigned code may void your manufacturer’s warranty.
If you're only using your $500 PlayStation 3 for console gaming, you're missing out on half of its hidden versatility: the ability to upgrade into a fully functional PC! Inside that shiny plastic shell resides some decent computing silicon, just waiting to be released from its undeserved console shackles. And while Windows Vista and OSX are no-goes due to legal issues, there's no reason at all not to dual boot into a perfectly serviceable Linux platform when the need arises.
The installation process is fairly straightforward, and the hard drive is easily upgradeable if you don't mind spending a little extra cash on the side. And while Ubuntu for PlayStation has a few functional limitations, you can find myriad excellent applications for you to enjoy from the comfort of your own living room, including VLC for encoded video playback, Amarok to blast your digital music library, and some classic SNES emulation software that you can play using your PS3's Sixaxis or Dualshock controller. This guide will show you how to do all of the above, so let's get started!
If you're brand new to the DIY PC building scene, you may think Intel chipset-based motherboard owners have always been able to run multiple Nvidia videocards in SLI. You'd also be wrong. It was less than six months ago that Nvidia officially announced it was licensing its SLI technology to several top-tier motherboard makers for Intel's X58 chipset, in exchange for a fee. So we can't imagine anyone over at Nvidia doing cartwheels when end-users find a way to enable SLI on non-SLI certified boards with a relatively simple BIOS hack.
Citing an article in Taiwanese magazine PC Home Advance, TweakTown reports that not only is it possible, but it's been demonstrated on Gigabyte's EX58-UD4 motherboard. The magazine downloaded the latest F6 BIOS for a slightly different model, the EX58-UD4P, which comes with official SLI support, and slapped it on the less expensive non-SLI board.
Because the model numbers are different, the magazine noted the unsupported BIOS can't be installed using the built-in QFlash utility, and instead requires using the DOS-based SPIFLASH utility. Still a relatively easy hack considering no physical modifications to the board itself needs to be done.
It's unclear whether there were any undesirable side effects from using another board model's BIOS in place of the correct one. It's also unclear whether Nvidia will take measures to prevent this and future BIOS hacks from working with future driver releases.
So you thought the facial recognition technology built into your laptop would keep your business and personal information safe? Bwa-ha-ha! Today, the Black Hat DC 2009 security conference found out that, as Vietnam-based security researcher Nguyen Minh Duc puts it, Your Face is NOT Your Password.
Nguyen's paper reveals (PDF link) that it's relatively simple to hack facial recognition systems included in webcam-equipped laptops from Lenovo (Veriface III), ASUS (SmartLogon v1.0.0.0005), and Toshiba (Face Recognition 22.214.171.124). Methods used included using photographs in place of live faces (Facebook, anyone?) and performing brute-force attacks by changing lighting and photo angles in a digitized face until the system permits access.
Are you counting on facial-recogntion technology to keep your stuff safe? Is your company? Join us after the jump for your chance to sound off on this latest "unbreakable," but now broken, access-control technology.
It is a disgrace that humans haven’t still got the hang of setting passwords. It seems as though that most internet users have inextricably tethered themselves to a promise of not setting strong-enough passwords, which may force hackers to reconsider their choice of profession for its grueling nature. As you devour more of this story, you will begin to envy hackers for having it stroll-in-the-park easy.
A new study has revealed – rather reiterated - that internet users nonchalantly continue to set unimaginative, fatuous passwords. The study appraised 28,000 passwords that were recently stolen from a U.S website.
Sixteen percent of the users had set their first name as their password. Around fourteen percent chose easiest to recall key combinations, including “1234” and “12345678”. Other users, who apparently don’t rate their mathematical ability highly, chose to steer clear of numbers and settled for passwords such as “AZERTY” and “QWERTY”.
Five percent of the passwords were found to be inspired by popular things and celebrities, including names of movies, TV shows and actors. The strongest password in this category was found to be “Ironman” as it sounds impenetrable.
Three percent of the people reckon passwords are another medium of expression. How else would you explain passwords like “Iloveyou” and “Ihateyou?”