Hardware Hacking

Asetek LCLC Takes Liquid Cooling Mainstream 118

bigwophh writes "Liquid cooling a PC has traditionally been considered an extreme solution, pursued by enthusiasts trying to squeeze every last bit of performance from their systems. In recent years, however, liquid cooling has moved toward the mainstream, as evidenced by the number of manufacturers producing entry-level, all-in-one kits. These kits are usually easy to install and operate, but at the expense of performance. Asetek's aptly named LCLC (Low Cost Liquid Cooling) may resemble other liquid cooling setups, but it offers a number of features that set it apart. For one, the LCLC is a totally sealed system that comes pre-assembled. Secondly, plastic tubing and a non-toxic, non-flammable liquid are used to overcome evaporation issues, eliminating the need to refill the system. And to further simplify the LCLC, its pump and water block are integrated into a single unit. Considering its relative simplicity, silence, and low cost, the Asetek LCLC performs quite well, besting traditional air coolers by a large margin in some tests."
Hardware Hacking

Hacker Club Publishes German Official's Fingerprint 253

A number of readers let us know about the Chaos Computer Club's latest caper: they published the fingerprint of German Secretary of the Interior Wolfgang Schäuble (link is to a Google translation of the German original). The club has been active in opposition to Germany's increasing push to use biometrics in, for example, e-passports. Someone friendly to the club's aims captured Schäuble's fingerprint from a glass he drank from at a panel discussion. The club published 4,000 copies of their magazine Die Datenschleuder including a plastic foil reproducing the minister's fingerprint — ready to glue to someone else's finger to provide a false biometric reading. The CCC has a page on their site detailing how to make such a fake fingerprint. The article says a ministry spokesman alluded to possible legal action against the club.
Hardware Hacking

Columbia Holds Wake For Historic Cyclotron 72

Pickens writes "They called it leviathan, behemoth, Big Bertha. At 12 feet wide, rising 7 feet above the cement floor and weighing an estimated 65 tons, the Columbia cyclotron, the particle accelerator built in the late 1930s by Columbia physicist John Dunning, played a crucial role in the dawn of the nuclear era. Dunning's experiments verified fission, established many of its properties, and, most significantly, demonstrated that the rare isotope Uranium 235, and not the more common U-238, was the more fissionable form of the element. 'In a week or two, they will dismantle it, and they will sell it for scrap,' says George Hamawy, Columbia University's director of radiation safety. 'This is the last chance to see it,' Hamawy added as students held a wake and contractors arrived to remove the cyclotron. 'We're going to make two-thousand-pound sections,' said one contractor before taking the cyclotron's measurements. 'We'll start slicing on Monday.'"
Earth

A Super-Efficient Light Bulb 468

Chroniton writes with news of a Silicon Valley company, Luxim, that has developed a tiny, full-spectrum light bulb, based on a plasma of argon gas, that gives off as much light as a streetlight while using less power. The Tic Tac-sized bulb operates at temperatures up to 6000K and produces 140 lumens/watt, almost ten times as efficient as standard incandescent lamps, and twice the efficiency of high-end LEDs. The new bulbs also have a lifetime of 20,000 hours. There's no mention of mercury or other heavy metals, which pose a problem for compact fluorescents.
Hardware Hacking

Cyber Storm II Set To Begin 36

mr sanjeev notes that Computerworld is running a story about Cyber Storm II, set to run from March 11th until the 14th. The exercise will test the security of the US, Australia, the UK, New Zealand, and Canada. The organizers' goals are to test preparedness and responsiveness in relation to real-time threats. The previous Cyber Storm test identified "eight specific areas in need of improvement." We recently discussed the details of the tests themselves. From Computerworld: "Security experts said the first Cyber Storm event last year improved participants' understanding of who to call in the event of an attack, but did not identify specific vulnerabilities in the nation's computer systems. 'What they're trying to do is highlight the inefficiencies in the process,' according to Marcus Sachs, deputy director with research group SRI International's Computer Science Laboratory. 'They're not really looking for technical solutions.'"
Hardware Hacking

Australia's Geekiest Man 256

An anonymous reader writes "Why have a key to open your front door when you can have an RFID tag implanted in your arm that will do the trick? Computerworld has a story up about the outgoing Linux Australia group president's hacked home, in which just about anything from watering the lawn, to opening his blinds, or checking the mail can be controlled through a software environment. Jonathan Oxer is an electronics and coding whiz who apparently has an RIFD tag implanted in his arm that opens his front door, and his front gate is hooked up with gigabit Ethernet — able to tell him when someone enters the property or send him a virtual email or sms to say he has real mail. Apparently the iPod Touch has just inspired him to begin linking all his little hardware hacks together into the one single, software controlled handheld touch device. I wonder if Steve Jobs ever thought the Touch would end up being used this way?"
Hardware Hacking

Best Open Source License For Hardware? 125

An anonymous reader writes "MIT recently open-sourced some really cool hardware designs, including an H.264 video decoder and an OFDM transceiver, under MIT's open source license (a.k.a. the X11 license). Now, the OpenCores FAQ recommends that people use either the GPL, LGPL, or modified BSD license; they do not mention the MIT license at all. And, according to the Free Software Foundation the GPL license can be used for hardware, but they do not list the LPGL, modified BSD, or MIT licenses as suitable for non-software. Would you or your company use hardware source-released under the MIT license? What's the best license to use for releasing hardware?"
Hardware Hacking

Femtosecond Lasers Used To Color Metals 166

Maximum Prophet writes "An optics professor and a postgrad have developed a way to use ultra-short pulses of laser light to etch nano features into the surface of metals so that they can absorb or reflect specific wavelengths of light. This is very similar to the way that butterflies get the color in their wings."
Communications

Hackers Get Android Running on Real Hardware 73

nerdyH writes "Google's Android stack for Linux phones has been successfully hacked onto several actual hardware devices, including Linux-based Sharp Zaurus PDAs and a high-end development board. Google's preview release of Android last fall included a software emulator based on Qemu, but you can't beat real target hardware when writing applications for devices, because emulators may not accurately reflect real-world performance. Plus, it appears that Android's modern UI could really breathe some new life into lots of Linux-friendly hardware with ARMv5TE or better cores."
Hardware Hacking

Hand-Made Vacuum Tubes 227

djmoore writes "Over at Make Magazine, watch this video of a French amateur radio operator making and testing his own vacuum tubes. It looks like he built much of his own equipment as well. The Make poster notes: 'I love the ease with which he performs these rather high-end skills (like glass forming), the gestural flourishes (like it's hand magic), and the Zelig-esque soundtrack.'"
Hardware Hacking

Archos 605 WiFi Hacked 102

Nathan Ramella writes "The ARCwelder project has released a technique dubbed 'Go Fighting Tabby!' which exploits an unquoted system() call through the Archos UI, providing the ability to execute arbitrary code with root access on the Archos 605 WiFi. In doing so, opening the platform up for further hacking. The Archos 605 WiFi runs embedded Linux on an ARM processor, but employs a variety of anti-hack techniques to keep users from modifying its firmware and operating system. Included is a cross-compiled sshd with configuration files to allow for passwordless ssh access to the Archos when it is connected to a WiFi connection. Bricks ahoy!"
Hardware Hacking

Wiimote as Multi-Touch Display Controller 107

Tmack writes "While hard-hacks with the Wiimote are somewhat old news, this particular implementation is quite interesting. Using the infrared camera on the Wiimote, pens with LEDs instead of ink, and an LCD projector, Johnny Chung Lee of Carnegie Mellon University has created software to use them as a (relatively) cheap multi-touch display. Any surface onto which you can project becomes an interactive multi-touch display, as demonstrated in the video at the link. He has the software available for download, along with some other neat projects. Lee has also documented another impressive Wiimote hack.
Hardware Hacking

Ye Olde World Charm 130

The Solitaire brings us a link to Datamancer, where Richard R. Nagy shows off his Steampunk Laptop. The attention to detail and the creative style, which includes a copper-plated keyboard and speakers shaped like violin f-holes, make this an impressive case mod. From Datamancer: "This may look like a Victorian music box, but inside this intricately hand-crafted wooden case lives a Hewlett-Packard ZT1000 laptop that runs both Windows XP and Ubuntu Linux. It features an elaborate display of clockworks under glass, engraved brass accents, claw feet, an antiqued copper keyboard and mouse, leather wrist pads, and customized wireless network card. The machine turns on with an antique clock-winding key by way of a custom-built ratcheting switch made from old clock parts."
Hardware Hacking

Playing With Atomic Clocks At Home 167

Wired is running a profile of the Time Nuts, a small group of people who buy surplus precision time equipment — cesium clocks for example — on eBay and keep really accurate time, because they can. The article quotes Tom Van Baak, who has outfitted a time lab superior to those of many small countries: "If you have one clock... you are peaceful and have no worries. If you have two clocks... you start asking, 'What time is it, really?'"
Education

Weird Science Offered As University Class 137

ludwigvan968 writes "The ACTLab at the University of Texas at Austin is making waves with its Weird Science class. The link is to the TA's blog with documentation of some of the projects: a laser harp, a 3D environment constructed with fog and an LCD projector, and a 'water bridge' using a 50,000-volt transformer. Next semester, they're introducing a new class called 'Disruptive Technologies.'"
Hardware Hacking

Stalling Cars Via OnStar 737

Lauren Weinstein writes to tell us that GM will be installing OnStar systems on almost 1.7 million 2009-model cars that will allow law enforcement (or anyone who cracks the system) to remotely shut down vehicles. Here is the AP's writeup, which like most MSM coverage doesn't mention any privacy implications.
Hardware Hacking

Major Linux Hardware Donor Is a CNN "Hero" 341

christian.einfeldt writes "James Burgett of the Alameda County Computer Resource Center calls himself a 'tattooed freak' and a recovering drug addict, but CNN is calling him a hero (video) for diverting tons of computers from landfills, installing Ubuntu Linux on them, and giving them out to schools, non-profits, and poor people. Burgett's filmed interview is currently leading a CNN contest among videos of 'ordinary people' whom CNN considers everyday heroes, narrowly edging out the video of a man who is saving gorillas from extinction. In his interview, Burgett points out that the people working for him are also recovering drug addicts or recovering mental illness patients." Update: 10/02 23:46 GMT by KD : Reader stefanlasiewski posted a journal article describing how, bewilderingly, the state of California is threatening to shut down Burgett's ACCRC.
Communications

Upcoming Firmware Will Brick Unlocked iPhones 605

iCry writes "It was rumored last week, and Apple has now confirmed it: 'Apple said today that a firmware update to the iPhone due to be released later this week "will likely result" in SIM-unlocked iPhones turning into very expensive bricks... So what are users of SIM-unlocked iPhones to do? Not run the latest software update, that's for sure. Users can instead pray to the hacking deities — the famed iPhone Dev Team that released the free software unlock, and iPhoneSIMfree, which released a commercial software unlock — to write applications that will undo the unlocks, as it were, if those users want to run the latest iPhone software.'"
Hardware Hacking

Couple Bonding Through PC Building 465

mikemuch writes "When his lovely girlfriend Glenda needed a new PC, Jason Cross, who spends much of the week assembling PCs with the latest gear to test for ExtremeTech, decided he would let her build it herself. She gave him her list of needs, he came up with a part list, and then watched as she did all the screwdriver wielding herself. Despite a DOA hard drive and some mis-connected wires, everyone was smiling when it was all finished. (Slide show here.)"
Hardware Hacking

Shuttle SDXi Water-Cooled SFF PC 74

MojoKid writes "Shuttle Computer single-handedly invented the SFF PC or Small Form-Factor PC a few years back. Their line of XPC mini-PC systems, no bigger than a toaster oven, has evolved nicely over the years. This article takes a look at the features and performance of a new XPC from Shuttle that is built on a i975X/Core 2 Duo platform and is designed with the PC enthusiast in mind. The SDXi features a number of unique features like a built-in water-cooler for Radeon GPU-based graphics cards and a slick, flamed-out paint job that you've just got to see." Update: 07/08 23:53 GMT by KD : Here is a link to the version split over 12 pages, in which the images are clickable thumbnails.

Slashdot Top Deals