Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Android Linux News Technology

Pwnie Express Releases Pwn Pad Ahead of Schedule 24

An anonymous reader writes "The team at Pwnie Express released their Pwn Plug, which combined an off the shelf SheevaPlug with a feature packed open source firmware that turned it into an incredibly capable security tool. Then came the Power Pwn, which hid the same type of functionality into what looked like a standard power strip. Today they've launched their latest product, continuing along the same line of hiding cutting edge open source security tools in plain sight: the Pwn Pad."
This discussion has been archived. No new comments can be posted.

Pwnie Express Releases Pwn Pad Ahead of Schedule

Comments Filter:
  • by Anonymous Coward

    The components add up to maybe $400 total if you buy them yourself. That's a 100% markup for the software -- which would probably take me half a day to get together and on the tablet. So if I value my time at more than $100 an hour, then maybe it's worthwhile.

  • by Anonymous Coward on Thursday March 14, 2013 @10:12PM (#43179255)

    An announcement coming shortly for a product that allows administrators to take tablets for pain relief, secure their networks, and engage in shootouts with the Chicago police, all using a simple handheld device. Sources say the name will be Alka Pwn.

  • by Anonymous Coward

    I want to Pwn2Own a Pwn Pad. No Pwn intended!

    • by Dahamma ( 304068 )

      Luckily for Google that contest only applies to Chromebooks, not Android tablets. Otherwise they'd have given out all of their hacking prize money in the first 10 minutes.

  • by tloh ( 451585 ) on Thursday March 14, 2013 @11:18PM (#43179625)

    the same type of functionality into what looked like a standard power strip

    A few years ago, I remember a story on slashdot about how a con-man swindled some investors who thought they were supporting the development of a high performance broadband wireless technology. Demonstrations were arranged where data transmission occurred across a bay or some other body of water. When the scam was uncovered, it was discovered that a coax cable was disguised as a power plug and used to fake the data transmission. I have not been able to rediscover the story or anything similar to it. Do any old timers here remember any such caper?

  • I'm an ordinary linux user, not geek, and interested in *owning* my tablet not pwning. Do I understand correctly that buying that one will allow me unrestricted root access?
    Also, what exactly is in the 'custom ROM' from this point of view? Am I to be confident?
    Last, do you think this tablet will be compatible with general-use linux apps, for instance, shall I be able to install serious image processing tools like Rawtherapee..?
    TIA!

  • Today they've launched their latest product, continuing along the same line of hiding cutting edge open source security tools in plain sight

    I'll be impressed when they come out with the Pwn Condom.

Technology is dominated by those who manage what they do not understand.

Working...