hack page 4 - Dave's Blog

Search
My timeline on Mastodon

CyanogenMod-6.0.0 RC1 | CyanogenMod

2010 Jul 14, 3:40Finally get Android 2.2 onto my G1!PermalinkCommentsandroid phone g1 google hack technical cellphone todo

Listen To House - Hacked IRL- Culture Jamming Graffiti

2010 May 19, 1:29Is it ever lupus?
PermalinkCommentshumor ad cultural-disobediance graffiti house

Hacked Roomba will google your house - Boing Boing

2010 Mar 3, 2:52Roomba hack that runs OCR on all text it can find in the house and then indexes and lets you search. Also it still vacuums.PermalinkCommentsroomba hack google vacuum search ocr

Flavorwire » Re-assembly Required: Artists on IKEA

2010 Feb 22, 7:34Art created from IKEA products.PermalinkCommentsart design ikea hack

KrazyDad » Blog Archive » Mayor of the North Pole

2010 Feb 22, 4:16On cheating at Four Square. Man becomes mayor of North Pole among other things.PermalinkCommentshack game security humor article geo gps cheat social api technical

Remove a Stripped Screw with a Rubber Band - Household - Lifehacker

2010 Feb 3, 3:18PermalinkCommentsdiy tip howto screw rubber-band macgyver

McAfee Security Insights Blog » Blog Archive » Operation “Aurora” Hit Google, Others

2010 Jan 20, 8:26McAfee on the China v Google attack.PermalinkCommentshack hackers security google browser web ie china microsoft malware ie6 technical

Google and China: the attacks and their aftermath

2010 Jan 13, 6:35Ars Technica rounds up links on the recent Google threatening to stop censoring itself in China including quotes from Secretary of State Clinton, and the EFF and info on the hacks.PermalinkCommentsgoogle china arstechnica news politics security censorship

Make: Online : Hack the box to get to the phone

2009 Dec 31, 4:40"Nokia has been struggling a bit this year, but this "hack it" to get your phone unboxing is pretty interesting. Once you "root" the box it opens up and a little puff of smoke appears, along with your phone (if you're a phone / gadget reviewer)." Makes me wonder how many devs and engineers they had working on the box to contain this phone.PermalinkCommentsphone video cellphone hack

YouTube - Automatic Mario~Don't Stop Me Now~【自動マリオシーケンサ×Queen】

2009 Nov 29, 1:43Queen's "Don't Stop Me Now" accompanied by 4 games of a hacked Super Mario World level. The matching of the background images between the four plays is what gets me.PermalinkCommentshumor videogame video youtube mario queen music dont-stop-me-now via:waxy

English Shellcode

2009 Nov 27, 6:10"What follows is a brief description of the method we have developed for encoding arbitrary shellcode as English text. This English shellcode is completely self-contained, i.e., it does not require an external loader, and executes as valid IA32 code."PermalinkCommentssecurity polyglot intel paper research programming hack obfuscation english language technical system:filetype:pdf system:media:document

Brutal Mario ROM Hack - Play This Thing!

2009 Oct 25, 5:50Every level has its own twist. In one, P switches stop time as in enemies freeze as well as the level clock, which starts at 60 seconds. The enemies are taken from previous Mario games, Donkey Kong Country, Chrono Trigger, and others. Entertaining!
PermalinkCommentsgame mario download hack rom emulate nes nintendo japanese

hackademix.net » Strict Transport Security in NoScript

2009 Sep 24, 3:51A proposed new HTTP header 'X-Force-TLS' to indicate a site only wants to be over HTTPS.PermalinkCommentshttp header security https extension noscript web browser webbrowser

Replace your T-Mobile voicemail with Google Voice visual mail | Android Atlas - CNET Blogs

2009 Aug 4, 7:00PermalinkCommentsgoogle google-voice android phone cellphone voicemail hack howto technical

IE8 Search Providers, Accelerators, and Local Applications Hack

2009 Jul 25, 3:23

There's no easy way to use local applications on a PC as the result of an accelerator or a search provider in IE8 but there is a hack-y/obvious way, that I'll describe here. Both accelerators and search providers in IE8 fill in URL templates and navigate to the resulting URL when an accelerator or search provider is executed by the user. These URLs are limited in scheme to http and https but those pages may do anything any other webpage may do. If your local application has an ActiveX control you could use that, or (as I will provide examples for) if the local application has registered for an application protocol you can redirect to that URL. In any case, unfortunately this means that you must put a webpage on the Internet in order to get an accelerator or search provider to use a local application.

For examples of the app protocol case, I've created a callto accelerator that uses whatever application is registered for the callto scheme on your system, and a Windows Search search provider that opens Explorer's search with your search query. The callto accelerator navigates to my redirection page with 'callto:' followed by the selected text in the fragment and the redirection page redirects to that callto URL. In the Windows Search search provider case the same thing happens except the fragment contains 'search-ms:query=' followed by the selected text, which starts Windows Search on your system with the selected text as the query. I've looked into app protocols previously.

PermalinkCommentstechnical callto hack accelerator search ie8

Analysis of the Green Dam Censorware System

2009 Jun 12, 12:20"We have discovered remotely-exploitable vulnerabilities in Green Dam, the censorship software reportedly mandated by the Chinese government. Any web site a Green Dam user visits can take control of the PC. According to press reports, China will soon require all PCs sold in the country to include Green Dam. This software monitors web sites visited and other activity on the computer and blocks adult content as well as politically sensitive material."PermalinkCommentscensorship china hack security internet greendam

The Ultimate Lock Picker Hacks Pentagon, Beats Corporate Security for Fun and Profit

2009 Jun 1, 3:21"Marc Weber Tobias can pick, crack, or bump any lock. Now he wants to teach the world how to break into military facilities and corporate headquarters."PermalinkCommentsvia:boingboing hack diy business politics security video lockpicking lock crime wired

A Brief History of Microsoft's Live Search's New Domain Bing

2009 Jun 1, 11:07
Logo for bing! from 2003 via The Wayback MachineLogo for BING* from 2006 via The Wayback MachineKimberly Saia's flickr photo of the Microsoft bing search logo.
When I heard that Live Search is now Bing one of my initial thoughts was how'd they get that domain name given the unavailability of pronouncable four letter .COM domain names. Well, the names been used in the past. Here now, via the Wayback Machine is a brief, somewhat speculative, and ultimately anticlimactic history of bing.com:

The new name reminds me of the show Friends. Also, I hope they get a new favicon - I don't enjoy the stretched 'b' nor its color scheme.

PermalinkCommentsmicrosoft technical domain history search archive dns bing

Infrared Goggles for $10, inexpensive IR filters, SCIENCE HOBBYIST

2009 May 29, 8:49Howto on goggles that block out everything but the small range of IR that's barely visible. "INFRARED GOGGLES FOR UNDER $10, A Human IR Vision Experiment, Sept. 14, 2002 Bill Beaty"PermalinkCommentsir infrared hack howto science photography diy hardware light

Clickable transcript of my Canonical Link Element talk

2009 Apr 23, 6:21You can link into the middle of a YouTube video using a fragment like '#t=30m14s'. Matt combines this with his transcript...: "If you run that over your entire caption file - boom - you have a clickable transcript of your video."PermalinkCommentsvideo blog hack youtube url transcript
Older EntriesNewer Entries Creative Commons License Some rights reserved.