29 September 2010

Free Your Mac’s Media Keys from iTunes, The One-Click Method

It’s the need for nonsense like this that degrades Apple’s laptop’s from “fucking stellar” to just “among the least insufferable on the market” or “a random Unix system I can do actual work with.”

[via:Leo Loikkanen]

8 June 2010

EFF’s List of Printers Which Do or Do Not Display Tracking Dots

“A “no” simply means that we couldn’t see yellow dots; it does not prove that there is no forensic watermarking present. (For example, the HP Color LaserJET 8500 series does not include any yellow tracking dots that we can see, but it may still include some kind of forensic marking, since the majority of other Color LaserJET models do.”


16 May 2010

Helsinki on a motherboard - from Teknostadi by Jussi Seppänen

Photo of Helsinki on a motherboard – a sculpture by Jussi Seppänen, from his exhibition Teknostadi, at display at Library 10 (Kymppikirjasto).

[via:Jani Uusitalo]

24 April 2010

Failed cheapo USB dongle design

[via:Kristoffer Lawson]

20 April 2010

Nearly every digital copier stores an image of all processed documents

Copiers have been equipped with hard drives for the last decade, but nobody’s paying any attention to the security implications.


18 April 2010

Not only is this My First Cubicle-type product intensely depressing, it’s also stupid. Since when have moderatly gifted children actually needed special-made computers and software?

[via:Maija Haavisto]

22 March 2010

Ask rooted – a computer security Q&A site based on the Stack Overflow platform.

[via:Mikko Hyppönen]

19 March 2010

Enthusiast builds digital pinball machine using commodity PC hardware

…and the Hyperspin pinball simulation software.

[via:Jeff Atwood]

20 January 2010

The Open-PC project

[via:Joonas Mäkinen]

6 January 2010

The history of the PC speaker and the beep driver in Windows 7

[via:Jeff Atwood]

17 November 2009

ICU64, real-time view and edit of Commodore 64 memory

More, better quality videos.


5 October 2009

Microsoft Research’s multitouch mouse prototypes


10 September 2009

Security vulnerability found in coffee machine

“The Jura Internet Connection Kit for the Jura Impressa F90 coffee maker does not properly restrict access to privileged functions, which allows remote attackers to cause a denial of service (physical damage), modify coffee settings, and possibly execute code via a crafted request.”


19 July 2009

Interview with Blue Pill creator: Security Threats 3 Levels Beyond Kernel Rootkits

Rutkowska is known for writing Blue Pill to demonstrate how…

“…hardware virtualization technology can be abused by malware to create a stealthy hypervisor and move, on the fly, the running OS into a virtual machine, controlled by this stealthy hypervisor.”


20 April 2009

Bohemian Rhapsody played by vintage computer hardware


Generated on