Hardware Hacker’s Marie Kondo: How Many LM386s is Too Many?

We’re running a contest on Making Tech at Home: building projects out of whatever you’ve got around the house. As a hacker who’s never had a lab outside of my apartment, house, or hackerspace, I had to laugh at the premise. Where the heck else would I hack?

The idea …read more

Continue reading Hardware Hacker’s Marie Kondo: How Many LM386s is Too Many?

WannaCrypt-style SMB exploits known since Stuxnet, circa 2008, but Microsoft hid fixes from us. So what is new now? [closed]

WannaCrypt-like SMB spreading technique was widely used in Stuxnet, as docummented by Symantec and Kaspersky.

Read this: W32.Stuxnet Dossier (2010,Symantec PDF)

Now we have the name of the exploit: EternalBlue

WannaCry r… Continue reading WannaCrypt-style SMB exploits known since Stuxnet, circa 2008, but Microsoft hid fixes from us. So what is new now? [closed]

Too Good To Throw Away: Dealing with an Out-Of-Control Junk Hoard

There it was, after twenty minutes of turning the place over, looking through assorted storage boxes. A Thinwire Ethernet network. About the smallest possible Thinwire Ethernet network as it happens, a crimped BNC lead about 100mm long and capped at each end by a T-piece and a 50 ohm terminator. I’d been looking for a BNC T-piece on which to hook up another terminator to a piece of test equipment, and I’d found two of them.

As I hooked up the test I wanted to run I found myself considering the absurdity of the situation. I last worked somewhere with …read more

Continue reading Too Good To Throw Away: Dealing with an Out-Of-Control Junk Hoard