Hotline Helps Toddler Keep in Touch with Mom and Dad

Even though the age for first carrying a smartphone seems to be decreasing, there’s a practical lower minimum age at which a kid can reliably use one to make a call. So how do you make sure your tot can reach out and touch mommy or daddy? This toddler-friendly Raspberry Pi hotline is a good start.

With a long trip to Hawaii pending and a toddler staying behind, [kuhnto] wanted a way to make communication as simple as possible. In the days of pervasive landlines, that would have been as simple as a feature phone with a couple of numbers …read more

Continue reading Hotline Helps Toddler Keep in Touch with Mom and Dad

DIY Wireless Sprinkler System? Don’t Mind If I Do.

What to do once you have a sprinkler system installed on your property: buy a sprinkler control system or make your own? The latter, obviously.

[danaman] was determined to hack together a cheap, IoT-enabled system but it wasn’t easy — taking the better part of a year to get working. Instead of starting right from scratch, he used the open-source Sustainable Irrigation Platform(SIP) control software — a Python sprinkler scheduler with some features [danman] was looking for(eg: it won’t activate if there’s rain in the forecast). Since he wasn’t running it with a Raspberry Pi as recommended, [danman] wrote a …read more

Continue reading DIY Wireless Sprinkler System? Don’t Mind If I Do.

Deprecated, Insecure Apple Authorization API Can Be Abused to Run Code at Root

An insecure Apple authorization API is used by numerous popular third-party application installers and can be abused by attackers ro run code as root. Continue reading Deprecated, Insecure Apple Authorization API Can Be Abused to Run Code at Root

Deprecated, Insecure Apple Authorization API Can Be Abused to Run Code at Root

An insecure Apple authorization API is used by numerous popular third-party application installers and can be abused by attackers ro run code as root. Continue reading Deprecated, Insecure Apple Authorization API Can Be Abused to Run Code at Root