Hackaday Prize Entry: IO, the Cardboard Computer

[Dr. Cockroach]’s goal was to build a four-bit computer out of recycled and repurposed junk. The resulting computer, called IO, consists of a single 555, around 230 PNP and NPN transistors, 230 diodes, and 460 resistors. It employs RISC architecture and operates at a speed of around 3 Hz.

He built IO out of cardboard for a good reason: he didn’t have a big budget for the project and he could get the material for free from his workplace. And because it was built so cheaply, he could also build it really big, allowing him to be able to really …read more

Continue reading Hackaday Prize Entry: IO, the Cardboard Computer

Cryptocurrency Mining Post-Bitcoin

While the age of using your own computer to mine Bitcoin during spare CPU cycles has long passed, average folks aren’t entirely shut out of the cryptocurrency game yet. Luckily, Bitcoin isn’t the only game in town anymore, and with GPUs coming down in price it’s possible to build a mining rig for other currencies like Etherium.

[Chris]’s build starts with some extruded aluminum and a handful of GPUs. He wanted to build something that didn’t take up too much space in the small apartment. Once the main computer was installed, each GPU was installed upwards in the rack, with …read more

Continue reading Cryptocurrency Mining Post-Bitcoin

Hidden Kill Switch Identified in Controversial Intel ME controller chip

By Uzair Amir

Europe’s leading cyber-security firm Positive Technologies’ security researchers have a

This is a post from HackRead.com Read the original post: Hidden Kill Switch Identified in Controversial Intel ME controller chip

Continue reading Hidden Kill Switch Identified in Controversial Intel ME controller chip

IT Pro Tip: Evaluate and Measure Computer Reboot and Logon Times

Ever want to take a closer look at how long it actually takes for a computer to reboot and get a user logged on? This tip from Microsoft will show you exactly how to accomplish this type of analysis.

read more Continue reading IT Pro Tip: Evaluate and Measure Computer Reboot and Logon Times

Starter Guide to Linux Forensics

The old saying is if your data isn’t backed up at least twice, it’s not backed up at all. For those not wise enough to heed this adage, there are a number of options available to you if you wish your data to be recovered. Assuming the drive itself is just corrupted somehow (maybe a malicious attack, maybe a user error) and not damaged beyond physical repair, the first step is to connect the drive to another computer. If that fails, it might be time to break out the computer forensics skills.

[Luis]’s guide is focused on Linux-specific drives and …read more

Continue reading Starter Guide to Linux Forensics

Critical Vulnerabilities Found in Pre-Installed Dell Software

By Jahanzaib Hassan

With so much of news surrounding major global malware attacks such as the recent NotPetya incident, not much has been talked about some flaws that exist within the popular Dell software. Security flaws that require immediate update Before letting you know about the technical details of the vulnerabilities, it is important to note that those […]

This is a post from HackRead.com Read the original post: Critical Vulnerabilities Found in Pre-Installed Dell Software

Continue reading Critical Vulnerabilities Found in Pre-Installed Dell Software

Wooden Laptop Enclosure: New Life for Old Thinkpad

Technology is designed to serve us and make our lives better. When a device gets outdated, it is either disposed of or is buried in a pile of junk never to be seen again. However, some individuals tend to develop a certain respect for their mechanical servants and make an effort to preserve them long after they have become redundant.

My relationship with my first laptop is a shining example of how to hold onto beloved hardware way too long. I converted that laptop into a desktop with a number of serious modifications which helped me learn about woodworking along …read more

Continue reading Wooden Laptop Enclosure: New Life for Old Thinkpad

Homemade Computer from 1970s Chips

Sometimes it starts with a 555 timer and an op-amp. Other times with a small microcontroller. But the timing’s not so great and needs a dedicated timing crystal circuit. And maybe some more memory, and maybe the ATtiny should be swapped out for some 74LS-series chips. And now of course it needs video output too. Before you know it, you’re staring at a 40-chip computer that hearkens back to a simpler, yet somehow more complex, time of computing. At least that’s where [Marcel] is with his breadboard computer based on 1970s-era chips.

For what it does, this homebrew computer is …read more

Continue reading Homemade Computer from 1970s Chips

Interpol identifies 9,000 computers in Asia owned by hackers, used to launch ransomware

Nearly 9,000 computer servers based in southeast Asia are infected with or currently dispensing malware, according to a newly unveiled Interpol-led operation heavily supported by multiple private sector cybersecurity firms and domestic law enforcement agencies. Hundreds of compromised websites popularly used in Southeast Asia — including regional government portals — also were identified as under the control of hackers, Interpol announced Monday. The news underscores an increasingly international effort between national law enforcement agencies and the broader digital defense industry to collaborate on cybercrime fighting operations. An assistant attorney general for the Justice Department’s Criminal Division, Leslie Caldwell, said last year that the FBI would need to rely on foreign help to stop hackers in the future. “Sharing intelligence was the basis of the success of this operation, and such cooperation is vital for long term effectiveness in managing cooperation networks for both future operations and day to day activity […]

The post Interpol identifies 9,000 computers in Asia owned by hackers, used to launch ransomware appeared first on Cyberscoop.

Continue reading Interpol identifies 9,000 computers in Asia owned by hackers, used to launch ransomware