Friday , 29 March 2024
Home 4 Hack Day (page 2)

Hack Day

Google Speed Up Google Analytics with urchin.js

Ever notice that sometimes your sites take a while to load all the way because google’s urchin.js file is taking forever? You may recognize this problem when you see something similar to this in your browsers status bar “Transferring data from google-analytics.com…” Time To Setup? 4 minutes I got tired of seeing that all the …

Read More »

Electricity usage monitor

Many houses in the UK have an electricity meter with a light on it that flashes at a rate proportional to how fast electricity is being used (typically 800 times per kilowatt hour). I built a system that took advantage of this to measure our house’s electricity usage. We already had a PC (our router) sitting on the floor next to the meter cupboard, so the easiest way to measure the rate was to clamp a photocell over the flashy light and connect it (via a little bit of interface hardware) to the router’s parallel port, then run a program to measure the time between flashes.

Read More »

Amankah Internet Banking Anda

Bagaimana caranya mengirimkan dokumen digital rahasia dengan cepat, aman dan praktis ke alamat email rekan atau kolega bisnis, yang mungkin sedang berada di Yogya dan tidak memiliki komputer dan terkoneksi ke internet hanya dari warnet ? Kalau filenya di kompres (zip) dan diberi password atau dokumen MS office di beri password dan relatif mudah dibuka oleh orang yang tidak berhak dengan tools pembuka password (password cracker) yang banyak tersedia di internet (underground seperti www.astalavista.com). Dengan menggunakan dictionary attack atau brute force hanya masalah waktu saja password tersebut akan dapat ditemukan. Gambar 2, Password Recovery Tools yang sering disalahgunakan untuk membuka file orang lain yang dipassword

Read More »

SQL Injection Walkthrough

The following article will try to help beginners with grasping the problems facing them while trying to utilize SQL Injection techniques, to successfully utilize them, and to protect themselves from such attacks. Introduction When a machine has only port 80 opened, your most trusted vulnerability scanner cannot return anything useful, and you know that the admin always patch his server, we have to turn to web hacking. SQL injection is one of type of web hacking that require nothing but port 80 and it might just work even if the admin is patch-happy. It attacks on the web application (like ASP, JSP, PHP, CGI, etc) itself rather than on the web server or services running in the OS.

Read More »

Steerable 802.11 Cantenna

I love projects that start off with a definite need – however daft it might be ! This one came about because the 802.11 chili can antennas we built were a bit of a pain to mount and point at various 802.11 access points. I thought it would be handy to build a steering platform that allowed the antenna to hunt for the strongest access point itself and zero in ! The antenna (standard issue Chili can antenna) is controlled by a PIC microcontroller connected to servos on the pan and tilt axis. This gives about 180 degrees of motion in both planes. The RF pigtail from the antenna is plugged into the 802.11 PCMCIA card in the computer which runs a Visual Basic program. This computer sends the PIC microcontroller the antenna coordinates to point to and measures the received signal strength off the 802.11 card. Hence the antenna …

Read More »

SD/MMC card fits in floppy edge-connector

You can attach an SD camera memory card to any homebrew DIY project that has a few I/O pins, using ordinary connectors you probably have right now. SD cards are very popular for this purpose, because they only need a few pins (using SPI mode), and can be driven with simple “bit-bashed” SPI serial communications protocol, using free device drivers readily available on the Internet. Until now, the big holdup for using an SD card in many homebrew projects has been the fact that SD sockets are not available at your local store, are not cheap (especially after shipping), and require ordering and waiting for them to arrive. But wait no longer! You can do it now! If not just laying around, or inside an old unused computer, you may have a spare connector inside the computer you are reading this with right now. seet more at http://uanr.com/sdfloppy/

Read More »