Agents of the Revolution
  • Content count

  • Joined

  • Last visited

  • Days Won


Everything posted by mungewell

  1. If you are looking at low voltage signals and willing/able to build up a USB device you could check out: He does say not expect more than '100's of sample/S', but it could be quite fun to build. There are also plently of pre-built/commercial offerings of 'USB scopes'. Cheers, Mungewell.
  2. Hi, The battery life on modern devices can be effected by so many things, even a small difference can result in a significant cut in runtime. Since the windows install is likely device specific (tailored with drivers written by device manufacture's) it may be hard to match the performance. If you don't have 'powertop' installed I sugest an 'apt-get install powertop'. The powertop website ( has a few suggestions on trimming the watts. Cheers, Mungewell. PS. Post back with your solutions, it'll be interesting to find out just how much you save...
  3. If the admin is paranoid, the logs may be on a 'write only' filesystem or being sent to another machine with syslog. Munge.
  4. Pretty cool, but all electronics give of some form of electromagnetic radiation, hence shielding the hell out of sensitive systems. Think what can be achieved if you can compromise the hardware. There was an interesting presentation at DefCon this year: Munge.
  5. You might like to take a look at zoneminder (, the supported hardware page ( on the wiki might give you some ideas. You could use a webcam connected to old PC to upload images to an FTP/web site, or buy a shiny IP Cam (to effectively do the same thing). Using VoIP software with a streamed image will likely give too poor an image to be useful. Cheers, Mungewell.
  6. A good resource for DIY power is the forums at: Mainly wind, but some solar/hydro/steam/gas Mungewell.
  7. You _can_ get it online via a SLIP/PPP connection via serial or IR.... I'm playing with mind to see if I can use it as a secondary display for a MythTV box. I'd like to display menus etc on it so that I can drive Myth without having to have the main display (large DLP screen) on for things like MP3 and Streaming audio. There is a VNC client ( and using x11vnc you can do server side scaling. Cheers, Munge. PS. There are a couple of hacks to ensure that the Palm starts the appropriate app when started.
  8. Just for the record, TFTP is heavily used in the VoIP world to provide firmware and configure phones. Yes the security (on the server) sucks, but the boot code on the phones can cryptographically check the download for validity. Why TFTP? Because it is extremely light weight, and when the power comes back on every phone on your network is going to hit it hard.... Munge.
  9. I have used a Linux application called PhotoRec to recover deleted photos from an SD-Card mounted in a reader. It worked really well. Munge.
  10. I think that you are setting yourself quite a hurdle by attempting not to use the FTS software. Unlike 802.11, Bluetooth is actually pretty secure by design. Once the communication is established, the frequency changes in time slices and these changes can be psuedo random. There are 79 channel each 1MHz wide starting at 2.402GHz and finishing at 2.480GHz. In order to snoop you will have to control your 'sniffer dongle' to some degree in order to make it follow the jumps of the monitored pair. You will also have to grab/work out what the encryption key is, which is negoiated when a channel is brought up between peers. If you really want to read up on Bluetooth, it looks like the core specification documents are available here: If you want to ask specific questions, PM me and I'll try to help. Cheers, Mungewell.
  11. and you bought that dongle only for this purpose ? No, you want to do this. I'm not interesting in intercepting voice conversations from bluetooth headsets or pulling information out of phones. I want to intercept the communication between my bluetooth keyboard and my computer and try to crack it. And that requires a bluetooth sniffer. The FTE/FTS software can be installed in Demo/Viewer only mode without a key. The default install contains some sample captures which show how powerful the sniffing is, if your sniffer is active from before any connection is made between the two target devices then EVERYTHING is decodable..... Cheers, Mungewell.
  12. Normally captures from soundcard, but I'd be pretty sure that you could loop-back a PCM sample into it. Cheers, Mungewell.
  13. Dia is a open-source attempt at Visio, and has bubbles for flow chart. Ports for Windows and Linux. Cheers, Mungewell.
  14. What if they happened to place an exploit into the clipboard, such as a suspicious jpeg or the like which would cause a buffer overflow and remote execution on your machine as soon as it was pasted somewhere? Do virus scanners actively check the clipboard? or do they assume that it must be safe as the contents must have be copied from somewhere which was previously scanned.... Cheers, Mungewell.
  15. Any one else get one of these pendants (at the Toxic BBQ or later) Guessing that it's an RFID which was used for tracking, so about to cut it open. Munge
  16. Alsa can also 'remix' everything the digital output. There are some examples in the Myth TV wiki: Cheers, Mungewell
  17. - Linux Encode/Decode library with demo applications. - Whilst not a true definition of DataMatrix, its extremely close. The official one is very expensive. Cheers, Mungewell. PS. Do ya think I think DataMatrix is cool...?
  18. What's written in the article makes perfect sense, he has replaced the firmware of the bluetooth dongle and changed the MAC address to match the appropriate block so that the paid-for sniffing application accepts it. He doesn't say which application he used, but my money is on: Not cheap, around the $10K mark for each license/dongle. If you have managed to find a source of 'ripped off' firmware, then you might be able to get something going. They did have a demo for download around Oct 2006... Cheers, Mungewell.
  19. Driving down Thurs... see ya all there. Munge.
  20. Did you put a JTAG probe on it yet? I did some work with a Connexant part (can't remember which one, but it was in the Set-Top-Box industry) a fair few years ago, and the main processor was simply (??) an ARM940T. Here's a really simple example of config and output serial code;view=markup which configures internal cache and 'pokes' code into it to run it. Cheers, Mungewell.
  21. Some of the newer processors can encrypt everything which is stored in external ram, this is handled by hardware built into the processor. The data/code is encrypted/decrypted on the fly as it is written to/read from ram. It is impossible to encrypt all ram, as the processor need to interpret the instructions in order to run them Mungewell.
  22. Just to note this can affect ANY system, if you have added a public key originally generated on Debian/Ubuntu to a 'authorized_key' file the crackers can own you!!!! It also affects other applications such as Encfs (encrypted filesystem), Tinc (VPN) and probably many others. Short story, trust nothing from the past. Regenerate now! Mungewell.
  23. Yeah, I used that as well, I don't think that the tapes were as resistant to corruption though. I love the quote from the website 'Even after you've used TurboTape for weeks, you'll still find it hard to believe that your cassettes can save and load this fast.'. LOL, Mungewell.
  24. Yep, every single one of them is cool which is why people start them.... it just depends what 'floats your boat'. What are you into - hardware, software, networking, graphics, activism, freedom? Mungewell
  25. You don't say how much data you want to store, or how often. Although I don't know of an immediate project to suggest, the solution will probably be to use a audio band modulator/demodulator such as AFSK. These are used in HAM radio so there are some applications out there, such as multimon ( which can decode stuff - I'm sure that there's a software encoder out there too. The other problems you'll have to overcome are bit corruption, wow-flutter and tape stretch. If you packetise your data and include forward error correction you might be able to get around these. If designing a system from scratch it might be worth while 're-purposing' and existing scheme. What ever you chose would have to be 1 way (ie. no feedback to issue resends!) Depending on your data contents (ie. numeric, ASCII or 8bit binary), you might like to take a look at the Datamatrix (2D barcode) system. Normally the Data matrix uses a maximum array of 144x144 pixels to represent up to 3116 (numbers) or 1556 (bytes), but these can be stacked into a group of up to 16 barcodes giving a storage size of around 24K. Rather than rendering to a bitmap you could take the byte code and pass it to an AFSK (or the like) modulator. There was also a project called DVbackup ( which did some research into error detection/correction. Cheers, Mungewell.