Live Journal 2600 Collective's Journal|
[Most Recent Entries]
Below are the 20 most recent journal entries recorded in
Live Journal 2600 Collective's LiveJournal:
[ << Previous 20 ]
[ << Previous 20 ]
|Tuesday, January 18th, 2011|
|Sunday, February 8th, 2009|
|Thursday, January 8th, 2009|
RepRap build-a-thon - 24 and 25 January 2008.
FOR IMMEDIATE RELEASE:
Local Technology and Arts Collective Holding Weekend Seminar on Self-Replicating Tools
Washington, DC – January 24-25, 2009.HacDC
, the Washington, DC-area technology and arts collective, is presenting a free, open to the public two-day event over the weekend of January 24th – 25th. Attendees will participate in the construction and use of a remarkable open source tool, the "Replicating Rapid Prototyper" or RepRap
. Anyone can make a RepRap machine, using parts made by another person with a similar machine, and a few additional parts that can be found online or from a local hardware store. RepRap is capable of making a nearly complete copy of itself, given a small amount of (possibly recycled) plastic. Once the machine is made, the user can download designs for other objects from the Internet or create their own designs, which can then be printed with the RepRap machine.( Read more...Collapse )
|Friday, October 3rd, 2008|
Food for thought
I just got home from the 2600 meeting. It was a very small turn-out. At one point the conversation turned to self programming robots and the like. I have some digital format papers on the subject, from 1994 there is "Living Machines", a 37 page paper by Mark Tilden. Tilden is a pioneer of this territory, both for robotics and artificial intelligence. His designs are basic, cheap, self-adapting, and very much insectoid in look. Another paper of his is "The Design of "Living" Biomech Machines: How low can one go?" This is a 23 page paper from 1997. These papers are VERY interesting. I'm kinda thinking about taking up the challenge of building one or two. I have a number of other e-books on building robots, if anyone is interested. I'm always willing to share the wealth of knowledge.
|Monday, April 7th, 2008|
Lansing 2600, take 2
The last meeting went pretty well.
That being said, 11 months ahead of schedule, we're having another one. The bar was a little loud, so we're swapping beer for coffee (Beaners, not that rubbish Starbucks stuff).More info Current Mood: bored
|Thursday, March 13th, 2008|
|Monday, December 3rd, 2007|
I have just been indentured to the to the 2600 magazine and have picked up my fist copy. I would never call myself a 1337. I do belive in and support many if not all of the ideas that I have read in 2600. I am also looking for others in the Huntsville Texas area that read 2600 and would like to start a 2600 group.
|Saturday, January 26th, 2008|
It's for defence against cyber attacks...trust us
i'm not even sure where to start with this story, from The Washington Post
, found via slashdot
Bush Order Expands Network Monitoring
Intelligence Agencies to Track Intrusions
Washington Post Staff Writer I'm starting to think Orwell's "1984" should be moved to the non-fiction section at the local library. Current Mood: cynical
Saturday, January 26, 2008; Page A03
President Bush signed a directive this month that expands the intelligence community's role in monitoring Internet traffic to protect against a rising number of attacks on federal agencies' computer systems.
The directive, whose content is classified, authorizes the intelligence agencies, in particular the National Security Agency, to monitor the computer networks of all federal agencies -- including ones they have not previously monitored.
Until now, the government's efforts to protect itself from cyber-attacks -- which run the gamut from hackers to organized crime to foreign governments trying to steal sensitive data -- have been piecemeal. Under the new initiative, a task force headed by the Office of the Director of National Intelligence (ODNI) will coordinate efforts to identify the source of cyber-attacks against government computer systems. As part of that effort, the Department of Homeland Security will work to protect the systems and the Pentagon will devise strategies for counterattacks against the intruders.
There has been a string of attacks on networks at the State, Commerce, Defense and Homeland Security departments in the past year and a half. U.S. officials and cyber-security experts have said Chinese Web sites were involved in several of the biggest attacks back to 2005, including some at the country's nuclear-energy labs and large defense contractors.
( Read more... it gets really scaryCollapse )
|Thursday, January 24th, 2008|
Why to take "hacking help requests" seriously.
Many people on this community already know why it's such a Bad Idea to discuss the use of general computer cleverness in committing even the most minor crime here. I am not a mod, but I am a concerned member, and I didn't see any mention of this on the userinfo page for this community, so I just wanted to post this general statement.
If you go visit the LJ TOS
, you'll find the following clause:
You understand that all Content, including without limitation, all information, data, text, software, music, sound, photographs, graphics, video, messages, or other materials, whether publicly posted or privately transmitted, are the sole responsibility of the person from which such Content originated. LiveJournal does not control Content posted via the Service and, as such, does not guarantee the validity of such Content. You also understand that by using the Service, you may be exposed to Content that is offensive, indecent, or objectionable. Should Content be found or reported to be in violation with, but not limited to, the following terms, it will be LiveJournal's sole discretion as to what action should be taken.
You agree to NOT use the Service to: [...] Promote or provide instructional information about illegal activities, promote physical harm or injury against any governmental entity, group or individual, or promote any act of cruelty to animals. This may include, but is not limited to, providing instructions on how to assemble bombs, grenades, and other weapons or incendiary devices
This is important to keep in mind because LJ has a clear history of mass-banning
the moment a few jerks start making a stink about the content on LJ. In fact, they've also taken a shine to banning searches on certain terms
. Granted, hackers haven't been bogeymen in a while now, but it still takes only one or two people with an axe to grind and this community could be lost.
Magazines like 2600
and the cultural groups that support and promote them have, time and again, deflected the majority of legal damage through a very simple set of rules-- meet in the open, show people that we're curious about machines simply for its own sake, and be the Good Guys. This isn't just a cynical marketing plan, either. There's nothing two-faced about it.
Thus, it's in the best interests of this community to be careful about what you ask. I don't ask a lot of questions on here because...well, frankly, I don't have the time to do all that much these days. That doesn't mean, however, that this community isn't a valuable asset and worth protecting.
If you value this community and the broader 2600
culture, please remember the way we keep ourselves safe and uphold it. LJ is a service that teeters on the brink of being a walled garden suitable only for those that meet its Disney-like fantasy image of blogging. If our little island in it is to remain, we have to keep it clean.
Again, I'm not a mod, so I'm happy to delete this if it has no place here. I've said my piece.
|Saturday, January 19th, 2008|
EIA-232 level shifting
No, I didn't use a search engine first.
I have a Magellan SporTrak GPS receiver. It has a serial output which
is ... out of spec. The space (0) is a sufficiently positive voltage
(I haven't measured, but judging from the brightness of the LEDs on a
breakout box, it's ~3V). The mark (1) is ground.
This is good enough for the UART on my desktop, but I already know
where that is! It doesn't satisfy the pl2303 chip in the only USB
serial converter I have at my disposal.
Could someone please point me towards a circuit I could build in a
D-sub jumper box? The only lines coming out of the GPS receiver are Tx, Rx,
and Gnd. Only the data line coming from the GPS receiver needs level
shifting, and that only for spacing.
|Sunday, December 9th, 2007|
|Friday, September 28th, 2007|
|Monday, September 24th, 2007|
Curl send sprint text
I spent awhile trying to figure out how to send a text message from terminal using:
I came up with:
curl -d "phoneNumber=6122223345&message=TheMessa
When I did that, the response said:
Cookies Are Not Enabled
So, I tried playing with -c (cookie jar) and some other stuff. One time, I accidentally copy and pasted the line twice into the terminal (as well as mispelled confirm), so it looked like this:
curl --cookie-jar -c cookiez.tmp -d "phoneNumber=6122223345&message=TheMessa
ging/compirmcurl -c cookiez.tmp -d "phoneNumber=6122223345&message=TheMessa
This did weird stuff. It downloaded the page twice. First, I got:
curl: (6) Couldn't resolve host 'cookiez.tmp'
<html><head><title>302 Moved Temporarily</title></head>
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="/textmessaging/compose;JSESSIONID_
Saying the page is in a different spot. Second, it downloaded the compose page, with the notice that the text message is in fact being sent! The 2nd set of arguments is irrelevant and discarded, so the phone number must be set in the first set of arguments.
My question is, 1. Why does this work - I'd imagine the first page sets a cookie that is passed to the second page. 2. What could I have done to do this right the first time.
Phone numbers have been changed from their original values.
|Saturday, September 15th, 2007|
|Friday, August 24th, 2007|
|Friday, August 17th, 2007|
|Wednesday, August 15th, 2007|
So i need to pull some information on a specific set of IP addresses at a specific time (within the last 3 weeks). They are addresses owned by SBC (pacbell). anyone know of a way to search the ip address records to pull down their exact geographical location at the time of an event? I can do it with a subpoena from our local PD, but they are a little over run...
|Tuesday, July 24th, 2007|
|Monday, July 23rd, 2007|
|Friday, July 20th, 2007|
it's two weeks away people: defcon xv
i'm a newb to defcon but i've heard the talks and been to (some of) the parties. what else is there to experience at DC, prefferably during the day?
i know there's a wi-fi shootout, cannonball run and some other activities but i don't know quite where to find out about these activities, carpooling, etc. what do i need to know about the con that isn't at the main hotel? and is there anything fun to do before and after the con since i'll be in from Wed night to Tues morning?
aside: i note that the toxic bbq and theSummit happen on the same day. is there any carpooling or shuttling for the car and directions deficient peoples?