During yesterday's Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security presentation at the 24th Chaos Communication Congress in Berlin, hackers Michael Steil and Felix Domke demonstrated a blown-wide-open hack for the Nintendo Wii. They've extracted the keys for signing Wii code, and now you can run anyone's code on your Wii, not just programs that Nintendo has sanctioned. Incredible as it may seem, there are still companies that think that they should have the right to tell you what you can and can't do with your hardware after you pay for it.
Roll Sebastian Bergne's $3.33 pencil dice across the table to get a randomish value from 1-6. Useful for writing choose-your-own-adventures! (via Geekologie)
Louis Vuitton’s Windows CE gadget was a misstep. Pocket PCs were unpopular gadgets of questionable utility even in their day: obsolete in a heartbeat and now draped with the comical stink of Microsoft at its nadir. It hardly speaks to the timeless quality a luxury brand wants to conjure, even as a promotional stocking stuffer. […]
BeauHD, a Slashdot moderator, has Crohn's Disease, and he lives in an age of modern miracles, which means that he can have his small intestine surveyed by swallowing a tiny pill-sized camera, rather than having a scope threaded up his rectum or down his throat, or having his gut sliced open.
The Adobe Creative Cloud is home to a suite of editing tools today’s creatives count on to produce their content. Whether you’re an aspiring photographer, animator, or graphic designer, Adobe’s programs can help you in your creative pursuits, and with the Complete Adobe CC Training Bundle, you can come to grips with six of them for […]
Your pet might be photogenic, but getting them to stare long enough at your camera to snap that Instagram-worthy photo isn’t as simple as telling them to sit. Bribing your pets with their favorite treat, however, might just do the trick, and with the Adjustable Pet Selfie Smartphone Attachment, you can do just that while getting […]
The cybersecurity landscape is changing, and now one of the most effective ways to counter hacking threats is to employ another hacker against them. Commonly referred to as ethical hackers, these professionals use a cybercriminal’s tools against them, checking networks for vulnerabilities and patching them up before they can be exploited. The Certified Ethical Hacker Bootcamp […]