wideNES is an ingenious tool that lets you zoom out of the NES game you're playing. It's a feature of ANESE, a new NES emulator developed by Daniel Prilik.
wideNES is a novel technique to automatically and interactively map-out NES games, in real time.
As players move within a level, wideNES records the screen, gradually building-up a map of what’s been explored. On subsequent playthroughs of the level, wideNES syncs the action on-screen to the generated map, effectively letting players see more of the level by “peeking” past the edge of the NES’s screen! Best of all, wideNES’s approach to mapping games is totally generalized, enabling a wide range of NES games to work with wideNES right out of the box!
The technical description of how it works is well-worth reading. It's like a primer on how memory-challenged early game consoles managed to keep things smooth and sweet--and why it's better to employ such an elaborate technique of observation than to try and pre-emptively decode the internal geography of each game.
Why not extract levels directly from ROMs?
Trying to extract level data from a NES ROM would be equivalent to determining which sections of the ROM are code (as opposed to data), which is hard, since finding all code in a given binary is equivalent to the Halting problem!
wideNES takes a much simpler approach: Instead of guessing how games pack level data in ROM, wideNES will simply run the game and watch the output!
An excellent suggestion from ArtWomb on Hacker News: set up a high-resolution monitor that has the entirety of a game world on it, letting it remain static whole your tiny sprite (Link, for example, in Hyrule) quests forth. Read the rest
Karateka is not just a classic game, but one of the most well-documented thanks to Jordan Mechner's memoirs and his habit for maintaining archives. 34 years after its release, Charles Mangin studied the game's source code and patched it to allow a second player to control the enemies—effectively adding a vs. battle mode.
I’ve taught myself 6502 assembly after getting back into the Apple II, through the thriving community online. The idea of a two player version of Karateka came back to me while at KansasFest a couple of years ago. I noodled a little on it back then, getting distracted by finding the code that created the unique music in the game. Long story short: I finally found the places in the game code that needed patching to allow a second player to control the enemies in the game, and create a functioning two player version of Karateka. The resulting patch is only 42 bytes long
42, the meaning of life! You can play the two-player Karateka at the Internet Archive.
I'd love to see this done to Great Gurianos (sometimes renamed Gladiator), another 80s' fighter with an interesting combat system whose attract mode suggested vs. battles that were not in the game itself. Read the rest
Ticketmaster UK today admitted that an unknown number of customers' data may have been stolen in a malware attack. Read the rest
NEW REPORTING CONFIRMS what previous stories speculated: chief of staff John Kelly's phone was hacked, and now they know where. They still don't know by whom, or how, or why, or what the damage was. Read the rest
The Department of Homeland Security today revealed which states were targeted by Russian hackers trying to break into voting systems during the 2016 election cycle. DHS said "most" states were unsuccessfully attacked, but didn't make clear how and where the hackers were successful, or whether the sustained cyberattacks helped Donald Trump win the presidency. Read the rest
Behold the most amazing arcade hack in existence: Matt Brailsford, AKA Circuitbeard, crammed Sega's OutRun into a Tomy Turnin' Turbo dashboard. [via]
Some key features are an integrated 3.5” TFT screen, fully usable steering wheel and gear shifter (dashboard turbo light comes on when in high gear), working ignition key for power, true MPH speed and rev counter displays, and a fuel gauge to represent the stage time remaining.
The project itself was quite a big one for me, filled with several moments of frustration, from burnt out potentiometers, to soldering LEDs backwards, multiple TFT screen purchases and more than one change in direction as approaches to problems were found to be inadequate.
All the toy's hardware is hooked up to the game, running on a Raspberry Pi with a PiCade board and Kookye 3.5" display. He worked around the lack of pedals by using the gearshift to accelerate and brake. How he made a physical LED dashboard to show the in-game speed completely escapes me. Genius!
Here's the original mechanical toy, for reference:
Read the rest
Snazzy Labs built a startlingly powerful Mac with only $70—editing the video above on it to prove it! Read the rest
Before today's anticipated announcement by the Justice Department, more details are already leaking out about who they're after: “two Russian spies, and two criminal hackers.” Read the rest
Just a few months after Yahoo disclosed a 2014 breach of 500 million user accounts, the company today revealed this was preceded by a 1 billion account breach in 2013, in which the hackers took everything: hashed passwords, names, email addresses, phone numbers, dates of birth, and possibly the tools necessary to forge login cookies that would bypass password checks altogether. Read the rest
This fellow cut the polarizing film from a $20 thrift store monitor and put film on a pair of eyeglasses to make a display that looks like a black screen to everybody but him. This is a good way to enjoy photos of Rubik's Cubes without anyone catching you. Read the rest
AdultFriendFinder was hacked (again) in October 2016. According to LeakedSource, which acquired a copy of the dataset, this amounts to more than 400m accounts, many with plaintext passwords, from AdultFriendFinder and associated websites.
The site was compromised with a local file inclusion exploit, which means the website's code allowed access to files on the server that aren't supposed to be public.
Nearly a million accounts have the password "123456". More than 100,000 have the password "password".
The non-plaintext passwords were easily cracked anyway, apparently due to some roll-your-own encryption that involved lowercasing everything, SHA1ing it and going back to bed. The longest passwords were "pussy.passwordLimitExceeded:07/1" and "gladiatoreetjaimelesexetjaimefum", with a Blackadder fan in #3 with "antidisestablishmentarianism" and a sybarite who reads XKCD in #4 with "pussypussymoneymoneyweedweed."
Hotmail was the most common email provider, followed by Yahoo and gmail. These three accounted for the vast majority of registered addresses, with AOL and Live an order of magnitude down.
Leaked Source isn't making the data set publicly available; but if they have it, others might too. Read the rest
A China-based maker of surveillance cameras said Monday it will recall some products sold in the United States after a massive "Internet of Things" malware attack took down a major DNS provider in a massive DDOS attack. The stunningly broad attack brought much internet activity to a halt last Friday.
Read the rest
Security experts hired by the short-selling firm Muddy Waters said in a legal brief filed today that cardiac implants made by St. Jude Medical can be hacked. If hackers can pwn your heart device, the researchers say, they can kill you--from as far away as 100 feet. Read the rest
A former Booz Allen Hamilton contractor who worked with the National Security Agency will face charges of espionage in a case involving 50 terabytes or more of highly sensitive NSA data the government says were stolen.
Read the rest
An image identified as a scanned copy of U.S. first lady Michelle Obama’s passport was published online today by "DC Leaks," along with personal emails associated with a man identified as a “low-level White House staffer who worked with Hillary Clinton’s presidential campaign.”
Read the rest
Yahoo today confirmed that it suffered a massive data breach that exposed information for at least 500 million user accounts in 2014. If you have a Yahoo account, the company says you should review all your online accounts for any suspicious activity. Read the rest