Friday, September 25, 2009

Missing: Floppy Disk Drive


I understand everybody places different values on certain things they own. For example, you may like this old beat up thing you've had since your childhood --Perhaps a blankie, a pillow, a toy, etc. Yeah, it may be old and/or even smelly but at the end of the day you'd be upset if someone stole it or you misplaced it.

Consequently, I cannot judge other for their sentimental attachments. In this guy's case it's his floppy disk drive. He wants it back. He's pissed. And apparently he's willing to pay.

Lost Floppy



Here's a close up ...

Lost Floppy



All this reminds me of a t-shirt from Threadless:

Missing Bicycle




Surly you have your own peculiar attachments. Share them with us in the comments.  ▣


Click here to see Friday-only posts.


Thursday, September 24, 2009

Wednesday, September 23, 2009

Lego Animation


Weird? Yes. But it took 1500 hours of laying these lego bricks, taking a picture each time and then stitching them all into this awesome video.


Link: http://www.youtube.com/watch?v=4qsWFFuYZYI
  ▣


Click here to see Wednesday-only posts.


Tuesday, September 22, 2009

Privacy, Security and Sniffing Keystrokes from Thin Air


As many of you know, Tip Tuesdays are my longest blogging days. Also, as you may know, I've had a backlog to play catch up given the time off I had on Sunday & Monday. With that in mind, I wanted to ease into a topic, which I plan to cover over the next 2 or 3 Tuesdays: Security & Privacy.

As an introduction, I found the following piece by Robert McMillan of PC World India to be very appropriate. As always, I welcome and invite you to comment on the topic. As I'm also interested in what else you have found or stumbled upon.

Sniffing Keystrokes

Researchers Find Ways to Sniff Keystrokes From Thin Air


Researchers say they have found new ways to determine information users type into keyboards, presenting a security risk.

That PC keyboard you're using may be giving away your passwords. Researchers say they've discovered new ways to read what you're typing by aiming special wireless or laser equipment at the keyboard or by simply plugging into a nearby electrical socket.

Two separate research teams, from the Ecole Polytechnique Federale de Lausanne and security consultancy Inverse Path have taken a close look at the electromagnetic radiation that is generated every time a computer keyboard is tapped. It turns out that this keystroke radiation is actually pretty easy to capture and decode -- if you're a computer hacker-type, that is.

The Ecole Polytechnique team did its work over the air. Using an oscilloscope and an inexpensive wireless antenna, the team was able to pick up keystrokes from virtually any keyboard, including laptops. "We discovered four different ways to recover the keystroke of a keyboard," said Matin Vuagnoux, a Ph.D. student at the university. With the keyboard's cabling and nearby power wires acting as antennas for these electromagnetic signals, the researchers were able to read keystrokes with 95 percent accuracy over a distance of up to 20 meters (22 yards), in ideal conditions.

Laptops were the hardest to read, because the cable between the keyboard and the PC is so short, making for a tiny antenna. The researchers found a way to sniff USB keyboards, but older PS/2 keyboards, which have ground wires that connect right into the electric grid, were the best.

Even encrypted wireless keyboards are not safe from this attack. That's because they use a special algorithm to check which key is pressed, and when that algorithm is run, the keyboard gives off a distinctive electromagnetic signal, which can be picked up via wireless.

Vuagnoux and co-researcher Sylvain Pasini were able to pick up the signals using an antenna, an oscilloscope, an analog-digital converter and a PC, running some custom code they've created. Total cost: about US$5,000.

Spies have long known about the risk of data leaking via electromagnetic radiation for about 50 years now. After the U.S. National Security Agency found strange surveillance equipment in a U.S. Department of State communications room in 1962, the agency began looking into ways that radiation from communications equipment could be tapped. Some of this research, known as Tempest, has now been declassified, but public work in this area didn't kick off until the mid-1980s.

The idea of someone sniffing out keystrokes with a wireless antenna may seem ripped from the pages of a spy thriller, but criminals have already used sneaky techniques such as wireless video cameras placed near automated teller machines and Wi-Fi sniffers to steal credit-card numbers and passwords.

"If you are a company using highly confidential data, you have to know that the keyboard is a problem," Vuagnoux said.

If pulling keystrokes out of thin air isn't bad enough, another team has found a way to get the same kind of information out of a power socket. Using similar techniques, Inverse Path researchers Andrea Barisani and Daniele Bianco say they get accurate results, picking out keyboard signals from keyboard ground cables.

Their work only applies to older, PS/2 keyboards, but the data they get is "pretty good," they say. On these keyboards, "the data cable is so close to the ground cable, the emanations from the data cable leak onto the ground cable, which acts as an antenna," Barisani said.

That ground wire passes through the PC and into the building's power wires, where the researchers can pick up the signals using a computer, an oscilloscope and about $500 worth of other equipment. They believe they could pick up signals from a distance of up to 50 meters by simply plugging a keystroke-sniffing device into the power grid somewhere close to the PC they want to snoop on.

Because PS/2 keyboards emanate radiation at a standard, very specific frequency, the researchers can pick up a keyboard's signal even on a crowded power grid. They tried out their experiment at a local university's physics department, and even with particle detectors, oscilloscopes and other computers on the network were still able to get good data.

Barisani and Bianco will present their findings at the CanSecWest hacking conference next week in Vancouver. They will also show how they've been able to read keystrokes by pointing a laser microphone at reflective surfaces on a laptop, such as the screen. Using the laser's very precise measurements of the vibrations on the screen's surface caused by typing, they can figure out what is being typed.

Previously researchers had shown how the sound of keystrokes could be analyzed to figure out what is being typed, but using the laser microphone to pick up mechanical vibrations rather than sound makes this technique much more effective, Barisani said. "We extend the range because with the laser microphone, you can be hundreds of meters away," he said.

The Ecole Polytechnique team has submitted their research for peer review and hopes to publish it very soon.


There are other methods out there. This one particular blog entry on the topic caught my attention.

Again, if you've across anything similar, please do share it with all of us in the comments  ▣


Click here to see Tuesday-only posts.


Inspirational Monday - A Link


Monday day 2 of a religious holiday, which caused a major blogging backlog. But I didn't want to leave the day unfilled so I'm retro-posting. And instead of posting a full article, I figured it was easier and faster (finish the backlog too) to just provide you a link to something I found very inspirational.

This link is about photography, and how one can generate some awesome and fascinating pictures without the use of programs or tools like Photoshop.

Enjoy: http://j.mp/4C3t4P  ▣


Click here to see Monday-only posts.