Latest Entries »

Hey guys, looks like I’m out of big stuff for the moment, so I’ll pop back to my two story format for now.

Google’s upcoming Mobile OS has been leaked out to open waters, with a companion in the good ole black box. No version number yet, and no huge visible upgrades (new colors, new drop down notifications, couple new functions.) This is however still a very early build, so from what I’ve seen so far things will pick up, and fast. Got some pics coming you’re way!

This slideshow requires JavaScript.

 

Pages: 1 2

Hey, readers. Digest this! People who think like me, enjoy the thought that augmented reality could be a wave of the future. Right now, I’m here to explain to everyone what augmented reality is, and why it’s a huge leap forward.

Augmented reality is a function of essentially any device with a camera (assuming it has the processing power, or connects to something that does.) What it does? Well it changes the world… Digitally. Augmented reality is any program that takes what you see, and alters it! adding information, directions, toys, mimicry, anything that isn’t there in real life can be added.and what is there in real life can be altered!

Let me show you, here we have a video of a man interacting with a digital 3D video of himself… ON HIS DESK! This works on a simple principle. Record, Program, Play. Record the video, Program your device to detect a marker (a small card or paper with distinct shapes and colors), then have the device play the video on top of the camera’s view where it sees the maker! It’s a simple overlay (not to say it’s easy to do!) The only problem, you need the marker to use the software. More advanced programming can allow for more advanced features, like interaction!

Interaction was the second key step in augmented reality becoming our new reality! This is the EyePet from Sony’s PSP developers. A game on a mobile platform, the EyePet is interactive via the PSP’s mic, buttons, and even real world items (i.e. the swing/pencil.) Interaction is a big part of life, and we need to be able to interact with our reality, digital or not. But even at this stage, as you see in the video, the marker is still needed.

This is where augmented reality seemed to have held for just a bit, but now we have this (sorry, it’s in japanese.) What you see here is a Sony developed augmented reality called SmartAR… It works without markers! It’s early in development, but seems smooth enough to use in daily life! The system works on recognition of real world shapes, not marker shapes. This is because it can use high definition technology to find the edges of items such as coffee cups, books and even the desk you’re reading this from.

Now if you combine Sony’s SmartAR software with these!

DARPA's Hologram shades!

These bad boys will have an integrated HD cam and projective lens. Basically, it’ll take the data given and overlay it inside the lens, so you’ll see it as an overlay to the item you look at! Imagine, you send yourself data to the shades from google maps on your smartphone, and it places a line on the floor for you to follow!  The phone crunches all the numbers, and the glasses show you the way! Impressive yes? This is the future, and after that only time will tell!

If you have any questions, please feel free to ask in the comment section below, or by email at technical.confessions@gmail.com, Facebook at Technical Confessions, or on twitter @techconfessions.

Well guys, that’s today’s Technical Confessions. As always, if you like what you read here, please subscribe and ALWAYS comment!

See Ya Next Time!

Fun And Functional Kinect Hacks

Good morning readers!

Today I’m going to show you a little something.

Microsoft Kinect

This is The Kinect for the Xbox 360. Keep in mind however, that what you are about to see is far from the limit. There are many projects running right now which use a Kinect sensor as the interface. Some that will even change lives.

Take, for example the WiGo project. This is a project directed toward the disabled. If you watch here, you’ll see a man in a wheelchair shopping, something we find rather easy, but he’s having a bit of a rough with it! But keep watching and you see the hack… A shopping cart that follows him wherever he goes! of course it’s not perfect yet, but if it makes it to market, it’ll make life easier for the disabled, and others likewise.

One for fun next? Okay, if you look here you’ll see a FULLY automated flying drone, which see’s in 3D and can actually navigate around obstacles without assistance! hows that for cool?

What’s next? Monkey see monkey do?

If you have any questions, please feel free to ask in the comment section below, or by email at technical.confessions@gmail.com or twitter @techconfessions

There you have it! Today’s Technical Confessions. As always, if you like what you read here, please subscribe and ALWAYS comment!

See Ya Next Time!

NASA finds DNA components from space

Good morning to all my readers out there. sorry had to take a couple days off to continue some other writings. However I kicked into gear as soon as i saw this story! NASA has found some rather ground breaking evidence of non-terrestrial life!

Petrified DNA Crispies... Delish.

Basically, you’re seeing components of DNA formed inside a meteorite, by way of chemical reaction. their samples contained Adanine, Guanine, and multiple “neucleobase analogs” all capable of possibly generating life, three of which are rare even here on earth. We’ve known for a long time that meteorites can contain DNA and RNA elements, but always had to assume they were of Earth origin. Now because of the chemicals found in the samples we can safely say that these are not! Which in turn suggests that which Fox Mulder believed, may have been correct, “We are not alone.”

Short but sweet today folks! As always, if you have any questions, please feel free to ask in the comment section below, or by email at technical.confessions@gmail.com, Facebook (Technical Confessions) or twitter @techconfessions

Well guys, that’s today’s Technical Confessions. As always, if you like what you read here, please subscribe and ALWAYS comment!

See Ya Next Time!

Hackers Demo Square Card Skimmer, Black Hat Part 4

If you’ve never heard of the Square for iPhone, then this is going to be a little out of your ballpark. The square is a small device for the iPhone or other mobile device, Which allows you to take credit card payments right from the phone! very useful for legitimate business people or for those looking to get card numbers for personal gain!

the device is basically a card reader! That’s it. And now, researchers at Aperture Laberatories (not including GLaDOS I hope) have proven that with a little extra software, you could have yourself a viable option for card skimming. the software basically converts the card data into a series of sounds, which are fed through the device (which is plugged into the headphone jack) and then unencrypted to display as human readable numbers usable for making card clones!

In other words, watch your back, and don’t use these unless you trust the vendor.

If you have any questions, please feel free to ask in the comment section below, or by email at technical.confessions@gmail.com or twitter @techconfessions

Well guys, that’s today’s Technical Confessions. As always, if you like what you read here, please subscribe and ALWAYS comment!

See Ya Next Time!

WhiteHat Security hacks into Chrome OS, Black Hat Part 3

Good morning everyone!

I’m afraid ChromeOS users are in for a nasty surprise from our fourth entry from the Black Hat Security conference.

It seems WhiteHat security researchers Matt Johansen and Kyle Osborn, Have found a way to break through Chrome’s security, using extensions.  Because Google has no real approval system for extensions, giving malicious code a perfect spreading ground. However, the vulnerabilities aren’t limited to store extensions, there are issues within the native ones as well, such as the scratch pad. A users cookies and contacts can be found using these gaps in security, The holes have been filled at this point (thank you google) but there may be some yet unknown.

If you have any questions, please feel free to ask in the comment section below, or by email at technical.confessions@gmail.com or twitter @techconfessions

Well guys, that’s today’s Technical Confessions. As always, if you like what you read here, please subscribe and ALWAYS comment!

See Ya Next Time!

Vulnerable Insulin Pumps, Black Hat Part 2

Well, for anyone reading this with an automatic insulin pump reading this, either stop reading or prepare to stop sleeping…

Wireless glucose monitor and insulin pump.

If you thought SMS car theft was bad, how about insulin OD’s. Jay Radcliffe, researcher and Diabetic himself, theorizes that an insulin pump with wireless glucose monitor is quite vulnerable to attackers.Thereby causing a user to be prone to an intentional overdose from a hacker (mind you they’d need to be willing to take a life.) Likely, this would occur by tapping into the monitor and fiddling with registered glucose readings. The monitor will then trigger the pump causing it to administer too much medication silently sending the user to their final resting place. Not nearly as terrifying as  a persons Pacemaker needing protection, but still worrying!
This years Black Hat is getting scarier and scarier…

If you have any questions, please feel free to ask in the comment section below, or by email at technical.confessions@gmail.com or twitter @techconfessions

Well guys, that’s today’s Technical Confessions. As always, if you like what you read here, please subscribe and ALWAYS comment!

See Ya Next Time!

Can A Text Hack Your Car? Black Hat Part 1

Every Year the black Hat conference finds ways to terrify everyone... Me included!

The Black Hat Technical Security Conference. Known for it’s “unique” approach to security showings, of having hackers point out flaws in machines, the conference has released a demonstration that could make you cringe.

A duo of dastardly deedsmen from a company called iSec Partners Security, were able to unlock AND start A Subaru Outback (assumed to be using a third party starter and such) using only an Android Powered smartphone using a technique called war texting. Yes, you heard right, they TEXTED the door open, and the car on…

But that’s not all! apparently your car isn’t all that’s vulnerable! A-GPS trackers, 3G security cams, SCADA sensors (which help control the power grid, water supply, and traffic systems) are all at risk. Somehow I don’t think I’ll ever look at a teenager with a cellphone the same way again.

Tune in again tomorrow for another Black Hat story!

If you have any questions, please feel free to ask in the comment section below, or by email at technical.confessions@gmail.com or twitter @techconfessions

Well guys, that’s today’s Technical Confessions. As always, if you like what you read here, please subscribe and ALWAYS comment!

See Ya Next Time!

4.5 Million FPS & Oxygen In Space, Still No Teleporters

Europe today leading the way in two fields! One being high speed video, the other, well you see. I will, However say it’s huge!

This is the closest I've seen to what is expected here!

We’ve all see those really cool looking high speed camera shots of balloons popping and whatnot, yes? If not, Here is a beautiul video of a soap bubble at 10,000 frames per second (FPS.)

You can see quite clearly every detail of the bubbles regression back to it’s soapy origin. However what if you wanted to watch light move? 10,000 FPS wouldn’t cut it. That’s why European scientists are building a camera with a speed so fast it will catch events at 4.5 Million FPS and attaching it to a microscope. To get a look at things we’ve yet to see in so many smaller than sight things. The camera will receive some of it’s power from an incredibly fast flash, that will pelt its microscopic targets with ultra-bright X-rays. the flash itself will last only two femtoseconds, or two quadrillionths of a second. For context, a femtosecond is to a second, what a second is to about 31.7 million years.

Honestly, I cant wait to see this camera in action in 2015! I wish I had a TARDIS.

Pages: 1 2

Droid Viruses, Proceed, But With Caution

Many of you may not realize that, after computers, the largest market for viruses and malware is actually cellphones. The largest market for cellphone viruses (just like computers) is whichever is most popular! As you should know from this post here, the most popular mobile platform is android. meaning that like windows, it’s vulnerable to attack at any turn. I’m not saying don’t buy Android. Rather the exact opposite! If you like Android, buy Android, just watch for things such as this;

This is a Trojan Horse. The virus works on the same premise. A curse dressed up as a blessing.

“The fine folks at CA Technologies came across an interesting new trojan that does something slightly more unnerving than max out your credit cards — it records your conversations. “
The way I see it, these things have been around a while, seems a little daunting, but there ARE simple, fast solutions on the market, and even in your eyes. You can get anti-viral scanners for your android phone which scan EVERY file launched on your phone! However one of your best defences, READ THE PERMISSIONS! Always read the permissions before installing any new software, not doing so puts your device, your information, and now your conversation at risk!

If you have any questions, please feel free to ask in the comment section below, or by email at technical.confessions@gmail.com or twitter @techconfessions

Well guys, that’s today’s Technical Confessions. As always, if you like what you read here, please subscribe and ALWAYS comment!

See Ya Next Time!