Hardware hacks

Managing an Unmanaged Switch

Network switches¬†come¬†in two different flavors: managed unmanaged. Unmanaged switches are cheap but you can’t control them. Managed switches have some interface to configure and monitor the equipment, and cost much more. Watch as Jim Gibson explains why you need managed switches in your network. For a hacker perspective you might ask how different those two

USB reverse engineering tips

Do you want to know what happens in the USB devices? What data flows between your PC and your device? Here are some videos that show tips how you can figure out what data flows on your USB ports. Reverse Engineering USB Devices [28C3]   How to reverse engineer a USB protocol for Linux  

Are electronic locks safe?

Lock picking is the craft of unlocking a lock by analyzing and manipulating the components of the lock device without the original key. It has been done to many mechanical locks if you know what to do, but what about electronic locks? Are they safe from lock picking? Teardown: An Electronic Master Lock article presents

Uses for broken Android tablet

Modern smart phones and tables has big glass screens that broke easily. You might have some broken smart phones and/or tablets that might not be worth of screen repair. But would here be still some use for this kind of damaged device? And if there is, then how the tablet could be used when the