Category: hardware fail

another reason NOT to use wireless keyboards
27.10.2019

„In the popular series of wireless keyboards Fujitsu LX390 found two dangerous vulnerabilities. According to researchers from the company SySS, exploitation of vulnerabilities allows nearby attackers to „spy“ passwords entered on the keyboard, or even to seize control of the […]

retro computing: win95 win98 as virtualbox vm running on linux host
15.06.2019

tested on: Operating System: CentOS Linux 7 (Core) CPE OS Name: cpe:/o:centos:centos:7 Kernel: Linux 4.15.9 Architecture: x86-64 # using vboxmanage –version 5.2.6r120293 ah lovely isn’t it? BSOD Win98 style… errors were NOT the exception, they were THE NORM (and still […]

02.05.2019

dmidecode -t 17 # dmidecode 3.0 Getting SMBIOS data from sysfs. SMBIOS 2.7 present. Handle 0x005D, DMI type 17, 34 bytes Memory Device Array Handle: 0x005E Error Information Handle: 0x0062 Total Width: 64 bits Data Width: 64 bits Size: 4096 […]

cost of cybercrime and lawful backdoors
09.03.2019

„The cost to companies from malware and “malicious insider”-related cyberattacks jumped +12 percent in 2018 and accounted for one-third of all cyberattack costs, according to new research published today by Accenture and the Ponemon Institute.“ src: helpnetsecurity.com logical consequence: stop […]

Hardware Implants – Thunderbolt and OMG USB Cable of Evil
09.03.2019

… this is why no usb stick and no cable can be trusted… Thunderbolt / PCI-Express is having similar issues „Abstract—Direct Memory Access (DMA) attacks have beenknown for many years: DMA-enabled I/O peripherals have com-plete access to the state of […]

The Y2038 Problem – cars and embedded systems
23.01.2019

in comparison to Y2K: „The issue became when it became 2000 because that would be stored as 00 in the program. This caused many to believe that say, bank software wouldn’t be able to get your money out because it […]

backdoors in hardware – Intel Anti Theft Brick Code
16.12.2018

While „backdoors“ in hardware sound like a good idea… you don’t know how hackers are using it to sabotage infrastructure or extort bitcoins of another country’s companies… see „backdoor in cisco router„. IT IS F**** DANGEROUS! ESPECIALLY if it is […]

VideoÜbrewachung im Test INSTAR IN-9008HD IPCam – INSTAR IN-8015 Full HD Wifi nach Software Update stabil – Kamera Review Erfahrungen und DSGVO: Wie lange darf ich Überwachungskamer Bilder speichern?
16.11.2018

Gleich vorweg: Wer das Geld hat, gibt direkt 1.298,00 € (mit 3TB Festplatte) für ein System aus, welches Bilder 24-7 zwar Analog überträgt, dann aber ein laufend (ohne Unterbrechung) via einem „Receiver mit Festplatte“ digitalisiert und auf Bewegung etc. analysiert und […]

Spectre and Meltdown – Linus Torvalds infuriated by Intel insanity – Open CPU and rise of RISC? RISCV – hifive1
09.05.2018

Update: 2020.03 „The newly developed Rowhammer- attack TRRespass can crack the RAM-a security mechanism by many DDR4-DRAM-modules as well as LPDDR4 Chips. Until now, these were considered to be almost immune to Rowhammer attacks.“ https://www.com-magazin.de/news/sicherheit/software-hammer-ram-schutz-attackiert-2515621.html Update: 2019.10 Zombieload is back. […]

Monitoring Performance of Linux Servers
04.04.2018

so i guess „monitoring“ is about two things: availability and performance: detect performance bottlenecks get informed if parts (harddisks) / servers have failed / are about to fail security: detect, report and (if possible) automatically fence off „unusual“ network activity […]

Bugs in Hardware – intel microcode updates
12.01.2018

Update: 2018.12: ForeShadow – guest reading Level1 Cache of host ForeShadow (known as L1 Terminal Fault (L1TF) by Intel)[1][2] is a vulnerability that affects modern microprocessors that was first discovered by two independent teams of researchers in January 2018, but […]

The Unix philosophy – simple and beautiful
02.05.2017

src: https://homepage.cs.uri.edu/~thenry/resources/unix_art/ch01s07.html The Unix philosophy emphasizes building simple, short, clear, modular, and extensible code that can be easily maintained and repurposed by developers other than its creators. The Unix philosophy favors composability as opposed to monolithic design. Later summarized by […]

Want to disable Intel Management Engine
16.01.2017

It is actually a scandal that the world depends on chips and operating systems – that are designed to do mass-surveillance – it seems – in order to build up a world-wide-dictatorship that no-one can escape… by information and money. […]

06.09.2016

screw AVM, screw Realtek, what one wants is should work out of the box with recent Linux kernels on Open Source drivers only: Recommended tested Hardware – Superb Wifi WLAN Adapter Chipset Atheros AR9285 Mini PCIE for GNU Linux Debian […]