KickSat – Private Satellites?

Posted by & filed under Uncategorized.

The goal is to bring down the huge cost of spaceflight, allowing anyone from a curious high school student or basement tinkerer to a professional scientist to explore what has until now been the exclusive realm of governments and large companies. By shrinking the spacecraft, we can fit more into a single launch slot and split the costs many ways.

KickSat

Sprites are the size of a couple of postage stamps but have solar cells, a radio transceiver, and a microcontroller (tiny computer) with memory and sensors – many of the capabilities a bigger spacecraft would have, just scaled down. This first version can’t do much more than transmit its name and a few bits of data – think of it as a shrunken down Sputnik – but future versions could include any type of sensor that will fit, from thermometers to cameras.

kicksat.wordpress.com/

Prey – Open Source PC/MAC/iOS/Android Anti-Theft

Posted by & filed under Hardware.

Now this is cool — a open source anti-theft system for your laptop, iOS, or Android device.

From the website: Prey lets you keep track of your phone or laptop at all times, and will help you find it if it ever gets lost or stolen. It’s lightweight, open source software, and free for anyone to use. And it just works.

Website: preyproject.com/
git Repo: github.com/prey

Visualizing Device Utilization

Posted by & filed under Networking, Server Admin.

Brendan Gregg recently posted some interesting data about visualizing large data sets. Particularly, device utilization which is a key metric for performance analysis and capacity planning. In his post, he illustrates different ways to visualize device utilization across multiple devices, and how that utilization is changing over time. The study included over 5,000 virtual CPU nodes and over 600 physical nodes on a production cloud environment.

Data visualization

dtrace.org/blogs/brendan/2011/12/18/visu…

Wi-Fi Protected Setup Vulnerability

Posted by & filed under Hardware, Networking, WiFi.

The Wi-Fi protected setup with which a large majority of new routers ship with enabled by default has a serious flaw opening it up to a brute force attack against the WPS pin. Additional flaws allow for a successful brute force attack in 11,000 attempts. This means the network key of a protected network can be retrieved within hours.

The best course of action right now is to disable WPS if possible. This is not a option on all routers, but the possibility may exist of re-flashing the router’s firmware to a different one such as Open-WRT, DD-WRT, Tomato, etc. to disable it.

CERT’s Release: www.kb.cert.org/vuls/id/723755
Vulnerability Technical Details: sviehb.files.wordpress.com/2011/12/viehb…
Reaver — Functional exploit: code.google.com/p/reaver-wps/