Forgot your password?
typodupeerror
PlayStation (Games)

PS3 Hacked? 296

Posted by Soulskill
from the another-one-bites-the-dust dept.
Several readers have sent word that George Hotz (a.k.a. geohot), the hacker best known for unlocking Apple's iPhone, says he has now hacked the PlayStation 3. From his blog post: "I have read/write access to the entire system memory, and HV level access to the processor. In other words, I have hacked the PS3. The rest is just software. And reversing. I have a lot of reversing ahead of me, as I now have dumps of LV0 and LV1. I've also dumped the NAND without removing it or a modchip. 3 years, 2 months, 11 days...that's a pretty secure system. ... As far as the exploit goes, I'm not revealing it yet. The theory isn't really patchable, but they can make implementations much harder. Also, for obvious reasons I can't post dumps. I'm hoping to find the decryption keys and post them, but they may be embedded in hardware. Hopefully keys are setup like the iPhone's KBAG."

Comment: Re:Yea, and.... (Score 1) 314

by juanfe (#29042505) Attached to: Palm Pre Reports Your Location and Usage To Palm

(used to work for Nextel, know their location infrastructure well).
I suspect that the basic reason for this is that customer care doesn't have the tools to do it.
The network infrastructure is there, and the tools are there, but Sprint probably hasn't invested in giving this kind of capability to care organizations. Plus, there ARE some (minor, overblown, redherring but real) concerns there about impersonation, spoofing and such, particularly in Boost land where the amount of information known about customers is pretty minimal to begin with.

Comment: Re:Not very bright in most cases (Score 1) 586

by juanfe (#27577791) Attached to: What Do You Call People Who "Do HTML"?

I've worked most of my career with PowerPoint types -- people who are actually creating the things because they're the MBAs presenting the concepts.

99% of them don't know how to use Powerpoint beyond dragging squares and changing colors. Styles, templates, master slides, etc are foreign concepts to them.

Often times, these are folks who got MBAs after spending years creating static HTML pages. They did it using FrontPage.

Becoming a competent HTML editor is not difficult, but it still is a skillset that not everyone has.

Comment: Re:Not very bright in most cases (Score 1) 586

by juanfe (#27577745) Attached to: What Do You Call People Who "Do HTML"?

There are still plenty of corporate websites for even large multi bilion $$ companies that are not database driven. Sometimes, it just doesn't need a database. 400 pages clearly is too many... but I've seen sites developed with 40 static HTML pages. Maintenance is a pain, but it's more expedient to hire an HTML editor than to hire the staff to install, configure and maintain even a simple/FOSS CMS.

Comment: Re:research in motion (Score 1) 374

by juanfe (#26448171) Attached to: Solving Obama's BlackBerry Dilemma

That is a significant point.
The architecture of the BlackBerry system requires all traffic going to a BlackBerry device from an Enterprise email server to go through RIM's NOCs -- all Americas email traffic goes go through the Canada NOC at some point, all EMEA traffic goes through their NOC in the UK. [reference]

While all the transmissions are encrypted end-to-end (to the point that the system has passed US-government security reviews for secure traffic), the transmission of a US President's data traffic through systems that are outside of US jurisdiction and government control can be tricky.

But then again, this gets eliminated if they go with any other wireless email device that does not use RIM's infrastructure; there are plenty, and they can be made to work.

Hardware Hacking

Physically-Challenged Gamer Hacks Together Custom PS3 Controller 50

Posted by Soulskill
from the quick-get-a-patent dept.
Destructoid has a neat post about a gamer whose condition prevents him from using a standard video game controller. With the help of a company called GimpGear, which markets devices for people with limited mobility, he designed and built a custom input device that makes use of fingers, toes, and even sips or puffs of air to control his favorite games. Pictures and a video of the setup are both available in the post.
Government

State Lawmaker Wants To Ban Anonymous Posting Online 471

Posted by Zonk
from the didn't-know-kentucky-was-so-powerful dept.
bfwebster writes "According to a local news article from last week, Kentucky state lawmaker Tim Couch wants to ban anonymous posting on the internet in order to 'cut down on online bullying', which he says has been 'a particular problem in eastern Kentucky.' His bill would require posters to register with their real names and e-mail addresses under threat of fines. Looks like another battle in the right for anonymous free speech."
Networking

+ - AT&T Engineer describing NSA syping architectu 1

Submitted by juanfe
juanfe (466699) writes "The Washington Post is reporting on the whistleblowing by a former AT&T network engineer who describes how and where AT&T's facilitation of NSA wiretapping was set up. This has been discussed on Slashdot before, but it's a particularly well-explained description for the lay person of why a fiber splitter allowing NSA to sift in all of AT&T's US backhaul traffic (including UUNet, Sprint and GlobalCrossing) is a bad thing."
Education

+ - A Brief Introduction To TRWS Theory

Submitted by
occu77
occu77 writes "TRWS: TGS and TSS — The various real and virtual elements of TGS and TSS are based upon the doctrine of Game Theory which relates that gaming can be, and in some cases should be, training for various Real World Capabilities. Therefore TGS and TSS are components of the Transferable Real World Skills Game Theory doctrine. TRWS (and the various components which comprise the Doctrine) is a Virtual Training and Gaming Protocol designed to allow the development, practice, and transmission of Real World Skills into a Training Scenario or Gaming Environment. Likewise the practice of Gaming and Virtual skills in a realistic manner within a virtual or artificial environment is designed to allow Training and Gaming Scenarios an opportunity to develop into Real World skills which can then be employed within a Real World Environment. The effectiveness of the protocols is not dependent upon the type of scenario, general environment, particular game, or virtual training opportunity undertaken, but is rather dependent upon the degree and nature of the realism of the practice. TRWS Game Theory demands a level of realism and practice which makes it practical to assume that any reasonably intelligent and trainable person employing the protocols can in fact perfect current skill sets or even develop entirely new skill sets within the game environment which can then be realistically employed within a Real World Environment. TRWS"
Media (Apple)

+ - WSJ: Apple signs with Cingular

Submitted by
fistfullast33l
fistfullast33l writes "Last night a blog post on Business 2.0's new blog pointed to a Wall Street Journal article (paid subscription required) reporting that Apple has apparently signed up with Cingular to provide the service for a new iPhone. If the WSJ story is true, more details should be given in today's Macworld Expo keynote by Steve Jobs. What's more interesting are the points that the blogger makes. From the article: "The first is that Verizon (VZ) Wireless and Sprint (S) are left out in the cold by this move, since Cingular uses GSM, a standard that's incompatible with Verizon and Sprint's CDMA technology. Verizon has the Chocolate and Sprint sells the Fusic music phone, but neither has proven to be an iPod substitute yet.""

Serving coffee on aircraft causes turbulence.

Working...