Il TG5 ha parlato di VerificaTruffa camisanicalzolari.it/il-tg5-ha…
Cybersecurity & cyberwarfare reshared this.
Cybersecurity & cyberwarfare reshared this.
Video del nuovo episodio della campagna "Cyber Hygiene", promossa dalla di Polizia Postale. In questo episodio le truffe che sfruttano il nome del BonusWeb Staff MCC (Marco Camisani Calzolari)
Cybersecurity & cyberwarfare reshared this.
🤖 Tracking strings detected and removed!
🔗 Clean URL(s):
camisanicalzolari.it/truffe-bo…
❌ Removed parts:
?utm_source=dlvr.it&utm_medium=mastodon
Video del nuovo episodio della campagna "Cyber Hygiene", promossa dalla di Polizia Postale. In questo episodio le truffe che sfruttano il nome del BonusWeb Staff MCC (Marco Camisani Calzolari)
Philco was a common household brand for many years. The company started in 1892, making street lights. Then they pivoted to batteries. This was big business when early radios were all battery-operated. But in the 1920s, line-powered radios threatened to shrink their customer base, so they pivoted again. This time, they started making radios. So what happened? [The Last Shift] has the story, and you can see the video below.
Philco used advanced manufacturing techniques to make radios more affordable. By 1930, they were the number one radio maker in the world. After World War II, they moved into everything electric: mostly appliances, but also the new king of the electronics market, the television.
Philco faced much competition and wanted to stand out. The answer was the Predicta, a TV like no other at the time. It used an advanced semi-flat picture tube with a plastic coating. The 17-inch or 21-inch picture tube was detached from the TV itself. In one model, the tube sat on top of the TV with a swivel mount. In a pricier variant, the tube connected to the TV with a 25-foot cable. Who needs a remote control? Put the TV by your recliner and change channels while watching the screen across the room.
The physical design was unique and in demand. The problem was that the semi-flat tube was unreliable. It was also black-and-white in a time when color TV burst on the scene. They made the set from 1959 to 1960 and discontinued it due to lower demand and high warranty service costs. By 1962, Philco was bankrupt.
Ford (the motor company) bought the company and used it as a vehicle for defense work (including NASA) and car radios. By 1974, the company was sold again to GTE. The giant factory in Philadelphia was razed.
We know of at least one famous collector of Predictas. If you wanted real remote control, you could get a more conventional Philco Directa at about the same time. It used a mechanical ultrasonic remote similar to the Zenith Space Command system.
youtube.com/embed/K4URhB5JnBM?…
Having an AI assistant is all the rage these days, but AI assistants usually don’t know about your automation setups and may have difficulty dealing with tasks asynchronously. Enter zclaw. It gives you the option to have a personal assistant on an ESP32 backed by Anthropic, OpenAI, or OpenRouter. The whole thing fits in 888KB, and while it doesn’t host the LLM, it does add key capabilities to monitor and control devices connected to the ESP32.
You communicate with the assistant via telegram. You can say things like “Remember the garage sensor is on GPIO 4.” Then later you might say: “In 20 minutes, check the garage sensor and if it is high, set GPIO 5 low.” It has an RTOS for scheduling tasks and is aware of the timezone and common periods. Memory persists across reboots, and you can pick different personas.
Some of the use cases mentioned in the manual show how having something that can precisely schedule, control, or monitor devices might pay off. Ideas like bringing up a lab setup, scheduling plant watering, and more would be difficult to do with just a stock chatbot.
The AI can also introspect. For example, you could create a few tasks on a schedule and then ask the device to “show me my schedules.” You can also create up to 8 tools with a name, description, and action. This lets you describe something like “power_down_bench” and then tell zclaw to execute it on demand or even on a schedule. Overall, an interesting and well-documented setup.
We’ve seen many projects like this, and each has its own charm. And its own personality.
Recently the Myrient game video archive announced that they’re shutting down on March 31st of this year, for a couple of reasons, but primarily the skyrocketing financial costs of hosting the archive. One advantage of Myrient over e.g. Archive.org is that – per the FAQ – every game on the site is curated and checked against a checksum of a known good copy. The site also focuses on fast downloads, making it a good resource if you’re trying to find ROMs of some more obscure old gaming system.
Amidst the mourning it seems also pertinent to address the reasons behind this shutdown. Although finances are the main reason for this hobby project to be shut down, it’s due to (paywalled) download managers that have recently appeared, and which completely bypass the donation requests and similar on the website. Despite use of Myrient for commercial, for-profit purposes having always been explicitly forbidden, this has been ignored to the point where the owner of Myrient had to shell out over $6,000 per month to cover the difference after donations.
Along with the rising costs of hosting due to rising storage and RAM prices courtesy of AI datacenter buildouts, this has meant that a hobby archive like this has become completely unsustainable. Barring good ways to block illegal traffic like these download tools and/or a surge in donations, it would seem that all archives like this are at risk of shutting down, along with other sites that contain commercially interesting content.
Animatronic displays aren’t just for Halloween, and hackers today have incredible access to effective, affordable parts with which to make spectacles of light, sound, and movement. But the hardware is only half the battle. Getting everything synchronized properly can be a daunting task, so get a head start on your next holiday display with the Hauntimator by [1031-Systems].Synchronizing control channels to audio is at the heart of solid animations.
After all, synchronizing movements, sound, and light by trial and error can get tiresome even in small setups. Anyone who makes such a display — and contemplates doing it twice — tends to quickly look into making things modular.
At its heart, Hauntimator works with a Raspberry Pi Pico-based controller board. The GUI makes it easy to create control channels for different hardware (for example, doing things like moving servos) and synchronize them to audio. Once an animation is validated, it gets uploaded to the control board where it runs itself. It’s open-source and designed to make plugins easy, so give it a look. There’s a video channel with some demonstrations of the tools that should fill in any blanks.
Intrigued by animatronics, but not sure where to begin? Get inspired by checking out this DIY set of servo-driven eyes, and see for yourself the benefits of smooth motor control for generating lifelike motion.
Aeternum botnet uses Polygon blockchain smart contracts for C&C, making its infrastructure harder to detect and disrupt.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Hackaday editors Elliot Williams and Al Williams met up to trade their favorite posts of the week. Tune in and see if your favorites made the list. From crazy intricate automata to surprising problems in Peltier cooler designs, there’s a little bit of everything.
Should bikes have chains? What’s the hardest thing about Star Trek computers to duplicate? Can you make a TV station from a single microcontroller? The podcast this week answers these questions and more. Plus, weigh in on the What’s That Sound contest and you might just score a Hackaday Podcast T-shirt.
For the Can’t Miss segment, Elliot had airships on his mind, while Al’s sick of passwords. But is he sick enough to take electronic pills that transmit his password?
html5-player.libsyn.com/embed/…
Or download the bit stream and decrypt it by XORing each byte with zero.
Where to Follow Hackaday Podcast
You see it all the time in science fiction: the heroes find old data, read it, and learn how to save the day. But how realistic is that? Forget aliens. Could you read a stack of punch cards or a 9-track tape right now? Probably not, and those are just a handful of decades in the past. Fast forward a few centuries, and punch cards will decay, and tapes will lose their coating. More modern storage is just as bad. It simply isn’t made to last for thousands of years. Microsoft has Project Silica, which aims to store data in quartz glass with a potential lifetime of many thousands of years.
As you might expect, this is a write-once technology. Lasers write the data, and polarization-sensitive microscopes read it back. Electromagnetic fields don’t matter. You can’t accidentally change the data while reading. A square glass platter the size of a DVD can hold about 7 TB of data.
While the program is not a new one, they’ve recently published results using ordinary borosilicate glass (like your Pyrex baking dish is made from) as a storage medium. They say writing is also more efficient, and reading now requires only one camera instead of the three in the original system. The paper identifies birefringent voxel writing, phase voxels, and more.
Obviously, this isn’t for the casual project. But we have to wonder if hackers could do something similar with lower densities, for example. Unlike other methods we’ve seen, no DNA is involved.
youtube.com/embed/-rfEYd4NGQg?…
An auspicious anniversary passed for me this week, as it’s a decade since I started writing for Hackaday. In that time this job has taken me all over Europe, it’s shown me the very best and most awesome things our community has to offer, and I hope that you have enjoyed my attempts to share all of that with you. It’s worth a moment to reflect on the last ten years in terms of what has made our world during that time.
The gift that keeps on giving: the inept reactions of the British police to a drone report.
With quite a few thousand articles under my belt I’ve sadly reached the point at which I can’t remember them all, indeed a hazard when thinking of new ones is that any idea might be something I’ve written before. But there are some of mine and from others which remain in the mind, such as our April Fool pieces, or my coverage of the needless panic about drone flights. Who can forget Brian Benchoff’s Apple Device, a spoof Apple take on a Raspberry Pi for which he even made real(fake) hardware.
Perhaps the only time I have ever found myself with what you might call a real scoop that has importance beyond Hackaday came at the end of 2018. London’s Gatwick airport was closed for several days due to drone sighting, soon followed by London Heathrow, and we were the first publication to pose the question as to whether the drone had existed at all.
The public were treated to a years-long saga of deceit from the authorities as they attempted to cover up the fact that they’d shut down two airports over nothing, with the eventual grudging admission made after years of Freedom of Information requests from activists, that there had never been any evidence of drone involvement at all. The craziest story in all of this was the time they chased a drone which turned out to be their own helicopter, which along with the rest of the sorry saga is related in a talk I did at a hacker camp in 2019. Given that in the week I write this there’s been an airspace closure over El Paso in Texas because of a mix-up over a US government test of an anti-drone weapon, it seems that drone panic is a story which will run and run.
The ESP8266 might seem an odd choice for part of the decade, but it ushered in a new era of affordable connected devices.
It’s been my observation since long before Hackaday, that the hardware hacking world gains momentum following the appearance of new parts or technologies. I’ve referred to them in terms of epochs in the past. In the last decade we were fortunate that a happy confluence of several such events came within a short time; in the period from about 2005 to 2015 we received accessible and cheap single board computers, 3D printing affordable by mere mortals, cheap PCBs from China, and the explosion of parts and modules from AliExpress sellers. These have arguably been the backbone of Hackaday’s success, because you in our community have taken them and used them to craft such amazing projects. If I had to name a single part which embodies this it would be Espressif’s ESP8266, while it’s largely obsolete in 2026 its appearance in 2014 as a Wi-Fi enabled microcontroller for around a dollar was nothing short of revolutionary. Before the 8266 an Internet connected project was expensive and complex, afterwards it’s done as a matter of course, and ubiquitous.
If I have a perennial concern about where our community is going, it’s in wondering where the next of those epochs will come from. Sadly, we haven’t yet gotten our crystal ball working, but maybe it’s time to look ahead for a minute anyway.
Perhaps the most likely direction will come not from new parts or technologies, but from a reaction to the world around us. As trust in monolithic online services plummets I’m sure our community will respond, and I hope that in the next few years I can have a truly open-source smartphone devoid of links to large corporates, that I’d want to use. Projects that help disconnect from cloud services are going to be popular in the coming years.
I don’t join the general hype around AI, but I think that locally-hosted LLMs will increasingly find their way into projects featured here as the hardware to run them becomes commoditised. A semblance of a personality in our home automation for example is surely going to tempt some hackers, but maybe it won’t be the epoch I’m looking for. For that I see custom semiconductors as one promising future, and I hope that for example Tiny Tapeoput will be only the start. I know nothing about IC design, but I look forward to the time I first sit down to learn the ropes and order the Jenny Chip. It’s next-level now, but in 2036 it’s likely to be as normal as ordering a PCB is for us today.
I miss you, Oxford Hackspace, but I don’t miss the drama.
I have spent a large proportion of my time in the world of hackerspaces over the last decade and before, ever since I saw my city had a group of people who’d started one. In them I have found my people, and found access to knowledge and experience well beyond my own. I’ve sat in spaces all across the UK and Europe and drunk caffeinated beverages with all manner of like-minded crazies, and it’s been a blast.
A good thing in that world over the years has been the extinguishing of the consensus model under which many early hackerspaces were run. I was a director of such a space whose drama level exceeded 1000 MilliNoiseBridges and it has marked me ever since, so it’s nice to see a much more sensible committee-based model take its place.
Every space has its own flavour, but the more recent ones I have been a member of in my peripatetic existence over the last few years have been blissfully stable and a joy to be part of. In Europe most established spaces are now in their second decade, and if I see a danger for them it’s in failing to keep attracting hackers in their 20s and fading into irrelevance. Maybe I’ll come back in another decade and tell you how that went.
A decade ago I was building a not-ultimately-successful electronic kit business when I saw one of Mike Szczys’ “We’re Hiring!” posts on my go-to hardware news website, and thought it looked like a fun thing to do. I didn’t realise that being the only electronic engineer who’d worked for the Oxford Dictionary put me uniquely in line for this, so from that happy accident onwards the last decade has been a blast. I’d like to thank you the Hackaday readers, my awesome Hackaday colleagues, and the wider community of crazy, weird, and talented people I have met along the way. The next decade of hardware hacking is now on.
Although not as reviled as the sound of nails on chalkboard, the sound of adhesive tape being peeled is quite probably at least as distinctive. With every millimeter of the tape’s removal from the roll sounding like it’s screaming in protest, it has led some to wonder just why this process is noisy enough to be heard from across an open-plan office. Recently [Er Qiang Li] et al. had their paper on a likely theory published in Physical Review E, in which they examine the supersonic air pulses at the core of this phenomenon.The shockwaves produced by peeling tape, captured on Schlieren imaging. (Credit: Er Qiang Li et al., 2026)
Using rolls of adhesive tape and two microphones synchronized with two high-speed cameras in a Schlieren imaging setup, they gathered experimental data of this stick-slip mechanism. Incidentally, in addition to this auditory effect, adhesive tape is also known for the triboluminescence effect, as well as the generating of X-rays, making them quite the source of scientific demonstrations, even when they’re not also being used to create graphene with.
What they deduced from the recorded data was that the transverse fractures that suddenly appear after the extended stick phase hold a vacuum until they reach the end of the fracture during the brief slip phase, at which point the vacuum collapses very suddenly. This produces a pressure of 9600 Pa and clearly visible shock fronts on the Schlieren images.
Now that we know why peeling adhesive tape from its roll is so noisy, it won’t make it any more quiet, but at least we can add another fascinating science fact to its role of achievements.
@Informatica (Italy e non Italy)
Un Remote Access Trojan venduto a 300 dollari al mese, capace di aggirare le protezioni delle versioni di Android dalla 8 alla16 e prendere il controllo dei dispositivi. Ecco perché Oblivion rappresenta una svolta nel panorama del mobile malware e cosa devono fare
Informatica (Italy e non Italy) reshared this.
Armi autonome? Ecco come andrà a finire! Gli LLM sono tutti concordi: Guerra Nucleare
📌 Link all'articolo : redhotcyber.com/post/armi-auto…
#redhotcyber #news #intelligenzaartificiale #modellilinguistici #potenzenucleari #wargames #kennethpayne #fiducia
Un professore testa i modelli linguistici in una simulazione di guerra nucleare. Scopri cosa succede quando GPT, Claude e Gemini decidono il destino del mondo.Silvia Felici (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Una Masterclass su come NON gestire una Crisi. Mi raccomando: like 👍 like 👍 like 👍e, se condividete, un 8️⃣ sul registro!
Cosa succede quando un prof con milioni di follower viene accusato di usare i propri studenti minorenni come spammer per l'algoritmo in cambio di voti? Per capire come si distrugge l'accountability tra scuse non scuse, gaslighting e l'uso dei propri follower.
Il video di @lastknight
reshared this
Grecia: le condanne per lo scandalo "Predatorgate" offrono una rara possibilità di responsabilità per l'abuso della tecnologia di sorveglianza
Amnesty commenta una sentenza storica emessa da un tribunale di Atene che ha ritenuto quattro individui legati al produttore di spyware Intellexa colpevoli di accesso illegale a sistemi di comunicazione e dati privati e di violazione delle leggi sulla privacy e sulla protezione dei dati
reshared this
@Informatica (Italy e non Italy)
Secondo l'Osservatorio Cybersecurity & Data Protection del Politecnico di Milano, i cyber attacchi sono sempre più mirati e sofisticati nell'era di GenAI ed Agentic AI, così la spesa arriva a quasi 3 miliardi nel 2025. Ma
Informatica (Italy e non Italy) reshared this.
Rilasciata #Tails 7.5: tutte le novità del nuovo rilascio orientato alla privacy
Acronimo di The Amnesic Incognito Live System, è una distro #GNULinux pensata per garantire la massima privacy, un live system che instrada automaticamente il traffico internet su rete Tor
Tails è pensato per un pubblico molto ampio, ma soprattutto per giornalisti, attivisti, ricercatori e soggetti che operano in contesti ad alto rischio
laseroffice.it/blog/2026/02/27…
La nuova versione, Tails 7.5, è stata rilasciata il 26 febbraio 2026, mentre la precedente versione stabile, Tails 7.4.2, è uscita l’11 febbraio 2026 comeAlex (Aggregatore GNU/Linux e dintorni)
reshared this
Apple’s iPhone and iPad are now NATO-approved for classified use, listed in the alliance’s Information Assurance Product Catalogue.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Juniper released an emergency patch for Junos OS Evolved to fix CVE-2026-21902, a critical RCE flaw affecting PTX routers.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Pensavi che il tuo vicino non potesse vedere le foto delle vacanze? Abbiamo una brutta notizia per te
📌 Link all'articolo : redhotcyber.com/post/pensavi-c…
#redhotcyber #news #cybersecurity #hacking #wifi #vulnerabilita #router #maninthemiddle #sicurezzainformatica
La protezione dei dispositivi collegati alla stessa rete Wi-Fi non è standardizzata e presenta vulnerabilitàRedazione RHC (Red Hot Cyber)
reshared this
🚨 Corso 𝗖𝗬𝗕𝗘𝗥 𝗢𝗙𝗙𝗘𝗡𝗦𝗜𝗩𝗘 𝗙𝗨𝗡𝗗𝗔𝗠𝗘𝗡𝗧𝗔𝗟𝗦: ultimi posti rimasti. Afrettati!
📞 Per info 379 163 8765 ✉️ formazione@redhotcyber.com
🔗 Per dettagli: redhotcyber.com/linksSk2L/cybe…
#redhotcyber #formazione #pentesting #pentest #formazionelive #ethicalhacking #hacking #cybersecurity
Corso in Live Class di Cyber Offensive Fundamentals: scopri penetration testing, vulnerabilità e strumenti pratici per la sicurezza informatica offensiva.Red Hot Cyber
Cybersecurity & cyberwarfare reshared this.
Hai mai provato un corso di Cybersecurity Awareness a fumetti? Acquista il fumetto sulla Cybersecurity BETTI-RHC!🚀🔒
BETTI-RHC è un innovativo #fumetto #educativo progettato per trasformare la #formazione sulla #cybersecurity in un'esperienza avvincente e accessibile. Attraverso #storie coinvolgenti e personaggi memorabili, il fumetto semplifica i complessi concetti della sicurezza informatica
👉 Acquista la versione cartacea ad alta qualità: redhotcyber.com/rhc/shopping/
👉 Acquista la versione elettronica: academy.redhotcyber.com/collec…
#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #fumetto #fumetti #cyberthreatintelligence #comics #cartoons #engineering #intelligence #intelligenzaartificiale #informationsecurity #ethicalhacking #dataprotection
Ricardo Antonio Piana likes this.
Cybersecurity & cyberwarfare reshared this.
Anthropic si rifiuta di piegarsi al Pentagono sull’uso militare dell’AI. E fa bene!
📌 Link all'articolo : redhotcyber.com/post/anthropic…
#redhotcyber #news #eticaintelligenzaartificiale #intelligenzaartificiale #controllousomilitare #iantropico #pentagono
L'intelligenza artificiale sta diventando una tecnologia strategica paragonabile al nucleare, allo spazio o alla crittografia.Redazione RHC (Red Hot Cyber)
reshared this
The modern web browser is now far more than a thing for rendering web pages, it’s a multi-faceted environment that can provide a home for almost any application you could imagine. But why should JavaScript or Wasm have all the fun? CSS is Turing complete now, right? Why not, as [Lyra Rebane] has done, write an 8086 emulator in pure CSS?
The web page at the link above may contain an 8086, but missing MMU aside, don’t expect it to run Linux just yet. Instead it has limited resources, just enough to run a demo program. It needs a Chrome-adjacent browser because it uses some CSS functions not available in for example Firefox, but we’ll forgive it that oddity. Its clock is provided by a small piece of JavaScript not because CSS can’t provide one, but because the JS version is more stable.
On one hand this is of little practical use, but to dismiss it as such is to entirely miss the point. It’s in the fine spirit of experimentation, and we love it. Perhaps a better way to look at it is to see what could be done more efficiently with the same idea. A 1970s CISC microprocessor might not be the best choice, but would for example a minimalist and optimized RISC design be more capable? We’re looking forward to where others take this thread.
It’s not the first unexpected computing environment we’ve found, who could forget the DOOM calculator!
Header: Thomas Nguyen, CC BY-SA 4.0.
Prima di Zero Trust c’era Jessica Fletcher: la mia prima mentore di cybersecurity
📌 Link all'articolo : redhotcyber.com/post/prima-di-…
#redhotcyber #news #cybersecurity #zerotrust #sicurezzainformatica #hacking #malware #ransomware
Ero bambina nel 1988, quando c’erano paillettes, fluo, la Milano da bere, i Depeche Mode, Michael Jackson… C’era chi sognava di diventare una pop star come Madonna o un calciatore come Maradona.Daniela Linda (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
AI accelerates incident response by correlating alerts and generating reports in minutes, helping teams scale beyond manual limits.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Mysterium VPN found 12M IPs exposing .env files, leaking credentials and revealing widespread security misconfigurations worldwide.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Perché le grandi imprese stanno tornando all’on-premises? Una nuova tendenza nell’era del cloud
📌 Link all'articolo : redhotcyber.com/post/perche-le…
#redhotcyber #news #cloudrepatriation #cloudcomputing #sicurezzainformatica #conformità #gestionedelcosto
Scopri il ritorno all'on-premises nel mondo digitale. ONLYOFFICE offre soluzioni di collaborazione sicure e efficienti per le imprese che cercano controllo e sovranità dei dati.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Attenzione alle telefonate mute. Sembrano innocue, invece ti fregano Seguitemi fino alla fine perché vi faccio capire come funziona davvero, perché il problema non è il silenzio, è quello che quel silenzio permette di costruire dopo.Web Staff MCC (Marco Camisani Calzolari)
Cybersecurity & cyberwarfare reshared this.
European DIY platform ManoMano suffered a data breach via a third-party provider, exposing personal data of 38 million customers.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Dietro un invito di lavoro su Meet si nasconde uno spyware: il segnale da non ignorare
📌 Link all'articolo : redhotcyber.com/post/dietro-un…
#redhotcyber #news #sicurezzainformatica #hacking #malware #cybersecurity #phishing #windows #zoom
Una campagna di malware si travestisce da riunioni online con Zoom e Google Meet per installare software di monitoraggio su computer Windows.Bajram Zeqiri (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Il gruppo REDHEBERG colpisce oltre 15.000 sistemi VNC non protetti
📌 Link all'articolo : redhotcyber.com/post/il-gruppo…
#redhotcyber #news #cybersecurity #hacking #malware #vnc #sicurezzainformatica #redheberg
Un’estesa campagna di intrusione globale, battezzata REDHEBERG, sta compromettendo migliaia di dispositivi connessi a intenet.Manuel Roccon (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Sviluppo Cognitivo: Le AI invadono i feed dei bambini con video colorati. Quanto è un bene?
📌 Link all'articolo : redhotcyber.com/post/sviluppo-…
#redhotcyber #news #intelligenzaartificiale #contenutigenerativi #youtubekids #aigenerativa #contenutibambini
L'analisi del NYT rivela che il 40% dei video per bambini sono generati automaticamente, con ripercussioni sullo sviluppo cognitivo.Massimiliano Brolli (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Not what you want to see when testing that ‘repaired’ SNES. (Credit: Skawo, YouTube)
The good part about older game consoles like the Super Nintendo is that they have rather rudimentary region locks, but unfortunately this also gives some people the idea that installing something like the SuperCIC mod chip to make a SNES region-free is easy. The patient that arrived on [Skawo]’s surgery table was one such victim, with the patient requiring immediate surgery to remove the botched installation before assessing the damage.
Here the good news was that the patient features the revision B CPU, making it a good console to rescue. The bad news was that the pads of the old CIC chip had been ripped up, there was a solder bridge on S-PPU1 between two pins and both the installed wiring and soldering were atrocious, requiring plenty of touch-ups.
With the CIC pads already a loss, finishing the SuperCIC mod seemed like a good plan, also since this would make for a nice region-free console. This mod involves a PIC16F630 with special firmware that works with the corresponding CIC IC in each cartridge, while also switching between 50/60 Hz mode to fit the cartridge’s region. After an initial test with PAL and NTSC cartridges everything seemed all right. Then [Skawo] ran the SuperNES Burn-In test from its cartridge, which gave dire news.
Something was wrong with one of the VRAM ICs, leading [Skawo] to first try replacing the IC in question with a replacement from a donor board, which unfortunately did not fix the issue. This led him back to the suspicious solder bridge between pins 25 and 26 on S-PPU1. This would have put 5V into a pin that was not expecting it, and may have led to permanent damage.
One lifting of a donor S-PPU1 IC and nerve-wrecking swap later, it was time for a retry. This time the test passed with flying colors, allowing Super Mario RPG to be played again without funny graphical artefacts and hopefully fixing the last of the issues caused by the botched SuperCIC installation. Fortunately the damage was fixable, but along with a destroyed case it also took out the S-PPU1, which is not an easy to replace chip.
Moral of the story is perhaps that if you really want to mod your SNES, you should leave it to someone who has the requisite skills, lest people like [Skawo] have to rescue another hapless victim from such displays of depravity.
youtube.com/embed/L7ZcN4S1QKw?…
2000 m above ground level (AGL), winds are stronger and much, much more consistent than they are at surface. Even if the Earth were a perfect sphere, there’d be a sluggish boundry layer at the surface, but since it’s got all these interesting bumps and bits and bobs, it’s not just sluggish but horribly turbulent, too. Getting above that, as much as possible, is why wind turbines are on big towers. Rather than build really big tower, Beijing Lanyi Yunchuan Energy Technology Co. has gone for a more ambitious approach: an aerostat to take power from the steady winds found at high altitude. Ambitiously called the Stratosphere Airborne Wind Energy System (SAWES), the megawatt-scale prototype has recently begun feeding into the grid in Yibin, Sichuan Province.
The name might be a bit ambitious, since its 2000 m test flight is only one tenth of the way to the stratosphere, but Yibin isn’t a bad choice for testing: as it is well inland, the S2000 prototype won’t have to contend with typhoons or other ocean storms. The prototype is arguably as ambitious as the name: its 12 flying turbines have a peak capacity of three megawatts. True, there are larger turbines in wind farms right now, but at 60 m in length and 40 m in diameter, the S2000 has a lot of room to grow before hitting any kind of limit or even record for aerostats. We’re particularly interested in the double-hull construction– it would seem the ring of the outer gas bag would do a good job funneling and accelerating air into those turbines, but we’d love to see some wind tunnel testing or even CFD renderings of what’s going on in there.A rear view shows the 12 turbines inside the double hull. It should guide air into the gap, but we wonder how much turbulence the trusses in there are making.
During its first test flight in January 2026, the system generated generated 385 kilowatt-hours of electricity over the course of 30 minutes. That means it averaged about 25% capacity for the test, which is a good safe start. Doubtless the engineers have a full suite of test flights planned to demonstrate the endurance and power production capabilities of this prototype. Longer flights at higher capacity may have already happened by the time you read this.
Flying wind turbines isn’t a new idea by any means; a few years ago we featured this homemade kite generator, and the pros have been in on it too. Using helium instead represents an interesting design choice–on the plus side, its probably easier to control, and obviously allowing large structures, but the downside is the added cost of the gas. It will be interesting to see how it develops.
We’re willing to bet it catches on faster than harvesting wind energy from trees.
All images from Beijing Lanyi Yunchuan Energy Technology Co., Ltd.
[Matt Denton]’s SpoolBot is a surprisingly agile remote-controlled robot that doesn’t just repurpose filament spool leftovers. It looks exactly like a 2 kg spool of filament; that’s real filament wound around the outside of the drum. In fact, Spoolie the SpoolBot looks so much like the real thing that [Matt] designed a googly-eye add-on, because the robot is so easily misplaced.The robot’s mass rotates around a central hub in order to move forward or back.
SpoolBot works by rotating its mass around the central hub, which causes it to roll forward or back. Steering is accomplished by tank-style turning of the independent spool ends. While conceptually simple, quite a bit of work is necessary to ensure SpoolBot rolls true, and doesn’t loop itself around inside the shell during maneuvers. Doing that means sensors, and software work.
To that end, a couple of rotary encoders complement the gearmotors and an IMU takes care of overall positional sensing while an ESP32 runs the show. The power supply uses NiMH battery packs, in part for their added weight. Since SpoolBot works by shifting its internal mass, heavier batteries are more effective.
The receiver is a standard RC PWM receiver which means any RC transmitter can be used, but [Matt] shows off a slick one-handed model that not only works well with SpoolBot but tucks neatly into the middle of the spool for storage. Just in case SpoolBot was not hard enough to spot among other filament rolls, we imagine.
The googly-eye add-on solves that, however. They clip to the central hub and so always show “forward” for the robot. They do add quite a bit of personality, as well as a visual indication of the internals’ position relative to the outside.
The GitHub repository and Printables page have all the design files, and the video (embedded just below) shows every piece of the internals.
The kind of hardware available nowadays makes self-balancing devices much more practical and accessible than they ever have been. Really, SpoolBot has quite a lot in common with other self-balancing robots and self-balancing electric vehicles (which are really just larger, ridable self-balancing robots) so there’s plenty of room for experimentation no matter one’s budget or skill level.
youtube.com/embed/6ZLJA1YpoMs?…
Trend Micro fixed two critical Apex One flaws enabling remote code execution on vulnerable Windows systems and urged immediate updates.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
The WS2812B has become one of the most popular addressable LEDs out there. They’re easy to drive from just about any microcontroller you can think of. But what if you have a microcontroller at all? [Povilas Dumcius] decided to try and drive the LEDs with raw logic only.
The project consists of a small board full of old-school ICs that can be used to drive WS2812Bs in a simplistic manner. A 74HC14 Schmitt trigger oscillator provides the necessary beat for this tune, generating an 800 kHz clock to keep everything in time and provide the longer pulse trains that represent logic one to a WS2812B. A phase-shifted AND gate generates the shorter pulses necessary to indicate logic zero. Meanwhile, a binary counter cycles through 24 bits (8 per R, G, and B) to handle color. Pressing each one of the three pushbuttons allows each color channel to be activated or deactivated as desired. It can make the strip red, green, or blue, or combine the channels if you press multiple buttons at once. That’s all the control you get—it would take a bit more logic to enable variable levels of each channel. Certainly within the realms of possibility, though.
We’ve featured some other nifty tricks for driving WS2812Bs in unconventional ways, like using DMA hardware or even I2S audio outputs. If you’ve got your own tricks, don’t hesitate to notify the tipsline. Video after the break.
youtube.com/embed/Yc67xXr24F4?…
The Haxophone is an open source MIDI saxophone project that has achieved some popularity. It’s caught the attention of [Shieladixon] not because she is a saxophonist but because she plays the recorder and is dissatisfied with existing MIDI recorder peripherals. She’s set about modifying the device to produce the Haxocorder, a better MIDI recorder.
The video below the break is the third of a series, of which part one and part two deal with the Haxophone and the shortcomings of her existing recorder peripheral. She’s replacing the Pi Zero of the Haxophone with a Pi Pico in a Zero form factor, and simplifying its design significantly to remove unnecessary features. The result is a versatile instrument capable at a touch of becoming the full range of recorders, which she demonstrates with some nifty duet work.
The upstream Haxophone project can be found here if you are interested, and we hope she follows this up with a release of her mods to make the Haxocorder. Meanwhile if you feel you might have seen her work before, she’s the brains behind the MIDISID.
youtube.com/embed/C5GVVqOo5GA?…
This game security company estimates the video game cheating market to be worth 8.5 billion (yes, with a B). Absolutely wild.
Cybersecurity & cyberwarfare reshared this.
Reminds me of this profile of Cheat Ninja and its creator Catfish, who made cheats for PUBG Mobile, and made more than $75 million, according to Chinese police, which dismantled the organization and arrested some members.
Catfish, if you're out there, reach out. I'd love to know what you're up to.
vice.com/en/article/inside-the…
The cheat-making group known as "Chicken Drumstick" made more than $70 million selling cheats for PUBG Mobile. This is the story of its rise and fall.Lorenzo Franceschi-Bicchierai (VICE)
evariste.gal🌈is reshared this.
Tracking Token Disrespector
in reply to Marco Camisani Calzolari • • •🤖 Tracking strings detected and removed!
🔗 Clean URL(s):
camisanicalzolari.it/il-tg5-ha…
❌ Removed parts:
?utm_source=dlvr.it&utm_medium=mastodon
Il TG5 ha parlato di VerificaTruffa - Marco Camisani Calzolari
Web Staff MCC (Marco Camisani Calzolari)