recentpopularlog in

mcherm : hack   26

Pokemon Yellow Total Control Hack
The game had a glitch allowing arbitrary code execution. He used this to turn the game into a midi player.
programming  hack 
february 2018 by mcherm
Hackers Came, but the French Were Prepared - The New York Times
When the Russians hacked email servers to try and influence the French election the French were ready for them.
nytimes  security  hack  via:rachel 
may 2017 by mcherm
PRE-SAFE® Sound: playing 'pink noise' in the split second before impact. - Mercedes-Benz
Play pink noise the instant before a collision to trigger a reflex that protects the ear from damage by really loud noise.
via:HackerNews  medicine  hack 
october 2016 by mcherm
Programming Moon Lander in TeX
He programmed the logic for playing a Moon Lander game in TeX (of all things).
programming  hack  via:LambdaTheUltimate 
april 2013 by mcherm
The $5000 Compression Challenge
Someone bet he couldn't create some smaller files that decompress into a big file picked by the bettor. He won, but the bettor wouldn't pay up.
programming  computerscience  hack  history 
october 2012 by mcherm
How to sue a telemarketer | Impact Dialing
He successfully trapped a telemarketer (one who is actively calling ME now) and sued them for $4,000.
law  hack  via:HackerNews 
june 2012 by mcherm
The 10 Greatest Hacks of My Life – Wesley Tansey
A list of really cool "hacks" this guy did, starting from age 10.
via:HackerNews  hack  personal_net 
october 2011 by mcherm
Founder's Blog - Jitbit: Chinese Magical Hard-Drive
Claims to be a huge hard drive. Is actually a small memory card with clever software that makes it appear to work when first tested.
hardware  scam  hack  via:HackerNews 
april 2011 by mcherm
The time I hacked my high school - Blog - thoughts from the red planet
A clever trick, but an old one. He borrowed money so they'd give him chances to earn money, and later he got money on the basis of previous need. Government contractors work like this.
via:HackerNews  hack 
november 2010 by mcherm
On Removing Java Checked Exceptions By Means of Perversion: One Div Zero
This is a very clever Java hack. It's a way to throw checked exceptions without the compiler checking them. Yeah.
hack  exceptions  java  JamesIry  via:JamesIry  programming 
august 2010 by mcherm » “Adam? …is there a reason your laptop is in the fridge?”
Very clever hack: sticking the failing drive in the fridge to keep it usable long enough to get the vital data off it.
hardware  hack  via:HackerNews  personal_net 
april 2010 by mcherm
Underhanded C: The Leaky Redaction | Not A Number
A brilliant hack -- the winning entry in the underhanded C contest.
december 2009 by mcherm
PyPy Status Blog: GC improvements
A couple of very clever hacks to save 2 words (usually 8 bytes) for each and every object. Very nicely written and explained. This comes out of the PyPy project, a project for which I have the greatest of respect.
memory  optimization  pypy  ArminRigo  hack 
october 2009 by mcherm
On Influenza A (H1N1) « bunnie's blog
An analysis of the "swine flu" virus which looks at like a computer virus: how many bits long is it, what "clever hacks" does it use, etc.
via:BruceSchneier  programming  genetics  biology  hack  medicine 
september 2009 by mcherm
Gamasutra - Features - Dirty Coding Tricks
Some interesting descriptions of shortcuts taken (particularly at the last minute just before shipping) in various game programming.
bugs  programming  hack  via:HackerNews 
august 2009 by mcherm
FBI Investigates 9 Million ATM Scam
Crooks found a flaw in an electronic system feeding ATM machines. In a coordinated, world-wide attack, they stole $9 million by withdrawing from 130 ATMs in 49 cities throughout the world.
via:boingboing  security  banking  hacking  hack  cracking 
february 2009 by mcherm
Secret Geek A-Team Hacks Back, Defends Worldwide Web
The story of how a hole in DNS was discovered which could undermine the entire internet. Includes how the secret was kept and how it got out.
via:boingboing  internet  security  history  hack  dns  hacking 
december 2008 by mcherm
Anatomy of a Subtle JSON Vulnerability
Redefining the array constructor allows a certain attack against some JSON requests.
security  javascript  JSON  xss  programming  hack  via:haacked 
november 2008 by mcherm
Armored truck robber uses Craigslist to make getaway | Top Stories | | News for Seattle, Washington
Clever hack - a robber uses Craigslist to get a bunch of people dressed just like him to use as cover for his escape.
via:boingboing  hack  craigslist 
october 2008 by mcherm

Copy this bookmark:

to read