Archive for category hack-the-planet

hmkay…ever heard of quarter-bits?

AdiumX tells you!

No Comments

the path to the dark nerd side

the path to the dark nerd side.

No Comments

hax0ring the HTC Himalaya (MDA2 / XDA2)

uhh…the last 3 days I did almost nothing else than hexediting, flashing, dumping and thinking what to do more with the ROM Images I’ve got.

Maybe I have to explain:

I’ve got a new build of a new Operating System for my MDA2 Smartphone. The only problem is, that some genius at HTC (the manufacturer of the MDA2) decided that it might be a great idea to lock a major part of the ROM of the device. On the support side it’s great: It’s nearly impossible to “destroy” the device by flashing it. You always have a fail-safe mode. Even after a crash when the “100% ROM erased” line appeared won’t affect the device…just redo the flash…

But for me it’s a major problem. I am supposed to flash the new ROMs via a serial terminal (HTCs MTTY to be precise). The problem is that the only reply if the device on the flash command is “NOT ALLOW OPERATION”. Which is quite frustrating.

But there’s another way to get the data flashed. If you have the BIN file… dd / ntrw it do the SD card…SD Card into the MDA2, boot into bootloader…and voila… flash!

Okay. That’s the fast version. But stay tuned for the long version soon 😉

SD:Waiting for card insert.........

CMD3 for SD, it's OK, ready to get RCA from response.

SD:Detected one card

SD:ready for transfer OK

Total card size=1E880000

Store image to SD/MMC card successful.


No Comments

real elite keyboard

This is a service announcement:

Das Keyboard

“If you are an elite programmer who can write sophisticated code under tight deadlines, someone who makes impossible projects possible; or a Silver Web Surfer your colleagues turn to when they need IT advice: this keyboard is for you.

Shouldn’t your keyboard reflect your status as one of the elite? We think so!”

Oh…just in case you didn’t notice: BLANK KEYS. I think I’ll get one…or two…



and I shall call it… “LASER”

There are some more new pictures of the laser in action available:

this is a direct hit of the camera…

a little bit to the left

approx. 2km distance to the laser

view from the lasers positon

Source: Star Wars is ein Witz!

No Comments

what would happen if someone hacks DCF77 time signal?

Some days ago we talked about: What would happen if someone hacks the DCF77 time signal?

If you don’t know what the DCF77 signal is, read the small description here.

Anyway: Many things are automated these days when it comes to time dependant actions. For example working time registration, backups, cash terminals just to name a few.
These services all depend on the assumption that they all have the correct time… Normally they get their standard-time from the internet or by radio (the mentioned dcf77).

In the first case I think many things will go wrong when the dcf77 time signal is manipulated… backups could be overwritten (tape overwrite protection expired…) … money wouldn’t be counted as disbursed … maybe things would just fail.

Anyway: Normally none of these speculations should be possible…but you never know…

The most interesting use of such a time manipulation is:

Almost every morning I am unable to get a parking lot for my car at the university. I would wonder if some would continue to sleep if the dcf77 time is set one or two hours behind…

Sounds not a that bad idea, doesn’t it?

We’ll see when it maybe just happens sometime.


1 Comment

You provide the light saber. I’ll provide the wireless LAN.

This evening the grey sky of Ilmenau was illuminated by something similar to Yodas green light saber. Actually it IS a laser of unknown power which seems to be used to “draw a straight line” above the roofs of the sleepy Ilmenau citizens.

Fortunately this is just a picture to show you what the laser should look like close-by.

And now cheer for the great pictures that where taken this night. They show the impressive skyline of Ilmenau and the even more impressive light saber by night.

Stay tuned for more light saber action…

Source 1: something about Yoda
Source 2: Wikipedia Laser


Nerd Sport: Harddisk Speaker!

Everytime I think it could not be worse I am impressed and surprised that it can be. After the fabulous Harddisk VU-Meter built by reply2all there is another Harddisk-mod project: Harddisk Speaker.

The idea is: take a defect Harddisk. Modify the read/write head interface and it’s bearing, add a standard stereo jack: Voilà you have a Harddisk Speaker.

The (quiet) sound is made by the read/write head when it’s moved fast on the plate.

The stereo jack in my notebook…

Soldering No. 1

Soldering No. 2
(connects the head interface to the jumper pins)

Soldering No. 3
(the bearing modified to move better)

the opened drive…

Really impressive to see that that little bit of energy from the stereo jack is enough to make the read/write head move and even create a sound. You can really hear the music … louder than you would expect. Okay: Sound quality is improvable especially the lower frequencies.

Source: Harddisk VU-meter

No Comments

RSA200 factored

Numbercruncing cereals!

"We have factored RSA200 by GNFS. The factors are




We did lattice sieving for most special q between 3e8 and 11e8
using mainly factor base bounds of 3e8 on the algebraic side and 18e7 
the rational side. The bounds for large primes were 2^35. This produced
26e8 relations. Together with 5e7 relations from line sieving the total
yield was 27e8 relations. After removing duplicates 226e7 relations
remained. A filter job produced a matrix with 64e6 rows and columns,
having 11e9 non-zero entries. This was solved by Block-Wiedemann.

Sieving has been done on a variety of machines. We estimate that
lattice sieving would have taken 55 years on a single 2.2 GHz Opteron 
Note that this number could have been improved if instead of the PIII-
binary which we used for sieving, we had used a version of the
lattice-siever optimized for Opteron CPU's which we developed in the 
The matrix step was performed on a cluster of 80 2.2 GHz Opterons 
connected via a Gigabit network and took about 3 months.

We started sieving shortly before Christmas 2003 and continued until
October 2004. The matrix step began in December 2004.
Line sieving was done by P. Montgomery and H. te Riele at the CWI, by
F. Bahr and his family."


No Comments

force Spotlight to index network shares

Today I found a very interesting article on MacOSX hints. It’s about Spotlight and how to force it to index network shares.
By default Spotlight ignores NFS/SMB/AFS shares. Of course there are some problems about the whole metadata idea behind spotlight when it comes to network shares.

It’s the idea behind a network shared volume that makes it hard to be indexed by spotlight. First of all more than one user at a time has access to this volume. So at any time there can be changes made to documents on that volume. Secondly the system Spotlight is running is not informed that a document changed…
One feature of Spotlight is, that you do not have to reindex a drive. It just indexes every document when it’s created or changed on the drive. And this is impossible on network volumes. Because there’s no possibility to stay in touch with the documents like it’s on physically attached exclusive used drives (through the file system for example).

So you have to reindex manually from time to time to use Spotlight on network volumes. So here’s what to do to force Spotlight to index network volumes:

Open a Terminal and enter:

sudo mdutil /Volumes/… -i on

Great hint! Unfortunatly you have to reenable the indexing everytime you mount the drive…that’s once a week for me… so not a big problem but not perfect anyway.

UPDATE: Unfortunately Spotlight just seems to index the network volume but it does not search through this index ;-( Thats disappointing!

Source: MacOSX hints


multeem Subversion access

Namenlos configured the Subversion server for anonymous acces. So you can now access the current development builds of multeem. Multeem is a project whose goal it is to reinvent the Instant Messaging world. Okay okay. That’s a bit to much marketing blah. I wrote about the goals and plan behind multeem some days ago. Just read this 😉

You can access the subversion server at Use the username “anonymous” and an empty password.

There are two ways to build multeem:

1. Visual Studio 2003

There’s a Visual Studio 2003 solution included. Just create a working copy from the SVN and open the multeem.sln in /multeem in Visual Studio. The solution should compile now. And you should be able to debug/run multeem.

2. Mono

We’ve included SConstruct files for the Scons Build-Tool. Just install Scons and Mono and build it 😉

We will release binaries and tarballs every now and then here on schrankmonster. So far we do not plan to maintain a dedicated website for multeem.

Source 1: multeem Mission Statement
Source 2: Scons: A software construction tool
Source 3: Microsoft Visual Studio
Source 4: Mono

No Comments

fun with websites… rotate’em!

Hehe…this is fun. If you have an IE6 handy you could try this website. It all starts with a google search…and you get nearly everything rotated from that point 😉

Schrankmonster for example:


No Comments

recordings of the 21c3 Congress are online…

The recordings of the 21c3 are online. Unfortunatly only the audio. No video so far. You can download them via bittorrent (it’s a 2.2GByte lump of data)

Malte from treehugginpussy splitted this big download into the several pieces. You can get them here.

All the recordings are in .ogg. You can grab the handouts here.

“Vom 21c3 wurden jetzt die Audiomitschnitte veröffentlicht, man kann sie mit BitTorrent herunterladen (2,2 GByte). Wer nur einzelne Beiträge sehen will, kann diese hier herunterladen, ich hab mir mal ein Verzeichnis mit den einzelnen Dateien online gestellt. Die Dateien liegen im .ogg-Format vor.
Mitschriften, soweit vorhanden, gibt es auf dem
Fahrplan zum Congress.”

Source: treehugginpussy

1 Comment

the next generation internet

I like my internet fast…
(screenshot of DU Meter monitoring a filecopy from my fileserver for 30s)


whip and route

This is Atze. He wants to show us what makes him somewhat horny. Its…

…a 12 connector “whip” for a chipcom 96 port switch. *Rawr* Doesn’t that sound hot?

This is the monster chipcom. You can estimate how old this thing is if you can read the inventory-number… its…#1

the official team logo…

Why did they play with the chipcom? Because on Saturday we will show this antique piece of technology to the public… the guys played about an hour to get the switches twinkle like it’s their last thing before they are dumped in the junk press… 😉

No Comments

a thriller a day keeps the doctor away

You may not know Pacific Tech’s Graphing Calculator but if you read this article and follow the link you’ll certainly know what it is and how it became what it is. And all this is packed into a very strange story:

“Pacific Tech’s Graphing Calculator has a long history. I began the work in 1985 while in school. That became Milo, and later became part of FrameMaker. Over the last twenty years, many people have contributed to it. Graphing Calculator 1.0, which Apple bundled with the original PowerPC computers, originated under unique circumstances.

I used to be a contractor for Apple, working on a secret project. Unfortunately, the computer we were building never saw the light of day. The project was so plagued by politics and ego that when the engineers requested technical oversight, our manager hired a psychologist instead. In August 1993, the project was canceled. A year of my work evaporated, my contract ended, and I was unemployed.

I was frustrated by all the wasted effort, so I decided to uncancel my small part of the project. I had been paid to do a job, and I wanted to finish it. My electronic badge still opened Apple’s doors, so I just kept showing up.”


No Comments

May the force be with you

I am going to order this soon…

ThinkGeek is not responsible should any customers who purchase this Lightsaber turn to the dark side. Nor are we responsible should you not contain sufficient Mitochlorians in your blood system to engage the force without reckless abandon.

Where to get:


No Comments

ever tried to grill your neighbour?

for the sake of every wireless network I know: PLEASE DON’T DO THAT AT HOME OR ANYWHERE ELSE!

“If you need the highest signal strength possible over the longest distances, then look no further. the 27dBm Transceiver for the Mac Mini pumps out an impressive 500 milliwatts of RF power – the built-in Airport antenna can only muster 30 milliwatts. Folks, that’s “oh my gosh” power.

And you don’t have to turn the light on in your room. It’ll glow just by itself. Oh and if you plan to reproduce yourself some day…don’t even think about it 😉

Source 1:
Source 2:


Microsoft Hellhounds won the Robocup German Open 2005!!!

Congratulations to the guys from Dortmund. With a final score of 4:2 the Microsoft Hellhounds once again won the Robocup.

Source 1:
Source 2:

No Comments

phear my l1ttl3 r0b0t

Andreas came up with this little gadget:

Isn’t this a beauty? I always did know that the japanese are great robot-contructors… but this exceeded my expectations by far.

Source: Walker

No Comments

Instant Messaging in the multi-client world

My problem is easy to explain: one user with many computers wants to use Instant Messaging…but not with multiple accounts – not with one account for each computer but with one account and one buddylist.

I have three machines with 4 monitors which makes 3 keyboards and 3 mice. It’s hard enough to get that managed – I don’t want to manage anything related to my daily tasks. I want to optimize my daily work. And therefore I want what obviously nobody wants today. Some kind of distributed Instant Messaging Network. I want something on top of the usual IM Services (e.g. MSN, ICQ, AIM, Jabber) – Let me show you an example:

Iam using all three computers – they are all signed in to the “Meta-IM-Network”. – And they all receive Events from that Meta-Network. When a buddy goes offline/online…he will go offline/online on all three machines simultaneausly. When someone writes a message to me. It will appear instantly on all three machines. When I’ve read the mail on any of the three computers the message will disappear on the other machines…

I think you get the idea. Why isn’t this possible? Why did nobody think of something like that? I want that NOW!


the perfect hotel for the Technology-Ninja of today

Tim told us his vision of the perfect „Nerd Hotel“ of today. And I totally agree with him. Everytime when I am in a hotel it’s just pain-in-the-ass to get internet access and even more painfull to get enough outlets.

He made a list what the perfect “Nerd Hotel” would at least need to qualify as one:

  1. free Internet access
  2. enough ports (RJ45/power) in a room this means:

    1. at least one port per desk/bed
    2. at least one three power outlets per desk/bed

  3. 1 notebook desk for inbed-use (per bed)
  4. a minium of 2Mbit downlink speed for the Internet access and not less than 50% uplink speed
  5. free 802.11b wireless LAN everywhere
  6. DHCP in the LAN and please no strange security behaviour…it will certainly get “fixed” by the nerds
  7. no port filtering/filtering at all
  8. 99,9 percent network reliability (power and internet uplink)
  9. no NAT for IPv4 if possible
  10. IPv6 would be fantastic
  11. internal gigabit network/fast in-house network
  12. every ethernet port is a switch-port (to prevent sniffing)
  13. DVD/CD first-aid kits at reception

I’m sure that we’ll find several more – So feel free to comment this article and tell us!


No Comments

use your Xbox Controller with your PC games

XBCD is the name of the driver that makes it possible to use the standard Xbox Controller with your PC games. Finally you have a real joypad for your PC… 😉

“Exports ~32 controls to Windows:

  • Up to 24 digital buttons.
  • 7 axes(X, Y, Z, RX, RY, RZ, Slider) in Windows 2000/XP.
  • 6 axes(X, Y, Z, RX, RZ, Slider) in 98/ME.
  • POV hat switch with 8 directions Controller buttons, axes, and the digital pad can be mapped to any of the controls exported to Windows.
  • Supports up to 8 different configurations. The active configuration can be selected by pressing both Analog Sticks simultaneously. Controller can be reported to Windows as a gamepad or a joystick.
  • Threshold settings for Buttons, Triggers, and Axes.
  • Deadzone settings for Analog Sticks.
  • Scaling of axes for sensitivity.
  • Gamepad settings can be saved to a file for later use.
  • Rumble support.
  • Adjustable maximum force for each actuator.”


No Comments

Radiation Gadget-o-rama

I found this very interesting website today: Smart Elements. You can order almost every element of the periodic table and even some isotops of elements. And there are some very interesting elements to play with… for instance those Tritium Trasers. Actually this is a gadget I probably really need because I can’t count the times I searched for the keys in the darkness…

“Traser is the generic name for glass tubes with a phosphor layer in them and Tritium gas inside the tube. They are most often seen as a type of glowing novelty keychain and in self illuminated exit signs. They are also favored by the military for critical applications where there must be illumination regardless of circumstances. They were invented in the 1960s as a reliable self powered light source for NATO. A traser consists of a section of tubular borosilicate glass, coated on the inside with a colored layor of phosphor. Borosilicate is preferred because it is a type of glass noted for its strength and resistance to breakage. In theory one could use any beta emitting gas. In practice Tritium is preferred because it is the least hazardous.”

The second cool “toy” that I found (with the help of cosrahn) on the site is Gallium. A metal whos melting point is 30 degree celsius…so indeed it will melt in my hand… I really have to get this just to play with…

Christian mentioned that they also sell Neodym NdFeB-magnets. I personally did not know what they are, but the site enlightened me and created some respect for them 😉

Source 1:
Source 2:
Source 3:
Source 4:
Source 5:

No Comments

European Installation Bus (EIB) Research

Deka and ThamThon started to play with the brand new EIB Installation in our Office. And they really seemed to have fun B-). Well the light was switched on and off several times – if they intended that… I don’t know – but the EIB configuration looked kinda complicated.

Oh, a few words what EIB is:

“Here’s how the “intelligent” home works: The EIB system serves as the automatic controller of devices and systems in homes and apartment houses, and functional and commercial buildings. Sensors, such as motion detectors and thermostats, send impulses over a transmission medium to so-called actuators, for example. Sensors and actuators communicate with each other via four alternate transmission media.”

This is the main controller and the serial interface of the EIB. You can see the serial cable (btw: 13 Euro for 3m serial cable is dailight robbery!) and the Battery.

The switch-modules…

This is the other side of the wall:

There are numerous actuators and switches connected to our bus. But when I left nothing worked so far 😉 The problem seems to be that the Software is not that logical – or we just don’t get it 😉

And THIS is a switch… okay… 4 switches… but damn isn’t that a nerds dream! 😉

A complete review and description of the offices’ EIB installation will be available shortly.

Source: EIB Wikipedia Article

1 Comment

UPDATE: kleine Lastsituation

als ich soeben mal seit langem wieder auf einen meiner Serverlein geschaut hab, hab ich direkt gesehen wieso der Rechner in letzter Zeit etwas träger reagiert als gewohnt:

So sieht eine Suchmaschine unter Dampf aus…


der Sound eines iPod Bootloaders

Tja…damals beim Xbox Bios Hack hab ich ja schon den Hut gezogen – damals wurde der unverschlüsselte Datenverkehr direkt auf den Leiterbahnen der Xbox “gemessen” und abgeschrieben… und nun hat sich jemand hingehockt und hat die iPod Firmware auf ähnliche Weise ausgelesen…

“The whole idea started last week when leachbj gave me a piece of code that caused the piezo in the iPod to make some *squeek*-sound. I played around with that code, changed some values and somehow was able to produce different sounds. Just for fun I came up with the idea of using this different sounds for transferring data. Some minutes later I dropped the idea because I thought that just won’t work and I won’t be able to write a decoder for that. Two days later I woke up and somehow just tried encoding a 32bit value into different beeps. It worked so made a loop around it to dump about 4kb of memory.”


No Comments

Dämonisches in der Musik

Früher ging man hin und hat irgendwelche Schallplatten oder Kassetten rückwärts laufen lassen…und da entdeckte man seltsame Botschaften an Gott, oder schlimmer an Satan. Im Zuge der Digitalisierung scheint sich hier auch eine Veränderung einzustellen: Auch die wirren Botschaften werden in die digitale Musik eingeflochten. Und zwar über die Spektren der aufgezeichneten Werke…so zum Beispiel bei Aphex Twin´s Windowlicker Scheibe:

Track #2

Track #1

Einfach die Lieder durch ein Spektrum-Analyzer geschickt und man erhält diese doch recht klaren Bilder… und weil jeder sich das Programm downloaden kann, kann auch jeder auf die Suche nach noch mehr dämonischen Botschaften machen….

Quelle 1:
Quelle 2:


Microsoft erklärt uns Leet-Speak

Th1$ 1$ \/\/h4+ \/\/3 4ll h@v3 \/\/@1+3d ph0r! M1cr0$0ph7 $h0\/\/$ u$ \/\/h4+ 1+$ @ll @b0u+ +h3 l337 $p34|<

Boah wie geil! 😉 Microsoft zeigt uns wie Leet-Speak funktioniert…

Key points for learning leetspeek

  • Numbers are often used as letters. The term “leet” could be written as “1337,” with “1” replacing the letter L, “3” posing as a backwards letter E, and “7” resembling the letter T. “0” (zero) will typically replace the letter “O.”

  • Characters of similar appearance can be used to replace the letters they resemble. For example, “5” or even “$” can replace the letter S. Applying this style, the word “leetspeek” can be written as “133t5p33k” or even “!337$p34k,” with “4” replacing the letter A.

  • Letters can be substituted for other letters that may sound alike. Using “Z” for a final letter S, and “X” for words ending in the letters C or K is common. For example, leetspeekers might refer to their computer “5x1llz” (skills).

  • Rules of grammar are rarely obeyed. Some leetspeekers will capitalize every letter except for vowels (LiKe THiS) and otherwise reject conventional English style and grammar.

  • Mistakes are often uncorrected. Common typing misspellings (or typos) such as “teh” instead of “the” are left uncorrected and may be adopted to replace the correct spelling.

  • Non-alphanumeric characters may be combined to form letters. For example, using slashes to create “/\/\” can substitute for the letter M, and two pipes combined with a hyphen to form “|-|” is often used in place of the letter H. Thus, the word “ham” could be written as “|-|4/\/\.””


No Comments

Codezone Engineer

Das sind die Helme die ein richtiger Entwickler brauch.

No Comments

Gewinnen Gewonnen Gewannen

v.l.: Frank Prengel, (), Frank Fischer, Uwe Baumann

bei der Siegerehrung…

1 Comment


unheimlich cool das das Hotel offenbar kostenlos und unlimitiert Netz per WLAN zur Verfügung stellt…

sponsored by NH-Hotels Frankfurt Mörfelden-Walldorf

No Comments

SHA-1 gebrochen

Ähm… da kehrt gerade so eine Art Knappheit an Prüfsummen ein meint Isotopp….und Bruce Schneider weiss noch genaueres:

“SHA-1 has been broken. Not a reduced-round version. Not a simplified version. The real thing.

The research team of Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu (mostly from Shandong University in China) have been quietly circulating a paper announcing their results:

  • collisions in the the full SHA-1 in 2**69 hash operations, much less than the brute-force attack of 2**80 operations based on the hash length.

  • collisions in SHA-0 in 2**39 operations.

  • collisions in 58-round SHA-1 in 2**33 operations.

This attack builds on previous attacks on SHA-0 and SHA-1, and is a major, major cryptanalytic result. It pretty much puts a bullet into SHA-1 as a hash function for digital signatures (although it doesn’t affect applications such as HMAC where collisions aren’t important).

The paper isn’t generally available yet. At this point I can’t tell if the attack is real, but the paper looks good and this is a reputable research team.”

Quelle 1: Isotopp
Quelle 2: SHA-1 broken

No Comments

Heute abend: Chaosradio

und zwar nicht wie erwartet Chaosradio Nummer 100 – sondern Chaosradio 33:

“Da wir die Nr. 33 seinerzeit übersprungen haben und demnächst ein Jubiläum ansteht, wollten wir den Sack voll machen und auch wirklich 99 Sendungen gemacht haben, bevor wir den dezimalen Übertrag in Auftrag geben. Deswegen Chaosradio 33. Ansonsten bleibt eigentlich alles beim alten 😉

Das Team dieses Mal: Frank, Pavel, Tim, Max.”


No Comments

Blauzahn Geschichten – Bluetooth zwischen Windows Server 2003 und Windows Mobile 2003

Nachdem gestern mein AVM BlueFritz USB 2.0 Stick gekommen ist, …

Habe ich angefangen zu probieren ActiveSync via Bluetooth mit meinem T-Mobile MDA2 zu synchronisieren. Jetzt kreuzigt mich bitte nicht . 😉 Mein Hauptsystem zum Spielen, Basteln und so ist ein Windows 2003 Enterprise. Nativ … no Bluetooth. Also steht nach der Install vom Stick nur der AVM Bluetooth Stack zur Verfügung. Gesagt getan …. Stick erkannt … “SerialProfil” ausgewählt für MDA2 aber ActiveSync will nicht. Nachdem ich nun diverse male versucht habe das ganze mit den Orginal MS Bluetooth Stack des MDA2 zu synchronosieren, habe ich mir dann heute ne WIDCOM Stack draufgehauen und siehe da. Plötzlich habe ich sämtliche Profile auf meinem MDA2 verfügbar. Standard sind wohl ObjectPush, Headset. Serial Profil gibts wohl erst nachdem man die Bluetooth Tools (Freeware Addon, nicht MS) installiert hat. Und ActiveSync funktioniert nun perfekt.


Heute Bildschirm:
man achte auf unten rechts

Komfortable Verwaltung (1):

Viele neue schöne Profile:

Komfortable Verwaltung (2):

Wieso nun der ganze Bluetooth Aufriss ???

Damit ich schön komfortabel mittels RemoteAmp mein Winamp und Itunes steuern kann. Playlist , Equalizer, MediaLibary, etc. vom MDA … alles no Prob.

Den Mediaplayer ab Version 9.x kann man auch fernsteuern. Das Tool heißt Rudeo Control.

Nico Orschel

Quelle 1: Ghosttalker Blog
Quelle 2:
Quelle 3:
Quelle 4:


wie man den Mac mini übertaktet….

Ich habe bisher nur einen einzigen meiner zahlreichen Rechner übertaktet…nämlich die zwei Celeron-A Prozessoren auf dem altehrwürdigen Abit BP6 Board (von 433 Mhz auf 550 Mhz) – alle anderen meiner Rechner habe ich nie übertaktet.

Das mit dem Übertakten ist auf dem PC – in meinem Fall auf dem BP6 Mainboard – recht einfach: im BIOS die entsprechenden Frequenzen einstellen und voilá – mehr oder weniger Megahertzen… – beim Mac mini wird das ganze dann schon etwas mühsamer, wie Leo Bodnar zu berichten weiss:

“I have settled on 1.42GHz speed for my original 1.25GHz Mac mini.”

Ich werde wohl nicht mit der Tradition brechen und meinen Mac mini auf Standard-Takt belassen…


No Comments

NerdAlert: Radio für Nerds

Sehr schön worauf ich gerade gestossen bin: Ich höre ja sehr gern Radiosendungen, vor allem über Technologie-Themen und mit ein bisschen Tiefgang. Trotzdem höre ich mir ab und zu auch Chaosradio an, aber das is ne andere Geschichte *stichel* 😉 – Nein Chaosradio is super, meine ich ja garnicht so. – egal hier solls nicht um Chaosradio gehen, sondern um NerdAlert.

Aber ich lass die Jungs mal selbst zu Wort kommen:

“Der NerdAlert ist eine monatliche Radiosendung zu digitalen Themen. Wir interessieren uns dabei insbesondere für die Hintergründe und Konsequenzen einer spezifischen Technologie und nicht vorrangig für die Technik an sich. Auch kreativen Umgang mit modernen Technologien finden wir höchst interessant.

Mit anderen Worten reden wir z.B. nicht über die frischen tollen Features eines neuen Webmail-Dienstes, sondern eher über die Datenschutz-Probleme, die sich daraus ergeben könnten, wenn eine führende Suchmachine plötzlich auch Zugriff auf Eure Emails hat. Ebenso werdet Ihr uns selten über eine neue Grafikkarte sprechen hören, es sei denn jemand benutzt diese Grafikkarte, um damit Töne zu berechnen.”

Die Sendungen gibts auf FM, die wenigsten werden jedoch die Möglichkeit haben den Sender “FSK” zu empfangen – deshalb bieten die Radiomacher die jeweilige Sendung auch als Radiomitschnitt an.

Ich selbst hab mir die Sendung noch garnicht angehört, werde also später ggf. meinen Senf dazu abgeben… aber meine Leser können das gerne auch tun… sogar SEHR gerne!

Quelle 1:
Quelle 2:
Quelle 3:

No Comments

Internet in 11km Höhe…

Genau so stelle ich mir den Fortschritt vor. Ganz selbstverständlich in ein Flugzeug steigen, sein Notebook aufklappen und ein bisschen im Internet surfen, natürlich arbeiten und chatten/skypen… GENAU SO!

Jetzt habe ich wenigstens ein Kriterium nachdem ich die Fluggesellschaft auf Langstreckenflügen aussuche – denn das Essen reicht bislang nicht als Kriterium um eine wirkliche Auswahl zu treffen. Iam so envious!

Clemens is such a stud. He chatted me last night around 8:20pm PST and was flying SAS to Copenhagen. Apparently for $30 you can get internet access while on the flight. OMG. That would so make a long-ass trip easier. “


No Comments

Linux auf dem Nintendo DS

Engadget berichtete heute:

“Using a passthrough and some homebrew demos, someone has Linux running on Nintendo’s new dual-screen portable gaming unit. It appears to use some external hardware, which makes the whole thing currently not-so-portable, but the idea is that all the hardware could be put on a single cartridge.”

Ja. Linux auf dem DS. Nicht schlecht soweit – also nicht das es nun gerade Linux ist, vielmehr das die Hardware damit anderweitig nutzbar wird.

Quelle 1:
Quelle 2:

No Comments

heute schon was über RFIDs gelesen?: Analysis of the Texas Instruments DST RFID

mit “Analysis of the Texas Instruments DST RFID” haben die Forscher ihre Arbeit überschrieben:

“The Texas Instruments DST tag is a cryptographically enabled RFID transponder used in several wide-scale systems including vehicle imobilizers and the ExxonMobil SpeedPass system. This page serves as an overview of our successful attacks on DST enabled systems. A preliminary version of the full academic paper describing our attacks in detail is also available below.”

Die Forscher haben dann mal ein bisschen mit den RFIDs herumgespielt und siehe da.. sie haben einen Simulator gebaut… da kann man dann Autos mit starten oder z.B. bei ExxonMobile Speedpass Benzin bezahlen…



1 Comment

8 Prozessoren und 8 GB RAM oder: How does this scale?

Hmm… also ich hab bald wieder Zeit zu spielen… und diese Kiste würd ich ganz gern mal in die Finger kriegen:

“A paper by Dr. Bernhard Tritsch, the Chief Systems Architect for visionapp GbmH, called “The Big Iron Test”, presents the methodologies and results of a study of Terminal Server on big (8 processor, 8GB of RAM) servers.”

Und um den Speichelfluss anzuregen, hier mal die SystemInfos des getesteten Systems:

und gleich ein Task Manager Screenshot mit den 16 CPUs hinterher:

Das PDF ist äusserst informativ – sollte einem mal so eine Kiste über den Weg laufen weiss man nach dem Studium des PDFs wie die Kiste sich vorraussichtlich verhalten wird…

Quelle 1: “How does this scale ?” PDF von visionapp GmbH
Quelle 2:

No Comments

Cracking the Mac mini… Part 5343665853

Und da gibts auch ein Video dazu…: (2,92 MB)

Das Ganze sieht offengestanden einigermassen beängstigend aus 😉 …. “These little buggers have to fit…“…MUAAH


No Comments

Hello Mr President… vor 4 Jahren

2001 gabs da eine coole Installation zum WEF 2001 – man konnte per SMS oder Webseite seine Nachrichten oberhalb des Hotels der wichtigen Menschen projezieren lassen…das war dann auch exakt vor 4 Jahren 😉 deshalb auch die Mitteilung heute…

“hellomrpresident ist eine interaktive Installation
von während des World Economic Forum (WEF) 2001
in Davos/Schweiz, vom 25.-29.Januar.”

hellomrpresident bietet Ihnen die Möglichkeit, eine Nachricht von 160 Zeichen unter den Augen von Hunderten von Journalisten und Tausenden von Managern und Politikern aus der ganzen Welt über einen Laserbeam in den Schnee oberhalb von Davos projizieren zu lassen. Mit einem einzigen Mausklick!”


No Comments

Browser Bug ?

hmm….Amazon wirft mit seltsamen Fehlermeldungen auf mich… was soll das denn B-)

No Comments

der Ruf der Vergangenheit: MGN BBS

vor kurzem bin ich schon über ein paar Bilder aus meiner Vergangenheit gestolpert.. und hab auch drüber gebloggt…und nun bin ich beim stöbern wieder über eine Perle gestolpert… eine ziemlich grosse Perle, dazu gleich mehr.

Erstmal das Titelbild der Perle:

Das ist das PDF-gewordene Abbild von mehr als 3 Jahren Userkommunikation meiner Mailbox “MGN BBS”. – Von der ersten bis zur letzten Mail, auf 13618 A4 Seiten in einem mehr als 24 Megabyte grossem PDF. – Die Kommunikation meiner Jugend…ich war damals gerade 15…. achja.. die Mailbox lief 24h und hatte zum Ende neben der bekannten Modem-Dial-In Leitung auch zwei ISDN Leitungen zu bieten. Über 3500 angemeldete Benutzer und einige hundert Megabyte Mail-Traffic jeden Monat. Neben der normalen ANSI Mailbox bot zum Ende die MGN BBS auch ein vollwertiges PPP Dial-In mit eigenen Webservern und Mailbox-Zusammenschluss. Um die Mails ordentlich zu verwalten und zwischen den Usenet- und den Fido-Servern synchron zu halten habe ich damals auch ein kleines Tool namens “gatenews” geschrieben…:

“GNPA#216.EXE 187720 28.04.98
BtK’s GateNEWS Version 0.1a Build #216
(C) 1997-98 by Daniel Kirstenpfad (‘BtK’)
Public Alpha Release *DEMO VERSION*”

Das einzige Tool zur damaligen Zeit welches die Brücke zwischen FIDO und Usenet geschlagen hat… und es hat funktioniert, wie eine handvoll Usenet Artikel zeigen…:-) Aber darum solls hier nicht gehen, über diesen Teil meiner Programmierer-Geschichte werde ich sicherlich demnächst auch stolpern.

Jedenfalls: Ich zögere das komplette PDF zu veröffentlichen – genaugenommen könnte ich es veröffentlichen, glaube ich zumindest – denn die dort abgedruckten Artikel waren allesamt öffentlich in der Mailbox lesbar – jederzeit von jedermann – sind also schon zur Zeit als sie geschrieben wurden absolut öffentlich gewesen.

Wenn jemand in der obigen “Autorenliste” nun Erinnerungen an alte Zeiten bekommt, dem sende ich natürlich gerne das PDF zu – ansonsten … naja ich zögere eben noch 😉 – Soll ich oder nicht ?

Quelle 1:
Quelle 2:

No Comments

den Mac mini öffnen

Okay..endlich ein Video wie der Mac mini zu öffnen ist… sieht prima aus muss ich sagen – ergo: dem RAM Upgrade steht nichts im Wege, schon garnicht die lange Autofahrt zum Händler.

“Apple doesn’t want you to open up your Mac mini on your own, but judging from this video it looks pretty darn easy. This video, in fact, slightly changes my opinion of the Mac mini. Apparently all you need is a putty knife and a light touch, and the path to user upgradability is clear!”

Quelle 1: Taking apart the Mac mini
Quelle 2:

No Comments

SETI ist der Name der Krankheit

Okay. Ich bin entschiedener Gegner der Rechenzeitverschwendung – der Kreuzritter der sinnvollen Anwendungen – und nun das:

“My seti farm is constantly growing/changing (as do most home farms !!), it started off by using all the bits I had lying around to make up as many pc’s as possible (I used to be a trader, so had a “few” bits around the place) The next step was ordering parts to go with what was left , eg shuttle boards to use the spare athlons I had Then as the bug bit even harder I started ordering parts to make more and more machines (crunchers). I now favor the caseless cruncher stacks , which have the advantage of taking up less space , but the disadvantage of being more hassle if you have to move them.”

Da hat sich so ein halbwegs Irrer gleich Palettenweise PCs in die Bude gekarrt um nichts sinnvolleres damit zu tun als SETI zu rechnen. – Das ist… BAH!

mal ein paar, dann doch, eindrucksvolle Bilder:



dasBlog “mal schnell” debuggen…

…ist nicht gerade eine einfache Aufgabe. Nachdem man sich die Sourcefiles heruntergeladen hat, und das Archiv entpackt hat, sieht man sich vor einer manigfaltiger Anzahl von Ordnern und Dateien. Mächte man die mitgeliferten solutions öffnen klappt fas nicht auf Anhieb. Mit ein paar einfachen Handgriffen ist dasBlog jedoch innerhalb weniger Minuten so konfiguriert, dass man losentwicklern und -debuggen kann.

Zunächst nehmen wir einmal an, die Quelldateien liegen in dem Ordner D:\Visual Studio Projects\DasBlogSource 1.6.4121.1. In dieem Fall richten wir zunächst den IIs ein. Zunächst muss ein Virutelles Verzeichnis mit dem namen DasBlog angelegt werden.

Als content directory gibt man im vorliegenden Fall D:\Visual Studio Projects\DasBlogSource 1.6.4121.1\newtelligence.DasBlog.Web an, repsektive den vollständigen Pfad des Verzeichnises newtelligence.DasBlog.Web.

In den Einstellungen des Virtuellen verzeichnisses noch schnell auf dem Reiter Virtuell Directory die Schaltfläche Configuration. Auf dem Reiter Debugging noch beide Debugging-Optionen aktivieren.

Auf Seiten des IIS ist man jetzt fertig und kann ohne Problem beispielsweise die Solution dasblog.sln öffnen. Auch das Debugging von dasBlog klappt jetzt problemlos!

1 Comment


diese Überwachungseinrichtung wollte ich schon immer mal dokumentieren. Dieses Kamera-Cluster hängt am Bus-Bahnhof in Ilmenau/Thüringen. – Und ist schon höchst eindrucksvoll anzusehen, ich zähle 6 Kameras allein an diesem Mast.

No Comments


wo ich gerad so über die Pimp0rs meckere…jetzt könnte ja der geneigte Leser auf die Idee kommen: und ? Was is das !? Bastelst du da nich herum ?! – Na klar ! B-)

aktueller Desktop auf meinem Notebook

No Comments