211 stories
·
1 follower

SNK Playmore puts ten of their games on sale for $0.99

1 Share

SNK Playmore releases some classic SNK games for Android, many of which were found on Neo Geo arcade machines, in the 1990s. For anyone looking for some retro, side scrolling action games or retro fighting games, or an arcade shooter,  they've listed several of them on sale for $0.99.

The list of action games is comprised of all four Metal Slug games (1-3, and X); you can check out our review for Metal Slug 3 here. As for fighting games, they would include Fatal Fury Special, King of Fighters 97, King of Fighters-A 2012, Samurai Shodown II, and Garou: Mark of the Wolves. Lastly, they also put their shooter on sale called Beast Busters.

I've played a handful of these SNK ports, and found them all to be enjoyable. The games typically include options for how  to set the screen (full, standard, windowed, etc),  as well as the option to position on-screen buttons anywhere the player would like. Lastly, in the fighting games, players can also toggle special buttons that assist with combos.

For $0.99, a player who has even mild interest in any of these games can't go wrong. Be advised, after looking through some of the list, I did notice that Samurai Showdown II had a warning that the game MAY have problems running on Android 5.0. It wasn't on the other games I checked out, but be sure to read through everything on the game's page.

Google Play: SNK Playmore

Read the whole story
dragorn
3198 days ago
reply
Share this story
Delete

Trust Me (I'm a kettle)

10 Comments and 27 Shares

The internet of things may be coming to us all faster and harder than we'd like.

Reports coming out of Russia suggest that some Chinese domestic appliances, notably kettles, come kitted out with malware—in the shape of small embedded computers that leech off the mains power to the device. The covert computational passenger hunts for unsecured wifi networks, connects to them, and joins a spam and malware pushing botnet. The theory is that a home computer user might eventually twig if their PC is a zombie, but who looks inside the base of their electric kettle, or the casing of their toaster? We tend to forget that the Raspberry Pi is as powerful as an early 90s UNIX server or a late 90s desktop; it costs £25, is the size of a credit card, and runs off a 5 watt USB power source. And there are cheaper, less competent small computers out there. Building them into kettles is a stroke of genius for a budding crime lord looking to build a covert botnet.

But that's not what I'm here to talk about.

I have an iPad. (You may be an Android or Windows RT proponent. Don't stop reading: this is just as applicable to you, too.) I mostly use it as a reacreational gizmo for reading and watching movies, and a little light gaming. But from time to time it's handy to have a keyboard—I use it for email too. So I bought one of these (warning: don't buy it direct, it costs a lot less than £90 on the high street). It's a lovely piece of kit: charges over micro-USB, magnetically clips to the front of the iPad to cover it when not in use, communicates via bluetooth.

But I suddenly had a worrying thought.

This keyboard contains an embedded device powerful enough to run a bluetooth stack. The additional complexity of adding wifi is minimal, as is the power draw if it's designed right. Here's an SD card, with wifi. It's aimed at camera owners: the idea is it can automatically upload your snapshots to the cloud. Turns out it runs Linux and it's hackable.

Look at that cute Logitech bluetooth keyboard. There's a lot of space in it, behind the slot the iPad sits in. Presumably that chunk of the case is full of battery, and the small embedded computer that handles the bluetooth stack. Even if it isn't hackable in its own right, what's to stop someone from buying a bunch of bluetooth keyboards and installing a hidden computer in them? Done properly it'll run a keylogger and some sniffing tools to gather data about the device it's connected to. It stays silent until it detects an open wifi network. Then it can hook up and hork up a hairball of personal data—anything you typed on it—at a command and control server. Best do it stealthily: between the hours of 1am and 4am, and in any event not less than an hour after the most recent keypress.

I hear tablets are catching on everywhere. Want to dabble in industrial espionage? Get a guy with a clipboard to walk into an executive's office and swap their keyboard for an identical-looking one. When they come back from lunch they'll suffer a moment of annoyance when their iPad or Microsoft Surface turns out to have forgotten it's keyboard. But they'll get it paired up again fast, and forget all about it.

I don't want you to think I'm picking on Logitech, by the way. Exactly the same headache applies to every battery-powered bluetooth keyboard. I'm dozy and slow on the uptake: I should have been all over this years ago.

And it's not just keyboards. It's ebook readers. Flashlights. Not your smartphone, but the removable battery in your smartphone. (Have you noticed it running down just a little bit faster?) Your toaster and your kettle are just the start. Could your electric blanket be spying on you? Koomey's law is going to keep pushing the power consumption of our devices down even after Moore's law grinds to a halt: and once Moore's law ends, the only way forward is to commoditize the product of those ultimate fab lines, and churn out chips for pennies. In another decade, we'll have embedded computers running some flavour of Linux where today we have smart inventory control tags—any item in a shop that costs more than about £50, basically. Some of those inventory control tags will be watching and listening to us; and some of their siblings will, repurposed, be piggy-backing a ride home and casing the joint.

The possibilities are endless: it's the dark side of the internet of things. If you'll excuse me now, I've got to go wallpaper my apartment in tinfoil ...

Read the whole story
dragorn
3780 days ago
reply
Share this story
Delete
9 public comments
Lacrymosa
3776 days ago
reply
Your tea kettle is a botnet zombie?
Boston, MA
boltonm
3779 days ago
reply
Alarming stuff. With all the writing in the business press regarding "cyber-security" this makes some possible risks come to life.
London, UK
wyeager
3779 days ago
reply
This article made good use of my xkcd substitutions chrome extension. "Not your pokedex, but the removable battery in your pokedex." "Could your atomic blanket be spying on you?"
Blur Area
rwarner
3779 days ago
reply
This is the most unsettling thing I've read in awhile.
iPhone: 30.163819,-81.571257
gmuslera
3780 days ago
reply
The elephant in the room is the smartphone/tablet itself, and the already included components. No need to go to optional addons when the core and common pieces are made for very few manufacturers, and you can't get rid of your phone as easy as you could not use a bluetooth keyboard.
montevideo, uy
Courtney
3780 days ago
reply
Dammit I used to say they could never remake The Conversation but now...fuck...
Portland, OR
ryanbrazell
3780 days ago
reply
Frightening.
Richmond, VA
wmorrell
3780 days ago
reply
I have a sudden urge to tear apart just about everything in my apartment.
HarlandCorbin
3780 days ago
reply
Why stop at a bluetooth keyboard? USB mice and keyboards could have this stuff embedded and we wouldn't know.

A DIY NFC Tag

1 Share

Simple NFC Tag

[Nicholas] built a simple NFC tag using an ATtiny84 microcontroller, four resistors, three capacitors, a diode, and an antenna. It implements ISO 14443-3, a standard for identification cards, and can communicate with the NFC chip sets found in most new smartphones.

This standard uses on-off keying for communication, which makes the hardware slightly more complex than the AVR RFID tag that we saw a few years back. The antenna and a variable capacitor form an LC circuit tuned at 13.56 MHz, which is the carrier frequency for the protocol. The diode acts as an envelope detector, letting the microcontroller recover the signal.

It may not be fully compliant with the standard, but [Nicolas] successfully tested out the device with his Lumia 620 phone. The firmware is available on Google Code so you can program your own tag data into main.c, build the firmware, and send some NFC packets. You can also check out a demo of the device after the break.


Filed under: wireless hacks
Read the whole story
dragorn
3808 days ago
reply
Share this story
Delete

High-Gain Patch Antennas Boost Wi-Fi Capacity In Crowded Lecture Halls

1 Share
An anonymous reader writes "To boost its Wi-Fi capacity in packed lecture halls, Georgia Institute of Technology gave up trying to cram in more access points with conventional omni-directional antennas, and juggle power settings and channel plans. Instead, it turned to new high-gain directional antennas. They look almost exactly like the bottom half of a small pizza box, and focus the Wi-Fi signal from the ceiling-mounted access point in a precise cone-shaped pattern, covering part of the lecture hall floor. Instead of the flaky, laggy connections, about which professors had been complaining, users now consistently get up to 144Mbps (if they have 802.11n client radios). 'Overall, the system performed much better' with the new antennas, says William Lawrence, IT project manager principal with the university's academic and research technologies group. 'And there was a much more even distribution of clients across the room's access points.'"

Read more of this story at Slashdot.








Read the whole story
dragorn
3817 days ago
reply
Share this story
Delete

Soviet plane-spotting head-gear

2 Shares


Drakegoodman scanned this 1917-ish photo of Soviet planespotters in exotic headgear; according to a commenter, the binox are focused at infinity "so that when you found the source of the sound by turning your head, you could see the aircraft creating that sound."

WTF (via Bruce Sterling)

    
Read the whole story
dragorn
3854 days ago
reply
Share this story
Delete

Decoding D-STAR headers with the RTL-SDR

1 Share

dstar7

D-STAR or Digital Smart Technologies for Amateur Radio is a digital voice and data protocol used in amateur radio. Here’s a link which shows how the RTL-SDR can decode D-STAR text messages and headers (link is in Italian but Google translate can help, and the pictures show more than enough information). By using SDRSharp and stereo mix you can tune to a D-STAR signal, and pass the audio to a command line based decoding program (dstar.exe) which, which will then decode D-STAR text messages.

Via RTL-SDR.com.

Read the whole story
dragorn
3856 days ago
reply
Share this story
Delete
Next Page of Stories