Muutke küpsiste eelistusi

E-raamat: Hardware Hacking: Have Fun while Voiding your Warranty

(President and CEO of Grand Idea Studio, CA, U.S.A.), (Technical Editor, Hacker, best-selling author of The Art of Deception, U.S.A.), (Ryan Russell (aka Blue Boar) has worked in the IT field for over 16 years.)
  • Formaat: PDF+DRM
  • Ilmumisaeg: 29-Jan-2004
  • Kirjastus: Syngress Media,U.S.
  • Keel: eng
  • ISBN-13: 9780080478258
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 27,03 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 29-Jan-2004
  • Kirjastus: Syngress Media,U.S.
  • Keel: eng
  • ISBN-13: 9780080478258
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

"If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include: * Don't toss your iPod away when the battery dies! Don't pay Apple the $99 to replace it! Install a new iPod battery yourself without Apple's "help" * An Apple a day! Modify a standard Apple USB Mouse into a glowing UFO Mouse or build a FireWire terabyte hard drive and custom case * Have you played Atari today? Create an arcade-style Atari 5200 paddle controller for your favorite retro videogames or transform the Atari 2600 joystick into one that can be used by left-handed players * Modern game systems, too! Hack your PlayStation 2 to boot code from the memory card or modify your PlayStation 2 for homebrew game development * Videophiles unite! Design, build, and configure your own Windows- or Linux-based Home Theater PC * Ride the airwaves! Modify a wireless PCMCIA NIC to include an external antenna connector or load Linux onto your Access Point * Stick it to The Man! Remove the proprietary barcode encoding from your CueCat and turn it into a regular barcode reader * Hack your Palm! Upgrade the available RAM on your Palm m505 from 8MB to 16MB

Muu info

Includes hacks of today's most popular gaming systems like Xbox and PS/2. Teaches readers to unlock the full entertainment potential of their desktop PC. Frees iMac owners to enhance the features they love and get rid of the ones they hate.
Foreword xxvii
Introduction xxxv
Part I Introduction to Hardware Hacking 1(44)
Chapter 1 Tools of the Warranty Voiding Trade
3(10)
Introduction
4(1)
The Essential Tools
4(2)
Taking it to the Next Level
6(2)
Hardcore Hardware Hackers Only
8(2)
Where to Obtain the Tools
10(3)
Chapter 2 Electrical Engineering Basics
13(32)
Introduction
14(1)
Fundamentals
14(9)
Bits, Bytes, and Nibbles
14(4)
Reading Schematics
18(2)
Voltage, Current, and Resistance
20(3)
Direct Current and Alternating Current
21(1)
Resistance
22(1)
Ohm's Law
22(1)
Basic Device Theory
23(11)
Resistors
23(2)
Capacitors
25(3)
Diodes
28(2)
Transistors
30(2)
Integrated Circuits
32(2)
Soldering Techniques
34(6)
Hands-On Example: Soldering a Resistor to a Circuit Board
34(2)
Desoldering Tips
36(1)
Hands-On Example: SMD Removal Using ChipQuik
37(3)
Common Engineering Mistakes
40(1)
Web Links and Other Resources
41(6)
General Electrical Engineering Books
41(1)
Electrical Engineering Web Sites
42(1)
Data Sheets and Component Information
43(1)
Major Electronic Component and Parts Distributors
43(1)
Obsolete and Hard-to-Find Component Distributors
43(2)
Part II Hardware Hacks 45(406)
Chapter 3 Declawing Your CueCat
47(36)
Introduction
48(3)
Model Variations
49(2)
Opening the CueCat
51(5)
Preparing for the Hack
51(1)
Opening the Four-Screw PS/2 CueCat
51(3)
Opening the Two-Screw PS/2 CueCat
54(1)
Opening the USB CueCat
55(1)
Removing the Unique Identifier
56(12)
Preparing for the Hack
57(1)
Removing the UID: Four-Screw PS/2CueCat
57(3)
Removing the UID: Two-Screw PS/2CueCat
60(2)
Removing the UID: USB CueCat
62(2)
Under the Hood: How the Hack Works
64(4)
Removing the Proprietary Barcode Encoding
68(8)
Preparing for the Hack
68(1)
Removing the Encoding from the Four-Screw PS/2 CueCat
69(2)
Removing the Encoding from the Two-Screw PS/2 CueCat
71(2)
Removing the Encoding from the USB CueCat
73(1)
Under the Hood: How the Hack Works
74(2)
Technical Information
76(6)
The CueCat Encoding Scheme
76(2)
More Physical Model Variations
78(2)
More History of Political and Legal Issues
80(2)
CueCat Litter Box: Web Links and Other Resources
82(1)
Open-Source CueCat Software and Drivers
83(1)
Digital Convergence Patents for CueCat Technologies
83(1)
Chapter 4 Case Modification: Building a Custom Terabyte FireWire Hard Drive
83(28)
Introduction
84(1)
Case Mod Primer
84(1)
Creating a 1.2TB FireWire RAID
85(9)
Preparing for the Hack
85(1)
Performing the Hack
86(6)
Under the Hood: How the Hack Works
92(2)
Custom Case Modification for the FireWire RAID
94(14)
Preparing for the Hack
94(1)
Performing the Hack
95(10)
Under the Hood: How the Hack Works
105(3)
Additional Resources
108(3)
Case Modifications
109(2)
Chapter 5 Macintosh
111(38)
Compubrick SE
112(20)
Preparing for the Hack
113(1)
Performing the Hack
114(17)
Taking Apart the Mac
114(6)
Encasing the Speaker
120(1)
Covering the Mouse and the Keyboard
121(2)
Encasing the Disk Drive
123(2)
Encasing the Hard Drive
125(2)
Encasing the Motherboard
127(2)
Encasing the CRT
129(2)
How the Hack Works
131(1)
Building a UFO Mouse
132(8)
Preparing for the Hack
133(1)
Performing the Hack
134(6)
Opening the Mouse
134(2)
Drilling the Hole
136(1)
Soldering the LED
137(1)
Reassembling the Mouse
138(2)
How the Hack Works
140(1)
Adding Colored Skins to the Power Macintosh G4 Cube
140(5)
Preparing for the Hack
141(1)
Performing the Hack
142(3)
Under the Hood: How the Hack Works
145(1)
Other Hacks and Resources
145(4)
Desktop Hacks
145(1)
Laptop Hacks
146(1)
Electrical and Optical Hacks
146(1)
Case Mods
146(1)
Software
147(1)
Discussion
147(2)
Chapter 6 Home Theater PCs
149(50)
Introduction
150(1)
Before You Begin: Research and Plan
151(3)
How Much Could It Cost?
152(1)
Did Someone Already Build It?
153(1)
The Components of an HTPC Project
154(17)
The Display
155(5)
What Are Your Options for Higher-Quality Video Display?
157(3)
The Video Card
160(1)
The Case
160(1)
The Hard Drives
161(3)
Speed Considerations
163(1)
Sshhhh... Quiet Operations
164(1)
Optical Drives
164(1)
The CPU
165(1)
The Sound Card
166(1)
The Controller
167(1)
The Software
167(4)
Building a Windows HTPC
171(14)
Preparing for the Hack
171(4)
Performing the Hack: Software
175(10)
Eazylook
177(1)
Using the Launcher
178(1)
Using Guide Plus+
178(2)
CDex
180(1)
FairUse
180(5)
Windows Summary
185(1)
Building a Linux HTPC
185(13)
Preparing for the Hack
185(1)
Performing the Hack: Hardware
185(7)
Performing the Hack: Software
192(5)
Installing the Video Capture Drivers
192(2)
Install MPlayer and CODECs
194(1)
Installing MythTV
194(3)
Linux Summary
197(1)
Further Hacking and Advanced Topics
198(1)
Chapter 7 Hack Your Atari 2600 and 7800
199(48)
Introduction
200(2)
The Atari 7800 ProSystem
201(1)
Hacks in This
Chapter
202(1)
Atari 2600 Left-Handed Joystick Modification
202(5)
Preparing for the Hack
203(1)
Performing the Hack
204(3)
Use an NES Control Pad with Your 2600
207(7)
Preparing for the Hack
207(2)
Performing the Hack
209(5)
Atari 2600 Stereo Audio Output
214(9)
Preparing for the Hack
216(1)
Performing the Hack
216(7)
Under the Hood: How the Hack Works
223(1)
Atari 7800 Blue LED Modification
223(5)
Preparing for the Hack
223(1)
Performing the Hack
224(3)
Under the Hood: How the Hack Works
227(1)
Atari 7800 Game Compatibility Hack to Play Certain 2600 Games
228(4)
Preparing for the Hack
229(1)
Performing the Hack
230(2)
Under the Hood: How the Hack Works
232(1)
Atari 7800 Voltage Regulator Replacement
232(5)
Preparing for the Hack
233(1)
Performing the Hack
233(3)
Under the Hood: How the Hack Works
236(1)
Atari 7800 Power Supply Plug Retrofit
237(5)
Preparing for the Hack
238(1)
Performing the Hack
239(3)
Other Hacks
242(5)
2600 Composite/S-Video Modifications
242(1)
Atari 7800 Composite and S-Video Output
243(1)
Sega Genesis to Atari 7800 Controller Modification
243(1)
NES Control Pad to Atari 7800 Controller Modification
243(1)
Atari 7800 DevOS Modification and Cable Creation
243(1)
Atari Resources on the Web
244(3)
Chapter 8 Hack Your Atari 5200 and 8-Bit Computer
247(46)
Introduction
248(2)
The Atari 5200 SuperSystem
249(1)
Hacks in This
Chapter
250(1)
Atari 5200 Blue LED Modification
250(6)
Preparing for the Hack
251(1)
Performing the Hack
251(5)
Under the Hood: How the Hack Works
256(1)
Creating an Atari 5200 Paddle
256(12)
Preparing for the Hack 257 Performing the Hack: Disassembling the Paddle Controller
258(2)
Performing the Hack: Building the 5200 Paddle Controller
260(6)
Performing the (Optional) Hack: Weighted Dial
266(1)
Under the Hood: How the Hack Works
267(1)
Free Yourself from the 5200 Four-Port Switchbox
268(12)
Preparing for the Hack
269(2)
Performing the Hack
271(8)
Under the Hood: How the Hack Works
279(1)
Build Atari 8-Bit S-Video and Composite Cables
280(10)
Preparing for the Hack
281(1)
Performing the Hack
282(6)
Cable Hack Alternatives
288(1)
Under the Hood: How the Hack Works
289(1)
Technical Information
289(1)
Other Hacks
290(3)
Atari 5200 Four-Port VCS Cartridge Adapter Fix
290(1)
Atari 5200 Composite/S-Video Modification
290(1)
Atari 8-Bit SI02PC Cable
291(1)
Atari Resources on the Web
291(2)
Chapter 9 Hacking the PlayStation 2
293(30)
Introduction
294(1)
Commercial Hardware Hacking: Modchips
294(2)
Getting Inside the PS2
296(6)
Mainboard Revisions
296(2)
Identifying Your Mainboard
297(1)
Opening the PS2
298(4)
Installing a Serial Port
302(8)
Preparing for the Hack
303(1)
Performing the Hack
304(6)
Testing
309(1)
Under the Hood: How the Hack Works
310(1)
Booting Code from the Memory Card
310(6)
Preparing for the Hack
310(1)
Performing the Hack: Preparing Title.DB
311(3)
Choosing BOOTELF
313(1)
Saving TITLE.DB to the Memory Card
314(1)
Independence!
314(1)
Under the Hood: How the Hack Works
314(2)
Other Hacks: Independent Hard Drives
316(1)
PS2 System Overview
316(5)
Understanding the Emotion Engine
317(4)
The Serial I/O Port
318(3)
The I/O Processor
321(1)
The Sub-CPU Interface
321(1)
Additional Web Resources
321(2)
Chapter 10 Wireless 802.11 Hacks
323(26)
Introduction
324(1)
Wireless NIC/PCMCIA Card Modifications: Adding an External Antenna Connector
325(7)
Preparing for the Hack
326(1)
Performing the Hack
327(5)
Removing the Cover
327(2)
Moving the Capacitor
329(2)
Attaching the New Connector
331(1)
Under the Hood: How the Hack Works
332(1)
OpenAP (Instant802): Reprogramming Your Access Point with Linux
332(6)
Preparing for the Hack
333(1)
Performing the Hack
334(4)
Installing the SO Card
335(3)
Power Me Up, Scotty!
338(1)
Under the Hood: How the Hack Works
338(1)
Having Fun with the Dell 1184 Access Point
338(7)
Preparing for the Hack
339(1)
Performing the Hack
340(5)
Under the Hood: How the Hack Works
345(1)
Summary
345(1)
Additional Resources and Other Hacks
345(4)
User Groups
345(1)
Research and Articles
346(1)
Products and Tools
346(3)
Chapter 11 Hacking the iPod
349(42)
Introduction
350(3)
Opening Your iPod
353(6)
Preparing for the Hack
354(1)
First Generation iPods
355(1)
Second and Third-Generation iPods
356(3)
Replacing the iPod Battery
359(12)
Preparing for the Hack
360(1)
Battery Replacement: First- and Second-Generation iPods
361(4)
Battery Replacement: Third-Generation iPods
365(6)
Upgrading a 5GB iPod's Hard Drive
371(10)
Preparing for the Hack
372(1)
Performing the Hack
372(9)
From Mac to Windows and Back Again
381(3)
Preparing for the Hack
381(1)
Going from Windows to Macintosh
381(2)
Going from Macintosh to Windows
383(1)
iPod Diagnostic Mode
384(4)
The Diagnostic Menu
384(3)
Disk Check
387(1)
Additional iPod Hacks
388(2)
Installing Linux on an iPod
388(1)
Repairing the FireWire Port
388(1)
Scroll Wheel Fix
389(1)
iPod Resources on the Web
390(1)
Chapter 12 Can You Hear Me Now? Nokia 6210 Mobile Phone Modifications
391(26)
Introduction
392(1)
Nokia 6210 LED Modification
393(13)
Preparing for the Hack
393(2)
Performing the Hack
395(9)
Opening the Nokia 6210
395(5)
Removing the Old LEDs
400(1)
Inserting the New LEDs
401(1)
Increasing the LED Power
402(1)
Putting the Phone Back Together
403(1)
Under the Hood: How the Hack Works
404(2)
Data Cabling Hacks
406(9)
Data Cables
407(3)
Flashing Cables
410(1)
Net Monitor
411(4)
Other Hacks and Resources
415(2)
Chapter 13 Upgrading Memory on Palm Devices
417(34)
Introduction
418(2)
Model Variations
419(1)
Hacking the Pilot 1000 and Pilot 5000
420(9)
Preparing for the Hack
420(2)
Removing the Memory Card
422(5)
Adding New Memory
423(4)
Under the Hood: How the Hack Works
427(2)
Hacking the PalmPilot Professional and PalmPilot Personal
429(7)
Preparing for the Hack
429(4)
Removing the Memory Card
429(1)
Adding New Memory
430(3)
Under the Hood: How the Hack Works
433(3)
Hacking the Palm m505
436(11)
Preparing for the Hack
436(1)
Opening the Palm
437(2)
Removing the Main Circuit Board
439(2)
Removing the Memory
441(1)
Adding New Memory
442(3)
Under the Hood: How the Hack Works
445(2)
Technical Information
447(3)
Hardware
447(1)
File System
448(1)
Memory Map
448(1)
Database Structure
449(1)
Palm Links on the Web
450(3)
Technical Information
450(1)
Palm Hacks
450(4)
More Memory Upgrades
450(1)
Part III Hardware Hacking Technical Reference 451(68)
Chapter 14 Operating Systems Overview
453(22)
Introduction
454(1)
OS Basics
454(8)
Memory
455(3)
Physical Memory
455(2)
Virtual Memory
457(1)
File Systems
458(1)
Cache
459(1)
Input/Output
460(1)
Processes
460(1)
System Calls
461(1)
Shells, User Interfaces, and GUIs
461(1)
Device Drivers
462(4)
Block and Character Devices
464(2)
Properties of Embedded Operating Systems
466(1)
Linux
467(3)
Open Source
467(1)
History
468(1)
Embedded Linux (uCLinux)
469(1)
Product Examples: Linux on Embedded Systems
470(1)
VxWorks
470(1)
Product Examples: VxWorks on Embedded Systems
470(1)
Windows CE
471(2)
Concepts
471(5)
Product Examples: Windows CE on Embedded Systems
472(1)
Summary
473(1)
Additional References and Further Reading
473(2)
Chapter 15 Coding 101
475(44)
Introduction
476(1)
Programming Concepts
476(14)
Assignment
477(1)
Control Structures
478(4)
Looping
479(1)
Conditional Branching
480(1)
Unconditional Branching
481(1)
Storage Structures
482(6)
Structures
483(1)
Arrays
484(1)
Hash Tables
485(1)
Linked Lists
486(2)
Readability
488(2)
Comments
488(1)
Function and Variable Names
488(1)
Code Readability: Pretty Printing
489(1)
Introduction to C
490(19)
History and Basics of C
490(6)
Printing to the Screen
490(3)
Data Types in C
493(1)
Mathematical Functions
493(3)
Control Structures
496(5)
For Loops
496(1)
While Loops
496(2)
If/Else
498(2)
Switch
500(1)
Storage Structures
501(6)
Arrays, Pointers, and Character Strings
501(5)
Structures
506(1)
Function Calls and Variable Passing
507(1)
System Calls and Hardware Access
508(1)
Summary
509(1)
Debugging
509(3)
Debugging Tools
509(1)
The printf Method
510(2)
Introduction to Assembly Language
512(6)
Components of an Assembly Language Statement
513(3)
Labels
513(2)
Operations
515(1)
Operands
515(1)
Sample Program
516(2)
Summary
518(1)
Additional Reading
518(1)
Index 519


Kevin Mitnick (Technical Editor) is the most famous computer hacker in the world. Since his first arrest in 1981, at age 17, he has spent nearly half his adult life either in prison or as a fugitive. He has been the subject of three books and his alleged 1982 hack into NORAD inspired the movie War Games. Since his plea-bargain release in 2000, he says he has reformed and is devoting his talents to helping computer security.