A how-to guide for hackers

Friday, 30 January 2004, 2:02 PM EST

Already bored with all the presents you got for the holidays? Hack them into new-and-improved presents.

Got piles of now-outdated gifts from past festive occasions carefully stashed away because you might need the parts someday? Hack them, too.

Don't know how to hack or need some inspiration? Get yourself a copy of Hardware Hacking: Have Fun While Voiding Your Warranty. It has 576 pages of detailed instructions that will show you how to re-engineer almost every inanimate object in your home or office.

"We decided to publish Hardware Hacking because there is an enormous community of hackers, in the purest sense of the word, who are passionate about combining technology and creativity to produce things that are new, better, different or just plain fun," said Andrew Williams, vice president of publishing at Syngress Publishing.

"These hackers carry on the heritage of the pioneers in the computing industry, like Steve Wozniak, Bill Hewlett and Dave Packard," said Williams. "So who knows.... Maybe this book will inspire someone to found the next Apple (Computer) or HP."

By Michelle Delio at Wired.

[ Read more ]




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //