Maker Feed Electronics, DIY, Makers, Hackers and Internet of Things (IoT)

  • Latest Articles
  • Popular
  • News
  • Blogs
  • Platforms
  • Automation
  • Stores
  • Podcasts
Home » Blogs, Security »

Articles from Conor Patrick

Visit conorpp.com, subscribe and follow @_conorpp

3D printing a programming jig and embedding pogo pins

From conorpp.com 2 years ago in BlogsSecurity

When using a microcontroller in a custom design, there’s always a bit of a headache for me because I need to figure out a convenient way break stuff out for programming and development. Usually you can’t afford to get the...

Designing Solo, a new U2F/FIDO2 Token

From conorpp.com 3 years ago in BlogsSecurity

For the past couple years, I’ve been selling U2F tokens on Amazon. I’ve been selling an average of 150 units per month and have ordered multiple batches over the past two years. Due to recent developments with FIDO2, WebAuthn, and...

Detecting lines on technical drawings

From conorpp.com 3 years ago in BlogsSecurity

Over the past few months I’ve been working on a program to convert images of technical drawings into digital formats. In other words, the program will convert an image like this. Into a digital format that can be used in...

My home workspace

From conorpp.com 3 years ago in BlogsSecurity

Everyone’s workspace is different. Mine is a culmination of things that I’ve seen from other people’s workspaces and tools that I’ve found useful. Here is my main desk. It’s a bit messy but that’s okay. I use it as a...

Quick electric skateboard build

From conorpp.com 3 years ago in BlogsSecurity

A friend and I recently decided to get electric longboards. Except most of them suck or are pretty expensive. We figured maybe the DIY route wouldn’t be too hard and we could make something pretty sweet. I wanted to make...

U2F Zero year in review

From conorpp.com 3 years ago in BlogsSecurity

I wanted to share some details on the U2F Project now that it has been on the market for over a year now. This is to give an idea of what to expect in terms of cost and profit from...

Designing a clock with levitating arms (part 1)

From conorpp.com 4 years ago in BlogsSecurity

At some point I developed an interest in magnetic levitation. And I decided to make a clock with levitating arms. I thought it would be a great opportunity to get some more analog circuit experience. It would also be a...

Randomly generating 3D mazes to 3D print

From conorpp.com 4 years ago in BlogsSecurity

I recently got a 3D printer for home prototyping. One thing I wanted to make was a puzzle that took advantage of the strengths of 3D printing. I didn’t really find anything I liked on Thingiverse so I decided to...

Proof of concept for a reconfigurable mold

From conorpp.com 4 years ago in BlogsSecurity

If you want to mass produce some physical product in a short amount of time, chances are you would need to get a mold made. Most plastic parts get made via a plastic injection molding process, where molten plastic is...

Last post on emulating a credit card

From conorpp.com 4 years ago in BlogsSecurity

This is an update to a previous post about designing a credit card emulator. I got a custom made coil and it didn’t work. I’m concluding the project here. I first attempted to generate a magnetic field using only PCB...

Designing a credit card emulator card

From conorpp.com 4 years ago in BlogsSecurity

What this project is Some time ago I got interested in emulating magstripes with electromagnets. There are some other projects that have done this, like magspoof. What I am really interested in figuring out is how to get the form...

A review of some SMT buttons

From conorpp.com 4 years ago in BlogsSecurity

A review of surface mount buttons I haven’t posted in a long time and I am now finally making updates. I’m going to start with something super exciting (not really). This is a brief review of some surface mount buttons....

Designing and Producing 2FA tokens to Sell on Amazon

From conorpp.com 4 years ago in BlogsSecurity

I made a two factor authentication token and have made it available on Amazon. In this post I’ll talk about the design, how I produced it affordably, and some metrics about selling on Amazon. If you’re interested in doing something...

My experience going to Defcon and SAC

From conorpp.com 5 years ago in BlogsSecurity

I just attended Defcon 24 in Las Vegas and went to SAC (Selected Areas in Cryptography) afterwards. Defcon Defcon is a great conference that hosts around 15k people every year. People come to share their new research in infosec and...

Pearson Educations client side method for checking homework answers

From conorpp.com 5 years ago in BlogsSecurity

Exploitable Method By exploitable, I don’t mean in the traditional security sense. I mean exploitable by lazy undergraduate students. Pearson Education runs a large set of web applications that colleges use to automate their tedious ABET required courses. I was...

My experience with DirtyPCBS.com

From conorpp.com 5 years ago in BlogsSecurity

Dirty Cheap Dirty Boards If you want to order custom made PCB’s for a small price, Dirty PCB’s is probably your cheapest option. This used to just be a service that was internal to Dangerous Prototypes to make cheap boards...

Keyak: a candidate for the authenticated encryption standard

From conorpp.com 5 years ago in BlogsSecurity

New authentication cipher Keyak is an authenticated crypto system that is based on the Keccak sponge primitive. It is a candidate for the authenticated encryption standard in NIST’s Caesar competition. For those not familiar, Keccak is the recent new standard...

How to accelerate a program using hardware

From conorpp.com 5 years ago in BlogsSecurity

The Challenge One of my recent final projects in school was to take a given software program and make it as fast as possible while still being functionally correct. It was graded based on speed and how it ranked against...

Linx: the filesharing server every hacker should know about

From conorpp.com 5 years ago in BlogsSecurity

Linx Many file sharing servers already exist; a lot of them come and go. Services Google Drive and Drop Box are the big ones. Also there’s have more lightweight options like pastebin or python -m SimpleHTTPServer. Linx is a recent,...

A close look at an operating botnet

From conorpp.com 5 years ago in BlogsSecurity

For those that don’t know, a botnet is a network of hacked computers that somehow connect back to a command and control server which instructs the network to conduct malicious activities like DDOS attacks, phishing, or spam. What happened This...

How to fix a corrupted file by brute force

From conorpp.com 5 years ago in BlogsSecurity

The Challenge I recently competed in CSAW with a few friends. For those that don’t know, CSAW (Cyber Security Awareness Week) is an online CTF where a group at NYU Poly puts up challenges related to computer security. One of...

Proxying Bluetooth devices for security analysis using btproxy

From conorpp.com 5 years ago in BlogsSecurity

btproxy I’ve recently been interested in investigating the security of new technologies. New devices, especially in the “IoT” realm, use Bluetooth to communicate. I got interested finding a good way to get insight to Bluetooth connections. I wanted to be...

Class Prerequisite Graphs for VT

From conorpp.com 6 years ago in BlogsSecurity

Here are the class prerequisite graphs for all of the departments at Virginia Tech (Fall 2015). Sorry for those that are bandwidth impaired. It was made by scraping this page and passing the results to a graph function in Wolfram...

About Maker Feed

We feature articles by the greatest makers, hackers and DIY enthusiasts from around the web. All websites and feeds are featured in the Feeds widget below.

Subscribe

  • Twitter
  • Facebook
  • Flipboard
  • RSS Feed

Feeds in Blogs, Security

  • Dr. Gough Lui Subscribe
  • RTL-SDR Subscribe
  • Docker Pirates Subscribe
  • Becky Stern Subscribe
  • Igor Pecovnik Subscribe
  • Lucky Resistor Subscribe
  • Board DB Subscribe
  • Kaspars Dambis Subscribe
  • Tinkerman Subscribe
  • All About Circuits Subscribe
  • Jara’s Spare Time Electronics Subscribe
  • Wade Wegner Subscribe
  • Sprites mods Subscribe
  • BEEKn Subscribe
  • Krebs on Security Subscribe
  • Gough’s Tech Zone Subscribe
  • airfy Inc. Subscribe
  • Johan Kanflo Subscribe
  • Hackaday Subscribe
  • import Subscribe
  • Matthew Petroff Subscribe
  • Mike’s Hardware Experiments Subscribe
  • Dan Strother Subscribe
  • Dimme’s World Subscribe
  • Neil’s Log Book Subscribe
  • Chris Stubbs Subscribe
  • Wolf Paulus Subscribe
  • IoT M2M blog Subscribe
  • MotoBrain Subscribe
  • Nootropic Design Project Lab Subscribe
  • electronut Subscribe
  • Bits on a Board Subscribe
  • Geoffrey Subscribe
  • Martin Harizanov Subscribe
  • Jeremy Blum Subscribe
  • My 2µF Subscribe
  • Tim’s Blog Subscribe
  • Paul’s Electronics Subscribe
  • Nathan Chantrell Subscribe
  • Limpkin’s blog Subscribe
  • Embedded Day Subscribe
  • Provide Your Own Subscribe
  • Miguel Grinberg Subscribe
  • Misc. Projects & Random Useless Stuff Subscribe
  • KOBAKANT Subscribe
  • Oona Räisänen Subscribe
  • Projects from Tech Subscribe
  • JeeLabs Subscribe
  • Dhakajack Subscribe
  • Evil Mad Scientist Laboratories Subscribe
  • Raspberry Pi @ Gadgetoid Subscribe
  • Derek Molloy Subscribe
  • Electronics-Lab.com Blog Subscribe
  • LowPowerLab Subscribe
  • bildr Subscribe
  • Łukasz Wieczorek Subscribe
  • maniacbug Subscribe
  • Tinkerlog Subscribe
  • JulietMikeBravo Subscribe

Maker Feed