Hardware Hacking: Have Fun while Voiding your Warranty
"If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include:
* Don't toss your iPod away when the battery dies! Don't pay Apple the $99 to replace it! Install a new iPod battery yourself without Apple's "help"
* An Apple a day! Modify a standard Apple USB Mouse into a glowing UFO Mouse or build a FireWire terabyte hard drive and custom case
* Have you played Atari today? Create an arcade-style Atari 5200 paddle controller for your favorite retro videogames or transform the Atari 2600 joystick into one that can be used by left-handed players
* Modern game systems, too! Hack your PlayStation 2 to boot code from the memory card or modify your PlayStation 2 for homebrew game development
* Videophiles unite! Design, build, and configure your own Windows- or Linux-based Home Theater PC
* Ride the airwaves! Modify a wireless PCMCIA NIC to include an external antenna connector or load Linux onto your Access Point
* Stick it to The Man! Remove the proprietary barcode encoding from your CueCat and turn it into a regular barcode reader
* Hack your Palm! Upgrade the available RAM on your Palm m505 from 8MB to 16MB
· Includes hacks of today's most popular gaming systems like Xbox and PS/2.
· Teaches readers to unlock the full entertainment potential of their desktop PC.
· Frees iMac owners to enhance the features they love and get rid of the ones they hate.
What people are saying - Write a review
Hardware Hacking: Have Fun While Voiding Your WarrantyUser Review - Not Available - Book Verdict
While most of us are content to use our technical toys as provided, hardware hackers constantly search for bigger, better, and more interesting ways to modify their equipment. Hardware Hacking ... Read full review
User Review - Flag as inappropriate
Other editions - View all
5200 controller AAAA AAAA AAAA antenna array assembly language Atari 8-bit audio barcode battery bottom buttons bytes cable capacitor chapter circuit board components connected CueCat device driver diode disk EEPROM electronics example FFFF FFFF FFFF FireWire four-screw PS/2 function hackers hard drive hardware hacking heat-shrink tubing hole HTPC installed interface joystick jumper keyboard Linux Macintosh mainboard memory card metal modchip modify monitor motherboard mouse MythTV NEED TO KNOW Nokia operating system output paddle controller pads Palm PalmPilot PalmPilot Professional Performing the Hack plastic plug port power supply processor remove replacement resemble the image resistor S-Video screen screwdriver screws Serial EEPROM serial number server shown in Figure soldering iron SRAM standard stored tabs TITLE.DB variable Windows wire wireless
Page v - Distributors for the enthusiasm with which they receive our books. Kwon Sung June at Acorn Publishing for his support. Jackie Gross, Gayle Voycey, Alexia Penny, Anik Robitaille, Craig Siddall, Darlene Morrow, lolanda Miller, Jane Mackay, and Marie Skelly at Jackie Gross & Associates for all their help and enthusiasm representing our product in Canada. Lois Fraser, Connie McMenemy, Shannon Russell, and the rest of the great folks at Jaguar Book Group for their help with distribution of Syngress books...
Page 15 - It is a base-16 system in which 16 sequential numbers are used as base units before adding a new position for the next number (digits 0 through 9 and letters A through F). One hex digit can represent the arrangement of 4 bits (a nibble). Two hex digits can represent 8 bits (a byte). Table 2.1 shows equivalent number values in the decimal, hexadecimal, and binary number systems. Hex digits are sometimes prefixed with Ox or $ to avoid confusion with other numbering systems.
Page vii - ... including consumer electronics, medical products, video games and toys, are licensed worldwide. Joe's recent developments include the Emic Text-to-Speech Module and the Stelladaptor Atari 2600 Controller-to-USB Interface. Joe has testified before the United States Senate Governmental Affairs Committee and is a former member of the legendary hacker think-tank L0pht Heavy Industries. He has presented his work at numerous academic, industry, and private forums, including the United States Air Force...
Page 18 - Europe sometimes use different symbols, and there are even multiple symbols to represent one type of part. A resistor has its own special symbol, as does a capacitor, a diode, or an integrated circuit. Think of schematic symbols as an alphabet for electronics. Table 2.3 shows a selection of basic components and their corresponding designators and schematic symbols. This is by no means a complete list, and, as mentioned, a particular component type may have additional symbols that aren't shown here....
Page xxvii - An incredibly good, and perhaps very time-consuming, piece of work that produces exactly what is needed.
Page xii - ... cofounder of Defensive Thinking, a Los Angeles-based consulting firm (www.defensivethinking.com). He has testified before the Senate Committee on Governmental Affairs on the need for legislation to ensure the security of the government's information systems. His articles have appeared in major news magazines and trade journals, and he has appeared on Court TV, Good Morning America, 60 Minutes, CNN's Burden of Proof and Headline News, and has been a keynote speaker at numerous industry events....