Hardware Hacking: Have Fun while Voiding your Warranty

Front Cover
Elsevier, Jan 29, 2004 - Computers - 448 pages
"If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include:
* Don't toss your iPod away when the battery dies! Don't pay Apple the $99 to replace it! Install a new iPod battery yourself without Apple's "help"
* An Apple a day! Modify a standard Apple USB Mouse into a glowing UFO Mouse or build a FireWire terabyte hard drive and custom case
* Have you played Atari today? Create an arcade-style Atari 5200 paddle controller for your favorite retro videogames or transform the Atari 2600 joystick into one that can be used by left-handed players
* Modern game systems, too! Hack your PlayStation 2 to boot code from the memory card or modify your PlayStation 2 for homebrew game development
* Videophiles unite! Design, build, and configure your own Windows- or Linux-based Home Theater PC
* Ride the airwaves! Modify a wireless PCMCIA NIC to include an external antenna connector or load Linux onto your Access Point
* Stick it to The Man! Remove the proprietary barcode encoding from your CueCat and turn it into a regular barcode reader
* Hack your Palm! Upgrade the available RAM on your Palm m505 from 8MB to 16MB

· Includes hacks of today's most popular gaming systems like Xbox and PS/2.
· Teaches readers to unlock the full entertainment potential of their desktop PC.
· Frees iMac owners to enhance the features they love and get rid of the ones they hate.
 

What people are saying - Write a review

User ratings

5 stars
1
4 stars
0
3 stars
2
2 stars
2
1 star
4

Hardware Hacking: Have Fun While Voiding Your Warranty

User Review  - Not Available - Book Verdict

While most of us are content to use our technical toys as provided, hardware hackers constantly search for bigger, better, and more interesting ways to modify their equipment. Hardware Hacking ... Read full review

User Review - Flag as inappropriate

shree

Contents

Part II Hardware Hacks
45
Part III Hardware Hacking
451

Other editions - View all

Common terms and phrases

Popular passages

Page v - Distributors for the enthusiasm with which they receive our books. Kwon Sung June at Acorn Publishing for his support. Jackie Gross, Gayle Voycey, Alexia Penny, Anik Robitaille, Craig Siddall, Darlene Morrow, lolanda Miller, Jane Mackay, and Marie Skelly at Jackie Gross & Associates for all their help and enthusiasm representing our product in Canada. Lois Fraser, Connie McMenemy, Shannon Russell, and the rest of the great folks at Jaguar Book Group for their help with distribution of Syngress books...
Page 22 - In fact they are examples of the first law of thermodynamics which states that energy cannot be created or destroyed...
Page 15 - It is a base-16 system in which 16 sequential numbers are used as base units before adding a new position for the next number (digits 0 through 9 and letters A through F). One hex digit can represent the arrangement of 4 bits (a nibble). Two hex digits can represent 8 bits (a byte). Table 2.1 shows equivalent number values in the decimal, hexadecimal, and binary number systems. Hex digits are sometimes prefixed with Ox or $ to avoid confusion with other numbering systems.
Page vii - ... including consumer electronics, medical products, video games and toys, are licensed worldwide. Joe's recent developments include the Emic Text-to-Speech Module and the Stelladaptor Atari 2600 Controller-to-USB Interface. Joe has testified before the United States Senate Governmental Affairs Committee and is a former member of the legendary hacker think-tank L0pht Heavy Industries. He has presented his work at numerous academic, industry, and private forums, including the United States Air Force...
Page 18 - Europe sometimes use different symbols, and there are even multiple symbols to represent one type of part. A resistor has its own special symbol, as does a capacitor, a diode, or an integrated circuit. Think of schematic symbols as an alphabet for electronics. Table 2.3 shows a selection of basic components and their corresponding designators and schematic symbols. This is by no means a complete list, and, as mentioned, a particular component type may have additional symbols that aren't shown here....
Page xxvii - An incredibly good, and perhaps very time-consuming, piece of work that produces exactly what is needed.
Page xii - ... cofounder of Defensive Thinking, a Los Angeles-based consulting firm (www.defensivethinking.com). He has testified before the Senate Committee on Governmental Affairs on the need for legislation to ensure the security of the government's information systems. His articles have appeared in major news magazines and trade journals, and he has appeared on Court TV, Good Morning America, 60 Minutes, CNN's Burden of Proof and Headline News, and has been a keynote speaker at numerous industry events....

About the author (2004)

Kevin Mitnick (Technical Editor) is the most famous computer hacker in the world. Since his first arrest in 1981, at age 17, he has spent nearly half his adult life either in prison or as a fugitive. He has been the subject of three books and his alleged 1982 hack into NORAD inspired the movie War Games. Since his plea-bargain release in 2000, he says he has reformed and is devoting his talents to helping computer security.

Bibliographic information