<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hardware on System Overlord</title><link>https://systemoverlord.com/tags/hardware.html</link><description>Recent content in Hardware on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Tue, 23 Feb 2021 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/hardware/index.xml" rel="self" type="application/rss+xml"/><item><title>Is Reusing an Old Mac Mini Worth It?</title><link>https://systemoverlord.com/2021/02/23/is-reusing-an-old-mac-mini-worth-it.html</link><pubDate>Tue, 23 Feb 2021 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2021/02/23/is-reusing-an-old-mac-mini-worth-it.html</guid><description>&lt;p&gt;I was cleaning up some old electronics (I&amp;rsquo;m a bit of a pack rat) and came across
a Mac Mini I&amp;rsquo;ve owned since 2009. I was curious whether it still worked and
whether it could get useful work done. This turned out to be more than a 5
minute experiment, so I thought I&amp;rsquo;d write it up here as it was just an
interesting little test.&lt;/p&gt;</description></item><item><title>Course Review: Applied Hardware Attacks: Rapid Prototying &amp; Hardware Implants</title><link>https://systemoverlord.com/2019/03/20/course-review-applied-hardware-attacks-rapid-prototying-hardware-implants.html</link><pubDate>Wed, 20 Mar 2019 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2019/03/20/course-review-applied-hardware-attacks-rapid-prototying-hardware-implants.html</guid><description>&lt;p&gt;Over the past 4 days, I had the opportunity to take two hardware security
classes taught by &lt;a href="https://securinghardware.com/"&gt;Joe Fitzpatrick&lt;/a&gt;(&lt;a href="https://twitter.com/securelyfitz"&gt;@securelyfitz&lt;/a&gt;)
along with &lt;a href="https://twitter.com/_mg_"&gt;@_MG_&lt;/a&gt;. Both courses are part of the
&amp;ldquo;Applied Hardware Attacks&amp;rdquo; series of courses taught by Joe. The first course,
&amp;ldquo;Rapid Prototyping&amp;rdquo;, is focused on using 3D printers and PCB mills to build
interfaces to hardware systems. The second course, aptly named &amp;ldquo;Hardware
Implants&amp;rdquo; applies these skills to build hardware implants to perform attacks on
hardware systems. Both courses are
&lt;a href="https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies"&gt;very timely&lt;/a&gt;
and informative, as well as a lot of fun.&lt;/p&gt;</description></item><item><title>Matir's Favorite Things</title><link>https://systemoverlord.com/2016/08/20/matir-s-favorite-things.html</link><pubDate>Sat, 20 Aug 2016 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2016/08/20/matir-s-favorite-things.html</guid><description>&lt;p&gt;One of my friends was recently asking me about some of the tools I use,
particularly for security assessments. While I can&amp;rsquo;t give out all of these
things for free Oprah-style, I did want to take a moment to share some of
my favorite security- and technology-related tools, services and resources.&lt;/p&gt;
&lt;h2 id="hardware"&gt;Hardware&lt;/h2&gt;
&lt;p&gt;&lt;a href="http://shop.lenovo.com/us/en/laptops/thinkpad/t-series/t450s/"&gt;&lt;img src="https://systemoverlord.com/img/blog/favorite_things/t450s.jpg" alt="Lenovo T450s"&gt;{:.left}&lt;/a&gt;
My primary laptop is a &lt;strong&gt;Lenovo T450s&lt;/strong&gt;. For me, it&amp;rsquo;s the perfect mix of weight and
processing power &amp;ndash; configured with enough RAM, the i5-5200U has no trouble
running 2 or 3 VMs at the same time, and with an internal 3-cell battery plus a
6-cell battery pack, it will go all day without an outlet. (Though not
necessarily under 100% CPU load.) Though Lenovo no longer sells this, having
replaced it with the T460s, it&amp;rsquo;s still &lt;a href="https://amzn.to/2boky1C"&gt;available on
Amazon&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>Playing with the Patriot Gauntlet Node (Part 1)</title><link>https://systemoverlord.com/2013/02/05/playing-with-the-patriot-gauntlet-node-part-1/</link><pubDate>Tue, 05 Feb 2013 07:54:05 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2013/02/05/playing-with-the-patriot-gauntlet-node-part-1/</guid><description>&lt;p&gt;I recently picked up a &lt;a href="http://www.amazon.com/gp/product/B008KW61XK/ref=as_li_ss_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B008KW61XK&amp;amp;linkCode=as2&amp;amp;tag=systemovecom-20"&gt;Patriot Gauntlet Node&lt;/a&gt; just to take a look at it. Playing with the device, it seemed to be a pretty straightforward wireless SoC with a hard drive interface. Many, if not most, of these embedded SoCs use Linux as their operating system, so I decided to go a bit further and see what was going on.&lt;/p&gt;
&lt;p&gt;I headed over to the Patriot website and downloaded the firmware for the
Gauntlet Node, unzipped the file, and ran &lt;a
href="https://github.com/ReFirmLabs/binwalk"&gt;binwalk&lt;/a&gt; against it. (Binwalk is an awesome tool that essentially runs 'file' with a special magic file against every possible byte offset to find the parts of a firmware image.)&lt;/p&gt;</description></item></channel></rss>