G3RMY
 
past...
2002-12 2003-01 2003-02 2003-03 2003-04 2003-05 2003-06 2003-07 2003-08 2003-09 2003-10 2003-11 2003-12 2004-01 2004-02 2004-03 2004-04 2004-05 2004-06 2004-07 2004-08 2004-09 2004-10 2004-11 2004-12 2005-01 2005-02 2005-03 2005-04 2005-05 2005-06 2005-07 2005-08 2005-09 2005-10 2005-11 2005-12 2006-01 2006-02 2006-03 2006-04 2006-05 2006-06 2006-07 2006-08 2006-09 2006-10 2006-11 2006-12 2007-01 2007-02 2007-04 2007-05 2007-06 2007-07 2007-09 2007-10 2007-11 2007-12 2008-01 2008-02 2008-03 2008-04 2008-05 2008-06 2008-07
Present...
Vectors..
abstractdynamics - Abe Burmeister
alt.sense
Arts & Letters Daily
ashleyb
Baader-Meinhof
BBCi
BBC : UK Weather
BLEEP.COM
BlissBlog - Simon Reynolds
Blog search directory
Blue Spoon - Alex Evans & Pete Hawley
ColorMatch 5K
Doug Coupland
designtechnica
diveintomark
essell
experimental.ro
Ftrain
gamasutra
Gigatoid - Chris Brown
Guardian/Observer
Project Gutenberg
GUTTERBREAKZ
icon architecture + design
imdb
Joi Ito
The Eyes have it - Lee Potts
makeshitbreakshit - Robrob
marginwalker.org
mcsweeneys
MetaFilter
NeedToKnow
O'Reilly Books
orkut
picturestation.net
Planet-Mu
Praystation - Joshua Davis
Processing
Rephlex
rhizome
Scaremongering.net
Scaremongering.net - Forum
schematic.net
S.I. Archives
nooflat.nu/
Shirky
skykicking
Soulseek
stereotypography
Swen's Weblog : Artists mentioned in the WIRE
textz.com
Technorati Profile
transphormetic
Tribe.net
The Wire
tufluv
Tufte
V-2 - Adam Greenfield
WARP
Web Standards Project
WeWorkForThem
wikipedia
William Gibson's blog
WOEBOT
XLTRONIC
YayHooray!
Jeff Zeldman
Zenarchery - Dr. Joshua Z. Ellis
old G3RM pieces...
g3rm
germ02
germ11
germ12
index
RSS...
RSS Feed
Subscribe with Bloglines

2003-06-27

... ?
Slashdot | Hacking the XBox
This part of the book quickly gets quite complicated, because Microsoft obviously tried hard to produce a secure machine that could provide a fair platform for people to play games. Getting the XBox to run any old software is not an easy task, but Huang describes several major techniques for drilling through the various layers of security. Again, he offers detailed pictures and instructions for construction special tools that snarf signals from a bus. Then he explains how he managed to grab the right keys for decrypting some of the most important data. Although it's a technical book, it unfolds like a spy novel. The book is also very politically thoughtful. While the clueless will equate the word 'hacking' in the title with piracy, money laundering, terrorism, and not phoning home on mother's day, Huang frames every step with a discussion of whether it is motivated by good or evil. He's not interested in building a tool to pirate XBox games and points out that many of the modifications aimed at running Linux on the Xbox do not help the pirates in any way. If anything, they make the games entirely unplayable.