Abstract
There are three classical forms of hacking: software, hardware, and wetware (also known as social engineering). More recently, firmware hacking has become prominent because low-cost hardware utilizing embedded Linux has opened the door to software hackers unable to build hardware. It is hardware hacking, and its associated software, that I will cover in this chapter.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
An NDA is a legal document formed by companies to prevent you from talking about their technology or ideas with anyone else.
- 2.
- 3.
The codecs now in use require more CPU power than the formats used in games of that time.
- 4.
Firmwares prior to 3.50 are underclocked at 222MHz.
- 5.
Some cite contravention of the DMCA/EUCD, and some cases have been dismissed.
- 6.
Formally called Extreme NXT: Extending the LEGO MINDSTORMS NXT to the Next Level (ISBN 978-1590598184).
- 7.
This is a difficult one to build, by the way, because the suction on most fridge doors is more powerful than the LEGO motors.
- 8.
PWM is where the digital output voltage is switched between high and low so that the average voltage, over time, is somewhere between the two. Not all hardware can be powered like this, however, but it is a cheap compromise.
- 9.
Older boards using the ATmega8 support only pins 9, 10, and 11, whereas the newer Arduino Mega can support PWM on 12 of its pins.
- 10.
Since January 1, 2005, in England and Wales, the Building Regulations Part P specifies that only certified engineers can carry out this particular electrical installation work. If it not carried out by such a person, then the work must be certified upon completion. Other countries may have similar laws.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Steven Goodwin
About this chapter
Cite this chapter
Goodwin, S. (2013). Appliance Hacking: Converting Existing Technology. In: Smart Home Automation with Linux and Raspberry Pi. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-5888-9_2
Download citation
DOI: https://doi.org/10.1007/978-1-4302-5888-9_2
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-5887-2
Online ISBN: 978-1-4302-5888-9
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)