Mar 03 2014

News - D-Link DIR-510L Wireless AC750 Travel Router With Battery Now Shipping

It wasn't that long ago that I added a portable router to my standard pack whenever leaving the house for vacation or business travel. It’s just so handy to be able to setup a Wi-Fi hotspot wherever I need one, and even if I don’t need to share a single for-fee wireless connection, it comes out of the bag because of the time it saves setting up all the other network-needing devices that also travel with me and the family.

I saw D-Link’s DIR-510L at CES and it offers most of the usual features. $100 may not seem like the right price at first, but with but the built in battery, that can power it or charge a device, and ability to connect to a cellular USB dongle make it stand out it what is becoming a welcomingly crowded field. Full PR after the click.

Feb 24 2014

Podcast - The MissingRemote Podcast Returns - Episode 10

RSS Feed for iTunes/Zune/Podcast

We're back for a second week in a row! MissingRemote.com is taking a little different approach to the podcast format this time. We are going to be doing a weekly podcast, with some new face and voices. They are run by Kyle Button (@techbutton) each week. We will be tackling the current post on the site and ones from around the web that deal with Home Automation, Media Center, HTPC, and Media Consumption. We are not going for the News feel we are going to the conversation we would have if we sat around that talked about these topics in a group. We will be featuring some guest each week. I have some other co-host joining myself, John McMahon (@JohnMcMahon_), Eric Hall (@wxrocks) and Paul Belser (@interwebtactics), will be working with at least three host each week. We will be publishing MP3 downloads and YouTube video links, with some weeks we are hoping to be live.  Sorry about the Echo, we are working on a fix for that..

Please check out the link and listen. We will be posting these on iTunes, Stitcher and Zune Marketplace in the near future.

MP3 Download:  https://archive.org/download/MissingRemote.comPodcastEpisode10Audio/MissingRemote.com_Podcast_Episode_10_Audio.mp3

YouTube Link: http://youtu.be/NBZUZV11gHA Embeded Player after the break

MissingRemote Podcast

Feb 23 2014

News - Intel D54250WYK NUC Custom Solutions Header (CSH) 3.3V Flaw

I was really excited when I found out Intel had placed the HDMI-CEC enabling Custom Solutions Header (CSH) on the D54250WYK NUC. It was exactly the kind of feature that belongs on this near-perfect mini-HTPC. Unfortunately, as we can see in the gallery, something isn't right with its ability to maintain 3.3V under load.

What this means in practice is that we can't use the 3.3V pin on the D54250WYK's CSH for Pulse-Eight's Internal CEC adapter - disappointing would be an understatement. Now it is possible to find 3.3V elsewhere on the board; I was able to pull it from the SATA power connector, but since that only powered when the system is in S0 (on) it's less than ideal. Intel has been contacted with these findings. Hopefully it's something that can be addressed with a BIOS update, but I'm not confident.

Feb 18 2014

News - Update: Security Flaw found in Belkin WeMo devices

There has been flaws found in the way WeMo (Belkin) does updates to the device. They use over the air firmware updates with PGP security through RSS updates. If someone wanted to spoof Belkin Logothat RSS feed and get a valid signed firmware, they could potentially send you modified firmware that would give them access to bypass your NAT firewall. WeMo uses a protocol called STUN (Wikipedia) and the hacker could then control an internal network behind your NAT and get information off any of your other computers after that. Nothing is know if this is a problem on other Home Automation products, but US-CERT has sent notice to Belkin and posted on their website the notice. See the advisory below from IOActive.

Feb 18 2014

News - ASUS is not fixing a security flaw in their Router Automatically

ASUS is not fixing a problem that is considered a security flaw in any of their recent firmware Asus Logoupdates. Do you have any of the features enabled that help with remote access to your files? Do you have Samba enabled? You are also opening up yourself to this vulnerability. Security experts are trying to contact ASUS to see if they are planning on fixing the issue, but no response yet. The “hacker” can see the entire hard drive that is connected to the router, even if you don’t have it shared out publicly. This goes for a bunch of ASUS routers and ASUS is slowly coming out with some patches but they have to manually fix the issues. Check out the link below from CNET.

"These types of attacks could be prevented if security was a higher priority in the router manufacturers software development life cycle," Holcomb said. "At the end of the day, this is just the tip of the iceberg; with the amount of vulnerable network hardware comprising the internet infrastructure, people should count on more large scale attacks."

CNET

Syndicate content
Website design by Yammm Software
Powered by Drupal