The hardware hacker adventures in making and breaking hardware
The Hardware Hacker is an illuminating career retrospective from Andrew "bunnie" Huang, one of the world's most esteemed hackers.
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
San Francisco, California :
No Starch Press
2016.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630092106719 |
Tabla de Contenidos:
- Intro
- Praise for The Hardware Hacker
- Title Page
- Copyright Page
- Acknowledgments
- brief contents
- contents in detail
- preface
- part 1: adventures in manufacturing
- Chapter 1. made in china
- The Ultimate Electronic Component Flea Market
- The Next Technological Revolution
- Touring Factories with Chumby
- Scale in Shenzhen
- Feeding the Factory
- Dedication to Quality
- Building Technology Without Using It
- Skilled Workers
- The Need for Craftspeople
- Automation for Electronics Assembly
- Precision, Injection Molding, and Patience
- The Challenge of Quality
- Closing Thoughts
- Chapter 2. inside three very different factories
- Where Arduinos Are Born
- Starting with a Sheet of Copper
- Applying the PCB Pattern to the Copper
- Etching the PCBs
- Applying Soldermask and Silkscreen
- Testing and Finishing the Boards
- Where USB Memory Sticks Are Born
- The Beginning of a USB Stick
- Hand-Placing Chips on a PCB
- Bonding the Chips to the PCB
- A Close Look at the USB Stick Boards
- A Tale of Two Zippers
- A Fully Automated Process
- A Semiautomated Process
- The Irony of Scarcity and Demand
- Chapter 3. the factory floor
- How to Make a Bill of Materials
- A Simple BOM for a Bicycle Safety Light
- Approved Manufacturers
- Tolerance, Composition, and Voltage Specification
- Electronic Component Form Factor
- Extended Part Numbers
- The Bicycle Safety Light BOM Revisited
- Planning for and Coping with Change
- Process Optimization: Design for Manufacturing
- Why DFM?
- Tolerances to Consider
- Following DFM Helps Your Bottom Line
- The Product Behind Your Product
- Testing vs. Validation
- Finding Balance in Industrial Design
- The chumby One's Trim and Finish
- The Arduino Uno's Silkscreen Art
- My Design Process
- Picking (and Maintaining) a Partner.
- Tips for Forming a Relationship with a Factory
- Tips on Quotations
- Miscellaneous Advice
- Closing Thoughts
- part 2: thinking differently: intellectual property in china
- Chapter 4. gongkai innovation
- I Broke My Phone's Screen, and It Was Awesome
- Shanzhai as Entrepreneurs
- Who Are the Shanzhai?
- More Than Copycats
- Community-Enforced IP Rules
- The 12 Phone
- Inside the 12 Phone
- Introducing Gongkai
- From Gongkai to Open Source
- Engineers Have Rights, Too
- Closing Thoughts
- Chapter 5. fake goods
- Well-Executed Counterfeit Chips
- Counterfeit Chips in US Military Hardware
- Types of Counterfeit Parts
- Fakes and US Military Designs
- Anticounterfeit Measures
- Fake MicroSD Cards
- Visible Differences
- Investigating the Cards
- Were the MicroSD Cards Authentic?
- Further Forensic Investigation
- Gathering Data
- Summarizing My Findings
- Fake FPGAs
- The White Screen Issue
- Incorrect ID Codes
- The Solution
- Closing Thoughts
- part 3: what open hardware means to me
- Chapter 6. the story of chumby
- A Hacker-Friendly Platform
- Evolving chumby
- A More Hackable Device
- Hardware with No Secrets
- The End of Chumby, New Adventures
- Why the Best Days of Open Hardware Are Yet to Come
- Where We Came From: Open to Closed
- Where We Are: "Sit and Wait" vs. "Innovate"
- Where We're Going: Heirloom Laptops
- An Opportunity for Open Hardware
- Closing Thoughts
- Chapter 7. novena: building my own laptop
- Not a Laptop for the Faint of Heart
- Designing the Early Novena
- Under the Hood
- The Enclosure
- The Heirloom Laptop's Custom Wood Composite
- Growing Novenas
- The Mechanical Engineering Details
- Changes to the Finished Product
- Case Construction and Injection-Molding Problems
- Changes to the Front Bezel
- DIY Speakers
- The PVT2 Mainboard.
- A Breakout Board for Beginners
- The Desktop Novena's Power Pass-Through Board
- Custom Battery Pack Problems
- Choosing a Hard Drive
- Finalizing Firmware
- Building a Community
- Closing Thoughts
- Chapter 8. chibitronics: creating circuit stickers
- Crafting with Circuits
- Developing a New Process
- Visiting the Factory
- Performing a Process Capability Test
- Delivering on a Promise
- Why On-Time Delivery Is Important
- Lessons Learned
- Not All Simple Requests Are Simple for Everyone
- Never Skip a Check Plot
- If a Component Can Be Placed Incorrectly, It Will Be
- Some Concepts Don't Translate into Chinese Well
- Eliminate Single Points of Failure
- Some Last-Minute Changes Are Worth It
- Chinese New Year Impacts the Supply Chain
- Shipping Is Expensive and Difficult
- You're Not Out of the Woods Until You Ship
- Closing Thoughts
- part 4: a hacker's perspective
- Chapter 9. hardware hacking
- Hacking the PIC18F1320
- Decapping the IC
- Taking a Closer Look
- Erasing the Flash Memory
- Erasing the Security Bits
- Protecting the Other Data
- Hacking SD Cards
- How SD Cards Work
- Reverse Engineering the Card's Microcontroller
- Potential Security Issues
- A Resource for Hobbyists
- Hacking HDCP-Secured Links to Allow Custom Overlays
- Background and Context
- How NeTV Worked
- Hacking a Shanzhai Phone
- The System Architecture
- Reverse Engineering the Boot Structure
- Building a Beachhead
- Attaching a Debugger
- Booting an OS
- Building a New Toolchain
- Fernvale Results
- Closing Thoughts
- Chapter 10. biology and bioinformatics
- Comparing H1N1 to a Computer Virus
- DNA and RNA as Bits
- Organisms Have Unique Access Ports
- Hacking Swine Flu
- Adaptable Influenza
- A Silver Lining
- Reverse Engineering Superbugs
- The O104:H4 DNA Sequence
- Reversing Tools for Biology.
- Answering Biological Questions with UNIX Shell Scripts
- More Questions Than Answers
- Mythbusting Personalized Genomics
- Myth: Having Your Genome Read Is Like Hex-Dumping the ROM of Your Computer
- Myth: We Know Which Mutations Predict Disease
- Myth: The Reference Genome Is an Accurate Reference
- Patching a Genome
- CRISPRs in Bacteria
- Determining Where to Cut a Gene
- Implications for Engineering Humans
- Hacking Evolution with Gene Drive
- Closing Thoughts
- Chapter 11. selected interviews
- Andrew "bunnie" Huang: Hardware Hacker (CSDN)
- About Open Hardware and the Maker Movement
- About Hardware Hackers
- The Blueprint Talks to Andrew Huang
- epilogue
- index
- Footnotes
- Chapter 1. made in china
- Chapter 2. inside three very different factories
- Part 2: thinking differently: intellectual property in china
- Chapter 4. gongkai innovation
- Chapter 5. fake goods
- Chapter 6. the story of chumby
- Chapter 7. novena: building my own laptop
- Chapter 9. hardware hacking
- Chapter 10. biology and bioinformatics
- Chapter 11. selected interviews.