Dreamplug User Guide GTI-2010.12.10
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Dreamplug User Guide GTI-2010.12.10
Quick Start Guide – DreamPlug page 1 / 11 DreamPlug User Guide GTI-2010.12.10 Thank you for purchasing our DreamPlug – The Power to Innovate! This is running at 2.4GHz yet using less than 10W power consumption. This little palm-sized powerhouse can handle all your biggest tasks while still saving about 96% on energy costs when compared to the average 175 Watt desktop computer. You can customize your Plug to work in almost any industry - Cloud ComputingˈHome / Industrial Automation, Security/Surveillance, Medical Monitoring and Data Capture , High End Audio SystemsˈNetwork Storage and monitoring , VoIP and IPPBXˈSmart Grid /Mesh . You can never have enough storage, not to mention fast access to all that data. That's why we have provided Wi-Fi, Bluetooth, Gigabit Ethernet, USB 2.0 and eSATA connection options to the Server line of products. as the AUDIO INTERFACE, the dreamplug can play the music or others data from this port to the external speaker or others devices.in a word, Go ahead give us what you got, we can take it. Package contents DreamPlug Content List Remark 1 DreamPlug 1 unit 2 Detachable AC-DC Power Supply Unit 1 pc 3 Detachable DC-DC Power Cable 1 pc 4 Detachable AC Slider 1 pc 5 Detachable AC Power Cord Adaptor 1 pc 6 AC power Cord 1 pc 7 Protective Slide Cover for DreamPlug 1 pc 8 Protective Slide Cover for Power Supply Unit 1 pc 9 Ethernet Cable 1 pc 10 Warranty Card 1 pc 11 Quick Reference Guide 1 pc 12 External JTAG Debug Module No Optional item. -
Marvell ARMADA™ 16X Plug Computer Development
Cover Marvell® ARMADA™ 16x Plug Computer Development Kit User Manual Doc. No. MV-S400320-00, Rev. - December 2010 Marvell. Moving Forward Faster Marvell® ARMADA™ 16x Plug Computer Development Kit User Manual Document Conventions Note: Provides related information or information of special importance. Caution: Indicates potential damage to hardware or software, or loss of data. Warning: Indicates a risk of personal injury. Document Status Doc Status: Preliminary Technical Publication: x.xx For more information, visit our website at: www.marvell.com Disclaimer No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose, without the express written permission of Marvell. Marvell retains the right to make changes to this document at any time, without notice. Marvell makes no warranty of any kind, expressed or implied, with regard to any information contained in this document, including, but not limited to, the implied warranties of merchantability or fitness for any particular purpose. Further, Marvell does not warrant the accuracy or completeness of the information, text, graphics, or other items contained within this document. Marvell products are not designed for use in life-support equipment or applications that would cause a life-threatening situation if any such products failed. Do not use Marvell products in these types of equipment or applications. With respect to the products described herein, the user or recipient, in the absence of appropriate U.S. government authorization, agrees: 1) Not to re-export or release any such information consisting of technology, software or source code controlled for national security reasons by the U.S. -
Thefnf.Org 2 Contents
From Blog to Book. thefnf.org 2 Contents 1 2011 9 1.1 May ................................................ 9 Sample Page (2011-05-31 18:16) .................................. 9 Whoops! 404 Error! (2011-05-31 23:52) ............................. 9 1.2 June................................................ 10 Statement on Hardware (2011-06-01 02:36) ........................... 10 Statement on Society (2011-06-01 02:37) ............................. 10 Resources (2011-06-01 17:58) ................................... 11 Donate (2011-06-01 17:59) ..................................... 12 Our Values (2011-06-01 19:51) .................................. 13 Home (2011-06-05 16:09) ..................................... 13 Statement on Software (2011-06-07 04:25) ............................ 14 Contact (2011-06-07 22:27) .................................... 14 Weblog (2011-06-08 04:24) ..................................... 15 Here We Go (2011-06-09 00:48) .................................. 15 Progress Report for June 10th (2011-06-10 22:51) ........................ 16 Progress Report for June 12th (2011-06-12 19:41) ........................ 17 ARIN Says Yes (2011-06-14 05:52) ................................ 17 Up Next (2011-06-15 03:16) .................................... 18 Tomorrow (2011-06-16 06:19) ................................... 18 Deep in the Heart of Texas (2011-06-17 22:04) ......................... 19 Roadmap (2011-06-18 00:12) ................................... 20 Technical Progress Report (2011-06-20 17:56) ......................... -
Pen Testing with Pwn Plug
toolsmith ISSA Journal | March 2012 Pen Testing with Pwn Plug By Russ McRee – ISSA Senior Member, Puget Sound (Seattle), USA Chapter Prerequisites one who owns a Sheevaplug: “Pwn Plug Community Edition does not include the web-based Plug UI, 3G/GSM support, Sheevaplug1 NAC/802.1x bypass.” 4GB SD card (needed for installation) For those of you interested in a review of the remaining fea- tures exclusive to commercial versions, I’ll post it to my blog Dedicated to the memory of Tareq Saade 1983-2012: on the heels of this column’s publishing. Dave provided me with a few insights including the Pwn This flesh and bone Plug’s most common use cases: Is just the way that we are tied in But there’s no one home • Remote, low-cost pen testing: penetration test cus- I grieve for you –Peter Gabriel tomers save on travel expenses; service providers save on travel time. • Penetration tests with a focus on physical security and s you likely know by now given toolsmith’s position social engineering. at the back of the ISSA Journal, March’s theme is • Data leakage/exfiltration testing: using a variety of co- A Advanced Threat Concepts and Cyberwarfare. Well, vert channels, the Pwn Plug is able to tunnel through dear reader, for your pwntastic reading pleasure I have just many IDS/IPS solutions and application-aware fire- the topic for you. The Pwn Plug can be considered an ad- walls undetected. vanced threat and useful in tactics that certainly resemble Information security training: the Pwn Plug touches cyberwarfare methodology. -
Plugcomputer
Fakultat¨ Informatik Institut f ¨urTechnische Informatik, Professur f ¨urVLSI-Entwurfssysteme, Diagnostik und Architektur PLUGCOMPUTER Alte Idee, Neuer Ansatz Thomas Gartner¨ Dresden, 14.7.2010 Ubersicht¨ Motivation Alte Idee: NSLU2 Neuer Ansatz: PlugComputer Quellen TU Dresden, 14.7.2010 PlugComputer Folie 2 von 24 Motivation Problemstellung Wie kann ich meine personlichen¨ Daten und Dateien moglichst¨ effizient, f ¨urmich und ausgewahlte¨ Personen, ¨uberallund immer verf ¨ugbarmachen? • Soziale Netzwerke • Hostingdienste wie z.B. Flickr, Google Suite, YouTube . • Server anmieten Probleme: • Daten ¨ubergabean Dritte • Dienste wegen ihrer Große¨ f ¨urAngreifer attraktiv TU Dresden, 14.7.2010 PlugComputer Folie 3 von 24 Motivation Losungsansatz¨ Idee: Eigener Server im eigenen, sicheren Netz das inzwischen meistens ohnehin standig¨ mit dem Internet verbunden ist. Vorteile: • Beschrankter¨ physikalischer Zugang f ¨urDritte • Voll anpassbar Nachteile: • Konfigurationsaufwand • Energieverbrauch • Larm¨ • Verantwortung f ¨urdie eigenen Daten TU Dresden, 14.7.2010 PlugComputer Folie 4 von 24 Motivation Losungsansatz¨ TU Dresden, 14.7.2010 PlugComputer Folie 5 von 24 Alte Idee: NSLU2 Allgemein Mit dem Network Storage Link von Linksys konnen¨ Sie die Speicherkapazitat¨ Ihres Netzwerks schnell und einfach um viele Gigabyte erweitern. Dieses kleine Netzwerkgerat¨ verbindet USB2.0-Festplatten direkt mit Ihrem Ethernet- Netzwerk. [Lina] TU Dresden, 14.7.2010 PlugComputer Folie 6 von 24 Alte Idee: NSLU2 Außen • 130 mm x 21 mm x 91 mm • 1x 10/100-RJ-45-Ethernet-Port • 2x USB 2.0-Port • 1x Stromanschluss TU Dresden, 14.7.2010 PlugComputer Folie 7 von 24 Alte Idee: NSLU2 Innen • Intel IXP420 (ARMv5TE) • 133 MHz, spater¨ 266 MHz • 8 MB Flash • 32 MB SDRAM TU Dresden, 14.7.2010 PlugComputer Folie 8 von 24 Alte Idee: NSLU2 Modifikationen • NSLU2 Firmware basiert auf Linux! • Ersetzbar durch Debian, OpenWrt, SlugOS . -
Decentralized Architectures
PERSONAL DATA JOURNAL Issue Nº3 April, 2012 Personal Data in Decentralized Network Architectures by Markus Sabadello, Technical Editor One of the most fundamental challenges for the PDE to consider will be the design and deployment of suitable underlying architectures for realizing emerging visions around the management and use of personal data. The basic organizational structures, according to which participants of an ecosystem exchange information with each other, influence many of its fundamental properties, such as privacy, security, flexibility, discovery, or the dependencies between different actors. The possible types of architectural Centralized Architectures patterns that can be implemented are highly diverse, with Centralized architectures are based on the idea that all centralized structures on one end of the spectrum, and fully communication passes through a single point in the system, distributed systems on the other end. On the Internet, very which is responsible for managing the flow of information different forms have always existed, depending on the between participants, for coordinating their behavior, and for infrastructural layer and the concrete applications and services one looks at. Contents Such organizational structures can be described and Feature Article: Personal Data in Decentralized Network analyzed using terminology and methods from the Architechures , Page 1 mathematical field of graph theory. They are really trans- disciplinary concepts, which have been applied to many Industry News: Page 3 practical situations and academic theories both in the natural Events: Page 6-7 and social sciences. One often-cited book in this context is Standards: Page 8-9 “Neither Market nor Hierarchy: Network Forms of Organization” by Walter W. -
Freedom: out of the Box! an Update on Activites at the Freedombox Foundation Bdale Garbee
Freedom: Out of the Box! An Update on Activites at the FreedomBox Foundation Bdale Garbee What's the Problem? ● We willingly hand personal data to companies to manage on our behalf, with little real thought given to consequences. … our lives are under increasing scrutiny ● For-profit companies, no matter how noble the intentions stated in their terms of service, must operate within the rules of jurisdictions in which they operate... Freedombox Vision ● A FreedomBox is a personal server running a free software operating system and applications designed to create and preserve personal privacy. ● Running on cheap, power-efficient plug computer servers that individuals can install in their own homes. ● Contribute to building privacy-respecting federated alternatives to contemporary social networks ● Mesh networking to augment or replace existing infrastructure. ● Facilitate collaborating safely and securely with others in building social networks supporting demonstration, protest, and mobilization for political change. The Foundation FreedomBox Foundation ● Founded by Eben Moglen ● Board of Directors ● Eben Moglen ● Bdale Garbee ● Yochai Benkler ● Executive Director - James Vasile ● Technical Advisory Committee ● Working Groups 5 Work of the Foundation ● Technology ● User Experience ● Publicity and Fund-Raising ● Industry Relations 6 Technical Advisory Committee ● Bdale Garbee, chair ● Jacob Applebaum ● Sam Hartman ● Sascha Meinrath ● Rob Savoye ● Matt Zimmerman 7 Working Groups ● Teams that will design elements of our FreedomBox reference -
Rationale and Design for the Peace Box an Electronic Device for Your Home Or Office
Rationale and Design for the Peace Box An Electronic Device for your Home or Office A thesis submitted by Markus Sabadello, Austria, [email protected] to the European Peace University (EPU) – Private University Stadtschlaining/Burg, Austria in partial fulfillment of the requirements for a Master of Arts Degree in Peace and Conflict Studies 1/23/2012 This thesis offers a summary of different lines of thought on how Information and Communication Technologies (ICTs) can be used for promoting the ideal of peace, for example by helping to manage a crisis, by supporting development and education, by overcoming authoritaran regimes, or by promoting a global civil society and global culture of peace. After introducing these ideas, the concept of a „Peace Box“ is presented, which is a small computer-like device that can be set up in any home or office to provide applications and services for actively supporting the various visions of using ICTs for peace. Contents 1. Introduction .............................................................................................................................................. 1 1.1. ICTs for Peace .................................................................................................................................. 2 1.2. ICTs against Peace ......................................................................................................................... 4 2. Technological Considerations ........................................................................................................... -
St. George's Robotics Team Autonomous Underwater Vehicle
St. George’s Robotics Team Autonomous Underwater Vehicle Spencer Chan Calvin Cheng Stanley Cho Evan Johnson Spencer Louie Ezaan Mangalji Giulio Rossi Marcus Tan Kevin Tian Raymond Wang Carl Xi Leon Zhou AUVSI Foundation and ONR’s 16th International RoboSub Competition SSC Pacific TRANSDEC, San Diego, CA July 22–28, 2013 Abstract Following a successful showing at the 2009 AUVSI RoboSub Competition, the St. George’s Robotics Team has built a new autonomous underwater vehicle from scratch, which it is proud to enter into 2013 competition. The design of the robot is built around the general architecture of a dirigible airship; the main computer and batteries are located in a long cylindrical tube, with the “gondola” section of the robot housing the thrusters and propulsion system. The sensors attached to the system include an accelerometer, a gyroscope, a compass, a pressure (depth) sensor, and a Hall effect sensor, which will work in coordination with a Dreamplug computer to control the movement and direction of the AUV. Needless to say, the robot this year is merely a skeleton of what the team hopes to accom- plish in the upcoming years; the plan for competition this year will be more of a learning experience to see what can be improved upon in the future, in terms of both hardware and software. This is also the first time competing in the RoboSub competition for all of the team members; regardless, despite the lack of experience, the team hopes to remain competitive in the field with this autonomous underwater vehicle, which has taken the team three years to meticulously build and put together. -
Taller De Firmware
Robótica embebida Embedded Single Board Computers Facultad de Ingeniería Instituto de Computación Contenido • Single Board Computers – Orígenes – Evolución – Algunos ejemplos Embedded Single Board Computers Single-board computers (SBCs) son computadoras completas fabricadas en una única placa de circuito. El diseño es centrado en un microprocesador con RAM, almacenamiento, E/S y otras características necesarias para ser una computadora funcional en una sola placa. Un poco de historia • Las primeras micro computadoras consistían de media docena (o más) placas de circuitos conectadas a un backplane. • Estas placas implementaban el CPU, memoria, controladores de disco y puertos paralelos/seriales Un poco de historia • Estas computadoras se utilizaban entre otras cosas, para adquisición de datos, control de procesos industriales. • Eran muy grandes para utilizarlas embebidas en dispositivos. Un poco de historia • A comienzo de la década del 80 la tecnología de circuitos integrados había llegado a un nivel de integración que permitía integrar funciones que ocupaban toda una placa en un solo chip (large scale integration chips). Un poco de historia • Permitió implementar computadoras completas en una sola placa, sin necesidad de utilizar backplanes. • Las primeras computadoras personales fueron implementadas de esta forma. • La Apple I de Steve Wozniak es un ejemplo. • Hoy día se siguen utilizando backplanes para implementar ciertos sistemas. Apple I Ferguson Big Board Ferguson Big Board • Diseño del 1980. • Basada en el microprocesador Z80, 64KB RAM. • Utilizaba el sistema operativo comercial CP/M. • Segunda versión "Little Board" (Ampro, 1983) • Dado su bajo costo, confiabilidad, simplicidad, y tamaño fue práctica para utilizarla embebida directamente en dispositivos que no eran computadoras. -
SMART SANTANDER Information on 1St Open Call for Experiments
SMART SANTANDER Information on 1st Open Call for Experiments Dr. Alex Gluhak, University of Surrey Dr. Luis Sanchez, University of Cantabria Open call information day th Copyright © SmartSantander Project FP7-ICT-2009-5 257992. All Rights reserved. Brussels, 14 of September 2011 Outline • First call overview (AG) – Call procedure and guidelines for proposals – Detailed technical call objectives – Expected impact of proposals • SmartSantander infrastructure (AG, LS) – Testbed architecture – Deployment description at the 4 testbed sites • Experimentation on top of SmartSantander (AG,LS) – Available experimentation tools – Example experiments • Q&A Copyright © SmartSantander Project FP7-ICT-2009-5 257992. All Rights reserved. Overview of First Call for Experiments Copyright © SmartSantander Project FP7-ICT-2009-5 257992. All Rights reserved. Open call information • Web: http://www.smartsantander.eu/index.php/open-calls • Contact e-mail: [email protected] Copyright © SmartSantander Project FP7-ICT-2009-5 257992. All Rights reserved. Key documents • Detailed open call text – Provides an overview of the technical call objectives and expected impact – Overview of the facility • Guide for applicants – Template adapted from EC how to prepare a proposal – Follows FP7 regulations • Regulations for the use of the facility – 7 articles outlining expectations and guidelines for experimentation Copyright © SmartSantander Project FP7-ICT-2009-5 257992. All Rights reserved. Key call facts Call identifier SmartSantander-1-Open-Call Call opening 1st October 2011 Call closing 16. November 2011, 17.00 Brussels time (last received version prior deadline counts) Experimentation Jan – December 2012 Timeframe (length may vary based on nature of experiment – typical 9 month) Max funding per 200k Euros experiment Maximum funding for call Up to 600k Euros Number of expected 3+ experiments Number of partners per 1-2 partners experiment Proposal language English Copyright © SmartSantander Project FP7-ICT-2009-5 257992. -
Sổ Tay Cài Đặt Debian GNU/Linux
Sổ tay Cài đặt Debian GNU/Linux July 31, 2021 Sổ tay Cài đặt Debian GNU/Linux Bản quyền © 2004 – 2021 nhóm trình cài đặt Debian Sổ tay này là phần mềm tự do; bạn có thể phát hành lại nó và/hay sửa đổi nó với điều kiện của Giấy Phép Công Cộng GNU (GPL). Xem giấy phép trong Phụ lục F. Build version of this manual: 20210730. i Contents 1 Chào mừng bạn dùng Debian 1 1.1 Debian là gì vậy? . 1 1.2 GNU/Linux là gì vậy? . 1 1.3 Debian GNU/Linux là gì vậy? . 2 1.4 What is the Debian Installer? . 3 1.5 Lấy Debian . 3 1.6 Lấy phiên bản mới nhất của tài liệu này . 3 1.7 Cấu trúc của tài liệu này . 3 1.8 Về tác quyền và giấy phép phần mềm . 4 2 Hệ thống Yêu cầu 5 2.1 Phần cứng được hỗ trợ . 5 2.1.1 Kiến trúc được hỗ trợ . 5 2.1.2 Three different ARM ports . 6 2.1.3 Variations in ARM CPU designs and support complexity . 6 2.1.4 Platforms supported by Debian/armel . 6 2.1.5 Platforms and devices no longer supported by Debian/armel . 6 2.1.6 Graphics Hardware Support . 7 2.1.7 Phần cứng khả năng kết nối mạng . 7 2.1.8 Ngoại vi và phần cứng khác . 7 2.2 Thiết bị cần thiết phần vững . 7 2.3 Mua phần cứng đặc biệt cho GNU/Linux . 7 2.3.1 Tránh phần mềm sở hữu hay bị đóng .