Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Praise for The Hardware Hacker Title Page Copyright Page Acknowledgments brief contents contents in detail preface part 1: adventures in manufacturing
Chapter 1. made in china
The Ultimate Electronic Component Flea Market The Next Technological Revolution Touring Factories with Chumby
Scale in Shenzhen Feeding the Factory Dedication to Quality Building Technology Without Using It Skilled Workers The Need for Craftspeople Automation for Electronics Assembly Precision, Injection Molding, and Patience The Challenge of Quality
Closing Thoughts
Chapter 2. inside three very different factories
Where Arduinos Are Born
Starting with a Sheet of Copper Applying the PCB Pattern to the Copper Etching the PCBs Applying Soldermask and Silkscreen Testing and Finishing the Boards
Where USB Memory Sticks Are Born
The Beginning of a USB Stick Hand-Placing Chips on a PCB Bonding the Chips to the PCB A Close Look at the USB Stick Boards
A Tale of Two Zippers
A Fully Automated Process A Semiautomated Process The Irony of Scarcity and Demand
Chapter 3. the factory floor
How to Make a Bill of Materials
A Simple BOM for a Bicycle Safety Light Approved Manufacturers Tolerance, Composition, and Voltage Specification Electronic Component Form Factor Extended Part Numbers The Bicycle Safety Light BOM Revisited Planning for and Coping with Change
Process Optimization: Design for Manufacturing
Why DFM? Tolerances to Consider Following DFM Helps Your Bottom Line The Product Behind Your Product Testing vs. Validation
Finding Balance in Industrial Design
The chumby One’s Trim and Finish The Arduino Uno’s Silkscreen Art My Design Process
Picking (and Maintaining) a Partner
Tips for Forming a Relationship with a Factory Tips on Quotations Miscellaneous Advice
Closing Thoughts
part 2: thinking differently: intellectual property in china
Chapter 4. gongkai innovation
I Broke My Phone’s Screen, and It Was Awesome Shanzhai as Entrepreneurs
Who Are the Shanzhai? More Than Copycats Community-Enforced IP Rules
The $12 Phone
Inside the $12 Phone Introducing Gongkai From Gongkai to Open Source Engineers Have Rights, Too
Closing Thoughts
Chapter 5. fake goods
Well-Executed Counterfeit Chips Counterfeit Chips in US Military Hardware
Types of Counterfeit Parts Fakes and US Military Designs Anticounterfeit Measures
Fake MicroSD Cards
Visible Differences Investigating the Cards Were the MicroSD Cards Authentic? Further Forensic Investigation Gathering Data Summarizing My Findings
Fake FPGAs
The White Screen Issue Incorrect ID Codes The Solution
Closing Thoughts
part 3: what open hardware means to me
Chapter 6. the story of chumby
A Hacker-Friendly Platform Evolving chumby
A More Hackable Device Hardware with No Secrets
The End of Chumby, New Adventures Why the Best Days of Open Hardware Are Yet to Come
Where We Came From: Open to Closed Where We Are: “Sit and Wait” vs. “Innovate” Where We’re Going: Heirloom Laptops An Opportunity for Open Hardware
Closing Thoughts
Chapter 7. novena: building my own laptop
Not a Laptop for the Faint of Heart Designing the Early Novena
Under the Hood The Enclosure
The Heirloom Laptop’s Custom Wood Composite
Growing Novenas The Mechanical Engineering Details
Changes to the Finished Product
Case Construction and Injection-Molding Problems Changes to the Front Bezel DIY Speakers The PVT2 Mainboard A Breakout Board for Beginners The Desktop Novena’s Power Pass-Through Board Custom Battery Pack Problems Choosing a Hard Drive Finalizing Firmware
Building a Community Closing Thoughts
Chapter 8. chibitronics: creating circuit stickers
Crafting with Circuits
Developing a New Process Visiting the Factory Performing a Process Capability Test
Delivering on a Promise Why On-Time Delivery Is Important Lessons Learned
Not All Simple Requests Are Simple for Everyone Never Skip a Check Plot If a Component Can Be Placed Incorrectly, It Will Be Some Concepts Don’t Translate into Chinese Well Eliminate Single Points of Failure Some Last-Minute Changes Are Worth It Chinese New Year Impacts the Supply Chain Shipping Is Expensive and Difficult You’re Not Out of the Woods Until You Ship
Closing Thoughts
part 4: a hacker’s perspective
Chapter 9. hardware hacking
Hacking the PIC18F1320
Decapping the IC Taking a Closer Look Erasing the Flash Memory Erasing the Security Bits Protecting the Other Data
Hacking SD Cards
How SD Cards Work Reverse Engineering the Card’s Microcontroller Potential Security Issues A Resource for Hobbyists
Hacking HDCP-Secured Links to Allow Custom Overlays
Background and Context How NeTV Worked
Hacking a Shanzhai Phone
The System Architecture Reverse Engineering the Boot Structure Building a Beachhead Attaching a Debugger Booting an OS Building a New Toolchain Fernvale Results
Closing Thoughts
Chapter 10. biology and bioinformatics
Comparing H1N1 to a Computer Virus
DNA and RNA as Bits Organisms Have Unique Access Ports Hacking Swine Flu Adaptable Influenza A Silver Lining
Reverse Engineering Superbugs
The O104:H4 DNA Sequence Reversing Tools for Biology Answering Biological Questions with UNIX Shell Scripts More Questions Than Answers
Mythbusting Personalized Genomics
Myth: Having Your Genome Read Is Like Hex-Dumping the ROM of Your Computer Myth: We Know Which Mutations Predict Disease Myth: The Reference Genome Is an Accurate Reference
Patching a Genome
CRISPRs in Bacteria Determining Where to Cut a Gene Implications for Engineering Humans Hacking Evolution with Gene Drive
Closing Thoughts
Chapter 11. selected interviews
Andrew “bunnie” Huang: Hardware Hacker (CSDN)
About Open Hardware and the Maker Movement About Hardware Hackers
The Blueprint Talks to Andrew Huang
epilogue index about the author The Electronic Frontier Foundation (EFF) Footnotes
Chapter 1. made in china Chapter 2. inside three very different factories Part 2: thinking differently: intellectual property in china Chapter 4. gongkai innovation Chapter 5. fake goods Chapter 6. the story of chumby Chapter 7. novena: building my own laptop Chapter 9. hardware hacking Chapter 10. biology and bioinformatics Chapter 11. selected interviews
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion