Saturday, June 6, 2009

TrendNet Wifi on Beagleboard running Angstrom Linux

By default after every boot-up, Angstrom runs wpa_supplicant daemon which tries to use WPA instead of WEP regardless of configuration in /etc/network/interfaces, hence prevent us to use WEP as wifi encryption. We need to kill this daemon by executing:

root@beagleboard:~# start-stop-daemon -K -n wpa_supplicant
root@beagleboard:~# ps -ef | /bin/grep wpa*

Then reconfigure the wlan:

iwconfig wlan0
iwconfig wlan0 key

Try to see if the USB Wifi adapter gets our AP's MAC address:

root@beagleboard:~# ps -ef | /bin/grep wpa*

Finally:

ifdown wlan0
ifup wlan0

It should get the IP (assuming our AP router is running DHCP service as well):

root@beagleboard:~# route
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
192.168.1.0 * 255.255.255.0 U 0 0 0 wlan0
192.168.0.0 * 255.255.255.0 U 0 0 0 usb0
default 192.168.1.1 0.0.0.0 UG 0 0 0 wlan0
default 192.168.0.200 0.0.0.0 UG 0 0 0 usb0
root@beagleboard:~#


(Note: the system used above was running Linux kernel 2.6.29:

root@beagleboard:~# uname -a
Linux beagleboard 2.6.29-omap1 #1 Wed Jun 3 18:10:47 PDT 2009 armv7l unknown

)

Monday, June 1, 2009

What is the best mobile Operating system?

Duh....smartphone environment is getting more crowded with more and more new operating systems. From Microsoft Windows Mobile, Blackberry O/S, Symbian, iPhone's OS, Google's Android and now Palm's WebOS.

Which one is the best from the following criterias?
  1. UI experiences (reponsiveness, easy to use, intuitiveness, beauty look)
  2. Features (view rotation, touch responses, supports to various wireless tech)
  3. Multi-tasking
  4. Development environment and toolkits (including rich sets of libraries)
  5. Portability
  6. Openness (open-system, open source, proprietary)
  7. Price
  8. Hardware supports
  9. Availability to developers to play (at least comes with a simulator)

Wednesday, May 13, 2009

Mathematical Advances Strengthen IT Security

European Science Foundation (05/11/09) Valleley, Sofia

A new cryptography approach based on the mathematical theory of elliptic curves is considered a leading candidate to replace the widely used RSA public key security system. Elliptic curves could enable more efficient cryptography and provide an optimum combination of security and processing efficiency.

The European Science Foundation (ESF) recently held a workshop to discuss the potential for elliptic curves and other modern techniques of mathematics in cryptography and information technology security.

"The impact of the elliptic curve method for integer factorization has played a role in introducing elliptic curves to cryptographers, albeit for attacking the underlying problem on which RSA is based (the difficulty of factoring integers)," says David Kohel, convenor of the ESF workshop, from the Institut de Mathematiques de Luminy in Marseille, France. Kohel says the advantage of elliptic curve cryptography is its immunity to the specialized attacks that have degraded the strength of RSA, meaning smaller keys can be used to provide the same levels of protection.

"In general, the cryptographer has the benefit over the cryptanalyst (the person attacking the cryptosystem) as he or she can select the key size for any desired level of security, provided everyone has the same base of knowledge of best attacks on the underlying cryptosystem," he says.

Saturday, May 9, 2009

Various Embedded Systems

Sony Clie NX80V PDA (running Palm OS)
The NX80V runs Palm OS 5.0 and has a 200 MHz XScale processor. It has 32 megs of RAM, 15.5 of which is available to the user.

AT&T HTC 8125 SmartPhone
Processor: 200 MHz TI OMAP850
Operating System: Windows Mobile 5.0
Memory: 64 MB RAM; 128 MB flash ROM (43 MB available)
In European version is Qtek 9100, AKA The HTC Wizard.
Linux port: http://linwizard.wiki.sourceforge.net/

Computer Architecture: A Quantitative Approach








































Powered by Ingram Digital