Raspberry Pi | Wiring | Pins | From https://projects.drogon.net/raspberry-pi/wiringpi/pins/

Just for my reference https://projects.drogon.net/raspberry-pi/wiringpi/pins/

The following tables give the mapping of the Raspberry Pi GPIO Pins to the GPIO connector in relation to the pin numbers and the physical location on the connector. This is a representation of the GPIO connector as viewed looking at the board from above, with the USB power at the top and the GPIO to the top-right of the board.

If using the connector pin numbering, then note that Pin 1 on the connector is the 3.3v supply. Pin 2 is the 5V supply, and pin 26 is marked SPI CE1 below.

P1: The Main GPIO connector:

wiringPiPin BCMGPIO Name Header Name BCMGPIO wiringPiPin
3.3v 1 | 2 5v
8 R1:0/R2:2 SDA0 3 | 4 5v
9 R1:1/R2:3 SCL0 5 | 6 0v
7 4 GPIO7 7 | 8 TxD 14 15
0v 9 | 10 RxD 15 16
0 17 GPIO0 11 | 12 GPIO1 18 1
2 R1:21/R2:27 GPIO2 13 | 14 0v
3 22 GPIO3 15 | 16 GPIO4 23 4
3.3v 17 | 18 GPIO5 24 5
12 10 MOSI 19 | 20 0v
13 9 MISO 21 | 22 GPIO6 25 6
14 11 SCLK 23 | 24 CE0 8 10
0v 25 | 26 CE1 7 11
wiringPiPin BCMGPIO Name Header Name BCMGPIO wiringPiPin
  • Board Revisions: Please note the differences between board revisions 1 and 2 (R1 and R2 above)

P5: The auxilliary GPIO connector present on Rev. 2 boards only:

wiringPi Pin BCM GPIO Name Header Name BCM GPIO wiringPi Pin
5v 1 | 2 3.3v
17 28 GPIO8 3 | 4 GPIO9 29 18
19 30 GPIO10 5 | 6 GPIO11 31 20
0v 7 | 8 0v
wiringPiPin BCMGPIO Name Header Name BCMGPIO wiringPiPin

NASA’s Next Frontier: Growing Plants On The Moon

A small team at NASA’s Ames Research Center has set out to “boldly grow where no man has grown before” – and they’re doing it with the help of thousands of children, a robot, and a few specially customized GoPro cameras.

In 2015, NASA will attempt to make history by growing plants on the Moon.  If they are successful, it will be the first time humans have ever brought life to another planetary body.  Along the way, they will make groundbreaking contributions to our understanding of biology, agriculture, and life on other worlds.  And though they may fail, the way they are going about their mission presents a fascinating case study of an innovative model for public-private collaboration that may very well change space entrepreneurship.

via NASA’s Next Frontier: Growing Plants On The Moon.

Qatar whips covers off giant footballing vagina • The Register

Qatar has unexpectedly delighted international pundits by unveiling the design for its 2022 World Cup Al Wakrah stadium, whose roof is designed to represent “the sails of the Arabian pearl fishing boat the Dhow”, but actually bearing more than a passing resemblance to a woman’s nether regions.

Al wakrah stadium – such beauty

Zaha Hadid Architects and international “provider of professional technical and management support services” AECOM whipped the covers off the stadium a few days back, and the eyebrow-raising kicked off almost immediately.

Callie Beusman, down at Jezebel, declared: “Any discerning human will be quick to recognize that the building looks exactly like an enormous vagina.”

via Qatar whips covers off giant footballing vagina • The Register.

Android 4.4 arrives with new security features – but do they really matter? – Securelist

Last week, Google has released the 4.4 (KitKat) version of their omni-popular Android OS. Between the improvements, some have noticed several security-related changes. So, how much more secure is Android 4.4?

When talking about Android 4.4 (KitKat) major security improvements, they can be divided into 2 categories:

1. Digital certificates

Android 4.4 will warn the user if a Certificate Authority (CA) is added to the device, making it easy to identify Man-in-the-Middle attacks inside local networks. At the same time, Google Certificate Pinning will make it harder for sophisticated attackers to intercept network traffic to and from Google services, by making sure only whitelisted SSL certificates can connect to certain Google domains.

2. OS hardening

SELinux is now running in enforcing mode, instead of permissive mode. This helps enforce permissions and thwart privilege escalation attacks, such as exploits that want to gain root access. Android 4.4 comes compiled with FORTIFY_SOURCE set at level 2, making buffer overflow exploits harder to implement.

via Android 4.4 arrives with new security features – but do they really matter? – Securelist.

Serious Security: How to store your users’ passwords safely | Naked Security

The last word

In summary, here is our minimum recommendation for safe storage of your users’ passwords:

Use a strong random number generator to create a salt of 16 bytes or longer.

Feed the salt and the password into the PBKDF2 algorithm.

Use HMAC-SHA-256 as the core hash inside PBKDF2.

Perform 10,000 iterations or more. (November 2013.)

Take 32 bytes (256 bits) of output from PBKDF2 as the final password hash.

Store the iteration count, the salt and the final hash in your password database.

Increase your iteration count regularly to keep up with faster cracking tools.

Whatever you do, don’t try to knit your own password storage algorithm.

It didn’t end well for Adobe, and it is unlikely to end well for you.

via Serious Security: How to store your users’ passwords safely | Naked Security.

LG Smart TVs phone home with viewing habits and USB file names | Naked Security

security hole in Samsung TVs which could have allowed hackers to get in to your television, watch you, change channels and plant malware.

Now, a UK blogger, known only as ‘DoctorBeet’, has apparently discovered that his LG Smart TV has actually been sending data about his family’s viewing habits back to the South Korean manufacturer.

After some investigation he found that his Smart TV would send data back to LG, even after he disabled an option in the system settings menu called “Collection of watching info.”

He said that his LG set, model number LG 42LN575V, connects to a non-functional URL with details of the times and channels being watched.

Worse still, he also discovered that the filenames of some media on a USB device connected to the TV were also transmitted, saying that:

My wife was shocked to see our children’s names being transmitted in the name of a Christmas video file that we had watched from USB.

This discovery prompted DoctorBeet to create a mock video file which he transferred to a USB stick. He deliberately chose a filename – Midget_Porn_2013.avi – that couldn’t possibly be confused with the TV set’s firmware. After connecting the USB drive to his TV he later found that the filename had been transmitted in an unencrypted format to GB.smartshare,lgtvsdp.com.

Strangely, not all filenames belonging to media on USB devices were transmitted:

via LG Smart TVs phone home with viewing habits and USB file names | Naked Security.

Cryptolocker infects cop PC: Massachusetts plod fork out Bitcoin ransom • The Register

Cryptolocker is a rather unpleasant strain of malware, first spotted in August, that encrypts documents on the infiltrated Windows PC and will throw away the decryption key unless a ransom is paid before a time limit. The sophisticated software, which uses virtually unbreakable 256-bit AES and 2048-bit RSA encryption, even offers a payment plan for victims who have trouble forking out the two Bitcoins (right now $1,200) required to recover the obfuscated data.

via Cryptolocker infects cop PC: Massachusetts plod fork out Bitcoin ransom • The Register.