1979 Cj5 With Hydraulics In The Rear\\ on 2040-cars
Ellsworth, Wisconsin, United States
CJ-5 1979
No title - maybe a replacement No ignition key- 1 could be made 3-spd 258ci 2bl GW- 3750 I picked this little gem up the way you see it. It has been parked since 2006, The motor did run well the last time it was ran. The owner passed away and it just sat there. I am looking for a good home for it, somebody who would like to maybe restore it. In the rear part a hydraulic system was built in it. There are some rust holes in the floor boards. |
Jeep CJ for Sale
- 1982 jeep cj7 collector jamboree edition 30th anniversary cj-7 w/ ac & hardtop(US $15,500.00)
- 1978 jeep cj-5
- Jeep cj-7 renegade levi edition original / un-restored v8 rare amc(US $20,000.00)
- Jeep cj7 6 cylider 5 speed(US $12,000.00)
- 1977 jeep cj5 base sport utility 2-door 5.0l(US $29,976.00)
- 1983 jeep scrambler
Auto Services in Wisconsin
Todd`s Automtv ★★★★★
Sturtevant Auto ★★★★★
Stephan`s Auto Repair ★★★★★
State Auto Sales ★★★★★
Scott`s Towing & Recovery ★★★★★
Schmelz Countryside Volkswagen/Saab Car Sales ★★★★★
Auto blog
Are future vehicular hacks inevitable?
Wed, Jul 29 2015Before the hack of the Uconnect system in a Jeep Cherokee resulted in a 1.4-million vehicle recall, the potential software vulnerabilities in vehicles were already a hot topic with Congressional inquiries and even proposed legislation in the US. As cars' interconnected systems gain the ability to go online, they become open to a host of new threats. Automakers are trying to stop this, but it might be too late to put the genie back into the bottle. Throughout 2015, the issue of software security in vehicles has become increasingly vital. For example, the recent Jeep case wasn't even the biggest hack this year. In February, a major flaw was discovered in the BMW Connected Drive service that allowed researchers to remotely lock and unlock the doors and potentially affected 2.2 million cars. The fix was an over-the-air patch for the problem. Automakers are actively working to fix the issues. Mercedes-Benz, BMW, and Audi reportedly are using encrypted connections and firewalls in their vehicles to prevent hacking. "Absolute, 100-percent safety isn't possible," Daimler spokesperson Benjamin Oberkersch said to Automotive News Europe. "But we develop our systems, tested by internal and external experts, so they're up to date." These vulnerabilities seem to be popping up more often. A successful hack took $14 in parts from Radio Shack in one case. There was also a 60 Minutes report earlier in the year about DARPA's ability to hack into OnStar to take control of a Chevrolet Impala. Experts aren't so sure companies can contend with hackers' advancement. "The difficulty for the carmakers at the moment is the question whether they can keep pace with advances in technology, and especially hacking technology," Rainer Scholz, executive director for telematics consultant EY, said to Automotive News Europe. "We seriously doubt they can." At this point, vehicle hacks are coming more from researchers looking for holes than from those with malicious intent. Still, the vulnerabilities are definitely there. It's up to automakers to keep patching the problems before they become dangerous to drivers. Related Video: News Source: Automotive News Europe - sub. req.Image Credit: Bill O'Leary / The Washington Post via Getty Images Audi BMW Jeep Mercedes-Benz Safety Technology Emerging Technologies hacking cyber security
25,000 Jeep Grand Cherokee, Dodge Durango SUVs recalled over brake feel
Mon, 10 Mar 2014Chrysler has announced that it is recalling over 25,000 Jeep Grand Cherokee and Dodge Durango SUVs from several markets over concerns about brake feel under hard braking. The affected models are from the 2012 and 2013 model years, although the actual dates of production aren't available. 18,700 are in the US, while 825 are in Canada, 530 are in Mexico and a further 5,200 outside of North America.
According to a statement, Chrysler was informed of the issue by a component supplier for the Ready Alert Braking system, which primes the brakes in anticipation of an emergency stop. A component in the system was restricting the flow of brake fluid too much.
As Chrysler is quick to point out, the way the brakes functioned was in compliance with regulations and there are no reported cases of drivers losing braking power. Instead, the issue rests with what Chrysler calls a pedal feel that "was not consistent with customer expectations." So it would seem Chrysler is being proactive and fixing a problem not because there's a legal issue at work, but simply because it doesn't feel the way the manufacturer wants it to. Well done.
FCA issuing software update for 1.4M vehicles to prevent hacking
Fri, Jul 24 2015In the wake of a Jeep Cherokee being hacked remotely while on the road through its Uconnect infotainment system, FCA US is now issuing a software update for 1.4 million vehicles in the United States. Affected customers will receive a USB stick in the mail with the improved version; owners can check this website to see if their cars are affected. A large variety of models with FCA's 8.4-inch touchscreen infotainment system are affected. They include the 2015 Chrysler 200, 2015 Chrysler 300, 2015 Dodge Charger, and 2015 Dodge Challenger; 2013-2015 Dodge Viper; 2013-2015 Ram 1500, 2500, and 3500; 2013-2015 Ram 3500, 4500, and 5500 chassis cab; 2014-2015 Jeep Grand Cherokee and Cherokee; and 2014-2015 Dodge Durango. According to FCA in its announcement, the new software "insulates connected vehicles from remote manipulation." As of July 23, the company also "fully tested and implemented within the cellular network" additional security to prevent access to many of a vehicle's systems. FCA US says that it's conducting this campaign out of an abundance of caution and disputes the notion that there's a defect with these vehicles. Beyond the demonstration of the hack in the Cherokee, the automaker says that it's unaware of any other reports of these attacks actually happening. Related Video: Statement: Software Update July 24, 2015 , Auburn Hills, Mich. - FCA US LLC is conducting a voluntary safety recall to update software in approximately 1,400,000 U.S. vehicles equipped with certain radios. The recall aligns with an ongoing software distribution that insulates connected vehicles from remote manipulation, which, if unauthorized, constitutes criminal action. Further, FCA US has applied network-level security measures to prevent the type of remote manipulation demonstrated in a recent media report. These measures – which required no customer or dealer actions – block remote access to certain vehicle systems and were fully tested and implemented within the cellular network on July 23, 2015. The Company is unaware of any injuries related to software exploitation, nor is it aware of any related complaints, warranty claims or accidents – independent of the media demonstration.