Vista Normal

Hay nuevos artículos disponibles. Pincha para refrescar la página.
AnteayerIT And Programming

Activated Alumina for Desiccating Your Filament

27 Junio 2024 at 23:00
A man in a red plaid shirt draped over an olive t-shirt holds sandpaper in one hand an an aluminum tube filled with white beads in the other over a wooden table.

When you first unwrap a shiny new roll of filament for your FDM printer, it typically has a bag of silica gel inside. While great for keeping costs low on the manufacturing side, is silica gel the best solution to keep your filament dry at home?

Frustrated with the consumable nature and fussy handling of silica gel beads, [Build It Make It] sought a more permanent way to keep his filament dry. Already familiar with activated alumina beads, he crafted a desiccant cylinder that can be popped into the oven all at once instead of all that tedious mucking about with emptying and refilling plastic capsules.

A length of aluminum intake pipe, some high temperature epoxy, and aluminum mesh are all combined to make a simple, sealed cylinder. During the process, he found that using a syringe filled with the epoxy led to a much more precise application to the aluminum cylinder, so he recommends starting out that way if you make these for yourself.

We suspect something with a less permanent attachment at one end would let you periodically swap out the beads if you wanted to try this hack with the silica beads you already had. Perhaps some kind of threaded pipe fitting? If you want a more active dryer, try making one with a Peltier. If you want to know just how dry your filament is getting, you could also put in a sensor. You might also wonder, do you really need to dry filament at all?

Portable, Full-Size Arcade Cabinets

27 Junio 2024 at 20:00

Believe it or not, there was a time when the only way for many of us to play video games was to grab a roll of quarters and head to the mall. Even though there’s a working computer or video game console in essentially every house now doesn’t mean we don’t look back with a certain nostalgia on those times, though. Some have turned to restoring vintage arcade cabinets and others build their own. This hackerspace got a unique request for a full-sized arcade cabinet that was also easily portable as well.

The original request was for a portable arcade cabinet, and the original designs were for a laptop-like tabletop arcade. But further back-and-forth made it clear they wanted full-size cabinets that just happened to also be portable. So with that criteria in mind the group started building the units. The updated design is modular, allowing the controls, monitor, and Raspberry Pi running the machines to be in self-contained units, with the cabinets in two parts that can quickly be assembled on-site. The base is separate and optional, with the top section capable of being assembled on the base or on something like a tabletop or bar, and the electronics section quickly drops in.

While the idea of a Pi-powered arcade cabinet is certainly nothing new, the quick build, prototyping, design, and final product that’s mobile and quickly assembled are all worth checking out. There is even more information on the build at the project’s GitHub page including Fusion 360 models. If you need your cabinets to be even more portable, this tabletop MAME cabinet is a great place to start.

Enjoy Totality Every Day With This Personal Eclipse Generator

27 Junio 2024 at 08:00

There have been a couple of high-profile solar eclipses lately, but like us, you probably missed the news of the one that passed over Munich in 2019. And every day since then, in fact, unless you were sitting in a particular spot: the couch of one [Bernd Kraus], who has his very own personal eclipse generator.

We’ll attempt to explain. Living in an apartment with a gorgeous western view of Munich is not without its cons, chief among which is the unobstructed exposure to the setting sun. Where most people would opt for a window treatment of some sort to mitigate this, [Bernd] felt that blotting out the entire view was a heavy-handed solution to the problem. His solution is a window-mounted X-Y gantry that dangles a cutout of the moon in just the right place to blot out the sun. An Arduino uses the time and date to calculate the position of the sun as it traverses the expansive window and moves the stepper motors to keep the moon casting its shadow in just the right place: on his face as he sits in his favorite spot on the couch.

There are a couple of time-lapse sequences in the video below, as well as a few shots of the hardware. We know this isn’t an actual coronagraph, but the effect is pretty cool, and does resemble an eclipse, at least in spirit. And it goes without saying that we applaud the unnecessary complexity embodied by this solution.

In Future, Printer Documents You

23 Junio 2024 at 02:00

[Jason Dookeran] reminded us of something we don’t like to think about. Your printer probably adds barely noticeable dots to everything you print. It does it on purpose, so that if you print something naughty, the good guys can figure out what printer it came from. This is the machine identification code and it has been around since the days that the US government feared that color copiers would allow wholesale counterfiting.

The technology dates back to Xerox and Canon devices from the mid-80s, but it was only publicly acknowledged in 2004. With color printers, the MIC — machine identification code — is a series of tiny yellow dots. Typically, each dock is about 10 microns across and spaced about a millimeter from each other. The pattern prints all over the page so that even a fragment of, say, a ransom note can be identified.

Apparently, printers use different encoding schemes, but reading the dots is usually done by scanning them under a blue light.

The EFF has an out-of-date list that identifies many printers that track. But they point out that some printers may use a different method, especially those that can’t print yellow. They also mention that it is likely that “all recent commercial color laser printers” print some kind of code.

If you want to check your printer, [Jason] points out an Instructable and a website that can decode common patterns.

While we can think of times we are glad people can figure out the origin of a death threat or a ransom note, we can also think of times when we would like whistleblowers or people with different opinions to be able to print things without fear of retribution. But either way, the technology is an interesting real-world example of steganography.

We prefer these yellow dots. Yellow steganography reminds us of turmeric.

Title image: “Yellow dots produced by an HP Color LaserJet CP1515n” CC BY-SA 3.0 by [Ianusisu].

An Enigma Machine Built in Meccano

15 Junio 2024 at 20:00

As far as model construction sets go, LEGO is by far the most popular brand for building not only pre-planned models but whatever the builder can imagine. There are a few others out there though, some with some interesting features. Meccano (or Erector in North America) is a construction set based around parts that are largely metal including its fasteners, which allows for a different approach to building models than other systems including the easy addition of electricity. [Craig], a member of the London Meccano Club, is demonstrating his model Enigma machine using this system for all of its parts and adding some electricity to make the circuitry work as well.

The original Enigma machine was an electronic cypher used by the German military in World War 2 to send coded messages. For the time, its code was extremely hard to break, and led to the British development of the first programmable electronic digital computer to help decipher its coded messages. This model uses Meccano parts instead to recreate the function of the original machine, with a set of keys similar to a typewriter which, when pressed, advance a set of three wheels. The wheels all have wiring in them, and depending on their initial settings will light up a different character on a display.

There are a few modifications made to the design (besides the use of a completely different set of materials) but one of the main ones was eliminating the heavy leaf springs of the original for smaller and easier-to-manage coil springs, which are also part of the electrical system that creates the code. The final product recreates the original exceptionally faithfully, with plans to create a plugboard up next, and you can take a look at the inner workings of a complete original here.

Thanks to [Tim] for the tip!

This Week in Security: Unicode Strikes Again, Trust No One (Redditor), and More

14 Junio 2024 at 14:00

There’s a popular Sysadmin meme that system problems are “always DNS”. In the realm of security, it seems like “it’s always Unicode“. And it’s not hard to see why. Unicode is the attempt to represent all of Earth’s languages with a single character set, and that means there’s a lot of very similar characters. The two broad issues are that human users can’t always see the difference between similar characters, and that libraries and applications sometimes automatically convert exotic Unicode characters into more traditional text.

This week we see the resurrection of an ancient vulnerability in PHP-CGI, that allows injecting command line switches when a web server launches an instance of PHP-CGI. The solution was to block some characters in specific places in query strings, like a query string starting with a dash.

The bypass is due to a Windows feature, “Best-Fit”, an automatic down-convert from certain Unicode characters. This feature works on a per-locale basis, which means that not every system language behaves the same. The exact bypass that has been found is the conversion of a soft hyphen, which doesn’t get blocked by PHP, into a regular hyphen, which can trigger the command injection. This quirk only happens when the Windows locale is set to Chinese or Japanese. Combined with the relative rarity of running PHP-CGI, and PHP on Windows, this is a pretty narrow problem. The XAMPP install does use this arrangement, so those installs are vulnerable, again if the locale is set to one of these specific languages. The other thing to keep in mind is that the Unicode character set is huge, and it’s very likely that there are other special characters in other locales that behave similarly.

Downloader Beware

The ComfyUI project is a flowchart interface for doing AI image generation workflows. It’s an easy way to build complicated generation pipelines, and the community has stepped up to build custom plugins and nodes for generation. The thing is, it’s not always the best idea to download and run code from strangers on the Internet, as a group of ComfyUI users found out the hard way this week. The ComfyUI_LLMVISION node from u/AppleBotzz was malicious.

The node references a malicious Python package that grabs browser data and sends it all to a Discord or Pastebin. It appears that some additional malware gets installed, for continuing access to infected systems. It’s a rough way to learn.

PyTorch Scores a Dubious 10.0

CVE-2024-5480 is a PyTorch flaw that allows PyTorch worker nodes to trigger arbitrary eval() calls on the master node. No authentication is required to add a PyTorch worker, so this is technically an unauthorized RCE, earning the CVSS of 10.0. Practically speaking it’s not that dire of a problem, as your PyTorch cluster shouldn’t be on the Internet to start with, and there’s no authentication as a design choice. It’s not clear the the PyTorch developers consider this a legitimate security vulnerability at all. It may or may not be fixed with version 2.3.

Next Level Smishing

My least favorite term in infosec has to be “smishing”, a frankenword for SMS phishing. Cell phone carriers around the world are working hard to blocking spam messages, making smishing an impossible task. And that’s why it’s particularly interesting to hear about a bypass that a pair of criminals were using in London. The technical details are light, but the police reported a “homemade mobile antenna”, “illegitimate telephone mast”, and “text message blaster” as part of the seized kit. The initial report sounds like it may be a sort of reverse stingray, where messages are skipping the regular cellular infrastructure and are getting sent directly to nearby cell phones. Hopefully more information will be forthcoming soon.

Zyxel’s NsaRescueAngel

The programmers at Zyxel apparently have a sense of humor, given the naming used for this mis-feature. Zyxel NAS units have a bit of magic code that writes a password for the new user, NsaRescueAngel, to the shadow password file. The SSH daemon is restarted, and upnp is fired off to request port forwarding from the outside world. One of the script names, possibly from a previous iteration, was open_back_door.sh, which seems to be sort of lampshading the whole thing.

It’s presumably intended to be a great troubleshooting tool, when a customer is stuck and needs help, to be able to visit a web url to enable remote access for a Zyxel tech. The problem is that the Zyxel NAS already has an authentication bypass flaw, and while it’s been patched, it wasn’t patched very well, making this whole scheme accessible without authentication, just by slapping /favicon.ico onto the url. The additional problems have been fixed in a more recent update.

Russian Secure Phablet?

A Twitter thread tells the story of a Russian secure device, left behind on the back of a bus in England. That’s an interesting premise. But the thread continues, that ‘conveniently the owner also left a briefcase with design notes, architecture, documentation, implementation, marketing material and internal Zoom demos about “trusted” devices too!’ OK, now this has to either be a fanfic, or a fell-off-the-back-of-a-truck story. There’s some convincing looking screenshots, and even rom dumps. What’s going on here?

Nobody knew how the devices worked, conveniently the owner also left a briefcase with design notes, architecture, documentation, implementation, marketing material and internal Zoom demos about "trusted" devices too! We'd all have been lost without those. https://t.co/LN7cTybxOV pic.twitter.com/j5OCHprSie

— hackerfantastic.x (@hackerfantastic) June 11, 2024

The most likely explanation is that somebody got their hands on a trove of data on these devices, and wanted to dump it online with a silly story. But fair warning, don’t trust any of the shared files. Who knows what’s actually in there. Taking a look at something untrusted like this is an art in itself, best done with isolated VMs and burner machines, maybe a Linux install you don’t mind wiping?

Bits and Bytes

Buskill just published their 8th warrant canary, a cryptographically signed statement attesting that they have not been served any secret warrants or national security letters that would undermine the trustworthiness of the Buskill project or code. In addition to a good cryptographic signature, this canary includes a handful of latest news headlines in the signed material, proving it is actually a recently generated document.

[Aethlios] has published Reset Tolkien, an open source tool for finding and attacking a very specific sort of weakness in time based tokens. The targeted flaw is a token generated from improper randomness source, like the current time. If the pattern can be found, a “sandwich attack” can narrow down the possible reset codes by requesting a reset code for a controlled account, requesting one for the target account, and then once again for the controlled account. The target code must come between the two known codes.

And finally, TPM security is hard. This time, the Trusted Platform Module can be reset by reclaiming the GPIO pins connected to it, and simulating a reboot by pulling the reset pin. This results in the TPM possibly talking to an application when it thinks it is talking to the CPU doing boot decryption. In short, it can result in compromised keys. Thanks to [char] from Discord for sending this one in!

Hackaday Links: June 9, 2024

9 Junio 2024 at 23:00
Hackaday Links Column Banner

We’ve been harping a lot lately about the effort by carmakers to kill off AM radio, ostensibly because making EVs that don’t emit enough electromagnetic interference to swamp broadcast signals is a practical impossibility. In the US, push-back from lawmakers — no doubt spurred by radio industry lobbyists — has put the brakes on the move a bit, on the understandable grounds that an entire emergency communication system largely centered around AM radio has been in place for the last seven decades or so. Not so in Japan, though, as thirteen of the nation’s 47 broadcasters have voluntarily shut down their AM transmitters in what’s billed as an “impact study” by the Ministry of Internal Affairs and Communications. The request for the study actually came from the broadcasters, with one being quoted in a hearing on the matter as “hop[ing] that AM broadcasting will be promptly discontinued.” So the writing is apparently on the wall for AM radio in Japan.

There was another close call this week with our increasingly active sun, which tried but didn’t quite launch a massive stream of plasma out into space. The M-class flare was captured in the act by the Solar Dynamics Observatory, which keeps an eye on what’s going on with our star. The video of the outburst is fascinating; it almost looks like a CGI render, but it’s real imaging and pretty spectacular. The active region on the sun’s surface suddenly belches out a few gigatons of plasma, which quickly get sucked right back down to the surface. You can actually see the material following ethereal lines of magnetic force, and the way it splashes when it hits the surface is just beautiful. Seeing this puts us in the mood for a feature on the SDO and how it gets these fascinating images, so stay tuned for that.

Also in space news, we’re saddened by the sudden loss of yet another of the Apollo astronauts. Bill Anders, lunar module pilot on Apollo 8, died Friday in a small plane crash off San Juan Island in Washington. Anders, 90, was piloting the Beechcraft T-34 Mentor, a single-engine military trainer aircraft from the 1950s. Anders’ only trip in space was Apollo 8, but what a trip it was. Along with Commander Frank Borman and pilot James Lovell, they were the first humans to leave Earth’s gravity well and visit another world, riding the mighty Saturn V rocket all the way to the Moon for a ten-orbit visit that paved the way for the landing on Apollo 11. He is also officially the luckiest photographer in history, having been in just the right place at just the right time to snap the famous “Earthrise” picture that gave us for the first time a Moon’s-eye-view of our fragile little world:

 

 

Godspeed, Major General Anders.

In more mundane news, a story from Maryland that should give anyone who depends on tools for a living a moment’s pause. Police cracked a massive tool-theft ring thanks to the actions of a carpenter who, sick of having his tools ripped off repeatedly, stashed a couple of AirTags among his stock in trade. When the inevitable occurred and his tools took a walk yet again, he tracked them to a storage facility and alerted police. They in turn conducted an investigation and got search warrants for twelve locations, where the scale of this criminal enterprise became apparent. Check out the photos in the story; mountains of cordless tools sorted by brand, DeWalt yellow here and Milwaukee red there. There’s a surprising amount of puke-green Ryobi, too; are people really trying to make money with those tools? Between the piles of cordless tools and the rows of air compressors, the total value of the haul is estimated to be from $3 to $5 million. Hats off to the carpenter for running his own mini-sting operation.

And finally, from the Genuinely Interesting Apps files we have ShadeMap, which does exactly what you think it does: plot shade and shadow on a map. It has controls for time and date, and zooms down to a pretty fine level of detail, even for the free version. Shadows from buildings, terrain, and trees are calculated and displayed, making it perfect for surveys of locations for solar power installations. There’s also supposed to be a way to virtually remove shadow-casting features, although we couldn’t find it; perhaps in a paid version? That would be a handy tool indeed to see which trees need to be cut down or which buildings demolished to improve your solar aspect. YMMV on that last one, of course.

Making Intel Mad, Retrocomputing Edition

9 Junio 2024 at 20:00

Intel has had a deathgrip on the PC world since the standardization around the software and hardware available on IBM boxes in the 90s. And if you think you’re free of them because you have an AMD chip, that’s just Intel’s instruction set with a different badge on the silicon. At least AMD licenses it, though — in the 80s there was another game in town that didn’t exactly ask for permission before implementing, and improving upon, the Intel chips available at the time.

The NEC V20 CPU was a chip that was a drop-in replacement for the Intel 8088 and made some performance improvements to it as well. Even though the 186 and 286 were available at the time of its release, this was an era before planned obsolescence as a business model was king so there were plenty of 8088 systems still working and relevant that could take advantage of this upgrade. In fact, the V20 was able to implement some of the improved instructions from these more modern chips. And this wasn’t an expensive upgrade either, with kits starting around $16 at the time which is about $50 today, adjusting for inflation.

This deep dive into the V20 isn’t limited to a history lesson and technological discussion, though. There’s also a project based on Arduino which makes use of the 8088 with some upgrades to support the NEC V20 and a test suite for a V20 emulator as well.

If you had an original IBM with one of these chips, though, things weren’t all smooth sailing for this straightforward upgrade at the time. A years-long legal battle ensued over the contents of the V20 microcode and whether or not it constituted copyright infringement. Intel was able to drag the process out long enough that by the time the lawsuit settled, the chips were relatively obsolete, leaving the NEC V20 to sit firmly in retrocomputing (and legal) history.

Using Kick Assembler and VS Code to write C64 Assembler

7 Junio 2024 at 02:00

YouTuber My Developer Thoughts, a self-confessed middle-aged Software Developer, clearly has a real soft spot for the 6502-based 8-bit era machines such as the Commodore 64 and the VIC-20, for which he has created several video tutorials while travelling through retro-computing. This latest instalment concerns bringing up the toolchain for using the Kick Assembler with VS Code to target the C64, initially via the VICE emulator.

The video offers a comprehensive tutorial on setting up the toolchain on Windows from scratch with minimal knowledge. While some may consider this level of guidance unnecessary, it is extremely helpful for those who wish to get started with a few examples quickly and don’t have the time to go through multiple manuals and Wikis. In that regard, the video does an excellent job.

VS Code is a great tool with a large user base, so it’s not surprising that there’s a plugin for using the Kick Assembler directly from the IDE. You can also easily launch the application onto the emulator with just a push of a button, allowing you to focus on learning and working on your application. Once it runs under emulation, there’s a learning curve for running it on native hardware, but there are plenty of tutorials available for that. While you could code directly on the C64 itself, it’s much more pleasant to use modern tools, revision control, and all the conveniences and not have to endure the challenges.

Once you’ve mastered assembly, it may be time to move on to C or even C++. The Oscar64 compiler is a good choice for that. Next, you may want to show off your new skills on the retro demo scene. Here’s a neat C64 demo with a twist. There is no C64.

Thanks to [Stephen] for the tip!

Clock Mixes Analog, Digital, Retrograde Displays

31 Mayo 2024 at 02:00

Unique clocks are a mainstay around here, and while plenty are “human readable” without any instruction, there are a few that take a bit of practice before someone can glean the current time from them. Word clocks are perhaps on the easier side of non-traditional displays but at the other end are binary clocks or even things like QR code clocks. To get the best of both worlds, though, multiple clock faces can be combined into one large display like this clock build from [imitche3].

The clock is actually three clocks in one. The first was inspired by a binary clock originally found in a kit, which has separate binary “digits” for hour, minute, and second and retains the MAX 7219 LED controller driving the display. A standard analog clock rests at the top, and a third clock called a retrograde clock sits at the bottom with three voltmeters that read out the time in steps. Everything is controlled by an Arduino Nano with the reliable DS3231 keeping track of time. The case can be laser-cut or 3D printed and [imitche3] has provided schematics for both options.

As far as clocks builds go, we always appreciate something which can be used to tell the time without needing any legends, codes, or specialized knowledge. Of course, if you want to take a more complex or difficult clock face some of the ones we’re partial to are this QR code clock which needs a piece of hardware to tell the time that probably already has its own clock on it.

Play Giant Tetris On Second-Floor Window

28 Mayo 2024 at 20:00

Sometimes it seems like ideas for projects spring out of nothingness from a serendipitous set of circumstances. [Maarten] found himself in just such a situation, with a combination of his existing Tetris novelty lamp and an awkwardly-sized window on a second-floor apartment, he was gifted with the perfect platform for a giant playable Tetris game built into that window.

To make the giant Tetris game easily playable by people walking by on the street, [Maarten] is building as much of this as possible in the browser. Starting with the controller, he designed a NES-inspired controller in JavaScript that can be used on anything with a touch screen. A simulator display was also built in the browser so he could verify that everything worked without needing the giant display at first. From there it was on to building the actual window-sized Tetris display which is constructed from addressable LEDs arranged in an array that matches the size of the original game.

There were some issues to iron out, as would be expected for a project with this much complexity, but the main thorn in [Maarten]’s side was getting his controller to work in Safari on iPhones. That seems to be mostly settled and there were some other gameplay issues to solve, but the unit is now working in his window and ready to be played by any passers-by, accessed by a conveniently-located QR code. Tetris has been around long enough that there are plenty of unique takes on the game, like this project from 2011 that uses Dance Dance Revolution pads for controllers.

Adafruit Badges Turned Electronic Invitations

Por: Tom Nardi
28 Mayo 2024 at 08:00

Despite what you might have heard, even the most devout Hackaday readers may eventually find themselves getting married. Should you ever find yourself in a situation where you need to send out invitations for your big day, or any other major celebration for that matter, you could do worse than follow the example [Mokas] and their partner set with these memorable electronic wedding invitations.

Inspired by the electronic badges distributed at hacker cons, [Mokas] decided to use Adafruit’ EdgeBadge and PyBadge devices to create a similar interactive keepsake that would be a bit more exciting than a piece of paper. While it would have been enough to have the wedding information pop up on the screen when they were turned on, the final invites actually boot into a retro-style game where you walk around talking to characters to uncover information about the event and the venue.

The game was created in Microsoft MakeCode Arcade, with a sprinkling of original and commissioned sprites. Early versions of the game ended up being a bit much for the Adafruit badge’s to handle, but after doing a bit of research on creating games for computationally-constrained platforms, [Mokas] was able to optimize the performance. For those that didn’t get a physical invite (no doubt ours was simply lost in the mail), you can play the whole thing right in your browser.

It’s a very clever idea, and while using custom hardware would have allowed for a more bespoke package, we can’t blame [Mokas] for wanting to keep this one simple. Getting everything ready for your wedding is already enough stress — it’s hardly the time to spin up a new board.

For a similar reasons, another Adafruit offering was selected to power the couple’s e-ink baby development display.

2024 Business Card Challenge: Adding Some Refinement to Breadboard Power Supplies

26 Mayo 2024 at 11:00

For small electronics projects, prototyping a design on a breadboard is a must to iron out kinks in the design and ensure everything works properly before a final version is created. The power supply for the breadboard is often overlooked, with newcomers to electronics sometimes using a 9V battery and regulator or a cheap USB supply to get a quick 5V source. We might eventually move on to hacking together an ATX power supply, or the more affluent among us might spring for a variable, regulated bench supply, but this power supply built specifically for breadboards might thread the needle for this use case much better than other options.

The unique supply is hosted on a small PCB with two breakout rails that connect directly to the positive and negative pins on a standard-sized breadboard. The power supply has two outputs, each of which can output up to 24V DC and both are adjustable by potentiometers. To maintain high efficiency and lower component sizes, a switch-mode design is used to provide variable DC voltage. A three-digit, seven-segment display at the top of the board keeps track of whichever output the user selects, and the supply itself can be powered by a number of inputs, including USB-C or lithium batteries.

As an upgrade to one’s own janky power supply (seen here in a project to upgrade the BIOS in an old laptop) this is an excellent step up, and of course comes in a form factor that fits into our current design contest. Of course, if you need a little more current delivering capabilities, there are some modern ATX modifications that can provide a fairly robust benchtop supply without too much expense. You can find some more information about this power supply on the project’s Kickstarter page.

2024 Business Card Challenge

Homebrew Computer from the Ground Up

26 Mayo 2024 at 08:00

Building a retro computer of some sort is a rite of passage for many of us, with some building replicas or restorations of old Commodores, Ataris, and other machines from decades past. Others go even further back, to the time of the Intel 8008 or earlier, and a dedicated few will build something completely novel. This project from [3DSage] falls squarely in the latter category, with his completely DIY computer built component by component from scratch, including the machine code needed to run it.

[3DSage] starts with the backbone of every computer: the clock. He first demonstrates how a pair of NOT gates with a set of capacitors can be used as a rudimentary clock pulse, then builds a more refined version with a 555 timer and potentiometer for adjustable rates. Then, it’s on to creating a binary counter, which is a fundamental part of the memory system for this small computer, and finally, allows this circuitry to behave like a normal computer. Using a set of switches to store values in memory and stepping through them with the clock, the computer can be programmed to do plenty of tasks just like a modern microcontroller.

[3DSage] built this project a few years ago and has used it for real-world applications such as controlling servos, LED arrays, playing music, and other tasks. Although he has to program it using his own machine code by hand, it’s a usable computer in many ways. If you want to eschew modernity and build a retro computer in the style of the 1960s, though, this piece goes through what it would have been like to build a similar system in the era when these computers were more common. If you have a switch fetish, you might like to see how real computers worked back then, too.

How A DOS Format Blunder Revealed Some Priceless Source Code

Por: Jenny List
25 Mayo 2024 at 20:00

As those of us who worked in the consumer software world back when physical media was king can attest, when a master disc has been sent for duplication and distribution there is no turning back from whatever code is in the hands of thousands of users. Usually such worries were confined to bugs or inadvertently sending out pre-release software versions, but [Lance Ewing] is here with the story of how Sierra On-Line once inadvertently released most of the source code for their game engine.

If you have some 720k floppy disk versions of the 1988 game Space Quest II, the first disk in the set appears to have nothing out of the ordinary, but a closer look reveals that the free space on the disk reported by DOS is greater than its used space. Diving in to the disk block contents with a hex editor reveals that many of the unused blocks in fact contain C code, and some further detective work allows the recovery of a not-quite complete set of source files for the company’s AGI, or adventure game interpreter. They had been left behind when the original master disk had been emptied by deleting them, rather than by formatting it afresh.

In commercial terms this would in 1988 have been something of a disaster for Sierra had it been discovered at the time, because it was the cornerstone of their success. As it was we’re told the code sat peacefully undetected until 2016, since when it has proved invaluable to those interested in computer game archaeology. Or did it? We’ll never know if a sharp-eyed competitor snagged it, and kept quiet.

Of course, these days, there are game engines that are open source. Some of them are very modern. Others… not so much.

Trying to Build A Communications Device With a 1-Pound Laser And a 7805

Por: Lewin Day
20 Mayo 2024 at 20:00

You can get a red laser diode pretty cheap these days—as cheap as £1 in fact. [Beamer] had purchased one himself, but quickly grew bored with just pointing it at the walls. He decided to figure out if he could use it for some kind of communication, and whipped up a circuit to test it out.

To do the job, he designed a modulator circuit that could drive the laser without damaging it. The build is based around the common 7805 regulator and the venerable 555 timer IC. The 555 is set to pulse at a given rate with the usual array of capacitors and resistors. Its output directly drives the input of a 7805 regulator. It’s set up as a constant current source in order to deliver the correct amount of current to run the laser. The receiver is based around a photodiode, which should prove fairly straightforward.

[Beamer]’s still working on the full setup, but plans to use the laser’s pulses to drive a varying analog meter or something similar. Not every communications method has to send digital data, and it’s good to remember that! Video after the break.

Improved 3D Scanning Rig Adds Full-Sized Camera Support

17 Mayo 2024 at 23:00

There are plenty of reasons to pick up or build a 3D scanner. Modeling for animation or special effects, reverse engineering or designing various devices or products, and working with fabrics and clothing are all well within the wide range of uses for these tools. [Vojislav] built one a few years ago which used an array of cameras to capture 3D information but the Pi camera modules used in this build limited the capabilities of the scanner in some ways. [Vojislav]’s latest 3D scanner takes a completely different approach by using a single high-quality camera instead.

The new 3D scanner is built to carry a full-size DSLR camera, its lens, and a light. Much more similarly to how a 3D printer works, the platform moves the camera around the object in programmable steps for the desired 3D scan. The object being scanned sits on a rotating plate as well, allowing for the entire object to be scanned without needing to move the camera through a full 180° in two axes. The scanner can also be used for scanning more 2D objects while capturing information about texture, such as various textiles.

For anyone looking to reproduce something like this, [Vojislav] has made all of the plans for this build available on the project’s GitHub page including some sample gcode to demonstrate the intended use for the scanner. On the other hand, if you’re short the often large amount of funding required to get a DSLR camera, his older 3D scanner is still worth taking a look at as well.

Hackaday Links: May 12, 2024

12 Mayo 2024 at 23:00
Hackaday Links Column Banner

Don’t pack your bags for the trip to exoplanet K2-18b quite yet — it turns out that the James Webb Space Telescope may not have detected signs of life there after all. Last year, astronomers reported the possible presence of dimethyl sulfide there, a gas that (at least on Earth) is generally associated with phytoplankton in the ocean. Webb used its infrared spectrometer instruments to look at the light from the planet’s star, a red dwarf about 111 light-years away, as it passed through the hydrogen-rich atmosphere. The finding was sort of incidental to the discovery of much stronger signals for methane and carbon dioxide, but it turns out that the DMS signal might have just been overlap from the methane signal. It’s too bad, because K2-18b seems to be somewhat Earth-like, if you can get over the lack of oxygen and the average temperature just below freezing. So, maybe not a great place to visit, but it would be nice to see if life, uh, found a way anywhere else in the universe.

Attention Fortran fans: your favorite language isn’t quite dead yet. In fact, it cracked the top ten on one recent survey, perhaps on the strength of its numerical and scientific applications. The “Programming Community Index” is perhaps a bit subjective, since it’s based on things like Google searches for references to particular languages. It’s no surprise then that Python tops such a list, but it’s still interesting that there’s enough interest in a 67-year-old programming language to make it onto the list. We’d probably not advise building a career around Fortran, but you never know.

If your experience with Bluetooth is anything like ours, you’ll probably be skeptical of reports of a successful Bluetooth connection with a satellite 600 km in space. But according to Hubble Network, a startup seeking to build a global Bluetooth network, they managed to do it using off-the-shelf hardware. The feat apparently required a firmware update to account for the Doppler shift and a phased-array antenna on the satellite for beam steering, but other than that, direct Bluetooth connections from your phone to a satellite could be coming soon. For some reason.

If you’ve ever wondered why it costs $20 billion to build a semiconductor fab, wonder no more. This is a long article, but it has to be since it covers everything from the structure of semiconductor chips to the processes used to make them, and just about everything you ever wanted to know about fab construction. Our revelation was just how little of a fab’s vertical space is devoted to the cleanroom space, which is sandwiched between sub-fab and utility layers below and a huge interstitial space above for air handling. It’s eye-opening stuff.

And finally, it turns out that “WarGames” was actually pretty accurate, at least in terms of the missile launch bunker set during the film’s cold open. Judging by this virtual tour of a US Minuteman ICBM launch control center (LCC), that is. The 360 tour features detailed — but not too detailed — photos of what appears to be an actual LCC and good explanations of all the equipment. Our biggest surprise was the pair of pink fuzzy bunny slippers in the commander’s kit bag. Hey, if you’re going to be responsible for potentially initiating the apocalypse, you might as well be comfortable.

FLOSS Weekly Episode 782: Nitric — In Search of the Right Knob

8 Mayo 2024 at 23:00

This week Jonathan Bennett and David Ruggles chat with Rak Siva and Steve Demchuck to talk about Nitric! That’s the Infrastructure from Code framework that makes it easy to use a cloud back-end in your code, using any of multiple providers, in multiple programming languages.

The group chatted about the role and form of good documentation, as well as whether a Contributor License Agreement is ever appropriate, and what a good CLA would actually look like. Don’t miss it!

Did you know you can watch the live recording of the show right in the Hackaday Discord? Have someone you’d like use to interview? Let us know, or contact the guest and have them contact us!

Direct Download in DRM-free MP3.

If you’d rather read along, here’s the transcript for this week’s episode.

Places to follow the FLOSS Weekly Podcast:

❌
❌