[Klakinoumi] wanted to use their Magsafe 1 charger from 2007 with their newer Macbook Pro Retina from 2012 — but it had a Magsafe 2 port. There were a few options on the table (buy an adapter, buy a new charger, cry) but those wouldn’t do. [Klakinoumi] went with the brute force option of grinding a Magsafe 1 charger to fit Magsafe 2.
Based on the existence of passive adapters that allow Magsafe 1 chargers to work with newer laptops, we’d assume that the older chargers are probably electrically similar to the newer models. That said, it’s not our gear and we’d definitely be checking first.
With that out of the way, it’s a simple enough modification — grind away the Magsafe 1’s magnet until it fits into a Magsafe 2 port. It really is that easy. The spring-loaded pins all seem to line up with the newer port’s pads. [Klakinoumi] reports it worked successfully in their tests with 2012, 2014 and 2015 Macbooks but that it should be attempted at your own risk — good advice, as laptops ain’t cheap.
When doing this mod, consider taking care not to overheat the connector during grinding. You could both melt plastic parts of the connector, or ruin the magnet by heating it past its Curie point.
Interested in the protocol Magsafe speaks over those little golden pins? Find out here.
[Buger] had an ESP-12F and wanted to play with nodeMCU, but found they were lacking buttons for reset & flash. We’ve all been there – mucking about with a project on a breadboard, trying to save the time required to solder up a button by shorting pins with wire or bending component legs to touch. This either doesn’t work or ends up bricking the microcontroller when it inevitably goes wrong. [Buger] found a tidier solution to adding buttons to the ESP-12F with the minimum of effort.
It’s the spirit of deadbug applied to buttons. One side of a piece of wire is soldered to the pin needing to be pulled down. Component leg offcuts are ideal for this. The other end of the wire is bent up and left to float over the metal shield of the ESP-12, which is connected to ground. When you want the pin to go low, press the wire into the shield, grounding it. Let it go, and the pin returns high again, assuming your pullup resistors are all in order.
It’s a quick hack that’s much more robust than trying to hold two ends of a piece of hookup wire in place. It’s also still easier than trying to find a tactile switch solder leads to, and you don’t end up having it hanging off the board either.
For deadbug construction taken to an impressive conclusion, check out this clock built out of discrete components.
[Thanks to Richard Marko for the tip!]
The audio cassette is an audio format that presented a variety of engineering challenges during its tenure. One of the biggest at the time was that listeners had to physically remove the cassette and flip it over to listen to the full recording. Over the years, manufacturers developed a variety of “auto-reverse” systems that allowed a cassette deck to play a full tape without user intervention. This video covers how Akai did it – the hard way.
Towards the end of the cassette era, most manufacturers had decided on a relatively simple system of having the head assembly rotate while reversing the motor direction. Many years prior to this, however, Akai’s system involved a shuttle which carried the tape up to a rotating arm that flipped the cassette, before shuttling it back down and reinserting it into the deck.
Even a regular cassette player has an astounding level of complexity using simple electromechanical components — the humble cassette precedes the widespread introduction of integrated circuits, so things were done with motors, cams, levers, and switches instead. This device takes it to another level, and [Techmoan] does a great job of showing it in close-up detail. This is certainly a formidable design from an era that’s beginning to fade into history.
The video (found after the break) also does a great job of showing glimpses of other creative auto-reverse solutions — including one from Phillips that appears to rely on bouncing tapes through something vaguely resembling a playground slide. We’d love to see that one in action, too.
One thing you should never do with a cassette deck like this is use it with a cassette audio adapter like this one.
Continue reading “The Hard Way of Cassette Tape Auto-Reverse”
Bees are a crucial part of the ecosystem – without bees to act as pollinators, many plant species wouldn’t be able to reproduce at all! It’s unfortunate then that bees are struggling to survive in many parts of the world. However, [Louise Cosgrove] is doing her part – building homes for bees in old television sets.
The project started when Louise’s son-in-law left 100 (!) analog TVs at her home, having already recycled the picture tubes. That sounds kind of impolite to us, but we’ll give them the benefit of the doubt and assume they had some sort of agreement. [Louise] realised the empty television cases had plenty of ventilation and would make ideal homes for bees. By filling the empty boxes with natural materials like wood, bamboo and bark, it creates nesting places that the bees can use to lay their eggs.
We’ve seen bees on Hackaday beefore (tee-hee) – like this beehive wired for remote monitoring.
[Thanks to Stuart Longland for the tip!]
Being a member of the bomb squad would be pretty high up when it comes to ranking stressful occupations. It also makes for great fun with friends. Keep Talking and Nobody Explodes is a two-player video game where one player attempts to defuse a bomb based on instructions from someone on the other end of a phone. [hephaisto] found the game great fun, but thought it could really benefit from some actual hardware. They set about building a real-life bomb defusal game named BUMM.
The “bomb” itself consists of a Raspberry Pi brain that communicates with a series of modules over a serial bus. The modules consist of a timer, a serial number display, and two “riddle” boxes covered in switches and LEDs. It’s the job of the bomb defuser to describe what they see on the various modules to the remote operator, who reads a manual and relays instructions based on this data back to the defuser. For example, the defuser may report seeing a yellow and green LED lit on the riddle module – the operator will then look this up and instruct the defuser on which switches to set in order to defuse that part of the bomb. It’s the challenge of quickly and accurately communicating in the face of a ticking clock that makes the game fun.
[hephaisto] took this build to Make Rhein-Main 2017, where they were very accepting of a “bomb” being brought onto the premises. The game was setup in a booth with an old analog S-video camera feed and a field telephone for communication – we love the detail touches that really add atmosphere to the gameplay experience.
Overall, it’s a great project that could easily be recreated by any hackerspace looking for something fun to share on community nights. The build files are all available on the project GitHub so it’s easy to see the nuts and bolts of how it works.
We’ve seen builds that bring video games into the real world before – like this coilgun Scorched Earth build. Fantastic.
Oh Nexus 5X, how could you? I found my beloved device was holding my files hostage having succumbed to the dreaded bootloop. But hey, we’re hackers, right? I’ve got this.
It was a long, quiet Friday afternoon when I noticed my Nexus 5X was asking to install yet another update. Usually I leave these things for a few days before eventually giving in, but at some point I must have accidentally clicked to accept the update. Later that day I found my phone mid-way through the update and figured I’d just wait it out. No dice — an hour later, my phone was off. Powering up led to it repeatedly falling back to the “Google” screen; the dreaded bootloop.
Stages of Grief
I kept my phone on me for the rest of the night’s jubilant activities, playing with it from time to time, but alas, nothing would make it budge. The problem was, my Nexus still had a full day’s video shoot locked away on its internal flash that I needed rather badly. I had to fix the phone, at least long enough to recover my files. This is the story of my attempt to debrick my Nexus 5X.
Continue reading “Fix-a-Brick: Fighting the Nexus 5X Bootloop”
[gw0udm] had an ancient monitored alarm system fitted to their home, and decided it was time to upgrade to something a little more modern. They chose a system from Texecom, but when it came time to hook it up to their computer, they were alarmed at the costs – £40 for what amounted to a USB-to-Serial cable! There were other overpriced modules too. But [gw0udm] wanted to upgrade, so it was time to hack the system.
The first step was grabbing a £4 USB-to-Serial board and wiring it up – a simple job for the skilled hacker. As we always say – everything speaks serial. [gw0udm] then set their sights higher – they wanted the Ethernet interface but weren’t about to cough up the coin. After some research, it was determined that a Raspberry Pi could be used with a utility called ser2net with the existing serial interface to do pretty much the same job. It was a simple matter of figuring out the parity and messaging format to get things up and running.
From there, the project moves on to tackling the creation of a GSM module for monitoring in the absence of a local network, and on flashing the firmware of the system itself. It’s great to see a project continually grow and expand the functionality of a product over time.
We see a lot of security systems here at Hackaday – high prices and proprietary hardware tend to inspire the hacker spirit. Check out this reverse engineering of an obsolete 1980s system, resplendent with Eurostile font.