The first music played on personal computers didn’t come out of fancy audio cards, or even a DAC. the first audio system in a personal computer was simply holding an AM radio up to the case and blinking address pins furiously. This worked wonderfully for homebrew computers where EMC compliance hadn’t even become an afterthought, but the technique still works today. [Chris] is playing music on the radio by sending bits over the system bus without using any wires at all.
[Chris]’ code is based on the earlier work of [fulldecent], and works pretty much the same. To play a sound over the radio, the code simply writes to a location in memory when the waveform should be high, and doesn’t when the waveform is low.
Of course the ability to exfiltrate information over an airgap has a few more nefarious purposes, but [Chris] also has another way of doing just that which is undefeatable by a TEMPEST shielded computer. He can send one bit at a time by opening and closing a CD-ROM drive, capturing these bits with a webcam. Is it useful? It’s hard to imagine how this setup could ever capture any valuable data, but it is a proof of concept.
A lot of great ICs use I2C to communicate, but debugging a non-working I2C setup can be opaque, especially if you’re just getting started with the protocol/bus. An I2C bus scanner can be a helpful first step in debugging an I2C system. Are all the devices that I think should be present actually there and responding? Do they all work at the bus speed that I’m trying to run? If you’ve got an Arduino or Bus Pirate sitting around, you’re only seconds away from scanning your I2C bus, and answering these questions.
Continue reading “Embed with Elliot: I2C Bus Scanning”
[Nightflyer] has been working on an open source project he calls CAMdrive. CAMdrive is designed to be a multi-axis controller for time-lapse photography. It currently only supports a single axis, but he’s looking for help in order to expand the functionality.
You may already be familiar with the idea of time-lapse photography. The principal is that your camera takes a photo automatically at a set interval. An example may be once per minute. This can be a good way to get see gradual changes over a long period of time. While this is interesting in itself, time-lapse videos can often be made more interesting by having the camera move slightly each time a photo is taken. CAMdrive aims to aid in this process by providing a framework for building systems that can pan, tilt, and slide all automatically.
The system is broken out into separate nodes. All nodes can communicate with each other via a communication bus. Power is also distributed to each node along the bus, making wiring easier. The entire network can be controlled via Bluetooth as long as any one of the nodes on the bus include a Bluetooth module. Each node also includes a motor controller and corresponding motor. This can either be a stepper motor or DC motor.
The system can be controlled using an Android app. [Nightflyer’s] main limitation at the moment is with the app. He doesn’t have much experience programming apps for Android and he’s looking for help to push the project forward. It seems like a promising project for those photography geeks out there. Continue reading “CAMdrive is an Open Source Time-lapse Photography Controller”
When a school bus has finished its life ferrying children around, it often ends up as someone’s pet project. Most buses in the US, however, have annoying back doors that lock only from the inside, which isn’t very convenient if you’re loading/unloading gear. Drawing inspiration from another project that fit a simple deadbolt upgrade, [Leonard] took the build one step further and hacked together his own keyless entry deadbolt system.
He started by removing the white safety bar that normally covers the long red handle and attached a slide bolt to the door. The slide bolt serves only as an extension for the deadbolt, which would otherwise get whacked by the red handle. [Leonard] made a few modifications to the slide bolt so it can sit flush against the bus’s lock bar, then went to work attaching the keyless deadbolt. At 2.5″, the bus’s door is actually thicker than standard doors, not to mention this build needs the deadbolt to move along the door’s surface to push the slide bolt fitted to the door. [Leonard] decided to throw in a chunk of wood as a kind of “simulated door,” which mounts next to the slide bolt and houses the deadbolt’s guts.
Check out the video after the break to make sense of the door’s operation and swing by [Leonard’s] blog to see what else he’s done to the bus. If you’re in the mood for more transportation hacks, make sure you see the Raspberry Pi CarPC.
Continue reading “School Bus Keyless Door Lock Conversion”
[John Graham-Cumming] was all set to start a new project based on the Raspberry Pi. Well, that was until shipment was delayed due to manufacturing issues. Not to fret, he transitioned over to a router board which displays the arrival countdown for mass transit bus service.
He based the build on a web page the Transport for London provided. You can load it up and see if your bus is running on time or not. There’s no published API, but by studying the source code from the site [John] was able to figure out how the JSON commands were formatted.
The next step is building a standalone device to pull the data and display it. The board seen above is from a Linksys WRT54GL router. This longtime favorite has a serial port header which can be driven from the Linux kernel. He wired up a jack on the router’s case, and uses an extension cable to get from it to the 7-segment displays mounted in a model of the bus. Since there’s four digits the display can tell you minutes until the arrival of two different buses.
[Thanks Pseudo Lobster]
If you are a frequent reader, you are undoubtedly familiar with hacker [Sprite_tm]. He has been working with fellow members of the TkkrLab hackerspace to get things ready for their official grand opening on May 28th, and wrote in to share a project he recently completed to kick things off.
As part of their preparations, they have been stocking the joint with all sorts of hacker-friendly goodies including plenty of tools and Club Mate, as well as a vintage ‘1943’ arcade cabinet. The game is a group favorite, though every time the power is turned off, it loses all of the hard-earned high scores. [Sprite_tm] knew he could improve on the current paper-based score register, so he pulled the machine open to see what could be done.
He used an AVR to tap into the machine’s Z80 logic board, allowing him to read and write to the entirety of the game’s RAM whenever he pleased. This enabled him to keep tabs on the high scores, restoring them to memory whenever the machine is powered back on. The addition of the AVR also allowed him to add a TCP/IP interface, which is used to send high scores to Twitter whenever someone beats the previous record.
His modular bus tap can be used in all sorts of Z80-based hardware, so if you have some vintage equipment laying around, be sure to swing by his site for a more detailed look at the build process.
shackspace member [@dop3j0e] found himself in a real bind when trying to recover some data after his ThinkPad’s fingerprint scanner died. You see, he stored his hard drive password in the scanner, and over time completely forgot what it was. Once the scanner stopped working, he had no way to get at his data.
He brainstormed, trying to figure out the best way to recover his data. He considered reverse engineering the BIOS, which was an interesting exercise, but it did not yield any password data. He also thought about swapping the hard drive’s logic board with that of a similar drive, but it turns out that the password is stored on the platters, not the PCB.
With his options quickly running out, he turned to a piece of open-source hardware we’ve covered here in the past, the OpenBench Logic Sniffer. The IDE bus contains 16 data pins, and lucky for [@dop3j0e] the OpenBench has 16 5v pins as well – a perfect match. He wired the sniffer up to the laptop and booted the computer, watching SUMP for the unlock command to be issued. Sure enough he captured the password with ease, after which he unlocked and permanently removed it using hdparm.
Be sure to check out [@dop3j0e’s] presentation on the subject if you are interested in learning more about how the recovery was done.