[Johan von Konow] found that he was using an FTDI USB-to-Serial chip in a lot of his projects and wanted to have an easy prototyping component on hand to facilitate this. What he came up with is the extremely small USB to serial dongle seen above. The copper fingers are designed to plug into your USB port. And if you’ve got an unused thumb drive (we’ve got a 128mb version that’s been collecting dust for years) it would make a perfect enclosure for the device.
He’s using an FT232BL chip in a LQFP-32 package. That’s got 0.8mm pitch so make sure you’ve got a steady hand, a fine tipped soldering iron, and some solder wick on hand. The 0603 passives might also give you a bit of a run-around during soldering, but all-in-all we think everyone will be able to successfully assemble this with a little bit of practice. The chip is the most expensive component at just under $6. But the good news is that the board is single sided and only needs one jumper wire making for very little drilling and easy home fabrication.
If you’re putting in a parts order, we’d recommend getting doubling the amount of resistors and capacitors. Chances are you’ll drop a few and nary will they be seen again. We also highly recommend looking into [Gerrit’s] surface mount component clamp.
Want that 70″ LCD television in your living room to be an Android device? This little guy can make it happen. With an HDMI port on one end, and a USB plug on the other for power, just plug in FXI Technologies’ Cotton Candy dongle to create a 1080p Android television.
The price isn’t set for the device, but it’s expected to be available at less than $200. Considering what’s inside that’s pretty reasonable. There’s a dual-core 1.2 GHz ARM processor, 1 gig of RAM, 64 gigs of storage, Bluetooth, WiFi, and a microSD card slot. Wow!
So is it hackable? Absolutely. Well, kind of? The company doesn’t intend to bring Cotton Candy to the retail market. Instead, they will sell the device to developers who may do what they wish. From there, said developers have the option to license the technology for their own products. This begs the question, will the development kit come in under $200? Hard to say.
Check out the video after the break to hear an interview with the company’s CEO. It certainly sounds fascinating, and like the Chumby NeTV, we can’t wait to see what comes of this. Continue reading “This dongle makes any screen an Android device”
Here’s an Android headphone add-on so clean that most people won’t know you built it yourself. [Will Robertson] was unsatisfied with the stock headphones that came with his HTC phone, but didn’t want to lose the control interface when upgrading. He built this add-on that lets him control the Android music player.
He was inspired to do this after reading about the control interface in one of our previous features. That hack detailed how to add control based on the 4-conductor headphone jack, but didn’t see us through to a clean finished product. [Will] picked up where it left off by designing a sleek surface mount board that hosts a headphone jack and three tactile switches. A patch cable is soldered opposite the jack, making this work as a pass-through device. The icing on the cake is the shrink tubing that masks the fact that this is a diy dongle.
If you want to follow his lead, [Will] posted his EagleCAD design files and footprints for the components he used in the post linked at the top.
Development has been progessing quite nicely on [Matlo’s] PlayStation 3 controller spoofing project. This is a package that allows you to identify a PC as a PS3 controller. We know what you’re thinking: why would you want to do that? When we originally looked in on the project about a year ago we mentioned that this allows you to use any Linux-friendly peripheral as a PS3 controller. In the clip embedded below you’ll see that nothing beats a good keyboard and gaming mouse when it comes to first-person shooters. [Matlo’s] solution not only allows you to use alternative control hardware, but there’s almost unlimited configurability.
And speaking of configuration, he’s done a ton of work on the GUI. After the initial package installation no terminal typing needs to be done to get the system configured. Once in place, you can set the MAC address of a Bluetooth dongle to spoof the address of your SixAxis controller. From there you can set up the button mapping, calibrate mouse hardware and the like, and even program macros (fantastic). Now go out and pwn everyone at deathmatch now that the PlayStation Network is back up and running.
Continue reading “PS3 controller spoofing advancing with leaps and bounds”
A common complaints of beginners to microcontroller programming is the availability of DIY tools that do not require a parallel port. Using not much more than a couple of 74xx series chips and some protoboard, [Rue] was able to create an AVR programmer for less than the cost of some chips it can program – giving parallel programmers a run for thier money. [Rue] used Linux treat the ubiquitous PATA/IDE port as a parallel port. By having avrdude treat the programmer as an Atmel STK200, [Rue] was able to upload a blinky program to his AVR microcontroller through ISP. If anybody can think of an even lower cost unconventional solution give us a shout.
This circuit board is from the USB dongle of a Girl Tech IM-ME. [Joby Taffey] took it apart and poked around to learn its secrets. These dongles come along with the pink pager that has become a popular low-cost hacking platform. But we haven’t seen much done with the dongle itself up until now.
[Joby] used the OpenBench Logic Sniffer to gain some insight on what’s going on here. The board has two chips on it, a Cypress CY7C63803 USB microcontroller which talks to the computer over USB and also communicates over SPI with a Chipcon CC1110 SoC radio. It looks like reprogramming the Cypress chip is a no-go, so he went to work on the CC1110. The inter-chip communications data that he acquired by sniffing the SPI lines gave him all he needed to reimplement the protocol using his own firmware. As a proof of concept he to reflashed the CC1110 and can now send and receive arbitrary commands from the dongle. There’s a tiny video after the break showing a script on the computer turning the dongle’s LED on and off.
Continue reading “IM-ME USB dongle hacking”
It’s been a long time coming, but the video above shows a modchip circumventing the PlayStation 3 security by running a game from a hard drive. The sites Ozmodchips.com which sells the modchip, and psx-scene.com which has confirmed them as working are both unstable right now due to heavy traffic. But here’s what we know. The device is called the PS Jailbreak and can be used to dump PS3 games to the hard drive of a PlayStation3 running the most current firmware (3.41). Dumped games can then be played from the hard drive by selecting them from a menu that the modchip spawns. It’ll cost you though. The current preorder price is $169.99 AUD or $147.47 US dollars with a projected delivery date of August 27th.
[Thanks Charlie via Slashdot]