The first of the BBC Micro Bits are slowly making their ways into hacker circulation, as is to be expected for any inexpensive educational gadget (see: Raspberry Pi). [Martin] was able to get his hands on one and created the “hello world” of LED displays: he created a playable game of snake that runs on this tiny board.
For those new to the scene, the Micro Bit is the latest in embedded ARM systems. It has a 23-pin connector for inputs and outputs, it has Bluetooth and USB connectivity, a wealth of sensors, and a 25-LED display. That’s small for a full display but it’s more than enough for [Martin]’s game of snake. He was able to create a hex file using the upyed tool from [ntoll] and upload it to the Micro Bit. Once he worked out all the kinks he went an additional step further and ported the game to Minecraft and the Raspberry Pi Sense HAT.
[Martin] has made all of the code available if you’re lucky enough to get your hands on one of these. Right now it seems that they are mostly in the hands of some UK teachers and students, but it’s only a matter of time before they become as ubiquitous as the Raspberry Pi or the original BBC Micro. It already runs python, so the sky’s the limit on these new boards.
Continue reading “Snake On A BBC Micro:bit”
Most people play games for entertainment. Hackers build robots to play games for entertainment. That’s what [piandchips] did. He used a Raspberry Pi and a MeArm kit to build a Connect 4-playing robot. The robot–named 4-Bot–has to do two things: the first is it has to be able to manipulate the pieces. Secondly, it has to be able to see the board. The MeArm imbues 4-Bot with the manipulation ability, and a clever scanning system does the trick.
Continue reading “Connect Four Robot Uses Raspberry Pi”
This could be the start of a new thing. [HarpDude] showed off his String Car Racers over on the Adafruit forum. It’s like a small model cable car on caffeine. String up enough of them and go head to head racing with others.
A motor with a small pulley runs over a length of string stretched between 2 posts. Below the pulley, acting as a counterweight balance, is the rest of the racer. A Trinket board, motor driver, 9V battery and a pair of long lever micro switches to detect end of travel. The switches also help reverse the motor. A piece of galvanized wire acts as a guide preventing the String Car from jumping off the string. And discovering the benefits of a micro-controller design, as against discrete TTL/CMOS, old timer [HarpDude] added two operational modes via software. “Pong”, where the String Car keeps going back and forth over the string until it stops of (battery) exhaustion. The other mode is “Boomerang” – a single return trip back and forth.
We are guessing the next upgrade would be to add some kind of radio on the car (ESP8266 perhaps) and build an app to control the String Car. That’s when gaming could become fun as it opens up possibilities. One way to improve performance would be to add two “idler” pulleys in line with the main drive pulley, and then snake the string through the three of them. Now you know what to do with all of those old motors you’ve scavenged from tape drives, CD drives and printers. Let the Games begin!
Thanks [Mike Stone] for tipping us off on this.
Fallout 4 was released about a month ago, and although we don’t have a ‘took an arrow to the knee’ meme like Bethesda’s last game, there are ample opportunities for cosplay and printing out deathclaws and mirelurks on a 3D printer. How do you turn files hidden away in a game’s folders into a real, printed object? It’s actually pretty easy and [Angus] is here to tell you how.
The files for Fallout enemies and items can be readily accessed with the Bethesda Archive Extractor, although this won’t give you files that a 3D printer can understand. You’ll get a .NIF file, and NifSkope can convert the files found in the Fallout archives to an .OBJ file any 3D modeling program can understand. The next step from there is taking the .OBJ file into Meshmixer and fixing everything with Netfabb. After that, it’s off to the printer.
[Angus] printed his model of a Deathclaw in ABS in multiple parts, gluing them together with a little bit of acetone. This didn’t go exactly as planned; there were some contaminants in the ABS that turned into a white film on the black ABS. This was ultimately fixed with XTC-3D, the 3D print coating everyone is experimenting with.
The finished product is a solid yellow but completely smooth 3D model of one of the toughest enemies in Fallout 4. The only thing left to do is paint the model. The best way to proceed at this point is probably doing what model builders have been doing for decades – an airbrush, and hundreds of tiny bottles of paint. [Angus] is opening up his YouTube comments for suggestions, and if you have a better idea he’s looking for some help.
Continue reading “Printing Objects Directly From Fallout 4”
It is hard enough to beat computers at games like chess. Now robotics engineers at the Ishikawa Watanabe Laboratory in Japan have created a janken robot that wins every time (if you didn’t know, janken is the Japanese name for rock-paper-scissors). How can it win every time? Easy. It cheats.
The janken robot evolved through three different versions. In the first version, the robotic hand would note the human player’s hand with a high-speed camera and then move the hand to a winning counter play with about a 20 millisecond delay. In the second version, the delay was greatly reduced.
However, in the third version, the robot uses a scanning technique to capture an entire field of view and determines what play the human is making. Again, a winning counter play is instantly produced by the robotic hand.
Continue reading “Robot Cheats at Rock Paper Scissors”
Last week, Parallax released an open hackable electronic badge that will eventually be used at dozens of conferences. It’s a great idea that allows badge hacks developed during one conference to be used at a later conference.
[Mark] was at the Hackable Electronics Badge premier at the 2015 Open Hardware Summit last weekend, and he just finished up the first interactive hack for this badge. It’s the zombie apocalypse in badge form, pitting humans and zombies against each other at your next con.
The zombie survival game works with the IR transmitter and receiver on the badge normally used to exchange contact information. Upon receiving the badge, the user chooses to be either a zombie or survivor. Pressing the resistive buttons attacks, heals, or infects others over IR. The game is your standard zombie apocalypse affair: zombies infect survivors, survivors attack zombies and heal the infected, and the infected turn into zombies.
Yes, a zombie apocalypse is a simple game for a wearable with IR communications, but for the Hackable Electronics Badge, it’s a great development. There will eventually be tens of thousands of these badges floating around at cons, and having this game available on day-one of a conference will make for a lot of fun.
Everyone has at least a few games on their computer, and I would assume most of the Hackaday readership would be among the enlightened PC gamer bretheren. At this year’s DEF CON, [Tamas Szakaly] gave a talk about the data these games leak to the Internet, the data they accept from the Internet, and what you can do with that data.
[Tamas]’ talk was entirely about scripting games, like the many games that are scriptable in Lua, or Valve’s Squirrel. Developers have thought about this before and have implemented sandboxes and many anti-cheat mechanisms. However, because these sandboxes are poorly implemented, it’s easy to get outside the game and do some real damage.
[Tamas]’ first target was Crysis 2 and the CryEngine3. This game uses a Lua scripting engine and has no sandbox whatsoever. That means [Tamas] can call os.execute, and from there the entire game is over. Or it’s just begun. Either way you look at it, it’s pretty bad.
CryTek notwithstanding, [Tamas] can also use games with Lua scripting that have a real sandbox. DOTA2 has a leaky sandbox and can be used to call OS I/O routines and execute base 64 encoded executables right over the main executable.
The most impressive example of script abuse in various multiplayer games is from Garry’s Mod. This game has custom implementation of dangerous functions, restricted file IO, and a proper Lua sandbox. This was a wise decision from the developers, but the library is huge. If you create a map or mode used on a server, you can have a full HTTP proxy to the gamer’s home network. During the talk, [Tamas] used this exploit to display an image from a webcam on a Garry’s Mod server. It was on the podium right next him, but this could have been done on a server on the other side of the planet.
Continue reading “DEF CON: Abusing Scripts in Multiplayer Games”