If you find a crusty old IT guy and give him half a chance, he’ll probably regale you with stories of how things were done “in the old days” where no one had their own computer and everyone worked on mainframe-connected dumb terminals. [JSTN] yearned for a true to life terminal display that he could attach to his 2010 Mac Pro, and since there’s no chance anybody is bringing one to market any time soon, he pieced one together on his own.
He dug up a digital VT220 terminal, and got to work trying to interface this office relic with his shiny new Mac. He found a few helpful tips from someone who did the same thing with an Apple ][c, though that solution relied on emulating a terminal – something he did not want to do.
He connected the VT220 to his computer using an off the shelf USB to serial adapter, but the software side of things still needed attention. A quick gettytab tweak later, he had his hardware terminal up and running without much trouble.
He says that he is more than happy to help anyone do the same, so let the mad eBay scramble for old terminals begin!
[via Adafruit blog]
[Shawn] emailed us some pictures and a description of his latest hack. He cracked open a Rosewill RXS-3211 IP Camera because the output of the web interface made him certain that it was running Linux and he wanted to unlock some more potential from the device. These cameras are used for security, and offer a browser-based interface via a WiFi connection. After studying the circuit board he started poking around an unpopulated set of four pads and managed to get a serial connection up and running. The device’s serial terminal operates at 115200 baud using eight data bits, one stop bit, and even parity.
He wonder where to go from here and we have a few ideas. You can see in the terminal readout above that it announces when motion is detected. We think this motion detection would be quite useful with a small rover while adding live video broadcasting at the same time. An embedded Linux system should be able to interface with the device and we think that a bit of creative coding would open up the WiFi connection for other use as well. Not bad for a module that can be had for as little as $29. We’ve included all the images [Shawn] sent us after the break and we’d love to hear your thoughts on what you’d use this for in the comments.
Continue reading “I am root! – IP camera shell access”
[Luigi Rizzo] has been working on some hacks for his 3rd generation Kindle. There is already a Python based terminal emulator called AjaxTerm but he wanted a lightweight standalone so he reimplemented the program in C. The 100k binary monitors the keyboard, launching the terminal emulator when it detects a Shift-T sequence. It also uses alternative key mapping to fill in for some of the keys the Kindle’s keyboard is missing.
We haven’t seen a whole lot of Kindle hacking since it was hacked to run Ubuntu. Seems like this terminal emulator is a useful and unobtrusive hack to try out on the beloved reader.
Most of the LED matrix posts we run delve into the hardware design. This time around [J Bremnant] used prefab modules and focused on writing code to address the display. The hardware combines two 24×16 LED boards from Sure Electronics with a Teensy 2.0 to drive the display and provide a USB connection. The firmware comes in just under 8k, leaving graphic manipulation up to a PC.
[J Bremnant’s] Python script offers a lot of flexibility when working with the display. There are three modes selectable through a terminal interface. One just tests the display and then drops into Conway’s Game of Life. The second mode lets you send commands via serial interface so it can be used as a message ticker. The final feature is frame addressing that allows graphics to be dropped into the display. See each of these featured in the video after the break.
Continue reading “Communicating with an LED matrix”
[Thomas Cannon] created his own hacking game by adding some circuitry to this toy vault. The original toy uses the keypad to control a solenoid keeping the door shut. He kept the mechanical setup, but replaced the original circuit board with his own ATmega328 based internals. He also added a USB port to the front. The gist of the game is that you plug-in through USB to gain access to the vault’s terminal software. If you can make your way through the various levels of admin access the loot inside will be yours.
[Michu] used his old Palm IIIc to make a serial interface for his OpenWRT router. It’s a matter of cracking open both the router and the Palm device, then connecting the TTL lines from the router to the MAX 3386e level converter chip inside the Palm. From there, Pocketterm can connect to the router’s serial terminal.
A lot of us have old electronics lying around that work perfectly well. It’s nice to find hacks that make them useful again.
Changing this 50MHz Rigol oscilloscope into its larger, more expensive brother just became quite a bit easier. When we originally looked at this hack it required pulling some capacitors off of the board. Now all it takes is three commands over a serial terminal connection.
Take a look at the walk through video after the break. You’ll see that there’s one chip that needs to be setup differently to change the functionality. Removing capacitors was actually changing the commands sent to initialize that chip at power-up. Now you can just change the model number and one letter of the serial number via a terminal and the firmware will recognize this as the more expensive DS1102E.
Continue reading “Update: 50MHz to 100Mhz scope conversion”