If you are into your social media, then you probably like to stay updated with your notifications. [Gamaral] feels this way but he wasn’t happy with the standard way of checking the website or waiting for his phone to alert him. He wanted something a little more flashy. Something like a flux capacitor notification light. This device won’t send his messages back in time, but it does look cool.
He started with an off-the-shelf flux capacitor USB charger. Normally this device just looks cool when charging your USB devices. [Gamaral] wanted to give himself more control of it. He started by opening up the case and replacing a single surface mount resistor. The replacement component is actually a 3.3V regulator that happens to be a similar form factor as the original resistor. This regulator can now provide steady power to the device itself, as well as a ESP8266 module.
The ESP8266 module has built-in WiFi capabilities for a low price. The board itself is also quite small, making it suitable for this project. [Gamaral] used just two GPIO pins. The first one toggles the flux circuit on and off, and the second keeps track of the current state of the circuit. To actually trigger the change, [gamaral] just connects to the module via TCP and issues a “TIME CIRCUIT ON/OFF” command. The simplicity makes the unit more versatile because an application running on a PC can actually track various social media and flash the unit accordingly.
[Bob] was having trouble keeping up with his water troughs. He had to constantly check them to make sure they weren’t empty, and he always found that the water level was lower than he thought. He decided it was time to build his own solution to this problem. What he ended up with was a water level sensor made from PVC pipe and a few other components.
The physical assembly is pretty simple. The whole structure is made from 1/2″ PVC pipe and fittings and is broken into four nearly identical sensor modules. The sensors have an electrode on either side. The electrodes are made from PVC end caps, sanded down flat at the tip. A hole is then drilled through the cap to accommodate a small machine screw. The screw threads are coated in joint compound before the screw is driven into the hole, creating its own threads. These caps are placed onto small sections of PVC pipe, which in turn connect to a four-way PVC cross connector.
On the inside of the electrode cap, two washers are placed onto the screw. A stranded wire is placed between the washers and then clamped in place with a nut. All of the modules are connected together with a few inches of pipe. [Bob] measured this out so it would fit appropriately into his trough, but the measurements can easily be altered to fit just about any size container. The wires all route up through the pipe. The PVC pipe is cemented together to keep the water out. The joint compound prevents any leaks at the electrodes.
A piece of CAT 5 cable connects the electrodes to the electronics inside of the waterproof controller box. The electronics are simple. It’s just a simple piece of perfboard with an XBee and a few transistors. The XBee can detect the water level by testing for a closed circuit between the two electrodes of any sensor module. The water acts as a sort of switch that closes the circuit. When the water gets too low, the circuit opens and [Bob] knows that the water level has lowered. The XBee is connected to a directional 2.4GHz antenna to ensure the signal reaches the laptop several acres away. Continue reading “Wireless Water Level Sensor from PVC Pipe”
[Kevin] recently scored a Morse code keyer/sounder unit from the 1920s on eBay. While many hams would love to use an old keyer for CW, [Kevin] took a different route and repurposed it into a wireless web-connected morse code keyer.
[Kevin] mounted an Arduino Yun under the keyer, which listens for user input and provides web connectivity. The Yun connects to [Kevin]’s open-source web API he calls “morsel,” which allows it to send and receive messages with other morsel users. When a message is keyed in, the Yun publishes it to the API. When another keyer queries the API for incoming messages, the Yun downloads the morse sequence and replays it on the sounder.
[Kevin] also added some copper electrodes to the top of his enclosure, which act as capacitive buttons while keeping the keyer’s old-school appearance. The left button replays the most recently received message, and the right button sets the playback speed. Check out the video after the break to hear and see the keyer in action.
Thanks for the tip, [Jarrod].
Continue reading “A Wireless Web-Connected Morse Code Keyer”
For those of us who worry about the security of our wireless devices, every now and then something comes along that scares even the already-paranoid. The latest is a device from [Samy] that is able to log the keystrokes from Microsoft keyboards by sniffing and decrypting the RF signals used in the keyboard’s wireless protocol. Oh, and the entire device is camouflaged as a USB wall wart-style power adapter.
The device is made possible by an Arduino or Teensy hooked up to an NRF24L01+ 2.4GHz RF chip that does the sniffing. Once the firmware for the Arduino is loaded, the two chips plus a USB charging circuit (for charging USB devices and maintaining the camouflage) are stuffed with a lithium battery into a plastic shell from a larger USB charger. The options for retrieving the sniffed data are either an SPI Serial Flash chip or a GSM module for sending the data automatically via SMS.
The scary thing here isn’t so much that this device exists, but that encryption for Microsoft keyboards was less than stellar and provides little more than a false sense of security. This also serves as a wake-up call that the things we don’t even give a passing glance at might be exactly where a less-honorable person might look to exploit whatever information they can get their hands on. Continue past the break for a video of this device in action, and be sure to check out the project in more detail, including source code and schematics, on [Samy]’s webpage.
Thanks to [Juddy] for the tip!
Continue reading “Keystroke Sniffer Hides as a Wall Wart, is Scary”
[Kalle] is at it again with more hacks on electricity use meters. This time, the meter has been hacked to stream their data over the aether wirelessly. Now, data can be grabbed from multiple devices simultaneously, making the possibilities for home energy monitoring limitless
The first project [Kalle] did involved finding a meter from China with capabilities similar to (and cheaper than) the Kill-a-Watt meters. Unlike the Kill-a-Watt which spits out analog values, the Chinese meter sent digital information out on a ribbon cable with the bus lines labeled. Since the meter was so hackable, [Kalle] took it even further in this hack.
With those pesky wires out of the way, the device now uses an Arduino Pro Mini to sniff the energy meter’s data stream. Then it transmits the data wirelessly with a nRF34L01+ transceiver. As a perk, all of these chips fit inside the case of the energy meter, making this a very tidy hack indeed. The project code an incredible amount of detail is available on the project site, so be sure to check this one out for all of your energy monitoring needs!
Thanksgiving was last week, and Christmas has been invading department stores for two or three months now, and that can only mean one thing: it’s time to kill a tree, set it up in your living room, and put a few hundred watts of lights on it. All those lights, though; it’s as if Christmas lights were specifically invented as fodder for standup comedians for two months out of the year. Why can’t someone invent wireless Christmas lights?
We don’t know if it’s been invented, but here’s a Kickstarter campaign that’s selling that same idea. It’s called Aura, and it’s exactly what it says on the tin: wireless Christmas lights, controllable with a smartphone. If it works, it’s a brilliant idea.
Continue reading “Christmas Lights And Ships In A Bottle”
[CNLohr] wanted to test the WiFi range in his house. One look at his roommate’s cup and an unorthodox idea was born. The WiFi Cup used an ESP8266 to connect to his home network. For output, [CNLohr] also added a WS2812 LED strip to the cup. The ESP8266 was programmed to send UDP packets to [CNLohr’s] laptop. When the laptop responded back, the ESP8266 turned on the LEDs, lighting up the cup. The cup’s response to signal strength was very quick – about a second.
[CNLohr] took the WiFi Cup around the house. He was surprised to detect the connection in corners he didn’t expect; in fact, the signal wasn’t weakening at all! He proceeded to walk outside with it, hoping to see the signal strength decrease. As a testament to his roommate’s robust router, the cup merely flickered. Hoping for a better test, [CNLohr] switched out the router for a cheaper TP-Link with shorter antennas. While the initial ping test showed a slower response time, the cup detected WiFi around the house just fine. It only wavered for a couple of moments when it was placed inside a metal bucket. We have to wonder how thin [CNLohr’s] walls are. WiFi never works that well in our house!
Continue reading “Test Your Signal with the WiFi Cup”