It’s been said that hackers are enamored with complex networks. In the 60s and 70s, the telephone network was the biggest around, singing a siren song to an entire generation of blue-boxing phone phreaks. I started a bit closer to the house. As a child I was fascinated by the heating system in the basement of our home: a network of pipes with a giant boiler in the middle. It knew when to come on to provide heat, and when to kick on for hot water. I spent hours charting the piping and electrical inputs and outputs, trying to understand how everything worked. My parents still tell stories of how I would ask to inspect the neighbors heating systems. I even pestered the maintenance staff at my nursery school until they finally took me down to see the monstrous steam boiler which kept the building warm.
My family was sure I would grow up to be a Heating Ventilation and Air Conditioning (HVAC) tech. As it turned out, electronics and embedded systems were my calling. They may not have been too far from the truth though, as these days I find myself designing systems for a major manufacturer of boiler controls and thermostats.
Recently a house hunt led me to do some HVAC research on the web. What I found is that HVAC techs have created a great community on the internet. Tradesmen and women from all over the world share stories, pictures, and videos on websites such as HVAC-Talk and HeatingHelp.
Continue reading “HVAC techs – Hackers who make house calls”
Consider this a public service announcement. [Colin Furze], besides being a raging lunatic, seems to have the nine lives of a cat. Well, he’s not always so lucky, and now that we’ve recovered from being grossed out by the results, we’re glad that [Colin] posted this “fail” video.
Basically, he’s firing up one of his jet engines, and there’s a big fireball. He wasn’t wearing any protective clothing. This is hardly a spoiler — please don’t watch the video below if you’re grossed out by people visiting the doctor’s office to get their horrible second degree burns all up and down their forearm treated. You’ve probably learned the lesson already just by looking at the preview image.
Naturally, we’ve covered [Colin]’s videos before. He’s either very lucky or a little bit more careful than he lets on. We’ve seen him play with fire and not get burned, and stick a jet engine on a go-kart. We’re not gonna tell you what to do, but if that were us, we’d be wearing at least long sleeves and a helmet.
Continue reading “Colin Furze Gets Burned”
[Nguyen Duc Thang]’s epic 2100 Animated Mechanical Mechanisms is one of the best YouTube channels we’ve ever seen. A retired mechanical engineer, [Nguyen Duc Thang] has taken on an immense challenge: building up 3D models of nearly every imaginable mechanism in Autodesk Inventor, and animating them for your amusement and enlightenment. And, no, we haven’t watched them all for you, but we’re confident that you’ll be able to waste at least a couple of hours without our help.
If you’re actually looking for something specific, with this many mechanisms demonstrated, YouTube is not the perfect lookup table. Thankfully, [Nguyen Duc Thang] has also produced a few hundred pages of documentation (PDFs, zipped) to go along with the series, with each mechanism classified, described, and linked to the video.
This is an amazing resource as it stands, and it’s probably a good thing that we don’t have access to the 3D files; between the filament cost and the time spent shepherding our 3D printer through 2,100 mechanisms, we’d be ruined. Good thing we don’t know about the Digital Mechanism and Gear Library or KMODDL.
Thanks [alnwlsn] for the tip!
Continue reading “2,100 Mechanical Mechanisms”
Spend enough time on YouTube, and you’ll eventually find yourself in one of the many dark corners hiding within it. No, I’m not talking about the comments. In this case, I mean the many videos dedicated to free energy, overunity devices, perpetual motion machines, or anything else that violates the laws of thermodynamics by trying to get out more energy than is put in. The human race has been reaching for impossible dreams of perpetual motion and free energy for just about all of recorded history. Now it’s convenient to find them all in one place.
Browsing the tubes, it’s easy to break free energy videos down into two major groups: enthusiasts and scammers. Catching a scammer is easy – they’re looking for money. Somewhere in the video or description will be a link to a website with more information. Eventually that will lead you to a place where the scammer attempts to part you and your hard-earned money.
Names like John Searl, Muammer Yildiz, and M. T. Keshe go here. Searl especially deserves note because he’s been at it for decades. Supposedly, his “Searl Effect Generator” SEG has been built several times, but the prototypes generate so much power they create their own anti-gravity field and fly off into space. Obviously this man and his staff need your money to continue their work. Scammers deserve disdain and public shaming. These are the folks who know their “discoveries” are nothing more than snake oil.
On the other side of the coin lie the enthusiasts. These are the backyard tinkerers, the ones who put down their computers, pick up their tools, and try to build something. Sounds a lot like the average Hackaday reader, doesn’t it? I have to admit I went into this article with the same disdain for the enthusiasts that I have for the scammers, possibly even more. In some cases, these are the folks who truly believe they can have a chance to violate the laws of thermodynamics. Inevitably these folks fail to build free energy generators, overunity devices, or whatever their pursuit is, but they all do seem to learn something in the process. A lot can be said about the builds themselves. Some of these are awesome devices. Even if they don’t work for their intended purpose, they are great demonstrations of magnetism or chemistry. This is where I had a change of heart. If someone wants to spend their time working on an impossible hack, then more power to them. I may not think they have any chance of success, but at the very least, they’ll learn how to build.
Continue reading “Overunity, Free Energy and Perpetual Motion: The Strange Side of YouTube”
There are a surprising number of Raspberry Pis being used in industrial equipment. This means the Arduino is left behind, but no longer. There’s your PLCs that use Arduinos.
A few weeks ago, Google introduced a machine intelligence and computer vision technique that made the world look psychedelic. Now, this library is available. On another note, head mounted displays exist, and a sufficiently creative person could mash these two things together into a very, very cool project.
Welcome to Kickstarter! Kickstarter is an uphill battle. People will doubt you because you don’t have a ‘target audience’ or ‘the rights to this franchise’ or ‘any talent whatsoever’, but that’s what crowdfunding is for!
Several years ago, Apple shipped a few million 17″ iMacs with defective displays. They’re still useful computers, though, especially if you can find a replacement LCD. Apple, in all its wisdom, used a weird connector for this LCD. Here’s the adapter board, and this adapter will allow displays running up to 1920×1200.
[Jan] has earned a reputation of building some very cool synths out of single ARM chips. His previous build was a Drumulator and now he’s shrinkified it. He’s put four drum sounds, pitch CV, and audio out on an 8-pin DIP ARM.
YouTube gives you cadmium! [AvE], recently got 100,000 subscribers on his YouTube channel. Apparently, YouTube sends you a terrible belt buckle when you manage to do that. At least he did it without playing video games and screaming.
The original steganography technique dates back to 440 BC (according to Wikipedia) when a Greek wrote secret messages on a piece of wood, covered it in wax, and then wrote innocent text on the wax. The term, in general, means hiding a message in something that looks harmless. The LVDO project (and a recent Windows fork) says it is steganography, but we aren’t quite sure it meets the definition. What it does is converts data into a video that you can transfer like any other video. A receiver that knows what LVDO parameters you used to create the video can extract the data (although, apparently, the reproduction is not always completely error-free).
The reason we aren’t sure if this really counts as steganography is that–judging from the example YouTube video (which is not encoded)–the output video looks like snow. It uses a discrete cosine transform to produce patterns. If you are the secret police, you might not know what the message says, but you certainly know it must be something. We’d be more interested in something that encodes data in funny cat videos, for example.
Continue reading “Transfer Data via YouTube”
With a simple $35 dongle that plugs right into your TV, it’s possible to enjoy your favorite TV shows, YouTube channels, and everything else Chromecast has to offer. Being a WiFi enabled device, it’s also possible to hijack a Chromecast, forcing your neighbors to watch [Rick Astley] say he’s never going to give you up.
The rickmote, as this horrible device is called, runs on a Raspberry Pi and does a lot of WiFi shennaigans to highjack a Chromecast. First, all the wireless networks within range of the rickmote are deauthenticated. When this happens, Chromecast devices generally freak out and try to automatically reconfigure themselves and accept commands from anyone within proximity. The rickmote is more than happy to provide these commands to any Chromecast device, in the form of the hit song from 1987 and 2008.
Video demo of the rickmote below, along with a talk from ToorCon describing how the hijacking actually works.
Continue reading “Hijacking Chromecast With The Rickmote Controller”