The guys over at NerdKits put together a really informative video on a meat thermometer using predictive filtering which is viewable below. The video, supplemental text, and code is available on their website. The thermometer is constructed of a LM34 temperature sensor attached to a piece of 12 gauge solid copper wire. The thermometer signal is processed on an ATmega168 microcontroller and visualized using the pygame library for python. The real gem in this project is their excellent explanation of predictive filtering, which could easily be utilized for a large number of projects.
Continue reading “Meat thermometer using predictive filtering”
[Synoptic Labs] stumbled upon an RGB light strip with individually-controllable LEDs. The strip uses 5 volts and is controlled by an HL1606. Because the strips are hard to find, this chip is mostly undocumented and he had trouble driving the strip. He was unable to get it working until he met with [John Cohn], who had previously reverse-engineered the serial protocol. Working together, they released a library for the Arduino to drive the strip. So far, the library only supports fading each LED, the only known functionality. If more strips like these were available, constructing LED matrices would be much easier. Embedded below is a video of the strip fading through the rainbow.
Continue reading “Addressable RGB LED strip”
Did you upgrade your iPhone to 3.0 yet? 9 to 5 Mac has posted a very good reason to upgrade: enabling tethering is almost stupidly simple. Just run a simple command and then go through a restore procedure. All thats left is to sit back and enjoy your other new features you could find on a four year old Nokia.
[Related: ultrasn0w announced]
[RSnake] has developed a denial of service technique that can take down servers more effectively. Traditionally, performing a denial of service attack entailed sending thousands of requests to a server, these requests needlessly tie up resources until the server fails. This repetitive attack requires the requests to happen in quick succession, and is usually a distributed effort. However, [RSnake]’s new technique has a client open several HTTP sessions and keeps them open for as long as possible. Most servers are configured to handle only a set number of connections; the infinite sessions prevent legitimate requests from being handled, shutting down the site. This vulnerability is present on webservers that use threading, such as Apache.
A positive side effect of the hack is that the server does not crash, only the HTTP server is affected. His example perl implementation, slowloris, is able to take down an average website using only one computer. Once the attack stops, the website will come back online immediately.
Update: Reader [Motoma] sent in a python implementation of slowloris called pyloris