Your Marble Machine Doesn’t Need To Change The World

It’s easy to get sucked into the increasing the complexity when sometimes the craftsmanship can be what makes the project. [Alex Weber] proves the point with his minimalist marble machine. There are no death-defying twists and turns, no convoluted path forks or overly-complex lifting mechanisms. This is about a clean and simple design that looks amazing whether running or stationary.

For the uninitiated, marble machines route marbles (or quite often steel ball bearings) through a set of paths usually guided by gravity for the delight of onlookers. Traditionally, making them complicated is the point. Take this offering which highlights years worth of marble machine builds all exercising different concepts. Sometimes they occupy entire rooms. We’ve seen them make a clock tick. And who can forget marble-based flip-flops that combine to form things like binary adders?

Have we scared you off from building these yourself yet? No, that’s the entire point of this one… it can be excruciatingly simple, while elegantly crafted. Check out the video demo below to see how one oval, one battery, and one motor have no problem bringing a smile to your face.

Continue reading “Your Marble Machine Doesn’t Need To Change The World”

Active “Dart-Sensing” Makes Your Nerf Gun Smarter

When choosing weapons to defend yourself in the next zombie apocalypse, dart jamming whilst firing your Nerf Gun can be a deal-breaker. This clogging is an issue with many “semi-automatic” Nerf Guns. When our trigger-happy fingertips attempt to shoot a dart that hasn’t finished loading into the firing chamber, the halfway-loaded dart folds onto itself and jams the chamber from firing any more darts. The solution, as intended by Nerf, would be to open the chamber lid and manually clear the pathway. The solution, according to [Technician Gimmick], however, is active sensing, and the resulting “smart” dart gun is the TR-27 GRYPHON.

To prevent jamming from occurring altogether, [Technician Gimmick] added a trigger-disable until the dart has fully loaded into the firing chamber. An IR LED, harvested from a mouse scroll wheel, returns an analog value to the microcontroller’s analog-to-digital converter, allowing it to determine whether or not a dart is ready for firing. The implementation is simple, but the results are fantastic. No longer will any gun fire a dart until it has completely entered the chamber.

The TR-27 GRYPHON isn’t just a Nerf Gun that enables “smart” dart sensing. [Technician Gimmick] folded a number of other features into the Nerf Gun that makes it a charmer on the shelf. First, a hall-sensor array identifies the current cartridge loaded into the Nerf Gun and it’s carrying capacity. To display this value and decrement appropriately, [Technician Gimmick] added a dual-seven segment display, a trick we’ve seen before. Finally, a whopping 3S LiPo battery replaces the original alkaline batteries, and the voltage-reducing diodes have been cropped, enabling a full 12.6 Volt delivery to the motors at full charge.

We’re glad to see such a simple trick go such a long way as to almost entirely eliminate Nerf dart jams. For all those braving the Humans-Versus-Zombies frontier this season, may this clever trick keep you alive for just a bit longer.

Continue reading “Active “Dart-Sensing” Makes Your Nerf Gun Smarter”

Portable 120V To 240V Converter; Or How To Fast Charge At Your In-Law’s House

[Nick Sayer] falls into the “would rather build it than buy it” category. This particular project is a clone of a fast electric vehicle charger. There are commercially available versions sold under the Quick 220 brand name. The idea is that for fast charging, some electric vehicles call for a 240V outlet and Americans without electric cars often don’t have one. If they do it’s for an appliance like a stove or clothes dryer and probably not found in the garage.

The device uses two hot and one ground to supply the 240V output which is, in some business where there is three phase power this will be closer to 208V but should still work. Obviously you shouldn’t be doing this unless you know exactly how it works, and we applaud [Nick] for airing these hazards while at the same time supplying the knowledge behind the concerns.

Two inputs for the beefy converter are supplied from outlets not just on separate circuits, but on two circuits whose hot lines are 180 degrees out of phase. That means identifying where there are two plugs, not protected by GFCI outlets or breakers, which are on two separate hot lines of split phase power. To protect the user, [Nick] designed in a set of relays which kill the circuit when one of the two supplies is unplugged. A system that didn’t have these protections would have mains voltage on the prongs of the disconnected plug.

We’ve seen very few car charging hacks. If you know of one, or have been working on your own, let us know!

MRRF: (not Quite) Chocolate Clock

[Jason] is a woodworker. At least, he was until he saw his first 3D printer. While he may still work in wood, he particularly likes adapting scroll saw patterns for 3D printing. His clock started as a woodworking pattern for use on a scroll saw. To adapt it for 3D printing, [Jason] scanned the plotter-sized pattern pieces into Inkscape, where he was able to do things like add bevels before sending the pieces to OpenSCAD.

tall chococlockAs you might imagine, a great deal of work went into this build, beginning with the scanning. [Jason] starting scanning last October and finished in January. Printing started January 9th, and he told me the final pieces were printed early this morning. We know you want all the details, so here goes: this build took just over six rolls of PLA at 20% infill. It’s 48″ tall and about 24″ wide. It was printed on what [Jason] referred to as his “very modified” Replicator 2. He glued the pieces together with Testor’s, and that took about 30 hours. All through the project, he kept meticulous notes in a spreadsheet of print times and filament used.

We were honored to be among the first to see [Jason]’s incredible clock build at this year’s Midwest RepRap Festival. He would like to take it on tour this year to the nearby Maker Faires. If he can figure out how transport it safely, he’d like to show it at World Maker Faire in NYC.

GT2 Belt Drive Conversion Of Printrbot Simple

The early versions of the Printrbot Simple at about $300 were cheap enough for even the most cash-strapped hackers to put on their desks. Obviously, for that cost, a lot of design compromises were needed to keep it cheap. Sometimes, changes carry forward to the next iteration at no cost increase. One such improvement in the current version of the Printrbot is the belt drive. Unfortunately, if you have one of the late 2013 – early 2014 wood models, it is most likely being driven by a fishing line that loops over a rubber hose attached to the stepper motor. [jason] describes the process of upgrading the Printrbot Simple to a GT2 belt drive , using the designs posted by Thingiverse contributor [iamjonlawrence].

The trouble with the fishing line drive was that it would tend to get loose over time and needed to be pulled taut. Also, it affected precision when the line tended to wander over the drive shaft. The good thing with having rapid prototyping tools is you can make bootstrap improvements using them. Once the parts for the upgrade were printed, [jason] only needed some bearings, GT2 belts and pulleys to complete the upgrade. For those wanting to upgrade their old Printrbot Simple machines, [jason] guides you through the whole process via some detailed photographs and listing out the gotcha’s that you need to be careful about.

Rebraining An LED Marquee With A SparkCore

Wires? Where this LED scroller is going we don’t need wires. Well, except for power but everything needs power. The 90×7 LED marquee hangs over the entrance to NYC Resistor’s laser cutter room. Thanks to a Spark Core and a bit of work from [Trammell Hudson], the sign is working and attached to the network.

The original unit called for an RS485 connection for input. Other than that there wasn’t really a reason it had been collecting dust. Closer inspection of the internals proved that the display is driven exactly as you would expect: transistors for the rows and shift registers for the columns. Well, actually the columns are split into separate shift registers for the even and odd but that doesn’t complicate things too much. GPIO takes the seven row-driving transistors, two shift register clocks, data, latch, and enable for a total of twelve pins.

The Spark Core completely replaces the Atmel 80C32X2 and its RTC by pinging the network for UTC time synchronization once per day.

[via NYC Resistor]

Excel Password

Breaking Dridex Malware With Excel Macro Password Exploit

[Ronnie] recently posted a new chapter in his adventures in malware deconstruction. This time the culprit was an infected Excel spreadsheet file. The .xls file was attached to a phishing email claiming to be related to a tax rebate. With tax season in full swing, this type of phishing message would be likely to be opened by an inexperienced user.

[Ronnie] saved the file to a virtual machine to prevent his real workstation from getting infected. He then opened it up in Excel and noticed that it immediately attempted to run macros. A macro is essentially visual basic scripting that runs inside of the spreadsheet file. You can use it for simple automation, cell formatting, or do even more complicated tasks like reach out to external websites and pull information. This malware focused on the latter.

[Ronnie] used the alt + F11 shortcut to view the macros. Unfortunately the attackers had password protected them. [Ronnie] wouldn’t be able to view the macro code without knowing the password. Luckily, he learned of a surprisingly simple trick to completely bypass the macro password. He opened up the .xls file in Notepad++ and located three keys; CMG, DPB, and G. [Ronnie] then created and saved a new blank .xls document and password protected the macros with his own password. He opened up this new file in Notepad++ as well, and located those same three keys. He copied the keys from the new file into the old one, and saved the old file. This effectively changed the password of the malware file to the new one he had set for his new file. This is a nifty trick that apparently only works on the older .xls formats, not the newer .xlsx format.

After loading the macros, [Ronnie] quickly noticed that most of the code was obfuscated to make it difficult to analyze. There were, however, three named modules that reference possible sandbox evasion techniques. The malware first invokes these functions to detect the presence of a virtual machine or other type of sandbox. If it detects nothing, then the rest of the malware program is decoded and executed. [Ronnie] removed these checks and then executed the macro to verify that his change had worked.

The next step was to try to view the decoded instructions. The decoded gibberish was saved to a variable. The simplest way for [Ronnie] to view the contents of the variable was to have the program create a pop-up box that displayed the contents of that variable. After making this change and running the program again, he was able to see exactly what the malware was doing. The code actually invoked Powershell, downloaded a file from the Internet, and then extracted and executed that file. In the full write-up, [Ronnie] goes even further by downloading and analyzing the executable.