Hackaday Podcast 127: Whippletree Clamps, Sniffing Your Stomach Radio, Multimeter Hum Fix, And C64 Demo; No C64

Hackaday editors Mike Szczys and Elliot Williams help you get caught up on a week of wonder hacks. We don’t remember seeing a floppy drive headline the demoscene, but sure enough, there’s a C64 demo that performs after the computer is disconnected. What causes bench tools to have unreliable measurements? Sometimes a poor crystal choice lets AC ruin the party. We dive into the ongoing saga of the Audacity open source project’s change of ownership, and talk about generator exciter circuits — specifically their role in starting grid-scale generators from shutdown.

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download (60 MB or so.)

Places to follow Hackaday podcasts:

Continue reading “Hackaday Podcast 127: Whippletree Clamps, Sniffing Your Stomach Radio, Multimeter Hum Fix, And C64 Demo; No C64”

Inside A 20-Watt Traveling Wave Tube Amplifier From Apollo

When the Apollo astronauts made their way to the Moon, their communication equipment had a transmission power of a mere 20 W, which the sensitive receivers back on Earth managed to pick up. But this isn’t just any amplifier, it’s a Traveling Wave Tube amplifier (TWT), as [Ken Shirriff] explains in a recent article.

The most fascinating thing about these TWTs isn’t just their role during the Apollo missions, but the fact that even today this type of vacuum tube is still among the most efficient and compact types of RF amplifier. As a result today’s high-tech satellites still commonly feature these devices.

As always, [Ken] entertains and enlightens us with how the TWT and the rest of the amplifier system worked.

 

This Week In Security: REvil Goes Dark, Kaseya Cleanup, Android Updates, And Terrible Firmware

The funniest thing happened to REvil this week. Their online presence seems to have disappeared.
Their Tor sites as well as conventional sites all went down about the same time Tuesday morning, leading to speculation that they may have been hit by a law enforcement operation. This comes on the heels of a renewed push by the US for other countries, notably Russia, to crack down on ransomware groups operating within their borders. If it is a coordinated takedown, it’s likely a response to the extremely widespread 4th of July campaign launched via the Kaseya platform. Seriously, if you’re going to do something that risks ticking off Americans, don’t do it on the day we’re celebrating national pride by blowing stuff up.

Speaking of Kaseya, they have finished their analysis, and published a guide for safely powering on their VSA on-premise hardware. Now that the fixes are available, more information about the attack itself is being released. Truesec researchers have been following this story in real time, and even provided information about the attack back to Kaseya, based on their observations. Their analysis shows that 4 separate vulnerabilities were involved in the attack. First up is an authentication bypass. It takes advantage of code that looks something like this: Continue reading “This Week In Security: REvil Goes Dark, Kaseya Cleanup, Android Updates, And Terrible Firmware”

Cracking A GBA Game With NSA Tools

[Wrongbaud] is a huge fan of Japanese kaiju-style movies, including Godzilla and King Kong. In honor of the release of a new movie, he has decided to tackle a few projects to see how both of these monsters can hold their own against other legendary monsters. In this project, he is using Ghidra, named after another legendary kaiju, against the password system of the Game Boy Advance game Kong: King of Atlantis.

Since this project is a how-to, [wrongbaud] shows how to search Ghidra for existing scripts that might already have the functionality needed for GBA analysis and emulation. When not, he also illustrates how to write scripts to automate code analysis, and then moves on to cracking the level password system on the game.

The key to finding the passwords on this game was looking for values in the code that were seven characters long, and after some searching [wrongbaud] is finally able to zero in on the code responsible for handling passwords. Once found a brute force method was automated to find viable passwords, and from there the game was officially pwned. For anyone interested in security, reverse engineering, or just the way that binaries work, it’s quite the detailed breakdown. Of course, it’s not the only example we have seen that uses this software tool to extract passwords.

Repair Hack Saves Tesla Owner From Massive Bill

As expensive as a new car is, it almost seems like a loss leader now to get you locked into exorbitantly expensive repairs at the dealership’s service department. That’s the reason a lot of us still try to do as much of the maintenance and repairs on our cars as possible — it’s just too darn expensive to pay someone else to do it.

Case in point: this story about a hapless Tesla owner who faced a massive repair bill on his brand new car. [Donald]’s tale of woe began when he hit some road debris with his two-wheel-drive Model 3. The object hit penetrated the plastic shield over the front of the battery pack, striking a fitting in the low-pressure battery cooling plumbing. The plastic fitting cracked, causing a leak that obviously needed repair. The authorized Tesla service center gave him the bad news: that he needed a new battery pack, at a cost of $16,000. Through a series of oversights, [Donald]’s comprehensive insurance on the car had lapsed, so he was looking at funding the repair, approximately half the cost of a new Model 3, out of pocket.

Luckily, he got in touch with [Rich Benoit] of The Electrified Garage, one of the few independent garages doing Tesla repairs and customizations. The video below is queued up to the part where they actually do the repair, which is ridiculously simple. After cutting off the remains of the broken fitting with a utility knife, [Rich]’s tech was able to cut a thread in both the fitting and the battery pack, and attach them together with a brass nipple from the plumbing section of the local home store. The total bill for the repair was $700, which still seems steep to us, but a far cry from what it could have been.

Hats off to [Rich] and his crew for finding a cost-effective workaround for this issue. And if you think you’ve seen his EV repairs before, you’re right. Of course, some repairs are more successful than others.

Continue reading “Repair Hack Saves Tesla Owner From Massive Bill”