Hackaday Podcast 137: Maximum Power Point, Electric Car Hacking, Commodore Drive Confidential, And Tesla Handles

Hackaday editors Mike Szczys and Elliot Williams marvel at a week packed full of great hardware hacks. Do you think the engineers who built the earliest home computers knew that their work would be dissected decades later for conference talks full of people hungry to learn the secret sauce? The only thing better than the actual engineering of the Commodore floppy drive is the care with which the ultimate hardware talk unpacks it all! We look upon a couple of EV hacks — one that replaces the inverter in a Leaf and the other details the design improvements to Telsa’s self-hiding door handles. Before we get to medieval surgery and USB-C power delivery, we stop for a look at a way to take snapshots of Game Boy gameplay and an electric plane engine that looks radial but is all gears.

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download (52 MB)

Continue reading “Hackaday Podcast 137: Maximum Power Point, Electric Car Hacking, Commodore Drive Confidential, And Tesla Handles”

VFD clock with wood case

Captivating Clock Puts Endangered Displays On Display

The DT-1704A VFD is straight from the 1976 Radio Shack Catalog
The DT-1704 VFD as seen the 1976 Radio Shack Catalog. The “A” version has no substrate, making the VFD fully clear for added effect.

When you have a small stock of vacuum fluorescent displays (VFDs) straight out of the 1976 Radio Shack catalog, you might sit around wondering what to do with them. When [stepawayfromthegirls] found out that his stash of seven DT-1704A tubes may be the last in existence, there was no question. They must be displayed! [stepawayfromthegirls]’ mode of display is this captivating clock build. Four VFDs with their aqua colored elements are set against a black background in a bespoke wooden case. Looking under the hood, the beauty only increases.

VFD Clock Wiring is almost as stunning as the clock itself
VFD Clock Wiring is nearly as stunning as the clock itself.

Keeping the build organized was not an easy task because the tubes are designed in such a way that each segment must be individually controlled. The needed I/O duties are provided by an Arduino Mega 2560 Pro (Embed). 28 2n3904’s each with their two resistors serve as drivers for each VFD segment.

The output of a  24 V AC transformer left over from the 1980s is rectified to 34 V of DC power which is then regulated to 27 V to power the tubes. Switching power supplies provide 6 V to the Arduino and 1.3 V to the filaments. If you look closely, you’ll also see a GPS module so that the clock doesn’t need to be set. To future-proof the clock against daylight savings time adjustments, a potentiometer on the back of the case allows the user to set custom hour offsets without editing any code.

We think the end result is a remarkably clean, simple, and elegant clock that he will be proud of for many years to come!

If VFD clock builds are your thing, then you’ll enjoy this Network Attached VFD Clock and a Mini VFD Clock with floating display.  And while not VFD based, we’d be silly to leave out the Boat Anchor Nixie Clock with enough knobs, switches, and buttons to delight even the fussiest of hacker.

 

This Week In Security: Somebody’s Watching, Microsoft + Linux, DDoS

In case you needed yet another example of why your IoT devices shouldn’t be exposed to the internet, a large swath of Hikvision IP Cameras have a serious RCE vulnerability. CVE-2021-36260 was discovered by the firm Watchful_IP in the UK. In Hikvision’s disclosure, they refer to the problem as a command injection vulnerability in the device’s web interface. The vuln is pre-authentication, and requires no user interaction. This could be something as simple as a language chooser not sanitizing the inputs on the back-end, and being able to use backticks or a semicolon to trigger an arbitrary command.

Now you’re probably thinking, “I don’t use Hikvision cameras.” The sneaky truth is that a bunch of cameras with different brand names are actually Hikvision hardware, with their firmware based on the Hikvision SDK. The outstanding question about this particular vulnerability is whether it’s present in any of the re-labelled cameras. Since the exact vulnerability has yet to be disclosed, it’s hard to know for sure whether the relabeled units are vulnerable.  But if we were betting… Continue reading “This Week In Security: Somebody’s Watching, Microsoft + Linux, DDoS”

[Look Mum No Computer] sits inside his new museum of obsolete technology and synth oddities.

This (Obsolete Technology) Museum Is (Not) Obsolete

You know, we’re not sure how this escaped our attention for so long. Blame it on the summer heat. Did you know that [Look Mum No Computer] opened a museum of obsolete technology a few weeks ago?

Inside a new museum of obsolete technology and synth oddities.This Museum is (Not) Obsolete is located by the seaside in the Ramsgate section of Kent, England, where you’ll also find the Micro Museum, a collection of computing and video game history. [LMNK] says it took 10 months to build the museum, which is a maze of vintage delights including decades of computers and computer accessories, signal generators, VFDs, vacuum tubes, old phone equipment, and 50 years’ worth of 150-in-one electronics kits. This list doesn’t even sort of start to scratch the surface.

Around every turn there are forgotten technological gems and never-heard-ofs, plus the space is peppered with [LMNK]’s own superb synth creations. (Who could forget the Furby Organ?) The goal is to make it as interactive as possible, and to keep growing the collection. So far, [LMNK] has welcomed visitors of all backgrounds and ages, which is exactly what he was after. Can’t quite make it to Ramsgate? Us either. Do what we did and take the video tour below.

If you can get there, you might want to check out the National Museum of Computing, too.

Continue reading “This (Obsolete Technology) Museum Is (Not) Obsolete”

Automatic guitar tuning robot

Handheld Bot Takes The Tedium Out Of Guitar Tuning

Even with fancy smartphone apps and custom-built tuners, tuning a guitar can be a tedious process, especially for the beginner. Pluck a string, figure out if the note is sharp or flat, tighten or loosen accordingly, repeat. Then do the same thing for all six strings. It’s no wonder some people never get very far with the guitar.

Luckily, technology can come to the rescue in the form of this handy open-source automatic guitar tuner by [Guyrandy Jean-Gilles]. The tuner has a Raspberry Pi Pico inside, with a microphone attached to the ADC. The program running on the Pico listens for the sound of a plucked string and determines whether the note is sharp or flat. The Pico then drives a small DC gear motor in the appropriate direction, which turns the peg the right way to bring the string into tune. The tuner makes ample use of 3D-printed parts, STLs for which are included in the project repo. [Guyrandy] has also made some updates to the project to make the tuner a little easier to use.

While there’s an affordable commercial version of this — upon which [Guyrandy] based his design — we really like the fact that he rolled his own here, and made the design freely accessible to everyone. We also like the idea that guitarists who can’t use tuners requiring visual feedback can use this, too — just like this one.

[via r/raspberry_pi]