Makerpipe Turns Conduit Into Structures

At the risk of stating the obvious, building big things can be difficult. Sure, parts that fit on the bed of a 3D printer are easy to make, if not particularly fast, and scaling up from there is possible. But if you need a long beam or structural element, printing makes little sense; better to buy than build in that case. The trouble then becomes, how do you attach such parts together?

Enter Makerpipe. This South Carolina company, recently out of a crowdfunding campaign, makes a range of structural connectors and fittings for electrical mechanical tubing, or EMT, the galvanized steel conduit used in the electrical trades. EMT is widely available in multiple sizes and is relatively cheap, although we have noticed that the price here has ticked up quite a bit over the last couple of years. It also has the advantage of being available off-the-shelf at any big-box home improvement store, meaning you have instant access to a fantastic building material.

Makerpipe’s bolt-together couplings let you turn pieces of EMT, easily cut with a hacksaw or pipe cutter, into structures without the need for welding. Yes, you can do the same with extruded aluminum, but even if you’re lucky enough to live near a supply house that carries extrusions and the necessary fittings and is open on Saturday afternoon, you’ll probably pay through the nose for it.

Makerpipe isn’t giving their stuff away, and while we normally don’t like to feature strictly commercial products, something that makes building large structures easier and faster seems worth sharing with our community. We’ve done our share of fabricobbling together EMT structures after all, and would have killed for fittings like these.

Continue reading “Makerpipe Turns Conduit Into Structures”

This Week In Security: Password Sanity, Tank Hacking, And The Mystery 9.9

It looks like there’s finally hope for sane password policies. The US National Institue of Standards and Technology, NIST, has released a draft of SP 800-63-4, the Digital Identity Guideline.

There’s password guidance in there, like “SHALL NOT impose other composition rules (e.g., requiring mixtures of different character types) for passwords” and “SHALL NOT require users to change passwords periodically.” NIST approved passwords must be at least 8 characters long, with a weaker recommendation of at least 15 characters. Security questions like name of first pet get the axe. And it’s strongly recommended that all ASCII and Unicode characters should be acceptable for passwords.

This is definitely moving in the right direction. NIST guidelines are only binding for government services and contractors, though they do eventually get picked up by banks and other industries. So there’s hope for sane password policies eventually.

Tank Hacking

Researchers at Bitsight are interested in infrastructure security, and they opted to take a closer look at Automatic Tank Gauging (ATG) systems. Those are found at gas stations, as well as any other facility that needs automated monitoring of liquids or gasses in a tank. There is an actual ATG message format, originally designed for RS-232 serial, and woefully unprepared for the interconnected present. The protocol allows for an optional security code, but it maxes out at only six alpha-numeric characters.

Among the vulnerabilities getting announced today, we have a pair of CVSS 10 command injection flaws, a quartet of 9.8 authentication bypass flaws, with one of those being a hardcoded credential — AKA a backdoor. The other CVSS9+ flaw is a SQL injection, with a trio of slightly less serious flaws. Continue reading “This Week In Security: Password Sanity, Tank Hacking, And The Mystery 9.9”

British Commuters Get Their WiFi Hacked

As if there weren’t enough worrying global news stories already, today the British press and media have been full of a story involving the public WiFi networks at some major railway stations. Instead of being faced with the usual don’t-be-naughty terms and conditions page, commuters were instead faced with a page that definitely shouldn’t have been there.

Hackaday readers will immediately have guessed what is likely to have happened. This is probably more of a compromise of the page than of the network itself, and, indeed, the BBC are reporting that it may have come via an administrator account at Network Rail’s er… network provider. Fortunately, it seems the intent was to spread a political message rather than malware, so perhaps those travelers got off lightly. The various companies involved have all got the proverbial egg on their faces, and we’re glad we don’t work in the IT department concerned.

Continue reading “British Commuters Get Their WiFi Hacked”

Blinking An LED Passively

It is a pretty common first project to use an Arduino (or similar) to blink an LED. Which, of course, brings taunts of: you could have used a 555! You can, of course, also use any sort of oscillator, but [Mustafa] has a different approach. Blinking an LED with three resistors and a capacitor. Ok, ok… one of the resistors is a light-dependent resistor, but still.

In reality, this is a classic relaxation oscillator. The capacitor charges until the LED lights. This, however, causes the capacitor to discharge, which eventually turns off the LED, and the process starts again.

There is one wrinkle that could be considered a feature. In daylight, the capacitor will stay in the off state, so the blinking only occurs in darkness. Of course, the resistor also has to have a sufficient view of the LED. You might use this as a safety light that only works in the dark.

A simple circuit, but it just goes to show that we tend to forget the simple solutions in a world where a computer costs less than a dollar.

Of course, you can get a chip whose sole purpose is to blink LEDs. We always like examples of doing more with less.

Continue reading “Blinking An LED Passively”