Amazing 3D-Scanner Teardown And Rebuild

0_10ea1b_776cdc71_origPour yourself a nice hot cup of tea, because [iliasam]’s latest work on a laser rangefinder (in Russian, translated here) is a long and interesting read. The shorter version is that he got his hands on a broken laser security scanner, nearly completely reverse-engineered it, got it working again, put it on a Roomba that was able to map out his apartment, and then re-designed it to become a tripod-mounted, full-room 3D scanner. Wow.

The scanner in question has a spinning mirror and a laser time-of-flight ranger, and is designed to shut down machinery when people enter a “no-go” region. As built, it returns ranges along a horizontal plane — it’s a 2D scanner. The conversion to a 3D scanner meant adding another axis, and to do this with sufficient precision required flipping the rig on its side, salvaging the fantastic bearings from a VHS machine, and driving it all with the surprisingly common A4988 stepper driver and an Arduino. A program on a PC reads in the data, and the stepper moves another 0.36 degrees. The results speak for themselves.

This isn’t [iliasam]’s first laser-rangefinder project, naturally. We’ve previously featured his homemade parallax-based ranger for use on a mobile robot, which is equally impressive. What amazes us most about these builds is the near-professional quality of the results pulled off on a shoestring budget.

Continue reading “Amazing 3D-Scanner Teardown And Rebuild”

Grant Anyone Temporary Permissions To Your Computer With SSH

This is a super cute hack for you Linux users out there. If you have played around with SSH, you know it’s the most amazing thing since sliced bread. For tunneling in, tunneling out, or even just to open up a shell safely, it’s the bees knees. If you work on multiple computers, do you know about ssh-copy-id? We had been using SSH for years before stumbling on that winner.

Anyway, [Felipe Lavratti]’s ssh-allow-friend script is simplicity itself, but the feature it adds is easily worth the cost of admission. All it does is look up your friend’s public key (at the moment only from GitHub) and add it temporarily to your authorized_keys file. When you hit ctrl-C to quit the script, it removes the keys. As long as your friend has the secret key that corresponds to the public key, he or she will be able to log in as your user account.

Continue reading “Grant Anyone Temporary Permissions To Your Computer With SSH”

Plywood Steals The Show From Upcycled Broken Glass Art Lamps

You can tell from looking around his workshop that [Paul Jackman] likes plywood even more than we do. And for the bases of these lamps, he sandwiches enough of the stuff together that it becomes a distinct part of the piece’s visuals. Some work with a router and some finishing, and they look great! You can watch the work, and the results, in his video embedded below.

The plywood bases also hide the electronics: a transformer and some LEDs. To make space for them in the otherwise solid blocks of wood, he tosses them in the CNC router and hollows them out. A little epoxy for the caps of the jars and the bases were finished. Fill the jars with colored glass, and a transparent tube to allow light all the way to the top, and they’re done.

Continue reading “Plywood Steals The Show From Upcycled Broken Glass Art Lamps”

33C3: Memory Deduplication, The Hacker’s Friend

At the 33rd annual Chaos Communications Congress, [Antonio Barresi] and [Erik Bosman] presented not one, not two, but three (3!!) great hacks that were all based on exploiting memory de-duplication in virtual machines. If you’re interested in security, you should definitely watch the talk, embedded below. And grab the slides too. (PDF)

Memory de-duplication is the forbidden fruit for large VM setups — obviously dangerous but so tempting. Imagine that you’re hosting VMs and you notice that many of the machines have the same things in memory at the same time. Maybe we’re all watching the same cat videos. They can save on global memory across the machines by simply storing one copy of the cat video and pointing to the shared memory block from each of the machines that uses it. Notionally separate machines are sharing memory. What could go wrong?

Continue reading “33C3: Memory Deduplication, The Hacker’s Friend”

Well, That Was Quick: Heng Lamp Duplicated

That didn’t take long at all! We covered a pretty cool lamp with a novel magnetic switch mechanism, and [msraynsford] has his version laser cut, veneered, a video posted on YouTube (embedded below), and an Instructable written up before we’d even caught our breath.

For those who missed it, the original Heng lamp is a beautiful design with a unique take on a magnetic switch. As with the original, the secret sauce is a switch inside that’s physically held closed by the two magnets. It’s a pretty clever mechanism that looks magical to boot.

[msraynsford]’s version replaces the floating spheres with floating cylinders, which are easier to fabricate in layers on a laser cutter, but otherwise the copy is fairly true to the aesthetics of the original. Pretty sweet!
Continue reading “Well, That Was Quick: Heng Lamp Duplicated”

Valentine’s Heart With Awesome Animations

January has drawn to a close, and for many of you that means: “Oh no! Less than two weeks’ time until Valentine’s day.” But for us here at Hackaday, it means heart-themed blinky projects. Hooray!

[Dmitry Grinberg] has weighed in with his version of the classic heart-shaped LED ring. It’s hard to beat the BOM on this one: just a microcontroller, five resistors, and twenty LEDs. The rest is code, and optionally putting the name of your beloved into the copper layer. Everything is there for you to download.

Continue reading “Valentine’s Heart With Awesome Animations”

Graphene? Soybean!

True graphene is a one-atom thick layer of carbon. It’s incredibly conductive, transparent, and of course thin. It’s one of those materials that, if it were only cheaper, would be used in everything from batteries to water filtration. Researchers from CSIRO in Australia have found a novel, dirt-cheap, and simple way to make graphene, and it’s hacker-friendly, for certain values of hacker.

The method is to take a sheet of polycrystalline nickel foil, spread a thin layer of soybean oil on it, and heat it up to 800° C for three minutes. It’s cooled off, slid off the foil, and it’s done. While 800° is a lot hotter than a standard toaster oven, their setup isn’t really all that much different. Notably lacking are things like esoteric gasses, partial vacuums, and the like. The nickel foil has some kind of catalytic role in the process — you should read the original if you’re more of a chemist than we are. Continue reading “Graphene? Soybean!”