GridSound – An Audio Workstation In Your Browser

If you’re into creating music, you’ll have a surprisingly large variety of open source options at your disposal, ranging from Audacity as rather simple audio editor to Ardour as a full-blown, studio-worthy DAW — and LMMS, Rosegarden, MusE etc. for anything in between. With [Thomas Tortorini]’s GridSound project, you’ll have one additional choice on your list now, except this one runs in your browser. So if you find yourself in a sudden moment of inspiration, all you’ll need is a browser and off you go.

From the feature set’s point of view, GridSound leans towards LMMS and offers a drum kit, piano roll, and synthesizer. It appears that you won’t be able to record real world instruments at this point, but it’s also a work in progress, so who knows what the future will bring. The code is available on GitHub and you can explore GridSound itself here — no login required, unless you want to save your work. Running in a browser, GridSound is naturally written in JavaScript and uses the Web Audio API to perform the actual audio tasks.

What’s impressive is that [Thomas] opted against any UI framework-of-the-week, but instead implemented everything from scratch in pure vanilla JavaScript. In fact, the entire code base seems to be self-contained without any third party dependencies, and that alone deserves some respect. Sure, JavaScript isn’t everybody’s cup of tea — “real developers use assembly” — so if you prefer something more physical, how about some cardboard music?

Give A Man A Phish, And You Entertain Him For A Day

With millions of phishing attempts happening daily, we’ve probably all had our fair share of coming across one. For the trained or naturally suspicious eye, it’s usually easy to spot them — maybe get a good chuckle out of the ridiculously bad ones along the way — and simply ignore them. Unfortunately, they wouldn’t exist if they weren’t successful enough in the big picture, so it might be a good idea to inform the targeted service about the attempt, in hopes they will notify users to act with caution. And then there’s [Christian Haschek], who decided to have some fun and trying to render the phished data useless by simply flooding it with garbage.

After his wife received a text message from “their bank”, [Christian] took a closer look at the URL it was pointing to, and found your typical copy of the real login form at a slightly misspelled address. As the usual goal is to steal the victim’s credentials, he simply wrote a shell script that sends random generated account numbers and PINs for all eternity via cURL, potentially lowering any value the attackers could get from their attempt.

As the form fields limit the input length of the account number and PIN, he eventually wondered if the server side will do the same, or whether it would crash if longer data is sent to it. Sadly, he’ll never know, because after he modified the script, the site itself returned a 404 and had disappeared.

In the quest against phishing attacks, this should count as a success, but as [Christian] seemed to enjoy himself, he yearned for more and decided to take a look at a similar attempt he saw mentioned earlier on Reddit. Despite targeting the same bank, the server-side implementation was more sophisticated, hinting at a different attack, and he definitely got his money worth this time — but we don’t want to give it all away here.

Rest assured, [Christian Haschek] continues the good fight, whether by annoying attackers as he did with ZIP-bombing random WordPress login attempts or battling child pornography with a Raspberry Pi cluster. Well, unless he’s busy hunting down an unidentified device hooked up in his own network.

(Banner image by Tumisu)

A Song Of Fog And Fire – Taking A Look Inside A Rubens’ Tube

The dark winter months are still a bit ahead of us, but with night returning even to the northernmost places, it might be a good time to get your next mood lighting project started. Despite the ubiquitousness of LED strips, cave-time nostalgia makes it hard to beat the coziness of an actual flame here — well, assuming it’s a controlled flame. While modern LED candles do a decent enough job to fool you from a distance, there’s one apparatus they’ll have a hard time to replicate though: the Rubens’ tube. Tired of their usual straight pipe construct, [RyanMake] added some twists and turns to the concept and created a flexible Ruben’s tube made from semi-rigid aluminum ducts.

If you’re not familiar with the Rubens’ tube, it’s a combination of science, fun, and danger to visualize standing waves with fire by attaching a loudspeaker to a pipe with equally spaced holes that’s filled with flammable gas, and light it up. As the resulting visual effect depends on the audio signal’s wavelength, and by that the length of the tube itself, [RyanMake]’s flexible duct approach adds some variety to the usual fixed-length pipe versions of it. But that’s not all he did. After seeing the flames in person, he got curious about what’s actually going on inside that tube and decided to build another one, this time using a clear plastic tube and a fog machine. While the fog escapes the tube rather unimpressively (and could hardly compete with fire anyway), it gives a nice insight of what’s going on inside those tubes. See for yourself in the videos after the break.

Of course, no experiment is truly conducted without failure, and after seeing his first tube go up in flames several times, you should probably hold on to building one as decorative item for indoors. On the other hand, if shooting fire is what you’re looking for, you might be interested in this vortex cannon. And for some more twists on a standard Rubens’ tube, check out the two-dimensional Pyro Board.

Continue reading “A Song Of Fog And Fire – Taking A Look Inside A Rubens’ Tube”

Window In The Skies: Why Everyone Is Going To Mars This Month

Mars may not be the kind of place to raise your kids, but chances are that one day [Elton John]’s famous lyrics will be wrong about there being no one there to raise them. For now, however, we have probes, orbiters, and landers. Mars missions are going strong this year, with three nations about to launch their rockets towards the Red Planet: the United States sending their Perseverance rover, China’s Tianwen-1 mission, and the United Arab Emirates sending their Hope orbiter.

As all of this is planned to happen still within the month of July, it almost gives the impression of a new era of wild space races where everyone tries to be first. Sure, some egos will certainly be boosted here, but the reason for this increased run within such a short time frame has a simple explanation: Mars will be right around the corner later this year — relatively speaking — providing an ideal opportunity to travel there right now.

In fact, this year is as good as it gets for quite a while. The next time the circumstances will be (almost) as favorable as this year is going to be in 2033, so it’s understandable that space agencies are eager to not miss out on this chance. Not that Mars missions couldn’t be accomplished in the next 13 years — after all, several endeavors are already in the wings for 2022, including the delayed Rosalind Franklin rover launch. It’s just that the circumstances won’t be as ideal.

But what exactly does that mean, and why is that? What makes July 2020 so special? And what’s everyone doing up there anyway? Well, let’s find out!

Continue reading “Window In The Skies: Why Everyone Is Going To Mars This Month”

The rust language logo being branded onto a microcontroller housing

Will 2020 Be The Year Of Rust In The Linux Kernel?

One problem with modern programming languages is the reach their overly enthusiastic early adopters have nowadays thanks to the internet. As a result, everyone else’s first encounter with them are oftentimes some crude, fanboyish endeavors to rewrite every single established software project in that shiny new language — just because — which may leave an off-putting taste behind. However, Rust certainly seems to have outgrown this state by now, and with its rising popularity within the general developer population, it’s safe to say it will stick around. Will it fully replace C one day? Probably not, but there’s a big chance for coexistence, and [Nick Desaulniers] got the ball rolling for that within the Linux kernel.

Now, before you storm off pledging your allegiance to C by finding a new operating system: nothing is happening yet. [Nick] simply tested the waters for a possible future of Rust within the Linux kernel code base, which is something he’s planning to bring up for discussion in this year’s Linux Plumbers Conference — the annual kernel developer gathering. The interesting part is [Linus Torvalds]’s respone on the LKML thread, which leaves everyone hoping for a hearty signature Rust rant akin to his C++ one disappointed. Instead, his main concern is that a soft and optional introduction of the support in the build system would leave possible bugs hidden, and therefore should be automatically enabled if a Rust compiler is present — essentially implying that he seems otherwise on board.

We’ll see what comes of it, but with Rust language team lead [Josh Triplett] stating that enhancements benefiting and advancing a kernel integration are certainly imaginable for Rust itself, we might see interesting collaborations coming up in the near future. If you don’t want to wait for that and use Rust already today in a user-land driver, check out this 35c3 talk. And if that doesn’t go far enough for you, here’s a whole (non-Linux) kernel written in Rust.

A Shrine For All The 555 Lovers

For many of our readers, the classic 555 timer holds a special place in their heart, and cursed be the fool who dares to use an Arduino in its place. For the seriously devoted ones, or those who simply like a novelty decorative item, [acerlaguinto7] built just the right thing: a giant, actually functional, cardboard 555 timer IC.

Taking all the measurements of the original IC, [acerlaguinto7] scaled it up by factor 22 and started cutting out pieces of cardboard — also considering the orientation notch — and added the markings to emulate TI’s NE555P. Next he took a bunch of aluminum cans apart and shaped them into the pins, again staying as close as possible to the original. To top it all off, he put an actual NE555 inside the giant counterpart, and hooked it up to the soda can pins, turning it into a fully operational, oversized timer IC.

Obviously, giant conductive pins like that scream for some dead bug blinky light that even the shakiest of hands could manage to solder, and [acerlaguinto7] certainly delivers, as you can see in the video after the break. One nifty way we could see this taken further would be integrating this breadboard implementation as replacement for the 555 inside — or then just connect it to the giant Raspberry Pi.

Continue reading “A Shrine For All The 555 Lovers”

Mmm… Obfuscated Shell Donuts

In case you grow tired of clear-written, understandable code, obfuscation contests provide a nice change of scenery, and trying to make sense of their entries can be a fun-time activity and an interesting alternative to the usual brainteasers. If we ever happen to see a Simpsons episode on the subject, [Andy Sloane] has the obvious candidate for a [Hackerman Homer] entry: a rotating ASCII art donut, formatted as donut-shaped C code.

The code itself actually dates back to 2006, but has recently resurfaced on Reddit after [Lex Fridman] posted a video about it on YouTube, so we figured we take that chance to give some further attention to this nifty piece of art. [Andy]’s blog article goes in all the details of the rotation math, and how he simply uses ASCII characters with different pixel amounts to emulate the illumination. For those who prefer C over mathematical notation, we added a reformatted version after the break.

Sure, the code’s donut shape is mainly owed to the added filler comments, but let’s face it, the donut shape is just a neat little addition, and the code wouldn’t be any less impressive squeezed all in one line — or multiple lines of appropriate lengths. However, for the actual 2006 IOCCC, [Andy] took it a serious step further with his entry, and you should definitely give that one a try. For some more obfuscated shell animations, check out the fluid dynamics simulator from a few years back, and for a more recent entry, have a look at the printf Tic Tac Toe we covered last month.

Continue reading “Mmm… Obfuscated Shell Donuts”