Just about any appliance comes in an internet enabled version nowadays. However, even the oldest gear can be switched on and off with an Internet connected power socket. [Bill] is in the process of automating his home, and found some old radio controlled power sockets that badly needed to join the 21st Century. Hacking ensued.
The first set of switches [Bill] came across were easy to work with. Eager to keep things as functional as possible, ESP8266s with Tasmota firmware were wedged into the enclosures. With a bit of circuit sleuthing, [Bill] was able to set up the switches to respond to commands from both the ESP8266 as well as the original push buttons and radio remote.
[Bill] later came across some black switches, which were not up to his standards. These switches were gutted entirely, being used only for their mains plug and enclosure. The relays inside were replaced with 5V versions which were easier to trigger from the ESP8266’s outputs.
[Bill[ readily admits that the cost benefits over buying off-the-shelf Sonoff modules don’t really add up, but good hackers rarely let such concerns get in the way of a fun project. Around these parts, we see plenty of hacks to automate your house – like this zero-intrusion light switch mod. Happy hacking!
My first full day in China was spent at Electronica, an absolutely massive conference showcasing companies involved in electronics manufacturing and distribution. It’s difficult to comprehend how large this event is, filling multiple halls at the New International Expo Center in Shanghai.
I’ve seen the equipment used for PCB assembly many times before. But at this show you get to see another level below that, machines that build components and other items needed to build products quickly and with great automation. There was also big news today as the 2019 Hackaday Prize China was launched. Join me after the break for a look at this equipment, and more about this new development for the Hackaday Prize.
Continue reading “Hacker Abroad: Massive Conference Brings Big News of Hackaday Prize China”
At the climax of 1983’s “WarGames”, the War Operation Plan Response (WOPR) computer famously opines “The only winning move is not to play” when presented with a barrage of no-win scenarios depicting global thermonuclear war. While the stakes aren’t quite as high when it comes to putting on a brand new hacker convention, there’s certainly enough pitfalls that most of us would take WOPR’s advice and never even try. But for those who attended the inaugural WOPR Summit in Atlantic City, it was clear that not only did the team behind it have the tenacity to play the game, but that they managed to prove their supercomputer namesake wrong.
That’s not to say there isn’t room for improvement going forward, but it was hard not to be impressed by such a strong initial showing. The WOPR Summit organizers not only had to contend with the myriad of things that could go wrong, but they had to deal with what actually did go wrong; such as a sizable storm hitting the New Jersey coast just as the event got rolling. Yet from the attendees perspective the weekend-long event went off without a hitch, and everyone I spoke to was excited for what the future holds for this brand-new East Coast event.
It’s never easy to capture 20+ hours worth of talks, workshops, and hands-on projects into a few articles, but we do our best for the good readers of Hackaday. Below you’ll find just a few of the highlights from the first-ever WOPR Summit, but it’s nothing quite like attending one of these events in person. This far out we don’t know when and where the next WOPR Summit will take place, but you can be sure that Hackaday will be there; and so should you.
Continue reading “First WOPR Summit Finds the Winning Move”
Combination locks! They’re great if you’re skilled at remembering arbitrary strings of numbers, and have a dramatic flair that’s made them a famous part of many a heist movie. They come in a wide variety of styles, and are vulnerable to a different set of attacks than the more typical pin-tumbler locks used on a household basis. If you fancy tinkering with a combination lock, why not 3D print one yourself?
It goes without saying that any lock you 3D print is going to have issues with strength. Such a lock should not be used to protect anything of real value, but it could be handy to prevent the kids getting at the Halloween candy you’re saving for October.
Regardless, 3D printing and assembling your own combination lock is a great way to learn about how they work. It’s a fun project that is also much easier than sourcing and disassembling the real thing. For a greater understanding of the underlying mechanism, this video should make the basic operation clear.
That’s not all 3D printing can offer to the locksport community, of course. You can always print your own keys, too. Video after the break. Continue reading “3D Printing a Combination Lock”
“It was a cold and windy night, but the breeze of ill omen blowing across the ‘net was colder. The regular trickle of login attempts suddenly became a torrent of IP addresses, all trying to break into the back-end of the Joomla site I host. I poured another cup of joe, it was gonna be a long night.”
Tech noir aside, there was something odd going on. I get an email from that web-site each time there is a failed login. The occasional login attempt isn’t surprising, but this was multiple attempts per minute, all from different IP addresses. Looking at the logs, I got the feeling they were pulling usernames and passwords from one of the various database dumps, probably also randomly seeding information from the Whois database on my domain.
Continue reading “What to Do When the Botnet Comes Knocking”
March 14th is “Pi Day”, for reasons which should be obvious to our more mathematically inclined readers. As you are not reading this post on March 14th, that must mean we’re either fashionably late to Pi Day 2019, or exceptionally early for Pi Day 2020. But in either event, we’ve got a hack for you that celebrates the day using two things we have it on good authority most hackers overindulge in: food and needless complexity.
This project comes from [Mike MacHenry], and it’s just as straightforward as it looks. Put simply, he’s using a load cell connected to the Raspberry Pi to weigh an actual pie and monitor its change over time. As the pie is consumed by hungry hackers, a pie graph (what else?) is rendered on the attached screen to show you how much of the dessert is left.
One might say that this project takes a three dimensional pie and converts it to a two dimensional facsimile, but perhaps that’s over-analyzing it. In reality, it was a fun little hack [Mike] put together just because he thought it would be fun. Which is certainly enough of a motive for us. More practically though, if you’re looking for a good example for how to get a load cell talking to your non-edible Raspberry Pi, you could do worse than checking this out.
We’ve also got to give [Mike] extra credit for including the recipe and procedure for actually baking the apple pie used in the project. While we’re not 100% sure the MIT license [Mike] used is actually valid for foodstuffs, but believe it or not this isn’t the first time we’ve seen Git used in the production of baked goods.
Potentially, one of the great things about having a device connected to the network is that you can update it remotely. However, how do you make that happen? If you use the Arduino setup for the ESP8266 or ESP32, you might try [scottchiefbaker’s] library which promises to make the process easy.
Adding it looks to be simple. You’ll need an include, of course. If you don’t mind using port 8080 and the path /webota, you only need to call handle_webota() from your main loop. If you want to change the defaults, you’ll need to add an extra call in your setup. You also need to set up a few global variables to specify your network parameters.
Continue reading “Library Makes ESP Over the Air Updates Easy”