Adding Auto-fire To A Computer Mouse

[Peter Skaarup’s] been re-living the past by playing old-school games in DOSBox. He’s using a mouse as the controller but longed for the auto-fire button that many joysticks used to have. Instead of looking around for a gamepad with this feature he decided to add an auto-fire button to the mouse. He incorporated a PIC 10F200, along with a momentary push switch and a transistor. The push switch enables the autofire feature, causing the transistor to short the left mouse button about seventeen times a second. Problem solved, and with a couple of other pins on the microcontroller there’s room for this project to grow.

Interested in an auto-fire feature for your gaming console? Perhaps this Xbox 360 rapid fire mod will give you some inspiration.

Linux-Fu: Automation For Chrome And The Desktop By Matching Screenshots

I will be the first to admit it. This is almost not — at least not specifically — a Linux article. The subject? An automation tool for Chrome or Firefox. But before you hit the back button, hear me out. Sure, this Chrome plugin started out as a tool to automatically test web pages and automate repetitive tasks in the browser. However, it can extend that power to all programs on your computer. So, in theory, you can use it to graphically build macros that can interact with desktop applications in surprisingly sophisticated ways. In theory, anyway; there are a few problems.

The program has a few different names. Most documentation says UI Vision RPA, although there are some references to Kantu, which appears to be an older name. RPA is an acronym for Robotic Process Automation, which is an industry buzz word.

Let’s take it for a spin and see what it’s all about.

Continue reading “Linux-Fu: Automation For Chrome And The Desktop By Matching Screenshots”

Rapid Fire Mod For A Wireless Mouse

Rapid Fire Wireless Mouse

Sometimes changing your computer mouse can be uncomfortable for a while until you get used to the replacement. It may also take some time to get used to new features or the lack of features the new mouse has. [Jon] bought an awesome wireless mouse that he really likes but it is missing one critical feature: rapid fire for gaming. He previously modded his old wired mouse to have a rapid fire button using a 555 timer. That worked fine as the mouse ran off the USB’s 5 volts, and that’s the voltage the 555 timer needed. The new wireless mouse has a 1.5 volt battery and can not support the 555 timer. What’s a gamer to do?

[Jon] searched around the ‘net but could not find any wireless rapid fire mods. Eventually, he did find a low-voltage variation called the LMC555 and ordered a few for his project. The new wireless mouse was taken apart in order to find out how the mouse buttons work. In this case, the signal pin is pulled low when the mouse button is pushed. Now that it is known how the mouse button works, just a couple of resistors, a capacitor, an NPN transistor and a push button switch are all that are necessary to finish up this mod. When the push button is pressed, the LMC555 timer activates the transistor in order to ground the mouse button signal pin. This happens to the tune of 1236 times a minute! That is a lot of rapid firing.

The few components were soldered up neatly and packed into the limited spare area inside the mouse. A hole drilled in the side of the mouse’s housing holds the new rapid fire push button in an ergonomically pleasing location.

Earlier, we mentioned [Jon] has done this mod before on a wired mouse. He learned about that project here on Hackaday. Check it out if your wired mouse is craving a rapid fire button.

Video after the break…

Continue reading “Rapid Fire Mod For A Wireless Mouse”

555s For Your Mouse And R/C Airplane

[lenny] decided to build a 555-based auto-firing mouse based on a 555 after seeing a similar PIC-based project we posted earlier. Lenny’s version is self-contained in one mouse without requiring a second mouse to act as the rapid-fire button. It uses only a handful of components, costs less than $5 to build, and doesn’t require any programming.

But then, [wfdudley] shakes things up a bit. He added a 4022 counter IC and some diodes to act as logical “OR” gates in order to create a unique blinking pattern (short-short-long) for the lights on a friend’s RC airplane. While this project involves more components, it’s definitely a trickier problem to solve with a 555 timer IC. We love seeing people choosing simplicity in design over popular off-the-shelf microcontroller frameworks as these two have done.

Don’t forget, the 555 Design Contest is still going strong, and you’ve got the entire month of February to submit your awesome designs. We wanted to highlight two of the more clever 555-based hacks that we’ve had in our backlog for a while, though.

Patching Into An Optical Mouse With A PIC

[MikyMouse] cracked open a couple different optical mice (or is it mouses?) in order to play with the data communications coming off of the chips inside. Once he figured out the protocol, it wasn’t too hard to grab the data for use in his own projects. The chip that controls the mouse is one of two he looked at, either an ADNS2051 or an ADNS2610. They run at 5V and use serial communications via SDIO and SCK pins. The clip after the break shows the test apparatus displaying coordinates of the mouse on an LCD screen. This seems like an easy and inexpensive way to get position data from your project. The only tricky part is going to be deciding when and how to to zero out the location.

Not interested in this type of mouse hack? Can we spark your curiosity with this mouse auto-fire project?

Continue reading “Patching Into An Optical Mouse With A PIC”

Hackaday Podcast Episode 300: The Dwingeloo 25 M Dish, A Dead-Tech Twofer, And Deconstructing PCBs

This week on the big 300th episode, Hackaday’s Elliot Williams and Kristina Panos teamed up to bring you the latest news, mystery sound, and of course, a big bunch of hacks from the previous week. So basically, business as usual.

First up in the news: it’s time for the Hackaday Europe 2025 call for proposals! Do you have a tale of hardware, firmware, or software that must be shared with the Hackaday crowd? Then this is your chance to regale us with a 20- or 40-minute talk. You know we love to hear new voices, so be sure to consider proposing a talk.

On What’s That Sound, it’s a results show week. Congratulations to [Kelvin] who was one of many that correctly identified it as the Wii startup sound. Kristina will just be over here with her Pikachu64 with the light-up cheeks.

Then it’s on to the hacks and such beginning with a rather nice reverse-engineering of the PS1, which surprisingly did it with a two-sided board. Then it’s on to a smartphone home server, magic eye images in a spreadsheet, and the math behind the music of 80s. Finally, we talk about disc cameras, the hovercraft revolution, and a whole mess of keyboards.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Download in DRM-free MP3 and savor at your leisure.

Continue reading “Hackaday Podcast Episode 300: The Dwingeloo 25 M Dish, A Dead-Tech Twofer, And Deconstructing PCBs”

This Week In Security: Apple Backdoors Curl, Tor’s New Bridge, And GhostRace

OK, that headline is a bit of a cheap shot. But if you run the curl binary that Apple ships, you’re in for a surprise if you happen to use the --cacert flag. That flag specifies that TLS verification is only to be done using the certificate file specified. That’s useful to solve certificate mysteries, or to make absolutely sure that you’re connecting to the server you expect.

What’s weird here is that on a MacOS, using the Apple provided curl binary, --cacert doesn’t limit the program to the single certificate file. On an Apple system, the verification falls back to the system’s certificate store. This is an intentional choice by Apple, but not one that’s aimed particularly at curl. The real magic is in Apple’s SSL library, which forces the use of the system keychain.

The current state of things is that this option is simply not going to do the right thing in the Apple provided binary. It’s documented with the note that “this option is supported for backward compatibility with other SSL engines, but it should not be set.” It’s an unfortunate situation, and we’re hopeful that a workaround can be found to restore the documented function of this option. Continue reading “This Week In Security: Apple Backdoors Curl, Tor’s New Bridge, And GhostRace”