Levitating Banana Is An Excellent Conversation Starter

“I really like your floating banana.” If that’s something you’ve always wanted your guests to say when visiting your living room, this levitating banana project from [ElectroBing] is for you.

The design is simple. It relies on a electromagnet to lift the banana into the air. As bananas aren’t usually ferromagnetic, a simple bar magnet is fitted to the banana to allow it to be attracted to the electromagnet. One could insert the magnets more stealthily inside the banana, though this would come with the risk that someone may accidentally consume them, which can be deadly.

Of course, typically, the magnet would either be too weak to lift the banana, or so strong that it simply attracted the banana until it made contact. To get the non-contact levitating effect, some circuitry is required. A hall effect sensor is installed directly under the electromagnet. As the banana’s magnet gets closer to the electromagnet, the hall effect sensor’s output voltage goes down. Once it drops below a certain threshold, a control circuit cuts power to the electromagnet. As the banana falls away, power is restored, pulling the banana back up. By carefully controlling the power to the electromagnet on a continuous basis, the banana can be made to float a short distance away in mid-air.

It’s a fun build, and one that teaches many useful lessons in both physics and electronics. Other levitation techniques exist, too, such as through the use of ultrasound. Video after the break.

Continue reading “Levitating Banana Is An Excellent Conversation Starter”

Dad Builds Frickin’ Tank For His Son

We gotta love hacker Dads and Moms for being so awesome. Sooner or later, their kids get to play with some amazing toy that every other kid on the block is jealous of. [Meanwhile in the Garage aka MWiG] is one of those super hacker Dads who built a frickin’ Tank for his son (video, embedded below.). But it’s so much fun driving that beast around that we suspect Dad is going to be piloting it a lot more than the kid. The tank features metal tracks, differential steering, a rotating turret, periscopes and a functional paintball gun with camera targeting.

Building a tank, even if it’s a mini replica, needs an engine with a decent amount of torque. [MWiG] first tried reviving an old ATV engine, but it did nothing more than sputter and die. It went to the scrap heap after donating its rear transmission and axle. [MWiG] managed to get an old Piaggio scooter with a 250cc / 22 hp engine. The scooter gave up its engine, electricals and the instrument cluster before being scrapped. Looking at the final build, and the amount of metal used, we are left wondering how the puny 22 hp engine manages to drive the tank. We guess it’s the right amount of gearing for the win.

Continue reading “Dad Builds Frickin’ Tank For His Son”

Building A Fake Printer To Grab Screenshots Off The Parallel Port

[Tom Verbeure] recently found himself lamenting the need to take screen grabs from an Advantest R3273 spectrum analyzer with a phone camera, as the older gear requires you to either grab tables of data over an expensive GPIB interface card, or print them to paper. Then he realized, why not make a simple printer port add-on that looks like a printer, but sends the data over USB as a serial stream?

On the hardware side, the custom PCB (KiCAD project) is based on the Raspberry Pi Pico. Obvious form factor issues aside ([Tom] did revise the PCB to make it smaller) this is a shrewd move, as this is not a critical-path gadget so using the Pico as a USB-to-thing solution is a cost-effective way to get something working with minimal risk. One interesting design point was the use of the 74LVC161284 special function bus interface that handles the 5 V tolerance that the RP2040 lacks, whilst making the project compliant with IEEE-1284 — useful for the fussier instruments.

Using the service manual of the Sharp AP-PK11 copier/printer as a reference, [Tom] again, shows how to correctly use the chip, minimizing the design effort and scope for error. The complete project, with preliminary firmware and everything needed to build this thing, can be found on the project GitHub page. [Tom] does add a warning however that this project is still being worked on so adopters might wish to bear that in mind.

If you don’t own such fancy bench instrumentation, but grabbing screenshots from devices that don’t normally support it, is more your thing, then how about a tool to grab Game Boy screenshots?

Smart Ovens Are Doing Dumb Checks For Internet Connectivity

If you’ve ever worked in IT support, you’ll be familiar with users calling in to check if the Internet is up every few hours or so. Often a quick refresh of the browser is enough to see if a machine is actually online. Alternatively, a simple ping or browsing to a known-working website will tell you what you need to know. The one I use is koi.com, incidentally.

When it comes to engineers coding firmware for smart devices, you would assume they have more straightforward and rigorous ways of determining connectivity. In the case of certain smart ovens, it turns out they’re making the same dumb checks as everyone else.

Continue reading “Smart Ovens Are Doing Dumb Checks For Internet Connectivity”

Hackaday Podcast 204: Cesium, Colorful Cast Buttons, And CNC Pizza

This week, Editor-in-Chief Elliot Williams and Assignments Editor Kristina Panos met up over thousands of miles to discuss the hottest hacks of the past seven days. There’s a whole lot of news this week, and the really good part is the the small radioactive source that went missing in Australia has been found. Phew!

Kristina is still striking out on What’s That Sound, but we’re sure you’ll fare better. If you think you know what it is, fill out the form and you’ll be entered to win a coveted Hackaday Podcast t-shirt!

Finally, we get on to the hacks with an atomic pendulum clock that’s accurate enough for CERN, safecracking the rough-and-ready way, and plenty of hacks that are non-destructive to nice, old things. We’ll gush over a tiny DIY adjustable wrench, drool over CNC pizza, and rock out to the sounds of a LEGO guitar/synthesizer thing.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in  the comments!

And/or download it and listen offline.

Continue reading “Hackaday Podcast 204: Cesium, Colorful Cast Buttons, And CNC Pizza”

Showing two MCP23017 expanders soldered onto a PCB

MCP23017 Went Through Shortage Hell, Lost Two Inputs

The MCP23017, a 16-bit I2C GPIO expander, has always been a tasty chip. With 16 GPIOs addressable over I2C, proper push/pull outputs, software-enabled pull-ups, eight addresses, maskable interrupts for all pins, and reasonably low price, there’s a reason it’s so popular. No doubt due in part to that popularity, it’s been consistently out of stock during the past year and a half, as those of us unlucky enough to rely on it in our projects will testify.

Now, the chip is back in stock, with 23,000 of them to go around on Mouser alone, but there’s a catch. Apparently, the lengthy out-of-stock period has taken a heavy toll on the IC. Whether it’s the recession or perhaps the gas shortages, the gist is — the MCP23017 now a 14/16-bit expander, with two of the pins (GPA7 and GPB7) losing their input capabilities. The chips look the same, are called the same, and act mostly the same — if you don’t download the latest version of the datasheet (Revision D), you’d never know that there’s been a change. This kind of update is bound to cause a special kind of a debugging evening for a hobbyist, and makes the chip way less suitable for quite a few applications.

It’s baffling to think about such a change happening nearly 20 years after the chip was initially released, and we wonder what could have caused it. This applies to the I2C version specifically — the SPI counterpart, MCP23S17, stays unaffected. Perhaps, using a microcontroller or shift registers for your GPIO expansion isn’t as unattractive of an option after all. Microcontroller GPIO errata are at least expected to happen, and shift registers seem to have stayed the same since the dawn of time.

The reasons for MCP23017 silicon getting cut in such a way, we might never know. At least now, hopefully, this change will be less of a bitter surprise to those of us happy to just see the chip back in stock — and for hackers who have already restocked their MCP23017 hoards, may your shelved boards magically turn out to have a compatible pinout.

This Week In Security: Github, Google, And Realtek

GitHub Desktop may have stopped working for you yesterday, Febuary 2nd. The reason was an unauthorized access to some decidedly non-public repositories. The most serious bit of information that escaped was code signing certificates, notably used for GitHub Desktop and Atom. Those certificates were password protected, so it’s unlikely they’ve been abused yet. Even so, Github is taking the proper steps of revoking those certificates.

The only active certificate that was revoked was used for signing the Mac releases of GitHub Desktop, so quite a few older versions of that software is no longer easily installed. If nothing else, it’s a reminder that even a project with a well run security team can have problems.

Sh1mmer-ing Chromebooks

There’s a new, clever attack on the Chromebook, specifically with the goal of unenrolling the device from an educational organization. And the “vulnerability” is a documented feature, the RMA Shim. That’s a special boot loader target that contains a valid signature, but allows the booting of other code, intended for troubleshooting and fixing devices in a repair center. Quite a few of those images have leaked, and Sh1mmer combines the appropriate image with a boot menu with some interesting options.

The first is unenrolling, so the device will act like a privately owned computer. This gets rid of content blocks and allows removing extensions. But wait, there’s more. Like rooting the device, a raw Bash terminal, and re-enabling developer mode. Now, as far as we can tell, this doesn’t *directly* break device encryption, but it’s likely that the RMA shim could be abused to tamper with the device’s filesystem. Meaning that the leak of a bunch of signed shims is a big problem for device security. If you use a Chromebook, it might be time to do some research on whether that model’s shim has been leaked. Continue reading “This Week In Security: Github, Google, And Realtek”