Militaries Are Rushing To Get Anti-Drone Lasers Operational

Flying drones have been a part of modern warfare for a good few decades now. Initially, most of these drones were built by traditional military contractors and were primarily used by the world’s best-funded militaries. However, in recent conflicts in Syria, Ukraine, and elsewhere have changed all that. Small commercial drones and compact militarized models have become key tools on the battlefield, for offense, defence, and reconnaissance.

With so many of these tiny craft buzzing around, militaries are scrambling for practical ways to shoot them down. Lasers might be just the ticket to do exactly that. Continue reading “Militaries Are Rushing To Get Anti-Drone Lasers Operational”

Custom Printed Knobs In Just A Few Lines Of Code

While not everyone is necessarily onboard for the CAD-via-code principle behind OpenSCAD, there’s no denying the software lends itself particularly well to parametric designs. Using a few choice variables, it’s possible to make a model in OpenSCAD that can be easily tweaked by other users — even if they have zero prior experience with CAD.

Take for example this parametric-knob-maker written by [aminGhafoory]. The code clocks in at less than 100 lines, but if you’re looking to spin up your own version, all you really need to pay attention to are the clearly labeled variables up at the top. Just plug in your desired diameter and height, fiddle around a bit with the values that get fed into the grip generating function, and hit F7 to export it to an STL ready for printing.

Now admittedly, all the knobs generated with this code will look more or less the same. But that’s the beauty of open source, should you want to print out some wild looking knobs, you can at least use this code as a basis to build on. With the core functionality in place, you just need to concern yourself with writing a new function to generate a grip texture more to your liking.

Of course, if you want to make your OpenSCAD designs even easier for others to modify, you’ll want to look into its impressive customizer capability which replaces manually edited variables with friendly sliders and text input boxes. Projects like the Ultimate Box Maker we looked at back in 2018 are an excellent example of how powerful OpenSCAD can be if you give your design the proper forethought.

Maiden Kansas City Keyboard Meetup Was A Clacking Good Time

Wow! I can’t believe it already came and went — but the first annual (semi-annual?) Kansas City Keyboard Meetup was, in my opinion, a rousing success. And I think organizer and Discord-nominated god among men [Ricardo] agrees with me. (He does; I checked before we left the venue.)

First of all, the attendance was off the charts, perhaps thanks in part to our announcement last week. We aim to get you the news sooner next time, in case you want to come in from surrounding states and municipalities. RSVPs sat around 20-something, and then shot up to 60 or so in the days leading up. Fortunately, there were enough tiny sandwiches, granola bars, and s t i c k e r s to go around. I already put mine on my keebin’ toolbox.

The Hive Was Buzzing

The event took place at Hive Co-Working thanks to [Nick], and overall, the space turned out to be a good layout. We were set up right inside the windows looking out to the street, and I like to think that we drew in a few passers-by, though I am probably more than a little bit biased. I wondered aloud on the way home how a sandwich board out on the sidewalk would have affected the influx of randos.

My husband pointed out that even though we were all the way downtown, this is Kansas City and not New York City, and most of the keyboard enthusiasts about town were already accounted for. Hmpf. I still say we should try a sandwich board next time. We could go meta and mention the tiny sandwiches inside. Don’t worry — there was plenty of sanitizer and napkins to go around, plus a box of gloves.

Continue reading “Maiden Kansas City Keyboard Meetup Was A Clacking Good Time”

C64 Turned Theremin With A Handful Of Parts

The theremin is popular for its eerie sound output and its non-contact playing style. While they’re typically built using analog hardware, [Linus Åkesson] decided to make one using the venerable Commodore 64.

The instrument works by measuring the capacitance between its two antennas and the Earth. As these capacitances are changed by a human waving their hands around near the respective pitch and volume antennas, the theremin responds by changing the pitch and volume of its output.

In this case, the humble 555 is pressed into service. It runs as an oscillator, with its frequency varying depending on the user’s hand position. There’s one each for pitch and volume, naturally, using a clamp and spoon as antennas. The C64 then reads the frequency the 555s are oscillating at, and then converts these into pitch and volume data to be fed to the SID audio chip.

[Linus Åkesson] demonstrates the build ably by performing a slow rendition of Amazing Grace. The SID synthesizer chip in the C64 does a passable job emulating a theremin, used here with a modulated pulse wave sound. It’s an impressive build and one we fully expect to see at a big chiptune show sooner rather than later. We’re almost surprised nobody came out with a C64 Theremin cartridge back in the day.

We’ve seen other fancy theremin-inspired builds recently too, like this light-based design.

Continue reading “C64 Turned Theremin With A Handful Of Parts”

DIY guide saw

A Beautiful DIY Guided Saw

[JSK-koubou] has quite the talent for creative woodwork, particularly building interesting tools or improving existing ones. This recent project (multiple build videos below: part 1, part 2, and part 3) is a very flexible type of guided pull saw, whereby a fine-toothed saw blade is fixed in the bed, and the workpiece is pulled over it it. By fixing it at a shallow angle, and enabling the blade to be raised up through the bed, the workpiece can be progressively cut by simply pulling it over the blade, then winding it up a little until the final cut length is achieved.

From a construction perspective, the tool is all-metal, built from a collection of the off-the-shelf parts, and thick, hand-cut aluminium alloy plate, nary a CNC tool in sight. The only unusual component is the saw blade itself, which might be a bit tricky to track down if you were so inclined to reproduce the build. It appears (well if you believe the auto-translation by Google Lens, anyway) to be a spare blade for a commercial guide saw available in Japan at least.

We found it particularly pleasing to see the use of a home-built anodizing setup to give it a bit of a jazzy color scheme for some of the plates, just because. Like with many of the build videos from this YouTuber, it is well worth watching all of them, if only just to gather a few ideas for one’s own workspace, if you can stop yourself getting distracted looking at all the other neat tools he uses on the way.

DIY tool builds are not uncommon in these parts, here’s a neat DIY combo table-based project, and here’s a homebrew auto-lowering metal bandsaw which could be a real timesaver.

Continue reading “A Beautiful DIY Guided Saw”

A Primer For The Homebrew Game Boy Advance Scene

As video game systems pass into antiquity, some of them turn out to make excellent platforms for homebrew gaming. Not only does modern technology make it easier to interact with systems that are now comparatively underpowered and simpler, but the documentation available for older systems is often readily available as well, giving the community lots of options for exploration and creativity. The Game Boy Advance is becoming a popular platform for these sorts of independent game development, and this video shows exactly how you can get started too.

This tutorial starts with some explanation of how the GBA works. It offered developers several modes for the display, so this is the first choice a programmer must make when designing the game. From there it has a brief explanation of how to compile programs for the GBA and execute them, then it dives into actually writing the games themselves. There are a few examples that [3DSage] demonstrates here including examples for checking the operation of the code and hardware, some simple games, and also a detailed explanation the framebuffers and other hardware and software available when developing games for this console.

While the video is only 10 minutes long, we recommend watching it at three-quarters or half speed. It’s incredibly information-dense and anyone following along will likely need to pause several times. That being said, it’s an excellent primer for developing games for this platform and in general, especially since emulators are readily available so the original hardware isn’t needed. If you’d like to build something from an even more bygone era than the early 2000s, though, take a look at this tutorial for developing games on arcade cabinets.

Continue reading “A Primer For The Homebrew Game Boy Advance Scene”

Genshin Security Impact

An MMORPG with cute anime-style characters and maybe a bit too much inspiration taken from another classic Nintento franchise, Genshin Impact is a relatively popular game across the PlayStation, iOS, Android, and PC platforms. That last one has already generated a bit of controversy, since the PC version game includes an anti-cheat kernel driver that runs in the Windows kernel context, and on initial release that module kept running even after the game was closed.

That anti-cheat driver is back in the news, with Trend Micro discovering a ransomware campaign that includes mhyprot2.sys, the anti-cheat driver, as a component of the infection. The module is known to have vulnerabilities, and is still a signed kernel driver, so the malware campaign loads the driver and uses its functions to disable anti-malware protections.

The rest of the campaign is straightforward. Starting with access to a single domain-connected machine, an attacker uses that foothold to gain access to the domain controller. The malicious script is hosted on shared storage, and PsExec is used to run it on all the domain member machines. The real novelty here is the use of the vulnerable anti-cheat kernel driver as the anti-malware bypass. As far as we can tell, this driver is *still* signed and considered trustworthy by Windows. We join the call to Microsoft, to revoke this vulnerable driver, as it’s now actively being used in ongoing malware campaigns. For more on security, check out our weekly column on the topic,