3D Printed Jig Makes Custom Springs A Snap

We’ve often heard it said that springs come in in all shapes and sizes…except for the one you need. In light of this, the hardware hacker would do well to keep the tools and knowledge required to make a custom spring close at hand when building something that moves. Luckily, all it really take is some stiff metal wire, a rod, and patience.

Unless you’ve got a 3D printer, that is. In which case, we’d suggest you print out this very clever “Spring Factory” designed by [Vincent Baillet]. The simple tool, consisting of just two parts, makes it easier and faster to make consistent DIY springs when compared to traditional methods. Rather than trying to eyeball the spacing of the coil as you wind the wire around the mandrel, this design does it for you.

As seen in the video, springs made with this tool look very professional. Not only does the threaded mandrel keep the spacing between coils even, it also makes sure all the springs you produce are identical. This can be especially important with projects that need to use multiple matching springs. [Vincent] says his handy tool works with piano wire from 0.8 to 1.2 mm, and slightly thicker if plain steel.

Of course, the obvious flaw in a tool like this is that it can only be used to make springs of a specific diameter. Changing the length is easy enough, just use more or less wire. But to make a thinner or thicker spring, you’d need a different size of mandrel. It seems that [Vincent] has only released the gadget in this approximately 9 mm diameter so far, but here’s hoping a few more sizes get added to the mix before too long.

Looking for something a bit more advanced? This Arduino-powered wire bender is capable of making some very impressive custom springs, among other things.

Continue reading “3D Printed Jig Makes Custom Springs A Snap”

Custom Piano Tickles The Ivories

The core ethos of “hacking” is usually interpreted as modifying something for a use that it wasn’t originally built for. Plenty of builds are modifications or improvements on existing technology, but sometimes that just isn’t enough. Sometimes we have to go all the way down and build something completely from scratch, and [Balthasar]’s recent piano-like musical instrument fits squarely into this category.

This electronic keyboard is completely designed and built from scratch, including the structure of the instrument and the keys themselves. [Balthasar] made each one by hand out of wood and then built an action mechanism for them to register presses. While they don’t detect velocity or pressure, the instrument is capable of defining the waveform and envelope for any note, is able to play multiple notes per key, and is able to change individual octaves. This is thanks to a custom 6×12 matrix connected to a STM32 microcontroller. Part of the reason [Balthasar] chose this microcontroller is that it can do some of the calculations needed to produce music in a single clock cycle, which is an impressive and under-reported feature for the platform.

With everything built and wired together, the keyboard is shockingly versatile. With the custom matrix it is easy to switch individual octaves on the piano to any range programmable, making the 61-key piano capable of sounding like a full 88-key piano. Any sound can be programmed in as well, further increasing its versatility, which is all the more impressive for being built from the ground up. While this build focuses more on the electronics of a keyboard, we have seen other builds which replicate the physical action of a traditional acoustic piano as well.

Continue reading “Custom Piano Tickles The Ivories”

Shelf Actualization

If you are old enough, you may remember that, for a time, almost every year was the year that home video was going to take off. Except it never was, until VHS tape machines appeared. We saw something similar with personal computers. Nowadays, we keep hearing about the home robot, but it never seems to fully materialize or catch on. If you think about it, it could be a problem of expectations.

What we all want is C3PO or Rosie the Robot that can do all the things we don’t want to do. What we usually get is something far less than that. You either get something hideously expensive that does a few tasks or something cheap that is little more than a toy.

Labrador Systems is trying to hit the middle ground. While no one would confuse their Caddie and Retriever robots with C3PO, they are useful but also simple, presumably to keep the cost down which are expected to cost about $1,500. The robots have been described as “self-driving shelves.” You can watch a video about the devices below.

Continue reading “Shelf Actualization”

Hackaday Podcast 153: A 555 Teardown To Die For, Tetrabyte Is Not A Typo, DIY Injection Molding, And Using All The Parts Of The Trash Printer

Join Hackaday Editor-in-Chief Elliot Williams and Managing Editor Tom Nardi on another whirlwind tour of the week’s top stories, hacks, and projects. We start off with some breaking Linux security news, and then marvel over impeccably designed pieces of hardware ranging from a thrifty Z table for the K40 laser cutter to a powerful homebrew injection molding rig. The finer technical points of a USB device that only stores 4 bytes at a time will be discussed, and after taking an interactive tour through the internals of the 555 timer, we come away even more impressed by the iconic 50 year old chip. We’ll wrap things up by speculating wildly about all the bad things that can happen to floating solar panels, and then recite some poetry that you can compile into a functional computer program should you feel so inclined.

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct Download (58 MB)

Continue reading “Hackaday Podcast 153: A 555 Teardown To Die For, Tetrabyte Is Not A Typo, DIY Injection Molding, And Using All The Parts Of The Trash Printer”

Mystery WWII Navy Gear With Magic Eye

There’s an unknown piece of military electronic gear being investigated over on [Usagi Electric]’s YouTube channel (see video below the break). The few markings and labels on the box aren’t terribly helpful, but along with the construction and parts, seem to identify it as relating to the US Navy from the WWII era. Its central feature is a seeing-eye tube and an adjustment knob. [David] does a bit of reverse engineering on the circuit, and is able to fire it up and get it working, magic eye squinting and all.

But there’s still the unanswered question, what was this thing supposed to do? Besides power, it only has one input signal. There are no outputs, except the “data” presented visually by the magic eye tube. Commenters have suggested it was used with sonar equipment, calibration tool, RTTY tuning aid, light exposure meter, etc. But if you dust off your copy of Navships 900,017 “Radar Systems Fundamentals” from 1944 and turn to page 249, there’s a section entitled Tuning Indicator that describes this circuit, almost.

Continue reading “Mystery WWII Navy Gear With Magic Eye”

This Week In Security: Geopolitical Hacktivism, Antivirus Mining, And Linux Malware

The CIA Hacktivists have launched a sort of ransomware campaign against the Belarusian rail system, but instead of cryptocurrency, they want the release of political prisoners and removal of Russian soldiers. This could be called an example of cyber-terrorism, though there is a reasonable theory that this is a state-sponsored hack, masquerading as hacktivism. What does seem certain is that something has interrupted rail transit, and a group on Twitter has produced convincing proof of a breach.

Your Antivirus Now Includes a CryptoMiner

Don’t look now, but your latest update of Norton 360 or Avira may have installed a cryptocurrency mining module. The silver lining is that some sanity has been retained, and you have to opt-in to the crypto scheme before your machine starts spending its spare cycles on mining. For users who do, they’re put into a mining pool, making for small payouts for most hardware. Norton, naturally, takes a 15% fee off the top for their trouble.

The State of Linux Malware

There used to be an adage that Linux machines don’t get malware. That’s never really been quite true, but the continued conquest of the server landscape has had the side effect of making Linux malware an even greater danger. Crowdstrike has seen a 35% increase in Linux malware in 2021, with three distinct categories leading the charge: XorDDoS, Mozi, and Mirai. Continue reading “This Week In Security: Geopolitical Hacktivism, Antivirus Mining, And Linux Malware”

Hacking A Proper Dash Into The Tesla Model 3

The Tesla Model 3 and Model Y are popular electric vehicles that dispense with some of the usual provisions you’d expect in a typical car. Namely, there’s no dash cluster in front of the driver; instead, all information is solely displayed on the center console screen. [Nick Nguyen] wasn’t a fan of this setup, and decided to hack together a dash cluster of his own. 

The CANdash works in a simple fashion, snooping the Tesla’s CAN bus for all the information relevant to the vehicle’s operation. It’s capable of displaying everything from speed to the remaining range in the battery, while also allowing the user to keep an eye on things like coolant temperatures and whether the Tesla Autopilot system is currently available.

The build relies on a CANserver, an ESP32-based device specifically built for hooking up to the CAN bus on Tesla vehicles and sharing the data externally. The data can then be piped wirelessly to an Android phone running CANdash to display all the desired information. With the help of an aftermarket dash clip or a 3D printed custom mount, the phone can then be placed behind the steering wheel to display data in the usual location.

It’s a simple, straightforward hack that gives Tesla owners a useful feature that they’re otherwise missing from the factory. The US automakers cars are proving to be fertile ground for hackers and DIYers, with one man recently saving thousands on a battery swap with a simple mod. Video after the break.

Continue reading “Hacking A Proper Dash Into The Tesla Model 3”