PC Overclocking With An Air Conditioner

We never insist that a hack be practical. [Tech Ingredients] is living proof as they modded a computer case to use a window air conditioner for overclocking a computer. They think they haven’t hit the ceiling yet, and got their AMD Ryzen 8-core processor up to 4.58 GHz.

An advantage of forcing air from an air conditioner is that the air forced into the system is quite dry and clean. The trick is to create a simple duct to attach to a 5,000 BTU air conditioner. It doesn’t actually interface with the CPU cooling block, instead it just forces cool air into the case and this tends to cool everything inside. Admittedly, it isn’t any worse than plunging your computer in liquid nitrogen, and we’ll admit that air conditioning units are made to keep large areas cold and work at high duty cycles. With the air conditioning running, they disconnected at least some of the stock fans. The temperatures stayed cool even at high speeds.

Continue reading “PC Overclocking With An Air Conditioner”

Vacuum Forming Key Cap Covers Doesn’t Quite Work Out

Retrocomputing is as much about physical preservation as it is about electronics and computer science. Plastic is an awful material when it comes to decade-long timescales, and the forces of sun, air and water are unrelenting on these materials. [Drygol] has long experimented with techniques to preserve and refresh keycaps, and decided to try some fun vacuum forming techniques for something new. It sadly didn’t go to plan, however.

The basic idea was to use a vacuum-forming machine to coat keycaps in a thin layer of translucent plastic, for both aesthetic benefit and to preserve them from falling apart. Initial small-scale tests were promising, creating a key with a tight, form-fitting blue plastic wrap through which the original labels were still visible.

However, scaling up the process proved fraught. Uneven heating of the plastic film and a lack of rigidity in the carriage used to stretch it over the keycaps led to poor results. The final product showed many wrinkles and was distinctly unappealing.

[Drygol] isn’t giving up however, and plans to build a new vacuum table with greater performance. We can imagine this technique being an accessible way to colorize keycaps for a vintage cyberdeck or chiptune rig, without permanently modifying the keys. If you’ve got the inside knowledge on how to make this work, sound off in the comments.

We’ve seen [Drygol]’s work in this space before, too, like this extreme modded Amiga. If you’re executing your own retro repairs, be sure to drop us a line!

AOI By DIY

As anyone who has ever assembled a run of PCBs will tell you, quality inspection of solder joints can be a difficult process. Even under a microscope their appearances can be deceptive, and one silver blob can be perfect while its neighbour conceals a problem. The electronics industry have developed inspection tools to help, including optical inspection devices. It’s one of these that [Sina Roughani] has built, in the form of a hemispherical 3D printed dome with concentric rings of coloured LEDs mounted within it.

The principle behind this tool is as unexpected and simple as it is clever; by having different colours of light from different elevations of the dome it ensures that each different angle of the solder joint surface reflects a different colour. Thus a colour photograph shot from directly above the board allows visual inspection of the quality of the solder joints by the rainbow of colours that appears around their edges. This process can even be automated with OpenCV or similar, hence the process is referred to as Automated Optical Inspection, or AOI.

The technique is demonstrated with some pictures of a Raspberry Pi Pico, on which it shows really well the rainbow-edged solder joints and the red colour reflected from flat pads. What at first might seem like a novelty lighting effect becomes a very useful inspection tool.

PCB inspection is a subject we’ve covered before, though perhaps we don’t all have access to X-rays.

Linux Fu: Serial Untethered

Serial ports used to be everywhere. In a way, they still are since many things that appear to plug in as a USB device actually look like a serial port. The problem is that today, the world runs on the network. Sure, you can buy a terminal server that converts a serial port to an Ethernet port, but what fun is that? In this article, I’m going to show you how to stream serial ports over the network using some available Linux tools. It isn’t perfect, and it won’t work for every case, but when it works it works well.

Everything is a File, Until it Isn’t

At some point in the past, Unix — the progenitor of Linux — treated virtually everything as a file, and all files were created more or less equal. Programs didn’t care if a file was local, on the network, from a tape drive, or arriving over a named pipe.

But things started to change. Even though a serial port is just a file under Linux, it has some special attributes that let you set, for example, baud rates. Worse, some programs “know” too much about files and insist on certain naming conventions. So, in theory, you should be able to create a network socket, connect one end to a serial port and the other end to a program, and be done with it. In theory.

Continue reading “Linux Fu: Serial Untethered”

Tiny Motors Enable Experimental Piano Performance

Just when you think you’ve seen every possible way to play the piano, [Alessandro Perini] came up with a new one. In this piece, written for the percussionist [Irene Bianco], hand-held motors become a tangible interface between composer, electronic music equipment, and the performer.

The performance involved ten small disc motors, held above the strings by a wooden frame. The motors are controlled by a Arduino Nano, which turns the motors on or off based on MIDI commands from a computer. However, the performance is not entirely automated. [Irene] wears a pair of contact microphones on her fingers, which she moves around inside the piano to capture the sounds of the strings vibrating in harmony with the motors themselves.

[Alessandro] has been kind enough to share a tutorial on how to recreate the hardware and software behind the performance for those keen to create similar work of their own. As with any musical endeavour, MIDI can always make it better. Video after the break.

Continue reading “Tiny Motors Enable Experimental Piano Performance”

Tesla Recalls Cars With EMMC Failures, Calls Part A ‘Wear Item’

It’s a problem familiar to anyone who’s spent a decent amount of time playing with a Raspberry Pi – over time, the flash in the SD card reaches its write cycle limits, and causes a cavalcade of confusing errors before failing entirely. While flash storage is fast, compact, and mechanically reliable, it has always had a writeable lifespan much shorter than magnetic technologies.

Flash storage failures in the computer behind Tesla’s famous touch screen are causing headaches for drivers.

Of course, with proper wear levelling techniques and careful use, these issues can be mitigated successfully. The surprising thing is when a major automaker fails to implement such basic features, as was the case with several Tesla models. Due to the car’s Linux operating system logging excessively to its 8 GB eMMC storage, the flash modules have been wearing out. This leads to widespread failures in the car, typically putting it into limp mode and disabling many features controlled via the touchscreen.

With the issue affecting important subsystems such as the heater, defroster, and warning systems, the NHTSA wrote to the automaker in January requesting a recall. Tesla’s response acquiesced to this request with some consternation, downplaying the severity of the issue. Now they are claiming that the eMMC chip, ball-grid soldered to the motherboard, inaccessible without disassembling the dash, and not specifically mentioned in the owner’s manual, should be considered a “wear item”, and thus should not be subject to such scrutiny. Continue reading “Tesla Recalls Cars With EMMC Failures, Calls Part A ‘Wear Item’”

Phishing With Morse Code

All of us have seen our share of phishing emails, but there are a lot more that get caught by secure email gateways and client filters. Threat actors are constantly coming up with new ways to get past these virtual gatekeepers. [BleepingComputer] investigated a new phishing attack that used some old tricks by hiding the malicious script tags as morse code.

The phishing attack targets Microsoft account login credentials with an HTML page posing as an Excel invoice. When opened, it asks the user to re-enter their credentials before viewing the document. Some external scripts are required to render the fake invoice and login window but would be detected if the links were included normally. Instead, the actor encoded the script links using dots and dashes, for example, “.-” equals “a”. A simple function (creatively named “decodeMorse”) is used to decode and inject the scripts when it runs in the victim’s browser.

Of course, this sort of attack is easy to avoid with the basic precautions we are all familiar with, like not opening suspicious attachments and carefully inspecting URLs. The code used in this attack is simple enough to be used in a tutorial on JavaScript arrays, but it was good enough to slip past a few large company’s filters.

Phishing attacks are probably not going to stop anytime soon, so if you’re bored, you could go phishing for phishers, or write some scripts to flood them with fake information.