Autodesk Blinks, Keeps STEP File Export In Free Version Of Fusion 360

Good news, Fusion 360 fans — Autodesk just announced that they won’t be removing support for STEP file exports for personal use licensees of the popular CAD/CAM platform after all.

As we noted last week, Autodesk had announced major changes to the free-to-use license for Fusion 360. Most of the changes, like the elimination of simulations, rolling back of some CAM features, and removal of generative design tools didn’t amount to major workflow disruptions for many hobbyists who have embraced the platform. But the loss of certain export formats, most notably STEP files, was a bone of contention and the topic of heated discussion in the makerverse. Autodesk summed up the situation succinctly in their announcement, stating that the reversal was due to “unintended consequences for the hobbyist community.”

While this is great news, bear in mind that the other changes to the personal use license are still scheduled to go into effect on October 1, while the planned change to limit the number of active projects will go into effect in January 2021. So while Fusion 360 personal use licensees will still have STEP files, the loss of other export file formats like IGES and SAT are still planned.

Xbox Controller Gets Snap On Joystick From Clever 3D-Printed Design

Ball and socket linkages make for smooth operation.

People making DIY controls to enhance flight simulators is a vibrant niche of engineering and hackery, and it sure looks like Microsoft Flight Simulator is doing its part to keep the scene lively. [Akaki Kuumeri]’s latest project turns an Xbox One gamepad into a throttle-and-stick combo that consists entirely of 3D printed parts that snap together without a screw in sight. Bummed out by sold-out joysticks, or just curious? The slick-looking HOTAS (hands on throttle and stick) assembly is only a 3D printer and an afternoon away. There’s even a provision to add elastic to increase spring tension if desired.

The design looks great, and the linkages in particular look very well thought-out. Ball and socket joints smoothly transfer motion from one joystick to the other, and [Akaki] says the linkages accurately transmit motion with very little slop.

There is a video to go with the design (YouTube link, embedded below) and it may seem like it’s wrapping up near the 9 minute mark, but do not stop watching because that’s when [Akaki] begins to go into hacker-salient details about of how he designed the device and what kinds of issues he ran into while doing so. For example, he says Fusion 360 doesn’t simulate ball and socket joints well, so he had to resort to printing a bunch of prototypes to iterate until he found the right ones. Also, the cradle that holds the Xbox controller was far more difficult to design than expected, because while Valve might provide accurate CAD models of their controllers, there was no such resource for the Xbox ones. You can watch the whole video, embedded below.

Continue reading “Xbox Controller Gets Snap On Joystick From Clever 3D-Printed Design”

Road Pollution Doesn’t Just Come From Exhaust

Alumni from Innovation Design Engineering at Imperial College London and the Royal College of Art want to raise awareness of a road pollution source we rarely consider: tire wear. If you think about it, it is obvious. Our tires wear out, and that has to go somewhere, but what surprises us is how fast it happens. Single-use plastic is the most significant source of oceanic pollution, but tire microplastics are next on the naughty list. The team calls themselves The Tyre Collective, and they’re working on a device to collect tire particles at the source.

Continue reading “Road Pollution Doesn’t Just Come From Exhaust”

Ask Hackaday: Is Windows XP Source Code Leak A Bad Thing?

News comes overnight that the Windows XP source code has been leaked. The Verge says they have “verified the material as legitimate” and that the leak also includes Windows Server 2003 and some DOS and CE code as well. The thing is, it has now been more than six years since Microsoft dropped support for XP, does it really matter if the source code is made public?

The Poison Pill

As Erin Pinheiro pointed out in her excellent article on the Nintendo IP leak earlier this year (perhaps the best Joe Kim artwork of the year on that one, by the way), legitimate developers can’t really make use of leaked code since it opens them up to potential litigation. Microsoft has a formidable legal machine that would surely go after misuse of the code from a leak like this. Erin mentions in her article that just looking at the code is the danger zone for competitors.

Even if other software companies did look at the source code and implement their own improvements without crossing the legal line, how much is there still to gain? Surely companies with this kind of motivation would have reverse engineered the secret sauce of the long dead OS by now, right?

Spy vs. Spy

The next thing that comes to mind are the security implications. At the time of writing, statcount pegs Windows XP at a 0.82% market share which is still going to be a very large number of machines. Perhaps a better question to consider is what types of machines are still running it? I didn’t find any hard data to answer this question, however there are dedicated machines like MRIs that don’t have easy upgrade paths and still use the OS and there is an embedded version of XP that runs on point-of-sale, automated teller machines, set-top boxes, and other long-life hardware that are notorious for not being upgraded by their owners.

Continue reading “Ask Hackaday: Is Windows XP Source Code Leak A Bad Thing?”

Hackaday Podcast 086: News Overflow, Formula 1/3 Racer, Standing Up For Rubber Duckies, And Useless Machine Takes A Turn

Hackaday editors Elliot Williams and Mike Szczys peruse the world of hacks. There was so much news this week that we lead off the show with a rundown to catch you up. Yet there is still no shortage of hardware hacks, with prosthetic legs for your rubber ducky, a RC cart that channels the spirit of Formula 1, and a project that brings 80’s video conferencing hardware to Zoom. There’s phosphine gas on Venus and unlimited hacking projects inside your guitar. The week wouldn’t be complete without the joy of riffing on the most useless machine concept.

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download (60 MB or so.)

Continue reading “Hackaday Podcast 086: News Overflow, Formula 1/3 Racer, Standing Up For Rubber Duckies, And Useless Machine Takes A Turn”

Candy Slide Keeps Halloween Spooky And Socially Distant

Pandemic got you down about the prospects for Halloween this year? While you may not be able to do the Monster Mash with all your friends and family, there are plenty of ways to hand out candy while upholding social distancing practices. [WickedMakers] built a spooky six-foot candy slide to help keep their celebration in compliance with the CDC.

Their candy slide is almost entirely made of PVC, plus some gauze to mummify it and make it scarier. It’s essentially a six-foot long section of 3″ tubing supported by two ladders made of 1″ tubing that put the top four feet off the ground and a kid-friendly two feet off the ground at the receiving end. [WickedMakers] did a great job of hiding the PVC-ness of this build. We can’t help but wonder how much harder it would be to make the skeleton put the candy on the slide. Check out the build video after the break.

Need some Halloween headgear? You could always build N95 filter material into an EDM helm to hand out candy. Stay safe out there this year, and remember: always check your Halloween candy for malicious payloads.

Continue reading “Candy Slide Keeps Halloween Spooky And Socially Distant”

This Week In Security: UTorrent Vulnerable, Crowd-Sourcing Your Fail2Ban, And Cryptographers At Casinos

The uTorrent client was recently updated to fix a null pointer dereference (CVE-2020-8437), discovered by [whtaguy]. Triggering the dereference simply crashes the client — so far an actual RCE hasn’t been found. Given the nature of the null pointer dereference, it’s possible this bug is limited to denial of service. That’s extremely good, because the flaw is extremely easy to target.

BitTorrent is a clever protocol. It’s still used to distribute large files, like Linux ISOs. The concept is simple: Split a large file into small chunks. Send the chunks to a client one at a time. As each chunk is received, the client sends a copy of that chunk to the next client. As a result of this peer-to-peer (p2p) arrangement, the bandwidth available to the server is greatly multiplied. As with all other p2p arrangements, the sticking point is how to make those connections between peers, particularly when most of the world’s desktops are behind NAT routers. In practice, for two peers to share data, at least one of them has to have a port opened or forwarded to the client. This is often accomplished through Universal Plug-n-Play (UPnP) or the NAT Port Mapping Protocol (NAT-PMP). The idea of both protocols are the same; a client on an internal device can request a temporary port forward without manual intervention. Whether it’s a good idea to allow automatic port forwards is another issue for another day. Continue reading “This Week In Security: UTorrent Vulnerable, Crowd-Sourcing Your Fail2Ban, And Cryptographers At Casinos”