Finding Noise With An Antenna

[K5ACL], aka [SignalSearch], recently brought his active receive loop antenna in off the roof to give it a checkup and perform any necessary maintenance. While it was in the shack, he took the opportunity to discuss how well it would perform indoors. The verdict? Not ideal. He’d mount it 50 feet away from the house if the HOA would let him.

Houses, and subsequently most ham shacks, are filled with noise sources that interfere badly with HF. So after spending a minute or so listening on an SDR, [K5ACL] demonstrates another use for this type of tightly-tuned antenna—as a noise detector.

The main culprit in [K5ACL]’s house is the ceiling light that’s right there in the shack. You can see the noise striping the waterfall as he turns it on and off. But the noise from the light is small potatoes compared to some other common household items, like those power line adapters that turn house wiring into networking cable. Those produce so much noise that even an active loop is really no match. Stay tuned after the break to watch [K5ACL] work the bands through the noise.

Loop antennas are great if you’re stuck in an apartment building or a congested city. They’re easy enough to make, whether you want a portable loop or a permanent installation.

Continue reading “Finding Noise With An Antenna”

Pinging The Depths Of A Rain Barrel

Rain barrels are a great way to go green, as long as your neighborhood doesn’t frown upon them. [NikonUser]’s barrel sits up high enough that he has to climb up on an old BBQ and half-dangle from the pipe to check the water level, all the while at the risk of encountering Australian spiders.

Arachnophobia, it turns out, is a great motivator. At first, [NikonUser] dreamed up a solar-powered IoT doodad that would check the level and report the result on a web page. He battled the Feature Creep and decided to build a handheld device that pings the water level with an ultrasonic sensor and displays it on a 7-segment.

Everything is contained in a water-resistant box and driven by an Arduino Pro. The box is mounted on a piece of scrap lumber that lays across the top of the barrel. This allows the HC-SR04’s eyes to peer over the edge and send pings toward the bottom. It also helps to keep the readings consistent and the electronics from taking a swim.

Operation is simple: [NikonUser] reaches up, sets the plank across the barrel, and pushes the momentary. This activates the Arduino, which prompts the HC-SR04 to take several readings. The code averages these readings, does a little math, and displays the percentage of water remaining in the barrel.

Interested in harvesting rain water, but not sure what to do with it? You can use it for laundry, pour it in the toilet tank instead of flushing, or make an automated watering system for your garden.

Laser Rotary Adapter Gets You Rolling

Laser cutters are becoming more garage-accessible with overseas imports, but plenty of us still need to drop in on the college campus or makerspace to get our cuts. Having a laser onsite is a nice touch, but having a rotary axis is almost unheard of. These nifty add-ons enable your laser to cut and engrave radially symmetric parts. Their pricetags usually fall in the hundred-to-thousand dollar price range, so while that might stop us there’s nothing holding us back from building our own!

That’s exactly what both [Cesar] and [Russ] did with two homebrew designs built from scraps, and the results look comparable to the professional default. The design itself is simple, yet dead clever. The carriage straps directly onto the x-axis such that its motion is rigidly connected to it. The wheels on the bottom play a dual role. First, they let the carriage slide smoothly with the y-axis motion. They also support the object-to-be-engraved and convert the wheel rotation from the y-axis movement into rotation of the object. There’s one drawback here in that the diameter of the object-to-be-engraved affects the angle of rotation, but we’ve never been ashamed to do a little work with θ = s/r.

[Cesar] gets the credit for putting this hack out for the world to see, but [Russ] also get’s a big thanks for putting out a downloadable file of his carriage. It’s a testament to how sharing a thought can inspire us to iterate on better designs that they world can enjoy.

Rolling fourth-axes aren’t anything new on these pages, but they’re certainly rare! If your hungry for more rolling axis goodness, have a look at [Perry’s] router modifications.

Continue reading “Laser Rotary Adapter Gets You Rolling”

Mechanisms: The Reed Switch

Just about everywhere you go, there’s a reed switch nearby that’s quietly going about its work. Reed switches are so ubiquitous that you’re probably never more than a few feet away from one at any given time, especially at home or in the car. You might have them on your doors and windows as part of a burglar alarm system. They keep your washing machine from running when the lid is open, and they put your laptop to sleep when you close the lid. They know if the car has enough brake fluid and whether or not your seat belt is fastened.

Reed switches are interesting devices with a ton of domestic and industrial applications. We call them switches, but they’re also sensors. In fact, they only do the work of a switch while they can sense a magnetic field. They are capable of switching AC or DC at low and high voltages, but they don’t need electricity to work. Since they’re sealed in glass, they are impervious to dirt, dust, corrosion, temperature swings, and explosive environments. They’re cheap, they’re durable, and in low-current applications they can last for about a billion actuations.

Continue reading “Mechanisms: The Reed Switch”

Images As Excel FIles Are Gloriously Nasty

Almost every person of a technical persuasion who has worked in an office will have some tale of wildly inappropriate use of office technology for a task that could have been accomplished far more simply with an appropriate tool. There are jokes about people photocopying a blank sheet of paper when they need a few sheets themselves, but some of the real stories are very bit as surreal.

[Bjonnh]’s patience for such things was exceeded when he received a screenshot embedded in a Microsoft Word file. His response is both pointless and elegant, a Python script that takes a JPEG image and encodes it into an Excel file. It’s simply an array of cells whose background colours represent the pixels, and he warns us that the output files may take a while to load. We just had to subject it to a test, but are sorry to report that LibreOffice doesn’t seem to want to play ball.

So yes, this is a small departure from our usual fare of hardware, and it serves no use other than to be a fantastically awful misuse of office technology. If you’ve ever been emailed a PowerPoint invitation to the office party though, then maybe you’ll have cracked a smile.

If pushing your corporate spreadsheet to the limit is your thing, perhaps you’d also like to see it running a 3D engine.

Review: NEJE DK-8-KZ Laser Engraver

When I got my first 3D printer I was excited, but now that I’m contemplating adding a forth to my collection, I have to come to the terms with the fact that these machines have all the novelty of a screwdriver at this point. Which is fine; getting the cost down and availability up is the key to turning a niche piece of technology into a mainstream tool, and the more people with 3D printers at home or in their workshop the better, as far as I’m concerned. But still, there’s a certain thrill in exploring the cutting edge, and I’ve been looking for something new to get excited about as of late.

NEJE DK-8-KZ

Lasers seem like an interesting next step in my quest towards complete in-house fabrication capability, so I started researching cheap setups to get my feet wet. In the course of looking up diode-powered laser cutters, I came across the NEJE DK-8-KZ. At only 1W, there’s no question this device isn’t going to be cutting a whole lot. In fact, it’s specifically sold as an engraver. But given the fact that you can get one of these little guys for around $70 USD shipped, it’s hard to complain.

Now I wasn’t 100% sure what I would do with a laser engraver, but I thought it would be a good way to test the waters before putting serious money (and time) into something more powerful. Plus, if I’m being totally honest, I wanted to start on something on the lower end of the power spectrum because I’m terrified of blinding myself.

So what kind of laser do you get for $70? Let’s find out… Continue reading “Review: NEJE DK-8-KZ Laser Engraver”

Memcached Servers Abused For DDoS Attacks

Cloudflare announced recently that they are seeing an increase in amplification attacks using memcached servers, and that this exploit has the potential to be a big problem because memcached is capable of amplifying an attack significantly. This takes DDoS attacks to a new level, but the good news is that the problem is confined to a few thousand misconfigured servers, and the solution is to put the servers behind a tighter firewall and to disable UDP. What’s interesting is how the fundamental workings of the Internet are exploited to create and direct a massive amount of traffic.

We start with a botnet. This is when a bunch of Internet-connected devices are compromised and controlled by a malicious user. This could be a set of specific brand of web camera or printer or computer with unsecured firmware. Once the device is compromised, the malicious user can control the botnet and have it execute code. This code could mine cryptocurrency, upload sensitive data, or create a lot of web traffic directed at a particular server, flooding it with requests and creating a distributed denial of service (DDoS) attack that takes down the server. Since the server can’t distinguish regular traffic from malicious traffic, it can’t filter it out and becomes unresponsive.

This DDoS attack is limited to the size of the botnet’s bandwidth, though. If all the web cameras in the botnet are pounding a server as fast as they can, the botnet has reached its max. The next trick is called an amplification attack, and it exploits UDP. UDP (as opposed to TCP) is like the early post office; you send mail and hope it gets there, and if it doesn’t then oh well. There’s no handshaking between communicating computers. When a device sends a UDP packet to a server, it includes the return address so that the server can send the response back. If the device sends a carefully crafted fake request with a different return address, then the server will send the response to that spoofed return address.

So if the web camera sends a request to Server A and the response is sent to Server B, then Server A is unintentionally attacking Server B. If the request is the same size as the response, then there’s no benefit to this attack. If the request is smaller than the response, and Server A sends Server B a bunch of unrequested data for every request from the camera, then you have a successful amplification attack. In the case of memcached, traffic can be amplified by more than 50,000 times, meaning that a small botnet can have a huge effect.

Memcached is a memory caching system whose primary use is to help large websites by caching data that would otherwise be stored in a database or API, so it really shouldn’t be publicly accessible anyway.  And the solution is to turn off public-facing memcached over UDP, but the larger solution is to think about what things you are making available to the Internet, and how they can be used maliciously.