A Home CNC Built By Someone Who Knows Their Stuff

[thisoldtony] has a nice shop in need of a CNC. We’re not certain what he does exactly, but we think he might be a machinist or an engineer. Regardless, he sure does build a nice CNC. Many home-built CNCs are neat, but lacking. Even popular kits ignore fundamental machine design principles. This is alright for the kind of work they will typically be used for, but it’s nice to see one done right.

Most home-built machines are hard or impossible to square. That is, to make each axis move exactly perpendicular to the others. They also neglect to design for the loads the machine will see, or adjusting for deviation across the whole movement. There’s also bearing pre-loads, backlash, and more to worry about. [thisoldtony] has taken all these into consideration.

The series is a long one, but it is fun to watch and we picked up a few tricks along the way. The resulting CNC is very attractive, and performs well after some tuning. In the final video he builds a stunning rubber band gun for his son. You can also download a STEP file of the machine if you’d like. Videos after the break.

Continue reading “A Home CNC Built By Someone Who Knows Their Stuff”

Bunnie’s Guide To Shenzhen Electronics

[Bunnie Huang] is now officially the person who wrote the book on electronics manufacturing in Shenzhen, China. His Crowd Supply campaign for The Essential Guide to Electronics in Shenzhen has blown way past the initial goal. [Bunnie] is the first person who comes to mind for anyone needing help getting their electronics built in the region.

The books is meant as a travel companion. Hackaday was in China last June and toured the markets of Hua Qiang Bei. They are incredibly overwhelming, but people are very nice, willing to help, and none of them speak English. [Bunnie’s] approach is pages with squares you can point to in order to express your meaning. Standing at the capacitor stall? There’s a page for that. Gawking at a booth packed full of LEDs and need them in reels instead of tape? That’s in the book too. Even better, this isn’t a one-way thing. You should be able to understand well enough what they vendor is trying to convey as they point at the pages to answer your questions. This is certainly better than our method of trying to find pictures of addresses and Chinese characters on our phones. Everything is at the ready.

It doesn’t end there. The images of the book’s table of contents shows that you’ll get help with getting into the country, getting around once you’re there, and making the deal when you do find what you need. If you’re ever going to make the trip to Shenzhen, this is the first thing you should put in your backpack.

Since you’re already in the mood to purchase something made of paper, we think you’ll be interested you in this gorgeous Hackaday Omnibus Vol 02. It’s 128 pages of the best original content published on Hackaday over the past year, including the stunning artwork of Joe Kim.

Continue reading “Bunnie’s Guide To Shenzhen Electronics”

Cheap WiFi Outlets Reflashed; Found To Use ESP8266

There’s a bunch of simple WiFi-enabled outlets on the market today, and all of these blister-pack goodies seem to have something in common – crappy software. At least from the hacker’s point of view; there always seems to be something that you want to do that the app just doesn’t support. Stuck in this position, [scootermcgoober] did the smart thing and reflashed his cheap IoT outlets.

Although [scooter]’s video is very recent, and he says he got his plugs at Home Depot, we were unable to find them listed for sale at any store near us. Walmart lists the same device for a paltry $15, though, so the price is right for repeating his experiment. The video after the break shows his teardown, which locates all the major components, including a mystery module that was revealed to be an ESP8266 upon decapping. Pins were traced, leads were tacked to his serial-to-USB adapter, and soon new firmware was flashing. [scooter]’s new app is simple, but there’s plenty of room for improvement once you’ve got the keys. All the code is up on GitHub.

WiFi outlets like this and the WeMo have proved to be fertile ground for hacking. Of course, if you’re not into the whole blister-pack thing, you could always roll your own WiFi outlet.

Continue reading “Cheap WiFi Outlets Reflashed; Found To Use ESP8266”

Balancing D-Pad Gets You In The Game

Inspired by TRON, [lasttraveler] decided to try his hand at building a Balance Board — basically a giant joystick pad you can stand on to control.

Constructed of solid wood, the switches are actually very simple — he’s just using tin foil to make the contacts. By opening up the sacrificial keyboard, he’s taken the up/down/left/right keys and wired the contacts directly to the four tin foil pads. A recess in the bottom of the board allows the rest of the keyboard to remain intact — in case he ever wants to take it apart again. Or add new buttons!

Wooden crossbeams in the shape of an X allow the board to balance in the middle without touching any of the contacts — but as soon as you lean the connections are made and you’re off to the races!

Now strap on a VR headset and play some TRON! Though if you want even more accurate control you might want to pick up a cheap Wii balance board instead.

[via r/DIY]

Ancient Fonts Are Fontastic!

Doing some 8-bit ASCII art, but can’t remember where you left your copy of MicroKnight for the Amiga? Or maybe you just need some low-res-but-high-style bitmap fonts to go with your LED pixel array. No fear! Maze.io is cataloguing old text-mode fonts for you.

Textmode.es has a slew of new and old text art from both the Amiga and PC scenes. Rendering some of these correctly really relies on having the right font, so the parser piece reads many different art file formats and renders them with the requested fonts. There’s ASCII, sure, but also ICE Draw, PCBoard, Artworx, and many more. But piece needs the right fonts to do its work, which brings us back to Maze.io.

So whether you’re interested in new or old text-mode art, or just in need of some pixels to push around, have a look at Maze.io. And if you see any ROMs out there with interesting fonts, let them know.

Title image credit trueschool.se

Reverse Engineering A WiFi Security Camera

The Internet of Things is slowly turning into the world’s largest crappy robot, with devices seemingly designed to be insecure, all waiting to be rooted and exploited by anyone with the right know-how. The latest Internet-enabled device to fall is a Motorola Focus 73 outdoor security camera. It’s quite a good camera, save for the software. [Alex Farrant] and [Neil Biggs] found the software was exceptionally terrible and would allow anyone to take control of this camera and install new firmware.

The camera in question is the Motorola Focus 73 outdoor security camera. This camera connects to WiFi, features full pan, tilt, zoom controls, and feeds a live image and movement alerts to a server. Basically, it’s everything you need in a WiFi security camera. Setting up this camera is simple – just press the ‘pair’ button and the camera switches to host mode and sets up an open wireless network. The accompanying Hubble mobile app scans the network for the camera and prompts the user to connect to it. Once the app connects to the camera, the user is asked to select a WiFi connection to the Internet from a list. The app then sends the security key over the open network unencrypted. By this point, just about anyone can see the potential for an exploit here, and since this camera is usually installed outdoors – where anyone can reach it – evidence of idiocy abounds.

Once the camera is on the network, there are a few provisions for firmware upgrades. Usually, firmware upgrades are available by downloading from ‘private’ URLs and sent to the camera with a simple script that passes a URL directly into the shell as root. A few facepalms later, and [Alex]  and [Neil] had root access to the camera. The root password was ‘123456’.

While there’s the beginnings of a good Internet of Camera in this product, the design choices for the software are downright stupid. In any event, if you’re looking for a network camera that you own – not a company with a few servers and a custom smartphone app – this would be near the top of the list. It’s a great beginning for some open source camera firmware.

Thanks [Mathieu] for the tip.

Build Yourself An Awesome Modular Power Supply

You may think you’ve built a power supply for your bench. Heck, we all do. But until you check out [Denis]’s bench power supply build, you may not even know what you’re missing.

[Denis]’s design is nearly entirely modular and targeted to the intermediate builder. It’s built on easily available parts and through-hole components. It’s got an Arduino running as the brains, so you’re going to be able to hack on the code when you feel like tweaking it. But easy doesn’t mean light on features. Let’s walk through the build together.

6203871454520455862_thumbnail

It starts off with a pre-regulator: a switching MOSFET that gets the voltage down to just a couple volts above the target value. Then it’s off to the post-regulator that includes all of the fine adjustments, the DAC and ADC interfacing to the microcontroller, and some fancy features like a “down-programmer” that turns the output off extra quickly.

On the user end of things, [Denis] made a very sleek board that incorporates a TFT touchscreen for the controls, Arduino connections, and the obligatory banana plug outputs. There’s opto-isolation on the SPI bus, a real-time clock, and a bunch more goodies on board. He’s in his third revision of this module, and that level of refinement shows. It’s even SCPI compliant, meaning you can control remotely using an industry-standard protocol.

So what would you do with a ridiculously fancy power supply under microcontroller control? Test out battery charging algorithms? Program test routines to see how your devices will work as their batteries drain out? We have no idea, but we know we want one!