Illustrated Kristina with an IBM Model M keyboard floating between her hands.

Keebin’ With Kristina: The One With The 24-Hour Macro Pad

They say Rome wasn’t built in a day, but this great little music-controlling macro pad by [nibbler] actually was. Why? Because as Hackaday’s own [Donald Papp] reminded us, we all need a win sometimes, especially as projects drag on and on without any end in sight.

A small macro pad with six buttons.
Image by [nibbler] via Toxic Antidote
As [nibbler] points out, what really constitutes a win? Set the bar too low and it won’t feel like one at all. Too high, and you may become too discouraged to cross the finish line. With that in mind, [nibbler] set the bar differently, limiting themselves to what could be done in the one day per week they have to devote time to electronic matters.

One-day turnaround usually means using parts on hand and limiting oneself to already-learned skills and techniques. No problem for [nibbler], who, armed with an Arduino Leonardo Tiny and a some colorful push buttons, set about designing a suitable enclosure, and then putting it all together. Was this a win? [nibbler] says yes, and so do I.

Continue reading “Keebin’ With Kristina: The One With The 24-Hour Macro Pad”

Linksys Velop Routers Caught Sending WiFi Creds In The Clear

A troubling report from the Belgian consumer protection group Testaankoop: several models of Velop Pro routers from Linksys were found to be sending WiFi configuration data out to a remote server during the setup process. That would be bad enough, but not only are these routers reporting private information to the mothership, they are doing it in clear text for anyone to listen in on.

Testaankoop says that while testing out the Pro WiFi 6E and Pro 7 versions of Velop routers, they discovered that unencrypted packets were being sent to a server hosted by Amazon Web Services (AWS). In these packets, they discovered not only the SSID of the user’s wireless network, but the encryption key necessary to join it. There were also various tokens included that could be used to identify network and user.

While the report doesn’t go into too much detail, it seems this information is being sent as part of the configuration process when using the official Linksys mobile application. If you want to avoid having your information bounced around the Internet, you can still use the router’s built-in web configuration menus from a browser on the local network — just like in the good old days.

The real kicker here is the response from Linksys, or more accurately, the lack thereof. Testaankoop says they notified them of their discovery back in November of 2023, and got no response. There’s even been firmware updates for the affected routers since then, but the issue is still unresolved.

Testaankoop ends the review by strongly recommending users avoid these particular models of Linksys Velop routers, which given the facts, sounds like solid advice to us. They also express their disappointment in how the brand, a fixture in the consumer router space for decades, has handled the situation. If you ask us, things started going downhill once they stopped running Linux on their hardware.

Simple Version Of Pong Played On A Row Of LEDs

As far as video games go, Pong is already about as simple as it gets. But if even two dimensions is a bit more than you’re looking to tackle, [mircemk] shows how you can distill the core gameplay of this iconic title to its absolute minimum using an Arduino and a row of LEDs.

While [mircemk] brings their usual design aesthetic and flash to the project, this one could truly be done as a parts bin build. All you really need is a microcontroller with enough I/O pins (here, an Arduino Nano is used), a couple of buttons, and the aforementioned LEDs. A 16×2 LCD and a buzzer have been added to improve on the user interface a bit, but even that isn’t strictly required.

To play, each user holds their button and gets ready to hit it as soon as the LED closest to them lights up. Again, [mircemk] spruces this build up by offering both integrated buttons on the front panel of the game, as well as a pair of external “controllers” so you don’t have to crowd around the main unit. In this incarnation the score is shown on the LCD, but swapping that out for a pair of seven-segment LEDs could give the whole thing a bit more of a retro flair.

This isn’t the first time [mircemk] has tackled 1D Pong — if you can spring for addressable LEDs, you can pull the whole thing off with significantly less wiring.

Continue reading “Simple Version Of Pong Played On A Row Of LEDs”

A 64-bit X86 Bootloader From Scratch

For most people, you turn on your computer, and it starts the operating system. However, the reality is much more complex as [Thasso] discovered. Even modern x86 chips start in 16-bit real mode and there is a bit of fancy footwork required to shift to modern protected mode with full 64-bit support. Want to see how? [Thasso] shows us the ropes.

Nowadays, it is handy to develop such things because you don’t have to use real hardware. An emulator like QEMU will suffice. If you know assembly language, the process is surprisingly simple, although there is a lot of nuance and subtlety. The biggest task is setting up appropriate paging tables to control the memory mapping. In real mode, segments have access to fixed 64 K blocks of memory unless you use some tricks. But in protected mode, segments define blocks of memory that can be very small or cover the entire address space. These segments define areas of memory even though it is possible to set segments to cover all memory and — sort of — ignore them. You still have to define them for the switch to protected mode.

In the bad old days, you had more reason to worry about this if you were writing a DOS Extender or using some tricks to get access to more memory. But still good to know if you are rolling your own operating system. Why do the processors still boot into real mode? Good question.

Using Forward- And Reverse-Osmosis To Let Astronaut EVA Suits Produce Fresh Water From Urine

An uncomfortable reality with the spacesuits used for extravehicular activities (EVA) – commonly referred to as spacewalks – is that the astronaut spends hours in them, during which normal bodily functions like urinating and defecating continue. The current EVA record at the ISS is currently a hair under nine hours, necessitating a new approach. A team of researchers have now pitched the idea of an in-suit water recovery system with an article by [Sofia Etlin] and colleagues as published in Frontiers in Space Technologies.

For the current Extravehicular Mobility Unit (EMU) EVA spacesuit the current solution is what is called the MAG: the Maximum Absorbency Garment, which is effectively a fancy adult diaper with sodium polyacrylate as absorbent for up to 2 L of fluids. It replaced the urine collection device (UCD) that was used until female astronauts joined the astronaut corps in the 1970s. Generally astronauts aim to not defecate until they finish their EVA, which leaves urinating and the related activity of rehydrating as the spacesuits only have 0.95 L of water that has to last the duration of the spacewalk. Continue reading “Using Forward- And Reverse-Osmosis To Let Astronaut EVA Suits Produce Fresh Water From Urine”

Hackaday Links Column Banner

Hackaday Links: July 14, 2024

We’ve been going on at length in this space about the death spiral that AM radio seems to be in, particularly in the automotive setting. Car makers have begun the process of phasing AM out of their infotainment systems, ostensibly due to its essential incompatibility with the electronics in newer vehicles, especially EVs. That argument always seemed a little specious to us, since the US has an entire bureaucracy dedicated to making sure everyone works and plays well with each other on the electromagnetic spectrum. The effort to drop AM resulted in pushback from US lawmakers, who threatened legislation to ensure every vehicle has the ability to receive AM broadcasts, on the grounds of its utility in a crisis and that we’ve spent billions ensuring that 80% of the population is within range of an AM station.

Continue reading “Hackaday Links: July 14, 2024”

Five Ways To Repair Broken PCB Traces

When everything used wires, it was easy to splice them or replace them. Not so much with PC boards, but everyone has their favorite method for repairing a broken trace. [Mr. SolderFix] has his five favorite ways, as you can see in the video below.

Of course, before you can repair a trace, you probably have to expose it since most boards have solder mask now. Unless you plan to shut the trace at both ends, exposing the actual trace is probably the first step.

Continue reading “Five Ways To Repair Broken PCB Traces”