A Simple App Controlled Door Lock

[Adnan.R.Khan] had a sliding door latch plus an Arduino, and hacked together this cool but simple app controlled door lock.

Mechanically the lock consists of a Solarbotics GM3 motor, some Meccano, and a servo arm. A string is tied between two pulleys and looped around the slide of a barrel latch. When the motor moves back and forth it’s enough to slide the lock in and out. Electronically an Arduino and a Bluetooth module provide the electronics. The system runs from a 9V battery, and we’re interested to know whether there were any tricks pulled to make the battery last.

The system’s software is a simple program built in MIT App Inventor. Still, it’s pretty cool that you can get functionally close to a production product with parts that are very much lying around. It also makes us think of maybe keeping our childhood Meccano sets a little closer to the bench!

74-Series Clock Gets A MEMS Heart

[Erik van Zijst] has had a long career as a programmer, but lacked an understanding of what was happening at a bare metal level. After building a few logic gates out of transistors to get a feel for electronics, he set out to build a working clock using 74-series logic. Naturally, it was quite the adventure. 

The project starts out as many do on the breadboard. The requisite BCD counters and 7-segment displays were sourced, and everything was connected up with a cavalcade of colorful hookup wires. A 32.768 KHz crystal was pressed into service to generate the clock signal, divided down to get a 1Hz output to drive the seconds counter that would then run the entire clock. [Erik] then had to learn some more practical electronics skills, to deal with debouncing buttons for the time setting circuit.

With the clock now functional, [Erik] decided to take things further, aiming to build something more robust and usable. An automatic brightness control was created using a 555 to run a crude PWM dimmer for the LEDs. Additionally, a PCB was designed to replace the temporary breadboard setup. This led to problems with the oscillator that [Erik] couldn’t quite figure out. Rather than continue on the same path, he changed tack, instead replacing the quartz crystal with a modern MEMS oscillator that solved the problem.

It’s a great look at how to construct a working clock from bare logic, and one that serves to remind us just how complex even a seemingly simple device can be. We’ve seen other from-scratch builds before too, like this 777-transistor clock, or this attractive stacked design. Video after the break.

Continue reading “74-Series Clock Gets A MEMS Heart”

Hardware Hack Makes Robocall Blocking Service Even Better

Sorry to bear sad tidings, but your car’s extended warranty is about to expire. At least that’s what you’ll likely hear if you answer one of those robocalls that have descended like a plague upon us. We applaud any effort to control the flood of robocalls, even if it means supplementing a commercial blocking service with a DIY ring-blocker.

The commercial service that [Jim] engaged to do his landline blocking is called Nomorobo – get it? It uses the Simultaneous Ringing feature many VoIP carriers support to intercept blacklisted robocallers, but with a catch: it needs caller ID data, so it lets the first ring go through. [Jim]’s box intercepts the ringing signal coming from his Xfinity modem using a full-wave rectifier and an analog input on an Arduino. Once the ring pattern is received, the Arduino flips a relay that connects all the phones in the house to the line, letting the call ring through. If Nomorobo has blocked the call, he’ll never hear a thing. There were a few glitches to deal with, like false positives from going off- and on-hook, but those were handled in software. There’s also a delay in displaying caller ID information on his phones, but it’s a small price to pay for peace.

Any escalation in the war on robocalls is justified, and we applaud [Jim] for his service. Should you feel like joining the fray, step one is to know your enemy. This primer on robocalling will help.

Thanks to [Phil] for the tip.

DMCA-Locked Tractors Make Decades-Old Machines The New Hotness

It’s fair to say that the hearts and minds of Hackaday readers lie closer to the technology centres of Shenzhen or Silicon Valley than they do to the soybean fields of Minnesota. The common link is the desire to actually own the hardware we buy. Among those working the soil there has been a surge in demand (and consequently a huge price rise) in 40-year-old tractors.

Second-hand farm machinery prices have made their way to the pages of Hackaday due to an ongoing battle between farmers and agricultural machinery manufacturers over who has the right to repair and maintain their tractors. The industry giant John Deere in particular uses the DMCA and end-user licensing agreements to keep all maintenance in the hands of their very expensive agents. It’s a battle we’ve reported on before, and continues to play out across the farmland of America, this time on the secondary market. Older models continue to deliver the freedom for owners to make repairs themselves, and the relative simplicity of the machines tends to make those repairs less costly overall.

Tractors built in the 1970s and 80s continue to be reliable and have the added perk of predating the digital shackles of the modern era. Aged-but-maintainable machinery is now the sweetheart of farm sales. It confirms a trend I’ve heard of anecdotally for a few years now, that relatively new tractors can be worth less than their older DMCA-free stablemates, and it’s something that I hope will also be noticed in the boardrooms. Perhaps this consumer rebellion can succeed against the DMCA where decades of activism and lobbying have evidently failed.

They just don’t build ’em like they used to.


[Image Source: John Deere 2850 by Raf24 CC-BY-SA 3.0]

[Via Hacker News]

City Clock Is Beautiful Tribute To Parisian Architecture

Binary clocks are often created as a programming exercise, or to display the time in a project with the minimal practical components. Displaying the time in binary needn’t always be for practicalities sake, however. The City Clock shows that it can be applied quite artfully, too.

The electronic side of things is simple – an Arduino Nano runs 13 LEDs, with a digital IO pin for each. Including a real time clock module is optional, though we imagine pretty essential if you wish the clock to keep accurate time. The LEDs are fitted into a grid, which is fitted behind the windowed facade of the building. This helps block light leaks between adjacent segments, giving a more polished look to the final design. The whole assembly is built out of lasercut wood, making it a quick and easy build if you’ve got such a tool handy.

It’s a simple concept, but one that is particularly striking in action. Even to those unaware of its horological abilities, it presents the appearance of a living building, with inhabitants switching lights on and off throughout the day. It would make an excellent bookshelf or coffee table piece, and we’re highly tempted to give building our own a go. Video after the break.

Continue reading “City Clock Is Beautiful Tribute To Parisian Architecture”

Voltmeter Clock Looks Great On Display

Voltmeters are cheap, and have a great industrial aesthetic about them. This makes them prime candidates for hackers looking to do a clock build. [Brett Oliver] went down this very road, and built a very stylish timepiece along the way.

[Brett] initially wanted to go with 240-degree voltmeters, however the cost was prohibitive, so settled for the more common 90-degree models. New dials were produced by first sanding down the old dials, repainting in an old-fashioned off-white, and then applying the new graphics with inkjet transfer paper.

The attention to detail continues with the case. [Brett] aimed to build the clock with an old-school lab equipment aesthetic. A large piece of mahogany was crafted into the base.  A clear plastic cover was sourced from eBay, which really makes the piece. Large buttons and toggle switches were chosen to complete the look.

On the electronic side of things, it’s all run by a PIC16F628A, which controls the voltmeters via PWM. Running with a 20MHz crystal, the PIC is not a great timekeeper. Instead, the whole show is synchronized to [Brett]’s master clock we featured a few years back.

Building a clock is a rite of passage for a hacker, and [Brett]’s example goes to show how craftsmanship can really pay off in this pursuit. Video after the break.
Continue reading “Voltmeter Clock Looks Great On Display”

Unlocking SIM Cards With A Logic Analyzer

[Jason Gin] wanted to reuse the SIM card that came with a ZTE WF721 wireless terminal he got from AT&T, but as he expected, it was locked to the device. Unfortunately, the terminal has no function to change the PIN and none of the defaults he tried seemed to work. The only thing left to do was crack it open and sniff the PIN with a logic analyzer.

This project is a fantastic example of the kind of reverse engineering you can pull off with even a cheap logic analyzer and a keen eye, but also perfectly illustrates the fact that having physical access to a device largely negates any security measures the manufacturer tries to implement. [Jason] already knew what the SIM unlock command would look like; he just needed to capture the exchange between the WF721 and SIM card, find the correct byte sequence, and look at the bytes directly after it.

Finding the test pads on the rear of the SIM slot, he wired his DSLogic Plus logic analyzer up to the VCC, CLK, RST, and I/O pins, then found a convenient place to attach his ground wire. After a bit of fiddling, he determined the SIM card was being run at 4 MHz, so he needed to configure a baud rate of 250 kbit/s to read the UART messages passing between the devices.

Once he found the bytes that signified successful unlocking, he was able to work his way backwards and determine the unlock command and its PIN code. It turns out the PIN was even being sent over the wire in plain text, though with the way security is often handled these days, we can’t say it surprises us. All [Jason] had to do then was put the SIM in his phone and punch in the sniffed PIN when prompted.

Could [Jason] have just run out to the store and picked up a prepaid SIM instead of cracking open this wireless terminal and sniffing its communications with a logic analyzer? Of course. But where’s the fun in that?