Windmill Made From Washing Machine, 555 Chip

Green hacks implement one of two philosophies. The first is über-technical, with very expensive, high-quality components. The other side of this coin creates green power out of junk. [Timot] obviously took the latter choice, building a windmill out of an old washing machine motor and a few bits of PVC.

The generator for the windmill is based on a Fisher and Paykel direct drive usually found in clothes washing machines, rewired to provide 12 Volts at low RPM. At high speeds, the generator can produce 80 Volts, so a charge controller – even one based on a 555 chip – was an excellent addition.

For the other miscellaneous mechanical parts of the build, [Timot] cut the blades of the windmill out of 200 mm PVC pipe and sanded them down a bit for a better aerodynamic profile. With a custom fiberglass spinner, [Timot] whipped up a very attractive power station that is able to provide about 20 watts in normal conditions and 600 watts when it’s very windy. Not enough to power a house by any means, but more than enough to charge a cellphone or run a laptop for a few hours out in the back country.

Kindle Weather And Recycling Display

kindle-weather-and-recycling-display

We’ve seen a fair number of hacks like this one that reuse a Kindle basically just for its ePaper display. [HaHaBird] has this device hanging on his refrigerator to display the weather and remind him about recycling day. It kind of make us wonder why we’re not seeing cheap ePaper modules on the hobby market?

The concept isn’t new, but [HaHaBird] does move it along just a little bit. He started by following the guide which [Matt] wrote after pulling off the original Kindle weather display hack. It uses a separate computer running a script that polls the Internet for weather data and generates a vector graphic like the one seen above. The Kindle then loads the image once every five minutes thanks to a cron job on the rooted device. But why stop there? [HaHaBird] tweaked the script to include a reminder about his municipality’s irregular recycling schedule.

Don’t overlook the quality of the hardware side of this hack. With its prominent place in the kitchen he wanted a nicely finished look. This was achieved by building a frame out of cherry and routing passages on the back to make room for the extension cable (so it could hang in landscape orientation) and a toggle to hold the Kindle firmly in place. Additional information on the build is available here.

Doctor Who-style WiFi

wifi

Spoilers, sweetie…

If you didn’t catch the latest episode of Doctor Who, here’s the plot: Random people connect to strangely-named WiFi networks and later have their conciousness uploaded to the Internet with the help of spoonheaded robots. To the non-Whovian that doesn’t make a whole lot of sense, but [Tony Box] figured out a way to replicate the effect with a Linux box and a USB WiFi card, just in time for a great April Fool’s gag.

For the SSID, the folks over on reddit decided the best characters come from the Unified Canadian Aboriginal Syllabics Unicode block. [Tony] then set up a laptop with a USB wifi card with hostapd, and dnsmasq to change the SSID and DHCP leases. nginx serves up a simple web page with a short clip from the episode (of a spoonhead uploading a conciousness).

Here’s what’s really interesting: [Tony] is using a captive portal, so something like the webpage that shows up when you log on to the internet in a coffee shop or hotel. When the victim of this prank logs on to The Great Intelligence’s WiFi, they’re presented with a webpage containing the video of the spoonhead.

You can check out [Tony]’s demo of his build after the break.

Continue reading “Doctor Who-style WiFi”

Visualize Twitter With An LED Matrix

visualizing-twitter

What’s your favorite color? Don’t tell us, Tweet it to [Sebastian’s] favorite color Twitter display and you’ll be contributing to the artwork hanging on his wall.

This answers a very important question, what do you do with your projects after they’re completed? For us the best part is the planning and building. Once it’s done the thrill is pretty much gone for us. We haven’t even switched on our Ping Pong clock in over a year. But [Sebastian] recently dusted his 10×10 LED matrix for this project.

Tweets are parsed by a Python project he wrote to try out the Twitter API. It looks for a set list of colors . He asserts that people aren’t that creative when you solicit their favorite color but to prove him wrong we’re going to say our favorite is Amaranth. After it finds the color it pushes it to the next pixel in the spiraling pattern shown above. But wait, there’s more! To give the pixels a but if extra meaning he uses the total length of the tweet to set intensity.

If you need a Titter enabled hack that displays a bit more specific data you’ll want something that can actually display what was Tweeted.

Building RAM Into Veronica – The 6502 Computer

ram-for-veronica

It seems strange that RAM is being added to a computer so late in the build, but [Quinn Dunki] must have had it in the back of her mind the whole time because it turns out to be a rather painless experience. For those of you keeping score, this makes her Veronica project Turing complete.

The brightly colored rats nest pictured above connects the new components to the 6502 computer backplane seen in the upper left. [Quinn] decided to go with two 32K SRAM modules which need very little in the way of drive hardware (it’s hanging out on the breadboard to the left). The RAM module will simply listen for its address and react accordingly. There is one hitch regarding a two-phase clock and the need to protect the RAM from erroneous data during the first of those phases.

Getting this all to work actually pointed out a bug in the ROM module she had long ago completed. After picking up on the problem she was able to correct it simply by cutting traces and soldering in jumper wires.

Images Carrying An Encrypted Data Payload

encrypted-data-image

This is a tidy looking banner image. But according to [Ian] it contains 52KB of source code. You can’t just read out all of that data. Well, you can but it will be gibberish. Before hiding the bits in plain sight he encrypted them with two different keys.

He’s using AES-256 encryption to keep his data away from prying eyes. But if that wasn’t enough, he also wrote a PHP program to hide the bits in a PNG image. Not just any picture will do (otherwise your eye will be able to see something’s awry). The post linked above focuses mainly on how to choose an image that will hide your data most easily. We asked him if he would share his techniques for actually merging the encrypted file with the picture and he delivered. Head on over to his repository if you want to take a look at the generator code.