Engauge Makes Graph Thieving A Cinch

We’ve seen ’em before: the charts and graphs in poorly photocopied ’80s datasheets, ancient research papers, or even our college prof’s chalkboard chicken scratch. Sadly, this marvelously plotted data is locked away in a poorly rendered png or textbook graphic. Fortunately, a team of programmers have come the rescue to give us the proper thieving tool to lift that data directly from the source itself, and that tool is Engauge.

Engauge is an open source software tool that enables to convert pictures of plots into the numerical representation of their data. While some of us might still be tracing graphs by hand, Engauge enables us to simply define reference points on the graph, and a clever image-processing algorithm extracts the curve for us automatically! Sure, there’s a little fine-tuning to determine what counts as data, but the net result is an all-in-one software tool that eats pictures and produces data–no intermediate steps required!

Engauge has been helping scientists and engineers preserve ancient data logs for years now, but it’s a tool that’s still fresh today when we’re recording from an analog o’scope or lifting those xs and ys off a textbook. In a world that’s increasingly digital, we’ve got the Engague developers to thank for arming us with the right tool for the job. All that said, If graph-thieving isn’t your thing, try spline-thieving to go from camera to CAD.

Engauge is a little lacking in the demo-video department, but we dug up a quickie on YouTube.

Thanks for the tip, [Jason]!

Continue reading “Engauge Makes Graph Thieving A Cinch”

Remote PC Power Control Thwarts Button Pushers

Pervasive connectivity is a mixed blessing at best, especially when it creates the expectation that we’ll always have access to everything we need. When what you need is on your work or home PC, there are plenty of options for remotely accessing files using your phone. But if your roomie or the cleaning crew powers the machine down, you’ve got a problem – unless you’ve got a way to remotely power the machine back up.

[Ahmad Khattab]’s hack required getting up close and personal with his PC’s motherboard. A Particle Photon steals power from the always-on 3.3 volt line of the vacant Trusted Platform Module connector on his machine. Outputs from the Photon are connected to the motherboard’s power switch connection and a smartphone app drives the outputs and turns the machine on and off. As [Ahmad] admits, there are plenty of ways to attack this problem, including Wake-on-LAN. But there’s something to be said for the hardware approach, especially when a Photon can be had for $20.

Astute readers will note that we recently covered a very similar project using a Particle Core. Be sure to check that one out for a little more detail on using Particle’s cloud, and for some ideas on powering the module if your motherboard lacks a TPM port. In the meantime, enjoy [Ahmad]’s video.

Continue reading “Remote PC Power Control Thwarts Button Pushers”

Open Source… Windows?

There’s a lot to be said for open source software. The ability to change code to suit one’s needs, the fact that security vulnerabilities can be easier to find, and the overall transparency are just the tip of the iceberg when it comes to the strengths of using open source software. And, while Microsoft is no Apple when it comes to locking down their source code, their operating system is still, unfortunately, closed.

Don’t despair, though! There is a project out there that aims to change this. No, they’re not stealing anything or breaking into any computers to obtain Microsoft’s code. They’re writing their own version of Windows called ReactOS that aims to be binary-compatible with Windows. The software has been in development for over a decade, but they’re ready to release version 0.4 which will bring USB, sound, networking, wireless, SATA, and many more features to the operating system.

While ReactOS isn’t yet complete for everyday use, the developers have made great strides in understanding how Windows itself works. There is a lot of documentation coming from the project regarding many previously unknown or undocumented parts of Windows, and with more developers there could be a drop-in replacement for Windows within a few years. It’s definitely worth a shot if you fondly remember the frontier days of Linux where doing things like reading information on a CD required extensive experience using the terminal. If this is a little too much, though, there are other unique operating systems out there to investigate.

Thanks for the tip, [Matt]!

Fail Of The Week: Dave Jones And The Case Of The Terrible Tablet

Nothing spices up a quiet afternoon like the righteous indignance of an upset engineer, especially if that engineer is none other than [Dave Jones], on his EEVblog YouTube Channel. This week [Dave] has good reason to be upset. A viewer sent him what looked to be a nondescript 2010 era tablet from a company called Esinomed. From the outside it looked like a standard issue medical device. Opening up the back panel tells a completely different story though. This thing is quite possibly the worst hack job [Dave] (and we) have ever seen. This is obviously some kind of sales demo or trade show model. Even with that in mind, this thing is a fail.

wtf-solderThe tablet is based upon an off-the-shelf embedded PC motherboard and touchscreen controller. [Dave] took some offense at the hacked up USB connector on the touchscreen. We have to disagree with [Dave] a bit here, as the video seems to show that a standard mini-b connector wouldn’t have fit inside the tablet’s case. There’s no excuse for the USB cable shield draped over the bare touch controller board though. Things go downhill from there. The tablet’s power supply is best described as a bizarre mess. Rather than use a premade DC to DC converter, whoever built this spun their own switch mode power supply on a home etched board. The etching job looks good, but everything else, including the solder job, is beyond terrible. All the jumps and oddly placed components make it look like a random board from the junk bin was used to build this supply.

The story gets even worse with the batteries. The tablet has horribly hand soldered NiMH cells shoved here, there and everywhere. Most of the cells show split shrink wrap – a sure sign they have been overheated. It’s hard to tell from the video, but it appears as if a few cells have their top mounted vent holes covered with solder. That’s a great way to turn a simple rechargeable battery into a pipe bomb. Batteries can be safely hand soldered – Radio Controlled modelers did it for decades before LiPo cells took over.

We’ve all hacked projects together at the last minute; that’s one of the things we celebrate here on Hackaday. However, since this is a commercial medical device (with serial number 11 no less) we have to stamp this one as a fail.

Continue reading “Fail Of The Week: Dave Jones And The Case Of The Terrible Tablet”

A Modern 386 Development Board

Some readers out there probably have nostalgic feelings for their first 386 based PC, the beeps and hisses of the modem, and the classic sound of a floppy drive’s stepper motor. Perhaps that turbo button that we could never quite figure out.

If you want the power of a 386 processor today, you’re in luck: [Pierre Surply] has developed a modern development board for the 80386SX CPU. This board is based on a 386 processor that comes in a LQFP package for “easy” soldering, and an Altera Cyclone IV FPGA.

To allow the CPU to run, the FPGA emulates the chipset you would usually find on a PC motherboard. The FPGA acts as both a bus controller and a memory controller for the CPU. On the board, there’s an SRAM chip and internal memory on the FPGA, which can be accessed through the 386’s bus access protocol.

The FPGA also provides debugging features. A supervisor application running on the FPGA gives debugging functionality via a FTDI USB to UART chip. This lets you control operation of the CPU from a PC for debugging purposes. The FPGA’s memory can be programmed through a JTAG interface.

The project is very well documented, and is a great read if you’re wondering how your old 386 actually worked. It can even be hand soldered, so the adventurous can grab the design files and give it a go. The francophones reading can also watch the talk in the video below.

Continue reading “A Modern 386 Development Board”

Ditch The IPad; Build A Commodore 64 Tablet

The classic Commodore 64 has had its share of modernizing in the OS department. From its roots starting up a basic prompt, to full high resolution GUI packages like GEOS, to today where [Jim_64] added a tablet like launcher complete with a touch screen interface.

The GUI itself takes advantage of the high resolution graphics of the C-64 that looks similar to iOS, Icons are selected via cursor keys or joystick (what? no light pen?) and launch the various functions they represent. To add to the tablet-like feel of the OS, an off the shelf 3m touch screen panel and its corresponding RS232 interface board were obtained from digikey.

With the panel securely attached to the monitor, XY data from the various finger pokes are sent via serial at a blazing 1200 bps where the program interprets the position. Using the available demo (download sideA and sideB) and off the shelf parts, this should be easy for anyone with a classic C-64 to set up in their own home and have some fun.

Join us after the break for a few demo videos!

Continue reading “Ditch The IPad; Build A Commodore 64 Tablet”

Physical Security For Desktop Computers

There’s a truism in the security circles that says physical security is security. It doesn’t matter how many bits you’ve encrypted your password with, which elliptic curve you’ve used in your algorithm, or if you use a fingerprint, retina scan, or face print for a second factor of authentication. If someone has physical access to a device, all these protections are just road bumps in the way of getting your data. Physical access to a machine means all that data is out in the open, and until now there’s nothing you could do to stop it.

This week at Black Hat Europe, Design-Shift introduced ORWL, a computer that provides the physical security to all the data sitting on your computer.

The first line of protection for the data stuffed into the ORWL is unique key fob radio. This electronic key fob is simply a means of authentication for the ORWL – without it, ORWL simply stays in its sleep mode. If the user walks away from the computer, the USB ports are shut down, and the HDMI output is disabled. While this isn’t a revolutionary feature – something like this can be installed on any computer – that’s not the biggest trick ORWL has up its sleeve.

ORWL2The big draw to the ORWL is a ‘honeycomb mesh’ that completely covers every square inch of circuit board. This honeycomb mesh is simply a bit of plastic that screws on to the ORWL PCB and connects dozens of electronic traces embedded in this board to a secure microcontroller. If these traces are broken – either through taking the honeycomb shell off or by breaking it wide open, the digital keys that unlock the computer are erased.

The ORWL specs are what you would expect from a bare-bones desktop computer: Intel Skylake mobile processors, Intel graphics, a choice of 4 or 8GB of RAM, 64 to 512GB SSD. WiFi, two USB C ports, and an HDMI port provide all the connections to the outside world.

While this isn’t a computer for everyone, and it may not even a very large deployment, it is an interesting challenge. Physical security rules over all, and it would be very interesting to see what sort of attack can be performed on the ORWL to extract all the data hidden away behind an electronic mesh. Short of breaking the digital key hidden on a key fob, the best attack might just be desoldering the chips for the SSD and transplanting them into a platform more amenable to reading them.

In any event, ORWL is an interesting device if only for being one of the few desktop computers to tackle the problem of physical security. As with any computer, if you have physical access to a device, you have access to all the data on the device; we just don’t know how to get the data off one of these tiny computers.

Video below.

Continue reading “Physical Security For Desktop Computers”