[ashish] is still having fun with his lasers. His latest hack is a dual laser based tracking camera. He mounted his camera to a simple parallel port controlled stepper motor. Essentially, if the camera loses track of either laser, it tracks to locate the lost edge of the object. I’d probably go with IR to reduce the chance of retina damage…
computer hacks1396 Articles
computer hacks
Simple USB Plug
I’m more into this one just for the simple USB plug than the joke that it’s used for. I’ve seen similar on extra small USB flash drives, but those are generally pre-etched. The idea is to use a piece of proto board to make a USB plug an mount a superbright LED on it. Pie indeed.
Ion Cooler 3.0 (return Of InventGeek)
[Jared]s been taking a bit of a hiatus, but he assures me that he’s gearing up for a bunch of new projects. The first sign that he’s awakened from his slumber is his latest take on the Ion Cooler. This time he’s built a CPU specific version. The cooler is made from off the shelf materials – heap pipe heat sink, copper pipe, tack nails, acrylic and even the ion generator are easy to get. It’s an interesting way to cool your PC if your comfortable with 10,000 volts or so next to your CPU.
Stroboscope LED Fan Clock
[sprite_tm] sent in one of his latest little adventures – and I love it. To create his stroboscope fan clock, he put a couple of red and green clock hands onto a standard PC fan(I love Panaflo fans), then he built a circuit to strobe a RGB LED to create a set of virtual clock hands on the spinning fan. An ATTiny2313 does all the work, with the help of some transistors to drive the LEDs.
Drive Bay PoE Adapter
Sure, we’ve seen Power over Ethernet before – I even whipped up a simple adapter for my modded wrt54gs. This is a nice clean setup, and it’ll save you from yet another power brick. (I’ve got a power strip dedicated to the things in my tiny home data center.)
ToorCon 9: Crypto Boot Camp
[Rodney Thayer] gave a 2 hour seminar on cryptographic technology. It was designed to give the audience a working knowledge for dealing with vendors. He gave some rules of thumb for choosing encryption. In order of preference, when doing symmetric key crypto: use AES with a minimum 128bit key, if not that 3-key Triple-DES, or last RC4 with 128bit key. For hashing: SHA 256 preferred, SHA 1 if you can’t do any better, and MD5 if you can’t SHA. For public key: RSA using at least a 2048bit key. The top choices in these lists were picked because they’ve stood up to years of scrutiny. One major theme of talk was to never roll your own crypto algorithm or buy someone elses. Proprietary algorithms get broken all the time, like the GSM A5 crypto we talked about earlier this year.
Nobel Prize Hard Drive Hacking Roundup
Ironically, high end gear is moving toward solid state hard drives, but I think it’s time for a hard drive hacking roundup in honor of the Nobel prize for physics being awarded for the technology behind todays magnetic hard drives.
We recently saw this awesome hard drive clock – which uses the actual drive hardware to show the time. Then there’s the now classic hard drive window – the trick is to create a clean room/box so you can swap out the cover. Let’s not forget the hard drive oscilloscope – made from a laser mounted on the oscillating drive arm. Sometimes drives die, so a bit of resurrection may be in order. Locked out? Maybe you should built a lock-picking gun from a junk drive. Some people just like to hide the things.