Software Defined… CPU?

Everything is better when you can program it, right? We have software-defined radios, software-defined networks, and software-defined storage. Now a company called Ascenium wants to create a software-defined CPU. They’ve raised millions of dollars to bring the product to market.

The materials are a bit hazy, but it sounds as though the idea is to have CPU resources available and let the compiler manage and schedule those resources without using a full instruction set. A system called Aptos lets the compiler orchestrate those resources.

Continue reading “Software Defined… CPU?”

CNC Saves Water Cooling Setup

A classic problem. You have a new CPU and a 15-year old water cooling system. Of course, the bracket doesn’t fit. Time to buy a new cooler? Not if you are [der8auer]. You design a new bracket and mill it out of aluminum.

Honestly, it might seem overkill, but it makes sense. After all, no matter how new the CPU is, using water to cool it still works the same way, in principle.

Continue reading “CNC Saves Water Cooling Setup”

The First New Vacuum Tube Computer Design For Well Over Half A Century

In a few museums around the world, there lies the special experience of seeing some of the earliest computers. These room-filling monsters have multiple racks of vacuum tubes that are kept working by the dedication and care of their volunteer maintainers. A visit to the primordial vacuum tube computer, Colossus at Bletchley Park, UK, led [Mike] on the path towards designing an entirely new one. He thinks it’s the first to see the light of day in over five decades. ENA, the Electron tube New Automatic Computer, is the result.

It uses 550 Soviet 6N3P double triodes, and its 8-bit Von Neumann architecture is constructed from the tubes wired up as 5-input NOR gates. ROM is a diode matrix, and RAM comes courtesy of reed relays. The whole thing is assembled as eleven PCBs on a wall-mounted frame, with a console that holds the piece de resistance, a display made from an array of LEDs. A Pong game is in development, meanwhile the machine makes an impressive room heater.

If you’d like to see some more vacuum tube computational goodness, we saw Colossus at the National Museum of Computing, back in 1996.

Hacked On SO-DIMM Slot Was Worth A Shot

Finding unpopulated pads on a circuit board is often a sign that the device in question has some untapped potential. These blank spots on the board could be left over from features or capabilities that were deleted from the design, or perhaps even represent an optional upgrade that wasn’t installed on this particular specimen. So we certainly understand why [d0rk] was fascinated by the empty SO-DIMM footprint he recently found on a laptop’s motherboard.

The budget Celeron machine shipped with 4 GB of RAM installed in its single socket, a situation [d0rk] hoped he could improve upon with the addition of a second module. But could it really be as simple as pulling the socket from a dead motherboard and soldering it into place? Would other components need to be added to the board? Could the BIOS cope with the unexpected upgrade? There was only one way to find out…

Room to grow

At first, it seemed like the patient didn’t survive the operation. But a close look uncovered that the power button had actually gotten damaged somewhere along the line. Once [d0rk] fixed that the machine started up, but unfortunately the operating system didn’t see the extra RAM module. Even after upgrading the BIOS, the computer remained oblivious to the additional memory.

When he went back in to inspect his solder work for shorts or bad joints, disaster struck. For reasons that aren’t immediately clear, the computer no longer starts. Even after pulling the transplanted SO-DIMM slot off the board entirely, [d0rk] says it won’t make it through the self-test. Obviously a disappointing conclusion, but we respect the effort he put into the attempt.

While this memory upgrade didn’t go according to plan, we’ve seen enough success stories over the years to balance it out. From old wireless routers to cutting-edge video cards, plenty of gadgets have received a memory boost courtesy of a soldering iron and a steady hand.

[Thanks to Timothy for the tip.]

Bellow-Cooled PC Is A Well Engineered Display Piece

The cooling systems on high-performance PCs are often a large part of their visual appeal, but we’ve never seen anything like [DIY Perks]’ latest build: A massive bellow-cooled PC.

The system is derived from a silent bellow system built by [DIY Perks] in 2020. It uses a clever combination of hydraulics and neodymium magnets to smoothly reciprocate a large plate within a chamber. Instead of blowing the air straight into the room, it pushes it through a pair of wood ducts into a second chamber with PC components, and out through a water-cooling radiator. To prevent the hot air from being sucked back in as the bellow reciprocates, a row of check valves was added on each side of the PC chamber and at the external intakes. The sides of the bellow chamber and PC chamber are made of glass to allow a full view of the internal components.

The build was not without complications. While disassembling the old bellow, the acrylic tube in which the magnet reciprocates shattered. When a replacement rube arrived, [DIY Perks] discovered the magnet’s fit was very loose. He solved this by increasing the thickness of the magnet’s nickel coating with another run of electroplating. To achieve a uniform coating, he agitated the plating solution by suspending the magnet from a small speaker playing a sine-wave tone. The cooling performance is excellent, keeping the CPU and GPU at 60C or below, even while running them at full tilt.

Continue reading “Bellow-Cooled PC Is A Well Engineered Display Piece”

WiFiWart Linux Pentesting Device Gets First PCBs

When we last checked in on the WiFiWart, an ambitious project to scratch-build a Linux powered penetration testing drop box small enough to be disguised as a standard phone charger, it was still in the early planning phases. In fact, the whole thing was little more than an idea. But we had a hunch that [Walker] was tenacious enough see the project through to reality, and now less than two months later, we’re happy to report that not only have the first prototype PCBs been assembled, but a community of like minded individuals is being built up around this exciting open source project.

Now before you get too excited, we should probably say that the prototypes didn’t actually work. Even worse, the precious Magic Smoke was released from the board’s Allwinner A33 ARM SoC when a pin only rated for 2.75 V was inadvertently fed 3.3 V. The culprit? Somehow [Walker] says he mistakenly ordered a 3.3 V regulator even though he had the appropriate 2.5 V model down in the Bill of Materials. A bummer to be sure, but that’s what prototypes are for.

Even though [Walker] wasn’t able to fire the board up, the fact that they even got produced shows just how much progress has been made in a relatively short amount of time. A lot of thought went into how the 1 GB DDR3 RAM would get connected to the A33, which includes a brief overview of how you do automatic trace length matching in KiCad. He’s also locked in component selections, such as the RTL8188CUS WiFi module, that were still being contemplated as of our last update.

Multiple boards make better use of vertical space.

Towards the end of the post, he even discusses the ultimate layout of the board, as the one he’s currently working on is just a functional prototype and would never actually fit inside of a phone charger. It sounds like the plan is to make use of the vertical real estate within the plastic enclosure of the charger, rather than trying to cram everything into a two dimensional design.

Want to get in on the fun, or just stay updated as [Walker] embarks on this epic journey? Perhaps you’d be interested in joining the recently formed Open Source Security Hardware Discord server he’s spun up. Whether you’ve got input on the design, or just want to hang out and watch the WiFiWart get developed, we’re sure he’d be happy to have you stop by.

The first post about this project got quite a response from Hackaday readers, and for good reason. While many in the hacking and making scene only have a passing interest in the security side of things, we all love our little little Linux boards. Especially ones that are being developed in the open.

This Week In Security: Bad Signs From Microsoft, An Epyc VM Escape

Code signing is the silver bullet that will save us from malware, right? Not so much, particularly when vendors can be convinced to sign malicious code. Researchers at G DATA got a hit on a Windows kernel driver, indicating it might be malicious. That seemed strange, since the driver was properly signed by Microsoft. Upon further investigation, it became clear that this really was malware. The file was reported to Microsoft, the signature revoked, and the malware added to the Windows Defender definitions.

The official response from Microsoft is odd. They start off by assuring everyone that their driver signing process wasn’t actually compromised, like you would. The next part is weird. Talking about the people behind the malware: “The actor’s goal is to use the driver to spoof their geo-location to cheat the system and play from anywhere. The malware enables them to gain an advantage in games and possibly exploit other players by compromising their accounts through common tools like keyloggers.” This doesn’t seem to really match the observed behavior of the malware — it seemed to be decoding SSL connections and sending the data to the C&C server. We’ll update you if we hear anything more on this one.
Continue reading “This Week In Security: Bad Signs From Microsoft, An Epyc VM Escape”