Universal Chip Analyzer: Test Old CPUs In Seconds

Collecting old CPUs and firing them up again is all the rage these days, but how do you know if they will work? For many of these ICs, which ceased production decades ago, sorting the good stuff from the defective and counterfeit is a minefield.

Testing old chips is a challenge in itself. Even if you can find the right motherboard, the slim chances of escaping the effect of time on the components (in particular, capacitor and EEPROM degradation) make a reliable test setup hard to come by.

Enter [Samuel], and the Universal Chip Analyzer (UCA). Using an FPGA to emulate the motherboard, it means the experience of testing an IC takes just a matter of seconds. Why an FPGA? Microcontrollers are simply too slow to get a full speed interface to the CPU, even one from the ’80s.

So, how does it actually test? Synthesized inside the FPGA is everything the CPU needs from the motherboard to make it tick, including ROM, RAM, bus controllers, clock generation and interrupt handling. Many testing frequencies are supported (which is helpful for spotting fakes), and if connected to a computer via USB, the UCA can check power consumption, and even benchmark the chip. We can’t begin to detail the amount of thought that’s gone into the design here, from auto-detecting data bus width to the sheer amount of models supported, but you can read more technical details here.

The Mojo v3 FPGA development board was chosen as the heart of the project, featuring an ATmega32U4 and Xilinx Spartan 6 FPGA. The wily among you will have already spotted a problem – the voltage levels used by early CPUs vary greatly (as high as 15V for an Intel 4004). [Samuel]’s ingenious solution to keep the cost down is a shield for each IC family – each with its own voltage converter.

Continue reading “Universal Chip Analyzer: Test Old CPUs In Seconds”

Upgrade Your Mac With A Touchscreen, For Only A Dollar

Imagine how hard it could be to add a touch screen to a Mac laptop. You’re thinking expensive and difficult, right? How could [Anish] and his friends possibly manage to upgrade their Mac with a touchscreen for only a dollar? That just doesn’t seem possible.

The trick, of course, is software. By mounting a small mirror over the machine’s webcam, using stiff card, hot glue, and a door hinge. By looking at the screen and deciding whether the image of a finger is touching its on-screen reflection, a remarkably simple touch screen can be created, and the promise of it only costing a dollar becomes a reality. We have to salute them for coming up with such an elegant solution.

They have a video which we’ve put below the break, showing a few simple applications for their interface. Certainly a lot less bother than a more traditional conversion.

Continue reading “Upgrade Your Mac With A Touchscreen, For Only A Dollar”

An 8-Bit ALU, Entirely From NAND Gates

One of the things that every student of digital electronics learns, is that every single logic function can be made from a combination of NAND gates. But nobody is foolhardy enough to give it a try, after all that would require a truly huge number of gates!

Someone evidently forgot to tell [Notbookies], for he has made a complete 8-bit ALU using only 4011B quad NAND gates on a set of breadboards, and in doing so has created a minor masterpiece with his wiring. It’s inspired by a series of videos from [Ben Eater] describing the construction of a computer with the so-called SAP (Simple As Possible) architecture. The 48 4011B DIP packages sit upon 8 standard breadboards, with an extra one for a set of DIP switches and LEDs, and a set of power busbar breadboards up their sides. He leaves us with the advice borne of bitter experience: “Unless your goal is building a NAND-only computer, pick the best IC for the job“.

We have covered countless processors and processor components manufactured from discrete logic chips over the years, though this makes them no less impressive a feat. The NedoNAND has been a recent example, a modular PCB-based design. TTL and CMOS logic chips made their debut over 50 years ago so you might expect there to be nothing new from that direction, however we expect this to be  well of projects that will keep flowing for may years more.

Via /r/electronics/.

Hackaday Visits World’s Oldest Computer Festival: TCF 43

I was fortunate enough to visit the Trenton Computer Festival last weekend. The show struck a very interesting mix of new and old, commercial and educational. Attendees were writing programs in BASIC on an Apple I (courtesy of the Vintage Computer Federation) not more than five feet from where students were demonstrating their FIRST robot.

The one-day event featured over fifty demonstrations, talks, and workshops on topics ranging from a crash course in lock picking to the latest advancements in quantum computing. In the vendor room you could buy a refurbished laptop while just down the hall talks were being given on heady topics such as using neural networks and genetic algorithms for day trading on the stock market.

Recent years have seen a widening of the content presented, but TCF’s longevity means there is a distinct “vintage” vibe to the show and the culture surrounding it. Many of the attendees, and even some of the presenters, can proudly say they’ve been attending since the very first show in 1976.

There was simply too much going on to see everything. At any given time, there were eleven talks happening simultaneously, and that doesn’t include the demonstrations and workshops which ran all day. I documented as many highlights from this year’s TCF as I could for those who haven’t had a chance to visit what might be the most low-key, and certainly oldest, celebration of computing technology on the planet. Join me after the break for the whirlwind tour.

Continue reading “Hackaday Visits World’s Oldest Computer Festival: TCF 43”

Converting Power Supplies For Antique Computers

Just because something is “never used” doesn’t mean it’s good. [Inkoo Vintage Computing] learned that lesson while trying to repair an Amiga 500 and finding parts online that were claimed to be “new” in that they were old stock that had never been used. The problem was that in the last 30 years the capacitors had dried out, rendering these parts essentially worthless. The solution, though, was to adapt a modern PSU for use on the old equipment.

The first hurdle to getting this machine running again was finding the connector for the power supply. The parts seemed to have vanished, with some people making their own from scratch. But after considering the problem for a minute longer they realized that another Commodore machine used the same parts, and were able to source a proper cable.

Many more parts had to be sourced to get the power supply operational, but these were not as hard to come across. After some dedicated work with the soldering iron, the power supply was put to use running the old Amiga. Asture readers will know that [Inkoo Vintage Computing] aren’t strangers to the Amiga. They recently were featured with a nondestructive memory module hack that suffered from the same parts sourcing issues that this modification had, but also came out wonderfully in the end.

Bring Deep Learning Algorithms To Your Security Cameras

AI is quickly revolutionizing the security camera industry. Several manufacturers sell cameras which use deep learning to detect cars, people, and other events. These smart cameras are generally expensive though, compared to their “dumb” counterparts. [Martin] was able to bring these detection features to a standard camera with a Raspberry Pi, and a bit of ingenuity.

[Martin’s] goal was to capture events of interest, such as a person on screen, or a car in the driveway. The data for the events would then be published to an MQTT topic, along with some metadata such as confidence level. OpenCV is generally how these pipelines start, but [Martin’s] camera wouldn’t send RTSP images over TCP the way OpenCV requires, only RTSP over UDP. To solve this, Martin captures the video stream with FFmpeg. The deep learning AI magic is handled by the darkflow library, which is itself based upon Google’s Tensorflow.

Martin tested out his recognition system with some cheap Chinese PTZ cameras, and the processing running on a remote Raspberry Pi. So far the results have been good. The system is able to recognize people, animals, and cars pulling in the driveway.  His code is available on GitHub if you want to give it a spin yourself!

Cracking An Encrypted External Hard Drive

As far as hobbies go, auditing high security external hard drives is not terribly popular. But it’s what [Raphaël Rigo] is into, and truth be told, we’re glad it’s how he gets his kicks. Not only does it make for fascinating content for us to salivate over, but it’s nice to know there’s somebody with his particular skill set out there keeping an eye out for dodgy hardware.

No word on how the “Secret Wang” performs

The latest device to catch his watchful eye is the Aigo “Patriot” SK8671. In a series of posts on his blog, [Raphaël] tears down the drive and proceeds to launch several attacks against it until he finally stumbles upon the trick to dump the user’s encryption PIN. It’s not exactly easy, it did take him about a week of work to sort it all out, but it’s bad enough that you should probably take this particular item off the wishlist on your favorite overseas importer.

[Raphaël] treats us to a proper teardown, including gratuitous images of chips under the microscope. He’s able to identify a number of components on the board, including a PM25LD010 SPI flash chip, Jmicron JMS539 USB-SATA controller, and Cypress CY8C21434 microcontroller. By hooking his logic analyzer up to the SPI chip he was able to dump its contents, but didn’t find anything that seemed particularly useful.

The second post in the series has all the gory details on how he eventually gained access to the CY8C21434 microcontroller, including a description of the methods which didn’t work (something we always love to see). [Raphaël] goes into great detail about the attack that eventually busted the device open: “cold boot stepping”. This method allowed him to painstakingly copy the contents of the chip’s flash; pulling 8192 bytes from the microcontroller took approximately 48 hours. By comparing flash dumps he was able to eventually discover where the PIN was being stored, and as an added bonus, found it was in plaintext. A bit of Python later, and he had a tool to pull the PIN from the drive’s chip.

This isn’t the first time we’ve seen a “secure” hard drive that ended up being anything but. We’ve even been witness to a safe being opened over Bluetooth. Seems like this whole “Security by Obscurity” thing might not be such a hot idea after all…