Retrotechtacular: Color TV

We have often wondered if people dreamed in black and white before the advent of photography. While color pictures eventually became the norm, black and white TV was common for many years. After all, a TV set was a big investment, so people didn’t run out and buy the latest TV every year. Even if you did buy a new or used TV, a black and white model was much less expensive and, for many years, some shows were in black and white anyway. RCA, of course, wanted you to buy a color set. [PeriscopeFilm] has a 1963 promotional film from RCA extolling the virtues of a color set. The video also shows something about how the sets were made, as you can see below.

We aren’t sure we’d have led with the idea that color could save your life in this context, but we have to salute the melodrama. There is a good bit of footage of picture tube manufacturing, although the technical detail is — understandably — aimed at the general public.

Continue reading “Retrotechtacular: Color TV”

Retrogadgets: Oscilloscope Cameras

Today, if you want to get a picture from your oscilloscope — maybe to send to a collaborator or to stick in a document or blog post — it is super easy. You can push an image to a USB stick or sometimes even just use the scope’s PC or web interface to save the picture directly to your computer. Of course, if it is on the computer, you could use normal screen capture software. But that hasn’t always been the case. Back in the days when scopes were heavy and expensive, if you wanted to capture an image from the tube, you took a picture. While you might be able to hold up your camera to the screen, they made specific cameras just for this purpose.

Continue reading “Retrogadgets: Oscilloscope Cameras”

Illustrated Kristina with an IBM Model M keyboard floating between her hands.

Keebin’ With Kristina: The One With All The Espionage

[Ziddy Makes] describes this cute little guy as a biblically-accurate keyboard. For the unfamiliar, that’s a reference to biblically-accurate angels, which have wings (and sometimes eyes) all over the place. They’re usually pretty scary to behold. Don’t say I didn’t warn you.

A cube keyboard with adorably vibrant pastel keycaps.
Image by [Ziddy Makes] via GitHub
But this? This is the opposite of scary. Sure, there are keys everywhere. But it’s just so darn adorable. You know what? It’s those keycaps.

This 16-key macro cube uses a Pro Micro and a system of PH2 5p ribbon cables to connect the four four-key sisterboards to the main board. A 3D-printed base holds all the boards in place. Out of all the switches in the world, [Ziddy] chose Otemu Blues. Clack!

Although it may take some getting used to, this seems like it would be a fun way to input macros. I can see the case for putting some rubber feet on the bottom, otherwise it might scoot around on the desk. That might be cute, but only the first couple of times, you know?

Continue reading “Keebin’ With Kristina: The One With All The Espionage”

Hackaday Links Column Banner

Hackaday Links: November 10, 2024

Fair warning, while the first item this week has no obvious connection to hacking, when 43 Rhesus monkeys escape from a lab, it’s just something that needs to be discussed. The tiny primates broke free from Alpha Genesis, a primate research facility in South Carolina. The monkey jailbreak seems to have occurred sometime on Wednesday, shortly after which the sheriff of Beaufort County was notified to be on the lookout for the tribe. Luckily, none of the animals has been used in any kind of infectious disease research, so this likely won’t be the origin story for anything apocalyptic. At least some of the animals were quickly located, doing their monkey thing in the woods and getting to swing from real trees for probably the first time in their lives. Alpha Genesis employees are trying to lure the monkeys back to captivity with food, but we suspect they’re too smart for that. They’ll probably come back on their own recognizance or when they get bored and realize that the real world isn’t all they thought it would be. When it’s all done we’d love to hear details about the breakout; was it something the monkeys got together and planned, or did one of the humans mess up?

Continue reading “Hackaday Links: November 10, 2024”

The Badge Hacks Of Supercon

We just got home from Supercon and well, it was super. It was great to see everyone, and meet a whole bunch of new folks to boot! The talks were great, and you can see a good half of them already on the Hackaday YouTube channel, so for that you didn’t even have to be there.

The badge hacks were, as with most years, out of this world. I’ll admit that my cheeks were sore from laughing so much after emceeing it this year, due in no small part to two hilarious AI projects, both of which were also righteous hacks in addition to full-on comedy routines. A group of six programmers got all of their hacks working together, and the I2C-to-MQTT bridge had badges blinking in sync even in the audience. You want blinkies? We had blinkies.

But the hack that warmed everyones’ hearts was “I figured it out” by [Connie]. Before this weekend, she had never coded MicroPython and didn’t know anything about I2C. But yet by Sunday afternoon, she made a sweet spiral animation on the LED wheel, and blinked the RGBs in the touchwheel.

What I love about the Hackaday audience is that, when the chips are down, someone doing something new for the first time is valued as much as some of the more showy work done by more experienced programmers. Hacking is also about learning and pushing out boundaries after all. The shouts for “I figured it out” were louder than any others in the graphics hacks category, it took home a prize, and I was smiling from ear to ear.

Hackaday can learn from this too. [Connie]’s hack definitely shows the need for another badge-hack category, first timers, because we absolutely should recognize first tries. There was also a strong petition / protest from people who had worked new hacks onto previous year’s badges – like [Andy] and [koppanyh]’s addition of bit-banged I2C to the Voja 4 badge from two years ago, and [Instant Arcade]’s Polar Pacman, which he named “Ineligible for this Competition” in protest. Touche.

We’re stoked to learn new things, see new hacks, and basically just catch up with everything folks did over the weekend. We can’t wait to see what you’re up to next year!

Hackaday Podcast Episode 295: Circuit Graver, Zinc Creep, And Video Tubes

With Superconference 2024 in the books, Dan joined Elliot, fresh off his flight back from Pasadena, to look through the week (or two) in hacks. It was a pretty good crop, too, despite all the distractions and diversions. We checked out the cutest little quadruped, a wireless antenna for wireless communications, a price-tag stand-in for paper calendars, and a neat way to test hardware and software together.

We take the closest look yet at why Arecibo collapsed, talk about Voyager’s recent channel-switching glitch, and find out how to put old Android phones back in action. There’s smear-free solder paste application, a Mims-worthy lap counter, and a PCB engraver that you’ve just got to see. We wrap things up with a look at Gentoo and pay homage to the TV tubes of years gone by — the ones in the camera, for the TV sets.

Download the zero-calorie MP3.

Continue reading “Hackaday Podcast Episode 295: Circuit Graver, Zinc Creep, And Video Tubes”

This Week In Security: Linux VMs, Real AI CVEs, And Backscatter TOR DoS

Steve Ballmer famously called Linux “viral”, with some not-entirely coherent complaints about the OS. In a hilarious instance of life imitating art, Windows machines are now getting attacked through malicious Linux VM images distributed through phishing emails.

This approach seems to be intended to fool any anti-malware software that may be running. The VM includes the chisel tool, described as “a fast TCP/UDP tunnel, transported over HTTP, secured via SSH”. Now that’s an interesting protocol stack. It’s an obvious advantage for an attacker to have a Linux VM right on a target network. As this sort of virtualization does require hardware virtualization, it might be worth disabling the virtualization extensions in BIOS if they aren’t needed on a particular machine.

AI Finds Real CVE

We’ve talked about some rather unfortunate use of AI, where aspiring security researchers asked an LLM to find vulnerabilities in a project like curl, and then completely wasted a maintainer’s time on those bogus reports. We happened to interview Daniel Stenberg on FLOSS Weekly this week, and after he recounted this story, we mused that there might be a real opportunity to use LLMs to find vulnerabilities, when used as a way to direct fuzzing, and when combined with a good test suite.

And now, we have Google Project Zero bringing news of their Big Sleep LLM project finding a real-world vulnerability in SQLite. This tool was previously called Project Naptime, and while it’s not strictly a fuzzer, it does share some similarities. The main one being that both tools take their educated guesses and run that data through the real program code, to positively verify that there is a problem. With this proof of concept demonstrated, it’s sure to be replicated. It seems inevitable that someone will next try to get an LLM to not only find the vulnerability, but also find an appropriate fix. Continue reading “This Week In Security: Linux VMs, Real AI CVEs, And Backscatter TOR DoS”