Hackaday Podcast 136: Smacking Asteroids, Decoding Voyager, Milling Cheap, And PS5 Triggered

Hackaday editors Elliot Williams and Mike Szczys look back on a great week of hardware hacking. What a time to be alive when you can use open source tools to decode signals from a probe that has long since left our solar system! We admire two dirt-cheap builds, one to measure current draw in mains power, another to mill small parts with great precision for only a few bucks. A display built from a few hundred 7-segment modules begs the question: who says pixels need to be the same size? We jaw on the concept of autonomous electric cargo ships, and marvel at the challenges of hitting an asteroid with a space probe. All that and we didn’t even mention using GLaDOS as a personal assistant robot, but that’s on the docket too!

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download (60 MB or so.)

Continue reading “Hackaday Podcast 136: Smacking Asteroids, Decoding Voyager, Milling Cheap, And PS5 Triggered”

This Week In Security: Office 0-day, ForcedEntry, ProtonMail, And OMIGOD

A particularly nasty 0-day was discovered in the wild, CVE-2021-40444, a flaw in how Microsoft’s MSHTML engine handled Office documents. Not all of the details are clear yet, but the result is that opening a office document can trigger a remote code execution. It gets worse, though, because the exploit can work when simply previewing a file in Explorer, making this a potential 0-click exploit. So far the attack has been used against specific targets, but a POC has been published.

It appears that there are multiple tricks that should be discrete CVEs behind the exploit. First, a simple invocation of mshtml:http in an Office document triggers the download and processing of that URL via the Trident engine, AKA our old friend IE. The real juicy problem is that in Trident, an iframe can be constructed with a .cpl URI pointing at an inf or dll file, and that gets executed without any prompt. This is demonstrated here by [Will Dormann]. A patch was included with this month’s roundup of fixes for Patch Tuesday, so make sure to update. Continue reading “This Week In Security: Office 0-day, ForcedEntry, ProtonMail, And OMIGOD”

Powering Up With USB: Untangling The USB Power Delivery Standards

Powering external devices directly from a PC’s I/O ports has been a thing long before USB was even a twinkle in an engineer’s eye. Some of us may remember the all too common PS/2 pass-through leads that’d tap into the 275 mA that is available via these ports. When USB was first released, it initially provided a maximum of 500 mA which USB 3.0 increased to 900 mA.

For the longest time, this provided power was meant only to provide a way for peripherals like keyboards, mice and similar trivial devices to be powered rather than require each of these to come with its own power adapter. As the number of  computer-connected gadgets increased USB would become the primary way to not only power small devices directly, but to also charge battery-powered devices and ultimately deliver power more generally.

Which brings us to the USB Power Delivery (USB-PD) protocol. Confusingly, USB-PD encompasses a number of different standards, ranging from fixed voltage charging to Programmable Power Supply and Adjustable Voltage Supply. What are the exact differences between these modes, and how does one go about using them? Continue reading “Powering Up With USB: Untangling The USB Power Delivery Standards”

Ask Hackaday: What’s The Best Way To Heat A Tent With A Laptop?

For Europeans, August is usually a month of blistering heatwaves, day after day of cloudless skies and burning sun that ripens fruit and turns we locals a variety of shades of pink. Hacker camps during this month are lazy days of cool projects and hot nights of lasers, Club-Mate, and techno music, with tents being warm enough under the night sky to dispense with a sleeping bag altogether.

Sometimes though, the whims of the global weather patterns smile less upon us hackers, and our balmy summer break becomes a little more frigid. At BornHack 2021 for example we packed for a heatwave and were met with a Denmark under the grip of the Northern air mass. How’s a hacker to keep warm?

Continue reading “Ask Hackaday: What’s The Best Way To Heat A Tent With A Laptop?”

a variety of enclosure options

The Many Ways To Solve Your Enclosure Problems

Most projects around here involve some sort of electronics, and some sort of box to put them in. The same is true of pretty much all commercially available electronic products as well.

Despite that, selecting an enclosure is far from a solved problem. For simple electronics it’s entirely possible to spend more time getting the case just right than working on the circuit itself. But most of the time we need to avoid getting bogged down in what exactly will house our hardware.

The array of options available for your housing is vast, and while many people default to a 3D printer, there are frequently better choices. I’ve been around the block on this issue countless times and wanted to share the options as I see them, and help you decide which is right for you. Let’s talk about enclosures!

Continue reading “The Many Ways To Solve Your Enclosure Problems”

A Rant On Personal Software Projects

Looking across your hard drive and GitHub, you might find hundreds of notes and skeletons of Git repositories. A veritable graveyard of software side projects. The typical flow for many of these projects is: get an idea, ruminate on the idea until it becomes exciting, eventually becoming more exciting than the current side project, notes are captured, a repository is created, and work begins at a blistering pace as the focus and excitement are there. There might be some rewrites or some changes in direction. Questions of whether the project is worthwhile or “what even should this project actually be” start to arise. Eventually, enthusiasm wanes as these questions continue to multiply. Progress slows as the path forward seems less clear-cut as it once did. The project is either sunset with a mournful promise to someday return or quietly put aside as something new and exciting comes to take its place. Sound familiar? Perhaps not, but the principles here could be helpful.

This particular article is largely a piece of opinion from one engineer to another. It’s about engineering the process by which you design a project to have better outcomes. There are many reasons why a project could be shelved or scrapped and not all of them are from a lack of clear project definition. In the case where it isn’t clear what the project is, it can be helpful to think about it in a more holistic/meta sense. There are two types of personal projects in broad strokes: technology demos and products.

Continue reading “A Rant On Personal Software Projects”

A bee pollinates a flower.

Even Bees Are Abuzz About Caffeine

Many of us can’t get through the day without at minimum one cup of coffee, or at least, we’d rather not think about trying. No matter how you choose to ingest caffeine, it is an awesome source of energy and focus for legions of hackers and humans. And evidently, the same goes for pollinator bees.

You’ve probably heard that there aren’t enough bees around anymore to pollinate all the crops that need pollinating. That’s old news. One solution was to raise them commercially and then truck them to farmers’ fields where they’re needed. The new problem is that the bees wander off and pollinate wildflowers instead of the fields they’re supposed to be pollinating. But there’s hope for these distracted bees: Scientists at the University of Greenwich have discovered that bees under the influence of caffeine are more likely to stay on track when given a whiff of the flower they’re supposed to be pollinating.

Continue reading “Even Bees Are Abuzz About Caffeine”