You Need More Weird

What do you do when you need to solve a problem creatively? Me, I go for a walk, preferably in the woods. It’s about as far away from the desk and computer as possible, and somehow getting outside of the box that is my office helps me to think outside of the metaphorical box as well. Maybe it’s the fresh air, maybe it’s the exercise. Or maybe, it’s putting my physical head in a different (head)space that helps me to think differently.

Psychologists are finding that being outside, being an outsider, or even just being exposed to the straight-up strange can help you think weirder, that is, more creatively. That artists, authors, and other hyper-creative folks are often a little bit odd is almost a cliche. Think of the artists who did their best work while under the influence of drugs, mental illness, or drastic dislocations.

The good news is that you might not have to go so far. Psychologists are able to measure increases in creative problem solving simply by exposing people to weirdness. And you don’t have to go on a magic-mushroom trip to get there either. In one study, this was playing in an upside-down VR world before answering a questionnaire, for instance. Ray Wilson meant it tongue-in-cheek when he suggested that building a silly synthesizer would help you think, but who’s laughing now that science is backing him up?

So if you find yourself, as I do, stuck inside the same four walls, make sure that you break out of the box from time to time. Expose your brain to weird, for your own creativity’s sake. Make some time for a completely wacky project. And of course, read more Hackaday! (We’ve got weird.)

This article is part of the Hackaday.com newsletter, delivered every seven days for each of the last 200+ weeks. It also includes our favorite articles from the last seven days that you can see on the web version of the newsletter.

Want this type of article to hit your inbox every Friday morning? You should sign up!

Hackaday Podcast 064: The COBOL Cabal, The Demoscene Bytes, And The BTLE Cure

Hackaday editors Elliot Williams and Mike Szczys pan for gold in a week packed with technological treasure. The big news is Apple/Google are working on contact tracing using BTLE. From adoption, to privacy, to efficacy, there’s a lot to unpack here and many of the details have yet to take shape. Of course the episode also overflows with great hacks like broken-inductor bike chain sensors, parabolic basketball backboards, bizarre hose clamp tools, iron-on eTextile trials, and hot AM radio towers. We finish up discussing the greatest typing device that wasn’t, and the coming and going of the COBOL crisis.

Take a look at the links below if you want to follow along, and as always tell us what you think about this episode in the comments!

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download (60 MB or so.)

Continue reading “Hackaday Podcast 064: The COBOL Cabal, The Demoscene Bytes, And The BTLE Cure”

This Week In Security: Nintendo Accounts, Pernicious Android Malware, And An IOS 0-day

A rash of Nintendo account compromises has made the news over the last week. Nintendo’s official response was that they were investigating, and recommended everyone enabled two factor authentication on their accounts.

[Dan Goodin] over at Ars Technica has a canny guess: The compromised accounts were each linked to an old Nintendo Network ID (NNID). This is essentially a legacy Nintendo account — one made in the Wii U and 3DS era. Since they’re linked, access via the NNID exposes the entire account. Resetting the primary account password doesn’t change the NNID credentials, but turning on two factor authentication does seem to close the loophole. There hasn’t yet been official confirmation that NNIDs are responsible, but it seems to fit the situation. It’s an interesting problem, where a legacy account can lead to further compromise.

Just Can’t Lose You: xHelper

xHelper, an Android malware, just won’t say goodbye. xHelper looks like a cleaner application, but once installed it begins rather stubbornly installing itself via the Triada trojan. The process begins with rooting the phone, and then remounting /system as writable. Binaries are installed and startup scripts are tampered with, and then the mount command itself is compromised, preventing a user from following the same steps to remove the malware. Additionally, if the device has previously been rooted, the superuser binary is removed. This combination of techniques means that the infection will survive a factory reset. The only way to remove xHelper is to flash a clean Android image, fully wiping /system in the process. Continue reading “This Week In Security: Nintendo Accounts, Pernicious Android Malware, And An IOS 0-day”

So. You Bought A VNA. Now What?

It’s never too late in life for new experiences, but there’s a new experience I had a few weeks ago that I wasn’t expecting. I probably received my first piece of test equipment – a multimeter –  in the early 1980s, and since then every time I’ve received a new one, whether an oscilloscope, logic analyser, spectrum analyser or signal generator, I’ve been able to figure out how to use it. I have a good idea what it does, and I can figure out whatever its interface may be to make it do what I want it to. My new experience came when I bought a piece of test equipment, and for the first time in my life didn’t have a clue how to use it.

That instrument is a Vector Network Analyser, or VNA, and it’s worth spending a while going through the basics in case anyone else is in the same position. My VNA is not a superlative piece of high-end instrumentation that cost the GDP of a small country, it’s the popular $50 NanoVNA that has a fairly modest frequency range and performance, but is still a functional VNA that can take useful measurements. But I’m a VNA newbie, what does a VNA do? Continue reading “So. You Bought A VNA. Now What?”

Printed It: Collet Drill Stop

You’d think that being quarantined in your home would be perfect for hackers and makers like us, as we all have a project or two that’s been sitting on the back burner because we didn’t have the time to tackle it. Unfortunately, some are finding that the problem now is actually getting the parts and tools needed to do the job. When there’s a bouncer and a line outside the Home Depot like it’s a nightclub on Saturday night, even the simplest of things can be difficult to source when making in the time of COVID.

Which is exactly the situation I found myself in recently when I needed to drill a bunch of holes to the same depth. The piece was too big to put in the drill press, and while I contemplated just wrapping the bit in some tape to serve as a makeshift stop, I wasn’t convinced it would be accurate or repeatable enough. It occurred to me that a set of drill stop collars would be easy enough to design and 3D print, but before I fired up OpenSCAD, I decided to see what was already available online.

Which is how I found the “Collet Drill Stop” from Adam Harrison. Rather than the traditional ring and setscrew arrangement, his design uses a printable collet that will clamp down on the bit at an arbitrary position without tools. So not only could I avoid a trip to the store by printing this design out, it looked like it would potentially be an upgrade over what I would have bought.

Of course, it’s wise not to take anything for granted when dealing with 3D printing. The only way I could be sure that Adam’s design would work for me was to commit it to plastic and try it out.

Continue reading “Printed It: Collet Drill Stop”

New Part Day: An Open Source Ethernet Switch In The Palm Of Your Hand

When you can get a WiFi-enabled microcontroller for $3, it’s little surprise that many of the projects we see these days have ditched Ethernet. But the days of wired networking are far from over, and there’s still plenty of hardware out there that can benefit from being plugged in. But putting an Ethernet network into your project requires a switch, and that means yet another piece of hardware that needs to get crammed into the build.

Seeing the need for a small and lightweight Ethernet switch, BotBlox has developed the SwitchBlox. This 45 mm square board has everything you need to build a five device wired network, and nothing you don’t. Gone are the bulky RJ45 jacks and rows of blinkenlights, they won’t do you any good on the inside of a robot’s chassis. But that’s not to say it’s a bare bones experience, either. The diminutive switch features automatic crossover, support for input voltages from 7 V all the way up to 40 V, and management functions accessible over SPI.

If you want to get up and running as quickly as possible, a fully assembled SwitchBlox is available to purchase directly from BotBlox for £149.00. But if you’re not in any particular rush and interested in saving on cost, you can spin up your own version of the Creative Commons licensed board. The C++ management firmware and Python management GUI isn’t ready for prime time just yet, but you’ll be able to build a “dumb” version of the switch with the provided KiCad design files.

The published schematic in their repo uses a Microchip KSZ8895MQXCA as the Ethernet controller, with a Pulse HX1344NL supplying the magnetics for all the ports in a single surface mount package. Interestingly, the two images that BotBlox shows on their product page include different part numbers like H1102FNL and PT61017PEL for the magnetics, and the Pulse H1164NL for the Ethernet controller.

Make Networks Wired Again

There’s no question that WiFi has dramatically changed the way we connect devices. In fact, there’s an excellent chance you’re currently reading these words from a device that doesn’t even have the capability to connect to a wired network. If you’re looking to connect a device to the Internet quickly, it’s tough to beat.

But WiFi certainly isn’t perfect. For one, you have to contend with issues that are inherent to wireless communications such as high latency and susceptibility to interference. There’s also the logistical issues involved in making that initial connection since you need to specify an Access Point and (hopefully) an encryption key. In comparison, Ethernet will give you consistent performance in more or less any environment, and configuration is usually as simple as plugging in the cable and letting DHCP sort the rest out.

Unfortunately, that whole “plugging in” part can get tricky. Given their size, putting an Ethernet switch into your project to act as an internal bus only works if you’ve got space to burn and weight is of little concern. So as appealing as it might be to build a network into your robot to connect the Raspberry Pi, motor controllers, cameras, etc, it’s rarely been practical.

This little switch could change that, and the fact it’s released under an open source license means hackers and makers will be free to integrate it into their designs. With the addition of an open source management firmware, this device has some truly fascinating potential. When combined with a single board computer or suitably powerful microcontroller, you have the makings of a fully open source home router; something that the privacy and security minded among us have been dreaming of for years.

Hacking Apollo Hack Chat

Join us on Wednesday, April 22 at noon Pacific for the Hacking Apollo Hack Chat with “CuriousMarc” VerdiellKen ShirriffMike Stewart, and Carl Claunch!

When President Kennedy laid down the gauntlet to a generation of scientists and engineers to land a man on the Moon before the close of the 1960s, he likely had little idea what he was putting in motion. The mission was dauntingly complex, the science was untested, and the engineering was largely untried. Almost everything had to be built from scratch, and entire industries were born just from the technologies that had to be invented to make the dream come true.

Chief among these new fields was computer science, which was barely in its infancy when the 1960s started. By the end of the decade and the close of the Space Race, computers had gone from room-filling, power-guzzling machines to something compact and capable enough to fly men to the Moon and back. The computers that followed all built on the innovations that came about as a result of Apollo, and investigating the computers of the era and finding out what made them tick is an important part of our technological culture.

That’s where this retrocomputing dream team came into play. Together, they’ve poked and prodded at every bit of hardware from the Space Race era they could find, including a genuine Apollo Guidance Computer (AGC) that was rescued from the trash. What’s more, they actually managed to restore it to working condition with a series of epic hacks and sheer force of will.

Marc, Ken, Mike, and Carl will stop by the Hack Chat to talk about everything that went into getting the AGC working again, along with anything else that pops up. Come ready to have your Apollo-era hardware itches scratched by the people who’ve been inside a lot of it, and who have seen first-hand what it took to make it to the Moon and back.

join-hack-chatOur Hack Chats are live community events in the Hackaday.io Hack Chat group messaging. This week we’ll be sitting down on Wednesday, April 22 at 12:00 PM Pacific time. If time zones have got you down, we have a handy time zone converter.

Click that speech bubble to the right, and you’ll be taken directly to the Hack Chat group on Hackaday.io. You don’t have to wait until Wednesday; join whenever you want and you can see what the community is talking about.

Continue reading “Hacking Apollo Hack Chat”