Act Now And Receive The Prong Saver For Only $0.00!

Well, actually, you can’t buy this. But for [TVmiller’s] latest project he decided to have some fun with the video — so he made an infomercial for it.

Called the Prong Saver, the device clips onto any appliance’s electrical cord to help prevent you from accidentally pulling too hard and bending the electrical prongs. It’s basically a cord-tension alarm. The question is — can you hear it over the vacuum cleaner?

And just because he could, it’s solar powered. Because why the heck not? He built it using scraps he found around the workshop. That included a solar powered LED key chain, a small piezo speaker, an eyebolt and a compression spring. Anyway, check out the commercial after the break. It had us in stitches.

Continue reading “Act Now And Receive The Prong Saver For Only $0.00!”

Heat Duct Rover Explores Stink, Rescues Flashlight

It all started with a bad smell coming from the heat register. [CuddleBurrito] recalled a time when something stinky ended up in the ductwork of his folks’ house which ended up costing them big bucks to explore. The hacker mindset shies away from those expenditures and toward literally rolling your own solution to investigating the funk. In the process [CuddleBurrito] takes us on a journey into the bowels of his house.

Continue reading “Heat Duct Rover Explores Stink, Rescues Flashlight”

The Running Cat

Cats are great to have around, but they need exercise. If you’re not in a position to let the cat outdoors, you need to look to something else when kitty wakes up bored from her 23 hour nap. Cat playscapes are useful diversions, but this is the first time we’ve considered real exercise equipment. Let’s get our feline friends their exercise fix with a hamster-esque cat exercise wheel.

[bbarlowski]’s design is simple but very clever, and almost looks like something you’d find flat-packed at IKEA. Built of CNC-milled birch plywood, the wheel rims snap together like puzzle pieces while the floor has tabs that slot into the rims. The tension of the bent floor panels locks everything together and makes for a smart looking wheel. The video after the break shows [Kuna the Maine Coon cat] in action on the wheel, and outlines a few plans for expansion, including adding an Arduino to monitor kitty’s activity and control both an RGB LED strip for mood lighting and a cat treat dispenser for positive reinforcement of the exercise regimen.

The project mounted an unsuccessful campaign in March and they’ve made the DXF cutting files available for download. Of course if it’s too much plywood and not enough Arduino for you, just build the Arduspider to torture – err, entertain your cat.

Continue reading “The Running Cat”

Adding Range (and Bling) To An Electric Skateboard

Long-time Hackaday reader [Andrew Rossignol] bought a Boosted-brand electric skateboard while he was living in NYC. While the batteries more than sufficed for his commute in the Big Apple, he ran out of juice when he moved to the Left Coast, leaving him three miles short of a ten mile trip.

Faced with the unthinkable fate of pushing his skateboard like a Neanderthal, [Andrew] added more batteries. There’s great detail about how he chose the battery chemistry and the particulars of charging and something about load balancing, so it’s definitely worth a read if you’re building an electric vehicle.

IMG_3927But once [Andrew] had some surplus battery capacity on board (tee hee!) he thought of ways to waste it. The natural solution: tons of RGB LED underlighting.

Still not content with an off-the-shelf solution (which wouldn’t let him recharge the batteries without unplugging the lights), he ended up rolling his own with an Arduino and some WS2812s. The nicest touch? Keeping it all out of the elements in a sweet aluminum box, hiding the cable salad within.

There’s a lot to be said for the good industrial design of something like the Boosted skateboard, but if you’d rather DIY, we’ve been covering electric skateboard for a while now. It’s nice to see how battery and motor technology have changed since then, too. Compare and contrast this recent build with that old-school version and with [Andrew’s] build that was covered in this post. We live in good times.

Low Power And Pin-Constrained

We’ve all been there. You’re building up a microcontroller project and you wish that you could just add “one more feature” but you’re limited by the hardware. Time to start thinking. (Or, arguably, buy the next model up.)

[Sam Feller] found himself in this position, adding a knob to set the time and a button to arm the alarm for his Analog Voltmeter Clock, and he came up with a way to implement an on-off switch, and poll a button and a potentiometer with only two pins of a microcontroller.

The problem with potentiometers in low-power designs is that they’re always leaking power. That is, unless you switch them off when you’re not using them. So the ideal solution is to power the potentiometer from one GPIO pin on the microcontroller, and read its value with another. That’s two GPIO pins just for the potentiometer. But [Sam] needed to read input from a button too, and he was out of pins.

His clever solution is to switch two resistors in or out of the circuit depending on the status of the pushbutton, so that the voltage range at the potentiometer is between either VCC and VCC/2 when the switch is pressed, or between VCC/2 and GND when the switch is not pressed.

If the ADC reads something higher than VCC/2, the microcontroller knows that the button is pressed, and vice-versa. The potentiometer’s setting determines exactly where the voltage lies within either range.

Done and done. If you find yourself in the similar situation of needing to read in values from a whole bunch of buttons instead of a potentiometer, then you can try using an R-2R DAC wired up to the pushbuttons and reading the (analog) value to figure out which buttons are pressed. (If you squint your eyes just right, this solution is the same as the R-2R DAC one with the potentiometer replacing all but the most-significant bit of the R-2R DAC.)

Another tool for the toolbox. Thanks [Sam].

Knappa Tutu: Some Dancing Required

Sometimes, you see a lamp shade and you’re just intoxicated enough to put it on your head like a hat and dance around on the table. Other times, you see the same lamp shade, and decide to wire it up with Neopixels, an accelerometer, and an Arduino and make a flowery, motion-activated light show when you wear it as a dress. Or at least that’s what we’ve heard.

[Cheng] gets full marks for the neo-IKEA name for the project and bonus points for clean execution and some nice animations to boot. The build is straightforward: build up the lamp so that it fits around your waist, zip-tie in the RGB LED strip, and connect up accelerometer and microcontroller. A tiny bit of coding later, and you’re off to the disco. It looks like a ridiculous amount of fun, and a sweet weekend build.

Continue reading “Knappa Tutu: Some Dancing Required”

Stegosploit: Owned By A JPG

We’re primarily hardware hackers, but every once in a while we see a software hack that really tickles our fancy. One such hack is Stegosploit, by [Saumil Shah]. Stegosploit isn’t really an exploit, so much as it’s a means of delivering exploits to browsers by hiding them in pictures. Why? Because nobody expects a picture to contain executable code.

stegosploit_diagram[Saumil] starts off by packing the real exploit code into an image. He demonstrates that you can do this directly, by encoding characters of the code in the color values of the pixels. But that would look strange, so instead the code is delivered steganographically by spreading the bits of the characters that represent the code among the least-significant bits in either a JPG or PNG image.

OK, so the exploit code is hidden in the picture. Reading it out is actually simple: the HTML canvas element has a built-in getImageData() method that reads the (numeric) value of a given pixel. A little bit of JavaScript later, and you’ve reconstructed your code from the image. This is sneaky because there’s exploit code that’s now runnable in your browser, but your anti-virus software won’t see it because it wasn’t ever written out — it was in the image and reconstructed on the fly by innocuous-looking “normal” JavaScript.

232115_1366x1792_scrotAnd here’s the coup de grâce. By packing HTML and JavaScript into the header data of the image file, you can end up with a valid image (JPG or PNG) file that will nonetheless be interpreted as HTML by a browser. The simplest way to do this is send your file myPic.JPG from the webserver with a Content-Type: text/html HTTP header. Even though it’s a totally valid image file, with an image file extension, a browser will treat it as HTML, render the page and run the script it finds within.

The end result of this is a single image that the browser thinks is HTML with JavaScript inside it, which displays the image in question and at the same time unpacks the exploit code that’s hidden in the shadows of the image and runs that as well. You’re owned by a single image file! And everything looks normal.

We like this because it combines two sweet tricks in one hack: steganography to deliver the exploit code, and “polyglot” files that can be read two ways, depending on which application is doing the reading. A quick tag-search of Hackaday will dig up a lot on steganography here, but polyglot files are a relatively new hack.

[Ange Ablertini] is the undisputed master of packing one file type inside another, so if you want to get into the nitty-gritty of [Ange]’s style of “polyglot” file types, watch his talk on “Funky File Formats” (YouTube). You’ll never look at a ZIP file the same again.

Sweet hack, right? Who says the hardware guys get to have all the fun?