Arm Mounted Light Cannon; Villains Beware

In a hack worthy of the flick Kick Ass, [Chein] built this arm-mounted light weapon. The lamp in the palm of your hand has a ring of LEDs for a nice glowing effect, but the real story is the xenon bulb at its center. The flash capacitor and charge circuit from a disposable camera are used to step up the battery voltage to 330V for an intense and slightly blinding discharge. The charging is started when you press a button on the back of the hand harness, with the flash coming when one of your fingers touches a conveniently positioned trigger. Check it out after the break.

This non-lethal weapon makes for a nice alternative to the dangers involve in playing with fire.

Continue reading “Arm Mounted Light Cannon; Villains Beware”

Touch Screen Using Range Sensors

This touch screen relies on measurements from two range finders to track your finger as you press buttons. [James Alliban] put this together as his first Arduino project. We’re familiar with [James’] background because of his informative augmented reality business card. As the Arduino picks up data from the range finder it sends it to a Flash script that is running on the PC.

As we watched the video after the break a lot of questions came to mind. What kind of angle do these Ping sensors have? Will there be interference problems if they were placed perpendicular with each other? Would you get more accurate data if they were not both on the top of the screen? For now this is just a preliminary experiment, but we like the concept and may give it a try ourselves.

Continue reading “Touch Screen Using Range Sensors”

Unbricking With The Help Of Arduino

A

This bricked Eee PC came to [Janzo] for about $50. Everything was fine with it, except for the failed bios update that rendered it useless to the last owner. [Janzo] set to work with an Arduino on a quest to repair the bios. He looked up the datasheet for the EEPROM that stores the bios and did some delicate soldering to gain access to the power and data pins on the device. A bit of trial and error and he was able to read the registers. Some comparisons between the output file and the official Eee PC bios file in a HEX editor confirmed that the first 80 bytes were fine but after that something went wrong. After coding a quick Python script [Janzo] reflashed the chip and had the computer up and running again.

We’ve seen Eee PC bios recovery before. This is a very simple method because it makes use of the simplicity we find in the Arduino. Nice job.

Update: Flash_Destroyer Final Destroys EEPROM

The Flash_Destroyer finally succeeded in rewriting that EEPROM until its demise. When we originally looked at the device it had already recorded 2.5 million successful rewrites. The first appearance of corrupt data occurred at 11,494,069 but that doesn’t tell the whole story. The chip kept working for another 200,000 rewrites before finally showing repeated data corruption.

We do find the writeup pretty interesting. There’s one thing that we can’t stop coming back to though. In the discussion of our original article [Tiago] pointed out that long-term data retention isn’t being tested here. If the abuse of that EEPROM had ended after say five million rewrites, would it have been able to hold the data long-term without corruption? Let us know what you think in the comments.

[Thanks Drone377]

PartKAM Produces CAM Related Files Online

PartKAM is a Flash-based CAM production package created by [Jack Qiao]. There are a ton of computer aided manufacturing suites out there, this one is simple and requires nothing more than having your browser open. We played with it for a few moments and found it useful but still a bit buggy. Most notably, it lacks a ‘undo’ option. That being said, you can export as SVG or gCode for use when you just need to hammer out a few parts with that CNC mill you threw together.

Russian Roulette… For EEPROM

There’s a loaded gun but its got only one bullet. Spin the cylinder, point at head, and pull the trigger. The game’s not over until the bullet is used and a player is done. This game’s got a twist though, the cylinder has at least one million chambers.

The Flash_Destroyer is testing the limits of EEPROM rewrites. It fills that little eight-pin chip with data, then verifies what has written. When it finds and error the game is over. The chip is rated for one million rewrites but while we were writing this it was already well over two and quarter million. We usually prefer to be creators and not destroyers with our hacks but there’s something delightful about running this chip into the ground. See the startup of this device after the break and click through the link above to see a streaming feed of the progress.

Continue reading “Russian Roulette… For EEPROM”

PLCC Replaces Game Boy Cartridge ROM

[Gerry] sent us pictures and a few details on replacing the Game Boy cartridge chip with a flash chip. For the prototype he used a PLCC and a little wire porn to interface a flash chip with the cartridge’s PCB while still having access to it for programming. In retrospect he plans to use a 32-pin ZIF socket on the next version to make things easier. It does work and he’s had some success loading his own code and getting it to run. There are other cartridge hacks that let you load code onto a cartridge but if you have the knowhow and the parts this makes for a fun weekend project. We’ve posted the rest of the photos that [Gerry] sent us after the break.

Update: Gerry is working on a video and a pinout. We’ll post info once we get a hold of it.

Continue reading “PLCC Replaces Game Boy Cartridge ROM”