VFD Hacking

vfd_hacking

[Mostafa] was a bit bored and had a broken DVD player sitting around, so he decided to take it apart to see what made the machine’s LCD panel tick. Once he popped it open, he discovered it wasn’t an LCD panel at all, it was a VFD.

The seven segment display looked to be controlled by an ET16312n VFD driver, so he dug around online and found a datasheet for the chip. After looking at the documentation he was pretty confident he could get things working without too much trouble. He started tracing the board for the STB, CLK, Din, and Dout leads he needed to set up serial communications with the panel and was on his way in no time.

He hooked the panel up to the parallel port on his computer, and got busy hammering out some C code to write text to the display. Right now, the code lets you scroll text across the display, which is about as far as [Mostafa] cares to take it. It was done mostly as a proof of concept exercise, but since this VFD is compliant with the same NEC programming standard that most VFDs use, his code can likely be reused to drive any similar display with very little tweaking.

Electronic Cufflinks For The Discerning Hacker

icufflinks

[Phillip Torrone] gave us a heads up about a project he and [Limor Fried] along with [Mike Doell] have just wrapped up. Their aptly-named “iCufflinks” softly pulsate with light the same way in which you see many Mac products do.

The cufflinks are made from machined aluminum and have the ubiquitous “power symbol” milled into the face. Inside the cufflinks, you will find a small circuit board and a battery, which powers the device for up to 24 hours. The team reverse-engineered the soft LED pulse found in Mac products in order to deliver the exact same visualization in their cufflinks.

Ignoring for a minute, the name and the inspiration for the product, we think they are pretty darn cool. There’s nothing like a set of softly glowing cufflinks to spark conversation at any social gathering.

Like anything else you’ll find on Adafruit.com, the cufflinks are completely open source, so you can feel free to tweak and remix the design any way you’d like.

Continue reading to see a video of the cufflinks in action.

Continue reading “Electronic Cufflinks For The Discerning Hacker”

Modding A Car Charger To A Variable Power Supply

For an upcoming road trip, [Patrick] needed a small variable power supply. Instead of lugging around a bench supply, [Patrick] did the sensible thing and reverse engineered a cell phone charger to fit his requirements.

After cracking open an old Kyocera car charger, [Patrick] found a small PCB with completely labeled, all through-hole components – excellent reverse engineering potential. After finding an On Semi MC33063 IC, [Patrick] tore through the datasheets, generated a netlist, and developed a schematic that closely resembled the reference schematic given by the datasheets.

With all the grunt work done, [Patrick] set out to finish what he started – modifying the charger to output 3-10 Volts. After replacing a resistor with a 5k multiturn pot, [Patrick] was left with a power supply with a variable output from 2.8 to 8.8 Volts. Not exactly what was desired, but more than enough for the application at hand. While this hack isn’t a disco floor, it’s a great walkthough of the hacking process – building or modifying something to suit a need.

reverse_engineering_firmware

Reverse Engineering Embedded Device Firmware

While not necessarily an easy thing to learn, the ability to reverse engineer embedded device firmware is an incredibly useful skill. Reverse engineering firmware allows you to analyze a device for bugs and vulnerabilities, as well as gives you the opportunity to add features if you happen to be so inclined. When it comes to things such as jailbroken iPhones, Android phones, and Nooks, you can guarantee that a close look at the firmware helped to move the process along.

[Craig] works with embedded systems quite frequently and put together a detailed walkthrough demonstrating how he reverse engineers device firmware. The subject of his hacking was a new firmware package he obtained for a Linksys WWAG120 Wireless-N router.

His tutorial walks through some of the most common reverse engineering methods and tools, which allow him to slowly unravel the firmware’s secrets. When finished, he had a working copy of the router’s boot loader, kernel, and file system – all ready to be further analyzed. His writeup includes tons of additional details, so be sure to swing by his site if reverse engineering is something you are interested in.

Digital Picture Frame Reverse Engineering

coby_frame_hack

A few months ago [Jason] got his hands on a free Coby DP700WD digital picture frame and thought it would be fun to hack. After realizing that the frame did not run any sort of Linux-based OS he figured his options were pretty limited, but he gave it a shot anyways.

The frame came with a set of built in images, and his goal was to swap them out for pictures of his own. He started by trying to read data from the frame’s serial flash chip, but found that the processor was preventing him from doing so. He de-soldered the chip from the frame, mounted it on a makeshift breakout board, and started reading up on SPI.

He was eventually able to read the device’s flash chip and swapped out the built-in images with his own. After a bit of trial and error, he was able to replace the frame’s boot screen with his own custom image as well.

If you are looking to do something similar, be sure to swing by his site – all of the tools and code he used to hack his frame are available for the taking.

Continue reading to see his modified picture frame in action.

Continue reading “Digital Picture Frame Reverse Engineering”

Blackberry LCD Reverse Engineering

blackberry_lcd

[Scott] was looking to source some LCD screens for an upcoming project, and was considering buying them from SparkFun. While the Nokia panels they sell are not expensive, they aren’t necessarily the cheapest option either – especially when building in volume.

He searched around for something he could use instead, and settled on Blackberry screens. Old Blackberry models were even more durable than the current offerings, plus companies are trying to get rid of old handsets by the truckload. The only problem was that he could not find any information online that would show him how to write to the screens.

It took a bit of digging, but he eventually determined which ICs were used to drive the LCD screen. He had no luck finding screen pinout information online, so after spending a few hours testing things with his multimeter, he came up with a full listing on his own.

He wired up a connector so that he could use the screen on a breadboard, then got busy writing code to display some text on the screen. Everything came together nicely as you can see in the video below, and he has released his code in case anyone else is looking to repurpose some old Blackberry screens.

All we want to know is what sort of project all these screens are going to be used in.

Continue reading “Blackberry LCD Reverse Engineering”

Reverse Engineering The Playstation Move

playstation_move

[Kenn] is working on building a quadrocopter from the ground up for a university project. Currently, his main focus is building an Inertial Measurement Unit, or rather re-purposing a PS3 Move controller as the IMU for his copter. He previously considered using a Wiimote Motion Plus, but the Move has a three-axis magnetometer, which the Wii controller does not.

The ultimate goal for this portion of his project is building custom firmware to run on the Move’s STM32-Cortex microcontroller, allowing him to obtain data from each of the controller’s sensors. Through the course of his research, he has thoroughly documented each sensor on his site, and dumped a full working firmware image from the Cortex chip as well. Recently, he was even able to run arbitrary code on the controller itself, which is a huge step forward.

[Kenn’s] project is coming along very nicely, and will undoubtedly be a great resource to others as he continues to dig through the inner workings of the Move. Be sure to swing by his site if you are looking for information, or if you have something to contribute.