A Motherboard For A WiFi Enabled SD Card

Over the last few months, a few very capable hackers have had a hand in cracking open a Transcend WiFi-enable SD card that just happens to be running a small Linux system inside. The possibilities for a wireless Linux device you can lose in your pocket are immense, but so far no one has gotten any IO enabled on this neat piece of hardware. [CNLohr] just did us all a favor with his motherboard for these Transcend WiFi SD cards, allowing the small Linux systems to communicate with I2C devices.

This build is based upon [Dmitry]’s custom kernel for the Transcend WiFiSD card. [CNLohr] did some poking around with this system and found he could use an AVR to speak to the card in its custom 4-bit protocol.

The ‘motherboard’ consists of some sort of ATMega, an AVR programming header, a power supply, and a breakout for the I2C bus. [Lohr] wired up a LED array to the I2C bus and used it to display some configuration settings for the WiFi card before connecting to the card over WiFi and issuing commands directly to the Linux system on the card. The end result was, obviously, a bunch of blinking LEDs.

While this is by far the most complex and overwrought way to blink a LED we’ve ever seen, this is a great proof of concept that makes the Transcend cards extremely interesting for a variety of hardware projects. If you want your own Transcend motherboard, [CNLohr] put all the files up for anyone who wants to etch their own board.

Wi-Fi Enabled Garage Door Opener

Normally, internet-controlled household devices are a cobbled together mashup of parts. This is great for a prototype, but if you’re looking for something that will last a decade in your garage, you’ll need something a little cleaner and more robust. [Phil]’s Internet-enabled garage door opener is just that, replete with a custom-made enclosure for his Arduino powered system.

The main hardware for [Phil]’s build is a Freetronix EtherTen, an Arduino clone with a built-in Ethernet interface. Aside from that, the electronics are simple: a relay, transistor, and diode provide the connection from the EtherTen to the garage door opener.

The software for this setup consists of a main file that sets up the web page, the serial monitor, and loops through the main program. There are a bunch of classes for initializing the web page, writing passwords to the EEPROM, activating the door, and setting the MAC and IP addresses.

Opening the door with this remote is a snap: with any WiFi enabled smartphone or tablet, [Phil] only needs to log onto his network, surf on over to the page hosted on the Arduino, and enter a password. From there, opening the door is just a press of a button. Passwords and other configuration settings cane be entered with MegunoLink. This software also includes a serial monitor to log who opened the door and when.

It’s an interesting and compact system, and handy to boot. You might sometimes forget your garage door opener, but we’re thinking if you ever find yourself without your phone, a closed garage door is the least of your problems.

Hackaday Links: September 22, 2013

hackaday-links-chain

First we start with some protection… for your USB charged devices. Here’s a USB Condom which acts as a pass-through for the power rails but not the data lines. This prevents untrusted charger security exploits. [Thanks Markus]

[OutKastz] seems to think he’s uncovered a price matching conspiracy at Best Buy. His post references an HDTV video wall he has built. But he also discovered that there are two different version of the same television sold as the same SKU. His theory is that this prevents the big box from matching prices on half of their inventory.

When you’re in need of some breadboarding action with your Raspberry Pi and want to make it as painless as possible you need to build your own Pi Cobbler. This is the diy version of an Adafruit product, built using a couple of pin headers, stripboard, and an IDE cable.

Speaking of Adafruit, did you see Ladyada’s teardown of an ICEdot crash sensor?

[Phineas] is showing off a really really small hexacopter. Check out the maiden flight, as well as first indoor and first outdoor tests.

Perhaps this coded entry system will inspire a future project for you. It uses piezo elements to enter a code which unlocks the back door to the company. The glass door already had a series of large dots painted on it. This turns out to be a nice interface for a four button code system.

Many projects use a Raspberry Pi as a web server. But there is more than just one flavor available. [Jeremy Morgan] performed a variety of Pi server benchmarks using Nginx, Monkey, Lighttpd, and Apache. [Thanks Walter]

Can an old TV antenna reflector be used to boost the range of a WiFi dongle? We’re a bit skeptical. Let us know what you think in the comments.

And finally, we do wish there was more information on this upright piano used to play Doom [Thanks Itay].

 

The Arduino YUN. YUN Means Cloud.

For the longest time, the creators of the Arduino have been looking at how to bring the Arduino platform into the cloud. Ethernet and WiFi shields technically work, but if you’re processing data scraped from a web page, a lowly microcontroller really isn’t the best option. Enter the Arduino YUN. At its core, it’s a regular old Arduino Leonardo. Underneath that metal plate on the board? That’s an SoC running Linux.

Basically, the Linux side of the Yun is pretty similar to a WiFi router running OpenWRT. There’s a USB port for plugging in peripherals, native WiFi support (802.11n, even!), an Ethernet connector, and enough RAM to do all the interesting stuff a small computer connected to the Internet can do.

To make all this web programming easier for Arduino neophytes, the YUN also includes a ‘bridge’ library that automates HTTP transactions between the Linux and microcontroller sides of the YUN. There’s also support for Temboo, an SDK for dozens of APIs that interact with Facebook, Dropbox, FedEx, and hundreds of other web services.

Below you can check out [Massimo] and [David] showing off their wares and going over how the YUN connects to the Internet and interacts with the microcontroller over the ‘bridge’. It’s an interesting device, and something we’ll surely check out at the World Maker Faire.

Continue reading “The Arduino YUN. YUN Means Cloud.”

DIY Electricity And Internet For Burning Man

bmPowerInet

Despite this being [Kenneth Finnegan’s] first Burning Man, the guy came prepared and stayed connected by setting up a beefy electricity supply and a faint yet functional internet connection. If you saw [Kenneth’s] Burning Man slideshow, you know that the desert is but a mild deterrent against power, water, and even temporary runways.

He borrowed a 20V 100W solar panel from Cal Poly and picked up a bargain-price TSMT-20A solar charge controller off eBay. The controller babysits the batteries by preventing both overcharging and over-discharging. The batteries—two Trojan-105 220Ah 6V behemoths—came limping out of a scissor lift on their last legs of life: a high internal resistance ruled out large current draws. Fortunately, the power demands were low, as the majority of devices were 12VDC or USB. [Kenneth] also had conveniently built this USB power strip earlier in the year, which he brought along to step down to 5VDC for USB charging.

Internet in the desert, however, was less reliable. A small team provides a microwave link from civilization every summer, which is shared via open access points in 3 different camps. [Kenneth] pointed his Ubiquiti NanoStation at the nearest one, which provided a host of inconvenient quirks and top speeds of 2-20kBps: enough, at least, to check emails.

Spoofing WiFi AP Based Geolocation

[Pierre Dandumont] just finished up a little project that will give Google Maps’ location feature a run for its money. It’s a technique that spoofs WiFi networks in order to relocate the positional data reported via WiFi networks.

He starts with an explanation of the different ways modern devices acquire location data. GPS is the obvious, and mobile network triangulation is pretty well know. But using WiFi networks may be a new trick for you. We’re not 100% certain but we think Google is able to look up location data based on known IP addresses for WiFi access points (this would be a good comments discussion). To trick the system all you have to do is feed some captured AP data into the computer before Google Maps tried to lock onto a location. The video after the break shows Maps with the legit location displayed. After running a quick script whose output is shown above the map position is changed to the spoofed location.

Continue reading “Spoofing WiFi AP Based Geolocation”

Tiny WiFi Modules, Again

The CC3000 is a tiny, single-chip component that adds all the necessary hardware (save for a chip antenna) and software to get even the most minimal microcontrollers onto a WiFi network. It was announced early this year but making proper breakout boards takes time, you know? This time has finally arrived with CC3000 modules from Adafruit, and evaluation modules and booster packs from TI themselves.

Unlike other microcontroller-compatible WiFi modules out there, the CC3000 takes care of just about everything – the TCP/IP stack, security stuff, and even the configuration with TI’s SmartConfig app for desktop, laptop, or mobile devices. Realistically, you can get an ATtiny, an exceedingly sparse microcontroller, or even a Commodore 64 or Apple II on the Internet with this. It’s very, very cool.

While these breakout boards and modules are priced very well for what they do, they’re still fairly expensive to stick in a project permanently. Where the CC3000 really shines is including it in your next fabbed board. There are already Altium parts and an Eagle library that includes this part should you need help with that, and blatant advertising for our overlords at SupplyFrame if you’re looking for a source.