Standalone Eye-Fi Upload

eye-fi

Former Hack a Day contributor [Will] has been using a Eye-Fi SD card to automate his photo transfers. Unfortunately this requires using Eye-Fi’s software and talking to their servers. He used [Jeff Tchang]’s replacement server written in Python to recieve the images from the card. [Will] manages his own online photo gallery using Gallery 2. To get the images uploaded, he added a call to GUP. Now all of his photos are transfered just as easily as with the standard Eye-Fi but without all of the middleman.

[photo: Eye-Fi teardown]

Wireless TAC-2 Joystick

wjs

[Aki] had a broken TAC-2 joystick that was just begging for some new and improved use.  Since it was the cable that was broken, [Aki] had the idea to make it wireless. He designed custom boards for the transmitter and receiver. Each is controlled by an ATTiny2313. He fitted it with the stock connector so it could possibly even still work on a commodore 64. He hasn’t tested that yet though.

[via the Hack A Day flickr pool]

UHF Power Harvesting

hdpowerharvesting

[Alanson Sample] and [Joshua R. Smith] have been experimenting with wireless power transfer for their sensing platform. Their microcontroller of choice is the MSP430, which we used on our e-paper clock. They chose it specifically for its ability to work with low voltages and they discus its specific behavior at different voltages. The first portion of their paper uses a UHF RFID reader to transmit to the sensor’s four stage charge pump. They added a supercap to provide enough power for 24 hours of logging while the node isn’t near a reader. For the second half of the paper, they use a UHF antenna designed for digital TV with the same circuit and pointed it at a television tower ~4.1km away. It had an open circuit voltage of 5.0V and 0.7V across an 8KOhm load, which works out to be 60uW of power. They connected this to the AAA battery terminals of the thermometer/hygrometer pictured above. It worked without issue. The thermometer’s draw on a lab power supply was 25uA at 1.5V.

It’s an interesting approach to powering devices. Do you have an application that needs something like this? For more on wireless power, checkout this earlier post on scratch building RFID tags.

[via DVICE]

Wireless Bootloading

[vimeo= 2976417]

Tired of having to physically connect to your microprocessor to upload new code? Just do it over a wireless connection. [Nathan] takes us through the process of setting up a wireless bootloader for the ATmega168. He is using the XBee base and remote modules for the wireless communication. While people have been doing wireless bootloading with the Arduino already, [Nathan] found that it was common for them to have timeout issues. His remedy was to make his own custom one that is much faster. He’s asking for help though. At this point it is tested and working, but he needs someone with more programming knowledge to help him make it “drop-in” compatible with the Arduino IDE.

Don’t forget to submit projects to our tip line.

Wireless BlinkM Control

blinkm

[John] has been working with several BlinkM RGB devices. He’s created a controller to talk to each of the BlinkMs wirelessly and change their behavior. The core is an old relay tester box used to test telephone circuits. Each of its four knobs are connected to the analog inputs on the Arduino. The signal is transmitted using RFlink devices. Each BlinkM is paired with an ATmega168 and receiver. The control box also has a switch to send the same signal to all of the devices at the same time. The transmit and receive code are available on his site. You can find a video of it embedded below.

Continue reading “Wireless BlinkM Control”

Atari Xbox 360 Controller

3600

It’s amazing what [Ben Heckendorn] can manage to crank out in just five hours. This time it’s a wireless Xbox 360 controller stuffed inside an Atari 2600 controller. The guts are from a Guitar Hero 3 controller. It’s a fairly compact board and [Ben] used thin ATA wire for the connections. While it doesn’t have all the buttons of a true Xbox controller, this 3600 controller has enough to make it useful in arcade games. The joystick portion was reused without any modification. Things like the guide button and ring of light are located underneath.

New WPA TKIP Attack

wifibox

[Martin Beck] and [Erik Tews] have just released a paper covering an improved attack against WEP and a brand new attack against WPA(PDF). For the WEP half, they offer a nice overview of attacks up to this point and the optimizations they made to reduce the number of packets needed to approximately 25K. The only serious threat to WPA so far has been the coWPAtty dictionary attack. This new attack lets you decrypt the last 12 bytes of a WPA packet’s plaintext and then generate arbitrary packets to send to the client. While it doesn’t recover the WPA key, the attacker is still able to send packets directly to the machine they’re attacking and could potentially read back the response via an outbound connection to the internet.

[photo: niallkennedy]

[via SANS]