Tag Archive for: Hackaday

CNC Router | Hackaday


Code can be beautiful, and good code can be a work of art. As it so happens, artful code can also result in art, if you know what you’re doing. That’s the idea behind Programming Posters, a project that Michael Fields undertook to meld computer graphics with the code behind the images. It starts with a simple C program to generate an image. The program needs to be short enough to fit legibly into the sidebar of an A2 sheet, and as if that weren’t enough of a challenge, Michael constrained himself to the standard C libraries to generate his graphics. A second program formats the code and the image together and prints out a copy suitable for display. We found the combination of code and art beautiful, and the challenge intriguing.

It always warms our hearts when we get positive feedback from the hacker community when something we’ve written has helped advance a project or inspire a build. It’s not often, however, that we learn that Hackaday is required reading. Educators at the Magellan International School in Austin, Texas, recently reached out to Managing Editor Elliot Williams to let him know that all their middle school students are required to read Hackaday as part of their STEM training. Looks like the kids are paying attention to what they read, too, judging by KittyWumpus, their ongoing mechatronics/coding project that’s unbearably adorable. We’re honored to be included in their education, and everyone in the Hackaday community should humbled to realize that we’ve got an amazing platform for inspiring the next generation of hardware hackers.

Hackers seem to fall into two broad categories: those who have built a CNC router, and those who want to build one. For those in the latter camp, the roadblock to starting a CNC build is often “analysis paralysis” — with so many choices to make, it’s hard to know where to start. To ease that pain and get you closer to starting your build, Matt Ferraro has penned a great guide to planning a CNC router build. The encyclopedic guide covers everything from frame material choice to spindle selection and software options. If Matt has a bias toward any particular options it’s hard to find; he lists the pros…

Source…

Wooden CNC Router | Hackaday


It’s been a few years since we first started hearing about “tools of the future changing the way we work” but this astounding whole-room floor inlay might be the best argument for them yet.

The Shaper Origin

A couple of years ago we wrote a hands-on preview of a unique tool called the Shaper Origin. If a milling machine is classically defined as having a stationary tool head with moving stock, the Origin is the reverse. To use an Origin the user adheres specially marked tape to the stock material, then holds the origin down and moves it much like a hand router.

The Origin has a camera which tracks the fiducial patterns on the tape, allowing it to know its precise position, even across an entire room. The operator sees a picture on the screen of the tool that guides them with superimposed lines, while the tool head makes its own precision adjustments to perfectly cut the design in the X, Y, and Z.

Floor in Progress

But what do you use a tool like this for? Cutting boards, small tables, and toy blocks are fine examples but don’t highlight any unique features of the tool. Many could just as easily be made using a ShopBot, X-Carve, Carvey, or any of their ilk. What you can’t do with any of those tools (or really anything besides manual labor, endless patience, and master skill) is inlay an entire floor in situ.

[Mark Scheller] (eight time winner of Wood Floor of the Year awards) used an Origin to cut a curvaceous 22 foot long rendition of the first 9 bars of Handel’s Passacaglia into the floor of a lucky homeowner’s music room. Without decades of practice, it’s difficult to imagine doing this any way besides with a Shaper Origin. You can’t put an entire room into a CNC router. The individual floorboards could be cut, but that would be tedious and increasingly difficult as the room gets larger. With the Origin it seems almost trivial. Do the design, place the marking tape, and cut. The same model is used to cut the inlays for a perfect fit. This is an incredible example of a unique use for this unusual tool!

Source…

Ask Hackaday: Does Your Car Need An Internet Killswitch?


Back in the good old days of carburetors and distributors, the game was all about busting door locks and hotwiring the ignition to boost a car. Technology rose up to combat this, you may remember the immobilizer systems that added a chip to the ignition key without which the vehicle could not be started. But alongside antitheft security advances, modern vehicles gained an array of electronic controls covering everything from the entertainment system to steering and brakes. Combine this with Bluetooth, WiFi, and cellular connectivity — it’s unlikely you can purchase a vehicle today without at least one of these built in — and the attack surface has grown far beyond the physical bounds of bumpers and crumple zones surrounding the driver.

Cyberattackers can now compromise vehicles from the comfort of their own homes. This can range from the mundane, like reading location data from the navigation system to more nefarious exploits capable of putting motorists at risk. It raises the question — what can be done to protect these vehicles from unscrupulous types? How can we give the user ultimate control over who has access to the data network that snakes throughout their vehicle? One possible solution I’m looking at today is the addition of internet killswitches.

The Scope of the Problem

[Chris] and [Charlie] remotely hacked into a Jeep, disabling its brakes remotely and sending it careening into a ditch.

As any hacker knows, a connected computer is a vulnerable computer. In vehicles, not only are the embedded systems connected to the internet, but they’re also capable of controlling vital safety systems. While many wrote off these concerns as unrealistic, the uncomfortable truth came home to roost in 2015. Security researchers [Charlie Miller] and [Chris Valasek] were able to remotely take control of a Jeep Cherokee, with just a laptop and a 3G data connection. The duo were able to scan the internet for further targets, and could even track various Chrysler automobiles around the country thanks to GPS and their in-dash entertainment systems.

This discovery led to the recall of 1.4 million vehicles, with Chrysler sending out firmware upgrades on USB drives to patch…

Source…

Hacking A Netgear Router | Hackaday


Have you ever wanted to watch someone reverse engineer a piece of hardware and pick up some tips? You can’t be there while [Jeremy] tears open a Netgear N300 router, but you can see his process step by step in some presentation charts, and you’ll get a few ideas for the next time you want to do something like this.

The first part of the presentation might be a little basic for most Hackaday readers, but presumably, the intended audience might not know much about soldering or multimeters. But we enjoyed the methodology used to work out the UART pins on the board. We would have read the baud rate with the scope, which [Jeremy] does, but he also mentions a script to work it out and create a minicom profile that looked interesting.

The router runs OpenWRT, so once you have access to the UART, you are in as root. Getting into the bootloader allowed access to the firmware. At first, [Jeremy] though he found a JTAG interface, but it didn’t work. He suspects the JTAG is disabled, but shows how he would dump the firmware from another device that does have JTAG. He also shows how you could dump the flash chip directly. Fair warning: it required removing the device from the PCB.

Once you have the firmware, there are tools to extract the root file system and even emulate the running system. Then you no longer have a hardware problem, you have a software problem, and that’s where [Jeremy] leaves it.

We were impressed with the completeness of the presentation and how each step provided multiple methods. Sometimes, as you can see, one method doesn’t work and you need to try an alternative.

You can hack other types of devices using similar techniques. Even games.


Source…