Tuesday, November 29, 2011

Google bike hack, quick and dirty



Many of the projects we post are so well thought out and engineered, they could hardly be called “hacks”.  This one, however, falls neatly into the hack category. [Dave] wanted his very own exercise bike hooked to Google maps. Instead of setting up a control system and writing software to control Google maps, he simply hacked a USB game controller. He wired a magnetic switch directly into the board, where the “up” button is. Then he mounted the switch so that it would be triggered each time he rotated the pedal.  Though he only has the forward movement done right now, it would be pretty easy to set up a couple more switches at the base of the handle bar for left and right.
While the experience may not be quite as nice as the more complicated one, aside from head tracking, it isn’t that far off.

How To Record 3D Video in 3D


Legalities of doing something like this aside, this concept by [MadSci labs] gives some insight into how one would go about recording a 3D movie in 3D.  Probably many of you have wondered if this could be done, but they took it one step further and actually made a device capable of doing just that.

La Crosse weather station wireless data acquisition

hacking_wireless_data_transfer_lacross_ws2305
Hackaday reader [equinoxefr] posted some images to our flickr pool showing off some modifications he made (Google Translation) to his La Crosse WS2305 weather station. Having built other router-based weather stations in the past, [equinoxefr] was looking for a better way to gather weather data after one of the routers gave up the ghost.

Easily movable RFID door lock is great for dorm rooms

rfid_door_lock_tutorial

One of the first things that [Eric] hacked together when he got to college was an RFID door locking system. He found that he was often in a rush to get in and out of his dorm room, and that using a simple wireless key was a great way to streamline his days.
Over the years, he has refined his design, and while his original prototype was functional, it was a bit rough around the edges. In the video posted on his site, he thoroughly explains how his system was built, and shows off the revisions he has made over time. One key consideration when building this system was the fact that the installation had to be non-permanent. Since schools typically frown on physically altering your rooms, he found a non-intrusive means to mount his system in the way of zip ties and foam board.

Wi-Fi jamming via deauthentication packets



[Elliot] put together an intriguing proof-of-concept script that uses repeated deauthentication packet bursts to jam WiFi access points. From what we can tell it’s a new way to use an old tool. Aircrack-ng is a package often seen in WiFi hacking. It includes a deauthentication command which causes WiFi clients to stop using an access point and attempt to reauthenticate themselves. [Elliot's] attack involves sending repeated deauthenitcation packets which in essence never allows a client to pass any data because they will always be tied up with authentication.

RF sniffing on-the-go



It’s been a while since we checked in on [Travis Goodspeed]. His latest post makes RF sniffing with the Next HOPE badge more portable by ditching the need to display data on a computer. He’s built on the work he did at the beginning of the year, replacing the FTDI chip on the badge with a Bluetooth module. Now he can use his Nokia N900 as a GoodFET terminal to not only display the packets pulled from the air, but the control the badge as well.

Wireless hackerspace music control

skipbutton_bitlair.nl

The crew at the Netherlands-based Bitlair hackerspace love their music, and have set up a digital jukebox for their workshop using mpd and fookebox. One problem that you run into with a bunch of different people working in one place is that everyone has their own distinct taste in music. The rhythmic “wub wub wub” of Dubstep might be great for some while leaving others trying to solder while simultaneously covering their ears. To ensure that everyone can exercise a musical veto (a la Empire Records) now and again, they built a Skipbutton which allows members to change what’s playing.

Reverse Engineering the Nike+ Hardware



The Nike+ hardware is obviously an interesting device.  We haven’t heard a whole lot about hacking one until now, but [Dimitry] has decided to change that. Many would assume that the data transmitted off of these sensors is quite simple, however there’s a bit more than meets the eye. Amongst other challenges, all the data packets coming out of the transceiver are encrypted. [Dimitry] claims to have decoded this data stream and made use of it.

3G connected hotspot hangs out at your house



[Drug123] made the most out of this inconspicuous gray box on the gable end of his father’s home. It serves up a 3G Internet connection that was otherwise unavailable..
The project idea was sparked by the absence of wired or fiber optic broadband in the community where his dad lives. He knew some neighbors were using 3G connections, but he couldn’t get it to work inside the house. So he set about developing an external installation that would both communicate with the cellular network, and provide a WiFi connect to it. Hardware for that is relatively expensive; a USB 3G modem and a WiFi router with a USB port.

Using WebSocket with PIC microcontrollers



[Blaise Jarrett] has been grinding away to get the WebSocket protocol to play nicely with PIC microcontrollers. Here he’s using the PIC 18F4620 along with a Roving Networks RN-XV WiFi module to get the device on the network. He had started with a smaller processor but ran into some RAM restrictions so keep that in mind when choosing your hardware.
This project was spawned after seeing the mBed feature a few days back which combined that board along with a WebSocket library and HTML5 to pull off some pretty amazing stuff. [Blaise] doesn’t have quite as much polish on the web client yet, but he has recreated the data transfer method and improved on that project by moving to the newer version 13 of WebSockets. The protocol is kind of a moving target as it is still in the process of standardization.
The backend is a server called AutoBahn which is written in python. It comes along with client-side web server examples which gave him a chance to get up and running quickly. From there he got down to work with the WebSocket communications. They’re a set of strings that look very much like HTML headers. He outlines each command and some of the hangups one might run into with implementation. After reading what it takes to get this going it seems less complicated than we thought, but it’s obvious why you’ll need a healthy chunk of RAM to pull it off.

Chrome and Firefox showing JavaScript improvements



With new betas for both Firefox and Chrome being released, CNET decided to find out how good their JavaScript performance was. Both browsers got a performance boost with Firefox slightly edging out Chrome. You have to turn on TraceMonkey, Firefox’s new Javascript engine in 3.1b1, to get the improvement. We never thought Google was that serious about building a new browser. They just want wanted Firefox to get their act together and suck less. It seems to be working.

Faster browsing with RAM disks

esperancedv

A coworker approached us today wondering if they could get a performance boost using Samsung’s newly announced 256GB SSD. Most of their work is done in browser, so we said “no”. They’d only see benefit if they were reading/writing large files. Their system has plenty of RAM, and we decided to take a different approach. By creating a filesystem in RAM, you can read and write files much faster than on a typical hard drive. We decided to put the browser’s file cache into RAM.





Securing your data



Lifehacker has published an overview of some of the many ways you can secure your data. The post was prompted by recently released browser vulnerabilities: first IE, then Firefox. They cover techniques far beyond just browser security, like how to properly wipe your iPhone. They mention disk encryption go-to TrueCrypt along with password management tools like KeePass. They also suggest using temporary credit cards to mitigate the impact of fraud.

Lightweight Webkit based browsers


Lightweight Webkit based Browsers



With netbooks being slim and mostly utilitarian, it seems a bit contradictory to use a standard and somewhat bulky web browser with them. After all, we’re trimming down the operating system to perform faster on these little devices, so why not thin out the focal point of the netbook: the browser. Firefox, Chrome, or Safari may be well and great for a full powered desktop or laptop, so how about something a bit more trimmed? Enter the lightweight Webkit based browsers: Arora and Midori.

Arora and Midori are relative newcomers to the browser wars, but each offers a great alternative to Firefox, especially for netbooks. They’re both based on the opensource Webkit project, which is the same engine used by Chrome and Safari, so pages load quickly. Flash is supported and fully enabled in both with video playback working just as well as other browsers. The main advantage is the loading speed of the browser itself. On an ASUS Eee PC with Ubuntu, Firefox takes a few seconds to load, where Arora and Midori load in under a second.
These projects are maturing pretty quickly, and some great features come out with each version. For our money though, Arora takes the cake, and has replaced Firefox as my browser of choice for my netbook. It’s quicker, offers a somewhat similar feature to Firefox’s “awesome bar”, has a privacy mode, and is generally a little bit faster than Midori.

Firefox CSS hack: change navigation icons

firefox_custom_icons

Why settle for the standard home icon on your browser? If your home button brings you to hackaday.com, why not make the icon reflect that destination? This hack is quick and simple. We’ll take you through it using Firefox 3 and the default theme with standard sized icons.
We start by using our favorite graphics program to make an icon that is 24×24 pixels, and then saved is as a PNG file without compression.

Custom shortcuts from Firefox address bar




firefox_bookmark

We picked up a great Firefox bookmark tip from [Colin]. He wanted an easier way to look up bug numbers on the launchpad bug tracker. Because the url is always the same with the bug number at the end of the address, he replaced the final portion of the url with %s. Now, when he types the keyword followed by the bug number in the address bar the bug page loads right up.
We don’t do all that many bug searches but it’s immediately obvious that this can be useful in a lot of ways. In the photo above you can see we’ve set up a shortcut to the tag pages for hackaday.com. Now we just type “hack” with the tag we want after it. Add this to your bookmarks and try typing “hack firefox” into the address bar.
Twitter Bird Gadget