[Hack a Day] 6 New Entries: Steam powered spud gun

Steam powered spud gun


[robbtoberfest] put together this cool looking steam powered spud pistol. Made from household materials, like a lighter and some copper pipe, this spud gun builds pressure in its little bitty boiler to expel the projectiles. It seems as though he’s using a cork to supply a seal, so why bother with potatos? At roughly 2 minutes between shots, its not the quickest, but it sure is cool. Good job [robbtoberfest].

      

Light Therapy


sads

[Boris] wanted to help ease his sister’s seasonal affective disorder. The most common way to do it is with fairly expensive light boxes. [Boris] built one of his own instead.  Now his sister can blast her sadness away with over 10,000 lumens of CFL happiness.  This is pretty much the same method one would use to create a ring light for photography.

      

Parts: Precision humidity and temperature sensor (SHT1x/7x)


sht11

Sensirion’s SHTxx is a digitally interfaced humidity and temperature sensor. Accurate humidity measurements usually require careful analog design, but the SHTxx moves all that complicated stuff into a single chip. Through-hole (SHT7x) and surface mount (SHT1x) versions are available, we used the surface mount SHT11 with +/-3% accuracy. We’ll show you how to use the SHTxx below.

Sensirion SHT1x/SHT7x precision humidity and temperature sensor (Octopart search, starting at $25).

This isn’t a cheap sensor. Octopart lists a few places to buy it. Several smaller hobby electronics stores carry it; Hobby Engineering has it for $29 (#H01509-01C). We found compatible PCB footprints in sht10_11_15.lbr and sht11.lbr on the Cadsoft library download page. Pin connections for the different package types are in the datasheet: SHT1x (PDF), SHT7x (PDF).

sht11

The SHTxx has a two-wire serial interface that requires pull-up resistors (R1,2), values between 2K and 10K should work. Sensirion recommends a decoupling capacitor (C1) only if the sensor is powered over a length of wire, but we think it’s always a good idea to include one.

We’ll demonstrate the SHTxx using the Bus Pirate universal serial interface in raw2wire mode with Hi-Z outputs. The SHTxx is powered from the Bus Pirate’s 3.3volt supply. The Bus Pirate’s on-board pull-up resistors hold the bus high, eliminating the need for external resistors R1 and R2.

Interface

The SHTxx communicates over two wires using a simple serial protocol. The protocol isn’t compatible with I2C, but a single SHTxx can exist on a bus with I2C peripherals.

Command Code
Measure Temperature 00000011
Measure Relative Humidity 00000101
Read Status Register 00000111
Write Status Register 00000110
Soft reset 00011110

Five commands control the SHTxx, these are outlined in the table. The first 3 bits are the address (always 000), the remaining 5 bits are a unique command code.

Reset

Start a transaction by clearing any partial commands or data from a previous use. A minimum of nine clock ticks while data is high will clear the SHTxx interface. The Bus Pirate syntax to for this is -^:9; data high (-), 9 clock ticks (^:9).

Commands to the SHT11 begin with a unique start condition. Like an I2C start condition, this is the only time when the data signal changes with the clock signal high. This illegal condition causes the chip to prepare for a new command. The SHTxx start condition is different than I2C, allowing both types of devices to exist on the same bus.

The Bus Pirate code to generate an SHTxx style start condition is -/_\/-\ ; data starts high (-), clock up (/), data goes low (_), clock low (\), clock high (/), data goes high (-), and a final clock low transition (\) ends the sequence.

A soft reset is a good idea because it puts the chip in a default state. Prior to the first temperature or humidity conversion, we send the soft reset command.

RAW2WIRE>-^:9 -/_\/-\ 0b00011110 !<–command
4xx RAW2WIRE DATA OUTPUT, 1 <–clear interface
4xx RAW2WIRE 0×09 CLOCK TICKS
4xx RAW2WIRE DATA OUTPUT, 1 <–start condition
4xx RAW2WIRE CLOCK, 1
4xx RAW2WIRE DATA OUTPUT, 0
4xx RAW2WIRE CLOCK, 0
4xx RAW2WIRE CLOCK, 1
4xx RAW2WIRE DATA OUTPUT, 1
4xx RAW2WIRE CLOCK, 0
420 RAW2WIRE WRITE: 0×1E <–soft reset code
4xx RAW2WIRE READ BIT: 0 <–acknowledge bit, OK
RAW2WIRE>

First, we clear the interface (-^:9), then send the start condition (-/_\/-\). The reset command (0b00011110=0×1E) follows. The SHTxx acknowledges (acks) commands by pulling the data line low for one bit after a command is transmitted. We read one bit (!) to get the acknowledgment status; 0 is success, 1 signals an error.

Temperature

Now we can read the temperature. This happens in two steps, with a delay for the temperature conversion.

RAW2WIRE>-^:9 -/_\/-\ 0b00000011 !
4xx RAW2WIRE DATA OUTPUT, 1  <–clear interface
4xx RAW2WIRE 0×09 CLOCK TICKS
4xx RAW2WIRE DATA OUTPUT, 1 <–start condition

4xx RAW2WIRE CLOCK, 0
420 RAW2WIRE WRITE: 0×03 <–start temperature conversion
4xx RAW2WIRE READ BIT: 0 <–ack bit, OK
RAW2WIRE>

First, we send a start condition and the temperature conversion command (00000011=0×03). The SHTxx replies to a successful command by pulling the data line low for one bit (ack). After the ack bit, the data line goes high until the conversion finishes.

RAW2WIRE>.
4xx RAW2WIRE DATA INPUT, STATE: 0 <–data low when done
RAW2WIRE>

When the data line goes low, the temperature conversion is finished. ‘.’ is the Bus Pirate command to read the data state without a clock tick. Now we can grab the result.

RAW2WIRE>r_^ r_^ r_^
430 RAW2WIRE READ: 0×17 <–data byte 1
4xx RAW2WIRE DATA OUTPUT, 0 <–data low
4xx RAW2WIRE 0×01 CLOCK TICKS <–send ack bit
430 RAW2WIRE READ: 0xCC <–data byte 2
4xx RAW2WIRE DATA OUTPUT, 0
4xx RAW2WIRE 0×01 CLOCK TICKS
430 RAW2WIRE READ: 0×0C <–crc
4xx RAW2WIRE DATA OUTPUT, 0
4xx RAW2WIRE 0×01 CLOCK TICKS
RAW2WIRE>

Each byte read (r) requires an I2C style acknowledgment bit with the data low. We do this with the _^ sequence; data low (_), one clock tick (^).

The first two bytes are the temperature reading (0×17cc), followed by a CRC (0×0c). The raw value (0×17cc=6092) is converted to degrees Celsius using the equation and coefficients on page 9 of the datasheet. Temperature readings are 14bits by default:

T = -39.7 + 0.01*X

21.22C = -39.7 + (0.01*6092)

Humidity

Humidity conversions are started with code 00000101 (0×05 hex).

RAW2WIRE>-^:9 -/_\/-\ 0b00000101 ! <–command
4xx RAW2WIRE DATA OUTPUT, 1 <–clear interface
4xx RAW2WIRE 0×09 CLOCK TICKS
4xx RAW2WIRE DATA OUTPUT, 1 <–start condition

4xx RAW2WIRE CLOCK, 0
420 RAW2WIRE WRITE: 0×05 <–start humidity conversion
4xx RAW2WIRE READ BIT: 0<–ack bit, OK

As before, a ninth acknowledgment bit is low if the SHTxx processed the command.

RAW2WIRE>.
4xx RAW2WIRE DATA INPUT, STATE: 0 <–data low when done

The data line goes high and then returns low when the humidity conversion is done.

RAW2WIRE>r_^ r_^ r_^
430 RAW2WIRE READ: 0×05 <–data byte 1
4xx RAW2WIRE DATA OUTPUT, 0 <–data low
4xx RAW2WIRE 0×01 CLOCK TICKS <–ack bit
430 RAW2WIRE READ: 0×80 <–data byte 2
4xx RAW2WIRE DATA OUTPUT, 0
4xx RAW2WIRE 0×01 CLOCK TICKS
430 RAW2WIRE READ: 0×46 <–crc
4xx RAW2WIRE DATA OUTPUT, 0
4xx RAW2WIRE 0×01 CLOCK TICKS
RAW2WIRE>

A complete conversion generates a three byte response. The first two bytes are the raw humidity reading (0×0580=1408), the final byte is a CRC (0×46) that can be used to verify data integrity.

Humidity readings have 12bits of resolution by default, convert to humidity using this equation:

RH = -2.0468 + 0.0367(X) + (-0.0000015955*(X^2))

46.46%RH = -2.0468 + 0.0367(1408) + (-0.0000015955*(1408^2))

Conclusion

This isn’t a cheap sensor, but it doesn’t require careful analog design like the Honeywell HIH series. Have you worked with a humidity sensor?

Like this post? Check out the parts posts you may have missed.

      

Unique method of home automation


automation

[leevonk] sent us this quick and dirty home automation set up. Using photo resistors and your computer screen, you can drive as many relays or actuators as you want. [leevonk] is simply using changes in brightness on his computer screen to set off relays. This makes it easy for someone who has no programming knowledge and a tight budget to set up some automation. You could even do remote automation by connecting to your pc via VNC. Be careful taping things to your screen, wouldn’t want to damage it.

      

Passive Multidimensional Input


Any musician who has ever used a computer to create music will tell you that while this technology is more than capable of producing great music, it is always a much more intimate experience to create by physically playing an instrument. In an effort to bridge this gap, [Randall Jones] has built a passive multidimensional interface that uses multitouch input to create an intimate experience that rivals that of a traditional musical instrument. While this concept may seem very complicated, the interface is made of only copper strips, rubber, and wood. At $50, this interface was designed to be inexpensive and appears to be very easy to use. As seen in the video, this interface can be used as anything from a drum to a multitouch synthesizer.

[via Make]

      

25C3: Hacking the iPhone


As promised in their yellowsnow demo, [pytey], [MuscleNerd], and [planetbeing] from the iphone-dev team presented at 25C3 on their work Hacking the iPhone. The team originally formed in 2007 and this is the most comprehensive presentation on how the iPhone was compromised to date. You can find the full talk embedded above.

They opened with a few stats about how popular their software is. Our favorite by far is that at least 180 people with Apple corporate IPs update their phones using the dev-team’s software on a regular basis. From there the talk was split into two sections: jailbreaking the S5L application processor and unlocking the S-Gold baseband processor.

The phone relies on a chain of trust to guarantee that only Apple’s code is being run on it. All of userland is signature checked by the kernel. The kernel is checked when loaded by iboot. The iboot image is checked when loaded by LLB. LLB is loaded from the NOR by the lowest piece of code, the bootrom. That’s where things fall apart; the bootrom does not check the signature of the LLB. To take advantage of this, the team found what they describe as a classic stack buffer overflow in DFU mode. DFU is Device Firmware Upgrade mode, a state that the phone can be forced into after the bootrom loads. Their exploit forces the certificate check to return ‘true’. They are then able to patch all of the subsequent signature checks out of the phone’s system.

The baseband processor proved to be much more difficult simply because it doesn’t have any sort of recovery mode; bricking a phone was always a possibility. The S-Gold is a complete system-on-chip and has a unique ID on each phone. The NOR also has a unique ID on each phone. These two IDs are used to sign the secpack, which in turn enforces the SIM carrier lock. These unique IDs are why you can’t just take an officially unlocked phone and copy the secpack off of it to unlock another phone. Everything else is identical: the firmware, the baseband, the bootroom are all the same. On the second generation iPhone, the bootrom checks the bootloader. The bootloader then verifies the bootrom before checking and then loading the firmware. The firmware enforces the carrier lock. The team decided that it wasn’t worth attempting to break the chain of trust. The SIM unlock code they developed is divided into two sections. The first part is the actual software unlock. They patch the firmware while it’s running in RAM. Their patch modifies the firmware’s decision tree about whether to enforce the carrier lock. The second half is the exploit that allows them to inject the code. The team knows that Apple can and probably will patch the exploit hole, but their RAM patching code will always work, so it’s just a matter of finding another hole to apply it through. In order to do a permanent unlock solution (like on the first generation iPhone), they’d need to analyze the actual bootrom code.

The team mentioned several things Apple did that actually helped them in their efforts. Security was gradually rolled out, so they were able to look at things that would eventually be hidden. The firmware was initially unencrypted. Earlier versions trusted iTunes, something they could easily modify. All userland apps originally ran as root meaning any application exploit gave root level access.

The iphone-dev team has truly put in a tremendous amount of effort and we look forward to the yellowsn0w release on New Year’s Eve.

      

You received this email because you are subscribed to the real_time feed for http://hackaday.com/feed/. To change your subscription settings, please log into RSSFWD.

[Download Squad] 5 New Entries: Power Meter Plus provides constant laptop battery updates

Power Meter Plus provides constant laptop battery updates

Filed under: , ,

Power Meter PlusIf you use a Windows laptop, you're probably familiar with the battery icon that hangs out in the system tray. It provides a bit of information about your battery status at a glance. But just a bit. It typically shows you if the battery is full, around half empty, or mostly empty. You have to scroll your mouse over the icon to get a more accurate reading.

Or you can install Power Meter Plus. This free utility for Windows XP and earlier releases provides a detailed battery meter which is always present on your desktop. The meter is partially transparent, so you can see through it. And it lives on the right or left side of the screen. If you need to access something hiding under the power meter, just move your mouse over it and the meter will jump to the other side of the screen.

As your battery power drains, the meter will get brighter. And you can configure Power Meter Plus to show notifications when the battery reaches critical levels.

[via gHacks]

Power Meter Plus provides constant laptop battery updates originally appeared on Download Squad on Mon, 29 Dec 2008 16:00:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

Windows 7 beta ISO the hottest download on the net?

Filed under: , ,

Since its initial leak a few days ago, the torrents for Windows 7 build 7000 have become more numerous - and extremely healthy.

Pirate Bay's now has more than 5,500 seeders and more than twice that number leeching. Mininova's top two torrents have almost 6,000 seeders and 17,000 leechers.

While they're likely a little concerned with how quickly the leaked image appeared on the net, Microsoft has to be pleased about the buzz generated so far.

I can almost picture Steve Ballmer rubbing his hands together and muttering "Exxxxxxxxcellent."

After running it for a few days, I've noticed a few "beta" issues. The most bothersome so far are incompatibility and instability issues with certain applications - for example Skype and (quite surprisingly) Microsoft's own Office 2007.

Sure, this is still a beta, but you'd think that running a key business application like Office is something that would be trouble-free by this point. Paul Thurrott has also noted issues with Office on his blog.

Windows 7 beta ISO the hottest download on the net? originally appeared on Download Squad on Mon, 29 Dec 2008 14:00:00 EST. Please see our terms for use of feeds.

Permalink | Email this | Comments

Greasemonkey script lets YouTube videos buffer

Filed under: , ,


Around 7pm CST every weekday, YouTube becomes painful to use where I live. Downloading just can't keep up with playback and the clips end up limping along until they're totally cached.

I'd rather just cache the whole clip first then watch it - which is precisely what Youtube Buffer Video for Greasemonkey is designed to do.

Install and activate it, and autoplay is automatically disabled on YouTube pages. Sit back and let them buffer as long as you like, and click play when you're ready. My ISP isn't always running at peak performance, so it's nice to have control over when playback begins.

There's nothing more to it. Like many Userscripts, it's a small, simple tweak that might fix a web site annoyance you figured you'd just have to deal with.

Greasemonkey script lets YouTube videos buffer originally appeared on Download Squad on Mon, 29 Dec 2008 12:30:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

Two utilities for taking simple screenshots in Windows

Filed under: , , ,

Screen Capturer and Greenshot image editor
As a software blogger, I probably take more screenshots of programs running on my computer in a week than most people will take in a year. So I'm always on the lookout for a good screen capture utility. This morning I ran across two.

Greenshot is a light weight screen capture utility for Windows that comes as a small executable file (no installation required). Just fire up the program and a little green frog icon will show up in your system tray. Right click on the icon and you'll see options to capture a window, the full screen, or a region. Once you capture an image, the Greenshot Image Editor will open up, allowing you to annotate the image with text and drawings.

Screen Capturer is a somewhat heavier duty utility which does require an installation. But you can choose to capture images to the Windows clipboard or save images as BMP, JPG, GIF, PNG, or TIFF formats. You can also capture videos as Windows Media Video animations.

Both programs are free, although Screen Capturer does require you to submit your email address for a registration code. And both applications let you use keyboard shortcuts to grab screenshots.

[via Lifehacker and Life Rocks 2.0]

Two utilities for taking simple screenshots in Windows originally appeared on Download Squad on Mon, 29 Dec 2008 11:00:00 EST. Please see our terms for use of feeds.

Permalink | Email this | Comments

Vertor shows you what's in a torrent before you download

Filed under: , , ,


Torrent downloads can be kind of a crap shoot. If you'd like a little reassurance about what you're about to download, take a look at Vertor.

The service launched recently and provides automated checking of torrents from a number of trackers, like Pirate Bay, Demonoid, and several others. To date, the service has verified more than 140,000 torrents.

20 second MP3 clips are provided to let you preview album downloads. Movies and TV shows display screencaps taken at regular intervals (usually every 10 or 15 minutes) during playback. The contents of text files (like NFOs) packed with applications and games are also posted.

All downloads are also scanned with antivirus software, though they're currently dissatisfied with its performance. It's slated for replacement with a more reliable engine on December 30, 2008. Even in its present state, it's still more of a reassurance than most other torrent sites provide.

Already downloaded something from another tracker? Using Vertor's advanced options menu you can enter the hash code and see the results of their checks, provided Vertor has grabbed the torrent.

Thanks, Nick!

Vertor shows you what's in a torrent before you download originally appeared on Download Squad on Mon, 29 Dec 2008 09:30:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

You received this email because you are subscribed to the real_time feed for http://www.downloadsquad.com/rss.xml. To change your subscription settings, please log into RSSFWD.