Author Archive

Discrete component Pong game

This is nuts old-school hardware hacking reported at https://blog.hackster.io/video-pong-made-with-all-discrete-components-cbffe6a2721d and https://hackaday.com/2019/09/17/building-video-pong-with-discrete-components/. It seems that this was a slightly masochistic undertaking. The trick is that this classic video game is made out of discrete components — it is 100% IC free. I like the beauty of it’s complex wiring! Look at the video of it: There is

Component tester case

I had earlier built Original Hiland DIY M12864 Graphics Version LCR ESR PWM Transistor Tester Kit and used it successfully. The kit worked well, but on longer term use I felt that the lack of proper case for it was sometimes annoying. I had some time though if making my own case, but it felt

Replacing electrolytic capacitors

I had one Elisa viihde base WLAN station + ADSL modem that was unreliable. I had earlier done tear-down of it that I posted to this blog. Now it is time to try to fix it, because it was making whining noise and was a bit unreliable as WLAN base station. So it looks like

Friday Fun: Studio 188 zero budget movies

This is how you remake a Hollywood blockbuster with zero budget (or almost). Studio 188 is a group of people that are creating low cost movie trailers. They say they have have is imagination. They have made several quite funny versions of well known movie trailers and posted the results to YouTube to https://www.youtube.com/channel/UCX3q2gub8M8NVVu4bCNIQ2g  

Day of the Programmer – Wikipedia

https://en.wikipedia.org/wiki/Day_of_the_Programmer The Day of the Programmer is an international professional day that is celebrated on the 256th (hexadecimal 100th, or the 28th) day of each year (September 13 during common years and on September 12 in leap years).

New SIM Card Flaw Lets Hackers Hijack Phone With SMS

SimJacker is 0-day vulnerability under active attack according to this article: Dubbed “SimJacker,” the vulnerability resides in a particular piece of software, called the S@T Browser (a dynamic SIM toolkit), embedded on most SIM cards. New SIM Card Flaw Lets Hackers Hijack Any Phone Just By Sending SMS https://thehackernews.com/2019/09/simjacker-mobile-hacking.html Huge security issue claims need some

Sunsetting Python 2 | Python.org

https://www.python.org/doc/sunset-python-2/ Volunteers who make and take care of the Python programming language have decided that January 1, 2020, will be the day that we sunset Python 2. That means that the people who develop python will not improve it anymore after that day. Even if people find catastrophic security problems in Python 2, or in

Stibitz demonstrates remote computing, September 11, 1940

Interesting historical facts according to https://www.edn.com/electronics-blogs/edn-moments/4395946/Stibitz-demonstrates-remote-computing–September-11–1940: George Stibitz of Bell Telephone Laboratories used his Complex Number Calculator (CNC) to demonstrate remote computing for the first time on September 11, 1940. Stibitz was among a handful of engineers across the globe designing machines that involved using relays to implement binary logic at the time. You can

Microphone hardware hacking with a hammer

I have had for a long time an AKG D60 S microphone. The AKG D60S is advertised as an unidirectional semiprofessional dynamic microphone with smooth frequency response, a rugged all-metal body, an on/off switch, and removable wire-mesh grill.  It was proven to be a decent semiprofessional all-round microphone with hypercardioid polar pattern. Hypercardioid microphones are