Motorcycle lighting upgrade ensures other drivers know you're there

led-brake-lights

[Pete Mills] recently bought himself a motorcycle, and as people are known to do, they start trying to scare him with gruesome stories of cycling accidents once they hear about his purchase. While he tries to shrug them off as people simply not minding their own business, something must have resonated with him, because he started tinkering with the bike’s taillight in order to ensure he was always seen by other drivers.

He swapped out his motorcycle’s incandescent taillight for a smart LED-based lamp that he constructed using perfboard. Not only does his new brake light feature ultra bright LEDs, but the onboard ATtiny85 rapidly flashes the lights each time he hits the brakes, making his presence impossible to miss. Before everyone starts with the claims of, “Flashing red lights are illegal!”, let’s all take a deep breath and read on.

We’ve seen these sorts of lights on the back of motorcycles for years, though being a careful guy, [Pete] wrote to the state of Michigan in order to ensure that his modifications won’t get him pulled over. He has yet to hear back, but in the meantime, he merely needs to start the bike with the brakes applied to trigger the ATtiny85 to run the lights in “normal mode.”

Continue reading to see a short demo video of his brake light mod in action.

[Read more…]

USB dongle generates and enters your passwords so you don't have to

usb-password-dongle

Like many businesses out there, [Joonas Pihlajamaa’s] employer requires him to change his password every few months. Instead of coming up with a complex, yet easy to remember password again and again, he built a small USB device to do the work for him.

He dismantled an old USB memory stick, fitting it with an ATtiny85 with its required components on a small piece of perfboard. Using the knowledge he gleaned from his previous USB HID tinkering, he programmed the ATtiny to act as a USB keyboard which enters his password for him whenever he plugs it in.

The USB dongle not only types his password in for him, it can generate a new password with a few simple keystrokes whenever he desires. Obviously it merely takes someone getting their hands on his USB stick to compromise security, but it does beat a Post-It under the keyboard any day.

Continue reading to see a short video of his USB password dongle in action, and be sure to swing by his site for more details on how it was all put together.

[Read more…]

Rapid fire update brings many new features

[Shawn McCombs] has been spending some time refining his Xbox 360 rapid fire hack. This time around he’s got a lot more features, many of which we haven’t really seen before.

When we looked at the original project he had added an ATtiny85 which read a potentiometer to set the rapid fire speed for one of the buttons. This time around he’s opened up settings for individual weapons in the game. For instance, if you have a hand-gun and a rifle, you can set different rapid fire rates for each to account for the reload speed for those guns. He patched into the ring of LEDs on the controller in order to indicate which preset is currently chosen. There are three tactile switches on the underside of the controller too. One of them is a reset button which gets you back to your primary weapon and the default rapid fire rate. Settings for each weapon are saved to the EEPROM so you won’t lose them when the controller goes to sleep. Check out [Shawn’s] description of the project in the video after the break.

[Read more…]

JTAG dongle pushes code to FPGA after bootup

This gnarly beast has near-magical qualities. [Sprite_TM] patched it together as a dongle which attaches to a JTAG header (we’re fairly certain this is not a standard footprint for that interface though). He uses it to push code to an FPGA after that device boots. Why? Well, there’s several reason, but the most generic answer is that some boards will not boot unless there is a chain of trust that validates the code which will be running.

In this case, [Sprite_TM] is using a knock-off board he acquired from a Chinese supplier. It’s a hardware network terminal (thin client), and as you can see in the video after the break, it works just fine. But that’s pretty boring and he wanted to use it for his own purposes. When he plugs in the dongle and powers up the board the network terminal is nowhere to be found, replaced with the code to play Pac-Man as if were a full arcade cabinet.

The dongle is simply a female DIL header, an ATtiny85, and a flash memory chip. The AVR has a software UART that speaks XSVF, the protocol used to push data to the FPGA. The data to be written is stored in the memory chip, and with that header in place reprogramming the AVR is just a matter of connecting an ISP programmer. Brilliant!

[Read more…]