When an attendee builds one of our badges, they’ve usually learned a whole load of new skills in the process. They’ll have learned how to solder, about the various components on the board and they have a personal stake in the badge. For many people a self-built badge is a piece of personal pride and many of the badges we’ve designed take pride of place back at the office.
Last week we built a set of beautiful Christmas tree lights. You can reprogram, and reuse these all year round. But what’s cooler than beautiful Christmas tree lights? How about Christmas tree lights that change based on what’s happening around the tree? Adding light sensors to your tree lights should take between half an hour and an hour from start to finish. We put together a HIDIOT photoresistor tutorial a while back.
This year we made our own Christmas tree lights. They’re really easy to build, and can be reprogrammed to be used all year round. Read on to find out how to make your own! When finished, you should have your own programmable Christmas tree lights! Then you can take it further and make it your own! Our Christmas tree lights are different to the ones you get in the shop.
Ghost hunters use EMF meters as an essential tool. According to the Anomolies Research Society, indicators of paranormal activity include fluctuations in EMF detection readings and background readings that drop or spike for no reason, with no explainable cause. What we’ll build We’re going to build an EMF detector, so we’re building our own analogue sensor from scratch. We’ll also look at how we can use Digital Signal Processing (DSP) techniques to improve our detector.
Sometimes you want things to only happen when the world around you changes. In electronics, we use sensors to detect these changes. In this post we’re going to look at a couple of sensors, how they work and we’ll show you how to use one with your HIDIOT. This blog post contains all the background info you need with some useful links, but if you just want to get up and running with a light sensor, Steve’s made a video for you to play along with.
Right After Ordering Firstly, make sure you’re subscribed to our mailing list. We post our (mostly) weekly update email This Week In HIDIOT to our mailing list. If you haven’t already subscribed, use the form below to make sure you get the latest tips, tricks and project ideas. Success! Now check your email to confirm your subscription. There was an error submitting your subscription. Please try again.
An important electronics skill is being able to read an electrical schematic. We thought we’d teach you how to read a schematic by reading ours, and comparing it to some similar circuits. Open this link in a new tab for a full-size copy of the schematic to play along with this blog post. What is that thing? A Schematic is a drawing that explains how the different parts of a circuit are connected together.
The relationship between UDP port scanning and ICMP Unlike TCP, UDP is a stateless protocol. It was designed for speed in an era where reliability couldn’t always be guaranteed. Effectively, UDP is mostly designed to be used for applications that care more whether or not a packet is sent than whether or not it is received. This presents a problem. If a host continuously sends UDP datagrams to a system that isn’t even listening, it could saturate a link.
Firstly, the Internet of Wrongs is a term I coined to describe the intersection of poorly built hardware designed for malicious purposes. None of the things I’m going to show you are particularly brilliant - indeed they’re actually all deliberately crap. However, each of these things I’ve deliberately made to provide an entry level project for a bunch of technologies, in order to highlight how easy it is to get started.
Before we start, I’d like to share a pentester story with you about knocking systems over. It’s a fact of life that software bugs happen, and are often triggered by edge cases never considered by the software’s author. A common edge case is something connecting to a service and disconnecting before the conversation starts, or connecting to a service and sending unexpected input. Unfortunately, port scanning more or less relies on these two edge cases.