Miguel writes :
The analyzer has become my best travel companion. It’s very discrete: everyone think you are playing with a mobile phone!. You can see in a moment what are the used frecuencies / channels at your location. One of the most interesting things if to carry it in the pocket in exposure mode and walk sometime in your neighborhood. In this way you can find easily what are the free frecuencies or channels. With the time, I learned how to distinguish between different device
Mobile 2.4 GHz Spectrum Analyzer: [via HackADay]
For all tweeter users that possess some hardware hacking skills, this is the Tweeter Wireless Display. It is basically a modified wireless router, stripped of its original case and mounted on a custom made wooden chassis. The text is displayed on a small screen which is mounted on the top side of the chassis.
The router used in this project is the WL-520-GU from Asus, which features a 4-port switch and supports both IEEE 802.11b and IEEE 802.11g. The device uses OpenWRT to run a Python script that fetches the 20 most recent tweets. The script is taken from a USB flash memory and the information is displayed on a serial alphanumeric LCD from Sparkfun.
The project is entitled Tweetser, a combination from ‘tweet’ and ‘serial’ and is surely an appealing piece of equipment for any tweeter lover out there, especially for the ones that are also hardware enthusiasts. I personally still think that a PC would be more suitable for this kind of things as it also features… you know, a keyboard and a slightly bigger screen. Nevertheless, it’s still a nifty little project that can be useful if you’re a tweeter maniac.
Tweeter Wireless Display: [Link] – [via]
The Wired Equivalent Privacy is an encryption algorithm that was introduced in 1997 for securing wireless networks and was designed to offer the privacy of a wired network in a wireless one. Known to have security flaws since 2001, WEP was superseded by WPA (Wi-Fi Protected Access) in recent years, but is still used in many wireless networks.
BackTrack is a Linux distribution which is distributed as a Live CD and can be used for performing security tests and other various tasks. Using BackTrack’s command line, called Konsole, and a few nifty commands, you can crack the WEP encryption and log onto the network. This tutorial uses BackTrack version 3, as version 4 is only in pre-release stage.
First and foremost, you will need a wireless adapter capable of packet injection and, of course, a wireless network nearby that uses WEP. The first thing you need to do is get a list of network interfaces and then fake a MAC address on your network interface. Next, you get a list of wireless network interfaces and look for one that uses WEP encryption. The final step is collecting enough data packets to make the crack successful (this requires that the signal is strong, so collecting of the data doesn’t take ages).
WEP has been cracked before and you can find lots of other tutorials on the Internet, so it’s no secret that it’s not a secure encryption standard. This one though can help even someone with just a little networking experience to successfully crack WEP. It only takes a few adequate tools and a little patience and voila! – you’re hacking. Detailed BackTrack commands, as well as screenshots and additional information is available in the link.
BackTrack WEP Cracking: [Link] – [via]
You like listening to radio and your favourite stations use Internet broadcasting? Or you’re sick of commercials between songs or the radio man spoiling the song with some announcement? Here is an award worthy project for you. With this wifi radio you have wireless connectivity to the Internet so you have a huge variety of radio stations to tune in, mp3 decoding, 44.1kHz 16 bit stereo audio, 4W amplifier with two 4 inch speakers, LCD display all this in a very nice vintage looking compact case. Total cost under 100$.
Asus WL-520GU was the choice for the wireless router. For under 50$ it’s a good platform for an embedded Linux system, its only shortcoming would be that it lacks built-in audio. This problem was solved with an USB audio adapter SYBA SD-CM-UAUD for 8$. Notice however the Asus router only supports USB 1.1 which is enough for audio, WL-500GP v2 can be used for USB 2.0. The router has a Broadcom BCM5354KFBG SoC CPU running at 200Mhz, 4MB flash and 16MB SRAM.
The most important part of the project is hacking the WL-520GU. Since it is just a router you will need to write new firmware to turn in into a wifi radio. This is done on the serial port which is pretty easy to access. The chosen open source Linux distribution that supports this router was OpenWRT. In the link you will find a precompiled image, thanks to the designer and builder of this project.
The LCD interface communicates with the WL-520GU by serial using ATmega168 microcontroller. On one of the analog inputs of the Atmel a potentiometer is connected and rotating the pot will make the radio jump to next station.
This is really an advanced project and i just love how it turned out. Lots of information on how to build one yourself is available in the link and I’m sure if you decide to go for it you will not regret it.
DIY Wifi Radio: [Link]
Many times you need to remotely control a relay, electrovalve or some other electronic or electromechanical device, and many times wirelessly. With XBee modules things become very easy. Very versatile and having small dimensions it is easy to add it to your projects.
In this demonstration the modules are set to wirelessly control two types of relays, standard and latched. To achieve this you will need to configure the analog inputs of the Xbee to digital I/O. In the given schematics the standard relay is driven by a general purpose NPN transistor T1. Some relays already have the protection diode incorporated, if not you will need to use D1 as shown.
The latch relay is driven by a hex inverter IC connected as a buffer. Each inverter changes the logic level from high to low and from low to high so you must cascade two inverters to preserve the logic level. This type of relay is activated by pulses so it needs a small amount of current. Even so the output capability of a single inverter might not be enough so the remaining inverters are connected in parallel.
On the transmitter side you have two push buttons connected between ground and the digital I/O ports of the XBee. There is no need for pull-up resistors because this is done internally in the Xbee.
This demonstration has lots of practical applications. You can connect almost anything to those relays or use the digital output of the module with a buffer to control other devices or transmit information.
Wireless Relay Control with XBee: [Link] – [Via]