I’ve seen a lot of electronic fireflies on the internet. Here, here, and probably others. The theory is simple, just small LED’s charlieplexed with a microcontroller. I wanted to take it a step futher, with a light sensor, solar panel, and more complex firmware.
This is my first microcontroller project from scratch, and I got to learn all sorts of interesting things like SPI programming, Watchdog Timers, Sleep states, and many other things…
I’ve finally moved to Colorado, and I had to leave the big clock behind, and luckily I had finished it:
I finilized the code, installed the clock in my church, and programmed it for there needs. The code is stored here if someone want to see it. If you want to check it out run:
git clone https://github.com/solarkennedy/clock.git I have a little more technical info on my wiki, but it basically goes like this:
The clock is almost finished, I’m just sanding the rough edges and putting on the final coat of paint. All schematics and code will be on my wiki when I’m finished.
After this second day of talks and no missle silo, there was this strange influx of women as the sunset approached. Turns out they were not for the camp, they were for the band:
They thought it was cool I guess. Somehow the owner of the silo booked these two events to have them intersect. Why else would 3 bands play in the middle of nowhere?
Afterwards there was free beer, and let me tell you, geeks can party hardy all night long:
When I first arrived at toor camp, I was issued a Hardhat and a kit of electronics to construct my own badge:
[](/uploads/DCAM0007-toorcamp.jpg)
What a cool start! Combined with the already cool scenery:
Only one problem: no silo access. We’ll see if that changes for day two…
So I spent $22 on an ebook for school.
It has this crappy DRM that only lets me view the pdf on one computer using only “Adobe Digital Editions”.
If that wasn’t so bad, only a small subset of the text is OCR’d, so most of it isn’t even searchable!
Now I’m pissed, but wait, what do you say? These files are just RSA encrypted, and I have the key?
I’ve become a semi-expert on wireless networking and their security features.. and how to get around them. Before I continue I want to emphasize:
The act of cracking encryption is not illegal just like picking a lock is not illegal. It is the unauthorized access of that network which is illegal, just like breaking and entering is illegal.
So. To sum it up, there are two types of encryption. There is the weak kind (wep) and the strong kind (wpa).
This semester I took a class on Discrete Wavelets. It was awesome. The coolest part was our group final project. My group had the best topic by far: Decoding a Captcha! (Click on any of the following images to view them full size)
We’ve all seen Captchas before. They are used on websites to make sure that the person on the website is a real human, not a computer program. Why do we want to break them?
Cody and I camped two nights at Rocky Bayou State Park!
Yea she doesn’t look very happy. Yes, we are camping on concrete….
Day 2. That’s better!
NEXT: Our previous vacation was a Cruise!
More Update: There are new AP’s that don’t conform to this pattern. If the calculator doesn’t work on yours, maybe it is like these non-conforming-wep keys
Update:Â A cool cool guy named Dylan Taylor wrote a java implementation of this script: http://www.fwc.dylanmtaylor.com/ if you need an offline version
Update: I wrote a bash implementation to make it easy to script, and for offline usage
In my previous post I showed a correlation between the WEP key of a Verizon FiOS install and the MAC address of the access point.