The Traffic Light Hack


The Hack

Here's a basic outline of how the hack functions:
  1. An application uses inpout32.dll to turn on a specific pin of the parallel port.
  2. This current in turn causes the line driver chip to allow 5 VDC to flow through the SPDT relay.
  3. The relay turns on and the light comes on.
There are three SPDT relays, one for each light. One problem I encountered when hacking this together was that the power coming out of the parallel port was not enough to throw a relay that could handle 125VAC. The parallel port itself was able to activate a Reed relay, but as soon as I hooked up the Reed relay to a light bulb, it almost immediately fried. Instead, the power had to be cascaded gradually, from the parallel port's power, to 5VDC from an AC adapter, and finally to the 125VAC.

Unfortunately, I don't know how to draw out a schematic for this hack, so I hope the pictures and explanations suffice. If you need any clarifications, please don't hesitate to leave a comment.

More information is provided in the picture captions. I'm no electrical engineer, so please leave comments if anything I've said is inaccurate, or if you have any questions or comments.
Hey bucky, drop me an email when you get a chance -- I'd like to get pictures of your project in a magazine I'm writing for. Thanks!
This comment has been removed by a blog administrator.
This comment has been removed by a blog administrator.
This comment has been removed by a blog administrator.
hi my name is autumn i am a female just 13 yr's old and i was wanting to have some fun with traffic light's and i am very interested in your work and i needed some specific advice on how to hack traffic light's and i know you can do that with a universal remote but i dont have one so i i thought i could do some research on how to hack it but it's taking me hours so i am here to ask you more specificaly on how to hack a traffic light. thank's
Auto girl is moron.

Ethical hacking is used to describe the hacking that is performed in a company in order to identify the potential threats that are present on the computer. The purpose of the ethical hacking is to evaluate network security.
Ethical hacking course in chennai | Ethical hacking courses
Post a Comment

<< Home


May 2005  

This page is powered by Blogger. Isn't yours?