Silicon ChipNeighbourhood Network Noise Nonsense - December 2022 SILICON CHIP
  1. Outer Front Cover
  2. Contents
  3. Publisher's Letter: Circuit labelling consistency
  4. Feature: James Webb Space Telescope by Dr David Maddison
  5. Project: Dual-channel Breadboard PSU by Tim Blythman
  6. Project: Breadboard PSU Display Adaptor by Tim Blythman
  7. Subscriptions
  8. Review: Jaycar QC1938 Oscilloscope by Tim Blythman
  9. Serviceman's Log: Neighbourhood Network Noise Nonsense by Dave Thompson
  10. Project: Active Monitor Speakers, Part 2 by Phil Prosser
  11. Review: nRF5340 DK Development Board by Tim Blythman
  12. Project: Digital Boost Regulator by Tim Blythman
  13. PartShop
  14. Vintage Radio: RCA 621TS TV by Dr Hugo Holden
  15. Market Centre
  16. Advertising Index
  17. Notes & Errata: WiFi DC Electronic Load, September & October 2022
  18. Outer Back Cover

This is only a preview of the December 2022 issue of Silicon Chip.

You can view 42 of the 112 pages in the full issue, including the advertisments.

For full access, purchase the issue for $10.00 or subscribe for access to the latest issues.

Items relevant to "Dual-channel Breadboard PSU":
  • Complete kit for the Breadboard PSU (Component, AUD $40.00)
  • Complete kit for the Breadboard PSU Display (Component, AUD $50.00)
  • Breadboard PSU main PCB [04112221] (AUD $5.00)
  • Small 2A boost step-up regulator module (MT3608) (Component, AUD $3.00)
  • Breadboard PSU PCB patterns (PDF download) [04112221/2] (Free)
Articles in this series:
  • Dual-channel Breadboard PSU (December 2022)
  • Breadboard PSU Display Adaptor (December 2022)
Items relevant to "Breadboard PSU Display Adaptor":
  • Complete kit for the Breadboard PSU (Component, AUD $40.00)
  • Complete kit for the Breadboard PSU Display (Component, AUD $50.00)
  • Breadboard PSU display PCB [04112222] (AUD $5.00)
  • PIC16F18877-I/PT programmed for the Breadboard PSU Display Adaptor [0411222A.HEX] (Programmed Microcontroller, AUD $15.00)
  • Firmware for the Breadboard PSU Display Adaptor (0411222B.HEX) (Software, Free)
  • Breadboard PSU PCB patterns (PDF download) [04112221/2] (Free)
Articles in this series:
  • Dual-channel Breadboard PSU (December 2022)
  • Breadboard PSU Display Adaptor (December 2022)
Items relevant to "Active Monitor Speakers, Part 2":
  • Active Monitor Speakers power supply PCB [01112221] (AUD $10.00)
  • Active Monitor Speakers cutting and assembly diagrams (Panel Artwork, Free)
  • 4-way Loudspeaker Protector PCB [01101222] (AUD $5.00)
  • The Hummingbird Audio Amplifier PCB [01111211] (AUD $5.00)
  • Two- or Three-Way Stereo Active Crossover PCB [01109211] (AUD $15.00)
  • Hard-to-get parts for the Hummingbird Amplifier (Component, AUD $15.00)
  • Active Monitor Speakers power supply PCB pattern (PDF download) [01112221] (Free)
  • Multi-Channel Speaker Protector PCB patterns (PDF download) [01101221-2] (Free)
  • The Hummingbird Audio Amplifier PCB pattern (PDF download) [01111211] (Free)
  • Two- or Three-Way Active Crossover PCB patterns (PDF download) [01109211] (Free)
  • Active Crossover Amplifier drilling and wiring diagrams (Panel Artwork, Free)
Articles in this series:
  • Active Monitor Speakers, Part 1 (November 2022)
  • Active Monitor Speakers, Part 2 (December 2022)
  • Active Subwoofer, Part 1 (January 2023)
  • Active Subwoofer, Part 2 (February 2023)
Items relevant to "Digital Boost Regulator":
  • Digital Boost Regulator with breakout board PCB [24110224] (purple) (AUD $5.00)
  • Digital Boost Regulator with breakout board PCB [24110224] (green) (AUD $5.00)
  • PIC16F18146-I/SO‎ programmed for the Digital Boost Regulator [2411022A.HEX] (Programmed Microcontroller, AUD $10.00)
  • Complete Kit for the Digital Boost Regulator/Breakout Board (Component, AUD $30.00)
  • Firmware for the Digital Boost Regulator with breakout (2411022A.HEX) (Software, Free)
  • Digital Boost Regulator PCB pattern (PDF download) [24110224] (Free)

Purchase a printed copy of this issue for $11.50.

SERVICEMAN’S LOG Neighbourhood network noise Dave Thompson This story isn’t about an electronic device that needs to be fixed; instead, it is about some neighbours who needed to be ‘fixed’ and an electronic device might have been the solution. These neighbours liked to make a lot of noise, and my long suffering friend thought that some electronic noise might just shut them up... Back in the mid-1990s, I had the excellent fortune to visit a pop-up James Bond museum in England. Many of the props and spy devices dreamed up by the fictional Q branch were featured. That included watches with lasers and retracting garroting wire, lighters, cuff-links and pens with embedded ‘radio transmitters’ and ‘trackers’ as well as other well-known ‘weapons’ such as Oddjob’s steel-rimmed bowler hat, Rosa Klebb’s knife shoe, Scaramanga’s golden gun and more. Of course, these are movie props designed to look good on screen, and most don’t really work. Still, everybody seems to love this type of thing and I am no exception. I’ve made my fair share of ‘bugs’, trackers, ultrasonic doodads and other gadgets but nothing as far-fetched as those Bond contraptions. These days, however, such things are not so far beyond modern technology. The other day, I watched a video of European armed forces taking control of an enemy drone and landing it into an allied soldier’s outstretched hand. The tool they used looked like a rifle fitted with an antenna array instead of 54 Silicon Chip a barrel and boasted several mysterious-looking cowlings hiding the electronics. The operator simply aimed it at the drone, held it in his ‘sights’ and brought it into a gentle landing. Incredible! As it turns out, I’m very familiar with the taking down of airborne vehicles. As an aeromodeller back in the day, I flew many radio-controlled models, and plenty of them were wrecked thanks to idiots accidentally (or deliberately, in one case) turning on a transmitter using the same frequency that I was using. This confuses the receiver and, as it doesn’t know which signal to respond to, it just locks up or twitches uncontrollably, inevitably causing the earth and the aircraft to meet – usually at ground level. Back then, we used the 27MHz band for model flying (later 35MHz, later still 2.4GHz). Within the 27MHz and 35MHz bands, only a set number of frequencies were allocated to R/C (remote control) use. Most flying fields and clubs used a ‘peg’ system; if your radio gear used, say, 27.125MHz, you took the peg for that frequency from the board; while you have that peg clipped to your antenna, nobody else is supposed to use anything on that frequency until you put the peg back. Obviously, this relied a lot on goodwill, patient queuing and not being stupid; sadly, plenty of people would neglect this system and turn up to the field, unload their model and switch on their transmitter to test things out without grabbing the peg first. The result was usually lots of swearing, some crashes and a firm reinforcement of the flying field rules to the offender. All you needed to do to ruin someone’s day was to sit somewhere within range with a transmitter, turn it on and watch the planes fall. Some miscreants did this for ‘fun’ or out of spite. You could do the same thing with any type of signal generator that swamped that band; many so-called ‘jammers’ work this way. In fact, anything that emits wide-band interference will naturally jam and confuse receivers and transmitters; a big enough spark-eroding machine or a plasma cutter can do it. Dad used to curse VW bugs driving past because the interference played havoc with his CB radios – it seemed no amount of RF Australia's electronics magazine siliconchip.com.au Items Covered This Month • • • • • • Denying the neighbourhood speaker Fixing two power banks Replacing an Ozito mower’s battery pack The flat 125Ah lithium-ion battery Refurbishing a Peak multimeter The breadmaker with a short fuse Dave Thompson runs PC Anytime in Christchurch, NZ. Website: www.pcanytime.co.nz Email: dave<at>pcanytime.co.nz Cartoonist – Louis Decrevel Website: loueee.com suppression stopped the electrical noise from those aircooled engines! These days, radio signals are supposedly much more robust and more immune to interference. Still, going by these emerging battlefield videos, signals can obviously be hijacked and the model/drone/UAV taken over to do the interceptor’s bidding. It is worrying indeed! Naughty neighbours need knackering This rather long-winded introduction is building up to a quandary a friend of mine brought to my attention recently. Like many of us these days, he is suffering from noisy neighbours. While suburban living is always going to have some noise, such as lawn mowers, chainsaws, water-blasters etc, they are usually temporary and sound levels soon drop to birdsong level once the yard work is done. Apparently, these neighbours place a large Bose wireless speaker out on their lawn and pipe music to it by some means. The sound levels are reportedly rock-concert loud and go on for hours every day and often into the night. That really would be annoying! My friend was at his wit’s end; he’d called the noise control people dozens of times – they seemed to be toothless other than giving the noisemakers a stern talking to. The usual occurrence, once the enforcement people leave, is the music gets turned back on, only louder. Surely, my friend suggested, I must know of, or could even make something, to fight back against these neighbours. I told him no. Despite being very interested in the technical aspects of any device that might help in this scenario, I wasn’t keen to get involved. Creating RF interference on purpose would likely be more illegal than them pumping loud music! Still, it really fired my imagination, so I decided to investigate anyway. My first thought is that any solution would need to be something that affects only the annoying guys while leaving other neighbours alone. That would likely be almost impossible. Simply cranking up a guitar amp and pointing it at the neighbour’s house while having someone who doesn’t play guitar do their best Jimi Hendrix impersonation would undoubtedly be entertaining. It’d also give everybody in the surrounding area cause for complaint! I admit to doing something similar many years ago when flatting and working nights at the airline. The guy next door had a DKW two-stroke car that he’d fire up at 6.30am siliconchip.com.au and leave idling for 15 minutes to ‘warm up’ before heading off to work. I asked him nicely several times not to do that, or park it on the road, because I worked nights and got to bed at 5am. He told me to suck it up, so I started practising guitar playing when I got home at 4am, with my amp perched on my bedroom windowsill, pointing directly at his bedroom window across the drive. Even at low volume, he would have heard it clearly. He got the message. While getting revenge like this is nice to imagine, it is far too indiscriminate in suburbia. If only there were some way to take control of their system and interrupt it, or turn it down ourselves. I knew of nothing that would achieve that goal. I suppose that some sort of jamming device might be able to disrupt the signal; I’ve noticed mobile phone jammers advertised on the likes of AliExpress and eBay, but they are pretty expensive, and jamming is illegal anyway. By the looks of the blurb on those sites, the jammers can block most bands associated with mobile phone operation, including the 2.4GHz and 5GHz WiFi and Bluetooth bands on some models. I imagine if anyone got caught using one of these in New Zealand, they would risk conviction, seizure of the hardware and incur a hefty fine to boot. I advised my friend against using such devices for that very reason; besides, it may not even work on their system, and that’s a lot of money to throw away for no result. Thankfully, he agreed. Still, this sort of thing is fascinating, a bit like those Bond gadgets; interesting and potentially useful in the right situation! Creating a ‘jam session’ More internet searching revealed several DIY jammers designs, but the assembly and technical details on them were scant. That path looked like a lesson in frustration. Besides, anything like this could only be purely hypothetical anyway because I didn’t know for sure how they were streaming the music to the speaker (Bluetooth, WiFi or even a direct connection). I also really didn’t want to get wrapped up in the whole grubby business. My research took me down a few rabbit holes, though, especially regarding the Bluetooth and WiFi angles. I also learned that the noisy neighbour issue is a global problem, if the number of people posting on forums and asking questions on project pages was any indication. Some people wondered if a ‘shotgun’ (hyper-directional) speaker existed (like those shotgun microphones that were all the rage once), but the consensus was ‘not really’. Could something be made to take control of the speaker and shut it off? There are quite a few experimental projects Australia's electronics magazine December 2022  55 along these lines, the downside being that the latest Bluetooth LE (Low Energy) protocol is not compatible with older versions of Bluetooth (and these projects) and is much more difficult to ‘hack’. To have any success, I’d need to know what devices were involved and what version of Bluetooth they used; that avenue was already becoming moot. However, I have plenty of older Bluetooth speakers and headphones around the workshop, and my interest was piqued. I breadboarded a unit; for obvious reasons, I won’t be going into details other than to say I used an Arduino to control it all. I also had to use relatively complex tools on my Linux laptop to ‘sniff’ for Bluetooth signals in my workshop. Once I identified the correct device, I could try to disrupt or break the connection using the ‘jammer’ circuit. While it did work after a fashion, to be truly useful, the transmitter would need to be much more powerful and considerably closer to the receiver to make much of an impact. As it turns out, most Bluetooth streaming protocols are incredibly robust, so this type of exploit would never fly, unless you could ‘ring-fence’ any potential target with hardware. A good idea then, but busted. My reading led me to another interesting area, though. People sometimes stream and cast music between devices using their home network and wireless router (some Bluetooth connections also use routers). Someone has created a small project that uses an exploit that still exists in many of today’s routers using the 802.11w protocol. Simply sending a ‘disconnect’ or de-authentication packet to the target router drops off anything connected wirelessly to it. This idea was too intriguing to pass up. I needed to build one of these and see if it worked – on our own network, obviously – most certainly not to harass anyone else! As they say, this device was for educational purposes only! Attack of the ESP8266 clones The project is very well-researched and is now on version 3. It is easily made by anyone familiar with computers and flashing .bin files. It uses a readily available (and 56 Silicon Chip very cheap) ESP8266 board, which must be flashed/programmed, utilising easy-to-use (and free) software tools. Once assembled and up and running, it turned out to be a very stable device, running from a battery pack, a 5V phone charger or a computer’s USB port. Power consumption is very low, making it quite portable, so it can be set up anywhere around the house to test how healthy a home network is and whether the router is immune to such exploits. In general, if your router is more than a year or two old, it likely will be vulnerable to the de-authentication attack. If the router uses the latest WPA3 security protocol, it should be immune. Essentially, the ESP8266 creates a standalone WiFi node and web server, which you can then connect to using a smartphone, tablet, laptop or any WiFi-enabled computer. Once joined, you enter the IP address of the board in your device’s web browser, accessing a web-based user interface. It is surprisingly comprehensive, and it transpires that this device has several other interesting and related functions aside from the de-authentication feature you can test network security with. I have a drawer full of older but still-too-good-to-throwaway routers gleaned over the years, so I set a couple of them up around the property with easily identifiable SSIDs (network names). I also connected some random WiFi-­ capable devices to them to test out this de-authentication functionality. Finding the routers is easy – all wireless networks within range are listed at the click of a button. Usually, the closest networks will be listed near the top; as I used specific SSIDs, it was easy to select the test networks. Once selected, a menu option is selected to carry out the de-­authentication attack. The instant I clicked the go button, my connected devices dropped off the target network. The same thing happened with the other router I set up. I tested a few more of my older routers, and all behaved the same way. I took the ESP board to the end of my long driveway and tried the attack on the routers I’d set up inside the house from there. Once again, all dropped connections immediately. So it is quite a powerful little device. While there is provision to add an external antenna on later versions of this board, I found my version 2 setup with a built-in antenna easily picked up routers in households well beyond the boundaries of my back-section property. I could see how this device might easily be misused in the wrong hands. The big test would be to try it on our main network router, a TP-Link Archer C7 v5. It is old by today’s standards, but it has some relatively sophisticated anti-cyber-attack features built in. They are off by default but can easily be switched on via the web interface. I had to pick my time because my wife works from home and is usually in Teams meetings half the day. I didn’t want to knock her connection off during my tests! When I had a clear run, I tried the attack and sure enough, off everything dropped. The thing with the de-­ authentication attack is that as soon as the packets are no longer being sent to the router, disconnected devices will usually try to re-establish the connection, so just one little drop-off might not be noticed. The ESP can be configured to send a continuous (preset) Australia's electronics magazine siliconchip.com.au stream of de-authentication packets to the router, preventing WiFi devices from reconnecting. Nasty! I tried applying the various anti-cyber-attack settings on the router, but as I suspected, they made no difference for this type of attack. While hiding the SSID (an option on most routers) might help prevent the router from being ‘seen’ by the ESP, it might also hamper connecting to it if you allow people to use your router’s WiFi connection. Upgrading to a new router should prevent most attacks of this type. I have one on order! All in all, it is a fascinating, functional gadget and strangely satisfying to build and test. For educational purposes only! Fixing two power banks B. P., of Dundathu, Qld will repair anything that isn’t working correctly. This time it’s a prevalent problem: over time, USB sockets on cheap devices can detach from the PCB and become intermittent... I have had two small power banks for several years. They came in very handy recently for charging our phones when our power was cut due to flooding in this area. Both power banks worked well to charge our phones, and we were recharging them from our car’s USB port. I noticed that the green power bank had a problem with the charging cable, which seemed to be loose, and it was necessary to push the cable to one side for the power bank to charge. After the power came back on, I looked closely at the faulty power bank to determine if it could be easily disassembled. It appeared that the white top was an insert that I could remove. I was then able to extract the PCB and battery. On close inspection, I could see that the micro Type-B USB port’s two power pins were no longer attached to the circuit board, and the two shell pins were very loose. The problem was that access to the tiny pins was very limited; it would be a challenge to re-solder the pins with a regular soldering iron. There was nothing for it but to try to re-solder the pins and hope that I didn’t destroy the power bank. I had a close look at how to get the tip to the pins without burning anything nearby. This was like trying to remove a splinter with a crowbar. I tried to re-solder the two power pins first; then, I plugged in a charging cable to test the repair. The first attempt was unsuccessful, and the charging light did not come on. The second attempt proved to be more successful, with the charging light now coming on, so I re-soldered the two shell pins and plugged the charging cable in again to ensure that everything was still OK. This power bank is just a small one that uses an 18650 (18mm diameter, 65mm-long) Li-ion cell. The fact that it can be easily dismantled for repair means that the battery could be replaced if it came to the end of its life and the power bank still worked. Another successful repair enabled the power bank to continue its useful life. Replacing an Ozito lawnmower’s battery pack R. S., of Figtree Pocket, Qld is a prolific contributor and he has been busy replacing rechargeable batteries in various devices... Ozito no longer supplies 36V mower battery packs and instead uses two 18V packs on their electric mowers because 18V packs are used for their other tools. So if you have one of these mowers and the battery fails, you either have to repack the battery or replace the mower. The packs use 20 18650 lithium batteries in parallel pairs, with 10 pairs in series to get 36V. As newer lithium-ion cells have a higher mAh capacity (3400mAh), I decided to use just 10 cells in series. I purchased four Samsung 18670s at $9 each from eBay and six Panasonic NCR18650B at $15 each, both from Australian suppliers. Buying from overseas is impractical due to transport difficulties or high delivery costs. I mainly used two different battery suppliers to compare them. There is no battery balance circuit in the packs. If some cells are already charged to 4.2V, charging is terminated too early, as the fully charged cells go open-circuit due to their inbuilt safety valve. So for the charger to charge all cells properly, the cells should all start with the same voltage (eg, 3.6V). The Ozito charger charges at 1A, taking about three hours to fully charge the battery pack. There is a 0.1W current-­ sensing resistor in the charger, which usually has 0.1V across it. If you prefer a slower charge rate, you can change the resistor to 0.33W to reduce the charging current to 0.3A. I repacked a 36V Ozito mower pack with ten Panasonic NCR18650B cells in 2017, and it is still working. With a 15W test load, the voltage drops from 41.5V to 39V, showing an internal resistance of about 0.9W. The mower won’t run with the pack with mixed cells – it has a higher internal resistance of around 1.3W. The NCR18650B cells I recently received can deliver less current (9A) than the ones I used to repack my first battery. It seems that the design has changed, or the ones I used this time are not genuine. Some Samsung cells have an electronic current limit (at the negative end), limiting the current to about 9A, but by removing it, the limit can be increased to about 20A. The cells with the electronic current limiter are a bit longer and have a copper strip down the side connecting positive to the circuit. I decided to repack the second battery with all Samsung cells this time due to their higher current limit. After swapping the second battery pack to all Samsung cells, it is now working. Paying extra for heavy-duty cells in the first place would have saved a lot of time, but my The PCB and battery was easily extractable from the power bank (shown at left); upon inspection, the USB socket’s two power pins were not attached. After resoldering those two pins it eventually powered up succesfully (shown at right). siliconchip.com.au Australia's electronics magazine December 2022  57 first repack with the NCR18650B cells in 2017 worked with no problems, so I expected the same this time. Another problem with repacking is that new cells may be longer than 65mm. For example, the Samsung cells I purchased are 67mm long. They would not fit in a Deebot DN5G robot vacuum cleaner, while in a Samsung SR8980 robot vacuum, there is plenty of room as the original battery was in a plastic case. The large cells used in the Dyson V11 vacuum are 20700 (2mm larger in diameter and 7mm longer), making them difficult to reuse if space is limited. I am soldering the cell terminals (they don’t come with solder tags). It seems to be easy to solder the negative end, but not the positive end, which I think is stainless steel. I bought some special liquid flux which helps. I also find that I also have to sand the positive terminal to get the solder to stick. However, one cell positive terminal would not take solder. When I get my spot welder, I will try that. In the meantime, I had to use another cell. Another new cell reads open circuit; perhaps the protection valve is faulty. Editor’s note: don’t mix Li-ion cells; use all the same type and age, especially in cases like this where there is no balancing circuitry. A flat 125Ah lithium-ion battery D. M., of Toorak, Vic saved his friend a lot of money with a trivial repair, when the manufacturer wasn’t all that helpful... I have a friend with a 4WD that has an auxiliary 125Ah lithium-ion battery with Bluetooth monitoring and a nominal voltage of 12.8V. It retails for a cool $1890. He uses it to power the vehicle fridge/freezer, which he keeps running whether the vehicle is in use or not. The battery is charged via the vehicle alternator. He was understandably rather upset when the battery apparently went flat, and the dedicated charger connected to the alternator would not charge the battery. Some chargers will not charge a very flat battery for safety reasons. He bought it to me, and I measured the terminal voltage at 1.9V. A call to the manufacturer’s representative resulted in them advising that the battery was almost certainly destroyed at such a low voltage. I told them that I thought these batteries had an internal battery management system (BMS) that would shut the battery down. In fact, the specifications say there is a low-voltage cutoff of 10V. The representative said the BMS did not always shut down the battery at low voltage, and its primary purpose was to manage the battery charge and discharge rates relative to cell balance and temperature. My friend independently called another branch of the manufacturer and was told they would take a look at the battery for a fee of $250 plus return freight between Melbourne and Sydney. The battery had a maximum charge voltage specification of around 14.6V, so I connected it to my bench power supply at 13.5V with the current limit set to 500mA. After a few minutes, I disconnected the power supply and was pleasantly surprised to get a reading of about 13.3V. I kept charging the battery for the next few days, gradually increasing the current to about 1A. I did not charge the battery fully because I could not tell the state of charge, as I could not connect to the battery’s Bluetooth system, 58 Silicon Chip which would give such information. In any case, I disconnected the power supply and the voltage held constant for a couple of days. I reinstalled the battery in his vehicle and, using a clamp ammeter, measured the charge current when the vehicle engine started as 40A. The battery can accept a 100A charge current. I told my friend to keep the battery on float charge via a dedicated charger if he wants to keep the fridge running when the vehicle is not in use. The recommended float charge voltage for that battery is 13.8V. My conclusion is that the BMS disconnected the battery from the terminals to protect it when the voltage reached the 10V threshold below which the battery could be damaged. The charger refused to charge it because the disconnection meant the terminals only presented 1.9V. As soon as I put a small amount of charge in it, the BMS reconnected the battery, and it could be charged normally. The manufacturer representatives seemed unaware of this possibility. My friend reports no further problems with the battery, and he is pleased I saved him $1890. You can see some pretty good photos of what the BMS circuitry looks like in a battery this large at the following website: siliconchip.au/link/abhr Refurbishing a Peak multimeter with new batteries R. E., of Majors Creek, NSW ‘fixed’ his multimeter by making up a new battery (with the original type no longer available). But with the simple repair comes an interesting story of the past... In the early 1970s, I obtained my first multimeter – a Peak OL-64D (Hioki Electric Works). I have used it extensively over the last 50 years. When I recently used it on the ohms range, the needle didn’t move because the AA cells were flat and had corroded the terminals. The 22.5V battery, which I suspect was original, was also flat. 22.5V batteries haven’t been made for years, so I planned to use two small 12V batteries in series with some series diodes added if the exact voltage was critical. I soldered together the batteries and soldered wires to the meter The front view of the Peak OL-64D multimeter. Australia's electronics magazine siliconchip.com.au terminals. I wound the ohms adjuster pot anti-clockwise in case the higher voltage caused the pointer to overshoot. To my astonishment, the pot could only adjust the zero a short distance up the scale. Wondering if my quick soldering had damaged the batteries, I checked the voltage with another meter. Surprise: only 3V! A close look at the batteries showed I had used N cells rather than the 12V A23 ‘lighter’ type, which are much the same size. After uttering some naughty words, I de-soldered the N cells and reconstructed the battery with two of the more suitable A23 batteries. The zero pot had plenty of range, and the x10,000 range worked again. In the 1970s and 80s, I worked at the NASA Orroral Valley Tracking Station on Operations. Occasionally, when major equipment changes were scheduled, the operational shift workers would be temporarily reassigned to other ‘day work’ at the station. In 1980, I had a week in the Test Equipment Lab, properly called the Precision Measuring Equipment Laboratory (PMEL). Dave (different from the Serviceman), the Senior Technician, was ex-Army, versatile and competent at maintaining the station’s master standards. He had a laconic sense of humour and a sensitive BS detector. Several times per year, American-based engineers would visit the station bringing ‘traceable’ (NBS became NIST in 1988) transfer standards on their flights to check the calibration standards held in the PMEL. Many of these engineers took their jobs with deadly seriousness. Some may have been recruited from regions where humour is unknown. There was a complicated paper trail of visit dates, equipment calibrated, discrepancies found etc. As well as using their signatures, these engineers all had personal rubber stamps that they kept secure so that no one else could use them. They would prepare the paperwork, get Dave to sign in the right place and then ask him to apply his stamp. Sometimes for impact, he asked them if they were sure. He would then stamp a red ‘rubber duck’ on the forms. Some were horrified, feeling that it diminished the importance The side view of the Peak OL-64D multimeter and NASA PMEL Cal sticker. siliconchip.com.au of their own stamps, their jobs and probably themselves. I’m glad I still have my meter with its 1980 NASA PMEL Cal sticker – complete with Dave’s initials and red duck stamp (see photo at lower left). RIP Dave. The short-fused breadmaker K. W., of Craigburn Farm, SA likes to make his own bread but was frustrated by the breadmaker playing up. Luckily, it turned out to be a simple fix… I’ve had a few breadmakers over the years; they don’t last forever. My Panasonic SD-2501 model has been the best yet, and its bucket and paddle are still in good nick, so I was perturbed when it started playing up. Twice it failed to bake after mixing, forcing me to complete the loaves in the ‘normal’ oven. Then it stopped powering up altogether. I pulled it apart to see if I could find an obvious fault. It is well made and opened up reasonably easily. I found no obvious failures, no burnt smell, no shonky connectors and heater element showing a fair resistance. So I started tracing the power feed. Sure enough, an over-temperature fuse (of two) in the supply line was open circuit. I sourced a replacement from Jaycar, getting the next temperature range up since they didn’t have the exact one. The hardest part of the whole process was prising the crimps open, pushing in the new fuse and re-crimping it. I just used pliers since I don’t have a flash crimp tool. I switched it on, and it was all good. So my favourite breadmaker was saved from the dump and is still working well. I think what blew the fuse was loaves that rose too high and blocked the heat vents in the lid. Too much water or yeast can cause that. I’ll be more careful from now on. I’ve kept our nice Panasonic microwave oven from the dump too. After a loud ‘pop’, it ceased heating. All inside looked OK, so I gambled on the klystron, buying a replacement online. Not an exact match, but it worked. The microwave lives on. Appliance failures are inevitable, but sometimes a simple look inside can reveal an obvious fault that’s easy to fix and much cheaper than replacing the whole thing. SC Australia's electronics magazine December 2022  59