Welcome to techmeology.co.uk! Here you'll find a collection of
stuff I've done that I think is cool (or at least useful to someone) enough
be on the Internet.
If you like what you find here, please share it with
I added a bunch of small programs to the
This centrifuge is 3D printed by hand using a 3D pen.
It achieves an acceleration of about 400 × g using a 18.5 V laptop
This project is a metal detector using a frequency counting approach.
It can generate an audio output, or connect to a computer
using a 5 V TTL serial connection.
I wanted to be able to add stuff to my site in a more ad-hoc manner
than the current organisation permitted.
So I have added a blog.
I intend to continue adding projects to the index on the left, but I
will now be able to make blog posts too!
I hope this proves successful.
It's an experiment, at least:p
P.S: Some posts, such as this one, are short enough not to have
their own pages.
Chain Reversi is similar to Reversi, except the "sandwich" rule is
applied until no more sandwiches that convert cells to the player's
Additionally, the end game rule is changed: the player that is first
to make their opponent unable to move wins.
The circuit for this project is quite simple.
Its purpose is to adapt the GPIO pins of the Raspberry Pi to the
voltages expected by the PIC.
It also provides LEDs for diagnostic purposes.
So, science is cool - we all know that.
It lets us explain why the universe has the properties it does.
Everything from why the sky is blue to how to use semiconductors to
build the computer on which you're reading this.
It also provides us with some fun excuses to supply to our parents:p
gr-scan is intended to scan a range of frequencies and print a list of
It should work with any device that works with that block, including
Realtek RTL2832U devices.
This project is designed to discover anomalous behaviour
of a computer network. In many cases, this anomalous behaviour
may be malicious, but this may not always be the
case. This project is
at its most general an attempt to discover information about a computer network
from the incomplete information available to an end machine. It is this
attempt to discover information from an unprivileged position on the network
(but with administrative access to the local machine) in an unobtrusive
way that makes this project interesting.