====== Using your Rad1o in HackRF mode ======
When in "HackRF mode", rad1o behaves like the HackRF (the very popular SDR by Michael Ossmann). That means that the rad1o has to be connected to a computer or smartphone and then acts as an interface to world of radiowaves.
===== Booting into HackRF mode =====
When in HackRF mode, the rad1o display shows something like "Booting HACKRF.BIN" or "Booting HKRF-OLD.BIN". If not, [[howto:change_default_application|change the mode]].
===== Connecting to your PC ====
Connect a microUSB cable to port A.
==== Verifying connection ====
Linux: run
''lsusb | grep -i OpenMoko''
if there is a line of output, you're fine
==== Giving your user access to the device ====
Linux: Create a new file in
''/etc/udev/rules.d''
with the .rules suffix, containing
SUBSYSTEMS=="usb", ATTRS{idVendor}=="1d50", ATTRS{idProduct}=="6089", MODE:="0666"
SUBSYSTEMS=="usb", ATTRS{idVendor}=="1d50", ATTRS{idProduct}=="cc15", MODE:="0666"
You can also download the file from [[http://s.hostalia.de/o|here]].
==== Getting libHackRF ====
You could install your distribution's libhackrf package. Or, you could take the easy route for all relevant dependencies (including GNU Radio and friends) you might meet later on and use [[http://pybombs.info]] (no root necessary for the stuff you build yourself):
git clone --recursive https://github.com/pybombs/pybombs.git
cd pybombs
#prepare to answer a lot of questions with the default answer
#if you're not on debian/ubuntu you should change the install preferences away from deb,src
./pybombs install hackrf
./pybombs install gnuradio gr-osmosdr
#create and use shell setup script
./pybombs env
#bash:
echo "source /home//target/setup_env.sh" >> ~/.bashrc
#zsh: >> ~/.zshenv
==== Testing stuff ====
''osmocom_fft''