Skip to main content

Home/ Electronic Everything!/ Group items tagged hacking

Rss Feed Group items tagged

Aasemoon =)

IEEE Spectrum: Torturing the Secret out of a Secure Chip - 0 views

  • A new chink has been found in the cryptographic armor that protects bank transactions, credit-card payments, and other secure Internet traffic. And although programmers have devised a patch for it, clever hackers might still be able to break through. The hack, presented in March at a computer security conference in Dresden, Germany, involves lowering the input voltage on a computer’s cryptography chip set and collecting the errors that leak out when the power-starved chips try and (sometimes) fail to encode messages. Crooks would then use those errors to reconstruct the secret key on which the encryption is based. More important, say the hack’s creators, the same attack could also be performed from afar on stressed systems, such as computer motherboards that run too hot or Web servers that run too fast.
jhonny bravo

Wireless Modem Hacking Software - 0 views

  •  
    Wireless field transmits data using tuner waves from one employment to another. The signalise carrying your information are transmitted over a open length sometimes Kilometers. Without plain guarantee measures in space, anyone with the good tools can gain out and encrypt, steal and taxi your accumulation. Vulnerable Wireless is the most unrefined comprise of intrusion to confidential networks.
Aasemoon =)

What Is an Arduino Shield and Why Should My Netduino Care? | Coding4Fun Articles | Chan... - 0 views

  • When the Arduino Duemilanove microcontroller appeared in 2005, it featured a set of female pin headers exposing most of the pins of the ATmega168 for easy hacking and for connecting accessory boards known as 'Shields'. The purpose of a shield is to provide new plug-and-play functionality to the host microcontroller, such as circuit prototyping, motion control, sensor integration, network and radio communication, or gaming interfaces, without worrying too much about the hardware implementation details. Seven years after the birth of the original Arduino, new shields keep coming out and are being cataloged on http://shieldlist.org/, a testament to the versatility of the design. It is also simple to build a DIY shield when nothing out there will meet your needs or when you want to understand how the shield concept works from the ground up.
Syeda Arshiya

Top 10 Antivirus 2014: Are You Using One Of These? - 0 views

  •  
    Top 10 Antivirus 2014: Are You Using One Of These? If you think that your computer is safe as you are the only person to use, then we have to say that it is not! If you leave your #computer unprotected, you are literally allowing cyber-thieves to hack it. So the best option to protect your data and make it private is antivirus software. Simple software will make your work more secure. Know More - Read More - http://digitalsoon.com/1426/top-10-antivirus-2014.htm
1 - 4 of 4
Showing 20 items per page