Skip to main content

Questions tagged [security]

The tag has no usage guidance.

2 votes
2 answers
105 views

Does the remote car door keyfob in today's automobiles change its code with every use?

I am just wondering why other keyfobs do not open my car door and thought every signal would have to be unique. So I did some research and they use a rolling code so in fact the code changes with ...
Sedumjoy's user avatar
  • 729
0 votes
1 answer
371 views

P Conductor E Conductor->PE Conductor

What are the difference between a P(Protection) Conductor and an E(Earthing) conductor.They combined make a PE conductor(Protective Earthing), but what are the difference between them separate?
Martino Pistis's user avatar
0 votes
2 answers
115 views

Magnetic Locks mods [closed]

What about magnetic locks? Two questions.. Does armature plate need be exact size as magnetic mate? Id like to get a bigger one milled so i dont have to use lasers to check perfect alignment. ...
Matt L's user avatar
  • 1
0 votes
2 answers
100 views

Wireless security for repetitive messages?

I'm designing myself a custom home automation system. Eventually, I want to expand the system to include security/alarm. The easiest way I know to do this is to include wireless capabilities. This ...
vini_i's user avatar
  • 7,127
2 votes
1 answer
1k views

Interfacing to end-of-line resistor in security system

Off-the-shelf security consoles utilize an end-of-line resistor to monitor the integrity of the cable runs, usually a 2 kΩ resistor. Is there a more or less standard interface circuit that most of ...
mcu's user avatar
  • 531
0 votes
2 answers
300 views

Can any part of Intel's (RdRand) random number generator be visually inspected?

A random number instruction RdRand, has been added to Intel's Ivy Bridge processors that (allegedly) draws upon a hardware entropy circuit. The architecture is (allegedly) something like this:- The ...
Paul Uszak's user avatar
  • 7,567
0 votes
0 answers
508 views

HTTPS (HTTP+SSL) server - field provisioning

My goal is secure field provisioning. Specifically, loading WiFi credentials on a device in the field. To do this, I wish to set up MCU as a WiFi Access Point with no WEP, WPA, etc - "open". The ...
Malachi's user avatar
  • 113
0 votes
3 answers
623 views

Controlling hardware with serial port [closed]

I initially posted this in SuperUser SE Site, but it was recommended that I bring it here instead. So, here we go :) We have a 'dated' security system at the office. It is a model that was made (or ...
Jason H.'s user avatar
14 votes
5 answers
9k views

Is it possible to jam wireless home alarm systems?

Sorry if this is the wrong community for this question but in my mind, it's the best fit. Please close or move to a more appropriate community if it's off topic. The other day, several home alarm ...
Classified's user avatar
0 votes
1 answer
1k views

Learning about security of UART and RS232 [closed]

I'm trying to learn about UART and related problems and solutions. IIUC, UART is a hardware, RS232 is an interface and hyperterminal is a program. Would these parts be able to work together? I ...
Niklas Rosencrantz's user avatar
7 votes
3 answers
3k views

securely storing and using keys in an embedded system

I'm using a microprocessor - PIC32MZ2048efm144 MCU that receives commands encrypted with a specific key, decrypts them and executes the command. The encrypted commands are stored offline, so I cannot ...
Sonja's user avatar
  • 77
-3 votes
1 answer
119 views

Anti case violation system for embedded products

I'm developing an embedded system that contains critical information inside. When someone tries to violate the case to obtain access to the board, the system should detect it and erase all the data ...
Sassa's user avatar
  • 101
2 votes
1 answer
404 views

Is CDMA more secure than LTE or GSM?

I know that this question is very direct, but I was curious to know why is it that in defense applications, CDMA is preferred over LTE? Is CDMA more secure than LTE and hence more difficult to ...
Tarandeep Kalra's user avatar
2 votes
1 answer
258 views

How secure are station clocks (using DCF77)? [closed]

In the Netherlands, we have clocks at train stations like on the one on the image below. In order to get the time as precise as possible, the clocks read the time from the DCF77 signal. (As far as I ...
Kevin's user avatar
  • 223
3 votes
3 answers
939 views

What security risks does the Test Access Port (TAP) introduce?

Trying to get my head around the JTAG world I looked at how the Test Access Port (TAP) works and although I get why we need it, the diagram seemed to me (as a software developer) introducing some kind ...
M. A. Kishawy's user avatar

15 30 50 per page
1
4
5
6 7 8