Questions tagged [security]
The security tag has no usage guidance.
112
questions
2
votes
2
answers
105
views
Does the remote car door keyfob in today's automobiles change its code with every use?
I am just wondering why other keyfobs do not open my car door and thought every signal would have to be unique.
So I did some research and they use a rolling code so in fact the code changes with ...
0
votes
1
answer
371
views
P Conductor E Conductor->PE Conductor
What are the difference between a P(Protection) Conductor and an E(Earthing) conductor.They combined make a PE conductor(Protective Earthing), but what are the difference between them separate?
0
votes
2
answers
115
views
Magnetic Locks mods [closed]
What about magnetic locks? Two questions..
Does armature plate need be exact size as magnetic mate? Id like to get a bigger one milled so i dont have to use lasers to check perfect alignment. ...
0
votes
2
answers
100
views
Wireless security for repetitive messages?
I'm designing myself a custom home automation system. Eventually, I want to expand the system to include security/alarm. The easiest way I know to do this is to include wireless capabilities.
This ...
2
votes
1
answer
1k
views
Interfacing to end-of-line resistor in security system
Off-the-shelf security consoles utilize an end-of-line resistor to monitor the integrity of the cable runs, usually a 2 kΩ resistor.
Is there a more or less standard interface circuit that most of ...
0
votes
2
answers
300
views
Can any part of Intel's (RdRand) random number generator be visually inspected?
A random number instruction RdRand, has been added to Intel's Ivy Bridge processors that (allegedly) draws upon a hardware entropy circuit. The architecture is (allegedly) something like this:-
The ...
0
votes
0
answers
508
views
HTTPS (HTTP+SSL) server - field provisioning
My goal is secure field provisioning. Specifically, loading WiFi credentials on a device in the field. To do this, I wish to set up MCU as a WiFi Access Point with no WEP, WPA, etc - "open". The ...
0
votes
3
answers
623
views
Controlling hardware with serial port [closed]
I initially posted this in SuperUser SE Site, but it was recommended that I bring it here instead. So, here we go :)
We have a 'dated' security system at the office. It is a model that was made (or ...
14
votes
5
answers
9k
views
Is it possible to jam wireless home alarm systems?
Sorry if this is the wrong community for this question but in my mind, it's the best fit. Please close or move to a more appropriate community if it's off topic.
The other day, several home alarm ...
0
votes
1
answer
1k
views
Learning about security of UART and RS232 [closed]
I'm trying to learn about UART and related problems and solutions.
IIUC, UART is a hardware, RS232 is an interface and hyperterminal is a program. Would these parts be able to work together?
I ...
7
votes
3
answers
3k
views
securely storing and using keys in an embedded system
I'm using a microprocessor - PIC32MZ2048efm144 MCU that receives commands encrypted with a specific key, decrypts them and executes the command.
The encrypted commands are stored offline, so I cannot ...
-3
votes
1
answer
119
views
Anti case violation system for embedded products
I'm developing an embedded system that contains critical information inside. When someone tries to violate the case to obtain access to the board, the system should detect it and erase all the data ...
2
votes
1
answer
404
views
Is CDMA more secure than LTE or GSM?
I know that this question is very direct, but I was curious to know why is it that in defense applications, CDMA is preferred over LTE? Is CDMA more secure than LTE and hence more difficult to ...
2
votes
1
answer
258
views
How secure are station clocks (using DCF77)? [closed]
In the Netherlands, we have clocks at train stations like on the one on the image below.
In order to get the time as precise as possible, the clocks read the time from the DCF77 signal. (As far as I ...
3
votes
3
answers
939
views
What security risks does the Test Access Port (TAP) introduce?
Trying to get my head around the JTAG world I looked at how the Test Access Port (TAP) works and although I get why we need it, the diagram seemed to me (as a software developer) introducing some kind ...