Author Archive

Simple circuits enable oscilloscope art

https://www.edn.com/design/analog/4421567/Simple-circuit-enables-oscilloscope-art?utm_content=buffer4a139&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer I built the circuit from this EDN article. I could not find exactly right component values from my lab, so I used 180 pF capacitor and 41 mH inductor instead.  I “powered” the circuit with 1 kHz 7Vpp square wave from signal generator. Then I got this nice graphics on digital oscilloscope screen in XY

Permissionless data slurping: Why Google’s latest bombshell matters • The Register

https://www.theregister.co.uk/2017/11/22/permissionless_data_slurping_google/ Somebody else than just your mobile operator gets to know where you are: According to an old Chinese proverb: “When a wise man points at the Moon, an idiot looks at his finger.” Google may have been hoping that you were examining a finger, not reading a Quartz story yesterday, which reveals how Android phones send

Solid state relay videos

A solid-state relay (SSR) is an electronic switching device that switches on or off when a small external voltage is applied across its control terminals. Packaged solid-state relays use power semiconductor devices such as thyristors and transistors. Here are some SSR videos worth to watch: What is a Solid State Relay? https://www.youtube.com/watch?v=wbQiRM9p0j0 Solid State Relay

No, you’re not being paranoid. Sites really are watching your every move | Ars Technica

https://arstechnica.com/tech-policy/2017/11/an-alarming-number-of-sites-employ-privacy-invading-session-replay-scripts/ If you have the uncomfortable sense someone is looking over your shoulder as you surf the Web, you’re not being paranoid. A new study finds hundreds of sites—including microsoft.com, adobe.com, and godaddy.com—employ scripts that record visitors’ keystrokes, mouse movements, and scrolling behavior in real time…

Getting Started with IoT Security with Threat Modeling

https://www.denimgroup.com/resources/blog/2017/11/getting-started-with-iot-security-with-threat-modeling/?lipi=urn%3Ali%3Apage%3Ad_flagship3_pulse_read%3BtGhVz%2BNYQRiSgJC%2Bt%2FEWQQ%3D%3D The security of IoT systems can be exceptionally complex because of the large number of components, potentially extensive attack surface, and the interactions between different parts of the system. Threat modeling is a great starting point to understand the risks associated with IoT systems. The challenge with this trend is that IoT devices are just computers