ePanorama.net

All about electronics and circuit design

Dynamic random flip memory

Row hammer (also written as rowhammer) is a security exploit that takes advantage of an unintended and undesirable side effect in dynamic random-access memory (DRAM) in which memory cells interact electrically between themselves by leaking their charges, possibly changing the contents of nearby memory rows that were not addressed in the original memory access. The

Ancient “fake RJ-45″

Who invented that and decided that it was a good idea to start to use this 10 pin RJ-45 look-alike connector? I wanted to do measurement with multimeter on UTP wiring, took a cable (left) that looked like RJ-45, but nothing worked as planned with it. Ended up butchering a real CAT6 cable (on right)

European mains power

This post is about European mains power. Electricity in EU countries conforms to the European standard, coming out of the wall socket at 230 volts alternating at 50 cycles per second. While the voltage and frequency are fixed, the mains connectors and wiring practices can vary between different countries in Europe. One thing to note

MTester LCR-T4 12864 LCD

One day I got a cheap MTester from some Chinese source. MTester is a cheap electronics component measurement device. It can detect component types and measure them. The meter has automatic detection PNP and NPN type bipolar transistors , N, P -channel MOSFET, JFET FET , diodes , two diodes, thyristors , resistors , capacitors

RLC measurements

This article is about measuring resistance, capacitance and inductance. The measurements described here talks about measuring components that not wired into any circuit. Resistors, Inductors and Capacitors are the most commonly used passive components in almost every electronics circuit. Out of these three the value of resistors and capacitors are commonly marked on top of

Hardware Weaknesses of 2021

First CWE Security Report Highlights the “Most Important Hardware Weaknesses” of 2021 has been released. “The goals for the 2021 Hardware List are to drive awareness of common hardware weaknesses through CWE, and to prevent hardware security issues at the source by educating designers and programmers on how to eliminate important mistakes early in the

Braktooth breaks Bluetooth

The United States Cybersecurity and Infrastructure Security Agency (CISA) warned last week on proof-of-concept (PoC) code for the BrakTooth Bluetooth vulnerabilities now being publicly available. BrakTooth is the name researchers with the Singapore University of Technology and Design gave to a set of roughly two dozen vulnerabilities in commercial Bluetooth Classic (BT) stacks and which

Mains LED waveform

I saw a quite interesting looking waveform from a 10W LED floodlight powered from 230V AC. It looks like when AC voltage waveform instantaneous voltage lower than some voltage, it takes practucally no current and above it it looks like a constant current load. This is picture of the light. This looks like this uses

Email is 50 years old

At some point this year, email turned 50 years old! In 1971, Ray Tomlinson sent the first email using the SNDMSG program on ARPANET. 50 Years of Email https://www.prnewswire.com/news-releases/50-years-of-email-301262676.html But if the history of email tells us anything, it’s that email isn’t going away any time soon Email is 50 years old, and still where