Ever hear of the Phoniebox project? If not – tune in, that’s a hacker’s project your entire family will appreciate. Phoniebox is a software suite and tutorial for building a jukebox controlled through ...
Wireless card readers are everywhere — but they’re easy to spoof or otherwise attack if you have the right tools Wireless card readers are everywhere — but they’re easy to spoof or otherwise attack if ...
Several companies have begun offering solutions leveraging Bluebird‘s HF550X Touch Mobile Computer to expand radio frequency identification (RFID) applications in retail and healthcare, for which a ...
A transmitter/receiver that reads the contents of RFID tags in the vicinity. Also called an "RFID interrogator." The maximum distance between the reader's antenna and the tag vary, depending on ...
Security researcher [Fran Brown] sent us this tip about his Tastic RFID Thief, which can stealthily snag the information off an RFID card at long range. If you’ve worked with passive RFID before, you ...
ASReader and Teijin Frontier released the reading device designed to only read the tag being touched by a worker wearing the glove. One of the greatest benefits of UHF RFID technology is the fast, ...
I just received my RC522 RFID reader and made this simple Arduino access control system that uses the reader, a buzzer for the alarm and a relay shield for the security system. The relay can be used ...
The RFID (Radio Frequency Identification-13.56MHz RFID system) essentially consists of an RFID Reader/Writer (Transceiver), an HF Tag and a Processor unit interfacing to various peripherals. The RFID ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果
反馈