High Voltage Measurement is Shockingly Safe

With the right equipment and training, it’s possible to safely work on energized power lines in the 500 kV range with bare hands. Most of us, though, don’t have the right equipment or training, and should take great care when working with any appreciable amount of voltage. If you want to safely measure even the voltages of the wiring in your house there’s still substantial danger, and you’ll want to take some precautions like using isolated amplifiers.

While there are other safe methods for measuring line voltage or protecting your oscilloscope, [Jason]’s isolated amplifier method uses high voltage capacitors to …read more

Continue reading High Voltage Measurement is Shockingly Safe

A Sneak Peek at Anechoic Chamber Testing

[Mathieu Stephan] has something new in the works, and while he isn’t ready to take the wraps off of it yet, he was kind enough to document his experience putting the mysterious new gadget through its paces inside an anechoic chamber. Considering the majority of us will never get inside of one of these rooms, much less have the opportunity to test our own hardware in one, he figured it was the least he could do.

If you’re not familiar with an anechoic chamber, don’t feel bad. It’s not exactly the sort of thing you’ll have at the local makerspace. …read more

Continue reading A Sneak Peek at Anechoic Chamber Testing

Would it be possible for a malicious user to change the LAN IP address of an uncompromised device

Basically I have a local network and an IPCam (with its own storage) in it. Due to some practical limitations, I cannot use technologies such as AP isolation or VLAN to isolate low-integrity and high-integrity devices.

There… Continue reading Would it be possible for a malicious user to change the LAN IP address of an uncompromised device

What kind of safety does software isolation (e.g. in operating systems) offer (e.g. between OS and browser)?

What kind of safety does software isolation (e.g. in operating systems) offer (e.g. between OS and browser)?

Particularly, what kind of safety mechanisms are there and how secure are they?

By software isolation I mean proce… Continue reading What kind of safety does software isolation (e.g. in operating systems) offer (e.g. between OS and browser)?