ATtiny Chip Abused in RFID Application

One of Atmel’s smallest microcontrollers, the ATtiny, is among the most inexpensive and reliable chips around for small applications. It’s also one of the most popular. If you don’t need more than a few inputs or outputs, there’s nothing better. As a show of its ability to thrive under adverse conditions, [Trammell Hudson] was able to shoehorn an ATtiny into an RFID circuit in a way that tests the limits of the chip design.

The RFID circuit only uses two of the ATtiny’s pins and neither of which is the ground or power pin. The ATtiny is equipped with protective …read more

Continue reading ATtiny Chip Abused in RFID Application

connect to another ip address remotely via tunnel can be traced? [duplicate]

if I connect through the tunnel to my friend’s friend work LAN, will use only his LAN (IP) and will not have my own internet at all, force entry connection and getting their internet to host my internet, is it possible to trace my physical location (address)? The only address government will be able to find is that, that ISP have on file for that particular IP thus my friend’s friend work address, and it will be impossible for them to find my location?

Continue reading connect to another ip address remotely via tunnel can be traced? [duplicate]

Accessing SQL database from Java Android app. How do I store the SQL database details so they are safe?

So I am developing a Java app which is going to be free and would preferably not require a sign up process. I cannot seem to think of an idea to store the log in details safely.

I have thought of salting and hashing the pass… Continue reading Accessing SQL database from Java Android app. How do I store the SQL database details so they are safe?

Accessing SQL database from Java Android app. How do I store the SQL database details so they are safe?

So I am developing a Java app which is going to be free and would preferably not require a sign up process. I cannot seem to think of an idea to store the log in details safely.

I have thought of salting and hashing the pass… Continue reading Accessing SQL database from Java Android app. How do I store the SQL database details so they are safe?

A Fresh Approach to Perimeter Protection: Application Isolation

Detection-based IT security solutions have never worked, and will never work. More security layers is not the answer, but smarter layers can work. Shift your mindset from “prevent, detect, and respond” to “isolate, contain, and control.” Layer after layer of security is not stopping breaches. We can’t keep the bad guys out. Oddly enough, 80+ years […]

The post A Fresh Approach to Perimeter Protection: Application Isolation appeared first on Bromium.

The post A Fresh Approach to Perimeter Protection: Application Isolation appeared first on Security Boulevard.

Continue reading A Fresh Approach to Perimeter Protection: Application Isolation