Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#RFID
Showing:
20
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
NPTEL
Design for Internet of Things
0
rewiews
Explore IoT applications, power management, protocols, and microcontroller selection. Learn about MQTT, RFID, BLE security, and LPWAN technologies. Includes practical case studies for hands-on experience.
Add to list
31
Lesons
1 day 4 hours
On-Demand
Free-Video
STMicroelectronics
NFC Sensor Tag - Webinar Replay
0
rewiews
Explore NFC Sensor Tag technology: low-cost, energy-efficient environmental data collection and transmission. Learn about its applications, benefits, and implementation in various industries using STMicroelectronics' solutions.
Add to list
45
Lesons
44 minutes
On-Demand
Free-Video
Mobile Forensics and App Analysis - Lecture 9
0
rewiews
Explore mobile forensics and app analysis techniques, focusing on Android, Facebook, NFC, and privacy concerns. Learn about emerging mobile technologies and their security implications.
Add to list
12
Lesons
40 minutes
On-Demand
Free-Video
RFID Security Vulnerabilities and Exploits - Lecture 7
0
rewiews
Explore RFID technology's vulnerabilities and security implications in this insightful presentation, uncovering potential risks and mitigation strategies.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
Playful Technology
Building a Physical "Connections" Word Puzzle with RFID and ESP32
0
rewiews
Build a physical "Connections" word puzzle using RFID readers and microcontrollers. Learn component overview, wiring, PCB design, and coding for an infinitely replayable game suitable for schools, events, or escape rooms.
Add to list
12
Lesons
44 minutes
On-Demand
Free-Video
BSidesLV
All Your Badge Are Belong to Us - Vulnerabilities in RFID Access Control Systems
0
rewiews
Explore RFID access control vulnerabilities, their real-world exploitation, and implications. Gain insights into why insecure systems persist and learn key considerations for selecting secure solutions.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
DEFCONConference
Your Smartcard is Dumb: A Brief History of Hacking Access Control Systems
0
rewiews
Explore the vulnerabilities of modern access control systems through live demonstrations, understanding fundamental design flaws and historical attacks on card-based security mechanisms.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
SDR Tricks with the HackRF
0
rewiews
Explore SDR techniques using hackrf, covering hardware design, RF interfaces, and RFID frequencies in this comprehensive wireless technology overview.
Add to list
11
Lesons
28 minutes
On-Demand
Free-Video
GOTO Conferences
REST No More - Using Actors for the Internet of LEGO Trains & Raspberry Pis
0
rewiews
Explore building IoT systems with Java/Scala on Raspberry Pi, using actors for communication in a LEGO train project. Learn architecture, performance, and practical challenges.
Add to list
23
Lesons
37 minutes
On-Demand
Free-Video
WeAreDevelopers
Traceability and Privacy Aspects in Industry
0
rewiews
Explore RFID and tracking technologies in industry, focusing on privacy concerns, challenges, and best practices for implementing location tracking systems.
Add to list
15
Lesons
52 minutes
On-Demand
Free-Video
linux.conf.au
Desktop Linux, Without a Keyboard, Mouse or Desk
0
rewiews
Explore alternative input methods for Linux desktops, including speech recognition, eye tracking, and foot pedals. Learn about ergonomic solutions for programmers seeking functionality and customization.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
Hackaday
Human Plants: Energy Harvesting for Open-Source Implantable Devices
0
rewiews
Explore groundbreaking energy harvesting techniques for implantable devices, from piezoelectric to RF systems, revolutionizing the future of hobbyist body modifications.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
DEFCONConference
Mutual Authentication Vulnerabilities in Physical Access Control Systems
0
rewiews
Explore physical access control system vulnerabilities, authentication weaknesses, and practical exploit techniques, featuring live demonstrations with HID readers and security tools.
Add to list
1
Lesons
17 minutes
On-Demand
Free-Video
DEFCONConference
RFID 101: Understanding Badge Systems, Readers, and Security Exploits
0
rewiews
Discover the fundamentals of RFID technology, badge cloning, and security system vulnerabilities using tools like Proxmark and Flipper, while learning practical wireless communication hacking techniques.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
DEFCONConference
Designing RFID Implants - From Concept to Under-Skin Implementation
0
rewiews
Explore the fascinating journey of creating custom RFID implants, from understanding basic concepts to designing functional credentials that work with existing security systems.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
DEFCONConference
Unlocking Doors Through Long-Range Relay Attacks on Contactless Credentials
0
rewiews
Discover how to execute long-range relay attacks on contactless credentials through ISO 14443A protocol vulnerabilities, including live demonstrations and practical mitigation strategies.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
DEFCONConference
Breaking into Secure Facilities with OSDP - Vulnerabilities and Exploitation Techniques
0
rewiews
Uncover critical vulnerabilities in OSDP security protocols and learn practical exploitation techniques for bypassing encrypted RFID systems through demonstrated pentesting tools and methodologies.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
DEFCONConference
Open Sesame - Vulnerabilities in Electronic Smart Lockers and Cabinets
0
rewiews
Explore physical and side-channel vulnerabilities in electronic smart locks, focusing on PIN and RFID security risks in organizational locker systems and shared spaces.
Add to list
8
Lesons
40 minutes
On-Demand
Free-Video
IOT Solutions World Congress
How Decathlon Uses RAIN RFID Technology for Sustainability and Regulatory Compliance
0
rewiews
Discover how Decathlon leverages RAIN RFID technology to revolutionize product traceability, meet sustainability goals, and comply with European regulations across their global value chain.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
secwestnet
RFID Security Research - Early Insights and Implications
0
rewiews
Early RFID security research by Adam Laurie, exploring vulnerabilities in RFID passports and predicting the need for RFID-blocking wallets. A pioneering look at RFID technology's security implications.
Add to list
1
Lesons
1 hour 1 minute
On-Demand
Free-Video
load more...