Remove tag wired-free-access
article thumbnail

RIM-brain at the Movies, Part II

The Texas Record

But when your workplace is also your leisure space, wires can be crossed and you may develop what I’m calling “RIM-Brain.” We consider the Public Information Act, which provides a mechanism for citizens to access government records. Defining who has access to what and in what capacity—read-only, edit, save, print, etc.—should

Paper 98
article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

Vamosi: I once wrote about a petty car thief in Prague, Czech Republic who started the usual way by using scissors to cut the wires and hotwire the engine to drive away. This has turned into a RFID tag, which is a fob that you carry in your pocket and the fob reaches out to the car and it will unlock the car or lock the car.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

Our organization is maybe 70% women, probably 29% Men 1% other, and we're not even all black, and I'd say maybe 80% literally have every color of the rainbow and we've got, you know, all of the gender options so you know, please feel free to come out and join us. So, you know what we're doing is we're providing a discount for them.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

Our organization is maybe 70% women, probably 29% Men 1% other, and we're not even all black, and I'd say maybe 80% literally have every color of the rainbow and we've got, you know, all of the gender options so you know, please feel free to come out and join us. So, you know what we're doing is we're providing a discount for them.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

And yet, everything we do requires electricity, either AC through the wire or DC in the form of a battery when it's gone. And I'm using a free service. And I'll let other people post for free. Like if we need to solder 100 wires onto some tiny chip to solve the problem. You click that thing with some wire cutters.

article thumbnail

The Legitimisation of Have I Been Pwned

Troy Hunt

Transparency has been a huge part of that effort and I've always written and spoken candidly about my thought processes, how I handle data and very often, the mechanics of how I've built the service (have a scroll through the HIBP tag on this blog for many examples of each).

article thumbnail

Turning a £400 BBC Micro (1981) into a $40,000 disc writer (1987)

Scary Beasts Security

The reason for the hefty price tag is likely the timing precision required to create fuzzy bits reliably. The connectors are standard and the wires between them are just jumper wires. Wiring together random pairs of components might sometimes work and sometimes it may need finessing. So far so good.

IT 68