88 research outputs found

    So You Think Your Router Is Safe?

    Get PDF
    A home router is a common item found in today’s household and is seen by most as just an Internet connection enabler. Users don’t realize how important this single device is in terms of privacy protection. The router is the centerpiece through which all the household Internet activities including ecommerce, tax filing and banking pass through. When this central device is compromised, users are at risk of having personal and confidential data exposed. Over the past decade, information security professionals have been shedding light on vulnerabilities plaguing consumer routers. Yet, most users are unaware of all the different ways a router can be compromised and tend to focus only on setting up a strong password to stop the neighbor from piggy backing on the Internet

    Real-Time High Jump Wearable Device with ESP8266 for High-Performance and Low-Injury

    Get PDF
    In the world of sports, the injury is unavoidable, however, the performance is the first priority. The percentage of the athletes to get injured is very high due to the fallibility of athlete jumping themselves. Therefore, this study presents the design and implementation of high-performance and low-injury real-time high jump wearable device by using ESP8266 microcontroller. The proposed wearable device is built because of there is no device to monitor this sport during training. There are three (3) parts have been integrated to build this wearable device – input, process and output. The input consists of global positioning system (GPS) sensor that attached to the waist and force sensing resistor (FSR) sensor was placed at the bottom of the ankle as a wireless input for data captured. These data were then being processed by ESP8266 microcontroller hardware device with an embedded wireless fidelity (Wi-Fi) module on the same chip that has been programmed and results obtained were displayed via the mobile app. Graphical user interface (GUI) of the wearable device has been designed using C language code using OpenHAB software and data from the wearable device were also available in log formats. The outcomes obtained have shown encouraging results since all data can be visualised and monitored in real-time, history of the training can be retrieved and the benchmark data acts as a guide to the other athlete to improve the performance

    An Australian Perspective on the Challenges for Computer and Network Security for Novice End-Users

    Get PDF
    A good portion of today\u27s investigations include, at least in part, an examination of the user\u27s web history. Although it has lost ground over the past several years, Microsoft\u27s Internet Explorer still accounts for a large portion of the web browser market share. Most users are now aware that Internet Explorer will save browsing history, user names, passwords and form history. Consequently some users seek to eliminate these artifacts, leaving behind less evidence for examiners to discover during investigations. However, most users, and probably a good portion of examiners are unaware Automatic Crash Recovery can leave a gold mine of recent browsing history in spite of the users attempts to delete historical artifacts. As investigators, we must continually be looking for new sources of evidence; Automatic Crash Recovery is it

    Ubiquigeneous networking : A distributed networking application over mobile embedded devices

    Get PDF
    The objective of this work is to develop a chat application between systems embedding the ColdFire processor utilizing Mobile IPv6 and TCP protocols in order to demonstrate that TCP connections are maintained while a device roams between two Ethernet 802.3 networks and that a peer node can be located even though it is not attached to its home network. Furthermore, it will be demonstrated that mobility is transparent to upper layers and the benefits this fact brings up.Es revisado por: http://sedici.unlp.edu.ar/handle/10915/9519Facultad de Informátic
    • …
    corecore