Home Blog Page 2075

Wireless Charging is the Future

Wireless charging is no more inferior to wired charging. Better standards, integration methods, and components have evolved over the past few years to make...

Make Your own Paper Plate Speaker

Here's how to make a real working paper plate speaker for under 100INR. Courtesy: Grant Thompson - "The King of Random"  

Monitor for 6V/12V Batteries

Rechargeable batteries of 6V and 12V are used in a large number of applications. It is imperative that these are maintained properly to get...

Laser Based Security Lock

Presented here is a security system that uses an inexpensive laser torch which is usually available with a key ring. The advantage of this...

Simple Low-Power Audio Amplifier

The small-signal amplifier is generally referred to as a voltage amplifier because it usually converts a small input voltage into a much larger output...

Plotting with MATLAB

MATLAB is a useful software tool for engineering and computational mathematics. It also plays a very important role in scientific and engineering plots. This...

Part 2 of 2: How to Ensure E-mail Security

E-mail authentication has become a big problem and many methods are being incorporated by e-mail servers across the world to overcome this problem. There...

RF Surveillance: A Case of Homeland and Border Security

  Although security threat can emerge from many sources, the one which is really brutal and catastrophic is terrorism. Terrorism has far reaching consequences like...

“Bluetooth Smart offers rapid rollout of low-power consumer products around the...

The IoT requires almost all objects to have some communication ability built into them. What is the scope of Bluetooth Smart in the IoT...

Security Testing Tools: Wapiti, OWASP ZAP and Netsparker—A Comparison

Before digging into the details of web application security testing, let us first take a brief overview of application security testing. Security testing can...