Search
intruder - search results
A Guide to Programming in Perl, PHP, and Python
Perl, PHP and Python are three very popular and easy-to-learn programming languages, each with its own advantages and disadvantages. Newbies venturing into the field...
Enterprise IoT | Electoral Cybersecurity | Security Standards
5 Reasons to Update the Enterprise IoT Security Roadmap
In order for widespread IoT adoption to take hold, the industry needs to mandate minimum levels...
Electromagnetic Hacking | Airforce Cybersecurity | Vulnerable Gadgets
Now You Can Hack a Chip With a Wave of Your Hand
When You Think of a standard hacker toolkit, software vulnerabilities and malware come to...
NTT Data: Roof Computing With Standard Interfaces…IoT Ecosystem
In order to ease the efforts of building applications over Roof platform, a unified interfacing and functional model is required. This is where Roof...
Dual-Laser Security System Using An Old Feature Phone
A security system having a single laser beam may not be very effective as any moving object or animal can interrupt it, causing a...
Sound Operated Timer
This sound operated timer is based on LM324 quad-operational amplifier and NE555 timer. Time delay can be set from a few seconds to 30...
Arduino Based GSM Home Security System
This project is designed using normally-closed reed switches connected to doors and windows and additional passive infrared (PIR) motion sensors to detect movement of...
11 Awesome Circuit Project Ideas!
From our collection of circuit projects, we bring to you a list of 11 popular ones to help you out! Click on the project...
Anti-Theft Alarm for Vehicles
This simple and inexpensive anti-theft alarm circuit for vehicles sounds an alarm simulating a police siren whenever someone attempts theft of your vehicle. The...
Directed Energy Weapons: Less-Lethal Laser Weapons
Under directed energy weapons, so far we have covered particle beam weapons and high-power microwaves. Let us now take a look at some less-lethal...





