We don’t know how [Kristoffer Marshall] found himself with free time at work, but he used it to beef up his computer security. Above is the finished project. There is literally nothing to see here. He ...
Group entry hacks are a favorite for hacker social groups. Why use old fashioned keys when you can use newfangled electronic keys? If you are looking to build a simple RFID-based security system to ...
With Aperio™ mechanical locks can be wirelessly linked to a new or existing access control system without any need to modify existing doors. At the heart of Aperio™ is a short distance encrypted ...
RF Code uses a combination of radio frequency identification (RFID) and infrared technology to keep tabs on the location of individual IT assets, right down to the rack level. RF Code today announced ...
It is hard to label any component of an RFID system as being more critical than any of the others. In past articles we have discussed the RFID tag, as well as, the RFID antenna hardware. Both of these ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results