«
Expand/Collapse
31 items tagged "lock"
Related tags:
vulnerability [+],
security [+],
picking [+],
video [+],
iphone [+],
arduino [+],
screen [+],
monitor [+],
gnome [+],
door [+],
wadlow [+],
types [+],
stephen wadlow [+],
slides [+],
security flaws [+],
john boxall [+],
hotel [+],
home [+],
halleck [+],
cons [+],
combination lock [+],
apple iphone [+],
addition [+],
Hardware [+],
year [+],
xserver [+],
xml [+],
wooden chest [+],
village [+],
ultrasonic range finder [+],
ultrasonic [+],
turn [+],
toorcamp [+],
toool [+],
stop hackers [+],
stop [+],
stepper motor [+],
speed record [+],
solution [+],
shikin [+],
server rooms [+],
security flaw [+],
schuyler towne [+],
schuyler [+],
safe lock [+],
removal [+],
record [+],
purchase decisions [+],
pound sign [+],
pistol [+],
peripherals [+],
password [+],
parekh [+],
open organization [+],
onity [+],
new apartment [+],
nand gates [+],
milliseconds [+],
microcontrollers [+],
markoez [+],
malaysia [+],
lockpicking [+],
lock picking [+],
lock key [+],
little [+],
launchpad [+],
keypad [+],
keyboard [+],
key code [+],
key card [+],
key [+],
joe [+],
job [+],
hotel locks [+],
hardware purchase [+],
hardware based [+],
hackers [+],
hack in the box [+],
gun safe [+],
gun [+],
greg [+],
glaring flaw [+],
garage [+],
function [+],
full [+],
fingerprint scanner [+],
fifteen seconds [+],
featured security [+],
ergonomic keyboard [+],
electronic safes [+],
droves [+],
door lock [+],
combo locks [+],
combo [+],
combination locks [+],
combination [+],
code [+],
chest [+],
character lcd [+],
bypass [+],
button code [+],
burglar [+],
basil shikin [+],
basil [+],
authors [+],
audio [+],
attack [+],
arshad [+],
android [+],
alan parekh [+],
555 timers [+],
hacks [+]
-
-
8:26
»
Hack a Day
Can anyone argue against this being the least-secure hotel room lock on the market? Regular readers will recognize it as an Onity key card lock. A few months back a glaring flaw in the security was exposed that allows these locks to be opened electronically in less than a second. So we are not surprised [...]
-
-
13:01
»
Hack a Day
College students have returned in droves to dorms and apartments at campuses everywhere. So this is the time of year we usually start seeing some coded entry hacks. [Charmonkey] recently took on the challenge at his new apartment. There were some caveats though. He needed to ensure the Landlord could still enter using a key, [...]
-
-
9:30
»
Hack a Day
The Open Organization Of Lockpickers (TOOOL) ran the lock picking village at Toorcamp. They gave great workshops on how lock picking works, provided a lot of examples of security flaws in popular locks, and let everyone practice with their locks and tools. Lock picking is a bit addictive, and I spent quite a bit of time at [...]
-
-
12:01
»
Hack a Day
The security flaws on this common hotel keycard lock are nothing short of face-palmingly stupid. Look closely at the picture above. This is a hotel room door swinging open. The device he holds in his hand is an Arduino connected to the OUTSIDE portion of the door lock. It takes approximately 200 milliseconds from the [...]
-
-
15:06
»
Hack a Day
[Basil Shikin] was thinking about different types of locks, and was trying to come up with a locking solution that he had yet to see. It dawned on him that he had never come across a lock triggered by music, so he set off to construct one of his own. He ordered a wooden chest [...]
-
-
8:01
»
Hack a Day
[MarkoeZ] had an issue with keys breaking off in his door lock, and while normal people might try to simply replace the lock all together, [MarkoeZ] decided to do it the “Hackaday” way by adding a bluetooth lock to his door. His door is already setup where someone can walk up to it, page an [...]
-
-
8:01
»
Hack a Day
Many companies today try to simplify life by over complicating the keyboard. Microsoft has been doing it since 2001. If you love your ergonomic keyboard, but hate that “function lock” key, there are plenty of options out there for you to try. The least complicated way is to either modify some XML or just set [...]
-
-
12:01
»
Hack a Day
[John Boxall] took a different route for a single-input combination lock. This unit uses a Ping ultrasonic range finder to input a four digit code. It’s a hardware upgrade, but uses the same basic concept as his button-based combo lock. That design used an Arduino to measure how long you hold down a single button, [...]
-
-
8:35
»
Hack a Day
[Arshad Pathan] let us know about his latest project, a modular code lock that can be adapted to many different situations. The user interface is made up of a character LCD screen and a 3×4 keypad. For this example [Arshad] is using a stepper motor as the locking mechanism. When the board is first powered [...]
-
-
14:01
»
Hack a Day
[John Boxall] of Little Bird Electronics was thinking about combination locks, and how one might improve or at least change the way these locks work. Traditional combo locks can be implemented in a variety of ways, most of which we are all familiar with. Standard rotary padlock and keypad-based electronic safes work just fine, but [...]
-
-
10:30
»
Hack a Day
Instructables user [trumpkin] recently built an all-hardware based keypad lock for a contest he was entering, and we thought it was pretty neat. The lock uses mostly NAND gates and 555 timers to get the job done, which makes it a nice alternative to similar software-based projects we have seen in the past. The lock [...]
-
-
10:00
»
Hack a Day
It looks like the iPhone lock screen provides just a marginal level of protection. [Jordand321] discovered a key combination that opens the contact app on a locked iPhone. Just tap the emergency call button, enter the pound sign three times (###), then tap call and immediately tap the lock key on the top of the [...]
-
-
13:00
»
Hack a Day
[Greg] sent in his biometric pistol safe lock. He keeps his guide light on details so not every Joe can crack the system (there is a thread to sift through if you really wanted to), but the idea runs fairly simple anyway. [Greg] took an old garage door opening fingerprint scanner and wired it into [...]
-
-
6:00
»
Hack a Day
Sometimes I get enough away from writing about other people’s accomplishments long enough to actually do my own hacks. Most recently I developed a combination lock that opens the garage door. The idea isn’t original, it is based on [Alan Parekh's] button code project, but I did develop my own hardware and software. A four digit [...]
-
-
12:20
»
Hack a Day
[Jos Weyers] tipping us off about this lock impressioning video. It shows his final round of the lock impressioning championship at this year’s SSDev conference. Even though he shaved about fifteen seconds off of his 87-second single-lock record from last year he came in third overall because the competition averages times over several rounds. This [...]
-
-
21:04
»
SecDocs
Authors:
Deviant Ollam Tags:
lockpicking Event:
Black Hat DC 2010 Abstract: Physical security is an oft-overlooked component of data and system security in the technology world. You can have the most hardened servers and network but that doesn't make the slightest difference if someone can gain direct access to a console keyboard or, worse yet, march your hardware right out the door. While numerous ratings and standards exist in order classify specific security hardware, many of these standards are ill-defined and poorly-understood. Do you know what makes a "hardened" or "contractor grade" lock special? What does the phrase "high security" signify on hardware packaging? As it turns out, many of these terms are just for show... but Deviant will walk you step-by-step through some distinct and easy-to-follow examples of how low-grade locks can fail as well as how to clearly identify quality equipment. Additionally, we will cover the more difficult matter of hardware purchase decisions at the highest levels... fine distinctions such as which locks belong on the CEO's office versus which ones to use on your server rooms. Every situation calls for something a bit different, and those differences add up when you're spending $100 or more per lock. Make your money count and keep your budget, and your data, secure.