submitted by /u/insanesciencekdlr [link] [comments]
Posts published in June 2020
I reset my admin password with below command:
#Set system login user admin authentication encrypted-password <new password>
But now i can't login to my device, what can be the reason?
I have a client whose requirements are to monitor students anywhere in the campus. The campus is anywhere between 50 to 60 acres of land and they won't allow phones inside the campus. What would be the cheapest technology we can use in this case? They can compromise on accuracy as long as it is cost effective.
This is my first time posting here. Apologies if I had broken any of the rules.
Hi everyone, I am fiddling around with LoRaWAN at home for an IoT project right now with 433Mhz and a Dragino LG01-P gateway and ESP32 with LoRaWAN RHF76-052 module (M5Stack) as sensor node. Unfortunately I can't get it to work with the gateway. I spent the last two weeks following diverse tutorials with no success. With the example sketches by M5 I am able to send and receive messages but for my use case of a private network with secure data transfer over LoRa to the gateway and forwarding to MQTT (no TTN), I have no idea on how to move forward.
I am thankful for any help and really appreciate anyone’s time reading and replying.
Thanks in advance.
submitted by /u/mabdullah284 [link] [comments]
Hello all, I have zero idea about this stuff as I didn't learn it before, can someone help me? or can someone provide me some site or news for doing this study?
Quick analysis of the existing IoT security landscape and the effectiveness of current solutions. Explore new ways to identify and mitigate IoT security risk for home and business users from the perspective of Application Layer Security.
Huge amounts of electronic devices used by individuals and corporations are wired and interconnected which are collectively called Internet of Things (IoT). The higher interconnectivity leads to better communication amongst devices which in turn brings us convenience but also a new attack vector for hackers. Security concern are an exponential function of the numbers of connected IoT devices. In light of the data sensitivity of what IoT devices have access to, it’s important to understand their security risk and ideally, minimize the risk.
- Problems: Analyze IoT devices which are common for domestic and commercial usages. Study the IoT security vulnerabilities poised by such devices. Who are the likely attackers? What are the common attack methods?
- Analysis of Existing Solutions: How to efficiently and cost-effectively identify and minimize such risks? Is the current protection on the Application Layer adequate? Are the existing software and tools powerful enough to protect the users? What are the costs, benefits or limitations?
- Feasibility Study of New Solutions: Any necessity to make a new device or solution to tackle such risk? If so, what are the technical requirements for such solution? A prototype of the solution
- Recommended Best Practice for home and business users: Recommended best practice of enhancing Application Layer Security for IoT
Hi r/IoT! I am a researcher working for a market research company. One of our clients is currently seeking IoT and cybersecurity enthusiasts to take part in a market research study!
The study takes about 15-20 minutes to complete, and will pay out $50 via PayPal. If you're interested in this study, fill out the Google Form below!
Hi, I'm trying to simulate a flood warning system. These were the items( gsm , arduino , ultrasonic sensor , few jumper wires , breadboard and led ) I needed to develop a real physical system, but due to the covid situation, I'm having to do it online.
Any help would be appreciated. Thankyou.
Can one AS unite several ISPs, can/does an ISP own several ASes? No matter what I read nobody really clarifies this relationship or at least doesn't writes it down. Or is ISP and AS just a synonym? Is there a special reference in the rfc t...
After several months sitting empty and quiet, commercial districts are coming back to life as businesses and offices are being given permission to reopen. When the lights come on and doors are unlocked, will the water that comes out of the tap be safe?