Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
1,712 results
In this talk, we'll be exploring how wireless communication works. We'll capture digital data live (with Software-Defined Radio), ...
20,659 views
6 years ago
Having lots of ideas for wireless technical gadgets but your WLAN range is to short? Building a sensor network, but you are tired ...
1,649 views
5 years ago
Relay Attack with Massive Antenna - Criminals Steal BMW M2 Competition with Relay Attack in 56 Seconds! Parked next to the ...
509,961 views
2 years ago
Location Services and Direction Finding with Bluetooth - Martin Woolley, Bluetooth SIG* Bluetooth acquired a new capability in ...
3,324 views
4 years ago
Dissecting the radio protocol of Sigfox, the global cellular network for the IoT you have probably never heard of Sigfox is an ...
6,071 views
Building Multi-protocol IoT Nodes with Thread, BLE and ZigBee - Alin Lazar, NXP Semiconductors Building Multi-protocol IoT ...
5,419 views
7 years ago
Let's have a quick look at Lora and Meshtastic and see if the functionality is something that could be used as an adjunct to packet ...
7,789 views
1 year ago
Comparing Messaging Techniques for the IoT - Michael E Anderson, The PTR Group, inc. In this presentation, we will discuss the ...
1,061 views
5G raises the security bar a level above 4G. Although IMSI exposure is prevented in 5G, we found new vulnerabilities to attack ...
498 views
Software-defined radios (SDRs) are indispensable for signal reconnaissance and physical-layer dissection, but despite we have ...
926 views
Title: Hacking satellites with Software Defined Radio (SDR) Abstract: In this no holds barred down introduction to Software ...
636,063 views
Presented by Andrew Tierney, @cybergibbons LoRaWAN Networks for Internet of Things (IoT) are Suspectible to Hacking: ...
1,583 views
The ProxyHam talk was mysteriously canceled. However, it's easy to replicate the talk from the press coverage. In this talk, we ...
8,940 views
8 years ago
1,152 views
TEMPEST is a cyber security term that refers to the use of electromagnetic energy emissions generated by electronic devices to ...
2,839 views
"Remember the good old fun sport, where people bought random hard drives from eBay and did forensics on them? Did you know ...
1,724 views
Midnight Blue, a specialist security consulting firm, announced today the discovery of 5 zero-day vulnerabilities collectively known ...
1,344 views
10 months ago
Today, most vehicle manufacturers in the US connect their vehicles to a type of network and delegate controls to mobile or web ...
6,001 views
You must have heard such statement as: - “Privacy is all about secrets!” and one more: - “I have nothing to hide! Why would I even ...
5,081 views
This on-line training includes 3 different hands-on training sessions directly from an STM32 expert on how to connect your ...
1,549 views