Bench Talk | encryption
 
United States - Flag United States

Please confirm your currency selection:

Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


How Unbreakable is the Blockchain? Jon Gabay
Blockchain security has gained attention and praise from many. Looking at the process, software, and weaknesses leaves doubts as to how effective it really is. So, how secure is blockchain?

Assessing Risk on Home Network Security Devices Jeff Fellinge
Many options are available today to protect your IoT and other smart devices. These devices monitor network usage, look for common misconfigurations, and alert you to possible vulnerabilities or activities that could allow an attacker into your home network and grant access to your sensitive data.

Understanding How Quantum Technologies Can Work Liam Critchley
Quantum technologies are starting to be developed, and if realized to their full potential, will be able to outperform classical computing technologies in many ways. Here, we look at the theory behind how basic quantum technologies are starting to work and how certain functions will work in the future.

Unclonable PUF Function Can Boost MCU Security Christine Young
Want to make hacker's life a lot harder—and protect your customers and your business? Learn how a secure microcontroller with physically unclonable function (PUF) technology can be your best friend.

SSH Part 3: Configuring SSH Reverse Tunnel to Reduce Exposed Ports Jeff Fellinge
You can use the Secure Shell (SSH) standard and tools for more than just secure remote administration. Learn how to use SSH port forwarding to securely connect to remote systems without exposing them to insecure networks.

SSH Part 2: Configuring SSH from a Windows 10 Workstation Jeff Fellinge
Microsoft’s support for the Windows Subsystem for Linux and the OpenSSH standard increases your options to manage Linux-based cloud environments and IoT devices. Use these tools to securely authenticate your devices and encrypt all communications.

SSH Part 1: Configuring SSH to Securely Connect to Remote Devices Jeff Fellinge
The Secure Shell (SSH) standard and tools provide essential command-line remote administration access for the secure and remote management of your IoT devices and cloud infrastructure. Learn how to configure SSH to securely connect to remote devices.

Protect Device Communication Through Secure Protocols Jeff Fellinge
Stop attackers from snooping or tampering with your data by ensuring that your devices and systems use secure protocols for communicating with each other and other services across the internet and in the cloud.

The Internet of Naming Things Warren Miller
One of the interesting things, at least to me, about the Internet of Things (IoT) is that every ‘thing’ will have its own address. You might be able to communicate with each of these things by just referencing its address. More complicated things might even have their own email address. You could be able to send messages to your coffee pot, your thermostat and your door lock just as you would send an email to a friend or family member.

Internet of Stuff Arden Henderson
The big buzzphrase today is The Internet of Things (IoT). Things that connect to the internet. Connected stuff. Lots of stuff. And the products that connect to the internet are rolling out at ever increasing rates. Connected cars, connected homes, connected things in homes, connected houses, connected wearables, connected stores for shopping, connected restaurants for dining, connected roads and bridges, and on and on. Hotel robots. Smart stuff. What stuff will be connected? The better question is what will not be connected. Rocks, for example. Wait, someone will market a rock monitor, connected to the internet by forest wifi. When a rock rolls in a forest, does it make a sound?

All Authors

Show More Show More
View Blogs by Date