Honor 5X touchdown: A midrange 2015 who wants to be the best in its category in 2016

Last year, the mobile phone was an unusual character. Accustomed to the high-end models carry the baton, 2015 was a year of inflection in which we saw a lot of phones that cost about 200 dollars proving to be a solution very capable for most users: Motorola Moto G, BQ Aquaris M5, X5 Aquarius, Xiaomi Mi4i, Alcatel Idol 3, Xperia M4 … the list was long and the trend for this year pointed in this direction as well. Continue reading Honor 5X touchdown: A midrange 2015 who wants to be the best in its category in 2016

Ring – how to crack the Wi-Fi doorbell

Specialists companies Pen Test Partners describe a simple method that allows you to see your password on your home wireless network after spending an attack on the doorbell. The process takes a few minutes and can be made transparent to the owner.

Solutions from the field of IoT are becoming available, but often they threaten the security rather than improve it. Now they appeared on the market “smart” doorbells of different firms. One of the popular models – Ring – is equipped with a proximity sensor, camera, speaker and the module Wi-Fi 802.11 b / g / n 2.4 GHz. Such calls can be easily connected to a home wireless network and become part of the security system.

Wi-Fi doorbell

Ring activates the recording by pressing a button or self-fixing approach. Video and audio are transmitted on a smartphone or other mobile device owners through the Internet. The free app Ring App is available for OS Android, iOS and Windows 10. For an additional fee of $ 3 per month, you can connect corporate cloud service for archiving video.

Optional call is connected to the electronic lock, so this allows you to manage security door remotely. Right on your phone, you can see who came to answer the visitor through the built-in speaker, or open the door for him, even while away from home.

This would seem obvious convenience and a step towards a “smart home”, but at the level of implementation is not so smooth. During the study, the experts found Pen Test Partners mismatch Ring basic safety requirements. Videocall easily removed from the fixtures. Aware of this problem, the company even guarantees the free replacement of the stolen unit. However, to find out your password Wi-Fi, the call did not necessarily take home.

On its reverse side has an orange button that, when clicked, translated Ring setting mode. This built-in HTTP-server Gainspan starts as a point of Wi-Fi access with a standard name: Ring-XXX, where XXX – last three octets of the MAC-address.

For video calls Ring in access point mode, you can connect without authorization known address: http://192.168.240.1. Just type it into your browser and go to the Configuration tab: http://192.168.240.1/gainspan/system/config/network

This page displays the basic wireless settings of the call, including the SSID used by the Wi-Fi network and the password to connect to it. Key PSK Set in tags [password]. It is displayed in plain text form, as well as all other data.

Calculating the developer are that the company did not shut down the dangerous functions embedded HTTP-server and does not use additional security measures – such as encryption of configuration files, access authorization and complexity of physical access to the outside.

After getting acquainted with the results of Ring, the developers have changed the mounting system and released a new version of firmware. Patched modules video call does not store passwords in the clear. However, they left the other vulnerabilities associated with light physical access to e-filling. To solve their need is already on the physical level.

 

Fours Essential Strategies for Testing Software

We all know that testing software is an important part of the development cycle, but it’s vital that it’s done using a carefully planned approach in order to ensure that it’s effective. There are a number of possible strategies when it comes to testing and you need to choose the most effective ones for your project. Continue reading Fours Essential Strategies for Testing Software

Four tips for optimising the efficiency of your IFA business

If you ask people what they think is the best solution to improve business efficiency, one of the top answers you are likely to hear is automating as many tasks as possible. While this is true in the broadest sense – for example, using software to handle everything from staff management to client management to day-to-day transactions – knowing when not to automate is of vital importance when optimising efficiency for businesses such as IFAs. Continue reading Four tips for optimising the efficiency of your IFA business

Business plan of a company training

Yes, you’re right. You have to innovate. Keep in mind that innovation does not have to be alone product, it can be other fields, such as teaching methodology, teacher quality, combining classes on line and face, system classes via webcam, professional management practices in companies for students who are not working, teacher support system to students / workers in the company for a period to answer questions and supervise the training, etc. Continue reading Business plan of a company training

5 Key Factors behind the Growth in Market for Toroidal Transformers

Transformers are used worldwide to change one electrical voltage to another: to step up the voltage or step down the voltage so that it can be safely used. Traditionally, laminated transformers have been the most widely used, but toroidals – doughnut shaped transformers made by wrapping copper windings around and through a ring-shaped core are becoming more and more popular. Below are five of the main reasons behind the recent market growth: Continue reading 5 Key Factors behind the Growth in Market for Toroidal Transformers