REGISTER | LOGIN
Breaking News
Comment
mclaus
User Rank
Author
Re: Part V: Case Study: Highlighting a Successful Design Example
mclaus   11/30/2012 12:43:36 PM
NO RATINGS
There is - but since update in basically an automated process, we have essentially embedded a password into the code - a very bad practice.  It is encrypted and known to only a few in our organization, but still it is probably vulnerable to being hacked if somebody were to work at it hard enough.  We are planning to change to a dynamically generated key that will be provided via a newwork connection back to our central service organization - but we don't have that infrastructure quote ready yet. 



Like Us on Facebook
EE Life
Frankenstein's Fix, Teardowns, Sideshows, Design Contests, Reader Content & More
Martin Rowe

Test Tool Finds Ethernet Wiring Errors
Martin Rowe
Post a comment
When my house was renovated several years ago, I had the electrician install network outlets in numerous places, then run the LAN cables to a wiring closet. But he didn't document the ends ...

Martin Rowe

Local Electronics Store Supplies Engineers and Hobbyists
Martin Rowe
5 comments
Rochester, N.Y. — Tucked away in this western New York city known for its optics is Goldcrest Electronics, a local store that's supplied businesses and individuals with electronic ...

Martin Rowe

How to Transform a Technology University (Book Review)
Martin Rowe
1 Comment
The Presiding Genius of the Place by Alison Chisolm. WPI, Worcester, Mass., 234 pp., 2016. Engineers love to discuss, and often criticize, engineering education. They often claim ...

Max Maxfield

Aloha from EEWeb
Max Maxfield
Post a comment
Just a few minutes ago as I pen these words, I posted this blog about this month's Cartoon Punchline Competition over on EEWeb.com.