News & Articles

Get started learning to build your own electronics by following our FREE online courses below!
Learn More »



Build Like A Pyro!
Find many of the parts used on this site at our favorite online electronics shop
Take Me To The Gadgetory!
Remote Controlled Surveillance Mobile Robot with IP Cam

Posted July 14, 2015 by Chris

"The Senior Year Design Project was named Vanguard by the team. He is a remote controlled surveillance robot. To avoid data communication problems we decided to use different protocols for controlling the wireless camera and the robot. The robot can be controlled through desktop or laptop computers while the video can be controlled through internet, adhoc, WAN and LAN. It is powered by two batteries. One for the circuit and one for its motors."

Sniffing Proprietary 2.4GHz Signals

Posted July 9, 2015 by Chris

"In this short article, I present a nifty technique for promiscuously sniffing such radios by (1) limiting the MAC address to 2 bytes, (2) disabling checksums, (3) setting the MAC to be the same as the preamble, and (4) sorting received noise for valid MAC addresses which may later be sniffed explicitly."


Posted May 11, 2015 by Chris

"KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back (over GSM) all keystrokes from any Microsoft wireless keyboard in the vicinity."

A DIY Universal RFID key

Posted February 28, 2015 by Chris

"The key I made works beautifully both on my garage door, as well as on a number of other readers I tried. I have decided to publish this, as more people should be aware of the design flaws that are inherent in older RFID implementations, and to allow others to make their own universal key."

Interfacing RFID with PIC18F4550 Microcontroller

Posted February 19, 2015 by Chris

"By employing RFID, secure entry systems can be developed without incurring huge costs. These are the reasons of excessive use of RFID technology. In this article, interfacing of an RFID reader module has been explained with PIC18F4550. The USART interrupt, an internal PIC interrupt, has also been explained."

Team 8 – Rescue Robot For Extraction

Posted February 14, 2014 by Chris

"The purpose of the prototype was to demonstrate the feasibility of a small, highly maneuverable search and rescue robot. As such, the completed prototype was successful. Capabilities include a ground speed of 10 inches per second, battery life of 50 minutes, wireless range of between 50 and 150 feet, weight of 14.5 pounds and the ability to climb stairs."

A Platform for RFID Security and Privacy Administration

Posted December 16, 2013 by Chris

"This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an ‘RFID firewall,’ that monitors and controls access to RFID tags by combining a standard-issue RFID reader with unique RFID tag emulation capabilities."

EGGN 482 Final Projects

Posted July 31, 2013 by Chris

“EGGN 482: Microprocessor and microcontroller architecture focusing on hardware structures and elementary machine and assembly language programming skills essential for use of microprocessors in data acquisition, control, and instrumentation systems. Analog and digital signal conditioning, communication, and processing. A/D and D/A converters for microprocessors. RS232 and other communication standards.”

GSM Based Real Time Home Security System

Posted June 28, 2013 by Chris

“GSM Home Security is a project to monitor the home when you are out of the house through the GSM network. The project uses four magnetic switches installed on any door in the house to trigger notification of doors being open or closed.”

Instrumented Steering Wheel Project Demo

Posted February 24, 2013 by Chris

“This project seeks to develop an additional form of authentication for vehicle security, specifically in the form of a tapped password. The goal of this project is to implement this form of authentication and determine the level of possible security while maintaining enough flexibility to allow human variation in password inputs.”