asteroza + lock   129

Bowley Lock Company
Interesting anti lockpicking design using an internal pin shield design
door  lock  padlock  slotted  key  security  hardware 
april 2018 by asteroza
Qrio Smart Lock | First Flight
Interesting BLE door lock opener from Sony, via their crowdfunding platform.
sony  crowdfunding  BLE  bluetooth  door  lock  opener  hardware  electronics  devices  aftermarket  accessories  Delicious 
september 2016 by asteroza
Interesting double gate design
binary  carabiner  double  gate  lock  camping  gear  hardware  Delicious 
august 2016 by asteroza
Some sort of weird PIN code mechanical lock and key system
hybrid  mechanical  passcode  PIN  number  combination  lock  key  security  Delicious 
august 2016 by asteroza
Apple Configurator 2 on the Mac App Store
Restricts allowed devices an iPhone will pair/sync with, gives forensics a real headache.
iOS  iPhone  pair  lock  pairing  configuration  configurator  app  software  security  antiforensic  tools  utilities  privacy  apple 
march 2016 by asteroza
Bowley Lock Company Inc - Home
Interesting key/tumbler design with pin shield to make lock picking conceptually harder...
alternative  high  security  lock  shielded  pin  shield  tumbler  hardware  home  house  building  door  Delicious 
december 2015 by asteroza
Interesting bike share service, but this appears to use a rear wheel imobilizer type lock, and not particularly strong to boot.
sharing  economy  bike  bicycle  service  bluetooth  lock  hardware  electronics  devices  Delicious 
october 2015 by asteroza
TSA FAIL for using a lock system that depends on obscurity of the master keys...
DHS  TSA  travel  luggage  lock  master  key  3D  printing  fabbing  file  FAIL  Delicious 
september 2015 by asteroza
HAVEN: The Stronger Smarter Home Lock - HOME
A lot of door locks work against the door frame, which is actually weak to battering ram attacks. Some of the more serious door lock systems utilize some sort of floor anchor connection, like this one does. This seems pretty simple, being a jamming cam type door stop..
door  lock  jam  floor  block  cam  wireless  unlock  hardware  electronics  devices  alterantive  security  Delicious 
march 2015 by asteroza
Smartlock with a sensor to detect knock code sequences, so you can unlock the door just by knocking in a certain sequence. Hope it's a one time code though!
home  house  door  lock  smartlock  sound  acceleration  sesnor  knock  knocking  unlock  hardware  electronics  devices  security  crowdfunding  Delicious 
february 2015 by asteroza
So, there seem to be two threads on the bolt, such that the two different nuts will separate if rotated together in one direction, but will come together and lock/jam against each other if turned the other way.
japan  lock  locking  nut  bolt  hardware  double  threaded  spiral  thread  Delicious 
september 2014 by asteroza
So the idea here is, if the lock isn't internet connected, then someone copying the physical key fails because they don't have the chip in the original key.
Abloy  electromechanical  mechanical  lock  cylinder  key  hardware  electronics  devices  security  Delicious 
july 2014 by asteroza
LokLok - Connected lock screen for Android
App that allows others to leave messages on your lock screen without logging in.
android  app  software  lock  screen  message  memo  Delicious 
july 2014 by asteroza
ICE Unlock Fingerprint Secure - Android Apps on Google Play
Uses a smartphone's built in rear camera for the fingerprint sensor, though that makes it vulnerable to printed fingerprint photos or analogs.
android  app  software  lock  fingerprint  scanner  biomteric  security  Delicious 
february 2014 by asteroza
Rotation Lock Adaptive (Free) - Android Apps on Google Play
it basically asks you via overlay icon to allow a screen rotation
android  app  software  adaptive  screen  rotation  lock  Delicious 
november 2013 by asteroza
The Kitchen Safe
The Kitchen Safe is the time-lock container that puts you in charge.
protection  hardware  tricks  locking  lock  security  kitchen  access  child  time  timer  container  prevention  tips  locked  devices  electronics  storage  Delicious 
june 2013 by asteroza
Sparrows is a leading manufacturer of lock picks for locksmiths, military and the sporting community.
Shirt cuff links, that contain a hidden handcuff key. Key not universal, but good enough to get you out of most handcuffs. Using this may be breaking the law however. But lets be honest, how often will a cop check your cuff links, since you are likely to be well dressed, and thus at first glance judged to be a low threat/flight risk?
picking  pick  lock  covert  accessories  fashion  hardware  gear  spy  escape  key  handcuff  link  cuff  cufflinks  Delicious 
november 2012 by asteroza
Interesting twin use of NFC (now available in newer phones) and an encrypted acoustic signal (for older phones without NFC), to provided a phone app based wireless key solution for hotels and other proximity card access facilities.
OpenWays  NFC  cryptographic  acoustic  signal  encryption  wireless  lock  key  system  hardware  electyronics  devices  smartphone  android  iPhone  app  software  Delicious 
february 2012 by asteroza
LockHunter is a free 64/32 bit tool to delete files blocked by any processes
an okay alternative to unlocker (which has turned into skeezy adware after version 1.8.7) and 64 bit,
LockHunter  windows  file  lock  lunlock  sysadmin  tools  utilities  software  unlocker  x64  64bit  freeware  Delicious 
march 2011 by asteroza
KSI keyboards are Programmable, with Biometric reader. POS , Smart Card, RFID, Wireles and Custom Keyboards
SonarLoc is a keyboard with a sonar sensor, HID proximity card reader, and a fingerprint reader. Basically, if the host computer software and the sonar determine the user has moved away from teh keyboard, it locks the workstation and forces you to log back in, either via traditional username/password, a HID/iClass/Mifare proximity RFID access card, or a fingerprint.
KSI  SonarLoc  security  keyboard  USB  biometric  fingerprint  reader  proximity  card  proxcard  HID  iClassMifare  RFID  contactless  sonar  user  presence  monitoring  autolock  lock  hardware  electronics  devices  Delicious 
february 2011 by asteroza
The SoBi lockbox prototype is up and running! A... - SoBi
Interesting cellphone network connected bicycle lock, equipped with GPS, to monitor bicycles used in a bicycle share program. While not impervious to assault/theft, this makes for a potentially far more useful sharing system since you are not functionally required to return bicycles exclusively to prepositioned bicycle storage/recharge/locking facilities. I wonder about the long term power issues of the battery powering the thing though. Maybe a forward wheel power generator dynamo to recharge the cellphone/lock computer?
SoBi  social  bicycle  sharing  GPS  cellphone  mobile  phone  lock  hardware  electronics  devices  antitheft  theft  vandalism  tracking  monitoring  vehicle  transportation  green  Delicious 
september 2010 by asteroza
MobileHackerz再起動日記: ドコモの定額データプランで海外端末が使えるようになった!
Something about DoCoMo flat rate plan SIM cards not being hard coded to host hardware, so essentially no carrier lock?
DoCoMo  SIM  card  lock  flat  rate  data  plan  mobile  japan  Delicious 
june 2010 by asteroza
« earlier      
per page:    204080120160

related tags

3D  64bit  Abloy  acceleration  access  accessories  acoustic  action  active  ad  adaptive  advertisement  aftermarket  alarm  Alcatel  algorithm  alterantive  alternative  ALV  analog  android  antenna  antiforensic  antiforensics  antitheft  app  apple  architecture  arm  armdand  armored  array  asteroid  atomic_ops  audio  authentication  autolock  automatic  automation  automotive  background  bag  ban  band  battery  beacon  Bell  bicycle  bike  binary  biometric  biometrics  biomteric  bistatic  BLE  block  blocker  blocking  blue  BlueLock  BlueProximity  bluetooth  bluewatchdog  bolt  box  bridge  brute  BtProx  BUGA  building  bump  bypass  C#  cable  cam  camping  capture  car  carabiner  card  carrier  CD  cell  cellphone  CertifiGate  chain  change  character  child  chip  circuit  citadel  Citizen  Clicker  cloud  code  coded  column  combination  combo  comibination  commercial  communications  compartment  compliance  concept  concurrency  configuration  configurator  connector  construction  contactless  container  contention  control  CoSoSys  counterforensic  cover  covert  cracking  credit  crowdfunding  cryptographic  CTL  cuff  cufflinks  custom  customization  cyberkey  cyberlock  cylinder  Dallas  data  database  DE-STAR  decor  decoration  defense  deflection  Delicious  design  desktop  development  device  devices  devil  DHS  directory  disable  discovery  DLP  DoCoMo  door  double  drive  drop  echo  echolocation  ECIT  economy  eject  eKey  electromechanical  electronic  electronics  electyronics  encryption  endpoint  engineering  entry  environment  ephemeral  ESA  escape  ETL  Evros  extension  fabbing  face  factor  FAIL  faraday  fashion  fastener  fiber  file  filetype:png  fingerprint  firewire  flash  flat  floor  food  force  forensic  forensics  form  frame  Fraunhofer  free  freeware  FridgeLocker  fringerprint  fujitsu  furniture  gadget  garden  gate  gear  geocache  gift  google  government  GPO  GPS  green  group  GSM  GUID  guide  hack  hacking  handcuff  handle  hardhack  hardware  HID  hide  high  holder  home  house  howto  HSDPA  HSPA  HTC  humor  hybrid  ibutton  iClassMifare  ID  identity  immutable  information  infrastructure  input  install  intelligent  interface  interior  internet-of-things  iOS  IoT  iPhone  isolation  IT  jam  japan  key  Key2Share  keyboard  keyhole  keyless  keyway  kitchen  knob  knock  knocking  KSI  Labs  laptop  laser  law  licensing  lifehacks  link  linux  locale  location  locator  lock  lockdown  locked  locker  LockHunter  locking  Lockitron  lockout  lockpicking  locks  lockscreen  locksmith  logging  logic  logical  LOK-IT  loop  loss  low  Lucent  luggage  lunlock  mac  magnetic  manager  marine  master  masterkey  masterlock  materials  mechanical  media:image  memo  memory  MEMS  message  method  methodology  microphone  microsoft  military  MIT  mitigation  mobile  mode  molecular  monitor  monitoring  mount  multithreading  MVNO  network  NetWrix  NFC  norbornadiene  nuclear  number  Numlock  nut  obfuscation  object  ocean  online  open  opener  opensource  OpenWays  optimization  orbit  OSX  padlock  pair  pairing  PAL  palm  palmsecure  parental  parking  passcode  patch  PC  PCMCIA  pentesting  permissive  personel  phase  phased  PhoenixFreeze  phone  physical  pick  picking  pin  plan  planar  planetary  planter  Plantlock  platform  play  plugin  PoC  policy  port  portable  Postgres  PostgreSQL  power  practice  presence  prevention  printing  privacy  programming  progressive  Project  proof-of-concept  protection  protector  provider  proxcard  proximity  pthread  pthreads  push  quadricyclane  rack  ranging  rare  rate  read  reader  readerwriterlock  recovery  reference  refridgerator  region  regional  registry  regulation  remote  removal  report  research  retailer  retrodirective  retrofit  reverse  rewrite  RF  RFID  ring  rocking  rotary  rotating  rotation  RTG  SaaS  safety  Salling  sample  saw  scanner  science  screen  screensaver  sec4  security  self  Semiconductor  sensing  sensor  serial  service  sesnor  SG  ShareKey  sharing  shear  shell  shield  shielded  shim  shop  signal  SIM  SIMlock  slotted  small  smart  smartlock  smartphone  SoBi  social  software  solid  sonar  SonarLoc  sony  sound  source  space  speaker  speed  spiral  spring  spy  ssyadmin  standoff  state  steered  steering  stem  STM  storage  store  Stronglink  structure  student  stunt  swing  sysadmin  system  tag  tap  TapLock  tapping  technology  tektrak  temporary  tether  thanko  theft  thread  threaded  threading  tilting  time  timeout  timer  tips  titanium  token  tools  tracking  training  transactional  transportation  travel  tricks  trigger  trunk  trusted  TSA  tumbler  tutorial  ultrasound  UMTS  underpass  unique  unlock  unlocked  unlocker  unusual  update  USB  user  utilities  UUI  vandalism  vaporization  vehicle  vein  Ventures  VGA  vibration  Videx  virtualization  VirtualPC  visualization  VLock  voice  Voicelok  VPN  VT  wallpaper  watchdog  weapon  weapons  wifi  windows  wipe  wireless  wrist  wristband  write  writer  x64  XP  ziptie 

Copy this bookmark: