Articles
January1984
February1984
March1984
April1984
May1984
June1984
July1984
August1984
September1984
October1984
November1984
December1984
January1985
February1985
March1985
April1985
May1985
June1985
July1985
August1985
September1985
October1985
November1985
December1985
January1986
February1986
March1986
April1986
May1986
June1986
July1986
August1986
September1986
October1986
November1986
December1986
January1987
February1987
March1987
April1987
May1987
June1987
July1987
August1987
September1987
October1987
November1987
December1987
Spring1988
Summer1988
Autumn1988
Winter1988
Spring1989
Summer1989
Autumn1989
Winter1989
Spring1990
Summer1990
Autumn1990
Winter1990
Spring1991
Summer1991
Autumn1991
Winter1991
Spring1992
Summer1992
Autumn1992
Winter1992
Spring1993
Summer1993
Autumn1993
Winter1993
Spring1994
Summer1994
Autumn1994
Winter1994
Spring1995
Summer1995
Autumn1995
Winter1995
Spring1996
Summer1996
Autumn1996
Winter1996
Spring1997
Summer1997
Autumn1997
Winter1997
Spring1998
Summer1998
Autumn1998
Winter1998
Spring1999
Summer1999
Autumn1999
Winter1999
Spring2000
Summer2000
Autumn2000
Winter2000
Spring2001
Summer2001
Autumn2001
Winter2001
Spring2002
Summer2002
Autumn2002
Winter2002
Spring2003
Summer2003
Autumn2003
Winter2003
Spring2004
Summer2004
Autumn2004
Winter2004
Spring2005
Summer2005
Autumn2005
Winter2005
Spring2006
Summer2006
Autumn2006
Winter2006
Spring2007
Summer2007
Autumn2007
Winter2007
Spring2008
Summer2008
Autumn2008
Winter2008
Spring2009
Summer2009
Autumn2009
Winter2009
Spring2010
Summer2010
Autumn2010
Winter2010
Spring2011
Summer2011
Autumn2011
Winter2011
Spring2012
Summer2012
Autumn2012
Winter2012
Spring2013
Summer2013
Autumn2013
Winter2013
Spring2014
Summer2014
Autumn2014
Winter2014
Spring2015
Summer2015
Autumn2015
Winter2015
Spring2016
Summer2016
Autumn2016
Winter2016
Spring2017
Summer2017
Autumn2017
Winter2017
Spring2018
Summer2018
Autumn2018
Avoiding Internet Filtering
Backspoofing 101
Can I Read Your Email?
Challenges
Covert Communications Channels
Dorking the DoorKing
Exploiting LiveJournal.com with Clickless SWF XSS
GoDaddy.com Insecurity
HACKER PERSPECTIVE: Bill Squire
Hacking a Major Technical School's Website
Hacking My Ambulance
Hacking Your Own Front Door
How to Cripple the FBI
Hubots: New Ways of Attacking Old Systems
Network Ninjitsu: Bypassing Firewalls and Web Filters
RFID: Radio Freak-me-out Identification
Ripping MMS Streams
Security Holes at Time Warner Cable
Snippets
SSL MITM Attacks on Online Poker Software
Stalking the Signals
TELECOM INFORMER
Understanding Web Application Security
prev
next
Volume 24
Number 1
68 pages
Quote: "The production of too many useful things results in too many useless people." - Karl Marx
Author
Aritcle
Synopsis
Discusses what RFID is potentially capable of and where the technology is heading.
Notes
Code
None
Page
9
Pages
1 and a half
In Best of 2600 book?
Yes, page 749, Section 3 (2000 and Beyond: A Changing Landscape), Chapter 18 (Toys of the 21st Century)
Links
Addendum
Keywords
RFID
Radio-Frequency IDentification - an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. (more..)