Загрузка страницы

RUS overview of the differences AM and RF eas systems and their vulnerabilities

This video is not motivating to commit illegal actions, in this video I demonstrate the distinctive unique features of the two main types of anti-theft systems.

Considering the vulnerabilities of these systems, we show how we are engaged in research activities for our own development and just entertainment. We do not just collect information on the Internet, we own anti-theft systems of all manufacturers, we have higher education, we have a difficult life due to the wrong choice of higher education in our country and that is why we once decided to develop our knowledge of anti-theft systems.

EM technology (electromagnetic gate) is not considered due to the low prevalence, EM technology is currently not produced and is not developed by any company in the world.

In the description of this video, I will not publish links, contacts and other information due to which this unique video can be blocked. Use search services and you will easily find me.

P.S.: we apologize for the camera's autofocus failure and not the perfect mood.. comprehensive preparation for video shooting has spent a lot of energy, I hope for your understanding.

timecode:
02:35 - 1. Theoretical minimum.
10:00 - 2. Labels. The biggest difference.
15:52 - 3. Plastic (Hard) tags:
15:52 - AM tags.
22:22 - RF tags.
28:19 - universal AM+RF tags.
35:42 - 4. EAS systems (gates).
44:30 - 5. identified vulnerabilities.
55:20 - 6. high-tech exploitation of vulnerabilities.
1:00:05 - 7. lifehacks and fun.

Видео RUS overview of the differences AM and RF eas systems and their vulnerabilities канала vulnerabilities in EAS systems from bombastershop
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
28 июля 2019 г. 23:57:12
01:05:38
Яндекс.Метрика