Wireless security, partnerships, and DACs

The Chicago Tribune recently reported about a team of computer security consultants that investigated wireless network security. They spent several hours in the Chicago area with two laptops and inexpensive wireless hardware looking for points where radio signals would permit access to computer networks.

06/15/2002


The Chicago Tribune recently reported about a team of computer security consultants that investigated wireless network security. They spent several hours in the Chicago area with two laptops and inexpensive wireless hardware looking for points where radio signals would permit access to computer networks.

The team discovered 575 separate wireless computer networks that could be accessed from the street, according to the Chicago Tribune report. Nearly 1/3 of the 575 networks used security measures. The remaining 2/3 did not use even the most basic forms of encryption. Further, according to the report, 1/3 of the detected systems retained the basic default settings on their equipment, making it easy for a hacker to access them.

Hackers could gain access to sensitive engineering, manufacturing, or financial data. Industrial spies could learn about the engineering and marketing plans of their competitors. Information could be lifted from corporate databases without anyone knowing.

The consultants used two off-the-shelf laptop computers in their investigation, along with wireless cards and antennas built by Lucent Technologies that are available for a few hundred dollars. According to the report, they used software, called Net Stumbler, that can be downloaded for free from the internet.

According to the report, a company can acquire a fair amount of network protection by using an encryption scheme known as wired equivalent privacy (WEP). Customizing the system's name and settings will further improve security. Virtually all wireless network systems are WEP-enabled, according to the consultants quoted in the article. Users should activate the built-in security to significantly reduce their vulnerability. Small investments of time and money can activate wireless network protections that would be comparable to installing a burglar system in your home.

The Chicago Tribune also cites a recent joint FBI/Computer Security Institute survey, which indicates that computer security breaches are still too common and that many companies remain unprepared to deal with them. Of the 503 respondents to this survey, 40% reported an outside hacker gaining access to internal systems. Also, 21% of these respondents could not even say if their web sites were ever compromised.

Bipolar DAC with serial interface introduced

Analog Devices has introduced the industry's first 14-bit,interface compatible with the SPI, QSPI, Microwire, and DSP interface standards. Applications are suited for digital gain and offset control, process control, automatic test equipment, and general-purpose data acquisition and instrumentation.

Other features include power down, data read back, and daisy chaining of parts over a single interface. Operating current is less than 2 mA and less than 50

Free maintenance and reliability training courses offered online

E-ConferenceZone.com has announced R/CM Online Reliability & Condition Monitoring Training. The training conference is free for attendees and may be accessed with any current web browser.

Current presentations include topics such as asset maintenance strategies, PM optimization, introduction to total productive maintenance (TPM), introduction to vibration analysis, introduction to ultrasonic detection, power quality, motor system management, electrical reliability, effective CMMS, world-class compressed air, steam system basics, root-cause analysis, and precision alignment.

Online training sessions require a Windows or Real Media player to hear narration. They are available on the internet 24 hr per day and can be accessed by anyone. A quick registration process is required. To access, go to rcm-1.com .



Device monitoring and control solution partnership formed

Entivity, Inc. and Comtrol Corp. recently announced a strategic partnership that integrates Comtrol's Ethernet-connected device servers and multiport controllers as the preferred connectivity hardware for all Entivity's control software. The alliance enables users to replace PLC-based systems with PC-based control and monitoring capabilities. The combined solution promises reduced downtime, increased visibility of plant floor devices, and reduced support and maintenance costs associated with proprietary control systems.

The cost of maintenance, cabling, and the actual hardware is lower than PLC architecture, according to Comtrol. The company sees the marketplace moving away from proprietary PLC-based controls. It says that users want to take advantage of "the stability and economies of scale that Ethernet and solid-state embedded servers can provide."

Minneapolis-based Comtrol Corp. is a provider of device connectivity, data communications, and enterprises device/system integration software technologies. Entivity, Inc., based in Ann Arbor, MI, was formed in 2001 as a result of the merger of two automation companies — Think & Do and Steepleshase.

Firms join to develop OPC products

Digi International and Kepware Technologies recently announced a partnership to develop an embedded OPC (OLE for process control) server and an embedded OPC data exchange (DX) device.

The companies will collaborate to create the OPC products, which will offer an extension of the use of PCs and the Windows NT platform by embedding an OPC server in an industrial grade device server box.

The DX server is said to provide interoperable data exchange and server-to-server communications across Ethernet networks.

Digi International is based in Minneapolis and is a provider of wired and wireless hardware and software connectivity solutions. Kepware is based in Yarmouth, ME and is a provider of OPC software and industrial communication products.



No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
Each year, a panel of Control Engineering editors and industry expert judges select the System Integrator of the Year Award winners.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Learn how to create value with re-use; gain productivity with lean automation and connectivity, and optimize panel design and construction.
Go deep: Automation tackles offshore oil challenges; Ethernet advice; Wireless robotics; Product exclusives; Digital edition exclusives
Lost in the gray scale? How to get effective HMIs; Best practices: Integrate old and new wireless systems; Smart software, networks; Service provider certifications
Fixing PID: Part 2: Tweaking controller strategy; Machine safety networks; Salary survey and career advice; Smart I/O architecture; Product exclusives
The Ask Control Engineering blog covers all aspects of automation, including motors, drives, sensors, motion control, machine control, and embedded systems.
Look at the basics of industrial wireless technologies, wireless concepts, wireless standards, and wireless best practices with Daniel E. Capano of Diversified Technical Services Inc.
Join this ongoing discussion of machine guarding topics, including solutions assessments, regulatory compliance, gap analysis...
This is a blog from the trenches – written by engineers who are implementing and upgrading control systems every day across every industry.
IMS Research, recently acquired by IHS Inc., is a leading independent supplier of market research and consultancy to the global electronics industry.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Case Study Database

Case Study Database

Get more exposure for your case study by uploading it to the Control Engineering case study database, where end-users can identify relevant solutions and explore what the experts are doing to effectively implement a variety of technology and productivity related projects.

These case studies provide examples of how knowledgeable solution providers have used technology, processes and people to create effective and successful implementations in real-world situations. Case studies can be completed by filling out a simple online form where you can outline the project title, abstract, and full story in 1500 words or less; upload photos, videos and a logo.

Click here to visit the Case Study Database and upload your case study.