Terence Eden. He has a beard and is smiling.

Terence Eden’s Blog

Theme Switcher:

My Underkill Home Network

· 6 comments · 400 words · Viewed ~481 times


A complex graph with dozens of devices connected by a tangle of coloured lines.

There's an absolutely delightfully bonkers post doing the rounds called "My Overkill Home Network" - which is a look into what happens when a computer geek goes feral and stuffs as many Internet connected thingamajigs in a living space. We're talking professional grade, rack mounted, doubly redundant, over-specced, equipment. Overkill is underselling it. I wondered how my home network looked in…

Review: eufyCam 2C Wireless Home Security Camera System

· 3 comments · 750 words · Viewed ~412 times


Flyer explaining how Eufy is different.

I hate the Internet of Things. It's a load of overpriced junk, which abuses your privacy and demands a monthly fee in return. That's why I was pleasantly surprised to see this fall out of the eufyCam 2C box. There's no monthly fee. The recordings stay in your home. The batteries last for ages. I can get on board with this! The package costs around £220 (discount of £40 if you use my code) and …

Gadget Review - Nooie 360 Security Camera

· 550 words · Viewed ~453 times


Nooie camera sat on a table.

The good folk at Nooie have sent me their 360 WiFi camera to review. Cost is usually £50 - but check the bottom of this post for a discount code. The design is gorgeous - and award winning. It's a sleek unit and, surprisingly, feels nice in the hand. It can store videos on an SD card (not included) or via the cloud. The app - which is pretty nice - also lets you view the camera when you're away …

Hacking Around With Network Cameras

· 285 comments · 1,300 words · Viewed ~121,446 times


I was recently given 3 rather locked-down network cameras. Each camera was pre-programmed to communicate with a specific website, and only attach to a predefined wireless access point. Naturally, there was no supplied username or password. I thought about how I might get access. Using a man-in-the-middle attack to sniff the password, or trying to dump the firmware and examine that. Sadly,…