Standard Gain Horn Antenna

Sort by:
  • Select

Standard gain horn antennas are used as calibration devices that measure the gain of other antennas.

These antennas are made up of a combination of a Waveguide to Coax Adapter and Standard Gain Horn with Waveguide Input. It is a kind of simple combination but with great care and attention to create an antenna with accurate and suitable specs.

FT-RF Standard gain horn antenna product series includes waveguide sizes WR28, WR42, WR51, WR62, WR75, WR90, WR112, WR137, WR159, WR187, WR229, WR284 and WR340, WR430, WR510, WR650, WR770, WR975, WR1150, WR1500, WR1800, WR2100, WR2300, with broadband waveguide horn antennas have frequency capabilities ranging from 320Mhz to 40 GHz depending on type and style. with the gain of 10dBi, 15dBi, 20dBi and 25dBi.

Standard Gain Horn Antenna Applications:

  • - Antenna measurement
  • - Radar Detection System
  • - Wireless Communication
  • - Spectrum Monitoring
  • - Electromagnetic interference Testing (EMI test)

用戶注意!華碩9千台路由器被駭客入侵 受害機型、自救法一次看

中時新聞網
邱怡萱
  • Facebook
  • Messenger
  • Line
  • Weibo
  • Twitter
  • Telegram
  • 複製連結
華碩路由器遭駭客入侵。(示意圖:shutterstock/達志)
  • Facebook
  • Messenger
  • Line
  • Weibo
  • Twitter
  • Telegram
  • 複製連結
字級設定:小中大特

家中有華碩 (ASUS )路由器的民眾注意!資安研究機構GreyNoise報告指出,全球超過9000台華碩路由器成駭客目標,其利用「CVE-2023-39780」漏洞成功入侵。本次受到影響的機型包括RT-AC3200、RT-AC3100和RT-AX55,華碩目前已經發布韌體來修復安全漏洞。

GreyNoise稱,這波駭客攻擊是利用「CVE-2023-39780」的漏洞,專業駭客集團結合暴力破解密碼和繞過登入驗證,入侵華碩多款路由器並植入後門,再添加自己的SSH金鑰,能長期遠端操控裝置。

GreyNoise統計,全球已有超過9千台華碩路由器遭到入侵,數量可能還在增加中。而且受害用戶難以察覺異常,因為駭客不會安裝明顯的惡意軟體,也關閉設備記錄功能。



本文出自: https://www.chinatimes.com/realtimenews/20250602002140-260412
文章標籤
全站熱搜
創作者介紹
創作者 uvitfieldinmm 的頭像
uvitfieldinmm

Horn antenna

uvitfieldinmm 發表在 痞客邦 留言(0) 人氣(0)