Commit b964675d authored by Frater's avatar Frater
Browse files


parent 8f017242
......@@ -8,8 +8,12 @@ I wasn't able to find many information for this specific modules around the web.
So I've decided to _tap_ and record the communication between the Checkpoint and the module for further decoding.
![Tapping 4400](img/tapping_1.jpg)
Here is my journey trought this reverse engineering.
![Close view of tapping](img/tapping_2.jpg)
Open communication Port with 115200 bps, 8N1 settings and write [Commands](CommandSet.MD).
you may want to read return the keys.
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment