<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>EEVblog #977 - Keysight 1000X Hacking - Part 1</title>
        <link>https://stream.echo6.co/videos/watch/e2510b80-548c-411c-a5d7-a2e70bd22811</link>
        <description>How to find and inspect hidden serial UART terminal ports inside equipment. Dave finds the uBoot Windows CE UART part in the new Keysight 1000 X-Series oscilloscope and uses the info to find some of the product mode configuration pins. A hardware hack shows that changing product configuration modes in hardware is possible. Forum: http://www.eevblog.com/forum/blog/eevblog-978-keysight-1000x-hacking/ EEVblog Main Web Site: http://www.eevblog.com The 2nd EEVblog Channel: http://www.youtube.com/EEVblog2 Support the EEVblog through Patreon! http://www.patreon.com/eevblog EEVblog Amazon Store (Dave gets a cut): http://astore.amazon.com/eevblogstore-20 T-Shirts: http://teespring.com/stores/eevblog 💗 Likecoin – Coins for Likes: https://likecoin.pro/@eevblog/dil9/hcq3</description>
        <lastBuildDate>Sat, 09 May 2026 05:59:22 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>EEVblog #977 - Keysight 1000X Hacking - Part 1</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/e2510b80-548c-411c-a5d7-a2e70bd22811</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=e2510b80-548c-411c-a5d7-a2e70bd22811" rel="self" type="application/rss+xml"/>
    </channel>
</rss>