Saturday, October 31, 2009

Spoofing IP based CCTV systems

Spoofing IP based CCTV systems with VideoJak
each month we are starting to see major problems that exist along side the ip systems. end users (the customers) just finding out they have very expensive yearly licence fees to run there ip systems and another problem that has just been released is the following artical from america.

Spoofing IP based CCTV systems
The case against the security of IP based CCTV systems was recently highlighted with the release of a new web tool shown at the hacker conference in Las Vegas. A security assessment tool, Videojak has the ability to both intercept Internet video feeds and eject false 'looped' images.

Similar in concept to Hollywood's "Mission Impossible" where the attacker can hack, monitor and record a CCTV feed (when nothing is happening), then play this back in a loop to hide the actual live feed (presumably while Tom Cruise is lowered down on a black rope).
This tool also provides the ability to intercept video conferencing.

To be on the safe side, if you are using any kind of conferencing facility you should assume that the information can be intercepted. With the popularity of IP streamed video systems we are not sure if our network is compromised or not use analog in the top security place.

join :

Tuesday, October 27, 2009

'On campus security' for SMB/SME (small/mid-sized business firm)

Larger businesses have more resources to guard their premises, Making Small businesses more vulnerable to intrusion and robbery. Therefore, Small businesses should plan and execute there security measures properly. The Security concerns for small businesses would depend on kind of business they are engaged in. A software development firm may want to guard their important data even from its employees. A SM Company might want to guard their valuable commodities like jewelery from theft. Some would want to monitor their godowns and storage. Production and manufacturing unit may want to screen Personals for a possible theft of raw materials etc.
The advancement in the technology have evolved over the years by understanding the needs and threats for organizations. A business owner (out of ignorance or cutting expenses) should not compromise on Security of their organizations. In a broader picture, a properly implemented security system will reduce cost of man guarding and prevent losses by raw material theft, robberies, secret leak etc.
These are the prime areas of implementing a security system-
1) Premises- You may need fencing, site surveillance CCTV, patrolling guards, etc.
2) Entrances and exits- You may need to monitoring exits or entrances with CCTV. Install metal detectors or door alarms.
3) Authorized Entry- An access control system for employees according to hierarchy levels. Issuing of access control cards will also help in attendance at main entrances.
4) screening- at production units, where the employees handle raw material.
5) Response method- installing security or fire alarms, emergency security dialer which can automatically call and inform 10 telephones numbers when the alarm is triggered.

Saturday, October 10, 2009

DO EMI & Video Signals Mix? No they do not.

DO EMI & Video Signals Mix? No they do not.

EMI (Electromagnetic Interference) is a disturbance in an electrical circuit.  The source of EMI can be any object that contains rapidly changing electrical currents.  Almost anything that uses electricity to operate is a source of EMI.  The problem with EMI, concerning surveillance, is that it distorts video signal.  When installing a CCTV system, it’s important to run cables away from sources of EMI.  Otherwise, the video feed on the DVR will be extremely fuzzy.  This should definitely be taken into consideration when installing a surveillance system in an industrial environment.  One common source of EMI is fluorescent lighting.  Fluorescent lights are common in industrial areas.   Running cable close to these lights should be avoided at all costs.  If cabling absolutely has to be run close to fluorescent lights, then it should be ran in some type of conduit that is properly insulated and will create a barrier between the video cable and the light.

Saturday, October 3, 2009

Your cell phone to home wi-fi network Connection

Connect your cell phone to home WIFI network ( BSNL Broadband) & Watch your Office

Requirements :
* Wifi enabled Handset
* Active Internet Connection with WIFI router modem

Configure your router modem to use the PPPPoE connection type
Restore your router to factory settings (Preferred & recommended). See your router manual. Type in in your url address bar and hit enter.  You will be prompted for a username and password which generally is admin and admin respectively unless you have not configured it manually. Also, the default username password could be different if you have a different model. Refer your router manual. is an IP address in the private IP address range – Many network devices, such as LinkSys routers, use as their default IP address.

Now follow these steps :

Configure your Wireless Security :

TCP/IP Settings:

Now, Configure your phone:  ( I  AM USING NOKIA 5800 XM )

Here we are !  Now Browse wireless @ great speed without 3G hassle ( at least when you are in WIFI hotspots ! )