Monday, October 29, 2012

IPv6 Security - Why You Should Care About It

IPv6 security solutions help you proactively identify, assess, and fix IPv6 security threats. Even organizations that still use IPv4 can be significantly and unknowingly impacted by IPv6 security, as many devices are enabled by default for IPv6. If not properly tested, these devices can actually represent a significant risk and an attack path for hackers. IPv6 security solutions have been specifically designed to help organizations identify, manage and fix IPv6 security threats.

Some interesting facts. There is actually more people living on the entire planet, than there are currently IPv4 addresses. What is an IPv4 address? The analogy I like to use is, think of your phone book, and we've run out of phone numbers. IPv6 is basically a new area code or a new phone number that we are starting to hand out. An IPv6 is the parallel world in IP addresses, in numbers that you need to run websites. Most people actually don't care about IPv6. It's interesting that they don't, because quite frankly, they should. Let me tell you why.
There is some early adopters in the industry, such as Telco companies, higher education, and federal agencies. The reason why these are early adopters is because, in the case of Telcos, they really are the backbone of our next generation Internet, media, and telecommunication exchange. Higher education is provisioning their students, and Federal agencies are actually mandated by law, in some industries and some sectors of Federal starting deploying IPv6. Many other industries haven't yet. They don't feel like it applies to them. They don't think IPv6 is relevant for them. What's interesting actually is that they probably should, because even if they are not running IPv6 networks, there are many, many devices on our IPv4 environments and networks that are, by default, configured to run both on IPv4 and IPv6.

They ship from the factories with both enabled. If you don't know that, you might not even know that you have these devices on your network. Why is that important? Because, that could open up a potential door for an attacker actually to take advantage of this information, to come in through IPv6 into our environments, and do some damage and breach your environment.

What's challenging about IPv6 security overall? Fundamentally, there are three main things. As we just discussed, they are very difficult to detect. Very often, we don't even look for them. If you don't look for them, you are not going to find them. Secondly, it's very difficult to actually run IPv4 and IPv6 in parallel. This is quite complex. It requires a lot of technical skills. Many organizations just haven't started looking at that yet, so it's very complex. Thirdly, because there's a lot of uncertainty and misinformation around IPv6, it's actually an ideal threat factor for attackers to come in and leverage this misinformation, to take advantage and breach your environments. Those are the three challenges with security.


Now, what recommendations can we provide to you? Number one, get educated. Get smart about IPv6. There are a number of white papers out there. There's a number of webcasts out there that can help you to better understand what to do about IPv6, and how to handle that from a security perspective, as well as overall how you can deploy it in your networks. Secondly, find out if you have IPv6 environments, even if you are not running an IPv6 environment. You can use solutions such as vulnerability scanners or discover tools that will help you to understand if you have IPv6 enabled devices on your network. If the answer is, "Yes, I have them," make sure that you turn off these devices, because that will help you prevent potential attacks from happening. The analogy I would use, it's like you have your house. You have your front door which is locked, but all of a sudden, you have a back door that you are not even looking at, that has an open door. Make sure you lock that back door as well, to protect your environment.

Monday, October 22, 2012

Video Smoke Detection Technology



Video Smoke Detection (VSD) or Video Image Detection (VID) systems have been developed to overcome many of the problems associated with smoke detection. It provides solutions for previously unsolvable fire detection scenarios, working externally as well as internally and represents a true technological breakthrough in fire detection.
VID / VSD CAMERA

 Video Image Smoke Detection (VISD) is based on the computer analysis of video images provided by integrate CCTV cameras into advanced flame and smoke detection systems. VSD automatically identifies the particular motion patterns of smoke and alerts the system operator to its presence in the shortest time possible. This enables a fast response to a potential fire, saving valuable time even in voluminous areas or where a high airflow may be present.

Smoke VID systems require a minimum amount of light for effective detection performance and most will not work in the dark, on that case used IR sensitive cameras. Flame VID systems can operate effectively in dark or lit spaces and some systems will have enhanced sensitivity to flaming fires in the dark.


In applications ranging from turbine halls to historic buildings, road tunnels, rail depots, warehouses, shopping malls, aircraft hangars and many others. Camera-based fire detection system has become established as the leading edge technology in the field of fire protection.

Fire safety professionals constantly seek the benefits of early warning of potential fires. In a perfect world it would be possible to place hundreds of smoke detecting sensors above and around any items or areas at risk. This would certainly enable a fast response to a potential fire, saving valuable time even in voluminous areas or where a high airflow may be present. But of course such a dream is not possible from a practical or financial point of view.

Video smoke detection technology makes this dream a reality.    

How it works -  Video Smoke and Flame Detection


Video smoke (VISD) and flame detection (VIFD) is performed by a software algorithm running on Visual Signal Processors (ViSPs) that implement parallel processing engines in hardware. Video images are analysed in real time by applying digital image processing techniques that allows smoke and flames to be detected with a high degree of confidence. The video image is continually monitored for changes and false alarms are eliminated by compensating for camera noise and acquiring knowledge of the camera view over time.
an illustration of how the Video Smoke Detection process works





Multiple zones can be defined for a camera view in which smoke and flames are to be detected. Each zone has a set of parameters that provide complete control over the detection algorithm. These parameters are configured individually for each zone in order to cater for a wide variety of application scenarios. It is also possible to combine information from multiple cameras to enhance the detection process.



Stemming from many years of research and development several complex statistical and geometrical measurements are made on the video image data from each zone as dictated by the control parameters. This is made possible by the parallel digital signal processing capabilities of the hardware. The scale of parameter settings is such that it is possible to detect smoke ranging from slow emerging faint smoke through to dense smoke plumes that are produced in a short period of time.


Once the measurements have been made from the video image data a set of rules can be applied to determine if they characterise smoke or flames. The rules can also be tuned to meet the specific application requirements to complete a robust and successful detection algorithm.


Video Smoke Detection Principles

VSD/VID (VISD) is based on sophisticated computer analysis of the video image seen by the CCTV camera (sensor). Using advanced image-processing technology and extensive detection algorithms (and known false alarm phenomena); the VID can automatically identify the distinctive characteristics of smoke patterns. The fire detection industry has an abundance of known smoke signatures and these are built into the system to give an accurate decision on whether smoke is present.

The VSD system uses standard CCTV equipment linked to a self contained processing system which is capable of recognising small amounts of smoke within the video image and alerting the system operator both at the processor and by a variety of remote outputs.

The VSD system employs highly complex algorithms to process video information from CCTV cameras simultaneously. The video hardware is designed to allow simultaneous real time digitising of all images, which means that the system does not multiplex images and, therefore, no information is lost or delayed. All alarm condition images are logged, time & date stamped, and stored within the system’s memory.

The VSD system detects smoke rapidly by looking for small areas of change within the image at the digitisation stage and only passing these pixel changes to the main processor for further filtering.

The video information is passed through a series of filters, which seek particular characteristics that can be associated with smoke behavior. Further analysis is then carried out on the relationships between the filtered characteristics to determine whether all the conditions have been met for the system to confidently predict the presence of smoke.

The system installer has the ability to vary the amount of smoke signal, and the length of time that the smoke exists before an alarm condition is raised to cater for situations where there may be background smoke present. The installer may also divide the video image into up to 16 zones and programmed the system to alarm only if smoke is present in multiple zones. Each zone can also be separately configured to generate an alarm at different levels of smoke activity.

The performance of a Smoke or Flame VID system must take into account three general items:
1. Fire sources
2. Environment
3. System variables


What it Overcomes

Standard smoke detection systems, be they point detection systems, infra-red beam detectors or aspirating systems all require the smoke generated from any combustion to reach them before they can recognise the particulates and activate an alarm. Such systems can function very effectively in internal thermally stable environments with low to moderate ceiling heights.

In large volumeous spaces such as enclosed sports arenas, exhibition halls, aircraft hangers and atriums, solar radiation, air conditioning systems and translucent glass all contribute to an increasing ambient temperature from floor to ceiling, known as a thermally stratified environment.

In a smouldering fire or low energy flaming fire scenario the raising combustion products cool as they rise through the air and move further away from the centre of combustion. In a temperature-stratified environment the ambient air temperature increases with height. As the combustion plume rises it cools, if this cooling reaches equilibrium with the temperature of the ambient air the smoke products will loose their buoyancy and move laterally to produce a roughly horizontal layer.  If the temperature slowly increases the hot air above the smoke will expand thus further reducing the height of the smoke stratification layer.

In environments with a high percentage change of air caused by either high velocity air-conditioning (HVAC) systems, or large open doors, smoke particles generated during low energy combustion can become quickly dispersed or diluted to the point where there are insufficient concentrations to activate an alarm in a standard smoke detection system.

These twin problems of stratification and dilution can seriously delay or even prevent a smoke detection system from entering an alarm state.

VSD systems over come both of these phenomena by looking below any stratification or dilution boundary at the incept point of any potential fire and identifying smoke generation at or very close to the source.

So, be separately configured to generate an alarm at different levels of smoke activity.

In general, VSD systems do not have fixed settings. They have many parameters that need to be adjusted to provide the optimum response to a specific fire risk. Therefore, it is very important that the manufacturer should be fully consulted in matters of product application and system design. The manufacturer’s installation, commissioning and service and maintenance instructions should also be followed.

Location and spacing

The location and spacing of detectors shall be based on the principle of operation and an engineering survey of the conditions anticipated in service. The manufacturer’s published instructions shall be consulted for recommended detector uses and locations. an engineering evaluation that includes the following:
(1) Structural features, size, and shape of the rooms and bays
(2) Occupancy and uses of the area
(3) Ceiling height
(4) Ceiling shape, surface, and obstructions
(5) Ventilation
(6) Ambient environment
(7) Burning characteristics of the combustible materials present
(8) Configuration of the contents in the area to be protected

Codes and Standards

The National Fire Alarm Code, NFPA 72-2007, recognizes the use of flame and smoke VID systems. (5.7.6 Video Image Smoke Detection; 5.8.5 Video Image Flame Detection) Per the Code, the installation of these systems requires a performance-based design. There are no prescriptive sitting requirements. Flame VID systems are classified as radiant energy sensing fire detectors and are treated similar to optical flame detectors. Due to the variability of VISD system capabilities and the differences in alarm algorithm technologies, NFPA 72 requires that the systems be inspected, tested, and maintained in accordance with the manufacturer’s published instructions.

Currently, there are no systems that are UL listed, and there is no UL standard that specifically addresses VID/VSD systems. Four systems have been FM approved. These include a system that detects only smoke, one that detects only flame and two that detect both. The systems have been approved to meet the requirements of FM Standard 3260, Radiant Energy- Sensing Fire Detectors for Automatic Fire Alarm Signaling, and UL 268, Smoke Detectors for Fire Alarm Signaling Systems.

The effect of all the changeable parameters in the VSD, such as camera lenses, software parameters adjustment and lighting conditions should be taken into consideration following the consultation principle given in BS5839 Part 1: 2002, clause 6.

BS 5839-1:2002 recognises the existence of VSD. Clause 21 j) recommends that:
"Video smoke detection systems should be capable of detecting smoke reliably in the absence of the normal lighting in the building and the absence of the mains power supply to any lighting provided specifically to aid the detection of smoke."

Environmental & Hazard Parameters

The foundational information collected for identifying typical/standard fire and smoke scenarios, likely false/nuisance scenarios, and a range of ambient conditions to which VISD systems may be subjected in the three target applications. This work included researching and reviewing fire incident data and conducting an industry workshop on VISD technology. On-site surveys and interviews with end-users were also conducted.

Installation of VSDs

Installation cables should be in accordance with the recommendations of BS 5839-1:2002.

Advantage of VISD Early fire detection

A VSD detecting fires in certain large open areas and areas of special high risk as:
1. VSD systems can be used for outdoor applications, such as train stations and off-shore oil platforms.
2. The ability of VSD to be programmed to provide different sensitivity (range) by lens selection, and to adapt to difficult application environments (false alarm sources) by tuning software operational parameters, makes it an ideal detection tool in special applications where an engineered solution is likely to give the best answer.
3. The ability to protect a large area, and/or areas with excessive ceiling heights, while still achieving fast detection. With VSD, smoke in the camera field of view can be detected whereas with other detector types, smoke has to migrate to, and be present in, the sensing area e.g. the sensing beam of a beam detector or the sensing chamber of a point smoke detector.
4. VSD, by providing accurate location of the incident, will benefit applications where targeted fire protection measures are required.
5. The ability to have live video immediately available upon detecting a pre-alarm or an alarm condition. This immediate situational awareness allows monitoring personnel to easily view the protected area to determine the extent of the fire and to more accurately identify the location.
6. Archiving of still and video images associated with alarm conditions also provides a means of assessing the cause of incidents and provides a basis for changes in the detection system if the event was a false/nuisance alarm.
7. The ability to sub-divide the image into different areas for separately identifying fire risks or programming out (masking) known sources of potential false alarms.
8. VSD, by providing visual verification of the event, will give operators information to facilitate a better and faster structured response of an incident and enable safer investigation by remote viewing.

Testing, servicing, maintenance and replacement

It is important to always follow the manufacturer’s recommendations for testing, servicing, maintenance and replacement requirements. It may be desirable that, in some installations where the effect of potential false alarm sources cannot be fully determined, a period of trial is undertaken before completing the commissioning of the system and handing it over to the client.

A method, appropriate to the risk, of testing the effectiveness of the VSD at both the commissioning stage and at subsequent service and maintenance visits should be agreed with the equipment manufacturers or system installer. Tests should be conducted and documented in accordance with this method.

VSD should NOT be used in the following situations

1. Where certain processes are likely to produce smoke-like images which may be misunderstood by the video analysis software, unless it has been demonstrated through trial and, if required, tuning of the equipment so that the effect of these false alarm sources have been adequately established and eradicated. Examples include processes generating large amounts of steam and/or other gas plumes (exhaust fumes from forklift trucks) and/or environmental pollutants (vapour, dust, sprays). In outdoor or semi-outdoor situations this may also include insect swarms.
2. Where a deterministic response to known fires is required and can be achieved by the use of EN 54 approved detectors, i.e. most standard commercial and industrial applications.
3. Where there is a danger that the ambient lighting level is either too low or too high to obtain a satisfactory response from the VSD at the time it is required to monitor the risk, unless specific provisions are available to alleviate this danger. For example infrared illumination of the scene with back-up power supply, polarized lens filters, or where very intense light sources can blind the camera.
4. Where there are significant obstructions in the camera line-of-sight of the main identified risk or where such obstructions are temporary and of an unpredictable nature.
5. Where a particular equipment configuration, including installation cables, would not assure the integrity of the alarm transmission path through the system so as to provide the desired warnings to the occupants of a building or the desired response from the emergency services.
6. Where likely environmental conditions present may have an adverse effect on the ability of the VSD to properly operate. For example this would include fog, mist, snow and rain.
7.  Where the use of cameras is not appropriate due to data protection issues.

Wednesday, October 10, 2012

Technical issues with Outdoor Wireless Security Cameras


Technology is man-made and anything that is man-made will have a certain problems with them.  With latest technology developing day by day, the improvements on them also take place on a daily basis. What may have seemed like a solution once might become a problem tomorrow.  Same is the case with outdoor low voltage wireless security cameras.  They are the latest in security and surveillance systems, and have the fastest growing market.

These cameras have many great features that make them superior to wired CCTV cameras, but they to have a few drawbacks that may not be suitable to your needs, and would make having the traditional CCTV a better option for you.

Signal Disturbances in Outdoor Wireless Security Cameras

Since wires are not involved, the signal is transmitted through airwaves. These airwaves can easily catch disturbance from many sources. The signal can be disturbed by cell phone activity, microwaves or any other wireless technology. The footage quality is also compromised when the disturbance occurs. Though, modern-day cameras have become advanced enough to significantly reduce these disturbances, and with the advent of internet, the footage can be transferred through Wi-Fi systems.

Vulnerability of the Footage

Clever thieves can also block wireless signals with help of high-tech devices. Not just block them, the signals can be hacked into, and the footage can be stolen.  Even if the footage is transferred through password protected internet systems, this risk always remains.

Power Connectivity

Wires are not required, but electricity is. The cameras need power to function, and for that a power outlet is required. Each camera will need its individual connection, and since they are placed outside, this might prove to be a headache.
If the cameras run on battery, the question of charging them also arises. And in case of power outage, the cameras will surely need battery backup as the burglars become most active during power cuts.

Maintenance

Outdoor wireless security cameras are built to be placed outside, and hence are rough and tough. But the technology is modern, and needs to be delicately handled. A constant watch has to be kept on the functioning and upgrades in software and tech will also be necessary.

Vulnerability of the Camera

These cameras are small and portable; hence, one cannot forget that they too can be the targets of thieves. Since there are no complicated cables that are holding them, all one needs to do is unscrew them out of their secure place and the camera is theirs to keep.

Other Factors

They may not seem likely, but these things can affect your wireless cameras. Unwanted expenses can occur with these cameras, since everything is latest technology, the cameras may not work with the screens or computers you have, and you may end up having to buy new screens.

Needs differ and the newest in technology does not necessarily mean the right one.  Simplicity can be the best option many times, and you should think long and hard before making such an important decision as this is a question of security.

Wednesday, September 26, 2012

Video Smoke Detection



Video Smoke Detection (VSD) systems have been developed to overcome many of the problems associated with smoke detection. It provides solutions for previously unsolvable fire detection scenarios, working externally as well as internally and represents a true technological breakthrough in fire detection.


Video Smoke Detection is based on the computer analysis of video images provided by standard modern CCTV cameras. VSD automatically identifies the particular motion patterns of smoke and alerts the system operator to its presence in the shortest time possible. This enables a fast response to a potential fire, saving valuable time even in voluminous areas or where a high airflow may be present. 


In applications ranging from turbine halls to historic buildings, road tunnels, rail depots, warehouses, shopping malls, aircraft hangars and many others, Camera-based fire detection system has become established as the leading edge technology in the field of fire protection 



Fire safety professionals constantly seek the benefits of early warning of potential fires. In a perfect world it would be possible to place hundreds of smoke detecting sensors above and around any items or areas at risk. This would certainly enable a fast response to a potential fire, saving valuable time even in voluminous areas or where a high airflow may be present. Of course such a dream is not possible from a practical or financial point of view.

Video smoke detection technology makes this dream a reality.




How does VSD work?
Video smoke and flame detection is performed by a software algorithm running on Visual Signal Processors (ViSPs) that implement parallel processing engines in hardware. Video images are analyzed in real time by applying digital image processing techniques that allows smoke and flames to be detected with a high degree of confidence. The video image is continually monitored for changes and false alarms are eliminated by compensating for camera noise and acquiring knowledge of the camera
view over time.

Multiple zones can be defined for a camera view in which smoke and flames are to be detected. Each zone has a set of parameters that provide complete control over the detection algorithm. These parameters are configured individually for each zone in order to cater for a wide variety of application scenarios. It is also possible to combine information from multiple cameras to enhance the detection process.

Stemming from many years of research and development several complex statistical and geometrical measurements are made on the video image data from each zone as dictated by the control parameters. This is made possible by the parallel digital signal processing capabilities of the hardware. The scale of parameter settings is such that it is possible to detect smoke ranging from slow emerging faint smoke through to dense smoke plumes that are produced in a short period of time.

Once the measurements have been made from the video image data, a set of rules can be applied to determine if they characterize smoke or flames. The rules can also be tuned to meet the specific application requirements to complete a robust and successful detection algorithm.



 Product
 FireVu is an advanced embedded Video Smoke Detection (VSD) server designed to operate over an IP network. For this, mathematical algorithms it is capable of determining the presence of smoke within each of its four available analog camera inputs (PAL or NTSC). Operators can be alerted either remotely over the system’s network or local to the unit via relay outputs.

Each camera image can have up to 16 fully independent, configurable zones, allowing the user complete flexibility on setting up the areas to be protected with their required sensitivity levels. System configuration is carried out via a series of web pages using a browser such as Internet Explorer, while system monitoring and reviewing is carried out by Observer client software.


All alarm events are recorded to disk with configurable pre and post event video, allowing the operator to witness (and download) the event, including who or what created it.
   
The system is a 19” rack-mountable unit, utilizing in-house manufactured Visual Signal Processors (ViSPs) to process the images.

Each unit possesses 16 configurable relay outputs and can accept up to 16 alarm inputs. Numerous servers can be joined to a network to create a multi-camera system for larger installations.
 





Benefits
 It’s fast.... it detects smoke at the source of the fire.
  1. It’s unaffected by high air movement.  It will sense smoke movement patterns just as quickly in high airflow as it does in no airflow environments.
  2. It can detect all types of smoke.  Conventional detectors respond more quickly to certain types (colors) of smoke than others – VSD responds to the movement patterns typical of any color smoke.
  3. It can use traditional security cameras that may already be existing at the facilities needing protection.
  4. It gives visual verification of the alarm allowing a more immediate response to fire event.
It can retain a visual record (archive) of fire events for future playback and investigation activities.



Application
Case Study – Power Generation:
Here is a good example of where video smoke detection might solve a problem.  Fire protection is difficult for Turbine Generators in the Power Generation industry. Typically these turbine generators are in large open areas with really high ceilings.  Stratification effects from high ceilings, dilution of the smoke in the large open area and unpredictability from the high airflow in the space.  Conventional smoke or heat detection will just take too long to operate.

Video Smoke Detection can solve the problem.  It will detect the smoke at the source of the fire (typically coming from within the generator somewhere) and doesn’t wait for smoke or heat to reach the detectors mounted all the way at the ceiling.

Sunday, September 23, 2012

FCC Part 15

The Federal Code Of Regulation (CFR) FCC Part 15 is a common testing standard for most electronic equipment. FCC Part 15 covers the regulations under which an intentional, unintentional, or incidental radiator that can be operated without an individual license. FCC Part 15 covers as well the technical specifications, administrative requirements and other conditions relating to the marketing of FCC Part 15 devices. Depending on the type of the equipment, verification, declaration of conformity, or certification is the process for FCC Part 15 compliance.
Verification is a procedure where the manufacturer makes measurements or takes the necessary steps to insure that the equipment complies with the appropriate technical standards. Submittal of a sample unit or representative data to the Commission demonstrating compliance is not required unless specifically requested the Commission. Verification attached to the equipment a label showing that compliance is met.
Declaration of Conformity is a procedure where the responsible party makes measurements or takes other necessary steps to ensure that the equipment complies with the appropriate technical standards. Submittal of a sample unit or representative data to the Commissions demonstrating compliance is not required unless specifically requested. The Declaration of Conformity attaches to the equipment a label showing that the sample has been tested and found acceptable by the responsible party.
Certification is an equipment authorization issued by the Commission, based on representations and test data submitted by eh applicant. Certification attaches to the units subsequently marketed by the grantee which are identical to the sample tested an FCC ID number to show compliance.
FCC Part 15 Subpart A contains specific information regarding testing and certification. Information like, scope of the rules and legal implications, definitions, prohibition against eavesdropping, labeling, and other sections.
Some more interesting descriptions used in the FCC Part 15 as listed in Subpart A.
Digital Device. “An unintentional radiator (device or system) that generates and uses timing signals or pulses at a rate in excess of 9,000 pulses (cycles) per second and uses digital techniques; inclusive of telephone equipment that uses digital techniques or any device or system that generates and uses radio frequency energy for the purpose of performing data processing functions such as electronics computations, operations, transformations, recording, filing, sorting, storage, retrieval, or transfer. A radio frequency device that is specifically subject to an emanation requirement in any other FCC Rule part or an intentional radiator subject to Subpart C of this part that contains a digital device is not subject to the standards for digital devices, provided the digital device is used only the enable operation of the radio frequency device and the digital device does not control additional functions or capabilities.”
Intentional radiator. “A device that intentionally generates and emits radio frequency energy by radiation or induction.”
Class A Digital Device. “A digital device that is marketed for use in a commercial, industrial or business environment, exclusive of a device which is marketed for use by the general public or is intended to be used in the home.”
Class B Digital Device. “A digital device that is marketed for use in a residential environment notwithstanding use in commercial, business and industrial environments. Examples of such devices included, but are not limited to, personal computers, calculators, and similar electronics devices that are marketed for use by the general public.
FCC Part 15 Subpart B is for unintentional radiators. The category of unintentional radiators includes a wide variety of devices that contain clocks or oscillators and logic circuitry but that do not deliberately generate radio frequencies emissions. Among the common unintentional radiators are personal computers, peripherals, receivers, radios, TV sets, and cable TV home terminals. FCC Part 15 Section 15.101 has a very informative table for unintentional radiators. Two levels of radiation and conducted emissions limits for unintentional radiators are specified in FCC Part 15 Subpart B. The two levels are Class A digital devices, the higher less strict limits, and Class B digital devices, the lower more strict limits. Manufacturers are encouraged to meet the Class B digital device limits.
FCC Part 15 Subpart C is for intentional radiators. The carious types of intentional radiators covered by Subpart C include cable-locating equipment, cordless telephones, remote control and alarm transmitters, field-disturbance sensors for opening doors, and spread-spectrum systems for wideband data transmission. Intentional radiators governed by FCC Part 15 Subpart C must either have a permanently attached antenna or provide a unique coupler to prevent the use of unauthorized antennas. The FCC Part 15 Subpart C rules for operation of radio transmitters for the most part are very detailed regarding fundamental field strength, power and/or power density, frequency accuracy, and permitted harmonic and spurious emissions.
FCC Part 15 Subpart D outlines the regulations for unlicensed personal communication service (UPCS) devices operating in the 1910 – 1930 MHz frequencies bands.
FCC Part 15 Subpart E sets out the regulations for unlicensed National Information Infrastructure (U-NII) devices operating in the 5.15 – 5.35 GHz, 5.47 – 5.725 GHz, and 5.725 – 5.825 GHz bands.
FCC Part 15 Subpart G sets out the regulations for Access Broadband over Power Line (Access BPL) devices operating in the 1.705-80 MHz band over medium or low voltage lines. This section outlines the geographical area within which Access BPS operations are not permitted in certain frequencies bands.

Wednesday, September 12, 2012

Biometric Scanning and Your Privacy



Look at the whorls on your index finger. Every fingerprint is almost entirely unique – that’s why they’ve been dusted for crime detection for more than a century. Technology is moving on. Biometric scanning is the process of checking a fingerprint, iris, or face pattern with a technological device. But what does the mass introduction of Biometrics mean for your privacy?

What is Biometric Scanning?

Biometric scanning is the process of ‘reading’ a physical feature such as fingerprint, iris, face, vein, or voice. When you present your fingerprint or iris, the biometric reader creates a digitized template which will be used to recognize you in the future. The template is stored, either in a central system, or on your card.

Where is Biometric Scanning Used?

Biometric scanning is already used in many workplaces, high-tech laptops, and on passports in some European countries. It is also being proposed for the new Identity Cards which could soon be compulsory in the UK.
Biometric scanners are currently used to register asylum seekers and monitor travellers passing through major airports. The UK and USA are in discussions about sharing their biometric information in the anti-terror campaign. In Europe, the sharing of information between police and immigration officials is being orchestrated. The Home Secretary recently remarked that the UK could not hope to improve its security systems by remaining inside a “bubble”, insisting that this sharing of personal biometric data is crucial to a safe future.

Is Biometric Scanning Foolproof?

Ever since a secondary school tested out a top-notch Biometrics system for dishing out school dinners, then declared it too slow, and worth another try in 12 months, biometric testing has been something of a laughing matter. Will it really be good enough for our national security?

The National Physical Laboratory carried out tests on behalf of the Home Office, which is looking for two methods (a primary and a back-up) to use on the new Identity Cards. The report indicated that minor factors such as a cut finger, poor light, bad positioning, watery eyes or contact lenses influence the success of scanning. 98% of fingerprint scans resulted in the successful acquisition of an image and 100% of facial scans produced a usable image. The report also showed that, once an image was produced, the number of false matches was quite high.

What Are The Risks To Your Privacy From Biometric Scanning?

In terms of privacy, the main concern with biometric scanning is the storage and handling of any data acquired by biometric systems.
Storing Your Biometric Data
The UK government does not have a reputation for handling information securely. It’s already tentatively proposed sharing biometric data from the National Identity Register with banks and supermarkets, and is in talks to give out more information to other countries, resulting in a lack of privacy. An ex-MI6 operative said that the National Identity Register is a “present” for terrorists – a fantastic target for misuse or destruction.
Using Your Biometric Data
The privacy concerns here are international. Although we’re protected by the European Convention on Human Rights, and by the Data Protection Act, other countries have different laws. Critics are already worried that the new biometric passports will be too easy to read, record, and pass on.

Wednesday, August 15, 2012

DDNS – Free Dynamic DNS Providers


We maintain the list of Dynamic DNS (DDNS) providers online. Dynamic DNS is a method that allows you to notify a Domain Name Server (DNS) to change in your active DNS configuration on a device such as a router or computer of its configured hostname and address. It is most useful when your computer or network obtains a new IP address lease and you would like to dynamically associate a hostname with that address, without having to manually enter the change every time. Since there are situations where an IP address can change, it helps to have a way of automatically updating hostnames that point to the new address every time. Enter DDNS to the rescue.
We are proud to be considered the top resource online for information on dynamic dns providers. This is a gentle, not-too-technical introduction on it, how it works, and a comprehensive list of mostly free providers. We have also provided some dynamic dns reviews on various hosting companies to help you better decide who to choose!

If you like this list, please link to it will help others find this free list more easily!
Name
URL and domain selection
Subdomains?
Domains?
dnsdynamic.org
(June 2011)

http://www.dnsdynamic.org/
Domains: *.user32.com, *.tftpd.net, *.wow64, etc (12+)
Free VPN Also Available
Free
Free
changeIP.com
(June 2011)

http://www.changeip.com/
Domains: *.dumb1.com, *.wikababa.com, *.dynamic-dns.net, etc (100+)
Free
$3/mo
$6/qr
$15/yr
No IP
(June 2011)

http://www.no-ip.com/
Domains: *.no-ip.com, *.servequake.com, *.sytes.net, etc. (21 domains)
Free (5 domain limit)
$15/yr
afraid.org
(June 2011)

http://freedns.afraid.org/
Domains: *.afraid.org, many many others (they list about 300. no, really.)
Free (donations encouraged)
Free (donations encouraged)
dyndns.com
(December 2011)

http://www.dyndns.com/
18 Subdomains Available
No Longer Free
Free
(Pro: $15/yr)
zonomi.com
(June 2011)

http://www.zonomi.com/
Free
$10/yr
zoneedit.com
(June 2011)

http://www.zoneedit.com/
Free
Free
cjb.net
(June 2011)

http://www.cjb.net/
Domains: *.cjb.net
Free
N/A
Zerigo
(June 2011)

http://www.zerigo.com/managed-dns
Free (Pro: $19/yr)
Free
3322.org
(June 2011)

http://www.3322.org/
Chinese Domains: *.3322.org, *.8866.net, etc (quite a few, but seem to have trouble accessing their sites from US)
Free
N/A
oray.com
(June 2011)

http://www.oray.com/
Chinese Domains: *.xicp.net, etc (in Chinese)
Free
N/A
DarSite
(June 2011)

http://www.darsite.com/eng
Domains: *.darweb.com
$100/year
$100/year
ddns.nu
(5 Dec 2001)

http://www.ddns.nu/
Domains: *.cable.nu, *.optus.nu, *.evangelion.nu, several others
Reg Disabled
Reg Disabled
Deerfield
(2 Nov 2002)

http://dns2go.deerfield.com/
Domains: *.dns2go.com, *.idleplay.net, *.dynamic-site.net, others
$9.95/year
$19.95/year
DHIS
(June 2011)

http://www.dhis.org/
Domains: *.net.dhis.org
Free
N/A
DHS
(9 Dec 2001)

http://www.dhs.org/
Domains: *.dhs.org
$5 (one-time charge?)
N/A
DNS 4 BIZ
(2 Nov 2002)

http://www.dns4biz.de/
Domains: Unknown
Free (also for-pay options available)
$4.99/month
DNS Exit
(2 Dec 2002)

http://www.dnsexit.com/
N/A
Free
DNS Made Easy
(2 Nov 2002)

http://www.dnsmadeeasy.com/
Domains: *.dnsmadeeasy.com, others
Free
$4.95/year (up to 5 domains)
DNS Park
(8 Dec 2005)

http://www.dnspark.com/services/dynamicDNS.php
N/A
$8.95/year
dnsd.be
(5 Dec 2001)

http://www.dnsd.be/
Domains: *.dnsd.be
5 Euro per year for the first
hostname; 4 Euro for additional
hostnames mapped to the same IP.
N/A
DtDNS
(9 Dec 2001)

http://www.dtdns.com/
Domains: *.darktech.org, *.dtdns.net, *.etowns.com, others
Free
$20/year
dyn.ee
(9 Dec 2001)

http://www.dyn.ee/
Domains: *.dyn.ee, *.dynserv.[com/net/org]
Free
N/A
DynAccess
(5 Dec 2001)

http://www.dynaccess.de
Domains: *.dyn-access.(com/net/org/de/info/biz),
several others
5 Euro/year (or more, depending on
name selected)

DynamIP
(5 Dec 2001)

http://www.dynamip.com/
N/A
$3/month
Dynamx
(5 Dec 2001)

http://www.dyn.ro/
Domains: *.dynam.ac, *.dyn.ro, *.my-ho.st, *.irc-chat.org
Free
N/A
dyndns.dk
(9 Dec 2001)

http://dyndns.dk/
Domains: *.dyndns.dk, *.kyed.com, *.lir.dk, *.yaboo.dk
Free
$10/year
dyndsl.com
(5 Dec 2001)

http://www.dyndsl.com/
Domains: *.dyndsl.com, *.45z.com, *.au2000.com
Free
N/A
dynip.com
(9 Dec 2001)

http://www.dynip.com/
Domains: *.dynip.com, others
$35.95/year and up (based on domain name chosen)
$159.95/year
dyns.cx
(5 Dec 2001)

http://dyns.cx/
Domains: *.dyns.cx, *.dyns.net, *metadns.cx, others
Free
15 Euro/year
DynUp
(5 Dec 2001)

http://www.dynup.net/
Domains: *.dynup.net
Free
N/A (“coming soon”)
Easy DNS
(5 Dec 2001)

https://web.easydns.com/
N/A
$19.95/year
Home PC
(5 Dec 2001)

http://www.homepc.org/
Domains: *.homepc.org
Reg Disabled
N/A
Hotline DNS
(5 Dec 2001)

http://www.hldns.com/
Domains: *.hldns.com
Free
N/A
Microtech Ltd.
(5 Dec 2001)

http://www.microtech.co.gg/dns/
Domains: *.freelancedeveloper.com, *.ohflip.com, *.microtech.co.gg, *.easydns4u.com
Free
20 UKP/year
MiniDNS
(5 Dec 2001)

http://www.minidns.net/
Domains: *.minidns.net
Free (“with quota”)
Free (“with quota”)
myserver.org
(9 Dec 2001)

http://www.myserver.org/
Domains: *.myserver.org, *.USArmyReserve.com, *.WidescreenHD.tv, several others
Free
$24.95/year
Nettica
(2 Nov 2002)

http://www.nettica.com/
N/A
$25/year, $45 for 2 years
Open Domain Server
(5 Dec 2001)

http://www.ods.org/
Domains: *.ods.org
Free
$20/year for up to 5 domains
Planet DNS
(9 Dec 2001)

http://www.planetdns.net/
Domains: *.planetdns.[net/org/biz/ca]
$19.95/year
$49.95/year
PowerDNS
(5 Dec 2001)

http://www.powerdns.com/
N/A
Free for up to five domains, per email from site admin.
Prout
(2 Nov 2002)

http://www.prout.be/dns/
Domains: *.prout.be, *.dyn.prout.be
Free
N/A
Sitelutions
(2 Nov 2002)

http://www.sitelutions.com/info/sldns
N/A
Free
Static Cling
(5 Dec 2001)

http://www.staticcling.org/
Domains: *.staticcling.org
Free
N/A
That IP
(2 Nov 2002)

http://www.thatip.com/
Domains: *.thatip.com
$10 for up to 5 names
$10 for up to 5 names
Turnkey Hub
(June 2011)

https://hub.turnkeylinux.org/
Domains *. TKLAPP.com
Cloud Services with Turnkey Hub, but pricing based on Amazon EC3
Free
Free
TZO Internet
(5 Dec 2001)

http://www.tzo.com/
Domains: *.tzo.com, *.tzo.net, *.tzo.org, *.tzo.cc
$24.95/year
$59.95/year
$99.95/2 years
whyI
(9 Dec 2001)

http://www.whyi.org/
Domains: *.yi.org,*.whyi.org,*.weedns.com,*.b0b.org
Free
N/A
Xname
(June 2011)

http://www.xname.org/
Domains: *.xname.org
Free
N/A
Widge DNS
(3 Dec 2002)

http://dns.widge.net/
N/A
Free
World Wide DNS
(5 Dec 2001)

http://www.worldwidedns.net/
N/A
$39/year